diff --git a/pkg/interop/crypto/crypto.go b/pkg/interop/crypto/crypto.go index 02fce7c5a..db842ad67 100644 --- a/pkg/interop/crypto/crypto.go +++ b/pkg/interop/crypto/crypto.go @@ -35,8 +35,9 @@ func VerifySignature(msg []byte, sig []byte, pub []byte) bool { // given message hash using Secp256k1 elliptic curve. Flag isEven denotes Y's // least significant bit in decompression algorithm. The return value is byte // array representation of the public key which is either empty (if it's not -// possible to recover key) or contains 32 bytes in BE for X point (in case of -// success). This function uses Neo.Cryptography.Secp256k1Recover syscall. +// possible to recover key) or contains 64 bytes with X and Y coordinates (both +// 32-byte in BE format). This function uses Neo.Cryptography.Secp256k1Recover +// syscall. func Secp256k1Recover(r []byte, s []byte, messageHash []byte, isEven bool) []byte { return nil } @@ -45,8 +46,9 @@ func Secp256k1Recover(r []byte, s []byte, messageHash []byte, isEven bool) []byt // given message hash using Secp256r1 elliptic curve. Flag isEven denotes Y's // least significant bit in decompression algorithm. The return value is byte // array representation of the public key which is either empty (if it's not -// possible to recover key) or contains 32 bytes in BE for X point (in case of -// success). This function uses Neo.Cryptography.Secp256r1Recover syscall. +// possible to recover key) or contains 64 bytes with X and Y coordinates (both +// 32-byte in BE format). This function uses Neo.Cryptography.Secp256r1Recover +// syscall. func Secp256r1Recover(r []byte, s []byte, messageHash []byte, isEven bool) []byte { return nil }