Add type PrivateKey, (*PrivateKey).Sign() and (*PublicKey).Verify().
This commit is contained in:
parent
1dbf389ceb
commit
ac7a367950
2 changed files with 32 additions and 2 deletions
28
privkey.go
28
privkey.go
|
@ -6,12 +6,17 @@ package btcec
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/ecdsa"
|
"crypto/ecdsa"
|
||||||
|
"crypto/rand"
|
||||||
"math/big"
|
"math/big"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// PrivateKey is an ecdsa.PrivateKey
|
||||||
|
// It provides a method Sign
|
||||||
|
type PrivateKey ecdsa.PrivateKey
|
||||||
|
|
||||||
// PrivKeyFromBytes returns a private and public key for `curve' based on the
|
// PrivKeyFromBytes returns a private and public key for `curve' based on the
|
||||||
// private key passed as an argument as a byte slice.
|
// private key passed as an argument as a byte slice.
|
||||||
func PrivKeyFromBytes(curve *KoblitzCurve, pk []byte) (*ecdsa.PrivateKey,
|
func PrivKeyFromBytes(curve *KoblitzCurve, pk []byte) (*PrivateKey,
|
||||||
*PublicKey) {
|
*PublicKey) {
|
||||||
x, y := curve.ScalarBaseMult(pk)
|
x, y := curve.ScalarBaseMult(pk)
|
||||||
|
|
||||||
|
@ -24,5 +29,24 @@ func PrivKeyFromBytes(curve *KoblitzCurve, pk []byte) (*ecdsa.PrivateKey,
|
||||||
D: new(big.Int).SetBytes(pk),
|
D: new(big.Int).SetBytes(pk),
|
||||||
}
|
}
|
||||||
|
|
||||||
return priv, (*PublicKey)(&priv.PublicKey)
|
return (*PrivateKey)(priv), (*PublicKey)(&priv.PublicKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ToECDSA returns the private key as a *ecdsa.PrivateKey.
|
||||||
|
func (p *PrivateKey) ToECDSA() *ecdsa.PrivateKey {
|
||||||
|
return (*ecdsa.PrivateKey)(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sign wraps ecdsa.Sign to sign an arbitrary length hash (which should be the result of hashing a larger message) using the private key.
|
||||||
|
// It returns the signature as a *Signature. The security of the private key depends on the entropy of rand (crypto/rand.Reader).
|
||||||
|
func (p *PrivateKey) Sign(hash []byte) (*Signature, error) {
|
||||||
|
r, s, err := ecdsa.Sign(rand.Reader, p.ToECDSA(), hash)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
sig := &Signature{
|
||||||
|
R: r,
|
||||||
|
S: s,
|
||||||
|
}
|
||||||
|
return sig, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -162,3 +162,9 @@ func paddedAppend(size uint, dst, src []byte) []byte {
|
||||||
}
|
}
|
||||||
return append(dst, src...)
|
return append(dst, src...)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Verify calls ecdsa.Verify to verify the signature of hash using the public key.
|
||||||
|
// Its return value records whether the signature is valid.
|
||||||
|
func (p *PublicKey) Verify(hash []byte, sig *Signature) bool {
|
||||||
|
return ecdsa.Verify(p.ToECDSA(), hash, sig.R, sig.S)
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue