Skip to content

Commit 6176e2f

Browse files
authored
Merge pull request #1388 from lightning-signer/2022-03-grind
2 parents eb68b5f + 8d7b38f commit 6176e2f

File tree

7 files changed

+34
-15
lines changed

7 files changed

+34
-15
lines changed

.github/workflows/build.yml

+3
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,9 @@ jobs:
115115
cargo test --verbose --color always --no-default-features --features no-std
116116
# check if there is a conflict between no-std and the default std feature
117117
cargo test --verbose --color always --features no-std
118+
# check that things still pass without grind_signatures
119+
# note that outbound_commitment_test only runs in this mode, because of hardcoded signature values
120+
cargo test --verbose --color always --no-default-features --features std
118121
# check if there is a conflict between no-std and the c_bindings cfg
119122
RUSTFLAGS="--cfg=c_bindings" cargo test --verbose --color always --no-default-features --features=no-std
120123
cd ..

lightning/Cargo.toml

+4-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,10 @@ _bench_unstable = []
3232
no-std = ["hashbrown", "bitcoin/no-std", "core2/alloc"]
3333
std = ["bitcoin/std"]
3434

35-
default = ["std"]
35+
# Generates low-r bitcoin signatures, which saves 1 byte in 50% of the cases
36+
grind_signatures = []
37+
38+
default = ["std", "grind_signatures"]
3639

3740
[dependencies]
3841
bitcoin = { version = "0.27", default-features = false, features = ["secp-recovery"] }

lightning/src/chain/keysinterface.rs

+9-9
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ use bitcoin::secp256k1::recovery::RecoverableSignature;
3131
use bitcoin::secp256k1;
3232

3333
use util::{byte_utils, transaction_utils};
34-
use util::crypto::hkdf_extract_expand_twice;
34+
use util::crypto::{hkdf_extract_expand_twice, sign};
3535
use util::ser::{Writeable, Writer, Readable, ReadableArgs};
3636

3737
use chain::transaction::OutPoint;
@@ -590,7 +590,7 @@ impl InMemorySigner {
590590
let remotepubkey = self.pubkeys().payment_point;
591591
let witness_script = bitcoin::Address::p2pkh(&::bitcoin::PublicKey{compressed: true, key: remotepubkey}, Network::Testnet).script_pubkey();
592592
let sighash = hash_to_message!(&bip143::SigHashCache::new(spend_tx).signature_hash(input_idx, &witness_script, descriptor.output.value, SigHashType::All)[..]);
593-
let remotesig = secp_ctx.sign(&sighash, &self.payment_key);
593+
let remotesig = sign(secp_ctx, &sighash, &self.payment_key);
594594
let payment_script = bitcoin::Address::p2wpkh(&::bitcoin::PublicKey{compressed: true, key: remotepubkey}, Network::Bitcoin).unwrap().script_pubkey();
595595

596596
if payment_script != descriptor.output.script_pubkey { return Err(()); }
@@ -624,7 +624,7 @@ impl InMemorySigner {
624624
let delayed_payment_pubkey = PublicKey::from_secret_key(&secp_ctx, &delayed_payment_key);
625625
let witness_script = chan_utils::get_revokeable_redeemscript(&descriptor.revocation_pubkey, descriptor.to_self_delay, &delayed_payment_pubkey);
626626
let sighash = hash_to_message!(&bip143::SigHashCache::new(spend_tx).signature_hash(input_idx, &witness_script, descriptor.output.value, SigHashType::All)[..]);
627-
let local_delayedsig = secp_ctx.sign(&sighash, &delayed_payment_key);
627+
let local_delayedsig = sign(secp_ctx, &sighash, &delayed_payment_key);
628628
let payment_script = bitcoin::Address::p2wsh(&witness_script, Network::Bitcoin).script_pubkey();
629629

630630
if descriptor.output.script_pubkey != payment_script { return Err(()); }
@@ -673,7 +673,7 @@ impl BaseSign for InMemorySigner {
673673
let htlc_sighashtype = if self.opt_anchors() { SigHashType::SinglePlusAnyoneCanPay } else { SigHashType::All };
674674
let htlc_sighash = hash_to_message!(&bip143::SigHashCache::new(&htlc_tx).signature_hash(0, &htlc_redeemscript, htlc.amount_msat / 1000, htlc_sighashtype)[..]);
675675
let holder_htlc_key = chan_utils::derive_private_key(&secp_ctx, &keys.per_commitment_point, &self.htlc_base_key).map_err(|_| ())?;
676-
htlc_sigs.push(secp_ctx.sign(&htlc_sighash, &holder_htlc_key));
676+
htlc_sigs.push(sign(secp_ctx, &htlc_sighash, &holder_htlc_key));
677677
}
678678

