Compare commits
5 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
567f411e12 | ||
|
|
eb92fccbd6 | ||
|
|
d30e2a1b59 | ||
|
|
bae4744bcb | ||
|
|
b2eb68bf83 |
@@ -22,7 +22,7 @@ buildscript {
|
|||||||
|
|
||||||
allprojects {
|
allprojects {
|
||||||
group = "fr.acinq.secp256k1"
|
group = "fr.acinq.secp256k1"
|
||||||
version = "0.14.0"
|
version = "0.16.0-SNAPSHOT"
|
||||||
|
|
||||||
repositories {
|
repositories {
|
||||||
google()
|
google()
|
||||||
@@ -58,6 +58,14 @@ kotlin {
|
|||||||
secp256k1CInterop("host")
|
secp256k1CInterop("host")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
macosX64 {
|
||||||
|
secp256k1CInterop("host")
|
||||||
|
}
|
||||||
|
|
||||||
|
macosArm64 {
|
||||||
|
secp256k1CInterop("host")
|
||||||
|
}
|
||||||
|
|
||||||
iosX64 {
|
iosX64 {
|
||||||
secp256k1CInterop("ios")
|
secp256k1CInterop("ios")
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,6 +6,7 @@ org.gradle.parallel = true
|
|||||||
kotlin.code.style = official
|
kotlin.code.style = official
|
||||||
kotlin.native.ignoreDisabledTargets = true
|
kotlin.native.ignoreDisabledTargets = true
|
||||||
kotlin.mpp.enableCInteropCommonization=true
|
kotlin.mpp.enableCInteropCommonization=true
|
||||||
|
kotlin.native.cacheKind.macosArm64=none
|
||||||
|
|
||||||
# Android
|
# Android
|
||||||
android.useAndroidX = true
|
android.useAndroidX = true
|
||||||
@@ -17,6 +17,7 @@ if [ "$TARGET" == "linux" ]; then
|
|||||||
CC_OPTS="-fPIC"
|
CC_OPTS="-fPIC"
|
||||||
elif [ "$TARGET" == "darwin" ]; then
|
elif [ "$TARGET" == "darwin" ]; then
|
||||||
OUTFILE=libsecp256k1-jni.dylib
|
OUTFILE=libsecp256k1-jni.dylib
|
||||||
|
CC_OPTS="-arch arm64 -arch x86_64"
|
||||||
elif [ "$TARGET" == "mingw" ]; then
|
elif [ "$TARGET" == "mingw" ]; then
|
||||||
OUTFILE=secp256k1-jni.dll
|
OUTFILE=secp256k1-jni.dll
|
||||||
CC=x86_64-w64-mingw32-gcc
|
CC=x86_64-w64-mingw32-gcc
|
||||||
|
|||||||
@@ -12,12 +12,8 @@ dependencies {
|
|||||||
val copyJni by tasks.creating(Sync::class) {
|
val copyJni by tasks.creating(Sync::class) {
|
||||||
onlyIf { org.gradle.internal.os.OperatingSystem.current().isMacOsX }
|
onlyIf { org.gradle.internal.os.OperatingSystem.current().isMacOsX }
|
||||||
dependsOn(":jni:jvm:buildNativeHost")
|
dependsOn(":jni:jvm:buildNativeHost")
|
||||||
val arch = when (System.getProperty("os.arch")) {
|
|
||||||
"aarch64" -> "aarch64"
|
|
||||||
else -> "x86_64"
|
|
||||||
}
|
|
||||||
from(rootDir.resolve("jni/jvm/build/darwin/libsecp256k1-jni.dylib"))
|
from(rootDir.resolve("jni/jvm/build/darwin/libsecp256k1-jni.dylib"))
|
||||||
into(buildDir.resolve("jniResources/fr/acinq/secp256k1/jni/native/darwin-$arch"))
|
into(buildDir.resolve("jniResources/fr/acinq/secp256k1/jni/native/darwin"))
|
||||||
}
|
}
|
||||||
|
|
||||||
(tasks["processResources"] as ProcessResources).apply {
|
(tasks["processResources"] as ProcessResources).apply {
|
||||||
|
|||||||
@@ -19,7 +19,8 @@ internal object OSInfo {
|
|||||||
private const val PPC = "ppc"
|
private const val PPC = "ppc"
|
||||||
private const val PPC64 = "ppc64"
|
private const val PPC64 = "ppc64"
|
||||||
|
|
||||||
@JvmStatic val nativeSuffix: String get() = "$os-$arch"
|
// on macos we build a universal library that contains arm64 and x64 binaries
|
||||||
|
@JvmStatic val nativeSuffix: String get() = if (os == "darwin") os else "$os-$arch"
