rbsecp256k1 3.0.0 → 5.0.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +157 -0
- data/Rakefile +2 -0
- data/documentation/context.md +81 -0
- data/documentation/index.md +319 -0
- data/documentation/key_pair.md +28 -0
- data/documentation/private_key.md +25 -0
- data/documentation/public_key.md +32 -0
- data/documentation/recoverable_signature.md +30 -0
- data/documentation/secp256k1.md +19 -0
- data/documentation/shared_secret.md +16 -0
- data/documentation/signature.md +42 -0
- data/documentation/util.md +17 -0
- data/ext/rbsecp256k1/extconf.rb +11 -8
- data/ext/rbsecp256k1/rbsecp256k1.c +291 -297
- data/lib/rbsecp256k1.rb +3 -0
- data/lib/rbsecp256k1/context.rb +29 -0
- data/lib/rbsecp256k1/util.rb +2 -0
- data/lib/rbsecp256k1/version.rb +3 -1
- metadata +36 -11
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: be2bc20e0b586daab65589d06c00e4bece13e864878d40000c0beea58b7664e7
|
4
|
+
data.tar.gz: cf3d966929ee5735a8aa3515e4e749233bab01e8d797804fbe4bfba33c1e8d7e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5ca5dc9a5dde1c173be0b9dcf43beeaaab96bda3942284f2ee33184c10df18633906c9ff243337cff0b7e19e9f62b790d712ffee7a91180da61e405210e446be
|
7
|
+
data.tar.gz: b211a0431338b7d8a1f4b96a2f18006b779f5abd23daa92ba698043b120dbe71ff89b2c9ecef73d86fb34c58a8ef6f5ee320ef2febdf8c072803214b8cbf8270
|
data/README.md
ADDED
@@ -0,0 +1,157 @@
|
|
1
|
+
# rbsecp256k1
|
2
|
+
|
3
|
+
[![Build Status](https://travis-ci.com/etscrivner/rbsecp256k1.svg?branch=master)](https://travis-ci.com/etscrivner/rbsecp256k1) [![Gem Version](https://badge.fury.io/rb/rbsecp256k1.svg)](https://badge.fury.io/rb/rbsecp256k1) [![Maintainability](https://api.codeclimate.com/v1/badges/d4b6e27bfa00030ca412/maintainability)](https://codeclimate.com/github/etscrivner/rbsecp256k1/maintainability)
|
4
|
+
|
5
|
+
Native extension gem for secp256k1 ECDSA. Wraps [libsecp256k1](https://github.com/bitcoin-core/secp256k1). In
|
6
|
+
rbsecp256k1 3.0.0 and later libsecp256k1 is bundled with the gem.
|
7
|
+
|
8
|
+
* [Documentation](https://github.com/etscrivner/rbsecp256k1/blob/master/documentation/index.md)
|
9
|
+
* [Examples](https://github.com/etscrivner/rbsecp256k1/blob/master/examples/README.md)
|
10
|
+
|
11
|
+
### Why wrap libsecp256k1?
|
12
|
+
|
13
|
+
[libsecp256k1](https://github.com/bitcoin-core/secp256k1) is an extremely optimized implementation of public key derivation,
|
14
|
+
signing, and verification with the secp256k1 elliptic curve. It comes with its
|
15
|
+
own set of benchmarks, but from [benchmarking done by Peter Wuille](https://www.reddit.com/r/Bitcoin/comments/2weymr/experiment_bitcoin_core_0100_initial_sync_time/coqghm2) it is ~4.9x
|
16
|
+
faster than the OpenSSL implementation of the same curve. It is the only library
|
17
|
+
that provides constant time signing of this curve and has been deployed as part
|
18
|
+
of Bitcoin since [v0.10.0](https://bitcoin.org/en/release/v0.10.0#improved-signing-security)
|
19
|
+
|
20
|
+
Natively wrapping the library in an extension gem means users don't have to
|
21
|
+
worry about compiling or locating the library, unlike many [FFI](https://github.com/ffi/ffi) based gems.
