2014-07-18 13:56:17 +00:00
|
|
|
// Rust Bitcoin Library
|
|
|
|
// Written in 2014 by
|
2015-04-07 22:51:57 +00:00
|
|
|
// Andrew Poelstra <apoelstra@wpsoftware.net>
|
2014-07-18 13:56:17 +00:00
|
|
|
//
|
|
|
|
// To the extent possible under law, the author(s) have dedicated all
|
|
|
|
// copyright and related and neighboring rights to this software to
|
|
|
|
// the public domain worldwide. This software is distributed without
|
|
|
|
// any warranty.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the CC0 Public Domain Dedication
|
|
|
|
// along with this software.
|
|
|
|
// If not, see <http://creativecommons.org/publicdomain/zero/1.0/>.
|
|
|
|
//
|
|
|
|
|
2021-11-05 21:58:18 +00:00
|
|
|
//! Miscellaneous functions.
|
|
|
|
//!
|
|
|
|
//! This module provides various utility functions including secp256k1 signature
|
|
|
|
//! recovery when library is used with the `secp-recovery` feature.
|
2014-07-18 13:56:17 +00:00
|
|
|
//!
|
|
|
|
|
2022-05-02 22:13:57 +00:00
|
|
|
use crate::prelude::*;
|
2021-06-09 10:34:44 +00:00
|
|
|
|
2022-05-02 22:13:57 +00:00
|
|
|
use crate::hashes::{sha256d, Hash, HashEngine};
|
2020-10-07 15:46:48 +00:00
|
|
|
|
2022-05-02 22:13:57 +00:00
|
|
|
use crate::blockdata::opcodes;
|
|
|
|
use crate::consensus::{encode, Encodable};
|
2014-07-18 13:56:17 +00:00
|
|
|
|
2020-10-07 15:46:48 +00:00
|
|
|
#[cfg(feature = "secp-recovery")]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "secp-recovery")))]
|
2020-10-07 15:46:48 +00:00
|
|
|
pub use self::message_signing::{MessageSignature, MessageSignatureError};
|
|
|
|
|
2020-12-08 17:31:28 +00:00
|
|
|
/// The prefix for signed messages using Bitcoin's message signing protocol.
|
|
|
|
pub const BITCOIN_SIGNED_MSG_PREFIX: &[u8] = b"\x18Bitcoin Signed Message:\n";
|
2019-04-28 05:59:20 +00:00
|
|
|
|
2020-10-07 15:46:48 +00:00
|
|
|
#[cfg(feature = "secp-recovery")]
|
|
|
|
mod message_signing {
|
2022-05-02 23:02:58 +00:00
|
|
|
#[cfg(feature = "base64")] use crate::prelude::*;
|
|
|
|
|
2021-06-09 10:40:41 +00:00
|
|
|
use core::fmt;
|
2020-10-07 15:46:48 +00:00
|
|
|
|
2022-05-02 22:13:57 +00:00
|
|
|
use crate::hashes::sha256d;
|
2020-10-07 15:46:48 +00:00
|
|
|
use secp256k1;
|
2022-01-03 02:52:44 +00:00
|
|
|
use secp256k1::ecdsa::{RecoveryId, RecoverableSignature};
|
2020-10-07 15:46:48 +00:00
|
|
|
|
2022-05-02 22:13:57 +00:00
|
|
|
use crate::util::key::PublicKey;
|
|
|
|
use crate::util::address::{Address, AddressType};
|
2020-10-07 15:46:48 +00:00
|
|
|
|
|
|
|
/// An error used for dealing with Bitcoin Signed Messages.
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "secp-recovery")))]
|
2020-10-07 15:46:48 +00:00
|
|
|
#[derive(Debug, PartialEq, Eq)]
|
|
|
|
pub enum MessageSignatureError {
|
|
|
|
/// Signature is expected to be 65 bytes.
|
|
|
|
InvalidLength,
|
|
|
|
/// The signature is invalidly constructed.
|
|
|
|
InvalidEncoding(secp256k1::Error),
|
|
|
|
/// Invalid base64 encoding.
