forked from mycroft/chainstate
-
Notifications
You must be signed in to change notification settings - Fork 0
/
pubkey.cc
117 lines (87 loc) · 2.81 KB
/
pubkey.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
#include <iostream>
#include <string.h>
#include <openssl/sha.h>
#include <openssl/ripemd.h>
#include <libbase58.h>
#include <secp256k1.h>
#include "segwit_addr.h"
using namespace std;
bool pubkey_decompress(unsigned int size, const char *input, unsigned char *pub, size_t *publen)
{
secp256k1_context* secp256k1_context_verify = nullptr;
secp256k1_pubkey pubkey;
unsigned char vch[33] = {};
vch[0] = size - 2;
memcpy(&vch[1], input, 32);
memset(&pubkey, 0, sizeof(pubkey));
secp256k1_context_verify = secp256k1_context_create(SECP256K1_CONTEXT_VERIFY);
if (!secp256k1_ec_pubkey_parse(secp256k1_context_verify, &pubkey, vch, 33)) {
secp256k1_context_destroy(secp256k1_context_verify);
return false;
}
secp256k1_ec_pubkey_serialize(secp256k1_context_verify, pub, publen, &pubkey, SECP256K1_EC_UNCOMPRESSED);
secp256k1_context_destroy(secp256k1_context_verify);
return true;
}
void sha256(unsigned char *input, size_t s, unsigned char output[SHA256_DIGEST_LENGTH])
{
SHA256_CTX sha256;
SHA256_Init(&sha256);
SHA256_Update(&sha256, input, s);
SHA256_Final(output, &sha256);
}
void ripemd160(unsigned char *input, size_t s, unsigned char output[RIPEMD160_DIGEST_LENGTH])
{
RIPEMD160_CTX ctx;
RIPEMD160_Init(&ctx);
RIPEMD160_Update(&ctx, input, s);
RIPEMD160_Final(output, &ctx);
}
string get_addr(unsigned char prefix[4], size_t prefix_size, string value)
{
char b58[1024];
size_t b58len = 1024;
unsigned char output[SHA256_DIGEST_LENGTH];
for(size_t i = 0;i < prefix_size; i ++) {
value.insert(i, 1, prefix[i]);
}
sha256((unsigned char*)value.c_str(), value.size(), output);
sha256(output, SHA256_DIGEST_LENGTH, output);
value.append((char *)output, 4);
b58enc(b58, &b58len, value.c_str(), value.size());
return string(b58);
}
string str_to_ripesha(string value, int size)
{
string v = value;
unsigned char output[SHA256_DIGEST_LENGTH];
unsigned char ripe_output[RIPEMD160_DIGEST_LENGTH];
sha256((unsigned char*)v.c_str(), size, output);
ripemd160(output, SHA256_DIGEST_LENGTH, ripe_output);
return string((const char*)ripe_output, RIPEMD160_DIGEST_LENGTH);
}
string str_to_ripesha(string value)
{
return str_to_ripesha(value, value.size());
}
string rebuild_bech32(string value)
{
int witver;
size_t witprog_len;
unsigned char witprog[256];
unsigned char* scriptpubkey;
int ret;
char rebuild[93];
witver = value[0];
witprog_len = value[1];
scriptpubkey = (unsigned char*)value.c_str();
if(witver) {
witver -= 0x50;
}
memcpy(witprog, scriptpubkey + 2, witprog_len);
ret = segwit_addr_encode(rebuild, "bc", witver, witprog, witprog_len);
if (ret != 1) {
return string();
}
return string(rebuild);
}