-
Notifications
You must be signed in to change notification settings - Fork 102
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Native: replace NamedCurve enum with NamedCurveHash enum
Mark VerifyWithECDsa method as obsolete. Ref. native CryptoLib update from neo-project/neo#3209. Signed-off-by: Anna Shaleva <[email protected]>
- Loading branch information
1 parent
05b575b
commit 7789606
Showing
4 changed files
with
82 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
// Copyright (C) 2015-2024 The Neo Project. | ||
// | ||
// The Neo.SmartContract.Framework is free software distributed under the MIT | ||
// software license, see the accompanying file LICENSE in the main directory | ||
// of the project or http://www.opensource.org/licenses/mit-license.php | ||
// for more details. | ||
// | ||
// Redistribution and use in source and binary forms with or without | ||
// modifications are permitted. | ||
|
||
using System; | ||
|
||
namespace Neo.SmartContract.Framework.Native | ||
{ | ||
/// <summary> | ||
/// Represents a pair of the named curve used in ECDSA and a hash algorithm used to hash message. | ||
/// This is a compatible extension of an obsolete <see cref="NamedCurve"/> enum. | ||
/// </summary> | ||
/// <remarks> | ||
/// https://tools.ietf.org/html/rfc4492#section-5.1.1 | ||
/// </remarks> | ||
public enum NamedCurveHash : byte | ||
{ | ||
/// <summary> | ||
/// The secp256k1 curve and SHA256 hash algorithm. | ||
/// </summary> | ||
secp256k1SHA256 = 22, | ||
|
||
/// <summary> | ||
/// The secp256r1 curve, which known as prime256v1 or nistP-256, and SHA256 hash algorithm. | ||
/// </summary> | ||
secp256r1SHA256 = 23, | ||
|
||
/// <summary> | ||
/// The secp256k1 curve and Keccak256 hash algorithm. | ||
/// </summary> | ||
secp256k1Keccak256 = 24, | ||
|
||
/// <summary> | ||
/// The secp256r1 curve, which known as prime256v1 or nistP-256, and Keccak256 hash algorithm. | ||
/// </summary> | ||
secp256r1Keccak256 = 25 | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters