From 8684d647a3f9410099f7c10ad84fa2759455de72 Mon Sep 17 00:00:00 2001 From: Dmitri Bogomolov <4glitch@gmail.com> Date: Mon, 18 Nov 2019 14:47:16 +0200 Subject: [PATCH] Use default digestalg='sha256' in highlevelcrypto.sign() --- src/highlevelcrypto.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/highlevelcrypto.py b/src/highlevelcrypto.py index f392fe4a..f89a31c8 100644 --- a/src/highlevelcrypto.py +++ b/src/highlevelcrypto.py @@ -2,8 +2,8 @@ High level cryptographic functions based on `.pyelliptic` OpenSSL bindings. .. note:: - Upstream pyelliptic was upgraded from SHA1 to SHA256 for signing. - We must upgrade PyBitmessage gracefully. + Upstream pyelliptic was upgraded from SHA1 to SHA256 for signing. We must + `upgrade PyBitmessage gracefully. `_ `More discussion. `_ """ @@ -68,7 +68,7 @@ def sign(msg, hexPrivkey): "digestalg" setting """ digestAlg = BMConfigParser().safeGet( - 'bitmessagesettings', 'digestalg', 'sha1') + 'bitmessagesettings', 'digestalg', 'sha256') if digestAlg == "sha1": # SHA1, this will eventually be deprecated return makeCryptor(hexPrivkey).sign(