/****************************************************************************** * Copyright © 2014-2016 The SuperNET Developers. * * * * See the AUTHORS, DEVELOPER-AGREEMENT and LICENSE files at * * the top-level directory of this distribution for the individual copyright * * holder information and the developer policies on copyright and licensing. * * * * Unless otherwise agreed in a custom licensing agreement, no part of the * * SuperNET software, including this file may be copied, modified, propagated * * or distributed except according to the terms contained in the LICENSE file * * * * Removal or modification of this copyright notice is prohibited. * * * ******************************************************************************/ // BTCoffer: // sends NXT assetid, volume and desired // request: // other node sends (othercoin, othercoinaddr, otherNXT and reftx that expires well before phasedtx) // proposal: // NXT node submits phasedtx that refers to it, but it wont confirm // approve: // other node verifies unconfirmed has phasedtx and broadcasts cltv, also to NXT node, releases trigger // confirm: // NXT node verifies bitcoin txbytes has proper payment and cashes in with onetimepubkey // BTC* node approves phased tx with onetimepubkey char *instantdex_PAXswap(struct supernet_info *myinfo,struct exchange_info *exchange,struct instantdex_accept *ap,char *cmdstr,struct instantdex_msghdr *msg,cJSON *argjson,char *remoteaddr,uint64_t signerbits,uint8_t *data,int32_t datalen) // receiving side { char *retstr = 0; return(clonestr("{\"error\":\"PAX swap is not yet\"}")); if ( strcmp(cmdstr,"offer") == 0 ) { } else if ( strcmp(cmdstr,"proposal") == 0 ) { } else if ( strcmp(cmdstr,"accept") == 0 ) { } else if ( strcmp(cmdstr,"confirm") == 0 ) { } else retstr = clonestr("{\"error\":\"PAX swap got unrecognized command\"}"); return(retstr); } /*#ifdef __APPLE__ #include "../secp256k1/include/secp256k1.h" //#include "../../crypto777/secp256k1/modules/rangeproof/pedersen_impl.h" //#include "../../crypto777/secp256k1/modules/rangeproof/borromean_impl.h" //#include "../../crypto777/secp256k1/modules/rangeproof/rangeproof_impl.h" void secp256k1_pedersen_context_initialize(secp256k1_context_t *ctx); int secp256k1_pedersen_commit(const secp256k1_context_t* ctx, unsigned char *commit, unsigned char *blind, uint64_t value); int secp256k1_pedersen_blind_sum(const secp256k1_context_t* ctx, unsigned char *blind_out, const unsigned char * const *blinds, int n, int npositive); int secp256k1_pedersen_verify_tally(const secp256k1_context_t* ctx, const unsigned char * const *commits, int pcnt,const unsigned char * const *ncommits, int ncnt, int64_t excess); // ./configure --enable-module-ecdh --enable-module-schnorr --enable-module-rangeproof void CHECK(int32_t val) { if ( val != 1 ) printf("error\n"),getchar(); } typedef struct { uint64_t d[4]; } secp256k1_scalar_t; static void secp256k1_scalar_get_b32(unsigned char *bin, const secp256k1_scalar_t* a) { bin[0] = a->d[3] >> 56; bin[1] = a->d[3] >> 48; bin[2] = a->d[3] >> 40; bin[3] = a->d[3] >> 32; bin[4] = a->d[3] >> 24; bin[5] = a->d[3] >> 16; bin[6] = a->d[3] >> 8; bin[7] = a->d[3]; bin[8] = a->d[2] >> 56; bin[9] = a->d[2] >> 48; bin[10] = a->d[2] >> 40; bin[11] = a->d[2] >> 32; bin[12] = a->d[2] >> 24; bin[13] = a->d[2] >> 16; bin[14] = a->d[2] >> 8; bin[15] = a->d[2]; bin[16] = a->d[1] >> 56; bin[17] = a->d[1] >> 48; bin[18] = a->d[1] >> 40; bin[19] = a->d[1] >> 32; bin[20] = a->d[1] >> 