|
47 | 47 | #include "../include/secp256k1_musig.h"
|
48 | 48 | #endif
|
49 | 49 |
|
| 50 | +#ifdef ENABLE_MODULE_FROST |
| 51 | +#include "include/secp256k1_frost.h" |
| 52 | +#endif |
| 53 | + |
50 | 54 | static void run_tests(secp256k1_context *ctx, unsigned char *key);
|
51 | 55 |
|
52 | 56 | int main(void) {
|
@@ -349,4 +353,79 @@ static void run_tests(secp256k1_context *ctx, unsigned char *key) {
|
349 | 353 | CHECK(ret == 1);
|
350 | 354 | }
|
351 | 355 | #endif
|
| 356 | + |
| 357 | +#ifdef ENABLE_MODULE_FROST |
| 358 | + { |
| 359 | + secp256k1_xonly_pubkey pk; |
| 360 | + unsigned char session_id[32]; |
| 361 | + secp256k1_frost_secnonce secnonce[2]; |
| 362 | + secp256k1_frost_pubnonce pubnonce[2]; |
| 363 | + const secp256k1_frost_pubnonce *pubnonce_ptr[2]; |
| 364 | + secp256k1_frost_tweak_cache cache; |
| 365 | + secp256k1_frost_session session; |
| 366 | + secp256k1_frost_partial_sig partial_sig; |
| 367 | + const secp256k1_frost_partial_sig *partial_sig_ptr[1]; |
| 368 | + unsigned char extra_input[32]; |
| 369 | + unsigned char sec_adaptor[32]; |
| 370 | + secp256k1_pubkey adaptor; |
| 371 | + unsigned char pre_sig[64]; |
| 372 | + int nonce_parity; |
| 373 | + secp256k1_frost_share shares[2]; |
| 374 | + secp256k1_pubkey pubshares[2]; |
| 375 | + size_t ids[2]; |
| 376 | + |
| 377 | + pubnonce_ptr[0] = &pubnonce[0]; |
| 378 | + pubnonce_ptr[1] = &pubnonce[1]; |
| 379 | + SECP256K1_CHECKMEM_DEFINE(key, 32); |
| 380 | + memcpy(extra_input, key, sizeof(extra_input)); |
| 381 | + extra_input[0] = extra_input[0] + 1; |
| 382 | + memcpy(sec_adaptor, key, sizeof(sec_adaptor)); |
| 383 | + sec_adaptor[0] = extra_input[0] + 2; |
| 384 | + memcpy(session_id, key, sizeof(session_id)); |
| 385 | + session_id[0] = session_id[0] + 3; |
| 386 | + partial_sig_ptr[0] = &partial_sig; |
| 387 | + ids[0] = 1; |
| 388 | + ids[1] = 2; |
| 389 | + |
| 390 | + /* shares_gen */ |
| 391 | + SECP256K1_CHECKMEM_UNDEFINE(key, 32); |
| 392 | + ret = secp256k1_frost_shares_trusted_gen(ctx, shares, pubshares, &pk, key, 2, 2); |
| 393 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 394 | + CHECK(ret == 1); |
| 395 | + SECP256K1_CHECKMEM_UNDEFINE(&shares[0], sizeof(shares[0])); |
| 396 | + SECP256K1_CHECKMEM_UNDEFINE(&shares[1], sizeof(shares[1])); |
| 397 | + /* nonce_gen */ |
| 398 | + SECP256K1_CHECKMEM_UNDEFINE(session_id, sizeof(session_id)); |
| 399 | + CHECK(secp256k1_ec_pubkey_create(ctx, &adaptor, sec_adaptor)); |
| 400 | + SECP256K1_CHECKMEM_UNDEFINE(extra_input, sizeof(extra_input)); |
| 401 | + SECP256K1_CHECKMEM_UNDEFINE(sec_adaptor, sizeof(sec_adaptor)); |
| 402 | + CHECK(secp256k1_frost_pubkey_tweak(ctx, &cache, &pk) == 1); |
| 403 | + ret = secp256k1_frost_nonce_gen(ctx, &secnonce[0], &pubnonce[0], session_id, &shares[0], msg, &pk, extra_input); |
| 404 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 405 | + CHECK(ret == 1); |
| 406 | + ret = secp256k1_frost_nonce_gen(ctx, &secnonce[1], &pubnonce[1], session_id, &shares[1], msg, &pk, extra_input); |
| 407 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 408 | + CHECK(ret == 1); |
| 409 | + /* partial_sign */ |
| 410 | + CHECK(secp256k1_frost_nonce_process(ctx, &session, pubnonce_ptr, 2, msg, &pk, 1, ids, &cache, &adaptor) == 1); |
| 411 | + ret = secp256k1_keypair_create(ctx, &keypair, key); |
| 412 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 413 | + CHECK(ret == 1); |
| 414 | + ret = secp256k1_frost_partial_sign(ctx, &partial_sig, &secnonce[0], &shares[0], &session, &cache); |
| 415 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 416 | + CHECK(ret == 1); |
| 417 | + /* adapt */ |
| 418 | + SECP256K1_CHECKMEM_DEFINE(&partial_sig, sizeof(partial_sig)); |
| 419 | + CHECK(secp256k1_frost_partial_sig_agg(ctx, pre_sig, &session, partial_sig_ptr, 1)); |
| 420 | + SECP256K1_CHECKMEM_DEFINE(pre_sig, sizeof(pre_sig)); |
| 421 | + CHECK(secp256k1_frost_nonce_parity(ctx, &nonce_parity, &session)); |
| 422 | + ret = secp256k1_frost_adapt(ctx, sig, pre_sig, sec_adaptor, nonce_parity); |
| 423 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 424 | + CHECK(ret == 1); |
| 425 | + /* extract_adaptor */ |
| 426 | + ret = secp256k1_frost_extract_adaptor(ctx, sec_adaptor, sig, pre_sig, nonce_parity); |
| 427 | + SECP256K1_CHECKMEM_DEFINE(&ret, sizeof(ret)); |
| 428 | + CHECK(ret == 1); |
| 429 | + } |
| 430 | +#endif |
352 | 431 | }
|
0 commit comments