secp256k1mod.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. /*
  2. mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
  3. Copyright (C)2013-2025 The MMGen Project <mmgen@tuta.io>
  4. This program is free software: you can redistribute it and/or modify it under
  5. the terms of the GNU General Public License as published by the Free Software
  6. Foundation, either version 3 of the License, or (at your option) any later
  7. version.
  8. This program is distributed in the hope that it will be useful, but WITHOUT
  9. ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  10. FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  11. details.
  12. You should have received a copy of the GNU General Public License along with
  13. this program. If not, see <http://www.gnu.org/licenses/>.
  14. */
  15. /*
  16. NOTE: deprecated context flags SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY
  17. must be used for now instead of SECP256K1_CONTEXT_NONE (see libsecp256k1 CHANGELOG)
  18. for backward compatibility with libsecp256k1 <v0.2.0 (i.e. pre-bookworm distros).
  19. */
  20. #define PY_SSIZE_T_CLEAN
  21. #include <Python.h>
  22. #include <secp256k1.h>
  23. #include <secp256k1_recovery.h>
  24. #include "random.h"
  25. static secp256k1_context * create_context(
  26. const unsigned char randomize
  27. ) {
  28. secp256k1_context *ctx = secp256k1_context_create(
  29. SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY
  30. /* SECP256K1_CONTEXT_NONE */ /* see NOTE above */
  31. );
  32. if (randomize) {
  33. unsigned char buf[32];
  34. if (!fill_random(buf, sizeof(buf))) {
  35. printf("Failed to generate entropy\n");
  36. return NULL;
  37. }
  38. if (!secp256k1_context_randomize(ctx, buf)) {
  39. printf("Failed to randomize context\n");
  40. return NULL;
  41. }
  42. }
  43. return ctx;
  44. }
  45. static int privkey_check(
  46. const secp256k1_context * ctx,
  47. const unsigned char * privkey_bytes,
  48. const Py_ssize_t privkey_bytes_len,
  49. const char * desc
  50. ) {
  51. if (privkey_bytes_len != 32) {
  52. char buf[64 + strlen(desc)];
  53. sprintf(buf, "%s length not 32 bytes", desc);
  54. PyErr_SetString(PyExc_ValueError, buf);
  55. return 0;
  56. }
  57. if (secp256k1_ec_seckey_verify(ctx, privkey_bytes) != 1) {
  58. char buf[64 + strlen(desc)];
  59. sprintf(buf, "%s not in allowable range", desc);
  60. PyErr_SetString(PyExc_ValueError, buf);
  61. return 0;
  62. }
  63. return 1;
  64. }
  65. static int pubkey_parse_with_check(
  66. const secp256k1_context * ctx,
  67. secp256k1_pubkey * pubkey_ptr,
  68. const unsigned char * pubkey_bytes,
  69. const Py_ssize_t pubkey_bytes_len
  70. ) {
  71. if (ctx == NULL) {
  72. PyErr_SetString(PyExc_RuntimeError, "Context initialization failed");
  73. return 0;
  74. }
  75. if (pubkey_bytes_len == 33) {
  76. if (pubkey_bytes[0] != 3 && pubkey_bytes[0] != 2) {
  77. PyErr_SetString(
  78. PyExc_ValueError,
  79. "Invalid first byte for serialized compressed public key");
  80. return 0;
  81. }
  82. } else if (pubkey_bytes_len == 65) {
  83. if (pubkey_bytes[0] != 4) {
  84. PyErr_SetString(
  85. PyExc_ValueError,
  86. "Invalid first byte for serialized uncompressed public key");
  87. return 0;
  88. }
  89. } else {
  90. PyErr_SetString(PyExc_ValueError, "Serialized public key length not 33 or 65 bytes");
  91. return 0;
  92. }
  93. /* checks for point-at-infinity (via secp256k1_pubkey_save) */
  94. if (secp256k1_ec_pubkey_parse(ctx, pubkey_ptr, pubkey_bytes, pubkey_bytes_len) != 1) {
  95. PyErr_SetString(
