Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ecdsa sign-to-contract module, with anti nonce covert chan util functions #637

Closed
wants to merge 4 commits into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 5 additions & 4 deletions .travis.yml
Original file line number Diff line number Diff line change
@@ -11,15 +11,16 @@ cache:
- src/java/guava/
env:
global:
- FIELD=auto BIGNUM=auto SCALAR=auto ENDOMORPHISM=no STATICPRECOMPUTATION=yes ECMULTGENPRECISION=auto ASM=no BUILD=check EXTRAFLAGS= HOST= ECDH=no RECOVERY=no EXPERIMENTAL=no JNI=no
- FIELD=auto BIGNUM=auto SCALAR=auto ENDOMORPHISM=no STATICPRECOMPUTATION=yes ECMULTGENPRECISION=auto ASM=no BUILD=check EXTRAFLAGS= HOST= ECDH=no RECOVERY=no ECDSA_SIGN_TO_CONTRACT=no EXPERIMENTAL=no JNI=no
- GUAVA_URL=https://search.maven.org/remotecontent?filepath=com/google/guava/guava/18.0/guava-18.0.jar GUAVA_JAR=src/java/guava/guava-18.0.jar
matrix:
- SCALAR=32bit RECOVERY=yes
- SCALAR=32bit FIELD=32bit ECDH=yes EXPERIMENTAL=yes
- SCALAR=32bit FIELD=32bit ECDH=yes ECDSA_SIGN_TO_CONTRACT=yes EXPERIMENTAL=yes
- SCALAR=32bit FIELD=32bit EXPERIMENTAL=yes
- SCALAR=64bit
- FIELD=64bit RECOVERY=yes
- FIELD=64bit ENDOMORPHISM=yes
- FIELD=64bit ENDOMORPHISM=yes ECDH=yes EXPERIMENTAL=yes
- FIELD=64bit ENDOMORPHISM=yes ECDH=yes ECDSA_SIGN_TO_CONTRACT=yes EXPERIMENTAL=yes
- FIELD=64bit ASM=x86_64
- FIELD=64bit ENDOMORPHISM=yes ASM=x86_64
- FIELD=32bit ENDOMORPHISM=yes
@@ -67,4 +68,4 @@ before_script: ./autogen.sh
script:
- if [ -n "$HOST" ]; then export USE_HOST="--host=$HOST"; fi
- if [ "x$HOST" = "xi686-linux-gnu" ]; then export CC="$CC -m32"; fi
- ./configure --enable-experimental=$EXPERIMENTAL --enable-endomorphism=$ENDOMORPHISM --with-field=$FIELD --with-bignum=$BIGNUM --with-scalar=$SCALAR --enable-ecmult-static-precomputation=$STATICPRECOMPUTATION --with-ecmult-gen-precision=$ECMULTGENPRECISION --enable-module-ecdh=$ECDH --enable-module-recovery=$RECOVERY --enable-jni=$JNI $EXTRAFLAGS $USE_HOST && make -j2 $BUILD
- ./configure --enable-experimental=$EXPERIMENTAL --enable-endomorphism=$ENDOMORPHISM --with-field=$FIELD --with-bignum=$BIGNUM --with-scalar=$SCALAR --enable-ecmult-static-precomputation=$STATICPRECOMPUTATION --with-ecmult-gen-precision=$ECMULTGENPRECISION --enable-module-ecdh=$ECDH --enable-module-recovery=$RECOVERY --enable-module-ecdsa-sign-to-contract=$ECDSA_SIGN_TO_CONTRACT --enable-jni=$JNI $EXTRAFLAGS $USE_HOST && make -j2 $BUILD
4 changes: 4 additions & 0 deletions Makefile.am
Original file line number Diff line number Diff line change
@@ -181,3 +181,7 @@ endif
if ENABLE_MODULE_RECOVERY
include src/modules/recovery/Makefile.am.include
endif

if ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT
include src/modules/ecdsa_sign_to_contract/Makefile.am.include
endif
51 changes: 33 additions & 18 deletions configure.ac
Original file line number Diff line number Diff line change
@@ -134,6 +134,11 @@ AC_ARG_ENABLE(module_recovery,
[enable_module_recovery=$enableval],
[enable_module_recovery=no])

AC_ARG_ENABLE(module_ecdsa_sign_to_contract,
AS_HELP_STRING([--enable-module-ecdsa-sign-to-contract],[enable ECDSA sign-to-contract module [default=no]]),
[enable_module_ecdsa_sign_to_contract=$enableval],
[enable_module_ecdsa_sign_to_contract=no])

AC_ARG_ENABLE(external_default_callbacks,
AS_HELP_STRING([--enable-external-default-callbacks],[enable external default callback functions [default=no]]),
[use_external_default_callbacks=$enableval],
@@ -516,6 +521,10 @@ if test x"$enable_module_recovery" = x"yes"; then
AC_DEFINE(ENABLE_MODULE_RECOVERY, 1, [Define this symbol to enable the ECDSA pubkey recovery module])
fi

if test x"$enable_module_ecdsa_sign_to_contract" = x"yes"; then
AC_DEFINE(ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT, 1, [Define this symbol to enable the ECDSA sign-to-contract module])
fi

