Class: Tapyrus::Key
Overview
tapyrus key class
Constant Summary collapse
- PUBLIC_KEY_SIZE =
65- COMPRESSED_PUBLIC_KEY_SIZE =
33- SIGNATURE_SIZE =
72- COMPACT_SIGNATURE_SIZE =
65- SIG_ALGO =
[:ecdsa, :schnorr]
- TYPES =
{uncompressed: 0x00, compressed: 0x01, p2pkh: 0x10, p2wpkh: 0x11, p2wpkh_p2sh: 0x12}
- MIN_PRIV_KEY_MOD_ORDER =
0x01- MAX_PRIV_KEY_MOD_ORDER =
Order of secp256k1’s generator minus 1.
ECDSA::Group::Secp256k1.order - 1
Instance Attribute Summary collapse
-
#key_type ⇒ Object
Returns the value of attribute key_type.
-
#priv_key ⇒ Object
Returns the value of attribute priv_key.
-
#pubkey ⇒ Object
Returns the value of attribute pubkey.
-
#secp256k1_module ⇒ Object
readonly
Returns the value of attribute secp256k1_module.
Class Method Summary collapse
-
.compress_or_uncompress_pubkey?(pubkey) ⇒ Boolean
check
pubkey(hex) is compress or uncompress pubkey. -
.compress_pubkey?(pubkey) ⇒ Boolean
check
pubkey(hex) is compress pubkey. -
.from_wif(wif) ⇒ Object
import private key from wif format en.bitcoin.it/wiki/Wallet_import_format.
-
.generate(key_type = ) ⇒ Object
generate key pair.
-
.low_signature?(sig) ⇒ Boolean
check
sigis low. -
.valid_signature_encoding?(sig, data_sig = false) ⇒ Boolean
check
sigis correct der encoding.
Instance Method Summary collapse
- #compressed? ⇒ Boolean
-
#fully_valid_pubkey?(allow_hybrid = false) ⇒ Boolean
fully validate whether this is a valid public key (more expensive than IsValid()).
-
#hash160 ⇒ Object
get hash160 public key.
-
#initialize(priv_key: nil, pubkey: nil, key_type: nil, compressed: true, allow_hybrid: false) ⇒ Tapyrus::Key
constructor
initialize private key.
-
#sign(data, low_r = true, extra_entropy = nil, algo: :ecdsa) ⇒ String
sign
datawith private key. - #to_p2pkh ⇒ Object deprecated Deprecated.
-
#to_point ⇒ ECDSA::Point
generate pubkey ec point.
-
#to_wif ⇒ Object
export private key with wif format.
-
#verify(sig, origin, algo: :ecdsa) ⇒ Boolean
verify signature using public key.
Constructor Details
#initialize(priv_key: nil, pubkey: nil, key_type: nil, compressed: true, allow_hybrid: false) ⇒ Tapyrus::Key
initialize private key
33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 |
# File 'lib/tapyrus/key.rb', line 33 def initialize(priv_key: nil, pubkey: nil, key_type: nil, compressed: true, allow_hybrid: false) puts "[Warning] Use key_type parameter instead of compressed. compressed parameter removed in the future." if key_type.nil? && !compressed.nil? && pubkey.nil? if key_type @key_type = key_type compressed = @key_type != TYPES[:uncompressed] else @key_type = compressed ? TYPES[:compressed] : TYPES[:uncompressed] end @secp256k1_module = Tapyrus.secp_impl @priv_key = priv_key if @priv_key raise ArgumentError, Errors::Messages::INVALID_PRIV_KEY unless validate_private_key_range(@priv_key) end if pubkey @pubkey = pubkey else @pubkey = generate_pubkey(priv_key, compressed: compressed) if priv_key end raise ArgumentError, Errors::Messages::INVALID_PUBLIC_KEY unless fully_valid_pubkey?(allow_hybrid) end |
Instance Attribute Details
#key_type ⇒ Object
Returns the value of attribute key_type.
18 19 20 |
# File 'lib/tapyrus/key.rb', line 18 def key_type @key_type end |
#priv_key ⇒ Object
Returns the value of attribute priv_key.
