This commit includes several API changes:
- The behavior of eth_sign is changed. It now accepts an arbitrary
  message, prepends the well-known string
        \x19Ethereum Signed Message:\n<length of message>
  hashes the result using keccak256 and calculates the signature of
  the hash. This breaks backwards compatability!
  
- personal_sign(hash, address [, password]) is added. It has the same
  semantics as eth_sign but also accepts a password. The private key
  used to sign the hash is temporarily unlocked in the scope of the
  request.
  
- personal_recover(message, signature) is added and returns the
  address for the account that created a signature.
		
	
			
		
			
				
	
	
		
			273 lines
		
	
	
		
			7.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			273 lines
		
	
	
		
			7.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2014 The go-ethereum Authors
 | 
						|
// This file is part of the go-ethereum library.
 | 
						|
//
 | 
						|
// The go-ethereum library is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU Lesser General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// The go-ethereum library is distributed in the hope that it will be useful,
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | 
						|
// GNU Lesser General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU Lesser General Public License
 | 
						|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
package crypto
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"crypto/ecdsa"
 | 
						|
	"encoding/hex"
 | 
						|
	"fmt"
 | 
						|
	"io/ioutil"
 | 
						|
	"math/big"
 | 
						|
	"os"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/ethereum/go-ethereum/common"
 | 
						|
	"github.com/ethereum/go-ethereum/crypto/secp256k1"
 | 
						|
)
 | 
						|
 | 
						|
var testAddrHex = "970e8128ab834e8eac17ab8e3812f010678cf791"
 | 
						|
var testPrivHex = "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032"
 | 
						|
 | 
						|
// These tests are sanity checks.
 | 
						|
// They should ensure that we don't e.g. use Sha3-224 instead of Sha3-256
 | 
						|
// and that the sha3 library uses keccak-f permutation.
 | 
						|
func TestSha3(t *testing.T) {
 | 
						|
	msg := []byte("abc")
 | 
						|
	exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45")
 | 
						|
	checkhash(t, "Sha3-256", func(in []byte) []byte { return Keccak256(in) }, msg, exp)
 | 
						|
}
 | 
						|
 | 
						|
func TestSha3Hash(t *testing.T) {
 | 
						|
	msg := []byte("abc")
 | 
						|
	exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45")
 | 
						|
	checkhash(t, "Sha3-256-array", func(in []byte) []byte { h := Keccak256Hash(in); return h[:] }, msg, exp)
 | 
						|
}
 | 
						|
 | 
						|
func TestSha256(t *testing.T) {
 | 
						|
	msg := []byte("abc")
 | 
						|
	exp, _ := hex.DecodeString("ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad")
 | 
						|
	checkhash(t, "Sha256", Sha256, msg, exp)
 | 
						|
}
 | 
						|
 | 
						|
func TestRipemd160(t *testing.T) {
 | 
						|
	msg := []byte("abc")
 | 
						|
	exp, _ := hex.DecodeString("8eb208f7e05d987a9b044a8e98c6b087f15a0bfc")
 | 
						|
	checkhash(t, "Ripemd160", Ripemd160, msg, exp)
 | 
						|
}
 | 
						|
 | 
						|
func BenchmarkSha3(b *testing.B) {
 | 
						|
	a := []byte("hello world")
 | 
						|
	amount := 1000000
 | 
						|
	start := time.Now()
 | 
						|
	for i := 0; i < amount; i++ {
 | 
						|
		Keccak256(a)
 | 
						|
	}
 | 
						|
 | 
						|
	fmt.Println(amount, ":", time.Since(start))
 | 
						|
}
 | 
						|
 | 
						|
func Test0Key(t *testing.T) {
 | 
						|
	key := common.Hex2Bytes("0000000000000000000000000000000000000000000000000000000000000000")
 | 
						|
	_, err := secp256k1.GeneratePubKey(key)
 | 
						|
	if err == nil {
 | 
						|