AC_C_BIGENDIAN()

if test x"$use_external_asm" = x"yes"; then
@@ -531,11 +540,15 @@ if test x"$enable_experimental" = x"yes"; then
AC_MSG_NOTICE([WARNING: experimental build])
AC_MSG_NOTICE([Experimental features do not have stable APIs or properties, and may not be safe for production use.])
AC_MSG_NOTICE([Building ECDH module: $enable_module_ecdh])
AC_MSG_NOTICE([Building ECDSA sign-to-contract module: $enable_module_ecdsa_sign_to_contract])
AC_MSG_NOTICE([******])
else
if test x"$enable_module_ecdh" = x"yes"; then
AC_MSG_ERROR([ECDH module is experimental. Use --enable-experimental to allow.])
fi
if test x"$enable_module_ecdsa_sign_to_contract" = x"yes"; then
AC_MSG_ERROR([ECDA sign-to-contract module module is experimental. Use --enable-experimental to allow.])
fi
if test x"$set_asm" = x"arm"; then
AC_MSG_ERROR([ARM assembly optimization is experimental. Use --enable-experimental to allow.])
fi
@@ -555,6 +568,7 @@ AM_CONDITIONAL([USE_BENCHMARK], [test x"$use_benchmark" = x"yes"])
AM_CONDITIONAL([USE_ECMULT_STATIC_PRECOMPUTATION], [test x"$set_precomp" = x"yes"])
AM_CONDITIONAL([ENABLE_MODULE_ECDH], [test x"$enable_module_ecdh" = x"yes"])
AM_CONDITIONAL([ENABLE_MODULE_RECOVERY], [test x"$enable_module_recovery" = x"yes"])
AM_CONDITIONAL([ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT], [test x"$enable_module_ecdsa_sign_to_contract" = x"yes"])
AM_CONDITIONAL([USE_JNI], [test x"$use_jni" = x"yes"])
AM_CONDITIONAL([USE_EXTERNAL_ASM], [test x"$use_external_asm" = x"yes"])
AM_CONDITIONAL([USE_ASM_ARM], [test x"$set_asm" = x"arm"])
@@ -568,24 +582,25 @@ AC_OUTPUT

echo
echo "Build Options:"
echo " with endomorphism = $use_endomorphism"
echo " with ecmult precomp = $set_precomp"
echo " with external callbacks = $use_external_default_callbacks"
echo " with jni = $use_jni"
echo " with benchmarks = $use_benchmark"
echo " with coverage = $enable_coverage"
echo " module ecdh = $enable_module_ecdh"
echo " module recovery = $enable_module_recovery"
echo " with endomorphism = $use_endomorphism"
echo " with ecmult precomp = $set_precomp"
echo " with external callbacks = $use_external_default_callbacks"
echo " with jni = $use_jni"
echo " with benchmarks = $use_benchmark"
echo " with coverage = $enable_coverage"
echo " module ecdh = $enable_module_ecdh"
echo " module recovery = $enable_module_recovery"
echo " module ecdsa sign-to-contract = $enable_module_ecdsa_sign_to_contract"
echo
echo " asm = $set_asm"
echo " bignum = $set_bignum"
echo " field = $set_field"
echo " scalar = $set_scalar"
echo " ecmult window size = $set_ecmult_window"
echo " ecmult gen prec. bits = $set_ecmult_gen_precision"
echo " asm = $set_asm"
echo " bignum = $set_bignum"
echo " field = $set_field"
echo " scalar = $set_scalar"
echo " ecmult window size = $set_ecmult_window"
echo " ecmult gen prec. bits = $set_ecmult_gen_precision"
echo
echo " CC = $CC"
echo " CFLAGS = $CFLAGS"
echo " CPPFLAGS = $CPPFLAGS"
echo " LDFLAGS = $LDFLAGS"
echo " CC = $CC"
echo " CFLAGS = $CFLAGS"
echo " CPPFLAGS = $CPPFLAGS"
echo " LDFLAGS = $LDFLAGS"
echo
55 changes: 55 additions & 0 deletions include/secp256k1.h
Original file line number Diff line number Diff line change
@@ -6,6 +6,7 @@ extern "C" {
#endif

#include <stddef.h>
#include <stdint.h>

/* These rules specify the order of arguments in API calls:
*
@@ -81,6 +82,29 @@ typedef struct {
unsigned char data[64];
} secp256k1_ecdsa_signature;

/** Data structure that holds a sign-to-contract ("s2c") opening information.
* Sign-to-contract allows a signer to commit to some data as part of a signature. It
* can be used as an Out-argument in certain signing functions.
*
* This structure is not opaque, but it is strongly discouraged to read or write to
* it directly.
*
* The exact representation of data inside is implementation defined and not
* guaranteed to be portable between different platforms or versions. It can
* be safely copied/moved.
*/
typedef struct {
/* magic is set during initialization */
uint64_t magic;
/* Public nonce before applying the sign-to-contract commitment */
secp256k1_pubkey original_pubnonce;
/* Byte indicating if signing algorithm negated the nonce. Alternatively when
* verifying we could compute the EC commitment of original_pubnonce and the
* data and negate if this would not be a valid nonce. But this would prevent
* batch verification of sign-to-contract commitments. */
int nonce_is_negated;
} secp256k1_s2c_opening;

