// Written in 2014 by Andrew Poelstra // SPDX-License-Identifier: CC0-1.0 //! Signature //! //! This module provides signature related functions including secp256k1 signature recovery when //! library is used with the `secp-recovery` feature. //! #[cfg(feature = "secp-recovery")] #[cfg_attr(docsrs, doc(cfg(feature = "secp-recovery")))] pub use self::message_signing::{MessageSignature, MessageSignatureError}; use crate::consensus::{encode, Encodable}; use crate::hashes::{sha256d, Hash, HashEngine}; /// The prefix for signed messages using Bitcoin's message signing protocol. pub const BITCOIN_SIGNED_MSG_PREFIX: &[u8] = b"\x18Bitcoin Signed Message:\n"; #[cfg(feature = "secp-recovery")] mod message_signing { use core::fmt; use bitcoin_internals::write_err; use secp256k1; use secp256k1::ecdsa::{RecoverableSignature, RecoveryId}; use crate::address::{Address, AddressType}; use crate::crypto::key::PublicKey; use crate::hashes::sha256d; #[cfg(feature = "base64")] use crate::prelude::*; /// An error used for dealing with Bitcoin Signed Messages. #[cfg_attr(docsrs, doc(cfg(feature = "secp-recovery")))] #[derive(Debug, PartialEq, Eq)] #[non_exhaustive] pub enum MessageSignatureError { /// Signature is expected to be 65 bytes. InvalidLength, /// The signature is invalidly constructed. InvalidEncoding(secp256k1::Error), /// Invalid base64 encoding. InvalidBase64, /// Unsupported Address Type UnsupportedAddressType(AddressType), } impl fmt::Display for MessageSignatureError { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { match *self { MessageSignatureError::InvalidLength => write!(f, "length not 65 bytes"), MessageSignatureError::InvalidEncoding(ref e) => write_err!(f, "invalid encoding"; e), MessageSignatureError::InvalidBase64 => write!(f, "invalid base64"), MessageSignatureError::UnsupportedAddressType(ref address_type) => write!(f, "unsupported address type: {}", address_type), } } } #[cfg(feature = "std")] #[cfg_attr(docsrs, doc(cfg(feature = "std")))] impl std::error::Error for MessageSignatureError { fn source(&self) -> Option<&(dyn std::error::Error + 'static)> { use self::MessageSignatureError::*; match self { InvalidEncoding(e) => Some(e), InvalidLength | InvalidBase64 | UnsupportedAddressType(_) => None, } } } #[doc(hidden)] impl From for MessageSignatureError { fn from(e: secp256k1::Error) -> MessageSignatureError { MessageSignatureError::InvalidEncoding(e) } } /// A signature on a Bitcoin Signed Message. /// /// In order to use the `to_base64` and `from_base64` methods, as well as the /// `fmt::Display` and `str::FromStr` implementations, the `base64` feature /// must be enabled. #[derive(Copy, Clone, PartialEq, Eq, Debug)] #[cfg_attr(docsrs, doc(cfg(feature = "secp-recovery")))] pub struct MessageSignature { /// The inner recoverable signature. pub signature: RecoverableSignature, /// Whether or not this signature was created with a compressed key. pub compressed: bool, } impl MessageSignature { /// Create a new [MessageSignature]. pub fn new(signature: RecoverableSignature, compressed: bool) -> MessageSignature { MessageSignature { signature, compressed } } /// Serialize to bytes. pub fn serialize(&self) -> [u8; 65] { let (recid, raw) = self.signature.serialize_compact(); let mut serialized = [0u8; 65]; serialized[0] = 27; serialized[0] += recid.to_i32() as u8; if self.compressed { serialized[0] += 4; } serialized[1..].copy_from_slice(&raw[..]); serialized } /// Create from a byte slice. pub fn from_slice(bytes: &[u8]) -> Result { if bytes.len() != 65 { return Err(MessageSignatureError::InvalidLength); } // We just check this here so we can safely subtract further. if bytes[0] < 27 { return Err(MessageSignatureError::InvalidEncoding( secp256k1::Error::InvalidRecoveryId, )); }; let recid = RecoveryId::from_i32(((bytes[0] - 27) & 0x03) as i32)?; Ok(MessageSignature { signature: RecoverableSignature::from_compact(&bytes[1..], recid)?, compressed: ((bytes[0] - 27) & 0x04) != 0, }) } /// Attempt to recover a public key from the signature and the signed message. /// /// To get the message hash from a message, use [super::signed_msg_hash]. pub fn recover_pubkey( &self, secp_ctx: &secp256k1::Secp256k1, msg_hash: sha256d::Hash, ) -> Result { let msg = secp256k1::Message::from(msg_hash); let pubkey = secp_ctx.recover_ecdsa(&msg, &self.signature)?; Ok(PublicKey { inner: pubkey, compressed: self.compressed }) } /// Verify that the signature signs the message and was signed by the given address. /// /// To get the message hash from a message, use [super::signed_msg_hash]. pub