Go to file
Hendrik Hofstadt 0e69aa4ddc remove requirement for half_q on pub key x
Schnorr signatures don't have the ecdsa malleability vulnerability, also we protect against malleable signatures by tracking consumed VAAs using their body hash.
The check was implemented because the author assumed that ecrecover in the EVM does not accept s < HALF_Q values for malleability protection. There were 2 misconceptions:
1. pubkey_x is passed in as r and not s, 2. the check is not enforced in the precompiled evm instruction.
2020-08-10 21:08:57 +02:00
bridge remove requirement for half_q on pub key x 2020-08-10 21:08:57 +02:00
docs update claimed vaa doc 2020-08-10 08:48:25 +02:00
ethereum remove requirement for half_q on pub key x 2020-08-10 21:08:57 +02:00
solana update claimed vaa doc 2020-08-10 08:48:25 +02:00
web basic ETH interaction; WIP Solana interaction 2020-08-10 00:01:18 +02:00
.gitignore Add VAA serialization logic 2020-08-04 23:43:16 +02:00