diff options
author | Jeffrey Wilcke <jeffrey@ethereum.org> | 2015-12-02 20:19:33 +0800 |
---|---|---|
committer | Jeffrey Wilcke <jeffrey@ethereum.org> | 2015-12-02 20:19:33 +0800 |
commit | 888e7bc765acc6bfe0b8afc4ecd9830394b0a026 (patch) | |
tree | 5a27f4efd453c776f35ace6ae08c28c11417f9d5 /crypto/key.go | |
parent | 8db9d44ca9fb6baf406256cae491c475de2f4989 (diff) | |
parent | c8ad64f33cd04fc10ac6681260ea06e464908c91 (diff) | |
download | go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.tar go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.tar.gz go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.tar.bz2 go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.tar.lz go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.tar.xz go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.tar.zst go-tangerine-888e7bc765acc6bfe0b8afc4ecd9830394b0a026.zip |
Merge pull request #1862 from Gustav-Simonsson/libsecp256k1_ecdh
crypto, crypto/secp256k1: use libsecp256k1 for scalar multiplication
Diffstat (limited to 'crypto/key.go')
-rw-r--r-- | crypto/key.go | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/crypto/key.go b/crypto/key.go index 4ec43dfd7..ccf284ad8 100644 --- a/crypto/key.go +++ b/crypto/key.go @@ -25,6 +25,7 @@ import ( "strings" "github.com/ethereum/go-ethereum/common" + "github.com/ethereum/go-ethereum/crypto/secp256k1" "github.com/pborman/uuid" ) @@ -137,7 +138,7 @@ func NewKey(rand io.Reader) *Key { panic("key generation: could not read from random source: " + err.Error()) } reader := bytes.NewReader(randBytes) - privateKeyECDSA, err := ecdsa.GenerateKey(S256(), reader) + privateKeyECDSA, err := ecdsa.GenerateKey(secp256k1.S256(), reader) if err != nil { panic("key generation: ecdsa.GenerateKey failed: " + err.Error()) } @@ -155,7 +156,7 @@ func NewKeyForDirectICAP(rand io.Reader) *Key { panic("key generation: could not read from random source: " + err.Error()) } reader := bytes.NewReader(randBytes) - privateKeyECDSA, err := ecdsa.GenerateKey(S256(), reader) + privateKeyECDSA, err := ecdsa.GenerateKey(secp256k1.S256(), reader) if err != nil { panic("key generation: ecdsa.GenerateKey failed: " + err.Error()) } |