|
|
|
|
@@ -136,13 +136,6 @@ void musig_api_tests(secp256k1_scratch_space *scratch) {
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(sign, &session[0], signer0, nonce_commitment[0], session_id[0], msg, &combined_pk, pk_hash, 2, 0, ones) == 0);
|
|
|
|
|
CHECK(ecount == 9);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
secp256k1_musig_session session_without_msg;
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(sign, &session_without_msg, signer0, nonce_commitment[0], session_id[0], NULL, &combined_pk, pk_hash, 2, 0, sk[0]) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_set_msg(none, &session_without_msg, msg) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_set_msg(none, &session_without_msg, msg) == 0);
|
|
|
|
|
}
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(sign, &session[0], signer0, nonce_commitment[0], session_id[0], msg, &combined_pk, pk_hash, 2, 0, sk[0]) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(sign, &session[1], signer1, nonce_commitment[1], session_id[1], msg, &combined_pk, pk_hash, 2, 1, sk[1]) == 1);
|
|
|
|
|
ncs[0] = nonce_commitment[0];
|
|
|
|
|
@@ -153,20 +146,20 @@ void musig_api_tests(secp256k1_scratch_space *scratch) {
|
|
|
|
|
CHECK(ecount == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, NULL, verifier_signer_data, msg, &combined_pk, pk_hash, ncs, 2) == 0);
|
|
|
|
|
CHECK(ecount == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, NULL, &combined_pk, pk_hash, ncs, 2) == 1);
|
|
|
|
|
CHECK(ecount == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, NULL, pk_hash, ncs, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, NULL, &combined_pk, pk_hash, ncs, 2) == 0);
|
|
|
|
|
CHECK(ecount == 2);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, &combined_pk, NULL, ncs, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, NULL, pk_hash, ncs, 2) == 0);
|
|
|
|
|
CHECK(ecount == 3);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, &combined_pk, NULL, ncs, 2) == 0);
|
|
|
|
|
CHECK(ecount == 4);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, &combined_pk, pk_hash, NULL, 2) == 0);
|
|
|
|
|
CHECK(ecount == 4);
|
|
|
|
|
CHECK(ecount == 5);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, &combined_pk, pk_hash, ncs, 0) == 0);
|
|
|
|
|
CHECK(ecount == 4);
|
|
|
|
|
CHECK(ecount == 5);
|
|
|
|
|
if (SIZE_MAX > UINT32_MAX) {
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, &combined_pk, pk_hash, ncs, ((size_t) UINT32_MAX) + 2) == 0);
|
|
|
|
|
}
|
|
|
|
|
CHECK(ecount == 4);
|
|
|
|
|
CHECK(ecount == 5);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize_verifier(none, &verifier_session, verifier_signer_data, msg, &combined_pk, pk_hash, ncs, 2) == 1);
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_compute_messagehash(none, msghash, &verifier_session) == 0);
|
|
|
|
|
@@ -178,7 +171,7 @@ void musig_api_tests(secp256k1_scratch_space *scratch) {
|
|
|
|
|
secp256k1_pubkey nonce;
|
|
|
|
|
|
|
|
|
|
/* Can obtain public nonce after commitments have been exchanged; still can't sign */
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &nonce, ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &nonce, ncs, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_partial_sign(none, &session[0], &partial_sig[0]) == 0);
|
|
|
|
|
CHECK(ecount == 0);
|
|
|
|
|
}
|
|
|
|
|
@@ -188,22 +181,22 @@ void musig_api_tests(secp256k1_scratch_space *scratch) {
|
|
|
|
|
{
|
|
|
|
|
secp256k1_pubkey public_nonce[3];
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], ncs, 2, NULL) == 1);
|
|
|
|
|
CHECK(ecount == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, NULL, signer0, &public_nonce[0], ncs, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, NULL, signer0, &public_nonce[0], ncs, 2, NULL) == 0);
|
|
|
|
|
CHECK(ecount == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], NULL, &public_nonce[0], ncs, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], NULL, &public_nonce[0], ncs, 2, NULL) == 0);
|
|
|
|
|
CHECK(ecount == 2);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, NULL, ncs, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, NULL, ncs, 2, NULL) == 0);
|
|
|
|
|