|
|
|
|
InvalidBase64,
|
2022-02-05 21:29:42 +00:00
|
|
|
/// Unsupported Address Type
|
|
|
|
UnsupportedAddressType(AddressType),
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Display for MessageSignatureError {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
match *self {
|
|
|
|
MessageSignatureError::InvalidLength => write!(f, "length not 65 bytes"),
|
|
|
|
MessageSignatureError::InvalidEncoding(ref e) => write!(f, "invalid encoding: {}", e),
|
|
|
|
MessageSignatureError::InvalidBase64 => write!(f, "invalid base64"),
|
2022-02-05 21:29:42 +00:00
|
|
|
MessageSignatureError::UnsupportedAddressType(ref address_type) => write!(f, "unsupported address type: {}", address_type),
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-09 10:34:44 +00:00
|
|
|
#[cfg(feature = "std")]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "std")))]
|
2022-05-04 05:56:24 +00:00
|
|
|
impl std::error::Error for MessageSignatureError {
|
|
|
|
fn source(&self) -> Option<&(dyn std::error::Error + 'static)> {
|
|
|
|
use self::MessageSignatureError::*;
|
|
|
|
|
|
|
|
match self {
|
|
|
|
InvalidEncoding(e) => Some(e),
|
|
|
|
InvalidLength | InvalidBase64 | UnsupportedAddressType(_) => None,
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[doc(hidden)]
|
|
|
|
impl From<secp256k1::Error> for MessageSignatureError {
|
|
|
|
fn from(e: secp256k1::Error) -> MessageSignatureError {
|
|
|
|
MessageSignatureError::InvalidEncoding(e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// A signature on a Bitcoin Signed Message.
|
|
|
|
///
|
|
|
|
/// In order to use the `to_base64` and `from_base64` methods, as well as the
|
|
|
|
/// `fmt::Display` and `str::FromStr` implementations, the `base64` feature
|
|
|
|
/// must be enabled.
|
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Debug)]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "secp-recovery")))]
|
2020-10-07 15:46:48 +00:00
|
|
|
pub struct MessageSignature {
|
|
|
|
/// The inner recoverable signature.
|
|
|
|
pub signature: RecoverableSignature,
|
|
|
|
/// Whether or not this signature was created with a compressed key.
|
|
|
|
pub compressed: bool,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl MessageSignature {
|
|
|
|
/// Create a new [MessageSignature].
|
|
|
|
pub fn new(signature: RecoverableSignature, compressed: bool) -> MessageSignature {
|
|
|
|
MessageSignature {
|
2021-11-03 09:20:34 +00:00
|
|
|
signature,
|
|
|
|
compressed,
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Serialize to bytes.
|
|
|
|
pub fn serialize(&self) -> [u8; 65] {
|
|
|
|
let (recid, raw) = self.signature.serialize_compact();
|
|
|
|
let mut serialized = [0u8; 65];
|
|
|
|
serialized[0] = 27;
|
|
|
|
serialized[0] += recid.to_i32() as u8;
|
|
|
|
if self.compressed {
|
|
|
|
serialized[0] += 4;
|
|
|
|
}
|
|
|
|
serialized[1..].copy_from_slice(&raw[..]);
|
|
|
|
serialized
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Create from a byte slice.
|
|
|
|
pub fn from_slice(bytes: &[u8]) -> Result<MessageSignature, MessageSignatureError> {
|
|
|
|
if bytes.len() != 65 {
|
|
|
|
return Err(MessageSignatureError::InvalidLength);
|
|
|
|
}
|
|
|
|
// We just check this here so we can safely subtract further.
|
|
|
|
if bytes[0] < 27 {
|
|
|
|
return Err(MessageSignatureError::InvalidEncoding(secp256k1::Error::InvalidRecoveryId));
|
|
|
|
};
|
|
|
|
let recid = RecoveryId::from_i32(((bytes[0] - 27) & 0x03) as i32)?;
|
|
|
|
Ok(MessageSignature {
|
|
|
|
signature: RecoverableSignature::from_compact(&bytes[1..], recid)?,
|
|
|
|
compressed: ((bytes[0] - 27) & 0x04) != 0,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Attempt to recover a public key from the signature and the signed message.
|
|
|
|
///
|
2021-05-03 09:41:58 +00:00
|
|
|
/// To get the message hash from a message, use [super::signed_msg_hash].
