mirror of
https://github.com/kvazar-network/kevacoin.git
synced 2025-02-06 12:14:14 +00:00
Merge pull request #4312
fda3fed libsecp256k1 integration (Pieter Wuille) 5566826 secp256k1: Add build-side changes for libsecp256k1 (Cory Fields) b150b09 secp256k1: add libtool as a dependency (Cory Fields)
This commit is contained in:
commit
c9600ce640
@ -35,6 +35,7 @@ COVERAGE_INFO = baseline_filtered_combined.info baseline.info block_test.info \
|
|||||||
|
|
||||||
dist-hook:
|
dist-hook:
|
||||||
-$(MAKE) -C $(top_distdir)/src/leveldb clean
|
-$(MAKE) -C $(top_distdir)/src/leveldb clean
|
||||||
|
-$(MAKE) -C $(top_distdir)/src/secp256k1 distclean
|
||||||
-$(GIT) archive --format=tar HEAD -- src/version.cpp | $(AMTAR) -C $(top_distdir) -xf -
|
-$(GIT) archive --format=tar HEAD -- src/version.cpp | $(AMTAR) -C $(top_distdir) -xf -
|
||||||
|
|
||||||
distcheck-hook:
|
distcheck-hook:
|
||||||
|
@ -2,4 +2,7 @@
|
|||||||
set -e
|
set -e
|
||||||
srcdir="$(dirname $0)"
|
srcdir="$(dirname $0)"
|
||||||
cd "$srcdir"
|
cd "$srcdir"
|
||||||
|
if [ -z ${LIBTOOLIZE} ] && GLIBTOOLIZE="`which glibtoolize 2>/dev/null`"; then
|
||||||
|
export LIBTOOLIZE="${GLIBTOOLIZE}"
|
||||||
|
fi
|
||||||
autoreconf --install --force
|
autoreconf --install --force
|
||||||
|
@ -9,6 +9,7 @@ define(_COPYRIGHT_YEAR, 2014)
|
|||||||
AC_INIT([Bitcoin Core],[_CLIENT_VERSION_MAJOR._CLIENT_VERSION_MINOR._CLIENT_VERSION_REVISION],[info@bitcoin.org],[bitcoin])
|
AC_INIT([Bitcoin Core],[_CLIENT_VERSION_MAJOR._CLIENT_VERSION_MINOR._CLIENT_VERSION_REVISION],[info@bitcoin.org],[bitcoin])
|
||||||
AC_CONFIG_AUX_DIR([src/build-aux])
|
AC_CONFIG_AUX_DIR([src/build-aux])
|
||||||
AC_CONFIG_MACRO_DIR([src/m4])
|
AC_CONFIG_MACRO_DIR([src/m4])
|
||||||
|
LT_INIT([disable-shared])
|
||||||
AC_CANONICAL_HOST
|
AC_CANONICAL_HOST
|
||||||
AH_TOP([#ifndef BITCOIN_CONFIG_H])
|
AH_TOP([#ifndef BITCOIN_CONFIG_H])
|
||||||
AH_TOP([#define BITCOIN_CONFIG_H])
|
AH_TOP([#define BITCOIN_CONFIG_H])
|
||||||
@ -679,6 +680,7 @@ AM_CONDITIONAL([USE_LCOV],[test x$use_lcov == xyes])
|
|||||||
AM_CONDITIONAL([USE_COMPARISON_TOOL],[test x$use_comparison_tool != xno])
|
AM_CONDITIONAL([USE_COMPARISON_TOOL],[test x$use_comparison_tool != xno])
|
||||||
AM_CONDITIONAL([USE_COMPARISON_TOOL_REORG_TESTS],[test x$use_comparison_tool_reorg_test != xno])
|
AM_CONDITIONAL([USE_COMPARISON_TOOL_REORG_TESTS],[test x$use_comparison_tool_reorg_test != xno])
|
||||||
AM_CONDITIONAL([GLIBC_BACK_COMPAT],[test x$use_glibc_compat = xyes])
|
AM_CONDITIONAL([GLIBC_BACK_COMPAT],[test x$use_glibc_compat = xyes])
|
||||||
|
AM_CONDITIONAL([USE_LIBSECP256K1],[test x$use_libsecp256k1 = xyes])
|
||||||
|
|
||||||
AC_DEFINE(CLIENT_VERSION_MAJOR, _CLIENT_VERSION_MAJOR, [Major version])
|
AC_DEFINE(CLIENT_VERSION_MAJOR, _CLIENT_VERSION_MAJOR, [Major version])
|
||||||
AC_DEFINE(CLIENT_VERSION_MINOR, _CLIENT_VERSION_MINOR, [Minor version])
