1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
use super::error::Error;
use super::pubkey::Pubkey;
use super::Message;
use super::SECP256K1;
use ckb_fixed_hash::{h256, H256, H520};
use faster_hex::hex_string;
use secp256k1::recovery::{RecoverableSignature, RecoveryId};
use secp256k1::Message as SecpMessage;
use std::fmt;
use std::str::FromStr;
#[derive(Clone)]
pub struct Signature([u8; 65]);
const N: H256 = h256!("0xffffffff_ffffffff_ffffffff_fffffffe_baaedce6_af48a03b_bfd25e8c_d0364141");
const ONE: H256 = h256!("0x1");
impl Signature {
pub fn r(&self) -> &[u8] {
&self.0[0..32]
}
pub fn s(&self) -> &[u8] {
&self.0[32..64]
}
pub fn v(&self) -> u8 {
self.0[64]
}
pub fn from_compact(rec_id: RecoveryId, ret: [u8; 64]) -> Self {
let mut data = [0; 65];
data[0..64].copy_from_slice(&ret[0..64]);
data[64] = rec_id.to_i32() as u8;
Signature(data)
}
pub fn from_rsv(r: &H256, s: &H256, v: u8) -> Self {
let mut sig = [0u8; 65];
sig[0..32].copy_from_slice(r.as_bytes());
sig[32..64].copy_from_slice(s.as_bytes());
sig[64] = v;
Signature(sig)
}
pub fn from_slice(data: &[u8]) -> Result<Self, Error> {
if data.len() != 65 {
return Err(Error::InvalidSignature);
}
let mut sig = [0u8; 65];
sig[..].copy_from_slice(data);
Ok(Signature(sig))
}
pub fn is_valid(&self) -> bool {
let h_r = match H256::from_slice(self.r()) {
Ok(h_r) => h_r,
Err(_) => {
return false;
}
};
let h_s = match H256::from_slice(self.s()) {
Ok(h_s) => h_s,
Err(_) => {
return false;
}
};
self.v() <= 1 && h_r < N && h_r >= ONE && h_s < N && h_s >= ONE
}
pub fn to_recoverable(&self) -> Result<RecoverableSignature, Error> {
let recovery_id = RecoveryId::from_i32(i32::from(self.0[64]))?;
Ok(RecoverableSignature::from_compact(
&self.0[0..64],
recovery_id,
)?)
}
pub fn recover(&self, message: &Message) -> Result<Pubkey, Error> {
let context = &SECP256K1;
let recoverable_signature = self.to_recoverable()?;
let message = SecpMessage::from_slice(message.as_bytes())?;
let pubkey = context.recover(&message, &recoverable_signature)?;
let serialized = pubkey.serialize_uncompressed();
let mut pubkey = [0u8; 64];
pubkey.copy_from_slice(&serialized[1..65]);
Ok(pubkey.into())
}
pub fn serialize(&self) -> Vec<u8> {
Vec::from(&self.0[..])
}
pub fn serialize_der(&self) -> Vec<u8> {
self.to_recoverable()
.unwrap()
.to_standard()
.serialize_der()
.to_vec()
}
}
impl fmt::Debug for Signature {
fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> {
f.debug_struct("Signature")
.field("r", &hex_string(&self.0[0..32]))
.field("s", &hex_string(&self.0[32..64]))
.field("v", &hex_string(&self.0[64..65]))
.finish()
}
}
impl From<H520> for Signature {
fn from(sig: H520) -> Self {
Signature(sig.0)
}
}
impl From<Signature> for H520 {
fn from(s: Signature) -> Self {
H520(s.0)
}
}
impl From<Vec<u8>> for Signature {
fn from(sig: Vec<u8>) -> Self {
let mut data = [0; 65];
data[0..65].copy_from_slice(sig.as_slice());
Signature(data)
}
}
impl FromStr for Signature {
type Err = Error;
fn from_str(s: &str) -> Result<Self, Self::Err> {
H520::from_str(s)
.map(Into::into)
.map_err(|_| Error::InvalidSignature)
}
}