|
||||||
|
|
||||||
@JvmStatic val os: String get() = translateOSName(System.getProperty("os.name"))
|
@JvmStatic val os: String get() = translateOSName(System.getProperty("os.name"))
|
||||||
|
|
||||||
|
|||||||
@@ -117,6 +117,7 @@ public object NativeSecp256k1 : Secp256k1 {
|
|||||||
}
|
}
|
||||||
|
|
||||||
override fun musigPartialSign(secnonce: ByteArray, privkey: ByteArray, keyaggCache: ByteArray, session: ByteArray): ByteArray {
|
override fun musigPartialSign(secnonce: ByteArray, privkey: ByteArray, keyaggCache: ByteArray, session: ByteArray): ByteArray {
|
||||||
|
require(musigNonceValidate(secnonce, pubkeyCreate(privkey)))
|
||||||
return Secp256k1CFunctions.secp256k1_musig_partial_sign(Secp256k1Context.getContext(), secnonce, privkey, keyaggCache, session)
|
return Secp256k1CFunctions.secp256k1_musig_partial_sign(Secp256k1Context.getContext(), secnonce, privkey, keyaggCache, session)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -12,18 +12,20 @@ cd "$(dirname "$0")"
|
|||||||
cd secp256k1
|
cd secp256k1
|
||||||
|
|
||||||
if [ "$TARGET" == "mingw" ]; then
|
if [ "$TARGET" == "mingw" ]; then
|
||||||
CONF_OPTS="CFLAGS=-fPIC --host=x86_64-w64-mingw32"
|
CFLAGS="-fPIC"
|
||||||
|
CONF_OPTS=" --host=x86_64-w64-mingw32"
|
||||||
elif [ "$TARGET" == "linux" ]; then
|
elif [ "$TARGET" == "linux" ]; then
|
||||||
CONF_OPTS="CFLAGS=-fPIC"
|
CFLAGS="-fPIC"
|
||||||
elif [ "$TARGET" == "darwin" ]; then
|
elif [ "$TARGET" == "darwin" ]; then
|
||||||
CONF_OPTS=""
|
CFLAGS="-arch arm64 -arch x86_64"
|
||||||
|
LDFLAGS="-arch arm64 -arch x86_64"
|
||||||
else
|
else
|
||||||
echo "Unknown TARGET=$TARGET"
|
echo "Unknown TARGET=$TARGET"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
./autogen.sh
|
./autogen.sh
|
||||||
./configure $CONF_OPTS --enable-experimental --enable-module_ecdh --enable-module-recovery --enable-module-schnorrsig --enable-module-musig --enable-benchmark=no --enable-shared=no --enable-exhaustive-tests=no --enable-tests=no
|
CFLAGS="$CFLAGS" LDFLAGS="$LDFLAGS" ./configure $CONF_OPTS --enable-experimental --enable-module_ecdh --enable-module-recovery --enable-module-schnorrsig --enable-module-musig --enable-benchmark=no --enable-shared=no --enable-exhaustive-tests=no --enable-tests=no
|
||||||
make clean
|
make clean
|
||||||
make
|
make
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,10 @@
|
|||||||
#!/bin/bash -x
|
#!/bin/bash -x
|
||||||
|
|
||||||
|
if [[ -z "${VERSION}" ]]; then
|
||||||
|
echo "VERSION is not defined"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
if [ $# -eq 0 ]
|
if [ $# -eq 0 ]
|
||||||
then
|
then
|
||||||
echo "specify either snapshot or release"
|
echo "specify either snapshot or release"
|
||||||
|
|||||||
@@ -1,5 +1,10 @@
|
|||||||
#!/bin/bash -x
|
#!/bin/bash -x
|
||||||
|
|
||||||
|
if [[ -z "${VERSION}" ]]; then
|
||||||
|
echo "VERSION is not defined"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
if [ $# -eq 0 ]
|
if [ $# -eq 0 ]
|
||||||
then
|
then
|
||||||
echo "specify either snapshot or release"
|
echo "specify either snapshot or release"
|
||||||
|
|||||||
@@ -21,45 +21,52 @@ mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/conte
|
|||||||
-Djavadoc=$ARTIFACT_ID_BASE-$VERSION-javadoc.jar
|
-Djavadoc=$ARTIFACT_ID_BASE-$VERSION-javadoc.jar
|
||||||
popd
|
popd
|
||||||
pushd .
