|
| 1 | +package secp256r1 |
| 2 | + |
| 3 | +import ( |
| 4 | + "crypto/ecdsa" |
| 5 | + "crypto/elliptic" |
| 6 | + "crypto/rand" |
| 7 | + "fmt" |
| 8 | + "io" |
| 9 | + "math/big" |
| 10 | + |
| 11 | + ethcrypto "github.com/ethereum/go-ethereum/crypto" |
| 12 | + "github.com/mailchain/go-crypto" |
| 13 | +) |
| 14 | + |
| 15 | +// PrivateKey based on the p256 curve |
| 16 | +type PrivateKey struct { |
| 17 | + key ecdsa.PrivateKey |
| 18 | + rand io.Reader |
| 19 | +} |
| 20 | + |
| 21 | +// Bytes returns the byte representation of the private key |
| 22 | +func (pk PrivateKey) Bytes() []byte { |
| 23 | + return ethcrypto.FromECDSA(&pk.key) |
| 24 | +} |
| 25 | + |
| 26 | +// Sign signs the message with the private key and returns the signature. |
| 27 | +func (pk PrivateKey) Sign(message []byte) (signature []byte, err error) { |
| 28 | + r, s, err := ecdsa.Sign(pk.rand, &pk.key, message) |
| 29 | + if err != nil { |
| 30 | + return nil, err |
| 31 | + } |
| 32 | + |
| 33 | + // normalize |
| 34 | + r, s = ecNormalizeSignature(r, s, pk.key.Curve) |
| 35 | + // serialize |
| 36 | + buf := make([]byte, 64) |
| 37 | + r.FillBytes(buf[:32]) |
| 38 | + s.FillBytes(buf[32:]) |
| 39 | + return buf, nil |
| 40 | +} |
| 41 | + |
| 42 | +// PublicKey return the public key that is derived from the private key |
| 43 | +func (pk PrivateKey) PublicKey() crypto.PublicKey { |
| 44 | + return &PublicKey{Key: pk.key.PublicKey} |
| 45 | +} |
| 46 | + |
| 47 | +// PrivateKeyFromBytes get a private key from seed []byte |
| 48 | +func PrivateKeyFromBytes(privKey []byte) (*PrivateKey, error) { |
| 49 | + ecdsaPrivateKey, err := toECDSA(privKey) |
| 50 | + if err != nil { |
| 51 | + return nil, err |
| 52 | + } |
| 53 | + |
| 54 | + return &PrivateKey{key: *ecdsaPrivateKey, rand: rand.Reader}, nil |
| 55 | +} |
| 56 | + |
| 57 | +func GenerateKey(rand io.Reader) (*PrivateKey, error) { |
| 58 | + key, err := ecdsa.GenerateKey(elliptic.P256(), rand) |
| 59 | + if err != nil { |
| 60 | + return nil, err |
| 61 | + } |
| 62 | + return &PrivateKey{key: *key, rand: rand}, nil |
| 63 | +} |
| 64 | + |
| 65 | +// ecNormalizeSignature ensures strict compliance with the EC spec by returning |
| 66 | +// S mod n for the appropriate keys curve. |
| 67 | +// |
| 68 | +// Details: |
| 69 | +// |
| 70 | +// Step #6 of the ECDSA algorithm [x] defines an `S` value mod n[0], |
| 71 | +// but most signers (OpenSSL, SoftHSM, YubiHSM) don't return a strict modulo. |
| 72 | +// This variability was exploited with transaction malleability in Bitcoin, |
| 73 | +// leading to BIP#62. BIP#62 Rule #5[1] requires that signatures return a |
| 74 | +// strict S = ... mod n which this function forces implemented in btcd here [2] |
| 75 | +// [0]: https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm |
| 76 | +// [1]: https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki#new-rules |
| 77 | +// [2]: https://github.com/btcsuite/btcd/blob/master/btcec/signature.go#L49 |
| 78 | +// |
| 79 | +// See also Ecadlabs Signatory: |
| 80 | +// https://github.com/ecadlabs/signatory/blob/f57871c2300cb5a53236ea5fcb4f203012b4fe41/pkg/cryptoutils/crypto.go#L17 |
| 81 | +func ecNormalizeSignature(r, s *big.Int, c elliptic.Curve) (*big.Int, *big.Int) { |
| 82 | + r = new(big.Int).Set(r) |
| 83 | + s = new(big.Int).Set(s) |
| 84 | + |
| 85 | + order := c.Params().N |
| 86 | + quo := new(big.Int).Quo(order, new(big.Int).SetInt64(2)) |
| 87 | + if s.Cmp(quo) > 0 { |
| 88 | + s = s.Sub(order, s) |
| 89 | + } |
| 90 | + return r, s |
| 91 | +} |
| 92 | + |
| 93 | +func toECDSA(pkBytes []byte) (*ecdsa.PrivateKey, error) { |
| 94 | + k := new(big.Int).SetBytes(pkBytes) |
| 95 | + curveOrder := elliptic.P256().Params().N |
| 96 | + if k.Cmp(curveOrder) >= 0 { |
| 97 | + return nil, fmt.Errorf("invalid private key for curve Nist P256") |
| 98 | + } |
| 99 | + |
| 100 | + priv := ecdsa.PrivateKey{ |
| 101 | + PublicKey: ecdsa.PublicKey{ |
| 102 | + Curve: elliptic.P256(), |
| 103 | + }, |
| 104 | + D: k, |
| 105 | + } |
| 106 | + |
| 107 | + // https://cs.opensource.google/go/go/+/refs/tags/go1.17.5:src/crypto/ecdsa/ecdsa.go;l=149 |
| 108 | + priv.PublicKey.X, priv.PublicKey.Y = elliptic.P256().ScalarBaseMult(k.Bytes()) |
| 109 | + return &priv, nil |
| 110 | +} |
0 commit comments