-
Notifications
You must be signed in to change notification settings - Fork 37
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Remove sudo requirement for building extension
- Loading branch information
Showing
4 changed files
with
160 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,154 @@ | ||
#include <stdlib.h> | ||
#include <stdint.h> | ||
|
||
/* Parse a DER signature with arbitrary | ||
/** This function is taken from the libsecp256k1 distribution and implements | ||
* DER parsing for ECDSA signatures, while supporting an arbitrary subset of | ||
* format violations. | ||
* | ||
* Supported violations include negative integers, excessive padding, garbage | ||
* at the end, and overly long length descriptors. This is safe to use in | ||
* Bitcoin because since the activation of BIP66, signatures are verified to be | ||
* strict DER before being passed to this module, and we know it supports all | ||
* violations present in the blockchain before that point. | ||
*/ | ||
int ecdsa_signature_parse_der_lax(const secp256k1_context* ctx, secp256k1_ecdsa_signature* sig, const unsigned char *input, size_t inputlen) { | ||
size_t rpos, rlen, spos, slen; | ||
size_t pos = 0; | ||
size_t lenbyte; | ||
unsigned char tmpsig[64] = {0}; | ||
int overflow = 0; | ||
|
||
/* Hack to initialize sig with a correctly-parsed but invalid signature. */ | ||
secp256k1_ecdsa_signature_parse_compact(ctx, sig, tmpsig); | ||
|
||
/* Sequence tag byte */ | ||
if (pos == inputlen || input[pos] != 0x30) { | ||
return 0; | ||
} | ||
pos++; | ||
|
||
/* Sequence length bytes */ | ||
if (pos == inputlen) { | ||
return 0; | ||
} | ||
lenbyte = input[pos++]; | ||
if (lenbyte & 0x80) { | ||
lenbyte -= 0x80; | ||
if (pos + lenbyte > inputlen) { | ||
return 0; | ||
} | ||
pos += lenbyte; | ||
} | ||
|
||
/* Integer tag byte for R */ | ||
if (pos == inputlen || input[pos] != 0x02) { | ||
return 0; | ||
} | ||
pos++; | ||
|
||
/* Integer length for R */ | ||
if (pos == inputlen) { | ||
return 0; | ||
} | ||
lenbyte = input[pos++]; | ||
if (lenbyte & 0x80) { | ||
lenbyte -= 0x80; | ||
if (pos + lenbyte > inputlen) { | ||
return 0; | ||
} | ||
while (lenbyte > 0 && input[pos] == 0) { | ||
pos++; | ||
lenbyte--; | ||
} | ||
if (lenbyte >= sizeof(size_t)) { | ||
return 0; | ||
} | ||
rlen = 0; | ||
while (lenbyte > 0) { | ||
rlen = (rlen << 8) + input[pos]; | ||
pos++; | ||
lenbyte--; | ||
} | ||
} else { | ||
rlen = lenbyte; | ||
} | ||
if (rlen > inputlen - pos) { | ||
return 0; | ||
} | ||
rpos = pos; | ||
pos += rlen; | ||
|
||
/* Integer tag byte for S */ | ||
if (pos == inputlen || input[pos] != 0x02) { | ||
return 0; | ||
} | ||
pos++; | ||
|
||
/* Integer length for S */ | ||
if (pos == inputlen) { | ||
return 0; | ||
} | ||
lenbyte = input[pos++]; | ||
if (lenbyte & 0x80) { | ||
lenbyte -= 0x80; | ||
if (pos + lenbyte > inputlen) { | ||
return 0; | ||
} | ||
while (lenbyte > 0 && input[pos] == 0) { | ||
pos++; | ||
lenbyte--; | ||
} | ||
if (lenbyte >= sizeof(size_t)) { | ||
return 0; | ||
} | ||
slen = 0; | ||
while (lenbyte > 0) { | ||
slen = (slen << 8) + input[pos]; | ||
pos++; | ||
lenbyte--; | ||
} | ||
} else { | ||
slen = lenbyte; | ||
} | ||
if (slen > inputlen - pos) { | ||
return 0; | ||
} | ||
spos = pos; | ||
pos += slen; | ||
|
||
/* Ignore leading zeroes in R */ | ||
while (rlen > 0 && input[rpos] == 0) { | ||
rlen--; | ||
rpos++; | ||
} | ||
/* Copy R value */ | ||
if (rlen > 32) { | ||
overflow = 1; | ||
} else { | ||
memcpy(tmpsig + 32 - rlen, input + rpos, rlen); | ||
} | ||
|
||
/* Ignore leading zeroes in S */ | ||
while (slen > 0 && input[spos] == 0) { | ||
slen--; | ||
spos++; | ||
} | ||
/* Copy S value */ | ||
if (slen > 32) { | ||
overflow = 1; | ||
} else { | ||
memcpy(tmpsig + 64 - slen, input + spos, slen); | ||
} | ||
|
||
if (!overflow) { | ||
overflow = !secp256k1_ecdsa_signature_parse_compact(ctx, sig, tmpsig); | ||
} | ||
if (overflow) { | ||
/* Overwrite the result again with a correctly-parsed but invalid | ||
signature if parsing failed. */ | ||
memset(tmpsig, 0, 64); | ||
secp256k1_ecdsa_signature_parse_compact(ctx, sig, tmpsig); | ||
} | ||
return 1; | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters