-
Notifications
You must be signed in to change notification settings - Fork 15
/
Copy pathsecp256k1.nr
88 lines (70 loc) · 2.77 KB
/
secp256k1.nr
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
use dep::std;
use dep::array_helpers;
pub struct PubKey {
pub_x: [u8; 32],
pub_y: [u8; 32],
}
fn split_uncompressed_pub_key(
pub_key: [u8; 65]
) -> ([u8; 32], [u8; 32]) {
let mut pub_key_x: [u8; 32] = [0; 32];
let mut pub_key_y: [u8; 32] = [0; 32];
for i in 0..32 {
pub_key_x[i] = pub_key[i + 1];
pub_key_y[i] = pub_key[i + 32 + 1];
};
(pub_key_x, pub_key_y)
}
impl PubKey {
pub fn from_xy(pub_x: [u8; 32], pub_y: [u8; 32]) -> PubKey {
PubKey {
pub_x,
pub_y,
}
}
pub fn from_unified(pub_key: [u8; 64]) -> PubKey {
let (key_x, key_y) = array_helpers::split_u8_64(pub_key);
PubKey {
pub_x: key_x,
pub_y: key_y,
}
}
pub fn from_uncompressed(pub_key: [u8; 65]) -> PubKey {
assert(pub_key[0] == 0x04);
let (key_x, key_y) = split_uncompressed_pub_key(pub_key);
PubKey {
pub_x: key_x,
pub_y: key_y,
}
}
pub fn verify_sig(self, signature: [u8; 64], hashed_message: [u8; 32]) -> bool {
std::ecdsa_secp256k1::verify_signature(self.pub_x, self.pub_y, signature, hashed_message)
}
pub fn to_eth_address(self) -> Field {
let pub_key = array_helpers::u8_32_to_u8_64(self.pub_x, self.pub_y);
let hashed_pub_key = std::hash::keccak256(pub_key, 64);
let mut addr: Field = 0;
for i in 0..20 {
// shift left by 8 and add the new value
addr = (addr * 256) + hashed_pub_key[i + 12] as Field;
}
addr
}
fn ecrecover(
self,
signature: [u8; 64],
hashed_message: [u8; 32]
) -> Field {
assert(self.verify_sig(signature, hashed_message));
self.to_eth_address()
}
}
#[test]
fn test_ecrecover_via_key() {
let pub_key_x = [131, 24, 83, 91, 84, 16, 93, 74, 122, 174, 96, 192, 143, 196, 95, 150, 135, 24, 27, 79, 223, 198, 37, 189, 26, 117, 63, 167, 57, 127, 237, 117];
let pub_key_y = [53, 71, 241, 28, 168, 105, 102, 70, 242, 243, 172, 176, 142, 49, 1, 106, 250, 194, 62, 99, 12, 93, 17, 245, 159, 97, 254, 245, 123, 13, 42, 165];
let signature = [57, 17, 112, 239, 241, 30, 64, 157, 170, 50, 85, 145, 156, 69, 226, 85, 147, 164, 10, 82, 71, 93, 42, 132, 200, 220, 161, 255, 95, 241, 211, 141, 81, 7, 150, 25, 25, 27, 162, 213, 80, 61, 12, 170, 50, 4, 154, 203, 252, 229, 119, 29, 202, 153, 50, 25, 126, 145, 245, 23, 136, 75, 29, 177];
let hashed_message = [13, 82, 120, 60, 76, 186, 215, 235, 175, 126, 185, 67, 252, 100, 143, 82, 130, 165, 32, 112, 68, 47, 193, 141, 141, 209, 109, 219, 47, 203, 175, 102];
let key = PubKey::from_xy(pub_key_x, pub_key_y);
assert(key.ecrecover(signature, hashed_message) == 0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266);
}