ECDSA.sol 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279
  1. // SPDX-License-Identifier: MIT
  2. // OpenZeppelin Contracts (last updated v5.1.0) (utils/cryptography/ECDSA.sol)
  3. pragma solidity ^0.8.20;
  4. /**
  5. * @dev Elliptic Curve Digital Signature Algorithm (ECDSA) operations.
  6. *
  7. * These functions can be used to verify that a message was signed by the holder
  8. * of the private keys of a given address.
  9. */
  10. library ECDSA {
  11. enum RecoverError {
  12. NoError,
  13. InvalidSignature,
  14. InvalidSignatureLength,
  15. InvalidSignatureS
  16. }
  17. /**
  18. * @dev The signature derives the `address(0)`.
  19. */
  20. error ECDSAInvalidSignature();
  21. /**
  22. * @dev The signature has an invalid length.
  23. */
  24. error ECDSAInvalidSignatureLength(uint256 length);
  25. /**
  26. * @dev The signature has an S value that is in the upper half order.
  27. */
  28. error ECDSAInvalidSignatureS(bytes32 s);
  29. /**
  30. * @dev Returns the address that signed a hashed message (`hash`) with `signature` or an error. This will not
  31. * return address(0) without also returning an error description. Errors are documented using an enum (error type)
  32. * and a bytes32 providing additional information about the error.
  33. *
  34. * If no error is returned, then the address can be used for verification purposes.
  35. *
  36. * The `ecrecover` EVM precompile allows for malleable (non-unique) signatures:
  37. * this function rejects them by requiring the `s` value to be in the lower
  38. * half order, and the `v` value to be either 27 or 28.
  39. *
  40. * NOTE: This function only supports 65-byte signatures. ERC-2098 short signatures are rejected. This restriction
  41. * is DEPRECATED and will be removed in v6.0. Developers SHOULD NOT use signatures as unique identifiers; use hash
  42. * invalidation or nonces for replay protection.
  43. *
  44. * IMPORTANT: `hash` _must_ be the result of a hash operation for the
  45. * verification to be secure: it is possible to craft signatures that
  46. * recover to arbitrary addresses for non-hashed data. A safe way to ensure
  47. * this is by receiving a hash of the original message (which may otherwise
  48. * be too long), and then calling {MessageHashUtils-toEthSignedMessageHash} on it.
  49. *
  50. * Documentation for signature generation:
  51. *
  52. * - with https://web3js.readthedocs.io/en/v1.3.4/web3-eth-accounts.html#sign[Web3.js]
  53. * - with https://docs.ethers.io/v5/api/signer/#Signer-signMessage[ethers]
  54. */
  55. function tryRecover(
  56. bytes32 hash,
  57. bytes memory signature
  58. ) internal pure returns (address recovered, RecoverError err, bytes32 errArg) {
  59. if (signature.length == 65) {
  60. bytes32 r;
  61. bytes32 s;
  62. uint8 v;
  63. // ecrecover takes the signature parameters, and the only way to get them
  64. // currently is to use assembly.
  65. assembly ("memory-safe") {
  66. r := mload(add(signature, 0x20))
  67. s := mload(add(signature, 0x40))
  68. v := byte(0, mload(add(signature, 0x60)))
  69. }
  70. return tryRecover(hash, v, r, s);
  71. } else {
  72. return (address(0), RecoverError.InvalidSignatureLength, bytes32(signature.length));
  73. }
  74. }
  75. /**
  76. * @dev Variant of {tryRecover} that takes a signature in calldata
  77. */
  78. function tryRecoverCalldata(
  79. bytes32 hash,
  80. bytes calldata signature
  81. ) internal pure returns (address recovered, RecoverError err, bytes32 errArg) {
  82. if (signature.length == 65) {
  83. bytes32 r;
  84. bytes32 s;
  85. uint8 v;
  86. // ecrecover takes the signature parameters, calldata slices would work here, but are
  87. // significantly more expensive (length check) than using calldataload in assembly.
