@@ -154,7 +154,7 @@ impl ElligatorSwift {
154
154
/// ```
155
155
/// # #[cfg(feature = "alloc")] {
156
156
/// use secp256k1::{
157
- /// ellswift::{ElligatorSwift, ElligatorSwiftParty },
157
+ /// ellswift::{ElligatorSwift, Party },
158
158
/// PublicKey, SecretKey, XOnlyPublicKey, Secp256k1,
159
159
/// };
160
160
/// use core::str::FromStr;
@@ -167,8 +167,8 @@ impl ElligatorSwift {
167
167
/// let alice_es = ElligatorSwift::from_seckey(&secp, alice_sk, None);
168
168
/// let bob_es = ElligatorSwift::from_seckey(&secp, bob_sk, None);
169
169
///
170
- /// let alice_shared_secret = ElligatorSwift::shared_secret(alice_es, bob_es, alice_sk, ElligatorSwiftParty::A , None);
171
- /// let bob_shared_secret = ElligatorSwift::shared_secret(alice_es, bob_es, bob_sk, ElligatorSwiftParty::B , None);
170
+ /// let alice_shared_secret = ElligatorSwift::shared_secret(alice_es, bob_es, alice_sk, Party::Initiator , None);
171
+ /// let bob_shared_secret = ElligatorSwift::shared_secret(alice_es, bob_es, bob_sk, Party::Responder , None);
172
172
///
173
173
/// assert_eq!(alice_shared_secret, bob_shared_secret);
174
174
/// # }
@@ -177,18 +177,19 @@ impl ElligatorSwift {
177
177
ellswift_a : ElligatorSwift ,
178
178
ellswift_b : ElligatorSwift ,
179
179
secret_key : SecretKey ,
180
- party : ElligatorSwiftParty ,
180
+ party : impl Into < Party > ,
181
181
data : Option < & [ u8 ] > ,
182
182
) -> ElligatorSwiftSharedSecret {
183
183
let mut shared_secret = [ 0u8 ; 32 ] ;
184
+ let p: Party = party. into ( ) ;
184
185
unsafe {
185
186
let ret = ffi:: secp256k1_ellswift_xdh (
186
187
ffi:: secp256k1_context_no_precomp,
187
188
shared_secret. as_mut_c_ptr ( ) ,
188
189
ellswift_a. as_c_ptr ( ) ,
189
190
ellswift_b. as_c_ptr ( ) ,
190
191
secret_key. as_c_ptr ( ) ,
191
- party . to_ffi_int ( ) ,
192
+ p . to_ffi_int ( ) ,
192
193
ffi:: secp256k1_ellswift_xdh_hash_function_bip324,
193
194
data. as_c_ptr ( ) as * mut c_void ,
194
195
) ;
@@ -206,22 +207,23 @@ impl ElligatorSwift {
206
207
ellswift_a : ElligatorSwift ,
207
208
ellswift_b : ElligatorSwift ,
208
209
secret_key : SecretKey ,
209
- party : ElligatorSwiftParty ,
210
+ party : impl Into < Party > ,
210
211
mut hash_function : F ,
211
212
) -> ElligatorSwiftSharedSecret
212
213
where
213
214
F : FnMut ( [ u8 ; 32 ] , [ u8 ; 64 ] , [ u8 ; 64 ] ) -> ElligatorSwiftSharedSecret ,
214
215
{
215
216
let mut shared_secret = [ 0u8 ; 32 ] ;
216
217
let hashfp = hash_callback :: < F > ;
218
+ let p: Party = party. into ( ) ;
217
219
unsafe {
218
220
let ret = ffi:: secp256k1_ellswift_xdh (
219
221
ffi:: secp256k1_context_no_precomp,
220
222
shared_secret. as_mut_c_ptr ( ) ,
221
223
ellswift_a. 0 . as_c_ptr ( ) ,
222
224
ellswift_b. 0 . as_c_ptr ( ) ,
223
225
secret_key. as_c_ptr ( ) ,
224
- party . to_ffi_int ( ) ,
226
+ p . to_ffi_int ( ) ,
225
227
Some ( hashfp) ,
226
228
& mut hash_function as * mut F as * mut c_void ,
227
229
) ;
@@ -291,22 +293,14 @@ impl ElligatorSwiftSharedSecret {
291
293
/// This distinction is important because the different parties compute different
292
294
/// hashes of the shared secret.
293
295
#[ derive( Copy , Clone , Debug , PartialEq , Eq , PartialOrd , Ord , Hash ) ]
296
+ #[ deprecated( since = "0.30.0" , note = "Use `Party` instead." ) ]
294
297
pub enum ElligatorSwiftParty {
295
298
/// We are the initiator of the ECDH
296
299
A ,
297
300
/// We are the responder of the ECDH
298
301
B ,
299
302
}
300
303
301
- impl ElligatorSwiftParty {
302
- fn to_ffi_int ( self ) -> c_int {
303
- match self {
304
- ElligatorSwiftParty :: A => 0 ,
305
- ElligatorSwiftParty :: B => 1 ,
306
- }
307
- }
308
- }
309
-
310
304
/// Represents the two parties in ECDH
311
305
#[ derive( Copy , Clone , Debug , PartialEq , Eq , PartialOrd , Ord , Hash ) ]
312
306
pub enum Party {
@@ -316,6 +310,7 @@ pub enum Party {
316
310
Responder ,
317
311
}
318
312
313
+ #[ allow( deprecated) ]
319
314
impl From < ElligatorSwiftParty > for Party {
320
315
fn from ( value : ElligatorSwiftParty ) -> Self {
321
316
match value {
@@ -372,7 +367,7 @@ mod tests {
372
367
373
368
use crate :: ellswift:: ElligatorSwift ;
374
369
#[ cfg( all( not( secp256k1_fuzz) , feature = "alloc" ) ) ]
375
- use crate :: ellswift:: { ElligatorSwiftParty , ElligatorSwiftSharedSecret } ;
370
+ use crate :: ellswift:: { ElligatorSwiftSharedSecret , Party } ;
376
371
#[ cfg( all( not( secp256k1_fuzz) , feature = "alloc" ) ) ]
377
372
use crate :: SecretKey ;
378
373
use crate :: { from_hex, PublicKey , XOnlyPublicKey } ;
@@ -418,7 +413,7 @@ mod tests {
418
413
ell,
419
414
ell,
420
415
SecretKey :: from_slice ( & priv32) . unwrap ( ) ,
421
- ElligatorSwiftParty :: A ,
416
+ Party :: Initiator ,
422
417
|_, _, _| ElligatorSwiftSharedSecret ( [ 0xff ; 32 ] ) ,
423
418
) ;
424
419
assert_eq ! ( pk, ElligatorSwiftSharedSecret ( [ 0xff ; 32 ] ) ) ;
@@ -632,8 +627,7 @@ mod tests {
632
627
)
633
628
} ;
634
629
let sec_key = SecretKey :: from_slice ( & my_secret) . unwrap ( ) ;
635
- let initiator =
636
- if initiator == 0 { ElligatorSwiftParty :: B } else { ElligatorSwiftParty :: A } ;
630
+ let initiator = if initiator == 0 { Party :: Responder } else { Party :: Initiator } ;
637
631
638
632
let shared = ElligatorSwift :: shared_secret ( el_a, el_b, sec_key, initiator, None ) ;
639
633
0 commit comments