-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider moving to BouncyCastle signature generation and verification #3220
Comments
Do you have benchmarks? |
Well, I think it's a question to @vang1ong7ang, since I'm stick to the second option, to keep it as it is now. |
Me too, unless it's incredible faster |
I think I think we should implement our own code like we did already for |
Specially considering this comment here #3209 (comment), I think that @vang1ong7ang was straight to the point.
|
We had benchmark before, built-in is much faster than BouncyCastle. And i dont think we should focus on things like this. Mnay other issues should have higher priority, such as adding unit tests, benchmarks, existing issues and pr etc. |
In my opinion, deciding upon a benchmark is not the case for this issue. Just if the benchmark is something that limits use case or would limit in 2-5 years, something like that. Try to run a node with MAC would be good test as well, re-sync the chain and verify everything. |
But why bother now? Do we really have any issue here? any problem was found? Any bug addressed? |
ecdsa is definately one of the core of the core performance bottleneck, i dont see any reason of updating it if there is no obvious problem. |
Let's not forget that this is the reason for using BouncyCastle for OSX #2499 |
Good recall, @ixje . In the past, before commit #2340, we use to have our "fork" implementation for Bouncy Castle and was working for all OS. In order to fix the lack of support for koblitz curves in the C# native implementation, we moved to bouncy castle for OSX only #2511. @shargon, are you not in favor now for setting up an standard for all Operation Systems? |
@cschuchardt88 this is not true unfortunately BouncyCastle performs better than native dotnet in consistency. just as me said
|
@Jim8y I agree that this is not an urgent problem, but I doubt the conclusion of this benchmark |
and, FYI, dotnet/runtime#36107 |
Summary or problem description
This is a discussion issue raised in #3209 (comment). The suggestion from @vang1ong7ang is to use
BouncyCastle
for both Secp256k1/r1 and SHA256/Keccak256 signature generation and verification instead of a mix of built-in andBouncyCastle
usages.Read the conversation for context, please, and add your opinions. An alternative - to leave this code as it is now.
Where in the software does this update applies to?
The text was updated successfully, but these errors were encountered: