307 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			307 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package secp256k1
 | 
						|
 | 
						|
/*
 | 
						|
#cgo CFLAGS: -std=gnu99 -Wno-error
 | 
						|
#cgo darwin CFLAGS: -I/usr/local/include
 | 
						|
#cgo LDFLAGS: -lgmp
 | 
						|
#cgo darwin LDFLAGS: -L/usr/local/lib
 | 
						|
#define USE_FIELD_10X26
 | 
						|
#define USE_NUM_GMP
 | 
						|
#define USE_FIELD_INV_BUILTIN
 | 
						|
#include "./secp256k1/src/secp256k1.c"
 | 
						|
*/
 | 
						|
import "C"
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"errors"
 | 
						|
	"unsafe"
 | 
						|
 | 
						|
	"github.com/ethereum/go-ethereum/crypto/randentropy"
 | 
						|
)
 | 
						|
 | 
						|
//#define USE_FIELD_5X64
 | 
						|
 | 
						|
/*
 | 
						|
   Todo:
 | 
						|
   > Centralize key management in module
 | 
						|
   > add pubkey/private key struct
 | 
						|
   > Dont let keys leave module; address keys as ints
 | 
						|
 | 
						|
   > store private keys in buffer and shuffle (deters persistance on swap disc)
 | 
						|
   > Byte permutation (changing)
 | 
						|
   > xor with chaning random block (to deter scanning memory for 0x63) (stream cipher?)
 | 
						|
 | 
						|
   On Disk
 | 
						|
   > Store keys in wallets
 | 
						|
   > use slow key derivation function for wallet encryption key (2 seconds)
 | 
						|
*/
 | 
						|
 | 
						|
func init() {
 | 
						|
	C.secp256k1_start() //takes 10ms to 100ms
 | 
						|
}
 | 
						|
 | 
						|
func Stop() {
 | 
						|
	C.secp256k1_stop()
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
int secp256k1_ecdsa_pubkey_create(
 | 
						|
    unsigned char *pubkey, int *pubkeylen,
 | 
						|
    const unsigned char *seckey, int compressed);
 | 
						|
*/
 | 
						|
 | 
						|
/** Compute the public key for a secret key.
 | 
						|
 *  In:     compressed: whether the computed public key should be compressed
 | 
						|
 *          seckey:     pointer to a 32-byte private key.
 | 
						|
 *  Out:    pubkey:     pointer to a 33-byte (if compressed) or 65-byte (if uncompressed)
 | 
						|
 *                      area to store the public key.
 | 
						|
 *          pubkeylen:  pointer to int that will be updated to contains the pubkey's
 | 
						|
 *                      length.
 | 
						|
 *  Returns: 1: secret was valid, public key stores
 | 
						|
 *           0: secret was invalid, try again.
 | 
						|
 */
 | 
						|
 | 
						|
//pubkey, seckey
 | 
						|
 | 
						|
func GenerateKeyPair() ([]byte, []byte) {
 | 
						|
 | 
						|
	pubkey_len := C.int(65)
 | 
						|
	const seckey_len = 32
 | 
						|
 | 
						|
	var pubkey []byte = make([]byte, pubkey_len)
 | 
						|
	var seckey []byte = randentropy.GetEntropyMixed(seckey_len)
 | 
						|
 | 
						|
	var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
 | 
						|
	var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
 | 
						|
 | 
						|
	ret := C.secp256k1_ecdsa_pubkey_create(
 | 
						|
		pubkey_ptr, &pubkey_len,
 | 
						|
		seckey_ptr, 0)
 | 
						|
 | 
						|
	if ret != C.int(1) {
 | 
						|
		return GenerateKeyPair() //invalid secret, try again
 | 
						|
	}
 | 
						|
	return pubkey, seckey
 | 
						|
}
 | 
						|
 | 
						|
func GeneratePubKey(seckey []byte) ([]byte, error) {
 | 
						|
	if err := VerifySeckeyValidity(seckey); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	pubkey_len := C.int(65)
 | 
						|
	const seckey_len = 32
 | 
						|
 | 
						|
	var pubkey []byte = make([]byte, pubkey_len)
 | 
						|
 | 
						|
	var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
 | 
						|
	var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
 | 
						|
 | 
						|
	ret := C.secp256k1_ecdsa_pubkey_create(
 | 
						|
		pubkey_ptr, &pubkey_len,
 | 
						|
		seckey_ptr, 0)
 | 
						|
 | 
						|
	if ret != C.int(1) {
 | 
						|
		return nil, errors.New("Unable to generate pubkey from seckey")
 | 
						|
	}
 | 
						|
 | 
						|
	return pubkey, nil
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
*  Create a compact ECDSA signature (64 byte + recovery id).
