2010-07-14 17:54:31 +02:00
|
|
|
// Copyright (c) 2009-2010 Satoshi Nakamoto
|
2013-05-01 06:52:05 +02:00
|
|
|
// Copyright (c) 2009-2013 The Bitcoin developers
|
2010-07-14 17:54:31 +02:00
|
|
|
// Distributed under the MIT/X11 software license, see the accompanying
|
2012-05-18 16:02:28 +02:00
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
2013-04-13 07:13:08 +02:00
|
|
|
|
2011-05-15 09:11:04 +02:00
|
|
|
#ifndef BITCOIN_KEY_H
|
|
|
|
#define BITCOIN_KEY_H
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2012-04-17 20:37:47 +02:00
|
|
|
#include "allocators.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
#include "hash.h"
|
2012-05-14 19:07:52 +02:00
|
|
|
#include "serialize.h"
|
2011-06-26 16:11:56 +02:00
|
|
|
#include "uint256.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
|
|
|
|
#include <stdexcept>
|
|
|
|
#include <vector>
|
2011-06-26 16:11:56 +02:00
|
|
|
|
2010-07-14 17:54:31 +02:00
|
|
|
// secp256k1:
|
|
|
|
// const unsigned int PRIVATE_KEY_SIZE = 279;
|
|
|
|
// const unsigned int PUBLIC_KEY_SIZE = 65;
|
|
|
|
// const unsigned int SIGNATURE_SIZE = 72;
|
|
|
|
//
|
|
|
|
// see www.keylength.com
|
|
|
|
// script supports up to 75 for single byte push
|
|
|
|
|
2012-05-14 23:44:52 +02:00
|
|
|
/** A reference to a CKey: the Hash160 of its serialized public key */
|
|
|
|
class CKeyID : public uint160
|
|
|
|
{
|
|
|
|
public:
|
2014-09-19 19:21:46 +02:00
|
|
|
CKeyID() : uint160(0) {}
|
|
|
|
CKeyID(const uint160& in) : uint160(in) {}
|
2012-05-14 23:44:52 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/** A reference to a CScript: the Hash160 of its serialization (see script.h) */
|
|
|
|
class CScriptID : public uint160
|
|
|
|
{
|
|
|
|
public:
|
2014-09-19 19:21:46 +02:00
|
|
|
CScriptID() : uint160(0) {}
|
|
|
|
CScriptID(const uint160& in) : uint160(in) {}
|
2012-05-14 23:44:52 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/** An encapsulated public key. */
|
2014-09-19 19:21:46 +02:00
|
|
|
class CPubKey
|
|
|
|
{
|
2012-05-14 19:07:52 +02:00
|
|
|
private:
|
2013-05-01 06:52:05 +02:00
|
|
|
// Just store the serialized data.
|
|
|
|
// Its length can very cheaply be computed from the first byte.
|
2013-04-30 21:56:04 +02:00
|
|
|
unsigned char vch[65];
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Compute the length of a pubkey with a given first byte.
|
2014-09-19 19:21:46 +02:00
|
|
|
unsigned int static GetLen(unsigned char chHeader)
|
|
|
|
{
|
2013-04-30 21:56:04 +02:00
|
|
|
if (chHeader == 2 || chHeader == 3)
|
|
|
|
return 33;
|
|
|
|
if (chHeader == 4 || chHeader == 6 || chHeader == 7)
|
|
|
|
return 65;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Set this key data to be invalid
|
2014-09-19 19:21:46 +02:00
|
|
|
void Invalidate()
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
vch[0] = 0xFF;
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
|
|
|
|
2012-05-14 19:07:52 +02:00
|
|
|
public:
|
2013-05-01 06:52:05 +02:00
|
|
|
// Construct an invalid public key.
|
2014-09-19 19:21:46 +02:00
|
|
|
CPubKey()
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
Invalidate();
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Initialize a public key using begin/end iterators to byte data.