  88. assembly ("memory-safe") {
  89. r := calldataload(signature.offset)
  90. s := calldataload(add(signature.offset, 0x20))
  91. v := byte(0, calldataload(add(signature.offset, 0x40)))
  92. }
  93. return tryRecover(hash, v, r, s);
  94. } else {
  95. return (address(0), RecoverError.InvalidSignatureLength, bytes32(signature.length));
  96. }
  97. }
  98. /**
  99. * @dev Returns the address that signed a hashed message (`hash`) with
  100. * `signature`. This address can then be used for verification purposes.
  101. *
  102. * The `ecrecover` EVM precompile allows for malleable (non-unique) signatures:
  103. * this function rejects them by requiring the `s` value to be in the lower
  104. * half order, and the `v` value to be either 27 or 28.
  105. *
  106. * NOTE: This function only supports 65-byte signatures. ERC-2098 short signatures are rejected. This restriction
  107. * is DEPRECATED and will be removed in v6.0. Developers SHOULD NOT use signatures as unique identifiers; use hash
  108. * invalidation or nonces for replay protection.
  109. *
  110. * IMPORTANT: `hash` _must_ be the result of a hash operation for the
  111. * verification to be secure: it is possible to craft signatures that
  112. * recover to arbitrary addresses for non-hashed data. A safe way to ensure
  113. * this is by receiving a hash of the original message (which may otherwise
  114. * be too long), and then calling {MessageHashUtils-toEthSignedMessageHash} on it.
  115. */
  116. function recover(bytes32 hash, bytes memory signature) internal pure returns (address) {
  117. (address recovered, RecoverError error, bytes32 errorArg) = tryRecover(hash, signature);
  118. _throwError(error, errorArg);
  119. return recovered;
  120. }
  121. /**
  122. * @dev Variant of {recover} that takes a signature in calldata
  123. */
  124. function recoverCalldata(bytes32 hash, bytes calldata signature) internal pure returns (address) {
  125. (address recovered, RecoverError error, bytes32 errorArg) = tryRecoverCalldata(hash, signature);
  126. _throwError(error, errorArg);
  127. return recovered;
  128. }
  129. /**
  130. * @dev Overload of {ECDSA-tryRecover} that receives the `r` and `vs` short-signature fields separately.
  131. *
  132. * See https://eips.ethereum.org/EIPS/eip-2098[ERC-2098 short signatures]
  133. */
  134. function tryRecover(
  135. bytes32 hash,
  136. bytes32 r,
  137. bytes32 vs
  138. ) internal pure returns (address recovered, RecoverError err, bytes32 errArg) {
  139. unchecked {
  140. bytes32 s = vs & bytes32(0x7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff);
  141. // We do not check for an overflow here since the shift operation results in 0 or 1.
  142. uint8 v = uint8((uint256(vs) >> 255) + 27);
  143. return tryRecover(hash, v, r, s);
  144. }
  145. }
  146. /**
  147. * @dev Overload of {ECDSA-recover} that receives the `r and `vs` short-signature fields separately.
  148. */
  149. function recover(bytes32 hash, bytes32 r, bytes32 vs) internal pure returns (address) {
  150. (address recovered, RecoverError error, bytes32 errorArg) = tryRecover(hash, r, vs);
  151. _throwError(error, errorArg);
  152. return recovered;
  153. }
  154. /**
  155. * @dev Overload of {ECDSA-tryRecover} that receives the `v`,
  156. * `r` and `s` signature fields separately.
  157. */
  158. function tryRecover(
  159. bytes32 hash,
  160. uint8 v,
  161. bytes32 r,
  162. bytes32 s
  163. ) internal pure returns (address recovered, RecoverError err, bytes32 errArg) {
  164. // EIP-2 still allows signature malleability for ecrecover(). Remove this possibility and make the signature
  165. // unique. Appendix F in the Ethereum Yellow paper (https://ethereum.github.io/yellowpaper/paper.pdf), defines
  166. // the valid range for s in (301): 0 < s < secp256k1n ÷ 2 + 1, and for v in (302): v ∈ {27, 28}. Most
  167. // signatures from current libraries generate a unique signature with an s-value in the lower half order.
