Files
next.orly.dev/pkg/crypto/p256k/secp256k1.go
mleku 110223fc4e Migrate internal module imports to unified package path.
Replaced legacy `*.orly` module imports with `next.orly.dev/pkg` paths across the codebase for consistency. Removed legacy `go.mod` files from sub-packages, consolidating dependency management. Added Dockerfiles and configurations for benchmarking environments.
2025-09-12 16:12:31 +01:00

427 lines
11 KiB
Go

//go:build cgo
package p256k
import (
"crypto/rand"
"unsafe"
"lol.mleku.dev/chk"
"lol.mleku.dev/errorf"
"lol.mleku.dev/log"
"next.orly.dev/pkg/crypto/ec/schnorr"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/crypto/sha256"
)
/*
#cgo LDFLAGS: -lsecp256k1
#include <secp256k1.h>
#include <secp256k1_schnorrsig.h>
#include <secp256k1_extrakeys.h>
*/
import "C"
type (
Context = C.secp256k1_context
Uchar = C.uchar
Cint = C.int
SecKey = C.secp256k1_keypair
PubKey = C.secp256k1_xonly_pubkey
ECPubKey = C.secp256k1_pubkey
)
var (
ctx *Context
)
func CreateContext() *Context {
return C.secp256k1_context_create(
C.SECP256K1_CONTEXT_SIGN |
C.SECP256K1_CONTEXT_VERIFY,
)
}
func GetRandom() (u *Uchar) {
rnd := make([]byte, 32)
_, _ = rand.Read(rnd)
return ToUchar(rnd)
}
func AssertLen(b []byte, length int, name string) (err error) {
if len(b) != length {
err = errorf.E("%s should be %d bytes, got %d", name, length, len(b))
}
return
}
func RandomizeContext(ctx *C.secp256k1_context) {
C.secp256k1_context_randomize(ctx, GetRandom())
return
}
func CreateRandomContext() (c *Context) {
c = CreateContext()
RandomizeContext(c)
return
}
func init() {
if ctx = CreateContext(); ctx == nil {
panic("failed to create secp256k1 context")
}
}
func ToUchar(b []byte) (u *Uchar) { return (*Uchar)(unsafe.Pointer(&b[0])) }
type Sec struct {
Key SecKey
}
func GenSec() (sec *Sec, err error) {
if _, _, sec, _, err = Generate(); chk.E(err) {
return
}
return
}
func SecFromBytes(sk []byte) (sec *Sec, err error) {
sec = new(Sec)
if C.secp256k1_keypair_create(ctx, &sec.Key, ToUchar(sk)) != 1 {
err = errorf.E("failed to parse private key")
return
}
return
}
func (s *Sec) Sec() *SecKey { return &s.Key }
func (s *Sec) Pub() (p *Pub, err error) {
p = new(Pub)
if C.secp256k1_keypair_xonly_pub(ctx, &p.Key, nil, s.Sec()) != 1 {
err = errorf.E("pubkey derivation failed")
return
}
return
}
// type PublicKey struct {
// Key *C.secp256k1_pubkey
// }
//
// func NewPublicKey() *PublicKey {
// return &PublicKey{
// Key: &C.secp256k1_pubkey{},
// }
// }
type XPublicKey struct {
Key *C.secp256k1_xonly_pubkey
}
func NewXPublicKey() *XPublicKey {
return &XPublicKey{
Key: &C.secp256k1_xonly_pubkey{},
}
}
// FromSecretBytes parses and processes what should be a secret key. If it is a correct key within the curve order, but
// with a public key having an odd Y coordinate, it returns an error with the fixed key.
func FromSecretBytes(skb []byte) (
pkb []byte,
sec *Sec,
pub *XPublicKey,
// ecPub *PublicKey,
err error,
) {
xpkb := make([]byte, schnorr.PubKeyBytesLen)
// clen := C.size_t(secp256k1.PubKeyBytesLenCompressed - 1)
pkb = make([]byte, schnorr.PubKeyBytesLen)
var parity Cint
// ecPub = NewPublicKey()
pub = NewXPublicKey()
sec = &Sec{}
uskb := ToUchar(skb)
res := C.secp256k1_keypair_create(ctx, &sec.Key, uskb)
if res != 1 {
err = errorf.E("failed to create secp256k1 keypair")
return
}
// C.secp256k1_keypair_pub(ctx, ecPub.Key, &sec.Key)
// C.secp256k1_ec_pubkey_serialize(ctx, ToUchar(ecpkb), &clen, ecPub.Key,
// C.SECP256K1_EC_COMPRESSED)
// if ecpkb[0] != 2 {
// log.W.ToSliceOfBytes("odd pubkey from %0x -> %0x", skb, ecpkb)
// Negate(skb)
// uskb = ToUchar(skb)
// res = C.secp256k1_keypair_create(ctx, &sec.Key, uskb)
// if res != 1 {
// err = errorf.E("failed to create secp256k1 keypair")
// return
// }
// C.secp256k1_keypair_pub(ctx, ecPub.Key, &sec.Key)
// C.secp256k1_ec_pubkey_serialize(ctx, ToUchar(ecpkb), &clen, ecPub.Key, C.SECP256K1_EC_COMPRESSED)
// C.secp256k1_keypair_xonly_pub(ctx, pub.Key, &parity, &sec.Key)
// err = errors.New("provided secret generates a public key with odd Y coordinate, fixed version returned")
// }
C.secp256k1_keypair_xonly_pub(ctx, pub.Key, &parity, &sec.Key)
C.secp256k1_xonly_pubkey_serialize(ctx, ToUchar(xpkb), pub.Key)
pkb = xpkb
// log.I.S(sec, pub, skb, pkb)
return
}
// Generate gathers entropy to generate a full set of bytes and CGO values of it and derived from it to perform
// signature and ECDH operations.
