examples: use EXIT_... constants for main return values
Fixes issue #1609.
This commit is contained in:
@@ -8,6 +8,7 @@
|
|||||||
*************************************************************************/
|
*************************************************************************/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
@@ -33,7 +34,7 @@ int main(void) {
|
|||||||
secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
||||||
if (!fill_random(randomize, sizeof(randomize))) {
|
if (!fill_random(randomize, sizeof(randomize))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* Randomizing the context is recommended to protect against side-channel
|
/* Randomizing the context is recommended to protect against side-channel
|
||||||
* leakage See `secp256k1_context_randomize` in secp256k1.h for more
|
* leakage See `secp256k1_context_randomize` in secp256k1.h for more
|
||||||
@@ -44,14 +45,14 @@ int main(void) {
|
|||||||
/*** Key Generation ***/
|
/*** Key Generation ***/
|
||||||
if (!fill_random(seckey1, sizeof(seckey1)) || !fill_random(seckey2, sizeof(seckey2))) {
|
if (!fill_random(seckey1, sizeof(seckey1)) || !fill_random(seckey2, sizeof(seckey2))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* If the secret key is zero or out of range (greater than secp256k1's
|
/* If the secret key is zero or out of range (greater than secp256k1's
|
||||||
* order), we fail. Note that the probability of this occurring is negligible
|
* order), we fail. Note that the probability of this occurring is negligible
|
||||||
* with a properly functioning random number generator. */
|
* with a properly functioning random number generator. */
|
||||||
if (!secp256k1_ec_seckey_verify(ctx, seckey1) || !secp256k1_ec_seckey_verify(ctx, seckey2)) {
|
if (!secp256k1_ec_seckey_verify(ctx, seckey1) || !secp256k1_ec_seckey_verify(ctx, seckey2)) {
|
||||||
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Public key creation using a valid context with a verified secret key should never fail */
|
/* Public key creation using a valid context with a verified secret key should never fail */
|
||||||
@@ -116,5 +117,5 @@ int main(void) {
|
|||||||
secure_erase(shared_secret1, sizeof(shared_secret1));
|
secure_erase(shared_secret1, sizeof(shared_secret1));
|
||||||
secure_erase(shared_secret2, sizeof(shared_secret2));
|
secure_erase(shared_secret2, sizeof(shared_secret2));
|
||||||
|
|
||||||
return 0;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,6 +8,7 @@
|
|||||||
*************************************************************************/
|
*************************************************************************/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
@@ -40,7 +41,7 @@ int main(void) {
|
|||||||
secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
||||||
if (!fill_random(randomize, sizeof(randomize))) {
|
if (!fill_random(randomize, sizeof(randomize))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* Randomizing the context is recommended to protect against side-channel
|
/* Randomizing the context is recommended to protect against side-channel
|
||||||
* leakage See `secp256k1_context_randomize` in secp256k1.h for more
|
* leakage See `secp256k1_context_randomize` in secp256k1.h for more
|
||||||
@@ -51,14 +52,14 @@ int main(void) {
|
|||||||
/*** Key Generation ***/
|
/*** Key Generation ***/
|
||||||
if (!fill_random(seckey, sizeof(seckey))) {
|
if (!fill_random(seckey, sizeof(seckey))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* If the secret key is zero or out of range (greater than secp256k1's
|
/* If the secret key is zero or out of range (greater than secp256k1's
|
||||||
* order), we fail. Note that the probability of this occurring is negligible
|
* order), we fail. Note that the probability of this occurring is negligible
|
||||||
* with a properly functioning random number generator. */
|
* with a properly functioning random number generator. */
|
||||||
if (!secp256k1_ec_seckey_verify(ctx, seckey)) {
|
if (!secp256k1_ec_seckey_verify(ctx, seckey)) {
|
||||||
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Public key creation using a valid context with a verified secret key should never fail */
|
/* Public key creation using a valid context with a verified secret key should never fail */
|
||||||
@@ -92,13 +93,13 @@ int main(void) {
|
|||||||
/* Deserialize the signature. This will return 0 if the signature can't be parsed correctly. */
|
/* Deserialize the signature. This will return 0 if the signature can't be parsed correctly. */
|
||||||
if (!secp256k1_ecdsa_signature_parse_compact(ctx, &sig, serialized_signature)) {
|
if (!secp256k1_ecdsa_signature_parse_compact(ctx, &sig, serialized_signature)) {
|
||||||
printf("Failed parsing the signature\n");
|
printf("Failed parsing the signature\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Deserialize the public key. This will return 0 if the public key can't be parsed correctly. */
|