|
2020-10-07 15:46:48 +00:00
|
|
|
pub fn recover_pubkey<C: secp256k1::Verification>(
|
|
|
|
&self,
|
|
|
|
secp_ctx: &secp256k1::Secp256k1<C>,
|
|
|
|
msg_hash: sha256d::Hash
|
2022-02-05 21:29:42 +00:00
|
|
|
) -> Result<PublicKey, MessageSignatureError> {
|
|
|
|
let msg = secp256k1::Message::from_slice(&msg_hash[..])
|
|
|
|
.expect("cannot fail");
|
2022-01-03 02:52:44 +00:00
|
|
|
let pubkey = secp_ctx.recover_ecdsa(&msg, &self.signature)?;
|
2020-10-07 15:46:48 +00:00
|
|
|
Ok(PublicKey {
|
2022-01-09 22:09:02 +00:00
|
|
|
inner: pubkey,
|
2020-10-07 15:46:48 +00:00
|
|
|
compressed: self.compressed,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Verify that the signature signs the message and was signed by the given address.
|
|
|
|
///
|
2021-05-03 09:41:58 +00:00
|
|
|
/// To get the message hash from a message, use [super::signed_msg_hash].
|
2020-10-07 15:46:48 +00:00
|
|
|
pub fn is_signed_by_address<C: secp256k1::Verification>(
|
|
|
|
&self,
|
|
|
|
secp_ctx: &secp256k1::Secp256k1<C>,
|
|
|
|
address: &Address,
|
|
|
|
msg_hash: sha256d::Hash
|
2022-02-05 21:29:42 +00:00
|
|
|
) -> Result<bool, MessageSignatureError> {
|
|
|
|
match address.address_type() {
|
2020-10-07 15:46:48 +00:00
|
|
|
Some(AddressType::P2pkh) => {
|
2022-02-05 21:29:42 +00:00
|
|
|
let pubkey = self.recover_pubkey(secp_ctx, msg_hash)?;
|
|
|
|
Ok(*address == Address::p2pkh(&pubkey, address.network))
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
2022-02-05 21:29:42 +00:00
|
|
|
Some(address_type) => Err(MessageSignatureError::UnsupportedAddressType(address_type)),
|
|
|
|
None => Ok(false),
|
|
|
|
}
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
|
|
|
|
2022-01-06 02:04:47 +00:00
|
|
|
/// Convert a signature from base64 encoding.
|
2020-10-07 15:46:48 +00:00
|
|
|
#[cfg(feature = "base64")]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "base64")))]
|
2020-10-07 15:46:48 +00:00
|
|
|
pub fn from_base64(s: &str) -> Result<MessageSignature, MessageSignatureError> {
|
|
|
|
let bytes = ::base64::decode(s).map_err(|_| MessageSignatureError::InvalidBase64)?;
|
|
|
|
MessageSignature::from_slice(&bytes)
|
|
|
|
}
|
|
|
|
|
2022-01-06 02:04:47 +00:00
|
|
|
/// Convert to base64 encoding.
|
2020-10-07 15:46:48 +00:00
|
|
|
#[cfg(feature = "base64")]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "base64")))]
|
2020-10-07 15:46:48 +00:00
|
|
|
pub fn to_base64(&self) -> String {
|
|
|
|
::base64::encode(&self.serialize()[..])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "base64")]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "base64")))]
|
2020-10-07 15:46:48 +00:00
|
|
|
impl fmt::Display for MessageSignature {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
let bytes = self.serialize();
|
|
|
|
// This avoids the allocation of a String.
|
|
|
|
write!(f, "{}", ::base64::display::Base64Display::with_config(
|
|
|
|
&bytes[..], ::base64::STANDARD))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "base64")]
|
2021-07-28 19:38:58 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "base64")))]
|
2021-06-09 10:40:41 +00:00
|
|
|
impl ::core::str::FromStr for MessageSignature {
|
2020-10-07 15:46:48 +00:00
|
|
|
type Err = MessageSignatureError;
|
|
|
|
fn from_str(s: &str) -> Result<MessageSignature, MessageSignatureError> {
|
|
|
|
MessageSignature::from_base64(s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-10 19:58:15 +00:00
|
|
|
/// Search for `needle` in the vector `haystack` and remove every
|
|
|
|
/// instance of it, returning the number of instances removed.
|
2014-08-12 04:38:46 +00:00
|
|
|
/// Loops through the vector opcode by opcode, skipping pushed data.
