signer.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361
  1. package core
  2. import (
  3. "app/commons/model/entity"
  4. "crypto/ecdsa"
  5. "encoding/base64"
  6. "fmt"
  7. "github.com/btcsuite/btcd/btcutil/hdkeychain"
  8. "github.com/btcsuite/btcd/chaincfg"
  9. "github.com/demdxx/gocast"
  10. "github.com/ethereum/go-ethereum/accounts"
  11. "github.com/ethereum/go-ethereum/common"
  12. "github.com/ethereum/go-ethereum/common/hexutil"
  13. "github.com/ethereum/go-ethereum/crypto"
  14. "github.com/tyler-smith/go-bip39"
  15. "strings"
  16. "time"
  17. )
  18. type Sign struct {
  19. SysName string `mapstructure:"sys-name" json:"sys-name" yaml:"sys-name"` // 本系统名
  20. SysSignPrefix string `mapstructure:"sys-sign-prefix" json:"sys-sign-prefix" yaml:"sys-sign-prefix"`
  21. SysAddress string `mapstructure:"sys-address" json:"sys-address" yaml:"sys-address"` // 本系统地址
  22. SysKey string `mapstructure:"sys-key" json:"sys-key" yaml:"sys-key"` // 本系统密钥 -- 使用本系统密码本加密
  23. Internals []*InternalSys `mapstructure:"internals" json:"internals" yaml:"internals"`
  24. }
  25. type InternalSys struct {
  26. SysName string `mapstructure:"sys-name" json:"sys-name" yaml:"sys-name"`
  27. SysUrl string `mapstructure:"sys-url" json:"sys-url" yaml:"sys-url"` // 系统地址
  28. SignPrefix string `mapstructure:"sign-prefix" json:"sign-prefix" yaml:"sign-prefix"` // 签名前缀
  29. SignExpSec int64 `mapstructure:"sign-exp-sec" json:"sign-exp-sec" yaml:"sign-exp-sec"` // 签名超时-S
  30. SysAddress string `mapstructure:"sys-address" json:"sys-address" yaml:"sys-address"` // 管理系统地址
  31. }
  32. var signConfer *Sign
  33. func GetSignSysName(signStr string) (string, error) {
  34. for _, item := range signConf().Internals {
  35. if strings.HasPrefix(signStr, item.SysName) {
  36. return item.SysName, nil
  37. }
  38. }
  39. return "", fmt.Errorf("not found")
  40. }
  41. func signConf() *Sign {
  42. if signConfer == nil {
  43. // 初始化
  44. rows := make([]*entity.SysSignConfig, 0)
  45. err := MainDb().
  46. Model(&entity.SysSignConfig{}).
  47. Where("1 = 1").
  48. Find(&rows).Error
  49. if err != nil {
  50. panic(err)
  51. }
  52. signConfer = new(Sign)
  53. for _, row := range rows {
  54. if row.IsSystemSign {
  55. signConfer.SysSignPrefix = row.SignName
  56. signConfer.SysKey = row.SignPriKey
  57. signConfer.SysAddress = row.SignAddress
  58. signConfer.SysName = row.SignName
  59. continue
  60. }
  61. if signConfer.Internals == nil {
  62. signConfer.Internals = make([]*InternalSys, 0)
  63. }
  64. signConfer.Internals = append(signConfer.Internals, &InternalSys{
  65. SysName: row.SignName,
  66. SysAddress: row.SignAddress,
  67. SysUrl: row.SysUrl,
  68. SignPrefix: row.SignName,
  69. SignExpSec: row.SignExpSec,
  70. })
  71. }
  72. }
  73. return signConfer
  74. }
  75. // 构建本系统签名信息
  76. func BuildSignMessage() (string, error) {
  77. sysPrivateKey, err := Base64Decode(signConf().SysKey)
  78. if err != nil {
  79. return "", err
  80. }
  81. msg := fmt.Sprintf("%s%d", signConf().SysSignPrefix, time.Now().Unix())
  82. sign, err := signMessage(msg, sysPrivateKey)
  83. if err != nil {
  84. return "", err
  85. }
  86. return fmt.Sprintf("%s%s", msg, sign), nil
  87. }
  88. type Signer struct {
  89. SignPrefix string `mapstructure:"sign-prefix" json:"sign-prefix" yaml:"sign-prefix"` // 签名前缀
  90. SignExpSec int64 `mapstructure:"sign-exp-sec" json:"sign-exp-sec" yaml:"sign-exp-sec"` // 签名超时-S
  91. SysAddress string `mapstructure:"sys-address" json:"sys-address" yaml:"sys-address"` // 管理系统地址
  92. }
  93. // 通过系统名获取外部系统签名器 用于签名验证
  94. var signerMap = make(map[string]*Signer)
