- 20 Jan, 2021 1 commit
-
-
Martin Holst Swende authored
Squashed from the following commits: core/state: lazily init snapshot storage map core/state: fix flawed meter on storage reads core/state: make statedb/stateobjects reuse a hasher core/blockchain, core/state: implement new trie prefetcher core: make trie prefetcher deliver tries to statedb core/state: refactor trie_prefetcher, export storage tries blockchain: re-enable the next-block-prefetcher state: remove panics in trie prefetcher core/state/trie_prefetcher: address some review concerns sq
-
- 08 Apr, 2020 1 commit
-
-
Adam Schmideg authored
This improves error messages when the file is too short or too long. Also rewrite the test for SaveECDSA because LoadECDSA has its own test now. Co-authored-by:
Felix Lange <fjl@twurst.com>
-
- 12 Jun, 2018 1 commit
-
-
Felix Lange authored
ToECDSAPub was unsafe because it returned a non-nil key with nil X, Y in case of invalid input. This change replaces ToECDSAPub with UnmarshalPubkey across the codebase.
-
- 08 May, 2018 1 commit
-
-
kiel barry authored
-
- 11 Dec, 2017 1 commit
-
-
Felix Lange authored
With this change, key, err := crypto.HexToECDSA("000000...") returns nil key and an error instead of a non-nil key with nil X and Y inside. Issue found by @guidovranken.
-
- 06 Dec, 2017 1 commit
-
-
Felix Lange authored
We need those operations for p2p/enr. Also upgrade github.com/btcsuite/btcd/btcec to the latest version and improve BenchmarkSha3. The benchmark printed extra output that confused tools like benchstat and ignored N.
-
- 01 Jun, 2017 1 commit
-
-
Péter Szilágyi authored
-
- 18 Feb, 2017 1 commit
-
-
Felix Lange authored
* vendor: add github.com/btcsuite/btcd/btcec * crypto: add btcec fallback for sign/recover without cgo This commit adds a non-cgo fallback implementation of secp256k1 operations. * crypto, core/vm: remove wrappers for sha256, ripemd160
-
- 12 Jan, 2017 1 commit
-
-
Felix Lange authored
- Use defined constants instead of hard-coding their integer value. - Allocate secp256k1 structs on the C stack instead of converting []byte - Remove dead code
-
- 06 Jan, 2017 1 commit
-
-
Felix Lange authored
-
- 05 Jan, 2017 1 commit
-
-
Péter Szilágyi authored
To address increasing complexity in code that handles signatures, this PR discards all notion of "different" signature types at the library level. Both the crypto and accounts package is reduced to only be able to produce plain canonical secp256k1 signatures. This makes the crpyto APIs much cleaner, simpler and harder to abuse.
-
- 28 Oct, 2016 1 commit
-
-
bas-vk authored
This commit includes several API changes: - The behavior of eth_sign is changed. It now accepts an arbitrary message, prepends the well-known string \x19Ethereum Signed Message:\n<length of message> hashes the result using keccak256 and calculates the signature of the hash. This breaks backwards compatability! - personal_sign(hash, address [, password]) is added. It has the same semantics as eth_sign but also accepts a password. The private key used to sign the hash is temporarily unlocked in the scope of the request. - personal_recover(message, signature) is added and returns the address for the account that created a signature.
-
- 21 Feb, 2016 1 commit
-
-
Ricardo Catalinas Jiménez authored
As we aren't really using the standarized SHA-3
-
- 18 Feb, 2016 1 commit
-
-
Gustav Simonsson authored
* change gas cost for contract creating txs * invalidate signature with s value greater than secp256k1 N / 2 * OOG contract creation if not enough gas to store code * new difficulty adjustment algorithm * new DELEGATECALL op code
-
- 30 Nov, 2015 1 commit
-
-
Gustav Simonsson authored
thanks to Felix Lange (fjl) for help with design & impl
-
- 22 Sep, 2015 1 commit
-
-
Gustav Simonsson authored
-
- 23 Jul, 2015 1 commit
-
-
Felix Lange authored
I forgot to update one instance of "go-ethereum" in commit 3f047be5.
-
- 22 Jul, 2015 1 commit
-
-
Felix Lange authored
All code outside of cmd/ is licensed as LGPL. The headers now reflect this by calling the whole work "the go-ethereum library".
-
- 07 Jul, 2015 1 commit
-
-
Felix Lange authored
-
- 17 Mar, 2015 1 commit
-
-
Felix Lange authored
-
- 16 Mar, 2015 1 commit
-
-
obscuren authored
-
- 05 Feb, 2015 1 commit
-
-
Felix Lange authored
crypto.Sha3(append(foo, bar)) --> crypto.Sha3(foo, bar) crypto.Sha3([]byte{}) --> crypto.Sha3()
-
- 22 Jan, 2015 1 commit
-
-
obscuren authored
-
- 21 Jan, 2015 1 commit
-
-
obscuren authored
-
- 19 Jan, 2015 1 commit
-
-
obscuren authored
Private key \x00\x00...\x00 returns the _exact_ same public key as \x11 \x11...\x11. Currently investigating.
-
- 12 Jan, 2015 1 commit
-
-
obscuren authored
-
- 31 Oct, 2014 1 commit
-
-
obscuren authored
-
- 29 Oct, 2014 1 commit
-
-
Felix Lange authored
The Sha3 test contained the wrong expected result. Note that the implementation hasn't changed, the test simply contained an outdated expected value that was valid for the previous implementation.
-
- 07 Sep, 2014 2 commits