Skip to content

Commit f97d6b8

Browse files
robdefeoalexvelicuAlexandru Velicuovasylenkoantonio-ivanovski
authored andcommitted
feat: Tezos
Co-authored-by: alexvelicu <[email protected]> Co-authored-by: Alexandru Velicu <[email protected]> Co-authored-by: Oleksii <[email protected]> Co-authored-by: Antonio Ivanovski <[email protected]> Co-authored-by: Zubeyir OZTURK <[email protected]> Co-authored-by: Tim Boeckmann <[email protected]> Co-authored-by: Antonio <[email protected]> GitOrigin-RevId: 6f51ed90a9107a19ab91000435c4c9a0dec622ac
1 parent 2d26436 commit f97d6b8

File tree

11 files changed

+702
-0
lines changed

11 files changed

+702
-0
lines changed

keys.go

+6
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ package crypto
33
const (
44
// KindSECP256K1 string identifier for secp256k1 keys.
55
KindSECP256K1 = "secp256k1"
6+
// KindSECP256R1 string identifier for secp256r1 keys.
7+
KindSECP256R1 = "secp256r1"
68
// KindED25519 string identifier for ed25519 keys.
79
KindED25519 = "ed25519"
810
// KindSR25519 string identifier for sr25519 keys.
@@ -18,6 +20,8 @@ const (
1820
IDED25519 = 0xe2
1921
// IDSR25519 byte identifier for sr25519 keys.
2022
IDSR25519 = 0xe3
23+
// IDSECP256R1 Id identifier for secp256r1 keys.
24+
IDSECP256R1 = 0xe4
2125
// IDNonSpecified Id identifier for non specified secret keys.
2226
IDNonSpecified = 0xee
2327
)
@@ -26,6 +30,7 @@ var CurveKindIDMapping = map[string]byte{ //nolint:gochecknoglobals
2630
KindSECP256K1: IDSECP256K1,
2731
KindED25519: IDED25519,
2832
KindSR25519: IDSR25519,
33+
KindSECP256R1: IDSECP256R1,
2934
}
3035

3136
// KeyTypes available key types.
@@ -34,5 +39,6 @@ func KeyTypes() map[string]bool {
3439
KindSECP256K1: true,
3540
KindED25519: true,
3641
KindSR25519: true,
42+
KindSECP256R1: true,
3743
}
3844
}

multikey/ids.go

+5
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ import (
66
"github.com/mailchain/go-crypto"
77
"github.com/mailchain/go-crypto/ed25519"
88
"github.com/mailchain/go-crypto/secp256k1"
9+
"github.com/mailchain/go-crypto/secp256r1"
910
"github.com/mailchain/go-crypto/sr25519"
1011
)
1112

@@ -15,6 +16,8 @@ func IDFromPublicKey(key crypto.PublicKey) (byte, error) {
1516
return crypto.IDED25519, nil
1617
case *secp256k1.PublicKey, secp256k1.PublicKey:
1718
return crypto.IDSECP256K1, nil
19+
case *secp256r1.PublicKey, secp256r1.PublicKey:
20+
return crypto.IDSECP256R1, nil
1821
case *sr25519.PublicKey, sr25519.PublicKey:
1922
return crypto.IDSR25519, nil
2023
default:
@@ -28,6 +31,8 @@ func IDFromPrivateKey(key crypto.PrivateKey) (byte, error) {
2831
return crypto.IDED25519, nil
2932
case *secp256k1.PrivateKey, secp256k1.PrivateKey:
3033
return crypto.IDSECP256K1, nil
34+
case *secp256r1.PrivateKey, secp256r1.PrivateKey:
35+
return crypto.IDSECP256R1, nil
3136
case *sr25519.PrivateKey, sr25519.PrivateKey:
3237
return crypto.IDSR25519, nil
3338
default:

multikey/names.go

+5
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ import (
66
"github.com/mailchain/go-crypto"
77
"github.com/mailchain/go-crypto/ed25519"
88
"github.com/mailchain/go-crypto/secp256k1"
9+
"github.com/mailchain/go-crypto/secp256r1"
910
"github.com/mailchain/go-crypto/sr25519"
1011
)
1112