24; bin[21] = a->d[1] >> 16; bin[22] = a->d[1] >> 8; bin[23] = a->d[1]; bin[24] = a->d[0] >> 56; bin[25] = a->d[0] >> 48; bin[26] = a->d[0] >> 40; bin[27] = a->d[0] >> 32; bin[28] = a->d[0] >> 24; bin[29] = a->d[0] >> 16; bin[30] = a->d[0] >> 8; bin[31] = a->d[0]; } #define SECP256K1_N_0 ((uint64_t)0xBFD25E8CD0364141ULL) #define SECP256K1_N_1 ((uint64_t)0xBAAEDCE6AF48A03BULL) #define SECP256K1_N_2 ((uint64_t)0xFFFFFFFFFFFFFFFEULL) #define SECP256K1_N_3 ((uint64_t)0xFFFFFFFFFFFFFFFFULL) #define SECP256K1_N_C_0 (~SECP256K1_N_0 + 1) #define SECP256K1_N_C_1 (~SECP256K1_N_1) #define SECP256K1_N_C_2 (1) static int secp256k1_scalar_check_overflow(const secp256k1_scalar_t *a) { int yes = 0; int no = 0; no |= (a->d[3] < SECP256K1_N_3); //No need for a > check. no |= (a->d[2] < SECP256K1_N_2); yes |= (a->d[2] > SECP256K1_N_2) & ~no; no |= (a->d[1] < SECP256K1_N_1); yes |= (a->d[1] > SECP256K1_N_1) & ~no; yes |= (a->d[0] >= SECP256K1_N_0) & ~no; return yes; } typedef unsigned uint128_t __attribute__((mode(TI))); static int secp256k1_scalar_reduce(secp256k1_scalar_t *r, unsigned int overflow) { uint128_t t; t = (uint128_t)r->d[0] + overflow * SECP256K1_N_C_0; r->d[0] = t & 0xFFFFFFFFFFFFFFFFULL; t >>= 64; t += (uint128_t)r->d[1] + overflow * SECP256K1_N_C_1; r->d[1] = t & 0xFFFFFFFFFFFFFFFFULL; t >>= 64; t += (uint128_t)r->d[2] + overflow * SECP256K1_N_C_2; r->d[2] = t & 0xFFFFFFFFFFFFFFFFULL; t >>= 64; t += (uint64_t)r->d[3]; r->d[3] = t & 0xFFFFFFFFFFFFFFFFULL; return overflow; } static void secp256k1_scalar_set_b32(secp256k1_scalar_t *r, const unsigned char *b32, int *overflow) { int over; r->d[0] = (uint64_t)b32[31] | (uint64_t)b32[30] << 8 | (uint64_t)b32[29] << 16 | (uint64_t)b32[28] << 24 | (uint64_t)b32[27] << 32 | (uint64_t)b32[26] << 40 | (uint64_t)b32[25] << 48 | (uint64_t)b32[24] << 56; r->d[1] = (uint64_t)b32[23] | (uint64_t)b32[22] << 8 | (uint64_t)b32[21] << 16 | (uint64_t)b32[20] << 24 | (uint64_t)b32[19] << 32 | (uint64_t)b32[18] << 40 | (uint64_t)b32[17] << 48 | (uint64_t)b32[16] << 56; r->d[2] = (uint64_t)b32[15] | (uint64_t)b32[14] << 8 | (uint64_t)b32[13] << 16 | (uint64_t)b32[12] << 24 | (uint64_t)b32[11] << 32 | (uint64_t)b32[10] << 40 | (uint64_t)b32[9] << 48 | (uint64_t)b32[8] << 56; r->d[3] = (uint64_t)b32[7] | (uint64_t)b32[6] << 8 | (uint64_t)b32[5] << 16 | (uint64_t)b32[4] << 24 | (uint64_t)b32[3] << 32 | (uint64_t)b32[2] << 40 | (uint64_t)b32[1] << 48 | (uint64_t)b32[0] << 56; over = secp256k1_scalar_reduce(r, secp256k1_scalar_check_overflow(r)); if (overflow) { *overflow = over; } } void random_scalar_order(secp256k1_scalar_t *num) { do { unsigned char b32[32]; int overflow = 0; OS_randombytes(b32,sizeof(b32)); //secp256k1_rand256(b32); secp256k1_scalar_set_b32(num, b32, &overflow); if ( overflow != 0 || bits256_nonz(*(bits256 *)num) == 0 ) continue; break; } while(1); } bits256 rand_secp() { bits256 s,ret; random_scalar_order((void *)&s); secp256k1_scalar_get_b32((void *)&ret,(void *)&s); return(ret); } void test_pedersen(void) { secp256k1_context_t *ctx; ctx = secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY); secp256k1_pedersen_context_initialize(ctx); unsigned char commits[33*19]; const unsigned char *cptr[19]; unsigned char blinds[32*19]; const unsigned char *bptr[19]; uint64_t values[19]; int64_t totalv; secp256k1_scalar_t s; int i; uint8_t r,r2; int inputs; int outputs; int total; OS_randombytes((void *)&r,sizeof(r)); OS_randombytes((void *)&r2,sizeof(r2)); inputs = (r & 7) + 1; outputs = (r2 & 7) + 2; total = inputs + outputs; printf("inputs.