From cd94855415b436fe9705c07ae984bb82957dd7f5 Mon Sep 17 00:00:00 2001 From: artemuhi Date: Sat, 23 Mar 2024 14:11:31 +0300 Subject: [PATCH] =?UTF-8?q?=D0=9E=D0=B1=D0=BD=D0=BE=D0=B2=D0=B8=D1=82?= =?UTF-8?q?=D1=8C=20py/converter.py?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- py/converter.py | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/py/converter.py b/py/converter.py index 65c8d16..96dc0bf 100644 --- a/py/converter.py +++ b/py/converter.py @@ -28,25 +28,25 @@ import json from ecdsa import SigningKey, VerifyingKey, SECP256k1 from ecdsa.util import PRNG -f = open('text.txt', 'r') +f = open('temp.json', 'r') request = json.load(f) f.close() def p2h(data, keymode): if(keymode=="sk"): - sk = SigningKey.from_pem(data, curve=SECP256k1) + sk = SigningKey.from_pem(data.encode(), curve=SECP256k1) print(sk.to_string().hex()) elif(keymode=="vk"): - vk = VerifyingKey.from_pem(data, curve=SECP256k1) + vk = VerifyingKey.from_pem(data.encode(), curve=SECP256k1) print(vk.to_string().hex()) def h2p(data, keymode): if(keymode=="sk"): - sk = SigningKey.from_string(b16decode(data), curve=SECP256k1) - print(sk.to_pem()) + sk = SigningKey.from_string(b16decode(data.encode()), curve=SECP256k1) + print(sk.to_pem().decode()) elif(keymode=="vk"): - vk = VerifyingKey.from_string(b16decode(data), curve=SECP256k1) - print(vk.to_pem()) + vk = VerifyingKey.from_string(b16decode(data.encode()), curve=SECP256k1) + print(vk.to_pem().decode()) def seed2hkey(data, keymode): seed = PRNG(data.encode())