2015-01-21 23:35:00 +00:00
|
|
|
package secp256k1
|
|
|
|
|
2015-04-07 10:40:31 +00:00
|
|
|
// TODO: set USE_SCALAR_4X64 depending on platform?
|
|
|
|
|
2015-01-21 23:35:00 +00:00
|
|
|
/*
|
2015-04-07 10:40:31 +00:00
|
|
|
#cgo CFLAGS: -I./secp256k1
|
2015-04-07 13:20:24 +00:00
|
|
|
#cgo darwin CFLAGS: -I/usr/local/include
|
|
|
|
#cgo LDFLAGS: -lgmp
|
|
|
|
#cgo darwin LDFLAGS: -L/usr/local/lib
|
2015-01-21 23:35:00 +00:00
|
|
|
#define USE_NUM_GMP
|
2015-04-07 10:40:31 +00:00
|
|
|
#define USE_FIELD_10X26
|
2015-01-21 23:35:00 +00:00
|
|
|
#define USE_FIELD_INV_BUILTIN
|
2015-04-07 10:40:31 +00:00
|
|
|
#define USE_SCALAR_8X32
|
|
|
|
#define USE_SCALAR_INV_BUILTIN
|
2015-01-21 23:35:00 +00:00
|
|
|
#include "./secp256k1/src/secp256k1.c"
|
|
|
|
*/
|
|
|
|
import "C"
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"errors"
|
|
|
|
"unsafe"
|
2015-02-15 01:20:31 +00:00
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/crypto/randentropy"
|
2015-01-21 23:35:00 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
//#define USE_FIELD_5X64
|
|
|
|
|
|
|
|
/*
|
|
|
|
Todo:
|
|
|
|
> Centralize key management in module
|
|
|
|
> add pubkey/private key struct
|
|
|
|
> Dont let keys leave module; address keys as ints
|
|
|
|
|
|
|
|
> store private keys in buffer and shuffle (deters persistance on swap disc)
|
|
|
|
> Byte permutation (changing)
|
|
|
|
> xor with chaning random block (to deter scanning memory for 0x63) (stream cipher?)
|
|
|
|
|
|
|
|
On Disk
|
|
|
|
> Store keys in wallets
|
|
|
|
> use slow key derivation function for wallet encryption key (2 seconds)
|
|
|
|
*/
|
|
|
|
|
|
|
|
func init() {
|
2015-04-07 10:40:31 +00:00
|
|
|
//takes 10ms to 100ms
|
|
|
|
C.secp256k1_start(3) // SECP256K1_START_SIGN | SECP256K1_START_VERIFY
|
2015-01-21 23:35:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func Stop() {
|
|
|
|
C.secp256k1_stop()
|
|
|
|
}
|
|
|
|
|
|
|
|
func GenerateKeyPair() ([]byte, []byte) {
|
|
|
|
|
|
|
|
pubkey_len := C.int(65)
|
|
|
|
const seckey_len = 32
|
|
|
|
|
|
|
|
var pubkey []byte = make([]byte, pubkey_len)
|
2015-02-04 16:06:06 +00:00
|
|
|
var seckey []byte = randentropy.GetEntropyMixed(seckey_len)
|
2015-01-21 23:35:00 +00:00
|
|
|
|
|
|
|
var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
|
|
|
|
var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
|
|
|
|
|
2015-04-07 10:40:31 +00:00
|
|
|
ret := C.secp256k1_ec_pubkey_create(
|
2015-01-21 23:35:00 +00:00
|
|
|
pubkey_ptr, &pubkey_len,
|
|
|
|
seckey_ptr, 0)
|
|
|
|
|
|
|
|
if ret != C.int(1) {
|
|
|
|
return GenerateKeyPair() //invalid secret, try again
|
|
|
|
}
|
|
|
|
return pubkey, seckey
|
|
|
|
}
|
|
|
|
|
|
|
|
func GeneratePubKey(seckey []byte) ([]byte, error) {
|
2015-02-15 01:20:31 +00:00
|
|
|
if err := VerifySeckeyValidity(seckey); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-01-21 23:35:00 +00:00
|
|
|
pubkey_len := C.int(65)
|
|
|
|
const seckey_len = 32
|
|
|
|
|
|
|
|
var pubkey []byte = make([]byte, pubkey_len)
|
|
|
|
|
|
|
|
var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
|
|
|
|
var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
|
|
|
|
|
2015-04-07 10:40:31 +00:00
|
|
|
ret := C.secp256k1_ec_pubkey_create(
|
2015-01-21 23:35:00 +00:00
|
|
|
pubkey_ptr, &pubkey_len,
|
|
|
|
seckey_ptr, 0)
|
|
|
|
|
|
|
|
if ret != C.int(1) {
|
|
|
|
return nil, errors.New("Unable to generate pubkey from seckey")
|
|
|
|
}
|
|
|
|
|
|
|
|
return pubkey, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func Sign(msg []byte, seckey []byte) ([]byte, error) {
|
2015-02-04 16:06:06 +00:00
|
|
|
nonce := randentropy.GetEntropyMixed(32)
|
2015-01-21 23:35:00 +00:00
|
|
|
|
|
|
|
var sig []byte = make([]byte, 65)
|
|
|
|
var recid C.int
|
|
|
|
|
|
|
|
var msg_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&msg[0]))
|
|
|
|
var sig_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&sig[0]))
|
2015-04-07 10:40:31 +00:00
|
|
|
var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
|
|
|
|
|
|
|
|
var noncefp_ptr = &(*C.secp256k1_nonce_function_default)
|
|
|
|
var ndata_ptr = unsafe.Pointer(&nonce[0])
|
2015-01-21 23:35:00 +00:00
|
|
|
|
2015-04-07 10:40:31 +00:00
|
|
|
if C.secp256k1_ec_seckey_verify(seckey_ptr) != C.int(1) {
|
2015-01-21 23:35:00 +00:00
|
|
|