@@ -17,6 +18,8 @@ func KindFromPublicKey(key crypto.PublicKey) (string, error) {
1718
return crypto.KindSECP256K1, nil
1819
case *sr25519.PublicKey, sr25519.PublicKey:
1920
return crypto.KindSR25519, nil
21+
case *secp256r1.PublicKey, secp256r1.PublicKey:
22+
return crypto.KindSECP256R1, nil
2023
default:
2124
return "", errors.New("unknown public key type")
2225
}
@@ -30,6 +33,8 @@ func KindFromPrivateKey(key crypto.PrivateKey) (string, error) {
3033
return crypto.KindSECP256K1, nil
3134
case *sr25519.PrivateKey, sr25519.PrivateKey:
3235
return crypto.KindSR25519, nil
36+
case *secp256r1.PrivateKey, secp256r1.PrivateKey:
37+
return crypto.KindSECP256R1, nil
3338
default:
3439
return "", errors.New("unknown private key type")
3540
}

multikey/private.go

+3
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ import (
66
"github.com/mailchain/go-crypto"
77
"github.com/mailchain/go-crypto/ed25519"
88
"github.com/mailchain/go-crypto/secp256k1"
9+
"github.com/mailchain/go-crypto/secp256r1"
910
"github.com/mailchain/go-crypto/sr25519"
1011
)
1112

@@ -21,6 +22,8 @@ func PrivateKeyFromBytes(keyType string, data []byte) (crypto.PrivateKey, error)
2122
return ed25519.PrivateKeyFromBytes(data)
2223
case crypto.KindSR25519:
2324
return sr25519.PrivateKeyFromBytes(data)
25+
case crypto.KindSECP256R1:
26+
return secp256r1.PrivateKeyFromBytes(data)
2427
default:
2528
return nil, fmt.Errorf("unsupported key type: %q", keyType)
2629
}

multikey/public.go

+5
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ import (
77
"github.com/mailchain/go-crypto"
88
"github.com/mailchain/go-crypto/ed25519"
99
"github.com/mailchain/go-crypto/secp256k1"
10+
"github.com/mailchain/go-crypto/secp256r1"
1011
"github.com/mailchain/go-crypto/sr25519"
1112
"github.com/mailchain/go-encoding"
1213
)
@@ -20,6 +21,8 @@ func PublicKeyFromBytes(keyType string, data []byte) (crypto.PublicKey, error) {
2021
return ed25519.PublicKeyFromBytes(data)
2122
case crypto.KindSR25519:
2223
return sr25519.PublicKeyFromBytes(data)
24+
case crypto.KindSECP256R1:
25+
return secp256r1.PublicKeyFromBytes(data)
2326
default:
2427
return nil, fmt.Errorf("unsupported curve type")
2528
}
@@ -49,6 +52,8 @@ func DescriptivePublicKeyFromBytes(in []byte) (crypto.PublicKey, error) {
4952
return ed25519.PublicKeyFromBytes(data)
5053
case crypto.IDSR25519:
5154
return sr25519.PublicKeyFromBytes(data)
55+
case crypto.IDSECP256R1:
56+
return secp256r1.PublicKeyFromBytes(data)
5257
default:
5358
return nil, fmt.Errorf("first byte must identity key curve")
5459
}