|
22
|
+
|
23
|
+
## Installation
|
24
|
+
|
25
|
+
The simplest installation:
|
26
|
+
|
27
|
+
```
|
28
|
+
gem install rbsecp256k1
|
29
|
+
```
|
30
|
+
|
31
|
+
## Requirements
|
32
|
+
|
33
|
+
If you want to use your system version of libsecp256k1 rather than the bundled
|
34
|
+
version use the `--with-system-libraries` flag:
|
35
|
+
|
36
|
+
```
|
37
|
+
gem install rbsecp256k1 -- --with-system-libraries
|
38
|
+
```
|
39
|
+
|
40
|
+
#### Linux
|
41
|
+
|
42
|
+
Install the dependencies for building libsecp256k1 and this library:
|
43
|
+
|
44
|
+
```
|
45
|
+
sudo apt-get install build-essential automake pkg-config libtool \
|
46
|
+
libffi-dev libssl-dev libgmp-dev python-dev
|
47
|
+
```
|
48
|
+
|
49
|
+
**NOTE:** If you have installed libsecp256k1 but the gem cannot find it. Ensure
|
50
|
+
you have run `ldconfig` so that your library load paths have been updated.
|
51
|
+
|
52
|
+
#### macOS
|
53
|
+
|
54
|
+
Dependencies for building libsecp256k1 and this library:
|
55
|
+
|
56
|
+
```
|
57
|
+
brew install openssl libtool pkg-config gmp libffi
|
58
|
+
```
|
59
|
+
|
60
|
+
## Features
|
61
|
+
|
62
|
+
See [rbsecp256k1 documentation](https://github.com/etscrivner/rbsecp256k1/blob/master/documentation/index.md) for examples and complete list of supported functionality.
|
63
|
+
|
64
|
+
## Development
|
65
|
+
|
66
|
+
### Cloning
|
67
|
+
|
68
|
+
To clone the repository and its submodules you'll need to the following:
|
69
|
+
|
70
|
+
```
|
71
|
+
git clone git@github.com:etscrivner/rbsecp256k1.git
|
72
|
+
```
|
73
|
+
|
74
|
+
### Setup
|
75
|
+
|
76
|
+
Development is largely facilitated by a makefile. After download you should run
|
77
|
+
the following command to set up your local environment:
|
78
|
+
|
79
|
+
```
|
80
|
+
make setup
|
81
|
+
```
|
82
|
+
|
83
|
+
### Compiling Extension
|
84
|
+
|
85
|
+
To compile the extension gem run the following (this is required to run tests):
|
86
|
+
|
87
|
+
```
|
88
|
+
make build
|
89
|
+
```
|
90
|
+
|
91
|
+
### Running Tests
|
92
|
+
|
93
|
+
```
|
94
|
+
make test
|
95
|
+
```
|
96
|
+
|
97
|
+
To test with recovery functionality disabled run:
|
98
|
+
|
99
|
+
```
|
100
|
+
make test WITH_RECOVERY=0
|
101
|
+
```
|
102
|
+
|
103
|
+
To test with ECDH functionality disabled run:
|
104
|
+
|
105
|
+
```
|
106
|
+
make test WITH_ECDH=0
|
107
|
+
```
|
108
|
+
|
109
|
+
To test with both disabled run:
|
110
|
+
|
111
|
+
```
|
112
|
+
make test WITH_RECOVERY=0 WITH_ECDH=0
|
113
|
+
```
|
114
|
+
|
115
|
+
Testing for memory leaks with valgrind:
|
116
|
+
|
117
|
+
```
|
118
|
+
make memcheck
|
119
|
+
```
|
120
|
+
|
121
|
+
### Building Gem
|
122
|
+
|
123
|
+
```
|
124
|
+
make gem
|
125
|
+
```
|
126
|
+
|
127
|
+
### Installing Gem Locally
|
128
|
+
|
129
|
+
To install the gem locally and verify builds you can run:
|
130
|
+
|
131
|
+
```
|
132
|
+
make install
|
133
|
+
```
|
134
|
+
|
135
|
+
### Uninstall Gem Locally
|
136
|
+
|
137
|
+
You can similarly uninstall the local gem by running the following:
|
138
|
+
|
139
|
+
```
|
140
|
+
make uninstall
|
141
|
+
```
|
142
|
+
|
143
|
+
### Cleaning Up
|
144
|
+
|
145
|
+
To clean up and do a fresh build:
|
146
|
+
|
147
|
+
```
|
148
|
+
make clean
|
149
|
+
```
|
150
|
+
|
151
|
+
### Running YARD Documentation Server
|
152
|
+
|
153
|
+
To run the [YARD](https://yardoc.org/) documentation server:
|
154
|
+
|
155
|
+
```
|
156
|
+
make docserver
|
157
|
+
```
|
data/Rakefile
CHANGED
@@ -0,0 +1,81 @@
|
|
1
|
+
[Index](index.md)
|
2
|
+
|
3
|
+
Secp256k1::Context
|
4
|
+
==================
|
5
|
+
|
6
|
+
Secp256k1::Context represents a libsecp256k1 context object. Contexts are
|
7
|
+
thread-safe and initialization is expensive, so a single context should be used
|
8
|
+
for multiple operations as much as possible.
