Skip to content

Commit 9e58040

Browse files
committed
surjectionproof: make sure that n_used_pubkeys > 0 in generate
If the proof was generated with surjectionproof_initialize (as mandated by the API docs), then n_used_pubkeys can never be 0. Without this commit, compilers will (rightfully) warn that borromean_s[ring_input_index] is not initialized in surjectionproof_generate. Therefore, this commit makes sure that n_used_pubkeys is greater than 0 which ensures that the array is initialized at ring_input_index.
1 parent 4fd7e1e commit 9e58040

File tree

2 files changed

+26
-8
lines changed

2 files changed

+26
-8
lines changed

src/modules/surjection/main_impl.h

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -322,6 +322,10 @@ int secp256k1_surjectionproof_generate(const secp256k1_context* ctx, secp256k1_s
322322
/* Compute public keys */
323323
n_total_pubkeys = secp256k1_surjectionproof_n_total_inputs(ctx, proof);
324324
n_used_pubkeys = secp256k1_surjectionproof_n_used_inputs(ctx, proof);
325+
326+
/* This must be true if the proof was created with surjectionproof_initialize */
327+
ARG_CHECK(n_used_pubkeys > 0);
328+
325329
if (n_used_pubkeys > n_total_pubkeys || n_total_pubkeys != n_ephemeral_input_tags) {
326330
return 0;
327331
}

src/modules/surjection/tests_impl.h

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -173,31 +173,45 @@ static void test_surjectionproof_api(void) {
173173
CHECK(secp256k1_surjectionproof_verify(vrfy, &proof, ephemeral_input_tags, n_inputs, NULL) == 0);
174174
CHECK(ecount == 16);
175175

176+
/* Test how surjectionproof_generate fails when the proof was not created
177+
* with surjectionproof_initialize */
178+
ecount = 0;
179+
CHECK(secp256k1_surjectionproof_generate(sign, &proof, ephemeral_input_tags, n_inputs, &ephemeral_output_tag, 0, input_blinding_key[0], output_blinding_key) == 1);
180+
{
181+
secp256k1_surjectionproof tmp_proof = proof;
182+
tmp_proof.n_inputs = 0;
183+
CHECK(secp256k1_surjectionproof_generate(sign, &tmp_proof, ephemeral_input_tags, n_inputs, &ephemeral_output_tag, 0, input_blinding_key[0], output_blinding_key) == 0);
184+
}
185+
CHECK(ecount == 1);
186+
187+
CHECK(secp256k1_surjectionproof_generate(sign, &proof, ephemeral_input_tags, n_inputs, &ephemeral_output_tag, 0, input_blinding_key[0], output_blinding_key) == 1);
188+
176189
/* Check serialize */
190+
ecount = 0;
177191
serialized_len = sizeof(serialized_proof);
178192
CHECK(secp256k1_surjectionproof_serialize(none, serialized_proof, &serialized_len, &proof) != 0);
179-
CHECK(ecount == 16);
193+
CHECK(ecount == 0);
180194
serialized_len = sizeof(serialized_proof);
181195
CHECK(secp256k1_surjectionproof_serialize(none, NULL, &serialized_len, &proof) == 0);
182-
CHECK(ecount == 17);
196+
CHECK(ecount == 1);
183197
serialized_len = sizeof(serialized_proof);
184198
CHECK(secp256k1_surjectionproof_serialize(none, serialized_proof, NULL, &proof) == 0);
185-
CHECK(ecount == 18);
199+
CHECK(ecount == 2);
186200
serialized_len = sizeof(serialized_proof);
187201
CHECK(secp256k1_surjectionproof_serialize(none, serialized_proof, &serialized_len, NULL) == 0);
188-
CHECK(ecount == 19);
202+
CHECK(ecount == 3);
189203

190204
serialized_len = sizeof(serialized_proof);
191205
CHECK(secp256k1_surjectionproof_serialize(none, serialized_proof, &serialized_len, &proof) != 0);
192206
/* Check parse */
193207
CHECK(secp256k1_surjectionproof_parse(none, &proof, serialized_proof, serialized_len) != 0);
194-
CHECK(ecount == 19);
208+
CHECK(ecount == 3);
195209
CHECK(secp256k1_surjectionproof_parse(none, NULL, serialized_proof, serialized_len) == 0);
196-
CHECK(ecount == 20);
210+
CHECK(ecount == 4);
197211
CHECK(secp256k1_surjectionproof_parse(none, &proof, NULL, serialized_len) == 0);
198-
CHECK(ecount == 21);
212+
CHECK(ecount == 5);
199213
CHECK(secp256k1_surjectionproof_parse(none, &proof, serialized_proof, 0) == 0);
200-
CHECK(ecount == 21);
214+
CHECK(ecount == 5);
201215

202216
secp256k1_context_destroy(none);
203217
secp256k1_context_destroy(sign);

0 commit comments

Comments
 (0)