|
pushd .
|
||||||
for i in iosarm64 iossimulatorarm64 iosx64 jni-android jni-common jni-jvm-darwin jni-jvm-extract jni-jvm-linux jni-jvm-mingw jni-jvm jvm linuxx64; do
|
for i in iosarm64 iossimulatorarm64 iosx64 macosarm64 macosx64 jni-android jni-common jni-jvm-darwin jni-jvm-extract jni-jvm-linux jni-jvm-mingw jni-jvm jvm linuxx64; do
|
||||||
cd fr/acinq/secp256k1/secp256k1-kmp-$i/$VERSION
|
cd fr/acinq/secp256k1/secp256k1-kmp-$i/$VERSION
|
||||||
if [ $i == iosarm64 ] || [ $i == iossimulatorarm64 ] || [ $i == iosx64 ]; then
|
|
||||||
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
case $i in
|
||||||
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
iosarm64 | iossimulatorarm64 | iosx64 | macosarm64 | macosx64)
|
||||||
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.klib \
|
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
||||||
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION-metadata.jar,$ARTIFACT_ID_BASE-$i-$VERSION.module,$ARTIFACT_ID_BASE-$i-$VERSION-cinterop-libsecp256k1.klib \
|
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
||||||
-Dtypes=jar,module,klib \
|
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.klib \
|
||||||
-Dclassifiers=metadata,,cinterop-libsecp256k1 \
|
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION-metadata.jar,$ARTIFACT_ID_BASE-$i-$VERSION.module,$ARTIFACT_ID_BASE-$i-$VERSION-cinterop-libsecp256k1.klib \
|
||||||
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
-Dtypes=jar,module,klib \
|
||||||
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
-Dclassifiers=metadata,,cinterop-libsecp256k1 \
|
||||||
elif [ $i == linuxx64 ]; then
|
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
||||||
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
||||||
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
;;
|
||||||
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.klib \
|
linuxx64)
|
||||||
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION.module,$ARTIFACT_ID_BASE-$i-$VERSION-cinterop-libsecp256k1.klib \
|
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
||||||
-Dtypes=module,klib \
|
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
||||||
-Dclassifiers=,cinterop-libsecp256k1 \
|
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.klib \
|
||||||
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION.module,$ARTIFACT_ID_BASE-$i-$VERSION-cinterop-libsecp256k1.klib \
|
||||||
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
-Dtypes=module,klib \
|
||||||
elif [ $i == jni-android ]; then
|
-Dclassifiers=,cinterop-libsecp256k1 \
|
||||||
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
||||||
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
||||||
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.aar \
|
;;
|
||||||
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION.module \
|
jni-android)
|
||||||
-Dtypes=module \
|
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
||||||
-Dclassifiers= \
|
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
||||||
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.aar \
|
||||||
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION.module \
|
||||||
else
|
-Dtypes=module \
|
||||||
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
-Dclassifiers= \
|
||||||
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
||||||
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.jar \
|
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
||||||
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION.module \
|
;;
|
||||||
-Dtypes=module \
|
*)
|
||||||
-Dclassifiers= \
|
mvn deploy:deploy-file -DrepositoryId=ossrh -Durl=https://oss.sonatype.org/content/repositories/snapshots/ \
|
||||||
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
-DpomFile=$ARTIFACT_ID_BASE-$i-$VERSION.pom \
|
||||||
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
-Dfile=$ARTIFACT_ID_BASE-$i-$VERSION.jar \
|
||||||
fi
|
-Dfiles=$ARTIFACT_ID_BASE-$i-$VERSION.module \
|
||||||
|
-Dtypes=module \
|
||||||
|
-Dclassifiers= \
|
||||||
|
-Dsources=$ARTIFACT_ID_BASE-$i-$VERSION-sources.jar \
|
||||||
|
-Djavadoc=$ARTIFACT_ID_BASE-$i-$VERSION-javadoc.jar
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
popd
|
popd
|
||||||
pushd .
|
pushd .
