Merge pull request #1105 from nspcc-dev/fix-key-recovery-doc

interop: fix key recovery functions documentation
This commit is contained in:
Roman Khimov 2020-06-25 16:34:28 +03:00 committed by GitHub
commit b517aa43db
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -35,8 +35,9 @@ func VerifySignature(msg []byte, sig []byte, pub []byte) bool {
// given message hash using Secp256k1 elliptic curve. Flag isEven denotes Y's
// least significant bit in decompression algorithm. The return value is byte
// array representation of the public key which is either empty (if it's not
// possible to recover key) or contains 32 bytes in BE for X point (in case of
// success). This function uses Neo.Cryptography.Secp256k1Recover syscall.
// possible to recover key) or contains 64 bytes with X and Y coordinates (both
// 32-byte in BE format). This function uses Neo.Cryptography.Secp256k1Recover
// syscall.
func Secp256k1Recover(r []byte, s []byte, messageHash []byte, isEven bool) []byte {
return nil
}
@ -45,8 +46,9 @@ func Secp256k1Recover(r []byte, s []byte, messageHash []byte, isEven bool) []byt
// given message hash using Secp256r1 elliptic curve. Flag isEven denotes Y's
// least significant bit in decompression algorithm. The return value is byte
// array representation of the public key which is either empty (if it's not
// possible to recover key) or contains 32 bytes in BE for X point (in case of
// success). This function uses Neo.Cryptography.Secp256r1Recover syscall.
// possible to recover key) or contains 64 bytes with X and Y coordinates (both
// 32-byte in BE format). This function uses Neo.Cryptography.Secp256r1Recover
// syscall.
func Secp256r1Recover(r []byte, s []byte, messageHash []byte, isEven bool) []byte {
return nil
}