%d outputs.%d\n",inputs,outputs); for (i = 0; i < 19; i++) { cptr[i] = &commits[i * 33]; bptr[i] = &blinds[i * 32]; } totalv = 0; for (i = 0; i < inputs; i++) { OS_randombytes((void *)&r,sizeof(r)); values[i] = r; totalv += values[i]; } if (1 ){//rand() & 1) { for (i = 0; i < outputs; i++) { int64_t max = INT64_MAX; if (totalv < 0) { max += totalv; } OS_randombytes((void *)&r,sizeof(r)); values[i + inputs] = r; totalv -= values[i + inputs]; } } else { for (i = 0; i < outputs - 1; i++) { OS_randombytes((void *)&r,sizeof(r)); values[i + inputs] = r; totalv -= values[i + inputs]; } values[total - 1] = totalv >> (rand() & 1); totalv -= values[total - 1]; } for (i = 0; i < total - 1; i++) { random_scalar_order(&s); secp256k1_scalar_get_b32(&blinds[i * 32], &s); } CHECK(secp256k1_pedersen_blind_sum(ctx, &blinds[(total - 1) * 32], bptr, total - 1, inputs)); printf("sum total.%d %lld\n",total,(long long)values[total-1]); for (i = 0; i < total; i++) { printf("%llu ",(long long)values[i]); CHECK(secp256k1_pedersen_commit(ctx, &commits[i * 33], &blinds[i * 32], values[i])); } printf("commits totalv.%lld\n",(long long)totalv); CHECK(secp256k1_pedersen_verify_tally(ctx, cptr, inputs, &cptr[inputs], outputs, totalv)); printf("tally\n"); CHECK(!secp256k1_pedersen_verify_tally(ctx, cptr, inputs, &cptr[inputs], outputs, totalv + 1)); printf("!tally\n"); getchar(); return; for (i = 0; i < 4; i++) { //OS_randombytes(&blinds[i * 32],32); *(bits256 *)&blinds[i * 32] = rand_secp(); } values[0] = INT64_MAX; values[1] = 0; values[2] = 1; for (i = 0; i < 3; i++) { CHECK(secp256k1_pedersen_commit(ctx, &commits[i * 33], &blinds[i * 32], values[i])); } printf("a\n"); CHECK(secp256k1_pedersen_verify_tally(ctx, &cptr[1], 1, &cptr[2], 1, -1)); printf("b\n"); CHECK(secp256k1_pedersen_verify_tally(ctx, &cptr[2], 1, &cptr[1], 1, 1)); printf("c\n"); CHECK(secp256k1_pedersen_verify_tally(ctx, &cptr[0], 1, &cptr[0], 1, 0)); printf("d\n"); CHECK(secp256k1_pedersen_verify_tally(ctx, &cptr[0], 1, &cptr[1], 1, INT64_MAX)); printf("e\n"); CHECK(secp256k1_pedersen_verify_tally(ctx, &cptr[1], 1, &cptr[1], 1, 0)); printf("f\n"); CHECK(secp256k1_pedersen_verify_tally(ctx, &cptr[1], 1, &cptr[0], 1, -INT64_MAX)); printf("g\n"); } #endif*/ void ztest() { #ifdef notnow return; printf("ztests\n"); //test_pedersen(); secp256k1_context_t *ctx; uint8_t commits[13][33],blinds[13][32]; int32_t i,j,ret,retvals[13]; int64_t val,excess = 0; const uint8_t *commitptrs[13],*blindptrs[13]; bits256 s; ctx = secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY); secp256k1_pedersen_context_initialize(ctx); for (j=0; j<13; j++) { blindptrs[j] = blinds[j]; commitptrs[j] = commits[j]; s = rand_secp(); memcpy(blinds[j],s.bytes,sizeof(s)); //OS_randombytes(blinds[j],sizeof(blinds[j])); } ret = secp256k1_pedersen_blind_sum(ctx,blinds[12],blindptrs,12,12); for (i=0; i<32; i++) printf("%02x",blindptrs[12][i]); printf(" blindsum.%d\n",ret); for (j=0; j<13; j++) { val = (j < 12) ? (j + 1) : -excess; while ( 1 ) { retvals[j] = secp256k1_pedersen_commit(ctx,commits[j],blinds[j],val); //if ( commits[j][0] == 0x02 ) break; } if ( j < 12 ) excess += val; for (i=0; i<33; i++) printf("%02x",commits[j][i]); printf(" pederson commit.%d val.%lld\n",retvals[j],(long long)val); } ret = secp256k1_pedersen_verify_tally(ctx,commitptrs,12,&commitptrs[12],1,0); printf("tally.%d vs %lld\n",ret,(long long)excess); //getchar(); #endif }