#![allow(unknown_lints, unnameable_types)]
use crate::signature::{parity::Parity, error::SignatureError};
use ruint::uint;
use crate::aliases::{U256, B256};
use std::vec::Vec;
use core::str::FromStr;
const SECP256K1N_ORDER: U256 =
uint!(0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141_U256);
#[derive(Clone, Copy, Debug, Hash, PartialEq, Eq)]
pub struct Signature {
v: Parity,
r: U256,
s: U256,
}
impl<'a> TryFrom<&'a [u8]> for Signature {
type Error = SignatureError;
fn try_from(bytes: &'a [u8]) -> Result<Self, Self::Error> {
if bytes.len() != 65 {
return Err(SignatureError::FromBytes("expected exactly 65 bytes"));
}
Self::from_bytes_and_parity(&bytes[..64], bytes[64] as u64)
}
}
impl FromStr for Signature {
type Err = SignatureError;
fn from_str(s: &str) -> Result<Self, Self::Err> {
let bytes = hex::decode(s)?;
Self::try_from(&bytes[..])
}
}
impl From<&Signature> for [u8; 65] {
#[inline]
fn from(value: &Signature) -> [u8; 65] {
value.as_bytes()
}
}
impl From<Signature> for [u8; 65] {
#[inline]
fn from(value: Signature) -> [u8; 65] {
value.as_bytes()
}
}
impl From<&Signature> for Vec<u8> {
#[inline]
fn from(value: &Signature) -> Self {
value.as_bytes().to_vec()
}
}
impl From<Signature> for Vec<u8> {
#[inline]
fn from(value: Signature) -> Self {
value.as_bytes().to_vec()
}
}
#[cfg(feature = "k256")]
impl From<(k256::ecdsa::Signature, k256::ecdsa::RecoveryId)> for Signature {
fn from(value: (k256::ecdsa::Signature, k256::ecdsa::RecoveryId)) -> Self {
Self::from_signature_and_parity(value.0, value.1).unwrap()
}
}
#[cfg(feature = "k256")]
impl TryFrom<Signature> for k256::ecdsa::Signature {
type Error = k256::ecdsa::Error;
fn try_from(value: Signature) -> Result<Self, Self::Error> {
value.to_k256()
}
}
#[cfg(feature = "rlp")]
impl Signature {
pub fn decode_rlp_vrs(buf: &mut &[u8]) -> Result<Self, alloy_rlp::Error> {
use alloy_rlp::Decodable;
let parity: Parity = Decodable::decode(buf)?;
let r = Decodable::decode(buf)?;
let s = Decodable::decode(buf)?;
Self::from_rs_and_parity(r, s, parity)
.map_err(|_| alloy_rlp::Error::Custom("attempted to decode invalid field element"))
}
}
impl Signature {
#[doc(hidden)]
pub fn test_signature() -> Self {
Self::from_scalars_and_parity(
B256::from_str("840cfc572845f5786e702984c2a582528cad4b49b2a10b9db1be7fca90058565").expect(""),
B256::from_str("25e7109ceb98168d95b09b18bbf6b685130e0562f233877d492b94eee0c5b6d1").expect(""),
false,
)
.unwrap()
}
#[allow(clippy::missing_const_for_fn)]
pub fn new(r: U256, s: U256, v: Parity) -> Self {
Self { r, s, v }
}
#[cfg(feature = "k256")]
#[deprecated(note = "use `Signature::to_k256` instead")]
#[inline]
pub fn into_inner(self) -> k256::ecdsa::Signature {
self.try_into().expect("signature conversion failed")
}
#[cfg(feature = "k256")]
#[inline]
