secp256k1mod.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266
  1. /*
  2. mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
  3. Copyright (C)2013-2025 The MMGen Project <mmgen@tuta.io>
  4. This program is free software: you can redistribute it and/or modify it under
  5. the terms of the GNU General Public License as published by the Free Software
  6. Foundation, either version 3 of the License, or (at your option) any later
  7. version.
  8. This program is distributed in the hope that it will be useful, but WITHOUT
  9. ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  10. FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  11. details.
  12. You should have received a copy of the GNU General Public License along with
  13. this program. If not, see <http://www.gnu.org/licenses/>.
  14. */
  15. /*
  16. NOTE: deprecated context flags SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY
  17. must be used for now instead of SECP256K1_CONTEXT_NONE (see libsecp256k1 CHANGELOG)
  18. for backward compatibility with libsecp256k1 <v0.2.0 (i.e. pre-bookworm distros).
  19. */
  20. #define PY_SSIZE_T_CLEAN
  21. #include <Python.h>
  22. #include <secp256k1.h>
  23. #include "random.h"
  24. static secp256k1_context * create_context(
  25. const unsigned char randomize
  26. ) {
  27. secp256k1_context *ctx = secp256k1_context_create(
  28. SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY
  29. /* SECP256K1_CONTEXT_NONE */ /* see NOTE above */
  30. );
  31. if (randomize) {
  32. unsigned char buf[32];
  33. if (!fill_random(buf, sizeof(buf))) {
  34. printf("Failed to generate entropy\n");
  35. return NULL;
  36. }
  37. if (!secp256k1_context_randomize(ctx, buf)) {
  38. printf("Failed to randomize context\n");
  39. return NULL;
  40. }
  41. }
  42. return ctx;
  43. }
  44. static int privkey_check(
  45. const secp256k1_context * ctx,
  46. const unsigned char * privkey_bytes,
  47. const Py_ssize_t privkey_bytes_len,
  48. const char * desc
  49. ) {
  50. if (privkey_bytes_len != 32) {
  51. char buf[64 + strlen(desc)];
  52. sprintf(buf, "%s length not 32 bytes", desc);
  53. PyErr_SetString(PyExc_ValueError, buf);
  54. return 0;
  55. }
  56. if (secp256k1_ec_seckey_verify(ctx, privkey_bytes) != 1) {
  57. char buf[64 + strlen(desc)];
  58. sprintf(buf, "%s not in allowable range", desc);
  59. PyErr_SetString(PyExc_ValueError, buf);
  60. return 0;
  61. }
  62. return 1;
  63. }
  64. static int pubkey_parse_with_check(
  65. const secp256k1_context * ctx,
  66. secp256k1_pubkey * pubkey_ptr,
  67. const unsigned char * pubkey_bytes,
  68. const Py_ssize_t pubkey_bytes_len
  69. ) {
  70. if (ctx == NULL) {
  71. PyErr_SetString(PyExc_RuntimeError, "Context initialization failed");
  72. return 0;
  73. }
  74. if (pubkey_bytes_len == 33) {
  75. if (pubkey_bytes[0] != 3 && pubkey_bytes[0] != 2) {
  76. PyErr_SetString(
  77. PyExc_ValueError,
  78. "Invalid first byte for serialized compressed public key");
  79. return 0;
  80. }
  81. } else if (pubkey_bytes_len == 65) {
  82. if (pubkey_bytes[0] != 4) {
  83. PyErr_SetString(
  84. PyExc_ValueError,
  85. "Invalid first byte for serialized uncompressed public key");
  86. return 0;
  87. }
  88. } else {
  89. PyErr_SetString(PyExc_ValueError, "Serialized public key length not 33 or 65 bytes");
  90. return 0;
  91. }
  92. /* checks for point-at-infinity (via secp256k1_pubkey_save) */
  93. if (secp256k1_ec_pubkey_parse(ctx, pubkey_ptr, pubkey_bytes, pubkey_bytes_len) != 1) {
  94. PyErr_SetString(
  95. PyExc_ValueError,
  96. "Public key could not be parsed or encodes point-at-infinity");
  97. return 0;
  98. }
  99. return 1;
  100. }
  101. static PyObject * pubkey_gen(PyObject *self, PyObject *args) {
  102. const unsigned char * privkey_bytes;
  103. Py_ssize_t privkey_bytes_len;
  104. int compressed;
  105. if (!PyArg_ParseTuple(args, "y#i", &privkey_bytes, &privkey_bytes_len, &compressed)) {
  106. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  107. return NULL;
  108. }
  109. size_t pubkey_bytes_len = compressed == 1 ? 33 : 65;
  110. unsigned char pubkey_bytes[pubkey_bytes_len];
  111. secp256k1_pubkey pubkey;
  112. secp256k1_context *ctx = create_context(1);
  113. if (ctx == NULL) {
  114. PyErr_SetString(PyExc_RuntimeError, "Context initialization failed");
  115. return NULL;
  116. }