|
2015-01-18 18:16:01 +00:00
|
|
|
pub fn script_find_and_remove(haystack: &mut Vec<u8>, needle: &[u8]) -> usize {
|
2022-01-24 00:26:29 +00:00
|
|
|
if needle.len() > haystack.len() {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if needle.is_empty() {
|
|
|
|
return 0;
|
|
|
|
}
|
2015-04-07 22:51:57 +00:00
|
|
|
|
|
|
|
let mut top = haystack.len() - needle.len();
|
|
|
|
let mut n_deleted = 0;
|
|
|
|
|
|
|
|
let mut i = 0;
|
|
|
|
while i <= top {
|
|
|
|
if &haystack[i..(i + needle.len())] == needle {
|
|
|
|
for j in i..top {
|
2015-04-10 23:15:57 +00:00
|
|
|
haystack.swap(j + needle.len(), j);
|
2015-04-07 22:51:57 +00:00
|
|
|
}
|
|
|
|
n_deleted += 1;
|
|
|
|
// This is ugly but prevents infinite loop in case of overflow
|
|
|
|
let overflow = top < needle.len();
|
2015-05-10 19:32:26 +00:00
|
|
|
top = top.wrapping_sub(needle.len());
|
2022-01-24 00:26:29 +00:00
|
|
|
if overflow {
|
|
|
|
break;
|
|
|
|
}
|
2015-04-07 22:51:57 +00:00
|
|
|
} else {
|
2021-09-09 21:28:37 +00:00
|
|
|
i += match opcodes::All::from((*haystack)[i]).classify(opcodes::ClassifyContext::Legacy) {
|
2015-04-07 22:51:57 +00:00
|
|
|
opcodes::Class::PushBytes(n) => n as usize + 1,
|
|
|
|
opcodes::Class::Ordinary(opcodes::Ordinary::OP_PUSHDATA1) => 2,
|
|
|
|
opcodes::Class::Ordinary(opcodes::Ordinary::OP_PUSHDATA2) => 3,
|
|
|
|
opcodes::Class::Ordinary(opcodes::Ordinary::OP_PUSHDATA4) => 5,
|
|
|
|
_ => 1
|
|
|
|
};
|
|
|
|
}
|
2014-08-10 19:58:15 +00:00
|
|
|
}
|
2015-05-10 19:32:26 +00:00
|
|
|
haystack.truncate(top.wrapping_add(needle.len()));
|
2015-04-07 22:51:57 +00:00
|
|
|
n_deleted
|
2014-08-10 19:58:15 +00:00
|
|
|
}
|
|
|
|
|
2020-12-08 17:31:28 +00:00
|
|
|
/// Hash message for signature using Bitcoin's message signing format.
|
2019-04-28 05:59:20 +00:00
|
|
|
pub fn signed_msg_hash(msg: &str) -> sha256d::Hash {
|
2020-04-08 12:01:47 +00:00
|
|
|
let mut engine = sha256d::Hash::engine();
|
2020-12-08 17:31:28 +00:00
|
|
|
engine.input(BITCOIN_SIGNED_MSG_PREFIX);
|
2020-04-12 16:00:55 +00:00
|
|
|
let msg_len = encode::VarInt(msg.len() as u64);
|
2021-11-24 23:01:41 +00:00
|
|
|
msg_len.consensus_encode(&mut engine).expect("engines don't error");
|
2020-04-08 12:01:47 +00:00
|
|
|
engine.input(msg.as_bytes());
|
|
|
|
sha256d::Hash::from_engine(engine)
|
2019-04-28 05:59:20 +00:00
|
|
|
}
|
|
|
|
|
2014-07-18 13:56:17 +00:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2022-02-05 21:29:42 +00:00
|
|
|
use super::*;
|
2022-05-02 22:13:57 +00:00
|
|
|
use crate::hashes::hex::ToHex;
|
2015-04-07 22:51:57 +00:00
|
|
|
use super::script_find_and_remove;
|
2019-04-28 05:59:20 +00:00
|
|
|
use super::signed_msg_hash;
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-07 22:51:57 +00:00
|
|
|
#[test]
|
|
|
|
fn test_script_find_and_remove() {
|
|
|
|
let mut v = vec![101u8, 102, 103, 104, 102, 103, 104, 102, 103, 104, 105, 106, 107, 108, 109];
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[]), 0);
|
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[105, 105, 105]), 0);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(v, vec![101, 102, 103, 104, 102, 103, 104, 102, 103, 104, 105, 106, 107, 108, 109]);
