-
Notifications
You must be signed in to change notification settings - Fork 441
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SECP256K1: Implement Verify function for hashes #828
Comments
Hi, @MarcoDotIO thanks for your participation in our project. Just one question, how badly do you want this feature? |
Hello, Thank you for the response. I can go ahead and show an implementation of such a use case from the following code snippet from one of my recent projects I was involved with: I'd also recommend having a sign() function that is able to return a non-recoverable signature: |
Thanks you once again for such detailed feedback, could you elaborate it a bit their use cases on the client side? It's just, we're now loosely maintaining this lib as it's stable and we're currently lacking of Ethereum foundation grants, so in anyway if the team decides that this feature is necessary it'll be added in our backlog, rather than being taken into work immediately. |
Hello, Thank you for reaching out and for your comprehensive feedback. To address your query on client-side use cases:
I understand the constraints you're working under given the current state of funding. However, considering the fundamental importance of these functions in cryptographic systems, and the increasing emphasis on security and privacy in today's digital world, I believe they would be a valuable addition to the library. I'm available to provide further insights or assist in any way necessary to expedite the implementation of these features if the team sees fit. Best regards, |
Sorry for being away for a while, and I really value your efforts to participate with our project. So, in given circumstances, I believe that the most effective way of your participation would be a PR. It's not just because this would be the easiest one for us to manage, but because we're actually considering this lib as a true open source project, which is mean that we are expecting that new features would be implemented by the requester themselves or being part of our roadmap, that is as I mentioned before is near to be finished for this given major version branch. So what I'm trying to say here is not just "provide a PR or get out", it's more like even though I share your concern here, the best we can offer from our side is to review the PR as long as general circumstances would change. |
What context is your feature request related to?
When using SECP256K1 Data, it is important that we need a verify function for verifying our signature data. Otherwise the struct is rendered essentially useless for signing data.
What solution would you like?
Implement a function called verifySignature() that takes in a signature data object (or a secp256k1_ecdsa_signature object), a pubKey data object (or a secp256k1_pubkey object), and a data object and outputs a bool whether or not the signature is valid.
Any additional context?
None.
The text was updated successfully, but these errors were encountered: