Skip to content

Commit 83c072e

Browse files
committed
rename secp256r1 to p256
1 parent 1d6320b commit 83c072e

File tree

5 files changed

+12
-12
lines changed

5 files changed

+12
-12
lines changed

keygen.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ var (
4646
PublicKey string
4747

4848
// SignatureScheme is the cryptographic scheme to be used for verifying
49-
// API response signatures. Either `ed25519` or `ecdsa-secp256r1`.
49+
// API response signatures. Either `ed25519` or `ecdsa-p256`.
5050
SignatureScheme = "ed25519"
5151

5252
// UserAgent defines the user-agent string sent to the API backend,

license.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ import (
1212
type SchemeCode string
1313

1414
const (
15-
SchemeCodeEd25519 SchemeCode = "ED25519_SIGN"
16-
SchemeCodeECDSASecp256r1 SchemeCode = "ECDSA_SECP256R1_SIGN"
15+
SchemeCodeEd25519 SchemeCode = "ED25519_SIGN"
16+
SchemeCodeECDSAP256 SchemeCode = "ECDSA_P256_SIGN"
1717
)
1818

1919
// License represents a Keygen license object.

license_file.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ func (lic *LicenseFile) Decrypt(key string) (*LicenseFileDataset, error) {
6969
switch {
7070
case cert.Alg == "aes-256-gcm+rsa-pss-sha256" || cert.Alg == "aes-256-gcm+rsa-sha256":
7171
return nil, ErrLicenseFileNotSupported
72-
case cert.Alg == "aes-256-gcm+ed25519" || cert.Alg == "aes-256-gcm+ecdsa-secp256r1":
72+
case cert.Alg == "aes-256-gcm+ed25519" || cert.Alg == "aes-256-gcm+ecdsa-p256":
7373
break // continue
7474
default:
7575
return nil, ErrLicenseFileNotEncrypted

machine_file.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ func (lic *MachineFile) Decrypt(key string) (*MachineFileDataset, error) {
7474
switch {
7575
case cert.Alg == "aes-256-gcm+rsa-pss-sha256" || cert.Alg == "aes-256-gcm+rsa-sha256":
7676
return nil, ErrMachineFileNotSupported
77-
case cert.Alg == "aes-256-gcm+ed25519" || cert.Alg == "aes-256-gcm+ecdsa-secp256r1":
77+
case cert.Alg == "aes-256-gcm+ed25519" || cert.Alg == "aes-256-gcm+ecdsa-p256":
7878
break // continue
7979
default:
8080
return nil, ErrMachineFileNotEncrypted

verifier.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ func (v *verifier) VerifyLicenseFile(lic *LicenseFile) error {
4444
if ok := ed25519.Verify(publicKey, msg, sig); !ok {
4545
return ErrLicenseFileNotGenuine
4646
}
47-
case cert.Alg == "aes-256-gcm+ecdsa-secp256r1" || cert.Alg == "base64+ecdsa-secp256r1":
47+
case cert.Alg == "aes-256-gcm+ecdsa-p256" || cert.Alg == "base64+ecdsa-p256":
4848
publicKey, err := v.publicKey()
4949
if err != nil {
5050
return err
@@ -86,7 +86,7 @@ func (v *verifier) VerifyMachineFile(lic *MachineFile) error {
8686
if ok := ed25519.Verify(publicKey, msg, sig); !ok {
8787
return ErrMachineFileNotGenuine
8888
}
89-
case cert.Alg == "aes-256-gcm+ecdsa-secp256r1" || cert.Alg == "base64+ecdsa-secp256r1":
89+
case cert.Alg == "aes-256-gcm+ecdsa-p256" || cert.Alg == "base64+ecdsa-p256":
9090
publicKey, err := v.publicKey()
9191
if err != nil {
9292
return err
@@ -191,7 +191,7 @@ func (v *verifier) VerifyRequest(request *http.Request) error {
191191
return err
192192
}
193193

194-
// we only support ed25519 and ecdsa secp256r1 (nist p-256)
194+
// we only support ed25519 and ecdsa p256 (nist p-256)
195195
switch alg {
196196
case "ed25519":
197197
publicKey, err := v.publicKeyBytes()
@@ -202,7 +202,7 @@ func (v *verifier) VerifyRequest(request *http.Request) error {
202202
if ok := ed25519.Verify(publicKey, msgBytes, sigBytes); !ok {
203203
return ErrResponseSignatureInvalid
204204
}
205-
case "ecdsa-secp256r1":
205+
case "ecdsa-p256":
206206
publicKey, err := v.publicKey()
207207
if err != nil {
208208
return err
@@ -282,7 +282,7 @@ func (v *verifier) VerifyResponse(response *Response) error {
282282
return ErrResponseSignatureInvalid
283283
}
284284

285-
// we only support ed25519 and ecdsa secp256r1 (nist p-256)
285+
// we only support ed25519 and ecdsa p256 (nist p-256)
286286
switch alg {
287287
case "ed25519":
288288
publicKey, err := v.publicKeyBytes()
@@ -293,7 +293,7 @@ func (v *verifier) VerifyResponse(response *Response) error {
293293
if ok := ed25519.Verify(publicKey, msgBytes, sigBytes); !ok {
294294
return ErrResponseSignatureInvalid
295295
}
296-
case "ecdsa-secp256r1":
296+
case "ecdsa-p256":
297297
publicKey, err := v.publicKey()
298298
if err != nil {
299299
return err
@@ -346,7 +346,7 @@ func (v *verifier) verifyKey(scheme SchemeCode, key string) ([]byte, error) {
346346
if ok := ed25519.Verify(publicKey, msg, sig); !ok {
347347
return nil, ErrLicenseKeyNotGenuine
348348
}
349-
case SchemeCodeECDSASecp256r1:
349+
case SchemeCodeECDSAP256:
350350
publicKey, err := v.publicKey()
351351
if err != nil {
352352
return nil, err

0 commit comments

Comments
 (0)