|
| 1 | +/*********************************************************************** |
| 2 | + * Distributed under the MIT software license, see the accompanying * |
| 3 | + * file COPYING or https://www.opensource.org/licenses/mit-license.php.* |
| 4 | + ***********************************************************************/ |
| 5 | + |
| 6 | +#ifndef SECP256K1_MODULE_MUSIG_TESTS_EXHAUSTIVE_H |
| 7 | +#define SECP256K1_MODULE_MUSIG_TESTS_EXHAUSTIVE_H |
| 8 | + |
| 9 | +#include "../../../include/secp256k1_extrakeys.h" |
| 10 | +#include "../../../include/secp256k1_musig.h" |
| 11 | +#include "../../../include/secp256k1_schnorrsig.h" |
| 12 | +#include "main_impl.h" |
| 13 | + |
| 14 | +static void test_exhaustive_musig(const secp256k1_context *ctx) { |
| 15 | + int s1, s2; |
| 16 | + int skipped_iterations = 0; |
| 17 | + uint64_t nonce_counter = 0; |
| 18 | + /* TODO: improve this, maybe loop over all challenges like in the schnorr exhaustive test? */ |
| 19 | + unsigned char message_to_sign[32] = "this_could_be_the_hash_of_a_msg"; |
| 20 | + |
| 21 | + /* Exercise 2-of-2 musig, looping over all possible signing keys for both participants. Note that this |
| 22 | + test is not fully exhaustive, as other involved cryptographic elements (nonces, challenges etc.) |
| 23 | + are currently not exhausted, but either derived from a counter or constant. */ |
| 24 | + for (s1 = 1; s1 < EXHAUSTIVE_TEST_ORDER; s1++) { |
| 25 | + for (s2 = 1; s2 < EXHAUSTIVE_TEST_ORDER; s2++) { |
| 26 | + /* TODO: move first participant's key generation to outer loop */ |
| 27 | + secp256k1_scalar sc1, sc2; |
| 28 | + unsigned char seckey1[32], seckey2[32]; |
| 29 | + secp256k1_keypair keypair1, keypair2; |
| 30 | + secp256k1_pubkey pubkey1, pubkey2; |
| 31 | + const secp256k1_pubkey *pubkeys_ptr[2]; |
| 32 | + secp256k1_xonly_pubkey agg_pk; |
| 33 | + secp256k1_musig_keyagg_cache cache; |
| 34 | + secp256k1_musig_secnonce secnonce1, secnonce2; |
| 35 | + secp256k1_musig_pubnonce pubnonce1, pubnonce2; |
| 36 | + const secp256k1_musig_pubnonce *pubnonces[2]; |
| 37 | + secp256k1_musig_aggnonce agg_pubnonce; |
| 38 | + secp256k1_musig_session session; |
| 39 | + secp256k1_musig_partial_sig partialsig1, partialsig2; |
| 40 | + const secp256k1_musig_partial_sig *partial_sigs_ptr[2]; |
| 41 | + unsigned char agg_sig[64]; |
| 42 | + int ret; |
| 43 | + |
| 44 | + /* Construct key pairs from exhaustive loop scalars s1, s2 */ |
| 45 | + secp256k1_scalar_set_int(&sc1, s1); |
| 46 | + secp256k1_scalar_set_int(&sc2, s2); |
| 47 | + secp256k1_scalar_get_b32(seckey1, &sc1); |
| 48 | + secp256k1_scalar_get_b32(seckey2, &sc2); |
| 49 | + CHECK(secp256k1_keypair_create(ctx, &keypair1, seckey1)); |
| 50 | + CHECK(secp256k1_keypair_create(ctx, &keypair2, seckey2)); |
| 51 | + CHECK(secp256k1_keypair_pub(ctx, &pubkey1, &keypair1)); |
| 52 | + CHECK(secp256k1_keypair_pub(ctx, &pubkey2, &keypair2)); |
| 53 | + pubkeys_ptr[0] = &pubkey1; |
| 54 | + pubkeys_ptr[1] = &pubkey2; |
| 55 | + |
| 56 | + /* Aggregate public keys */ |
| 57 | + if (!secp256k1_musig_pubkey_agg(ctx, &agg_pk, &cache, pubkeys_ptr, 2)) { |
| 58 | + /* can fail if aggregated pubkey is point at infinity */ |
| 59 | + skipped_iterations++; |