|
||||||
done
|
done
|
||||||
|
|||||||
@@ -3,9 +3,22 @@
|
|||||||
# first you must sign all files:
|
# first you must sign all files:
|
||||||
# find release -type f -print -exec gpg -ab {} \;
|
# find release -type f -print -exec gpg -ab {} \;
|
||||||
|
|
||||||
VERSION=0.6.2
|
if [[ -z "${VERSION}" ]]; then
|
||||||
|
echo "VERSION is not defined"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ -z "${OSS_USER}" ]]; then
|
||||||
|
echo "OSS_USER is not defined"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
read -p "Password : " -s OSS_PASSWORD
|
||||||
|
|
||||||
|
|
||||||
for i in secp256k1-kmp \
|
for i in secp256k1-kmp \
|
||||||
secp256k1-kmp-iosarm64 \
|
secp256k1-kmp-iosarm64 \
|
||||||
|
secp256k1-kmp-iossimulatorarm64 \
|
||||||
secp256k1-kmp-iosx64 \
|
secp256k1-kmp-iosx64 \
|
||||||
secp256k1-kmp-jni-android \
|
secp256k1-kmp-jni-android \
|
||||||
secp256k1-kmp-jni-common \
|
secp256k1-kmp-jni-common \
|
||||||
@@ -15,14 +28,14 @@ for i in secp256k1-kmp \
|
|||||||
secp256k1-kmp-jni-jvm-linux \
|
secp256k1-kmp-jni-jvm-linux \
|
||||||
secp256k1-kmp-jni-jvm-mingw \
|
secp256k1-kmp-jni-jvm-mingw \
|
||||||
secp256k1-kmp-jvm \
|
secp256k1-kmp-jvm \
|
||||||
secp256k1-kmp-linux
|
secp256k1-kmp-linuxx64
|
||||||
do
|
do
|
||||||
pushd .
|
pushd .
|
||||||
cd release/fr/acinq/secp256k1/$i/$VERSION
|
cd release/fr/acinq/secp256k1/$i/$VERSION
|
||||||
pwd
|
pwd
|
||||||
jar -cvf bundle.jar *
|
jar -cvf bundle.jar *
|
||||||
# use correct sonatype credentials here
|
# use correct sonatype credentials here
|
||||||
curl -v -XPOST -u USER:PASSWORD --upload-file bundle.jar https://oss.sonatype.org/service/local/staging/bundle_upload
|
curl -v -XPOST -u $OSS_USER:$OSS_PASSWORD --upload-file bundle.jar https://oss.sonatype.org/service/local/staging/bundle_upload
|
||||||
popd
|
popd
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|||||||
@@ -217,6 +217,26 @@ public interface Secp256k1 {
|
|||||||
*/
|
*/
|
||||||
public fun musigNonceProcess(aggnonce: ByteArray, msg32: ByteArray, keyaggCache: ByteArray): ByteArray
|
public fun musigNonceProcess(aggnonce: ByteArray, msg32: ByteArray, keyaggCache: ByteArray): ByteArray
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check that a secret nonce was generated with a public key that matches the private key used for signing.
|
||||||
|
* @param secretnonce secret nonce.
|
||||||
|
* @param pubkey public key for the private key that will be used, with the secret nonce, to generate a partial signature.
|
||||||
|
* @return false if the secret nonce does not match the public key.
|
||||||
|
*/
|
||||||
|
public fun musigNonceValidate(secretnonce: ByteArray, pubkey: ByteArray): Boolean {
|
||||||
|
if (secretnonce.size != MUSIG2_SECRET_NONCE_SIZE) return false
|
||||||
|
if (pubkey.size != 33 && pubkey.size != 65) return false
|
||||||
|
val pk = Secp256k1.pubkeyParse(pubkey)
|
||||||
|
// this is a bit hackish but the secp256k1 library does not export methods to do this cleanly
|
||||||
|
val x = secretnonce.copyOfRange(68, 68 + 32)
|
||||||
|
x.reverse()
|
||||||
|
val y = secretnonce.copyOfRange(68 + 32, 68 + 32 + 32)
|
||||||
|
y.reverse()
|
||||||
|
val pkx = pk.copyOfRange(1, 1 + 32)
|
||||||
|
val pky = pk.copyOfRange(33, 33 + 32)
|
||||||
|
return x.contentEquals(pkx) && y.contentEquals(pky)
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create a partial signature.
|
* Create a partial signature.
