quorum/crypto
Péter Szilágyi 08eea0f0e4 accounts, core, crypto, internal: use normalised V during signature handling (#3455)
To address increasing complexity in code that handles signatures, this PR
discards all notion of "different" signature types at the library level. Both
the crypto and accounts package is reduced to only be able to produce plain
canonical secp256k1 signatures. This makes the crpyto APIs much cleaner,
simpler and harder to abuse.
2017-01-05 11:35:23 +01:00
..
ecies all: fix go vet warnings 2016-04-15 11:17:27 +02:00
randentropy crypto: Remove dead code 2016-02-21 22:46:31 +00:00
secp256k1 parmas, crypto, core, core/vm: homestead consensus protocol changes 2016-02-18 10:08:11 +01:00
sha3 crypto/sha3: update from golang.org/x/crypto/sha3 a 80b25ed4 2016-10-01 21:26:43 +02:00
crypto.go accounts, core, crypto, internal: use normalised V during signature handling (#3455) 2017-01-05 11:35:23 +01:00
crypto_test.go accounts, core, crypto, internal: use normalised V during signature handling (#3455) 2017-01-05 11:35:23 +01:00
encrypt_decrypt_test.go all: fix license headers one more time 2015-07-23 18:35:11 +02:00