-
Notifications
You must be signed in to change notification settings - Fork 5
/
signer.go
78 lines (67 loc) · 2.06 KB
/
signer.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
// Copyright (C) 2019 gyee authors
//
// This file is part of the gyee library.
//
// The gyee library is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// The gyee library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with the gyee library. If not, see <http://www.gnu.org/licenses/>.
package secp256k1
import (
"github.com/yeeco/gyee/crypto"
"github.com/yeeco/gyee/utils/logging"
"errors"
)
type Signer struct {
algrithm crypto.Algorithm
privateKey []byte
}
func NewSecp256k1Signer() *Signer {
signer := &Signer{
algrithm: crypto.ALG_SECP256K1,
}
return signer
}
func (s *Signer) Algorithm() crypto.Algorithm {
return s.algrithm
}
func (s *Signer) InitSigner(privateKey []byte) error {
s.privateKey = privateKey
return nil
}
func (s *Signer) Sign(data []byte) (signature *crypto.Signature, err error) {
if s.privateKey == nil {
logging.Logger.Warn("privateKey has not setted!")
return nil, errors.New("privateKey has not setted")
}
sig, err := Sign(data, s.privateKey)
if err != nil {
logging.Logger.Warn("signing error.", err)
return nil, err
}
signature = &crypto.Signature{
Algorithm: s.Algorithm(),
Signature: sig,
}
return signature, nil
}
func (s *Signer) RecoverPublicKey(data []byte, signature *crypto.Signature) (publicKey []byte, err error) {
pk, err := RecoverPubkey(data, signature.Signature)
if err != nil {
logging.Logger.Warn("recover public key error.", err)
return nil, err
}
return pk, nil
}
func (s *Signer) Verify(publicKey []byte, data []byte, signature *crypto.Signature) bool {
ret := VerifySignature(publicKey, data, signature.Signature[:64])
return ret
}