/** A pointer to a function to deterministically generate a nonce.
*
* Returns: 1 if a nonce was successfully generated. 0 will cause signing to fail.
@@ -444,6 +468,37 @@ SECP256K1_API int secp256k1_ecdsa_signature_serialize_compact(
const secp256k1_ecdsa_signature* sig
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);

/** Parse a sign-to-contract opening.
*
* Returns: 1 if the opening was fully valid.
* 0 if the opening could not be parsed or is invalid.
* Args: ctx: a secp256k1 context object.
* Out: opening: pointer to an opening object. If 1 is returned, it is set to a
* parsed version of input. If not, its value is undefined.
* In: input34: pointer to 34-byte array with a serialized opening
*
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_s2c_opening_parse(
const secp256k1_context* ctx,
secp256k1_s2c_opening* opening,
const unsigned char *input34
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);

/** Serialize a sign-to-contract opening into a byte sequence.
*
* Returns: 1 if the opening was successfully serialized.
* 0 if the opening was not initializaed.
* Args: ctx: a secp256k1 context object.
* Out: output34: pointer to a 34-byte array to place the serialized opening
* in.
* In: opening: a pointer to an initialized `secp256k1_s2c_opening`.
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_s2c_opening_serialize(
const secp256k1_context* ctx,
unsigned char *output34,
const secp256k1_s2c_opening* opening
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);

/** Verify an ECDSA signature.
*
* Returns: 1: correct signature
129 changes: 129 additions & 0 deletions include/secp256k1_ecdsa_sign_to_contract.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,129 @@
#ifndef SECP256K1_ECDSA_SIGN_TO_CONTRACT_H
#define SECP256K1_ECDSA_SIGN_TO_CONTRACT_H

#include "secp256k1.h"

#ifdef __cplusplus
extern "C" {
#endif

/** Same as secp256k1_ecdsa_sign, but s2c_data32 is committed to by adding `hash(R1, s2c_data32)` to
* the nonce generated by noncefp, with `ndata=hash(s2c_data32, ndata)`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: The with [...] part is a bit difficult to understand. Also noncefp is always secp256k1_nonce_function_default. Perhaps for this function we can remove the noncefp and ndata argument because they don't have a purpose anyway.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we sure that there is no use case for ndata when you could also provide s2c_data? I am not familiar with uses of ndata in general, but if s2c_data alone is enough for all cases, then ndata could also be removed from secp256k1_schnorrsig_sign?

I can remove noncefp, but we could also keep it so other functions could be allowed in the future without breaking API compatibility.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ndata is for giving additional information to the nonce function. Since it is hashed with s2c_data I don't see how you'd transmit usable information to the nonce function in that way. ndata shouldn't be removed from schnorrsig_sign because schnorrsig_sign can be used with other nonce functions than just the default. Imo, simpler is better than optimizing for some unknown future usecase.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Dropped the noncefp and ndata params from the function in the alternative here. Can also do it for this version if we choose this alternative over the other.

* Returns: 1: signature created
* 0: the nonce generation function failed, or the private key was invalid.
* Args: ctx: pointer to a context object, initialized for signing (cannot be NULL)
* Out: sig: pointer to an array where the signature will be placed (cannot be NULL)
* s2c_opening: pointer to an secp256k1_s2c_opening structure which can be
* NULL but is required to be not NULL if this signature creates
* a sign-to-contract commitment (i.e. the `s2c_data` argument
* is not NULL).
* In:
* msg32: the 32-byte message hash being signed (cannot be NULL)
* seckey: pointer to a 32-byte secret key (cannot be NULL)
* s2c_data32: pointer to a 32-byte data to create an optional
* sign-to-contract commitment to if not NULL (can be NULL).
* noncefp: pointer to a nonce generation function.
* If NULL, secp256k1_nonce_function_default is used.
* Must be the default if s2c_data32 is not NULL.
* ndata: pointer to arbitrary data used by the nonce generation function (can be NULL)
*/
SECP256K1_API int secp256k1_ecdsa_s2c_sign(
const secp256k1_context* ctx,
secp256k1_ecdsa_signature *sig,
secp256k1_s2c_opening *s2c_opening,
const unsigned char *msg32,
const unsigned char *seckey,
const unsigned char* s2c_data32,
secp256k1_nonce_function noncefp,
const void *ndata
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);

/** Verify a sign-to-contract commitment.
*
* Returns: 1: the signature contains a commitment to data32
* 0: incorrect opening
* Args: ctx: a secp256k1 context object, initialized for verification.
* In: sig: the signature containing the sign-to-contract commitment (cannot be NULL)
* data32: the 32-byte data that was committed to (cannot be NULL)
* opening: pointer to the opening created during signing (cannot be NULL)
*/
SECP256K1_API int secp256k1_ecdsa_s2c_verify_commit(
const secp256k1_context* ctx,
const secp256k1_ecdsa_signature *sig,
const unsigned char *data32,
const secp256k1_s2c_opening *opening
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4);