|
AC_DEFINE(CLIENT_VERSION_MINOR, _CLIENT_VERSION_MINOR, [Minor version])
|
||||||
|
@ -6,6 +6,7 @@ Uploaders: Micah Anderson <micah@debian.org>
|
|||||||
Build-Depends: debhelper,
|
Build-Depends: debhelper,
|
||||||
devscripts,
|
devscripts,
|
||||||
automake,
|
automake,
|
||||||
|
libtool,
|
||||||
bash-completion,
|
bash-completion,
|
||||||
libboost-system-dev (>> 1.35) | libboost-system1.35-dev,
|
libboost-system-dev (>> 1.35) | libboost-system1.35-dev,
|
||||||
libdb4.8++-dev,
|
libdb4.8++-dev,
|
||||||
|
@ -11,6 +11,7 @@ packages:
|
|||||||
- "bsdmainutils"
|
- "bsdmainutils"
|
||||||
- "pkg-config"
|
- "pkg-config"
|
||||||
- "p7zip-full"
|
- "p7zip-full"
|
||||||
|
- "libtool"
|
||||||
|
|
||||||
reference_datetime: "2013-06-01 00:00:00"
|
reference_datetime: "2013-06-01 00:00:00"
|
||||||
remotes:
|
remotes:
|
||||||
|
@ -41,7 +41,7 @@ Instructions: MacPorts
|
|||||||
|
|
||||||
### Install dependencies
|
### Install dependencies
|
||||||
|
|
||||||
sudo port install boost db48@+no_java openssl miniupnpc autoconf pkgconfig automake
|
sudo port install boost db48@+no_java openssl miniupnpc autoconf pkgconfig automake libtool
|
||||||
|
|
||||||
Optional: install Qt4
|
Optional: install Qt4
|
||||||
|
|
||||||
@ -69,7 +69,7 @@ Instructions: Homebrew
|
|||||||
|
|
||||||
#### Install dependencies using Homebrew
|
#### Install dependencies using Homebrew
|
||||||
|
|
||||||
brew install autoconf automake berkeley-db4 boost miniupnpc openssl pkg-config protobuf qt
|
brew install autoconf automake libtool berkeley-db4 boost miniupnpc openssl pkg-config protobuf qt
|
||||||
|
|
||||||
Note: After you have installed the dependencies, you should check that the Homebrew installed version of OpenSSL is the one available for compilation. You can check this by typing
|
Note: After you have installed the dependencies, you should check that the Homebrew installed version of OpenSSL is the one available for compilation. You can check this by typing
|
||||||
|
|
||||||
|
@ -1,6 +1,10 @@
|
|||||||
AM_CPPFLAGS = $(INCLUDES)
|
AM_CPPFLAGS = $(INCLUDES)
|
||||||
AM_LDFLAGS = $(PTHREAD_CFLAGS)
|
AM_LDFLAGS = $(PTHREAD_CFLAGS)
|
||||||
|
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
secp256k1/libsecp256k1.la: $(wildcard secp256k1/src/*) $(wildcard secp256k1/include/*)
|
||||||
|
@$(MAKE) $(AM_MAKEFLAGS) -C $(@D) $(@F)
|
||||||
|
endif
|
||||||
|
|
||||||
if EMBEDDED_LEVELDB
|
if EMBEDDED_LEVELDB
|
||||||
LEVELDB_CPPFLAGS += -I$(srcdir)/leveldb/include
|
LEVELDB_CPPFLAGS += -I$(srcdir)/leveldb/include
|
||||||
@ -20,6 +24,10 @@ endif
|
|||||||
BITCOIN_CONFIG_INCLUDES=-I$(builddir)/config
|
BITCOIN_CONFIG_INCLUDES=-I$(builddir)/config
|
||||||
BITCOIN_INCLUDES=-I$(builddir) -I$(builddir)/obj $(BOOST_CPPFLAGS) $(LEVELDB_CPPFLAGS)
|
BITCOIN_INCLUDES=-I$(builddir) -I$(builddir)/obj $(BOOST_CPPFLAGS) $(LEVELDB_CPPFLAGS)