|
2014-09-19 19:21:46 +02:00
|
|
|
template <typename T>
|
|
|
|
void Set(const T pbegin, const T pend)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
int len = pend == pbegin ? 0 : GetLen(pbegin[0]);
|
2014-09-19 19:21:46 +02:00
|
|
|
if (len && len == (pend - pbegin))
|
2013-05-01 06:52:05 +02:00
|
|
|
memcpy(vch, (unsigned char*)&pbegin[0], len);
|
|
|
|
else
|
|
|
|
Invalidate();
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Construct a public key using begin/end iterators to byte data.
|
2014-09-19 19:21:46 +02:00
|
|
|
template <typename T>
|
|
|
|
CPubKey(const T pbegin, const T pend)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
Set(pbegin, pend);
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
2012-05-14 19:07:52 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Construct a public key from a byte vector.
|
2014-09-19 19:21:46 +02:00
|
|
|
CPubKey(const std::vector<unsigned char>& vch)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
Set(vch.begin(), vch.end());
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
|
|
|
|
2013-05-04 16:10:09 +02:00
|
|
|
// Simple read-only vector-like interface to the pubkey data.
|
2013-05-01 06:52:05 +02:00
|
|
|
unsigned int size() const { return GetLen(vch[0]); }
|
2014-09-19 19:21:46 +02:00
|
|
|
const unsigned char* begin() const { return vch; }
|
|
|
|
const unsigned char* end() const { return vch + size(); }
|
|
|
|
const unsigned char& operator[](unsigned int pos) const { return vch[pos]; }
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Comparator implementation.
|
2014-09-19 19:21:46 +02:00
|
|
|
friend bool operator==(const CPubKey& a, const CPubKey& b)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
return a.vch[0] == b.vch[0] &&
|
|
|
|
memcmp(a.vch, b.vch, a.size()) == 0;
|
|
|
|
}
|
2014-09-19 19:21:46 +02:00
|
|
|
friend bool operator!=(const CPubKey& a, const CPubKey& b)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
return !(a == b);
|
|
|
|
}
|
2014-09-19 19:21:46 +02:00
|
|
|
friend bool operator<(const CPubKey& a, const CPubKey& b)
|
|
|
|
{
|
2013-04-30 21:56:04 +02:00
|
|
|
return a.vch[0] < b.vch[0] ||
|
2013-05-01 06:52:05 +02:00
|
|
|
(a.vch[0] == b.vch[0] && memcmp(a.vch, b.vch, a.size()) < 0);
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Implement serialization, as if this was a byte vector.
|
2014-09-19 19:21:46 +02:00
|
|
|
unsigned int GetSerializeSize(int nType, int nVersion) const
|
|
|
|
{
|
2013-04-30 21:56:04 +02:00
|
|
|
return size() + 1;
|
|
|
|
}
|
2014-09-19 19:21:46 +02:00
|
|
|
template <typename Stream>
|
|
|
|
void Serialize(Stream& s, int nType, int nVersion) const
|
|
|
|
{
|
2013-04-30 21:56:04 +02:00
|
|
|
unsigned int len = size();
|
2013-05-04 16:10:09 +02:00
|
|
|
::WriteCompactSize(s, len);
|
2013-04-30 21:56:04 +02:00
|
|
|
s.write((char*)vch, len);
|
|
|
|
}
|
2014-09-19 19:21:46 +02:00
|
|
|
template <typename Stream>
|
|
|
|
void Unserialize(Stream& s, int nType, int nVersion)
|
|
|
|
{
|
2013-05-04 16:10:09 +02:00
|
|
|
unsigned int len = ::ReadCompactSize(s);
|
2013-04-30 21:56:04 +02:00
|
|
|
if (len <= 65) {
|
|
|
|
s.read((char*)vch, len);
|
|
|
|
} else {
|
2013-05-01 06:52:05 +02:00
|
|
|
// invalid pubkey, skip available data
|
2013-04-30 21:56:04 +02:00
|
|
|
char dummy;
|
|
|
|
while (len--)
|
|
|
|
s.read(&dummy, 1);
|
2013-05-01 06:52:05 +02:00
|
|
|
Invalidate();
|
2013-04-30 21:56:04 +02:00
|
|
|
}
|
|
|
|
}
|
2012-05-14 19:07:52 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Get the KeyID of this public key (hash of its serialization)
|
2014-09-19 19:21:46 +02:00
|
|
|
CKeyID GetID() const
|
|
|
|
{
|
|
|
|
return CKeyID(Hash160(vch, vch + size()));
|
2012-05-14 19:07:52 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Get the 256-bit hash of this public key.
