line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Bitcoin::Crypto::Helpers; |
2
|
|
|
|
|
|
|
$Bitcoin::Crypto::Helpers::VERSION = '1.008'; |
3
|
17
|
|
|
17
|
|
212709
|
use v5.10; |
|
17
|
|
|
|
|
98
|
|
4
|
17
|
|
|
17
|
|
97
|
use strict; |
|
17
|
|
|
|
|
37
|
|
|
17
|
|
|
|
|
378
|
|
5
|
17
|
|
|
17
|
|
113
|
use warnings; |
|
17
|
|
|
|
|
39
|
|
|
17
|
|
|
|
|
495
|
|
6
|
17
|
|
|
17
|
|
104
|
use Exporter qw(import); |
|
17
|
|
|
|
|
41
|
|
|
17
|
|
|
|
|
669
|
|
7
|
17
|
|
|
17
|
|
7923
|
use Crypt::Digest::RIPEMD160 qw(ripemd160); |
|
17
|
|
|
|
|
38406
|
|
|
17
|
|
|
|
|
1022
|
|
8
|
17
|
|
|
17
|
|
5850
|
use Crypt::Digest::SHA256 qw(sha256); |
|
17
|
|
|
|
|
8053
|
|
|
17
|
|
|
|
|
946
|
|
9
|
17
|
|
|
17
|
|
110
|
use List::Util qw(max); |
|
17
|
|
|
|
|
47
|
|
|
17
|
|
|
|
|
1656
|
|
10
|
17
|
|
|
17
|
|
8071
|
use Crypt::PK::ECC; |
|
17
|
|
|
|
|
134791
|
|
|
17
|
|
|
|
|
860
|
|
11
|
|
|
|
|
|
|
|
12
|
17
|
|
|
17
|
|
5851
|
use Bitcoin::Crypto::Config; |
|
17
|
|
|
|
|
45
|
|
|
17
|
|
|
|
|
483
|
|
13
|
17
|
|
|
17
|
|
5751
|
use Bitcoin::Crypto::Exception; |
|
17
|
|
|
|
|
113
|
|
|
17
|
|
|
|
|
1712
|
|
14
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
BEGIN { |
16
|
17
|
|
|
17
|
|
24496
|
require Math::BigInt; |
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
# Version 1.6003 of optional GMP is required for the from_bytes / to_bytes implementations |
19
|
17
|
50
|
|
|
|
611935
|
if (eval { require Math::BigInt::GMP; Math::BigInt::GMP->VERSION('1.6003'); 1 }) { |
|
17
|
|
|
|
|
3390
|
|
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
20
|
0
|
|
|
|
|
0
|
Math::BigInt->import(try => 'GMP,LTM'); |
21
|
|
|
|
|
|
|
} |
22
|
|
|
|
|
|
|
else { |
23
|
17
|
|
|
|
|
144
|
Math::BigInt->import(try => 'LTM'); |
24
|
|
|
|
|
|
|
} |
25
|
|
|
|
|
|
|
} |
26
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
our @EXPORT_OK = qw( |
28
|
|
|
|
|
|
|
new_bigint |
29
|
|
|
|
|
|
|
pad_hex |
30
|
|
|
|
|
|
|
ensure_length |
31
|
|
|
|
|
|
|
verify_bytestring |
32
|
|
|
|
|
|
|
hash160 |
33
|
|
|
|
|
|
|
hash256 |
34
|
|
|
|
|
|
|
add_ec_points |
35
|
|
|
|
|
|
|
); |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
sub new_bigint |
38
|
|
|
|
|
|
|
{ |
39
|
907
|
|
|
907
|
0
|
19732
|
my ($bytes) = @_; |
40
|
907
|
|
|
|
|
3883
|
return Math::BigInt->from_hex(unpack "H*", $bytes); |
41
|
|
|
|
|
|
|
} |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
sub pad_hex |
44
|
|
|
|
|
|
|
{ |
45
|
42
|
|
|
42
|
0
|
5602
|
my ($hex) = @_; |
46
|
42
|
|
|
|
|
138
|
$hex =~ s/^0x//; |
47
|
42
|
|
|
|
|
406
|
return "0" x (length($hex) % 2) . $hex; |
48
|
|
|
|
|
|
|
} |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
sub ensure_length |
