package crypto import ( "fmt" "io" pb "github.com/libp2p/go-libp2p-core/crypto/pb" "github.com/libp2p/go-libp2p-core/internal/catch" btcec "github.com/btcsuite/btcd/btcec/v2" btcececdsa "github.com/btcsuite/btcd/btcec/v2/ecdsa" "github.com/minio/sha256-simd" ) // Secp256k1PrivateKey is an Secp256k1 private key type Secp256k1PrivateKey btcec.PrivateKey // Secp256k1PublicKey is an Secp256k1 public key type Secp256k1PublicKey btcec.PublicKey // GenerateSecp256k1Key generates a new Secp256k1 private and public key pair func GenerateSecp256k1Key(src io.Reader) (PrivKey, PubKey, error) { privk, err := btcec.NewPrivateKey() if err != nil { return nil, nil, err } k := (*Secp256k1PrivateKey)(privk) return k, k.GetPublic(), nil } // UnmarshalSecp256k1PrivateKey returns a private key from bytes func UnmarshalSecp256k1PrivateKey(data []byte) (k PrivKey, err error) { if len(data) != btcec.PrivKeyBytesLen { return nil, fmt.Errorf("expected secp256k1 data size to be %d", btcec.PrivKeyBytesLen) } defer func() { catch.HandlePanic(recover(), &err, "secp256k1 private-key unmarshal") }() privk, _ := btcec.PrivKeyFromBytes(data) return (*Secp256k1PrivateKey)(privk), nil } // UnmarshalSecp256k1PublicKey returns a public key from bytes func UnmarshalSecp256k1PublicKey(data []byte) (_k PubKey, err error) { defer func() { catch.HandlePanic(recover(), &err, "secp256k1 public-key unmarshal") }() k, err := btcec.ParsePubKey(data) if err != nil { return nil, err } return (*Secp256k1PublicKey)(k), nil } // Type returns the private key type func (k *Secp256k1PrivateKey) Type() pb.KeyType { return pb.KeyType_Secp256k1 } // Raw returns the bytes of the key func (k *Secp256k1PrivateKey) Raw() ([]byte, error) { return (*btcec.PrivateKey)(k).Serialize(), nil } // Equals compares two private keys func (k *Secp256k1PrivateKey) Equals(o Key) bool { sk, ok := o.(*Secp256k1PrivateKey) if !ok { return basicEquals(k, o) } return k.GetPublic().Equals(sk.GetPublic()) } // Sign returns a signature from input data func (k *Secp256k1PrivateKey) Sign(data []byte) (_sig []byte, err error) { defer func() { catch.HandlePanic(recover(), &err, "secp256k1 signing") }() key := (*btcec.PrivateKey)(k) hash := sha256.Sum256(data) sig := btcececdsa.Sign(key, hash[:]) return sig.Serialize(), nil } // GetPublic returns a public key func (k *Secp256k1PrivateKey) GetPublic() PubKey { return (*Secp256k1PublicKey)((*btcec.PrivateKey)(k).PubKey()) } // Type returns the public key type func (k *Secp256k1PublicKey) Type() pb.KeyType { return pb.KeyType_Secp256k1 } // Raw returns the bytes of the key func (k *Secp256k1PublicKey) Raw() (res []byte, err error) { defer func() { catch.HandlePanic(recover(), &err, "secp256k1 public key marshaling") }() return (*btcec.PublicKey)(k).SerializeCompressed(), nil } // Equals compares two public keys func (k *Secp256k1PublicKey) Equals(o Key) bool { sk, ok := o.(*Secp256k1PublicKey) if !ok { return basicEquals(k, o) } return (*btcec.PublicKey)(k).IsEqual((*btcec.PublicKey)(sk)) } // Verify compares a signature against the input data func (k *Secp256k1PublicKey) Verify(data []byte, sigStr []byte) (success bool, err error) { defer func() { catch.HandlePanic(recover(), &err, "secp256k1 signature verification") // To be extra safe. if err != nil { success = false } }() sig, err := btcececdsa.ParseDERSignature(sigStr) if err != nil { return false, err } hash := sha256.Sum256(data) return sig.Verify(hash[:], (*btcec.PublicKey)(k)), nil }