/** Compute commitment on the client as part of the ECDSA Anti Nonce Covert Channel Protocol.
*
* ECDSA Anti Nonce Covert Channel Protocol:
* 1. The host draws randomness `k2`, commits to it with sha256 and sends the commitment to the client.
* 2. The client commits to its original nonce `k1` using the host commitment by calling
* `secp256k1_ecdsa_anti_covert_channel_client_commit`. The client sends the resulting commitment
* `R1` to the host.
* 3. The host replies with `k2` generated in step 1.
* 4. The client signs with `secp256k1_ecdsa_s2c_sign`, using the `k2` as `s2c_data` and
* sends the signature and opening to the host.
* 5. The host verifies that `R_x = (R1 + H(R1, k2)*G)_x`, where R_x is the `r` part of the signature by using
* `secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify` with the client's
* commitment from step 2 and the signature and opening received in step 4. If verification does
* not succeed, the protocol failed and can be restarted.
*
* Returns 1 on success, 0 on failure.
* Args: ctx: pointer to a context object (cannot be NULL)
* Out: client_commit: pointer to a pubkey where the clients public nonce will be
* placed. (cannot be NULL)
* In: msg32: the 32-byte message hash to be signed (cannot be NULL)
* seckey32: the 32-byte secret key used for signing (cannot be NULL)
* noncefp: pointer to a nonce generation function. If NULL, secp256k1_nonce_function_default is used
* rand_commitment32: the 32-byte randomness commitment from the host (cannot be NULL)
*/
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(
const secp256k1_context* ctx,
secp256k1_pubkey *client_commit,
const unsigned char *msg32,
const unsigned char *seckey32,
unsigned char *rand_commitment32
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);

/** Create a randomness commitment on the host as part of the ECDSA Anti Nonce Covert Channel Protocol.
*
* Returns 1 on success, 0 on failure.
* Args: ctx: pointer to a context object (cannot be NULL)
* Out: rand_commitment32: pointer to 32-byte array to store the returned commitment (cannot be NULL)
* In: rand32: the 32-byte randomness to commit to (cannot be NULL)
*/
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(
secp256k1_context *ctx,
unsigned char *rand_commitment32,
const unsigned char *rand32
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);

/** Verify that a clients signature contains the hosts randomness as part of the Anti
* Nonce Covert Channel Protocol. Does not verify the signature itself.
*
* Returns 1 on success, 0 on failure.
* Args: ctx: pointer to a context object (cannot be NULL)
* In: sig: pointer to the signature whose randomness should be verified
* (cannot be NULL)
* rand32: pointer to the 32-byte randomness from the host which should
* be included by the signature (cannot be NULL)
* opening: pointer to the opening produced by the client when signing
* with `rand32` as `s2c_data` (cannot be NULL)
* client_commit: pointer to the client's commitment created in
* `secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit`
* (cannot be NULL)
*/
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(
secp256k1_context *ctx,
const secp256k1_ecdsa_signature *sig,
const unsigned char *rand32,
const secp256k1_s2c_opening *opening,
const secp256k1_pubkey *client_commit
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);

#ifdef __cplusplus
}
#endif

#endif /* SECP256K1_ECDSA_SIGN_TO_CONTRACT_H */
3 changes: 3 additions & 0 deletions src/modules/ecdsa_sign_to_contract/Makefile.am.include
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
include_HEADERS += include/secp256k1_ecdsa_sign_to_contract.h
noinst_HEADERS += src/modules/ecdsa_sign_to_contract/main_impl.h
noinst_HEADERS += src/modules/ecdsa_sign_to_contract/tests_impl.h
218 changes: 218 additions & 0 deletions src/modules/ecdsa_sign_to_contract/main_impl.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,218 @@
/**********************************************************************
* Copyright (c) 2019 Marko Bencun, Jonas Nick *
* Distributed under the MIT software license, see the accompanying *
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
**********************************************************************/

#ifndef SECP256K1_MODULE_ECDSA_SIGN_TO_CONTRACT_MAIN_H
#define SECP256K1_MODULE_ECDSA_SIGN_TO_CONTRACT_MAIN_H

#include "include/secp256k1_ecdsa_sign_to_contract.h"

int secp256k1_ecdsa_s2c_sign(const secp256k1_context *ctx, secp256k1_ecdsa_signature *signature, secp256k1_s2c_opening *s2c_opening, const unsigned char *msg32, const unsigned char *seckey, const unsigned char* s2c_data32, secp256k1_nonce_function noncefp, const void* noncedata) {
secp256k1_scalar r, s;
secp256k1_scalar sec, non, msg;
secp256k1_sha256 sha;
int ret = 0;
int overflow = 0;
int is_zero = 0;
unsigned char ndata[32];
VERIFY_CHECK(ctx != NULL);
ARG_CHECK(secp256k1_ecmult_gen_context_is_built(&ctx->ecmult_gen_ctx));
ARG_CHECK(msg32 != NULL);
ARG_CHECK(signature != NULL);
ARG_CHECK(seckey != NULL);
if (noncefp == NULL) {
noncefp = secp256k1_nonce_function_default;
}
/* sign-to-contract commitments only work with the default nonce function,
* because we need to ensure that s2c_data is actually hashed into the nonce and
* not just ignored. */
ARG_CHECK(s2c_data32 == NULL || noncefp == secp256k1_nonce_function_default);
/* s2c_opening and s2c_data32 should be either both non-NULL or both NULL. */
ARG_CHECK((s2c_opening != NULL) == (s2c_data32 != NULL));

