mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-19 04:48:12 +00:00
133c068f37
This adds an is_canonic parameter to all sign functions. This is a callback that determines if a signature corresponds to some coin specific rules. It is used, e. g., by ethereum (where the recovery byte must be 0 or 1, and not 2 or 3) and or steem signatures (which require both r and s to be between 2^248 and 2^255). This also separates the initialization and the step function of the random number generator, making it easy to restart the signature process with the next random number.
93 lines
4.7 KiB
C
93 lines
4.7 KiB
C
/**
|
|
* Copyright (c) 2013-2014 Tomas Dzetkulic
|
|
* Copyright (c) 2013-2014 Pavol Rusnak
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the "Software"),
|
|
* to deal in the Software without restriction, including without limitation
|
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
* and/or sell copies of the Software, and to permit persons to whom the
|
|
* Software is furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included
|
|
* in all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
* OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES
|
|
* OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
|
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
|
* OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
|
|
#ifndef __ECDSA_H__
|
|
#define __ECDSA_H__
|
|
|
|
#include <stdint.h>
|
|
#include "options.h"
|
|
#include "bignum.h"
|
|
|
|
// curve point x and y
|
|
typedef struct {
|
|
bignum256 x, y;
|
|
} curve_point;
|
|
|
|
typedef struct {
|
|
|
|
bignum256 prime; // prime order of the finite field
|
|
curve_point G; // initial curve point
|
|
bignum256 order; // order of G
|
|
bignum256 order_half; // order of G divided by 2
|
|
int a; // coefficient 'a' of the elliptic curve
|
|
bignum256 b; // coefficient 'b' of the elliptic curve
|
|
|
|
#if USE_PRECOMPUTED_CP
|
|
const curve_point cp[64][8];
|
|
#endif
|
|
|
|
} ecdsa_curve;
|
|
|
|
// rfc6979 pseudo random number generator state
|
|
typedef struct {
|
|
uint8_t v[32], k[32];
|
|
} rfc6979_state;
|
|
|
|
void point_copy(const curve_point *cp1, curve_point *cp2);
|
|
void point_add(const ecdsa_curve *curve, const curve_point *cp1, curve_point *cp2);
|
|
void point_double(const ecdsa_curve *curve, curve_point *cp);
|
|
void point_multiply(const ecdsa_curve *curve, const bignum256 *k, const curve_point *p, curve_point *res);
|
|
void point_set_infinity(curve_point *p);
|
|
int point_is_infinity(const curve_point *p);
|
|
int point_is_equal(const curve_point *p, const curve_point *q);
|
|
int point_is_negative_of(const curve_point *p, const curve_point *q);
|
|
void scalar_multiply(const ecdsa_curve *curve, const bignum256 *k, curve_point *res);
|
|
void uncompress_coords(const ecdsa_curve *curve, uint8_t odd, const bignum256 *x, bignum256 *y);
|
|
int ecdsa_uncompress_pubkey(const ecdsa_curve *curve, const uint8_t *pub_key, uint8_t *uncompressed);
|
|
|
|
int ecdsa_sign(const ecdsa_curve *curve, const uint8_t *priv_key, const uint8_t *msg, uint32_t msg_len, uint8_t *sig, uint8_t *pby, int (*is_canonical)(uint8_t by, uint8_t sig[64]));
|
|
int ecdsa_sign_double(const ecdsa_curve *curve, const uint8_t *priv_key, const uint8_t *msg, uint32_t msg_len, uint8_t *sig, uint8_t *pby, int (*is_canonical)(uint8_t by, uint8_t sig[64]));
|
|
int ecdsa_sign_digest(const ecdsa_curve *curve, const uint8_t *priv_key, const uint8_t *digest, uint8_t *sig, uint8_t *pby, int (*is_canonical)(uint8_t by, uint8_t sig[64]));
|
|
void ecdsa_get_public_key33(const ecdsa_curve *curve, const uint8_t *priv_key, uint8_t *pub_key);
|
|
void ecdsa_get_public_key65(const ecdsa_curve *curve, const uint8_t *priv_key, uint8_t *pub_key);
|
|
void ecdsa_get_pubkeyhash(const uint8_t *pub_key, uint8_t *pubkeyhash);
|
|
void ecdsa_get_address_raw(const uint8_t *pub_key, uint8_t version, uint8_t *addr_raw);
|
|
void ecdsa_get_address(const uint8_t *pub_key, uint8_t version, char *addr, int addrsize);
|
|
void ecdsa_get_wif(const uint8_t *priv_key, uint8_t version, char *wif, int wifsize);
|
|
|
|
int ecdsa_address_decode(const char *addr, uint8_t *out);
|
|
int ecdsa_read_pubkey(const ecdsa_curve *curve, const uint8_t *pub_key, curve_point *pub);
|
|
int ecdsa_validate_pubkey(const ecdsa_curve *curve, const curve_point *pub);
|
|
int ecdsa_verify(const ecdsa_curve *curve, const uint8_t *pub_key, const uint8_t *sig, const uint8_t *msg, uint32_t msg_len);
|
|
int ecdsa_verify_double(const ecdsa_curve *curve, const uint8_t *pub_key, const uint8_t *sig, const uint8_t *msg, uint32_t msg_len);
|
|
int ecdsa_verify_digest(const ecdsa_curve *curve, const uint8_t *pub_key, const uint8_t *sig, const uint8_t *digest);
|
|
int ecdsa_verify_digest_recover(const ecdsa_curve *curve, uint8_t *pub_key, const uint8_t *sig, const uint8_t *digest, int recid);
|
|
int ecdsa_sig_to_der(const uint8_t *sig, uint8_t *der);
|
|
|
|
// Private
|
|
void init_k_rfc6979(const uint8_t *priv_key, const uint8_t *hash, rfc6979_state *rng);
|
|
void generate_k_rfc6979(bignum256 *k, rfc6979_state *rng);
|
|
void generate_k_random(bignum256 *k);
|
|
|
|
#endif
|