mirror of
https://github.com/status-im/status-go.git
synced 2025-01-09 14:16:21 +00:00
eeca435064
Update vendor Integrate rendezvous into status node Add a test with failover using rendezvous Use multiple servers in client Use discovery V5 by default and test that node can be started with rendezvous discovet Fix linter Update rendezvous client to one with instrumented stream Address feedback Fix test with updated topic limits Apply several suggestions Change log to debug for request errors because we continue execution Remove web3js after rebase Update rendezvous package
101 lines
2.3 KiB
Go
101 lines
2.3 KiB
Go
package crypto
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
|
|
btcec "github.com/btcsuite/btcd/btcec"
|
|
proto "github.com/gogo/protobuf/proto"
|
|
pb "github.com/libp2p/go-libp2p-crypto/pb"
|
|
sha256 "github.com/minio/sha256-simd"
|
|
)
|
|
|
|
type Secp256k1PrivateKey btcec.PrivateKey
|
|
type Secp256k1PublicKey btcec.PublicKey
|
|
|
|
func GenerateSecp256k1Key(src io.Reader) (PrivKey, PubKey, error) {
|
|
privk, err := btcec.NewPrivateKey(btcec.S256())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
k := (*Secp256k1PrivateKey)(privk)
|
|
return k, k.GetPublic(), nil
|
|
}
|
|
|
|
func UnmarshalSecp256k1PrivateKey(data []byte) (PrivKey, error) {
|
|
if len(data) != btcec.PrivKeyBytesLen {
|
|
return nil, fmt.Errorf("expected secp256k1 data size to be %d", btcec.PrivKeyBytesLen)
|
|
}
|
|
|
|
privk, _ := btcec.PrivKeyFromBytes(btcec.S256(), data)
|
|
return (*Secp256k1PrivateKey)(privk), nil
|
|
}
|
|
|
|
func UnmarshalSecp256k1PublicKey(data []byte) (PubKey, error) {
|
|
k, err := btcec.ParsePubKey(data, btcec.S256())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return (*Secp256k1PublicKey)(k), nil
|
|
}
|
|
|
|
func (k *Secp256k1PrivateKey) Bytes() ([]byte, error) {
|
|
pbmes := new(pb.PrivateKey)
|
|
typ := pb.KeyType_Secp256k1
|
|
pbmes.Type = &typ
|
|
pbmes.Data = (*btcec.PrivateKey)(k).Serialize()
|
|
return proto.Marshal(pbmes)
|
|
}
|
|
|
|
func (k *Secp256k1PrivateKey) Equals(o Key) bool {
|
|
sk, ok := o.(*Secp256k1PrivateKey)
|
|
if !ok {
|
|
return false
|
|
}
|
|
|
|
return k.D.Cmp(sk.D) == 0
|
|
}
|
|
|
|
func (k *Secp256k1PrivateKey) Sign(data []byte) ([]byte, error) {
|
|
hash := sha256.Sum256(data)
|
|
sig, err := (*btcec.PrivateKey)(k).Sign(hash[:])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return sig.Serialize(), nil
|
|
}
|
|
|
|
func (k *Secp256k1PrivateKey) GetPublic() PubKey {
|
|
return (*Secp256k1PublicKey)((*btcec.PrivateKey)(k).PubKey())
|
|
}
|
|
|
|
func (k *Secp256k1PublicKey) Bytes() ([]byte, error) {
|
|
pbmes := new(pb.PublicKey)
|
|
typ := pb.KeyType_Secp256k1
|
|
pbmes.Type = &typ
|
|
pbmes.Data = (*btcec.PublicKey)(k).SerializeCompressed()
|
|
return proto.Marshal(pbmes)
|
|
}
|
|
|
|
func (k *Secp256k1PublicKey) Equals(o Key) bool {
|
|
sk, ok := o.(*Secp256k1PublicKey)
|
|
if !ok {
|
|
return false
|
|
}
|
|
|
|
return (*btcec.PublicKey)(k).IsEqual((*btcec.PublicKey)(sk))
|
|
}
|
|
|
|
func (k *Secp256k1PublicKey) Verify(data []byte, sigStr []byte) (bool, error) {
|
|
sig, err := btcec.ParseDERSignature(sigStr, btcec.S256())
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
hash := sha256.Sum256(data)
|
|
return sig.Verify(hash[:], (*btcec.PublicKey)(k)), nil
|
|
}
|