  168. //
  169. // If your library generates malleable signatures, such as s-values in the upper range, calculate a new s-value
  170. // with 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141 - s1 and flip v from 27 to 28 or
  171. // vice versa. If your library also generates signatures with 0/1 for v instead 27/28, add 27 to v to accept
  172. // these malleable signatures as well.
  173. if (uint256(s) > 0x7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF5D576E7357A4501DDFE92F46681B20A0) {
  174. return (address(0), RecoverError.InvalidSignatureS, s);
  175. }
  176. // If the signature is valid (and not malleable), return the signer address
  177. address signer = ecrecover(hash, v, r, s);
  178. if (signer == address(0)) {
  179. return (address(0), RecoverError.InvalidSignature, bytes32(0));
  180. }
  181. return (signer, RecoverError.NoError, bytes32(0));
  182. }
  183. /**
  184. * @dev Overload of {ECDSA-recover} that receives the `v`,
  185. * `r` and `s` signature fields separately.
  186. */
  187. function recover(bytes32 hash, uint8 v, bytes32 r, bytes32 s) internal pure returns (address) {
  188. (address recovered, RecoverError error, bytes32 errorArg) = tryRecover(hash, v, r, s);
  189. _throwError(error, errorArg);
  190. return recovered;
  191. }
  192. /**
  193. * @dev Parse a signature into its `v`, `r` and `s` components. Supports 65-byte and 64-byte (ERC-2098)
  194. * formats. Returns (0,0,0) for invalid signatures. Consider skipping {tryRecover} or {recover} if so.
  195. */
  196. function parse(bytes memory signature) internal pure returns (uint8 v, bytes32 r, bytes32 s) {
  197. assembly ("memory-safe") {
  198. // Check the signature length
  199. switch mload(signature)
  200. // - case 65: r,s,v signature (standard)
  201. case 65 {
  202. r := mload(add(signature, 0x20))
  203. s := mload(add(signature, 0x40))
  204. v := byte(0, mload(add(signature, 0x60)))
  205. }
  206. // - case 64: r,vs signature (cf https://eips.ethereum.org/EIPS/eip-2098)
  207. case 64 {
  208. let vs := mload(add(signature, 0x40))
  209. r := mload(add(signature, 0x20))
  210. s := and(vs, shr(1, not(0)))
  211. v := add(shr(255, vs), 27)
  212. }
  213. default {
  214. r := 0
  215. s := 0
  216. v := 0
  217. }
  218. }
  219. }
  220. /**
  221. * @dev Variant of {parse} that takes a signature in calldata
  222. */
  223. function parseCalldata(bytes calldata signature) internal pure returns (uint8 v, bytes32 r, bytes32 s) {
  224. assembly ("memory-safe") {
  225. // Check the signature length
  226. switch signature.length
  227. // - case 65: r,s,v signature (standard)
  228. case 65 {
  229. r := calldataload(signature.offset)
  230. s := calldataload(add(signature.offset, 0x20))
  231. v := byte(0, calldataload(add(signature.offset, 0x40)))
  232. }
  233. // - case 64: r,vs signature (cf https://eips.ethereum.org/EIPS/eip-2098)
  234. case 64 {
  235. let vs := calldataload(add(signature.offset, 0x20))
  236. r := calldataload(signature.offset)
  237. s := and(vs, shr(1, not(0)))
  238. v := add(shr(255, vs), 27)
  239. }
  240. default {
  241. r := 0
  242. s := 0
  243. v := 0
  244. }
  245. }
  246. }
  247. /**
  248. * @dev Optionally reverts with the corresponding custom error according to the `error` argument provided.
  249. */
  250. function _throwError(RecoverError error, bytes32 errorArg) private pure {
  251. if (error == RecoverError.NoError) {
  252. return; // no error: do nothing
  253. } else if (error == RecoverError.InvalidSignature) {
  254. revert ECDSAInvalidSignature();
  255. } else if (error == RecoverError.InvalidSignatureLength) {
  256. revert ECDSAInvalidSignatureLength(uint256(errorArg));
  257. } else if (error == RecoverError.InvalidSignatureS) {
  258. revert ECDSAInvalidSignatureS(errorArg);
  259. }
  260. }
  261. }