|
9
|
+
|
10
|
+
Initializers
|
11
|
+
------------
|
12
|
+
|
13
|
+
#### new(context_randomization_bytes: nil)
|
14
|
+
|
15
|
+
Returns a newly initialized libsecp256k1 context. The context is randomized at
|
16
|
+
initialization if given `context_randomization_bytes`. The
|
17
|
+
`context_randomization_bytes` argument can optionally take a string containing
|
18
|
+
32 bytes of random data, if not provided then the Context is not randomized and
|
19
|
+
may be vulnerable to side-channel attacks.
|
20
|
+
|
21
|
+
Class Methods
|
22
|
+
-------------
|
23
|
+
|
24
|
+
#### create
|
25
|
+
|
26
|
+
Creates and returns a new randomized `Context` using `SecureRandom` for the
|
27
|
+
random initialization bytes. This is the recommended method for initialization.
|
28
|
+
|
29
|
+
#### create_unrandomized
|
30
|
+
|
31
|
+
Creates a new unrandomized `Context`.
|
32
|
+
|
33
|
+
Instance Methods
|
34
|
+
----------------
|
35
|
+
|
36
|
+
#### ecdh(point, scalar)
|
37
|
+
|
38
|
+
**Requires:** libsecp256k1 was built with the experimental ECDH module.
|
39
|
+
|
40
|
+
Takes a `point` ([PublicKey](public_key.md)) and a `scalar` ([PrivateKey](private_key.md)) and returns a new
|
41
|
+
[SharedSecret](shared_secret.md) containing the 32-byte shared secret. Raises a `Secp256k1::Error` if
|
42
|
+
the `scalar` is invalid (zero or causes an overflow).
|
43
|
+
|
44
|
+
#### generate_key_pair
|
45
|
+
|
46
|
+
Generates and returns a new [KeyPair](key_pair.md) using a cryptographically
|
47
|
+
secure random number generator (CSRNG) provided by OpenSSL.
|
48
|
+
|
49
|
+
#### key_pair_from_private_key(private_key_data)
|
50
|
+
|
51
|
+
Returns a new [KeyPair](key_pair.md) from the given `private_key_data`. The
|
52
|
+
`private_key_data` is expected to be a binary string. Raises a `Secp256k1::Error`
|
53
|
+
if the private key is invalid or key derivation fails.
|
54
|
+
|
55
|
+
#### recoverable_signature_from_compact(compact_signature, recovery_id)
|
56
|
+
|
57
|
+
**Requires:** libsecp256k1 was build with recovery module.
|
58
|
+
|
59
|
+
Attempts to load a [RecoverableSignature](recoverable_signature.md) from the given `compact_signature`
|
60
|
+
and `recovery_id`. Raises a `Secp256k1::DeserializationError` if the signature data or recovery ID are invalid.
|
61
|
+
|
62
|
+
#### sign(private_key, hash32)
|
63
|
+
|
64
|
+
Signs the SHA-256 hash given by `hash32` using `private_key` and returns a new
|
65
|
+
[Signature](signature.md). The `private_key` is expected to be a [PrivateKey](private_key.md)
|
66
|
+
object and `data` can be either a binary string or text.
|
67
|
+
|
68
|
+
#### sign_recoverable(private_key, hash32)
|
69
|
+
|
70
|
+
**Requires:** libsecp256k1 was build with recovery module.
|
71
|
+
|
72
|
+
Signs the data represented by the SHA-256 hash `hash32` using `private_key` and returns a
|
73
|
+
new [RecoverableSignature](recoverable_signature.md). The `private_key` is expected to be a [PrivateKey](private_key.md) and
|
74
|
+
`data` can be either a binary string or text.
