fix non-generation of btcec keys in signer

This commit is contained in:
2025-05-30 20:14:59 +01:00
parent 39bf42708d
commit d14da6788f
2 changed files with 6 additions and 4 deletions

View File

@@ -21,7 +21,7 @@ type Signer struct {
var _ signer.I = &Signer{}
// Generate creates a new Signer.
func (s *Signer) Generate() (err error) {
func (s *Signer) Generate(nobtcec ...bool) (err error) {
if s.SecretKey, err = ec.NewSecretKey(); chk.E(err) {
return
}
@@ -33,7 +33,7 @@ func (s *Signer) Generate() (err error) {
}
// InitSec initialises a Signer using raw secret key bytes.
func (s *Signer) InitSec(sec []byte) (err error) {
func (s *Signer) InitSec(sec []byte, nobtcec ...bool) (err error) {
if len(sec) != secp256k1.SecKeyBytesLen {
err = errorf.E("sec key must be %d bytes", secp256k1.SecKeyBytesLen)
return

View File

@@ -44,7 +44,8 @@ func (s *Signer) Generate(nobtcec ...bool) (err error) {
}
s.SecretKey = &cs.Key
s.PublicKey = cx.Key
if len(nobtcec) > 0 && nobtcec[0] == false {
if len(nobtcec) > 0 && nobtcec[0] != true {
} else {
s.BTCECSec, _ = btcec.PrivKeyFromBytes(s.skb)
}
return
@@ -65,7 +66,8 @@ func (s *Signer) InitSec(skb []byte, nobtcec ...bool) (err error) {
s.PublicKey = cx.Key
// s.ECPublicKey = cp.Key
// needed for ecdh
if len(nobtcec) > 0 && nobtcec[0] == false {
if len(nobtcec) > 0 && nobtcec[0] != true {
} else {
s.BTCECSec, _ = btcec.PrivKeyFromBytes(s.skb)
}
return