-
Notifications
You must be signed in to change notification settings - Fork 361
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Road to secp256r1 support #2001
Comments
The API seems fine. Checking through This involves:
But we can't cover that, really. Unless we want an API that accepts raw scalars (that'd be a big no from me) or implement COSE ourselves (is it worth it? Contracts can do that themselves.) |
But then again, I haven't implemented WebAuthn/FIDO myself yet, so I'm not 100% sure. |
That sounds interesting. Can we try to implement all those conversions in an example contract? That way we can show contract developers what needs to be done without having to expose that functionality as part of our APIs.
Public key, right? On chain we only do signature verification. |
Ah, yes, public key. Not private key. Mixed them up in my head for a sec |
Seems like the last checklist item is done now. Can we mark this as done? 🎉 |
It is, well done and thanks 🐎 |
It has become clear that we want ECDSA secp256r1 signature verification support to allow app level signature verification using a popular industry standard curve. Now that if is answered, let' move on to when and how. Given that adding a new crypto API is something we cannot easily revert once contracts rely on it, we need to ensure that the new API is correct and behaves as desired.
Open Questions
secp256k1_verify
behaves today. An app level protocol may further restrict which sigantures are valid. Those extra checks have to be implemented separately, for now in Wasm.Blockers
trait Api
usingunimplemented!()
(Add default implementations for secp256r1_verify/secp256r1_recover_pubkey #2058)The text was updated successfully, but these errors were encountered: