Skip to content

Fix to make AWSKeyManagementExternalSigner signed messages compatible with EIP-2 #1036

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jun 25, 2024

Conversation

hasandogu
Copy link
Contributor

ECDSASignature should be made canonical here as Ethereum requires S to be less than secp256k1n/2 as specified in EIP-2 because of a transaction malleability concern.

It is doing the correct thing for Azure as can be seen here:

return ECDSASignatureFactory.FromComponents(result.Signature).MakeCanonical();

Fixing #1035

@juanfranblanco juanfranblanco merged commit b80d2b5 into Nethereum:master Jun 25, 2024
@juanfranblanco
Copy link
Member

Thanks, well spotted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants