| 
									
										
										
										
											2018-07-24 03:47:47 +03:00
										 |  |  | // Copyright 2015 Jeffrey Wilcke, Felix Lange, Gustav Simonsson. All rights reserved. | 
					
						
							|  |  |  | // Use of this source code is governed by a BSD-style license that can be found in | 
					
						
							|  |  |  | // the LICENSE file. | 
					
						
							| 
									
										
										
										
											2015-07-07 02:54:22 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | // Package secp256k1 wraps the bitcoin secp256k1 C library. | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | package secp256k1 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* | 
					
						
							| 
									
										
										
										
											2015-09-28 11:19:23 +02:00
										 |  |  | #cgo CFLAGS: -I./libsecp256k1 | 
					
						
							| 
									
										
										
										
											2015-09-29 19:37:44 +02:00
										 |  |  | #cgo CFLAGS: -I./libsecp256k1/src/ | 
					
						
							| 
									
										
										
										
											2015-12-03 20:04:39 +01:00
										 |  |  | #define USE_NUM_NONE | 
					
						
							| 
									
										
										
										
											2015-04-07 12:40:31 +02:00
										 |  |  | #define USE_FIELD_10X26 | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | #define USE_FIELD_INV_BUILTIN | 
					
						
							| 
									
										
										
										
											2015-04-07 12:40:31 +02:00
										 |  |  | #define USE_SCALAR_8X32 | 
					
						
							|  |  |  | #define USE_SCALAR_INV_BUILTIN | 
					
						
							| 
									
										
										
										
											2015-04-07 18:09:58 +02:00
										 |  |  | #define NDEBUG | 
					
						
							| 
									
										
										
										
											2015-09-28 11:19:23 +02:00
										 |  |  | #include "./libsecp256k1/src/secp256k1.c" | 
					
						
							|  |  |  | #include "./libsecp256k1/src/modules/recovery/main_impl.h" | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | #include "ext.h" | 
					
						
							| 
									
										
										
										
											2015-11-16 18:04:56 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | typedef void (*callbackFunc) (const char* msg, void* data); | 
					
						
							|  |  |  | extern void secp256k1GoPanicIllegal(const char* msg, void* data); | 
					
						
							|  |  |  | extern void secp256k1GoPanicError(const char* msg, void* data); | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | */ | 
					
						
							|  |  |  | import "C" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"errors" | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | 	"math/big" | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	"unsafe" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-02-18 09:24:12 +01:00
										 |  |  | var context *C.secp256k1_context | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-09-28 11:19:23 +02:00
										 |  |  | func init() { | 
					
						
							|  |  |  | 	// around 20 ms on a modern CPU. | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	context = C.secp256k1_context_create_sign_verify() | 
					
						
							| 
									
										
										
										
											2015-11-16 18:04:56 +01:00
										 |  |  | 	C.secp256k1_context_set_illegal_callback(context, C.callbackFunc(C.secp256k1GoPanicIllegal), nil) | 
					
						
							|  |  |  | 	C.secp256k1_context_set_error_callback(context, C.callbackFunc(C.secp256k1GoPanicError), nil) | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | var ( | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	ErrInvalidMsgLen       = errors.New("invalid message length, need 32 bytes") | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | 	ErrInvalidSignatureLen = errors.New("invalid signature length") | 
					
						
							|  |  |  | 	ErrInvalidRecoveryID   = errors.New("invalid signature recovery id") | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	ErrInvalidKey          = errors.New("invalid private key") | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | 	ErrInvalidPubkey       = errors.New("invalid public key") | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	ErrSignFailed          = errors.New("signing failed") | 
					
						
							|  |  |  | 	ErrRecoverFailed       = errors.New("recovery failed") | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | // Sign creates a recoverable ECDSA signature. | 
					
						
							|  |  |  | // The produced signature is in the 65-byte [R || S || V] format where V is 0 or 1. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The caller is responsible for ensuring that msg cannot be chosen | 
					
						
							|  |  |  | // directly by an attacker. It is usually preferable to use a cryptographic | 
					
						
							|  |  |  | // hash function on any input before handing it to this function. | 
					
						
							|  |  |  | func Sign(msg []byte, seckey []byte) ([]byte, error) { | 
					
						
							|  |  |  | 	if len(msg) != 32 { | 
					
						
							|  |  |  | 		return nil, ErrInvalidMsgLen | 
					
						
							| 
									
										
										
										
											2015-02-15 02:20:31 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	if len(seckey) != 32 { | 
					
						
							|  |  |  | 		return nil, ErrInvalidKey | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	seckeydata := (*C.uchar)(unsafe.Pointer(&seckey[0])) | 
					
						
							|  |  |  | 	if C.secp256k1_ec_seckey_verify(context, seckeydata) != 1 { | 
					
						
							|  |  |  | 		return nil, ErrInvalidKey | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	var ( | 
					
						
							| 
									
										
										
										
											2017-01-22 23:28:47 +01:00
										 |  |  | 		msgdata   = (*C.uchar)(unsafe.Pointer(&msg[0])) | 
					
						
							|  |  |  | 		noncefunc = C.secp256k1_nonce_function_rfc6979 | 
					
						
							|  |  |  | 		sigstruct C.secp256k1_ecdsa_recoverable_signature | 
					
						
							| 
									
										
										
										
											2015-09-28 11:19:23 +02:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2017-01-22 23:28:47 +01:00
										 |  |  | 	if C.secp256k1_ecdsa_sign_recoverable(context, &sigstruct, msgdata, seckeydata, noncefunc, nil) == 0 { | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 		return nil, ErrSignFailed | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	var ( | 
					
						
							|  |  |  | 		sig     = make([]byte, 65) | 
					
						
							|  |  |  | 		sigdata = (*C.uchar)(unsafe.Pointer(&sig[0])) | 
					
						
							|  |  |  | 		recid   C.int | 
					
						
							| 
									
										
										
										
											2015-09-28 11:19:23 +02:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	C.secp256k1_ecdsa_recoverable_signature_serialize_compact(context, sigdata, &recid, &sigstruct) | 
					
						
							|  |  |  | 	sig[64] = byte(recid) // add back recid to get 65 bytes sig | 
					
						
							|  |  |  | 	return sig, nil | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-08-27 16:49:29 +08:00
										 |  |  | // RecoverPubkey returns the public key of the signer. | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | // msg must be the 32-byte hash of the message to be signed. | 
					
						
							|  |  |  | // sig must be a 65-byte compact ECDSA signature containing the | 
					
						
							|  |  |  | // recovery id as the last element. | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | func RecoverPubkey(msg []byte, sig []byte) ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | 	if len(msg) != 32 { | 
					
						
							|  |  |  | 		return nil, ErrInvalidMsgLen | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if err := checkSignature(sig); err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	var ( | 
					
						
							|  |  |  | 		pubkey  = make([]byte, 65) | 
					
						
							|  |  |  | 		sigdata = (*C.uchar)(unsafe.Pointer(&sig[0])) | 
					
						
							|  |  |  | 		msgdata = (*C.uchar)(unsafe.Pointer(&msg[0])) | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2017-12-15 10:40:09 +01:00
										 |  |  | 	if C.secp256k1_ext_ecdsa_recover(context, (*C.uchar)(unsafe.Pointer(&pubkey[0])), sigdata, msgdata) == 0 { | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 		return nil, ErrRecoverFailed | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-12 21:29:11 +01:00
										 |  |  | 	return pubkey, nil | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | // VerifySignature checks that the given pubkey created signature over message. | 
					
						
							|  |  |  | // The signature should be in [R || S] format. | 
					
						
							|  |  |  | func VerifySignature(pubkey, msg, signature []byte) bool { | 
					
						
							|  |  |  | 	if len(msg) != 32 || len(signature) != 64 || len(pubkey) == 0 { | 
					
						
							|  |  |  | 		return false | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	sigdata := (*C.uchar)(unsafe.Pointer(&signature[0])) | 
					
						
							|  |  |  | 	msgdata := (*C.uchar)(unsafe.Pointer(&msg[0])) | 
					
						
							|  |  |  | 	keydata := (*C.uchar)(unsafe.Pointer(&pubkey[0])) | 
					
						
							| 
									
										
										
										
											2017-12-15 10:40:09 +01:00
										 |  |  | 	return C.secp256k1_ext_ecdsa_verify(context, sigdata, msgdata, keydata, C.size_t(len(pubkey))) != 0 | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // DecompressPubkey parses a public key in the 33-byte compressed format. | 
					
						
							|  |  |  | // It returns non-nil coordinates if the public key is valid. | 
					
						
							| 
									
										
										
										
											2017-12-15 10:40:09 +01:00
										 |  |  | func DecompressPubkey(pubkey []byte) (x, y *big.Int) { | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | 	if len(pubkey) != 33 { | 
					
						
							|  |  |  | 		return nil, nil | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-12-15 10:40:09 +01:00
										 |  |  | 	var ( | 
					
						
							|  |  |  | 		pubkeydata = (*C.uchar)(unsafe.Pointer(&pubkey[0])) | 
					
						
							|  |  |  | 		pubkeylen  = C.size_t(len(pubkey)) | 
					
						
							|  |  |  | 		out        = make([]byte, 65) | 
					
						
							|  |  |  | 		outdata    = (*C.uchar)(unsafe.Pointer(&out[0])) | 
					
						
							|  |  |  | 		outlen     = C.size_t(len(out)) | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	if C.secp256k1_ext_reencode_pubkey(context, outdata, outlen, pubkeydata, pubkeylen) == 0 { | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | 		return nil, nil | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-12-15 10:40:09 +01:00
										 |  |  | 	return new(big.Int).SetBytes(out[1:33]), new(big.Int).SetBytes(out[33:]) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // CompressPubkey encodes a public key to 33-byte compressed format. | 
					
						
							|  |  |  | func CompressPubkey(x, y *big.Int) []byte { | 
					
						
							|  |  |  | 	var ( | 
					
						
							|  |  |  | 		pubkey     = S256().Marshal(x, y) | 
					
						
							|  |  |  | 		pubkeydata = (*C.uchar)(unsafe.Pointer(&pubkey[0])) | 
					
						
							|  |  |  | 		pubkeylen  = C.size_t(len(pubkey)) | 
					
						
							|  |  |  | 		out        = make([]byte, 33) | 
					
						
							|  |  |  | 		outdata    = (*C.uchar)(unsafe.Pointer(&out[0])) | 
					
						
							|  |  |  | 		outlen     = C.size_t(len(out)) | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	if C.secp256k1_ext_reencode_pubkey(context, outdata, outlen, pubkeydata, pubkeylen) == 0 { | 
					
						
							|  |  |  | 		panic("libsecp256k1 error") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return out | 
					
						
							| 
									
										
										
										
											2017-12-06 16:07:08 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-11-16 17:11:26 +01:00
										 |  |  | func checkSignature(sig []byte) error { | 
					
						
							|  |  |  | 	if len(sig) != 65 { | 
					
						
							|  |  |  | 		return ErrInvalidSignatureLen | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if sig[64] >= 4 { | 
					
						
							|  |  |  | 		return ErrInvalidRecoveryID | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2015-01-22 00:35:00 +01:00
										 |  |  | } |