|
||||||
|
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
BITCOIN_INCLUDES += -I$(srcdir)/secp256k1/include
|
||||||
|
endif
|
||||||
|
|
||||||
LIBBITCOIN_SERVER=libbitcoin_server.a
|
LIBBITCOIN_SERVER=libbitcoin_server.a
|
||||||
LIBBITCOIN_WALLET=libbitcoin_wallet.a
|
LIBBITCOIN_WALLET=libbitcoin_wallet.a
|
||||||
LIBBITCOIN_COMMON=libbitcoin_common.a
|
LIBBITCOIN_COMMON=libbitcoin_common.a
|
||||||
@ -220,6 +228,11 @@ bitcoind_LDADD = \
|
|||||||
$(LIBBITCOIN_CRYPTO) \
|
$(LIBBITCOIN_CRYPTO) \
|
||||||
$(LIBLEVELDB) \
|
$(LIBLEVELDB) \
|
||||||
$(LIBMEMENV)
|
$(LIBMEMENV)
|
||||||
|
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
bitcoind_LDADD += secp256k1/libsecp256k1.la
|
||||||
|
endif
|
||||||
|
|
||||||
if ENABLE_WALLET
|
if ENABLE_WALLET
|
||||||
bitcoind_LDADD += libbitcoin_wallet.a
|
bitcoind_LDADD += libbitcoin_wallet.a
|
||||||
endif
|
endif
|
||||||
@ -242,6 +255,10 @@ bitcoin_cli_LDADD = \
|
|||||||
$(BOOST_LIBS)
|
$(BOOST_LIBS)
|
||||||
bitcoin_cli_SOURCES = \
|
bitcoin_cli_SOURCES = \
|
||||||
bitcoin-cli.cpp
|
bitcoin-cli.cpp
|
||||||
|
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
bitcoin_cli_LDADD += secp256k1/libsecp256k1.la
|
||||||
|
endif
|
||||||
bitcoin_cli_CPPFLAGS = $(BITCOIN_INCLUDES)
|
bitcoin_cli_CPPFLAGS = $(BITCOIN_INCLUDES)
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -253,10 +270,11 @@ CLEANFILES = leveldb/libleveldb.a leveldb/libmemenv.a *.gcda *.gcno
|
|||||||
|
|
||||||
DISTCLEANFILES = obj/build.h
|
DISTCLEANFILES = obj/build.h
|
||||||
|
|
||||||
EXTRA_DIST = leveldb
|
EXTRA_DIST = leveldb secp256k1
|
||||||
|
|
||||||
clean-local:
|
clean-local:
|
||||||
-$(MAKE) -C leveldb clean
|
-$(MAKE) -C leveldb clean
|
||||||
|
-$(MAKE) -C secp256k1 clean
|
||||||
rm -f leveldb/*/*.gcno leveldb/helpers/memenv/*.gcno
|
rm -f leveldb/*/*.gcno leveldb/helpers/memenv/*.gcno
|
||||||
-rm -f config.h
|
-rm -f config.h
|
||||||
|
|
||||||
|
@ -357,6 +357,9 @@ qt_bitcoin_qt_LDADD += $(LIBBITCOIN_WALLET)
|
|||||||
endif
|
endif
|
||||||
qt_bitcoin_qt_LDADD += $(LIBBITCOIN_CLI) $(LIBBITCOIN_COMMON) $(LIBBITCOIN_UTIL) $(LIBBITCOIN_CRYPTO) $(LIBLEVELDB) $(LIBMEMENV) \
|
qt_bitcoin_qt_LDADD += $(LIBBITCOIN_CLI) $(LIBBITCOIN_COMMON) $(LIBBITCOIN_UTIL) $(LIBBITCOIN_CRYPTO) $(LIBLEVELDB) $(LIBMEMENV) \
|
||||||
$(BOOST_LIBS) $(QT_LIBS) $(QT_DBUS_LIBS) $(QR_LIBS) $(PROTOBUF_LIBS) $(BDB_LIBS)
|
$(BOOST_LIBS) $(QT_LIBS) $(QT_DBUS_LIBS) $(QR_LIBS) $(PROTOBUF_LIBS) $(BDB_LIBS)
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
qt_bitcoin_qt_LDADD += secp256k1/libsecp256k1.la
|
||||||
|
endif
|
||||||
qt_bitcoin_qt_LDFLAGS = $(QT_LDFLAGS)
|
qt_bitcoin_qt_LDFLAGS = $(QT_LDFLAGS)
|
||||||
|
|
||||||
#locale/foo.ts -> locale/foo.qm
|
#locale/foo.ts -> locale/foo.qm
|
||||||
|
@ -33,6 +33,9 @@ endif
|
|||||||