  95. func SignerBySysName(sysName string) (*Signer, error) {
  96. v, ok := signerMap[sysName]
  97. if ok {
  98. return v, nil
  99. }
  100. for _, item := range signConf().Internals {
  101. if item.SysName == sysName {
  102. signerMap[sysName] = &Signer{
  103. SignPrefix: item.SignPrefix,
  104. SignExpSec: item.SignExpSec,
  105. SysAddress: item.SysAddress,
  106. }
  107. return signerMap[sysName], nil
  108. }
  109. }
  110. return nil, fmt.Errorf("sys name not found")
  111. }
  112. // 本系统地址 -- 暴露给其他系统使用
  113. func SysAddress() (string, error) {
  114. sysPrivateKey, err := Base64Decode(signConf().SysKey)
  115. if err != nil {
  116. return "", err
  117. }
  118. return ethPriKey2HexAddress(sysPrivateKey)
  119. }
  120. func SysSignPrefix() string {
  121. return signConf().SysSignPrefix
  122. }
  123. const (
  124. base64Table = "7PQX12RVW3YZaDEFGbcdeIJjkKLMNO56fghiABCHlSTUmnopqrxyz04stuvw89+/"
  125. )
  126. var coder = base64.NewEncoding(base64Table)
  127. func Base64Encode(src string) string { //编码
  128. return coder.EncodeToString([]byte(src))
  129. }
  130. func Base64Decode(src string) (string, error) { //解码
  131. bts, err := coder.DecodeString(src)
  132. if err != nil {
  133. return "", err
  134. }
  135. return fmt.Sprintf("%s", bts), nil
  136. }
  137. func signMessage(message, hexPri string) (string, error) {
  138. priKey, err := priHexKeyToECDSA(hexPri)
  139. if err != nil {
  140. return "", err
  141. }
  142. return signMessageWithEcdsa(message, priKey)
  143. }
  144. // signMessageWithEcdsa 使用私钥签名消息
  145. func signMessageWithEcdsa(message string, privateKey *ecdsa.PrivateKey) (string, error) {
  146. // 计算消息的Keccak256哈希
  147. hash := crypto.Keccak256Hash([]byte(message))
  148. // 签名
  149. signature, err := crypto.Sign(hash.Bytes(), privateKey)
  150. if err != nil {
  151. return "", err
  152. }
  153. // 添加恢复ID(以太坊要求)
  154. signature[64] += 27
  155. return hexutil.Encode(signature), nil
  156. }
  157. func (s *Signer) VerifySignature(message string) error {
  158. msg, signature, ok := s.checkMessage(message)
  159. if !ok {
  160. return fmt.Errorf("非法签名")
  161. }
  162. return verifySignature(msg, signature, common.HexToAddress(s.SysAddress))
  163. }
  164. // 消息格式
  165. // 1 去除消息头部信息
  166. // 2 获取前10位数字
  167. // 3 对比时间 不得相差3秒
  168. func (s *Signer) checkMessage(message string) (string, string, bool) {
  169. if !strings.HasPrefix(message, s.SignPrefix) {
  170. fmt.Println(fmt.Sprintf("签名未包含前缀:%s", s.SignPrefix))
  171. return "", "", false
  172. }
  173. removePrefix := strings.TrimPrefix(message, s.SignPrefix)
  174. timestamp := removePrefix[:10]
  175. notUnixTime := time.Now().Unix()
  176. if notUnixTime > gocast.ToInt64(timestamp)+s.SignExpSec || gocast.ToInt64(timestamp) > notUnixTime {
  177. return "", "", false
  178. }
  179. signature := removePrefix[10:]
  180. return s.SignPrefix + removePrefix[:10], signature, true
  181. }
  182. // verifySignature 验证签名
  183. func verifySignature(message, signature string, address common.Address) error {
  184. // 解码签名
  185. sig, err := hexutil.Decode(signature)
  186. if err != nil {
  187. return err
  188. }
  189. // 恢复ID必须为27或28
  190. if sig[64] != 27 && sig[64] != 28 {
  191. return fmt.Errorf("无效的恢复ID")
  192. }
  193. // 调整恢复ID为0或1(以太坊库要求)
  194. sig[64] -= 27
  195. // 计算消息哈希
  196. hash := crypto.Keccak256Hash([]byte(message))
  197. // 从签名恢复公钥
  198. publicKey, err := crypto.SigToPub(hash.Bytes(), sig)
  199. if err != nil {
  200. return err
  201. }
  202. // 从公钥生成地址
  203. recoveredAddr := crypto.PubkeyToAddress(*publicKey)
  204. // 验证地址是否匹配