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[105, 106, 107]), 1);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(v, vec![101, 102, 103, 104, 102, 103, 104, 102, 103, 104, 108, 109]);
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[104, 108, 109]), 1);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(v, vec![101, 102, 103, 104, 102, 103, 104, 102, 103]);
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[101]), 1);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(v, vec![102, 103, 104, 102, 103, 104, 102, 103]);
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[102]), 3);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(v, vec![103, 104, 103, 104, 103]);
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[103, 104]), 2);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(v, vec![103]);
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[105, 105, 5]), 0);
|
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[105]), 0);
|
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[103]), 1);
|
2019-04-12 18:06:06 +00:00
|
|
|
assert_eq!(v, Vec::<u8>::new());
|
2014-08-10 19:58:15 +00:00
|
|
|
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[105, 105, 5]), 0);
|
|
|
|
assert_eq!(script_find_and_remove(&mut v, &[105]), 0);
|
2015-04-07 22:51:57 +00:00
|
|
|
}
|
2014-07-18 13:56:17 +00:00
|
|
|
|
2015-04-07 22:51:57 +00:00
|
|
|
#[test]
|
|
|
|
fn test_script_codesep_remove() {
|
|
|
|
let mut s = vec![33u8, 3, 132, 121, 160, 250, 153, 140, 211, 82, 89, 162, 239, 10, 122, 92, 104, 102, 44, 20, 116, 248, 140, 203, 109, 8, 167, 103, 123, 190, 199, 242, 32, 65, 173, 171, 33, 3, 132, 121, 160, 250, 153, 140, 211, 82, 89, 162, 239, 10, 122, 92, 104, 102, 44, 20, 116, 248, 140, 203, 109, 8, 167, 103, 123, 190, 199, 242, 32, 65, 173, 171, 81];
|
2015-04-08 22:23:45 +00:00
|
|
|
assert_eq!(script_find_and_remove(&mut s, &[171]), 2);
|
2015-04-07 22:51:57 +00:00
|
|
|
assert_eq!(s, vec![33, 3, 132, 121, 160, 250, 153, 140, 211, 82, 89, 162, 239, 10, 122, 92, 104, 102, 44, 20, 116, 248, 140, 203, 109, 8, 167, 103, 123, 190, 199, 242, 32, 65, 173, 33, 3, 132, 121, 160, 250, 153, 140, 211, 82, 89, 162, 239, 10, 122, 92, 104, 102, 44, 20, 116, 248, 140, 203, 109, 8, 167, 103, 123, 190, 199, 242, 32, 65, 173, 81]);
|
|
|
|
}
|
2014-08-13 03:56:16 +00:00
|
|
|
|
2019-04-28 05:59:20 +00:00
|
|
|
#[test]
|
|
|
|
fn test_signed_msg_hash() {
|
|
|
|
let hash = signed_msg_hash("test");
|
|
|
|
assert_eq!(hash.to_hex(), "a6f87fe6d58a032c320ff8d1541656f0282c2c7bfcc69d61af4c8e8ed528e49c");
|
|
|
|
}
|
2020-10-07 15:46:48 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
#[cfg(all(feature = "secp-recovery", feature = "base64"))]
|
|
|
|
fn test_message_signature() {
|
2021-06-09 10:40:41 +00:00
|
|
|
use core::str::FromStr;
|
2020-10-07 15:46:48 +00:00
|
|
|
use secp256k1;
|
2022-05-02 23:02:58 +00:00
|
|
|
use crate::{Address, Network, AddressType};
|
2020-10-07 15:46:48 +00:00
|
|
|
|
|
|
|
let secp = secp256k1::Secp256k1::new();
|
|
|
|
let message = "rust-bitcoin MessageSignature test";
|
|
|
|
let msg_hash = super::signed_msg_hash(&message);
|
