neo-go/pkg/wallet/wif.go
Anastasia Prasolova 2fd2866f7f Key signature and wallet address get functions added to Public key (#144)
* small fixes

* gofmt

* fix in raw tx build

* fixes after review

* balance getter interface

* moved address and signature calculation to public key

* errors handling

* PublicKey() returns PublicKey instead of bytes slice

* fixes after review

* fixes after review
2019-02-19 18:37:35 +00:00

110 lines
2.2 KiB
Go

package wallet
import (
"bytes"
"fmt"
"github.com/CityOfZion/neo-go/pkg/crypto"
)
const (
// WIFVersion is the version used to decode and encode WIF keys.
WIFVersion = 0x80
)
// WIF represents a wallet import format.
type WIF struct {
// Version of the wallet import format. Default to 0x80.
Version byte
// Bool to determine if the WIF is compressed or not.
Compressed bool
// A reference to the PrivateKey which this WIF is created from.
PrivateKey *PrivateKey
// The string representation of the WIF.
S string
}
// WIFEncode encodes the given private key into a WIF string.
func WIFEncode(key []byte, version byte, compressed bool) (s string, err error) {
if version == 0x00 {
version = WIFVersion
}
if len(key) != 32 {
return s, fmt.Errorf("invalid private key length: %d", len(key))
}
buf := new(bytes.Buffer)
buf.WriteByte(version)
buf.Write(key)
if compressed {
buf.WriteByte(0x01)
}
s = crypto.Base58CheckEncode(buf.Bytes())
return
}
// WIFDecode decoded the given WIF string into a WIF struct.
func WIFDecode(wif string, version byte) (*WIF, error) {
b, err := crypto.Base58CheckDecode(wif)
if err != nil {
return nil, err
}
if version == 0x00 {
version = WIFVersion
}
if b[0] != version {
return nil, fmt.Errorf("invalid WIF version got %d, expected %d", b[0], version)
}
// Derive the PrivateKey.
privKey, err := NewPrivateKeyFromBytes(b[1:33])
if err != nil {
return nil, err
}
w := &WIF{
Version: version,
PrivateKey: privKey,
S: wif,
}
// This is an uncompressed WIF
if len(b) == 33 {
w.Compressed = false
return w, nil
}
if len(b) != 34 {
return nil, fmt.Errorf("invalid WIF length: %d expecting 34", len(b))
}
// Check the compression flag.
if b[33] != 0x01 {
return nil, fmt.Errorf("invalid compression flag %d expecting %d", b[34], 0x01)
}
w.Compressed = true
return w, nil
}
func (wif WIF) GetVerificationScript() ([]byte, error) {
const (
pushbytes33 = 0x21
checksig = 0xac
)
var (
vScript []byte
pubkey *crypto.PublicKey
)
pubkey, err := wif.PrivateKey.PublicKey()
if err != nil {
return nil, err
}
vScript = append([]byte{pushbytes33}, pubkey.Bytes()...)
vScript = append(vScript, checksig)
return vScript, nil
}