First commit on a late git install
This commit is contained in:
commit
ca6b4754f9
|
@ -0,0 +1,25 @@
|
|||
Trash/
|
||||
cjson/
|
||||
cline_history/
|
||||
libsodium/
|
||||
monocypher-4.0.2/
|
||||
nak/
|
||||
nips/
|
||||
node_modules/
|
||||
nostr-tools/
|
||||
tiny-AES-c/
|
||||
mbedtls/
|
||||
mbedtls-arm64-install/
|
||||
mbedtls-install/
|
||||
secp256k1/
|
||||
Trash/debug_tests/
|
||||
node_modules/
|
||||
|
||||
*.o
|
||||
*.a
|
||||
*.so
|
||||
*.dylib
|
||||
*.dll
|
||||
build/
|
||||
mbedtls-install/
|
||||
mbedtls-arm64-install/
|
|
@ -0,0 +1,88 @@
|
|||
# NOSTR Core Library - Cleanup Report
|
||||
|
||||
## Overview
|
||||
After successfully resolving the NIP-04 ECDH compatibility issues, we performed a comprehensive cleanup of debugging artifacts and temporary files created during the troubleshooting process.
|
||||
|
||||
## Files Moved to Trash/debug_tests/
|
||||
|
||||
### NIP-04 Debug Tests (Created During Troubleshooting)
|
||||
- `aes_debug_test.c/.exe` - AES encryption debugging
|
||||
- `ecdh_debug_test.c/.exe` - ECDH shared secret debugging
|
||||
- `ecdh_x_coordinate_test.c/.exe` - X coordinate extraction testing
|
||||
- `ecdh_comprehensive_debug_test.c/.exe` - Comprehensive ECDH testing
|
||||
- `nip04_decrypt_debug_test.c/.exe` - Decryption specific debugging
|
||||
- `nip04_detailed_debug_test.c/.exe` - Detailed step-by-step debugging
|
||||
- `nip04_ecdh_debug_test.c/.exe` - NIP-04 ECDH specific testing
|
||||
- `nip04_encrypt_only_test.c/.exe` - Encryption-only testing
|
||||
- `nip04_minimal_test.c/.exe` - Minimal test cases
|
||||
- `nip04_simple_test.c/.exe` - Simple test implementation
|
||||
- `nip04_step_by_step_debug_test.c/.exe` - Step-by-step debugging
|
||||
- `decrypt_debug_minimal.c/.exe` - Minimal decryption debugging
|
||||
- `noble_vs_libsecp_comparison.c/.exe` - JavaScript comparison testing
|
||||
|
||||
### Other Debug Files
|
||||
- `debug_bip32.c/.exe` - BIP32 debugging
|
||||
- `debug_bip32_test.c/.exe` - BIP32 test debugging
|
||||
- `frame_debug_test.c/.exe` - Frame debugging
|
||||
- `debug.log` - **9.8GB debug log file** (major space savings!)
|
||||
|
||||
### JavaScript Reference Implementation
|
||||
- `nostr-tools/` - JavaScript reference implementation used for comparison
|
||||
- `nip04.ts` - TypeScript NIP-04 implementation
|
||||
- `debug_nip04.js` - JavaScript debugging script
|
||||
|
||||
## Files Kept (Essential Tests)
|
||||
|
||||
### Core Functionality Tests
|
||||
- `nip04_test.c` - **Main comprehensive NIP-04 test** (our final working test)
|
||||
- `simple_init_test.c` - Basic library initialization test
|
||||
- `nostr_crypto_test.c` - Cryptographic functions test
|
||||
- `nostr_test_bip32.c` - BIP32 HD wallet test
|
||||
- `relay_pool_test.c` - Relay pool functionality test
|
||||
- `sync_test.c` - Synchronization test
|
||||
- `test_pow_loop.c` - Proof of work test
|
||||
|
||||
### Build Infrastructure
|
||||
- `Makefile` - Test compilation rules
|
||||
- `build.tests.sh` - Test build script
|
||||
|
||||
## Key Improvements Made
|
||||
|
||||
### 1. Function Naming Clarity
|
||||
- Added `nostr_schnorr_sign()` - clearly indicates BIP-340 Schnorr signatures
|
||||
- Maintained `nostr_ec_sign()` as legacy wrapper for backward compatibility
|
||||
- **Benefit**: Prevents future confusion between ECDH and signature operations
|
||||
|
||||
### 2. ECDH Compatibility Fix
|
||||
- Fixed ECDH implementation to match NIP-04 specification exactly
|
||||
- Custom hash function that extracts only X coordinate (no hashing)
|
||||
- **Result**: 100% compatible with JavaScript NOSTR ecosystem
|
||||
|
||||
### 3. Memory Management
|
||||
- Fixed buffer overflow issues in NIP-04 decryption
|
||||
- Proper base64 buffer size calculations
|
||||
- Enhanced error handling and cleanup
|
||||
- **Result**: No more segmentation faults
|
||||
|
||||
## Final Test Status
|
||||
|
||||
```
|
||||
✅ nip04_test: PASS (Round-trip + Reference compatibility)
|
||||
✅ Memory management: Fixed (No segfaults)
|
||||
✅ ECDH compatibility: 100% JavaScript ecosystem compatible
|
||||
✅ Function naming: Clear and unambiguous
|
||||
```
|
||||
|
||||
## Space Savings
|
||||
- **Removed 9.8GB debug.log file**
|
||||
- Cleaned up 20+ debugging test files and executables
|
||||
- Organized debugging artifacts in Trash/debug_tests/ for easy reference
|
||||
|
||||
## Secp256k1 Status
|
||||
- Checked for extra debugging code: **CLEAN**
|
||||
- All files are standard libsecp256k1 build artifacts
|
||||
- No cleanup needed
|
||||
|
||||
---
|
||||
|
||||
**The NOSTR core library is now in a clean, production-ready state with fully functional NIP-04 encryption/decryption that's compatible with the broader NOSTR ecosystem!**
|
|
@ -0,0 +1,187 @@
|
|||
cmake_minimum_required(VERSION 3.12)
|
||||
project(nostr_core VERSION 1.0.0 LANGUAGES C)
|
||||
|
||||
# Set C standard
|
||||
set(CMAKE_C_STANDARD 99)
|
||||
set(CMAKE_C_STANDARD_REQUIRED ON)
|
||||
|
||||
# Build options
|
||||
option(NOSTR_BUILD_STATIC "Build static library" ON)
|
||||
option(NOSTR_BUILD_SHARED "Build shared library" ON)
|
||||
option(NOSTR_BUILD_EXAMPLES "Build examples" ON)
|
||||
option(NOSTR_BUILD_TESTS "Build tests" ON)
|
||||
option(NOSTR_ENABLE_WEBSOCKETS "Enable WebSocket support" ON)
|
||||
option(NOSTR_USE_MBEDTLS "Use mbedTLS for crypto (otherwise use built-in)" OFF)
|
||||
|
||||
# Compiler flags
|
||||
if(CMAKE_COMPILER_IS_GNUCC OR CMAKE_C_COMPILER_ID MATCHES "Clang")
|
||||
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Werror")
|
||||
set(CMAKE_C_FLAGS_DEBUG "-g -O0")
|
||||
set(CMAKE_C_FLAGS_RELEASE "-O3 -DNDEBUG")
|
||||
endif()
|
||||
|
||||
# Include directories
|
||||
include_directories(${CMAKE_CURRENT_SOURCE_DIR})
|
||||
include_directories(${CMAKE_CURRENT_SOURCE_DIR}/cjson)
|
||||
|
||||
# Source files
|
||||
set(NOSTR_CORE_SOURCES
|
||||
nostr_core/core.c
|
||||
nostr_core/core_relays.c
|
||||
nostr_core/core_relay_pool.c
|
||||
nostr_core/nostr_crypto.c
|
||||
nostr_core/nostr_secp256k1.c
|
||||
cjson/cJSON.c
|
||||
)
|
||||
|
||||
set(NOSTR_CORE_HEADERS
|
||||
nostr_core.h
|
||||
nostr_crypto.h
|
||||
cjson/cJSON.h
|
||||
)
|
||||
|
||||
# Add mbedTLS if enabled
|
||||
if(NOSTR_USE_MBEDTLS)
|
||||
add_subdirectory(mbedtls)
|
||||
list(APPEND NOSTR_CORE_SOURCES mbedtls_wrapper.c)
|
||||
add_definitions(-DNOSTR_USE_MBEDTLS=1)
|
||||
endif()
|
||||
|
||||
# Add WebSocket support if enabled
|
||||
if(NOSTR_ENABLE_WEBSOCKETS)
|
||||
file(GLOB WEBSOCKET_SOURCES "nostr_websocket/*.c")
|
||||
file(GLOB WEBSOCKET_HEADERS "nostr_websocket/*.h")
|
||||
list(APPEND NOSTR_CORE_SOURCES ${WEBSOCKET_SOURCES})
|
||||
list(APPEND NOSTR_CORE_HEADERS ${WEBSOCKET_HEADERS})
|
||||
add_definitions(-DNOSTR_ENABLE_WEBSOCKETS=1)
|
||||
endif()
|
||||
|
||||
# Create static library
|
||||
if(NOSTR_BUILD_STATIC)
|
||||
add_library(nostr_core_static STATIC ${NOSTR_CORE_SOURCES})
|
||||
set_target_properties(nostr_core_static PROPERTIES OUTPUT_NAME nostr_core)
|
||||
target_link_libraries(nostr_core_static m)
|
||||
|
||||
if(NOSTR_USE_MBEDTLS)
|
||||
target_link_libraries(nostr_core_static mbedcrypto mbedx509 mbedtls)
|
||||
endif()
|
||||
endif()
|
||||
|
||||
# Create shared library
|
||||
if(NOSTR_BUILD_SHARED)
|
||||
add_library(nostr_core_shared SHARED ${NOSTR_CORE_SOURCES})
|
||||
set_target_properties(nostr_core_shared PROPERTIES OUTPUT_NAME nostr_core)
|
||||
target_link_libraries(nostr_core_shared m)
|
||||
|
||||
if(NOSTR_USE_MBEDTLS)
|
||||
target_link_libraries(nostr_core_shared mbedcrypto mbedx509 mbedtls)
|
||||
endif()
|
||||
|
||||
# Set version information
|
||||
set_target_properties(nostr_core_shared PROPERTIES
|
||||
VERSION ${PROJECT_VERSION}
|
||||
SOVERSION 1
|
||||
)
|
||||
endif()
|
||||
|
||||
# Create alias targets for easier integration
|
||||
if(NOSTR_BUILD_STATIC)
|
||||
add_library(nostr_core::static ALIAS nostr_core_static)
|
||||
endif()
|
||||
|
||||
if(NOSTR_BUILD_SHARED)
|
||||
add_library(nostr_core::shared ALIAS nostr_core_shared)
|
||||
endif()
|
||||
|
||||
# Examples
|
||||
if(NOSTR_BUILD_EXAMPLES)
|
||||
add_subdirectory(examples)
|
||||
endif()
|
||||
|
||||
# Tests
|
||||
if(NOSTR_BUILD_TESTS)
|
||||
enable_testing()
|
||||
add_subdirectory(tests)
|
||||
endif()
|
||||
|
||||
# Installation
|
||||
include(GNUInstallDirs)
|
||||
|
||||
# Install libraries
|
||||
if(NOSTR_BUILD_STATIC)
|
||||
install(TARGETS nostr_core_static
|
||||
ARCHIVE DESTINATION ${CMAKE_INSTALL_LIBDIR}
|
||||
)
|
||||
endif()
|
||||
|
||||
if(NOSTR_BUILD_SHARED)
|
||||
install(TARGETS nostr_core_shared
|
||||
LIBRARY DESTINATION ${CMAKE_INSTALL_LIBDIR}
|
||||
RUNTIME DESTINATION ${CMAKE_INSTALL_BINDIR}
|
||||
)
|
||||
endif()
|
||||
|
||||
# Install headers
|
||||
install(FILES ${NOSTR_CORE_HEADERS}
|
||||
DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}/nostr
|
||||
)
|
||||
|
||||
# Install pkg-config file
|
||||
configure_file(nostr_core.pc.in nostr_core.pc @ONLY)
|
||||
install(FILES ${CMAKE_CURRENT_BINARY_DIR}/nostr_core.pc
|
||||
DESTINATION ${CMAKE_INSTALL_LIBDIR}/pkgconfig
|
||||
)
|
||||
|
||||
# Generate export configuration
|
||||
include(CMakePackageConfigHelpers)
|
||||
|
||||
configure_package_config_file(
|
||||
${CMAKE_CURRENT_SOURCE_DIR}/cmake/nostr_core-config.cmake.in
|
||||
${CMAKE_CURRENT_BINARY_DIR}/nostr_core-config.cmake
|
||||
INSTALL_DESTINATION ${CMAKE_INSTALL_LIBDIR}/cmake/nostr_core
|
||||
)
|
||||
|
||||
write_basic_package_version_file(
|
||||
${CMAKE_CURRENT_BINARY_DIR}/nostr_core-config-version.cmake
|
||||
VERSION ${PROJECT_VERSION}
|
||||
COMPATIBILITY SameMajorVersion
|
||||
)
|
||||
|
||||
install(FILES
|
||||
${CMAKE_CURRENT_BINARY_DIR}/nostr_core-config.cmake
|
||||
${CMAKE_CURRENT_BINARY_DIR}/nostr_core-config-version.cmake
|
||||
DESTINATION ${CMAKE_INSTALL_LIBDIR}/cmake/nostr_core
|
||||
)
|
||||
|
||||
# Export targets
|
||||
if(NOSTR_BUILD_STATIC OR NOSTR_BUILD_SHARED)
|
||||
set(EXPORT_TARGETS "")
|
||||
if(NOSTR_BUILD_STATIC)
|
||||
list(APPEND EXPORT_TARGETS nostr_core_static)
|
||||
endif()
|
||||
if(NOSTR_BUILD_SHARED)
|
||||
list(APPEND EXPORT_TARGETS nostr_core_shared)
|
||||
endif()
|
||||
|
||||
install(EXPORT nostr_core-targets
|
||||
FILE nostr_core-targets.cmake
|
||||
NAMESPACE nostr_core::
|
||||
DESTINATION ${CMAKE_INSTALL_LIBDIR}/cmake/nostr_core
|
||||
)
|
||||
|
||||
export(TARGETS ${EXPORT_TARGETS}
|
||||
FILE ${CMAKE_CURRENT_BINARY_DIR}/nostr_core-targets.cmake
|
||||
NAMESPACE nostr_core::
|
||||
)
|
||||
endif()
|
||||
|
||||
# Summary
|
||||
message(STATUS "NOSTR Core Library Configuration:")
|
||||
message(STATUS " Version: ${PROJECT_VERSION}")
|
||||
message(STATUS " Build static library: ${NOSTR_BUILD_STATIC}")
|
||||
message(STATUS " Build shared library: ${NOSTR_BUILD_SHARED}")
|
||||
message(STATUS " Build examples: ${NOSTR_BUILD_EXAMPLES}")
|
||||
message(STATUS " Build tests: ${NOSTR_BUILD_TESTS}")
|
||||
message(STATUS " Enable WebSockets: ${NOSTR_ENABLE_WEBSOCKETS}")
|
||||
message(STATUS " Use mbedTLS: ${NOSTR_USE_MBEDTLS}")
|
||||
message(STATUS " Install prefix: ${CMAKE_INSTALL_PREFIX}")
|
|
@ -0,0 +1,309 @@
|
|||
# Exportable C NOSTR Library Design Guide
|
||||
|
||||
This document outlines the design principles and structure for making the C NOSTR library easily exportable and reusable across multiple projects.
|
||||
|
||||
## Overview
|
||||
|
||||
The C NOSTR library is designed as a modular, self-contained implementation that can be easily integrated into other projects while maintaining compatibility with the broader NOSTR ecosystem.
|
||||
|
||||
## Design Principles
|
||||
|
||||
### 1. Modular Architecture
|
||||
- **Core Layer**: Essential NOSTR functionality (`nostr_core.c/h`)
|
||||
- **Crypto Layer**: Self-contained cryptographic primitives (`nostr_crypto.c/h`)
|
||||
- **WebSocket Layer**: Optional networking functionality (`nostr_websocket/`)
|
||||
- **Dependencies**: Minimal external dependencies (only cJSON and mbedTLS)
|
||||
|
||||
### 2. Clean API Surface
|
||||
- Consistent function naming with `nostr_` prefix
|
||||
- Clear return codes using `NOSTR_SUCCESS`/`NOSTR_ERROR_*` constants
|
||||
- Well-documented function signatures
|
||||
- No global state where possible
|
||||
|
||||
### 3. Self-Contained Crypto
|
||||
- Custom implementations of SHA-256, HMAC, secp256k1
|
||||
- BIP39 wordlist embedded in code
|
||||
- No external crypto library dependencies for core functionality
|
||||
- Optional mbedTLS integration for enhanced security
|
||||
|
||||
### 4. Cross-Platform Compatibility
|
||||
- Standard C99 code
|
||||
- Platform-specific code isolated in separate modules
|
||||
- ARM64 and x86_64 tested builds
|
||||
- Static library compilation support
|
||||
|
||||
## Library Structure
|
||||
|
||||
```
|
||||
c_nostr/
|
||||
├── nostr_core.h # High-level API
|
||||
├── nostr_core.c # Implementation
|
||||
├── nostr_crypto.h # Crypto primitives API
|
||||
├── nostr_crypto.c # Self-contained crypto
|
||||
├── libnostr_core.a # Static library (x86_64)
|
||||
├── libnostr_core.so # Shared library (x86_64)
|
||||
├── cjson/ # JSON parsing (vendored)
|
||||
├── mbedtls/ # Optional crypto backend
|
||||
├── examples/ # Usage examples
|
||||
├── tests/ # Test suites
|
||||
└── nostr_websocket/ # Optional WebSocket layer
|
||||
```
|
||||
|
||||
## Integration Methods
|
||||
|
||||
### Method 1: Static Library Linking
|
||||
|
||||
**Best for**: Applications that want a single binary with all NOSTR functionality embedded.
|
||||
|
||||
```bash
|
||||
# Build the library
|
||||
make lib
|
||||
|
||||
# In your project Makefile:
|
||||
CFLAGS += -I/path/to/c_nostr
|
||||
LDFLAGS += -L/path/to/c_nostr -lnostr_core -lm -static
|
||||
```
|
||||
|
||||
**Usage:**
|
||||
```c
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
unsigned char private_key[32], public_key[32];
|
||||
nostr_generate_keypair(private_key, public_key);
|
||||
|
||||
cJSON* event = nostr_create_text_event("Hello NOSTR!", private_key);
|
||||
// ... use event
|
||||
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
### Method 2: Source Code Integration
|
||||
|
||||
**Best for**: Applications that want to customize the crypto backend or minimize dependencies.
|
||||
|
||||
```bash
|
||||
# Copy essential files to your project:
|
||||
cp nostr_core.{c,h} your_project/src/
|
||||
cp nostr_crypto.{c,h} your_project/src/
|
||||
cp -r cjson/ your_project/src/
|
||||
```
|
||||
|
||||
**Compile with your project:**
|
||||
```c
|
||||
// In your source
|
||||
#include "nostr_core.h"
|
||||
// Use NOSTR functions directly
|
||||
```
|
||||
|
||||
### Method 3: Git Submodule
|
||||
|
||||
**Best for**: Projects that want to track upstream changes and contribute back.
|
||||
|
||||
```bash
|
||||
# In your project root:
|
||||
git submodule add https://github.com/yourorg/c_nostr.git deps/c_nostr
|
||||
git submodule update --init --recursive
|
||||
|
||||
# In your Makefile:
|
||||
CFLAGS += -Ideps/c_nostr
|
||||
LDFLAGS += -Ldeps/c_nostr -lnostr_core
|
||||
```
|
||||
|
||||
### Method 4: Shared Library
|
||||
|
||||
**Best for**: System-wide installation or multiple applications sharing the same NOSTR implementation.
|
||||
|
||||
```bash
|
||||
# Install system-wide
|
||||
sudo make install
|
||||
|
||||
# In your project:
|
||||
CFLAGS += $(pkg-config --cflags nostr_core)
|
||||
LDFLAGS += $(pkg-config --libs nostr_core)
|
||||
```
|
||||
|
||||
## API Design for Exportability
|
||||
|
||||
### Consistent Error Handling
|
||||
```c
|
||||
typedef enum {
|
||||
NOSTR_SUCCESS = 0,
|
||||
NOSTR_ERROR_INVALID_INPUT = -1,
|
||||
NOSTR_ERROR_CRYPTO_FAILED = -2,
|
||||
NOSTR_ERROR_MEMORY_ALLOCATION = -3,
|
||||
NOSTR_ERROR_JSON_PARSE = -4,
|
||||
NOSTR_ERROR_NETWORK = -5
|
||||
} nostr_error_t;
|
||||
|
||||
const char* nostr_strerror(int error_code);
|
||||
```
|
||||
|
||||
### Clean Resource Management
|
||||
```c
|
||||
// Always provide cleanup functions
|
||||
int nostr_init(void);
|
||||
void nostr_cleanup(void);
|
||||
|
||||
// JSON objects returned should be freed by caller
|
||||
cJSON* nostr_create_text_event(const char* content, const unsigned char* private_key);
|
||||
// Caller must call cJSON_Delete(event) when done
|
||||
```
|
||||
|
||||
### Optional Features
|
||||
```c
|
||||
// Compile-time feature toggles
|
||||
#ifndef NOSTR_DISABLE_WEBSOCKETS
|
||||
int nostr_connect_relay(const char* url);
|
||||
#endif
|
||||
|
||||
#ifndef NOSTR_DISABLE_IDENTITY_PERSISTENCE
|
||||
int nostr_save_identity(const unsigned char* private_key, const char* password, int account);
|
||||
#endif
|
||||
```
|
||||
|
||||
## Configuration System
|
||||
|
||||
### Build-Time Configuration
|
||||
```c
|
||||
// nostr_config.h (generated during build)
|
||||
#define NOSTR_VERSION "1.0.0"
|
||||
#define NOSTR_HAS_MBEDTLS 1
|
||||
#define NOSTR_HAS_WEBSOCKETS 1
|
||||
#define NOSTR_STATIC_BUILD 1
|
||||
```
|
||||
|
||||
### Runtime Configuration
|
||||
```c
|
||||
typedef struct {
|
||||
int log_level;
|
||||
char* identity_file_path;
|
||||
int default_account;
|
||||
int enable_networking;
|
||||
} nostr_config_t;
|
||||
|
||||
int nostr_set_config(const nostr_config_t* config);
|
||||
const nostr_config_t* nostr_get_config(void);
|
||||
```
|
||||
|
||||
## Testing and Validation
|
||||
|
||||
### Ecosystem Compatibility Testing
|
||||
The library includes comprehensive test suites that validate compatibility with reference implementations like `nak`:
|
||||
|
||||
```bash
|
||||
# Run all tests
|
||||
cd tests && make test
|
||||
|
||||
# Test specific functionality
|
||||
make test-crypto # Cryptographic primitives
|
||||
make test-core # High-level NOSTR functions
|
||||
```
|
||||
|
||||
### Test Vectors
|
||||
Real-world test vectors are generated using `nak` to ensure ecosystem compatibility:
|
||||
- Key generation and derivation (BIP39/BIP32)
|
||||
- Event creation and signing
|
||||
- Bech32 encoding/decoding
|
||||
- Message serialization
|
||||
|
||||
## Documentation for Exporters
|
||||
|
||||
### Essential Files Checklist
|
||||
For projects integrating this library, you need:
|
||||
|
||||
**Core Files (Required):**
|
||||
- `nostr_core.h` - Main API
|
||||
- `nostr_core.c` - Implementation
|
||||
- `nostr_crypto.h` - Crypto API
|
||||
- `nostr_crypto.c` - Self-contained crypto
|
||||
- `cjson/` directory - JSON parsing
|
||||
|
||||
**Optional Files:**
|
||||
- `nostr_websocket/` - WebSocket relay support
|
||||
- `mbedtls/` - Enhanced crypto backend
|
||||
- `examples/` - Usage examples
|
||||
- `tests/` - Validation tests
|
||||
|
||||
### Minimal Integration Example
|
||||
```c
|
||||
// minimal_nostr.c - Smallest possible integration
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
// Initialize library
|
||||
nostr_init();
|
||||
|
||||
// Generate keypair
|
||||
unsigned char priv[32], pub[32];
|
||||
nostr_generate_keypair(priv, pub);
|
||||
|
||||
// Create and sign event
|
||||
cJSON* event = nostr_create_text_event("Hello from my app!", priv);
|
||||
char* json_string = cJSON_Print(event);
|
||||
printf("Event: %s\n", json_string);
|
||||
|
||||
// Cleanup
|
||||
free(json_string);
|
||||
cJSON_Delete(event);
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
**Compile:**
|
||||
```bash
|
||||
gcc -I. minimal_nostr.c nostr_core.c nostr_crypto.c cjson/cJSON.c -lm -o minimal_nostr
|
||||
```
|
||||
|
||||
## Future Considerations
|
||||
|
||||
### Language Bindings
|
||||
The C library is designed to be easily wrapped:
|
||||
- **Python**: Use ctypes or cffi
|
||||
- **JavaScript**: Use Node.js FFI or WASM compilation
|
||||
- **Go**: Use cgo
|
||||
- **Rust**: Use bindgen for FFI bindings
|
||||
|
||||
### WebAssembly Support
|
||||
The library can be compiled to WebAssembly for browser usage:
|
||||
```bash
|
||||
emcc -O3 -s WASM=1 -s EXPORTED_FUNCTIONS='["_nostr_init", "_nostr_generate_keypair"]' \
|
||||
nostr_core.c nostr_crypto.c cjson/cJSON.c -o nostr.wasm
|
||||
```
|
||||
|
||||
### Package Manager Support
|
||||
Future versions may include:
|
||||
- pkgconfig files for system installation
|
||||
- CMake integration for easier builds
|
||||
- vcpkg/Conan package definitions
|
||||
|
||||
## Contributing Back
|
||||
|
||||
Projects using this library are encouraged to:
|
||||
1. Report compatibility issues
|
||||
2. Submit test vectors from their use cases
|
||||
3. Contribute performance improvements
|
||||
4. Add support for additional NIPs
|
||||
|
||||
## Version Compatibility
|
||||
|
||||
The library follows semantic versioning:
|
||||
- **Major**: Breaking API changes
|
||||
- **Minor**: New features, backward compatible
|
||||
- **Patch**: Bug fixes
|
||||
|
||||
API stability guarantees:
|
||||
- All functions prefixed with `nostr_` are part of the stable API
|
||||
- Internal functions (static or prefixed with `_`) may change
|
||||
- Configuration structures may be extended but not modified
|
||||
|
||||
---
|
||||
|
||||
This design ensures the C NOSTR library can be easily adopted by other projects while maintaining high compatibility with the NOSTR ecosystem standards.
|
|
@ -0,0 +1,29 @@
|
|||
# c-nostr Export and Implementation Guide
|
||||
|
||||
## Overview
|
||||
|
||||
This guide provides essential information for developers using the `c-nostr` library, particularly regarding the capabilities and limitations of its self-contained modules, such as the HTTP client.
|
||||
|
||||
## HTTP Client (`http_client.c`)
|
||||
|
||||
The `http_client` module is a lightweight, self-contained HTTP/HTTPS client designed for simple and direct web requests. It is ideal for tasks like fetching NIP-11 information from Nostr relays or interacting with standard, permissive web APIs.
|
||||
|
||||
### Key Features
|
||||
|
||||
* **Self-Contained**: It is built with `mbedTLS` and has no external dependencies beyond standard C libraries, making it highly portable.
|
||||
* **Simplicity**: It provides a straightforward `http_get()` function for making web requests.
|
||||
* **TLS Support**: It supports HTTPS and basic TLS 1.3/1.2 features, including SNI (Server Name Indication) and ALPN (Application-Layer Protocol Negotiation).
|
||||
|
||||
### Limitations
|
||||
|
||||
The `http_client` is intentionally simple and is **not a full-featured web browser**. Due to its minimalist design, it will likely be blocked by websites that employ advanced anti-bot protection systems.
|
||||
|
||||
* **Incompatibility with Advanced Bot Protection**: Sites like Google, Cloudflare, and others use sophisticated fingerprinting techniques to distinguish between real browsers and automated clients. They analyze the exact combination of TLS cipher suites, TLS extensions, and HTTP headers. Our client's fingerprint does not match a standard browser, so these sites will preemptively drop the connection, typically resulting in a `HTTP_ERROR_NETWORK` error.
|
||||
|
||||
* **Intended Use Case**: This client is best suited for interacting with known, friendly APIs and Nostr relays. It is **not** designed for general web scraping or for accessing services that are heavily guarded against automated traffic.
|
||||
|
||||
### Best Practices
|
||||
|
||||
* **Use for APIs and Relays**: Rely on this client for fetching data from well-defined, public endpoints that do not have aggressive bot-detection measures in place.
|
||||
* **Avoid Protected Sites**: Do not attempt to use this client to access services like Google Search, as such attempts will fail. For those use cases, a full-featured library like `libcurl` or a dedicated web-scraping framework is required.
|
||||
* **Check the Test Suite**: The `tests/http_client_test.c` file contains test cases that demonstrate both the successful use cases (e.g., `httpbin.org`) and the expected failures (e.g., `google.com`), providing a clear reference for the client's capabilities.
|
|
@ -0,0 +1,266 @@
|
|||
# NOSTR Core Library - Usage Guide
|
||||
|
||||
## Overview
|
||||
|
||||
The NOSTR Core Library (`libnostr_core`) is a self-contained, exportable C library for NOSTR protocol implementation. It requires **no external cryptographic dependencies** (no OpenSSL, no libwally) and can be easily integrated into other projects.
