Files
palladum-lightning/devtools/bip137-verifysignature.c
Rusty Russell 6e5cb299dd global: remove unnecessary includes from C files.
Basically, `devtools/reduce-includes.sh */*.c`.

Build time from make clean (RUST=0) (includes building external libs):

Before:
	real    0m38.944000-40.416000(40.1131+/-0.4)s
	user    3m6.790000-17.159000(15.0571+/-2.8)s
	sys     0m35.304000-37.336000(36.8942+/-0.57)s
After:
	real    0m37.872000-39.974000(39.5466+/-0.59)s
	user    3m1.211000-14.968000(12.4556+/-3.9)s
	sys     0m35.008000-36.830000(36.4143+/-0.5)s

Build time after touch config.vars (RUST=0):

Before:
	real    0m19.831000-21.862000(21.5528+/-0.58)s
	user    2m15.361000-30.731000(28.4798+/-4.4)s
	sys     0m21.056000-22.339000(22.0346+/-0.35)s

After:
	real    0m18.384000-21.307000(20.8605+/-0.92)s
	user    2m5.585000-26.843000(23.6017+/-6.7)s
	sys     0m19.650000-22.003000(21.4943+/-0.69)s

Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2025-10-23 06:44:04 +10:30

112 lines
2.9 KiB
C

#include "config.h"
#include <bitcoin/pubkey.h>
#include <bitcoin/varint.h>
#include <ccan/err/err.h>
#include <common/addr.h>
#include <common/bech32.h>
#include <common/utils.h>
#include <secp256k1_recovery.h>
#include <stdio.h>
#include <wally_core.h>
static void usage(void)
{
fprintf(stderr,
"Usage: bip137-verifysignature message hex-sig [address] [network]\n"
"If key does not match, signature is not valid!\n");
exit(1);
}
static char *encode_pubkey_to_p2wpkh_addr(const tal_t *ctx,
const struct pubkey *pubkey,
const struct chainparams *chain)
{
char *out;
const char *hrp;
struct ripemd160 h160;
bool ok;
hrp = chain->onchain_hrp;
/* out buffer is 73 + strlen(human readable part),
* see common/bech32.h*/
out = tal_arr(ctx, char, 73 + strlen(hrp));
pubkey_to_hash160(pubkey, &h160);
ok = segwit_addr_encode(out, hrp, 0, h160.u.u8, sizeof(h160));
if(!ok)
tal_free(out);
return out;
}
int main(int argc, char *argv[])
{
u8 *sig;
u8 varint[VARINT_MAX_LEN];
size_t varintlen, msg_len;
secp256k1_ecdsa_recoverable_signature rsig;
struct sha256_ctx sctx = SHA256_INIT;
struct sha256_double shad;
struct pubkey reckey;
const char *addr;
const struct chainparams *chain = NULL;
const char *input_chain = NULL, *input_address = NULL;
setup_locale();
err_set_progname(argv[0]);
wally_init(0);
secp256k1_ctx = wally_get_secp_context();
if (argc != 3 && argc != 4 && argc != 5)
usage();
if (argc > 3)
input_address = argv[3];
if (argc > 4)
input_chain = argv[4];
sig = tal_hexdata(NULL, argv[2], strlen(argv[2]));
if (!sig)
errx(1, "Not a valid hex string");
if (sig[0] < 39 || sig[0] >= 43)
errx(1,
"Signature header does not correspond to a P2WPKH type");
if (!secp256k1_ecdsa_recoverable_signature_parse_compact(
secp256k1_ctx, &rsig, sig + 1, sig[0] - 39))
errx(1, "Signature not parsable");
sha256_update(&sctx,
"\x18"
"Bitcoin Signed Message:\n",
strlen("\x18"
"Bitcoin Signed Message:\n"));
msg_len = strlen(argv[1]);
varintlen = varint_put(varint, msg_len);
sha256_update(&sctx, varint, varintlen);
sha256_update(&sctx, argv[1], msg_len);
sha256_double_done(&sctx, &shad);
if (!secp256k1_ecdsa_recover(secp256k1_ctx, &reckey.pubkey, &rsig,
shad.sha.u.u8))
errx(1, "Signature not recoverable");
if (input_chain) {
chain = chainparams_for_network(input_chain);
if (!chain)
errx(1, "Invalid network");
} else {
/* By default, assume we are verifying a mainnet signature. */
chain = chainparams_for_network("bitcoin");
}
addr = encode_pubkey_to_p2wpkh_addr(NULL, &reckey, chain);
if (!addr)
errx(1, "Failed to derive address from recovered key");
if (input_address) {
if (!streq(addr, input_address))
errx(1, "Signature is invalid");
printf("Signature is valid!\n");
} else
printf("Signature claims to be from address %s\n", addr);
return 0;
}