--- Day changed Mon Oct 05 2015 02:23 -!- arubi [~ese168@unaffiliated/arubi] has left #secp256k1 ["Leaving"] 03:10 -!- Guest11115 [~GAit@2-228-102-100.ip191.fastwebnet.it] has quit [Quit: It was good while it lasted!] 05:47 -!- GAit [~GAit@2-228-102-100.ip191.fastwebnet.it] has joined #secp256k1 06:28 -!- mtrythall [~mtrythall@pool-108-36-102-29.phlapa.fios.verizon.net] has joined #secp256k1 07:53 -!- CodeShark [CodeShark@cpe-76-167-237-202.san.res.rr.com] has quit [] 08:43 -!- fkhan [weechat@gateway/vpn/mullvad/x-gprnhghujoehtoec] has quit [Ping timeout: 260 seconds] 08:56 -!- fkhan [weechat@gateway/vpn/mullvad/x-cfznpurriqqzmrdj] has joined #secp256k1 09:36 -!- mtrythall [~mtrythall@pool-108-36-102-29.phlapa.fios.verizon.net] has quit [Quit: Textual IRC Client: http://www.textualapp.com/] 13:19 < phantomcircuit> gmaxwell, does the current master have compact recovery still? 13:20 < phantomcircuit> it would be nice to remove the openssl code for compact recovery for the sign/verify message rpc calls 13:20 < phantomcircuit> especially ECDSA_SIG_recover_key_GFp... 13:20 < sipa> yes, optionally enabled with --enable-module-recovery 13:39 < phantomcircuit> i guess there isn't much point in doing that until the other openssl verify code is removed 13:41 < sipa> patience, my phadawan 13:41 < sipa> i have a branch that does all that 13:42 < sipa> including for messages 13:58 < phantomcircuit> ah 13:58 < phantomcircuit> sipa, neat :) 15:21 < btcdrak> can a channel OP please PM me 15:23 -!- mode/#secp256k1 [+o sipa] by ChanServ 15:55 <@sipa> ok, so how shall i be calling the lax-really-discouraged-der-parser? 15:58 <@gmaxwell> secp256k1_ecdsa_signature_parse_sloppy_encoding ? 16:40 <@gmaxwell> sipa: if you believe your permissive decoder gets all of BER, perhaps it should just be called BER? 16:40 <@sipa> it supports more than BER :) 16:40 <@sipa> (negative numbers) 16:40 <@gmaxwell> Hm? ber doesn't do negative numbers? 16:41 <@sipa> BER specifies that numbers are encoded in 2's complement notation 16:41 <@gmaxwell> another possibility is to call it "malleable" 16:41 <@sipa> ECDSA signatures only have positive numbers in them, so the top bit will never be 1 16:42 <@gmaxwell> as in, name it based on the property people need to understand about it. 16:42 <@sipa> however, OpenSSL accepts signatures where the top bit is 1, and interprets them as unsigned integers anyway 16:42 <@sipa> but BER doesn't have a concept of unsigned integers, only integers 16:42 <@sipa> so, OpenSSL and my parser are more lax than BER is 16:42 <@gmaxwell> ah, got it.. it's not that it's negative numbers, its that openssl misinters a ber negative number. 16:43 <@sipa> by implicitly assuming the numbers are unsigned, and violating BER's intended interpretation 17:44 -!- CodeShark [CodeShark@cpe-76-167-237-202.san.res.rr.com] has joined #secp256k1 19:06 -!- mtrythall [~mtrythall@pool-108-36-102-29.phlapa.fios.verizon.net] has joined #secp256k1 19:26 -!- mtrythall [~mtrythall@pool-108-36-102-29.phlapa.fios.verizon.net] has quit [Quit: Computer has gone to sleep.] 22:03 -!- roasbeef [~root@104.131.26.124] has quit [Ping timeout: 246 seconds] 22:03 -!- fkhan [weechat@gateway/vpn/mullvad/x-cfznpurriqqzmrdj] has quit [Ping timeout: 244 seconds] 22:03 -!- Apocalyptic [~Apocalypt@unaffiliated/apocalyptic] has quit [Ping timeout: 255 seconds] 22:04 -!- Luke-Jr [~luke-jr@unaffiliated/luke-jr] has quit [Ping timeout: 265 seconds] 22:05 -!- roasbeef [~root@104.131.26.124] has joined #secp256k1 22:06 -!- Luke-Jr [~luke-jr@unaffiliated/luke-jr] has joined #secp256k1 22:09 -!- Apocalyptic [~Apocalypt@unaffiliated/apocalyptic] has joined #secp256k1 22:16 -!- fkhan [weechat@gateway/vpn/mullvad/x-ndcobfptkpdhblbm] has joined #secp256k1