rust-bitcoin-unsafe-fast/src/util/privkey.rs

205 lines
6.2 KiB
Rust
Raw Normal View History

2018-03-14 03:53:03 +00:00
// Rust Bitcoin Library
// Written in 2014 by
// Andrew Poelstra <apoelstra@wpsoftware.net>
// To the extent possible under law, the author(s) have dedicated all
// copyright and related and neighboring rights to this software to
// the public domain worldwide. This software is distributed without
// any warranty.
//
// You should have received a copy of the CC0 Public Domain Dedication
// along with this software.
// If not, see <http://creativecommons.org/publicdomain/zero/1.0/>.
//
//! Private key
//!
//! A private key represents the secret data associated with its proposed use
2018-03-14 03:53:03 +00:00
//!
2018-10-10 10:12:33 +00:00
use std::fmt::{self, Write};
2018-03-14 03:53:03 +00:00
use std::str::FromStr;
2018-07-27 20:15:48 +00:00
use secp256k1::{self, Secp256k1};
2018-03-14 03:53:03 +00:00
use secp256k1::key::{PublicKey, SecretKey};
use util::address::Address;
use consensus::encode;
2018-03-14 03:53:03 +00:00
use network::constants::Network;
use util::base58;
#[derive(Clone, PartialEq, Eq)]
/// A Bitcoin ECDSA private key
pub struct Privkey {
/// Whether this private key represents a compressed address
pub compressed: bool,
/// The network on which this key should be used
pub network: Network,
/// The actual ECDSA key
pub key: SecretKey
}
impl Privkey {
2018-08-09 22:41:48 +00:00
/// Creates a `Privkey` from a raw secp256k1 secret key
2018-03-14 03:53:03 +00:00
#[inline]
pub fn from_secret_key(key: SecretKey, compressed: bool, network: Network) -> Privkey {
Privkey {
compressed: compressed,
network: network,
key: key,
}
2018-03-14 03:53:03 +00:00
}
/// Computes the public key as supposed to be used with this secret
2018-07-27 20:15:48 +00:00
pub fn public_key<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> PublicKey {
PublicKey::from_secret_key(secp, &self.key)
2018-03-14 03:53:03 +00:00
}
/// Converts a private key to a segwit address
#[inline]
2018-07-27 20:15:48 +00:00
pub fn to_address<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> Address {
Address::p2wpkh(&self.public_key(secp), self.network)
2018-03-14 03:53:03 +00:00
}
/// Converts a private key to a legacy (non-segwit) address
#[inline]
2018-07-27 20:15:48 +00:00
pub fn to_legacy_address<C: secp256k1::Signing>(&self, secp: &Secp256k1<C>) -> Address {
2018-03-14 03:53:03 +00:00
if self.compressed {
2018-07-27 20:15:48 +00:00
Address::p2pkh(&self.public_key(secp), self.network)
2018-03-14 03:53:03 +00:00
}
else {
2018-07-27 20:15:48 +00:00
Address::p2upkh(&self.public_key(secp), self.network)
2018-03-14 03:53:03 +00:00
}
}
/// Accessor for the underlying secp key
#[inline]
pub fn secret_key(&self) -> &SecretKey {
&self.key
}
/// Accessor for the underlying secp key that consumes the privkey
#[inline]
pub fn into_secret_key(self) -> SecretKey {
self.key
}
/// Accessor for the network type
#[inline]
pub fn network(&self) -> Network {
self.network
}
/// Accessor for the compressed flag
#[inline]
pub fn is_compressed(&self) -> bool {
self.compressed
}
2018-10-10 10:12:33 +00:00
/// Format the private key to WIF format.
pub fn fmt_wif(&self, fmt: &mut fmt::Write) -> fmt::Result {
2018-03-14 03:53:03 +00:00
let mut ret = [0; 34];
ret[0] = match self.network {
Network::Bitcoin => 128,
Network::Testnet | Network::Regtest => 239,
2018-03-14 03:53:03 +00:00
};
ret[1..33].copy_from_slice(&self.key[..]);
let privkey = if self.compressed {
2018-03-14 03:53:03 +00:00
ret[33] = 1;
base58::check_encode_slice(&ret[..])