  96. PyExc_ValueError,
  97. "Public key could not be parsed or encodes point-at-infinity");
  98. return 0;
  99. }
  100. return 1;
  101. }
  102. static PyObject * pubkey_gen(PyObject *self, PyObject *args) {
  103. const unsigned char * privkey_bytes;
  104. Py_ssize_t privkey_bytes_len;
  105. int compressed;
  106. if (!PyArg_ParseTuple(args, "y#i", &privkey_bytes, &privkey_bytes_len, &compressed)) {
  107. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  108. return NULL;
  109. }
  110. size_t pubkey_bytes_len = compressed == 1 ? 33 : 65;
  111. unsigned char pubkey_bytes[pubkey_bytes_len];
  112. secp256k1_pubkey pubkey;
  113. secp256k1_context *ctx = create_context(1);
  114. if (ctx == NULL) {
  115. PyErr_SetString(PyExc_RuntimeError, "Context initialization failed");
  116. return NULL;
  117. }
  118. if (!privkey_check(ctx, privkey_bytes, privkey_bytes_len, "Private key")) {
  119. return NULL;
  120. }
  121. if (secp256k1_ec_pubkey_create(ctx, &pubkey, privkey_bytes) != 1) {
  122. PyErr_SetString(PyExc_RuntimeError, "Public key creation failed");
  123. return NULL;
  124. }
  125. if (secp256k1_ec_pubkey_serialize(ctx, pubkey_bytes, &pubkey_bytes_len, &pubkey,
  126. compressed == 1 ? SECP256K1_EC_COMPRESSED : SECP256K1_EC_UNCOMPRESSED) != 1) {
  127. PyErr_SetString(PyExc_RuntimeError, "Public key serialization failed");
  128. return NULL;
  129. }
  130. return Py_BuildValue("y#", pubkey_bytes, pubkey_bytes_len);
  131. }
  132. static PyObject * pubkey_tweak_add(PyObject *self, PyObject *args) {
  133. const unsigned char * pubkey_bytes;
  134. const unsigned char * tweak_bytes;
  135. Py_ssize_t pubkey_bytes_len;
  136. Py_ssize_t tweak_bytes_len;
  137. if (!PyArg_ParseTuple(
  138. args,
  139. "y#y#",
  140. &pubkey_bytes,
  141. &pubkey_bytes_len,
  142. &tweak_bytes,
  143. &tweak_bytes_len)) {
  144. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  145. return NULL;
  146. }
  147. secp256k1_context *ctx = create_context(1);
  148. secp256k1_pubkey pubkey;
  149. if (!pubkey_parse_with_check(ctx, &pubkey, pubkey_bytes, pubkey_bytes_len)) {
  150. return NULL;
  151. }
  152. if (!privkey_check(ctx, tweak_bytes, tweak_bytes_len, "Tweak")) {
  153. return NULL;
  154. }
  155. /* checks for point-at-infinity (via secp256k1_pubkey_save) */
  156. if (secp256k1_ec_pubkey_tweak_add(ctx, &pubkey, tweak_bytes) != 1) {
  157. PyErr_SetString(
  158. PyExc_RuntimeError,
  159. "Adding public key points failed or result was point-at-infinity");
  160. return NULL;
  161. }
  162. unsigned char new_pubkey_bytes[pubkey_bytes_len];
  163. if (secp256k1_ec_pubkey_serialize(
  164. ctx,
  165. new_pubkey_bytes,
  166. (size_t*) &pubkey_bytes_len,
  167. &pubkey,
  168. pubkey_bytes_len == 33 ? SECP256K1_EC_COMPRESSED : SECP256K1_EC_UNCOMPRESSED) != 1) {
  169. PyErr_SetString(PyExc_RuntimeError, "Public key serialization failed");
  170. return NULL;
  171. }
  172. return Py_BuildValue("y#", new_pubkey_bytes, pubkey_bytes_len);
  173. }
  174. static PyObject * pubkey_check(PyObject *self, PyObject *args) {
  175. const unsigned char * pubkey_bytes;
  176. Py_ssize_t pubkey_bytes_len;
  177. if (!PyArg_ParseTuple(args, "y#", &pubkey_bytes, &pubkey_bytes_len)) {
  178. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  179. return NULL;
  180. }
  181. secp256k1_context *ctx = create_context(1);
  182. secp256k1_pubkey pubkey;
  183. if (!pubkey_parse_with_check(ctx, &pubkey, pubkey_bytes, pubkey_bytes_len)) {
  184. return NULL;
  185. }
  186. return Py_BuildValue("I", 1);
  187. }
  188. /*