|
75
|
+
|
76
|
+
#### verify(signature, public_key, hash32)
|
77
|
+
|
78
|
+
Verifies the given `signature` ([Signature](signature.md)) was signed by
|
79
|
+
the private key corresponding to `public_key` ([PublicKey](public_key.md)) and signed `hash32`. Returns `true`
|
80
|
+
if `signature` is valid or `false` otherwise. Note that `data` can be either a
|
81
|
+
text or binary string.
|
@@ -0,0 +1,319 @@
|
|
1
|
+
rbsecp256k1 Reference
|
2
|
+
=====================
|
3
|
+
|
4
|
+
Find your topic in the index, or refer to one of the examples below.
|
5
|
+
|
6
|
+
Classes and Modules
|
7
|
+
-------------------
|
8
|
+
|
9
|
+
| Module | Classes | Utilities
|
10
|
+
|----------------------------|:-------------------------------------------------|:--------------------------------
|
11
|
+
| [Secp256k1](secp256k1.md) | [Context](context.md) | [Util](util.md)
|
12
|
+
| | [KeyPair](key_pair.md) |
|
13
|
+
| | [PublicKey](public_key.md) |
|
14
|
+
| | [PrivateKey](private_key.md) |
|
15
|
+
| | [SharedSecret](shared_secret.md) |
|
16
|
+
| | [Signature](signature.md) |
|
17
|
+
| | [RecoverableSignature](recoverable_signature.md) |
|
18
|
+
|
19
|
+
Glossary
|
20
|
+
--------
|
21
|
+
|
22
|
+
**[Context](context.md)** is a libsecp256k1 library context. It contains
|
23
|
+
pre-computed tables and values to make ECDSA signing and verification more
|
24
|
+
efficient.
|
25
|
+
|
26
|
+
**[KeyPair](key_pair.md)** is a Secp256k1 elliptic-curve key pair.
|
27
|
+
|
28
|
+
**[PublicKey](public_key.md)** is a Secp256k1 public key. It can come in either
|
29
|
+
compressed or uncompressed format.
|
30
|
+
|
31
|
+
**[PrivateKey](private_key.md)** is a 64-byte Secp256k1 private key.
|
32
|
+
|
33
|
+
**[SharedSecret](shared_secret.md)** A 32-byte shared secret computed from a
|
34
|
+
public key (point) and private key (scalar).
|
35
|
+
|
36
|
+
**[Signature](signature.md)** is an ECDSA signature of the SHA-256 message hash
|
37
|
+
of a piece of data.
|
38
|
+
|
39
|
+
**[RecoverableSignature](recoverable_signature.md)** is a recoverable ECDSA signature of the SHA-256 message
|
40
|
+
hash of a piece of data.
|
41
|
+
|
42
|
+
Examples
|
43
|
+
--------
|
44
|
+
|
45
|
+
### 1. Creating a libsecp256k1 context
|
46
|
+
|
47
|
+
This example demonstrates how to create a new libsecp256k1 context. This is the
|
48
|
+
first step of using this library:
|
49
|
+
|
50
|
+
```ruby
|
51
|
+
context = Secp256k1::Context.create
|
52
|
+
# => #<Secp256k1::Context:0x0000559b0bd8f5d0>
|
53
|
+
```
|
54
|
+
|
55
|
+
### 2. Generating a key pair
|
56
|
+
|
57
|
+
This example shows how to generate a new public-private key pair:
|
58
|
+
|
59
|
+
```ruby
|
60
|
+
context = Secp256k1::Context.create
|
61
|
+
key_pair = context.generate_key_pair
|
62
|
+
# => #<Secp256k1::KeyPair:0x0000559b0bc876b0 @public_key=#<Secp256k1::PublicKey:0x0000559b0bc876d8>, @private_key=#<Secp256k1::PrivateKey:0x0000559b0bc87700 @data="\r\xA7\xB3<\x92\xCDw\xC1\xDB\xEB[BB;=\x80\xB83\xA8]\x06\xD9\x90\xF8v\xFFi\xF0/\x1E\x96\xF9">>
|
