Some checks are pending
Build SimApp / build (amd64) (push) Waiting to run
Build SimApp / build (arm64) (push) Waiting to run
CodeQL / Analyze (push) Waiting to run
Build & Push / build (push) Waiting to run
Run Gosec / Gosec (push) Waiting to run
Lint / golangci-lint (push) Waiting to run
Checks dependencies and mocks generation / Check go mod tidy (push) Waiting to run
Checks dependencies and mocks generation / Check up to date mocks (push) Waiting to run
System Tests / setup (push) Waiting to run
System Tests / test-system (push) Blocked by required conditions
System Tests / test-system-legacy (push) Blocked by required conditions
Tests / Code Coverage / split-test-files (push) Waiting to run
Tests / Code Coverage / tests (00) (push) Blocked by required conditions
Tests / Code Coverage / tests (01) (push) Blocked by required conditions
Tests / Code Coverage / tests (02) (push) Blocked by required conditions
Tests / Code Coverage / tests (03) (push) Blocked by required conditions
Tests / Code Coverage / test-integration (push) Waiting to run
Tests / Code Coverage / test-e2e (push) Waiting to run
Tests / Code Coverage / repo-analysis (push) Blocked by required conditions
Tests / Code Coverage / test-sim-nondeterminism (push) Waiting to run
Tests / Code Coverage / test-clientv2 (push) Waiting to run
Tests / Code Coverage / test-core (push) Waiting to run
Tests / Code Coverage / test-depinject (push) Waiting to run
Tests / Code Coverage / test-errors (push) Waiting to run
Tests / Code Coverage / test-math (push) Waiting to run
Tests / Code Coverage / test-schema (push) Waiting to run
Tests / Code Coverage / test-collections (push) Waiting to run
Tests / Code Coverage / test-cosmovisor (push) Waiting to run
Tests / Code Coverage / test-confix (push) Waiting to run
Tests / Code Coverage / test-store (push) Waiting to run
Tests / Code Coverage / test-log (push) Waiting to run
Tests / Code Coverage / test-x-tx (push) Waiting to run
Tests / Code Coverage / test-x-nft (push) Waiting to run
Tests / Code Coverage / test-x-circuit (push) Waiting to run
Tests / Code Coverage / test-x-feegrant (push) Waiting to run
Tests / Code Coverage / test-x-evidence (push) Waiting to run
Tests / Code Coverage / test-x-upgrade (push) Waiting to run
Tests / Code Coverage / test-tools-benchmark (push) Waiting to run
54 lines
1.6 KiB
Go
54 lines
1.6 KiB
Go
//go:build !libsecp256k1_sdk
|
|
|
|
package secp256k1
|
|
|
|
import (
|
|
"errors"
|
|
|
|
"git.cw.tr/mukan-network/mukan-consensus/crypto"
|
|
secp256k1 "github.com/decred/dcrd/dcrec/secp256k1/v4"
|
|
"github.com/decred/dcrd/dcrec/secp256k1/v4/ecdsa"
|
|
)
|
|
|
|
// Sign creates an ECDSA signature on curve Secp256k1, using SHA256 on the msg.
|
|
// The returned signature will be of the form R || S (in lower-S form).
|
|
func (privKey *PrivKey) Sign(msg []byte) ([]byte, error) {
|
|
priv := secp256k1.PrivKeyFromBytes(privKey.Key)
|
|
sig := ecdsa.SignCompact(priv, crypto.Sha256(msg), false)
|
|
|
|
// remove the first byte which is compactSigRecoveryCode
|
|
return sig[1:], nil
|
|
}
|
|
|
|
// VerifyBytes verifies a signature of the form R || S.
|
|
// It rejects signatures which are not in lower-S form.
|
|
func (pubKey *PubKey) VerifySignature(msg, sigStr []byte) bool {
|
|
if len(sigStr) != 64 {
|
|
return false
|
|
}
|
|
pub, err := secp256k1.ParsePubKey(pubKey.Key)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
// parse the signature, will return error if it is not in lower-S form
|
|
signature, err := signatureFromBytes(sigStr)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return signature.Verify(crypto.Sha256(msg), pub)
|
|
}
|
|
|
|
// Read Signature struct from R || S. Caller needs to ensure
|
|
// that len(sigStr) == 64.
|
|
// Rejects malleable signatures (if S value if it is over half order).
|
|
func signatureFromBytes(sigStr []byte) (*ecdsa.Signature, error) {
|
|
var r secp256k1.ModNScalar
|
|
r.SetByteSlice(sigStr[:32])
|
|
var s secp256k1.ModNScalar
|
|
s.SetByteSlice(sigStr[32:64])
|
|
if s.IsOverHalfOrder() {
|
|
return nil, errors.New("signature is not in lower-S form")
|
|
}
|
|
|
|
return ecdsa.NewSignature(&r, &s), nil
|
|
}
|