@@ -35,7 +35,7 @@ extension Bridge {
35
35
}
36
36
nonceFunctionArbitraryBytes = [ UInt8] ( nonceFunctionArbitraryData)
37
37
}
38
-
38
+
39
39
var signatureRecoverableBridgedToC = secp256k1_ecdsa_recoverable_signature ( )
40
40
41
41
try Self . call (
@@ -81,7 +81,7 @@ extension Bridge {
81
81
}
82
82
nonceFunctionArbitraryBytes = [ UInt8] ( nonceFunctionArbitraryData)
83
83
}
84
-
84
+
85
85
var signatureBridgedToC = secp256k1_ecdsa_signature ( )
86
86
87
87
try Self . call (
@@ -96,7 +96,7 @@ extension Bridge {
96
96
nonceFunctionArbitraryBytes
97
97
)
98
98
}
99
-
99
+
100
100
return Data (
101
101
bytes: & signatureBridgedToC. data,
102
102
count: MemoryLayout . size ( ofValue: signatureBridgedToC. data)
@@ -114,7 +114,7 @@ extension Bridge {
114
114
var signatureOut = [ UInt8] ( repeating: 0 , count: 64 )
115
115
116
116
var keyPair = secp256k1_keypair ( )
117
-
117
+
118
118
try Self . call (
119
119
ifFailThrow: . failedToInitializeKeyPairForSchnorrSigning
120
120
) { context in
@@ -140,31 +140,62 @@ extension Bridge {
140
140
auxilaryRandomBytes
141
141
)
142
142
}
143
-
143
+
144
144
var publicKey = secp256k1_xonly_pubkey ( )
145
-
145
+
146
146
try Self . call (
147
147
ifFailThrow: . failedToSchnorrSignErrorGettingPubKeyFromKeyPair
148
148
) { context in
149
149
secp256k1_keypair_xonly_pub ( context, & publicKey, nil , & keyPair)
150
150
}
151
-
151
+
152
152
try Self . call (
153
153
ifFailThrow: . failedToSchnorrSignDigestDidNotPassVerification
154
154
) { context in
155
155
secp256k1_schnorrsig_verify ( context, & signatureOut, message, message. count, & publicKey)
156
156
}
157
-
157
+
158
158
return Data ( signatureOut)
159
159
}
160
160
161
+ enum ECDHSerializeFunction {
162
+
163
+ /// Using the `libsecp256k1` default behaviour, which is to SHA256 hash the compressed public key
164
+ case libsecp256kDefault
165
+
166
+ /// Following the [ANSI X9.63][ansix963] standard
167
+ ///
168
+ /// [ansix963]: https://webstore.ansi.org/standards/ascx9/ansix9632011r2017
169
+ case ansiX963
170
+
171
+ /// Following no standard at all, does not hash the shared public point, and returns it in full.
172
+ case noHashWholePoint
173
+
174
+ func hashfp( ) -> ( Optional < @convention ( c) ( Optional < UnsafeMutablePointer < UInt8 > > , Optional < UnsafePointer < UInt8 > > , Optional < UnsafePointer < UInt8 > > , Optional < UnsafeMutableRawPointer > ) -> Int32 > ) {
175
+ switch self {
176
+ case . libsecp256kDefault: return secp256k1_ecdh_hash_function_default
177
+ case . ansiX963: return ecdh_skip_hash_extract_only_x
178
+ case . noHashWholePoint: return ecdh_skip_hash_extract_x_and_y
179
+ }
180
+ }
181
+
182
+ var outputByteCount : Int {
183
+ switch self {
184
+ case . libsecp256kDefault: return K1 . Curve. Field. byteCount
185
+ case . ansiX963: return K1 . Curve. Field. byteCount
186
+ case . noHashWholePoint: return K1 . Format. uncompressed. length
187
+ }
188
+ }
189
+ }
190
+
161
191
static func ecdh(
162
192
publicKey publicKeyBytes: [ UInt8 ] ,
163
- privateKey: SecureBytes
193
+ privateKey: SecureBytes ,
194
+ hashFp: ECDHSerializeFunction
164
195
) throws -> Data {
165
-
196
+
166
197
var publicKeyBridgedToC = secp256k1_pubkey ( )
