|
|
- package secp256k1
-
- /*
- #cgo CFLAGS: -std=gnu99 -Wno-error
- #cgo darwin CFLAGS: -I/usr/local/include
- #cgo LDFLAGS: -lgmp
- #cgo darwin LDFLAGS: -L/usr/local/lib
- #define USE_FIELD_10X26
- #define USE_NUM_GMP
- #define USE_FIELD_INV_BUILTIN
- #include "./secp256k1/src/secp256k1.c"
- */
- import "C"
-
- import (
- "bytes"
- "errors"
- "unsafe"
-
- "github.com/ethereum/go-ethereum/crypto/randentropy"
- )
-
- //#define USE_FIELD_5X64
-
- /*
- Todo:
- > Centralize key management in module
- > add pubkey/private key struct
- > Dont let keys leave module; address keys as ints
-
- > store private keys in buffer and shuffle (deters persistance on swap disc)
- > Byte permutation (changing)
- > xor with chaning random block (to deter scanning memory for 0x63) (stream cipher?)
-
- On Disk
- > Store keys in wallets
- > use slow key derivation function for wallet encryption key (2 seconds)
- */
-
- func init() {
- C.secp256k1_start() //takes 10ms to 100ms
- }
-
- func Stop() {
- C.secp256k1_stop()
- }
-
- /*
- int secp256k1_ecdsa_pubkey_create(
- unsigned char *pubkey, int *pubkeylen,
- const unsigned char *seckey, int compressed);
- */
-
- /** Compute the public key for a secret key.
- * In: compressed: whether the computed public key should be compressed
- * seckey: pointer to a 32-byte private key.
- * Out: pubkey: pointer to a 33-byte (if compressed) or 65-byte (if uncompressed)
- * area to store the public key.
- * pubkeylen: pointer to int that will be updated to contains the pubkey's
- * length.
- * Returns: 1: secret was valid, public key stores
- * 0: secret was invalid, try again.
- */
-
- //pubkey, seckey
-
- func GenerateKeyPair() ([]byte, []byte) {
-
- pubkey_len := C.int(65)
- const seckey_len = 32
-
- var pubkey []byte = make([]byte, pubkey_len)
- var seckey []byte = randentropy.GetEntropyMixed(seckey_len)
-
- var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
- var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
-
- ret := C.secp256k1_ecdsa_pubkey_create(
- pubkey_ptr, &pubkey_len,
- seckey_ptr, 0)
-
- if ret != C.int(1) {
- return GenerateKeyPair() //invalid secret, try again
- }
- return pubkey, seckey
- }
-
- func GeneratePubKey(seckey []byte) ([]byte, error) {
- if err := VerifySeckeyValidity(seckey); err != nil {
- return nil, err
- }
-
- pubkey_len := C.int(65)
- const seckey_len = 32
-
- var pubkey []byte = make([]byte, pubkey_len)
-
- var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
- var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
-
- ret := C.secp256k1_ecdsa_pubkey_create(
- pubkey_ptr, &pubkey_len,
- seckey_ptr, 0)
-
- if ret != C.int(1) {
- return nil, errors.New("Unable to generate pubkey from seckey")
- }
-
- return pubkey, nil
- }
-
- /*
- * Create a compact ECDSA signature (64 byte + recovery id).
- * Returns: 1: signature created
- * 0: nonce invalid, try another one
- * In: msg: the message being signed
- * msglen: the length of the message being signed
- * seckey: pointer to a 32-byte secret key (assumed to be valid)
- * nonce: pointer to a 32-byte nonce (generated with a cryptographic PRNG)
- * Out: sig: pointer to a 64-byte array where the signature will be placed.
- * recid: pointer to an int, which will be updated to contain the recovery id.
- */
-
- /*
- int secp256k1_ecdsa_sign_compact(const unsigned char *msg, int msglen,
- unsigned char *sig64,
- const unsigned char *seckey,
- const unsigned char *nonce,
- int *recid);
- */
-
- func Sign(msg []byte, seckey []byte) ([]byte, error) {
- nonce := randentropy.GetEntropyMixed(32)
-
- var sig []byte = make([]byte, 65)
- var recid C.int
-
- var msg_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&msg[0]))
- var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
- var nonce_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&nonce[0]))
- var sig_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&sig[0]))
-
- if C.secp256k1_ecdsa_seckey_verify(seckey_ptr) != C.int(1) {
- return nil, errors.New("Invalid secret key")
- }
-
- ret := C.secp256k1_ecdsa_sign_compact(
- msg_ptr, C.int(len(msg)),
- sig_ptr,
- seckey_ptr,
- nonce_ptr,
- &recid)
-
- sig[64] = byte(int(recid))
-
- if ret != C.int(1) {
- // nonce invalid, retry
- return Sign(msg, seckey)
- }
-
- return sig, nil
-
- }
-
- /*
- * Verify an ECDSA secret key.