679679
Ok((commitment_sig, htlc_sigs))
@@ -714,7 +714,7 @@ impl BaseSign for InMemorySigner {
714714
};
715715
let mut sighash_parts = bip143::SigHashCache::new(justice_tx);
716716
let sighash = hash_to_message!(&sighash_parts.signature_hash(input, &witness_script, amount, SigHashType::All)[..]);
717-
return Ok(secp_ctx.sign(&sighash, &revocation_key))
717+
return Ok(sign(secp_ctx, &sighash, &revocation_key))
718718
}
719719

720720
fn sign_justice_revoked_htlc(&self, justice_tx: &Transaction, input: usize, amount: u64, per_commitment_key: &SecretKey, htlc: &HTLCOutputInCommitment, secp_ctx: &Secp256k1<secp256k1::All>) -> Result<Signature, ()> {
@@ -728,7 +728,7 @@ impl BaseSign for InMemorySigner {
728728
};
729729
let mut sighash_parts = bip143::SigHashCache::new(justice_tx);
730730
let sighash = hash_to_message!(&sighash_parts.signature_hash(input, &witness_script, amount, SigHashType::All)[..]);
731-
return Ok(secp_ctx.sign(&sighash, &revocation_key))
731+
return Ok(sign(secp_ctx, &sighash, &revocation_key))
732732
}
733733

734734
fn sign_counterparty_htlc_transaction(&self, htlc_tx: &Transaction, input: usize, amount: u64, per_commitment_point: &PublicKey, htlc: &HTLCOutputInCommitment, secp_ctx: &Secp256k1<secp256k1::All>) -> Result<Signature, ()> {
@@ -742,7 +742,7 @@ impl BaseSign for InMemorySigner {
742742
} else { return Err(()) };
743743
let mut sighash_parts = bip143::SigHashCache::new(htlc_tx);
744744
let sighash = hash_to_message!(&sighash_parts.signature_hash(input, &witness_script, amount, SigHashType::All)[..]);
745-
return Ok(secp_ctx.sign(&sighash, &htlc_key))
745+
return Ok(sign(secp_ctx, &sighash, &htlc_key))
746746
}
747747
Err(())
748748
}
@@ -756,7 +756,7 @@ impl BaseSign for InMemorySigner {
756756
fn sign_channel_announcement(&self, msg: &UnsignedChannelAnnouncement, secp_ctx: &Secp256k1<secp256k1::All>)
757757
-> Result<(Signature, Signature), ()> {
758758
let msghash = hash_to_message!(&Sha256dHash::hash(&msg.encode()[..])[..]);
759-
Ok((secp_ctx.sign(&msghash, &self.node_secret), secp_ctx.sign(&msghash, &self.funding_key)))
759+
Ok((sign(secp_ctx, &msghash, &self.node_secret), sign(secp_ctx, &msghash, &self.funding_key)))
760760
}
761761

762762
fn ready_channel(&mut self, channel_parameters: &ChannelTransactionParameters) {
@@ -1102,7 +1102,7 @@ impl KeysManager {
11021102
if payment_script != output.script_pubkey { return Err(()); };
11031103

11041104
let sighash = hash_to_message!(&bip143::SigHashCache::new(&spend_tx).signature_hash(input_idx, &witness_script, output.value, SigHashType::All)[..]);
1105-
let sig = secp_ctx.sign(&sighash, &secret.private_key.key);
1105+
let sig = sign(secp_ctx, &sighash, &secret.private_key.key);
11061106
spend_tx.input[input_idx].witness.push(sig.serialize_der().to_vec());
11071107
spend_tx.input[input_idx].witness[0].push(SigHashType::All as u8);
11081108
spend_tx.input[input_idx].witness.push(pubkey.key.serialize().to_vec());

lightning/src/ln/chan_utils.rs

+5-4
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ use util::transaction_utils::sort_outputs;
3939
use ln::channel::{INITIAL_COMMITMENT_NUMBER, ANCHOR_OUTPUT_VALUE_SATOSHI};
4040
use core::ops::Deref;
4141
use chain;
42+
use util::crypto::sign;
4243

4344
pub(crate) const MAX_HTLCS: u16 = 483;
4445

@@ -841,7 +842,7 @@ impl HolderCommitmentTransaction {
841842
pub fn dummy() -> Self {
842843
let secp_ctx = Secp256k1::new();
843844
let dummy_key = PublicKey::from_secret_key(&secp_ctx, &SecretKey::from_slice(&[42; 32]).unwrap());
844-
let dummy_sig = secp_ctx.sign(&secp256k1::Message::from_slice(&[42; 32]).unwrap(), &SecretKey::from_slice(&[42; 32]).unwrap());
845+
let dummy_sig = sign(&secp_ctx, &secp256k1::Message::from_slice(&[42; 32]).unwrap(), &SecretKey::from_slice(&[42; 32]).unwrap());
845846