/* Deserialize the public key. This will return 0 if the public key can't be parsed correctly. */
|
||||||
if (!secp256k1_ec_pubkey_parse(ctx, &pubkey, compressed_pubkey, sizeof(compressed_pubkey))) {
|
if (!secp256k1_ec_pubkey_parse(ctx, &pubkey, compressed_pubkey, sizeof(compressed_pubkey))) {
|
||||||
printf("Failed parsing the public key\n");
|
printf("Failed parsing the public key\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Verify a signature. This will return 1 if it's valid and 0 if it's not. */
|
/* Verify a signature. This will return 1 if it's valid and 0 if it's not. */
|
||||||
@@ -133,5 +134,5 @@ int main(void) {
|
|||||||
* will remove any writes that aren't used. */
|
* will remove any writes that aren't used. */
|
||||||
secure_erase(seckey, sizeof(seckey));
|
secure_erase(seckey, sizeof(seckey));
|
||||||
|
|
||||||
return 0;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,6 +13,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
@@ -38,7 +39,7 @@ int main(void) {
|
|||||||
ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
||||||
if (!fill_random(randomize, sizeof(randomize))) {
|
if (!fill_random(randomize, sizeof(randomize))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* Randomizing the context is recommended to protect against side-channel
|
/* Randomizing the context is recommended to protect against side-channel
|
||||||
* leakage. See `secp256k1_context_randomize` in secp256k1.h for more
|
* leakage. See `secp256k1_context_randomize` in secp256k1.h for more
|
||||||
@@ -49,14 +50,14 @@ int main(void) {
|
|||||||
/*** Generate secret keys ***/
|
/*** Generate secret keys ***/
|
||||||
if (!fill_random(seckey1, sizeof(seckey1)) || !fill_random(seckey2, sizeof(seckey2))) {
|
if (!fill_random(seckey1, sizeof(seckey1)) || !fill_random(seckey2, sizeof(seckey2))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* If the secret key is zero or out of range (greater than secp256k1's
|
/* If the secret key is zero or out of range (greater than secp256k1's
|
||||||
* order), we fail. Note that the probability of this occurring is negligible
|
* order), we fail. Note that the probability of this occurring is negligible
|
||||||
* with a properly functioning random number generator. */
|
* with a properly functioning random number generator. */
|
||||||
if (!secp256k1_ec_seckey_verify(ctx, seckey1) || !secp256k1_ec_seckey_verify(ctx, seckey2)) {
|
if (!secp256k1_ec_seckey_verify(ctx, seckey1) || !secp256k1_ec_seckey_verify(ctx, seckey2)) {
|
||||||
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Generate ElligatorSwift public keys. This should never fail with valid context and
|
/* Generate ElligatorSwift public keys. This should never fail with valid context and
|
||||||
@@ -64,7 +65,7 @@ int main(void) {
|
|||||||
optional, but recommended. */
|
optional, but recommended. */
|
||||||
if (!fill_random(auxrand1, sizeof(auxrand1)) || !fill_random(auxrand2, sizeof(auxrand2))) {
|
if (!fill_random(auxrand1, sizeof(auxrand1)) || !fill_random(auxrand2, sizeof(auxrand2))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
return_val = secp256k1_ellswift_create(ctx, ellswift_pubkey1, seckey1, auxrand1);
|
return_val = secp256k1_ellswift_create(ctx, ellswift_pubkey1, seckey1, auxrand1);
|
||||||
assert(return_val);
|
assert(return_val);
|
||||||
@@ -117,5 +118,5 @@ int main(void) {
|
|||||||
secure_erase(shared_secret1, sizeof(shared_secret1));
|
secure_erase(shared_secret1, sizeof(shared_secret1));
|
||||||
secure_erase(shared_secret2, sizeof(shared_secret2));
|
secure_erase(shared_secret2, sizeof(shared_secret2));
|
||||||
|
|
||||||
return 0;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -12,6 +12,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
@@ -193,7 +194,7 @@ int main(void) {
|
|||||||
for (i = 0; i < N_SIGNERS; i++) {
|
for (i = 0; i < N_SIGNERS; i++) {
|
||||||
if (!create_keypair(ctx, &signer_secrets[i], &signers[i])) {
|
if (!create_keypair(ctx, &signer_secrets[i], &signers[i])) {
|
||||||
printf("FAILED\n");
|
printf("FAILED\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
pubkeys_ptr[i] = &signers[i].pubkey;
|
pubkeys_ptr[i] = &signers[i].pubkey;
|
||||||
}
|
}
|
||||||
@@ -208,7 +209,7 @@ int main(void) {
|
|||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
if (!secp256k1_ec_pubkey_sort(ctx, pubkeys_ptr, N_SIGNERS)) {
|
if (!secp256k1_ec_pubkey_sort(ctx, pubkeys_ptr, N_SIGNERS)) {
|
||||||
printf("FAILED\n");
|
printf("FAILED\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
printf("ok\n");
|
printf("ok\n");
|
||||||
|
|
||||||
@@ -219,7 +220,7 @@ int main(void) {
|
|||||||
* while providing a non-NULL agg_pk argument. */
|
* while providing a non-NULL agg_pk argument. */
|
||||||
if (!secp256k1_musig_pubkey_agg(ctx, NULL, &cache, pubkeys_ptr, N_SIGNERS)) {
|
if (!secp256k1_musig_pubkey_agg(ctx, NULL, &cache, pubkeys_ptr, N_SIGNERS)) {
|
||||||
printf("FAILED\n");
|
printf("FAILED\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
printf("ok\n");
|
printf("ok\n");
|
||||||
printf("Tweaking................");
