neoneo-go/pkg/crypto/keys/wif.go
Roman Khimov 2c3e92923f keys: simplify error handling for PublicKey() and associated
PublicKey() for PrivateKey now just can't fail and it makes no sense to return
an error from it. There is a lot of associated functionality for which this
also is true, so adjust it accordingly and simplify a lot of code.
2019-09-05 12:34:12 +03:00

108 lines
2.2 KiB
Go

package keys
import (
"bytes"
"fmt"
"github.com/CityOfZion/neo-go/pkg/crypto"
)
const (
// WIFVersion is the version used to decode and encode WIF keys.
WIFVersion = 0x80
)
// WIF represents a wallet import format.
type WIF struct {
// Version of the wallet import format. Default to 0x80.
Version byte
// Bool to determine if the WIF is compressed or not.
Compressed bool
// A reference to the PrivateKey which this WIF is created from.
PrivateKey *PrivateKey
// The string representation of the WIF.
S string
}
// WIFEncode encodes the given private key into a WIF string.
func WIFEncode(key []byte, version byte, compressed bool) (s string, err error) {
if version == 0x00 {
version = WIFVersion
}
if len(key) != 32 {
return s, fmt.Errorf("invalid private key length: %d", len(key))
}
buf := new(bytes.Buffer)
buf.WriteByte(version)
buf.Write(key)
if compressed {
buf.WriteByte(0x01)
}
s = crypto.Base58CheckEncode(buf.Bytes())
return
}
// WIFDecode decoded the given WIF string into a WIF struct.
func WIFDecode(wif string, version byte) (*WIF, error) {
b, err := crypto.Base58CheckDecode(wif)
if err != nil {
return nil, err
}
if version == 0x00 {
version = WIFVersion
}
if b[0] != version {
return nil, fmt.Errorf("invalid WIF version got %d, expected %d", b[0], version)
}
// Derive the PrivateKey.
privKey, err := NewPrivateKeyFromBytes(b[1:33])
if err != nil {
return nil, err
}
w := &WIF{
Version: version,
PrivateKey: privKey,
S: wif,
}
// This is an uncompressed WIF
if len(b) == 33 {
w.Compressed = false
return w, nil
}
if len(b) != 34 {
return nil, fmt.Errorf("invalid WIF length: %d expecting 34", len(b))
}
// Check the compression flag.
if b[33] != 0x01 {
return nil, fmt.Errorf("invalid compression flag %d expecting %d", b[34], 0x01)
}
w.Compressed = true
return w, nil
}
// GetVerificationScript returns NEO VM bytecode with checksig command for the public key.
func (wif WIF) GetVerificationScript() []byte {
const (
pushbytes33 = 0x21
checksig = 0xac
)
var (
vScript []byte
pubkey *PublicKey
)
pubkey = wif.PrivateKey.PublicKey()
vScript = append([]byte{pushbytes33}, pubkey.Bytes()...)
vScript = append(vScript, checksig)
return vScript
}