pub fn to_k256(self) -> Result<k256::ecdsa::Signature, k256::ecdsa::Error> {
k256::ecdsa::Signature::from_scalars(self.r.to_be_bytes(), self.s.to_be_bytes())
}
#[cfg(feature = "k256")]
pub fn from_signature_and_parity<T: TryInto<Parity, Error = E>, E: Into<SignatureError>>(
sig: k256::ecdsa::Signature,
parity: T,
) -> Result<Self, SignatureError> {
let r = U256::from_be_slice(sig.r().to_bytes().as_ref());
let s = U256::from_be_slice(sig.s().to_bytes().as_ref());
Ok(Self { v: parity.try_into().map_err(Into::into)?, r, s })
}
#[inline]
pub fn from_scalars_and_parity<T: TryInto<Parity, Error = E>, E: Into<SignatureError>>(
r: crate::aliases::B256,
s: crate::aliases::B256,
parity: T,
) -> Result<Self, SignatureError> {
Self::from_rs_and_parity(
U256::from_be_slice(&r.to_be_bytes::<32>()),
U256::from_be_slice(&s.to_be_bytes::<32>()),
parity,
)
}
#[inline]
pub fn normalize_s(&self) -> Option<Self> {
let s = self.s();
if s > SECP256K1N_ORDER >> 1 {
Some(Self { v: self.v.inverted(), r: self.r, s: SECP256K1N_ORDER - s })
} else {
None
}
}
#[cfg(feature = "k256")]
#[inline]
pub const fn recid(&self) -> k256::ecdsa::RecoveryId {
self.v.recid()
}
#[cfg(feature = "k256")]
#[doc(hidden)]
#[deprecated(note = "use `Signature::recid` instead")]
pub const fn recovery_id(&self) -> k256::ecdsa::RecoveryId {
self.recid()
}
#[cfg(feature = "k256")]
#[inline]
pub fn recover_address_from_msg<T: AsRef<[u8]>>(
&self,
msg: T,
) -> Result<crate::Address, SignatureError> {
self.recover_from_msg(msg).map(|vk| crate::Address::from_public_key(&vk))
}
#[cfg(feature = "k256")]
#[inline]
pub fn recover_address_from_prehash(
&self,
prehash: &crate::B256,
) -> Result<crate::Address, SignatureError> {
self.recover_from_prehash(prehash).map(|vk| crate::Address::from_public_key(&vk))
}
#[cfg(feature = "k256")]
#[inline]
pub fn recover_from_msg<T: AsRef<[u8]>>(
&self,
msg: T,
) -> Result<k256::ecdsa::VerifyingKey, SignatureError> {
self.recover_from_prehash(&crate::eip191_hash_message(msg))
}
#[cfg(feature = "k256")]
#[inline]
pub fn recover_from_prehash(
&self,
prehash: &crate::B256,
) -> Result<k256::ecdsa::VerifyingKey, SignatureError> {
let this = self.normalize_s().unwrap_or(*self);
k256::ecdsa::VerifyingKey::recover_from_prehash(
prehash.as_slice(),
&this.to_k256()?,
this.recid(),
)
.map_err(Into::into)
}
#[inline]
pub fn from_bytes_and_parity<T: TryInto<Parity, Error = E>, E: Into<SignatureError>>(
bytes: &[u8],
parity: T,
) -> Result<Self, SignatureError> {
let r = U256::from_be_slice(&bytes[..32]);
let s = U256::from_be_slice(&bytes[32..64]);
Self::from_rs_and_parity(r, s, parity)
}
pub fn from_rs_and_parity<T: TryInto<Parity, Error = E>, E: Into<SignatureError>>(
r: U256,
s: U256,
parity: T,
) -> Result<Self, SignatureError> {