func Generate() (
skb, pkb []byte,
sec *Sec,
pub *XPublicKey,
err error,
) {
skb = make([]byte, secp256k1.SecKeyBytesLen)
pkb = make([]byte, schnorr.PubKeyBytesLen)
upkb := ToUchar(pkb)
var parity Cint
pub = NewXPublicKey()
sec = &Sec{}
for {
if _, err = rand.Read(skb); chk.E(err) {
return
}
uskb := ToUchar(skb)
if res := C.secp256k1_keypair_create(ctx, &sec.Key, uskb); res != 1 {
err = errorf.E("failed to create secp256k1 keypair")
continue
}
C.secp256k1_keypair_xonly_pub(ctx, pub.Key, &parity, &sec.Key)
C.secp256k1_xonly_pubkey_serialize(ctx, upkb, pub.Key)
break
}
return
}
// Negate inverts a secret key so an odd prefix bit becomes even and vice versa.
func Negate(uskb []byte) { C.secp256k1_ec_seckey_negate(ctx, ToUchar(uskb)) }
type ECPub struct {
Key ECPubKey
}
// ECPubFromSchnorrBytes converts a BIP-340 public key to its even standard 33 byte encoding.
//
// This function is for the purpose of getting a key to do ECDH from an x-only key.
func ECPubFromSchnorrBytes(xkb []byte) (pub *ECPub, err error) {
if err = AssertLen(xkb, schnorr.PubKeyBytesLen, "pubkey"); chk.E(err) {
return
}
pub = &ECPub{}
p := append([]byte{0}, xkb...)
if C.secp256k1_ec_pubkey_parse(
ctx, &pub.Key, ToUchar(p),
secp256k1.PubKeyBytesLenCompressed,
) != 1 {
err = errorf.E("failed to parse pubkey from %0x", p)
log.I.S(pub)
return
}
return
}
// // ECPubFromBytes parses a pubkey from 33 bytes to the bitcoin-core/secp256k1 struct.
// func ECPubFromBytes(pkb []byte) (pub *ECPub, err error) {
// if err = AssertLen(pkb, secp256k1.PubKeyBytesLenCompressed, "pubkey"); chk.E(err) {
// return
// }
// pub = &ECPub{}
// if C.secp256k1_ec_pubkey_parse(ctx, &pub.Key, ToUchar(pkb),
// secp256k1.PubKeyBytesLenCompressed) != 1 {
// err = errorf.E("failed to parse pubkey from %0x", pkb)
// log.I.S(pub)
// return
// }
// return
// }
// Pub is a schnorr BIP-340 public key.
type Pub struct {
Key PubKey
}
// PubFromBytes creates a public key from raw bytes.
func PubFromBytes(pk []byte) (pub *Pub, err error) {
if err = AssertLen(pk, schnorr.PubKeyBytesLen, "pubkey"); chk.E(err) {
return
}
pub = new(Pub)
if C.secp256k1_xonly_pubkey_parse(ctx, &pub.Key, ToUchar(pk)) != 1 {
err = errorf.E("failed to parse pubkey from %0x", pk)
return
}
return
}
// PubB returns the contained public key as bytes.
func (p *Pub) PubB() (b []byte) {
b = make([]byte, schnorr.PubKeyBytesLen)
C.secp256k1_xonly_pubkey_serialize(ctx, ToUchar(b), &p.Key)
return
}
// Pub returns the public key as a PubKey.
func (p *Pub) Pub() *PubKey { return &p.Key }
// ToBytes returns the contained public key as bytes.
func (p *Pub) ToBytes() (b []byte, err error) {
b = make([]byte, schnorr.PubKeyBytesLen)
if C.secp256k1_xonly_pubkey_serialize(ctx, ToUchar(b), p.Pub()) != 1 {
err = errorf.E("pubkey serialize failed")
return
}
return
}
// Sign a message and return a schnorr BIP-340 64 byte signature.