if (s2c_opening != NULL) {
secp256k1_s2c_opening_init(s2c_opening);
}

if(s2c_data32 != NULL) {
/* Provide s2c_data32 and ndata (if not NULL) to the the nonce function
* as additional data to derive the nonce from. If both pointers are
* not NULL, they need to be hashed to get the nonce data 32 bytes.
* Even if only s2c_data32 is not NULL, it's hashed because it should
* be possible to derive nonces even if only a SHA256 commitment to the
* data is known. This is for example important in the
* anti-nonce-sidechannel protocol.
*/
secp256k1_sha256_initialize(&sha);
secp256k1_sha256_write(&sha, s2c_data32, 32);
if (noncedata != NULL) {
secp256k1_sha256_write(&sha, noncedata, 32);
}
secp256k1_sha256_finalize(&sha, ndata);
noncedata = &ndata;
}

secp256k1_scalar_set_b32(&sec, seckey, &overflow);
/* Fail if the secret key is invalid. */
if (!overflow && !secp256k1_scalar_is_zero(&sec)) {
unsigned char nonce32[32];
unsigned int count = 0;
secp256k1_scalar_set_b32(&msg, msg32, NULL);
while (1) {
ret = noncefp(nonce32, msg32, seckey, NULL, (void*)noncedata, count);
if (!ret) {
break;
}
secp256k1_scalar_set_b32(&non, nonce32, &overflow);
is_zero = secp256k1_scalar_is_zero(&non);
if (!overflow && !is_zero) {
if (s2c_data32 != NULL) {
secp256k1_gej nonce_pj;
secp256k1_ge nonce_p;

/* Compute original nonce commitment/pubkey */
secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &nonce_pj, &non);
secp256k1_ge_set_gej(&nonce_p, &nonce_pj);
secp256k1_pubkey_save(&s2c_opening->original_pubnonce, &nonce_p);

/* Tweak nonce with s2c commitment. */
if (!secp256k1_ec_commit_seckey(ctx, nonce32, &s2c_opening->original_pubnonce, s2c_data32, 32)) {
return 0;
}
secp256k1_scalar_set_b32(&non, nonce32, &overflow);
is_zero = secp256k1_scalar_is_zero(&non);
}

if (!overflow && !is_zero) {
if (secp256k1_ecdsa_sig_sign(&ctx->ecmult_gen_ctx, &r, &s, &sec, &msg, &non, NULL)) {
break;
}
}
}
count++;
}
memset(nonce32, 0, 32);
secp256k1_scalar_clear(&msg);
secp256k1_scalar_clear(&non);
secp256k1_scalar_clear(&sec);
}
if (ret) {
secp256k1_ecdsa_signature_save(signature, &r, &s);
} else {
memset(signature, 0, sizeof(*signature));
}
return ret;
}

int secp256k1_ecdsa_s2c_verify_commit(const secp256k1_context* ctx, const secp256k1_ecdsa_signature *sig, const unsigned char *data32, const secp256k1_s2c_opening *opening) {
secp256k1_pubkey commitment;
secp256k1_ge commitment_ge;
unsigned char x_bytes1[32];
unsigned char x_bytes2[32];
secp256k1_scalar sigr, sigs;

VERIFY_CHECK(ctx != NULL);
ARG_CHECK(sig != NULL);
ARG_CHECK(data32 != NULL);
ARG_CHECK(opening != NULL);
ARG_CHECK(secp256k1_s2c_commit_is_init(opening));

if (!secp256k1_ec_commit(ctx, &commitment, &opening->original_pubnonce, data32, 32)) {
return 0;
}

/* Check that sigr (x coordinate of R) matches the x coordinate of the commitment. */
secp256k1_ecdsa_signature_load(ctx, &sigr, &sigs, sig);

if (!secp256k1_pubkey_load(ctx, &commitment_ge, &commitment)) {
return 0;
}
secp256k1_fe_normalize(&commitment_ge.x);
secp256k1_fe_get_b32(x_bytes1, &commitment_ge.x);
secp256k1_scalar_get_b32(x_bytes2, &sigr);
return memcmp(x_bytes1, x_bytes2, 32) == 0;

}

int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(const secp256k1_context* ctx, secp256k1_pubkey *client_commit, const unsigned char *msg32, const unsigned char *seckey32, unsigned char *rand_commitment32) {
unsigned char nonce32[32];
secp256k1_scalar k;
secp256k1_gej rj;
secp256k1_ge r;
unsigned int count = 0;
VERIFY_CHECK(ctx != NULL);
ARG_CHECK(secp256k1_ecmult_gen_context_is_built(&ctx->ecmult_gen_ctx));
ARG_CHECK(client_commit != NULL);
ARG_CHECK(msg32 != NULL);
ARG_CHECK(seckey32 != NULL);
ARG_CHECK(rand_commitment32 != NULL);

while (1) {
int overflow = 0;
if (!secp256k1_nonce_function_default(nonce32, msg32, seckey32, NULL, rand_commitment32, count)) {
/* cannot happen with secp256k1_nonce_function_default */
return 0;
}

secp256k1_scalar_set_b32(&k, nonce32, &overflow);
if (!overflow && !secp256k1_scalar_is_zero(&k)) {
break;
}
count++;
}

secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &rj, &k);
secp256k1_ge_set_gej(&r, &rj);
secp256k1_pubkey_save(client_commit, &r);
return 1;
}

int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(secp256k1_context *ctx, const secp256k1_ecdsa_signature *sig, const unsigned char *rand32, const secp256k1_s2c_opening *opening, const secp256k1_pubkey *client_commit) {

secp256k1_ge gcommit;
secp256k1_ge gopening;
secp256k1_gej pj;

