2020-06-26 17:10:48 +02:00
|
|
|
package fr.acinq.secp256k1
|
|
|
|
|
|
|
|
import kotlinx.cinterop.*
|
|
|
|
import platform.posix.size_tVar
|
|
|
|
import secp256k1.*
|
|
|
|
|
|
|
|
@OptIn(ExperimentalUnsignedTypes::class)
|
2020-07-01 12:46:04 +02:00
|
|
|
public object Secp256k1Native : Secp256k1 {
|
2020-06-26 17:10:48 +02:00
|
|
|
|
|
|
|
private val ctx: CPointer<secp256k1_context> by lazy {
|
|
|
|
secp256k1_context_create((SECP256K1_FLAGS_TYPE_CONTEXT or SECP256K1_FLAGS_BIT_CONTEXT_SIGN or SECP256K1_FLAGS_BIT_CONTEXT_VERIFY).toUInt())
|
|
|
|
?: error("Could not create segp256k1 context")
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
private fun Int.requireSuccess(message: String): Int = if (this != 1) throw Secp256k1Exception(message) else this
|
2020-06-26 17:10:48 +02:00
|
|
|
|
|
|
|
private fun MemScope.allocSignature(input: ByteArray): secp256k1_ecdsa_signature {
|
|
|
|
val sig = alloc<secp256k1_ecdsa_signature>()
|
|
|
|
val nativeBytes = toNat(input)
|
2020-06-29 17:10:58 +02:00
|
|
|
|
|
|
|
val result = when (input.size) {
|
|
|
|
64 -> secp256k1_ecdsa_signature_parse_compact(ctx, sig.ptr, nativeBytes)
|
|
|
|
in 70..73 -> secp256k1_ecdsa_signature_parse_der(ctx, sig.ptr, nativeBytes, input.size.convert())
|
2020-07-02 17:52:21 +02:00
|
|
|
else -> throw Secp256k1Exception("Unknown signature format")
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
2020-07-02 17:52:21 +02:00
|
|
|
result.requireSuccess("cannot parse signature (size = ${input.size} sig = ${Hex.encode(input)}")
|
2020-06-26 17:10:48 +02:00
|
|
|
return sig
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
private fun MemScope.serializeSignature(signature: secp256k1_ecdsa_signature): ByteArray {
|
|
|
|
val natOutput = allocArray<UByteVar>(64)
|
|
|
|
secp256k1_ecdsa_signature_serialize_compact(ctx, natOutput, signature.ptr).requireSuccess("secp256k1_ecdsa_signature_serialize_compact() failed")
|
|
|
|
return natOutput.readBytes(64)
|
2020-06-29 17:10:58 +02:00
|
|
|
}
|
|
|
|
|
2020-06-26 17:10:48 +02:00
|
|
|
private fun MemScope.allocPublicKey(pubkey: ByteArray): secp256k1_pubkey {
|
|
|
|
val natPub = toNat(pubkey)
|
|
|
|
val pub = alloc<secp256k1_pubkey>()
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_pubkey_parse(ctx, pub.ptr, natPub, pubkey.size.convert()).requireSuccess("secp256k1_ec_pubkey_parse() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
return pub
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
private fun MemScope.serializePubkey(pubkey: secp256k1_pubkey): ByteArray {
|
|
|
|
val serialized = allocArray<UByteVar>(65)
|
2020-06-26 17:10:48 +02:00
|
|
|
val outputLen = alloc<size_tVar>()
|
2020-07-02 17:52:21 +02:00
|
|
|
outputLen.value = 65.convert()
|
|
|
|
secp256k1_ec_pubkey_serialize(ctx, serialized, outputLen.ptr, pubkey.ptr, SECP256K1_EC_UNCOMPRESSED.convert()).requireSuccess("secp256k1_ec_pubkey_serialize() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
return serialized.readBytes(outputLen.value.convert())
|
|
|
|
}
|
|
|
|
|
|
|
|
private fun DeferScope.toNat(bytes: ByteArray): CPointer<UByteVar> {
|
|
|
|
val ubytes = bytes.asUByteArray()
|
|
|
|
val pinned = ubytes.pin()
|
|
|
|
this.defer { pinned.unpin() }
|
|
|
|
return pinned.addressOf(0)
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun verify(signature: ByteArray, data: ByteArray, pub: ByteArray): Boolean {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(data.size == 32)
|
|
|
|
require(pub.size == 33 || pub.size == 65)
|
|
|
|
memScoped {
|
2020-06-29 17:10:58 +02:00
|
|
|
val nPubkey = allocPublicKey(pub)
|
|
|
|
val nData = toNat(data)
|
|
|
|
val nSig = allocSignature(signature)
|
|
|
|
return secp256k1_ecdsa_verify(ctx, nSig.ptr, nData, nPubkey.ptr) == 1
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun sign(data: ByteArray, sec: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(sec.size == 32)
|
|
|
|
require(data.size == 32)
|
|
|
|
memScoped {
|
2020-06-29 17:10:58 +02:00
|
|
|
val nSec = toNat(sec)
|
|
|
|
val nData = toNat(data)
|
|
|
|
val nSig = alloc<secp256k1_ecdsa_signature>()
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ecdsa_sign(ctx, nSig.ptr, nData, nSec, null, null).requireSuccess("secp256k1_ecdsa_sign() failed")
|
|
|
|
return serializeSignature(nSig)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun signatureNormalize(sig: ByteArray): Pair<ByteArray, Boolean> {
|
2020-06-29 17:10:58 +02:00
|
|
|
require(sig.size == 64 || sig.size in 70..73)
|
2020-06-26 17:10:48 +02:00
|
|
|
memScoped {
|
2020-06-29 17:10:58 +02:00
|
|
|
val nSig = allocSignature(sig)
|
|
|
|
val isHighS = secp256k1_ecdsa_signature_normalize(ctx, nSig.ptr, nSig.ptr)
|
2020-07-02 17:52:21 +02:00
|
|
|
return Pair(serializeSignature(nSig), isHighS == 1)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun secKeyVerify(seckey: ByteArray): Boolean {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(seckey.size == 32)
|
|
|
|
memScoped {
|
2020-06-29 17:10:58 +02:00
|
|
|
val nSec = toNat(seckey)
|
|
|
|
return secp256k1_ec_seckey_verify(ctx, nSec) == 1
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun pubkeyCreate(seckey: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(seckey.size == 32)
|
|
|
|
memScoped {
|
2020-06-29 17:10:58 +02:00
|
|
|
val nSec = toNat(seckey)
|
|
|
|
val nPubkey = alloc<secp256k1_pubkey>()
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_pubkey_create(ctx, nPubkey.ptr, nSec).requireSuccess("secp256k1_ec_pubkey_create() failed")
|
|
|
|
return serializePubkey(nPubkey)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun pubkeyParse(pubkey: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(pubkey.size == 33 || pubkey.size == 65)
|
|
|
|
memScoped {
|
|
|
|
val nPubkey = allocPublicKey(pubkey)
|
2020-07-02 17:52:21 +02:00
|
|
|
return serializePubkey(nPubkey)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun cleanup() {
|
2020-06-26 17:10:48 +02:00
|
|
|
secp256k1_context_destroy(ctx)
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun privKeyNegate(privkey: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(privkey.size == 32)
|
|
|
|
memScoped {
|
|
|
|
val negated = privkey.copyOf()
|
|
|
|
val negPriv = toNat(negated)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_privkey_negate(ctx, negPriv).requireSuccess("secp256k1_ec_privkey_negate() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
return negated
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun privKeyTweakMul(privkey: ByteArray, tweak: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(privkey.size == 32)
|
|
|
|
memScoped {
|
|
|
|
val multiplied = privkey.copyOf()
|
|
|
|
val natMul = toNat(multiplied)
|
|
|
|
val natTweak = toNat(tweak)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_privkey_tweak_mul(ctx, natMul, natTweak).requireSuccess("secp256k1_ec_privkey_tweak_mul() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
return multiplied
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun privKeyTweakAdd(privkey: ByteArray, tweak: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(privkey.size == 32)
|
|
|
|
memScoped {
|
|
|
|
val added = privkey.copyOf()
|
|
|
|
val natAdd = toNat(added)
|
|
|
|
val natTweak = toNat(tweak)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_privkey_tweak_add(ctx, natAdd, natTweak).requireSuccess("secp256k1_ec_privkey_tweak_add() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
return added