qt_test_test_bitcoin_qt_LDADD += $(LIBBITCOIN_CLI) $(LIBBITCOIN_COMMON) $(LIBBITCOIN_UTIL) $(LIBBITCOIN_CRYPTO) $(LIBLEVELDB) \
|
qt_test_test_bitcoin_qt_LDADD += $(LIBBITCOIN_CLI) $(LIBBITCOIN_COMMON) $(LIBBITCOIN_UTIL) $(LIBBITCOIN_CRYPTO) $(LIBLEVELDB) \
|
||||||
$(LIBMEMENV) $(BOOST_LIBS) $(QT_DBUS_LIBS) $(QT_TEST_LIBS) $(QT_LIBS) \
|
$(LIBMEMENV) $(BOOST_LIBS) $(QT_DBUS_LIBS) $(QT_TEST_LIBS) $(QT_LIBS) \
|
||||||
$(QR_LIBS) $(PROTOBUF_LIBS) $(BDB_LIBS)
|
$(QR_LIBS) $(PROTOBUF_LIBS) $(BDB_LIBS)
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
qt_test_test_bitcoin_qt_LDADD += secp256k1/libsecp256k1.la
|
||||||
|
endif
|
||||||
qt_test_test_bitcoin_qt_LDFLAGS = $(QT_LDFLAGS)
|
qt_test_test_bitcoin_qt_LDFLAGS = $(QT_LDFLAGS)
|
||||||
|
|
||||||
CLEAN_BITCOIN_QT_TEST = $(TEST_QT_MOC_CPP) qt/test/*.gcda qt/test/*.gcno
|
CLEAN_BITCOIN_QT_TEST = $(TEST_QT_MOC_CPP) qt/test/*.gcda qt/test/*.gcno
|
||||||
|
@ -69,6 +69,11 @@ test_test_bitcoin_LDADD = $(LIBBITCOIN_SERVER) $(LIBBITCOIN_CLI) $(LIBBITCOIN_CO
|
|||||||
if ENABLE_WALLET
|
if ENABLE_WALLET
|
||||||
test_test_bitcoin_LDADD += $(LIBBITCOIN_WALLET)
|
test_test_bitcoin_LDADD += $(LIBBITCOIN_WALLET)
|
||||||
endif
|
endif
|
||||||
|
|
||||||
|
if USE_LIBSECP256K1
|
||||||
|
test_test_bitcoin_LDADD += secp256k1/libsecp256k1.la
|
||||||
|
endif
|
||||||
|
|
||||||
test_test_bitcoin_LDADD += $(BDB_LIBS)
|
test_test_bitcoin_LDADD += $(BDB_LIBS)
|
||||||
|
|
||||||
nodist_test_test_bitcoin_SOURCES = $(GENERATED_TEST_FILES)
|
nodist_test_test_bitcoin_SOURCES = $(GENERATED_TEST_FILES)
|
||||||
|
132
src/key.cpp
132
src/key.cpp
@ -5,15 +5,34 @@
|
|||||||
#include "key.h"
|
#include "key.h"
|
||||||
|
|
||||||
#include "crypto/sha2.h"
|
#include "crypto/sha2.h"
|
||||||
|
#include <openssl/rand.h>
|
||||||
|
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
#include <secp256k1.h>
|
||||||
|
#else
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
#include <openssl/ecdsa.h>
|
#include <openssl/ecdsa.h>
|
||||||
#include <openssl/obj_mac.h>
|
#include <openssl/obj_mac.h>
|
||||||
#include <openssl/rand.h>
|
#endif
|
||||||
|
|
||||||
// anonymous namespace with local implementation code (OpenSSL interaction)
|
// anonymous namespace with local implementation code (OpenSSL interaction)
|
||||||
namespace {
|
namespace {
|
||||||
|
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
#include <secp256k1.h>
|
||||||
|
class CSecp256k1Init {
|
||||||
|
public:
|
||||||
|
CSecp256k1Init() {
|
||||||
|
secp256k1_start();
|
||||||
|
}
|
||||||
|
~CSecp256k1Init() {
|
||||||
|
secp256k1_stop();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
static CSecp256k1Init instance_of_csecp256k1;
|
||||||
|
|
||||||
|
#else
|
||||||
|
|
||||||
// Generate a private key from just the secret parameter
|
// Generate a private key from just the secret parameter
|
||||||
int EC_KEY_regenerate_key(EC_KEY *eckey, BIGNUM *priv_key)