		t.Errorf("expected error due to zero privkey")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func testSign(signfn func([]byte, *ecdsa.PrivateKey) ([]byte, error), t *testing.T) {
 | 
						|
	key, _ := HexToECDSA(testPrivHex)
 | 
						|
	addr := common.HexToAddress(testAddrHex)
 | 
						|
 | 
						|
	msg := Keccak256([]byte("foo"))
 | 
						|
	sig, err := signfn(msg, key)
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Sign error: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// signfn can return a recover id of either [0,1] or [27,28].
 | 
						|
	// In the latter case its an Ethereum signature, adjust recover id.
 | 
						|
	if sig[64] == 27 || sig[64] == 28 {
 | 
						|
		sig[64] -= 27
 | 
						|
	}
 | 
						|
 | 
						|
	recoveredPub, err := Ecrecover(msg, sig)
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("ECRecover error: %s", err)
 | 
						|
	}
 | 
						|
	pubKey := ToECDSAPub(recoveredPub)
 | 
						|
	recoveredAddr := PubkeyToAddress(*pubKey)
 | 
						|
	if addr != recoveredAddr {
 | 
						|
		t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr)
 | 
						|
	}
 | 
						|
 | 
						|
	// should be equal to SigToPub
 | 
						|
	recoveredPub2, err := SigToPub(msg, sig)
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("ECRecover error: %s", err)
 | 
						|
	}
 | 
						|
	recoveredAddr2 := PubkeyToAddress(*recoveredPub2)
 | 
						|
	if addr != recoveredAddr2 {
 | 
						|
		t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr2)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSign(t *testing.T) {
 | 
						|
	testSign(Sign, t)
 | 
						|
}
 | 
						|
 | 
						|
func TestSignEthereum(t *testing.T) {
 | 
						|
	testSign(SignEthereum, t)
 | 
						|
}
 | 
						|
 | 
						|
func testInvalidSign(signfn func([]byte, *ecdsa.PrivateKey) ([]byte, error), t *testing.T) {
 | 
						|
	_, err := signfn(make([]byte, 1), nil)
 | 
						|
	if err == nil {
 | 
						|
		t.Errorf("expected sign with hash 1 byte to error")
 | 
						|
	}
 | 
						|
 | 
						|
	_, err = signfn(make([]byte, 33), nil)
 | 
						|
	if err == nil {
 | 
						|
		t.Errorf("expected sign with hash 33 byte to error")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestInvalidSign(t *testing.T) {
 | 
						|
	testInvalidSign(Sign, t)
 | 
						|
}
 | 
						|
 | 
						|
func TestInvalidSignEthereum(t *testing.T) {
 | 
						|
	testInvalidSign(SignEthereum, t)
 | 
						|
}
 | 
						|
 | 
						|
func TestNewContractAddress(t *testing.T) {
 | 
						|
	key, _ := HexToECDSA(testPrivHex)
 | 
						|
	addr := common.HexToAddress(testAddrHex)
 | 
						|
	genAddr := PubkeyToAddress(key.PublicKey)
 | 
						|
	// sanity check before using addr to create contract address
 | 
						|
	checkAddr(t, genAddr, addr)
 | 
						|
 | 
						|
	caddr0 := CreateAddress(addr, 0)
 | 
						|
	caddr1 := CreateAddress(addr, 1)
 | 
						|
	caddr2 := CreateAddress(addr, 2)
 | 
						|
	checkAddr(t, common.HexToAddress("333c3310824b7c685133f2bedb2ca4b8b4df633d"), caddr0)
 | 
						|
	checkAddr(t, common.HexToAddress("8bda78331c916a08481428e4b07c96d3e916d165"), caddr1)
 | 
						|
	checkAddr(t, common.HexToAddress("c9ddedf451bc62ce88bf9292afb13df35b670699"), caddr2)
 | 
						|
}
 | 
						|
 | 
						|
func TestLoadECDSAFile(t *testing.T) {
 | 
						|
	keyBytes := common.FromHex(testPrivHex)
 | 
						|
	fileName0 := "test_key0"
 | 
						|
	fileName1 := "test_key1"
 | 
						|
	checkKey := func(k *ecdsa.PrivateKey) {
 | 
						|
		checkAddr(t, PubkeyToAddress(k.PublicKey), common.HexToAddress(testAddrHex))
 | 
						|
		loadedKeyBytes := FromECDSA(k)
 | 
						|
		if !bytes.Equal(loadedKeyBytes, keyBytes) {
 | 
						|
			t.Fatalf("private key mismatch: want: %x have: %x", keyBytes, loadedKeyBytes)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ioutil.WriteFile(fileName0, []byte(testPrivHex), 0600)