secp256r1/keys_test.go

+95
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
package secp256r1
2+
3+
import (
4+
"crypto/ecdsa"
5+
"log"
6+
7+
"github.com/mailchain/go-encoding/encodingtest"
8+
)
9+
10+
var (
11+
aliceSECP256R1PrivateKey = func() PrivateKey {
12+
k, err := PrivateKeyFromBytes(aliceSECP256R1PrivateKeyBytes)
13+
if err != nil {
14+
log.Fatal(err)
15+
}
16+
return *k
17+
}() //nolint: lll
18+
19+
aliceSECP256R1PrivateKeyBytes = encodingtest.MustDecodeHex("3cdee0ff28337463455cd1cc43d29b1bf749d9615576525853ccc02b83c8b433")
20+
21+
aliceSECP256R1PrivateECDSA = func() ecdsa.PrivateKey {
22+
key, err := toECDSA(aliceSECP256R1PrivateKeyBytes)
23+
if err != nil {
24+
log.Fatal(err)
25+
}
26+
return *key
27+
}
28+
29+
aliceSECP256R1PublicKey = func() PublicKey {
30+
k, err := PublicKeyFromBytes(aliceSECP256R1PublicKeyBytes)
31+
if err != nil {
32+
log.Fatal(err)
33+
}
34+
35+
return *k.(*PublicKey)
36+
}()
37+
aliceSECP256R1PublicKeyBytes = encodingtest.MustDecodeHex("0330ef59d5da4547c684aa0d5b7d8c1527fceab462cfd8d4a3529319c469b0d4d7")
38+
)
39+
40+
var (
41+
bobSECP256R1PrivateKey = func() PrivateKey {
42+
k, err := PrivateKeyFromBytes(bobSECP256R1PrivateKeyBytes)
43+
if err != nil {
44+
log.Fatal(err)
45+
}
46+
return *k
47+
}() //nolint: lll
48+
49+
bobSECP256R1PrivateKeyBytes = encodingtest.MustDecodeHex("a1e65c4677435cea57950b39379a9ec7ec0c64edc97efe36cdaae3c386fe2b71")
50+
51+
bobSECP256R1PrivateECDSA = func() ecdsa.PrivateKey {
52+
key, err := toECDSA(bobSECP256R1PrivateKeyBytes)
53+
if err != nil {
54+
log.Fatal(err)
55+
}
56+
return *key
57+
}
58+
bobSECP256R1PublicKey = func() PublicKey {
59+
k, err := PublicKeyFromBytes(bobSECP256R1PublicKeyBytes)
60+
if err != nil {
61+
log.Fatal(err)
62+
}
63+
64+
return *k.(*PublicKey)
65+
}()
66+
bobSECP256R1PublicKeyBytes = encodingtest.MustDecodeHex("032da43f4b992968e53c68c894933e8ba22a7905bf9cdc903fd96d4f38ff49e115")
67+
)
68+
69+
var (
70+
carlosSECP256R1PrivateKey = func() PrivateKey {
71+
k, err := PrivateKeyFromBytes(carlosSECP256R1PrivateKeyBytes)
72+
if err != nil {
73+
log.Fatal(err)
74+
}
75+
return *k
76+
}() //nolint: lll
77+
78+
carlosSECP256R1PrivateKeyBytes = encodingtest.MustDecodeHex("7198ec54092518b49b2c66468a058f1fdbf0fdf0b1e281a027c692bb0ee1d1ed")
79+
carlosSECP256R1PrivateECDSA = func() ecdsa.PrivateKey {
80+
key, err := toECDSA(carlosSECP256R1PrivateKeyBytes)
81+
if err != nil {
82+
log.Fatal(err)
83+
}
84+
return *key
85+
}
86+
carlosSECP256R1PublicKey = func() PublicKey {
87+
k, err := PublicKeyFromBytes(carlosSECP256R1PublicKeyBytes)
88+
if err != nil {
89+
log.Fatal(err)
90+
}
91+
92+
return *k.(*PublicKey)
93+
}()
94+
carlosSECP256R1PublicKeyBytes = encodingtest.MustDecodeHex("02c48a6a32004a6ec31b78c05c9ea9d6bee0904f7f7a13f384c6f2a25c86fcb0e6")
95+
)