|
||||||
*
|
*
|
||||||
|
|||||||
@@ -7,6 +7,14 @@ staticLibraries.linux = libsecp256k1.a
|
|||||||
libraryPaths.linux = c/secp256k1/build/linux/ native/build/linux/ native/build/darwin/
|
libraryPaths.linux = c/secp256k1/build/linux/ native/build/linux/ native/build/darwin/
|
||||||
linkerOpts.linux = -L/usr/lib64 -L/usr/lib/x86_64-linux-gnu -L/usr/local/lib
|
linkerOpts.linux = -L/usr/lib64 -L/usr/lib/x86_64-linux-gnu -L/usr/local/lib
|
||||||
|
|
||||||
|
staticLibraries.macos_x64 = libsecp256k1.a
|
||||||
|
libraryPaths.macos_x64 = c/secp256k1/build/darwin/ native/build/darwin/
|
||||||
|
linkerOpts.macos_x64 = -framework Security -framework Foundation
|
||||||
|
|
||||||
|
staticLibraries.macos_arm64 = libsecp256k1.a
|
||||||
|
libraryPaths.macos_arm64 = c/secp256k1/build/darwin/ native/build/darwin/
|
||||||
|
linkerOpts.macos_arm64 = -framework Security -framework Foundation
|
||||||
|
|
||||||
staticLibraries.ios = libsecp256k1.a
|
staticLibraries.ios = libsecp256k1.a
|
||||||
libraryPaths.ios_x64 = c/secp256k1/build/ios/ /usr/local/lib native/build/ios/
|
libraryPaths.ios_x64 = c/secp256k1/build/ios/ /usr/local/lib native/build/ios/
|
||||||
libraryPaths.ios_arm64 = c/secp256k1/build/ios/ /usr/local/lib native/build/ios/
|
libraryPaths.ios_arm64 = c/secp256k1/build/ios/ /usr/local/lib native/build/ios/
|
||||||
|
|||||||
@@ -81,7 +81,7 @@ public object Secp256k1Native : Secp256k1 {
|
|||||||
return serialized.readBytes(Secp256k1.MUSIG2_PUBLIC_NONCE_SIZE)
|
return serialized.readBytes(Secp256k1.MUSIG2_PUBLIC_NONCE_SIZE)
|
||||||
}
|
}
|
||||||
|
|
||||||
private fun DeferScope.toNat(bytes: ByteArray): CPointer<UByteVar> {
|
private fun DeferScope.toNat(bytes: ByteArray): CPointer<UByteVar> {
|
||||||
val ubytes = bytes.asUByteArray()
|
val ubytes = bytes.asUByteArray()
|
||||||
val pinned = ubytes.pin()
|
val pinned = ubytes.pin()
|
||||||
this.defer { pinned.unpin() }
|
this.defer { pinned.unpin() }
|
||||||
@@ -112,7 +112,7 @@ public object Secp256k1Native : Secp256k1 {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public override fun signatureNormalize(sig: ByteArray): Pair<ByteArray, Boolean> {
|
public override fun signatureNormalize(sig: ByteArray): Pair<ByteArray, Boolean> {
|
||||||
require(sig.size >= 64){ "invalid signature ${Hex.encode(sig)}" }
|
require(sig.size >= 64) { "invalid signature ${Hex.encode(sig)}" }
|
||||||
memScoped {
|
memScoped {
|
||||||
val nSig = allocSignature(sig)
|
val nSig = allocSignature(sig)
|
||||||
val isHighS = secp256k1_ecdsa_signature_normalize(ctx, nSig.ptr, nSig.ptr)
|
val isHighS = secp256k1_ecdsa_signature_normalize(ctx, nSig.ptr, nSig.ptr)
|
||||||
@@ -307,7 +307,16 @@ public object Secp256k1Native : Secp256k1 {
|
|||||||
memcpy(n.ptr, toNat(it), Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE.toULong())
|
memcpy(n.ptr, toNat(it), Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE.toULong())
|
||||||
n
|
n
|
||||||
}
|
}
|
||||||
secp256k1_musig_nonce_gen(ctx, secnonce.ptr, pubnonce.ptr, toNat(sessionId32), privkey?.let { toNat(it) }, nPubkey.ptr, msg32?.let { toNat(it) },nKeyAggCache?.ptr, extraInput32?.let { toNat(it) }).requireSuccess("secp256k1_musig_nonce_gen() failed")
|
secp256k1_musig_nonce_gen(
|
||||||
|
ctx,
|
||||||
|
secnonce.ptr,
|
||||||
|
pubnonce.ptr,
|
||||||
|
toNat(sessionId32),
|
||||||
|
privkey?.let { toNat(it) },
|
||||||
|
nPubkey.ptr,
|
||||||