 | 
						|
	defer os.Remove(fileName0)
 | 
						|
 | 
						|
	key0, err := LoadECDSA(fileName0)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	checkKey(key0)
 | 
						|
 | 
						|
	// again, this time with SaveECDSA instead of manual save:
 | 
						|
	err = SaveECDSA(fileName1, key0)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	defer os.Remove(fileName1)
 | 
						|
 | 
						|
	key1, err := LoadECDSA(fileName1)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	checkKey(key1)
 | 
						|
}
 | 
						|
 | 
						|
func TestValidateSignatureValues(t *testing.T) {
 | 
						|
	check := func(expected bool, v byte, r, s *big.Int) {
 | 
						|
		if ValidateSignatureValues(v, r, s, false) != expected {
 | 
						|
			t.Errorf("mismatch for v: %d r: %d s: %d want: %v", v, r, s, expected)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	minusOne := big.NewInt(-1)
 | 
						|
	one := common.Big1
 | 
						|
	zero := common.Big0
 | 
						|
	secp256k1nMinus1 := new(big.Int).Sub(secp256k1.N, common.Big1)
 | 
						|
 | 
						|
	// correct v,r,s
 | 
						|
	check(true, 27, one, one)
 | 
						|
	check(true, 28, one, one)
 | 
						|
	// incorrect v, correct r,s,
 | 
						|
	check(false, 30, one, one)
 | 
						|
	check(false, 26, one, one)
 | 
						|
 | 
						|
	// incorrect v, combinations of incorrect/correct r,s at lower limit
 | 
						|
	check(false, 0, zero, zero)
 | 
						|
	check(false, 0, zero, one)
 | 
						|
	check(false, 0, one, zero)
 | 
						|
	check(false, 0, one, one)
 | 
						|
 | 
						|
	// correct v for any combination of incorrect r,s
 | 
						|
	check(false, 27, zero, zero)
 | 
						|
	check(false, 27, zero, one)
 | 
						|
	check(false, 27, one, zero)
 | 
						|
 | 
						|
	check(false, 28, zero, zero)
 | 
						|
	check(false, 28, zero, one)
 | 
						|
	check(false, 28, one, zero)
 | 
						|
 | 
						|
	// correct sig with max r,s
 | 
						|
	check(true, 27, secp256k1nMinus1, secp256k1nMinus1)
 | 
						|
	// correct v, combinations of incorrect r,s at upper limit
 | 
						|
	check(false, 27, secp256k1.N, secp256k1nMinus1)
 | 
						|
	check(false, 27, secp256k1nMinus1, secp256k1.N)
 | 
						|
	check(false, 27, secp256k1.N, secp256k1.N)
 | 
						|
 | 
						|
	// current callers ensures r,s cannot be negative, but let's test for that too
 | 
						|
	// as crypto package could be used stand-alone
 | 
						|
	check(false, 27, minusOne, one)
 | 
						|
	check(false, 27, one, minusOne)
 | 
						|
}
 | 
						|
 | 
						|
func checkhash(t *testing.T, name string, f func([]byte) []byte, msg, exp []byte) {
 | 
						|
	sum := f(msg)
 | 
						|
	if bytes.Compare(exp, sum) != 0 {
 | 
						|
		t.Fatalf("hash %s mismatch: want: %x have: %x", name, exp, sum)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func checkAddr(t *testing.T, addr0, addr1 common.Address) {
 | 
						|
	if addr0 != addr1 {
 | 
						|
		t.Fatalf("address mismatch: want: %x have: %x", addr0, addr1)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// test to help Python team with integration of libsecp256k1
 | 
						|
// skip but keep it after they are done
 | 
						|
func TestPythonIntegration(t *testing.T) {
 | 
						|
	kh := "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032"
 | 
						|
	k0, _ := HexToECDSA(kh)
 | 
						|
	k1 := FromECDSA(k0)
 | 
						|
 | 
						|
	msg0 := Keccak256([]byte("foo"))
 | 
						|
	sig0, _ := secp256k1.Sign(msg0, k1)
 | 
						|
 | 
						|
	msg1 := common.FromHex("00000000000000000000000000000000")
 | 
						|
	sig1, _ := secp256k1.Sign(msg0, k1)
 | 
						|
 | 
						|
	fmt.Printf("msg: %x, privkey: %x sig: %x\n", msg0, k1, sig0)
 | 
						|
	fmt.Printf("msg: %x, privkey: %x sig: %x\n", msg1, k1, sig1)
 | 
						|
}
 |