|
int EC_KEY_regenerate_key(EC_KEY *eckey, BIGNUM *priv_key)
|
||||||
{
|
{
|
||||||
@ -334,6 +353,8 @@ public:
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
int CompareBigEndian(const unsigned char *c1, size_t c1len, const unsigned char *c2, size_t c2len) {
|
int CompareBigEndian(const unsigned char *c1, size_t c1len, const unsigned char *c2, size_t c2len) {
|
||||||
while (c1len > c2len) {
|
while (c1len > c2len) {
|
||||||
if (*c1)
|
if (*c1)
|
||||||
@ -398,10 +419,15 @@ void CKey::MakeNewKey(bool fCompressedIn) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
bool CKey::SetPrivKey(const CPrivKey &privkey, bool fCompressedIn) {
|
bool CKey::SetPrivKey(const CPrivKey &privkey, bool fCompressedIn) {
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
if (!secp256k1_ecdsa_privkey_import((unsigned char*)begin(), &privkey[0], privkey.size()))
|
||||||
|
return false;
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
if (!key.SetPrivKey(privkey))
|
if (!key.SetPrivKey(privkey))
|
||||||
return false;
|
return false;
|
||||||
key.GetSecretBytes(vch);
|
key.GetSecretBytes(vch);
|
||||||
|
#endif
|
||||||
fCompressed = fCompressedIn;
|
fCompressed = fCompressedIn;
|
||||||
fValid = true;
|
fValid = true;
|
||||||
return true;
|
return true;
|
||||||
@ -409,99 +435,167 @@ bool CKey::SetPrivKey(const CPrivKey &privkey, bool fCompressedIn) {
|
|||||||
|
|
||||||
CPrivKey CKey::GetPrivKey() const {
|
CPrivKey CKey::GetPrivKey() const {
|
||||||
assert(fValid);
|
assert(fValid);
|
||||||
|
CPrivKey privkey;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
privkey.resize(279);
|
||||||
|
int privkeylen = 279;
|
||||||
|
int ret = secp256k1_ecdsa_privkey_export(begin(), (unsigned char*)&privkey[0], &privkeylen, fCompressed);
|
||||||
|
assert(ret);
|
||||||
|
privkey.resize(privkeylen);
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
key.SetSecretBytes(vch);
|
key.SetSecretBytes(vch);
|
||||||
CPrivKey privkey;
|
|
||||||
key.GetPrivKey(privkey, fCompressed);
|
key.GetPrivKey(privkey, fCompressed);
|
||||||
|
#endif
|
||||||
return privkey;
|
return privkey;
|
||||||
}
|
}
|
||||||
|
|
||||||
CPubKey CKey::GetPubKey() const {
|
CPubKey CKey::GetPubKey() const {
|
||||||
assert(fValid);
|
assert(fValid);
|
||||||
|
CPubKey pubkey;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
int clen = 65;
|
||||||
|
int ret = secp256k1_ecdsa_pubkey_create((unsigned char*)pubkey.begin(), &clen, begin(), fCompressed);
|
||||||
|
assert(ret);
|
||||||
|
assert(pubkey.IsValid());
|
||||||
|
assert((int)pubkey.size() == clen);
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
key.SetSecretBytes(vch);
|
key.SetSecretBytes(vch);
|
||||||
CPubKey pubkey;
|
|
||||||
key.GetPubKey(pubkey, fCompressed);
|
key.GetPubKey(pubkey, fCompressed);
|
||||||
|
#endif
|
||||||
return pubkey;
|
return pubkey;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CKey::Sign(const uint256 &hash, std::vector<unsigned char>& vchSig) const {
|
bool CKey::Sign(const uint256 &hash, std::vector<unsigned char>& vchSig) const {
|
||||||
if (!fValid)
|
if (!fValid)
|
||||||
return false;
|
return false;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
vchSig.resize(72);
|
||||||
|
int nSigLen = 72;
|
||||||
|
CKey nonce;
|
||||||
|
do {
|
||||||
|
nonce.MakeNewKey(true);
|
||||||
|
if (secp256k1_ecdsa_sign((const unsigned char*)&hash, 32, (unsigned char*)&vchSig[0], &nSigLen, begin(), nonce.begin()))
|
||||||
|
break;
|
||||||
|
} while(true);
|
||||||
|
vchSig.resize(nSigLen);
|
||||||
|
return true;
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
key.SetSecretBytes(vch);
|
key.SetSecretBytes(vch);
|
||||||
return key.Sign(hash, vchSig);
|
return key.Sign(hash, vchSig);
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CKey::SignCompact(const uint256 &hash, std::vector<unsigned char>& vchSig) const {
|
bool CKey::SignCompact(const uint256 &hash, std::vector<unsigned char>& vchSig) const {
|
||||||
if (!fValid)
|
if (!fValid)
|
||||||
return false;
|
return false;
|
||||||
CECKey key;
|
|
||||||
key.SetSecretBytes(vch);
|
|
||||||
vchSig.resize(65);
|
vchSig.resize(65);
|
||||||
int rec = -1;
|
int rec = -1;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
CKey nonce;
|
||||||
|
do {
|
||||||
|
nonce.MakeNewKey(true);
|
||||||
|
if (secp256k1_ecdsa_sign_compact((const unsigned char*)&hash, 32, &vchSig[1], begin(), nonce.begin(), &rec))
|
||||||
|
break;
|
||||||
|
} while(true);
|
||||||
|
#else
|
||||||
|
CECKey key;
|
||||||
|
key.SetSecretBytes(vch);
|
||||||
if (!key.SignCompact(hash, &vchSig[1], rec))
|
if (!key.SignCompact(hash, &vchSig[1], rec))
|
||||||
return false;
|
return false;
|
||||||
|
#endif
|
||||||
assert(rec != -1);
|
assert(rec != -1);
|
||||||
vchSig[0] = 27 + rec + (fCompressed ? 4 : 0);
|
vchSig[0] = 27 + rec + (fCompressed ? 4 : 0);
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CKey::Load(CPrivKey &privkey, CPubKey &vchPubKey, bool fSkipCheck=false) {
|
bool CKey::Load(CPrivKey &privkey, CPubKey &vchPubKey, bool fSkipCheck=false) {
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
if (!secp256k1_ecdsa_privkey_import((unsigned char*)begin(), &privkey[0], privkey.size()))
|
||||||
|
return false;
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
if (!key.SetPrivKey(privkey, fSkipCheck))
|
if (!key.SetPrivKey(privkey, fSkipCheck))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
key.GetSecretBytes(vch);
|
key.GetSecretBytes(vch);
|
||||||
|
#endif
|
||||||
fCompressed = vchPubKey.IsCompressed();
|
fCompressed = vchPubKey.IsCompressed();
|
||||||
fValid = true;
|
fValid = true;
|
||||||
|
|
||||||
if (fSkipCheck)
|
if (fSkipCheck)
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
