|
|
@ -67,21 +67,27 @@ func ripemd160Func(in []byte) []byte { |
|
|
|
const ecRecoverInputLength = 128 |
|
|
|
const ecRecoverInputLength = 128 |
|
|
|
|
|
|
|
|
|
|
|
func ecrecoverFunc(in []byte) []byte { |
|
|
|
func ecrecoverFunc(in []byte) []byte { |
|
|
|
// "in" is (hash, v, r, s), each 32 bytes
|
|
|
|
|
|
|
|
// but for ecrecover we want (r, s, v)
|
|
|
|
|
|
|
|
if len(in) < ecRecoverInputLength { |
|
|
|
if len(in) < ecRecoverInputLength { |
|
|
|
return nil |
|
|
|
in = common.RightPadBytes(in, 128) |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// "in" is (hash, v, r, s), each 32 bytes
|
|
|
|
|
|
|
|
// but for ecrecover we want (r, s, v)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
r := common.BytesToBig(in[64:96]) |
|
|
|
|
|
|
|
s := common.BytesToBig(in[96:128]) |
|
|
|
// Treat V as a 256bit integer
|
|
|
|
// Treat V as a 256bit integer
|
|
|
|
v := new(big.Int).Sub(common.Bytes2Big(in[32:64]), big.NewInt(27)) |
|
|
|
vbig := common.Bytes2Big(in[32:64]) |
|
|
|
// Ethereum requires V to be either 0 or 1 => (27 || 28)
|
|
|
|
v := byte(vbig.Uint64()) |
|
|
|
if !(v.Cmp(Zero) == 0 || v.Cmp(One) == 0) { |
|
|
|
|
|
|
|
|
|
|
|
if !crypto.ValidateSignatureValues(v, r, s) { |
|
|
|
|
|
|
|
glog.V(logger.Error).Infof("EC RECOVER FAIL: v, r or s value invalid") |
|
|
|
return nil |
|
|
|
return nil |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// v needs to be moved to the end
|
|
|
|
// v needs to be at the end and normalized for libsecp256k1
|
|
|
|
rsv := append(in[64:128], byte(v.Uint64())) |
|
|
|
vbignormal := new(big.Int).Sub(vbig, big.NewInt(27)) |
|
|
|
|
|
|
|
vnormal := byte(vbignormal.Uint64()) |
|
|
|
|
|
|
|
rsv := append(in[64:128], vnormal) |
|
|
|
pubKey, err := crypto.Ecrecover(in[:32], rsv) |
|
|
|
pubKey, err := crypto.Ecrecover(in[:32], rsv) |
|
|
|
// make sure the public key is a valid one
|
|
|
|
// make sure the public key is a valid one
|
|
|
|
if err != nil { |
|
|
|
if err != nil { |
|
|
|