|
msg32?.let { toNat(it) },
|
||||||
|
nKeyAggCache?.ptr,
|
||||||
|
extraInput32?.let { toNat(it) }).requireSuccess("secp256k1_musig_nonce_gen() failed")
|
||||||
val nPubnonce = allocArray<UByteVar>(Secp256k1.MUSIG2_PUBLIC_NONCE_SIZE)
|
val nPubnonce = allocArray<UByteVar>(Secp256k1.MUSIG2_PUBLIC_NONCE_SIZE)
|
||||||
secp256k1_musig_pubnonce_serialize(ctx, nPubnonce, pubnonce.ptr).requireSuccess("secp256k1_musig_pubnonce_serialize failed")
|
secp256k1_musig_pubnonce_serialize(ctx, nPubnonce, pubnonce.ptr).requireSuccess("secp256k1_musig_pubnonce_serialize failed")
|
||||||
secnonce.ptr.readBytes(Secp256k1.MUSIG2_SECRET_NONCE_SIZE) + nPubnonce.readBytes(Secp256k1.MUSIG2_PUBLIC_NONCE_SIZE)
|
secnonce.ptr.readBytes(Secp256k1.MUSIG2_SECRET_NONCE_SIZE) + nPubnonce.readBytes(Secp256k1.MUSIG2_PUBLIC_NONCE_SIZE)
|
||||||
@@ -339,7 +348,7 @@ public object Secp256k1Native : Secp256k1 {
|
|||||||
n
|
n
|
||||||
}
|
}
|
||||||
secp256k1_musig_pubkey_agg(ctx, combined.ptr, nKeyAggCache?.ptr, nPubkeys.toCValues(), pubkeys.size.convert()).requireSuccess("secp256k1_musig_nonce_agg() failed")
|
secp256k1_musig_pubkey_agg(ctx, combined.ptr, nKeyAggCache?.ptr, nPubkeys.toCValues(), pubkeys.size.convert()).requireSuccess("secp256k1_musig_nonce_agg() failed")
|
||||||
val agg = serializeXonlyPubkey(combined)
|
val agg = serializeXonlyPubkey(combined)
|
||||||
keyaggCache?.let { blob -> nKeyAggCache?.let { memcpy(toNat(blob), it.ptr, Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE.toULong()) } }
|
keyaggCache?.let { blob -> nKeyAggCache?.let { memcpy(toNat(blob), it.ptr, Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE.toULong()) } }
|
||||||
return agg
|
return agg
|
||||||
}
|
}
|
||||||
@@ -386,13 +395,14 @@ public object Secp256k1Native : Secp256k1 {
|
|||||||
memcpy(toNat(session), nSession.ptr, Secp256k1.MUSIG2_PUBLIC_SESSION_SIZE.toULong())
|
memcpy(toNat(session), nSession.ptr, Secp256k1.MUSIG2_PUBLIC_SESSION_SIZE.toULong())
|
||||||
return session
|
return session
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
override fun musigPartialSign(secnonce: ByteArray, privkey: ByteArray, keyaggCache: ByteArray, session: ByteArray): ByteArray {
|
override fun musigPartialSign(secnonce: ByteArray, privkey: ByteArray, keyaggCache: ByteArray, session: ByteArray): ByteArray {
|
||||||
require(secnonce.size == Secp256k1.MUSIG2_SECRET_NONCE_SIZE)
|
require(secnonce.size == Secp256k1.MUSIG2_SECRET_NONCE_SIZE)
|
||||||
require(privkey.size == 32)
|
require(privkey.size == 32)
|
||||||
require(keyaggCache.size == Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE)
|
require(keyaggCache.size == Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE)
|
||||||
require(session.size == Secp256k1.MUSIG2_PUBLIC_SESSION_SIZE)
|
require(session.size == Secp256k1.MUSIG2_PUBLIC_SESSION_SIZE)
|
||||||
|
require(musigNonceValidate(secnonce, pubkeyCreate(privkey)))
|
||||||
|
|
||||||
memScoped {
|
memScoped {
|
||||||
val nSecnonce = alloc<secp256k1_musig_secnonce>()
|
val nSecnonce = alloc<secp256k1_musig_secnonce>()
|
||||||
|
|||||||
@@ -57,6 +57,8 @@ kotlin {
|
|||||||
}
|
}
|
||||||
|
|
||||||
linuxX64()
|
linuxX64()
|
||||||
|
macosX64()
|
||||||
|
macosArm64()
|
||||||
iosX64()
|
iosX64()
|
||||||
iosArm64()
|
iosArm64()
|
||||||
iosSimulatorArm64()
|
iosSimulatorArm64()
|
||||||
|
|||||||
@@ -5,6 +5,14 @@ import kotlin.test.*
|
|||||||
|
|
||||||
