ethers.js/lib.esm/crypto/signing-key.js

100 lines
4.3 KiB
JavaScript
Raw Normal View History

2022-09-05 23:57:11 +03:00
import * as secp256k1 from "@noble/secp256k1";
2022-11-09 10:57:02 +03:00
import { concat, dataLength, getBytes, getBytesCopy, hexlify, toHex, assertArgument } from "../utils/index.js";
2022-09-05 23:57:11 +03:00
import { computeHmac } from "./hmac.js";
import { Signature } from "./signature.js";
//const N = BigInt("0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141");
// Make noble-secp256k1 sync
secp256k1.utils.hmacSha256Sync = function (key, ...messages) {
2022-09-16 05:58:45 +03:00
return getBytes(computeHmac("sha256", key, concat(messages)));
2022-09-05 23:57:11 +03:00
};
export class SigningKey {
#privateKey;
constructor(privateKey) {
2022-11-30 23:44:23 +03:00
assertArgument(dataLength(privateKey) === 32, "invalid private key", "privateKey", "[REDACTED]");
2022-09-05 23:57:11 +03:00
this.#privateKey = hexlify(privateKey);
}
get privateKey() { return this.#privateKey; }
get publicKey() { return SigningKey.computePublicKey(this.#privateKey); }
get compressedPublicKey() { return SigningKey.computePublicKey(this.#privateKey, true); }
sign(digest) {
2022-10-20 12:03:32 +03:00
assertArgument(dataLength(digest) === 32, "invalid digest length", "digest", digest);
2022-09-16 05:58:45 +03:00
const [sigDer, recid] = secp256k1.signSync(getBytesCopy(digest), getBytesCopy(this.#privateKey), {
2022-09-05 23:57:11 +03:00
recovered: true,
canonical: true
});
const sig = secp256k1.Signature.fromHex(sigDer);
return Signature.from({
r: toHex("0x" + sig.r.toString(16), 32),
s: toHex("0x" + sig.s.toString(16), 32),
v: (recid ? 0x1c : 0x1b)
2022-11-30 23:44:23 +03:00
});
2022-09-05 23:57:11 +03:00
}
computeShardSecret(other) {
const pubKey = SigningKey.computePublicKey(other);
2022-09-16 05:58:45 +03:00
return hexlify(secp256k1.getSharedSecret(getBytesCopy(this.#privateKey), pubKey));
2022-09-05 23:57:11 +03:00
}
static computePublicKey(key, compressed) {
2022-09-16 05:58:45 +03:00
let bytes = getBytes(key, "key");
2022-09-05 23:57:11 +03:00
if (bytes.length === 32) {
const pubKey = secp256k1.getPublicKey(bytes, !!compressed);
return hexlify(pubKey);
}
if (bytes.length === 64) {
const pub = new Uint8Array(65);
pub[0] = 0x04;
pub.set(bytes, 1);
bytes = pub;
}
const point = secp256k1.Point.fromHex(bytes);
return hexlify(point.toRawBytes(compressed));
}
static recoverPublicKey(digest, signature) {
2022-10-20 12:03:32 +03:00
assertArgument(dataLength(digest) === 32, "invalid digest length", "digest", digest);
2022-09-05 23:57:11 +03:00
const sig = Signature.from(signature);
2022-09-16 05:58:45 +03:00
const der = secp256k1.Signature.fromCompact(getBytesCopy(concat([sig.r, sig.s]))).toDERRawBytes();
const pubKey = secp256k1.recoverPublicKey(getBytesCopy(digest), der, sig.yParity);
2022-09-05 23:57:11 +03:00
if (pubKey != null) {
return hexlify(pubKey);
}
2022-11-09 10:57:02 +03:00
assertArgument(false, "invalid signautre for digest", "signature", signature);
2022-09-05 23:57:11 +03:00
}
static _addPoints(p0, p1, compressed) {
const pub0 = secp256k1.Point.fromHex(SigningKey.computePublicKey(p0).substring(2));
const pub1 = secp256k1.Point.fromHex(SigningKey.computePublicKey(p1).substring(2));
return "0x" + pub0.add(pub1).toHex(!!compressed);
}
}
/*
const key = new SigningKey("0x1234567890123456789012345678901234567890123456789012345678901234");
console.log(key);
console.log(key.sign("0x1234567890123456789012345678901234567890123456789012345678901234"));
{
const privKey = "0x1234567812345678123456781234567812345678123456781234567812345678";
const signingKey = new SigningKey(privKey);
console.log("0", signingKey, signingKey.publicKey, signingKey.publicKeyCompressed);
let pubKey = SigningKey.computePublicKey(privKey);
let pubKeyComp = SigningKey.computePublicKey(privKey, true);
let pubKeyRaw = "0x" + SigningKey.computePublicKey(privKey).substring(4);
console.log("A", pubKey, pubKeyComp);
let a = SigningKey.computePublicKey(pubKey);
let b = SigningKey.computePublicKey(pubKey, true);
console.log("B", a, b);
a = SigningKey.computePublicKey(pubKeyComp);
b = SigningKey.computePublicKey(pubKeyComp, true);
console.log("C", a, b);
a = SigningKey.computePublicKey(pubKeyRaw);
b = SigningKey.computePublicKey(pubKeyRaw, true);
console.log("D", a, b);
const digest = "0x1122334411223344112233441122334411223344112233441122334411223344";
const sig = signingKey.sign(digest);
console.log("SS", sig, sig.r, sig.s, sig.yParity);
console.log("R", SigningKey.recoverPublicKey(digest, sig));
}
*/
//# sourceMappingURL=signing-key.js.map