  117. if (!privkey_check(ctx, privkey_bytes, privkey_bytes_len, "Private key")) {
  118. return NULL;
  119. }
  120. if (secp256k1_ec_pubkey_create(ctx, &pubkey, privkey_bytes) != 1) {
  121. PyErr_SetString(PyExc_RuntimeError, "Public key creation failed");
  122. return NULL;
  123. }
  124. if (secp256k1_ec_pubkey_serialize(ctx, pubkey_bytes, &pubkey_bytes_len, &pubkey,
  125. compressed == 1 ? SECP256K1_EC_COMPRESSED : SECP256K1_EC_UNCOMPRESSED) != 1) {
  126. PyErr_SetString(PyExc_RuntimeError, "Public key serialization failed");
  127. return NULL;
  128. }
  129. return Py_BuildValue("y#", pubkey_bytes, pubkey_bytes_len);
  130. }
  131. static PyObject * pubkey_tweak_add(PyObject *self, PyObject *args) {
  132. const unsigned char * pubkey_bytes;
  133. const unsigned char * tweak_bytes;
  134. Py_ssize_t pubkey_bytes_len;
  135. Py_ssize_t tweak_bytes_len;
  136. if (!PyArg_ParseTuple(
  137. args,
  138. "y#y#",
  139. &pubkey_bytes,
  140. &pubkey_bytes_len,
  141. &tweak_bytes,
  142. &tweak_bytes_len)) {
  143. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  144. return NULL;
  145. }
  146. secp256k1_context *ctx = create_context(1);
  147. secp256k1_pubkey pubkey;
  148. if (!pubkey_parse_with_check(ctx, &pubkey, pubkey_bytes, pubkey_bytes_len)) {
  149. return NULL;
  150. }
  151. if (!privkey_check(ctx, tweak_bytes, tweak_bytes_len, "Tweak")) {
  152. return NULL;
  153. }
  154. /* checks for point-at-infinity (via secp256k1_pubkey_save) */
  155. if (secp256k1_ec_pubkey_tweak_add(ctx, &pubkey, tweak_bytes) != 1) {
  156. PyErr_SetString(
  157. PyExc_RuntimeError,
  158. "Adding public key points failed or result was point-at-infinity");
  159. return NULL;
  160. }
  161. unsigned char new_pubkey_bytes[pubkey_bytes_len];
  162. if (secp256k1_ec_pubkey_serialize(
  163. ctx,
  164. new_pubkey_bytes,
  165. (size_t*) &pubkey_bytes_len,
  166. &pubkey,
  167. pubkey_bytes_len == 33 ? SECP256K1_EC_COMPRESSED : SECP256K1_EC_UNCOMPRESSED) != 1) {
  168. PyErr_SetString(PyExc_RuntimeError, "Public key serialization failed");
  169. return NULL;
  170. }
  171. return Py_BuildValue("y#", new_pubkey_bytes, pubkey_bytes_len);
  172. }
  173. static PyObject * pubkey_check(PyObject *self, PyObject *args) {
  174. const unsigned char * pubkey_bytes;
  175. Py_ssize_t pubkey_bytes_len;
  176. if (!PyArg_ParseTuple(args, "y#", &pubkey_bytes, &pubkey_bytes_len)) {
  177. PyErr_SetString(PyExc_ValueError, "Unable to parse extension mod arguments");
  178. return NULL;
  179. }
  180. secp256k1_context *ctx = create_context(1);
  181. secp256k1_pubkey pubkey;
  182. if (!pubkey_parse_with_check(ctx, &pubkey, pubkey_bytes, pubkey_bytes_len)) {
  183. return NULL;
  184. }
  185. return Py_BuildValue("I", 1);
  186. }
  187. /* https://docs.python.org/3/howto/cporting.html */
  188. struct module_state {
  189. PyObject *error;
  190. };
  191. #define GETSTATE(m) ((struct module_state*)PyModule_GetState(m))
  192. static PyMethodDef secp256k1_methods[] = {
  193. {
  194. "pubkey_gen",
  195. pubkey_gen,
  196. METH_VARARGS,
  197. "Generate a serialized pubkey from privkey bytes"
  198. },
  199. {
  200. "pubkey_tweak_add",
  201. pubkey_tweak_add,
  202. METH_VARARGS,
  203. "Add scalar bytes to a serialized pubkey, returning a serialized pubkey"
  204. },
  205. {
  206. "pubkey_check",
  207. pubkey_check,
  208. METH_VARARGS,
  209. "Check a serialized pubkey, ensuring the encoded point is not point-at-infinity"
  210. },
  211. {NULL, NULL}
  212. };
  213. static int secp256k1_traverse(PyObject *m, visitproc visit, void *arg) {
  214. Py_VISIT(GETSTATE(m)->error);
  215. return 0;
  216. }
  217. static int secp256k1_clear(PyObject *m) {
  218. Py_CLEAR(GETSTATE(m)->error);
  219. return 0;
  220. }
  221. static struct PyModuleDef moduledef = {
  222. PyModuleDef_HEAD_INIT,
  223. "secp256k1",
  224. NULL,
  225. sizeof(struct module_state),
  226. secp256k1_methods,
  227. NULL,
  228. secp256k1_traverse,
  229. secp256k1_clear,
  230. NULL
  231. };
  232. #define INITERROR return NULL
  233. PyMODINIT_FUNC PyInit_secp256k1(void) {
  234. PyObject *module = PyModule_Create(&moduledef);
  235. if (module == NULL)
  236. INITERROR;
  237. struct module_state *st = GETSTATE(module);
  238. st->error = PyErr_NewException("secp256k1.Error", NULL, NULL);
  239. if (st->error == NULL) {
  240. Py_DECREF(module);
  241. INITERROR;
  242. }
  243. return module;
  244. }