63
|
+
```
|
64
|
+
|
65
|
+
### 3. Getting compressed and uncompressed public key representations
|
66
|
+
|
67
|
+
This example shows how to generate compressed and uncompressed public keys:
|
68
|
+
|
69
|
+
```ruby
|
70
|
+
context = Secp256k1::Context.create
|
71
|
+
key_pair = context.generate_key_pair
|
72
|
+
|
73
|
+
# 1. Get the binary representation of compressed public key
|
74
|
+
key_pair.public_key.compressed
|
75
|
+
# => "\x03D\x88\xD6 3|3\x836\xCB(\x9CW%\xF4T\xB7\xCD\x8AF T\xE7\xE8\xCE\xB0\xC7c{\xE2:\xFE"
|
76
|
+
|
77
|
+
# 2. Show hex representation of compressed public key
|
78
|
+
Secp256k1::Util.bin_to_hex(key_pair.public_key.compressed)
|
79
|
+
# => "034488d620337c338336cb289c5725f454b7cd8a462054e7e8ceb0c7637be23afe"
|
80
|
+
|
81
|
+
# 3. Get the binary representation of uncompressed public key
|
82
|
+
key_pair.public_key.uncompressed
|
83
|
+
# => "\x04D\x88\xD6 3|3\x836\xCB(\x9CW%\xF4T\xB7\xCD\x8AF T\xE7\xE8\xCE\xB0\xC7c{\xE2:\xFE XRew\x1F\e\x05\xC8\xDC\xA7\xE3\x8C\xBD\x91s?\xFCW\xD5\xB3\xA8aaCCG\xD4\x94m\xA5c"
|
84
|
+
|
85
|
+
# 4. Show hex representation of uncompressed public key
|
86
|
+
Secp256k1::Util.bin_to_hex(key_pair.public_key.uncompressed)
|
87
|
+
# => "044488d620337c338336cb289c5725f454b7cd8a462054e7e8ceb0c7637be23afe20585265771f1b05c8dca7e38cbd91733ffc57d5b3a86161434347d4946da563"
|
88
|
+
```
|
89
|
+
|
90
|
+
### 3. Signing a message
|
91
|
+
|
92
|
+
This example shows how to sign a message using your private key:
|
93
|
+
|
94
|
+
```ruby
|
95
|
+
require 'digest'
|
96
|
+
|
97
|
+
context = Secp256k1::Context.create
|
98
|
+
key_pair = context.generate_key_pair
|
99
|
+
|
100
|
+
signature = context.sign(key_pair.private_key, Digest::SHA256.digest("test message"))
|
101
|
+
# => #<Secp256k1::Signature:0x0000559b0bc79358>
|
102
|
+
```
|
103
|
+
|
104
|
+
### 4. Getting DER and Compact signature encodings
|
105
|
+
|
106
|
+
This example shows you how to get the DER encoded and compact encoded
|
107
|
+
representations of a signature:
|
108
|
+
|
109
|
+
```ruby
|
110
|
+
require 'digest'
|
111
|
+
|
112
|
+
context = Secp256k1::Context.create
|
113
|
+
key_pair = context.generate_key_pair
|
114
|
+
|
115
|
+
signature = context.sign(key_pair.private_key, Digest::SHA256.digest("test message"))
|
116
|
+
|
117
|
+
# 1. Get the compact binary representation
|
118
|
+
signature.compact
|
119
|
+
# => "\xAB#e6_\x866\e\xAC\e\x92W\xC8a\x84N\xD4\xB6\x88\xF8\xEE\xDF\xFBC\xE8j\xB2\xF0\x10\xB8\xA0\x89\x13L\e\x9E\x91cB\xD7\xAC\x11\xF7\x02,Y&TM\xA5zp\xFD\xB3\xB1\xDCIV\xBB\\\xAF\x16@\xFC\x00"
|
120
|
+
|
121
|
+
# 2. Get the compact hex representation
|
122
|
+
Secp256k1::Util.bin_to_hex(signature.compact)
|
123
|
+
# => "ab2365365f86361bac1b9257c861844ed4b688f8eedffb43e86ab2f010b8a089134c1b9e916342d7ac11f7022c5926544da57a70fdb3b1dc4956bb5caf1640fc00"
|