51
|
|
|
|
|
|
|
{ |
52
|
1246
|
|
|
1246
|
0
|
11077
|
my ($packed, $bytelen) = @_; |
53
|
1246
|
|
|
|
|
2201
|
my $missing = $bytelen - length $packed; |
54
|
|
|
|
|
|
|
|
55
|
1246
|
100
|
|
|
|
2517
|
Bitcoin::Crypto::Exception->raise( |
56
|
|
|
|
|
|
|
"packed string exceeds maximum number of bytes allowed ($bytelen)" |
57
|
|
|
|
|
|
|
) if $missing < 0; |
58
|
|
|
|
|
|
|
|
59
|
1245
|
|
|
|
|
4993
|
return pack("x$missing") . $packed; |
60
|
|
|
|
|
|
|
} |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
sub verify_bytestring |
63
|
|
|
|
|
|
|
{ |
64
|
447
|
|
|
447
|
0
|
1543
|
my ($string) = @_; |
65
|
|
|
|
|
|
|
|
66
|
447
|
100
|
100
|
|
|
2135
|
Bitcoin::Crypto::Exception->raise( |
67
|
|
|
|
|
|
|
"invalid input value, expected string" |
68
|
|
|
|
|
|
|
) if !defined $string || ref $string; |
69
|
|
|
|
|
|
|
|
70
|
445
|
|
|
|
|
3734
|
my @characters = split //, $string; |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
Bitcoin::Crypto::Exception->raise( |
73
|
|
|
|
|
|
|
"string contains characters with numeric values over 255 and cannot be used as a byte string" |
74
|
445
|
50
|
|
|
|
1078
|
) if (grep { ord($_) > 255 } @characters) > 0; |
|
20618
|
|
|
|
|
32893
|
|
75
|
|
|
|
|
|
|
} |
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
sub hash160 |
78
|
|
|
|
|
|
|
{ |
79
|
341
|
|
|
341
|
0
|
863
|
my ($data) = @_; |
80
|
|
|
|
|
|
|
|
81
|
341
|
|
|
|
|
940
|
return ripemd160(sha256($data)); |
82
|
|
|
|
|
|
|
} |
83
|
|
|
|
|
|
|
|
84
|
|
|
|
|
|
|
sub hash256 |
85
|
|
|
|
|
|
|
{ |
86
|
227
|
|
|
227
|
0
|
1167
|
my ($data) = @_; |
87
|
|
|
|
|
|
|
|
88
|
227
|
|
|
|
|
630
|
return sha256(sha256($data)); |
89
|
|
|
|
|
|
|
} |
90
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
# Self-contained implementation on elliptic curve points addition. |
92
|
|
|
|
|
|
|
# This is only a partial implementation, but should be good enough for key |
93
|
|
|
|
|
|
|
# derivation needs. Code borrowed from the archived Math::EllipticCurve::Prime |
94
|
|
|
|
|
|
|
# module. Returns undef for infinity points, expects to get a valid uncompressed |
95
|
|
|
|
|
|
|
# point data on input |
96
|
|
|
|
|
|
|
sub add_ec_points |
97
|
|
|
|
|
|
|
{ |
98
|
15
|
|
|
15
|
0
|
43
|
my ($point1, $point2) = @_; |
99
|
|
|
|
|
|
|
|
100
|
15
|
|
|
|
|
30
|
my $curve_size = Bitcoin::Crypto::Config::key_max_length; |
101
|
15
|
|
|
|
|
80
|
my $curve_data = Crypt::PK::ECC->new->generate_key(Bitcoin::Crypto::Config::curve_name)->curve2hash; |
102
|
15
|
|
|
|
|
45927
|
my $p = new_bigint(pack "H*", $curve_data->{prime}); |
103
|
15
|
|
|
|
|
3279
|
my $a = new_bigint(pack "H*", $curve_data->{A}); |
104
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