if (GetPubKey() != vchPubKey)
|
if (GetPubKey() != vchPubKey)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CPubKey::Verify(const uint256 &hash, const std::vector<unsigned char>& vchSig) const {
|
bool CPubKey::Verify(const uint256 &hash, const std::vector<unsigned char>& vchSig) const {
|
||||||
if (!IsValid())
|
if (!IsValid())
|
||||||
return false;
|
return false;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
if (secp256k1_ecdsa_verify((const unsigned char*)&hash, 32, &vchSig[0], vchSig.size(), begin(), size()) != 1)
|
||||||
|
return false;
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
if (!key.SetPubKey(*this))
|
if (!key.SetPubKey(*this))
|
||||||
return false;
|
return false;
|
||||||
if (!key.Verify(hash, vchSig))
|
if (!key.Verify(hash, vchSig))
|
||||||
return false;
|
return false;
|
||||||
|
#endif
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CPubKey::RecoverCompact(const uint256 &hash, const std::vector<unsigned char>& vchSig) {
|
bool CPubKey::RecoverCompact(const uint256 &hash, const std::vector<unsigned char>& vchSig) {
|
||||||
if (vchSig.size() != 65)
|
if (vchSig.size() != 65)
|
||||||
return false;
|
return false;
|
||||||
CECKey key;
|
int recid = (vchSig[0] - 27) & 3;
|
||||||
if (!key.Recover(hash, &vchSig[1], (vchSig[0] - 27) & ~4))
|
bool fComp = (vchSig[0] - 27) & 4;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
int pubkeylen = 65;
|
||||||
|
if (!secp256k1_ecdsa_recover_compact((const unsigned char*)&hash, 32, &vchSig[1], (unsigned char*)begin(), &pubkeylen, fComp, recid))
|
||||||
return false;
|
return false;
|
||||||
key.GetPubKey(*this, (vchSig[0] - 27) & 4);
|
assert((int)size() == pubkeylen);
|
||||||
|
#else
|
||||||
|
CECKey key;
|
||||||
|
if (!key.Recover(hash, &vchSig[1], recid))
|
||||||
|
return false;
|
||||||
|
key.GetPubKey(*this, fComp);
|
||||||
|
#endif
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CPubKey::IsFullyValid() const {
|
bool CPubKey::IsFullyValid() const {
|
||||||
if (!IsValid())
|
if (!IsValid())
|
||||||
return false;
|
return false;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
if (!secp256k1_ecdsa_pubkey_verify(begin(), size()))
|
||||||
|
return false;
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
if (!key.SetPubKey(*this))
|
if (!key.SetPubKey(*this))
|
||||||
return false;
|
return false;
|
||||||
|
#endif
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool CPubKey::Decompress() {
|
bool CPubKey::Decompress() {
|
||||||
if (!IsValid())
|
if (!IsValid())
|
||||||
return false;
|
return false;
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
int clen = size();
|
||||||
|
int ret = secp256k1_ecdsa_pubkey_decompress((unsigned char*)begin(), &clen);
|
||||||
|
assert(ret);
|
||||||
|
assert(clen == (int)size());
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
