/
key_manager.go
129 lines (105 loc) · 2.96 KB
/
key_manager.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
package crypto
import (
"fmt"
"strings"
"github.com/pkg/errors"
"github.com/tendermint/tendermint/crypto"
"github.com/cosmos/go-bip39"
cryptoAmino "github.com/oracleNetworkProtocol/plugchain-sdk-go/crypto/codec"
"github.com/oracleNetworkProtocol/plugchain-sdk-go/crypto/hd"
)
const (
defaultBIP39Passphrase = ""
)
type KeyManager interface {
Generate() (string, crypto.PrivKey)
Sign(data []byte) ([]byte, error)
ExportPrivKey(password string) (armor string, err error)
ImportPrivKey(armor, passphrase string) (crypto.PrivKey, string, error)
ExportPubKey() crypto.PubKey
}
type keyManager struct {
privKey crypto.PrivKey
mnemonic, algo string
}
func NewKeyManager() KeyManager {
return &keyManager{}
}
func NewAlgoKeyManager(algo string) (KeyManager, error) {
entropy, err := bip39.NewEntropy(256)
if err != nil {
return nil, err
}
mnemonic, err := bip39.NewMnemonic(entropy)
if err != nil {
return nil, err
}
return NewMnemonicKeyManager(mnemonic, algo)
}
func NewMnemonicKeyManager(mnemonic string, algo string) (KeyManager, error) {
k := keyManager{
mnemonic: mnemonic,
algo: algo,
}
err := k.recoveryFromMnemonic(mnemonic, hd.FullPath, algo)
return &k, err
}
func NewMnemonicKeyManagerWithHDPath(mnemonic, algo, hdPath string) (KeyManager, error) {
k := keyManager{
mnemonic: mnemonic,
algo: algo,
}
err := k.recoveryFromMnemonic(mnemonic, hdPath, algo)
return &k, err
}
func NewPrivateKeyManager(priv []byte, algo string) (KeyManager, error) {
privKey, err := cryptoAmino.PrivKeyFromBytes(priv)
if err != nil {
return nil, errors.Wrap(err, "failed to decrypt private key")
}
k := keyManager{
privKey: privKey,
algo: algo,
}
return &k, err
}
func (m *keyManager) Generate() (string, crypto.PrivKey) {
return m.mnemonic, m.privKey
}
func (m *keyManager) Sign(data []byte) ([]byte, error) {
return m.privKey.Sign(data)
}
func (m *keyManager) recoveryFromMnemonic(mnemonic, hdPath, algoStr string) error {
words := strings.Split(mnemonic, " ")
if len(words) != 12 && len(words) != 24 {
return fmt.Errorf("mnemonic length should either be 12 or 24")
}
algo, err := hd.NewSigningAlgoFromString(algoStr)
if err != nil {
return err
}
// create master key and derive first key for keyring
derivedPriv, err := algo.Derive()(mnemonic, defaultBIP39Passphrase, hdPath)
if err != nil {
return err
}
privKey := algo.Generate()(derivedPriv)
m.privKey = privKey
m.algo = algoStr
return nil
}
func (m *keyManager) ExportPrivKey(password string) (armor string, err error) {
return EncryptArmorPrivKey(m.privKey, password, m.algo), nil
}
func (m *keyManager) ImportPrivKey(armor, passphrase string) (crypto.PrivKey, string, error) {
privKey, algo, err := UnarmorDecryptPrivKey(armor, passphrase)
if err != nil {
return nil, "", errors.Wrap(err, "failed to decrypt private key")
}
m.privKey = privKey
m.algo = algo
return privKey, algo, nil
}
func (m *keyManager) ExportPubKey() crypto.PubKey {
return m.privKey.PubKey()
}