VERIFY_CHECK(ctx != NULL);
ARG_CHECK(sig != NULL);
ARG_CHECK(rand32 != NULL);
ARG_CHECK(opening != NULL);
ARG_CHECK(secp256k1_s2c_commit_is_init(opening));
ARG_CHECK(client_commit != NULL);

/* Check that client_commit == opening->original_pubnonce */
secp256k1_gej_set_infinity(&pj);
if (!secp256k1_pubkey_load(ctx, &gcommit, client_commit)) {
return 0;
}
secp256k1_ge_neg(&gcommit, &gcommit);
secp256k1_gej_add_ge(&pj, &pj, &gcommit);
if (!secp256k1_pubkey_load(ctx, &gopening, &opening->original_pubnonce)) {
return 0;
}
secp256k1_gej_add_ge(&pj, &pj, &gopening);
if (!secp256k1_gej_is_infinity(&pj)) {
return 0;
}
if (!secp256k1_ecdsa_s2c_verify_commit(ctx, sig, rand32, opening)) {
return 0;
}
return 1;
}

int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(secp256k1_context *ctx, unsigned char *rand_commitment32, const unsigned char *rand32) {
secp256k1_sha256 sha;

VERIFY_CHECK(ctx != NULL);
ARG_CHECK(rand_commitment32 != NULL);
ARG_CHECK(rand32 != NULL);

secp256k1_sha256_initialize(&sha);
secp256k1_sha256_write(&sha, rand32, 32);
secp256k1_sha256_finalize(&sha, rand_commitment32);
return 1;
}

#endif /* SECP256K1_ECDSA_SIGN_TO_CONTRACT_MAIN_H */
414 changes: 414 additions & 0 deletions src/modules/ecdsa_sign_to_contract/tests_impl.h

Large diffs are not rendered by default.

120 changes: 120 additions & 0 deletions src/secp256k1.c
Original file line number Diff line number Diff line change
@@ -681,10 +681,130 @@ int secp256k1_ec_pubkey_combine(const secp256k1_context* ctx, secp256k1_pubkey *
return 1;
}

/* Compute an ec commitment tweak as hash(pubkey, data). */
static int secp256k1_ec_commit_tweak(const secp256k1_context *ctx, unsigned char *tweak32, const secp256k1_pubkey *pubkey, const unsigned char *data, size_t data_size) {
secp256k1_ge p;
unsigned char rbuf[33];
size_t rbuf_size = sizeof(rbuf);
secp256k1_sha256 sha;

if (data_size == 0) {
/* That's probably not what the caller wanted */
return 0;
}
if(!secp256k1_pubkey_load(ctx, &p, pubkey)) {
return 0;
}
secp256k1_eckey_pubkey_serialize(&p, rbuf, &rbuf_size, 1);

secp256k1_sha256_initialize(&sha);
secp256k1_sha256_write(&sha, rbuf, rbuf_size);
secp256k1_sha256_write(&sha, data, data_size);
secp256k1_sha256_finalize(&sha, tweak32);
return 1;
}

/* Compute an ec commitment as pubkey + hash(pubkey, data)*G. */
static int secp256k1_ec_commit(const secp256k1_context* ctx, secp256k1_pubkey *commitment, const secp256k1_pubkey *pubkey, const unsigned char *data, size_t data_size) {
unsigned char tweak[32];

*commitment = *pubkey;
if (!secp256k1_ec_commit_tweak(ctx, tweak, commitment, data, data_size)) {
return 0;
}
return secp256k1_ec_pubkey_tweak_add(ctx, commitment, tweak);
}

/* Compute the seckey of an ec commitment from the original secret key of the pubkey as seckey +
* hash(pubkey, data). */
static int secp256k1_ec_commit_seckey(const secp256k1_context* ctx, unsigned char *seckey, const secp256k1_pubkey *pubkey, const unsigned char *data, size_t data_size) {
unsigned char tweak[32];
secp256k1_pubkey pubkey_tmp;

if (pubkey == NULL) {
/* Compute pubkey from seckey if not provided */
int overflow;
secp256k1_scalar x;
secp256k1_gej pj;
secp256k1_ge p;

secp256k1_scalar_set_b32(&x, seckey, &overflow);
if (overflow != 0) {
return 0;
}
secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &pj, &x);
secp256k1_ge_set_gej(&p, &pj);
secp256k1_pubkey_save(&pubkey_tmp, &p);
pubkey = &pubkey_tmp;
}

if (!secp256k1_ec_commit_tweak(ctx, tweak, pubkey, data, data_size)) {
return 0;
}
return secp256k1_ec_privkey_tweak_add(ctx, seckey, tweak);
}

/* Verify an ec commitment as pubkey + hash(pubkey, data)*G ?= commitment. */
static int secp256k1_ec_commit_verify(const secp256k1_context* ctx, const secp256k1_pubkey *commitment, const secp256k1_pubkey *pubkey, const unsigned char *data, size_t data_size) {
secp256k1_gej pj;
secp256k1_ge p;
secp256k1_pubkey commitment_tmp;

if (!secp256k1_ec_commit(ctx, &commitment_tmp, pubkey, data, data_size)) {
return 0;
}