- * Returns: 1: secret key is valid
- * 0: secret key is invalid
- * In: seckey: pointer to a 32-byte secret key
- */
-
- func VerifySeckeyValidity(seckey []byte) error {
- if len(seckey) != 32 {
- return errors.New("priv key is not 32 bytes")
- }
- var seckey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&seckey[0]))
- ret := C.secp256k1_ecdsa_seckey_verify(seckey_ptr)
- if int(ret) != 1 {
- return errors.New("invalid seckey")
- }
- return nil
- }
-
- /*
- * Validate a public key.
- * Returns: 1: valid public key
- * 0: invalid public key
- */
-
- func VerifyPubkeyValidity(pubkey []byte) error {
- if len(pubkey) != 65 {
- return errors.New("pub key is not 65 bytes")
- }
- var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
- ret := C.secp256k1_ecdsa_pubkey_verify(pubkey_ptr, 65)
- if int(ret) != 1 {
- return errors.New("invalid pubkey")
- }
-
- return nil
- }
-
- func VerifySignatureValidity(sig []byte) bool {
- //64+1
- if len(sig) != 65 {
- return false
- }
- //malleability check, highest bit must be 1
- if (sig[32] & 0x80) == 0x80 {
- return false
- }
- //recovery id check
- if sig[64] >= 4 {
- return false
- }
-
- return true
- }
-
- //for compressed signatures, does not need pubkey
- func VerifySignature(msg []byte, sig []byte, pubkey1 []byte) error {
- if msg == nil || sig == nil || pubkey1 == nil {
- return errors.New("inputs must be non-nil")
- }
- if len(sig) != 65 {
- return errors.New("invalid signature length")
- }
- if len(pubkey1) != 65 {
- return errors.New("Invalid public key length")
- }
-
- //to enforce malleability, highest bit of S must be 0
- //S starts at 32nd byte
- if (sig[32] & 0x80) == 0x80 { //highest bit must be 1
- return errors.New("Signature not malleable")
- }
-
- if sig[64] >= 4 {
- return errors.New("Recover byte invalid")
- }
-
- // if pubkey recovered, signature valid
- pubkey2, err := RecoverPubkey(msg, sig)
- if err != nil {
- return err
- }
- if len(pubkey2) != 65 {
- return errors.New("Invalid recovered public key length")
- }
- if !bytes.Equal(pubkey1, pubkey2) {
- return errors.New("Public key does not match recovered public key")
- }
-
- return nil
- }
-
- /*
- int secp256k1_ecdsa_recover_compact(const unsigned char *msg, int msglen,
- const unsigned char *sig64,
- unsigned char *pubkey, int *pubkeylen,
- int compressed, int recid);
- */
-
- /*
- * Recover an ECDSA public key from a compact signature.
- * Returns: 1: public key succesfully recovered (which guarantees a correct signature).
- * 0: otherwise.
- * In: msg: the message assumed to be signed
- * msglen: the length of the message
- * compressed: whether to recover a compressed or uncompressed pubkey
- * recid: the recovery id (as returned by ecdsa_sign_compact)
- * Out: pubkey: pointer to a 33 or 65 byte array to put the pubkey.
- * pubkeylen: pointer to an int that will contain the pubkey length.
- */
-
- //recovers the public key from the signature
- //recovery of pubkey means correct signature
- func RecoverPubkey(msg []byte, sig []byte) ([]byte, error) {
- if len(sig) != 65 {
- return nil, errors.New("Invalid signature length")
- }
-
- var pubkey []byte = make([]byte, 65)
-
- var msg_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&msg[0]))
- var sig_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&sig[0]))
- var pubkey_ptr *C.uchar = (*C.uchar)(unsafe.Pointer(&pubkey[0]))
-
- var pubkeylen C.int
-
- ret := C.secp256k1_ecdsa_recover_compact(
- msg_ptr, C.int(len(msg)),
- sig_ptr,
- pubkey_ptr, &pubkeylen,
- C.int(0), C.int(sig[64]),
- )
-
- if ret == C.int(0) {
- return nil, errors.New("Failed to recover public key")
- } else if pubkeylen != C.int(65) {
- return nil, errors.New("Impossible Error: Invalid recovered public key length")
- } else {
- return pubkey, nil
- }
- return nil, errors.New("Impossible Error: func RecoverPubkey has reached an unreachable state")
- }
|