  189. * returns 64-byte serialized signature (r + s) plus integer recovery ID in range 0-3
  190. */
  191. static PyObject * sign_msghash(PyObject *self, PyObject *args) {
  192. const unsigned char * msghash_bytes;
  193. const unsigned char * privkey_bytes;
  194. Py_ssize_t msghash_bytes_len;
  195. Py_ssize_t privkey_bytes_len;
  196. if (!PyArg_ParseTuple(
  197. args,
  198. "y#y#",
  199. &msghash_bytes,
  200. &msghash_bytes_len,
  201. &privkey_bytes,
  202. &privkey_bytes_len)) {
  203. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  204. return NULL;
  205. }
  206. if (msghash_bytes_len != 32) {
  207. PyErr_SetString(PyExc_RuntimeError, "Invalid message hash length (not 32 bytes)");
  208. return NULL;
  209. }
  210. secp256k1_context *ctx = create_context(1);
  211. if (!privkey_check(ctx, privkey_bytes, privkey_bytes_len, "Private key")) {
  212. return NULL;
  213. }
  214. secp256k1_ecdsa_recoverable_signature rsig;
  215. unsigned char rsig_serialized[65];
  216. int recid;
  217. if (!secp256k1_ecdsa_sign_recoverable(ctx, &rsig, msghash_bytes, privkey_bytes, NULL, NULL)) {
  218. PyErr_SetString(PyExc_ValueError, "Unable to sign message hash");
  219. return NULL;
  220. }
  221. if (!secp256k1_ecdsa_recoverable_signature_serialize_compact(ctx, rsig_serialized, &recid, &rsig)) {
  222. PyErr_SetString(PyExc_ValueError, "Unable to serialize signature");
  223. return NULL;
  224. }
  225. /* truncate serialized sig to 64 bytes */
  226. return Py_BuildValue("y#I", rsig_serialized, 64, recid);
  227. }
  228. static PyObject * verify_sig(PyObject *self, PyObject *args) {
  229. const unsigned char * sig_bytes;
  230. const unsigned char * msghash_bytes;
  231. const unsigned char * pubkey_bytes;
  232. Py_ssize_t sig_bytes_len;
  233. Py_ssize_t msghash_bytes_len;
  234. Py_ssize_t pubkey_bytes_len;
  235. if (!PyArg_ParseTuple(
  236. args,
  237. "y#y#y#",
  238. &sig_bytes,
  239. &sig_bytes_len,
  240. &msghash_bytes,
  241. &msghash_bytes_len,
  242. &pubkey_bytes,
  243. &pubkey_bytes_len)) {
  244. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  245. return NULL;
  246. }
  247. if (sig_bytes_len != 64) {
  248. PyErr_SetString(PyExc_RuntimeError, "Invalid signature length (not 64 bytes)");
  249. return NULL;
  250. }
  251. if (msghash_bytes_len != 32) {
  252. PyErr_SetString(PyExc_RuntimeError, "Invalid message hash length (not 32 bytes)");
  253. return NULL;
  254. }
  255. secp256k1_ecdsa_signature sig;
  256. secp256k1_pubkey pubkey;
  257. secp256k1_context *ctx = create_context(1);
  258. if (!secp256k1_ecdsa_signature_parse_compact(ctx, &sig, sig_bytes)) {
  259. PyErr_SetString(PyExc_RuntimeError, "Failed to parse signature");
  260. return NULL;
  261. }
  262. if (!secp256k1_ec_pubkey_parse(ctx, &pubkey, pubkey_bytes, pubkey_bytes_len)) {
  263. PyErr_SetString(PyExc_RuntimeError, "Failed to parse public key");
  264. return NULL;
  265. }
  266. /* returns 1 on valid sig, 0 on invalid sig */
  267. return Py_BuildValue("I", secp256k1_ecdsa_verify(ctx, &sig, msghash_bytes, &pubkey));
  268. }
  269. static PyObject * pubkey_recover(PyObject *self, PyObject *args) {
  270. const unsigned char * msghash_bytes;
  271. const unsigned char * sig_bytes;
  272. int recid;
  273. int compressed;
  274. Py_ssize_t msghash_bytes_len;
  275. Py_ssize_t sig_bytes_len;
  276. if (!PyArg_ParseTuple(
  277. args,
  278. "y#y#ii",
  279. &msghash_bytes,
  280. &msghash_bytes_len,
  281. &sig_bytes,
  282. &sig_bytes_len,
  283. &recid,
  284. &compressed)) {
  285. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  286. return NULL;