my $add_points = sub { |
106
|
15
|
|
|
15
|
|
41
|
my ($x1, $x2, $y1, $lambda) = @_; |
107
|
|
|
|
|
|
|
|
108
|
15
|
|
|
|
|
40
|
my $x = $lambda->copy->bmodpow(2, $p); |
109
|
15
|
|
|
|
|
3157
|
$x->bsub($x1); |
110
|
15
|
|
|
|
|
1253
|
$x->bsub($x2); |
111
|
15
|
|
|
|
|
1193
|
$x->bmod($p); |
112
|
|
|
|
|
|
|
|
113
|
15
|
|
|
|
|
1105
|
my $y = $x1->copy->bsub($x); |
114
|
15
|
|
|
|
|
1475
|
$y->bmul($lambda); |
115
|
15
|
|
|
|
|
708
|
$y->bsub($y1); |
116
|
15
|
|
|
|
|
1206
|
$y->bmod($p); |
117
|
|
|
|
|
|
|
|
118
|
15
|
|
|
|
|
1231
|
return {x => $x, y => $y}; |
119
|
15
|
|
|
|
|
2200
|
}; |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
my $double = sub { |
122
|
0
|
|
|
0
|
|
0
|
my ($x, $y) = @_; |
123
|
0
|
|
|
|
|
0
|
my $lambda = $x->copy->bmodpow(2, $p); |
124
|
0
|
|
|
|
|
0
|
$lambda->bmul(3); |
125
|
0
|
|
|
|
|
0
|
$lambda->badd($a); |
126
|
0
|
|
|
|
|
0
|
my $bottom = $y->copy->bmul(2)->bmodinv($p); |
127
|
0
|
|
|
|
|
0
|
$lambda->bmul($bottom)->bmod($p); |
128
|
|
|
|
|
|
|
|
129
|
0
|
|
|
|
|
0
|
return $add_points->($x, $x, $y, $lambda); |
130
|
15
|
|
|
|
|
66
|
}; |
131
|
|
|
|
|
|
|
|
132
|
15
|
|
|
|
|
47
|
my $format = "(a$curve_size)*"; |
133
|
15
|
|
|
|
|
122
|
my ($px1, $py1) = map { new_bigint($_) } unpack $format, substr $point1, 1; |
|
30
|
|
|
|
|
3054
|
|
134
|
15
|
|
|
|
|
3126
|
my ($px2, $py2) = map { new_bigint($_) } unpack $format, substr $point2, 1; |
|
30
|
|
|
|
|
2894
|
|
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
my $ret = sub { |
137
|
15
|
50
|
0
|
15
|
|
55
|
if ($px1->bcmp($px2)) { |
|
|
0
|
0
|
|
|
|
|
138
|
15
|
|
|
|
|
350
|
my $lambda = $py2->copy->bsub($py1); |
139
|
15
|
|
|
|
|
1916
|
my $bottom = $px2->copy->bsub($px1)->bmodinv($p); |
140
|
15
|
|
|
|
|
4543
|
$lambda->bmul($bottom)->bmod($p); |
141
|
|
|
|
|
|
|
|
142
|
15
|
|
|
|
|
1858
|
return $add_points->($px1, $px2, $py1, $lambda); |
143
|
|
|
|
|
|
|
} |
144
|
|
|
|
|
|
|
elsif ($py1->is_zero || $py2->is_zero || $py1->bcmp($py2)) { |
145
|
0
|
|
|
|
|
0
|
return undef; |
146
|
|
|
|
|
|
|
} |
147
|
|
|
|
|
|
|
else { |
148
|
0
|
|
|
|
|
0
|
return $double->($px1, $py1); |
149
|
|
|
|
|
|
|
} |
150
|
|
|
|
|
|
|
} |
151
|
15
|
|
|
|
|
2993
|
->(); |
152
|
|
|
|
|
|
|
|
153
|
15
|
|
|
|
|
138
|
my $exp_x = $ret->{x}->to_bytes; |
154
|
15
|
|
|
|
|
479
|
my $exp_y = $ret->{y}->to_bytes; |
155
|
|
|
|
|
|
|
|
156
|
15
|
50
|
|
|
|
369
|
return defined $ret |
157
|
|
|
|
|
|
|
? "\x04" . |
158
|
|
|
|
|
|
|
ensure_length($exp_x, $curve_size) . |
159
|
|
|
|
|
|
|
ensure_length($exp_y, $curve_size) |
160
|
|
|
|
|
|
|
: undef; |
161
|
|
|
|
|
|
|
} |
162
|
|
|
|
|
|
|
|
163
|
|
|
|
|
|
|
1; |
164
|
|
|
|
|
|
|
|