|
printf("Tweaking................");
|
||||||
@@ -227,21 +228,21 @@ int main(void) {
|
|||||||
/* Optionally tweak the aggregate key */
|
/* Optionally tweak the aggregate key */
|
||||||
if (!tweak(ctx, &agg_pk, &cache)) {
|
if (!tweak(ctx, &agg_pk, &cache)) {
|
||||||
printf("FAILED\n");
|
printf("FAILED\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
printf("ok\n");
|
printf("ok\n");
|
||||||
printf("Signing message.........");
|
printf("Signing message.........");
|
||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
if (!sign(ctx, signer_secrets, signers, &cache, msg, sig)) {
|
if (!sign(ctx, signer_secrets, signers, &cache, msg, sig)) {
|
||||||
printf("FAILED\n");
|
printf("FAILED\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
printf("ok\n");
|
printf("ok\n");
|
||||||
printf("Verifying signature.....");
|
printf("Verifying signature.....");
|
||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
if (!secp256k1_schnorrsig_verify(ctx, sig, msg, 32, &agg_pk)) {
|
if (!secp256k1_schnorrsig_verify(ctx, sig, msg, 32, &agg_pk)) {
|
||||||
printf("FAILED\n");
|
printf("FAILED\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
printf("ok\n");
|
printf("ok\n");
|
||||||
|
|
||||||
@@ -256,5 +257,5 @@ int main(void) {
|
|||||||
secure_erase(&signer_secrets[i], sizeof(signer_secrets[i]));
|
secure_erase(&signer_secrets[i], sizeof(signer_secrets[i]));
|
||||||
}
|
}
|
||||||
secp256k1_context_destroy(ctx);
|
secp256k1_context_destroy(ctx);
|
||||||
return 0;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,6 +8,7 @@
|
|||||||
*************************************************************************/
|
*************************************************************************/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
@@ -34,7 +35,7 @@ int main(void) {
|
|||||||
secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);
|
||||||
if (!fill_random(randomize, sizeof(randomize))) {
|
if (!fill_random(randomize, sizeof(randomize))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* Randomizing the context is recommended to protect against side-channel
|
/* Randomizing the context is recommended to protect against side-channel
|
||||||
* leakage See `secp256k1_context_randomize` in secp256k1.h for more
|
* leakage See `secp256k1_context_randomize` in secp256k1.h for more
|
||||||
@@ -45,7 +46,7 @@ int main(void) {
|
|||||||
/*** Key Generation ***/
|
/*** Key Generation ***/
|
||||||
if (!fill_random(seckey, sizeof(seckey))) {
|
if (!fill_random(seckey, sizeof(seckey))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
/* Try to create a keypair with a valid context. This only fails if the
|
/* Try to create a keypair with a valid context. This only fails if the
|
||||||
* secret key is zero or out of range (greater than secp256k1's order). Note
|
* secret key is zero or out of range (greater than secp256k1's order). Note
|
||||||
@@ -53,7 +54,7 @@ int main(void) {
|
|||||||
* functioning random number generator. */
|
* functioning random number generator. */
|
||||||
if (!secp256k1_keypair_create(ctx, &keypair, seckey)) {
|
if (!secp256k1_keypair_create(ctx, &keypair, seckey)) {
|
||||||
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Extract the X-only public key from the keypair. We pass NULL for
|
/* Extract the X-only public key from the keypair. We pass NULL for
|
||||||
@@ -90,7 +91,7 @@ int main(void) {
|
|||||||
/* Generate 32 bytes of randomness to use with BIP-340 schnorr signing. */
|
/* Generate 32 bytes of randomness to use with BIP-340 schnorr signing. */
|
||||||
if (!fill_random(auxiliary_rand, sizeof(auxiliary_rand))) {
|
if (!fill_random(auxiliary_rand, sizeof(auxiliary_rand))) {
|
||||||
printf("Failed to generate randomness\n");
|
printf("Failed to generate randomness\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Generate a Schnorr signature.
|
/* Generate a Schnorr signature.
|
||||||
@@ -110,7 +111,7 @@ int main(void) {
|
|||||||
* be parsed correctly */
|
* be parsed correctly */
|
||||||
if (!secp256k1_xonly_pubkey_parse(ctx, &pubkey, serialized_pubkey)) {
|
if (!secp256k1_xonly_pubkey_parse(ctx, &pubkey, serialized_pubkey)) {
|
||||||
printf("Failed parsing the public key\n");
|
printf("Failed parsing the public key\n");
|
||||||
return 1;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Compute the tagged hash on the received messages using the same tag as the signer. */
|
/* Compute the tagged hash on the received messages using the same tag as the signer. */
|
||||||
@@ -149,5 +150,5 @@ int main(void) {
|
|||||||
* Here we are preventing these writes from being optimized out, as any good compiler
|
* Here we are preventing these writes from being optimized out, as any good compiler
|
||||||
* will remove any writes that aren't used. */
|
* will remove any writes that aren't used. */
|
||||||
secure_erase(seckey, sizeof(seckey));
|
secure_erase(seckey, sizeof(seckey));
|
||||||
return 0;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user