aboutsummaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorobscuren <geffobscura@gmail.com>2015-03-11 08:10:25 +0800
committerobscuren <geffobscura@gmail.com>2015-03-11 08:10:25 +0800
commit58909117bea6a8185df3335300426b8a49542235 (patch)
tree28da1103a5542dff0ebfb41c43b46c460294203b /crypto
parenteba4f389a6c494bc3e15b3bbc6516b51a5e61236 (diff)
downloadgo-tangerine-58909117bea6a8185df3335300426b8a49542235.tar.gz
go-tangerine-58909117bea6a8185df3335300426b8a49542235.tar.zst
go-tangerine-58909117bea6a8185df3335300426b8a49542235.zip
Use ECDSA instead of elliptic
Diffstat (limited to 'crypto')
-rw-r--r--crypto/key.go9
1 files changed, 3 insertions, 6 deletions
diff --git a/crypto/key.go b/crypto/key.go
index ec4908c30..9dbf37467 100644
--- a/crypto/key.go
+++ b/crypto/key.go
@@ -26,7 +26,6 @@ package crypto
import (
"bytes"
"crypto/ecdsa"
- "crypto/elliptic"
"encoding/json"
"io"
@@ -87,18 +86,16 @@ func (k *Key) UnmarshalJSON(j []byte) (err error) {
}
func NewKey(rand io.Reader) *Key {
- randBytes := make([]byte, 32)
+ randBytes := make([]byte, 64)
_, err := rand.Read(randBytes)
if err != nil {
panic("key generation: could not read from random source: " + err.Error())
}
reader := bytes.NewReader(randBytes)
- _, x, y, err := elliptic.GenerateKey(S256(), reader)
+ privateKeyECDSA, err := ecdsa.GenerateKey(S256(), reader)
if err != nil {
- panic("key generation: elliptic.GenerateKey failed: " + err.Error())
+ panic("key generation: ecdsa.GenerateKey failed: " + err.Error())
}
- privateKeyMarshalled := elliptic.Marshal(S256(), x, y)
- privateKeyECDSA := ToECDSA(privateKeyMarshalled)
id := uuid.NewRandom()
key := &Key{