SKALE-2748 fix verifying ecdsa signature

parent 36ad7ae1
...@@ -131,7 +131,7 @@ string getECDSAPubKey(const char *_encryptedKeyHex) { ...@@ -131,7 +131,7 @@ string getECDSAPubKey(const char *_encryptedKeyHex) {
} }
bool verifyECDSASig(string& pubKeyStr, const char *hashHex, const char *signatureR, bool verifyECDSASig(string& pubKeyStr, const char *hashHex, const char *signatureR,
const char *signatureS) { const char *signatureS, int base) {
bool result = false; bool result = false;
signature sig = signature_init(); signature sig = signature_init();
...@@ -149,7 +149,7 @@ bool verifyECDSASig(string& pubKeyStr, const char *hashHex, const char *signatur ...@@ -149,7 +149,7 @@ bool verifyECDSASig(string& pubKeyStr, const char *hashHex, const char *signatur
goto clean; goto clean;
} }
if (signature_set_str(sig, signatureR, signatureS, 16) != 0) { if (signature_set_str(sig, signatureR, signatureS, base) != 0) {
spdlog::error("Failed to set str signature"); spdlog::error("Failed to set str signature");
goto clean; goto clean;
} }
...@@ -220,7 +220,7 @@ vector <string> ecdsaSignHash(const char *encryptedKeyHex, const char *hashHex, ...@@ -220,7 +220,7 @@ vector <string> ecdsaSignHash(const char *encryptedKeyHex, const char *hashHex,
/* Now verify signature */ /* Now verify signature */
if (!verifyECDSASig(pubKeyStr, hashHex, signatureR.data(), signatureS.data())) { if (!verifyECDSASig(pubKeyStr, hashHex, signatureR.data(), signatureS.data(), base)) {
exception = make_shared<SGXException>(667, "ECDSA did not verify"); exception = make_shared<SGXException>(667, "ECDSA did not verify");
goto clean; goto clean;
} }
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment