fcoin/lib/bcoin/ec.js
Christopher Jeffrey fec9f2e308 verify pubkey.
2016-03-31 03:55:47 -07:00

219 lines
4.5 KiB
JavaScript

/**
* ec.js - ecdsa wrapper for secp256k1 and elliptic
* Copyright (c) 2014-2015, Fedor Indutny (MIT License)
* https://github.com/indutny/bcoin
*/
var bcoin = require('../bcoin');
var elliptic = require('elliptic');
var utils = require('./utils');
var assert = utils.assert;
var ec = exports;
var crypto, secp256k1;
if (!bcoin.isBrowser)
crypto = require('cry' + 'pto');
try {
secp256k1 = require('secp' + '256k1');
} catch (e) {
;
}
ec.elliptic = elliptic.ec('secp256k1');
ec.signature = require('elliptic/lib/elliptic/ec/signature');
ec.keypair = require('elliptic/lib/elliptic/ec/key');
/**
* EC
*/
ec.generatePrivateKey = function generatePrivateKey() {
var key, priv;
if (secp256k1 && crypto) {
do {
priv = crypto.randomBytes(32);
} while (!secp256k1.privateKeyVerify(priv));
} else {
key = ec.elliptic.genKeyPair();
priv = key.getPrivate().toBuffer('be', 32);
}
return priv;
};
ec.publicKeyCreate = function publicKeyCreate(priv, compressed) {
assert(Buffer.isBuffer(priv));
if (secp256k1)
return secp256k1.publicKeyCreate(priv, compressed);
priv = ec.elliptic.keyPair({ priv: priv }).getPublic(compressed, 'array');
return new Buffer(priv);
};
ec.random = function random(size) {
if (crypto)
return crypto.randomBytes(size);
return new Buffer(ec.elliptic.rand(size));
};
ec.verify = function verify(msg, sig, key, historical) {
if (!Buffer.isBuffer(sig))
return false;
if (sig.length === 0)
return false;
if (key.getPublicKey)
key = key.getPublicKey();
// Attempt to normalize the signature
// length before passing to elliptic.
// Note: We only do this for historical data!
// https://github.com/indutny/elliptic/issues/78
if (historical)
sig = ec.normalizeLength(sig);
try {
if (secp256k1) {
// secp256k1 fails on high s values. This is
// bad for verifying historical data.
if (historical)
sig = ec.toLowS(sig);
// Import from DER.
sig = secp256k1.signatureImport(sig);
return secp256k1.verify(msg, sig, key);
}
return ec.elliptic.verify(msg, sig, key);
} catch (e) {
// if (!ec.publicKeyVerify(key))
// utils.debug('Public key is invalid.');
return false;
}
};
ec.publicKeyVerify = function publicKeyVerify(key) {
if (secp256k1)
return secp256k1.publicKeyVerify(key);
return ec.elliptic.keyPair({ pub: key }).validate();
};
ec.sign = function sign(msg, key) {
var sig;
if (key.getPrivateKey)
key = key.getPrivateKey();
if (secp256k1) {
// Sign message
sig = secp256k1.sign(msg, key);
// Ensure low S value
sig = secp256k1.signatureNormalize(sig.signature);
// Convert to DER array
sig = secp256k1.signatureExport(sig);
} else {
// Sign message and ensure low S value
sig = ec.elliptic.sign(msg, key, { canonical: true });
// Convert to DER array
sig = new Buffer(sig.toDER());
}
return sig;
};
ec.normalizeLength = function normalizeLength(sig) {
var data, p, len, rlen, slen;
data = sig.slice();
p = { place: 0 };
if (data[p.place++] !== 0x30)
return sig;
len = getLength(data, p);
if (data.length > len + p.place)
data = data.slice(0, len + p.place);
if (data[p.place++] !== 0x02)
return sig;
rlen = getLength(data, p);
p.place += rlen;
if (data[p.place++] !== 0x02)
return sig;
slen = getLength(data, p);
if (data.length > slen + p.place)
data = data.slice(0, slen + p.place);
return data;
};
function getLength(buf, p) {
var initial = buf[p.place++];
if (!(initial & 0x80)) {
return initial;
}
var octetLen = initial & 0xf;
var val = 0;
for (var i = 0, off = p.place; i < octetLen; i++, off++) {
val <<= 8;
val |= buf[off];
}
p.place = off;
return val;
}
ec.isLowS = function isLowS(sig) {
if (!sig.s) {
assert(Buffer.isBuffer(sig));
try {
sig = new ec.signature(sig);
} catch (e) {
return false;
}
}
// Technically a negative S value is low,
// but we don't want to ever use negative
// S values in bitcoin.
if (sig.s.cmpn(0) <= 0)
return false;
// If S is greater than half the order,
// it's too high.
if (sig.s.cmp(ec.elliptic.nh) > 0)
return false;
return true;
};
ec.toLowS = function toLowS(sig) {
if (!sig.s) {
assert(Buffer.isBuffer(sig));
try {
sig = new ec.signature(sig);
} catch (e) {
return sig;
}
}
// If S is greater than half the order,
// it's too high.
if (sig.s.cmp(ec.elliptic.nh) > 0)
sig.s = ec.elliptic.n.sub(sig.s);
return new Buffer(sig.toDER());
};