@@ -147,7 +147,7 @@ static void test_ecdsa_s2c_api(void) {
147
147
CHECK (secp256k1_ecdsa_s2c_sign (sign , & signature , & s2c_opening , message , privkey , NULL , NULL , NULL ) == 0 );
148
148
CHECK (ecount == 2 );
149
149
}
150
- { /* verify_commit, ctx */
150
+ { /* verify_commit: ctx */
151
151
ecount = 0 ;
152
152
CHECK (secp256k1_ecdsa_s2c_sign (sign , & signature , & s2c_opening , message , privkey , s2c_data , NULL , NULL ) == 1 );
153
153
CHECK (secp256k1_ecdsa_s2c_verify_commit (none , & signature , s2c_data , & s2c_opening ) == 0 );
@@ -159,7 +159,7 @@ static void test_ecdsa_s2c_api(void) {
159
159
CHECK (secp256k1_ecdsa_s2c_verify_commit (both , & signature , s2c_data , & s2c_opening ) == 1 );
160
160
CHECK (ecount == 2 );
161
161
}
162
- { /* verify_commit, NULL signature, s2c_data, s2c_opening */
162
+ { /* verify_commit: NULL signature, s2c_data, s2c_opening */
163
163
ecount = 0 ;
164
164
CHECK (secp256k1_ecdsa_s2c_sign (sign , & signature , & s2c_opening , message , privkey , s2c_data , NULL , NULL ) == 1 );
165
165
CHECK (secp256k1_ecdsa_s2c_verify_commit (vrfy , NULL , s2c_data , & s2c_opening ) == 0 );
@@ -169,12 +169,75 @@ static void test_ecdsa_s2c_api(void) {
169
169
CHECK (secp256k1_ecdsa_s2c_verify_commit (vrfy , & signature , s2c_data , NULL ) == 0 );
170
170
CHECK (ecount == 3 );
171
171
}
172
- { /* verify_commit, invalid opening */
172
+ { /* verify_commit: invalid opening */
173
173
secp256k1_s2c_opening invalid_opening = {0 };
174
174
ecount = 0 ;
175
175
CHECK (secp256k1_ecdsa_s2c_verify_commit (vrfy , & signature , s2c_data , & invalid_opening ) == 0 );
176
176
CHECK (ecount == 1 );
177
177
}
178
+ { /* anti_nonce_covert_channel_client_commit: ctx */
179
+ secp256k1_pubkey commitment ;
180
+ uint8_t rand_commitment [32 ] = {0 };
181
+ ecount = 0 ;
182
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (none , & commitment , message , privkey , rand_commitment ) == 0 );
183
+ CHECK (ecount == 1 );
184
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (sign , & commitment , message , privkey , rand_commitment ) == 1 );
185
+ CHECK (ecount == 1 );
186
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (vrfy , & commitment , message , privkey , rand_commitment ) == 0 );
187
+ CHECK (ecount == 2 );
188
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (both , & commitment , message , privkey , rand_commitment ) == 1 );
189
+ CHECK (ecount == 2 );
190
+ }
191
+ { /* anti_nonce_covert_channel_client_commit: client_commitment, msg32, seckey32, rand_commitment32 */
192
+ secp256k1_pubkey commitment ;
193
+ uint8_t rand_commitment [32 ] = {0 };
194
+ ecount = 0 ;
195
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (sign , NULL , message , privkey , rand_commitment ) == 0 );
196
+ CHECK (ecount == 1 );
197
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (sign , & commitment , NULL , privkey , rand_commitment ) == 0 );
198
+ CHECK (ecount == 2 );
199
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (sign , & commitment , message , NULL , rand_commitment ) == 0 );
200
+ CHECK (ecount == 3 );
201
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (sign , & commitment , message , privkey , NULL ) == 0 );
202
+ CHECK (ecount == 4 );
203
+ }
204
+ { /* anti_nonce_covert_channel_host_verify */
205
+ uint8_t host_nonce [32 ] = {0 };
206
+ uint8_t host_commitment [32 ] = {0 };
207
+ secp256k1_pubkey client_commitment = {0 };
208
+ secp256k1_s2c_opening invalid_opening = {0 };
209
+ secp256k1_pubkey invalid_pubkey = {0 };
210
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (ctx , & client_commitment , message , privkey , host_commitment ) == 1 );
211
+ ecount = 0 ;
212
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , NULL , host_nonce , & s2c_opening , & client_commitment ) == 0 );
213
+ CHECK (ecount == 1 );
214
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , & signature , NULL , & s2c_opening , & client_commitment ) == 0 );
215
+ CHECK (ecount == 2 );
216
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , & signature , host_nonce , NULL , & client_commitment ) == 0 );
217
+ CHECK (ecount == 3 );
218
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , & signature , host_nonce , & invalid_opening , & client_commitment ) == 0 );
219
+ CHECK (ecount == 4 );
220
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , & signature , host_nonce , & s2c_opening , NULL ) == 0 );
221
+ CHECK (ecount == 5 );
222
+ /* invalid client commitment */
223
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , & signature , host_nonce , & s2c_opening , & invalid_pubkey ) == 0 );
224
+ CHECK (ecount == 6 );
225
+ /* invalid original pubnonce */
226
+ memset (& s2c_opening .original_pubnonce , 0 , sizeof (s2c_opening .original_pubnonce ));
227
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (vrfy , & signature , host_nonce , & s2c_opening , & client_commitment ) == 0 );
228
+ CHECK (ecount == 7 );
229
+ }
230
+ { /* anti_nonce_covert_channel_host_commit */
231
+ uint8_t rand_commitment [32 ];
232
+ uint8_t rand [32 ] = {1 };
233
+ ecount = 0 ;
234
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit (none , rand_commitment , rand ) == 1 );
235
+ CHECK (ecount == 0 );
236
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit (none , NULL , rand ) == 0 );
237
+ CHECK (ecount == 1 );
238
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit (none , rand_commitment , NULL ) == 0 );
239
+ CHECK (ecount == 2 );
240
+ }
178
241
}
179
242
180
243
static void test_ecdsa_s2c_sign_verify (void ) {
@@ -263,12 +326,88 @@ static void test_ecdsa_s2c_sign_verify(void) {
263
326
}
264
327
}
265
328
329
+ static void test_ecdsa_s2c_anti_nonce_covert_channel_client_commit (void ) {
330
+ size_t i ;
331
+ unsigned char privkey [32 ] = {
332
+ 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 ,
333
+ 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 , 0x55 ,
334
+ };
335
+ unsigned char message [32 ] = {
336
+ 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 ,
337
+ 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 , 0x88 ,
338
+ };
339
+ secp256k1_pubkey client_commit ;
340
+ unsigned char pubnonce [33 ];
341
+ /*
342
+ Check that original pubnonce is derived from s2c_data and ndata.
