You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
It is not directly related to any particular problem, its just some functionality that would be useful in interacting with other libraries that provide the compressed forms of ecc public keys rather than the uncompressed format that the crypto library currently provides.
Describe the solution you'd like
It would be nice if there were a flag or method that could take public keys of elliptic curves (ie secp256k1, secp256r1,...) and provide the compressed representation of that public key rather than the uncompressed version which is currently supported by generate_key. crypto is compatible with https://datatracker.ietf.org/doc/html/rfc3279.html as the uncompressed form is a MAY requirement, but many libraries online now use this representation so it would be nice to have in the standard library.
With the compressed format of the public key to the RFC, it would be {33, 32} for that last line.
Describe alternatives you've considered
We have looked for alternative library support in hex but have not yet found it and are currently implementing the compression/uncompression of these public key representations in our application. We may also look to NIF bindings to Rust libraries which do provide this functionality.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
It is not directly related to any particular problem, its just some functionality that would be useful in interacting with other libraries that provide the compressed forms of ecc public keys rather than the uncompressed format that the crypto library currently provides.
Describe the solution you'd like
It would be nice if there were a flag or method that could take public keys of elliptic curves (ie secp256k1, secp256r1,...) and provide the compressed representation of that public key rather than the uncompressed version which is currently supported by
generate_key
.crypto
is compatible with https://datatracker.ietf.org/doc/html/rfc3279.html as the uncompressed form is aMAY
requirement, but many libraries online now use this representation so it would be nice to have in the standard library.What happens now:
With the compressed format of the public key to the RFC, it would be
{33, 32}
for that last line.Describe alternatives you've considered
We have looked for alternative library support in hex but have not yet found it and are currently implementing the compression/uncompression of these public key representations in our application. We may also look to NIF bindings to Rust libraries which do provide this functionality.
The text was updated successfully, but these errors were encountered: