#include "uint256.h"
#include "hash.h"
#include "bignum.h"
-#include "ies.h"
#include <openssl/ec.h> // for EC_KEY definition
+#include <openssl/obj_mac.h>
// secp160k1
// const unsigned int PRIVATE_KEY_SIZE = 192;
CScriptID(const uint160 &in) : uint160(in) { }
};
-/** An encapsulated public key. */
-class CPubKey {
+/** An encapsulated OpenSSL Elliptic Curve key (public) */
+class CPubKey
+{
private:
- std::vector<unsigned char> vchPubKey;
- friend class CKey;
+
+ /**
+ * Just store the serialized data.
+ * Its length can very cheaply be computed from the first byte.
+ */
+ unsigned char vbytes[65];
+
+ //! Compute the length of a pubkey with a given first byte.
+ unsigned int static GetLen(unsigned char chHeader)
+ {
+ if (chHeader == 2 || chHeader == 3)
+ return 33;
+ if (chHeader == 4 || chHeader == 6 || chHeader == 7)
+ return 65;
+ return 0;
+ }
+
+ // Set this key data to be invalid
+ void Invalidate()
+ {
+ vbytes[0] = 0xFF;
+ }
public:
- CPubKey() { }
- CPubKey(const std::vector<unsigned char> &vchPubKeyIn) : vchPubKey(vchPubKeyIn) { }
- friend bool operator==(const CPubKey &a, const CPubKey &b) { return a.vchPubKey == b.vchPubKey; }
- friend bool operator!=(const CPubKey &a, const CPubKey &b) { return a.vchPubKey != b.vchPubKey; }
- friend bool operator<(const CPubKey &a, const CPubKey &b) { return a.vchPubKey < b.vchPubKey; }
+ // Construct an invalid public key.
+ CPubKey()
+ {
+ Invalidate();
+ }
- IMPLEMENT_SERIALIZE(
- READWRITE(vchPubKey);
- )
+ // Initialize a public key using begin/end iterators to byte data.
+ template <typename T>
+ void Set(const T pbegin, const T pend)
+ {
+ int len = pend == pbegin ? 0 : GetLen(pbegin[0]);
+ if (len && len == (pend - pbegin))
+ memcpy(vbytes, (unsigned char*)&pbegin[0], len);
+ else
+ Invalidate();
+ }
- CKeyID GetID() const {
- return CKeyID(Hash160(vchPubKey));
+ void Set(const std::vector<unsigned char>& vch)
+ {
+ Set(vch.begin(), vch.end());
}
- uint256 GetHash() const {
- return Hash(vchPubKey.begin(), vchPubKey.end());
+ template <typename T>
+ CPubKey(const T pbegin, const T pend)
+ {
+ Set(pbegin, pend);
}
- bool IsValid() const {
- return vchPubKey.size() == 33 || vchPubKey.size() == 65;
+ CPubKey(const std::vector<unsigned char>& vch)
+ {
+ Set(vch.begin(), vch.end());
}
- bool IsCompressed() const {
- return vchPubKey.size() == 33;
+ // Read-only vector-like interface to the data.
+ unsigned int size() const { return GetLen(vbytes[0]); }
+ const unsigned char* begin() const { return vbytes; }
+ const unsigned char* end() const { return vbytes + size(); }
+ const unsigned char& operator[](unsigned int pos) const { return vbytes[pos]; }
+
+ friend bool operator==(const CPubKey& a, const CPubKey& b) { return a.vbytes[0] == b.vbytes[0] && memcmp(a.vbytes, b.vbytes, a.size()) == 0; }
+ friend bool operator!=(const CPubKey& a, const CPubKey& b) { return !(a == b); }
+ friend bool operator<(const CPubKey& a, const CPubKey& b) { return a.vbytes[0] < b.vbytes[0] || (a.vbytes[0] == b.vbytes[0] && memcmp(a.vbytes, b.vbytes, a.size()) < 0); }
+
+ //! Implement serialization, as if this was a byte vector.
+ unsigned int GetSerializeSize(int nType, int nVersion) const
+ {
+ return size() + 1;
+ }
+ template <typename Stream>
+ void Serialize(Stream& s, int nType, int nVersion) const
+ {
+ unsigned int len = size();
+ ::WriteCompactSize(s, len);
+ s.write((char*)vbytes, len);
+ }
+ template <typename Stream>
+ void Unserialize(Stream& s, int nType, int nVersion)
+ {
+ unsigned int len = ::ReadCompactSize(s);
+ if (len <= 65) {
+ s.read((char*)vbytes, len);
+ } else {
+ // invalid pubkey, skip available data
+ char dummy;
+ while (len--)
+ s.read(&dummy, 1);
+ Invalidate();
+ }
}
- std::vector<unsigned char> Raw() const {
- return vchPubKey;
+ CKeyID GetID() const
+ {
+ return CKeyID(Hash160(vbytes, vbytes + size()));
}
- // Encrypt data
- void EncryptData(const std::vector<unsigned char>& data, std::vector<unsigned char>& encrypted);
-};
+ uint256 GetHash() const
+ {
+ return Hash(vbytes, vbytes + size());
+ }
+
+ /*
+ * Check syntactic correctness.
+ *
+ * Note that this is consensus critical as CheckSig() calls it!
+ */
+ bool IsValid() const
+ {
+ return size() > 0;
+ }
+
+ //! fully validate whether this is a valid public key (more expensive than IsValid())
+ bool IsFullyValid() const
+ {
+ const unsigned char* pbegin = &vbytes[0];
+ EC_KEY *pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
+ if (o2i_ECPublicKey(&pkey, &pbegin, size()))
+ {
+ EC_KEY_free(pkey);
+ return true;
+ }
+ return false;
+ }
+
+ //! Check whether this is a compressed public key.
+ bool IsCompressed() const
+ {
+ return size() == 33;
+ }
+
+ bool Verify(const uint256& hash, const std::vector<unsigned char>& vchSig) const;
+ bool VerifyCompact(uint256 hash, const std::vector<unsigned char>& vchSig);
+
+ bool SetCompactSignature(uint256 hash, const std::vector<unsigned char>& vchSig);
+ // Reserialize to DER
+ static bool ReserealizeSignature(std::vector<unsigned char>& vchSig);
+};
// secure_allocator is defined in allocators.h
// CPrivKey is a serialized private key, with all parameters included (279 bytes)
// CSecret is a serialization of just the secret parameter (32 bytes)
typedef std::vector<unsigned char, secure_allocator<unsigned char> > CSecret;
-/** An encapsulated OpenSSL Elliptic Curve key (public and/or private) */
+/** An encapsulated OpenSSL Elliptic Curve key (private) */
class CKey
{
protected:
EC_KEY* pkey;
bool fSet;
- bool fCompressedPubKey;
-
- void SetCompressedPubKey();
public:
bool IsNull() const;
bool IsCompressed() const;
+ void SetCompressedPubKey(bool fCompressed=true);
void MakeNewKey(bool fCompressed=true);
bool SetPrivKey(const CPrivKey& vchPrivKey);
bool SetSecret(const CSecret& vchSecret, bool fCompressed = true);
CSecret GetSecret(bool &fCompressed) const;
CSecret GetSecret() const;
CPrivKey GetPrivKey() const;
- bool SetPubKey(const CPubKey& vchPubKey);
CPubKey GetPubKey() const;
bool Sign(uint256 hash, std::vector<unsigned char>& vchSig);
// 0x1D = second key with even y, 0x1E = second key with odd y
bool SignCompact(uint256 hash, std::vector<unsigned char>& vchSig);
- // reconstruct public key from a compact signature
- // This is only slightly more CPU intensive than just verifying it.
- // If this function succeeds, the recovered public key is guaranteed to be valid
- // (the signature is a valid signature of the given data for that key)
- bool SetCompactSignature(uint256 hash, const std::vector<unsigned char>& vchSig);
-
- bool Verify(uint256 hash, const std::vector<unsigned char>& vchSig);
-
- // Verify a compact signature
- bool VerifyCompact(uint256 hash, const std::vector<unsigned char>& vchSig);
-
bool IsValid();
// Check whether an element of a signature (r or s) is valid.
static bool CheckSignatureElement(const unsigned char *vch, int len, bool half);
-
- // Reserialize to DER
- static bool ReserealizeSignature(std::vector<unsigned char>& vchSig);
-
- // Encrypt data
- void EncryptData(const std::vector<unsigned char>& data, std::vector<unsigned char>& encrypted);
-
- // Decrypt data
- void DecryptData(const std::vector<unsigned char>& encrypted, std::vector<unsigned char>& data);
};
class CPoint
pubKeyL = mpk.pubKeyL;
pubKeyH = mpk.pubKeyH;
}
+ CMalleablePubKey(const std::vector<unsigned char> &vchPubKeyPair) { setvch(vchPubKeyPair); }
CMalleablePubKey(const std::string& strMalleablePubKey) { SetString(strMalleablePubKey); }
CMalleablePubKey(const CPubKey &pubKeyInL, const CPubKey &pubKeyInH) : pubKeyL(pubKeyInL), pubKeyH(pubKeyInH) { }