forked from TrueCloudLab/rfc6979
75 lines
1.6 KiB
Go
75 lines
1.6 KiB
Go
package rfc6979
|
|
|
|
import (
|
|
"crypto/dsa"
|
|
"crypto/ecdsa"
|
|
"crypto/elliptic"
|
|
"crypto/rand"
|
|
"crypto/sha1"
|
|
"crypto/sha512"
|
|
"fmt"
|
|
)
|
|
|
|
// Generates a 521-bit ECDSA key, uses SHA-512 to sign a message, then verifies
|
|
// it.
|
|
func ExampleSignECDSA() {
|
|
// Generate a key pair.
|
|
// You need a high-quality PRNG for this.
|
|
k, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
return
|
|
}
|
|
|
|
// Hash a message.
|
|
alg := sha512.New()
|
|
alg.Write([]byte("I am a potato."))
|
|
hash := alg.Sum(nil)
|
|
|
|
// Sign the message. You don't need a PRNG for this.
|
|
r, s, err := SignECDSA(k, hash, sha512.New)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
return
|
|
}
|
|
|
|
if !ecdsa.Verify(&k.PublicKey, hash, r, s) {
|
|
fmt.Println("Invalid signature!")
|
|
}
|
|
|
|
// Output:
|
|
}
|
|
|
|
// Generates a 1024-bit DSA key, uses SHA-1 to sign a message, then verifies it.
|
|
func ExampleSignDSA() {
|
|
// Here I'm generating some DSA params, but you should really pre-generate
|
|
// these and re-use them, since this takes a long time and isn't necessary.
|
|
k := new(dsa.PrivateKey)
|
|
dsa.GenerateParameters(&k.Parameters, rand.Reader, dsa.L1024N160)
|
|
|
|
// Generate a key pair.
|
|
// You need a high-quality PRNG for this.
|
|
err := dsa.GenerateKey(k, rand.Reader)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
return
|
|
}
|
|
|
|
// Hash a message.
|
|
alg := sha1.New()
|
|
alg.Write([]byte("I am a potato."))
|
|
hash := alg.Sum(nil)
|
|
|
|
// Sign the message. You don't need a PRNG for this.
|
|
r, s, err := SignDSA(k, hash, sha1.New)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
return
|
|
}
|
|
|
|
if !dsa.Verify(&k.PublicKey, hash, r, s) {
|
|
fmt.Println("Invalid signature!")
|
|
}
|
|
|
|
// Output:
|
|
}
|