124
|
+
|
125
|
+
# 3. Get the DER binary representation
|
126
|
+
signature.der_encoded
|
127
|
+
# => "0E\x02!\x00\xAB#e6_\x866\e\xAC\e\x92W\xC8a\x84N\xD4\xB6\x88\xF8\xEE\xDF\xFBC\xE8j\xB2\xF0\x10\xB8\xA0\x89\x02 \x13L\e\x9E\x91cB\xD7\xAC\x11\xF7\x02,Y&TM\xA5zp\xFD\xB3\xB1\xDCIV\xBB\\\xAF\x16@\xFC"
|
128
|
+
|
129
|
+
# 4. Get the DER hex representation
|
130
|
+
Secp256k1::Util.bin_to_hex(signature.der_encoded)
|
131
|
+
# => "3045022100ab2365365f86361bac1b9257c861844ed4b688f8eedffb43e86ab2f010b8a0890220134c1b9e916342d7ac11f7022c5926544da57a70fdb3b1dc4956bb5caf1640fc"
|
132
|
+
```
|
133
|
+
|
134
|
+
### 5. Verifying a signature
|
135
|
+
|
136
|
+
This example shows how to verify a signature using a public key:
|
137
|
+
|
138
|
+
```ruby
|
139
|
+
require 'digest'
|
140
|
+
|
141
|
+
context = Secp256k1::Context.create
|
142
|
+
key_pair = context.generate_key_pair
|
143
|
+
hash = Digest::SHA256.digest("test message")
|
144
|
+
|
145
|
+
signature = context.sign(key_pair.private_key, hash)
|
146
|
+
|
147
|
+
# 1. Verify signature against matching message
|
148
|
+
context.verify(signature, key_pair.public_key, hash)
|
149
|
+
# => true
|
150
|
+
|
151
|
+
# 2. Verify signature against different message
|
152
|
+
context.verify(signature, key_pair.public_key, hash)
|
153
|
+
# => false
|
154
|
+
```
|
155
|
+
|
156
|
+
### 6. Loading a private key or key pair from private key data
|
157
|
+
|
158
|
+
This example shows how to load a key pair from raw binary private key data:
|
159
|
+
|
160
|
+
```ruby
|
161
|
+
context = Secp256k1::Context.create
|
162
|
+
|
163
|
+
#1. Load private key alone
|
164
|
+
private_key = Secp256k1::PrivateKey.from_data("I\nX\x85\xAEz}\n\x9B\xA4\\\x81)\xD4\x9Aq\xFDH\t\xBE\x8EP\xC5.\xC6\x1F7-\x86\xA0\xCB\xF9")
|
165
|
+
# => #<Secp256k1::PrivateKey:0x00005647df1bcd30 @data="I\nX\x85\xAEz}\n\x9B\xA4\\\x81)\xD4\x9Aq\xFDH\t\xBE\x8EP\xC5.\xC6\x1F7-\x86\xA0\xCB\xF9">
|
166
|
+
|
167
|
+
# 2. Load key pair from private key data
|
168
|
+
key_pair = context.key_pair_from_private_key("I\nX\x85\xAEz}\n\x9B\xA4\\\x81)\xD4\x9Aq\xFDH\t\xBE\x8EP\xC5.\xC6\x1F7-\x86\xA0\xCB\xF9")
|
169
|
+
# => #<Secp256k1::KeyPair:0x0000559b0bbf9a90 @public_key=#<Secp256k1::PublicKey:0x0000559b0bbf9ab8>, @private_key=#<Secp256k1::PrivateKey:0x0000559b0bbf9ae0 @data="I\nX\x85\xAEz}\n\x9B\xA4\\\x81)Ԛq\xFDH\t\xBE\x8EP\xC5.\xC6\u001F7-\x86\xA0\xCB\xF9">>
|
170
|
+
```
|
171
|
+
|
172
|
+
### 7. Loading a public key from binary data
|
173
|
+
|
174
|
+
This example shows how to load a public key from binary data:
|
175
|
+
|
176
|
+
```ruby
|
177
|
+
# 1. Load public key from uncompressed pubkey
|
178
|
+
public_key = Secp256k1::PublicKey.from_data("\x04$\xA2\xE7\xBB1\xC4|tN\xE6\xE4J-\xED\x9A[\xAFf-<\x14\x84^QQ\"\x14\xC3\x91\xE4\xF2\xB5\xEEEj\xAB\xD9\xFE\b\e7Zk\xC5{k\x12\xE3\xEA\xA2\xA5\xD7\xC1\xA5&\xE5|:K\xA9 X\xA3\x90")