CHECK(ecount == 3);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], NULL, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], NULL, 2, NULL) == 0);
|
|
|
|
|
CHECK(ecount == 4);
|
|
|
|
|
/* Number of commitments and number of signers are different */
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], ncs, 1) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], ncs, 1, NULL) == 0);
|
|
|
|
|
CHECK(ecount == 4);
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[1], signer1, &public_nonce[1], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[0], signer0, &public_nonce[0], ncs, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(none, &session[1], signer1, &public_nonce[1], ncs, 2, NULL) == 1);
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(none, &signer0[0], &public_nonce[0]) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(none, &signer0[1], &public_nonce[0]) == 0);
|
|
|
|
|
@@ -404,14 +397,14 @@ int musig_state_machine_diff_signer_msghash_test(unsigned char *msghash, secp256
|
|
|
|
|
pks_tmp[0] = pks[0];
|
|
|
|
|
CHECK(secp256k1_ec_pubkey_create(ctx, &pks_tmp[1], sk_dummy) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_pubkey_combine(ctx, NULL, &combined_pk_tmp, pk_hash_tmp, pks_tmp, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session_tmp, signers_tmp, nonce_commitment, session_id, msg, &combined_pk_tmp, pk_hash_tmp, 2, 0, sk_dummy) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session_tmp, signers_tmp, nonce_commitment, session_id, msg, &combined_pk_tmp, pk_hash_tmp, 2, 1, sk_dummy) == 1);
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session, signers, nonce_commitment, session_id, msg, combined_pk, pk_hash, 2, 0, sk) == 1);
|
|
|
|
|
CHECK(memcmp(nonce_commitment, nonce_commitments[1], 32) == 0);
|
|
|
|
|
/* Call get_public_nonce with different signers than the signers the session was
|
|
|
|
|
* initialized with. */
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session_tmp, signers, &nonce, nonce_commitments, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers_tmp, &nonce, nonce_commitments, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session_tmp, signers, &nonce, nonce_commitments, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers_tmp, &nonce, nonce_commitments, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[0], nonce_other) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[1], &nonce) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_combine_nonces(ctx, &session, signers, 2, NULL, NULL) == 1);
|
|
|
|
|
@@ -438,7 +431,7 @@ int musig_state_machine_diff_signers_combine_nonce_test(secp256k1_pubkey *combin
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session, signers, nonce_commitment, session_id, msg, combined_pk, pk_hash, 2, 1, sk) == 1);
|
|
|
|
|
ncs[0] = nonce_commitment_other;
|
|
|
|
|
ncs[1] = nonce_commitment;
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers, &nonce, ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers, &nonce, ncs, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[0], nonce_other) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[1], &nonce) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[1], &nonce) == 1);
|
|
|
|
|
@@ -451,34 +444,44 @@ int musig_state_machine_diff_signers_combine_nonce_test(secp256k1_pubkey *combin
|
|
|
|
|
return secp256k1_musig_session_combine_nonces(ctx, &session, signers_to_use, 2, NULL, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Recreates a session with the given session_id, signers, pk, msg etc. parameters
|
|
|
|
|
* and tries to sign and verify the other signers partial signature. Both should fail
|
|
|
|
|
* if msg is NULL. */
|
|
|
|
|
int musig_state_machine_missing_msg_test(secp256k1_pubkey *pks, secp256k1_pubkey *combined_pk, unsigned char *pk_hash, unsigned char *nonce_commitment_other, secp256k1_pubkey *nonce_other, secp256k1_musig_partial_signature *partial_sig_other, unsigned char *sk, unsigned char *session_id, unsigned char *msg) {
|
|
|
|
|
/* Initializaes a session with the given session_id, signers, pk, msg etc.
|
|
|
|
|
* parameters but without a message. Will test that the message must be
|
|
|
|
|
* provided with `get_public_nonce`.