class Secp256k1Test {
|
class Secp256k1Test {
|
||||||
|
|
||||||
|
val random = Random.Default
|
||||||
|
|
||||||
|
fun randomBytes(length: Int): ByteArray {
|
||||||
|
val buffer = ByteArray(length)
|
||||||
|
random.nextBytes(buffer)
|
||||||
|
return buffer
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
fun verifyValidPrivateKey() {
|
fun verifyValidPrivateKey() {
|
||||||
val priv = Hex.decode("67E56582298859DDAE725F972992A07C6C4FB9F62A8FFF58CE3CA926A1063530".lowercase())
|
val priv = Hex.decode("67E56582298859DDAE725F972992A07C6C4FB9F62A8FFF58CE3CA926A1063530".lowercase())
|
||||||
@@ -454,40 +462,55 @@ class Secp256k1Test {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
fun testMusig2SigningSession() {
|
fun testMusig2SigningSession() {
|
||||||
val privkeys = listOf(
|
val privkeys = listOf(randomBytes(32), randomBytes(32))
|
||||||
"0101010101010101010101010101010101010101010101010101010101010101",
|
val sessionId = randomBytes(32)
|
||||||
"0202020202020202020202020202020202020202020202020202020202020202",
|
val msg32 = randomBytes(32)
|
||||||
).map { Hex.decode(it) }.toTypedArray()
|
|
||||||
val pubkeys = privkeys.map { Secp256k1.pubkeyCreate(it) }
|
val pubkeys = privkeys.map { Secp256k1.pubkeyCreate(it) }
|
||||||
|
|
||||||
val sessionId = Hex.decode("0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F")
|
|
||||||
val nonces = pubkeys.map { Secp256k1.musigNonceGen(sessionId, null, it, null, null, null) }
|
val nonces = pubkeys.map { Secp256k1.musigNonceGen(sessionId, null, it, null, null, null) }
|
||||||
|
val testData = run {
|
||||||
|
val builder = StringBuilder()
|
||||||
|
builder.append("private keys\n")
|
||||||
|
privkeys.forEach { builder.append(Hex.encode(it)).append("\n") }
|
||||||
|
builder.append("sessionId ${Hex.encode(sessionId)}\n")
|
||||||
|
builder.append("msg32 ${Hex.encode(msg32)}\n")
|
||||||
|
builder.append("nonces\n")
|
||||||
|
nonces.forEach { builder.append(Hex.encode(it)).append("\n") }
|
||||||
|
builder.toString()
|
||||||
|
}
|
||||||
val secnonces = nonces.map { it.copyOfRange(0, 132) }
|
val secnonces = nonces.map { it.copyOfRange(0, 132) }
|
||||||
val pubnonces = nonces.map { it.copyOfRange(132, 132 + 66) }
|
val pubnonces = nonces.map { it.copyOfRange(132, 132 + 66) }
|
||||||
val aggnonce = Secp256k1.musigNonceAgg(pubnonces.toTypedArray())
|
val aggnonce = Secp256k1.musigNonceAgg(pubnonces.toTypedArray())
|
||||||
|
|
||||||
val keyaggCaches = (0 until 2).map { ByteArray(Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE) }
|
val keyaggCaches = (0 until 2).map { ByteArray(Secp256k1.MUSIG2_PUBLIC_KEYAGG_CACHE_SIZE) }
|
||||||
val aggpubkey = Secp256k1.musigPubkeyAgg(pubkeys.toTypedArray(), keyaggCaches[0])
|
val aggpubkey = Secp256k1.musigPubkeyAgg(pubkeys.toTypedArray(), keyaggCaches[0])
|
||||||
assertContentEquals(aggpubkey, Secp256k1.musigPubkeyAgg(pubkeys.toTypedArray(), keyaggCaches[1]))
|
assertContentEquals(aggpubkey, Secp256k1.musigPubkeyAgg(pubkeys.toTypedArray(), keyaggCaches[1]), testData)
|
||||||
assertContentEquals(keyaggCaches[0], keyaggCaches[1])
|
assertContentEquals(keyaggCaches[0], keyaggCaches[1], testData)
|
||||||
|
|
||||||
val msg32 = Hex.decode("0303030303030303030303030303030303030303030303030303030303030303")
|
|
||||||
val sessions = (0 until 2).map { Secp256k1.musigNonceProcess(aggnonce, msg32, keyaggCaches[it]) }
|
