lightning/util/
message_signing.rs1#[allow(unused)]
24use crate::prelude::*;
25use crate::util::base32;
26use bitcoin::hashes::{sha256d, Hash};
27use bitcoin::secp256k1::ecdsa::{RecoverableSignature, RecoveryId};
28use bitcoin::secp256k1::{Error, Message, PublicKey, Secp256k1, SecretKey};
29
30static LN_MESSAGE_PREFIX: &[u8] = b"Lightning Signed Message:";
31
32fn sigrec_encode(sig_rec: RecoverableSignature) -> Vec<u8> {
33 let (rid, rsig) = sig_rec.serialize_compact();
34 let prefix = rid.to_i32() as u8 + 31;
35
36 [&[prefix], &rsig[..]].concat()
37}
38
39fn sigrec_decode(sig_rec: Vec<u8>) -> Result<RecoverableSignature, Error> {
40 if sig_rec.len() != 65 {
42 return Err(Error::InvalidSignature);
43 }
44
45 let rsig = &sig_rec[1..];
46 let rid = sig_rec[0] as i32 - 31;
47
48 match RecoveryId::from_i32(rid) {
49 Ok(x) => RecoverableSignature::from_compact(rsig, x),
50 Err(e) => Err(e),
51 }
52}
53
54pub fn sign(msg: &[u8], sk: &SecretKey) -> String {
58 let secp_ctx = Secp256k1::signing_only();
59 let msg_hash = sha256d::Hash::hash(&[LN_MESSAGE_PREFIX, msg].concat());
60
61 let sig = secp_ctx.sign_ecdsa_recoverable(&Message::from_digest(msg_hash.to_byte_array()), sk);
62 base32::Alphabet::ZBase32.encode(&sigrec_encode(sig))
63}
64
65pub fn recover_pk(msg: &[u8], sig: &str) -> Result<PublicKey, Error> {
67 let secp_ctx = Secp256k1::verification_only();
68 let msg_hash = sha256d::Hash::hash(&[LN_MESSAGE_PREFIX, msg].concat());
69
70 match base32::Alphabet::ZBase32.decode(&sig) {
71 Ok(sig_rec) => match sigrec_decode(sig_rec) {
72 Ok(sig) => {
73 secp_ctx.recover_ecdsa(&Message::from_digest(msg_hash.to_byte_array()), &sig)
74 },
75 Err(e) => Err(e),
76 },
77 Err(_) => Err(Error::InvalidSignature),
78 }
79}
80
81pub fn verify(msg: &[u8], sig: &str, pk: &PublicKey) -> bool {
84 match recover_pk(msg, sig) {
85 Ok(x) => x == *pk,
86 Err(_) => false,
87 }
88}
89
90#[cfg(test)]
91mod test {
92 use crate::util::message_signing::{recover_pk, sign, verify};
93 use bitcoin::secp256k1::constants::ONE;
94 use bitcoin::secp256k1::{PublicKey, Secp256k1, SecretKey};
95 use core::str::FromStr;
96
97 #[test]
98 fn test_sign() {
99 let message = "test message";
100 let one_key = SecretKey::from_slice(&ONE).unwrap();
101 let zbase32_sig = sign(message.as_bytes(), &one_key);
102
103 assert_eq!(zbase32_sig, "d9tibmnic9t5y41hg7hkakdcra94akas9ku3rmmj4ag9mritc8ok4p5qzefs78c9pqfhpuftqqzhydbdwfg7u6w6wdxcqpqn4sj4e73e")
104 }
105
106 #[test]
107 fn test_recover_pk() {
108 let message = "test message";
109 let one_key = SecretKey::from_slice(&ONE).unwrap();
110 let sig = "d9tibmnic9t5y41hg7hkakdcra94akas9ku3rmmj4ag9mritc8ok4p5qzefs78c9pqfhpuftqqzhydbdwfg7u6w6wdxcqpqn4sj4e73e";
111 let pk = recover_pk(message.as_bytes(), sig);
112
113 assert_eq!(pk.unwrap(), PublicKey::from_secret_key(&Secp256k1::signing_only(), &one_key))
114 }
115
116 #[test]
117 fn test_verify() {
118 let message = "another message";
119 let one_key = SecretKey::from_slice(&ONE).unwrap();
120 let sig = sign(message.as_bytes(), &one_key);
121 let pk = PublicKey::from_secret_key(&Secp256k1::signing_only(), &one_key);
122
123 assert!(verify(message.as_bytes(), &sig, &pk))
124 }
125
126 #[test]
127 fn test_verify_ground_truth_ish() {
128 let corpus = [
132 ["@bitconner",
133 "is this compatible?",
134 "rbgfioj114mh48d8egqx8o9qxqw4fmhe8jbeeabdioxnjk8z3t1ma1hu1fiswpakgucwwzwo6ofycffbsqusqdimugbh41n1g698hr9t",
135 "02b80cabdf82638aac86948e4c06e82064f547768dcef977677b9ea931ea75bab5"],
136 ["@duck1123",
137 "hi",
138 "rnrphcjswusbacjnmmmrynh9pqip7sy5cx695h6mfu64iac6qmcmsd8xnsyczwmpqp9shqkth3h4jmkgyqu5z47jfn1q7gpxtaqpx4xg",
139 "02de60d194e1ca5947b59fe8e2efd6aadeabfb67f2e89e13ae1a799c1e08e4a43b"],
140 ["@jochemin",
141 "hi",
142 "ry8bbsopmduhxy3dr5d9ekfeabdpimfx95kagdem7914wtca79jwamtbw4rxh69hg7n6x9ty8cqk33knbxaqftgxsfsaeprxkn1k48p3",
143 "022b8ece90ee891cbcdac0c1cc6af46b73c47212d8defbce80265ac81a6b794931"],
144 ];
145
146 for c in &corpus {
147 assert!(verify(c[1].as_bytes(), c[2], &PublicKey::from_str(c[3]).unwrap()))
148 }
149 }
150}