diff options
author | obscuren <geffobscura@gmail.com> | 2014-12-10 21:17:10 +0800 |
---|---|---|
committer | obscuren <geffobscura@gmail.com> | 2014-12-10 21:17:10 +0800 |
commit | 0f5c6c5e2daa9fbf3a0bb753debd8989a872823c (patch) | |
tree | 9d3fbd89db4210415cf897ef0c4d504b5da4ce6c /crypto/crypto.go | |
parent | 186948da22feeca138ffb976fbf96033045ad350 (diff) | |
download | go-tangerine-0f5c6c5e2daa9fbf3a0bb753debd8989a872823c.tar.gz go-tangerine-0f5c6c5e2daa9fbf3a0bb753debd8989a872823c.tar.zst go-tangerine-0f5c6c5e2daa9fbf3a0bb753debd8989a872823c.zip |
Changed new methods to use ecdsa package for pub prv keys
Diffstat (limited to 'crypto/crypto.go')
-rw-r--r-- | crypto/crypto.go | 55 |
1 files changed, 32 insertions, 23 deletions
diff --git a/crypto/crypto.go b/crypto/crypto.go index 87dd72dc7..d70a5a4db 100644 --- a/crypto/crypto.go +++ b/crypto/crypto.go @@ -18,19 +18,6 @@ func init() { ecies.AddParamsForCurve(S256(), ecies.ECIES_AES128_SHA256) } -func ToECDSA(prv []byte) *ecdsa.PrivateKey { - priv := new(ecdsa.PrivateKey) - priv.PublicKey.Curve = S256() - priv.D = ethutil.BigD(prv) - priv.PublicKey.X, priv.PublicKey.Y = S256().ScalarBaseMult(prv) - return priv -} - -func FromECDSA(prv *ecdsa.PrivateKey) []byte { - return prv.D.Bytes() -} - -// TODO refactor, remove (bin) func Sha3(data []byte) []byte { d := sha3.NewKeccak256() d.Write(data) @@ -67,23 +54,45 @@ func Ecrecover(data []byte) []byte { return r } -func SigToPub(hash, sig []byte) []byte { - return Ecrecover(append(hash, sig...)) +// New methods using proper ecdsa keys from the stdlib +func ToECDSA(prv []byte) *ecdsa.PrivateKey { + priv := new(ecdsa.PrivateKey) + priv.PublicKey.Curve = S256() + priv.D = ethutil.BigD(prv) + priv.PublicKey.X, priv.PublicKey.Y = S256().ScalarBaseMult(prv) + return priv } -func Sign(hash, prv []byte) (sig []byte, err error) { - sig, err = secp256k1.Sign(hash, prv) - return +func FromECDSA(prv *ecdsa.PrivateKey) []byte { + return prv.D.Bytes() } -func Encrypt(pub, message []byte) ([]byte, error) { +func PubToECDSA(pub []byte) *ecdsa.PublicKey { x, y := elliptic.Unmarshal(S256(), pub) - epub := &ecdsa.PublicKey{S256(), x, y} + return &ecdsa.PublicKey{S256(), x, y} +} + +func GenerateKey() (*ecdsa.PrivateKey, error) { + return ecdsa.GenerateKey(S256(), rand.Reader) +} + +func SigToPub(hash, sig []byte) *ecdsa.PublicKey { + s := Ecrecover(append(hash, sig...)) + x, y := elliptic.Unmarshal(S256(), s) + + return &ecdsa.PublicKey{S256(), x, y} +} + +func Sign(hash []byte, prv *ecdsa.PrivateKey) (sig []byte, err error) { + sig, err = secp256k1.Sign(hash, prv.D.Bytes()) + return +} - return ecies.Encrypt(rand.Reader, ecies.ImportECDSAPublic(epub), message, nil, nil) +func Encrypt(pub *ecdsa.PublicKey, message []byte) ([]byte, error) { + return ecies.Encrypt(rand.Reader, ecies.ImportECDSAPublic(pub), message, nil, nil) } -func Decrypt(prv, ct []byte) ([]byte, error) { - key := ecies.ImportECDSA(ToECDSA(prv)) +func Decrypt(prv *ecdsa.PrivateKey, ct []byte) ([]byte, error) { + key := ecies.ImportECDSA(prv) return key.Decrypt(rand.Reader, ct, nil, nil) } |