16 17 18 |
# File 'lib/tapyrus/key.rb', line 16 def priv_key @priv_key end |
#pubkey ⇒ Object
Returns the value of attribute pubkey.
17 18 19 |
# File 'lib/tapyrus/key.rb', line 17 def pubkey @pubkey end |
#secp256k1_module ⇒ Object (readonly)
Returns the value of attribute secp256k1_module.
19 20 21 |
# File 'lib/tapyrus/key.rb', line 19 def secp256k1_module @secp256k1_module end |
Class Method Details
.compress_or_uncompress_pubkey?(pubkey) ⇒ Boolean
check pubkey (hex) is compress or uncompress pubkey.
149 150 151 152 153 154 155 156 157 158 159 160 161 |
# File 'lib/tapyrus/key.rb', line 149 def self.compress_or_uncompress_pubkey?(pubkey) p = pubkey.htb return false if p.bytesize < COMPRESSED_PUBLIC_KEY_SIZE case p[0] when "\x04" return false unless p.bytesize == PUBLIC_KEY_SIZE when "\x02", "\x03" return false unless p.bytesize == COMPRESSED_PUBLIC_KEY_SIZE else return false end true end |
.compress_pubkey?(pubkey) ⇒ Boolean
check pubkey (hex) is compress pubkey.
164 165 166 167 |
# File 'lib/tapyrus/key.rb', line 164 def self.compress_pubkey?(pubkey) p = pubkey.htb p.bytesize == COMPRESSED_PUBLIC_KEY_SIZE && ["\x02", "\x03"].include?(p[0]) end |
.from_wif(wif) ⇒ Object
import private key from wif format en.bitcoin.it/wiki/Wallet_import_format
62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 |
# File 'lib/tapyrus/key.rb', line 62 def self.from_wif(wif) hex = Base58.decode(wif) raise ArgumentError, 'data is too short' if hex.htb.bytesize < 4 version = hex[0..1] data = hex[2...-8].htb checksum = hex[-8..-1] raise ArgumentError, 'invalid version' unless version == Tapyrus.chain_params.privkey_version raise ArgumentError, Errors::Messages::INVALID_CHECKSUM unless Tapyrus.calc_checksum(version + data.bth) == checksum key_len = data.bytesize if key_len == COMPRESSED_PUBLIC_KEY_SIZE && data[-1].unpack('C').first == 1 key_type = TYPES[:compressed] data = data[0..-2] elsif key_len == 32 key_type = TYPES[:uncompressed] else raise ArgumentError, 'Wrong number of bytes for a private key, not 32 or 33' end new(priv_key: data.bth, key_type: key_type) end |
.generate(key_type = ) ⇒ Object
generate key pair
55 56 57 58 |
# File 'lib/tapyrus/key.rb', line 55 def self.generate(key_type = TYPES[:compressed]) priv_key, pubkey = Tapyrus.secp_impl.generate_key_pair new(priv_key: priv_key, pubkey: pubkey, key_type: key_type) end |
.low_signature?(sig) ⇒ Boolean
check sig is low.
170 171 172 173 174 175 176 177 178 179 180 181 182 |
# File 'lib/tapyrus/key.rb', line 170 def self.low_signature?(sig) s = sig.unpack('C*') len_r = s[3] len_s = s[5 + len_r] val_s = s.slice(6 + len_r, len_s) max_mod_half_order = [ 0x7f,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0x5d,0x57,0x6e,0x73,0x57,0xa4,0x50,0x1d, 0xdf,0xe9,0x2f,0x46,0x68,0x1b,0x20,0xa0] compare_big_endian(val_s, [0]) > 0 && compare_big_endian(val_s, max_mod_half_order) <= 0 end |
.valid_signature_encoding?(sig, data_sig = false) ⇒ Boolean
check sig is correct der encoding. This function is consensus-critical since BIP66.
