]> Git Repo - VerusCoin.git/blame - src/key.h
Merge pull request #735 from sipa/netbase
[VerusCoin.git] / src / key.h
CommitLineData
8bd66202 1// Copyright (c) 2009-2010 Satoshi Nakamoto
b2120e22 2// Copyright (c) 2011 The Bitcoin developers
8bd66202
GA
3// Distributed under the MIT/X11 software license, see the accompanying
4// file license.txt or http://www.opensource.org/licenses/mit-license.php.
223b6f1b
WL
5#ifndef BITCOIN_KEY_H
6#define BITCOIN_KEY_H
8bd66202 7
fcedd45c
VN
8#include <stdexcept>
9#include <vector>
10
223b6f1b
WL
11#include <openssl/ec.h>
12#include <openssl/ecdsa.h>
13#include <openssl/obj_mac.h>
8bd66202 14
fcedd45c
VN
15#include "serialize.h"
16#include "uint256.h"
fcedd45c 17
8bd66202
GA
18// secp160k1
19// const unsigned int PRIVATE_KEY_SIZE = 192;
20// const unsigned int PUBLIC_KEY_SIZE = 41;
21// const unsigned int SIGNATURE_SIZE = 48;
22//
23// secp192k1
24// const unsigned int PRIVATE_KEY_SIZE = 222;
25// const unsigned int PUBLIC_KEY_SIZE = 49;
26// const unsigned int SIGNATURE_SIZE = 57;
27//
28// secp224k1
29// const unsigned int PRIVATE_KEY_SIZE = 250;
30// const unsigned int PUBLIC_KEY_SIZE = 57;
31// const unsigned int SIGNATURE_SIZE = 66;
32//
33// secp256k1:
34// const unsigned int PRIVATE_KEY_SIZE = 279;
35// const unsigned int PUBLIC_KEY_SIZE = 65;
36// const unsigned int SIGNATURE_SIZE = 72;
37//
38// see www.keylength.com
39// script supports up to 75 for single byte push
40
93db3fce
PW
41int extern EC_KEY_regenerate_key(EC_KEY *eckey, BIGNUM *priv_key);
42int extern ECDSA_SIG_recover_key_GFp(EC_KEY *eckey, ECDSA_SIG *ecsig, const unsigned char *msg, int msglen, int recid, int check);
8bd66202
GA
43
44class key_error : public std::runtime_error
45{
46public:
47 explicit key_error(const std::string& str) : std::runtime_error(str) {}
48};
49
50
51// secure_allocator is defined in serialize.h
d825e6a3 52// CPrivKey is a serialized private key, with all parameters included (279 bytes)
223b6f1b 53typedef std::vector<unsigned char, secure_allocator<unsigned char> > CPrivKey;
d825e6a3 54// CSecret is a serialization of just the secret parameter (32 bytes)
acd65016 55typedef std::vector<unsigned char, secure_allocator<unsigned char> > CSecret;
8bd66202
GA
56
57class CKey
58{
59protected:
60 EC_KEY* pkey;
61 bool fSet;
62
63public:
64 CKey()
65 {
66 pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
67 if (pkey == NULL)
68 throw key_error("CKey::CKey() : EC_KEY_new_by_curve_name failed");
69 fSet = false;
70 }
71
72 CKey(const CKey& b)
73 {
74 pkey = EC_KEY_dup(b.pkey);
75 if (pkey == NULL)
76 throw key_error("CKey::CKey(const CKey&) : EC_KEY_dup failed");
77 fSet = b.fSet;
78 }
79
80 CKey& operator=(const CKey& b)
81 {
82 if (!EC_KEY_copy(pkey, b.pkey))
83 throw key_error("CKey::operator=(const CKey&) : EC_KEY_copy failed");
84 fSet = b.fSet;
85 return (*this);
86 }
87
88 ~CKey()
89 {
90 EC_KEY_free(pkey);
91 }
92
93 bool IsNull() const
94 {
95 return !fSet;
96 }
97
98 void MakeNewKey()
99 {
100 if (!EC_KEY_generate_key(pkey))
101 throw key_error("CKey::MakeNewKey() : EC_KEY_generate_key failed");
102 fSet = true;
103 }
104
105 bool SetPrivKey(const CPrivKey& vchPrivKey)
106 {
107 const unsigned char* pbegin = &vchPrivKey[0];
108 if (!d2i_ECPrivateKey(&pkey, &pbegin, vchPrivKey.size()))
109 return false;
110 fSet = true;
111 return true;
112 }
113
acd65016
PW
114 bool SetSecret(const CSecret& vchSecret)
115 {
116 EC_KEY_free(pkey);
117 pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
118 if (pkey == NULL)
119 throw key_error("CKey::SetSecret() : EC_KEY_new_by_curve_name failed");
120 if (vchSecret.size() != 32)
121 throw key_error("CKey::SetSecret() : secret must be 32 bytes");
122 BIGNUM *bn = BN_bin2bn(&vchSecret[0],32,BN_new());
123 if (bn == NULL)
124 throw key_error("CKey::SetSecret() : BN_bin2bn failed");
125 if (!EC_KEY_regenerate_key(pkey,bn))
126 throw key_error("CKey::SetSecret() : EC_KEY_regenerate_key failed");
127 BN_clear_free(bn);
128 fSet = true;
129 return true;
130 }
131
132 CSecret GetSecret() const
133 {
134 CSecret vchRet;
135 vchRet.resize(32);
136 const BIGNUM *bn = EC_KEY_get0_private_key(pkey);
137 int nBytes = BN_num_bytes(bn);
138 if (bn == NULL)
139 throw key_error("CKey::GetSecret() : EC_KEY_get0_private_key failed");
140 int n=BN_bn2bin(bn,&vchRet[32 - nBytes]);
141 if (n != nBytes)
142 throw key_error("CKey::GetSecret(): BN_bn2bin failed");
143 return vchRet;
144 }
145
8bd66202
GA
146 CPrivKey GetPrivKey() const
147 {
148 unsigned int nSize = i2d_ECPrivateKey(pkey, NULL);
149 if (!nSize)
150 throw key_error("CKey::GetPrivKey() : i2d_ECPrivateKey failed");
151 CPrivKey vchPrivKey(nSize, 0);
152 unsigned char* pbegin = &vchPrivKey[0];
153 if (i2d_ECPrivateKey(pkey, &pbegin) != nSize)
154 throw key_error("CKey::GetPrivKey() : i2d_ECPrivateKey returned unexpected size");
155 return vchPrivKey;
156 }
157
223b6f1b 158 bool SetPubKey(const std::vector<unsigned char>& vchPubKey)
8bd66202
GA
159 {
160 const unsigned char* pbegin = &vchPubKey[0];
161 if (!o2i_ECPublicKey(&pkey, &pbegin, vchPubKey.size()))
162 return false;
163 fSet = true;
164 return true;
165 }
166
223b6f1b 167 std::vector<unsigned char> GetPubKey() const
8bd66202
GA
168 {
169 unsigned int nSize = i2o_ECPublicKey(pkey, NULL);
170 if (!nSize)
171 throw key_error("CKey::GetPubKey() : i2o_ECPublicKey failed");
223b6f1b 172 std::vector<unsigned char> vchPubKey(nSize, 0);
8bd66202
GA
173 unsigned char* pbegin = &vchPubKey[0];
174 if (i2o_ECPublicKey(pkey, &pbegin) != nSize)
175 throw key_error("CKey::GetPubKey() : i2o_ECPublicKey returned unexpected size");
176 return vchPubKey;
177 }
178
223b6f1b 179 bool Sign(uint256 hash, std::vector<unsigned char>& vchSig)
8bd66202 180 {
9ef7fa34
GA
181 unsigned int nSize = ECDSA_size(pkey);
182 vchSig.resize(nSize); // Make sure it is big enough
183 if (!ECDSA_sign(0, (unsigned char*)&hash, sizeof(hash), &vchSig[0], &nSize, pkey))
184 {
185 vchSig.clear();
8bd66202 186 return false;
9ef7fa34
GA
187 }
188 vchSig.resize(nSize); // Shrink to fit actual size
8bd66202
GA
189 return true;
190 }
191
01cc5263 192 // create a compact signature (65 bytes), which allows reconstructing the used public key
d825e6a3
PW
193 // The format is one header byte, followed by two times 32 bytes for the serialized r and s values.
194 // The header byte: 0x1B = first key with even y, 0x1C = first key with odd y,
195 // 0x1D = second key with even y, 0x1E = second key with odd y
01cc5263
PW
196 bool SignCompact(uint256 hash, std::vector<unsigned char>& vchSig)
197 {
198 bool fOk = false;
199 ECDSA_SIG *sig = ECDSA_do_sign((unsigned char*)&hash, sizeof(hash), pkey);
200 if (sig==NULL)
201 return false;
202 vchSig.clear();
203 vchSig.resize(65,0);
204 int nBitsR = BN_num_bits(sig->r);
205 int nBitsS = BN_num_bits(sig->s);
206 if (nBitsR <= 256 && nBitsS <= 256)
207 {
208 int nRecId = -1;
209 for (int i=0; i<4; i++)
210 {
211 CKey keyRec;
212 keyRec.fSet = true;
213 if (ECDSA_SIG_recover_key_GFp(keyRec.pkey, sig, (unsigned char*)&hash, sizeof(hash), i, 1) == 1)
214 if (keyRec.GetPubKey() == this->GetPubKey())
215 {
216 nRecId = i;
217 break;
218 }
219 }
220
221 if (nRecId == -1)
d825e6a3 222 throw key_error("CKey::SignCompact() : unable to construct recoverable key");
01cc5263
PW
223
224 vchSig[0] = nRecId+27;
225 BN_bn2bin(sig->r,&vchSig[33-(nBitsR+7)/8]);
226 BN_bn2bin(sig->s,&vchSig[65-(nBitsS+7)/8]);
227 fOk = true;
228 }
229 ECDSA_SIG_free(sig);
230 return fOk;
231 }
232
233 // reconstruct public key from a compact signature
d825e6a3
PW
234 // This is only slightly more CPU intensive than just verifying it.
235 // If this function succeeds, the recovered public key is guaranteed to be valid
236 // (the signature is a valid signature of the given data for that key)
01cc5263
PW
237 bool SetCompactSignature(uint256 hash, const std::vector<unsigned char>& vchSig)
238 {
239 if (vchSig.size() != 65)
240 return false;
241 if (vchSig[0]<27 || vchSig[0]>=31)
242 return false;
243 ECDSA_SIG *sig = ECDSA_SIG_new();
244 BN_bin2bn(&vchSig[1],32,sig->r);
245 BN_bin2bn(&vchSig[33],32,sig->s);
246
247 EC_KEY_free(pkey);
248 pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
249 if (ECDSA_SIG_recover_key_GFp(pkey, sig, (unsigned char*)&hash, sizeof(hash), vchSig[0] - 27, 0) == 1)
250 {
251 fSet = true;
252 ECDSA_SIG_free(sig);
253 return true;
254 }
255 return false;
256 }
257
223b6f1b 258 bool Verify(uint256 hash, const std::vector<unsigned char>& vchSig)
8bd66202
GA
259 {
260 // -1 = error, 0 = bad sig, 1 = good
261 if (ECDSA_verify(0, (unsigned char*)&hash, sizeof(hash), &vchSig[0], vchSig.size(), pkey) != 1)
262 return false;
263 return true;
264 }
2ffba736 265
d825e6a3 266 // Verify a compact signature
01cc5263
PW
267 bool VerifyCompact(uint256 hash, const std::vector<unsigned char>& vchSig)
268 {
269 CKey key;
270 if (!key.SetCompactSignature(hash, vchSig))
271 return false;
272 if (GetPubKey() != key.GetPubKey())
273 return false;
274 return true;
275 }
8bd66202 276};
223b6f1b
WL
277
278#endif
This page took 0.071356 seconds and 4 git commands to generate.