package rfc6979

import (
	"crypto/dsa"
	"crypto/ecdsa"
	"crypto/elliptic"
	"crypto/rand"
	"crypto/sha1"
	"crypto/sha512"
	"fmt"
)

// Generates a 521-bit ECDSA key, uses SHA-512 to sign a message, then verifies
// it.
func ExampleSignECDSA() {
	// Generate a key pair.
	// You need a high-quality PRNG for this.
	k, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
	if err != nil {
		fmt.Println(err)
		return
	}

	// Hash a message.
	alg := sha512.New()
	alg.Write([]byte("I am a potato."))
	hash := alg.Sum(nil)

	// Sign the message. You don't need a PRNG for this.
	r, s := SignECDSA(k, hash, sha512.New)

	if !ecdsa.Verify(&k.PublicKey, hash, r, s) {
		fmt.Println("Invalid signature!")
	}

	// Output:
}

// Generates a 1024-bit DSA key, uses SHA-1 to sign a message, then verifies it.
func ExampleSignDSA() {
	// Here I'm generating some DSA params, but you should really pre-generate
	// these and re-use them, since this takes a long time and isn't necessary.
	k := new(dsa.PrivateKey)
	if err := dsa.GenerateParameters(&k.Parameters, rand.Reader, dsa.L1024N160); err != nil {
		fmt.Println(err)
		return
	}

	// Generate a key pair.
	// You need a high-quality PRNG for this.
	err := dsa.GenerateKey(k, rand.Reader)
	if err != nil {
		fmt.Println(err)
		return
	}

	// Hash a message.
	alg := sha1.New()
	alg.Write([]byte("I am a potato."))
	hash := alg.Sum(nil)

	// Sign the message. You don't need a PRNG for this.
	r, s, err := SignDSA(k, hash, sha1.New)
	if err != nil {
		fmt.Println(err)
		return
	}

	if !dsa.Verify(&k.PublicKey, hash, r, s) {
		fmt.Println("Invalid signature!")
	}

	// Output:
}