167
-
198
+
168
199
try Self . call ( ifFailThrow: . incorrectByteCountOfPublicKey( providedByteCount: publicKeyBytes. count) ) { context in
169
200
/* Parse a variable-length public key into the pubkey object. */
170
201
secp256k1_ec_pubkey_parse (
@@ -174,10 +205,10 @@ extension Bridge {
174
205
publicKeyBytes. count
175
206
)
176
207
}
177
-
208
+
178
209
var sharedPublicPointBytes = [ UInt8] (
179
210
repeating: 0 ,
180
- count: K1 . Format . uncompressed . length
211
+ count: hashFp . outputByteCount
181
212
)
182
213
183
214
try Self . call (
@@ -190,7 +221,7 @@ extension Bridge {
190
221
& sharedPublicPointBytes, // output
191
222
& publicKeyBridgedToC, // pubkey
192
223
privateKey. backing. bytes, // seckey
193
- ecdh_skip_hash_extract_x_and_y , // hashfp
224
+ hashFp . hashfp ( ) , // hashfp
194
225
nil // arbitrary data pointer that is passed through to hashfp
195
226
)
196
227
}
@@ -259,7 +290,7 @@ extension Bridge {
259
290
message: message
260
291
)
261
292
}
262
-
293
+
263
294
/// Recover an ECDSA public key from a signature.
264
295
static func _recoverPublicKey(
265
296
rs rsData: Data ,
@@ -312,13 +343,13 @@ extension Bridge {
312
343
try Self . call (
313
344
ifFailThrow: . failedToSerializePublicKeyIntoBytes
314
345
) { context in
315
- secp256k1_ec_pubkey_serialize (
316
- context,
317
- pubkeyBytes. baseAddress!,
318
- & pubkeyBytesSerializedCount,
319
- & publicKeyBridgedToC,
320
- publicKeyFormat. rawValue
321
- )
346
+ secp256k1_ec_pubkey_serialize (
347
+ context,
348
+ pubkeyBytes. baseAddress!,
349
+ & pubkeyBytesSerializedCount,
350
+ & publicKeyBridgedToC,
351
+ publicKeyFormat. rawValue
352
+ )
322
353
}
323
354
}
324
355
guard
@@ -327,7 +358,7 @@ extension Bridge {
327
358
else {
328
359
throw K1 . Error. failedToSerializePublicKeyIntoBytes
329
360
}
330
-
361
+
331
362
return publicPointBytes
332
363
}
333
364
}
@@ -384,7 +415,7 @@ public extension ECDSASignatureNonRecoverable {
384
415
}
385
416
386
417
public extension K1 . PrivateKey {
387
-
418
+
388
419
/// Produces a **recoverable** ECDSA signature.
389
420
func ecdsaSignRecoverable< D: DataProtocol > (
390
421
hashed message: D ,
@@ -394,7 +425,7 @@ public extension K1.PrivateKey {
394
425
let raw = try withSecureBytes {
395
426
try Bridge . ecdsaSignRecoverable ( message: messageBytes, privateKey: $0, mode: mode)
396
427
}
397
-
428
+
398
429
return try ECDSASignatureRecoverable . init ( rawRepresentation: raw)
399
430
}
400
431
@@ -407,7 +438,7 @@ public extension K1.PrivateKey {
407
438
let signatureData = try withSecureBytes { ( secureBytes: SecureBytes ) -> Data in
408
439
try Bridge . ecdsaSignNonRecoverable ( message: messageBytes, privateKey: secureBytes, mode: mode)
409
440
}
410
-
441
+
411
442
return try ECDSASignatureNonRecoverable (
412
443
rawRepresentation: signatureData
413
444
)
@@ -421,12 +452,12 @@ public extension K1.PrivateKey {
421
452
let signatureData = try withSecureBytes { ( secureBytes: SecureBytes ) -> Data in
422
453
try Bridge . schnorrSign ( message: message, privateKey: secureBytes, input: maybeInput)
423
454
}
424
-
455
+
425
456
return try SchnorrSignature (
426
457
rawRepresentation: signatureData
