1 // Copyright (c) 2009-2010 Satoshi Nakamoto
2 // Copyright (c) 2009-2015 The Bitcoin Core developers
3 // Distributed under the MIT software license, see the accompanying
4 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
10 #include "serialize.h"
11 #include "support/allocators/secure.h"
20 * const unsigned int PRIVATE_KEY_SIZE = 279;
21 * const unsigned int PUBLIC_KEY_SIZE = 65;
22 * const unsigned int SIGNATURE_SIZE = 72;
24 * see www.keylength.com
25 * script supports up to 75 for single byte push
29 * secure_allocator is defined in allocators.h
30 * CPrivKey is a serialized private key, with all parameters included (279 bytes)
32 typedef std::vector
<unsigned char, secure_allocator
<unsigned char> > CPrivKey
;
34 /** An encapsulated private key. */
38 //! Whether this private key is valid. We check for correctness when modifying the key
39 //! data, so fValid should always correspond to the actual state.
42 //! Whether the public key corresponding to this private key is (to be) compressed.
45 //! The actual byte data
46 std::vector
<unsigned char, secure_allocator
<unsigned char> > keydata
;
48 //! Check whether the 32-byte array pointed to be vch is valid keydata.
49 bool static Check(const unsigned char* vch
);
52 //! Construct an invalid private key.
53 CKey() : fValid(false), fCompressed(false)
55 // Important: vch must be 32 bytes in length to not break serialization
59 //! Destructor (again necessary because of memlocking).
64 friend bool operator==(const CKey
& a
, const CKey
& b
)
66 return a
.fCompressed
== b
.fCompressed
&&
67 a
.size() == b
.size() &&
68 memcmp(a
.keydata
.data(), b
.keydata
.data(), a
.size()) == 0;
71 //! Initialize using begin and end iterators to byte data.
73 void Set(const T pbegin
, const T pend
, bool fCompressedIn
)
75 if (size_t(pend
- pbegin
) != keydata
.size()) {
77 } else if (Check(&pbegin
[0])) {
78 memcpy(keydata
.data(), (unsigned char*)&pbegin
[0], keydata
.size());
80 fCompressed
= fCompressedIn
;
86 //! Simple read-only vector-like interface.
87 unsigned int size() const { return (fValid
? keydata
.size() : 0); }
88 const unsigned char* begin() const { return keydata
.data(); }
89 const unsigned char* end() const { return keydata
.data() + size(); }
91 //! Check whether this private key is valid.
92 bool IsValid() const { return fValid
; }
94 //! Check whether the public key corresponding to this private key is (to be) compressed.
95 bool IsCompressed() const { return fCompressed
; }
97 //! Initialize from a CPrivKey (serialized OpenSSL private key data).
98 bool SetPrivKey(const CPrivKey
& vchPrivKey
, bool fCompressed
);
100 //! Generate a new private key using a cryptographic PRNG.
101 void MakeNewKey(bool fCompressed
);
104 * Convert the private key to a CPrivKey (serialized OpenSSL private key data).
107 CPrivKey
GetPrivKey() const;
110 * Compute the public key from a private key.
113 CPubKey
GetPubKey() const;
116 * Create a DER-serialized signature.
117 * The test_case parameter tweaks the deterministic nonce.
119 bool Sign(const uint256
& hash
, std::vector
<unsigned char>& vchSig
, uint32_t test_case
= 0) const;
122 * Create a compact signature (65 bytes), which allows reconstructing the used public key.
123 * The format is one header byte, followed by two times 32 bytes for the serialized r and s values.
124 * The header byte: 0x1B = first key with even y, 0x1C = first key with odd y,
125 * 0x1D = second key with even y, 0x1E = second key with odd y,
126 * add 0x04 for compressed keys.
128 bool SignCompact(const uint256
& hash
, std::vector
<unsigned char>& vchSig
) const;
130 //! Derive BIP32 child key.
131 bool Derive(CKey
& keyChild
, ChainCode
&ccChild
, unsigned int nChild
, const ChainCode
& cc
) const;
134 * Verify thoroughly whether a private key and a public key match.
135 * This is done using a different mechanism than just regenerating it.
137 bool VerifyPubKey(const CPubKey
& vchPubKey
) const;
139 //! Load private key and check that public key matches.
140 bool Load(CPrivKey
& privkey
, CPubKey
& vchPubKey
, bool fSkipCheck
);
144 unsigned char nDepth
;
145 unsigned char vchFingerprint
[4];
150 friend bool operator==(const CExtKey
& a
, const CExtKey
& b
)
152 return a
.nDepth
== b
.nDepth
&&
153 memcmp(&a
.vchFingerprint
[0], &b
.vchFingerprint
[0], sizeof(vchFingerprint
)) == 0 &&
154 a
.nChild
== b
.nChild
&&
155 a
.chaincode
== b
.chaincode
&&
159 void Encode(unsigned char code
[BIP32_EXTKEY_SIZE
]) const;
160 void Decode(const unsigned char code
[BIP32_EXTKEY_SIZE
]);
161 bool Derive(CExtKey
& out
, unsigned int nChild
) const;
162 CExtPubKey
Neuter() const;
163 void SetMaster(const unsigned char* seed
, unsigned int nSeedLen
);
164 template <typename Stream
>
165 void Serialize(Stream
& s
) const
167 unsigned int len
= BIP32_EXTKEY_SIZE
;
168 ::WriteCompactSize(s
, len
);
169 unsigned char code
[BIP32_EXTKEY_SIZE
];
171 s
.write((const char *)&code
[0], len
);
173 template <typename Stream
>
174 void Unserialize(Stream
& s
)
176 unsigned int len
= ::ReadCompactSize(s
);
177 unsigned char code
[BIP32_EXTKEY_SIZE
];
178 s
.read((char *)&code
[0], len
);
183 /** Initialize the elliptic curve support. May not be called twice without calling ECC_Stop first. */
184 void ECC_Start(void);
186 /** Deinitialize the elliptic curve support. No-op if ECC_Start wasn't called first. */
189 /** Check that required EC support is available at runtime. */
190 bool ECC_InitSanityCheck(void);
192 #endif // BITCOIN_KEY_H