|
2014-09-19 19:21:46 +02:00
|
|
|
uint256 GetHash() const
|
|
|
|
{
|
|
|
|
return Hash(vch, vch + size());
|
2012-05-14 19:07:52 +02:00
|
|
|
}
|
|
|
|
|
2014-02-25 15:31:43 +01:00
|
|
|
// Check syntactic correctness.
|
|
|
|
//
|
|
|
|
// Note that this is consensus critical as CheckSig() calls it!
|
2014-09-19 19:21:46 +02:00
|
|
|
bool IsValid() const
|
|
|
|
{
|
2013-04-30 21:56:04 +02:00
|
|
|
return size() > 0;
|
2012-05-14 19:07:52 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// fully validate whether this is a valid public key (more expensive than IsValid())
|
|
|
|
bool IsFullyValid() const;
|
|
|
|
|
|
|
|
// Check whether this is a compressed public key.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool IsCompressed() const
|
|
|
|
{
|
2013-04-30 21:56:04 +02:00
|
|
|
return size() == 33;
|
2012-05-14 23:44:52 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Verify a DER signature (~72 bytes).
|
|
|
|
// If this public key is not fully valid, the return value will be false.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool Verify(const uint256& hash, const std::vector<unsigned char>& vchSig) const;
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Recover a public key from a compact signature.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool RecoverCompact(const uint256& hash, const std::vector<unsigned char>& vchSig);
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Turn this public key into an uncompressed public key.
|
|
|
|
bool Decompress();
|
2013-07-15 01:05:25 +02:00
|
|
|
|
|
|
|
// Derive BIP32 child pubkey.
|
|
|
|
bool Derive(CPubKey& pubkeyChild, unsigned char ccChild[32], unsigned int nChild, const unsigned char cc[32]) const;
|
2012-05-14 19:07:52 +02:00
|
|
|
};
|
|
|
|
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2012-09-15 12:10:00 +02:00
|
|
|
// secure_allocator is defined in allocators.h
|
2011-11-07 00:05:42 +01:00
|
|
|
// CPrivKey is a serialized private key, with all parameters included (279 bytes)
|
2011-05-15 09:11:04 +02:00
|
|
|
typedef std::vector<unsigned char, secure_allocator<unsigned char> > CPrivKey;
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
/** An encapsulated private key. */
|
2014-09-19 19:21:46 +02:00
|
|
|
class CKey
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
private:
|
|
|
|
// Whether this private key is valid. We check for correctness when modifying the key
|
|
|
|
// data, so fValid should always correspond to the actual state.
|
|
|
|
bool fValid;
|
2011-11-21 02:46:28 +01:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Whether the public key corresponding to this private key is (to be) compressed.
|
|
|
|
bool fCompressed;
|
|
|
|
|
|
|
|
// The actual byte data
|
|
|
|
unsigned char vch[32];
|
|
|
|
|
|
|
|
// Check whether the 32-byte array pointed to be vch is valid keydata.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool static Check(const unsigned char* vch);
|
2011-11-21 02:46:28 +01:00
|
|
|
|
2014-09-19 19:21:46 +02:00
|
|
|
public:
|
2013-05-01 06:52:05 +02:00
|
|
|
// Construct an invalid private key.
|
2014-09-19 19:21:46 +02:00
|
|
|
CKey() : fValid(false), fCompressed(false)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
LockObject(vch);
|
|
|
|
}
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Copy constructor. This is necessary because of memlocking.
|
2014-09-19 19:21:46 +02:00
|
|
|
CKey(const CKey& secret) : fValid(secret.fValid), fCompressed(secret.fCompressed)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
LockObject(vch);
|
|
|
|
memcpy(vch, secret.vch, sizeof(vch));
|
|
|
|
}
|
2011-11-21 02:46:28 +01:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Destructor (again necessary because of memlocking).
|
2014-09-19 19:21:46 +02:00
|
|
|
~CKey()
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
UnlockObject(vch);
|
|
|
|
}
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2014-09-19 19:21:46 +02:00
|
|
|
friend bool operator==(const CKey& a, const CKey& b)
|
|
|
|
{
|
2013-10-28 11:20:26 +01:00
|
|
|
return a.fCompressed == b.fCompressed && a.size() == b.size() &&
|
|
|
|
memcmp(&a.vch[0], &b.vch[0], a.size()) == 0;
|
2013-07-15 01:05:25 +02:00
|
|
|
}
|
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Initialize using begin and end iterators to byte data.
|
2014-09-19 19:21:46 +02:00
|
|
|
template <typename T>
|
|
|
|
void Set(const T pbegin, const T pend, bool fCompressedIn)
|
|
|
|
{
|
2013-05-01 06:52:05 +02:00
|
|
|
if (pend - pbegin != 32) {
|
|
|
|
fValid = false;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (Check(&pbegin[0])) {
|
|
|
|
memcpy(vch, (unsigned char*)&pbegin[0], 32);
|
|
|
|
fValid = true;
|
|
|
|
fCompressed = fCompressedIn;
|
|
|
|
} else {
|
|
|
|
fValid = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Simple read-only vector-like interface.
|
|
|
|
unsigned int size() const { return (fValid ? 32 : 0); }
|
2014-09-19 19:21:46 +02:00
|
|
|
const unsigned char* begin() const { return vch; }
|
|
|
|
const unsigned char* end() const { return vch + size(); }
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Check whether this private key is valid.
|
|
|
|
bool IsValid() const { return fValid; }
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Check whether the public key corresponding to this private key is (to be) compressed.
|
|
|
|
bool IsCompressed() const { return fCompressed; }
|
2011-06-25 14:57:32 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Initialize from a CPrivKey (serialized OpenSSL private key data).
|
2014-09-19 19:21:46 +02:00
|
|
|
bool SetPrivKey(const CPrivKey& vchPrivKey, bool fCompressed);
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Generate a new private key using a cryptographic PRNG.
|
2012-05-16 18:36:38 +02:00
|
|
|
void MakeNewKey(bool fCompressed);
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Convert the private key to a CPrivKey (serialized OpenSSL private key data).
|
|
|
|
// This is expensive.
|
2012-05-16 18:36:38 +02:00
|
|
|
CPrivKey GetPrivKey() const;
|
2013-05-01 06:52:05 +02:00
|
|
|
|
|
|
|
// Compute the public key from a private key.
|
|
|
|
// This is expensive.
|
2012-05-14 19:07:52 +02:00
|
|
|
CPubKey GetPubKey() const;
|
2011-06-25 14:57:32 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Create a DER-serialized signature.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool Sign(const uint256& hash, std::vector<unsigned char>& vchSig) const;
|
2010-07-14 17:54:31 +02:00
|
|
|
|
2013-05-01 06:52:05 +02:00
|
|
|
// Create a compact signature (65 bytes), which allows reconstructing the used public key.
|
2011-11-07 00:05:42 +01:00
|
|
|
// The format is one header byte, followed by two times 32 bytes for the serialized r and s values.