fn is_signed_by_address( &self, secp_ctx: &secp256k1::Secp256k1, address: &Address, msg_hash: sha256d::Hash, ) -> Result { match address.address_type() { Some(AddressType::P2pkh) => { let pubkey = self.recover_pubkey(secp_ctx, msg_hash)?; Ok(*address == Address::p2pkh(&pubkey, address.network)) } Some(address_type) => Err(MessageSignatureError::UnsupportedAddressType(address_type)), None => Ok(false), } } /// Convert a signature from base64 encoding. #[cfg(feature = "base64")] #[cfg_attr(docsrs, doc(cfg(feature = "base64")))] pub fn from_base64(s: &str) -> Result { let bytes = base64::decode(s).map_err(|_| MessageSignatureError::InvalidBase64)?; MessageSignature::from_slice(&bytes) } /// Convert to base64 encoding. #[cfg(feature = "base64")] #[cfg_attr(docsrs, doc(cfg(feature = "base64")))] pub fn to_base64(self) -> String { base64::encode(&self.serialize()[..]) } } #[cfg(feature = "base64")] #[cfg_attr(docsrs, doc(cfg(feature = "base64")))] impl fmt::Display for MessageSignature { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { let bytes = self.serialize(); // This avoids the allocation of a String. write!( f, "{}", base64::display::Base64Display::with_config(&bytes[..], base64::STANDARD) ) } } #[cfg(feature = "base64")] #[cfg_attr(docsrs, doc(cfg(feature = "base64")))] impl core::str::FromStr for MessageSignature { type Err = MessageSignatureError; fn from_str(s: &str) -> Result { MessageSignature::from_base64(s) } } } /// Hash message for signature using Bitcoin's message signing format. pub fn signed_msg_hash(msg: &str) -> sha256d::Hash { let mut engine = sha256d::Hash::engine(); engine.input(BITCOIN_SIGNED_MSG_PREFIX); let msg_len = encode::VarInt(msg.len() as u64); msg_len.consensus_encode(&mut engine).expect("engines don't error"); engine.input(msg.as_bytes()); sha256d::Hash::from_engine(engine) } #[cfg(test)] mod tests { use super::*; use crate::hashes::hex::ToHex; #[test] fn test_signed_msg_hash() { let hash = signed_msg_hash("test"); assert_eq!( hash.to_hex(), "a6f87fe6d58a032c320ff8d1541656f0282c2c7bfcc69d61af4c8e8ed528e49c" ); } #[test] #[cfg(all(feature = "secp-recovery", feature = "base64"))] fn test_message_signature() { use core::str::FromStr; use secp256k1; use crate::{Address, AddressType, Network}; let secp = secp256k1::Secp256k1::new(); let message = "rust-bitcoin MessageSignature test"; let msg_hash = super::signed_msg_hash(message); let msg = secp256k1::Message::from(msg_hash); let privkey = secp256k1::SecretKey::new(&mut secp256k1::rand::thread_rng()); let secp_sig = secp.sign_ecdsa_recoverable(&msg, &privkey); let signature = super::MessageSignature { signature: secp_sig, compressed: true }; assert_eq!(signature.to_base64(), signature.to_string()); let signature2 = super::MessageSignature::from_str(&signature.to_string()).unwrap(); let pubkey = signature2.recover_pubkey(&secp, msg_hash).unwrap(); assert!(pubkey.compressed); assert_eq!(pubkey.inner, secp256k1::PublicKey::from_secret_key(&secp, &privkey)); let p2pkh = Address::p2pkh(&pubkey, Network::Bitcoin); assert_eq!(signature2.is_signed_by_address(&secp, &p2pkh, msg_hash), Ok(true)); let p2wpkh = Address::p2wpkh(&pubkey, Network::Bitcoin).unwrap(); assert_eq!( signature2.is_signed_by_address(&secp, &p2wpkh, msg_hash), Err(MessageSignatureError::UnsupportedAddressType(AddressType::P2wpkh)) ); let p2shwpkh = Address::p2shwpkh(&pubkey, Network::Bitcoin).unwrap(); assert_eq!( signature2.is_signed_by_address(&secp, &p2shwpkh, msg_hash), Err(MessageSignatureError::UnsupportedAddressType(AddressType::P2sh)) ); } #[test] #[cfg(all(feature = "secp-recovery", feature = "base64"))] fn test_incorrect_message_signature() { use secp256k1; use crate::crypto::key::PublicKey; use crate::{Address, Network}; let secp = secp256k1::Secp256k1::new(); let message = "a different message from what was signed"; let msg_hash = super::signed_msg_hash(message); // Signature of msg = "rust-bitcoin MessageSignature test" // Signed with pk "UuOGDsfLPr4HIMKQX0ipjJeRaj1geCq3yPUF2COP5ME=" let signature_base64 = "IAM2qX24tYx/bdBTIgVLhD8QEAjrPlJpmjB4nZHdRYGIBa4DmVulAcwjPnWe6Q5iEwXH6F0pUCJP/ZeHPWS1h1o="; let pubkey_base64 = "A1FTfMEntPpAty3qkEo0q2Dc1FEycI10a3jmwEFy+Qr6"; let signature = super::MessageSignature::from_base64(signature_base64).expect("message signature"); let pubkey = PublicKey::from_slice(&base64::decode(pubkey_base64).expect("base64 string")) .expect("pubkey slice"); let p2pkh = Address::p2pkh(&pubkey, Network::Bitcoin); assert_eq!(signature.is_signed_by_address(&secp, &p2pkh, msg_hash), Ok(false)); } }