diff --git a/src/Pact/Types/Command.hs b/src/Pact/Types/Command.hs index 8cfb86f18..d5b0356cb 100644 --- a/src/Pact/Types/Command.hs +++ b/src/Pact/Types/Command.hs @@ -52,7 +52,6 @@ module Pact.Types.Command , RequestKey(..) , cmdToRequestKey , requestKeyToB16Text - -- , verifyWebAuthnSig ) where import Control.Applicative diff --git a/src/Pact/Types/Crypto.hs b/src/Pact/Types/Crypto.hs index f97195dd8..d1c9bb280 100644 --- a/src/Pact/Types/Crypto.hs +++ b/src/Pact/Types/Crypto.hs @@ -149,7 +149,6 @@ instance Scheme (SPPKScheme 'ED25519) where type PrivateKey (SPPKScheme 'ED25519) = Ed25519.PrivateKey type Signature (SPPKScheme 'ED25519) = Ed25519.Signature - -- TODO: Check this with the right compiler flags. _valid _ (Hash msg) pub sig = case (fromBS pubBS, fromBS sigBS) of (Right pubKey, Right sig) -> Ed25519.verify pubKey (fromShort msg) sig diff --git a/tests/SchemeSpec.hs b/tests/SchemeSpec.hs index 6612f86dd..54bf4fd6b 100644 --- a/tests/SchemeSpec.hs +++ b/tests/SchemeSpec.hs @@ -154,7 +154,6 @@ testPublicKeyImport = do - -- TODO doublecheck the logic. it "fails UserSig validation when UserSig has unexpected Scheme" $ do let hsh = hash "(somePactFunction)" [signer] <- toSigners [someED25519Pair]