190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 |
# File 'lib/tapyrus/key.rb', line 190 def self.valid_signature_encoding?(sig, data_sig = false) num_parts = data_sig ? 8 : 9 size = data_sig ? 72 : 73 return false if sig.bytesize < num_parts || sig.bytesize > size # Minimum and maximum size check s = sig.unpack('C*') return false if s[0] != 0x30 || s[1] != s.size - (data_sig ? 2 : 3) # A signature is of type 0x30 (compound). Make sure the length covers the entire signature. len_r = s[3] return false if 5 + len_r >= s.size # Make sure the length of the S element is still inside the signature. len_s = s[5 + len_r] return false unless len_r + len_s + (data_sig ? 6 : 7) == s.size #Verify that the length of the signature matches the sum of the length of the elements. return false unless s[2] == 0x02 # Check whether the R element is an integer. return false if len_r == 0 # Zero-length integers are not allowed for R. return false unless s[4] & 0x80 == 0 # Negative numbers are not allowed for R. # Null bytes at the start of R are not allowed, unless R would otherwise be interpreted as a negative number. return false if len_r > 1 && (s[4] == 0x00) && (s[5] & 0x80 == 0) return false unless s[len_r + 4] == 0x02 # Check whether the S element is an integer. return false if len_s == 0 # Zero-length integers are not allowed for S. return false unless (s[len_r + 6] & 0x80) == 0 # Negative numbers are not allowed for S. # Null bytes at the start of S are not allowed, unless S would otherwise be interpreted as a negative number. return false if len_s > 1 && (s[len_r + 6] == 0x00) && (s[len_r + 7] & 0x80 == 0) true end |
Instance Method Details
#compressed? ⇒ Boolean
136 137 138 |
# File 'lib/tapyrus/key.rb', line 136 def compressed? key_type != TYPES[:uncompressed] end |
#fully_valid_pubkey?(allow_hybrid = false) ⇒ Boolean
fully validate whether this is a valid public key (more expensive than IsValid())
227 228 229 230 231 232 233 234 235 |
# File 'lib/tapyrus/key.rb', line 227 def fully_valid_pubkey?(allow_hybrid = false) return false unless valid_pubkey? begin point = ECDSA::Format::PointOctetString.decode(pubkey.htb, ECDSA::Group::Secp256k1, allow_hybrid: allow_hybrid) ECDSA::Group::Secp256k1.valid_public_key?(point) rescue ECDSA::Format::DecodeError false end end |
#hash160 ⇒ Object
get hash160 public key.
126 127 128 |
# File 'lib/tapyrus/key.rb', line 126 def hash160 Tapyrus.hash160(pubkey) end |
#sign(data, low_r = true, extra_entropy = nil, algo: :ecdsa) ⇒ String
sign data with private key
97 98 99 100 101 102 103 104 |
# File 'lib/tapyrus/key.rb', line 97 def sign(data, low_r = true, extra_entropy = nil, algo: :ecdsa) raise ArgumentError, "Unsupported algorithm has been specified." unless SIG_ALGO.include?(algo) if algo == :ecdsa sign_ecdsa(data, low_r, extra_entropy) else sign_schnorr(data) end end |
#to_p2pkh ⇒ Object
get pay to pubkey hash address
132 133 134 |
# File 'lib/tapyrus/key.rb', line 132 def to_p2pkh Tapyrus::Script.to_p2pkh(hash160).addresses.first end |
#to_point ⇒ ECDSA::Point
generate pubkey ec point
142 143 144 145 146 |
# File 'lib/tapyrus/key.rb', line 142 def to_point p = pubkey p ||= generate_pubkey(priv_key, compressed: compressed) ECDSA::Format::PointOctetString.decode(p.htb, Tapyrus::Secp256k1::GROUP) end |
#to_wif ⇒ Object
export private key with wif format
83 84 85 86 87 88 89 |
# File 'lib/tapyrus/key.rb', line 83 def to_wif version = Tapyrus.chain_params.privkey_version hex = version + priv_key hex += '01' if compressed? hex += Tapyrus.calc_checksum(hex) Base58.encode(hex) end |
#verify(sig, origin, algo: :ecdsa) ⇒ Boolean
verify signature using public key
111 112 113 114 115 116 117 118 119 120 121 122 123 |
# File 'lib/tapyrus/key.rb', line 111 def verify(sig, origin, algo: :ecdsa) return false unless valid_pubkey? begin raise ArgumentError, "Unsupported algorithm has been specified." unless SIG_ALGO.include?(algo) if algo == :ecdsa verify_ecdsa_sig(sig, origin) else verify_schnorr_sig(sig, origin) end rescue Exception false end end |