 | 
						|
*  Returns: 1: signature created
 | 
						|
*           0: nonce invalid, try another one
 | 
						|
*  In:      msg:    the message being signed
 | 
						|
*           msglen: the length of the message being signed
 | 
						|
*           seckey: pointer to a 32-byte secret key (assumed to be valid)
 | 
						|
*           nonce:  pointer to a 32-byte nonce (generated with a cryptographic PRNG)
 | 
						|
*  Out:     sig:    pointer to a 64-byte array where the signature will be placed.
 | 
						|
*           recid:  pointer to an int, which will be updated to contain the recovery id.
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
int secp256k1_ecdsa_sign_compact(const unsigned char *msg, int msglen,
 | 
						|
                                 unsigned char *sig64,
 | 
						|
                                 const unsigned char *seckey,
 | 
						|
                                 const unsigned char *nonce,
 | 
						|
                                 int *recid);
 | 
						|
*/
 | 
						|
 | 
						|
func Sign(msg []byte, seckey []byte) ([]byte, error) {
 | 
						|
	nonce := randentropy.GetEntropyMixed(32)
 | 
						|
 | 
						|
	var sig []byte = make([]byte, 65)
 | 
						|
	var recid C.int
 | 
						|
 | 
						|
	var msg_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&msg[0]))
 | 
						|
	var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
 | 
						|
	var nonce_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&nonce[0]))
 | 
						|
	var sig_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&sig[0]))
 | 
						|
 | 
						|
	if C.secp256k1_ecdsa_seckey_verify(seckey_ptr) != C.int(1) {
 | 
						|
		return nil, errors.New("Invalid secret key")
 | 
						|
	}
 | 
						|
 | 
						|
	ret := C.secp256k1_ecdsa_sign_compact(
 | 
						|
		msg_ptr, C.int(len(msg)),
 | 
						|
		sig_ptr,
 | 
						|
		seckey_ptr,
 | 
						|
		nonce_ptr,
 | 
						|
		&recid)
 | 
						|
 | 
						|
	sig[64] = byte(int(recid))
 | 
						|
 | 
						|
	if ret != C.int(1) {
 | 
						|
		// nonce invalid, retry
 | 
						|
		return Sign(msg, seckey)
 | 
						|
	}
 | 
						|
 | 
						|
	return sig, nil
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
* Verify an ECDSA secret key.
 | 
						|
*  Returns: 1: secret key is valid
 | 
						|
*           0: secret key is invalid
 | 
						|
*  In:      seckey: pointer to a 32-byte secret key
 | 
						|
 */
 | 
						|
 | 
						|
func VerifySeckeyValidity(seckey []byte) error {
 | 
						|
	if len(seckey) != 32 {
 | 
						|
		return errors.New("priv key is not 32 bytes")
 | 
						|
	}
 | 
						|
	var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
 | 
						|
	ret := C.secp256k1_ecdsa_seckey_verify(seckey_ptr)
 | 
						|
	if int(ret) != 1 {
 | 
						|
		return errors.New("invalid seckey")
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
* Validate a public key.