return nil, errors.New("Invalid secret key")
|
|
|
|
}
|
|
|
|
|
|
|
|
ret := C.secp256k1_ecdsa_sign_compact(
|
2015-04-07 10:40:31 +00:00
|
|
|
msg_ptr,
|
2015-01-21 23:35:00 +00:00
|
|
|
sig_ptr,
|
|
|
|
seckey_ptr,
|
2015-04-07 10:40:31 +00:00
|
|
|
noncefp_ptr,
|
|
|
|
ndata_ptr,
|
2015-01-21 23:35:00 +00:00
|
|
|
&recid)
|
|
|
|
|
|
|
|
sig[64] = byte(int(recid))
|
|
|
|
|
|
|
|
if ret != C.int(1) {
|
|
|
|
// nonce invalid, retry
|
|
|
|
return Sign(msg, seckey)
|
|
|
|
}
|
|
|
|
|
|
|
|
return sig, nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func VerifySeckeyValidity(seckey []byte) error {
|
|
|
|
if len(seckey) != 32 {
|
|
|
|
return errors.New("priv key is not 32 bytes")
|
|
|
|
}
|
|
|
|
var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
|
2015-04-07 10:40:31 +00:00
|
|
|
ret := C.secp256k1_ec_seckey_verify(seckey_ptr)
|
2015-01-21 23:35:00 +00:00
|
|
|
if int(ret) != 1 {
|
|
|
|
return errors.New("invalid seckey")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func VerifyPubkeyValidity(pubkey []byte) error {
|
|
|
|
if len(pubkey) != 65 {
|
|
|
|
return errors.New("pub key is not 65 bytes")
|
|
|
|
}
|
|
|
|
var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
|
2015-04-07 10:40:31 +00:00
|
|
|
ret := C.secp256k1_ec_pubkey_verify(pubkey_ptr, 65)
|
2015-01-21 23:35:00 +00:00
|
|
|
if int(ret) != 1 {
|
|
|
|
return errors.New("invalid pubkey")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func VerifySignatureValidity(sig []byte) bool {
|
|
|
|
//64+1
|
|
|
|
if len(sig) != 65 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
//malleability check, highest bit must be 1
|
|
|
|
if (sig[32] & 0x80) == 0x80 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
//recovery id check
|
|
|
|
if sig[64] >= 4 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
//for compressed signatures, does not need pubkey
|
|
|
|
func VerifySignature(msg []byte, sig []byte, pubkey1 []byte) error {
|
|
|
|
if msg == nil || sig == nil || pubkey1 == nil {
|
|
|
|
return errors.New("inputs must be non-nil")
|
|
|
|
}
|
|
|
|
if len(sig) != 65 {
|
|
|
|
return errors.New("invalid signature length")
|
|
|
|
}
|
|
|
|
if len(pubkey1) != 65 {
|
|
|
|
return errors.New("Invalid public key length")
|
|
|
|
}
|
|
|
|
|
|
|
|
//to enforce malleability, highest bit of S must be 0
|
|
|
|
//S starts at 32nd byte
|
|
|
|
if (sig[32] & 0x80) == 0x80 { //highest bit must be 1
|
|
|
|
return errors.New("Signature not malleable")
|
|
|
|
}
|
|
|
|
|
|
|
|
if sig[64] >= 4 {
|
|
|
|
return errors.New("Recover byte invalid")
|
|
|
|
}
|
|
|
|
|
|
|
|
// if pubkey recovered, signature valid
|
|
|
|
pubkey2, err := RecoverPubkey(msg, sig)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(pubkey2) != 65 {
|
|
|
|
return errors.New("Invalid recovered public key length")
|
|
|
|
}
|
|
|
|
if !bytes.Equal(pubkey1, pubkey2) {
|
|
|
|
return errors.New("Public key does not match recovered public key")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
//recovers the public key from the signature
|
|
|
|
//recovery of pubkey means correct signature
|
|
|
|
func RecoverPubkey(msg []byte, sig []byte) ([]byte, error) {
|
|
|
|
if len(sig) != 65 {
|
|
|
|
return nil, errors.New("Invalid signature length")
|
|
|
|
}
|
|
|
|
|
|
|
|
var pubkey []byte = make([]byte, 65)
|
|
|
|
|
|
|
|
var msg_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&msg[0]))
|
|
|
|
var sig_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&sig[0]))
|
|
|
|
var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
|
|
|
|
|
|
|
|
var pubkeylen C.int
|
|
|
|
|
|
|
|
ret := C.secp256k1_ecdsa_recover_compact(
|
2015-04-07 10:40:31 +00:00
|
|
|
msg_ptr,
|
2015-01-21 23:35:00 +00:00
|
|
|
sig_ptr,
|
2015-04-07 10:40:31 +00:00
|
|
|
pubkey_ptr,
|
|
|
|
&pubkeylen,
|
|
|
|
C.int(0),
|
|
|
|
C.int(sig[64]),
|
2015-01-21 23:35:00 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
if ret == C.int(0) {
|
|
|
|
return nil, errors.New("Failed to recover public key")
|
|
|
|
} else if pubkeylen != C.int(65) {
|
|
|
|
return nil, errors.New("Impossible Error: Invalid recovered public key length")
|
|
|
|
} else {
|
|
|
|
return pubkey, nil
|
|
|
|
}
|
|
|
|
return nil, errors.New("Impossible Error: func RecoverPubkey has reached an unreachable state")
|
|
|
|
}
|