mirror of
https://github.com/ElementsProject/lightning.git
synced 2024-11-20 02:27:51 +01:00
20a07d860a
And fix the resulting issues. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
80 lines
2.6 KiB
C
80 lines
2.6 KiB
C
#define SUPERVERBOSE
|
|
static void *tmpctx;
|
|
|
|
#include <stdio.h>
|
|
#include <utils.h>
|
|
#include <type_to_string.h>
|
|
#include "../key_derive.c"
|
|
#include <assert.h>
|
|
#include <ccan/str/hex/hex.h>
|
|
#include <stdio.h>
|
|
#include <type_to_string.h>
|
|
|
|
static struct privkey privkey_from_hex(const char *hex)
|
|
{
|
|
struct privkey privkey;
|
|
hex += 2;
|
|
if (!hex_decode(hex, strlen(hex), &privkey, sizeof(privkey)))
|
|
abort();
|
|
return privkey;
|
|
}
|
|
|
|
int main(void)
|
|
{
|
|
struct privkey base_secret, per_commitment_secret, privkey;
|
|
struct pubkey base_point, per_commitment_point, pubkey, pubkey2;
|
|
|
|
tmpctx = tal_tmpctx(NULL);
|
|
secp256k1_ctx = secp256k1_context_create(SECP256K1_CONTEXT_VERIFY
|
|
| SECP256K1_CONTEXT_SIGN);
|
|
|
|
base_secret = privkey_from_hex("0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f");
|
|
per_commitment_secret = privkey_from_hex("0x1f1e1d1c1b1a191817161514131211100f0e0d0c0b0a09080706050403020100");
|
|
|
|
printf("base_secret: 0x%s\n",
|
|
tal_hexstr(tmpctx, &base_secret, sizeof(base_secret)));
|
|
printf("per_commitment_secret: 0x%s\n",
|
|
tal_hexstr(tmpctx, &per_commitment_secret,
|
|
sizeof(per_commitment_secret)));
|
|
if (!pubkey_from_privkey(&per_commitment_secret, &per_commitment_point))
|
|
abort();
|
|
if (!pubkey_from_privkey(&base_secret, &base_point))
|
|
abort();
|
|
printf("base_point: 0x%s\n",
|
|
type_to_string(tmpctx, struct pubkey, &base_point));
|
|
printf("per_commitment_point: 0x%s\n",
|
|
type_to_string(tmpctx, struct pubkey, &per_commitment_point));
|
|
|
|
/* FIXME: Annotate internal steps. */
|
|
if (!derive_simple_key(&base_point, &per_commitment_point, &pubkey))
|
|
abort();
|
|
printf("localkey: 0x%s\n",
|
|
type_to_string(tmpctx, struct pubkey, &pubkey));
|
|
if (!derive_simple_privkey(&base_secret, &base_point,
|
|
&per_commitment_point, &privkey))
|
|
abort();
|
|
printf("localprivkey: 0x%s\n",
|
|
tal_hexstr(tmpctx, &privkey, sizeof(privkey)));
|
|
pubkey_from_privkey(&privkey, &pubkey2);
|
|
assert(pubkey_eq(&pubkey, &pubkey2));
|
|
|
|
/* FIXME: Annotate internal steps. */
|
|
if (!derive_revocation_key(&base_point, &per_commitment_point, &pubkey))
|
|
abort();
|
|
printf("revocationkey: 0x%s\n",
|
|
type_to_string(tmpctx, struct pubkey, &pubkey));
|
|
if (!derive_revocation_privkey(&base_secret, &per_commitment_secret,
|
|
&base_point, &per_commitment_point,
|
|
&privkey))
|
|
abort();
|
|
printf("revocationprivkey: 0x%s\n",
|
|
tal_hexstr(tmpctx, &privkey, sizeof(privkey)));
|
|
pubkey_from_privkey(&privkey, &pubkey2);
|
|
assert(pubkey_eq(&pubkey, &pubkey2));
|
|
|
|
/* No memory leaks please */
|
|
secp256k1_context_destroy(secp256k1_ctx);
|
|
tal_free(tmpctx);
|
|
return 0;
|
|
}
|