-
| | |
|------------------|-----------------|
|Previous ID | SR-4349 |
|Radar | rdar://problem/31408027 |
|Original Repor…
-
The library already has an API for sign-to-contract signature tweaks for ECDSA, but not BIP-340 Schnorrs. This issue is to colect a feedback on the best way of its implementation before I will start w…
-
**What is the bug?**
Basically we are receiving delete events from Shuttle but when we check for hub using the `getAllVerificationMessagesByFid` it says its in added state. we are assuming whenever M…
-
We should use a default keytype in most tests (currently RSA, ecdsa maybe makes sense after #155). In addition we should have specific tests for support of various other keytypes. Specification does n…
-
It feels like leaving the verifier to wade through a schema definition or 'scheme-sniff' returned data for the crypto schemes the response items use would be messy, misfire-prone process. As such, sho…
-
The currently implemented signature verification doesn't work for every tool, many use streaming payloads which this doesn't attempt to handle at the moment.
The overview and documentation may be fou…
-
Armin Sabouri, CTO, Botanix Labs - PANEL
Other Guests: Nick Farrow, Jesse Posner, Chelsea Komlo
Moderator (Suggestion): Satsie
# Description
### What is this panel discussion about? Please give …
-
Tagging local dates with 1004, which are stored as `elementValue` in `IssuerSignedItem` doesn't work.
First approach doesn't solve it, see 92d71a4
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xddc2c1afc88706ed5044654969bf0bae2dfe20b6fed3f4b52e3722a0c023bcd0
**Severity:** medium
**Description:**
As per the […
-
I was testing PKCS#1 v1.5 signature verification as implemented in cryptopp and noticed it rejects valid signature whose encoded message uses an implicit NULL parameter for hash algorithm (where diges…