/* Return commitment == commitment_tmp */
secp256k1_gej_set_infinity(&pj);
secp256k1_pubkey_load(ctx, &p, &commitment_tmp);
secp256k1_gej_add_ge_var(&pj, &pj, &p, NULL);
secp256k1_pubkey_load(ctx, &p, commitment);
secp256k1_ge_neg(&p, &p);
secp256k1_gej_add_ge_var(&pj, &pj, &p, NULL);
return secp256k1_gej_is_infinity(&pj);
}

static uint64_t s2c_opening_magic = 0x5d0520b8b7f2b168ULL;

static void secp256k1_s2c_opening_init(secp256k1_s2c_opening *opening) {
opening->magic = s2c_opening_magic;
opening->nonce_is_negated = 0;
}

static int secp256k1_s2c_commit_is_init(const secp256k1_s2c_opening *opening) {
return opening->magic == s2c_opening_magic;
}

int secp256k1_s2c_opening_parse(const secp256k1_context* ctx, secp256k1_s2c_opening* opening, const unsigned char *input34) {
VERIFY_CHECK(ctx != NULL);
ARG_CHECK(opening != NULL);
ARG_CHECK(input34 != NULL);

secp256k1_s2c_opening_init(opening);
opening->nonce_is_negated = input34[0];
return secp256k1_ec_pubkey_parse(ctx, &opening->original_pubnonce, &input34[1], 33);
}

int secp256k1_s2c_opening_serialize(const secp256k1_context* ctx, unsigned char *output34, const secp256k1_s2c_opening* opening) {
size_t outputlen = 33;

VERIFY_CHECK(ctx != NULL);
ARG_CHECK(output34 != NULL);
ARG_CHECK(opening != NULL);
ARG_CHECK(secp256k1_s2c_commit_is_init(opening));

output34[0] = opening->nonce_is_negated;
return secp256k1_ec_pubkey_serialize(ctx, &output34[1], &outputlen, &opening->original_pubnonce, SECP256K1_EC_COMPRESSED);
}

#ifdef ENABLE_MODULE_ECDH
# include "modules/ecdh/main_impl.h"
#endif

#ifdef ENABLE_MODULE_RECOVERY
# include "modules/recovery/main_impl.h"
#endif

#ifdef ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT
# include "modules/ecdsa_sign_to_contract/main_impl.h"
#endif
147 changes: 146 additions & 1 deletion src/tests.c
Original file line number Diff line number Diff line change
@@ -2365,6 +2365,85 @@ void run_ec_combine(void) {
}
}

int test_ec_commit_seckey(unsigned char *seckey, secp256k1_pubkey *commitment) {
/* Return if seckey is the discrete log of commitment */
secp256k1_pubkey pubkey_tmp;
return secp256k1_ec_pubkey_create(ctx, &pubkey_tmp, seckey) == 1
&& memcmp(&pubkey_tmp, commitment, sizeof(pubkey_tmp)) == 0;
}

void test_ec_commit(void) {
unsigned char seckey[32];
secp256k1_pubkey pubkey;
secp256k1_pubkey commitment;
unsigned char data[32];

/* Create random keypair and data */
secp256k1_rand256(seckey);
CHECK(secp256k1_ec_pubkey_create(ctx, &pubkey, seckey));
secp256k1_rand256_test(data);

/* Commit to data and verify */
CHECK(secp256k1_ec_commit(ctx, &commitment, &pubkey, data, 32));
CHECK(secp256k1_ec_commit_verify(ctx, &commitment, &pubkey, data, 32));
CHECK(secp256k1_ec_commit_seckey(ctx, seckey, &pubkey, data, 32));
CHECK(test_ec_commit_seckey(seckey, &commitment) == 1);

/* Check that verification fails with different data */
CHECK(secp256k1_ec_commit_verify(ctx, &commitment, &pubkey, data, 31) == 0);
}

void test_ec_commit_api(void) {
unsigned char seckey[32];
secp256k1_pubkey pubkey;
secp256k1_pubkey commitment;
unsigned char data[32];

memset(data, 23, sizeof(data));

/* Create random keypair */
secp256k1_rand256(seckey);
CHECK(secp256k1_ec_pubkey_create(ctx, &pubkey, seckey));

CHECK(secp256k1_ec_commit(ctx, &commitment, &pubkey, data, 1) == 1);
/* The same pubkey can be both input and output of the function */
{
secp256k1_pubkey pubkey_tmp = pubkey;
CHECK(secp256k1_ec_commit(ctx, &pubkey_tmp, &pubkey_tmp, data, 1) == 1);
CHECK(memcmp(commitment.data, pubkey_tmp.data, sizeof(commitment.data)) == 0);
}

/* If the pubkey is not provided it will be computed from seckey */
CHECK(secp256k1_ec_commit_seckey(ctx, seckey, NULL, data, 1) == 1);
CHECK(test_ec_commit_seckey(seckey, &commitment) == 1);
/* pubkey is not provided but seckey overflows */
{
unsigned char overflowed_seckey[32];
memset(overflowed_seckey, 0xFF, sizeof(overflowed_seckey));
CHECK(secp256k1_ec_commit_seckey(ctx, overflowed_seckey, NULL, data, 1) == 0);
}