| 60 | + continue; |
| 61 | + } |
| 62 | + |
| 63 | + /* Generate nonces (using the counter variant to keep it simple) and aggregate them */ |
| 64 | + ret = 0; |
| 65 | + while (!ret) { |
| 66 | + /* can fail if one of the generated nonce scalars is zero, so try again in that case */ |
| 67 | + ret = secp256k1_musig_nonce_gen_counter(ctx, &secnonce1, &pubnonce1, |
| 68 | + nonce_counter++, &keypair1, NULL, NULL, NULL); |
| 69 | + } |
| 70 | + ret = 0; |
| 71 | + while (!ret) { |
| 72 | + ret = secp256k1_musig_nonce_gen_counter(ctx, &secnonce2, &pubnonce2, |
| 73 | + nonce_counter++, &keypair2, NULL, NULL, NULL); |
| 74 | + } |
| 75 | + pubnonces[0] = &pubnonce1; |
| 76 | + pubnonces[1] = &pubnonce2; |
| 77 | + CHECK(secp256k1_musig_nonce_agg(ctx, &agg_pubnonce, pubnonces, 2)); |
| 78 | + |
| 79 | + /* Start signing session */ |
| 80 | + CHECK(secp256k1_musig_nonce_process(ctx, &session, &agg_pubnonce, message_to_sign, &cache)); |
| 81 | + |
| 82 | + /* If the final nonce is the generator point, this means that possibly a reduction from an |
| 83 | + invalid final nonce (i.e. point of infinity) has happened and the aggregated signature |
| 84 | + verification would fail (see BIP327, section "Dealing with Infinity in Nonce Aggregation", |
| 85 | + and the `GetSessionValues` algorithm, at the condition `If is_infinite(R'):`), so skip |
| 86 | + the signing/verification part in this case. |
| 87 | + TODO: detect this directly in _musig_nonce_process and return 0 accordingly, in order to |
| 88 | + avoid false positives (i.e. final nonce is the generator point without reduction), |
| 89 | + leading to skips even if the aggregated signature verification would succeed |
| 90 | + */ |
| 91 | + { |
| 92 | + secp256k1_musig_session_internal session_i; |
| 93 | + unsigned char ge_x[32]; |
| 94 | + CHECK(secp256k1_musig_session_load(ctx, &session_i, &session)); |
| 95 | + secp256k1_fe_get_b32(ge_x, &secp256k1_ge_const_g.x); |
| 96 | + if (secp256k1_memcmp_var(session_i.fin_nonce, ge_x, 32) == 0) { |
| 97 | + skipped_iterations++; |
| 98 | + continue; |
| 99 | + } |
| 100 | + } |
| 101 | + |
| 102 | + /* Create partial signatures and verify them */ |
| 103 | + CHECK(secp256k1_musig_partial_sign(ctx, &partialsig1, &secnonce1, &keypair1, &cache, &session)); |
| 104 | + CHECK(secp256k1_musig_partial_sign(ctx, &partialsig2, &secnonce2, &keypair2, &cache, &session)); |
| 105 | + CHECK(secp256k1_musig_partial_sig_verify(ctx, &partialsig1, &pubnonce1, &pubkey1, &cache, &session)); |
| 106 | + CHECK(secp256k1_musig_partial_sig_verify(ctx, &partialsig2, &pubnonce2, &pubkey2, &cache, &session)); |
| 107 | + |
| 108 | + /* Aggregate signature and verify it */ |
| 109 | + partial_sigs_ptr[0] = &partialsig1; |
| 110 | + partial_sigs_ptr[1] = &partialsig2; |
| 111 | + CHECK(secp256k1_musig_partial_sig_agg(ctx, agg_sig, &session, partial_sigs_ptr, 2)); |
| 112 | + CHECK(secp256k1_schnorrsig_verify(ctx, agg_sig, message_to_sign, 32, &agg_pk)); |
| 113 | + } |
| 114 | + } |
| 115 | + printf("musig exhaustive test, skipped iterations: %d/%d\n", |
| 116 | + skipped_iterations, (EXHAUSTIVE_TEST_ORDER-1)*(EXHAUSTIVE_TEST_ORDER-1)); |
| 117 | +} |
| 118 | + |
| 119 | +#endif |
0 commit comments