func (cert *obfs4ServerCert) unpack() (*ntor.NodeID, *ntor.PublicKey) { if len(cert.raw) != certLength { panic(fmt.Sprintf("cert length %d is invalid", len(cert.raw))) } nodeID, _ := ntor.NewNodeID(cert.raw[:ntor.NodeIDLength]) pubKey, _ := ntor.NewPublicKey(cert.raw[ntor.NodeIDLength:]) return nodeID, pubKey }
func newJSONServerState(stateDir string, js *jsonServerState) (err error) { // Generate everything a server needs, using the cryptographic PRNG. var st obfs4ServerState rawID := make([]byte, ntor.NodeIDLength) if err = csrand.Bytes(rawID); err != nil { return } if st.nodeID, err = ntor.NewNodeID(rawID); err != nil { return } if st.identityKey, err = ntor.NewKeypair(false); err != nil { return } if st.drbgSeed, err = drbg.NewSeed(); err != nil { return } st.iatMode = iatNone // Encode it into JSON format and write the state file. js.NodeID = st.nodeID.Hex() js.PrivateKey = st.identityKey.Private().Hex() js.PublicKey = st.identityKey.Public().Hex() js.DrbgSeed = st.drbgSeed.Hex() js.IATMode = st.iatMode var encoded []byte if encoded, err = json.Marshal(js); err != nil { return } if err = ioutil.WriteFile(path.Join(stateDir, stateFile), encoded, 0600); err != nil { return err } return nil }