val sessions = (0 until 2).map { Secp256k1.musigNonceProcess(aggnonce, msg32, keyaggCaches[it]) }
|
||||||
val psigs = (0 until 2).map {
|
val psigs = (0 until 2).map {
|
||||||
val psig = Secp256k1.musigPartialSign(secnonces[it], privkeys[it], keyaggCaches[it], sessions[it])
|
val psig = Secp256k1.musigPartialSign(secnonces[it], privkeys[it], keyaggCaches[it], sessions[it])
|
||||||
assertEquals(1, Secp256k1.musigPartialSigVerify(psig, pubnonces[it], pubkeys[it], keyaggCaches[it], sessions[it]))
|
assertEquals(1, Secp256k1.musigPartialSigVerify(psig, pubnonces[it], pubkeys[it], keyaggCaches[it], sessions[it]), testData)
|
||||||
assertEquals(0, Secp256k1.musigPartialSigVerify(Random.nextBytes(32), pubnonces[it], pubkeys[it], keyaggCaches[it], sessions[it]))
|
assertEquals(0, Secp256k1.musigPartialSigVerify(Random.nextBytes(32), pubnonces[it], pubkeys[it], keyaggCaches[it], sessions[it]), testData)
|
||||||
psig
|
psig
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// signing fails if the secret nonce does not match the private key's public key
|
||||||
|
assertFails(testData) {
|
||||||
|
Secp256k1.musigPartialSign(secnonces[1], privkeys[0], keyaggCaches[0], sessions[0])
|
||||||
|
}
|
||||||
|
|
||||||
|
assertFails(testData) {
|
||||||
|
Secp256k1.musigPartialSign(secnonces[0], privkeys[1], keyaggCaches[1], sessions[1])
|
||||||
|
}
|
||||||
|
|
||||||
val sig = Secp256k1.musigPartialSigAgg(sessions[0], psigs.toTypedArray())
|
val sig = Secp256k1.musigPartialSigAgg(sessions[0], psigs.toTypedArray())
|
||||||
assertContentEquals(sig, Secp256k1.musigPartialSigAgg(sessions[1], psigs.toTypedArray()))
|
assertContentEquals(sig, Secp256k1.musigPartialSigAgg(sessions[1], psigs.toTypedArray()), testData)
|
||||||
assertTrue(Secp256k1.verifySchnorr(sig, msg32, aggpubkey))
|
assertTrue(Secp256k1.verifySchnorr(sig, msg32, aggpubkey), testData)
|
||||||
|
|
||||||
val invalidSig1 = Secp256k1.musigPartialSigAgg(sessions[0], arrayOf(psigs[0], psigs[0]))
|
val invalidSig1 = Secp256k1.musigPartialSigAgg(sessions[0], arrayOf(psigs[0], psigs[0]))
|
||||||
assertFalse(Secp256k1.verifySchnorr(invalidSig1, msg32, aggpubkey))
|
assertFalse(Secp256k1.verifySchnorr(invalidSig1, msg32, aggpubkey), testData)
|
||||||
val invalidSig2 = Secp256k1.musigPartialSigAgg(sessions[0], arrayOf(Random.nextBytes(32), Random.nextBytes(32)))
|
val invalidSig2 = Secp256k1.musigPartialSigAgg(sessions[0], arrayOf(Random.nextBytes(32), Random.nextBytes(32)))
|
||||||
assertFalse(Secp256k1.verifySchnorr(invalidSig2, msg32, aggpubkey))
|
assertFalse(Secp256k1.verifySchnorr(invalidSig2, msg32, aggpubkey), testData)
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -523,15 +546,14 @@ class Secp256k1Test {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
fun fuzzEcdsaSignVerify() {
|
fun fuzzMusig2SigningSession() {
|
||||||
val random = Random.Default
|
repeat(1000) {
|
||||||
|
testMusig2SigningSession()
|
||||||
fun randomBytes(length: Int): ByteArray {
|
|
||||||
val buffer = ByteArray(length)
|
|
||||||
random.nextBytes(buffer)
|
|
||||||
return buffer
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
fun fuzzEcdsaSignVerify() {
|
||||||
repeat(200) {
|
repeat(200) {
|
||||||
val priv = randomBytes(32)
|
val priv = randomBytes(32)
|
||||||
assertTrue(Secp256k1.secKeyVerify(priv))
|
assertTrue(Secp256k1.secKeyVerify(priv))
|
||||||
|
|||||||
Reference in New Issue
Block a user