  205. if recoveredAddr != address {
  206. return fmt.Errorf("签名验证失败: 地址不匹配")
  207. }
  208. return nil
  209. }
  210. // 生成助记词 使用标准:BIP39(i -128 /256)
  211. // 生成“128的熵”
  212. //1. 生成一个长度为 128 ~ 256 位的随机序列(后面称为熵);
  213. //- 熵的取值长度需要为 32 的整数倍的值。所以取值可能为:【128, 160, 192, 224, 256】。
  214. //2. 获取熵的校验和;
  215. //- 取熵哈希后的前 n 位作为校验和(n = 熵长度/32)。
  216. //- 校验和的理论值为【4,5,6,7,8】。
  217. //3. 生成新的序列;
  218. //- 新的序列方式为 = 熵 + 校验和
  219. //- 新序列的长度理论值可能为:【128+4,160+5,192+6,224+7,256+8】即【132,165,198,231,264】
  220. //4. 获得 m 个 11 位二进制数。
  221. //- 将新生成的序列,按照 11 位进行平分。
  222. //- m 的理论可能值为:【12,15,18,21,24】
  223. //- 为什么是 11 位?助记词库总共有 2048 个单词,2^11 正好是 2048。所以用 11 位二进制数刚好可以将所有的助记词定位。
  224. //5. 获得 m 个助记词;
  225. //- 根据第四步得到的 m 个 11位二进制数,去助记词表定位每一个助记词。
  226. //- 得到助记词个数的理论值为:【12,15,18,21,24】
  227. // 波场使用的熵长度为256 128生成12位单词助记词
  228. func GenerateMnemonicWords(i int) string {
  229. entropy, err := bip39.NewEntropy(i)
  230. if err != nil {
  231. return ""
  232. }
  233. mnemonic, _ := bip39.NewMnemonic(entropy)
  234. return mnemonic
  235. }
  236. func MnemonicToEthInfo(mnemonic string) (ethHexAddress string, subPriKey string, err error) {
  237. // 验证助记词有效性
  238. if !bip39.IsMnemonicValid(mnemonic) {
  239. return "", "", fmt.Errorf("invalid mnemonic phrase")
  240. }
  241. // 生成种子
  242. seed := bip39.NewSeed(mnemonic, "") // 第二个参数是密码,可以为空
  243. // 创建主密钥
  244. master, err := hdkeychain.NewMaster(seed, &chaincfg.MainNetParams)
  245. if err != nil {
  246. return "", "", fmt.Errorf("failed to create master key: %v", err)
  247. }
  248. // 解析派生路径
  249. dp, err := accounts.ParseDerivationPath("m/44'/60'/0'/0/0")
  250. if err != nil {
  251. return "", "", fmt.Errorf("failed to parse derivation path: %v", err)
  252. }
  253. // 派生密钥
  254. for _, n := range dp {
  255. var child *hdkeychain.ExtendedKey
  256. if master.IsAffectedByIssue172() {
  257. child, err = master.Derive(n)
  258. } else {
  259. child, err = master.DeriveNonStandard(n)
  260. }
  261. if err != nil {
  262. return "", "", fmt.Errorf("failed to derive key: %v", err)
  263. }
  264. master = child
  265. }
  266. // 获取ECDSA私钥
  267. privateKey, err := master.ECPrivKey()
  268. if err != nil {
  269. return "", "", fmt.Errorf("failed to get EC private key: %v", err)
  270. }
  271. privateKeyECDSA := privateKey.ToECDSA()
  272. publicKey := privateKeyECDSA.Public().(*ecdsa.PublicKey)
  273. // 生成地址
  274. addr := crypto.PubkeyToAddress(*publicKey)
  275. ethHexAddress = addr.Hex()
  276. // 编码私钥
  277. privateKeyBytes := crypto.FromECDSA(privateKeyECDSA)
  278. subPriKey = hexutil.Encode(privateKeyBytes)
  279. return ethHexAddress, subPriKey, nil
  280. }
  281. func GenerateSysInfo() (string, string, error) {
  282. mn := GenerateMnemonicWords(128)
  283. addr, pri, err := MnemonicToEthInfo(mn)
  284. if err != nil {
  285. return "", "", err
  286. }
  287. pri = Base64Encode(pri)
  288. return addr, pri, nil
  289. }
  290. func EthAddressCheck(addr string) bool {
  291. return common.IsHexAddress(addr)
  292. }
  293. func priHexKeyToECDSA(hexPriKey string) (*ecdsa.PrivateKey, error) {
  294. return crypto.HexToECDSA(strings.TrimPrefix(hexPriKey, "0x"))
  295. }
  296. func ethPriKey2HexAddress(priKeyHash string) (string, error) {
  297. priKey, err := priHexKeyToECDSA(priKeyHash)
  298. if err != nil {
  299. return "", err
  300. }
  301. pubKey := priKey.Public().(*ecdsa.PublicKey)
  302. addr := crypto.PubkeyToAddress(*pubKey)
  303. return addr.Hex(), nil
  304. }
  305. func EthPriKey2HexAddress(priKeyHash string) (string, error) {
  306. return ethPriKey2HexAddress(priKeyHash)
  307. }