CHECK(secp256k1_ec_commit_verify(ctx, &commitment, &pubkey, data, 1) == 1);

/* Commitment to 0-len data should fail */
CHECK(secp256k1_ec_commit(ctx, &commitment, &pubkey, data, 0) == 0);
CHECK(secp256k1_ec_commit_verify(ctx, &commitment, &pubkey, data, 0) == 0);
CHECK(memcmp(&pubkey.data, &commitment.data, sizeof(pubkey.data)) == 0);
{
unsigned char seckey_tmp[32];
memcpy(seckey_tmp, seckey, 32);
CHECK(secp256k1_ec_commit_seckey(ctx, seckey_tmp, &pubkey, data, 0) == 0);
}
}

void run_ec_commit(void) {
int i;
for (i = 0; i < count * 8; i++) {
test_ec_commit();
}
test_ec_commit_api();
}

void test_group_decompress(const secp256k1_fe* x) {
/* The input itself, normalized. */
secp256k1_fe fex = *x;
@@ -3076,7 +3155,7 @@ void test_ecmult_multi_batching(void) {
data.pt = pt;
secp256k1_gej_neg(&r2, &r2);

/* Test with empty scratch space. It should compute the correct result using
/* Test with empty scratch space. It should compute the correct result using
* ecmult_mult_simple algorithm which doesn't require a scratch space. */
scratch = secp256k1_scratch_create(&ctx->error_callback, 0);
CHECK(secp256k1_ecmult_multi_var(&ctx->error_callback, &ctx->ecmult_ctx, scratch, &r, &scG, ecmult_multi_callback, &data, n_points));
@@ -4104,6 +4183,59 @@ void run_eckey_edge_case_test(void) {
secp256k1_context_set_illegal_callback(ctx, NULL, NULL);
}


void run_s2c_opening_test(void) {
int i = 0;
unsigned char output[34];
unsigned char input[34] = {
0x01,
0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x02
};
secp256k1_s2c_opening opening;
size_t ecount = 0;

secp256k1_context_set_illegal_callback(ctx, counting_illegal_callback_fn, &ecount);

/* Uninitialized opening can't be serialized. Actually testing that would be
* undefined behavior. Therefore we simulate it by setting the opening to 0. */
memset(&opening, 0, sizeof(opening));
CHECK(ecount == 0);
CHECK(secp256k1_s2c_opening_serialize(ctx, output, &opening) == 0);
CHECK(ecount == 1);

/* First parsing, then serializing works */
CHECK(secp256k1_s2c_opening_parse(ctx, &opening, input) == 1);
CHECK(secp256k1_s2c_opening_serialize(ctx, output, &opening) == 1);

{
/* Invalid pubkey makes parsing fail */
unsigned char input_tmp[34];
memcpy(input_tmp, input, sizeof(input_tmp));
input_tmp[33] = 0;
CHECK(secp256k1_s2c_opening_parse(ctx, &opening, input_tmp) == 0);
}

/* Try parsing and serializing a bunch of openings */
do {
/* This is expected to fail in about 50% of iterations because the
* points' x-coordinates are uniformly random */
if (secp256k1_s2c_opening_parse(ctx, &opening, input) == 1) {
CHECK(secp256k1_s2c_opening_serialize(ctx, output, &opening) == 1);
CHECK(memcmp(output, input, 34) == 0);
}
secp256k1_rand256(input);
/* nonce_is_negated */
input[0] = input[0] & 1;
/* oddness */
input[1] = (input[1] % 2) + 2;
i++;
} while(i < count);
}

void random_sign(secp256k1_scalar *sigr, secp256k1_scalar *sigs, const secp256k1_scalar *key, const secp256k1_scalar *msg, int *recid) {
secp256k1_scalar nonce;
do {
@@ -5166,6 +5298,11 @@ void run_ecdsa_openssl(void) {
# include "modules/recovery/tests_impl.h"
#endif

#ifdef ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT
# include "modules/ecdsa_sign_to_contract/tests_impl.h"
#endif


int main(int argc, char **argv) {
unsigned char seed16[16] = {0};
unsigned char run32[32] = {0};
@@ -5258,6 +5395,7 @@ int main(int argc, char **argv) {
run_ecmult_const_tests();
run_ecmult_multi_tests();
run_ec_combine();
run_ec_commit();

/* endomorphism tests */
#ifdef USE_ENDOMORPHISM
@@ -5270,6 +5408,8 @@ int main(int argc, char **argv) {
/* EC key edge cases */
run_eckey_edge_case_test();

run_s2c_opening_test();

#ifdef ENABLE_MODULE_ECDH
/* ecdh tests */
run_ecdh_tests();
@@ -5290,6 +5430,11 @@ int main(int argc, char **argv) {
run_recovery_tests();
#endif

#ifdef ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT
/* ECDSA sign to contract */
run_ecdsa_sign_to_contract_tests();
#endif

secp256k1_rand256(run32);
printf("random run = %02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x\n", run32[0], run32[1], run32[2], run32[3], run32[4], run32[5], run32[6], run32[7], run32[8], run32[9], run32[10], run32[11], run32[12], run32[13], run32[14], run32[15]);