From 9dbecf0592eb7c3d2e24b39c6a41f616d1854ca5 Mon Sep 17 00:00:00 2001 From: Kagami Hiiragi Date: Wed, 28 Jan 2015 16:14:17 +0300 Subject: [PATCH] Update to latest secp256k1-node --- index.js | 14 ++------------ package.json | 2 +- 2 files changed, 3 insertions(+), 13 deletions(-) diff --git a/index.js b/index.js index 6b03e6d..cb128d8 100644 --- a/index.js +++ b/index.js @@ -62,16 +62,6 @@ function equalConstTime(b1, b2) { */ var getPublic = exports.getPublic = secp256k1.createPublicKey; -function zeropad(msg) { - var zeroes; - if (msg.length < 32) { - zeroes = new Buffer(32 - msg.length); - zeroes.fill(0); - msg = Buffer.concat([zeroes, msg]); - } - return msg; -} - /** * Create an ECDSA signature. * @param {Buffer} privateKey - A 32-byte private key @@ -83,7 +73,7 @@ exports.sign = function(privateKey, msg) { return new promise(function(resolve) { assert(msg.length > 0, "Message should not be empty"); assert(msg.length <= 32, "Message is too long"); - resolve(secp256k1.sign(privateKey, zeropad(msg))); + resolve(secp256k1.sign(privateKey, msg)); }); }; @@ -99,7 +89,7 @@ exports.verify = function(publicKey, msg, sig) { return new promise(function(resolve, reject) { assert(msg.length > 0, "Message should not be empty"); assert(msg.length <= 32, "Message is too long"); - if (secp256k1.verify(publicKey, zeropad(msg), sig) === 1) { + if (secp256k1.verify(publicKey, msg, sig) === 1) { resolve(); } else { reject(new Error("Bad signature")); diff --git a/package.json b/package.json index 9840586..c840310 100644 --- a/package.json +++ b/package.json @@ -54,6 +54,6 @@ "nan": "^1.4.1" }, "optionalDependencies": { - "secp256k1": "~0.0.13" + "secp256k1": "~0.0.15" } }