func Sign(msg *Uchar, sk *SecKey) (sig []byte, err error) {
sig = make([]byte, schnorr.SignatureSize)
c := CreateRandomContext()
if C.secp256k1_schnorrsig_sign32(
c, ToUchar(sig), msg, sk,
GetRandom(),
) != 1 {
err = errorf.E("failed to sign message")
return
}
return
}
// SignFromBytes Signs a message using a provided secret key and message as raw bytes.
func SignFromBytes(msg, sk []byte) (sig []byte, err error) {
var umsg *Uchar
if umsg, err = Msg(msg); chk.E(err) {
return
}
var sec *Sec
if sec, err = SecFromBytes(sk); chk.E(err) {
return
}
return Sign(umsg, sec.Sec())
}
// Msg checks that a message hash is correct, and converts it for use with a Signer.
func Msg(b []byte) (id *Uchar, err error) {
if err = AssertLen(b, sha256.Size, "id"); chk.E(err) {
return
}
id = ToUchar(b)
return
}
// Sig checks that a signature bytes is correct, and converts it for use with a Signer.
func Sig(b []byte) (sig *Uchar, err error) {
if err = AssertLen(b, schnorr.SignatureSize, "sig"); chk.E(err) {
return
}
sig = ToUchar(b)
return
}
// Verify a message signature matches the provided PubKey.
func Verify(msg, sig *Uchar, pk *PubKey) (valid bool) {
return C.secp256k1_schnorrsig_verify(ctx, sig, msg, 32, pk) == 1
}
// VerifyFromBytes a signature from the raw bytes of the message hash, signature and public key
func VerifyFromBytes(msg, sig, pk []byte) (err error) {
var umsg, usig *Uchar
if umsg, err = Msg(msg); chk.E(err) {
return
}
if usig, err = Sig(sig); chk.E(err) {
return
}
var pub *Pub
if pub, err = PubFromBytes(pk); chk.E(err) {
return
}
valid := Verify(umsg, usig, pub.Pub())
if !valid {
err = errorf.E("failed to verify signature")
}
return
}
// Zero wipes the memory of a SecKey by overwriting it three times with random data and then
// zeroing it.
func Zero(sk *SecKey) {
b := (*[96]byte)(unsafe.Pointer(sk))[:96]
for range 3 {
rand.Read(b)
// reverse the order and negate
lb := len(b)
l := lb / 2
for j := range l {
b[j] = ^b[lb-1-j]
}
}
for i := range b {
b[i] = 0
}
}
// Keygen is an implementation of a key miner designed to be used for vanity key generation with X-only BIP-340 keys.
type Keygen struct {
secBytes, comprPubBytes []byte
secUchar, cmprPubUchar *Uchar
sec *Sec
// ecpub *PublicKey
cmprLen C.size_t
}
// NewKeygen allocates the required buffers for deriving a key. This should only be done once to avoid garbage and make
// the key mining as fast as possible.
//
// This allocates everything and creates proper CGO variables needed for the generate function so they only need to be
// allocated once per thread.
func NewKeygen() (k *Keygen) {
k = new(Keygen)
k.cmprLen = C.size_t(secp256k1.PubKeyBytesLenCompressed)
k.secBytes = make([]byte, secp256k1.SecKeyBytesLen)
k.comprPubBytes = make([]byte, secp256k1.PubKeyBytesLenCompressed)
k.secUchar = ToUchar(k.secBytes)
k.cmprPubUchar = ToUchar(k.comprPubBytes)
k.sec = &Sec{}
// k.ecpub = NewPublicKey()
return
}
// Generate takes a pair of buffers for the secret and ec pubkey bytes and gathers new entropy and returns a valid
// secret key and the compressed pubkey bytes for the partial collision search.
//
// The first byte of pubBytes must be sliced off before deriving the hex/Bech32 forms of the nostr public key.
func (k *Keygen) Generate() (
sec *Sec,
pub *XPublicKey,
pubBytes []byte,
err error,
) {
if _, err = rand.Read(k.secBytes); chk.E(err) {
return
}
if res := C.secp256k1_keypair_create(
ctx, &k.sec.Key, k.secUchar,
); res != 1 {
err = errorf.E("failed to create secp256k1 keypair")
return
}
var parity Cint
C.secp256k1_keypair_xonly_pub(ctx, pub.Key, &parity, &sec.Key)
// C.secp256k1_keypair_pub(ctx, k.ecpub.Key, &k.sec.Key)
// C.secp256k1_ec_pubkey_serialize(ctx, k.cmprPubUchar, &k.cmprLen, k.ecpub.Key,
// C.SECP256K1_EC_COMPRESSED)
// pubBytes = k.comprPubBytes
C.secp256k1_xonly_pubkey_serialize(ctx, ToUchar(pubBytes), pub.Key)
// pubBytes =
return
}