|
||||
|
||||
## Key Features
|
||||
|
||||
- **Self-Contained Crypto**: All cryptographic operations implemented from scratch
|
||||
- **Zero External Dependencies**: Only requires standard C library, cJSON, and libwebsockets
|
||||
- **Cross-Platform**: Builds on Linux, macOS, Windows (with appropriate toolchain)
|
||||
- **NIP-06 Compliant**: Proper BIP39/BIP32 implementation for key derivation
|
||||
- **Thread-Safe**: Core cryptographic functions are stateless and thread-safe
|
||||
- **Easy Integration**: Simple C API with clear error handling
|
||||
|
||||
## File Structure for Export
|
||||
|
||||
### Core Library Files (Required)
|
||||
```
|
||||
libnostr_core/
|
||||
├── nostr_core.h # Main public API header
|
||||
├── nostr_core.c # Core implementation
|
||||
├── nostr_crypto.h # Crypto implementation header
|
||||
├── nostr_crypto.c # Self-contained crypto implementation
|
||||
├── Makefile # Build configuration
|
||||
└── cjson/ # JSON library (can be replaced with system cJSON)
|
||||
├── cJSON.h
|
||||
└── cJSON.c
|
||||
```
|
||||
|
||||
### Optional Files
|
||||
```
|
||||
├── examples/ # Usage examples (helpful for integration)
|
||||
├── LIBRARY_USAGE.md # This usage guide
|
||||
├── SELF_CONTAINED_CRYPTO.md # Crypto implementation details
|
||||
└── CROSS_PLATFORM_GUIDE.md # Platform-specific build notes
|
||||
```
|
||||
|
||||
## Integration Methods
|
||||
|
||||
### Method 1: Static Library Integration
|
||||
|
||||
1. **Copy Required Files**:
|
||||
```bash
|
||||
cp nostr_core.h nostr_core.c nostr_crypto.h nostr_crypto.c /path/to/your/project/
|
||||
cp -r cjson/ /path/to/your/project/
|
||||
```
|
||||
|
||||
2. **Build Static Library**:
|
||||
```bash
|
||||
gcc -c -fPIC nostr_core.c nostr_crypto.c cjson/cJSON.c
|
||||
ar rcs libnostr_core.a nostr_core.o nostr_crypto.o cJSON.o
|
||||
```
|
||||
|
||||
3. **Link in Your Project**:
|
||||
```bash
|
||||
gcc your_project.c -L. -lnostr_core -lm -o your_project
|
||||
```
|
||||
|
||||
### Method 2: Direct Source Integration
|
||||
|
||||
Simply include the source files directly in your project:
|
||||
|
||||
```c
|
||||
// In your project
|
||||
#include "nostr_core.h"
|
||||
|
||||
// Compile with:
|
||||
// gcc your_project.c nostr_core.c nostr_crypto.c cjson/cJSON.c -lm
|
||||
```
|
||||
|
||||
### Method 3: Shared Library Integration
|
||||
|
||||
1. **Build Shared Library**:
|
||||
```bash
|
||||
make libnostr_core.so
|
||||
```
|
||||
|
||||
2. **Install System-Wide** (optional):
|
||||
```bash
|
||||
sudo cp libnostr_core.so /usr/local/lib/
|
||||
sudo cp nostr_core.h /usr/local/include/
|
||||
sudo ldconfig
|
||||
```
|
||||
|
||||
3. **Use in Projects**:
|
||||
```bash
|
||||
gcc your_project.c -lnostr_core -lm
|
||||
```
|
||||
|
||||
## Basic Usage Example
|
||||
|
||||
```c
|
||||
#include "nostr_core.h"
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
int main() {
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate a keypair
|
||||
unsigned char private_key[32];
|
||||
unsigned char public_key[32];
|
||||
|
||||
if (nostr_generate_keypair(private_key, public_key) != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to generate keypair\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Convert to hex and bech32
|
||||
char private_hex[65], public_hex[65];
|
||||
char nsec[100], npub[100];
|
||||
|
||||
nostr_bytes_to_hex(private_key, 32, private_hex);
|
||||
nostr_bytes_to_hex(public_key, 32, public_hex);
|
||||
nostr_key_to_bech32(private_key, "nsec", nsec);
|
||||
nostr_key_to_bech32(public_key, "npub", npub);
|
||||
|
||||
printf("Private Key: %s\n", private_hex);
|
||||
printf("Public Key: %s\n", public_hex);
|
||||
printf("nsec: %s\n", nsec);
|
||||
printf("npub: %s\n", npub);
|
||||
|
||||
// Create and sign an event
|
||||
cJSON* event = nostr_create_text_event("Hello NOSTR!", private_key);
|
||||
if (event) {
|
||||
char* event_json = cJSON_Print(event);
|
||||
printf("Signed Event: %s\n", event_json);
|
||||
free(event_json);
|
||||
cJSON_Delete(event);
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
## Dependency Management
|
||||
|
||||
### Required Dependencies
|
||||
- **Standard C Library**: malloc, string functions, file I/O
|
||||
- **Math Library**: `-lm` (for cryptographic calculations)
|
||||
- **cJSON**: JSON parsing (included, or use system version)
|
||||
|
||||
### Optional Dependencies
|
||||
- **libwebsockets**: Only needed for relay communication functions
|
||||
- **System cJSON**: Can replace bundled version
|
||||
|
||||
### Minimal Integration (Crypto Only)
|
||||
If you only need key generation and signing:
|
||||
|
||||
```bash
|
||||
# Build with minimal dependencies
|
||||
gcc -DNOSTR_CRYPTO_ONLY your_project.c nostr_crypto.c -lm
|
||||
```
|
||||
|
||||
## Cross-Platform Considerations
|
||||
|
||||
### Linux
|
||||
- Works out of the box with GCC
|
||||
- Install build-essential: `sudo apt install build-essential`
|
||||
|
||||
### macOS
|
||||
- Works with Xcode command line tools
|
||||
- May need: `xcode-select --install`
|
||||
|
||||
### Windows
|
||||
- Use MinGW-w64 or MSYS2
|
||||
- Or integrate with Visual Studio project
|
||||
|
||||
### Embedded Systems
|
||||
- Library is designed to work on resource-constrained systems
|
||||
- No heap allocations in core crypto functions
|
||||
- Stack usage is predictable and bounded
|
||||
|
||||
## API Reference
|
||||
|
||||
### Initialization
|
||||
```c
|
||||
int nostr_init(void); // Initialize library
|
||||
void nostr_cleanup(void); // Cleanup resources
|
||||
const char* nostr_strerror(int error); // Get error string
|
||||
```
|
||||
|
||||
### Key Generation
|
||||
```c
|
||||
int nostr_generate_keypair(unsigned char* private_key, unsigned char* public_key);
|
||||
int nostr_generate_mnemonic_and_keys(char* mnemonic, size_t mnemonic_size,
|
||||
int account, unsigned char* private_key,
|
||||
unsigned char* public_key);
|
||||
int nostr_derive_keys_from_mnemonic(const char* mnemonic, int account,
|
||||
unsigned char* private_key, unsigned char* public_key);
|
||||
```
|
||||
|
||||
### Event Creation
|
||||
```c
|
||||
cJSON* nostr_create_text_event(const char* content, const unsigned char* private_key);
|
||||
cJSON* nostr_create_profile_event(const char* name, const char* about,
|
||||
const unsigned char* private_key);
|
||||
int nostr_sign_event(cJSON* event, const unsigned char* private_key);
|
||||
```
|
||||
|
||||
### Utilities
|
||||
```c
|
||||
void nostr_bytes_to_hex(const unsigned char* bytes, size_t len, char* hex);
|
||||
int nostr_hex_to_bytes(const char* hex, unsigned char* bytes, size_t len);
|
||||
int nostr_key_to_bech32(const unsigned char* key, const char* hrp, char* output);
|
||||
nostr_input_type_t nostr_detect_input_type(const char* input);
|
||||
```
|
||||
|
||||
## Error Handling
|
||||
|
||||
All functions return standardized error codes:
|
||||
|
||||
- `NOSTR_SUCCESS` (0): Operation successful
|
||||
- `NOSTR_ERROR_INVALID_INPUT` (-1): Invalid parameters
|
||||
- `NOSTR_ERROR_CRYPTO_FAILED` (-2): Cryptographic operation failed
|
||||
- `NOSTR_ERROR_MEMORY_FAILED` (-3): Memory allocation failed
|
||||
- `NOSTR_ERROR_IO_FAILED` (-4): File I/O operation failed
|
||||
- `NOSTR_ERROR_NETWORK_FAILED` (-5): Network operation failed
|
||||
|
||||
## Security Considerations
|
||||
|
||||
1. **Private Key Handling**: Always clear private keys from memory when done
|
||||
2. **Random Number Generation**: Uses `/dev/urandom` on Unix systems
|
||||
3. **Memory Safety**: All buffers are bounds-checked
|
||||
4. **Constant-Time Operations**: Critical crypto operations are timing-attack resistant
|
||||
|
||||
## Testing Your Integration
|
||||
|
||||
Use the provided examples to verify your integration:
|
||||
|
||||
```bash
|
||||
# Test key generation
|
||||
./examples/simple_keygen
|
||||
|
||||
# Test mnemonic functionality
|
||||
./examples/mnemonic_generation
|
||||
|
||||
# Test event creation
|
||||
./examples/text_event
|
||||
|
||||
# Test all functionality
|
||||
./examples/utility_functions
|
||||
```
|
||||
|
||||
## Support and Documentation
|
||||
|
||||
- See `examples/` directory for comprehensive usage examples
|
||||
- Check `SELF_CONTAINED_CRYPTO.md` for cryptographic implementation details
|
||||
- Review `CROSS_PLATFORM_GUIDE.md` for platform-specific notes
|
||||
- All functions are documented in `nostr_core.h`
|
||||
|
||||
## License
|
||||
|
||||
This library is designed to be freely integrable into other projects. Check the individual file headers for specific licensing information.
|
||||
|
||||
---
|
||||
|
||||
**Quick Start**: Copy `nostr_core.h`, `nostr_core.c`, `nostr_crypto.h`, `nostr_crypto.c`, and the `cjson/` folder to your project, then compile with `-lm`. That's it!
|
|
@ -0,0 +1,142 @@
|
|||
# NOSTR Core Library Makefile
|
||||
# Standalone library build system
|
||||
|
||||
CC = gcc
|
||||
AR = ar
|
||||
CFLAGS = -Wall -Wextra -std=c99 -fPIC -O2
|
||||
DEBUG_CFLAGS = -Wall -Wextra -std=c99 -fPIC -g -DDEBUG
|
||||
STATIC_CFLAGS = -Wall -Wextra -std=c99 -O2 -static
|
||||
|
||||
# Logging compile flags
|
||||
LOGGING_FLAGS ?= -DENABLE_FILE_LOGGING -DENABLE_WEBSOCKET_LOGGING -DENABLE_DEBUG_LOGGING
|
||||
ifneq ($(ENABLE_LOGGING),)
|
||||
LOGGING_FLAGS += -DENABLE_FILE_LOGGING -DENABLE_WEBSOCKET_LOGGING -DENABLE_DEBUG_LOGGING
|
||||
endif
|
||||
|
||||
# Include paths
|
||||
INCLUDES = -I. -Inostr_core -Icjson -Isecp256k1/include
|
||||
|
||||
# Library source files
|
||||
LIB_SOURCES = nostr_core/core.c nostr_core/core_relays.c nostr_core/nostr_crypto.c nostr_core/nostr_secp256k1.c nostr_core/nostr_aes.c nostr_core/nostr_chacha20.c cjson/cJSON.c
|
||||
LIB_OBJECTS = $(LIB_SOURCES:.c=.o)
|
||||
ARM64_LIB_OBJECTS = $(LIB_SOURCES:.c=.arm64.o)
|
||||
|
||||
# Library outputs (static only)
|
||||
STATIC_LIB = libnostr_core.a
|
||||
ARM64_STATIC_LIB = libnostr_core_arm64.a
|
||||
|
||||
# Example files
|
||||
EXAMPLE_SOURCES = $(wildcard examples/*.c)
|
||||
EXAMPLE_TARGETS = $(EXAMPLE_SOURCES:.c=)
|
||||
|
||||
# Default target - build static library
|
||||
default: $(STATIC_LIB)
|
||||
|
||||
# Build all targets (static only)
|
||||
all: $(STATIC_LIB) examples
|
||||
|
||||
# Static library
|
||||
$(STATIC_LIB): $(LIB_OBJECTS)
|
||||
@echo "Creating static library: $@"
|
||||
$(AR) rcs $@ $^
|
||||
|
||||
# ARM64 cross-compilation settings
|
||||
ARM64_CC = aarch64-linux-gnu-gcc
|
||||
ARM64_AR = aarch64-linux-gnu-ar
|
||||
ARM64_INCLUDES = -I. -Inostr_core -Icjson
|
||||
|
||||
# ARM64 static library
|
||||
$(ARM64_STATIC_LIB): $(ARM64_LIB_OBJECTS)
|
||||
@echo "Creating ARM64 static library: $@"
|
||||
$(ARM64_AR) rcs $@ $^
|
||||
|
||||
|
||||
# Object files (x86_64)
|
||||
%.o: %.c
|
||||
@echo "Compiling: $<"
|
||||
$(CC) $(CFLAGS) $(LOGGING_FLAGS) $(INCLUDES) -c $< -o $@
|
||||
|
||||
# ARM64 object files
|
||||
%.arm64.o: %.c
|
||||
@echo "Compiling for ARM64: $<"
|
||||
$(ARM64_CC) $(CFLAGS) $(LOGGING_FLAGS) $(ARM64_INCLUDES) -c $< -o $@
|
||||
|
||||
# Examples
|
||||
examples: $(EXAMPLE_TARGETS)
|
||||
|
||||
examples/%: examples/%.c $(STATIC_LIB)
|
||||
@echo "Building example: $@"
|
||||
$(CC) $(STATIC_CFLAGS) $(LOGGING_FLAGS) $(INCLUDES) $< -o $@ ./libnostr_core.a ./secp256k1/.libs/libsecp256k1.a -lm
|
||||
|
||||
# ARM64 targets
|
||||
arm64: $(ARM64_STATIC_LIB)
|
||||
arm64-all: $(ARM64_STATIC_LIB)
|
||||
|
||||
# Debug build
|
||||
debug: CFLAGS = $(DEBUG_CFLAGS)
|
||||
debug: clean default
|
||||
|
||||
# Install library to system (static only)
|
||||
install: $(STATIC_LIB)
|
||||
@echo "Installing static library..."
|
||||
sudo cp $(STATIC_LIB) /usr/local/lib/
|
||||
sudo cp nostr_core/nostr_core.h /usr/local/include/
|
||||
sudo cp nostr_core/nostr_crypto.h /usr/local/include/
|
||||
|
||||
# Uninstall library
|
||||
uninstall:
|
||||
@echo "Uninstalling library..."
|
||||
sudo rm -f /usr/local/lib/$(STATIC_LIB)
|
||||
sudo rm -f /usr/local/include/nostr_core.h
|
||||
sudo rm -f /usr/local/include/nostr_crypto.h
|
||||
|
||||
# Test the library
|
||||
test: examples/simple_keygen
|
||||
@echo "Running simple key generation test..."
|
||||
./examples/simple_keygen
|
||||
|
||||
# Run crypto tests
|
||||
test-crypto:
|
||||
@echo "Running comprehensive crypto test suite..."
|
||||
cd tests && make test
|
||||
|
||||
# Clean build artifacts
|
||||
clean:
|
||||
@echo "Cleaning build artifacts..."
|
||||
rm -f $(LIB_OBJECTS) $(ARM64_LIB_OBJECTS)
|
||||
rm -f $(STATIC_LIB) $(ARM64_STATIC_LIB)
|
||||
rm -f $(EXAMPLE_TARGETS)
|
||||
|
||||
# Create distribution package
|
||||
dist: clean
|
||||
@echo "Creating distribution package..."
|
||||
mkdir -p dist/nostr_core
|
||||
cp -r *.h *.c Makefile examples/ tests/ README.md LICENSE dist/nostr_core/ 2>/dev/null || true
|
||||
cd dist && tar -czf nostr_core.tar.gz nostr_core/
|
||||
@echo "Distribution package created: dist/nostr_core.tar.gz"
|
||||
|
||||
# Help
|
||||
help:
|
||||
@echo "NOSTR Core Library Build System"
|
||||
@echo "==============================="
|
||||
@echo ""
|
||||
@echo "Available targets:"
|
||||
@echo " default - Build static library (recommended)"
|
||||
@echo " all - Build static library and examples"
|
||||
@echo " arm64 - Build ARM64 static library"
|
||||
@echo " arm64-all - Build ARM64 static library"
|
||||
@echo " debug - Build with debug symbols"
|
||||
@echo " examples - Build example programs"
|
||||
@echo " test - Run simple test"
|
||||
@echo " test-crypto - Run comprehensive crypto test suite"
|
||||
@echo " install - Install static library to system (/usr/local)"
|
||||
@echo " uninstall - Remove library from system"
|
||||
@echo " clean - Remove build artifacts"
|
||||
@echo " dist - Create distribution package"
|
||||
@echo " help - Show this help"
|
||||
@echo ""
|
||||
@echo "Library outputs (static only):"
|
||||
@echo " $(STATIC_LIB) - x86_64 static library"
|
||||
@echo " $(ARM64_STATIC_LIB) - ARM64 static library"
|
||||
|
||||
.PHONY: default all arm64 arm64-all debug examples test test-crypto install uninstall clean dist help
|
|
@ -0,0 +1,122 @@
|
|||
# Version Management System
|
||||
|
||||
This project implements an automated version management system for C applications with auto-incrementing build numbers.
|
||||
|
||||
## Overview
|
||||
|
||||
The version management system consists of:
|
||||
- **Semantic versioning** (Major.Minor.Patch) in `VERSION` file
|
||||
- **Auto-incrementing build numbers** in `.build_number` file
|
||||
- **Generated version header** (`version.h`) with all version info
|
||||
- **Build-time integration** via `scripts/generate_version.sh`
|
||||
|
||||
## Files
|
||||
|
||||
### Core Files
|
||||
- `VERSION` - Contains semantic version (e.g., "1.0.0")
|
||||
- `.build_number` - Contains current build number (auto-incremented)
|
||||
- `scripts/generate_version.sh` - Version generation script
|
||||
- `version.h` - Generated header (auto-created, do not edit)
|
||||
|
||||
### Integration Files
|
||||
- `build.sh` - Modified to call version generation
|
||||
- `.gitignore` - Excludes generated `version.h`
|
||||
|
||||
## Usage
|
||||
|
||||
### Building
|
||||
Every time you run `./build.sh`, the build number automatically increments:
|
||||
|
||||
```bash
|
||||
./build.sh # Build #1
|
||||
./build.sh # Build #2
|
||||
./build.sh # Build #3
|
||||
```
|
||||
|
||||
### Version Display
|
||||
The application shows version information in multiple ways:
|
||||
|
||||
**Command Line:**
|
||||
```bash
|
||||
./build/c_nostr --version
|
||||
./build/c_nostr -v
|
||||
```
|
||||
|
||||
**Interactive Mode:**
|
||||
- ASCII art title with version
|
||||
- Header shows: `NOSTR TERMINAL v1.0.0 (Build #3, 2025-07-21)`
|
||||
|
||||
### Updating Semantic Version
|
||||
To update the major/minor/patch version:
|
||||
|
||||
```bash
|
||||
echo "1.1.0" > VERSION
|
||||
```
|
||||
|
||||
The next build will be `v1.1.0 (Build #4)`.
|
||||
|
||||
## Generated Macros
|
||||
|
||||
The `version.h` file contains these macros:
|
||||
|
||||
```c
|
||||
#define VERSION_MAJOR 1
|
||||
#define VERSION_MINOR 0
|
||||
#define VERSION_PATCH 0
|
||||
#define VERSION_BUILD 3
|
||||
#define VERSION_STRING "1.0.0"
|
||||
#define VERSION_FULL "1.0.0.3"
|
||||
#define BUILD_NUMBER 3
|
||||
#define BUILD_DATE "2025-07-21"
|
||||
#define BUILD_TIME "14:53:32"
|
||||
#define BUILD_TIMESTAMP "2025-07-21 14:53:32"
|
||||
#define GIT_HASH ""
|
||||
#define GIT_BRANCH ""
|
||||
#define VERSION_DISPLAY "v1.0.0 (Build #3)"
|
||||
#define VERSION_FULL_DISPLAY "v1.0.0 (Build #3, 2025-07-21)"
|
||||
```
|
||||
|
||||
## Integration in Code
|
||||
|
||||
Include the version header:
|
||||
```c
|
||||
#include "version.h"
|
||||
```
|
||||
|
||||
Use version macros:
|
||||
```c
|
||||
printf("NOSTR TERMINAL %s\n", VERSION_FULL_DISPLAY);
|
||||
printf("Built: %s\n", BUILD_TIMESTAMP);
|
||||
```
|
||||
|
||||
## Best Practices
|
||||
|
||||
1. **Never edit `version.h`** - it's auto-generated
|
||||
2. **Commit `.build_number`** - tracks build history
|
||||
3. **Update `VERSION` manually** - for semantic version changes
|
||||
4. **Build increments automatically** - no manual intervention needed
|
||||
|
||||
## Version History
|
||||
|
||||
Build numbers are persistent and increment across sessions:
|
||||
- Build #1: Initial implementation
|
||||
- Build #2: First rebuild test
|
||||
- Build #3: Added --version flag
|
||||
- Build #4: Next build...
|
||||
|
||||
## ASCII Art Integration
|
||||
|
||||
The version system integrates with the ASCII art title display:
|
||||
|
||||
```
|
||||
███ ██ ██████ ███████ ████████ ███████ ██████
|
||||
████ ██ ██ ██ ██ ██ ██ ██ ██
|
||||
██ ██ ██ ██ ██ ███████ ██ █████ ██████
|
||||
██ ██ ██ ██ ██ ██ ██ ██ ██ ██
|
||||
██ ████ ███████ ██████ ███████ ███████ ██ ███████ ██ ██
|
||||
|
||||
NOSTR TERMINAL v1.0.0 (Build #3, 2025-07-21) - user_abc123
|
||||
================================================================
|
||||
```
|
||||
|
||||
This provides a professional, branded experience with clear version identification.
|
|
@ -0,0 +1,116 @@
|
|||
# Compiler Warning Cleanup - SUCCESS REPORT
|
||||
|
||||
## 🎉 All Warnings Resolved!
|
||||
|
||||
The nostr_core_lib now compiles with **zero compiler warnings** using `-Wall -Wextra` flags.
|
||||
|
||||
## ✅ Fixed Issues Summary
|
||||
|
||||
### 1. **Type Limits Warning** - `nostr_core/core.c`
|
||||
- **Issue**: `comparison is always false due to limited range of data type [-Wtype-limits]`
|
||||
- **Location**: `bech32_decode()` function, line 791
|
||||
- **Problem**: Comparing `char c < 0` when `char` might be unsigned
|
||||
- **Fix**: Changed `char c` to `unsigned char c` and removed redundant comparison
|
||||
- **Status**: ✅ RESOLVED
|
||||
|
||||
### 2. **Unused Parameter Warning** - `nostr_core/nostr_crypto.c`
|
||||
- **Issue**: `unused parameter 'mnemonic_size' [-Wunused-parameter]`
|
||||
- **Location**: `nostr_bip39_mnemonic_from_bytes()` function
|
||||
- **Problem**: Function parameter was declared but never used
|
||||
- **Fix**: Removed `mnemonic_size` parameter from function signature and all call sites
|
||||
- **Files Updated**:
|
||||
- `nostr_core/nostr_crypto.c` (function implementation)
|
||||
- `nostr_core/nostr_crypto.h` (function declaration)
|
||||
- `nostr_core/core.c` (function call site)
|
||||
- **Status**: ✅ RESOLVED
|
||||
|
||||
### 3. **Unused Constant Variable** - `nostr_core/nostr_crypto.c`
|
||||
- **Issue**: `'CURVE_N' defined but not used [-Wunused-const-variable=]`
|
||||
- **Location**: Line 456
|
||||
- **Problem**: Constant array was defined but never referenced
|
||||
- **Fix**: Removed the unused `CURVE_N` constant definition
|
||||
- **Status**: ✅ RESOLVED
|
||||
|
||||
### 4. **Unused Variables** - `nostr_websocket/nostr_websocket_mbedtls.c`
|
||||
- **Issue 1**: `unused variable 'tcp' [-Wunused-variable]` in `tcp_cleanup()`
|
||||
- **Issue 2**: `unused variable 'fin' [-Wunused-variable]` in `ws_receive_frame()`
|
||||
- **Fix**: Removed both unused variable declarations
|
||||
- **Status**: ✅ RESOLVED
|
||||
|
||||
### 5. **Sign Comparison Warnings** - `nostr_websocket/nostr_websocket_mbedtls.c`
|
||||
- **Issue**: `comparison of integer expressions of different signedness [-Wsign-compare]`
|
||||
- **Locations**:
|
||||
- `ws_parse_url()` - `path_start - url` vs `strlen(url)`
|
||||
- `ws_perform_handshake()` - `len` vs `sizeof(request)`
|
||||
- `ws_perform_handshake()` - `total_received` vs `sizeof(response) - 1`
|
||||
- **Fix**: Added explicit casts to `size_t` for signed integers before comparison
|
||||
- **Status**: ✅ RESOLVED
|
||||
|
||||
### 6. **Unused Function Warning** - `nostr_websocket/nostr_websocket_mbedtls.c`
|
||||
- **Issue**: `'debug_log_cleanup' defined but not used [-Wunused-function]`
|
||||
- **Problem**: Function was defined but never called
|
||||
- **Fix**: Removed the unused function and its forward declaration
|
||||
- **Status**: ✅ RESOLVED
|
||||
|
||||
## 🧪 Verification Results
|
||||
|
||||
### Clean Build Test
|
||||
```bash
|
||||
make clean && make
|
||||
```
|
||||
**Result**: ✅ **ZERO WARNINGS** - Clean compilation
|
||||
|
||||
### Functionality Test
|
||||
```bash
|
||||
make examples && ./examples/simple_keygen
|
||||
```
|
||||
**Result**: ✅ **ALL EXAMPLES WORK** - Library functionality preserved
|
||||
|
||||
## 📊 Before vs After
|
||||
|
||||
### Before Cleanup:
|
||||
```
|
||||
Compiling: nostr_core/core.c
|
||||
nostr_core/core.c:791:24: warning: comparison is always false due to limited range of data type [-Wtype-limits]
|
||||
|
||||
Compiling: nostr_core/nostr_crypto.c
|
||||
nostr_core/nostr_crypto.c:901:59: warning: unused parameter 'mnemonic_size' [-Wunused-parameter]
|
||||
nostr_core/nostr_crypto.c:456:23: warning: 'CURVE_N' defined but not used [-Wunused-const-variable=]
|
||||
|
||||
Compiling: nostr_websocket/nostr_websocket_mbedtls.c
|
||||
nostr_websocket/nostr_websocket_mbedtls.c:485:22: warning: unused variable 'tcp' [-Wunused-variable]
|
||||
nostr_websocket/nostr_websocket_mbedtls.c:760:40: warning: operand of '?:' changes signedness [-Wsign-compare]
|
||||
nostr_websocket/nostr_websocket_mbedtls.c:807:13: warning: comparison of integer expressions of different signedness [-Wsign-compare]
|
||||
nostr_websocket/nostr_websocket_mbedtls.c:824:27: warning: comparison of integer expressions of different signedness [-Wsign-compare]
|
||||
nostr_websocket/nostr_websocket_mbedtls.c:919:13: warning: unused variable 'fin' [-Wunused-variable]
|
||||
nostr_websocket/nostr_websocket_mbedtls.c:1024:13: warning: 'debug_log_cleanup' defined but not used [-Wunused-function]
|
||||
|
||||
Total: 9 warnings
|
||||
```
|
||||
|
||||
### After Cleanup:
|
||||
```
|
||||
Compiling: nostr_core/core.c
|
||||
Compiling: nostr_core/core_relays.c
|
||||
Compiling: nostr_core/nostr_crypto.c
|
||||
Compiling: nostr_core/nostr_secp256k1.c
|
||||
Compiling: cjson/cJSON.c
|
||||
Compiling: nostr_websocket/nostr_websocket_mbedtls.c
|
||||
Creating static library: libnostr_core.a
|
||||
|
||||
Total: 0 warnings ✅
|
||||
```
|
||||
|
||||
## 🎯 Benefits Achieved
|
||||
|
||||
1. **Professional Code Quality**: Clean compilation with strict compiler flags
|
||||
2. **Maintainability**: Removed unused code reduces confusion for future developers
|
||||
3. **Portability**: Fixed sign comparison issues improve cross-platform compatibility
|
||||
4. **Performance**: Compiler can better optimize warning-free code
|
||||
5. **Debugging**: Cleaner build output makes real issues more visible
|
||||
|
||||
## 🏆 Final Status: **COMPLETE SUCCESS**
|
||||
|
||||
The nostr_core_lib now compiles cleanly with zero warnings while maintaining full functionality. All examples continue to work correctly, demonstrating that the cleanup did not introduce any regressions.
|
||||
|
||||
**Mission Accomplished!** 🚀
|
|
@ -0,0 +1,161 @@
|
|||
#!/bin/bash
|
||||
|
||||
# NOSTR Core Library Build Script
|
||||
# Provides convenient build targets for the standalone library
|
||||
|
||||
set -e # Exit on any error
|
||||
|
||||
# Colors for output
|
||||
RED='\033[0;31m'
|
||||
GREEN='\033[0;32m'
|
||||
YELLOW='\033[1;33m'
|
||||
BLUE='\033[0;34m'
|
||||
NC='\033[0m' # No Color
|
||||
|
||||
# Function to print colored output
|
||||
print_status() {
|
||||
echo -e "${BLUE}[INFO]${NC} $1"
|
||||
}
|
||||
|
||||
print_success() {
|
||||
echo -e "${GREEN}[SUCCESS]${NC} $1"
|
||||
}
|
||||
|
||||
print_warning() {
|
||||
echo -e "${YELLOW}[WARNING]${NC} $1"
|
||||
}
|
||||
|
||||
print_error() {
|
||||
echo -e "${RED}[ERROR]${NC} $1"
|
||||
}
|
||||
|
||||
# Function to show usage
|
||||
show_usage() {
|
||||
echo "NOSTR Core Library Build Script"
|
||||
echo "==============================="
|
||||
echo ""
|
||||
echo "Usage: $0 [target]"
|
||||
echo ""
|
||||
echo "Available targets:"
|
||||
echo " clean - Clean all build artifacts"
|
||||
echo " lib - Build static library (default)"
|
||||
echo " shared - Build shared library"
|
||||
echo " all - Build both static and shared libraries"
|
||||
echo " examples - Build example programs"
|
||||
echo " test - Run tests"
|
||||
echo " install - Install library to system"
|
||||
echo " uninstall - Remove library from system"
|
||||
echo " help - Show this help message"
|
||||
echo ""
|
||||
echo "Library outputs:"
|
||||
echo " libnostr_core.a - Static library"
|
||||
echo " libnostr_core.so - Shared library"
|
||||
echo " examples/* - Example programs"
|
||||
}
|
||||
|
||||
# Parse command line arguments
|
||||
TARGET=${1:-lib}
|
||||
|
||||
case "$TARGET" in
|
||||
clean)
|
||||
print_status "Cleaning build artifacts..."
|
||||
make clean
|
||||
print_success "Clean completed"
|
||||
;;
|
||||
|
||||
lib|library)
|
||||
print_status "Building static library..."
|
||||
make clean
|
||||
make
|
||||
if [ -f "libnostr_core.a" ]; then
|
||||
SIZE=$(stat -c%s "libnostr_core.a")
|
||||
print_success "Static library built successfully (${SIZE} bytes)"
|
||||
ls -la libnostr_core.a
|
||||
else
|
||||
print_error "Failed to build static library"
|
||||
exit 1
|
||||
fi
|
||||
;;
|
||||
|
||||
shared)
|
||||
print_status "Building shared library..."
|
||||
make clean
|
||||
make libnostr_core.so
|
||||
if [ -f "libnostr_core.so" ]; then
|
||||
SIZE=$(stat -c%s "libnostr_core.so")
|
||||
print_success "Shared library built successfully (${SIZE} bytes)"
|
||||
ls -la libnostr_core.so
|
||||
else
|
||||
print_error "Failed to build shared library"
|
||||
exit 1
|
||||
fi
|
||||
;;
|
||||
|
||||
all)
|
||||
print_status "Building all libraries..."
|
||||
make clean
|
||||
make all
|
||||
print_success "All libraries built successfully"
|
||||
ls -la libnostr_core.*
|
||||
;;
|
||||
|
||||
examples)
|
||||
print_status "Building examples..."
|
||||
make clean
|
||||
make
|
||||
make examples
|
||||
print_success "Examples built successfully"
|
||||
ls -la examples/
|
||||
;;
|
||||
|
||||
test)
|
||||
print_status "Running tests..."
|
||||
make clean
|
||||
make
|
||||
if make test-crypto 2>/dev/null; then
|
||||
print_success "All tests passed"
|
||||
else
|
||||
print_warning "Running simple test instead..."
|
||||
make test
|
||||
print_success "Basic test completed"
|
||||
fi
|
||||
;;
|
||||
|
||||
tests)
|
||||
print_status "Running tests..."
|
||||
make clean
|
||||
make
|
||||
if make test-crypto 2>/dev/null; then
|
||||
print_success "All tests passed"
|
||||
else
|
||||
print_warning "Running simple test instead..."
|
||||
make test
|
||||
print_success "Basic test completed"
|
||||
fi
|
||||
;;
|
||||
|
||||
install)
|
||||
print_status "Installing library to system..."
|
||||
make clean
|
||||
make all
|
||||
sudo make install
|
||||
print_success "Library installed to /usr/local"
|
||||
;;
|
||||
|
||||
uninstall)
|
||||
print_status "Uninstalling library from system..."
