diff options
author | Gibheer <gibheer+git@zero-knowledge.org> | 2022-08-15 22:35:00 +0200 |
---|---|---|
committer | Gibheer <gibheer+git@zero-knowledge.org> | 2022-08-15 22:35:00 +0200 |
commit | 9fcfb1009c2088e0506e8fc5239a5a5d15379378 (patch) | |
tree | 8e8fd50c6a792ce687d3216f342ae9008812f414 | |
parent | e95929ed2641bf6548aada92d9d17a3441f19e2b (diff) |
fix upstream source of ed25519
Back when this file was created, ed25519 wasn't available as it is
today, 8 years later.
Now ed25519 is implemented in go directly, so use their work instead of
an upstream project that is now gone.
-rw-r--r-- | ed25519.go | 28 |
1 files changed, 14 insertions, 14 deletions
@@ -3,12 +3,12 @@ package pki import ( "bytes" "crypto" + "crypto/ed25519" "crypto/rand" "encoding/pem" "errors" + "fmt" "io" - - "github.com/agl/ed25519" ) const ( @@ -17,11 +17,11 @@ const ( type ( Ed25519PrivateKey struct { - private_key [ed25519.PrivateKeySize]byte + private_key ed25519.PrivateKey } Ed25519PublicKey struct { - public_key [ed25519.PublicKeySize]byte + public_key ed25519.PublicKey } ) @@ -31,16 +31,16 @@ func NewPrivateKeyEd25519() (*Ed25519PrivateKey, error) { if err != nil { return nil, err } - return &Ed25519PrivateKey{*pr_raw}, nil + return &Ed25519PrivateKey{pr_raw}, nil } // Restore an ed25519 private key from a raw byte stream. // TODO does this have to be asn1? all other functions expect asn1 func LoadPrivateKeyEd25519(raw []byte) (*Ed25519PrivateKey, error) { - var pr_loaded [ed25519.PrivateKeySize]byte - length := copy(pr_loaded[:], raw) + pr_loaded := make([]byte, ed25519.PrivateKeySize) + length := copy(pr_loaded, raw) if length != ed25519.PrivateKeySize { - return nil, errors.New("private key length incorrect") + return nil, fmt.Errorf("private key length incorrect - got: %d - expected: %d", length, ed25519.PrivateKeySize) } return &Ed25519PrivateKey{pr_loaded}, nil } @@ -57,14 +57,14 @@ func (pr *Ed25519PrivateKey) Public() PublicKey { if err != nil { return nil } - return &Ed25519PublicKey{*pu_raw} + return &Ed25519PublicKey{pu_raw} } // Hash the message given the hash algorythm and sign the hash using the private key. func (pr *Ed25519PrivateKey) Sign(message []byte, hash crypto.Hash) ([]byte, error) { hashed_message := hash.New() hashed_message.Write(message) - result := ed25519.Sign(&pr.private_key, hashed_message.Sum(nil))[:] + result := ed25519.Sign(pr.private_key, hashed_message.Sum(nil))[:] return result, nil } @@ -84,8 +84,8 @@ func (pr Ed25519PrivateKey) ToPem() (pem.Block, error) { // Load the public key from a raw byte stream. // TODO should this be read from ASN.1? All other functions do that. func LoadPublicKeyEd25519(raw []byte) (*Ed25519PublicKey, error) { - var pu_loaded [ed25519.PublicKeySize]byte - length := copy(pu_loaded[:], raw) + pu_loaded := make([]byte, ed25519.PublicKeySize) + length := copy(pu_loaded, raw) if length != ed25519.PublicKeySize { return nil, errors.New("public key length incorrect") } @@ -108,12 +108,12 @@ func (pu Ed25519PublicKey) MarshalPem() (io.WriterTo, error) { // Hash the message with the hash algorythm and check the signature against the result. func (pu Ed25519PublicKey) Verify(message []byte, signature []byte, hash crypto.Hash) (bool, error) { - var sig [ed25519.SignatureSize]byte + sig := make([]byte, ed25519.SignatureSize) length := copy(sig[:], signature) if length != ed25519.SignatureSize { return false, errors.New("signature does not fit length") } hashed_message := hash.New() hashed_message.Write(message) - return ed25519.Verify(&pu.public_key, hashed_message.Sum(nil), &sig), nil + return ed25519.Verify(pu.public_key, hashed_message.Sum(nil), sig), nil } |