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun pubKeyNegate(pubkey: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(pubkey.size == 33 || pubkey.size == 65)
|
|
|
|
memScoped {
|
|
|
|
val nPubkey = allocPublicKey(pubkey)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_pubkey_negate(ctx, nPubkey.ptr).requireSuccess("secp256k1_ec_pubkey_negate() failed")
|
|
|
|
return serializePubkey(nPubkey)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun pubKeyTweakAdd(pubkey: ByteArray, tweak: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(pubkey.size == 33 || pubkey.size == 65)
|
|
|
|
memScoped {
|
|
|
|
val nPubkey = allocPublicKey(pubkey)
|
|
|
|
val nTweak = toNat(tweak)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_pubkey_tweak_add(ctx, nPubkey.ptr, nTweak).requireSuccess("secp256k1_ec_pubkey_tweak_add() failed")
|
|
|
|
return serializePubkey(nPubkey)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun pubKeyTweakMul(pubkey: ByteArray, tweak: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(pubkey.size == 33 || pubkey.size == 65)
|
|
|
|
memScoped {
|
|
|
|
val nPubkey = allocPublicKey(pubkey)
|
|
|
|
val nTweak = toNat(tweak)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_pubkey_tweak_mul(ctx, nPubkey.ptr, nTweak).requireSuccess("secp256k1_ec_pubkey_tweak_mul() failed")
|
|
|
|
return serializePubkey(nPubkey)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-01 12:46:04 +02:00
|
|
|
public override fun pubKeyAdd(pubkey1: ByteArray, pubkey2: ByteArray): ByteArray {
|
2020-06-29 17:10:58 +02:00
|
|
|
require(pubkey1.size == 33 || pubkey1.size == 65)
|
|
|
|
require(pubkey2.size == 33 || pubkey2.size == 65)
|
2020-06-26 17:10:48 +02:00
|
|
|
memScoped {
|
|
|
|
val nPubkey1 = allocPublicKey(pubkey1)
|
|
|
|
val nPubkey2 = allocPublicKey(pubkey2)
|
2020-06-29 17:10:58 +02:00
|
|
|
val combined = alloc<secp256k1_pubkey>()
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ec_pubkey_combine(ctx, combined.ptr, cValuesOf(nPubkey1.ptr, nPubkey2.ptr), 2.convert()).requireSuccess("secp256k1_ec_pubkey_combine() failed")
|
|
|
|
return serializePubkey(combined)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun ecdh(seckey: ByteArray, pubkey: ByteArray): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(seckey.size == 32)
|
|
|
|
require(pubkey.size == 33 || pubkey.size == 65)
|
|
|
|
memScoped {
|
|
|
|
val nPubkey = allocPublicKey(pubkey)
|
|
|
|
val nSeckey = toNat(seckey)
|
|
|
|
val output = allocArray<UByteVar>(32)
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ecdh(ctx, output, nPubkey.ptr, nSeckey, null, null).requireSuccess("secp256k1_ecdh() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
return output.readBytes(32)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:21 +02:00
|
|
|
public override fun ecdsaRecover(sig: ByteArray, message: ByteArray, recid: Int): ByteArray {
|
2020-06-26 17:10:48 +02:00
|
|
|
require(sig.size == 64)
|
|
|
|
require(message.size == 32)
|
|
|
|
memScoped {
|
|
|
|
val nSig = toNat(sig)
|
2020-06-29 17:10:58 +02:00
|
|
|
val rSig = alloc<secp256k1_ecdsa_recoverable_signature>()
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ecdsa_recoverable_signature_parse_compact(ctx, rSig.ptr, nSig, recid).requireSuccess("secp256k1_ecdsa_recoverable_signature_parse_compact() failed")
|
2020-06-26 17:10:48 +02:00
|
|
|
val nMessage = toNat(message)
|
2020-06-29 17:10:58 +02:00
|
|
|
val pubkey = alloc<secp256k1_pubkey>()
|
2020-07-02 17:52:21 +02:00
|
|
|
secp256k1_ecdsa_recover(ctx, pubkey.ptr, rSig.ptr, nMessage).requireSuccess("secp256k1_ecdsa_recover() failed")
|
|
|
|
return serializePubkey(pubkey)
|
2020-06-26 17:10:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-01 12:46:04 +02:00
|
|
|
|
|
|
|
internal actual fun getSecpk256k1(): Secp256k1 = Secp256k1Native
|