|
||||
sudo make uninstall
|
||||
print_success "Library uninstalled"
|
||||
;;
|
||||
|
||||
help|--help|-h)
|
||||
show_usage
|
||||
;;
|
||||
|
||||
*)
|
||||
print_error "Unknown target: $TARGET"
|
||||
echo ""
|
||||
show_usage
|
||||
exit 1
|
||||
;;
|
||||
esac
|
|
@ -0,0 +1,40 @@
|
|||
@PACKAGE_INIT@
|
||||
|
||||
include(CMakeFindDependencyMacro)
|
||||
|
||||
# Find required dependencies
|
||||
find_dependency(Threads REQUIRED)
|
||||
|
||||
# Include targets
|
||||
include("${CMAKE_CURRENT_LIST_DIR}/nostr_core-targets.cmake")
|
||||
|
||||
# Set variables for backward compatibility
|
||||
set(NOSTR_CORE_FOUND TRUE)
|
||||
set(NOSTR_CORE_VERSION "@PROJECT_VERSION@")
|
||||
|
||||
# Check which libraries are available
|
||||
set(NOSTR_CORE_STATIC_AVAILABLE FALSE)
|
||||
set(NOSTR_CORE_SHARED_AVAILABLE FALSE)
|
||||
|
||||
if(TARGET nostr_core::static)
|
||||
set(NOSTR_CORE_STATIC_AVAILABLE TRUE)
|
||||
endif()
|
||||
|
||||
if(TARGET nostr_core::shared)
|
||||
set(NOSTR_CORE_SHARED_AVAILABLE TRUE)
|
||||
endif()
|
||||
|
||||
# Provide convenient variables
|
||||
if(NOSTR_CORE_STATIC_AVAILABLE)
|
||||
set(NOSTR_CORE_LIBRARIES nostr_core::static)
|
||||
elseif(NOSTR_CORE_SHARED_AVAILABLE)
|
||||
set(NOSTR_CORE_LIBRARIES nostr_core::shared)
|
||||
endif()
|
||||
|
||||
set(NOSTR_CORE_INCLUDE_DIRS "@PACKAGE_CMAKE_INSTALL_INCLUDEDIR@/nostr")
|
||||
|
||||
# Feature information
|
||||
set(NOSTR_CORE_ENABLE_WEBSOCKETS @NOSTR_ENABLE_WEBSOCKETS@)
|
||||
set(NOSTR_CORE_USE_MBEDTLS @NOSTR_USE_MBEDTLS@)
|
||||
|
||||
check_required_components(nostr_core)
|
|
@ -0,0 +1,107 @@
|
|||
// Debug script to extract all intermediate values from nostr-tools NIP-44
|
||||
const { v2 } = require('./nostr-tools/nip44.js');
|
||||
const { bytesToHex, hexToBytes } = require('@noble/hashes/utils');
|
||||
|
||||
// Test vector 1: single char 'a'
|
||||
console.log('=== NOSTR-TOOLS DEBUG: Single char "a" ===');
|
||||
const sec1 = hexToBytes('0000000000000000000000000000000000000000000000000000000000000001');
|
||||
const sec2 = hexToBytes('0000000000000000000000000000000000000000000000000000000000000002');
|
||||
const nonce = hexToBytes('0000000000000000000000000000000000000000000000000000000000000001');
|
||||
const plaintext = 'a';
|
||||
|
||||
// Step 1: Get public keys
|
||||
const { schnorr } = require('@noble/curves/secp256k1');
|
||||
const pub1 = bytesToHex(schnorr.getPublicKey(sec1));
|
||||
const pub2 = bytesToHex(schnorr.getPublicKey(sec2));
|
||||
console.log('pub1:', pub1);
|
||||
console.log('pub2:', pub2);
|
||||
|
||||
// Step 2: Get conversation key
|
||||
const conversationKey = v2.utils.getConversationKey(sec1, pub2);
|
||||
console.log('conversation_key:', bytesToHex(conversationKey));
|
||||
|
||||
// Step 3: Get shared secret (raw ECDH)
|
||||
const { secp256k1 } = require('@noble/curves/secp256k1');
|
||||
const sharedPoint = secp256k1.getSharedSecret(sec1, '02' + pub2);
|
||||
const sharedSecret = sharedPoint.subarray(1, 33); // X coordinate only
|
||||
console.log('ecdh_shared_secret:', bytesToHex(sharedSecret));
|
||||
|
||||
// Step 4: Get message keys using internal function
|
||||
const hkdf = require('@noble/hashes/hkdf');
|
||||
const { sha256 } = require('@noble/hashes/sha256');
|
||||
|
||||
// HKDF Extract step
|
||||
const salt = new TextEncoder().encode('nip44-v2');
|
||||
const prk = hkdf.extract(sha256, sharedSecret, salt);
|
||||
console.log('hkdf_extract_result:', bytesToHex(prk));
|
||||
|
||||
// HKDF Expand step
|
||||
const messageKeys = hkdf.expand(sha256, prk, nonce, 76);
|
||||
const chachaKey = messageKeys.subarray(0, 32);
|
||||
const chachaNonce = messageKeys.subarray(32, 44);
|
||||
const hmacKey = messageKeys.subarray(44, 76);
|
||||
|
||||
console.log('chacha_key:', bytesToHex(chachaKey));
|
||||
console.log('chacha_nonce:', bytesToHex(chachaNonce));
|
||||
console.log('hmac_key:', bytesToHex(hmacKey));
|
||||
|
||||
// Step 5: Pad the plaintext
|
||||
function pad(plaintext) {
|
||||
const utf8Encoder = new TextEncoder();
|
||||
const unpadded = utf8Encoder.encode(plaintext);
|
||||
const unpaddedLen = unpadded.length;
|
||||
|
||||
// Length prefix (big-endian u16)
|
||||
const prefix = new Uint8Array(2);
|
||||
new DataView(prefix.buffer).setUint16(0, unpaddedLen, false);
|
||||
|
||||
// Calculate padded length
|
||||
function calcPaddedLen(len) {
|
||||
if (len <= 32) return 32;
|
||||
const nextPower = 1 << (Math.floor(Math.log2(len - 1)) + 1);
|
||||
const chunk = nextPower <= 256 ? 32 : nextPower / 8;
|
||||
return chunk * (Math.floor((len - 1) / chunk) + 1);
|
||||
}
|
||||
|
||||
const paddedLen = calcPaddedLen(unpaddedLen + 2);
|
||||
const suffix = new Uint8Array(paddedLen - 2 - unpaddedLen);
|
||||
|
||||
// Combine: prefix + plaintext + padding
|
||||
const result = new Uint8Array(paddedLen);
|
||||
result.set(prefix);
|
||||
result.set(unpadded, 2);
|
||||
result.set(suffix, 2 + unpaddedLen);
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
const paddedPlaintext = pad(plaintext);
|
||||
console.log('padded_plaintext:', bytesToHex(paddedPlaintext));
|
||||
console.log('padded_length:', paddedPlaintext.length);
|
||||
|
||||
// Step 6: ChaCha20 encrypt
|
||||
const { chacha20 } = require('@noble/ciphers/chacha');
|
||||
const ciphertext = chacha20(chachaKey, chachaNonce, paddedPlaintext);
|
||||
console.log('ciphertext:', bytesToHex(ciphertext));
|
||||
|
||||
// Step 7: HMAC with AAD
|
||||
const { hmac } = require('@noble/hashes/hmac');
|
||||
const { concatBytes } = require('@noble/hashes/utils');
|
||||
const aad = concatBytes(nonce, ciphertext);
|
||||
console.log('aad_data:', bytesToHex(aad));
|
||||
const mac = hmac(sha256, hmacKey, aad);
|
||||
console.log('mac:', bytesToHex(mac));
|
||||
|
||||
// Step 8: Final payload
|
||||
const { base64 } = require('@scure/base');
|
||||
const payload = concatBytes(new Uint8Array([2]), nonce, ciphertext, mac);
|
||||
console.log('raw_payload:', bytesToHex(payload));
|
||||
const base64Payload = base64.encode(payload);
|
||||
console.log('final_payload:', base64Payload);
|
||||
|
||||
// Expected from test vectors
|
||||
console.log('expected_payload:', 'AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABee0G5VSK0/9YypIObAtDKfYEAjD35uVkHyB0F4DwrcNaCXlCWZKaArsGrY6M9wnuTMxWfp1RTN9Xga8no+kF5Vsb');
|
||||
|
||||
// Now let's also test the full encrypt function
|
||||
const fullEncrypt = v2.encrypt(plaintext, conversationKey, nonce);
|
||||
console.log('v2.encrypt_result:', fullEncrypt);
|
|
@ -0,0 +1,84 @@
|
|||
/*
|
||||
* Example: Input Type Detection
|
||||
* Demonstrates nostr_detect_input_type() and nostr_decode_nsec()
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("=== NOSTR Input Type Detection Example ===\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Test various input types
|
||||
const char* test_inputs[] = {
|
||||
// Mnemonic
|
||||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
|
||||
|
||||
// Hex nsec (64 chars)
|
||||
"5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb",
|
||||
|
||||
// Bech32 nsec
|
||||
"nsec1tkks0lxyf9x2jetlzluxsqqwudlnwvef9xx2muxvt7tsh7lgmrhqvfmaqg",
|
||||
|
||||
// Invalid input
|
||||
"not-a-valid-input",
|
||||
|
||||
// Empty string
|
||||
""
|
||||
};
|
||||
|
||||
const char* type_names[] = {
|
||||
"UNKNOWN",
|
||||
"MNEMONIC",
|
||||
"HEX_NSEC",
|
||||
"BECH32_NSEC"
|
||||
};
|
||||
|
||||
int num_tests = sizeof(test_inputs) / sizeof(test_inputs[0]);
|
||||
|
||||
for (int i = 0; i < num_tests; i++) {
|
||||
printf("Test %d:\n", i + 1);
|
||||
printf("Input: \"%s\"\n", test_inputs[i]);
|
||||
|
||||
// Detect input type
|
||||
nostr_input_type_t type = nostr_detect_input_type(test_inputs[i]);
|
||||
printf("Detected Type: %s\n", type_names[type]);
|
||||
|
||||
// Try to decode if it's an nsec
|
||||
if (type == NOSTR_INPUT_NSEC_HEX || type == NOSTR_INPUT_NSEC_BECH32) {
|
||||
unsigned char private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
int result = nostr_decode_nsec(test_inputs[i], private_key);
|
||||
|
||||
if (result == NOSTR_SUCCESS) {
|
||||
// Convert back to hex and bech32 to verify
|
||||
char private_hex[NOSTR_HEX_KEY_SIZE];
|
||||
char nsec_bech32[NOSTR_BECH32_KEY_SIZE];
|
||||
|
||||
nostr_bytes_to_hex(private_key, NOSTR_PRIVATE_KEY_SIZE, private_hex);
|
||||
nostr_key_to_bech32(private_key, "nsec", nsec_bech32);
|
||||
|
||||
printf("✓ Successfully decoded nsec!\n");
|
||||
printf(" Hex format: %s\n", private_hex);
|
||||
printf(" Bech32 format: %s\n", nsec_bech32);
|
||||
} else {
|
||||
printf("✗ Failed to decode nsec: %s\n", nostr_strerror(result));
|
||||
}
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
printf("✓ Example completed successfully!\n");
|
||||
printf("💡 Input detection helps handle different key formats automatically\n");
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,39 @@
|
|||
# Example CMakeLists.txt for a project using nostr_core library
|
||||
cmake_minimum_required(VERSION 3.12)
|
||||
project(my_nostr_app VERSION 1.0.0 LANGUAGES C)
|
||||
|
||||
set(CMAKE_C_STANDARD 99)
|
||||
|
||||
# Method 1: Find installed package
|
||||
# Uncomment if nostr_core is installed system-wide
|
||||
# find_package(nostr_core REQUIRED)
|
||||
|
||||
# Method 2: Use as subdirectory
|
||||
# Uncomment if nostr_core is a subdirectory
|
||||
# add_subdirectory(nostr_core)
|
||||
|
||||
# Method 3: Use pkg-config
|
||||
# Uncomment if using pkg-config
|
||||
# find_package(PkgConfig REQUIRED)
|
||||
# pkg_check_modules(NOSTR_CORE REQUIRED nostr_core)
|
||||
|
||||
# Create executable
|
||||
add_executable(my_nostr_app main.c)
|
||||
|
||||
# Link with nostr_core
|
||||
# Choose one of the following based on your integration method:
|
||||
|
||||
# Method 1: Installed package
|
||||
# target_link_libraries(my_nostr_app nostr_core::static)
|
||||
|
||||
# Method 2: Subdirectory
|
||||
# target_link_libraries(my_nostr_app nostr_core_static)
|
||||
|
||||
# Method 3: pkg-config
|
||||
# target_include_directories(my_nostr_app PRIVATE ${NOSTR_CORE_INCLUDE_DIRS})
|
||||
# target_link_libraries(my_nostr_app ${NOSTR_CORE_LIBRARIES})
|
||||
|
||||
# For this example, we'll assume Method 2 (subdirectory)
|
||||
# Add the parent nostr_core directory
|
||||
add_subdirectory(../.. nostr_core)
|
||||
target_link_libraries(my_nostr_app nostr_core_static)
|
|
@ -0,0 +1,186 @@
|
|||
# NOSTR Core Integration Example
|
||||
|
||||
This directory contains a complete example showing how to integrate the NOSTR Core library into your own projects.
|
||||
|
||||
## What This Example Demonstrates
|
||||
|
||||
- **Library Initialization**: Proper setup and cleanup of the NOSTR library
|
||||
- **Identity Management**: Key generation, bech32 encoding, and format detection
|
||||
- **Event Creation**: Creating and signing different types of NOSTR events
|
||||
- **Input Handling**: Processing various input formats (mnemonic, hex, bech32)
|
||||
- **Utility Functions**: Using helper functions for hex conversion and error handling
|
||||
- **CMake Integration**: How to integrate the library in your CMake-based project
|
||||
|
||||
## Building and Running
|
||||
|
||||
### Method 1: Using CMake
|
||||
|
||||
```bash
|
||||
# Create build directory
|
||||
mkdir build && cd build
|
||||
|
||||
# Configure with CMake
|
||||
cmake ..
|
||||
|
||||
# Build
|
||||
make
|
||||
|
||||
# Run the example
|
||||
./my_nostr_app
|
||||
```
|
||||
|
||||
### Method 2: Manual Compilation
|
||||
|
||||
```bash
|
||||
# Compile directly (assuming you're in the c_nostr root directory)
|
||||
gcc -I. examples/integration_example/main.c nostr_core.c nostr_crypto.c cjson/cJSON.c -lm -o integration_example
|
||||
|
||||
# Run
|
||||
./integration_example
|
||||
```
|
||||
|
||||
## Expected Output
|
||||
|
||||
The example will demonstrate:
|
||||
|
||||
1. **Identity Management Demo**
|
||||
- Generate a new keypair
|
||||
- Display keys in hex and bech32 format
|
||||
|
||||
2. **Event Creation Demo**
|
||||
- Create a text note event
|
||||
- Create a profile event
|
||||
- Display the JSON for both events
|
||||
|
||||
3. **Input Handling Demo**
|
||||
- Process different input formats
|
||||
- Show format detection and decoding
|
||||
|
||||
4. **Utility Functions Demo**
|
||||
- Hex conversion round-trip
|
||||
- Error message display
|
||||
|
||||
## Integration Patterns
|
||||
|
||||
### Pattern 1: CMake Find Package
|
||||
|
||||
If NOSTR Core is installed system-wide:
|
||||
|
||||
```cmake
|
||||
find_package(nostr_core REQUIRED)
|
||||
target_link_libraries(your_app nostr_core::static)
|
||||
```
|
||||
|
||||
### Pattern 2: CMake Subdirectory
|
||||
|
||||
If NOSTR Core is a subdirectory of your project:
|
||||
|
||||
```cmake
|
||||
add_subdirectory(nostr_core)
|
||||
target_link_libraries(your_app nostr_core_static)
|
||||
```
|
||||
|
||||
### Pattern 3: pkg-config
|
||||
|
||||
If using pkg-config:
|
||||
|
||||
```cmake
|
||||
find_package(PkgConfig REQUIRED)
|
||||
pkg_check_modules(NOSTR_CORE REQUIRED nostr_core)
|
||||
target_include_directories(your_app PRIVATE ${NOSTR_CORE_INCLUDE_DIRS})
|
||||
target_link_libraries(your_app ${NOSTR_CORE_LIBRARIES})
|
||||
```
|
||||
|
||||
### Pattern 4: Direct Source Integration
|
||||
|
||||
Copy the essential files to your project:
|
||||
|
||||
```bash
|
||||
cp nostr_core.{c,h} nostr_crypto.{c,h} your_project/src/
|
||||
cp -r cjson/ your_project/src/
|
||||
```
|
||||
|
||||
Then compile them with your project sources.
|
||||
|
||||
## Code Structure
|
||||
|
||||
### main.c Structure
|
||||
|
||||
The example is organized into clear demonstration functions:
|
||||
|
||||
- `demo_identity_management()` - Key generation and encoding
|
||||
- `demo_event_creation()` - Creating different event types
|
||||
- `demo_input_handling()` - Processing various input formats
|
||||
- `demo_utilities()` - Using utility functions
|
||||
|
||||
Each function demonstrates specific aspects of the library while maintaining proper error handling and resource cleanup.
|
||||
|
||||
### Key Integration Points
|
||||
|
||||
1. **Initialization**
|
||||
```c
|
||||
int ret = nostr_init();
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
// Handle error
|
||||
}
|
||||
```
|
||||
|
||||
2. **Resource Cleanup**
|
||||
```c
|
||||
// Always clean up JSON objects
|
||||
cJSON_Delete(event);
|
||||
|
||||
// Clean up library on exit
|
||||
nostr_cleanup();
|
||||
```
|
||||
|
||||
3. **Error Handling**
|
||||
```c
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("Error: %s\n", nostr_strerror(ret));
|
||||
return ret;
|
||||
}
|
||||
```
|
||||
|
||||
## Customization
|
||||
|
||||
You can modify this example for your specific needs:
|
||||
|
||||
- Change the `app_config_t` structure to match your application's configuration
|
||||
- Add additional event types or custom event creation logic
|
||||
- Integrate with your existing error handling and logging systems
|
||||
- Add networking functionality using the WebSocket layer
|
||||
|
||||
## Dependencies
|
||||
|
||||
This example requires:
|
||||
- C99 compiler (gcc, clang)
|
||||
- CMake 3.12+ (for CMake build)
|
||||
- NOSTR Core library and its dependencies
|
||||
|
||||
## Testing
|
||||
|
||||
You can test different input formats by passing them as command line arguments:
|
||||
|
||||
```bash
|
||||
# Test with mnemonic
|
||||
./my_nostr_app "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about"
|
||||
|
||||
# Test with hex private key
|
||||
./my_nostr_app "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"
|
||||
|
||||
# Test with bech32 nsec
|
||||
./my_nostr_app "nsec1xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
||||
```
|
||||
|
||||
## Next Steps
|
||||
|
||||
After studying this example, you can:
|
||||
|
||||
1. Integrate the patterns into your own application
|
||||
2. Explore the WebSocket functionality for relay communication
|
||||
3. Add support for additional NOSTR event types
|
||||
4. Implement your own identity persistence layer
|
||||
5. Add networking and relay management features
|
||||
|
||||
For more examples, see the other files in the `examples/` directory.
|
|
@ -0,0 +1,271 @@
|
|||
/*
|
||||
* Example application demonstrating how to integrate nostr_core into other projects
|
||||
* This shows a complete workflow from key generation to event publishing
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
// Example application configuration
|
||||
typedef struct {
|
||||
char* app_name;
|
||||
char* version;
|
||||
int debug_mode;
|
||||
} app_config_t;
|
||||
|
||||
static app_config_t g_config = {
|
||||
.app_name = "My NOSTR App",
|
||||
.version = "1.0.0",
|
||||
.debug_mode = 1
|
||||
};
|
||||
|
||||
// Helper function to print hex data
|
||||
static void print_hex(const char* label, const unsigned char* data, size_t len) {
|
||||
if (g_config.debug_mode) {
|
||||
printf("%s: ", label);
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
printf("%02x", data[i]);
|
||||
}
|
||||
printf("\n");
|
||||
}
|
||||
}
|
||||
|
||||
// Helper function to print JSON nicely
|
||||
static void print_event(const char* label, cJSON* event) {
|
||||
if (!event) {
|
||||
printf("%s: NULL\n", label);
|
||||
return;
|
||||
}
|
||||
|
||||
char* json_string = cJSON_Print(event);
|
||||
if (json_string) {
|
||||
printf("%s:\n%s\n", label, json_string);
|
||||
free(json_string);
|
||||
}
|
||||
}
|
||||
|
||||
// Example: Generate and manage identity
|
||||
static int demo_identity_management(void) {
|
||||
printf("\n=== Identity Management Demo ===\n");
|
||||
|
||||
unsigned char private_key[32], public_key[32];
|
||||
char nsec[100], npub[100];
|
||||
|
||||
// Generate a new keypair
|
||||
printf("Generating new keypair...\n");
|
||||
int ret = nostr_generate_keypair(private_key, public_key);
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("Error generating keypair: %s\n", nostr_strerror(ret));
|
||||
return ret;
|
||||
}
|
||||
|
||||
print_hex("Private Key", private_key, 32);
|
||||
print_hex("Public Key", public_key, 32);
|
||||
|
||||
// Convert to bech32 format
|
||||
ret = nostr_key_to_bech32(private_key, "nsec", nsec);
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("Error encoding nsec: %s\n", nostr_strerror(ret));
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = nostr_key_to_bech32(public_key, "npub", npub);
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("Error encoding npub: %s\n", nostr_strerror(ret));
|
||||
return ret;
|
||||
}
|
||||
|
||||
printf("nsec: %s\n", nsec);
|
||||
printf("npub: %s\n", npub);
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
// Example: Create different types of events
|
||||
static int demo_event_creation(const unsigned char* private_key) {
|
||||
printf("\n=== Event Creation Demo ===\n");
|
||||
|
||||
// Create a text note
|
||||
printf("Creating text note...\n");
|
||||
cJSON* text_event = nostr_create_text_event("Hello from my NOSTR app!", private_key);
|
||||
if (!text_event) {
|
||||
printf("Error creating text event\n");
|
||||
return NOSTR_ERROR_JSON_PARSE;
|
||||
}
|
||||
print_event("Text Event", text_event);
|
||||
|
||||
// Create a profile event
|
||||
printf("\nCreating profile event...\n");
|
||||
cJSON* profile_event = nostr_create_profile_event(
|
||||
g_config.app_name,
|
||||
"A sample application demonstrating NOSTR integration",
|
||||
private_key
|
||||
);
|
||||
if (!profile_event) {
|
||||
printf("Error creating profile event\n");
|
||||
cJSON_Delete(text_event);
|
||||
return NOSTR_ERROR_JSON_PARSE;
|
||||
}
|
||||
print_event("Profile Event", profile_event);
|
||||
|
||||
// Cleanup
|
||||
cJSON_Delete(text_event);
|
||||
cJSON_Delete(profile_event);
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
// Example: Handle different input formats
|
||||
static int demo_input_handling(const char* user_input) {
|
||||
printf("\n=== Input Handling Demo ===\n");
|
||||
printf("Processing input: %s\n", user_input);
|
||||
|
||||
// Detect input type
|
||||
int input_type = nostr_detect_input_type(user_input);
|
||||
switch (input_type) {
|
||||
case NOSTR_INPUT_MNEMONIC:
|
||||
printf("Detected: BIP39 Mnemonic\n");
|
||||
{
|
||||
unsigned char priv[32], pub[32];
|
||||
int ret = nostr_derive_keys_from_mnemonic(user_input, 0, priv, pub);
|
||||
if (ret == NOSTR_SUCCESS) {
|
||||
print_hex("Derived Private Key", priv, 32);
|
||||
print_hex("Derived Public Key", pub, 32);
|
||||
}
|
||||
}
|
||||
break;
|
||||
|
||||
case NOSTR_INPUT_NSEC_HEX:
|
||||
printf("Detected: Hex-encoded private key\n");
|
||||
{
|
||||
unsigned char decoded[32];
|
||||
int ret = nostr_decode_nsec(user_input, decoded);
|
||||
if (ret == NOSTR_SUCCESS) {
|
||||
print_hex("Decoded Private Key", decoded, 32);
|
||||
}
|
||||
}
|
||||
break;
|
||||
|
||||
case NOSTR_INPUT_NSEC_BECH32:
|
||||
printf("Detected: Bech32-encoded private key (nsec)\n");
|
||||
{
|
||||
unsigned char decoded[32];
|
||||
int ret = nostr_decode_nsec(user_input, decoded);
|
||||
if (ret == NOSTR_SUCCESS) {
|
||||
print_hex("Decoded Private Key", decoded, 32);
|
||||
}
|
||||
}
|
||||
break;
|
||||
|
||||
default:
|
||||
printf("Unknown input format\n");
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
// Example: Demonstrate utility functions
|
||||
static int demo_utilities(void) {
|
||||
printf("\n=== Utility Functions Demo ===\n");
|
||||
|
||||
// Hex conversion
|
||||
const char* test_hex = "deadbeef";
|
||||
unsigned char bytes[4];
|
||||
char hex_result[9];
|
||||
|
||||
printf("Testing hex conversion with: %s\n", test_hex);
|
||||
|
||||
int ret = nostr_hex_to_bytes(test_hex, bytes, 4);
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("Error in hex_to_bytes: %s\n", nostr_strerror(ret));
|
||||
return ret;
|
||||
}
|
||||
|
||||
nostr_bytes_to_hex(bytes, 4, hex_result);
|
||||
printf("Round-trip result: %s\n", hex_result);
|
||||
|
||||
// Error message testing
|
||||
printf("\nTesting error messages:\n");
|
||||
for (int i = 0; i >= -10; i--) {
|
||||
const char* msg = nostr_strerror(i);
|
||||
if (msg && strlen(msg) > 0) {
|
||||
printf(" %d: %s\n", i, msg);
|
||||
}
|
||||
}
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
printf("%s v%s\n", g_config.app_name, g_config.version);
|
||||
printf("NOSTR Core Integration Example\n");
|
||||
printf("=====================================\n");
|
||||
|
||||
// Initialize the NOSTR library
|
||||
printf("Initializing NOSTR core library...\n");
|
||||
int ret = nostr_init();
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("Failed to initialize NOSTR library: %s\n", nostr_strerror(ret));
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Run demonstrations
|
||||
unsigned char demo_private_key[32];
|
||||
|
||||
// 1. Identity management
|
||||
ret = demo_identity_management();
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
// Generate a key for other demos
|
||||
nostr_generate_keypair(demo_private_key, NULL);
|
||||
|
||||
// 2. Event creation
|
||||
ret = demo_event_creation(demo_private_key);
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
// 3. Input handling (use command line argument if provided)
|
||||
const char* test_input = (argc > 1) ? argv[1] :
|
||||
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about";
|
||||
ret = demo_input_handling(test_input);
|
||||
if (ret != NOSTR_SUCCESS && ret != NOSTR_ERROR_INVALID_INPUT) {
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
// 4. Utility functions
|
||||
ret = demo_utilities();
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
printf("\n=====================================\n");
|
||||
printf("All demonstrations completed successfully!\n");
|
||||
printf("\nThis example shows how to:\n");
|
||||
printf(" • Initialize the NOSTR library\n");
|
||||
printf(" • Generate and manage keypairs\n");
|
||||
printf(" • Create and sign different event types\n");
|
||||
printf(" • Handle various input formats\n");
|
||||
printf(" • Use utility functions\n");
|
||||
printf(" • Clean up resources properly\n");
|
||||
|
||||
ret = NOSTR_SUCCESS;
|
||||
|
||||
cleanup:
|
||||
// Clean up the NOSTR library
|
||||
printf("\nCleaning up NOSTR library...\n");
|
||||
nostr_cleanup();
|
||||
|
||||
if (ret == NOSTR_SUCCESS) {
|
||||
printf("Example completed successfully.\n");
|
||||
return 0;
|
||||
} else {
|
||||
printf("Example failed with error: %s\n", nostr_strerror(ret));
|
||||
return 1;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,56 @@
|
|||
/*
|
||||
* Example: Random Keypair Generation
|
||||
* Demonstrates nostr_generate_keypair()
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("=== NOSTR Random Keypair Generation Example ===\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate a random keypair
|
||||
unsigned char private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
unsigned char public_key[NOSTR_PUBLIC_KEY_SIZE];
|
||||
|
||||
int result = nostr_generate_keypair(private_key, public_key);
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to generate keypair: %s\n", nostr_strerror(result));
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Convert to hex format
|
||||
char private_hex[NOSTR_HEX_KEY_SIZE];
|
||||
char public_hex[NOSTR_HEX_KEY_SIZE];
|
||||
|
||||
nostr_bytes_to_hex(private_key, NOSTR_PRIVATE_KEY_SIZE, private_hex);
|
||||
nostr_bytes_to_hex(public_key, NOSTR_PUBLIC_KEY_SIZE, public_hex);
|
||||
|
||||
// Convert to bech32 format
|
||||
char nsec[NOSTR_BECH32_KEY_SIZE];
|
||||
char npub[NOSTR_BECH32_KEY_SIZE];
|
||||
|
||||
nostr_key_to_bech32(private_key, "nsec", nsec);
|
||||
nostr_key_to_bech32(public_key, "npub", npub);
|
||||
|
||||
// Display results
|
||||
printf("✓ Successfully generated random NOSTR keypair\n\n");
|
||||
printf("Private Key (hex): %s\n", private_hex);
|
||||
printf("Public Key (hex): %s\n", public_hex);
|
||||
printf("nsec (bech32): %s\n", nsec);
|
||||
printf("npub (bech32): %s\n", npub);
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
printf("\n✓ Example completed successfully!\n");
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,57 @@
|
|||
/*
|
||||
* Example: Key Derivation from Existing Mnemonic
|
||||
* Demonstrates nostr_derive_keys_from_mnemonic()
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("=== NOSTR Key Derivation from Mnemonic Example ===\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use a well-known test mnemonic
|
||||
const char* test_mnemonic = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about";
|
||||
|
||||
printf("Using test mnemonic: %s\n\n", test_mnemonic);
|
||||
|
||||
// Derive keys for multiple accounts
|
||||
for (int account = 0; account < 3; account++) {
|
||||
unsigned char private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
unsigned char public_key[NOSTR_PUBLIC_KEY_SIZE];
|
||||
|
||||
int result = nostr_derive_keys_from_mnemonic(test_mnemonic, account,
|
||||
private_key, public_key);
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to derive keys for account %d: %s\n",
|
||||
account, nostr_strerror(result));
|
||||
continue;
|
||||
}
|
||||
|
||||
// Convert to bech32 format
|
||||
char nsec[NOSTR_BECH32_KEY_SIZE];
|
||||
char npub[NOSTR_BECH32_KEY_SIZE];
|
||||
|
||||
nostr_key_to_bech32(private_key, "nsec", nsec);
|
||||
nostr_key_to_bech32(public_key, "npub", npub);
|
||||
|
||||
// Display results for this account
|
||||
printf("Account %d (m/44'/1237'/%d'/0/0):\n", account, account);
|
||||
printf(" nsec: %s\n", nsec);
|
||||
printf(" npub: %s\n", npub);
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
printf("✓ Example completed successfully!\n");
|
||||
printf("💡 The same mnemonic always produces the same keys (deterministic)\n");
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,60 @@
|
|||
/*
|
||||
* Example: Mnemonic Generation and Key Derivation
|
||||
* Demonstrates nostr_generate_mnemonic_and_keys()
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("=== NOSTR Mnemonic Generation Example ===\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate mnemonic and derive keys for account 0
|
||||
char mnemonic[256];
|
||||
unsigned char private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
unsigned char public_key[NOSTR_PUBLIC_KEY_SIZE];
|
||||
int account = 0;
|
||||
|
||||
int result = nostr_generate_mnemonic_and_keys(mnemonic, sizeof(mnemonic),
|
||||
account, private_key, public_key);
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to generate mnemonic and keys: %s\n", nostr_strerror(result));
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Convert keys to various formats
|
||||
char private_hex[NOSTR_HEX_KEY_SIZE];
|
||||
char public_hex[NOSTR_HEX_KEY_SIZE];
|
||||
char nsec[NOSTR_BECH32_KEY_SIZE];
|
||||
char npub[NOSTR_BECH32_KEY_SIZE];
|
||||
|
||||
nostr_bytes_to_hex(private_key, NOSTR_PRIVATE_KEY_SIZE, private_hex);
|
||||
nostr_bytes_to_hex(public_key, NOSTR_PUBLIC_KEY_SIZE, public_hex);
|
||||
nostr_key_to_bech32(private_key, "nsec", nsec);
|
||||
nostr_key_to_bech32(public_key, "npub", npub);
|
||||
|
||||
// Display results
|
||||
printf("✓ Successfully generated BIP39 mnemonic and derived NOSTR keys\n\n");
|
||||
printf("BIP39 Mnemonic: %s\n\n", mnemonic);
|
||||
printf("Account: %d\n", account);
|
||||
printf("Derivation Path: m/44'/1237'/%d'/0/0 (NIP-06)\n\n", account);
|
||||
printf("Private Key (hex): %s\n", private_hex);
|
||||
printf("Public Key (hex): %s\n", public_hex);
|
||||
printf("nsec (bech32): %s\n", nsec);
|
||||
printf("npub (bech32): %s\n", npub);
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
printf("\n✓ Example completed successfully!\n");
|
||||
printf("💡 Save the mnemonic safely - it can restore your NOSTR identity\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,95 @@
|
|||
/*
|
||||
* Simple Key Generation Example
|
||||
*
|
||||
* This example demonstrates basic NOSTR key generation using the nostr_core library.