343
+ */
344
+ for (i = 0 ; i < sizeof (ecdsa_s2c_tests ) / sizeof (ecdsa_s2c_tests [0 ]); i ++ ) {
345
+ size_t pubnonce_size = 33 ;
346
+ const ecdsa_s2c_test * test = & ecdsa_s2c_tests [i ];
347
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (ctx , & client_commit , message , privkey , (unsigned char * )test -> host_commitment ) == 1 );
348
+ CHECK (secp256k1_ec_pubkey_serialize (ctx , pubnonce , & pubnonce_size , & client_commit , SECP256K1_EC_COMPRESSED ) == 1 );
349
+ CHECK (memcmp (test -> expected_pubnonce , pubnonce , pubnonce_size ) == 0 );
350
+ }
351
+ }
352
+
353
+ /* This tests the full ECDSA Anti Nonce Covert Channel Protocol */
354
+ static void test_ecdsa_s2c_anti_nonce_covert_channel (void ) {
355
+ unsigned char client_privkey [32 ];
356
+ unsigned char host_msg [32 ];
357
+ unsigned char host_commitment [32 ];
358
+ unsigned char host_nonce_contribution [32 ];
359
+ secp256k1_pubkey client_commitment ;
360
+ secp256k1_ecdsa_signature signature ;
361
+ secp256k1_s2c_opening s2c_opening ;
362
+
363
+ /* Generate a random key, message. */
364
+ {
365
+ secp256k1_scalar key ;
366
+ random_scalar_order_test (& key );
367
+ secp256k1_scalar_get_b32 (client_privkey , & key );
368
+ secp256k1_rand256_test (host_msg );
369
+ secp256k1_rand256_test (host_nonce_contribution );
370
+ }
371
+
372
+ /* Protocol step 1. */
373
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit (ctx , host_commitment , host_nonce_contribution ) == 1 );
374
+ /* Protocol step 2. */
375
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit (ctx , & client_commitment , host_msg , client_privkey , host_commitment ) == 1 );
376
+ /* Protocol step 3: host_nonce_contribution send to client to be used in step 4. */
377
+ /* Protocol step 4. */
378
+ CHECK (secp256k1_ecdsa_s2c_sign (ctx , & signature , & s2c_opening , host_msg , client_privkey , host_nonce_contribution , NULL , NULL ) == 1 );
379
+ /* Protocol step 5. */
380
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (ctx , & signature , host_nonce_contribution , & s2c_opening , & client_commitment ) == 1 );
381
+
382
+ { /* host_verify: commitment does not match */
383
+ uint8_t sigbytes [64 ];
384
+ size_t i ;
385
+ CHECK (secp256k1_ecdsa_signature_serialize_compact (ctx , sigbytes , & signature ) == 1 );
386
+ for (i = 0 ; i < 32 ; i ++ ) {
387
+ /* change one byte */
388
+ sigbytes [i ] = (((int )sigbytes [i ]) + 1 ) % 256 ;
389
+ CHECK (secp256k1_ecdsa_signature_parse_compact (ctx , & signature , sigbytes ) == 1 );
390
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (ctx , & signature , host_nonce_contribution , & s2c_opening , & client_commitment ) == 0 );
391
+ /* revert */
392
+ sigbytes [i ] = (((int )sigbytes [i ]) + 255 ) % 256 ;
393
+ }
394
+ }
395
+ { /* host_verify: client commitment != opening original pubnonce */
396
+
397
+ uint8_t tweak [32 ] = {1 };
398
+ CHECK (secp256k1_ec_pubkey_tweak_add (ctx , & client_commitment , tweak ) == 1 );
399
+ CHECK (secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify (ctx , & signature , host_nonce_contribution , & s2c_opening , & client_commitment ) == 0 );
400
+ }
401
+ }
402
+
266
403
static void run_ecdsa_sign_to_contract_tests (void ) {
267
404
int i ;
268
405
test_ecdsa_s2c_api ();
269
406
test_ecdsa_s2c_original_pubnonce ();
407
+ test_ecdsa_s2c_anti_nonce_covert_channel_client_commit ();
270
408
for (i = 0 ; i < count ; i ++ ) {
271
409
test_ecdsa_s2c_sign_verify ();
410
+ test_ecdsa_s2c_anti_nonce_covert_channel ();
272
411
}
273
412
}
274
413
0 commit comments