|
179
|
+
# => #<Secp256k1::PublicKey:0x0000559b0bdc72f0>
|
180
|
+
|
181
|
+
# 2. Load public key from compressed pubkey
|
182
|
+
public_key = Secp256k1::PublicKey.from_data("\x02$\xA2\xE7\xBB1\xC4|tN\xE6\xE4J-\xED\x9A[\xAFf-<\x14\x84^QQ\"\x14\xC3\x91\xE4\xF2\xB5")
|
183
|
+
# => #<Secp256k1::PublicKey:0x0000559b0bdd3668>
|
184
|
+
```
|
185
|
+
|
186
|
+
### 8. Loading a DER or compact encoded signature
|
187
|
+
|
188
|
+
This example shows how to load signatures from binary data:
|
189
|
+
|
190
|
+
```ruby
|
191
|
+
# 1. From DER encoded signature
|
192
|
+
signature = Secp256k1::Signature.from_der_encoded("0D\x02 <\xC6\x7F/\x921l\x89Z\xFBs\x89p\xEE\x18u\x8B\x92\x9D\xA6\x84\xC5Y<t\xB7\xF1\f\xEE\f\x81J\x02 \t\"\xDF]\x1D\xA7W@^\xAAokH\b\x00\xE2L\xCF\x82\xA3\x05\x1E\x00\xF9\xFC\xB19\x0F\x93|\xB1f")
|
193
|
+
# => #<Secp256k1::Signature:0x0000559b0b823d58>
|
194
|
+
|
195
|
+
# 2. From compact signature
|
196
|
+
signature = Secp256k1::Signature.from_compact("<\xC6\x7F/\x921l\x89Z\xFBs\x89p\xEE\x18u\x8B\x92\x9D\xA6\x84\xC5Y<t\xB7\xF1\f\xEE\f\x81J\t\"\xDF]\x1D\xA7W@^\xAAokH\b\x00\xE2L\xCF\x82\xA3\x05\x1E\x00\xF9\xFC\xB19\x0F\x93|\xB1f\x00")
|
197
|
+
# => #<Secp256k1::Signature:0x0000559b0bdcaa68>
|
198
|
+
```
|
199
|
+
|
200
|
+
Recoverable Signature Examples
|
201
|
+
------------------------------
|
202
|
+
|
203
|
+
### 1. Checking for recovery module
|
204
|
+
|
205
|
+
To check if you have compiled the recovery module into your local libsecp256k1
|
206
|
+
run the following:
|
207
|
+
|
208
|
+
```ruby
|
209
|
+
Secp256k1.have_recovery?
|
210
|
+
# => true
|
211
|
+
```
|
212
|
+
|
213
|
+
### 2. Sign data producing recoverable signature
|
214
|
+
|
215
|
+
You can sign data producing a recoverable signature as follows:
|
216
|
+
|
217
|
+
```ruby
|
218
|
+
require 'digest'
|
219
|
+
|
220
|
+
hash = Digest::SHA256.digest('test message')
|
221
|
+
context = Secp256k1::Context.create
|
222
|
+
key_pair = context.generate_key_pair
|
223
|
+
|
224
|
+
signature = context.sign_recoverable(key_pair.private_key, hash)
|
225
|
+
# => #<Secp256k1::RecoverableSignature:0x000055f2ea76e548>
|
226
|
+
```
|
227
|
+
|
228
|
+
### 3. Serialize recoverable signature as compact representation
|
229
|
+
|
230
|
+
You can produce the compact binary serialization of a recoverable signature:
|
231
|
+
|
232
|
+
```ruby
|
233
|
+
require 'digest'
|
234
|
+
|
235
|
+
hash = Digest::SHA256.digest('test message')
|
236
|
+
context = Secp256k1::Context.create
|
237
|
+
key_pair = context.generate_key_pair
|
238
|
+
|
239
|
+
signature = context.sign_recoverable(key_pair.private_key, hash)
|
240
|
+
compact_data, recovery_id = signature.compact
|
241
|
+
# => ["D,\x9C\xA6%I\x14-\xCA\xC0\x11\x0F\xEB\x1E\xB0\xB6\\-\xE2\b\x98\xFB\xEA\xD5\x9BZ\xE6\xDF#\xC1\x1A\xEEL\xF02\xB1\xE9{\r\xEBhh<\\\xCF\xB6\x98\xEA\x8F\xF65\xF2\xBF\x84\xD8\xE5x\xF0\xA5)\xA2Wb\x9D", 1]
|
242
|
+
```
|
243
|
+
|