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("NOSTR Core Library - Simple Key Generation Example\n");
|
||||
printf("==================================================\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR core library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✓ NOSTR core library initialized\n\n");
|
||||
|
||||
// Generate a random keypair
|
||||
unsigned char private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
unsigned char public_key[NOSTR_PUBLIC_KEY_SIZE];
|
||||
|
||||
printf("Generating random NOSTR keypair...\n");
|
||||
int result = nostr_generate_keypair(private_key, public_key);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to generate keypair: %s\n", nostr_strerror(result));
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Convert keys to hex format
|
||||
char private_hex[NOSTR_HEX_KEY_SIZE];
|
||||
char public_hex[NOSTR_HEX_KEY_SIZE];
|
||||
|
||||
nostr_bytes_to_hex(private_key, NOSTR_PRIVATE_KEY_SIZE, private_hex);
|
||||
nostr_bytes_to_hex(public_key, NOSTR_PUBLIC_KEY_SIZE, public_hex);
|
||||
|
||||
// Convert keys to bech32 format
|
||||
char nsec_bech32[NOSTR_BECH32_KEY_SIZE];
|
||||
char npub_bech32[NOSTR_BECH32_KEY_SIZE];
|
||||
|
||||
if (nostr_key_to_bech32(private_key, "nsec", nsec_bech32) != NOSTR_SUCCESS ||
|
||||
nostr_key_to_bech32(public_key, "npub", npub_bech32) != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to convert keys to bech32 format\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Display the generated keys
|
||||
printf("✓ Keypair generated successfully!\n\n");
|
||||
printf("Private Key (hex): %s\n", private_hex);
|
||||
printf("Public Key (hex): %s\n", public_hex);
|
||||
printf("nsec (bech32): %s\n", nsec_bech32);
|
||||
printf("npub (bech32): %s\n", npub_bech32);
|
||||
|
||||
printf("\n=== Key Validation Test ===\n");
|
||||
|
||||
// Test key validation by decoding the generated nsec
|
||||
unsigned char decoded_private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
result = nostr_decode_nsec(nsec_bech32, decoded_private_key);
|
||||
|
||||
if (result == NOSTR_SUCCESS) {
|
||||
printf("✓ nsec validation: PASSED\n");
|
||||
|
||||
// Verify the decoded key matches the original
|
||||
int keys_match = 1;
|
||||
for (int i = 0; i < NOSTR_PRIVATE_KEY_SIZE; i++) {
|
||||
if (private_key[i] != decoded_private_key[i]) {
|
||||
keys_match = 0;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (keys_match) {
|
||||
printf("✓ Key consistency: PASSED\n");
|
||||
} else {
|
||||
printf("✗ Key consistency: FAILED\n");
|
||||
}
|
||||
} else {
|
||||
printf("✗ nsec validation: FAILED (%s)\n", nostr_strerror(result));
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
printf("\nExample completed successfully!\n");
|
||||
printf("You can now use these keys with NOSTR applications.\n");
|
||||
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,165 @@
|
|||
/*
|
||||
* Example: Utility Functions
|
||||
* Demonstrates nostr_bytes_to_hex(), nostr_hex_to_bytes(), nostr_strerror()
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("=== NOSTR Utility Functions Example ===\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Test 1: Bytes to Hex conversion
|
||||
printf("Test 1: Bytes to Hex Conversion\n");
|
||||
printf("-------------------------------\n");
|
||||
|
||||
unsigned char test_bytes[] = {
|
||||
0x5d, 0xab, 0x08, 0x7e, 0x62, 0x4a, 0x8a, 0x4b,
|
||||
0x79, 0xe1, 0x7f, 0x8b, 0x83, 0x80, 0x0e, 0xe6,
|
||||
0x6f, 0x3b, 0xb1, 0x29, 0x26, 0x18, 0xb6, 0xfd,
|
||||
0x1c, 0x2f, 0x8b, 0x27, 0xff, 0x88, 0xe0, 0xeb
|
||||
};
|
||||
|
||||
char hex_output[65]; // 32 bytes * 2 + null terminator
|
||||
nostr_bytes_to_hex(test_bytes, sizeof(test_bytes), hex_output);
|
||||
|
||||
printf("Input bytes (%zu bytes):\n", sizeof(test_bytes));
|
||||
printf(" ");
|
||||
for (size_t i = 0; i < sizeof(test_bytes); i++) {
|
||||
printf("%02x ", test_bytes[i]);
|
||||
if ((i + 1) % 16 == 0) printf("\n ");
|
||||
}
|
||||
printf("\n");
|
||||
printf("Hex output: %s\n\n", hex_output);
|
||||
|
||||
// Test 2: Hex to Bytes conversion
|
||||
printf("Test 2: Hex to Bytes Conversion\n");
|
||||
printf("-------------------------------\n");
|
||||
|
||||
const char* test_hex = "5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb";
|
||||
unsigned char bytes_output[32];
|
||||
|
||||
printf("Input hex: %s\n", test_hex);
|
||||
|
||||
int result = nostr_hex_to_bytes(test_hex, bytes_output, sizeof(bytes_output));
|
||||
if (result == NOSTR_SUCCESS) {
|
||||
printf("✓ Successfully converted hex to bytes\n");
|
||||
printf("Output bytes (%zu bytes):\n", sizeof(bytes_output));
|
||||
printf(" ");
|
||||
for (size_t i = 0; i < sizeof(bytes_output); i++) {
|
||||
printf("%02x ", bytes_output[i]);
|
||||
if ((i + 1) % 16 == 0) printf("\n ");
|
||||
}
|
||||
printf("\n");
|
||||
|
||||
// Verify round-trip conversion
|
||||
int match = memcmp(test_bytes, bytes_output, sizeof(test_bytes)) == 0;
|
||||
printf("Round-trip verification: %s\n\n", match ? "✓ PASSED" : "✗ FAILED");
|
||||
} else {
|
||||
printf("✗ Failed to convert hex to bytes: %s\n\n", nostr_strerror(result));
|
||||
}
|
||||
|
||||
// Test 3: Error code to string conversion
|
||||
printf("Test 3: Error Code to String Conversion\n");
|
||||
printf("---------------------------------------\n");
|
||||
|
||||
int error_codes[] = {
|
||||
NOSTR_SUCCESS,
|
||||
NOSTR_ERROR_INVALID_INPUT,
|
||||
NOSTR_ERROR_CRYPTO_FAILED,
|
||||
NOSTR_ERROR_MEMORY_FAILED,
|
||||
NOSTR_ERROR_IO_FAILED,
|
||||
NOSTR_ERROR_NETWORK_FAILED,
|
||||
-999 // Unknown error code
|
||||
};
|
||||
|
||||
int num_errors = sizeof(error_codes) / sizeof(error_codes[0]);
|
||||
|
||||
for (int i = 0; i < num_errors; i++) {
|
||||
int code = error_codes[i];
|
||||
const char* message = nostr_strerror(code);
|
||||
printf("Error code %d: %s\n", code, message);
|
||||
}
|
||||
printf("\n");
|
||||
|
||||
// Test 4: Invalid hex string handling
|
||||
printf("Test 4: Invalid Hex String Handling\n");
|
||||
printf("------------------------------------\n");
|
||||
|
||||
const char* invalid_hex_strings[] = {
|
||||
"invalid_hex_string", // Non-hex characters
|
||||
"5dab087e624a8a4b79e17f8b", // Too short (24 chars, need 64)
|
||||
"5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0ebaa", // Too long (66 chars)
|
||||
"", // Empty string
|
||||
"5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eZ" // Invalid hex char 'Z'
|
||||
};
|
||||
|
||||
int num_invalid = sizeof(invalid_hex_strings) / sizeof(invalid_hex_strings[0]);
|
||||
|
||||
for (int i = 0; i < num_invalid; i++) {
|
||||
printf("Testing invalid hex: \"%s\"\n", invalid_hex_strings[i]);
|
||||
|
||||
unsigned char invalid_output[32];
|
||||
result = nostr_hex_to_bytes(invalid_hex_strings[i], invalid_output, sizeof(invalid_output));
|
||||
|
||||
if (result == NOSTR_SUCCESS) {
|
||||
printf(" ✗ Unexpectedly succeeded (should have failed)\n");
|
||||
} else {
|
||||
printf(" ✓ Correctly failed: %s\n", nostr_strerror(result));
|
||||
}
|
||||
}
|
||||
printf("\n");
|
||||
|
||||
// Test 5: Working with real NOSTR keys
|
||||
printf("Test 5: Real NOSTR Key Conversion\n");
|
||||
printf("---------------------------------\n");
|
||||
|
||||
// Generate a real keypair
|
||||
unsigned char private_key[NOSTR_PRIVATE_KEY_SIZE];
|
||||
unsigned char public_key[NOSTR_PUBLIC_KEY_SIZE];
|
||||
|
||||
result = nostr_generate_keypair(private_key, public_key);
|
||||
if (result == NOSTR_SUCCESS) {
|
||||
// Convert to hex
|
||||
char private_hex[NOSTR_HEX_KEY_SIZE];
|
||||
char public_hex[NOSTR_HEX_KEY_SIZE];
|
||||
|
||||
nostr_bytes_to_hex(private_key, NOSTR_PRIVATE_KEY_SIZE, private_hex);
|
||||
nostr_bytes_to_hex(public_key, NOSTR_PUBLIC_KEY_SIZE, public_hex);
|
||||
|
||||
printf("Generated NOSTR keys:\n");
|
||||
printf("Private key (hex): %s\n", private_hex);
|
||||
printf("Public key (hex): %s\n", public_hex);
|
||||
|
||||
// Convert back to bytes to verify
|
||||
unsigned char recovered_private[NOSTR_PRIVATE_KEY_SIZE];
|
||||
unsigned char recovered_public[NOSTR_PUBLIC_KEY_SIZE];
|
||||
|
||||
int priv_result = nostr_hex_to_bytes(private_hex, recovered_private, NOSTR_PRIVATE_KEY_SIZE);
|
||||
int pub_result = nostr_hex_to_bytes(public_hex, recovered_public, NOSTR_PUBLIC_KEY_SIZE);
|
||||
|
||||
if (priv_result == NOSTR_SUCCESS && pub_result == NOSTR_SUCCESS) {
|
||||
int priv_match = memcmp(private_key, recovered_private, NOSTR_PRIVATE_KEY_SIZE) == 0;
|
||||
int pub_match = memcmp(public_key, recovered_public, NOSTR_PUBLIC_KEY_SIZE) == 0;
|
||||
|
||||
printf("Key recovery verification:\n");
|
||||
printf(" Private key: %s\n", priv_match ? "✓ PASSED" : "✗ FAILED");
|
||||
printf(" Public key: %s\n", pub_match ? "✓ PASSED" : "✗ FAILED");
|
||||
}
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
printf("\n✓ Example completed successfully!\n");
|
||||
printf("💡 Utility functions handle format conversions and error reporting\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,824 @@
|
|||
/*
|
||||
* NOSTR Core Library Implementation - Core Functionality
|
||||
*
|
||||
* Self-contained crypto implementation (no external crypto dependencies)
|
||||
*
|
||||
* This file contains:
|
||||
* - NIP-19: Bech32-encoded Entities
|
||||
* - NIP-01: Basic Protocol Flow
|
||||
* - NIP-06: Key Derivation from Mnemonic
|
||||
* - NIP-10: Text Notes (Kind 1)
|
||||
* - NIP-13: Proof of Work
|
||||
* - General Utilities
|
||||
* - Identity Management
|
||||
* - Single Relay Communication
|
||||
*/
|
||||
|
||||
#define _GNU_SOURCE
|
||||
#define _POSIX_C_SOURCE 200809L
|
||||
|
||||
#include "nostr_core.h"
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
#include <sys/stat.h>
|
||||
#include <unistd.h>
|
||||
#include <ctype.h>
|
||||
|
||||
// Our self-contained crypto implementation
|
||||
#include "nostr_crypto.h"
|
||||
|
||||
// Our production-ready WebSocket implementation
|
||||
#include "../nostr_websocket/nostr_websocket_tls.h"
|
||||
|
||||
// cJSON for JSON handling
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
|
||||
// Forward declarations for bech32 functions (used by NIP-06 functions)
|
||||
static int convert_bits(uint8_t *out, size_t *outlen, int outbits, const uint8_t *in, size_t inlen, int inbits, int pad);
|
||||
static int bech32_encode(char *output, const char *hrp, const uint8_t *data, size_t data_len);
|
||||
static int bech32_decode(const char* input, const char* hrp, unsigned char* data, size_t* data_len);
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// GENERAL UTILITIES
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
void nostr_bytes_to_hex(const unsigned char* bytes, size_t len, char* hex) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sprintf(hex + i * 2, "%02x", bytes[i]);
|
||||
}
|
||||
hex[len * 2] = '\0';
|
||||
}
|
||||
|
||||
int nostr_hex_to_bytes(const char* hex, unsigned char* bytes, size_t len) {
|
||||
if (strlen(hex) != len * 2) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
if (sscanf(hex + i * 2, "%02hhx", &bytes[i]) != 1) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
}
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-01: BASIC PROTOCOL FLOW
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
int nostr_init(void) {
|
||||
if (nostr_crypto_init() != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
void nostr_cleanup(void) {
|
||||
nostr_crypto_cleanup();
|
||||
}
|
||||
|
||||
const char* nostr_strerror(int error_code) {
|
||||
switch (error_code) {
|
||||
case NOSTR_SUCCESS: return "Success";
|
||||
case NOSTR_ERROR_INVALID_INPUT: return "Invalid input";
|
||||
case NOSTR_ERROR_CRYPTO_FAILED: return "Cryptographic operation failed";
|
||||
case NOSTR_ERROR_MEMORY_FAILED: return "Memory allocation failed";
|
||||
case NOSTR_ERROR_IO_FAILED: return "I/O operation failed";
|
||||
case NOSTR_ERROR_NETWORK_FAILED: return "Network operation failed";
|
||||
case NOSTR_ERROR_NIP04_INVALID_FORMAT: return "NIP-04 invalid format";
|
||||
case NOSTR_ERROR_NIP04_DECRYPT_FAILED: return "NIP-04 decryption failed";
|
||||
case NOSTR_ERROR_NIP04_BUFFER_TOO_SMALL: return "NIP-04 buffer too small";
|
||||
default: return "Unknown error";
|
||||
}
|
||||
}
|
||||
|
||||
cJSON* nostr_create_and_sign_event(int kind, const char* content, cJSON* tags, const unsigned char* private_key, time_t timestamp) {
|
||||
if (!private_key) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (!content) {
|
||||
content = ""; // Default to empty content
|
||||
}
|
||||
|
||||
// Convert private key to public key
|
||||
unsigned char public_key[32];
|
||||
if (nostr_ec_public_key_from_private_key(private_key, public_key) != 0) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Convert public key to hex
|
||||
char pubkey_hex[65];
|
||||
nostr_bytes_to_hex(public_key, 32, pubkey_hex);
|
||||
|
||||
// Create event structure
|
||||
cJSON* event = cJSON_CreateObject();
|
||||
if (!event) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Use provided timestamp or current time if timestamp is 0
|
||||
time_t event_time = (timestamp == 0) ? time(NULL) : timestamp;
|
||||
|
||||
cJSON_AddStringToObject(event, "pubkey", pubkey_hex);
|
||||
cJSON_AddNumberToObject(event, "created_at", (double)event_time);
|
||||
cJSON_AddNumberToObject(event, "kind", kind);
|
||||
|
||||
// Add tags (copy provided tags or create empty array)
|
||||
if (tags) {
|
||||
cJSON_AddItemToObject(event, "tags", cJSON_Duplicate(tags, 1));
|
||||
} else {
|
||||
cJSON_AddItemToObject(event, "tags", cJSON_CreateArray());
|
||||
}
|
||||
|
||||
cJSON_AddStringToObject(event, "content", content);
|
||||
|
||||
// ============================================================================
|
||||
// INLINE SERIALIZATION AND SIGNING LOGIC
|
||||
// ============================================================================
|
||||
|
||||
// Get event fields for serialization
|
||||
cJSON* pubkey_item = cJSON_GetObjectItem(event, "pubkey");
|
||||
cJSON* created_at_item = cJSON_GetObjectItem(event, "created_at");
|
||||
cJSON* kind_item = cJSON_GetObjectItem(event, "kind");
|
||||
cJSON* tags_item = cJSON_GetObjectItem(event, "tags");
|
||||
cJSON* content_item = cJSON_GetObjectItem(event, "content");
|
||||
|
||||
if (!pubkey_item || !created_at_item || !kind_item || !tags_item || !content_item) {
|
||||
cJSON_Delete(event);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Create serialization array: [0, pubkey, created_at, kind, tags, content]
|
||||
cJSON* serialize_array = cJSON_CreateArray();
|
||||
if (!serialize_array) {
|
||||
cJSON_Delete(event);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
cJSON_AddItemToArray(serialize_array, cJSON_CreateNumber(0));
|
||||
cJSON_AddItemToArray(serialize_array, cJSON_Duplicate(pubkey_item, 1));
|
||||
cJSON_AddItemToArray(serialize_array, cJSON_Duplicate(created_at_item, 1));
|
||||
cJSON_AddItemToArray(serialize_array, cJSON_Duplicate(kind_item, 1));
|
||||
cJSON_AddItemToArray(serialize_array, cJSON_Duplicate(tags_item, 1));
|
||||
cJSON_AddItemToArray(serialize_array, cJSON_Duplicate(content_item, 1));
|
||||
|
||||
char* serialize_string = cJSON_PrintUnformatted(serialize_array);
|
||||
cJSON_Delete(serialize_array);
|
||||
|
||||
if (!serialize_string) {
|
||||
cJSON_Delete(event);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Hash the serialized event
|
||||
unsigned char event_hash[32];
|
||||
if (nostr_sha256((const unsigned char*)serialize_string, strlen(serialize_string), event_hash) != 0) {
|
||||
free(serialize_string);
|
||||
cJSON_Delete(event);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Convert hash to hex for event ID
|
||||
char event_id[65];
|
||||
nostr_bytes_to_hex(event_hash, 32, event_id);
|
||||
|
||||
// Sign the hash using ECDSA
|
||||
unsigned char signature[64];
|
||||
if (nostr_ec_sign(private_key, event_hash, signature) != 0) {
|
||||
free(serialize_string);
|
||||
cJSON_Delete(event);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Convert signature to hex
|
||||
char sig_hex[129];
|
||||
nostr_bytes_to_hex(signature, 64, sig_hex);
|
||||
|
||||
// Add ID and signature to the event
|
||||
cJSON_AddStringToObject(event, "id", event_id);
|
||||
cJSON_AddStringToObject(event, "sig", sig_hex);
|
||||
|
||||
free(serialize_string);
|
||||
|
||||
return event;
|
||||
}
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-06: KEY DERIVATION FROM MNEMONIC
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
int nostr_generate_keypair(unsigned char* private_key, unsigned char* public_key) {
|
||||
if (!private_key || !public_key) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
// Generate random entropy using /dev/urandom
|
||||
FILE* urandom = fopen("/dev/urandom", "rb");
|
||||
if (!urandom) {
|
||||
return NOSTR_ERROR_IO_FAILED;
|
||||
}
|
||||
|
||||
if (fread(private_key, 1, 32, urandom) != 32) {
|
||||
fclose(urandom);
|
||||
return NOSTR_ERROR_IO_FAILED;
|
||||
}
|
||||
fclose(urandom);
|
||||
|
||||
// Validate private key
|
||||
if (nostr_ec_private_key_verify(private_key) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Generate public key from private key (already x-only for NOSTR)
|
||||
if (nostr_ec_public_key_from_private_key(private_key, public_key) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
int nostr_generate_mnemonic_and_keys(char* mnemonic, size_t mnemonic_size,
|
||||
int account, unsigned char* private_key,
|
||||
unsigned char* public_key) {
|
||||
if (!mnemonic || mnemonic_size < 256 || !private_key || !public_key) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
// Generate entropy for 12-word mnemonic
|
||||
unsigned char entropy[16];
|
||||
FILE* urandom = fopen("/dev/urandom", "rb");
|
||||
if (!urandom) {
|
||||
return NOSTR_ERROR_IO_FAILED;
|
||||
}
|
||||
|
||||
if (fread(entropy, 1, sizeof(entropy), urandom) != sizeof(entropy)) {
|
||||
fclose(urandom);
|
||||
return NOSTR_ERROR_IO_FAILED;
|
||||
}
|
||||
fclose(urandom);
|
||||
|
||||
// Generate mnemonic from entropy
|
||||
if (nostr_bip39_mnemonic_from_bytes(entropy, sizeof(entropy), mnemonic) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Derive keys from the generated mnemonic
|
||||
return nostr_derive_keys_from_mnemonic(mnemonic, account, private_key, public_key);
|
||||
}
|
||||
|
||||
int nostr_derive_keys_from_mnemonic(const char* mnemonic, int account,
|
||||
unsigned char* private_key, unsigned char* public_key) {
|
||||
if (!mnemonic || !private_key || !public_key) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
// Validate mnemonic
|
||||
if (nostr_bip39_mnemonic_validate(mnemonic) != 0) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
// Convert mnemonic to seed
|
||||
unsigned char seed[64];
|
||||
if (nostr_bip39_mnemonic_to_seed(mnemonic, "", seed, sizeof(seed)) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Derive master key from seed
|
||||
nostr_hd_key_t master_key;
|
||||
if (nostr_bip32_key_from_seed(seed, sizeof(seed), &master_key) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// NIP-06 path: m/44'/1237'/account'/0/0
|
||||
nostr_hd_key_t derived_key;
|
||||
uint32_t path[] = {
|
||||
0x80000000 + 44, // 44' (hardened)
|
||||
0x80000000 + 1237, // 1237' (hardened)
|
||||
0x80000000 + account, // account' (hardened)
|
||||
0, // 0 (not hardened)
|
||||
0 // 0 (not hardened)
|
||||
};
|
||||
|
||||
if (nostr_bip32_derive_path(&master_key, path, sizeof(path) / sizeof(path[0]), &derived_key) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Extract private key and public key
|
||||
memcpy(private_key, derived_key.private_key, 32);
|
||||
memcpy(public_key, derived_key.public_key + 1, 32); // Remove compression prefix for x-only
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
int nostr_key_to_bech32(const unsigned char* key, const char* hrp, char* output) {
|
||||
if (!key || !hrp || !output) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
uint8_t conv[64];
|
||||
size_t conv_len;
|
||||
|
||||
if (!convert_bits(conv, &conv_len, 5, key, 32, 8, 1)) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
if (!bech32_encode(output, hrp, conv, conv_len)) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
nostr_input_type_t nostr_detect_input_type(const char* input) {
|
||||
if (!input || strlen(input) == 0) {
|
||||
return NOSTR_INPUT_UNKNOWN;
|
||||
}
|
||||
|
||||
size_t len = strlen(input);
|
||||
|
||||
// Check for bech32 nsec
|
||||
if (len > 5 && strncmp(input, "nsec1", 5) == 0) {
|
||||
return NOSTR_INPUT_NSEC_BECH32;
|
||||
}
|
||||
|
||||
// Check for hex nsec (64 characters, all hex)
|
||||
if (len == 64) {
|
||||
int is_hex = 1;
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
if (!isxdigit(input[i])) {
|
||||
is_hex = 0;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (is_hex) {
|
||||
return NOSTR_INPUT_NSEC_HEX;
|
||||
}
|
||||
}
|
||||
|
||||
// Check for mnemonic (space-separated words)
|
||||
int word_count = 0;
|
||||
char temp[1024];
|
||||
strncpy(temp, input, sizeof(temp) - 1);
|
||||
temp[sizeof(temp) - 1] = '\0';
|
||||
|
||||
char* token = strtok(temp, " ");
|
||||
while (token != NULL) {
|
||||
word_count++;
|
||||
token = strtok(NULL, " ");
|
||||
}
|
||||
|
||||
// BIP39 mnemonics are typically 12, 18, or 24 words
|
||||
if (word_count >= 12 && word_count <= 24) {
|
||||
return NOSTR_INPUT_MNEMONIC;
|
||||
}
|
||||
|
||||
return NOSTR_INPUT_UNKNOWN;
|
||||
}
|
||||
|
||||
int nostr_decode_nsec(const char* input, unsigned char* private_key) {
|
||||
if (!input || !private_key) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
nostr_input_type_t type = nostr_detect_input_type(input);
|
||||
|
||||
if (type == NOSTR_INPUT_NSEC_HEX) {
|
||||
if (nostr_hex_to_bytes(input, private_key, 32) != NOSTR_SUCCESS) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
} else if (type == NOSTR_INPUT_NSEC_BECH32) {
|
||||
size_t decoded_len;
|
||||
if (!bech32_decode(input, "nsec", private_key, &decoded_len)) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
if (decoded_len != 32) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
} else {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
// Validate the private key
|
||||
if (nostr_ec_private_key_verify(private_key) != 0) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-13: PROOF OF WORK
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Count leading zero bits in a hash (NIP-13 reference implementation)
|
||||
*/
|
||||
static int zero_bits(unsigned char b) {
|
||||
int n = 0;
|
||||
|
||||
if (b == 0)
|
||||
return 8;
|
||||
|
||||
while (b >>= 1)
|
||||
n++;
|
||||
|
||||
return 7-n;
|
||||
}
|
||||
|
||||
/**
|
||||
* Find the number of leading zero bits in a hash (NIP-13 reference implementation)
|
||||
*/
|
||||
static int count_leading_zero_bits(unsigned char *hash) {
|
||||
int bits, total, i;
|
||||
for (i = 0, total = 0; i < 32; i++) {
|
||||
bits = zero_bits(hash[i]);
|
||||
total += bits;
|
||||
if (bits != 8)
|
||||
break;
|
||||
}
|
||||
return total;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Add or update nonce tag with target difficulty
|
||||
*/
|
||||
static int update_nonce_tag_with_difficulty(cJSON* tags, uint64_t nonce, int target_difficulty) {
|
||||
if (!tags) return -1;
|
||||
|
||||
// Look for existing nonce tag and remove it
|
||||
cJSON* tag = NULL;
|
||||
int index = 0;
|
||||
cJSON_ArrayForEach(tag, tags) {
|
||||
if (cJSON_IsArray(tag) && cJSON_GetArraySize(tag) >= 2) {
|
||||
cJSON* tag_type = cJSON_GetArrayItem(tag, 0);
|
||||
if (tag_type && cJSON_IsString(tag_type) &&
|
||||
strcmp(cJSON_GetStringValue(tag_type), "nonce") == 0) {
|
||||
// Remove existing nonce tag
|
||||
cJSON_DetachItemFromArray(tags, index);
|
||||
cJSON_Delete(tag);
|
||||
break;
|
||||
}
|
||||
}
|
||||
index++;
|
||||
}
|
||||
|
||||
// Add new nonce tag with format: ["nonce", "<nonce>", "<target_difficulty>"]
|
||||
cJSON* nonce_tag = cJSON_CreateArray();
|
||||
if (!nonce_tag) return -1;
|
||||
|
||||
char nonce_str[32];
|
||||
char difficulty_str[16];
|
||||
snprintf(nonce_str, sizeof(nonce_str), "%llu", (unsigned long long)nonce);
|
||||
snprintf(difficulty_str, sizeof(difficulty_str), "%d", target_difficulty);
|
||||
|
||||
cJSON_AddItemToArray(nonce_tag, cJSON_CreateString("nonce"));
|
||||
cJSON_AddItemToArray(nonce_tag, cJSON_CreateString(nonce_str));
|
||||
cJSON_AddItemToArray(nonce_tag, cJSON_CreateString(difficulty_str));
|
||||
|
||||
cJSON_AddItemToArray(tags, nonce_tag);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Helper function to replace event content with successful PoW result
|
||||
*/
|
||||
static void replace_event_content(cJSON* target_event, cJSON* source_event) {
|
||||
// Remove old fields
|
||||
cJSON_DeleteItemFromObject(target_event, "id");
|
||||
cJSON_DeleteItemFromObject(target_event, "sig");
|
||||
cJSON_DeleteItemFromObject(target_event, "tags");
|
||||
cJSON_DeleteItemFromObject(target_event, "created_at");
|
||||
|
||||
// Copy new fields from successful event
|
||||
cJSON* id = cJSON_GetObjectItem(source_event, "id");
|
||||
cJSON* sig = cJSON_GetObjectItem(source_event, "sig");
|
||||
cJSON* tags = cJSON_GetObjectItem(source_event, "tags");
|
||||
cJSON* created_at = cJSON_GetObjectItem(source_event, "created_at");
|
||||
|
||||
if (id) cJSON_AddItemToObject(target_event, "id", cJSON_Duplicate(id, 1));
|
||||
if (sig) cJSON_AddItemToObject(target_event, "sig", cJSON_Duplicate(sig, 1));
|
||||
if (tags) cJSON_AddItemToObject(target_event, "tags", cJSON_Duplicate(tags, 1));
|
||||
if (created_at) cJSON_AddItemToObject(target_event, "created_at", cJSON_Duplicate(created_at, 1));
|
||||
}
|
||||
|
||||
/**
|
||||
* Add NIP-13 Proof of Work to an event
|
||||
*
|
||||
* @param event The event to add proof of work to
|
||||
* @param private_key The private key for re-signing the event
|
||||
* @param target_difficulty Target number of leading zero bits (default: 4 if 0)
|
||||
* @param progress_callback Optional callback for mining progress
|
||||
* @param user_data User data for progress callback
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_add_proof_of_work(cJSON* event, const unsigned char* private_key,
|
||||
int target_difficulty,
|
||||
void (*progress_callback)(int current_difficulty, uint64_t nonce, void* user_data),
|
||||
void* user_data) {
|
||||
if (!event || !private_key) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
// Set default difficulty if not specified (but allow 0 to disable PoW)
|
||||
if (target_difficulty < 0) {
|
||||
target_difficulty = 4;
|
||||
}
|
||||
|
||||
// If target_difficulty is 0, skip proof of work entirely
|
||||
if (target_difficulty == 0) {
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
// Extract event data for reconstruction
|
||||
cJSON* kind_item = cJSON_GetObjectItem(event, "kind");
|
||||
cJSON* content_item = cJSON_GetObjectItem(event, "content");
|
||||
cJSON* created_at_item = cJSON_GetObjectItem(event, "created_at");
|
||||
cJSON* tags_item = cJSON_GetObjectItem(event, "tags");
|
||||
|
||||
if (!kind_item || !content_item || !created_at_item || !tags_item) {
|
||||
return NOSTR_ERROR_INVALID_INPUT;
|
||||
}
|
||||
|
||||
int kind = (int)cJSON_GetNumberValue(kind_item);
|
||||
const char* content = cJSON_GetStringValue(content_item);
|
||||
time_t original_timestamp = (time_t)cJSON_GetNumberValue(created_at_item);
|
||||
|
||||
uint64_t nonce = 0;
|
||||
int attempts = 0;
|
||||
int max_attempts = 10000000;
|
||||
time_t current_timestamp = original_timestamp;
|
||||
|
||||
// PoW difficulty tracking variables
|
||||
int best_difficulty_this_round = 0;
|
||||
int best_difficulty_overall = 0;
|
||||
|
||||
// Mining loop
|
||||
while (attempts < max_attempts) {
|
||||
// Update timestamp every 10,000 iterations
|
||||
if (attempts % 10000 == 0) {
|
||||
current_timestamp = time(NULL);
|
||||
#ifdef ENABLE_DEBUG_LOGGING
|
||||
FILE* f = fopen("debug.log", "a");
|
||||
if (f) {
|
||||
fprintf(f, "PoW mining: %d attempts, best this round: %d, overall best: %d, goal: %d\n",
|
||||
attempts, best_difficulty_this_round, best_difficulty_overall, target_difficulty);
|
||||
fclose(f);
|
||||
}
|
||||
#endif
|
||||
// Reset best difficulty for the new round
|
||||
best_difficulty_this_round = 0;
|
||||
}
|
||||
|
||||
// Create working copy of tags and add nonce
|
||||
cJSON* working_tags = cJSON_Duplicate(tags_item, 1);
|
||||
if (!working_tags) {
|
||||
return NOSTR_ERROR_MEMORY_FAILED;
|
||||
}
|
||||
|
||||
if (update_nonce_tag_with_difficulty(working_tags, nonce, target_difficulty) != 0) {
|
||||
cJSON_Delete(working_tags);
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Create and sign new event with current nonce
|
||||
cJSON* test_event = nostr_create_and_sign_event(kind, content, working_tags,
|
||||
private_key, current_timestamp);
|
||||
cJSON_Delete(working_tags);
|
||||
|
||||
if (!test_event) {
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Check PoW difficulty
|
||||
cJSON* id_item = cJSON_GetObjectItem(test_event, "id");
|
||||
if (!id_item || !cJSON_IsString(id_item)) {
|
||||
cJSON_Delete(test_event);
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
const char* event_id = cJSON_GetStringValue(id_item);
|
||||
unsigned char hash[32];
|
||||
if (nostr_hex_to_bytes(event_id, hash, 32) != NOSTR_SUCCESS) {
|
||||
cJSON_Delete(test_event);
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
// Count leading zero bits using NIP-13 method
|
||||
int current_difficulty = count_leading_zero_bits(hash);
|
||||
|
||||
// Update difficulty tracking
|
||||
if (current_difficulty > best_difficulty_this_round) {
|
||||
best_difficulty_this_round = current_difficulty;
|
||||
}
|
||||
if (current_difficulty > best_difficulty_overall) {
|
||||
best_difficulty_overall = current_difficulty;
|
||||
}
|
||||
|
||||
// Call progress callback if provided
|
||||
if (progress_callback) {
|
||||
progress_callback(current_difficulty, nonce, user_data);
|
||||
}
|
||||
|
||||
// Check if we've reached the target
|
||||
if (current_difficulty >= target_difficulty) {
|
||||
#ifdef ENABLE_DEBUG_LOGGING
|
||||
FILE* f = fopen("debug.log", "a");
|
||||
if (f) {
|
||||
fprintf(f, "PoW SUCCESS: Found difficulty %d (target %d) at nonce %llu after %d attempts\n",
|
||||
current_difficulty, target_difficulty, (unsigned long long)nonce, attempts + 1);
|
||||
|
||||
// Print the final event JSON
|
||||
char* event_json = cJSON_Print(test_event);
|
||||
if (event_json) {
|
||||
fprintf(f, "Final event: %s\n", event_json);
|
||||
free(event_json);
|
||||
}
|
||||
fclose(f);
|
||||
}
|
||||
#endif
|
||||
|
||||
// Copy successful result back to input event
|
||||
replace_event_content(event, test_event);
|
||||
cJSON_Delete(test_event);
|
||||
return NOSTR_SUCCESS;
|
||||
}
|
||||
|
||||
cJSON_Delete(test_event);
|
||||
nonce++;
|
||||
attempts++;
|
||||
}
|
||||
|
||||
#ifdef ENABLE_DEBUG_LOGGING
|
||||
// Debug logging - failure
|
||||
FILE* f = fopen("debug.log", "a");
|
||||
if (f) {
|
||||
fprintf(f, "PoW FAILED: Mining failed after %d attempts\n", max_attempts);
|
||||
fclose(f);
|
||||
}
|
||||
#endif
|
||||
|
||||
// If we reach here, we've exceeded max attempts
|
||||
return NOSTR_ERROR_CRYPTO_FAILED;
|
||||
}
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-19: BECH32-ENCODED ENTITIES
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
#define BECH32_CONST 1
|
||||
|
||||
static const char bech32_charset[] = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
|
||||
|
||||
static const int8_t bech32_charset_rev[128] = {
|
||||
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
||||
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
||||
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
|
||||
15, -1, 10, 17, 21, 20, 26, 30, 7, 5, -1, -1, -1, -1, -1, -1,
|
||||
-1, 29, -1, 24, 13, 25, 9, 8, 23, -1, 18, 22, 31, 27, 19, -1,
|
||||
1, 0, 3, 16, 11, 28, 12, 14, 6, 4, 2, -1, -1, -1, -1, -1,
|
||||
-1, 29, -1, 24, 13, 25, 9, 8, 23, -1, 18, 22, 31, 27, 19, -1,
|
||||
1, 0, 3, 16, 11, 28, 12, 14, 6, 4, 2, -1, -1, -1, -1, -1
|
||||
};
|
||||
|
||||
static uint32_t bech32_polymod_step(uint32_t pre) {
|
||||
uint8_t b = pre >> 25;
|
||||
return ((pre & 0x1FFFFFF) << 5) ^
|
||||
(-((b >> 0) & 1) & 0x3b6a57b2UL) ^
|
||||
(-((b >> 1) & 1) & 0x26508e6dUL) ^
|
||||
(-((b >> 2) & 1) & 0x1ea119faUL) ^
|
||||
(-((b >> 3) & 1) & 0x3d4233ddUL) ^
|
||||
(-((b >> 4) & 1) & 0x2a1462b3UL);
|
||||
}
|
||||
|
||||
static int convert_bits(uint8_t *out, size_t *outlen, int outbits, const uint8_t *in, size_t inlen, int inbits, int pad) {
|
||||
uint32_t val = 0;
|
||||
int bits = 0;
|
||||
uint32_t maxv = (((uint32_t)1) << outbits) - 1;
|