 | 
						|
*  Returns: 1: valid public key
 | 
						|
*           0: invalid public key
 | 
						|
 */
 | 
						|
 | 
						|
func VerifyPubkeyValidity(pubkey []byte) error {
 | 
						|
	if len(pubkey) != 65 {
 | 
						|
		return errors.New("pub key is not 65 bytes")
 | 
						|
	}
 | 
						|
	var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
 | 
						|
	ret := C.secp256k1_ecdsa_pubkey_verify(pubkey_ptr, 65)
 | 
						|
	if int(ret) != 1 {
 | 
						|
		return errors.New("invalid pubkey")
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func VerifySignatureValidity(sig []byte) bool {
 | 
						|
	//64+1
 | 
						|
	if len(sig) != 65 {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	//malleability check, highest bit must be 1
 | 
						|
	if (sig[32] & 0x80) == 0x80 {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	//recovery id check
 | 
						|
	if sig[64] >= 4 {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
//for compressed signatures, does not need pubkey
 | 
						|
func VerifySignature(msg []byte, sig []byte, pubkey1 []byte) error {
 | 
						|
	if msg == nil || sig == nil || pubkey1 == nil {
 | 
						|
		return errors.New("inputs must be non-nil")
 | 
						|
	}
 | 
						|
	if len(sig) != 65 {
 | 
						|
		return errors.New("invalid signature length")
 | 
						|
	}
 | 
						|
	if len(pubkey1) != 65 {
 | 
						|
		return errors.New("Invalid public key length")
 | 
						|
	}
 | 
						|
 | 
						|
	//to enforce malleability, highest bit of S must be 0
 | 
						|
	//S starts at 32nd byte
 | 
						|
	if (sig[32] & 0x80) == 0x80 { //highest bit must be 1
 | 
						|
		return errors.New("Signature not malleable")
 | 
						|
	}
 | 
						|
 | 
						|
	if sig[64] >= 4 {
 | 
						|
		return errors.New("Recover byte invalid")
 | 
						|
	}
 | 
						|
 | 
						|
	// if pubkey recovered, signature valid
 | 
						|
	pubkey2, err := RecoverPubkey(msg, sig)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if len(pubkey2) != 65 {
 | 
						|
		return errors.New("Invalid recovered public key length")
 | 
						|
	}
 | 
						|
	if !bytes.Equal(pubkey1, pubkey2) {
 | 
						|
		return errors.New("Public key does not match recovered public key")
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
int secp256k1_ecdsa_recover_compact(const unsigned char *msg, int msglen,
 | 
						|
                                    const unsigned char *sig64,
 | 
						|
                                    unsigned char *pubkey, int *pubkeylen,
 | 
						|
                                    int compressed, int recid);
 | 
						|
*/
 | 
						|
 | 
						|
/*
 | 
						|
 * Recover an ECDSA public key from a compact signature.
 | 
						|
 *  Returns: 1: public key succesfully recovered (which guarantees a correct signature).
 | 
						|
 *           0: otherwise.
 | 
						|
 *  In:      msg:        the message assumed to be signed
 | 
						|
 *           msglen:     the length of the message
 | 
						|
 *           compressed: whether to recover a compressed or uncompressed pubkey
 | 
						|
 *           recid:      the recovery id (as returned by ecdsa_sign_compact)
 | 
						|
 *  Out:     pubkey:     pointer to a 33 or 65 byte array to put the pubkey.
 | 
						|
 *           pubkeylen:  pointer to an int that will contain the pubkey length.
 | 
						|
 */
 | 
						|
 | 
						|
//recovers the public key from the signature
 | 
						|
//recovery of pubkey means correct signature
 | 
						|
func RecoverPubkey(msg []byte, sig []byte) ([]byte, error) {
 | 
						|
	if len(sig) != 65 {
 | 
						|
		return nil, errors.New("Invalid signature length")
 | 
						|
	}
 | 
						|
 | 
						|
	var pubkey []byte = make([]byte, 65)
 | 
						|
 | 
						|
	var msg_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&msg[0]))
 | 
						|
	var sig_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&sig[0]))
 | 
						|
	var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
 | 
						|
 | 
						|
	var pubkeylen C.int
 | 
						|
 | 
						|
	ret := C.secp256k1_ecdsa_recover_compact(
 | 
						|
		msg_ptr, C.int(len(msg)),
 | 
						|
		sig_ptr,
 | 
						|
		pubkey_ptr, &pubkeylen,
 | 
						|
		C.int(0), C.int(sig[64]),
 | 
						|
	)
 | 
						|
 | 
						|
	if ret == C.int(0) {
 | 
						|
		return nil, errors.New("Failed to recover public key")
 | 
						|
	} else if pubkeylen != C.int(65) {
 | 
						|
		return nil, errors.New("Impossible Error: Invalid recovered public key length")
 | 
						|
	} else {
 | 
						|
		return pubkey, nil
 | 
						|
	}
 | 
						|
	return nil, errors.New("Impossible Error: func RecoverPubkey has reached an unreachable state")
 | 
						|
}
 |