Ok(Self { v: parity.try_into().map_err(Into::into)?, r, s })
}
#[inline]
pub fn with_chain_id(self, chain_id: u64) -> Self {
self.with_parity(self.v.with_chain_id(chain_id))
}
pub fn with_parity_bool(self) -> Self {
self.with_parity(self.v.to_parity_bool())
}
#[inline]
pub const fn r(&self) -> U256 {
self.r
}
#[inline]
pub const fn s(&self) -> U256 {
self.s
}
#[inline]
pub const fn v(&self) -> Parity {
self.v
}
#[inline]
pub fn as_bytes(&self) -> [u8; 65] {
let mut sig = [0u8; 65];
sig[..32].copy_from_slice(&self.r.to_be_bytes::<32>());
sig[32..64].copy_from_slice(&self.s.to_be_bytes::<32>());
sig[64] = self.v.y_parity_byte_non_eip155().unwrap_or(self.v.y_parity_byte());
sig
}
#[inline]
pub fn with_parity<T: Into<Parity>>(self, parity: T) -> Self {
Self { v: parity.into(), r: self.r, s: self.s }
}
#[cfg(feature = "rlp")]
pub fn rlp_rs_len(&self) -> usize {
alloy_rlp::Encodable::length(&self.r) + alloy_rlp::Encodable::length(&self.s)
}
#[cfg(feature = "rlp")]
pub fn rlp_vrs_len(&self) -> usize {
self.rlp_rs_len() + alloy_rlp::Encodable::length(&self.v)
}
#[cfg(feature = "rlp")]
pub fn write_rlp_rs(&self, out: &mut dyn alloy_rlp::BufMut) {
alloy_rlp::Encodable::encode(&self.r, out);
alloy_rlp::Encodable::encode(&self.s, out);
}
#[cfg(feature = "rlp")]
pub fn write_rlp_v(&self, out: &mut dyn alloy_rlp::BufMut) {
alloy_rlp::Encodable::encode(&self.v, out);
}
#[cfg(feature = "rlp")]
pub fn write_rlp_vrs(&self, out: &mut dyn alloy_rlp::BufMut) {
self.write_rlp_v(out);
self.write_rlp_rs(out);
}
}
#[cfg(feature = "rlp")]
impl alloy_rlp::Encodable for Signature {
fn encode(&self, out: &mut dyn alloy_rlp::BufMut) {
alloy_rlp::Header { list: true, payload_length: self.rlp_vrs_len() }.encode(out);
self.write_rlp_vrs(out);
}
fn length(&self) -> usize {
let payload_length = self.rlp_vrs_len();
payload_length + alloy_rlp::length_of_length(payload_length)
}
}
#[cfg(feature = "rlp")]
impl alloy_rlp::Decodable for Signature {
fn decode(buf: &mut &[u8]) -> Result<Self, alloy_rlp::Error> {
let header = alloy_rlp::Header::decode(buf)?;
let pre_len = buf.len();
let decoded = Self::decode_rlp_vrs(buf)?;
let consumed = pre_len - buf.len();
if consumed != header.payload_length {
return Err(alloy_rlp::Error::Custom("consumed incorrect number of bytes"));
}
Ok(decoded)
}
}
#[cfg(feature = "serde")]
impl serde::Serialize for Signature {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
where
S: serde::Serializer,
{
if serializer.is_human_readable() {
use serde::ser::SerializeMap;
let mut map = serializer.serialize_map(Some(3))?;
map.serialize_entry("r", &self.r)?;
map.serialize_entry("s", &self.s)?;
match self.v {
Parity::Eip155(v) => map.serialize_entry("v", &crate::U64::from(v))?,
Parity::NonEip155(b) => {
map.serialize_entry("v", &crate::U64::from(b as u8 + 27))?