||||
*outlen = 0;
|
||||
while (inlen--) {
|
||||
val = (val << inbits) | *(in++);
|
||||
bits += inbits;
|
||||
while (bits >= outbits) {
|
||||
bits -= outbits;
|
||||
out[(*outlen)++] = (val >> bits) & maxv;
|
||||
}
|
||||
}
|
||||
if (pad) {
|
||||
if (bits) {
|
||||
out[(*outlen)++] = (val << (outbits - bits)) & maxv;
|
||||
}
|
||||
} else if (((val << (outbits - bits)) & maxv) || bits >= inbits) {
|
||||
return 0;
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int bech32_encode(char *output, const char *hrp, const uint8_t *data, size_t data_len) {
|
||||
uint32_t chk = 1;
|
||||
size_t i, hrp_len = strlen(hrp);
|
||||
|
||||
for (i = 0; i < hrp_len; ++i) {
|
||||
int ch = hrp[i];
|
||||
if (ch < 33 || ch > 126) return 0;
|
||||
if (ch >= 'A' && ch <= 'Z') return 0;
|
||||
chk = bech32_polymod_step(chk) ^ (ch >> 5);
|
||||
}
|
||||
|
||||
chk = bech32_polymod_step(chk);
|
||||
for (i = 0; i < hrp_len; ++i) {
|
||||
chk = bech32_polymod_step(chk) ^ (hrp[i] & 0x1f);
|
||||
*(output++) = hrp[i];
|
||||
}
|
||||
|
||||
*(output++) = '1';
|
||||
for (i = 0; i < data_len; ++i) {
|
||||
if (*data >> 5) return 0;
|
||||
chk = bech32_polymod_step(chk) ^ (*data);
|
||||
*(output++) = bech32_charset[*(data++)];
|
||||
}
|
||||
|
||||
for (i = 0; i < 6; ++i) {
|
||||
chk = bech32_polymod_step(chk);
|
||||
}
|
||||
|
||||
chk ^= BECH32_CONST;
|
||||
for (i = 0; i < 6; ++i) {
|
||||
*(output++) = bech32_charset[(chk >> ((5 - i) * 5)) & 0x1f];
|
||||
}
|
||||
|
||||
*output = 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int bech32_decode(const char* input, const char* hrp, unsigned char* data, size_t* data_len) {
|
||||
if (!input || !hrp || !data || !data_len) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
size_t input_len = strlen(input);
|
||||
size_t hrp_len = strlen(hrp);
|
||||
|
||||
if (input_len < hrp_len + 7) return 0;
|
||||
if (strncmp(input, hrp, hrp_len) != 0) return 0;
|
||||
if (input[hrp_len] != '1') return 0;
|
||||
|
||||
const char* data_part = input + hrp_len + 1;
|
||||
size_t data_part_len = input_len - hrp_len - 1;
|
||||
|
||||
uint8_t values[256];
|
||||
for (size_t i = 0; i < data_part_len; i++) {
|
||||
unsigned char c = (unsigned char)data_part[i];
|
||||
if (c >= 128) return 0;
|
||||
int8_t val = bech32_charset_rev[c];
|
||||
if (val == -1) return 0;
|
||||
values[i] = (uint8_t)val;
|
||||
}
|
||||
|
||||
if (data_part_len < 6) return 0;
|
||||
|
||||
uint32_t chk = 1;
|
||||
for (size_t i = 0; i < hrp_len; i++) {
|
||||
chk = bech32_polymod_step(chk) ^ (hrp[i] >> 5);
|
||||
}
|
||||
chk = bech32_polymod_step(chk);
|
||||
for (size_t i = 0; i < hrp_len; i++) {
|
||||
chk = bech32_polymod_step(chk) ^ (hrp[i] & 0x1f);
|
||||
}
|
||||
for (size_t i = 0; i < data_part_len; i++) {
|
||||
chk = bech32_polymod_step(chk) ^ values[i];
|
||||
}
|
||||
|
||||
if (chk != BECH32_CONST) return 0;
|
||||
|
||||
size_t payload_len = data_part_len - 6;
|
||||
size_t decoded_len;
|
||||
if (!convert_bits(data, &decoded_len, 8, values, payload_len, 5, 0)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
*data_len = decoded_len;
|
||||
return 1;
|
||||
}
|
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
|
@ -0,0 +1,610 @@
|
|||
/*
|
||||
* NOSTR Core Library Implementation - Relay Pool Management
|
||||
*
|
||||
* This file contains:
|
||||
* - Relay Pool Management
|
||||
* - Pool connection management
|
||||
* - Subscription handling
|
||||
* - Event processing and dispatching
|
||||
* - Statistics and latency tracking
|
||||
* - Multi-relay query and publish functions
|
||||
*/
|
||||
|
||||
#define _GNU_SOURCE
|
||||
#define _POSIX_C_SOURCE 200809L
|
||||
|
||||
#include "nostr_core.h"
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
#include <unistd.h>
|
||||
|
||||
// Our production-ready WebSocket implementation
|
||||
#include "../nostr_websocket/nostr_websocket_tls.h"
|
||||
|
||||
// cJSON for JSON handling
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
// =============================================================================
|
||||
// TYPE DEFINITIONS FOR SYNCHRONOUS RELAY QUERIES
|
||||
// =============================================================================
|
||||
|
||||
// Relay state enum (internal to this file)
|
||||
typedef enum {
|
||||
RELAY_STATE_CONNECTING,
|
||||
RELAY_STATE_SUBSCRIBED, // REQ sent successfully
|
||||
RELAY_STATE_ACTIVE, // Receiving events
|
||||
RELAY_STATE_EOSE_RECEIVED, // End of stored events
|
||||
RELAY_STATE_TIMED_OUT, // No response within timeout
|
||||
RELAY_STATE_ERROR // Connection or protocol error
|
||||
} relay_state_enum_t;
|
||||
|
||||
// Internal relay connection structure
|
||||
typedef struct {
|
||||
nostr_ws_client_t* client;
|
||||
char* url;
|
||||
time_t last_activity; // Last message received
|
||||
time_t request_sent_time; // When REQ was sent
|
||||
relay_state_enum_t state;
|
||||
int events_received;
|
||||
cJSON** events; // Array of events from this relay
|
||||
int events_capacity; // Allocated capacity
|
||||
char subscription_id[32]; // Unique subscription ID
|
||||
} relay_connection_t;
|
||||
|
||||
|
||||
// =============================================================================
|
||||
// SYNCHRONOUS MULTI-RELAY QUERY WITH PROGRESS CALLBACKS
|
||||
// =============================================================================
|
||||
cJSON** synchronous_query_relays_with_progress(
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* filter,
|
||||
relay_query_mode_t mode,
|
||||
int* result_count,
|
||||
int relay_timeout_seconds,
|
||||
relay_progress_callback_t callback,
|
||||
void* user_data) {
|
||||
|
||||
if (!relay_urls || relay_count <= 0 || !filter || !result_count) {
|
||||
if (result_count) *result_count = 0;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
*result_count = 0;
|
||||
|
||||
// Set default timeout if not specified
|
||||
if (relay_timeout_seconds <= 0) {
|
||||
relay_timeout_seconds = 2; // Default 2 seconds
|
||||
}
|
||||
|
||||
// Initialize relay connections
|
||||
relay_connection_t* relays = calloc(relay_count, sizeof(relay_connection_t));
|
||||
if (!relays) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Setup connections
|
||||
int active_relays = 0;
|
||||
time_t start_time = time(NULL);
|
||||
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
relays[i].url = strdup(relay_urls[i]);
|
||||
relays[i].state = RELAY_STATE_CONNECTING;
|
||||
relays[i].last_activity = start_time;
|
||||
relays[i].events_capacity = 10;
|
||||
relays[i].events = malloc(relays[i].events_capacity * sizeof(cJSON*));
|
||||
|
||||
// Generate unique subscription ID
|
||||
snprintf(relays[i].subscription_id, sizeof(relays[i].subscription_id),
|
||||
"sync_%d_%ld", i, start_time);
|
||||
|
||||
if (callback) {
|
||||
callback(relays[i].url, "connecting", NULL, 0, relay_count, 0, user_data);
|
||||
}
|
||||
|
||||
// Attempt connection
|
||||
relays[i].client = nostr_ws_connect(relays[i].url);
|
||||
if (relays[i].client) {
|
||||
relays[i].state = RELAY_STATE_SUBSCRIBED;
|
||||
relays[i].request_sent_time = time(NULL);
|
||||
relays[i].last_activity = relays[i].request_sent_time;
|
||||
|
||||
// Send REQ message
|
||||
if (nostr_relay_send_req(relays[i].client, relays[i].subscription_id, filter) >= 0) {
|
||||
active_relays++;
|
||||
if (callback) {
|
||||
callback(relays[i].url, "subscribed", NULL, 0, relay_count, 0, user_data);
|
||||
}
|
||||
} else {
|
||||
relays[i].state = RELAY_STATE_ERROR;
|
||||
if (callback) {
|
||||
callback(relays[i].url, "error", NULL, 0, relay_count, 0, user_data);
|
||||
}
|
||||
}
|
||||
} else {
|
||||
relays[i].state = RELAY_STATE_ERROR;
|
||||
if (callback) {
|
||||
callback(relays[i].url, "error", NULL, 0, relay_count, 0, user_data);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (active_relays == 0) {
|
||||
// Cleanup and return
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
free(relays[i].url);
|
||||
free(relays[i].events);
|
||||
}
|
||||
free(relays);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Main polling loop
|
||||
cJSON** result_array = NULL;
|
||||
int total_unique_events = 0;
|
||||
char seen_event_ids[1000][65]; // Simple deduplication
|
||||
int seen_count = 0;
|
||||
|
||||
while (active_relays > 0) {
|
||||
time_t current_time = time(NULL);
|
||||
int completed_relays = relay_count - active_relays;
|
||||
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
relay_connection_t* relay = &relays[i];
|
||||
|
||||
// Skip finished relays
|
||||
if (relay->state == RELAY_STATE_EOSE_RECEIVED ||
|
||||
relay->state == RELAY_STATE_TIMED_OUT ||
|
||||
relay->state == RELAY_STATE_ERROR) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// Check for timeout
|
||||
time_t time_since_activity = current_time - relay->last_activity;
|
||||
if (time_since_activity > relay_timeout_seconds) {
|
||||
relay->state = RELAY_STATE_TIMED_OUT;
|
||||
active_relays--;
|
||||
if (callback) {
|
||||
callback(relay->url, "timeout", NULL, relay->events_received,
|
||||
relay_count, completed_relays + 1, user_data);
|
||||
}
|
||||
if (relay->client) {
|
||||
nostr_relay_send_close(relay->client, relay->subscription_id);
|
||||
nostr_ws_close(relay->client);
|
||||
relay->client = NULL;
|
||||
}
|
||||
continue;
|
||||
}
|
||||
|
||||
// Try to receive message (short timeout to keep UI responsive)
|
||||
char buffer[8192];
|
||||
int len = nostr_ws_receive(relay->client, buffer, sizeof(buffer)-1, 50);
|
||||
|
||||
if (len > 0) {
|
||||
buffer[len] = '\0';
|
||||
relay->last_activity = current_time;
|
||||
|
||||
// Parse message
|
||||
char* msg_type = NULL;
|
||||
cJSON* parsed = NULL;
|
||||
if (nostr_parse_relay_message(buffer, &msg_type, &parsed) == 0) {
|
||||
|
||||
if (msg_type && strcmp(msg_type, "EVENT") == 0) {
|
||||
// Handle EVENT message
|
||||
if (cJSON_IsArray(parsed) && cJSON_GetArraySize(parsed) >= 3) {
|
||||
cJSON* sub_id_json = cJSON_GetArrayItem(parsed, 1);
|
||||
cJSON* event = cJSON_GetArrayItem(parsed, 2);
|
||||
|
||||
if (cJSON_IsString(sub_id_json) && event &&
|
||||
strcmp(cJSON_GetStringValue(sub_id_json), relay->subscription_id) == 0) {
|
||||
|
||||
cJSON* event_id_json = cJSON_GetObjectItem(event, "id");
|
||||
if (event_id_json && cJSON_IsString(event_id_json)) {
|
||||
const char* event_id = cJSON_GetStringValue(event_id_json);
|
||||
|
||||
// Check for duplicate
|
||||
int is_duplicate = 0;
|
||||
for (int j = 0; j < seen_count; j++) {
|
||||
if (strcmp(seen_event_ids[j], event_id) == 0) {
|
||||
is_duplicate = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (!is_duplicate && seen_count < 1000) {
|
||||
// New event - add to seen list
|
||||
strncpy(seen_event_ids[seen_count], event_id, 64);
|
||||
seen_event_ids[seen_count][64] = '\0';
|
||||
seen_count++;
|
||||
total_unique_events++;
|
||||
|
||||
// Store event in relay's array
|
||||
if (relay->events_received >= relay->events_capacity) {
|
||||
relay->events_capacity *= 2;
|
||||
relay->events = realloc(relay->events,
|
||||
relay->events_capacity * sizeof(cJSON*));
|
||||
}
|
||||
|
||||
relay->events[relay->events_received] = cJSON_Duplicate(event, 1);
|
||||
relay->events_received++;
|
||||
relay->state = RELAY_STATE_ACTIVE;
|
||||
|
||||
if (callback) {
|
||||
callback(relay->url, "event_found", event_id,
|
||||
relay->events_received, relay_count,
|
||||
completed_relays, user_data);
|
||||
}
|
||||
|
||||
// For FIRST_RESULT mode, return immediately
|
||||
if (mode == RELAY_QUERY_FIRST_RESULT) {
|
||||
result_array = malloc(sizeof(cJSON*));
|
||||
if (result_array) {
|
||||
result_array[0] = cJSON_Duplicate(event, 1);
|
||||
*result_count = 1;
|
||||
if (callback) {
|
||||
callback(NULL, "first_result", event_id,
|
||||
1, relay_count, completed_relays, user_data);
|
||||
}
|
||||
}
|
||||
goto cleanup; // Break out of all loops
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
} else if (msg_type && strcmp(msg_type, "EOSE") == 0) {
|
||||
// Handle End of Stored Events
|
||||
cJSON* sub_id_json = cJSON_GetArrayItem(parsed, 1);
|
||||
if (cJSON_IsString(sub_id_json) &&
|
||||
strcmp(cJSON_GetStringValue(sub_id_json), relay->subscription_id) == 0) {
|
||||
|
||||
relay->state = RELAY_STATE_EOSE_RECEIVED;
|
||||
active_relays--;
|
||||
|
||||
if (callback) {
|
||||
callback(relay->url, "eose", NULL, relay->events_received,
|
||||
relay_count, completed_relays + 1, user_data);
|
||||
}
|
||||
|
||||
// Send CLOSE and cleanup
|
||||
nostr_relay_send_close(relay->client, relay->subscription_id);
|
||||
nostr_ws_close(relay->client);
|
||||
relay->client = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
if (msg_type) free(msg_type);
|
||||
if (parsed) cJSON_Delete(parsed);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Small sleep to prevent busy waiting
|
||||
usleep(10000); // 10ms
|
||||
}
|
||||
|
||||
// Handle different return modes
|
||||
if (mode == RELAY_QUERY_MOST_RECENT && total_unique_events > 0) {
|
||||
// Find the event with highest created_at
|
||||
time_t most_recent_time = 0;
|
||||
cJSON* most_recent_event = NULL;
|
||||
const char* most_recent_id = NULL;
|
||||
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
for (int j = 0; j < relays[i].events_received; j++) {
|
||||
cJSON* event = relays[i].events[j];
|
||||
cJSON* created_at = cJSON_GetObjectItem(event, "created_at");
|
||||
if (created_at && cJSON_IsNumber(created_at)) {
|
||||
time_t event_time = (time_t)cJSON_GetNumberValue(created_at);
|
||||
if (event_time > most_recent_time) {
|
||||
most_recent_time = event_time;
|
||||
most_recent_event = event;
|
||||
cJSON* id_json = cJSON_GetObjectItem(event, "id");
|
||||
if (id_json && cJSON_IsString(id_json)) {
|
||||
most_recent_id = cJSON_GetStringValue(id_json);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (most_recent_event) {
|
||||
result_array = malloc(sizeof(cJSON*));
|
||||
if (result_array) {
|
||||
result_array[0] = cJSON_Duplicate(most_recent_event, 1);
|
||||
*result_count = 1;
|
||||
if (callback) {
|
||||
callback(NULL, "all_complete", most_recent_id, 1,
|
||||
relay_count, relay_count, user_data);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
} else if (mode == RELAY_QUERY_ALL_RESULTS && total_unique_events > 0) {
|
||||
// Return ALL unique events
|
||||
result_array = malloc(total_unique_events * sizeof(cJSON*));
|
||||
if (result_array) {
|
||||
int event_index = 0;
|
||||
|
||||
// Collect all unique events from all relays
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
for (int j = 0; j < relays[i].events_received; j++) {
|
||||
cJSON* event = relays[i].events[j];
|
||||
cJSON* event_id_json = cJSON_GetObjectItem(event, "id");
|
||||
|
||||
if (event_id_json && cJSON_IsString(event_id_json)) {
|
||||
const char* event_id = cJSON_GetStringValue(event_id_json);
|
||||
|
||||
// Check if we already added this event ID
|
||||
int already_added = 0;
|
||||
for (int k = 0; k < event_index; k++) {
|
||||
cJSON* existing_id = cJSON_GetObjectItem(result_array[k], "id");
|
||||
if (existing_id && cJSON_IsString(existing_id) &&
|
||||
strcmp(cJSON_GetStringValue(existing_id), event_id) == 0) {
|
||||
already_added = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (!already_added) {
|
||||
result_array[event_index] = cJSON_Duplicate(event, 1);
|
||||
event_index++;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
*result_count = event_index;
|
||||
|
||||
if (callback) {
|
||||
callback(NULL, "all_complete", NULL, total_unique_events,
|
||||
relay_count, relay_count, user_data);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cleanup:
|
||||
// Cleanup all relay connections and data
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
if (relays[i].client) {
|
||||
nostr_relay_send_close(relays[i].client, relays[i].subscription_id);
|
||||
nostr_ws_close(relays[i].client);
|
||||
}
|
||||
|
||||
// Free stored events
|
||||
for (int j = 0; j < relays[i].events_received; j++) {
|
||||
if (relays[i].events[j]) {
|
||||
cJSON_Delete(relays[i].events[j]);
|
||||
}
|
||||
}
|
||||
|
||||
free(relays[i].url);
|
||||
free(relays[i].events);
|
||||
}
|
||||
free(relays);
|
||||
|
||||
return result_array;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// SYNCHRONOUS MULTI-RELAY PUBLISH WITH PROGRESS CALLBACKS
|
||||
// =============================================================================
|
||||
|
||||
publish_result_t* synchronous_publish_event_with_progress(
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* event,
|
||||
int* success_count,
|
||||
int relay_timeout_seconds,
|
||||
publish_progress_callback_t callback,
|
||||
void* user_data) {
|
||||
|
||||
if (!relay_urls || relay_count <= 0 || !event || !success_count) {
|
||||
if (success_count) *success_count = 0;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
*success_count = 0;
|
||||
|
||||
// Set default timeout if not specified
|
||||
if (relay_timeout_seconds <= 0) {
|
||||
relay_timeout_seconds = 5; // Default 5 seconds for publishing
|
||||
}
|
||||
|
||||
// Initialize relay connections
|
||||
relay_connection_t* relays = calloc(relay_count, sizeof(relay_connection_t));
|
||||
if (!relays) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Initialize results array
|
||||
publish_result_t* results = calloc(relay_count, sizeof(publish_result_t));
|
||||
if (!results) {
|
||||
free(relays);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Get event ID for tracking
|
||||
cJSON* event_id_json = cJSON_GetObjectItem(event, "id");
|
||||
const char* event_id = NULL;
|
||||
if (event_id_json && cJSON_IsString(event_id_json)) {
|
||||
event_id = cJSON_GetStringValue(event_id_json);
|
||||
}
|
||||
|
||||
// Setup connections
|
||||
int active_relays = 0;
|
||||
time_t start_time = time(NULL);
|
||||
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
relays[i].url = strdup(relay_urls[i]);
|
||||
relays[i].state = RELAY_STATE_CONNECTING;
|
||||
relays[i].last_activity = start_time;
|
||||
results[i] = PUBLISH_ERROR; // Default to error
|
||||
|
||||
if (callback) {
|
||||
callback(relays[i].url, "connecting", NULL, 0, relay_count, 0, user_data);
|
||||
}
|
||||
|
||||
// Attempt connection
|
||||
relays[i].client = nostr_ws_connect(relays[i].url);
|
||||
if (relays[i].client) {
|
||||
relays[i].state = RELAY_STATE_SUBSCRIBED; // Reuse for "publishing" state
|
||||
relays[i].request_sent_time = time(NULL);
|
||||
relays[i].last_activity = relays[i].request_sent_time;
|
||||
|
||||
// Send EVENT message
|
||||
if (nostr_relay_send_event(relays[i].client, event) >= 0) {
|
||||
active_relays++;
|
||||
if (callback) {
|
||||
callback(relays[i].url, "publishing", NULL, 0, relay_count, 0, user_data);
|
||||
}
|
||||
} else {
|
||||
relays[i].state = RELAY_STATE_ERROR;
|
||||
results[i] = PUBLISH_ERROR;
|
||||
if (callback) {
|
||||
callback(relays[i].url, "error", "Failed to send EVENT message",
|
||||
0, relay_count, 0, user_data);
|
||||
}
|
||||
}
|
||||
} else {
|
||||
relays[i].state = RELAY_STATE_ERROR;
|
||||
results[i] = PUBLISH_ERROR;
|
||||
if (callback) {
|
||||
callback(relays[i].url, "error", "Failed to connect", 0, relay_count, 0, user_data);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (active_relays == 0) {
|
||||
// Cleanup and return
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
free(relays[i].url);
|
||||
}
|
||||
free(relays);
|
||||
return results; // Return error results
|
||||
}
|
||||
|
||||
// Main polling loop
|
||||
int completed_relays = relay_count - active_relays;
|
||||
|
||||
while (active_relays > 0) {
|
||||
time_t current_time = time(NULL);
|
||||
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
relay_connection_t* relay = &relays[i];
|
||||
|
||||
// Skip finished relays
|
||||
if (relay->state == RELAY_STATE_EOSE_RECEIVED || // Reuse for "completed"
|
||||
relay->state == RELAY_STATE_TIMED_OUT ||
|
||||
relay->state == RELAY_STATE_ERROR) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// Check for timeout
|
||||
time_t time_since_activity = current_time - relay->last_activity;
|
||||
if (time_since_activity > relay_timeout_seconds) {
|
||||
relay->state = RELAY_STATE_TIMED_OUT;
|
||||
results[i] = PUBLISH_TIMEOUT;
|
||||
active_relays--;
|
||||
completed_relays++;
|
||||
|
||||
if (callback) {
|
||||
callback(relay->url, "timeout", "No response within timeout",
|
||||
*success_count, relay_count, completed_relays, user_data);
|
||||
}
|
||||
|
||||
if (relay->client) {
|
||||
nostr_ws_close(relay->client);
|
||||
relay->client = NULL;
|
||||
}
|
||||
continue;
|
||||
}
|
||||
|
||||
// Try to receive message (short timeout to keep UI responsive)
|
||||
char buffer[8192];
|
||||
int len = nostr_ws_receive(relay->client, buffer, sizeof(buffer)-1, 50);
|
||||
|
||||
if (len > 0) {
|
||||
buffer[len] = '\0';
|
||||
relay->last_activity = current_time;
|
||||
|
||||
// Parse message
|
||||
char* msg_type = NULL;
|
||||
cJSON* parsed = NULL;
|
||||
if (nostr_parse_relay_message(buffer, &msg_type, &parsed) == 0) {
|
||||
|
||||
if (msg_type && strcmp(msg_type, "OK") == 0) {
|
||||
// Handle OK message: ["OK", <event_id>, <true|false>, <message>]
|
||||
if (cJSON_IsArray(parsed) && cJSON_GetArraySize(parsed) >= 3) {
|
||||
cJSON* ok_event_id = cJSON_GetArrayItem(parsed, 1);
|
||||
cJSON* accepted = cJSON_GetArrayItem(parsed, 2);
|
||||
cJSON* message = cJSON_GetArrayItem(parsed, 3);
|
||||
|
||||
// Verify this OK is for our event
|
||||
if (ok_event_id && cJSON_IsString(ok_event_id) && event_id &&
|
||||
strcmp(cJSON_GetStringValue(ok_event_id), event_id) == 0) {
|
||||
|
||||
relay->state = RELAY_STATE_EOSE_RECEIVED; // Reuse for "completed"
|
||||
active_relays--;
|
||||
completed_relays++;
|
||||
|
||||
const char* ok_message = "";
|
||||
if (message && cJSON_IsString(message)) {
|
||||
ok_message = cJSON_GetStringValue(message);
|
||||
}
|
||||
|
||||
if (accepted && cJSON_IsBool(accepted) && cJSON_IsTrue(accepted)) {
|
||||
// Event accepted
|
||||
results[i] = PUBLISH_SUCCESS;
|
||||
(*success_count)++;
|
||||
|
||||
if (callback) {
|
||||
callback(relay->url, "accepted", ok_message,
|
||||
*success_count, relay_count, completed_relays, user_data);
|
||||
}
|
||||
} else {
|
||||
// Event rejected
|
||||
results[i] = PUBLISH_REJECTED;
|
||||
|
||||
if (callback) {
|
||||
callback(relay->url, "rejected", ok_message,
|
||||
*success_count, relay_count, completed_relays, user_data);
|
||||
}
|
||||
}
|
||||
|
||||
// Close connection
|
||||
nostr_ws_close(relay->client);
|
||||
relay->client = NULL;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (msg_type) free(msg_type);
|
||||
if (parsed) cJSON_Delete(parsed);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Small sleep to prevent busy waiting
|
||||
usleep(10000); // 10ms
|
||||
}
|
||||
|
||||
// Final callback with summary
|
||||
if (callback) {
|
||||
callback(NULL, "all_complete", NULL, *success_count, relay_count, relay_count, user_data);
|
||||
}
|
||||
|
||||
// Cleanup relay connections
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
if (relays[i].client) {
|
||||
nostr_ws_close(relays[i].client);
|
||||
}
|
||||
free(relays[i].url);
|
||||
}
|
||||
free(relays);
|
||||
|
||||
return results;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,400 @@
|
|||
/*
|
||||
* NOSTR AES Implementation
|
||||
*
|
||||
* Based on tiny-AES-c by kokke (public domain)
|
||||
* Configured specifically for NIP-04: AES-256-CBC only
|
||||
*
|
||||
* This is an implementation of the AES algorithm, specifically CBC mode.
|
||||
* Configured for AES-256 as required by NIP-04.
|
||||
*/
|
||||
|
||||
#include <string.h> // CBC mode, for memset
|
||||
#include "nostr_aes.h"
|
||||
|
||||
// The number of columns comprising a state in AES. This is a constant in AES. Value=4
|
||||
#define Nb 4
|
||||
|
||||
#if defined(AES256) && (AES256 == 1)
|
||||
#define Nk 8
|
||||
#define Nr 14
|
||||
#elif defined(AES192) && (AES192 == 1)
|
||||
#define Nk 6
|
||||
#define Nr 12
|
||||
#else
|
||||
#define Nk 4 // The number of 32 bit words in a key.
|
||||
#define Nr 10 // The number of rounds in AES Cipher.
|
||||
#endif
|
||||
|
||||
// state - array holding the intermediate results during decryption.
|
||||
typedef uint8_t state_t[4][4];
|
||||
|
||||
// The lookup-tables are marked const so they can be placed in read-only storage instead of RAM
|
||||
static const uint8_t sbox[256] = {
|
||||
//0 1 2 3 4 5 6 7 8 9 A B C D E F
|
||||
0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76,
|
||||
0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0,
|
||||
0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15,
|
||||
0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75,
|
||||
0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84,
|
||||
0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf,
|
||||
0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8,
|
||||
0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2,
|
||||
0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73,
|
||||
0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb,
|
||||
0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79,
|
||||
0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08,
|
||||
0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a,
|
||||
0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e,
|
||||
0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf,
|
||||
0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16 };
|
||||
|
||||
static const uint8_t rsbox[256] = {
|
||||
0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb,
|
||||
0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb,
|
||||
0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e,
|
||||
0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25,
|
||||
0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92,
|
||||
0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84,
|
||||
0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06,
|
||||
0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b,
|
||||
0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73,
|
||||
0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e,
|
||||
0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b,
|
||||
0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4,
|
||||
0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f,
|
||||
0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef,
|
||||
0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61,
|
||||
0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d };
|
||||
|
||||
// The round constant word array, Rcon[i], contains the values given by
|
||||
// x to the power (i-1) being powers of x (x is denoted as {02}) in the field GF(2^8)
|
||||
static const uint8_t Rcon[11] = {
|
||||
0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36 };
|
||||
|
||||
#define getSBoxValue(num) (sbox[(num)])
|
||||
#define getSBoxInvert(num) (rsbox[(num)])
|
||||
|
||||
// This function produces Nb(Nr+1) round keys. The round keys are used in each round to decrypt the states.
|
||||
static void KeyExpansion(uint8_t* RoundKey, const uint8_t* Key)
|
||||
{
|
||||
unsigned i, j, k;
|
||||
uint8_t tempa[4]; // Used for the column/row operations
|
||||
|
||||
// The first round key is the key itself.
|
||||
for (i = 0; i < Nk; ++i)
|
||||
{
|
||||
RoundKey[(i * 4) + 0] = Key[(i * 4) + 0];
|
||||
RoundKey[(i * 4) + 1] = Key[(i * 4) + 1];
|
||||
RoundKey[(i * 4) + 2] = Key[(i * 4) + 2];
|
||||
RoundKey[(i * 4) + 3] = Key[(i * 4) + 3];
|
||||
}
|
||||
|
||||
// All other round keys are found from the previous round keys.
|
||||
for (i = Nk; i < Nb * (Nr + 1); ++i)
|
||||
{
|
||||
{
|
||||
k = (i - 1) * 4;
|
||||
tempa[0]=RoundKey[k + 0];
|
||||
tempa[1]=RoundKey[k + 1];
|
||||
tempa[2]=RoundKey[k + 2];
|
||||
tempa[3]=RoundKey[k + 3];
|
||||
}
|
||||
|
||||
if (i % Nk == 0)
|
||||
{
|
||||
// This function shifts the 4 bytes in a word to the left once.
|
||||
// [a0,a1,a2,a3] becomes [a1,a2,a3,a0]
|
||||
|
||||
// Function RotWord()
|
||||
{
|
||||
const uint8_t u8tmp = tempa[0];
|
||||
tempa[0] = tempa[1];
|
||||
tempa[1] = tempa[2];
|
||||
tempa[2] = tempa[3];
|
||||
tempa[3] = u8tmp;
|
||||
}
|
||||
|
||||
// SubWord() is a function that takes a four-byte input word and
|
||||
// applies the S-box to each of the four bytes to produce an output word.
|
||||
|
||||
// Function Subword()
|
||||
{
|
||||
tempa[0] = getSBoxValue(tempa[0]);
|
||||
tempa[1] = getSBoxValue(tempa[1]);
|
||||
tempa[2] = getSBoxValue(tempa[2]);
|
||||
tempa[3] = getSBoxValue(tempa[3]);
|
||||
}
|
||||
|
||||
tempa[0] = tempa[0] ^ Rcon[i/Nk];
|
||||
}
|
||||
#if defined(AES256) && (AES256 == 1)
|
||||
if (i % Nk == 4)
|
||||
{
|
||||
// Function Subword()
|
||||
{
|
||||
tempa[0] = getSBoxValue(tempa[0]);
|
||||
tempa[1] = getSBoxValue(tempa[1]);
|
||||
tempa[2] = getSBoxValue(tempa[2]);
|
||||
tempa[3] = getSBoxValue(tempa[3]);
|
||||
}
|
||||
}
|
||||
#endif
|
||||
j = i * 4; k=(i - Nk) * 4;
|
||||
RoundKey[j + 0] = RoundKey[k + 0] ^ tempa[0];
|
||||
RoundKey[j + 1] = RoundKey[k + 1] ^ tempa[1];
|
||||
RoundKey[j + 2] = RoundKey[k + 2] ^ tempa[2];
|
||||
RoundKey[j + 3] = RoundKey[k + 3] ^ tempa[3];
|
||||
}
|
||||
}
|
||||
|
||||
void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key)
|
||||
{
|
||||
KeyExpansion(ctx->RoundKey, key);
|
||||
}
|
||||
|
||||
void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv)
|
||||
{
|
||||
KeyExpansion(ctx->RoundKey, key);
|
||||
memcpy (ctx->Iv, iv, AES_BLOCKLEN);
|
||||
}
|
||||
|
||||
void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv)
|
||||
{
|
||||
memcpy (ctx->Iv, iv, AES_BLOCKLEN);
|
||||
}
|
||||
|
||||
// This function adds the round key to state.
|
||||
// The round key is added to the state by an XOR function.
|
||||
static void AddRoundKey(uint8_t round, state_t* state, const uint8_t* RoundKey)
|
||||
{
|
||||
uint8_t i,j;
|
||||
for (i = 0; i < 4; ++i)
|
||||
{
|
||||
for (j = 0; j < 4; ++j)
|
||||
{
|
||||
(*state)[i][j] ^= RoundKey[(round * Nb * 4) + (i * Nb) + j];
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// The SubBytes Function Substitutes the values in the
|
||||
// state matrix with values in an S-box.
|
||||
static void SubBytes(state_t* state)
|
||||
{
|
||||
uint8_t i, j;
|
||||
for (i = 0; i < 4; ++i)
|
||||
{
|
||||
for (j = 0; j < 4; ++j)
|
||||
{
|
||||
(*state)[j][i] = getSBoxValue((*state)[j][i]);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// The ShiftRows() function shifts the rows in the state to the left.
|
||||
// Each row is shifted with different offset.
|
||||
// Offset = Row number. So the first row is not shifted.
|
||||
static void ShiftRows(state_t* state)
|
||||
{
|
||||
uint8_t temp;
|
||||
|
||||
// Rotate first row 1 columns to left
|
||||
temp = (*state)[0][1];
|
||||
(*state)[0][1] = (*state)[1][1];
|
||||
(*state)[1][1] = (*state)[2][1];
|
||||
(*state)[2][1] = (*state)[3][1];
|
||||
(*state)[3][1] = temp;
|
||||
|
||||
// Rotate second row 2 columns to left
|
||||
temp = (*state)[0][2];
|
||||
(*state)[0][2] = (*state)[2][2];
|
||||
(*state)[2][2] = temp;
|
||||
|
||||
temp = (*state)[1][2];
|
||||
(*state)[1][2] = (*state)[3][2];
|
||||
(*state)[3][2] = temp;
|
||||
|
||||
// Rotate third row 3 columns to left
|
||||
temp = (*state)[0][3];
|
||||
(*state)[0][3] = (*state)[3][3];
|
||||
(*state)[3][3] = (*state)[2][3];
|
||||
(*state)[2][3] = (*state)[1][3];
|
||||
(*state)[1][3] = temp;
|
||||
}
|
||||
|
||||
static uint8_t xtime(uint8_t x)
|
||||
{
|
||||
return ((x<<1) ^ (((x>>7) & 1) * 0x1b));
|
||||
}
|
||||
|
||||
// MixColumns function mixes the columns of the state matrix
|
||||
static void MixColumns(state_t* state)
|
||||
{
|
||||
uint8_t i;
|
||||
uint8_t Tmp, Tm, t;
|
||||
for (i = 0; i < 4; ++i)
|
||||
{
|
||||
t = (*state)[i][0];
|
||||
Tmp = (*state)[i][0] ^ (*state)[i][1] ^ (*state)[i][2] ^ (*state)[i][3] ;
|
||||
Tm = (*state)[i][0] ^ (*state)[i][1] ; Tm = xtime(Tm); (*state)[i][0] ^= Tm ^ Tmp ;
|
||||
Tm = (*state)[i][1] ^ (*state)[i][2] ; Tm = xtime(Tm); (*state)[i][1] ^= Tm ^ Tmp ;
|
||||
Tm = (*state)[i][2] ^ (*state)[i][3] ; Tm = xtime(Tm); (*state)[i][2] ^= Tm ^ Tmp ;
|
||||
Tm = (*state)[i][3] ^ t ; Tm = xtime(Tm); (*state)[i][3] ^= Tm ^ Tmp ;
|
||||
}
|
||||
}
|
||||
|
||||
// Multiply is used to multiply numbers in the field GF(2^8)
|
||||
#define Multiply(x, y) \
|
||||
( ((y & 1) * x) ^ \
|
||||
((y>>1 & 1) * xtime(x)) ^ \
|
||||
((y>>2 & 1) * xtime(xtime(x))) ^ \
|
||||
((y>>3 & 1) * xtime(xtime(xtime(x)))) ^ \
|
||||
((y>>4 & 1) * xtime(xtime(xtime(xtime(x)))))) \
|
||||
|
||||
// MixColumns function mixes the columns of the state matrix.
|
||||
static void InvMixColumns(state_t* state)
|
||||
{
|
||||
int i;
|
||||
uint8_t a, b, c, d;
|
||||
for (i = 0; i < 4; ++i)
|
||||
{
|
||||
a = (*state)[i][0];
|
||||
b = (*state)[i][1];
|
||||
c = (*state)[i][2];
|
||||
d = (*state)[i][3];
|
||||
|
||||
(*state)[i][0] = Multiply(a, 0x0e) ^ Multiply(b, 0x0b) ^ Multiply(c, 0x0d) ^ Multiply(d, 0x09);
|
||||
(*state)[i][1] = Multiply(a, 0x09) ^ Multiply(b, 0x0e) ^ Multiply(c, 0x0b) ^ Multiply(d, 0x0d);
|
||||
(*state)[i][2] = Multiply(a, 0x0d) ^ Multiply(b, 0x09) ^ Multiply(c, 0x0e) ^ Multiply(d, 0x0b);
|
||||
(*state)[i][3] = Multiply(a, 0x0b) ^ Multiply(b, 0x0d) ^ Multiply(c, 0x09) ^ Multiply(d, 0x0e);
|
||||
}
|
||||
}
|
||||
|
||||
// The SubBytes Function Substitutes the values in the
|
||||
// state matrix with values in an S-box.
|
||||
static void InvSubBytes(state_t* state)
|
||||
{
|
||||
uint8_t i, j;
|
||||
for (i = 0; i < 4; ++i)
|
||||
{
|
||||
for (j = 0; j < 4; ++j)
|
||||
{
|
||||
(*state)[j][i] = getSBoxInvert((*state)[j][i]);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static void InvShiftRows(state_t* state)
|
||||
{
|
||||
uint8_t temp;
|
||||
|
||||
// Rotate first row 1 columns to right
|
||||
temp = (*state)[3][1];
|
||||
(*state)[3][1] = (*state)[2][1];
|
||||
(*state)[2][1] = (*state)[1][1];
|
||||
(*state)[1][1] = (*state)[0][1];
|
||||
(*state)[0][1] = temp;
|
||||
|
||||
// Rotate second row 2 columns to right
|
||||
temp = (*state)[0][2];
|
||||
(*state)[0][2] = (*state)[2][2];
|
||||
(*state)[2][2] = temp;
|
||||
|
||||
temp = (*state)[1][2];
|
||||
(*state)[1][2] = (*state)[3][2];
|
||||
(*state)[3][2] = temp;
|
||||
|
||||
// Rotate third row 3 columns to right
|
||||
temp = (*state)[0][3];
|
||||
(*state)[0][3] = (*state)[1][3];
|
||||
(*state)[1][3] = (*state)[2][3];
|
||||
(*state)[2][3] = (*state)[3][3];
|
||||
(*state)[3][3] = temp;
|
||||
}
|
||||
|
||||
// Cipher is the main function that encrypts the PlainText.
|
||||
static void Cipher(state_t* state, const uint8_t* RoundKey)
|
||||
{
|
||||
uint8_t round = 0;
|
||||
|
||||
// Add the First round key to the state before starting the rounds.
|
||||
AddRoundKey(0, state, RoundKey);
|
||||
|
||||
// There will be Nr rounds.
|
||||
// The first Nr-1 rounds are identical.
|
||||
// These Nr rounds are executed in the loop below.
|
||||
// Last one without MixColumns()
|
||||
for (round = 1; ; ++round)
|
||||
{
|
||||
SubBytes(state);
|
||||
ShiftRows(state);
|
||||
if (round == Nr) {
|
||||
break;
|
||||
}
|
||||
MixColumns(state);
|
||||
AddRoundKey(round, state, RoundKey);
|
||||
}
|
||||
// Add round key to last round
|
||||
AddRoundKey(Nr, state, RoundKey);
|
||||
}
|
||||
|
||||
static void InvCipher(state_t* state, const uint8_t* RoundKey)
|
||||
{
|
||||
uint8_t round = 0;
|
||||
|
||||
// Add the First round key to the state before starting the rounds.
|
||||
AddRoundKey(Nr, state, RoundKey);
|
||||
|
||||
// There will be Nr rounds.
|
||||
// The first Nr-1 rounds are identical.
|
||||
// These Nr rounds are executed in the loop below.
|
||||
// Last one without InvMixColumn()
|
||||
for (round = (Nr - 1); ; --round)
|
||||
{
|
||||
InvShiftRows(state);
|
||||
InvSubBytes(state);
|
||||
AddRoundKey(round, state, RoundKey);
|
||||
if (round == 0) {
|
||||
break;
|
||||
}
|
||||
InvMixColumns(state);
|
||||
}
|
||||
}
|
||||
|
||||
static void XorWithIv(uint8_t* buf, const uint8_t* Iv)
|
||||
{
|
||||
uint8_t i;
|
||||
for (i = 0; i < AES_BLOCKLEN; ++i) // The block in AES is always 128bit no matter the key size
|
||||
{
|
||||
buf[i] ^= Iv[i];
|
||||
}
|
||||
}
|
||||
|
||||
void AES_CBC_encrypt_buffer(struct AES_ctx *ctx, uint8_t* buf, size_t length)
|
||||
{
|
||||
size_t i;
|
||||
uint8_t *Iv = ctx->Iv;
|
||||
for (i = 0; i < length; i += AES_BLOCKLEN)
|
||||
{
|
||||
XorWithIv(buf, Iv);
|
||||
Cipher((state_t*)buf, ctx->RoundKey);
|
||||
Iv = buf;
|
||||
buf += AES_BLOCKLEN;
|
||||
}
|
||||
/* store Iv in ctx for next call */
|
||||
memcpy(ctx->Iv, Iv, AES_BLOCKLEN);
|
||||
}
|
||||
|
||||
void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length)
|
||||
{
|
||||
size_t i;
|
||||
uint8_t storeNextIv[AES_BLOCKLEN];
|
||||
for (i = 0; i < length; i += AES_BLOCKLEN)
|
||||
{
|
||||
memcpy(storeNextIv, buf, AES_BLOCKLEN);
|
||||
InvCipher((state_t*)buf, ctx->RoundKey);
|
||||
XorWithIv(buf, ctx->Iv);
|
||||
memcpy(ctx->Iv, storeNextIv, AES_BLOCKLEN);
|
||||
buf += AES_BLOCKLEN;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,53 @@
|
|||
#ifndef _NOSTR_AES_H_
|
||||
#define _NOSTR_AES_H_
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stddef.h>
|
||||
|
||||
// Configure for NIP-04 requirements: AES-256-CBC only
|
||||
#define CBC 1
|
||||
#define ECB 0
|
||||
#define CTR 0
|
||||
|
||||
// Configure for AES-256 (required by NIP-04)
|
||||
#define AES128 0
|
||||
#define AES192 0
|
||||
#define AES256 1
|
||||
|
||||
#define AES_BLOCKLEN 16 // Block length in bytes - AES is 128b block only
|
||||
|
||||
#if defined(AES256) && (AES256 == 1)
|
||||
#define AES_KEYLEN 32
|
||||
#define AES_keyExpSize 240
|
||||
#elif defined(AES192) && (AES192 == 1)
|
||||
#define AES_KEYLEN 24
|
||||
#define AES_keyExpSize 208
|
||||
#else
|
||||
#define AES_KEYLEN 16 // Key length in bytes
|
||||
#define AES_keyExpSize 176
|
||||
#endif
|
||||
|
||||
struct AES_ctx
|
||||
{
|
||||
uint8_t RoundKey[AES_keyExpSize];
|
||||
#if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1))
|
||||
uint8_t Iv[AES_BLOCKLEN];
|
||||
#endif
|
||||
};
|
||||
|
||||
void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key);
|
||||
#if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1))
|
||||
void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv);
|
||||
void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv);
|
||||
#endif
|
||||
|
||||
#if defined(CBC) && (CBC == 1)
|
||||
// buffer size MUST be multiple of AES_BLOCKLEN;
|
||||
// Suggest https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 for padding scheme
|
||||
// NOTES: you need to set IV in ctx via AES_init_ctx_iv() or AES_ctx_set_iv()
|
||||
// no IV should ever be reused with the same key
|
||||
void AES_CBC_encrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length);
|
||||
void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length);
|
||||
#endif // #if defined(CBC) && (CBC == 1)
|
||||
|
||||
#endif // _NOSTR_AES_H_
|
Binary file not shown.
|
@ -0,0 +1,163 @@
|
|||
/*
|
||||
* nostr_chacha20.c - ChaCha20 stream cipher implementation
|
||||
*
|
||||
* Implementation based on RFC 8439 "ChaCha20 and Poly1305 for IETF Protocols"
|
||||
*
|
||||
* This implementation is adapted from the RFC 8439 reference specification.
|
||||
* It prioritizes correctness and clarity over performance optimization.
|
||||
*/
|
||||
|
||||
#include "nostr_chacha20.h"
|
||||
#include <string.h>
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* UTILITY MACROS AND FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
/* Left rotate a 32-bit value by n bits */
|
||||
#define ROTLEFT(a, b) (((a) << (b)) | ((a) >> (32 - (b))))
|
||||
|
||||
/* Convert 4 bytes to 32-bit little-endian */
|
||||
static uint32_t bytes_to_u32_le(const uint8_t *bytes) {
|
||||
return ((uint32_t)bytes[0]) |
|
||||
((uint32_t)bytes[1] << 8) |
|
||||
((uint32_t)bytes[2] << 16) |
|
||||
((uint32_t)bytes[3] << 24);
|
||||
}
|
||||
|
||||
/* Convert 32-bit to 4 bytes little-endian */
|
||||
static void u32_to_bytes_le(uint32_t val, uint8_t *bytes) {
|
||||
bytes[0] = (uint8_t)(val & 0xff);
|
||||
bytes[1] = (uint8_t)((val >> 8) & 0xff);
|
||||
bytes[2] = (uint8_t)((val >> 16) & 0xff);
|
||||
bytes[3] = (uint8_t)((val >> 24) & 0xff);
|
||||
}
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* CHACHA20 CORE FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
void chacha20_quarter_round(uint32_t state[16], int a, int b, int c, int d) {
|
||||
state[a] += state[b];
|
||||
state[d] ^= state[a];
|
||||
state[d] = ROTLEFT(state[d], 16);
|
||||
|
||||
state[c] += state[d];
|
||||
state[b] ^= state[c];
|
||||
state[b] = ROTLEFT(state[b], 12);
|
||||
|
||||
state[a] += state[b];
|
||||
state[d] ^= state[a];
|
||||
state[d] = ROTLEFT(state[d], 8);
|
||||
|
||||
state[c] += state[d];
|
||||
state[b] ^= state[c];
|
||||
state[b] = ROTLEFT(state[b], 7);
|
||||
}
|
||||
|
||||
void chacha20_init_state(uint32_t state[16], const uint8_t key[32],
|
||||
uint32_t counter, const uint8_t nonce[12]) {
|
||||
/* ChaCha20 constants "expand 32-byte k" */
|
||||
state[0] = 0x61707865;
|
||||
state[1] = 0x3320646e;
|
||||
state[2] = 0x79622d32;
|
||||
state[3] = 0x6b206574;
|
||||
|
||||
/* Key (8 words) */
|
||||
state[4] = bytes_to_u32_le(key + 0);
|
||||
state[5] = bytes_to_u32_le(key + 4);
|
||||
state[6] = bytes_to_u32_le(key + 8);
|
||||
state[7] = bytes_to_u32_le(key + 12);
|
||||
state[8] = bytes_to_u32_le(key + 16);
|
||||
state[9] = bytes_to_u32_le(key + 20);
|
||||
state[10] = bytes_to_u32_le(key + 24);
|
||||
state[11] = bytes_to_u32_le(key + 28);
|
||||
|
||||
/* Counter (1 word) */
|
||||
state[12] = counter;
|
||||
|
||||
/* Nonce (3 words) */
|
||||
state[13] = bytes_to_u32_le(nonce + 0);
|
||||
state[14] = bytes_to_u32_le(nonce + 4);
|
||||
state[15] = bytes_to_u32_le(nonce + 8);
|
||||
}
|
||||
|
||||
void chacha20_serialize_state(const uint32_t state[16], uint8_t output[64]) {
|
||||
for (int i = 0; i < 16; i++) {
|
||||
u32_to_bytes_le(state[i], output + (i * 4));
|
||||
}
|
||||
}
|
||||
|
||||
int chacha20_block(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], uint8_t output[64]) {
|
||||
uint32_t state[16];
|
||||
uint32_t initial_state[16];
|
||||
|
||||
/* Initialize state */
|
||||
chacha20_init_state(state, key, counter, nonce);
|
||||
|
||||
/* Save initial state for later addition */
|
||||
memcpy(initial_state, state, sizeof(initial_state));
|
||||
|
||||
/* Perform 20 rounds (10 iterations of the 8 quarter rounds) */
|
||||
for (int i = 0; i < 10; i++) {
|
||||
/* Column rounds */
|
||||
chacha20_quarter_round(state, 0, 4, 8, 12);
|
||||
chacha20_quarter_round(state, 1, 5, 9, 13);
|
||||
chacha20_quarter_round(state, 2, 6, 10, 14);
|
||||
chacha20_quarter_round(state, 3, 7, 11, 15);
|
||||
|
||||
/* Diagonal rounds */
|
||||
chacha20_quarter_round(state, 0, 5, 10, 15);
|
||||
chacha20_quarter_round(state, 1, 6, 11, 12);
|
||||
chacha20_quarter_round(state, 2, 7, 8, 13);
|
||||
chacha20_quarter_round(state, 3, 4, 9, 14);
|
||||
}
|
||||
|
||||
/* Add initial state back (prevents slide attacks) */
|
||||
for (int i = 0; i < 16; i++) {
|
||||
state[i] += initial_state[i];
|
||||
}
|
||||
|
||||
/* Serialize to output bytes */
|
||||
chacha20_serialize_state(state, output);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int chacha20_encrypt(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], const uint8_t* input,
|
||||
uint8_t* output, size_t length) {
|
||||
uint8_t keystream[CHACHA20_BLOCK_SIZE];
|
||||
size_t offset = 0;
|
||||
|
||||
while (length > 0) {
|
||||
/* Generate keystream block */
|
||||
int ret = chacha20_block(key, counter, nonce, keystream);
|
||||
if (ret != 0) {
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* XOR with input to produce output */
|
||||
size_t block_len = (length < CHACHA20_BLOCK_SIZE) ? length : CHACHA20_BLOCK_SIZE;
|
||||
for (size_t i = 0; i < block_len; i++) {
|
||||
output[offset + i] = input[offset + i] ^ keystream[i];
|
||||
}
|
||||
|
||||
/* Move to next block */
|
||||
offset += block_len;
|
||||
length -= block_len;
|
||||
counter++;
|
||||
|
||||
/* Check for counter overflow */
|
||||
if (counter == 0) {
|
||||
return -1; /* Counter wrapped around */
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,115 @@
|
|||
/*
|
||||
* nostr_chacha20.h - ChaCha20 stream cipher implementation
|
||||
*
|
||||
* Implementation based on RFC 8439 "ChaCha20 and Poly1305 for IETF Protocols"
|
||||
*
|
||||
* This is a small, portable implementation for NIP-44 support in the NOSTR library.
|
||||
* The implementation prioritizes correctness and simplicity over performance.
|
||||
*/
|
||||
|
||||
#ifndef NOSTR_CHACHA20_H
|
||||
#define NOSTR_CHACHA20_H
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stddef.h>
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* CONSTANTS AND DEFINITIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
#define CHACHA20_KEY_SIZE 32 /* 256 bits */
|
||||
#define CHACHA20_NONCE_SIZE 12 /* 96 bits */
|
||||
#define CHACHA20_BLOCK_SIZE 64 /* 512 bits */
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* CORE CHACHA20 FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
/**
|
||||
* ChaCha20 quarter round operation
|
||||
*
|
||||
* Operates on four 32-bit words performing the core ChaCha20 quarter round:
|
||||
* a += b; d ^= a; d <<<= 16;
|
||||
* c += d; b ^= c; b <<<= 12;
|
||||
* a += b; d ^= a; d <<<= 8;
|
||||
* c += d; b ^= c; b <<<= 7;
|
||||
*
|
||||
* @param state[in,out] ChaCha state as 16 32-bit words
|
||||
* @param a, b, c, d Indices into state array for quarter round
|
||||
*/
|
||||
void chacha20_quarter_round(uint32_t state[16], int a, int b, int c, int d);
|
||||
|
||||
/**
|
||||
* ChaCha20 block function
|
||||
*
|
||||
* Transforms a 64-byte input block using ChaCha20 algorithm with 20 rounds.
|
||||
*
|
||||
* @param key[in] 32-byte key
|
||||
* @param counter[in] 32-bit block counter
|
||||
* @param nonce[in] 12-byte nonce
|
||||
* @param output[out] 64-byte output buffer
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int chacha20_block(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], uint8_t output[64]);
|
||||
|
||||
/**
|
||||
* ChaCha20 encryption/decryption
|
||||
*
|
||||
* Encrypts or decrypts data using ChaCha20 stream cipher.
|
||||
* Since ChaCha20 is a stream cipher, encryption and decryption are the same operation.
|
||||
*
|
||||
* @param key[in] 32-byte key
|
||||
* @param counter[in] Initial 32-bit counter value
|
||||
* @param nonce[in] 12-byte nonce
|
||||
* @param input[in] Input data to encrypt/decrypt
|
||||
* @param output[out] Output buffer (can be same as input)
|
||||
* @param length[in] Length of input data in bytes
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int chacha20_encrypt(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], const uint8_t* input,
|
||||
uint8_t* output, size_t length);
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* UTILITY FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
/**
|
||||
* Initialize ChaCha20 state matrix
|
||||
*
|
||||
* Sets up the initial 16-word state matrix with constants, key, counter, and nonce.
|
||||
*
|
||||
* @param state[out] 16-word state array to initialize
|
||||
* @param key[in] 32-byte key
|
||||
* @param counter[in] 32-bit block counter
|
||||
* @param nonce[in] 12-byte nonce
|
||||
*/
|
||||
void chacha20_init_state(uint32_t state[16], const uint8_t key[32],
|
||||
uint32_t counter, const uint8_t nonce[12]);
|
||||
|
||||
/**
|
||||
* Serialize ChaCha20 state to bytes
|
||||
*
|
||||
* Converts 16 32-bit words to 64 bytes in little-endian format.
|
||||
*
|
||||
* @param state[in] 16-word state array
|
||||
* @param output[out] 64-byte output buffer
|
||||
*/
|
||||
void chacha20_serialize_state(const uint32_t state[16], uint8_t output[64]);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif /* NOSTR_CHACHA20_H */
|
Binary file not shown.
|
@ -0,0 +1,744 @@
|
|||
/*
|
||||
* NOSTR Core Library
|
||||
*
|
||||
* A C library for NOSTR protocol implementation
|
||||
* Self-contained crypto implementation (no external crypto dependencies)
|
||||
*
|
||||
* Features:
|
||||
* - BIP39 mnemonic generation and validation
|
||||
* - BIP32 hierarchical deterministic key derivation (NIP-06 compliant)
|
||||
* - NOSTR key pair generation and management
|
||||
* - Event creation, signing, and serialization
|
||||
* - Relay communication (websocket-based)
|
||||
* - Identity management and persistence
|
||||
*/
|
||||
|
||||
#ifndef NOSTR_CORE_H
|
||||
#define NOSTR_CORE_H
|
||||
|
||||
#include <stddef.h>
|
||||
#include <stdint.h>
|
||||
#include <time.h>
|
||||
|
||||
// Forward declare cJSON to avoid requiring cJSON.h in public header
|
||||
typedef struct cJSON cJSON;
|
||||
|
||||
// Return codes
|
||||
#define NOSTR_SUCCESS 0
|
||||
#define NOSTR_ERROR_INVALID_INPUT -1
|
||||
#define NOSTR_ERROR_CRYPTO_FAILED -2
|
||||
#define NOSTR_ERROR_MEMORY_FAILED -3
|
||||
#define NOSTR_ERROR_IO_FAILED -4
|
||||
#define NOSTR_ERROR_NETWORK_FAILED -5
|
||||
#define NOSTR_ERROR_NIP04_INVALID_FORMAT -10
|
||||
#define NOSTR_ERROR_NIP04_DECRYPT_FAILED -11
|
||||
#define NOSTR_ERROR_NIP04_BUFFER_TOO_SMALL -12
|
||||
#define NOSTR_ERROR_NIP44_INVALID_FORMAT -13
|
||||
#define NOSTR_ERROR_NIP44_DECRYPT_FAILED -14
|
||||
#define NOSTR_ERROR_NIP44_BUFFER_TOO_SMALL -15
|
||||
|
||||
// Debug control - uncomment to enable debug output
|
||||
// #define NOSTR_DEBUG_ENABLED
|
||||
|
||||
// Constants
|
||||
#define NOSTR_PRIVATE_KEY_SIZE 32
|
||||
#define NOSTR_PUBLIC_KEY_SIZE 32
|
||||
#define NOSTR_HEX_KEY_SIZE 65 // 64 + null terminator
|
||||
#define NOSTR_BECH32_KEY_SIZE 100
|
||||
#define NOSTR_MAX_CONTENT_SIZE 2048
|
||||
#define NOSTR_MAX_URL_SIZE 256
|
||||
|
||||
// NIP-04 Constants
|
||||
#define NOSTR_NIP04_MAX_PLAINTEXT_SIZE 16777216 // 16MB
|
||||
#define NOSTR_NIP04_MAX_ENCRYPTED_SIZE 22369621 // ~21.3MB (accounts for base64 overhead + IV)
|
||||
|
||||
// Input type detection
|
||||
typedef enum {
|
||||
NOSTR_INPUT_UNKNOWN = 0,
|
||||
NOSTR_INPUT_MNEMONIC,
|
||||
NOSTR_INPUT_NSEC_HEX,
|
||||
NOSTR_INPUT_NSEC_BECH32
|
||||
} nostr_input_type_t;
|
||||
|
||||
// Relay permissions
|
||||
typedef enum {
|
||||
NOSTR_RELAY_READ_WRITE = 0,
|
||||
NOSTR_RELAY_READ_ONLY,
|
||||
NOSTR_RELAY_WRITE_ONLY
|
||||
} nostr_relay_permission_t;
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// LIBRARY MAINTENANCE - KEEP THE SHELVES NICE AND ORGANIZED.
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
/**
|
||||
* Initialize the NOSTR core library (must be called before using other functions)
|
||||
*
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_init(void);
|
||||
|
||||
/**
|
||||
* Cleanup the NOSTR core library (call when done)
|
||||
*/
|
||||
void nostr_cleanup(void);
|
||||
|
||||
/**
|
||||
* Get human-readable error message for error code
|
||||
*
|
||||
* @param error_code Error code from other functions
|
||||
* @return Human-readable error string
|
||||
*/
|
||||
const char* nostr_strerror(int error_code);
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// GENERAL NOSTR UTILITIES
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Convert bytes to hexadecimal string
|
||||
*
|
||||
* @param bytes Input bytes
|
||||
* @param len Number of bytes
|
||||
* @param hex Output hex string (must be at least len*2+1 bytes)
|
||||
*/
|
||||
void nostr_bytes_to_hex(const unsigned char* bytes, size_t len, char* hex);
|
||||
|
||||
/**
|
||||
* Convert hexadecimal string to bytes
|
||||
*
|
||||
* @param hex Input hex string
|
||||
* @param bytes Output bytes buffer
|
||||
* @param len Expected number of bytes
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_hex_to_bytes(const char* hex, unsigned char* bytes, size_t len);
|
||||
|
||||
/**
|
||||
* Generate public key from private key
|
||||
*
|
||||
* @param private_key Input private key (32 bytes)
|
||||
* @param public_key Output public key (32 bytes, x-only)
|
||||
* @return 0 on success, non-zero on failure
|
||||
*/
|
||||
int nostr_ec_public_key_from_private_key(const unsigned char* private_key, unsigned char* public_key);
|
||||
|
||||
/**
|
||||
* Sign a hash using BIP-340 Schnorr signatures (NOSTR standard)
|
||||
*
|
||||
* @param private_key Input private key (32 bytes)
|
||||
* @param hash Input hash to sign (32 bytes)
|
||||
* @param signature Output signature (64 bytes)
|
||||
* @return 0 on success, non-zero on failure
|
||||
*/
|
||||
int nostr_schnorr_sign(const unsigned char* private_key, const unsigned char* hash, unsigned char* signature);
|
||||
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-01: BASIC PROTOCOL FLOW
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Create and sign a NOSTR event
|
||||
*
|
||||
* @param kind Event kind (0=profile, 1=text, 3=contacts, 10002=relays, etc.)