  287. }
  288. if (recid < 0 || recid > 3) {
  289. PyErr_SetString(PyExc_RuntimeError, "Invalid recovery ID (not in range 0-3)");
  290. return NULL;
  291. }
  292. if (sig_bytes_len != 64) {
  293. PyErr_SetString(PyExc_RuntimeError, "Invalid signature length (not 64 bytes)");
  294. return NULL;
  295. }
  296. if (msghash_bytes_len != 32) {
  297. PyErr_SetString(PyExc_RuntimeError, "Invalid message hash length (not 32 bytes)");
  298. return NULL;
  299. }
  300. secp256k1_context *ctx = create_context(1);
  301. secp256k1_ecdsa_recoverable_signature rsig;
  302. secp256k1_pubkey pubkey;
  303. size_t pubkey_bytes_len = compressed == 1 ? 33 : 65;
  304. unsigned char pubkey_bytes[pubkey_bytes_len];
  305. if (!secp256k1_ecdsa_recoverable_signature_parse_compact(ctx, &rsig, sig_bytes, recid)) {
  306. PyErr_SetString(PyExc_RuntimeError, "Failed to parse signature");
  307. return NULL;
  308. }
  309. if (!secp256k1_ecdsa_recover(ctx, &pubkey, &rsig, msghash_bytes)) {
  310. PyErr_SetString(PyExc_RuntimeError, "Failed to recover public key");
  311. return NULL;
  312. }
  313. if (secp256k1_ec_pubkey_serialize(ctx, pubkey_bytes, &pubkey_bytes_len, &pubkey,
  314. compressed == 1 ? SECP256K1_EC_COMPRESSED : SECP256K1_EC_UNCOMPRESSED) != 1) {
  315. PyErr_SetString(PyExc_RuntimeError, "Failed to serialize public key");
  316. return NULL;
  317. }
  318. return Py_BuildValue("y#", pubkey_bytes, pubkey_bytes_len);
  319. }
  320. /* https://docs.python.org/3/howto/cporting.html */
  321. struct module_state {
  322. PyObject *error;
  323. };
  324. #define GETSTATE(m) ((struct module_state*)PyModule_GetState(m))
  325. static PyMethodDef secp256k1_methods[] = {
  326. {
  327. "pubkey_gen",
  328. pubkey_gen,
  329. METH_VARARGS,
  330. "Generate a serialized pubkey from privkey bytes"
  331. },
  332. {
  333. "pubkey_tweak_add",
  334. pubkey_tweak_add,
  335. METH_VARARGS,
  336. "Add scalar bytes to a serialized pubkey, returning a serialized pubkey"
  337. },
  338. {
  339. "pubkey_check",
  340. pubkey_check,
  341. METH_VARARGS,
  342. "Check a serialized pubkey, ensuring the encoded point is not point-at-infinity"
  343. },
  344. {
  345. "sign_msghash",
  346. sign_msghash,
  347. METH_VARARGS,
  348. "Sign a 32-byte message hash with a private key"
  349. },
  350. {
  351. "verify_sig",
  352. verify_sig,
  353. METH_VARARGS,
  354. "Verify a signature"
  355. },
  356. {
  357. "pubkey_recover",
  358. pubkey_recover,
  359. METH_VARARGS,
  360. "Recover a serialized pubkey from a recoverable signature plus signed message"
  361. },
  362. {NULL, NULL}
  363. };
  364. static int secp256k1_traverse(PyObject *m, visitproc visit, void *arg) {
  365. Py_VISIT(GETSTATE(m)->error);
  366. return 0;
  367. }
  368. static int secp256k1_clear(PyObject *m) {
  369. Py_CLEAR(GETSTATE(m)->error);
  370. return 0;
  371. }
  372. static struct PyModuleDef moduledef = {
  373. PyModuleDef_HEAD_INIT,
  374. "secp256k1",
  375. NULL,
  376. sizeof(struct module_state),
  377. secp256k1_methods,
  378. NULL,
  379. secp256k1_traverse,
  380. secp256k1_clear,
  381. NULL
  382. };
  383. #define INITERROR return NULL
  384. PyMODINIT_FUNC PyInit_secp256k1(void) {
  385. PyObject *module = PyModule_Create(&moduledef);
  386. if (module == NULL)
  387. INITERROR;
  388. struct module_state *st = GETSTATE(module);
  389. st->error = PyErr_NewException("secp256k1.Error", NULL, NULL);
  390. if (st->error == NULL) {
  391. Py_DECREF(module);
  392. INITERROR;
  393. }
  394. return module;
  395. }