On Thu, Oct 10, 2013 at 10:29 AM, Mike Hearn wrote:
> Thanks! I'd love to see this library become usable behind a command line
> flag or config setting. At some point we're going to want to switch to it.
>
The current idea is to provide a compile-time flag to enable it, which
at the same time dis
Thanks! I'd love to see this library become usable behind a command line
flag or config setting. At some point we're going to want to switch to it.
I believe the main issue at the moment is the malleability issues? If so,
it would seem possible to use OpenSSL to parse the signature into
components
Can this be combined with the ideas on deterministic signing to show matching signatures with OpenSSL's implementation?Not sure if that's worth much, since we would just be testing needles in a very large haystack, but better than nothing?On Wed, 09 Oct 2013 20:50:30 -0700, Warren Togami Jr. wrot
https://github.com/sipa/secp256k1
sipa's secp256k1, optimized ecdsa, significantly faster than openssl
Today someone in #bitcoin-dev asked for Bitcoin 0.8.5 with sipa's
secp256k1. Litecoin has been shipping test builds with secp256k1 for
several months now so it was a simple matter to throw toget
4 matches
Mail list logo