signature_cgo.go 3.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788
  1. // Copyright 2017 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. //go:build !nacl && !js && cgo && !gofuzz
  17. // +build !nacl,!js,cgo,!gofuzz
  18. package crypto
  19. import (
  20. "crypto/ecdsa"
  21. "crypto/elliptic"
  22. "fmt"
  23. "github.com/ethereum/go-ethereum/common/math"
  24. "github.com/ethereum/go-ethereum/crypto/secp256k1"
  25. )
  26. // Ecrecover returns the uncompressed public key that created the given signature.
  27. func Ecrecover(hash, sig []byte) ([]byte, error) {
  28. return secp256k1.RecoverPubkey(hash, sig)
  29. }
  30. // SigToPub returns the public key that created the given signature.
  31. func SigToPub(hash, sig []byte) (*ecdsa.PublicKey, error) {
  32. s, err := Ecrecover(hash, sig)
  33. if err != nil {
  34. return nil, err
  35. }
  36. x, y := elliptic.Unmarshal(S256(), s)
  37. return &ecdsa.PublicKey{Curve: S256(), X: x, Y: y}, nil
  38. }
  39. // Sign calculates an ECDSA signature.
  40. //
  41. // This function is susceptible to chosen plaintext attacks that can leak
  42. // information about the private key that is used for signing. Callers must
  43. // be aware that the given digest cannot be chosen by an adversery. Common
  44. // solution is to hash any input before calculating the signature.
  45. //
  46. // The produced signature is in the [R || S || V] format where V is 0 or 1.
  47. func Sign(digestHash []byte, prv *ecdsa.PrivateKey) (sig []byte, err error) {
  48. if len(digestHash) != DigestLength {
  49. return nil, fmt.Errorf("hash is required to be exactly %d bytes (%d)", DigestLength, len(digestHash))
  50. }
  51. seckey := math.PaddedBigBytes(prv.D, prv.Params().BitSize/8)
  52. defer zeroBytes(seckey)
  53. return secp256k1.Sign(digestHash, seckey)
  54. }
  55. // VerifySignature checks that the given public key created signature over digest.
  56. // The public key should be in compressed (33 bytes) or uncompressed (65 bytes) format.
  57. // The signature should have the 64 byte [R || S] format.
  58. func VerifySignature(pubkey, digestHash, signature []byte) bool {
  59. return secp256k1.VerifySignature(pubkey, digestHash, signature)
  60. }
  61. // DecompressPubkey parses a public key in the 33-byte compressed format.
  62. func DecompressPubkey(pubkey []byte) (*ecdsa.PublicKey, error) {
  63. x, y := secp256k1.DecompressPubkey(pubkey)
  64. if x == nil {
  65. return nil, fmt.Errorf("invalid public key")
  66. }
  67. return &ecdsa.PublicKey{X: x, Y: y, Curve: S256()}, nil
  68. }
  69. // CompressPubkey encodes a public key to the 33-byte compressed format.
  70. func CompressPubkey(pubkey *ecdsa.PublicKey) []byte {
  71. return secp256k1.CompressPubkey(pubkey.X, pubkey.Y)
  72. }
  73. // S256 returns an instance of the secp256k1 curve.
  74. func S256() elliptic.Curve {
  75. return secp256k1.S256()
  76. }