|
||||
* @param content Event content string
|
||||
* @param tags cJSON array of tags (NULL for empty tags)
|
||||
* @param private_key Private key for signing (32 bytes)
|
||||
* @param timestamp Event timestamp (0 for current time)
|
||||
* @return cJSON event object (caller must free), NULL on failure
|
||||
*/
|
||||
cJSON* nostr_create_and_sign_event(int kind, const char* content, cJSON* tags, const unsigned char* private_key, time_t timestamp);
|
||||
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-04: ENCRYPTED DIRECT MESSAGES
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Encrypt a message using NIP-04 (ECDH + AES-CBC + Base64)
|
||||
*
|
||||
* @param sender_private_key Sender's 32-byte private key
|
||||
* @param recipient_public_key Recipient's 32-byte public key (x-only)
|
||||
* @param plaintext Message to encrypt
|
||||
* @param output Buffer for encrypted result (recommend NOSTR_NIP04_MAX_ENCRYPTED_SIZE)
|
||||
* @param output_size Size of output buffer
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_nip04_encrypt(const unsigned char* sender_private_key,
|
||||
const unsigned char* recipient_public_key,
|
||||
const char* plaintext,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
/**
|
||||
* Decrypt a NIP-04 encrypted message
|
||||
*
|
||||
* @param recipient_private_key Recipient's 32-byte private key
|
||||
* @param sender_public_key Sender's 32-byte public key (x-only)
|
||||
* @param encrypted_data Encrypted message in format "ciphertext?iv=iv"
|
||||
* @param output Buffer for decrypted plaintext (recommend NOSTR_NIP04_MAX_PLAINTEXT_SIZE)
|
||||
* @param output_size Size of output buffer
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_nip04_decrypt(const unsigned char* recipient_private_key,
|
||||
const unsigned char* sender_public_key,
|
||||
const char* encrypted_data,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-44: VERSIONED ENCRYPTED DIRECT MESSAGES
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Encrypt a message using NIP-44 v2 (ECDH + ChaCha20 + HMAC)
|
||||
*
|
||||
* @param sender_private_key Sender's 32-byte private key
|
||||
* @param recipient_public_key Recipient's 32-byte public key (x-only)
|
||||
* @param plaintext Message to encrypt
|
||||
* @param output Buffer for encrypted result (recommend NOSTR_NIP44_MAX_PLAINTEXT_SIZE * 2)
|
||||
* @param output_size Size of output buffer
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_nip44_encrypt(const unsigned char* sender_private_key,
|
||||
const unsigned char* recipient_public_key,
|
||||
const char* plaintext,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
/**
|
||||
* Decrypt a NIP-44 encrypted message
|
||||
*
|
||||
* @param recipient_private_key Recipient's 32-byte private key
|
||||
* @param sender_public_key Sender's 32-byte public key (x-only)
|
||||
* @param encrypted_data Base64-encoded encrypted message
|
||||
* @param output Buffer for decrypted plaintext
|
||||
* @param output_size Size of output buffer
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_nip44_decrypt(const unsigned char* recipient_private_key,
|
||||
const unsigned char* sender_public_key,
|
||||
const char* encrypted_data,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-06: KEY DERIVATION FROM MNEMONIC
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Generate a random NOSTR keypair using cryptographically secure entropy
|
||||
*
|
||||
* @param private_key Output buffer for private key (32 bytes)
|
||||
* @param public_key Output buffer for public key (32 bytes, x-only)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_generate_keypair(unsigned char* private_key, unsigned char* public_key);
|
||||
|
||||
|
||||
/**
|
||||
* Generate a BIP39 mnemonic phrase and derive NOSTR keys
|
||||
*
|
||||
* @param mnemonic Output buffer for mnemonic (at least 256 bytes recommended)
|
||||
* @param mnemonic_size Size of mnemonic buffer
|
||||
* @param account Account number for key derivation (default: 0)
|
||||
* @param private_key Output buffer for private key (32 bytes)
|
||||
* @param public_key Output buffer for public key (32 bytes)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_generate_mnemonic_and_keys(char* mnemonic, size_t mnemonic_size,
|
||||
int account, unsigned char* private_key,
|
||||
unsigned char* public_key);
|
||||
|
||||
|
||||
/**
|
||||
* Derive NOSTR keys from existing BIP39 mnemonic (NIP-06 compliant)
|
||||
*
|
||||
* @param mnemonic BIP39 mnemonic phrase
|
||||
* @param account Account number for derivation path m/44'/1237'/account'/0/0
|
||||
* @param private_key Output buffer for private key (32 bytes)
|
||||
* @param public_key Output buffer for public key (32 bytes)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_derive_keys_from_mnemonic(const char* mnemonic, int account,
|
||||
unsigned char* private_key, unsigned char* public_key);
|
||||
|
||||
|
||||
/**
|
||||
* Convert NOSTR key to bech32 format (nsec/npub)
|
||||
*
|
||||
* @param key Key data (32 bytes)
|
||||
* @param hrp Human readable part ("nsec" or "npub")
|
||||
* @param output Output buffer (at least 100 bytes recommended)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_key_to_bech32(const unsigned char* key, const char* hrp, char* output);
|
||||
|
||||
|
||||
/**
|
||||
* Detect the type of input string (mnemonic, hex nsec, bech32 nsec)
|
||||
*
|
||||
* @param input Input string to analyze
|
||||
* @return Input type enum
|
||||
*/
|
||||
nostr_input_type_t nostr_detect_input_type(const char* input);
|
||||
|
||||
|
||||
/**
|
||||
* Validate and decode an nsec (hex or bech32) to private key
|
||||
*
|
||||
* @param input Input nsec string
|
||||
* @param private_key Output buffer for private key (32 bytes)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_decode_nsec(const char* input, unsigned char* private_key);
|
||||
|
||||
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// NIP-13: PROOF OF WORK
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
/**
|
||||
* Add NIP-13 Proof of Work to an existing event
|
||||
*
|
||||
* @param event cJSON event object to add PoW to
|
||||
* @param private_key Private key for re-signing the event during mining
|
||||
* @param target_difficulty Target number of leading zero bits (default: 2 if 0)
|
||||
* @param progress_callback Optional callback for progress updates (nonce, difficulty, user_data)
|
||||
* @param user_data User data passed to progress callback
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_add_proof_of_work(cJSON* event, const unsigned char* private_key,
|
||||
int target_difficulty,
|
||||
void (*progress_callback)(int current_difficulty, uint64_t nonce, void* user_data),
|
||||
void* user_data);
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
// =============================================================================
|
||||
// RELAY COMMUNICATION
|
||||
// =============================================================================
|
||||
|
||||
/**
|
||||
* Query a relay for a specific event
|
||||
*
|
||||
* @param relay_url Relay WebSocket URL (ws:// or wss://)
|
||||
* @param pubkey_hex Author's public key in hex format
|
||||
* @param kind Event kind to search for
|
||||
* @return cJSON event object (caller must free), NULL if not found/error
|
||||
*/
|
||||
cJSON* nostr_query_relay_for_event(const char* relay_url, const char* pubkey_hex, int kind);
|
||||
|
||||
|
||||
// =============================================================================
|
||||
// SYNCHRONOUS MULTI-RELAY QUERIES AND PUBLISHING
|
||||
// =============================================================================
|
||||
|
||||
// Query mode enum
|
||||
typedef enum {
|
||||
RELAY_QUERY_FIRST_RESULT, // Return as soon as first event is found
|
||||
RELAY_QUERY_MOST_RECENT, // Wait for all relays, return most recent event
|
||||
RELAY_QUERY_ALL_RESULTS // Wait for all relays, return all unique events
|
||||
} relay_query_mode_t;
|
||||
|
||||
// Progress callback type for relay queries
|
||||
typedef void (*relay_progress_callback_t)(
|
||||
const char* relay_url, // Which relay is reporting (NULL for summary)
|
||||
const char* status, // Status: "connecting", "subscribed", "event_found", "eose", "complete", "timeout", "error", "first_result", "all_complete"
|
||||
const char* event_id, // Event ID when applicable (NULL otherwise)
|
||||
int events_received, // Number of events from this relay
|
||||
int total_relays, // Total number of relays
|
||||
int completed_relays, // Number of relays finished
|
||||
void* user_data // User data pointer
|
||||
);
|
||||
|
||||
/**
|
||||
* Query multiple relays synchronously with progress callbacks
|
||||
*
|
||||
* @param relay_urls Array of relay WebSocket URLs
|
||||
* @param relay_count Number of relays in array
|
||||
* @param filter cJSON filter object for query
|
||||
* @param mode Query mode (FIRST_RESULT, MOST_RECENT, or ALL_RESULTS)
|
||||
* @param result_count OUTPUT: number of events returned
|
||||
* @param relay_timeout_seconds Timeout per relay in seconds (default: 2 if <= 0)
|
||||
* @param callback Progress callback function (can be NULL)
|
||||
* @param user_data User data passed to callback
|
||||
* @return Array of cJSON events (caller must free each event and array), NULL on failure
|
||||
*/
|
||||
cJSON** synchronous_query_relays_with_progress(
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* filter,
|
||||
relay_query_mode_t mode,
|
||||
int* result_count,
|
||||
int relay_timeout_seconds,
|
||||
relay_progress_callback_t callback,
|
||||
void* user_data
|
||||
);
|
||||
|
||||
// Publish result enum
|
||||
typedef enum {
|
||||
PUBLISH_SUCCESS, // Event accepted by relay (received OK with true)
|
||||
PUBLISH_REJECTED, // Event rejected by relay (received OK with false)
|
||||
PUBLISH_TIMEOUT, // No response from relay within timeout
|
||||
PUBLISH_ERROR // Connection error or other failure
|
||||
} publish_result_t;
|
||||
|
||||
// Progress callback type for publishing
|
||||
typedef void (*publish_progress_callback_t)(
|
||||
const char* relay_url, // Which relay is reporting
|
||||
const char* status, // Status: "connecting", "publishing", "accepted", "rejected", "timeout", "error"
|
||||
const char* message, // OK message from relay (for rejected events)
|
||||
int successful_publishes, // Count of successful publishes so far
|
||||
int total_relays, // Total number of relays
|
||||
int completed_relays, // Number of relays finished
|
||||
void* user_data // User data pointer
|
||||
);
|
||||
|
||||
/**
|
||||
* Publish event to multiple relays synchronously with progress callbacks
|
||||
*
|
||||
* @param relay_urls Array of relay WebSocket URLs
|
||||
* @param relay_count Number of relays in array
|
||||
* @param event cJSON event object to publish
|
||||
* @param success_count OUTPUT: number of successful publishes
|
||||
* @param relay_timeout_seconds Timeout per relay in seconds (default: 5 if <= 0)
|
||||
* @param callback Progress callback function (can be NULL)
|
||||
* @param user_data User data passed to callback
|
||||
* @return Array of publish_result_t (caller must free), NULL on failure
|
||||
*/
|
||||
publish_result_t* synchronous_publish_event_with_progress(
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* event,
|
||||
int* success_count,
|
||||
int relay_timeout_seconds,
|
||||
publish_progress_callback_t callback,
|
||||
void* user_data
|
||||
);
|
||||
|
||||
// =============================================================================
|
||||
// RELAY POOL MANAGEMENT
|
||||
// =============================================================================
|
||||
|
||||
// Forward declarations for relay pool types
|
||||
typedef struct nostr_relay_pool nostr_relay_pool_t;
|
||||
typedef struct nostr_pool_subscription nostr_pool_subscription_t;
|
||||
|
||||
// Pool connection status
|
||||
typedef enum {
|
||||
NOSTR_POOL_RELAY_DISCONNECTED = 0,
|
||||
NOSTR_POOL_RELAY_CONNECTING = 1,
|
||||
NOSTR_POOL_RELAY_CONNECTED = 2,
|
||||
NOSTR_POOL_RELAY_ERROR = -1
|
||||
} nostr_pool_relay_status_t;
|
||||
|
||||
// Relay statistics structure
|
||||
typedef struct {
|
||||
// Event counters
|
||||
int events_received;
|
||||
int events_published;
|
||||
int events_published_ok;
|
||||
int events_published_failed;
|
||||
|
||||
// Connection stats
|
||||
int connection_attempts;
|
||||
int connection_failures;
|
||||
time_t connection_uptime_start;
|
||||
time_t last_event_time;
|
||||
|
||||
// Latency measurements (milliseconds)
|
||||
// NOTE: ping_latency_* values will be 0.0/-1.0 until PONG response handling is fixed
|
||||
double ping_latency_current;
|
||||
double ping_latency_avg;
|
||||
double ping_latency_min;
|
||||
double ping_latency_max;
|
||||
double publish_latency_avg; // EVENT->OK response time
|
||||
double query_latency_avg; // REQ->first EVENT response time
|
||||
double query_latency_min; // Min query latency
|
||||
double query_latency_max; // Max query latency
|
||||
|
||||
// Sample counts for averaging
|
||||
int ping_samples;
|
||||
int publish_samples;
|
||||
int query_samples;
|
||||
} nostr_relay_stats_t;
|
||||
|
||||
/**
|
||||
* Create a new relay pool for managing multiple relay connections
|
||||
*
|
||||
* @return New relay pool instance (caller must destroy), NULL on failure
|
||||
*/
|
||||
nostr_relay_pool_t* nostr_relay_pool_create(void);
|
||||
|
||||
/**
|
||||
* Add a relay to the pool
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay WebSocket URL (ws:// or wss://)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_relay_pool_add_relay(nostr_relay_pool_t* pool, const char* relay_url);
|
||||
|
||||
/**
|
||||
* Remove a relay from the pool
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to remove
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_relay_pool_remove_relay(nostr_relay_pool_t* pool, const char* relay_url);
|
||||
|
||||
/**
|
||||
* Destroy relay pool and cleanup all connections
|
||||
*
|
||||
* @param pool Relay pool instance to destroy
|
||||
*/
|
||||
void nostr_relay_pool_destroy(nostr_relay_pool_t* pool);
|
||||
|
||||
/**
|
||||
* Subscribe to events from multiple relays with event deduplication
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_urls Array of relay URLs to subscribe to
|
||||
* @param relay_count Number of relays in array
|
||||
* @param filter cJSON filter object for subscription
|
||||
* @param on_event Callback for received events (event, relay_url, user_data)
|
||||
* @param on_eose Callback when all relays have sent EOSE (user_data)
|
||||
* @param user_data User data passed to callbacks
|
||||
* @return Subscription handle (caller must close), NULL on failure
|
||||
*/
|
||||
nostr_pool_subscription_t* nostr_relay_pool_subscribe(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* filter,
|
||||
void (*on_event)(cJSON* event, const char* relay_url, void* user_data),
|
||||
void (*on_eose)(void* user_data),
|
||||
void* user_data
|
||||
);
|
||||
|
||||
/**
|
||||
* Close a pool subscription
|
||||
*
|
||||
* @param subscription Subscription to close
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_pool_subscription_close(nostr_pool_subscription_t* subscription);
|
||||
|
||||
/**
|
||||
* Query multiple relays synchronously and return all matching events
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_urls Array of relay URLs to query
|
||||
* @param relay_count Number of relays in array
|
||||
* @param filter cJSON filter object for query
|
||||
* @param event_count Output: number of events returned
|
||||
* @param timeout_ms Timeout in milliseconds
|
||||
* @return Array of cJSON events (caller must free), NULL on failure/timeout
|
||||
*/
|
||||
cJSON** nostr_relay_pool_query_sync(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* filter,
|
||||
int* event_count,
|
||||
int timeout_ms
|
||||
);
|
||||
|
||||
/**
|
||||
* Get a single event from multiple relays (returns the most recent one)
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_urls Array of relay URLs to query
|
||||
* @param relay_count Number of relays in array
|
||||
* @param filter cJSON filter object for query
|
||||
* @param timeout_ms Timeout in milliseconds
|
||||
* @return cJSON event (caller must free), NULL if not found/timeout
|
||||
*/
|
||||
cJSON* nostr_relay_pool_get_event(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* filter,
|
||||
int timeout_ms
|
||||
);
|
||||
|
||||
/**
|
||||
* Publish an event to multiple relays
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_urls Array of relay URLs to publish to
|
||||
* @param relay_count Number of relays in array
|
||||
* @param event cJSON event to publish
|
||||
* @return Number of successful publishes, negative on error
|
||||
*/
|
||||
int nostr_relay_pool_publish(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char** relay_urls,
|
||||
int relay_count,
|
||||
cJSON* event
|
||||
);
|
||||
|
||||
/**
|
||||
* Get connection status for a relay in the pool
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to check
|
||||
* @return Connection status enum
|
||||
*/
|
||||
nostr_pool_relay_status_t nostr_relay_pool_get_relay_status(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url
|
||||
);
|
||||
|
||||
/**
|
||||
* Get list of all relays in pool with their status
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_urls Output: array of relay URL strings (caller must free)
|
||||
* @param statuses Output: array of status values (caller must free)
|
||||
* @return Number of relays, negative on error
|
||||
*/
|
||||
int nostr_relay_pool_list_relays(
|
||||
nostr_relay_pool_t* pool,
|
||||
char*** relay_urls,
|
||||
nostr_pool_relay_status_t** statuses
|
||||
);
|
||||
|
||||
/**
|
||||
* Run continuous event processing for active subscriptions (blocking)
|
||||
* Processes incoming events and calls subscription callbacks until timeout or stopped
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param timeout_ms Timeout in milliseconds (0 = no timeout, runs indefinitely)
|
||||
* @return Total number of events processed, negative on error
|
||||
*/
|
||||
int nostr_relay_pool_run(nostr_relay_pool_t* pool, int timeout_ms);
|
||||
|
||||
/**
|
||||
* Process events for active subscriptions (non-blocking, single pass)
|
||||
* Processes available events and returns immediately
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param timeout_ms Maximum time to spend processing in milliseconds
|
||||
* @return Number of events processed in this call, negative on error
|
||||
*/
|
||||
int nostr_relay_pool_poll(nostr_relay_pool_t* pool, int timeout_ms);
|
||||
|
||||
// =============================================================================
|
||||
// RELAY POOL STATISTICS AND LATENCY
|
||||
// =============================================================================
|
||||
|
||||
/**
|
||||
* Get statistics for a specific relay in the pool
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to get statistics for
|
||||
* @return Pointer to statistics structure (owned by pool), NULL if relay not found
|
||||
*/
|
||||
const nostr_relay_stats_t* nostr_relay_pool_get_relay_stats(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url
|
||||
);
|
||||
|
||||
/**
|
||||
* Reset statistics for a specific relay
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to reset statistics for
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_relay_pool_reset_relay_stats(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url
|
||||
);
|
||||
|
||||
/**
|
||||
* Get current ping latency for a relay (most recent ping result)
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to check
|
||||
* @return Ping latency in milliseconds, -1.0 if no ping data available
|
||||
*/
|
||||
double nostr_relay_pool_get_relay_ping_latency(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url
|
||||
);
|
||||
|
||||
/**
|
||||
* Get average query latency for a relay (REQ->first EVENT response time)
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to check
|
||||
* @return Average query latency in milliseconds, -1.0 if no data available
|
||||
*/
|
||||
double nostr_relay_pool_get_relay_query_latency(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url
|
||||
);
|
||||
|
||||
/**
|
||||
* Manually trigger ping measurement for a relay (asynchronous)
|
||||
*
|
||||
* NOTE: PING frames are sent correctly, but PONG response handling needs debugging.
|
||||
* Currently times out waiting for PONG responses. Future fix needed.
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to ping
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_relay_pool_ping_relay(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url
|
||||
);
|
||||
|
||||
/**
|
||||
* Manually trigger ping measurement for a relay and wait for response (synchronous)
|
||||
*
|
||||
* NOTE: PING frames are sent correctly, but PONG response handling needs debugging.
|
||||
* Currently times out waiting for PONG responses. Future fix needed.
|
||||
*
|
||||
* @param pool Relay pool instance
|
||||
* @param relay_url Relay URL to ping
|
||||
* @param timeout_seconds Timeout in seconds (0 for default 5 seconds)
|
||||
* @return NOSTR_SUCCESS on success, error code on failure
|
||||
*/
|
||||
int nostr_relay_pool_ping_relay_sync(
|
||||
nostr_relay_pool_t* pool,
|
||||
const char* relay_url,
|
||||
int timeout_seconds
|
||||
);
|
||||
|
||||
#endif // NOSTR_CORE_H
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,186 @@
|
|||
/*
|
||||
* NOSTR Crypto - Self-contained cryptographic functions
|
||||
*
|
||||
* Embedded implementations of crypto primitives needed for NOSTR
|
||||
* No external dependencies except standard C library
|
||||
*/
|
||||
|
||||
#ifndef NOSTR_CRYPTO_H
|
||||
#define NOSTR_CRYPTO_H
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stddef.h>
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
// =============================================================================
|
||||
// CORE CRYPTO FUNCTIONS
|
||||
// =============================================================================
|
||||
|
||||
// Initialize crypto subsystem
|
||||
int nostr_crypto_init(void);
|
||||
|
||||
// Cleanup crypto subsystem
|
||||
void nostr_crypto_cleanup(void);
|
||||
|
||||
// SHA-256 hash function
|
||||
int nostr_sha256(const unsigned char* data, size_t len, unsigned char* hash);
|
||||
|
||||
// HMAC-SHA256
|
||||
int nostr_hmac_sha256(const unsigned char* key, size_t key_len,
|
||||
const unsigned char* data, size_t data_len,
|
||||
unsigned char* output);
|
||||
|
||||
// HMAC-SHA512
|
||||
int nostr_hmac_sha512(const unsigned char* key, size_t key_len,
|
||||
const unsigned char* data, size_t data_len,
|
||||
unsigned char* output);
|
||||
|
||||
// PBKDF2 with HMAC-SHA512
|
||||
int nostr_pbkdf2_hmac_sha512(const unsigned char* password, size_t password_len,
|
||||
const unsigned char* salt, size_t salt_len,
|
||||
int iterations,
|
||||
unsigned char* output, size_t output_len);
|
||||
|
||||
// SHA-512 implementation (for testing)
|
||||
int nostr_sha512(const unsigned char* data, size_t len, unsigned char* hash);
|
||||
|
||||
// =============================================================================
|
||||
// SECP256K1 ELLIPTIC CURVE FUNCTIONS
|
||||
// =============================================================================
|
||||
|
||||
// Verify private key is valid
|
||||
int nostr_ec_private_key_verify(const unsigned char* private_key);
|
||||
|
||||
// Generate public key from private key
|
||||
int nostr_ec_public_key_from_private_key(const unsigned char* private_key,
|
||||
unsigned char* public_key);
|
||||
|
||||
// Sign data with ECDSA
|
||||
int nostr_ec_sign(const unsigned char* private_key,
|
||||
const unsigned char* hash,
|
||||
unsigned char* signature);
|
||||
|
||||
// RFC 6979 deterministic nonce generation
|
||||
int nostr_rfc6979_generate_k(const unsigned char* private_key,
|
||||
const unsigned char* message_hash,
|
||||
unsigned char* k_out);
|
||||
|
||||
// =============================================================================
|
||||
// HKDF KEY DERIVATION FUNCTIONS
|
||||
// =============================================================================
|
||||
|
||||
// HKDF Extract step
|
||||
int nostr_hkdf_extract(const unsigned char* salt, size_t salt_len,
|
||||
const unsigned char* ikm, size_t ikm_len,
|
||||
unsigned char* prk);
|
||||
|
||||
// HKDF Expand step
|
||||
int nostr_hkdf_expand(const unsigned char* prk, size_t prk_len,
|
||||
const unsigned char* info, size_t info_len,
|
||||
unsigned char* okm, size_t okm_len);
|
||||
|
||||
// HKDF (Extract + Expand)
|
||||
int nostr_hkdf(const unsigned char* salt, size_t salt_len,
|
||||
const unsigned char* ikm, size_t ikm_len,
|
||||
const unsigned char* info, size_t info_len,
|
||||
unsigned char* okm, size_t okm_len);
|
||||
|
||||
// ECDH shared secret computation (for debugging)
|
||||
int ecdh_shared_secret(const unsigned char* private_key,
|
||||
const unsigned char* public_key_x,
|
||||
unsigned char* shared_secret);
|
||||
|
||||
// Base64 encoding function (for debugging)
|
||||
size_t base64_encode(const unsigned char* data, size_t len, char* output, size_t output_size);
|
||||
|
||||
// =============================================================================
|
||||
// NIP-04 AND NIP-44 ENCRYPTION FUNCTIONS
|
||||
// =============================================================================
|
||||
|
||||
// Note: NOSTR_NIP04_MAX_PLAINTEXT_SIZE already defined in nostr_core.h
|
||||
#define NOSTR_NIP44_MAX_PLAINTEXT_SIZE 65536
|
||||
|
||||
// NIP-04 encryption (AES-256-CBC)
|
||||
int nostr_nip04_encrypt(const unsigned char* sender_private_key,
|
||||
const unsigned char* recipient_public_key,
|
||||
const char* plaintext,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
// NIP-04 decryption
|
||||
int nostr_nip04_decrypt(const unsigned char* recipient_private_key,
|
||||
const unsigned char* sender_public_key,
|
||||
const char* encrypted_data,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
// NIP-44 encryption (ChaCha20-Poly1305)
|
||||
int nostr_nip44_encrypt(const unsigned char* sender_private_key,
|
||||
const unsigned char* recipient_public_key,
|
||||
const char* plaintext,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
// NIP-44 encryption with fixed nonce (for testing)
|
||||
int nostr_nip44_encrypt_with_nonce(const unsigned char* sender_private_key,
|
||||
const unsigned char* recipient_public_key,
|
||||
const char* plaintext,
|
||||
const unsigned char* nonce,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
// NIP-44 decryption
|
||||
int nostr_nip44_decrypt(const unsigned char* recipient_private_key,
|
||||
const unsigned char* sender_public_key,
|
||||
const char* encrypted_data,
|
||||
char* output,
|
||||
size_t output_size);
|
||||
|
||||
// =============================================================================
|
||||
// BIP39 MNEMONIC FUNCTIONS
|
||||
// =============================================================================
|
||||
|
||||
// Generate mnemonic from entropy
|
||||
int nostr_bip39_mnemonic_from_bytes(const unsigned char* entropy, size_t entropy_len,
|
||||
char* mnemonic);
|
||||
|
||||
// Validate mnemonic
|
||||
int nostr_bip39_mnemonic_validate(const char* mnemonic);
|
||||
|
||||
// Convert mnemonic to seed
|
||||
int nostr_bip39_mnemonic_to_seed(const char* mnemonic, const char* passphrase,
|
||||
unsigned char* seed, size_t seed_len);
|
||||
|
||||
// =============================================================================
|
||||
// BIP32 HD WALLET FUNCTIONS
|
||||
// =============================================================================
|
||||
|
||||
typedef struct {
|
||||
unsigned char private_key[32];
|
||||
unsigned char public_key[33];
|
||||
unsigned char chain_code[32];
|
||||
uint32_t depth;
|
||||
uint32_t parent_fingerprint;
|
||||
uint32_t child_number;
|
||||
} nostr_hd_key_t;
|
||||
|
||||
// Create master key from seed
|
||||
int nostr_bip32_key_from_seed(const unsigned char* seed, size_t seed_len,
|
||||
nostr_hd_key_t* master_key);
|
||||
|
||||
// Derive child key from parent
|
||||
int nostr_bip32_derive_child(const nostr_hd_key_t* parent_key, uint32_t child_number,
|
||||
nostr_hd_key_t* child_key);
|
||||
|
||||
// Derive key from path
|
||||
int nostr_bip32_derive_path(const nostr_hd_key_t* master_key, const uint32_t* path,
|
||||
size_t path_len, nostr_hd_key_t* derived_key);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif // NOSTR_CRYPTO_H
|
Binary file not shown.
|
@ -0,0 +1,238 @@
|
|||
#include "nostr_secp256k1.h"
|
||||
#include <secp256k1.h>
|
||||
#include <secp256k1_schnorrsig.h>
|
||||
#include <secp256k1_ecdh.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <fcntl.h>
|
||||
#include <unistd.h>
|
||||
|
||||
// Global context for secp256k1 operations
|
||||
static secp256k1_context* g_ctx = NULL;
|
||||
|
||||
int nostr_secp256k1_context_create(void) {
|
||||
if (g_ctx != NULL) {
|
||||
return 1; // Already initialized
|
||||
}
|
||||
|
||||
g_ctx = secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY);
|
||||
if (g_ctx == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Add some randomization to the context for better security
|
||||
unsigned char randomize[32];
|
||||
// In a real implementation, you'd want better randomness
|
||||
// For now, just use a simple pattern
|
||||
for (int i = 0; i < 32; i++) {
|
||||
randomize[i] = (unsigned char)(i * 7 + 13);
|
||||
}
|
||||
|
||||
if (!secp256k1_context_randomize(g_ctx, randomize)) {
|
||||
secp256k1_context_destroy(g_ctx);
|
||||
g_ctx = NULL;
|
||||
return 0;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
void nostr_secp256k1_context_destroy(void) {
|
||||
if (g_ctx != NULL) {
|
||||
secp256k1_context_destroy(g_ctx);
|
||||
g_ctx = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
int nostr_secp256k1_ec_seckey_verify(const unsigned char *seckey) {
|
||||
if (g_ctx == NULL || seckey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
return secp256k1_ec_seckey_verify(g_ctx, seckey);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_ec_pubkey_create(nostr_secp256k1_pubkey *pubkey, const unsigned char *seckey) {
|
||||
if (g_ctx == NULL || pubkey == NULL || seckey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_pubkey internal_pubkey;
|
||||
if (!secp256k1_ec_pubkey_create(g_ctx, &internal_pubkey, seckey)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Copy the internal representation to our wrapper
|
||||
memcpy(pubkey->data, &internal_pubkey, sizeof(secp256k1_pubkey));
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int nostr_secp256k1_keypair_create(nostr_secp256k1_keypair *keypair, const unsigned char *seckey) {
|
||||
if (g_ctx == NULL || keypair == NULL || seckey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_keypair internal_keypair;
|
||||
if (!secp256k1_keypair_create(g_ctx, &internal_keypair, seckey)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Copy the internal representation to our wrapper
|
||||
memcpy(keypair->data, &internal_keypair, sizeof(secp256k1_keypair));
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int nostr_secp256k1_keypair_xonly_pub(nostr_secp256k1_xonly_pubkey *pubkey, const nostr_secp256k1_keypair *keypair) {
|
||||
if (g_ctx == NULL || pubkey == NULL || keypair == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_keypair internal_keypair;
|
||||
secp256k1_xonly_pubkey internal_xonly;
|
||||
|
||||
// Copy from our wrapper to internal representation
|
||||
memcpy(&internal_keypair, keypair->data, sizeof(secp256k1_keypair));
|
||||
|
||||
if (!secp256k1_keypair_xonly_pub(g_ctx, &internal_xonly, NULL, &internal_keypair)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Copy the internal representation to our wrapper
|
||||
memcpy(pubkey->data, &internal_xonly, sizeof(secp256k1_xonly_pubkey));
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int nostr_secp256k1_xonly_pubkey_parse(nostr_secp256k1_xonly_pubkey *pubkey, const unsigned char *input32) {
|
||||
if (g_ctx == NULL || pubkey == NULL || input32 == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_xonly_pubkey internal_xonly;
|
||||
if (!secp256k1_xonly_pubkey_parse(g_ctx, &internal_xonly, input32)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Copy the internal representation to our wrapper
|
||||
memcpy(pubkey->data, &internal_xonly, sizeof(secp256k1_xonly_pubkey));
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int nostr_secp256k1_xonly_pubkey_serialize(unsigned char *output32, const nostr_secp256k1_xonly_pubkey *pubkey) {
|
||||
if (g_ctx == NULL || output32 == NULL || pubkey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_xonly_pubkey internal_xonly;
|
||||
|
||||
// Copy from our wrapper to internal representation
|
||||
memcpy(&internal_xonly, pubkey->data, sizeof(secp256k1_xonly_pubkey));
|
||||
|
||||
return secp256k1_xonly_pubkey_serialize(g_ctx, output32, &internal_xonly);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_schnorrsig_sign32(unsigned char *sig64, const unsigned char *msghash32, const nostr_secp256k1_keypair *keypair, const unsigned char *aux_rand32) {
|
||||
if (g_ctx == NULL || sig64 == NULL || msghash32 == NULL || keypair == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_keypair internal_keypair;
|
||||
|
||||
// Copy from our wrapper to internal representation
|
||||
memcpy(&internal_keypair, keypair->data, sizeof(secp256k1_keypair));
|
||||
|
||||
return secp256k1_schnorrsig_sign32(g_ctx, sig64, msghash32, &internal_keypair, aux_rand32);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_schnorrsig_verify(const unsigned char *sig64, const unsigned char *msghash32, const nostr_secp256k1_xonly_pubkey *pubkey) {
|
||||
if (g_ctx == NULL || sig64 == NULL || msghash32 == NULL || pubkey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_xonly_pubkey internal_xonly;
|
||||
|
||||
// Copy from our wrapper to internal representation
|
||||
memcpy(&internal_xonly, pubkey->data, sizeof(secp256k1_xonly_pubkey));
|
||||
|
||||
return secp256k1_schnorrsig_verify(g_ctx, sig64, msghash32, 32, &internal_xonly);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_ec_pubkey_serialize_compressed(unsigned char *output, const nostr_secp256k1_pubkey *pubkey) {
|
||||
if (g_ctx == NULL || output == NULL || pubkey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_pubkey internal_pubkey;
|
||||
size_t outputlen = 33;
|
||||
|
||||
// Copy from our wrapper to internal representation
|
||||
memcpy(&internal_pubkey, pubkey->data, sizeof(secp256k1_pubkey));
|
||||
|
||||
return secp256k1_ec_pubkey_serialize(g_ctx, output, &outputlen, &internal_pubkey, SECP256K1_EC_COMPRESSED);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_ec_seckey_tweak_add(unsigned char *seckey, const unsigned char *tweak) {
|
||||
if (g_ctx == NULL || seckey == NULL || tweak == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
return secp256k1_ec_seckey_tweak_add(g_ctx, seckey, tweak);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_ec_pubkey_parse(nostr_secp256k1_pubkey *pubkey, const unsigned char *input, size_t inputlen) {
|
||||
if (g_ctx == NULL || pubkey == NULL || input == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_pubkey internal_pubkey;
|
||||
if (!secp256k1_ec_pubkey_parse(g_ctx, &internal_pubkey, input, inputlen)) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Copy the internal representation to our wrapper
|
||||
memcpy(pubkey->data, &internal_pubkey, sizeof(secp256k1_pubkey));
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int nostr_secp256k1_ecdh(unsigned char *result, const nostr_secp256k1_pubkey *pubkey, const unsigned char *seckey, void *hashfp, void *data) {
|
||||
if (g_ctx == NULL || result == NULL || pubkey == NULL || seckey == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
secp256k1_pubkey internal_pubkey;
|
||||
|
||||
// Copy from our wrapper to internal representation
|
||||
memcpy(&internal_pubkey, pubkey->data, sizeof(secp256k1_pubkey));
|
||||
|
||||
return secp256k1_ecdh(g_ctx, result, &internal_pubkey, seckey, hashfp, data);
|
||||
}
|
||||
|
||||
int nostr_secp256k1_get_random_bytes(unsigned char *buf, size_t len) {
|
||||
if (buf == NULL || len == 0) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Try to use /dev/urandom for good randomness
|
||||
int fd = open("/dev/urandom", O_RDONLY);
|
||||
if (fd >= 0) {
|
||||
ssize_t result = read(fd, buf, len);
|
||||
close(fd);
|
||||
if (result == (ssize_t)len) {
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
// Fallback to a simple PRNG (not cryptographically secure, but better than nothing)
|
||||
// In a real implementation, you'd want to use a proper CSPRNG
|
||||
static unsigned long seed = 1;
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
seed = seed * 1103515245 + 12345;
|
||||
buf[i] = (unsigned char)(seed >> 16);
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
|
@ -0,0 +1,141 @@
|
|||
#ifndef NOSTR_SECP256K1_H
|
||||
#define NOSTR_SECP256K1_H
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#include <stddef.h>
|
||||
|
||||
/** Opaque data structure that holds a parsed and valid public key.
|
||||
* Guaranteed to be 64 bytes in size, and can be safely copied/moved.
|
||||
*/
|
||||
typedef struct nostr_secp256k1_pubkey {
|
||||
unsigned char data[64];
|
||||
} nostr_secp256k1_pubkey;
|
||||
|
||||
/** Opaque data structure that holds a parsed keypair.
|
||||
* Guaranteed to be 96 bytes in size, and can be safely copied/moved.
|
||||
*/
|
||||
typedef struct nostr_secp256k1_keypair {
|
||||
unsigned char data[96];
|
||||
} nostr_secp256k1_keypair;
|
||||
|
||||
/** Opaque data structure that holds a parsed x-only public key.
|
||||
* Guaranteed to be 64 bytes in size, and can be safely copied/moved.
|
||||
*/
|
||||
typedef struct nostr_secp256k1_xonly_pubkey {
|
||||
unsigned char data[64];
|
||||
} nostr_secp256k1_xonly_pubkey;
|
||||
|
||||
/** Initialize the secp256k1 library. Must be called before any other functions.
|
||||
* Returns: 1 on success, 0 on failure.
|
||||
*/
|
||||
int nostr_secp256k1_context_create(void);
|
||||
|
||||
/** Clean up the secp256k1 library resources.
|
||||
*/
|
||||
void nostr_secp256k1_context_destroy(void);
|
||||
|
||||
/** Verify an elliptic curve secret key.
|
||||
* Returns: 1: secret key is valid, 0: secret key is invalid
|
||||
* In: seckey: pointer to a 32-byte secret key.
|
||||
*/
|
||||
int nostr_secp256k1_ec_seckey_verify(const unsigned char *seckey);
|
||||
|
||||
/** Compute the public key for a secret key.
|
||||
* Returns: 1: secret was valid, public key stored. 0: secret was invalid.
|
||||
* Out: pubkey: pointer to the created public key.
|
||||
* In: seckey: pointer to a 32-byte secret key.
|
||||
*/
|
||||
int nostr_secp256k1_ec_pubkey_create(nostr_secp256k1_pubkey *pubkey, const unsigned char *seckey);
|
||||
|
||||
/** Create a keypair from a secret key.
|
||||
* Returns: 1: keypair created, 0: secret key invalid.
|
||||
* Out: keypair: pointer to the created keypair.
|
||||
* In: seckey: pointer to a 32-byte secret key.
|
||||
*/
|
||||
int nostr_secp256k1_keypair_create(nostr_secp256k1_keypair *keypair, const unsigned char *seckey);
|
||||
|
||||
/** Get the x-only public key from a keypair.
|
||||
* Returns: 1 always.
|
||||
* Out: pubkey: pointer to storage for the x-only public key.
|
||||
* In: keypair: pointer to a keypair.
|
||||
*/
|
||||
int nostr_secp256k1_keypair_xonly_pub(nostr_secp256k1_xonly_pubkey *pubkey, const nostr_secp256k1_keypair *keypair);
|
||||
|
||||
/** Parse an x-only public key from bytes.
|
||||
* Returns: 1: public key parsed, 0: invalid public key.
|
||||
* Out: pubkey: pointer to the created x-only public key.
|
||||
* In: input32: pointer to a 32-byte x-only public key.
|
||||
*/
|
||||
int nostr_secp256k1_xonly_pubkey_parse(nostr_secp256k1_xonly_pubkey *pubkey, const unsigned char *input32);
|
||||
|
||||
/** Serialize an x-only public key to bytes.
|
||||
* Returns: 1 always.
|
||||
* Out: output32: pointer to a 32-byte array to store the serialized key.
|
||||
* In: pubkey: pointer to an x-only public key.
|
||||
*/
|
||||
int nostr_secp256k1_xonly_pubkey_serialize(unsigned char *output32, const nostr_secp256k1_xonly_pubkey *pubkey);
|
||||
|
||||
/** Create a Schnorr signature.
|
||||
* Returns: 1: signature created, 0: nonce generation failed or secret key invalid.
|
||||
* Out: sig64: pointer to a 64-byte array where the signature will be placed.
|
||||
* In: msghash32: the 32-byte message hash being signed.
|
||||
* keypair: pointer to an initialized keypair.
|
||||
* aux_rand32: pointer to 32 bytes of auxiliary randomness (can be NULL).
|
||||
*/
|
||||
int nostr_secp256k1_schnorrsig_sign32(unsigned char *sig64, const unsigned char *msghash32, const nostr_secp256k1_keypair *keypair, const unsigned char *aux_rand32);
|
||||
|
||||
/** Verify a Schnorr signature.
|
||||
* Returns: 1: correct signature, 0: incorrect signature
|
||||
* In: sig64: pointer to the 64-byte signature being verified.
|
||||
* msghash32: the 32-byte message hash being verified.
|
||||
* pubkey: pointer to an x-only public key to verify with.
|
||||
*/
|
||||
int nostr_secp256k1_schnorrsig_verify(const unsigned char *sig64, const unsigned char *msghash32, const nostr_secp256k1_xonly_pubkey *pubkey);
|
||||
|
||||
/** Serialize a pubkey object into a serialized byte sequence.
|
||||
* Returns: 1 always.
|
||||
* Out: output: pointer to a 33-byte array to place the serialized key in.
|
||||
* In: pubkey: pointer to a secp256k1_pubkey containing an initialized public key.
|
||||
*
|
||||
* The output will be a 33-byte compressed public key (0x02 or 0x03 prefix + 32 bytes x coordinate).
|
||||
*/
|
||||
int nostr_secp256k1_ec_pubkey_serialize_compressed(unsigned char *output, const nostr_secp256k1_pubkey *pubkey);
|
||||
|
||||
/** Tweak a secret key by adding a 32-byte tweak to it.
|
||||
* Returns: 1: seckey was valid, 0: seckey invalid or resulting key invalid
|
||||
* In/Out: seckey: pointer to a 32-byte secret key. Will be modified in-place.
|
||||
* In: tweak: pointer to a 32-byte tweak.
