TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Pure Go implementation of the NaCL set of APIs

108 点作者 kevinburke将近 8 年前

8 条评论

inglor将近 8 年前
I love the README, it&#x27;s very modest and I enjoy reading things like &quot;if a function is longer than, say, 5 lines, I didn&#x27;t write it myself.&quot; and &quot;While you probably shouldn&#x27;t trust random security code from the Internet, I&#x27;m reasonably confident that this code is secure. I did not implement any of the hard math (poly1305, XSalsa20, curve25519) myself - I call into golang.org&#x2F;x&#x2F;crypto for all of those functions. I also ported over every test I could find from the C&#x2F;C++ code, and associated RFC&#x27;s, and ensured that these libraries passed those tests.&quot;<p>I will wait for other companies to use it first - but it looks like a very level-headed implementation that won&#x27;t be hard for the author to maintain - and a very useful tool.
wvh将近 8 年前
Thanks! I&#x27;ve been wondering why the golang crypto repo contains only half an implementation for so long. I guess people are not generally eager to take responsibility for crypto implementations, especially semi-official ones...<p>It would be nice if the golang devs would pick an Argon2 implementation too (Blake2 hash is already there); it always feels prudent not to use any crypto libraries lest they receive some sort of semi-official blessing from the either language&#x27;s own creators or renowned cryptographers.
staticassertion将近 8 年前
Did a quick ctrl + F in the readme to look for how they handle timing attacks in Go. As this is a pure Go implementation, I&#x27;m curious - how are these attacks mitigated, or is that left to consumers of the library?
评论 #14823117 未加载
geoah将近 8 年前
Amazing work, thank you! Let&#x27;s see if saltpack[1] will move to this at some point! :D<p>1. <a href="https:&#x2F;&#x2F;github.com&#x2F;keybase&#x2F;saltpack" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;keybase&#x2F;saltpack</a>
Asooka将近 8 年前
I&#x27;m confused - does this have anything to do with Google&#x27;s NaCL plug-in architecture for Chrome? Or is it only a set of crypto routines that have an unfortunate name collision with the former?
评论 #14824761 未加载
评论 #14823911 未加载
justinsaccount将近 8 年前
Also interesting, this is the first package I&#x27;ve seen in the wild that uses Bazel.
评论 #14823640 未加载
donpark将近 8 年前
Excellent. I am using my own pure-go lib, hacked up just to avoid hassle of binding to native code, but it supports only features I need.<p>Thanks Kevin.
0xdeadbeefbabe将近 8 年前
Oh good. I was just about to use <a href="https:&#x2F;&#x2F;github.com&#x2F;GoKillers&#x2F;libsodium-go" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;GoKillers&#x2F;libsodium-go</a>, but I&#x27;d rather not have to depend on CGO.