secp256r1/private.go

+110
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
package secp256r1
2+
3+
import (
4+
"crypto/ecdsa"
5+
"crypto/elliptic"
6+
"crypto/rand"
7+
"fmt"
8+
"io"
9+
"math/big"
10+
11+
ethcrypto "github.com/ethereum/go-ethereum/crypto"
12+
"github.com/mailchain/go-crypto"
13+
)
14+
15+
// PrivateKey based on the p256 curve
16+
type PrivateKey struct {
17+
key ecdsa.PrivateKey
18+
rand io.Reader
19+
}
20+
21+
// Bytes returns the byte representation of the private key
22+
func (pk PrivateKey) Bytes() []byte {
23+
return ethcrypto.FromECDSA(&pk.key)
24+
}
25+
26+
// Sign signs the message with the private key and returns the signature.
27+
func (pk PrivateKey) Sign(message []byte) (signature []byte, err error) {
28+
r, s, err := ecdsa.Sign(pk.rand, &pk.key, message)
29+
if err != nil {
30+
return nil, err
31+
}
32+
33+
// normalize
34+
r, s = ecNormalizeSignature(r, s, pk.key.Curve)
35+
// serialize
36+
buf := make([]byte, 64)
37+
r.FillBytes(buf[:32])
38+
s.FillBytes(buf[32:])
39+
return buf, nil
40+
}
41+
42+
// PublicKey return the public key that is derived from the private key
43+
func (pk PrivateKey) PublicKey() crypto.PublicKey {
44+
return &PublicKey{Key: pk.key.PublicKey}
45+
}
46+
47+
// PrivateKeyFromBytes get a private key from seed []byte
48+
func PrivateKeyFromBytes(privKey []byte) (*PrivateKey, error) {
49+
ecdsaPrivateKey, err := toECDSA(privKey)
50+
if err != nil {
51+
return nil, err
52+
}
53+
54+
return &PrivateKey{key: *ecdsaPrivateKey, rand: rand.Reader}, nil
55+
}
56+
57+
func GenerateKey(rand io.Reader) (*PrivateKey, error) {
58+
key, err := ecdsa.GenerateKey(elliptic.P256(), rand)
59+
if err != nil {
60+
return nil, err
61+
}
62+
return &PrivateKey{key: *key, rand: rand}, nil
63+
}
64+
65+
// ecNormalizeSignature ensures strict compliance with the EC spec by returning
66+
// S mod n for the appropriate keys curve.
67+
//
68+
// Details:
69+
//
70+
// Step #6 of the ECDSA algorithm [x] defines an `S` value mod n[0],
71+
// but most signers (OpenSSL, SoftHSM, YubiHSM) don't return a strict modulo.
72+
// This variability was exploited with transaction malleability in Bitcoin,
73+
// leading to BIP#62. BIP#62 Rule #5[1] requires that signatures return a
74+
// strict S = ... mod n which this function forces implemented in btcd here [2]
75+
// [0]: https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm
76+
// [1]: https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki#new-rules
77+
// [2]: https://github.com/btcsuite/btcd/blob/master/btcec/signature.go#L49
78+
//
79+
// See also Ecadlabs Signatory:
80+
// https://github.com/ecadlabs/signatory/blob/f57871c2300cb5a53236ea5fcb4f203012b4fe41/pkg/cryptoutils/crypto.go#L17
81+
func ecNormalizeSignature(r, s *big.Int, c elliptic.Curve) (*big.Int, *big.Int) {
82+
r = new(big.Int).Set(r)
83+
s = new(big.Int).Set(s)
84+
85+
order := c.Params().N
86+
quo := new(big.Int).Quo(order, new(big.Int).SetInt64(2))
87+
if s.Cmp(quo) > 0 {
88+
s = s.Sub(order, s)
89+
}
90+
return r, s
91+
}
92+
93+
func toECDSA(pkBytes []byte) (*ecdsa.PrivateKey, error) {
94+
k := new(big.Int).SetBytes(pkBytes)
95+
curveOrder := elliptic.P256().Params().N
96+
if k.Cmp(curveOrder) >= 0 {
97+
return nil, fmt.Errorf("invalid private key for curve Nist P256")
98+
}
99+
100+
priv := ecdsa.PrivateKey{
101+
PublicKey: ecdsa.PublicKey{
102+
Curve: elliptic.P256(),
103+
},
104+
D: k,
105+
}
106+
107+
// https://cs.opensource.google/go/go/+/refs/tags/go1.17.5:src/crypto/ecdsa/ecdsa.go;l=149
108+
priv.PublicKey.X, priv.PublicKey.Y = elliptic.P256().ScalarBaseMult(k.Bytes())
109+
return &priv, nil
110+
}

0 commit comments

Comments
 (0)