go-ethereum/core/vm/contracts.go

105 lines
2.7 KiB
Go
Raw Normal View History

2014-10-18 06:31:20 -05:00
package vm
2014-10-08 05:01:36 -05:00
import (
"math/big"
2015-03-16 05:27:38 -05:00
"github.com/ethereum/go-ethereum/common"
"github.com/ethereum/go-ethereum/crypto"
"github.com/ethereum/go-ethereum/logger"
"github.com/ethereum/go-ethereum/logger/glog"
"github.com/ethereum/go-ethereum/params"
2014-10-08 05:01:36 -05:00
)
type Address interface {
Call(in []byte) []byte
}
type PrecompiledAccount struct {
Gas func(l int) *big.Int
2014-10-08 05:01:36 -05:00
fn func(in []byte) []byte
}
func (self PrecompiledAccount) Call(in []byte) []byte {
2014-10-08 05:01:36 -05:00
return self.fn(in)
}
2015-01-13 03:30:52 -06:00
var Precompiled = PrecompiledContracts()
// XXX Could set directly. Testing requires resetting and setting of pre compiled contracts.
func PrecompiledContracts() map[string]*PrecompiledAccount {
return map[string]*PrecompiledAccount{
// ECRECOVER
2015-03-16 05:27:38 -05:00
string(common.LeftPadBytes([]byte{1}, 20)): &PrecompiledAccount{func(l int) *big.Int {
return params.EcrecoverGas
2015-01-13 03:30:52 -06:00
}, ecrecoverFunc},
// SHA256
2015-03-16 05:27:38 -05:00
string(common.LeftPadBytes([]byte{2}, 20)): &PrecompiledAccount{func(l int) *big.Int {
2015-03-02 09:32:02 -06:00
n := big.NewInt(int64(l+31) / 32)
n.Mul(n, params.Sha256WordGas)
return n.Add(n, params.Sha256Gas)
2015-01-13 03:30:52 -06:00
}, sha256Func},
// RIPEMD160
2015-03-16 05:27:38 -05:00
string(common.LeftPadBytes([]byte{3}, 20)): &PrecompiledAccount{func(l int) *big.Int {
2015-03-02 09:32:02 -06:00
n := big.NewInt(int64(l+31) / 32)
n.Mul(n, params.Ripemd160WordGas)
return n.Add(n, params.Ripemd160Gas)
2015-01-13 03:30:52 -06:00
}, ripemd160Func},
2015-03-16 05:27:38 -05:00
string(common.LeftPadBytes([]byte{4}, 20)): &PrecompiledAccount{func(l int) *big.Int {
2015-03-02 09:32:02 -06:00
n := big.NewInt(int64(l+31) / 32)
n.Mul(n, params.IdentityWordGas)
2015-01-13 03:30:52 -06:00
return n.Add(n, params.IdentityGas)
2015-01-13 03:30:52 -06:00
}, memCpy},
}
2014-10-08 05:01:36 -05:00
}
func sha256Func(in []byte) []byte {
2014-10-31 06:37:43 -05:00
return crypto.Sha256(in)
2014-10-08 05:01:36 -05:00
}
func ripemd160Func(in []byte) []byte {
2015-03-16 05:27:38 -05:00
return common.LeftPadBytes(crypto.Ripemd160(in), 32)
2014-10-08 05:01:36 -05:00
}
2015-03-29 08:02:49 -05:00
const ecRecoverInputLength = 128
2014-10-08 05:01:36 -05:00
func ecrecoverFunc(in []byte) []byte {
2015-03-29 08:02:49 -05:00
if len(in) < ecRecoverInputLength {
in = common.RightPadBytes(in, 128)
}
// "in" is (hash, v, r, s), each 32 bytes
// but for ecrecover we want (r, s, v)
2015-03-29 08:02:49 -05:00
r := common.BytesToBig(in[64:96])
s := common.BytesToBig(in[96:128])
2015-03-29 08:02:49 -05:00
// Treat V as a 256bit integer
vbig := common.Bytes2Big(in[32:64])
v := byte(vbig.Uint64())
if !crypto.ValidateSignatureValues(v, r, s) {
glog.V(logger.Error).Infof("EC RECOVER FAIL: v, r or s value invalid")
return nil
}
2015-03-29 08:02:49 -05:00
// v needs to be at the end and normalized for libsecp256k1
vbignormal := new(big.Int).Sub(vbig, big.NewInt(27))
vnormal := byte(vbignormal.Uint64())
rsv := append(in[64:128], vnormal)
pubKey, err := crypto.Ecrecover(in[:32], rsv)
2015-03-29 08:02:49 -05:00
// make sure the public key is a valid one
if err != nil {
glog.V(logger.Error).Infof("EC RECOVER FAIL: ", err)
return nil
}
2015-03-29 08:02:49 -05:00
// the first byte of pubkey is bitcoin heritage
return common.LeftPadBytes(crypto.Sha3(pubKey[1:])[12:], 32)
2014-10-08 05:01:36 -05:00
}
func memCpy(in []byte) []byte {
return in
}