|
|
|
|
// The header byte: 0x1B = first key with even y, 0x1C = first key with odd y,
|
2013-05-01 06:52:05 +02:00
|
|
|
// 0x1D = second key with even y, 0x1E = second key with odd y,
|
|
|
|
// add 0x04 for compressed keys.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool SignCompact(const uint256& hash, std::vector<unsigned char>& vchSig) const;
|
2013-07-15 01:05:25 +02:00
|
|
|
|
|
|
|
// Derive BIP32 child key.
|
|
|
|
bool Derive(CKey& keyChild, unsigned char ccChild[32], unsigned int nChild, const unsigned char cc[32]) const;
|
2013-10-28 11:20:26 +01:00
|
|
|
|
2013-08-29 08:53:26 +02:00
|
|
|
// Load private key and check that public key matches.
|
2014-09-19 19:21:46 +02:00
|
|
|
bool Load(CPrivKey& privkey, CPubKey& vchPubKey, bool fSkipCheck);
|
2014-02-07 02:19:48 +01:00
|
|
|
|
|
|
|
// Check whether an element of a signature (r or s) is valid.
|
2014-09-19 19:21:46 +02:00
|
|
|
static bool CheckSignatureElement(const unsigned char* vch, int len, bool half);
|
2013-07-15 01:05:25 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
struct CExtPubKey {
|
|
|
|
unsigned char nDepth;
|
|
|
|
unsigned char vchFingerprint[4];
|
|
|
|
unsigned int nChild;
|
|
|
|
unsigned char vchChainCode[32];
|
|
|
|
CPubKey pubkey;
|
|
|
|
|
2014-09-19 19:21:46 +02:00
|
|
|
friend bool operator==(const CExtPubKey& a, const CExtPubKey& b)
|
|
|
|
{
|
2013-07-15 01:05:25 +02:00
|
|
|
return a.nDepth == b.nDepth && memcmp(&a.vchFingerprint[0], &b.vchFingerprint[0], 4) == 0 && a.nChild == b.nChild &&
|
|
|
|
memcmp(&a.vchChainCode[0], &b.vchChainCode[0], 32) == 0 && a.pubkey == b.pubkey;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Encode(unsigned char code[74]) const;
|
|
|
|
void Decode(const unsigned char code[74]);
|
2014-09-19 19:21:46 +02:00
|
|
|
bool Derive(CExtPubKey& out, unsigned int nChild) const;
|
2013-07-15 01:05:25 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
struct CExtKey {
|
|
|
|
unsigned char nDepth;
|
|
|
|
unsigned char vchFingerprint[4];
|
|
|
|
unsigned int nChild;
|
|
|
|
unsigned char vchChainCode[32];
|
|
|
|
CKey key;
|
|
|
|
|
2014-09-19 19:21:46 +02:00
|
|
|
friend bool operator==(const CExtKey& a, const CExtKey& b)
|
|
|
|
{
|
2013-07-15 01:05:25 +02:00
|
|
|
return a.nDepth == b.nDepth && memcmp(&a.vchFingerprint[0], &b.vchFingerprint[0], 4) == 0 && a.nChild == b.nChild &&
|
|
|
|
memcmp(&a.vchChainCode[0], &b.vchChainCode[0], 32) == 0 && a.key == b.key;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Encode(unsigned char code[74]) const;
|
|
|
|
void Decode(const unsigned char code[74]);
|
2014-09-19 19:21:46 +02:00
|
|
|
bool Derive(CExtKey& out, unsigned int nChild) const;
|
2013-07-15 01:05:25 +02:00
|
|
|
CExtPubKey Neuter() const;
|
2014-09-19 19:21:46 +02:00
|
|
|
void SetMaster(const unsigned char* seed, unsigned int nSeedLen);
|
2010-07-14 17:54:31 +02:00
|
|
|
};
|
2011-05-15 09:11:04 +02:00
|
|
|
|
2014-06-03 01:21:03 +02:00
|
|
|
/** Check that required EC support is available at runtime */
|
|
|
|
bool ECC_InitSanityCheck(void);
|
|
|
|
|
2014-08-28 22:21:03 +02:00
|
|
|
#endif // BITCOIN_KEY_H
|