|
|
|
|
|
*/
|
|
|
|
|
void musig_state_machine_late_msg_test(secp256k1_pubkey *pks, secp256k1_pubkey *combined_pk, unsigned char *pk_hash, unsigned char *nonce_commitment_other, secp256k1_pubkey *nonce_other, unsigned char *sk, unsigned char *session_id, unsigned char *msg) {
|
|
|
|
|
/* Create context for testing ARG_CHECKs by setting an illegal_callback. */
|
|
|
|
|
secp256k1_context *ctx_tmp = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
|
|
|
|
int ecount = 0;
|
|
|
|
|
secp256k1_musig_session session;
|
|
|
|
|
secp256k1_musig_session_signer_data signers[2];
|
|
|
|
|
unsigned char nonce_commitment[32];
|
|
|
|
|
const unsigned char *ncs[2];
|
|
|
|
|
secp256k1_pubkey nonce;
|
|
|
|
|
secp256k1_musig_partial_signature partial_sig;
|
|
|
|
|
int partial_sign, partial_verify;
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session, signers, nonce_commitment, session_id, msg, combined_pk, pk_hash, 2, 0, sk) == 1);
|
|
|
|
|
secp256k1_context_set_illegal_callback(ctx_tmp, counting_illegal_callback_fn, &ecount);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session, signers, nonce_commitment, session_id, NULL, combined_pk, pk_hash, 2, 1, sk) == 1);
|
|
|
|
|
ncs[0] = nonce_commitment_other;
|
|
|
|
|
ncs[1] = nonce_commitment;
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers, &nonce, ncs, 2) == 1);
|
|
|
|
|
|
|
|
|
|
/* Trying to get the nonce without providing a message fails. */
|
|
|
|
|
CHECK(ecount == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx_tmp, &session, signers, &nonce, ncs, 2, NULL) == 0);
|
|
|
|
|
CHECK(ecount == 1);
|
|
|
|
|
|
|
|
|
|
/* Providing a message should make get_public_nonce succeed. */
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers, &nonce, ncs, 2, msg) == 1);
|
|
|
|
|
/* Trying to set the message again fails. */
|
|
|
|
|
CHECK(ecount == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx_tmp, &session, signers, &nonce, ncs, 2, msg) == 0);
|
|
|
|
|
CHECK(ecount == 2);
|
|
|
|
|
|
|
|
|
|
/* Check that it's working */
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[0], nonce_other) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[1], &nonce) == 1);
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_session_combine_nonces(ctx, &session, signers, 2, NULL, NULL) == 1);
|
|
|
|
|
partial_sign = secp256k1_musig_partial_sign(ctx, &session, &partial_sig);
|
|
|
|
|
partial_verify = secp256k1_musig_partial_sig_verify(ctx, &session, &signers[0], partial_sig_other, &pks[0]);
|
|
|
|
|
if (msg != NULL) {
|
|
|
|
|
/* Return 1 if both succeeded */
|
|
|
|
|
return partial_sign && partial_verify;
|
|
|
|
|
}
|
|
|
|
|
/* Return 0 if both failed */
|
|
|
|
|
return partial_sign || partial_verify;
|
|
|
|
|
CHECK(secp256k1_musig_partial_sign(ctx, &session, &partial_sig));
|
|
|
|
|
CHECK(secp256k1_musig_partial_sig_verify(ctx, &session, &signers[1], &partial_sig, &pks[1]));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Recreates a session with the given session_id, signers, pk, msg etc. parameters
|
|
|
|
|
@@ -495,10 +498,10 @@ int musig_state_machine_missing_combine_test(secp256k1_pubkey *pks, secp256k1_pu
|
|
|
|
|
secp256k1_schnorrsig sig;
|
|
|
|
|
int partial_verify, sig_combine;
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session, signers, nonce_commitment, session_id, msg, combined_pk, pk_hash, 2, 0, sk) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_initialize(ctx, &session, signers, nonce_commitment, session_id, msg, combined_pk, pk_hash, 2, 1, sk) == 1);
|
|
|
|
|
ncs[0] = nonce_commitment_other;
|
|
|
|
|
ncs[1] = nonce_commitment;
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers, &nonce, ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session, signers, &nonce, ncs, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[0], nonce_other) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers[1], &nonce) == 1);
|
|
|
|
|
|
|
|
|
|
@@ -553,16 +556,16 @@ void musig_state_machine_tests(secp256k1_scratch_space *scratch) {
|
|
|
|
|
/* Set nonce commitments */
|
|
|
|
|
ncs[0] = nonce_commitment[0];
|
|
|
|
|
ncs[1] = nonce_commitment[1];
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2, NULL) == 1);
|
|
|
|
|
/* Changing a nonce commitment is not okay */