}
Parity::Parity(true) => map.serialize_entry("yParity", "0x1")?,
Parity::Parity(false) => map.serialize_entry("yParity", "0x0")?,
}
map.end()
} else {
use serde::ser::SerializeTuple;
let mut tuple = serializer.serialize_tuple(3)?;
tuple.serialize_element(&self.r)?;
tuple.serialize_element(&self.s)?;
tuple.serialize_element(&crate::U64::from(self.v.to_u64()))?;
tuple.end()
}
}
}
#[cfg(feature = "serde")]
impl<'de> serde::Deserialize<'de> for Signature {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: serde::Deserializer<'de>,
{
use serde::de::MapAccess;
enum Field {
R,
S,
V,
YParity,
Unknown,
}
impl<'de> serde::Deserialize<'de> for Field {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: serde::Deserializer<'de>,
{
struct FieldVisitor;
impl<'de> serde::de::Visitor<'de> for FieldVisitor {
type Value = Field;
fn expecting(
&self,
formatter: &mut core::fmt::Formatter<'_>,
) -> core::fmt::Result {
formatter.write_str("v, r, s, or yParity")
}
fn visit_str<E>(self, value: &str) -> Result<Field, E>
where
E: serde::de::Error,
{
match value {
"r" => Ok(Field::R),
"s" => Ok(Field::S),
"v" => Ok(Field::V),
"yParity" => Ok(Field::YParity),
_ => Ok(Field::Unknown),
}
}
}
deserializer.deserialize_identifier(FieldVisitor)
}
}
struct MapVisitor;
impl<'de> serde::de::Visitor<'de> for MapVisitor {
type Value = Signature;
fn expecting(&self, formatter: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
formatter.write_str("a JSON signature object containing r, s, and v or yParity")
}
fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error>
where
A: MapAccess<'de>,
{
let mut v: Option<Parity> = None;
let mut r = None;
let mut s = None;
while let Some(key) = map.next_key()? {
match key {
Field::V => {
let value: crate::U64 = map.next_value()?;
let parity = value.try_into().map_err(|_| {
serde::de::Error::invalid_value(
serde::de::Unexpected::Unsigned(value.as_limbs()[0]),
&"a valid v value matching the range 0 | 1 | 27 | 28 | 35..",
)
})?;
v = Some(parity);
}
Field::YParity => {
let value: crate::Uint<1, 1> = map.next_value()?;
if v.is_none() {
v = Some(value.into());
}
}
Field::R => {
let value: U256 = map.next_value()?;
r = Some(value);
}
Field::S => {
let value: U256 = map.next_value()?;
s = Some(value);
}
_ => {}
}
}
let v = v.ok_or_else(|| serde::de::Error::missing_field("v"))?;
let r = r.ok_or_else(|| serde::de::Error::missing_field("r"))?;
let s = s.ok_or_else(|| serde::de::Error::missing_field("s"))?;
Signature::from_rs_and_parity(r, s, v).map_err(serde::de::Error::custom)
}
}
struct TupleVisitor;
impl<'de> serde::de::Visitor<'de> for TupleVisitor {
type Value = Signature;
fn expecting(&self, formatter: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
formatter.write_str("a tuple containing r, s, and v")
}
fn visit_seq<A>(self, mut seq: A) -> Result<Self::Value, A::Error>
where
A: serde::de::SeqAccess<'de>,
{
let r = seq
.next_element()?
.ok_or_else(|| serde::de::Error::invalid_length(0, &self))?;
let s = seq
.next_element()?
.ok_or_else(|| serde::de::Error::invalid_length(1, &self))?;
let v: crate::U64 = seq
.next_element()?
.ok_or_else(|| serde::de::Error::invalid_length(2, &self))?;
Signature::from_rs_and_parity(r, s, v).map_err(serde::de::Error::custom)
}
}
if deserializer.is_human_readable() {
deserializer.deserialize_map(MapVisitor)
} else {
deserializer.deserialize_tuple(3, TupleVisitor)
}
}
}
#[cfg(feature = "arbitrary")]
impl<'a> arbitrary::Arbitrary<'a> for Signature {
fn arbitrary(u: &mut arbitrary::Unstructured<'a>) -> arbitrary::Result<Self> {
Self::from_rs_and_parity(u.arbitrary()?, u.arbitrary()?, u.arbitrary::<Parity>()?)
.map_err(|_| arbitrary::Error::IncorrectFormat)
}
}
#[cfg(feature = "arbitrary")]
impl proptest::arbitrary::Arbitrary for Signature {
type Parameters = ();
type Strategy = proptest::strategy::FilterMap<
<(U256, U256, Parity) as proptest::arbitrary::Arbitrary>::Strategy,
fn((U256, U256, Parity)) -> Option<Self>,
>;
fn arbitrary_with((): Self::Parameters) -> Self::Strategy {
use proptest::strategy::Strategy;
proptest::arbitrary::any::<(U256, U256, Parity)>()
.prop_filter_map("invalid signature", |(r, s, parity)| {
Self::from_rs_and_parity(r, s, parity).ok()
})
}
}