6eef37b0c6
* Basic transactions set up (to be separated) * Change transaction command to not include create operation (to include other command in next commit) * set up create command and made minor changes * wip implements module queries * Added tests for query address decoding * Added ambiguous encoding of to address in transaction and added tests * Fix linting issue * Move registering key types to application level to allow module usage to ignore * Move genaccounts code to be reused * Switches nonce increase to always happen in ante handler * change SetNonce from keeper to point to actual nonce operation * Remove no op nonce switch (not needed with clearing cache) * Changes to update all accounts pre state transition and clear cache at end of block * Update accounts before end of block commit (edge case where necessary) * Fix nonce of sender going into evm in case it's checked, and let evm set contract starting nonce
118 lines
3.6 KiB
Go
118 lines
3.6 KiB
Go
package crypto
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/ecdsa"
|
|
|
|
ethcrypto "github.com/ethereum/go-ethereum/crypto"
|
|
ethsecp256k1 "github.com/ethereum/go-ethereum/crypto/secp256k1"
|
|
|
|
authtypes "github.com/cosmos/cosmos-sdk/x/auth/types"
|
|
|
|
tmcrypto "github.com/tendermint/tendermint/crypto"
|
|
)
|
|
|
|
func init() {
|
|
authtypes.RegisterAccountTypeCodec(PubKeySecp256k1{}, PubKeyAminoName)
|
|
authtypes.RegisterAccountTypeCodec(PrivKeySecp256k1{}, PrivKeyAminoName)
|
|
}
|
|
|
|
// ----------------------------------------------------------------------------
|
|
// secp256k1 Private Key
|
|
|
|
var _ tmcrypto.PrivKey = PrivKeySecp256k1{}
|
|
|
|
// PrivKeySecp256k1 defines a type alias for an ecdsa.PrivateKey that implements
|
|
// Tendermint's PrivateKey interface.
|
|
type PrivKeySecp256k1 []byte
|
|
|
|
// GenerateKey generates a new random private key. It returns an error upon
|
|
// failure.
|
|
func GenerateKey() (PrivKeySecp256k1, error) {
|
|
priv, err := ethcrypto.GenerateKey()
|
|
if err != nil {
|
|
return PrivKeySecp256k1{}, err
|
|
}
|
|
|
|
return PrivKeySecp256k1(ethcrypto.FromECDSA(priv)), nil
|
|
}
|
|
|
|
// PubKey returns the ECDSA private key's public key.
|
|
func (privkey PrivKeySecp256k1) PubKey() tmcrypto.PubKey {
|
|
ecdsaPKey := privkey.ToECDSA()
|
|
return PubKeySecp256k1(ethcrypto.FromECDSAPub(&ecdsaPKey.PublicKey))
|
|
}
|
|
|
|
// Bytes returns the raw ECDSA private key bytes.
|
|
func (privkey PrivKeySecp256k1) Bytes() []byte {
|
|
return cryptoCodec.MustMarshalBinaryBare(privkey)
|
|
}
|
|
|
|
// Sign creates a recoverable ECDSA signature on the secp256k1 curve over the
|
|
// Keccak256 hash of the provided message. The produced signature is 65 bytes
|
|
// where the last byte contains the recovery ID.
|
|
func (privkey PrivKeySecp256k1) Sign(msg []byte) ([]byte, error) {
|
|
return ethcrypto.Sign(ethcrypto.Keccak256Hash(msg).Bytes(), privkey.ToECDSA())
|
|
}
|
|
|
|
// Equals returns true if two ECDSA private keys are equal and false otherwise.
|
|
func (privkey PrivKeySecp256k1) Equals(other tmcrypto.PrivKey) bool {
|
|
if other, ok := other.(PrivKeySecp256k1); ok {
|
|
return bytes.Equal(privkey.Bytes(), other.Bytes())
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// ToECDSA returns the ECDSA private key as a reference to ecdsa.PrivateKey type.
|
|
func (privkey PrivKeySecp256k1) ToECDSA() *ecdsa.PrivateKey {
|
|
key, _ := ethcrypto.ToECDSA(privkey)
|
|
return key
|
|
}
|
|
|
|
// ----------------------------------------------------------------------------
|
|
// secp256k1 Public Key
|
|
|
|
var _ tmcrypto.PubKey = (*PubKeySecp256k1)(nil)
|
|
|
|
// PubKeySecp256k1 defines a type alias for an ecdsa.PublicKey that implements
|
|
// Tendermint's PubKey interface.
|
|
type PubKeySecp256k1 []byte
|
|
|
|
// Address returns the address of the ECDSA public key.
|
|
func (key PubKeySecp256k1) Address() tmcrypto.Address {
|
|
pubk, _ := ethcrypto.UnmarshalPubkey(key)
|
|
return tmcrypto.Address(ethcrypto.PubkeyToAddress(*pubk).Bytes())
|
|
}
|
|
|
|
// Bytes returns the raw bytes of the ECDSA public key.
|
|
func (key PubKeySecp256k1) Bytes() []byte {
|
|
bz, err := cryptoCodec.MarshalBinaryBare(key)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return bz
|
|
}
|
|
|
|
// VerifyBytes verifies that the ECDSA public key created a given signature over
|
|
// the provided message. It will calculate the Keccak256 hash of the message
|
|
// prior to verification.
|
|
func (key PubKeySecp256k1) VerifyBytes(msg []byte, sig []byte) bool {
|
|
if len(sig) == 65 {
|
|
// remove recovery ID if contained in the signature
|
|
sig = sig[:len(sig)-1]
|
|
}
|
|
|
|
// the signature needs to be in [R || S] format when provided to VerifySignature
|
|
return ethsecp256k1.VerifySignature(key, ethcrypto.Keccak256Hash(msg).Bytes(), sig)
|
|
}
|
|
|
|
// Equals returns true if two ECDSA public keys are equal and false otherwise.
|
|
func (key PubKeySecp256k1) Equals(other tmcrypto.PubKey) bool {
|
|
if other, ok := other.(PubKeySecp256k1); ok {
|
|
return bytes.Equal(key.Bytes(), other.Bytes())
|
|
}
|
|
|
|
return false
|
|
}
|