427
458
)
428
459
}
429
-
460
+
430
461
func ecdsaSignNonRecoverable< D: Digest > (
431
462
digest: D ,
432
463
mode: ECDSASignatureNonRecoverable . SigningMode = . default
@@ -470,7 +501,7 @@ public extension K1.PrivateKey {
470
501
try schnorrSign ( digest: SHA256 . hash ( data: data) , input: maybeInput)
471
502
}
472
503
473
-
504
+
474
505
func sign< S: ECSignatureScheme , D: DataProtocol > (
475
506
hashed: D ,
476
507
scheme: S . Type ,
@@ -487,28 +518,121 @@ public extension K1.PrivateKey {
487
518
try S . Signature. by ( signing: Array ( digest) , with: self , mode: mode)
488
519
}
489
520
490
- func sign< S: ECSignatureScheme , D: DataProtocol > (
491
- unhashed: D ,
492
- scheme: S . Type ,
493
- mode: S . Signature . SigningMode
494
- ) throws -> S . Signature {
495
- try sign (
521
+ func sign< S: ECSignatureScheme , D: DataProtocol > (
522
+ unhashed: D ,
523
+ scheme: S . Type ,
524
+ mode: S . Signature . SigningMode
525
+ ) throws -> S . Signature {
526
+ try sign (
496
527
hashed: Data ( S . hash ( unhashed: unhashed) ) ,
497
528
scheme: scheme,
498
529
mode: mode
499
- )
500
- }
530
+ )
531
+ }
532
+ }
533
+
534
+ /// MARK: ECDH
535
+ extension K1 . PrivateKey {
501
536
502
- /// Performs a key agreement with provided public key share.
503
- ///
504
- /// - Parameter publicKeyShare: The public key to perform the ECDH with.
505
- /// - Returns: Returns the public point obtain by performing EC mult between
506
- /// this `privateKey` and `publicKeyShare`
507
- /// - Throws: An error occurred while computing the shared secret
508
- func sharedSecret( with publicKeyShare: K1 . PublicKey ) throws -> Data {
537
+ private func _ecdh(
538
+ publicKey: K1 . PublicKey ,
539
+ serializeOutputFunction hashFp: Bridge . ECDHSerializeFunction
540
+ ) throws -> Data {
509
541
let sharedSecretData = try withSecureBytes { secureBytes in
510
- try Bridge . ecdh ( publicKey: publicKeyShare. uncompressedRaw, privateKey: secureBytes)
542
+ try Bridge . ecdh (
543
+ publicKey: publicKey. uncompressedRaw,
544
+ privateKey: secureBytes,
545
+ hashFp: hashFp
546
+ )
511
547
}
512
548
return sharedSecretData
513
549
}
550
+
551
+
552
+
553
+ /// Computes a shared secret with the provided public key from another party,
554
+ /// returning only the `X` coordinate of the point, following [ANSI X9.63][ansix963] standards.
555
+ ///
556
+ /// This is one of three ECDH functions, this library vendors, all three versions
557
+ /// uses different serialization of the shared EC Point, specifically:
558
+ /// 1. SHA-256 hash the compressed point
559
+ /// 2. No hash, return point uncompressed
560
+ /// 3. No hash, return only the `X` coordinate of the point <- this function
561
+ ///
562
+ /// This function uses 3. i.e. no hash, and returns only the `X` coordinate of the point.
563
+ /// This is following the [ANSI X9.63][ansix963] standard serialization of the shared point.
564
+ ///
565
+ /// Further more this function is compatible with CryptoKit, since it returns a CryptoKit
566
+ /// `SharedSecret` struct, thus offering you to use all of CryptoKit's Key Derivation Functions
567
+ /// (`KDF`s), which can be called on the `SharedSecret`.
