diff options
author | Egon Elbre <egonelbre@gmail.com> | 2017-08-08 18:58:22 +0800 |
---|---|---|
committer | Péter Szilágyi <peterke@gmail.com> | 2017-08-08 18:58:22 +0800 |
commit | 10ce8b0e3c361f7fcbd9440fe78566f49cce9588 (patch) | |
tree | 5c06bbcc8fc0fe8637a86f3794d5577d379c8677 /crypto/ecies/params.go | |
parent | 9a7e99f75d09dc7835d3335d97a37f153d480cc6 (diff) | |
download | go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.tar go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.tar.gz go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.tar.bz2 go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.tar.lz go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.tar.xz go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.tar.zst go-tangerine-10ce8b0e3c361f7fcbd9440fe78566f49cce9588.zip |
crypto: fix megacheck warnings (#14917)
* crypto: fix megacheck warnings
* crypto/ecies: remove ASN.1 support
Diffstat (limited to 'crypto/ecies/params.go')
-rw-r--r-- | crypto/ecies/params.go | 93 |
1 files changed, 0 insertions, 93 deletions
diff --git a/crypto/ecies/params.go b/crypto/ecies/params.go index 826d90c84..6312daf5a 100644 --- a/crypto/ecies/params.go +++ b/crypto/ecies/params.go @@ -114,97 +114,4 @@ func AddParamsForCurve(curve elliptic.Curve, params *ECIESParams) { // Only the curves P256, P384, and P512 are supported. func ParamsFromCurve(curve elliptic.Curve) (params *ECIESParams) { return paramsFromCurve[curve] - - /* - switch curve { - case elliptic.P256(): - return ECIES_AES128_SHA256 - case elliptic.P384(): - return ECIES_AES256_SHA384 - case elliptic.P521(): - return ECIES_AES256_SHA512 - default: - return nil - } - */ -} - -// ASN.1 encode the ECIES parameters relevant to the encryption operations. -func paramsToASNECIES(params *ECIESParams) (asnParams asnECIESParameters) { - if nil == params { - return - } - asnParams.KDF = asnNISTConcatenationKDF - asnParams.MAC = hmacFull - switch params.KeyLen { - case 16: - asnParams.Sym = aes128CTRinECIES - case 24: - asnParams.Sym = aes192CTRinECIES - case 32: - asnParams.Sym = aes256CTRinECIES - } - return -} - -// ASN.1 encode the ECIES parameters relevant to ECDH. -func paramsToASNECDH(params *ECIESParams) (algo asnECDHAlgorithm) { - switch params.hashAlgo { - case crypto.SHA224: - algo = dhSinglePass_stdDH_sha224kdf - case crypto.SHA256: - algo = dhSinglePass_stdDH_sha256kdf - case crypto.SHA384: - algo = dhSinglePass_stdDH_sha384kdf - case crypto.SHA512: - algo = dhSinglePass_stdDH_sha512kdf - } - return -} - -// ASN.1 decode the ECIES parameters relevant to the encryption stage. -func asnECIEStoParams(asnParams asnECIESParameters, params *ECIESParams) { - if !asnParams.KDF.Cmp(asnNISTConcatenationKDF) { - params = nil - return - } else if !asnParams.MAC.Cmp(hmacFull) { - params = nil - return - } - - switch { - case asnParams.Sym.Cmp(aes128CTRinECIES): - params.KeyLen = 16 - params.BlockSize = 16 - params.Cipher = aes.NewCipher - case asnParams.Sym.Cmp(aes192CTRinECIES): - params.KeyLen = 24 - params.BlockSize = 16 - params.Cipher = aes.NewCipher - case asnParams.Sym.Cmp(aes256CTRinECIES): - params.KeyLen = 32 - params.BlockSize = 16 - params.Cipher = aes.NewCipher - default: - params = nil - } -} - -// ASN.1 decode the ECIES parameters relevant to ECDH. -func asnECDHtoParams(asnParams asnECDHAlgorithm, params *ECIESParams) { - if asnParams.Cmp(dhSinglePass_stdDH_sha224kdf) { - params.hashAlgo = crypto.SHA224 - params.Hash = sha256.New224 - } else if asnParams.Cmp(dhSinglePass_stdDH_sha256kdf) { - params.hashAlgo = crypto.SHA256 - params.Hash = sha256.New - } else if asnParams.Cmp(dhSinglePass_stdDH_sha384kdf) { - params.hashAlgo = crypto.SHA384 - params.Hash = sha512.New384 - } else if asnParams.Cmp(dhSinglePass_stdDH_sha512kdf) { - params.hashAlgo = crypto.SHA512 - params.Hash = sha512.New - } else { - params = nil - } } |