} else {
base58::check_encode_slice(&ret[..33])
};
fmt.write_str(&privkey)
2018-03-14 03:53:03 +00:00
}
2018-10-10 10:12:33 +00:00
/// Get WIF encoding of this private key.
#[inline]
pub fn to_wif(&self) -> String {
let mut buf = String::new();
buf.write_fmt(format_args!("{}", self)).unwrap();
buf.shrink_to_fit();
buf
}
2018-03-14 03:53:03 +00:00
2018-10-10 10:12:33 +00:00
/// Parse WIF encoded private key.
pub fn from_wif(wif: &str) -> Result<Privkey, encode::Error> {
let data = base58::from_check(wif)?;
2018-03-14 03:53:03 +00:00
let compressed = match data.len() {
33 => false,
34 => true,
_ => { return Err(encode::Error::Base58(base58::Error::InvalidLength(data.len()))); }
2018-03-14 03:53:03 +00:00
};
let network = match data[0] {
128 => Network::Bitcoin,
239 => Network::Testnet,
x => { return Err(encode::Error::Base58(base58::Error::InvalidVersion(vec![x]))); }
2018-03-14 03:53:03 +00:00
};
2019-01-15 17:05:41 +00:00
let key = SecretKey::from_slice(&data[1..33])
.map_err(|_| base58::Error::Other("Secret key out of range".to_owned()))?;
2018-03-14 03:53:03 +00:00
Ok(Privkey {
compressed: compressed,
network: network,
key: key
})
}
}
2018-10-10 10:12:33 +00:00
impl fmt::Display for Privkey {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
self.fmt_wif(f)
}
}
impl fmt::Debug for Privkey {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(f, "[private key data]")
}
}
2018-10-10 10:12:33 +00:00
impl FromStr for Privkey {
type Err = encode::Error;
fn from_str(s: &str) -> Result<Privkey, encode::Error> {
Privkey::from_wif(s)
}
}
2018-03-14 03:53:03 +00:00
#[cfg(test)]
mod tests {
use super::Privkey;
use secp256k1::Secp256k1;
use std::str::FromStr;
use network::constants::Network::Testnet;
use network::constants::Network::Bitcoin;
#[test]
fn test_key_derivation() {
// testnet compressed
2018-10-10 10:12:33 +00:00
let sk = Privkey::from_wif("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
2018-03-14 03:53:03 +00:00
assert_eq!(sk.network(), Testnet);
assert_eq!(sk.is_compressed(), true);
2018-10-10 10:12:33 +00:00
assert_eq!(&sk.to_wif(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
2018-03-14 03:53:03 +00:00
let secp = Secp256k1::new();
2018-07-27 20:15:48 +00:00
let pk = sk.to_legacy_address(&secp);
2018-03-14 03:53:03 +00:00
assert_eq!(&pk.to_string(), "mqwpxxvfv3QbM8PU8uBx2jaNt9btQqvQNx");
2018-10-10 10:12:33 +00:00
// test string conversion
assert_eq!(&sk.to_string(), "cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy");
let sk_str =
Privkey::from_str("cVt4o7BGAig1UXywgGSmARhxMdzP5qvQsxKkSsc1XEkw3tDTQFpy").unwrap();
assert_eq!(&sk.to_wif(), &sk_str.to_wif());
2018-03-14 03:53:03 +00:00
// mainnet uncompressed
2018-10-10 10:12:33 +00:00
let sk = Privkey::from_wif("5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3").unwrap();
2018-03-14 03:53:03 +00:00
assert_eq!(sk.network(), Bitcoin);
assert_eq!(sk.is_compressed(), false);
2018-10-10 10:12:33 +00:00
assert_eq!(&sk.to_wif(), "5JYkZjmN7PVMjJUfJWfRFwtuXTGB439XV6faajeHPAM9Z2PT2R3");
2018-03-14 03:53:03 +00:00
let secp = Secp256k1::new();
2018-07-27 20:15:48 +00:00
let pk = sk.to_legacy_address(&secp);
2018-03-14 03:53:03 +00:00
assert_eq!(&pk.to_string(), "1GhQvF6dL8xa6wBxLnWmHcQsurx9RxiMc8");
}
}