568
+ ///
569
+ /// As seen on [StackExchange][cryptostackexchange], this version is compatible with the following
570
+ /// libraries:
571
+ /// - JS: `elliptic` (v6.4.0 in nodeJS v8.2.1)
572
+ /// - JS: `crypto` (builtin) - uses openssl under the hood (in nodeJS v8.2.1)
573
+ /// - .NET: `BouncyCastle` (BC v1.8.1.3, .NET v2.1.4)
574
+ ///
575
+ /// [ansix963]: https://webstore.ansi.org/standards/ascx9/ansix9632011r2017
576
+ /// [cryptostackexchange]: https://crypto.stackexchange.com/a/57727
577
+ public func sharedSecretFromKeyAgreement(
578
+ with publicKeyShare: K1 . PublicKey
579
+ ) throws -> SharedSecret {
580
+ let sharedSecretData = try _ecdh ( publicKey: publicKeyShare, serializeOutputFunction: . ansiX963)
581
+ let __sharedSecret = __SharedSecret ( ss: . init( bytes: sharedSecretData) )
582
+ let sharedSecret = unsafeBitCast ( __sharedSecret, to: SharedSecret . self)
583
+ guard sharedSecret. withUnsafeBytes ( { Data ( $0) . count == sharedSecretData. count } ) else {
584
+ throw K1 . Error. failedToProduceSharedSecret
585
+ }
586
+ return sharedSecret
587
+ }
588
+
589
+ /// Computes a shared secret with the provided public key from another party,
590
+ /// using `libsecp256k1` default behaviour, returning a hashed of the compressed point.
591
+ ///
592
+ /// This is one of three ECDH functions, this library vendors, all three versions
593
+ /// uses different serialization of the shared EC Point, specifically:
594
+ /// 1. SHA-256 hash the compressed point <- this function
595
+ /// 2. No hash, return point uncompressed
596
+ /// 3. No hash, return only the `X` coordinate of the point.
597
+ ///
598
+ /// This function uses 1. i.e.SHA-256 hash the compressed point.
599
+ /// This is using the [default behaviour of `libsecp256k1`][libsecp256k1], which does not adhere to any
600
+ /// other standard.
601
+ ///
602
+ /// As seen on [StackExchange][cryptostackexchange], this version is compatible with all
603
+ /// libraries which wraps `libsecp256k1`, e.g.:
604
+ /// - Python wrapper: secp256k1 (v0.13.2, for python 3.6.4)
605
+ /// - JS wrapper: secp256k1 (v3.5.0, for nodeJS v8.2.1)
606
+ ///
607
+ /// [libsecp256k1]: https://github.com/bitcoin-core/secp256k1/blob/master/src/modules/ecdh/main_impl.h#L27
608
+ /// [cryptostackexchange]: https://crypto.stackexchange.com/a/57727
609
+ ///
610
+ public func ecdh( with publicKey: K1 . PublicKey ) throws -> Data {
611
+ try _ecdh ( publicKey: publicKey, serializeOutputFunction: . libsecp256kDefault)
612
+ }
613
+
614
+ /// Computes a shared secret with the provided public key from another party,
615
+ /// returning an uncompressed public point, unhashed.
616
+ ///
617
+ /// This is one of three ECDH functions, this library vendors, all three versions
618
+ /// uses different serialization of the shared EC Point, specifically:
619
+ /// 1. SHA-256 hash the compressed point
620
+ /// 2. No hash, return point uncompressed <- this function
621
+ /// 3. No hash, return only the `X` coordinate of the point.
622
+ ///
623
+ /// This function uses 2. i.e. no hash, return point uncompressed
624
+ /// **This is not following any standard at all**, but might be useful if you want to write your
625
+ /// cryptographic functions, e.g. some ECIES scheme.
626
+ ///
627
+ public func ecdhPoint( with publicKey: K1 . PublicKey ) throws -> Data {
628
+ try _ecdh ( publicKey: publicKey, serializeOutputFunction: . noHashWholePoint)
629
+ }
630
+ }
631
+
632
+ // MUST match https://github.com/apple/swift-crypto/blob/main/Sources/Crypto/Key%20Agreement/DH.swift#L34
633
+
634
+ /// A Key Agreement Result
635
+ /// A SharedSecret has to go through a Key Derivation Function before being able to use by a symmetric key operation.
636
+ public struct __SharedSecret {
637
+ var ss : SecureBytes
514
638
}
0 commit comments