846847
let keys = TxCreationKeys {
847848
per_commitment_point: dummy_key.clone(),
@@ -936,7 +937,7 @@ impl BuiltCommitmentTransaction {
936937
/// because we are about to broadcast a holder transaction.
937938
pub fn sign<T: secp256k1::Signing>(&self, funding_key: &SecretKey, funding_redeemscript: &Script, channel_value_satoshis: u64, secp_ctx: &Secp256k1<T>) -> Signature {
938939
let sighash = self.get_sighash_all(funding_redeemscript, channel_value_satoshis);
939-
secp_ctx.sign(&sighash, funding_key)
940+
sign(secp_ctx, &sighash, funding_key)
940941
}
941942
}
942943

@@ -1060,7 +1061,7 @@ impl<'a> TrustedClosingTransaction<'a> {
10601061
/// because we are about to broadcast a holder transaction.
10611062
pub fn sign<T: secp256k1::Signing>(&self, funding_key: &SecretKey, funding_redeemscript: &Script, channel_value_satoshis: u64, secp_ctx: &Secp256k1<T>) -> Signature {
10621063
let sighash = self.get_sighash_all(funding_redeemscript, channel_value_satoshis);
1063-
secp_ctx.sign(&sighash, funding_key)
1064+
sign(secp_ctx, &sighash, funding_key)
10641065
}
10651066
}
10661067

@@ -1415,7 +1416,7 @@ impl<'a> TrustedCommitmentTransaction<'a> {
14151416
let htlc_redeemscript = get_htlc_redeemscript_with_explicit_keys(&this_htlc, self.opt_anchors(), &keys.broadcaster_htlc_key, &keys.countersignatory_htlc_key, &keys.revocation_key);
14161417

14171418
let sighash = hash_to_message!(&bip143::SigHashCache::new(&htlc_tx).signature_hash(0, &htlc_redeemscript, this_htlc.amount_msat / 1000, SigHashType::All)[..]);
1418-
ret.push(secp_ctx.sign(&sighash, &holder_htlc_key));
1419+
ret.push(sign(secp_ctx, &sighash, &holder_htlc_key));
14191420
}
14201421
Ok(ret)
14211422
}

lightning/src/ln/channel.rs

+1
Original file line numberDiff line numberDiff line change
@@ -6629,6 +6629,7 @@ mod tests {
66296629
}
66306630
}
66316631

6632+
#[cfg(not(feature = "grind_signatures"))]
66326633
#[test]
66336634
fn outbound_commitment_test() {
66346635
// Test vectors from BOLT 3 Appendices C and F (anchors):

lightning/src/ln/channelmanager.rs

+2-1
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ use core::ops::Deref;
6969

7070
#[cfg(any(test, feature = "std"))]
7171
use std::time::Instant;
72+
use util::crypto::sign;
7273

7374
mod inbound_payment {
7475
use alloc::string::ToString;
@@ -3060,7 +3061,7 @@ impl<Signer: Sign, M: Deref, T: Deref, K: Deref, F: Deref, L: Deref> ChannelMana
30603061
excess_data: Vec::new(),
30613062
};
30623063
let msghash = hash_to_message!(&Sha256dHash::hash(&announcement.encode()[..])[..]);
3063-
let node_announce_sig = self.secp_ctx.sign(&msghash, &self.our_network_key);
3064+
let node_announce_sig = sign(&self.secp_ctx, &msghash, &self.our_network_key);
30643065

30653066
let mut channel_state_lock = self.channel_state.lock().unwrap();
30663067
let channel_state = &mut *channel_state_lock;

lightning/src/util/crypto.rs

+10
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
use bitcoin::hashes::{Hash, HashEngine};
22
use bitcoin::hashes::hmac::{Hmac, HmacEngine};
33
use bitcoin::hashes::sha256::Hash as Sha256;
4+
use bitcoin::secp256k1::{Message, Secp256k1, SecretKey, Signature, Signing};
45

56
macro_rules! hkdf_extract_expand {
67
($salt: expr, $ikm: expr) => {{
@@ -36,3 +37,12 @@ pub fn hkdf_extract_expand_twice(salt: &[u8], ikm: &[u8]) -> ([u8; 32], [u8; 32]
3637
pub fn hkdf_extract_expand_thrice(salt: &[u8], ikm: &[u8]) -> ([u8; 32], [u8; 32], [u8; 32]) {
3738
hkdf_extract_expand!(salt, ikm, 3)
3839
}
40+
41+
#[inline]
42+
pub fn sign<C: Signing>(ctx: &Secp256k1<C>, msg: &Message, sk: &SecretKey) -> Signature {
43+
#[cfg(feature = "grind_signatures")]
44+
let sig = ctx.sign_low_r(msg, sk);
45+
#[cfg(not(feature = "grind_signatures"))]
46+
let sig = ctx.sign(msg, sk);
47+
sig
48+
}

0 commit comments

Comments
 (0)