if (!key.SetPubKey(*this))
|
if (!key.SetPubKey(*this))
|
||||||
return false;
|
return false;
|
||||||
key.GetPubKey(*this, false);
|
key.GetPubKey(*this, false);
|
||||||
|
#endif
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -531,7 +625,12 @@ bool CKey::Derive(CKey& keyChild, unsigned char ccChild[32], unsigned int nChild
|
|||||||
BIP32Hash(cc, nChild, 0, begin(), out);
|
BIP32Hash(cc, nChild, 0, begin(), out);
|
||||||
}
|
}
|
||||||
memcpy(ccChild, out+32, 32);
|
memcpy(ccChild, out+32, 32);
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
memcpy((unsigned char*)keyChild.begin(), begin(), 32);
|
||||||
|
bool ret = secp256k1_ecdsa_privkey_tweak_add((unsigned char*)keyChild.begin(), out);
|
||||||
|
#else
|
||||||
bool ret = CECKey::TweakSecret((unsigned char*)keyChild.begin(), begin(), out);
|
bool ret = CECKey::TweakSecret((unsigned char*)keyChild.begin(), begin(), out);
|
||||||
|
#endif
|
||||||
UnlockObject(out);
|
UnlockObject(out);
|
||||||
keyChild.fCompressed = true;
|
keyChild.fCompressed = true;
|
||||||
keyChild.fValid = ret;
|
keyChild.fValid = ret;
|
||||||
@ -545,10 +644,15 @@ bool CPubKey::Derive(CPubKey& pubkeyChild, unsigned char ccChild[32], unsigned i
|
|||||||
unsigned char out[64];
|
unsigned char out[64];
|
||||||
BIP32Hash(cc, nChild, *begin(), begin()+1, out);
|
BIP32Hash(cc, nChild, *begin(), begin()+1, out);
|
||||||
memcpy(ccChild, out+32, 32);
|
memcpy(ccChild, out+32, 32);
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
pubkeyChild = *this;
|
||||||
|
bool ret = secp256k1_ecdsa_pubkey_tweak_add((unsigned char*)pubkeyChild.begin(), pubkeyChild.size(), out);
|
||||||
|
#else
|
||||||
CECKey key;
|
CECKey key;
|
||||||
bool ret = key.SetPubKey(*this);
|
bool ret = key.SetPubKey(*this);
|
||||||
ret &= key.TweakPublic(out);
|
ret &= key.TweakPublic(out);
|
||||||
key.GetPubKey(pubkeyChild, true);
|
key.GetPubKey(pubkeyChild, true);
|
||||||
|
#endif
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -629,6 +733,9 @@ bool CExtPubKey::Derive(CExtPubKey &out, unsigned int nChild) const {
|
|||||||
}
|
}
|
||||||
|
|
||||||
bool ECC_InitSanityCheck() {
|
bool ECC_InitSanityCheck() {
|
||||||
|
#ifdef USE_SECP256K1
|
||||||
|
return true;
|
||||||
|
#else
|
||||||
EC_KEY *pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
|
EC_KEY *pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
|
||||||
if(pkey == NULL)
|
if(pkey == NULL)
|
||||||
return false;
|
return false;
|
||||||
@ -636,6 +743,7 @@ bool ECC_InitSanityCheck() {
|
|||||||
|
|
||||||
// TODO Is there more EC functionality that could be missing?
|
// TODO Is there more EC functionality that could be missing?
|
||||||
return true;
|
return true;
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
0
src/secp256k1/.empty
Normal file
0
src/secp256k1/.empty
Normal file
Loading…
x
Reference in New Issue
Block a user