2022-02-05 21:29:42 +00:00
|
|
|
let msg = secp256k1::Message::from_slice(&msg_hash).expect("message");
|
|
|
|
|
2020-10-07 15:46:48 +00:00
|
|
|
|
|
|
|
let privkey = secp256k1::SecretKey::new(&mut secp256k1::rand::thread_rng());
|
2022-01-07 20:44:57 +00:00
|
|
|
let secp_sig = secp.sign_ecdsa_recoverable(&msg, &privkey);
|
2020-10-07 15:46:48 +00:00
|
|
|
let signature = super::MessageSignature {
|
|
|
|
signature: secp_sig,
|
|
|
|
compressed: true,
|
|
|
|
};
|
|
|
|
|
|
|
|
assert_eq!(signature.to_base64(), signature.to_string());
|
|
|
|
let signature2 = super::MessageSignature::from_str(&signature.to_string()).unwrap();
|
|
|
|
let pubkey = signature2.recover_pubkey(&secp, msg_hash).unwrap();
|
|
|
|
assert_eq!(pubkey.compressed, true);
|
2022-01-09 22:09:02 +00:00
|
|
|
assert_eq!(pubkey.inner, secp256k1::PublicKey::from_secret_key(&secp, &privkey));
|
2020-10-07 15:46:48 +00:00
|
|
|
|
2022-05-02 23:02:58 +00:00
|
|
|
let p2pkh = Address::p2pkh(&pubkey, Network::Bitcoin);
|
2020-10-07 15:46:48 +00:00
|
|
|
assert_eq!(signature2.is_signed_by_address(&secp, &p2pkh, msg_hash), Ok(true));
|
2022-05-02 23:02:58 +00:00
|
|
|
let p2wpkh = Address::p2wpkh(&pubkey, Network::Bitcoin).unwrap();
|
2022-02-05 21:29:42 +00:00
|
|
|
assert_eq!(
|
|
|
|
signature2.is_signed_by_address(&secp, &p2wpkh, msg_hash),
|
|
|
|
Err(MessageSignatureError::UnsupportedAddressType(AddressType::P2wpkh))
|
|
|
|
);
|
2022-05-02 23:02:58 +00:00
|
|
|
let p2shwpkh = Address::p2shwpkh(&pubkey, Network::Bitcoin).unwrap();
|
2022-02-05 21:29:42 +00:00
|
|
|
assert_eq!(
|
|
|
|
signature2.is_signed_by_address(&secp, &p2shwpkh, msg_hash),
|
|
|
|
Err(MessageSignatureError::UnsupportedAddressType(AddressType::P2sh))
|
|
|
|
);
|
2020-10-07 15:46:48 +00:00
|
|
|
}
|
2022-02-09 20:56:13 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
#[cfg(all(feature = "secp-recovery", feature = "base64"))]
|
|
|
|
fn test_incorrect_message_signature() {
|
|
|
|
use secp256k1;
|
2022-05-02 23:02:58 +00:00
|
|
|
use crate::util::key::PublicKey;
|
|
|
|
use crate::{Address, Network};
|
2022-02-09 20:56:13 +00:00
|
|
|
|
|
|
|
let secp = secp256k1::Secp256k1::new();
|
|
|
|
let message = "a different message from what was signed";
|
|
|
|
let msg_hash = super::signed_msg_hash(&message);
|
|
|
|
|
|
|
|
// Signature of msg = "rust-bitcoin MessageSignature test"
|
|
|
|
// Signed with pk "UuOGDsfLPr4HIMKQX0ipjJeRaj1geCq3yPUF2COP5ME="
|
|
|
|
let signature_base64 = "IAM2qX24tYx/bdBTIgVLhD8QEAjrPlJpmjB4nZHdRYGIBa4DmVulAcwjPnWe6Q5iEwXH6F0pUCJP/ZeHPWS1h1o=";
|
|
|
|
let pubkey_base64 = "A1FTfMEntPpAty3qkEo0q2Dc1FEycI10a3jmwEFy+Qr6";
|
|
|
|
let signature = super::MessageSignature::from_base64(signature_base64).expect("message signature");
|
|
|
|
|
|
|
|
let pubkey = PublicKey::from_slice(
|
|
|
|
&::base64::decode(&pubkey_base64).expect("base64 string")
|
|
|
|
).expect("pubkey slice");
|
|
|
|
|
2022-05-02 23:02:58 +00:00
|
|
|
let p2pkh = Address::p2pkh(&pubkey, Network::Bitcoin);
|
2022-02-09 20:56:13 +00:00
|
|
|
assert_eq!(signature.is_signed_by_address(&secp, &p2pkh, msg_hash), Ok(false));
|
|
|
|
}
|
2014-07-18 13:56:17 +00:00
|
|
|
}
|