diff --git a/p256k/btcec/btcec.go b/p256k/btcec/btcec.go index 989da47..0cdfc92 100644 --- a/p256k/btcec/btcec.go +++ b/p256k/btcec/btcec.go @@ -21,7 +21,7 @@ type Signer struct { var _ signer.I = &Signer{} // Generate creates a new Signer. -func (s *Signer) Generate() (err error) { +func (s *Signer) Generate(nobtcec ...bool) (err error) { if s.SecretKey, err = ec.NewSecretKey(); chk.E(err) { return } @@ -33,7 +33,7 @@ func (s *Signer) Generate() (err error) { } // InitSec initialises a Signer using raw secret key bytes. -func (s *Signer) InitSec(sec []byte) (err error) { +func (s *Signer) InitSec(sec []byte, nobtcec ...bool) (err error) { if len(sec) != secp256k1.SecKeyBytesLen { err = errorf.E("sec key must be %d bytes", secp256k1.SecKeyBytesLen) return diff --git a/p256k/p256k.go b/p256k/p256k.go index 6e576b2..e37e281 100644 --- a/p256k/p256k.go +++ b/p256k/p256k.go @@ -44,7 +44,8 @@ func (s *Signer) Generate(nobtcec ...bool) (err error) { } s.SecretKey = &cs.Key s.PublicKey = cx.Key - if len(nobtcec) > 0 && nobtcec[0] == false { + if len(nobtcec) > 0 && nobtcec[0] != true { + } else { s.BTCECSec, _ = btcec.PrivKeyFromBytes(s.skb) } return @@ -65,7 +66,8 @@ func (s *Signer) InitSec(skb []byte, nobtcec ...bool) (err error) { s.PublicKey = cx.Key // s.ECPublicKey = cp.Key // needed for ecdh - if len(nobtcec) > 0 && nobtcec[0] == false { + if len(nobtcec) > 0 && nobtcec[0] != true { + } else { s.BTCECSec, _ = btcec.PrivKeyFromBytes(s.skb) } return