module Tapyrus::Secp256k1::Ruby
secp256 module using ecdsa gem github.com/DavidEGrayson/ruby_ecdsa
Public Class Methods
Public Instance Methods
generate tapyrus key object
# File lib/tapyrus/secp256k1/ruby.rb, line 18 def generate_key(compressed: true) privkey, pubkey = generate_key_pair(compressed: compressed) Tapyrus::Key.new(priv_key: privkey, pubkey: pubkey, compressed: compressed) end
generate ec private key and public key
# File lib/tapyrus/secp256k1/ruby.rb, line 9 def generate_key_pair(compressed: true) private_key = 1 + SecureRandom.random_number(GROUP.order - 1) public_key = GROUP.generator.multiply_by_scalar(private_key) privkey = ECDSA::Format::IntegerOctetString.encode(private_key, 32) pubkey = public_key.to_hex(compressed) [privkey.bth, pubkey] end
# File lib/tapyrus/secp256k1/ruby.rb, line 23 def generate_pubkey(privkey, compressed: true) public_key = ECDSA::Group::Secp256k1.generator.multiply_by_scalar(privkey.to_i(16)) public_key.to_hex(compressed) end
validate whether this is a valid public key (more expensive than IsValid()) @param [String] pubkey public key with hex format. @param [Boolean] allow_hybrid whether support hybrid public key. @return [Boolean] If valid public key return true, otherwise false.
# File lib/tapyrus/secp256k1/ruby.rb, line 67 def parse_ec_pubkey?(pubkey, allow_hybrid = false) begin point = ECDSA::Format::PointOctetString.decode(pubkey.htb, ECDSA::Group::Secp256k1, allow_hybrid: allow_hybrid) ECDSA::Group::Secp256k1.valid_public_key?(point) rescue ECDSA::Format::DecodeError false end end
if pubkey
is hybrid public key format, it convert uncompressed format. lists.linuxfoundation.org/pipermail/bitcoin-dev/2012-June/001578.html
# File lib/tapyrus/secp256k1/ruby.rb, line 79 def repack_pubkey(pubkey) p = pubkey.htb case p[0] when "\x06", "\x07" p[0] = "\x04" p else pubkey.htb end end
sign data. @param [String] data a data to be signed with binary format @param [String] privkey a private key using sign @return [String] signature data with binary format
# File lib/tapyrus/secp256k1/ruby.rb, line 32 def sign_data(data, privkey, extra_entropy, algo: :ecdsa) case algo when :ecdsa sign_ecdsa(data, privkey, extra_entropy) when :schnorr Schnorr.sign(data, privkey.to_i(16)).encode else nil end end
# File lib/tapyrus/secp256k1/ruby.rb, line 90 def sign_ecdsa(data, privkey, extra_entropy) privkey = privkey.htb private_key = ECDSA::Format::IntegerOctetString.decode(privkey) extra_entropy ||= '' nonce = RFC6979.generate_rfc6979_nonce(privkey + data, extra_entropy) # port form ecdsa gem. r_point = GROUP.new_point(nonce) point_field = ECDSA::PrimeField.new(GROUP.order) r = point_field.mod(r_point.x) return nil if r.zero? e = ECDSA.normalize_digest(data, GROUP.bit_length) s = point_field.mod(point_field.inverse(nonce) * (e + r * private_key)) if s > (GROUP.order / 2) # convert low-s s = GROUP.order - s end return nil if s.zero? signature = ECDSA::Signature.new(r, s).to_der public_key = Tapyrus::Key.new(priv_key: privkey.bth).pubkey raise 'Creation of signature failed.' unless Tapyrus::Secp256k1::Ruby.verify_sig(data, signature, public_key) signature end
# File lib/tapyrus/secp256k1/ruby.rb, line 119 def verify_ecdsa(digest, sig, pubkey) begin k = ECDSA::Format::PointOctetString.decode(repack_pubkey(pubkey), GROUP) signature = ECDSA::Format::SignatureDerString.decode(sig) ECDSA.valid_signature?(k, digest, signature) rescue Exception false end end
verify signature using public key @param [String] digest a SHA-256 message digest with binary format @param [String] sig a signature for data
with binary format @param [String] pubkey a public key corresponding to the private key used for sign @return [Boolean] verify result
# File lib/tapyrus/secp256k1/ruby.rb, line 48 def verify_sig(digest, sig, pubkey, algo: :ecdsa) case algo when :ecdsa verify_ecdsa(digest, sig, pubkey) when :schnorr Schnorr.valid_sig?(digest, sig, pubkey.htb) else false end end