|
|
|
|
|
ncs[1] = (unsigned char*) "this isn't a nonce commitment...";
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2, NULL) == 0);
|
|
|
|
|
/* Repeating with the same nonce commitments is okay */
|
|
|
|
|
ncs[1] = nonce_commitment[1];
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2, NULL) == 1);
|
|
|
|
|
|
|
|
|
|
/* Get nonce for signer 1 */
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[1], signers1, &nonce[1], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[1], signers1, &nonce[1], ncs, 2, NULL) == 1);
|
|
|
|
|
|
|
|
|
|
/* Set nonces */
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers0[0], &nonce[0]) == 1);
|
|
|
|
|
@@ -597,12 +600,12 @@ void musig_state_machine_tests(secp256k1_scratch_space *scratch) {
|
|
|
|
|
CHECK(musig_state_machine_diff_signer_msghash_test(msghash2, pk, &combined_pk, pk_hash, ncs, msg, &nonce[0], sk[1], session_id[1]) == 1);
|
|
|
|
|
CHECK(memcmp(msghash1, msghash2, 32) == 0);
|
|
|
|
|
CHECK(secp256k1_musig_partial_sign(ctx, &session[1], &partial_sig[1]) == 1);
|
|
|
|
|
|
|
|
|
|
CHECK(secp256k1_musig_partial_sig_verify(ctx, &session[1], &signers1[1], &partial_sig[1], &pk[1]) == 1);
|
|
|
|
|
/* Wrong signature */
|
|
|
|
|
CHECK(secp256k1_musig_partial_sig_verify(ctx, &session[1], &signers1[1], &partial_sig[0], &pk[1]) == 0);
|
|
|
|
|
/* Can't sign or verify until msg is set */
|
|
|
|
|
CHECK(musig_state_machine_missing_msg_test(pk, &combined_pk, pk_hash, nonce_commitment[0], &nonce[0], &partial_sig[0], sk[1], session_id[1], NULL) == 0);
|
|
|
|
|
CHECK(musig_state_machine_missing_msg_test(pk, &combined_pk, pk_hash, nonce_commitment[0], &nonce[0], &partial_sig[0], sk[1], session_id[1], msg) == 1);
|
|
|
|
|
/* Can't get the public nonce until msg is set */
|
|
|
|
|
musig_state_machine_late_msg_test(pk, &combined_pk, pk_hash, nonce_commitment[0], &nonce[0], sk[1], session_id[1], msg);
|
|
|
|
|
|
|
|
|
|
/* Can't verify and combine partial sigs until nonces are combined */
|
|
|
|
|
CHECK(musig_state_machine_missing_combine_test(pk, &combined_pk, pk_hash, nonce_commitment[0], &nonce[0], &partial_sig[0], msg, sk[1], session_id[1], &partial_sig[1], 0) == 0);
|
|
|
|
|
@@ -676,10 +679,10 @@ void scriptless_atomic_swap(secp256k1_scratch_space *scratch) {
|
|
|
|
|
noncommit_b_ptr[1] = noncommit_b[1];
|
|
|
|
|
|
|
|
|
|
/* Step 2: Exchange nonces */
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_a[0], data_a, &pubnon_a[0], noncommit_a_ptr, 2));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_a[1], data_a, &pubnon_a[1], noncommit_a_ptr, 2));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_b[0], data_b, &pubnon_b[0], noncommit_b_ptr, 2));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_b[1], data_b, &pubnon_b[1], noncommit_b_ptr, 2));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_a[0], data_a, &pubnon_a[0], noncommit_a_ptr, 2, NULL));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_a[1], data_a, &pubnon_a[1], noncommit_a_ptr, 2, NULL));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_b[0], data_b, &pubnon_b[0], noncommit_b_ptr, 2, NULL));
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &musig_session_b[1], data_b, &pubnon_b[1], noncommit_b_ptr, 2, NULL));
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &data_a[0], &pubnon_a[0]));
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &data_a[1], &pubnon_a[1]));
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &data_b[0], &pubnon_b[0]));
|
|
|
|
|
@@ -777,8 +780,8 @@ void musig_tweak_test_helper(const secp256k1_pubkey* combined_pubkey, const unsi
|
|
|
|
|
/* Set nonce commitments */
|
|
|
|
|
ncs[0] = nonce_commitment[0];
|
|
|
|
|
ncs[1] = nonce_commitment[1];
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[1], signers1, &nonce[1], ncs, 2) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[0], signers0, &nonce[0], ncs, 2, NULL) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_session_get_public_nonce(ctx, &session[1], signers1, &nonce[1], ncs, 2, NULL) == 1);
|
|
|
|
|
/* Set nonces */
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers0[0], &nonce[0]) == 1);
|
|
|
|
|
CHECK(secp256k1_musig_set_nonce(ctx, &signers0[1], &nonce[1]) == 1);
|
|
|
|
|
|