244
|
+
### 4. Recoverable signature from compact representation
|
245
|
+
|
246
|
+
You can load a recoverable signature give its compact representation and
|
247
|
+
recovery ID:
|
248
|
+
|
249
|
+
```ruby
|
250
|
+
context = Secp256k1::Context.create
|
251
|
+
|
252
|
+
compact_data = "D,\x9C\xA6%I\x14-\xCA\xC0\x11\x0F\xEB\x1E\xB0\xB6\\-\xE2\b\x98\xFB\xEA\xD5\x9BZ\xE6\xDF#\xC1\x1A\xEEL\xF02\xB1\xE9{\r\xEBhh<\\\xCF\xB6\x98\xEA\x8F\xF65\xF2\xBF\x84\xD8\xE5x\xF0\xA5)\xA2Wb\x9D"
|
253
|
+
recovery_id = 1
|
254
|
+
|
255
|
+
signature = context.recoverable_signature_from_compact(compact_data, recovery_id)
|
256
|
+
# => #<Secp256k1::RecoverableSignature:0x000055f2ea7615c8>
|
257
|
+
```
|
258
|
+
|
259
|
+
### 5. Convert recoverable signature to non-recoverable signature
|
260
|
+
|
261
|
+
You can convert a recoverable signature to a non-recoverable signature suitable
|
262
|
+
for use by all methods that take a [Signature](signature.md) object:
|
263
|
+
|
264
|
+
```ruby
|
265
|
+
require 'digest'
|
266
|
+
|
267
|
+
hash = Digest::SHA256.digest('test message')
|
268
|
+
context = Secp256k1::Context.create
|
269
|
+
key_pair = context.generate_key_pair
|
270
|
+
|
271
|
+
recoverable_signature = context.sign_recoverable(key_pair.private_key, hash)
|
272
|
+
signature = recoverable_signature.to_signature
|
273
|
+
# => #<Secp256k1::Signature:0x000055f2ea8ca4f0>
|
274
|
+
```
|
275
|
+
|
276
|
+
### 6. Recover public key from recoverable signature
|
277
|
+
|
278
|
+
You can recover the [PublicKey](public_key.md) associated with a recoverable signature:
|
279
|
+
|
280
|
+
```ruby
|
281
|
+
require 'digest'
|
282
|
+
|
283
|
+
hash = Digest::SHA256.digest('test message')
|
284
|
+
context = Secp256k1::Context.create
|
285
|
+
key_pair = context.generate_key_pair
|
286
|
+
|
287
|
+
recoverable_signature = context.sign_recoverable(key_pair.private_key, hash)
|
288
|
+
public_key = recoverable_signature.recover_public_key(hash)
|
289
|
+
# => #<Secp256k1::PublicKey:0x000055f2ea756678>
|
290
|
+
|
291
|
+
public_key == key_pair.public_key
|
292
|
+
# => true
|
293
|
+
```
|
294
|
+
|
295
|
+
EC Diffie-Hellman
|
296
|
+
-----------------
|
297
|
+
|
298
|
+
### 1. Checking for ECDH module
|
299
|
+
|
300
|
+
To check if you have compiled the ECDH module into your local libsecp256k1 run
|
301
|
+
the following:
|
302
|
+
|
303
|
+
```ruby
|
304
|
+
Secp256k1.have_ecdh?
|
305
|
+
# => true
|
306
|
+
```
|
307
|
+
|
308
|
+
### 2. Generating a shared secret
|
309
|
+
|
310
|
+
To generate a shared secret run the following:
|
311
|
+
|
312
|
+
```ruby
|
313
|
+
context = Secp256k1::Context.create
|
314
|
+
key_pair = context.generate_key_pair
|
315
|
+
|
316
|
+
shared_secret = context.ecdh(key_pair.public_key, key_pair.private_key)
|
317
|
+
shared_secret.data
|
318
|
+
# => "\x1FQ\x90X\xA5\xF2\xAEx;\xD7i\xB6\\T,2[\x90\xD1)a$\x1CA\x17\x8F\e\x91\xE3\x06C\x93"
|
319
|
+
```
|