|
||||
*/
|
||||
int nostr_secp256k1_ec_seckey_tweak_add(unsigned char *seckey, const unsigned char *tweak);
|
||||
|
||||
/** Parse a variable-length public key into the pubkey object.
|
||||
* Returns: 1: public key parsed, 0: invalid public key.
|
||||
* Out: pubkey: pointer to the created public key.
|
||||
* In: input: pointer to a serialized public key
|
||||
* inputlen: length of the array pointed to by input
|
||||
*/
|
||||
int nostr_secp256k1_ec_pubkey_parse(nostr_secp256k1_pubkey *pubkey, const unsigned char *input, size_t inputlen);
|
||||
|
||||
/** Compute an EC Diffie-Hellman secret in constant time.
|
||||
* Returns: 1: exponentiation was successful, 0: scalar was invalid (zero or overflow)
|
||||
* Out: result: a 32-byte array which will be populated by an ECDH secret computed from point and scalar
|
||||
* In: pubkey: a pointer to a secp256k1_pubkey containing an initialized public key
|
||||
* seckey: a 32-byte scalar with which to multiply the point
|
||||
*/
|
||||
int nostr_secp256k1_ecdh(unsigned char *result, const nostr_secp256k1_pubkey *pubkey, const unsigned char *seckey, void *hashfp, void *data);
|
||||
|
||||
/** Generate cryptographically secure random bytes.
|
||||
* Returns: 1: success, 0: failure
|
||||
* Out: buf: buffer to fill with random bytes
|
||||
* In: len: number of bytes to generate
|
||||
*/
|
||||
int nostr_secp256k1_get_random_bytes(unsigned char *buf, size_t len);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif /* NOSTR_SECP256K1_H */
|
Binary file not shown.
|
@ -0,0 +1,184 @@
|
|||
# NOSTR WebSocket Library Export Guide
|
||||
|
||||
This guide explains how to use the NOSTR WebSocket library in other C projects.
|
||||
|
||||
## Library Structure
|
||||
|
||||
The NOSTR WebSocket library consists of these key files for export:
|
||||
|
||||
### Core Files (Required)
|
||||
- `nostr_websocket_tls.h` - Header with all function declarations and constants
|
||||
- `nostr_websocket_mbedtls.c` - Main implementation using mbedTLS for SSL/TLS
|
||||
- `../cjson/cJSON.h` and `../cjson/cJSON.c` - JSON parsing (lightweight)
|
||||
|
||||
### Dependencies
|
||||
- **mbedTLS** - For SSL/TLS support (wss:// connections)
|
||||
- **Standard C libraries** - socket, networking, etc.
|
||||
|
||||
## Quick Integration
|
||||
|
||||
### 1. Copy Files to Your Project
|
||||
```bash
|
||||
# Copy the library files
|
||||
cp nostr_websocket_tls.h your_project/
|
||||
cp nostr_websocket_mbedtls.c your_project/
|
||||
cp ../cjson/cJSON.h your_project/
|
||||
cp ../cjson/cJSON.c your_project/
|
||||
```
|
||||
|
||||
### 2. Install mbedTLS Dependency
|
||||
```bash
|
||||
# Ubuntu/Debian
|
||||
sudo apt-get install libmbedtls-dev
|
||||
|
||||
# Or build from source (see mbedTLS documentation)
|
||||
```
|
||||
|
||||
### 3. Compile Your Project
|
||||
```bash
|
||||
gcc -o my_nostr_app my_app.c nostr_websocket_mbedtls.c cJSON.c \
|
||||
-lmbedtls -lmbedx509 -lmbedcrypto -lm
|
||||
```
|
||||
|
||||
## Basic Usage Example
|
||||
|
||||
```c
|
||||
#include "nostr_websocket_tls.h"
|
||||
#include "cJSON.h"
|
||||
#include <stdio.h>
|
||||
|
||||
int main() {
|
||||
// Connect to relay
|
||||
nostr_ws_client_t* client = nostr_ws_connect("wss://relay.damus.io");
|
||||
if (!client) {
|
||||
printf("Failed to connect\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Create subscription filter
|
||||
cJSON* filter = cJSON_CreateObject();
|
||||
cJSON* kinds = cJSON_CreateArray();
|
||||
cJSON_AddItemToArray(kinds, cJSON_CreateNumber(1)); // Text notes
|
||||
cJSON_AddItemToObject(filter, "kinds", kinds);
|
||||
cJSON_AddItemToObject(filter, "limit", cJSON_CreateNumber(10));
|
||||
|
||||
// Send REQ message
|
||||
nostr_relay_send_req(client, "my-sub", filter);
|
||||
|
||||
// Receive messages
|
||||
char buffer[8192];
|
||||
while (1) {
|
||||
int len = nostr_ws_receive(client, buffer, sizeof(buffer), 1000);
|
||||
if (len > 0) {
|
||||
printf("Received: %s\n", buffer);
|
||||
|
||||
// Parse message type
|
||||
char* msg_type;
|
||||
cJSON* parsed;
|
||||
if (nostr_parse_relay_message(buffer, &msg_type, &parsed) == 0) {
|
||||
if (strcmp(msg_type, "EOSE") == 0) {
|
||||
printf("End of subscription\n");
|
||||
free(msg_type);
|
||||
cJSON_Delete(parsed);
|
||||
break;
|
||||
}
|
||||
free(msg_type);
|
||||
cJSON_Delete(parsed);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_ws_close(client);
|
||||
cJSON_Delete(filter);
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
## API Reference
|
||||
|
||||
### Connection Management
|
||||
- `nostr_ws_connect(url)` - Connect to relay (ws:// or wss://)
|
||||
- `nostr_ws_close(client)` - Close connection and cleanup
|
||||
- `nostr_ws_get_state(client)` - Get connection state
|
||||
|
||||
### Messaging
|
||||
- `nostr_ws_send_text(client, message)` - Send raw text message
|
||||
- `nostr_ws_receive(client, buffer, size, timeout)` - Receive message
|
||||
- `nostr_ws_ping(client)` - Send ping frame
|
||||
|
||||
### NOSTR Protocol Helpers
|
||||
- `nostr_relay_send_req(client, sub_id, filters)` - Send REQ message
|
||||
- `nostr_relay_send_event(client, event)` - Send EVENT message
|
||||
- `nostr_relay_send_close(client, sub_id)` - Send CLOSE message
|
||||
- `nostr_parse_relay_message(message, type, json)` - Parse relay message
|
||||
|
||||
### Error Handling
|
||||
- `nostr_ws_strerror(error_code)` - Get error string
|
||||
- Return codes: `NOSTR_WS_SUCCESS`, `NOSTR_WS_ERROR_*`
|
||||
|
||||
## Advanced Configuration
|
||||
|
||||
### Custom Timeouts
|
||||
```c
|
||||
nostr_ws_set_timeout(client, 30000); // 30 second timeout
|
||||
```
|
||||
|
||||
### Multiple Transports
|
||||
The library supports both TCP (`ws://`) and TLS (`wss://`) automatically based on URL scheme.
|
||||
|
||||
## Cross-Platform Notes
|
||||
|
||||
### Linux/Unix
|
||||
- Works out of the box with standard development tools
|
||||
- Requires: gcc, mbedTLS development headers
|
||||
|
||||
### Potential Windows Support
|
||||
- Would need Winsock2 adaptations in transport layer
|
||||
- mbedTLS is cross-platform compatible
|
||||
|
||||
### Embedded Systems
|
||||
- Lightweight design suitable for embedded use
|
||||
- Memory usage: ~4KB per client + message buffers
|
||||
- No dynamic allocations in hot paths
|
||||
|
||||
## Library Design Benefits
|
||||
|
||||
### Modular Architecture
|
||||
- Clean separation between WebSocket protocol and NOSTR logic
|
||||
- Transport layer abstraction (easy to add new transports)
|
||||
- No global state - multiple clients supported
|
||||
|
||||
### Performance Optimized
|
||||
- Minimal memory allocations
|
||||
- Efficient SSL buffer handling
|
||||
- Fast WebSocket frame parsing
|
||||
|
||||
### Production Ready
|
||||
- Proper error handling throughout
|
||||
- Resource cleanup on all code paths
|
||||
- Thread-safe design (no shared state)
|
||||
|
||||
## Migration from Other Libraries
|
||||
|
||||
### From libwebsockets
|
||||
```c
|
||||
// Old libwebsockets code:
|
||||
// lws_client_connect_info info = {...};
|
||||
// wsi = lws_client_connect(context, &info);
|
||||
|
||||
// New NOSTR WebSocket library:
|
||||
client = nostr_ws_connect("wss://relay.example.com");
|
||||
```
|
||||
|
||||
### From raw sockets
|
||||
The library handles all WebSocket protocol details, SSL/TLS, and NOSTR message formatting automatically.
|
||||
|
||||
## Support
|
||||
|
||||
- Based on WebSocket RFC 6455
|
||||
- Implements NOSTR WebSocket conventions
|
||||
- SSL/TLS via proven mbedTLS library
|
||||
- Tested with major NOSTR relays
|
||||
|
||||
This library provides a clean, efficient way to integrate NOSTR WebSocket functionality into any C project with minimal dependencies and maximum portability.
|
|
@ -0,0 +1,63 @@
|
|||
# NOSTR WebSocket Library Makefile
|
||||
# Production-ready WebSocket implementation for NOSTR protocol
|
||||
|
||||
CC = gcc
|
||||
CFLAGS = -Wall -Wextra -std=c99 -O2
|
||||
INCLUDES = -I. -I.. -I../mbedtls/include -I../mbedtls/tf-psa-crypto/include -I../mbedtls/tf-psa-crypto/drivers/builtin/include
|
||||
LIBS = -lm -L../mbedtls/library -lmbedtls -lmbedx509 -lmbedcrypto
|
||||
|
||||
# Source files
|
||||
WEBSOCKET_SOURCES = nostr_websocket_mbedtls.c ../cjson/cJSON.c
|
||||
WEBSOCKET_HEADERS = nostr_websocket_tls.h ../cjson/cJSON.h
|
||||
|
||||
# Test programs
|
||||
TEST_SOURCES = test_5_events_clean.c
|
||||
TEST_PROGRAMS = test_5_events_clean
|
||||
|
||||
# Object files
|
||||
WEBSOCKET_OBJECTS = $(WEBSOCKET_SOURCES:.c=.o)
|
||||
|
||||
.PHONY: all clean test
|
||||
|
||||
all: $(TEST_PROGRAMS)
|
||||
|
||||
# Test programs
|
||||
test_5_events_clean: test_5_events_clean.o $(WEBSOCKET_OBJECTS)
|
||||
$(CC) -o $@ $^ $(LIBS)
|
||||
|
||||
# Object file compilation
|
||||
%.o: %.c $(WEBSOCKET_HEADERS)
|
||||
$(CC) $(CFLAGS) $(INCLUDES) -c $< -o $@
|
||||
|
||||
# Test target
|
||||
test: test_5_events_clean
|
||||
@echo "🧪 Running WebSocket test..."
|
||||
@echo "Press Ctrl-C to stop the test"
|
||||
./test_5_events_clean
|
||||
|
||||
# Clean build artifacts
|
||||
clean:
|
||||
rm -f *.o $(TEST_PROGRAMS)
|
||||
rm -f ../cjson/*.o
|
||||
|
||||
# Display library info
|
||||
info:
|
||||
@echo "📚 NOSTR WebSocket Library"
|
||||
@echo "=========================="
|
||||
@echo "Core files:"
|
||||
@echo " - nostr_websocket_tls.h (header)"
|
||||
@echo " - nostr_websocket_mbedtls.c (implementation)"
|
||||
@echo " - ../cjson/cJSON.h/c (JSON support)"
|
||||
@echo ""
|
||||
@echo "Dependencies:"
|
||||
@echo " - mbedTLS (SSL/TLS support)"
|
||||
@echo " - Standard C libraries"
|
||||
@echo ""
|
||||
@echo "Usage:"
|
||||
@echo " make - Build test programs"
|
||||
@echo " make test - Run WebSocket test"
|
||||
@echo " make clean - Clean build artifacts"
|
||||
@echo " make info - Show this information"
|
||||
|
||||
# Help target
|
||||
help: info
|
|
@ -0,0 +1,139 @@
|
|||
# NOSTR WebSocket Library
|
||||
|
||||
A production-ready, lightweight WebSocket client library specifically designed for the NOSTR protocol. This library provides a clean C API for connecting to NOSTR relays over both TCP (`ws://`) and TLS (`wss://`) connections.
|
||||
|
||||
## Features
|
||||
|
||||
- ✅ **WebSocket RFC 6455 Compliant** - Full WebSocket protocol implementation
|
||||
- ✅ **SSL/TLS Support** - Secure `wss://` connections via mbedTLS
|
||||
- ✅ **NOSTR Protocol** - Built-in support for REQ, EVENT, CLOSE messages
|
||||
- ✅ **Production Ready** - Optimized performance and error handling
|
||||
- ✅ **Lightweight** - Minimal dependencies and memory footprint
|
||||
- ✅ **Cross-Platform** - Linux/Unix support, Windows adaptable
|
||||
- ✅ **Thread Safe** - No global state, multiple clients supported
|
||||
|
||||
## Quick Start
|
||||
|
||||
### 1. Build the Test Program
|
||||
```bash
|
||||
make
|
||||
```
|
||||
|
||||
### 2. Run the Test
|
||||
```bash
|
||||
make test
|
||||
# or directly:
|
||||
./test_5_events_clean
|
||||
```
|
||||
|
||||
### 3. Basic Usage
|
||||
```c
|
||||
#include "nostr_websocket_tls.h"
|
||||
|
||||
// Connect to a NOSTR relay
|
||||
nostr_ws_client_t* client = nostr_ws_connect("wss://relay.damus.io");
|
||||
|
||||
// Create and send a subscription
|
||||
cJSON* filter = cJSON_CreateObject();
|
||||
cJSON_AddItemToObject(filter, "limit", cJSON_CreateNumber(10));
|
||||
nostr_relay_send_req(client, "my-sub", filter);
|
||||
|
||||
// Receive messages
|
||||
char buffer[8192];
|
||||
int len = nostr_ws_receive(client, buffer, sizeof(buffer), 1000);
|
||||
if (len > 0) {
|
||||
printf("Received: %s\n", buffer);
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_ws_close(client);
|
||||
cJSON_Delete(filter);
|
||||
```
|
||||
|
||||
## Library Structure
|
||||
|
||||
### Core Components
|
||||
- **`nostr_websocket_tls.h`** - Public API header
|
||||
- **`nostr_websocket_mbedtls.c`** - Main implementation (mbedTLS backend)
|
||||
- **`../cjson/cJSON.h/c`** - JSON parsing support
|
||||
|
||||
### Dependencies
|
||||
- **mbedTLS** - For SSL/TLS support
|
||||
- **Standard C libraries** - POSIX sockets, etc.
|
||||
|
||||
## Installation in Other Projects
|
||||
|
||||
See [`EXPORT_GUIDE.md`](EXPORT_GUIDE.md) for detailed instructions on integrating this library into your C projects.
|
||||
|
||||
## API Reference
|
||||
|
||||
### Connection Management
|
||||
```c
|
||||
nostr_ws_client_t* nostr_ws_connect(const char* url);
|
||||
int nostr_ws_close(nostr_ws_client_t* client);
|
||||
nostr_ws_state_t nostr_ws_get_state(nostr_ws_client_t* client);
|
||||
```
|
||||
|
||||
### Messaging
|
||||
```c
|
||||
int nostr_ws_send_text(nostr_ws_client_t* client, const char* message);
|
||||
int nostr_ws_receive(nostr_ws_client_t* client, char* buffer, size_t size, int timeout_ms);
|
||||
int nostr_ws_ping(nostr_ws_client_t* client);
|
||||
```
|
||||
|
||||
### NOSTR Protocol Helpers
|
||||
```c
|
||||
int nostr_relay_send_req(nostr_ws_client_t* client, const char* sub_id, cJSON* filters);
|
||||
int nostr_relay_send_event(nostr_ws_client_t* client, cJSON* event);
|
||||
int nostr_relay_send_close(nostr_ws_client_t* client, const char* sub_id);
|
||||
int nostr_parse_relay_message(const char* message, char** type, cJSON** json);
|
||||
```
|
||||
|
||||
### Error Handling
|
||||
```c
|
||||
const char* nostr_ws_strerror(int error_code);
|
||||
```
|
||||
|
||||
## Performance Characteristics
|
||||
|
||||
- **Memory Usage**: ~4KB per client + message buffers
|
||||
- **Latency**: Optimized SSL buffer handling, minimal delays
|
||||
- **Throughput**: Efficient WebSocket frame parsing
|
||||
- **Scalability**: Multiple concurrent clients supported
|
||||
|
||||
## Tested Relays
|
||||
|
||||
This library has been successfully tested with:
|
||||
- `wss://relay.damus.io`
|
||||
- `wss://nostr.mom`
|
||||
- `wss://relay.nostr.band`
|
||||
- `ws://localhost:7777` (local relays)
|
||||
|
||||
## Build Options
|
||||
|
||||
```bash
|
||||
make # Build test programs
|
||||
make test # Run WebSocket test
|
||||
make clean # Clean build artifacts
|
||||
make info # Show library information
|
||||
make help # Show help
|
||||
```
|
||||
|
||||
## Development History
|
||||
|
||||
This library evolved from the experimental WebSocket implementation in `../websocket_experiment/` and represents the production-ready, stable version suitable for integration into other projects.
|
||||
|
||||
Key improvements made during development:
|
||||
- Fixed critical WebSocket frame parsing bugs
|
||||
- Optimized SSL/TLS performance
|
||||
- Reduced memory allocations
|
||||
- Enhanced error handling
|
||||
- Added comprehensive documentation
|
||||
|
||||
## License
|
||||
|
||||
This library is part of the C NOSTR project and follows the same license terms.
|
||||
|
||||
## Contributing
|
||||
|
||||
For issues, improvements, or questions about the NOSTR WebSocket library, please refer to the main project documentation.
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,156 @@
|
|||
#ifndef NOSTR_WEBSOCKET_TLS_H
|
||||
#define NOSTR_WEBSOCKET_TLS_H
|
||||
|
||||
#include <stddef.h>
|
||||
#include <stdint.h>
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
// WebSocket client state
|
||||
typedef struct nostr_ws_client nostr_ws_client_t;
|
||||
|
||||
// Connection states
|
||||
typedef enum {
|
||||
NOSTR_WS_CONNECTING = 0,
|
||||
NOSTR_WS_CONNECTED = 1,
|
||||
NOSTR_WS_CLOSING = 2,
|
||||
NOSTR_WS_CLOSED = 3,
|
||||
NOSTR_WS_ERROR = -1
|
||||
} nostr_ws_state_t;
|
||||
|
||||
// WebSocket opcodes (RFC 6455)
|
||||
typedef enum {
|
||||
WS_OPCODE_CONTINUATION = 0x0,
|
||||
WS_OPCODE_TEXT = 0x1,
|
||||
WS_OPCODE_BINARY = 0x2,
|
||||
WS_OPCODE_CLOSE = 0x8,
|
||||
WS_OPCODE_PING = 0x9,
|
||||
WS_OPCODE_PONG = 0xA
|
||||
} ws_opcode_t;
|
||||
|
||||
// Error codes
|
||||
#define NOSTR_WS_SUCCESS 0
|
||||
#define NOSTR_WS_ERROR_INVALID -1
|
||||
#define NOSTR_WS_ERROR_NETWORK -2
|
||||
#define NOSTR_WS_ERROR_PROTOCOL -3
|
||||
#define NOSTR_WS_ERROR_MEMORY -4
|
||||
#define NOSTR_WS_ERROR_TLS -5
|
||||
|
||||
// Debug control - uncomment to enable debug output
|
||||
// #define NOSTR_WS_DEBUG_ENABLED
|
||||
|
||||
// ============================================================================
|
||||
// Core WebSocket Functions (with TLS support)
|
||||
// ============================================================================
|
||||
|
||||
/**
|
||||
* Connect to a WebSocket server (supports both ws:// and wss://)
|
||||
* @param url WebSocket URL (e.g., "ws://127.0.0.1:7777" or "wss://relay.damus.io")
|
||||
* @return WebSocket client handle or NULL on error
|
||||
*/
|
||||
nostr_ws_client_t* nostr_ws_connect(const char* url);
|
||||
|
||||
/**
|
||||
* Close WebSocket connection
|
||||
* @param client WebSocket client handle
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_ws_close(nostr_ws_client_t* client);
|
||||
|
||||
/**
|
||||
* Get current connection state
|
||||
* @param client WebSocket client handle
|
||||
* @return Connection state
|
||||
*/
|
||||
nostr_ws_state_t nostr_ws_get_state(nostr_ws_client_t* client);
|
||||
|
||||
/**
|
||||
* Send text message to WebSocket server
|
||||
* @param client WebSocket client handle
|
||||
* @param message Text message to send
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_ws_send_text(nostr_ws_client_t* client, const char* message);
|
||||
|
||||
/**
|
||||
* Receive message from WebSocket server (blocking)
|
||||
* @param client WebSocket client handle
|
||||
* @param buffer Buffer to store received message
|
||||
* @param buffer_size Size of buffer
|
||||
* @param timeout_ms Timeout in milliseconds (0 = no timeout)
|
||||
* @return Number of bytes received, negative on error
|
||||
*/
|
||||
int nostr_ws_receive(nostr_ws_client_t* client, char* buffer, size_t buffer_size, int timeout_ms);
|
||||
|
||||
/**
|
||||
* Send ping frame to server
|
||||
* @param client WebSocket client handle
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_ws_ping(nostr_ws_client_t* client);
|
||||
|
||||
// ============================================================================
|
||||
// NOSTR-Specific Helper Functions
|
||||
// ============================================================================
|
||||
|
||||
/**
|
||||
* Send NOSTR REQ message to relay
|
||||
* @param client WebSocket client handle
|
||||
* @param subscription_id Subscription ID
|
||||
* @param filters JSON array of filters
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_relay_send_req(nostr_ws_client_t* client, const char* subscription_id, cJSON* filters);
|
||||
|
||||
/**
|
||||
* Send NOSTR EVENT message to relay
|
||||
* @param client WebSocket client handle
|
||||
* @param event NOSTR event JSON object
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_relay_send_event(nostr_ws_client_t* client, cJSON* event);
|
||||
|
||||
/**
|
||||
* Send NOSTR CLOSE message to relay
|
||||
* @param client WebSocket client handle
|
||||
* @param subscription_id Subscription ID to close
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_relay_send_close(nostr_ws_client_t* client, const char* subscription_id);
|
||||
|
||||
/**
|
||||
* Parse received NOSTR message
|
||||
* @param message Raw message string
|
||||
* @param message_type Output: message type ("EVENT", "EOSE", "OK", "NOTICE")
|
||||
* @param parsed_json Output: parsed JSON object (caller must free)
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_parse_relay_message(const char* message, char** message_type, cJSON** parsed_json);
|
||||
|
||||
// ============================================================================
|
||||
// Utility Functions
|
||||
// ============================================================================
|
||||
|
||||
/**
|
||||
* Get error string for error code
|
||||
* @param error_code Error code from WebSocket functions
|
||||
* @return Human-readable error string
|
||||
*/
|
||||
const char* nostr_ws_strerror(int error_code);
|
||||
|
||||
/**
|
||||
* Set receive timeout for blocking operations
|
||||
* @param client WebSocket client handle
|
||||
* @param timeout_ms Timeout in milliseconds
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int nostr_ws_set_timeout(nostr_ws_client_t* client, int timeout_ms);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif // NOSTR_WEBSOCKET_TLS_H
|
|
@ -0,0 +1,141 @@
|
|||
{
|
||||
"name": "nostr_core_lib",
|
||||
"version": "1.0.0",
|
||||
"lockfileVersion": 3,
|
||||
"requires": true,
|
||||
"packages": {
|
||||
"": {
|
||||
"name": "nostr_core_lib",
|
||||
"version": "1.0.0",
|
||||
"license": "ISC",
|
||||
"dependencies": {
|
||||
"nostr-tools": "^2.16.1"
|
||||
}
|
||||
},
|
||||
"node_modules/@noble/ciphers": {
|
||||
"version": "0.5.3",
|
||||
"resolved": "https://registry.npmjs.org/@noble/ciphers/-/ciphers-0.5.3.tgz",
|
||||
"integrity": "sha512-B0+6IIHiqEs3BPMT0hcRmHvEj2QHOLu+uwt+tqDDeVd0oyVzh7BPrDcPjRnV1PV/5LaknXJJQvOuRGR0zQJz+w==",
|
||||
"license": "MIT",
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/@noble/curves": {
|
||||
"version": "1.2.0",
|
||||
"resolved": "https://registry.npmjs.org/@noble/curves/-/curves-1.2.0.tgz",
|
||||
"integrity": "sha512-oYclrNgRaM9SsBUBVbb8M6DTV7ZHRTKugureoYEncY5c65HOmRzvSiTE3y5CYaPYJA/GVkrhXEoF0M3Ya9PMnw==",
|
||||
"license": "MIT",
|
||||
"dependencies": {
|
||||
"@noble/hashes": "1.3.2"
|
||||
},
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/@noble/curves/node_modules/@noble/hashes": {
|
||||
"version": "1.3.2",
|
||||
"resolved": "https://registry.npmjs.org/@noble/hashes/-/hashes-1.3.2.tgz",
|
||||
"integrity": "sha512-MVC8EAQp7MvEcm30KWENFjgR+Mkmf+D189XJTkFIlwohU5hcBbn1ZkKq7KVTi2Hme3PMGF390DaL52beVrIihQ==",
|
||||
"license": "MIT",
|
||||
"engines": {
|
||||
"node": ">= 16"
|
||||
},
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/@noble/hashes": {
|
||||
"version": "1.3.1",
|
||||
"resolved": "https://registry.npmjs.org/@noble/hashes/-/hashes-1.3.1.tgz",
|
||||
"integrity": "sha512-EbqwksQwz9xDRGfDST86whPBgM65E0OH/pCgqW0GBVzO22bNE+NuIbeTb714+IfSjU3aRk47EUvXIb5bTsenKA==",
|
||||
"license": "MIT",
|
||||
"engines": {
|
||||
"node": ">= 16"
|
||||
},
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/@scure/base": {
|
||||
"version": "1.1.1",
|
||||
"resolved": "https://registry.npmjs.org/@scure/base/-/base-1.1.1.tgz",
|
||||
"integrity": "sha512-ZxOhsSyxYwLJj3pLZCefNitxsj093tb2vq90mp2txoYeBqbcjDjqFhyM8eUjq/uFm6zJ+mUuqxlS2FkuSY1MTA==",
|
||||
"funding": [
|
||||
{
|
||||
"type": "individual",
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
],
|
||||
"license": "MIT"
|
||||
},
|
||||
"node_modules/@scure/bip32": {
|
||||
"version": "1.3.1",
|
||||
"resolved": "https://registry.npmjs.org/@scure/bip32/-/bip32-1.3.1.tgz",
|
||||
"integrity": "sha512-osvveYtyzdEVbt3OfwwXFr4P2iVBL5u1Q3q4ONBfDY/UpOuXmOlbgwc1xECEboY8wIays8Yt6onaWMUdUbfl0A==",
|
||||
"license": "MIT",
|
||||
"dependencies": {
|
||||
"@noble/curves": "~1.1.0",
|
||||
"@noble/hashes": "~1.3.1",
|
||||
"@scure/base": "~1.1.0"
|
||||
},
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/@scure/bip32/node_modules/@noble/curves": {
|
||||
"version": "1.1.0",
|
||||
"resolved": "https://registry.npmjs.org/@noble/curves/-/curves-1.1.0.tgz",
|
||||
"integrity": "sha512-091oBExgENk/kGj3AZmtBDMpxQPDtxQABR2B9lb1JbVTs6ytdzZNwvhxQ4MWasRNEzlbEH8jCWFCwhF/Obj5AA==",
|
||||
"license": "MIT",
|
||||
"dependencies": {
|
||||
"@noble/hashes": "1.3.1"
|
||||
},
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/@scure/bip39": {
|
||||
"version": "1.2.1",
|
||||
"resolved": "https://registry.npmjs.org/@scure/bip39/-/bip39-1.2.1.tgz",
|
||||
"integrity": "sha512-Z3/Fsz1yr904dduJD0NpiyRHhRYHdcnyh73FZWiV+/qhWi83wNJ3NWolYqCEN+ZWsUz2TWwajJggcRE9r1zUYg==",
|
||||
"license": "MIT",
|
||||
"dependencies": {
|
||||
"@noble/hashes": "~1.3.0",
|
||||
"@scure/base": "~1.1.0"
|
||||
},
|
||||
"funding": {
|
||||
"url": "https://paulmillr.com/funding/"
|
||||
}
|
||||
},
|
||||
"node_modules/nostr-tools": {
|
||||
"version": "2.16.1",
|
||||
"resolved": "https://registry.npmjs.org/nostr-tools/-/nostr-tools-2.16.1.tgz",
|
||||
"integrity": "sha512-1JQR7X8twAP6LFCHGUhr3/vs9CeOUXgB9Q6f2bU4xqh8+StqbkMsbdVdoA+/gmytnhbCpu33t6SYFz7ZOL1KyA==",
|
||||
"license": "Unlicense",
|
||||
"dependencies": {
|
||||
"@noble/ciphers": "^0.5.1",
|
||||
"@noble/curves": "1.2.0",
|
||||
"@noble/hashes": "1.3.1",
|
||||
"@scure/base": "1.1.1",
|
||||
"@scure/bip32": "1.3.1",
|
||||
"@scure/bip39": "1.2.1",
|
||||
"nostr-wasm": "0.1.0"
|
||||
},
|
||||
"peerDependencies": {
|
||||
"typescript": ">=5.0.0"
|
||||
},
|
||||
"peerDependenciesMeta": {
|
||||
"typescript": {
|
||||
"optional": true
|
||||
}
|
||||
}
|
||||
},
|
||||
"node_modules/nostr-wasm": {
|
||||
"version": "0.1.0",
|
||||
"resolved": "https://registry.npmjs.org/nostr-wasm/-/nostr-wasm-0.1.0.tgz",
|
||||
"integrity": "sha512-78BTryCLcLYv96ONU8Ws3Q1JzjlAt+43pWQhIl86xZmWeegYCNLPml7yQ+gG3vR6V5h4XGj+TxO+SS5dsThQIA==",
|
||||
"license": "MIT"
|
||||
}
|
||||
}
|
||||
}
|
|
@ -0,0 +1,20 @@
|
|||
{
|
||||
"name": "nostr_core_lib",
|
||||
"version": "1.0.0",
|
||||
"description": "",
|
||||
"main": "index.js",
|
||||
"directories": {
|
||||
"example": "examples",
|
||||
"test": "tests"
|
||||
},
|
||||
"scripts": {
|
||||
"test": "echo \"Error: no test specified\" && exit 1"
|
||||
},
|
||||
"keywords": [],
|
||||
"author": "",
|
||||
"license": "ISC",
|
||||
"type": "commonjs",
|
||||
"dependencies": {
|
||||
"nostr-tools": "^2.16.1"
|
||||
}
|
||||
}
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,69 @@
|
|||
const { generateSecretKey, getPublicKey, nip04 } = require('nostr-tools');
|
||||
const { bytesToHex } = require('@noble/hashes/utils');
|
||||
|
||||
function generateTestVector(testName, plaintext) {
|
||||
// Generate random keys
|
||||
const sk1 = generateSecretKey();
|
||||
const pk1 = getPublicKey(sk1);
|
||||
const sk2 = generateSecretKey();
|
||||
const pk2 = getPublicKey(sk2);
|
||||
|
||||
// Encrypt from Alice (sk1) to Bob (pk2)
|
||||
const encrypted = nip04.encrypt(sk1, pk2, plaintext);
|
||||
|
||||
// Verify decryption works (Bob using sk2 to decrypt from Alice pk1)
|
||||
const decrypted = nip04.decrypt(sk2, pk1, encrypted);
|
||||
|
||||
if (decrypted !== plaintext) {
|
||||
throw new Error(`Decryption failed for ${testName}`);
|
||||
}
|
||||
|
||||
return {
|
||||
testName,
|
||||
sk1: bytesToHex(sk1),
|
||||
pk1: pk1,
|
||||
sk2: bytesToHex(sk2),
|
||||
pk2: pk2,
|
||||
plaintext: plaintext,
|
||||
encrypted: encrypted
|
||||
};
|
||||
}
|
||||
|
||||
console.log('=== NIP-04 Test Vector Generation ===\n');
|
||||
|
||||
// Generate 3 test vectors with different plaintexts
|
||||
const testVectors = [
|
||||
generateTestVector('TEST_VECTOR_2', 'Hello, NOSTR!'),
|
||||
generateTestVector('TEST_VECTOR_3', 'This is a longer message to test encryption with more content. 🚀'),
|
||||
generateTestVector('TEST_VECTOR_4', 'Short')
|
||||
];
|
||||
|
||||
// Output in C format for easy integration
|
||||
testVectors.forEach((vector, index) => {
|
||||
console.log(`=== ${vector.testName}: ${vector.plaintext.replace(/\n/g, '\\n')} ===`);
|
||||
console.log(`SK1 (Alice): ${vector.sk1}`);
|
||||
console.log(`PK1 (Alice): ${vector.pk1}`);
|
||||
console.log(`SK2 (Bob): ${vector.sk2}`);
|
||||
console.log(`PK2 (Bob): ${vector.pk2}`);
|
||||
console.log(`Plaintext: "${vector.plaintext}"`);
|
||||
console.log(`Expected: ${vector.encrypted}`);
|
||||
console.log('');
|
||||
});
|
||||
|
||||
// Also output as C code that can be copied directly
|
||||
console.log('=== C CODE FOR INTEGRATION ===\n');
|
||||
|
||||
testVectors.forEach((vector, index) => {
|
||||
const testNum = index + 2; // Start from 2 since we already have TEST_VECTOR_1
|
||||
console.log(` // ${vector.testName}: ${vector.plaintext.replace(/"/g, '\\"')}`);
|
||||
console.log(` {`);
|
||||
console.log(` "${vector.sk1}",`);
|
||||
console.log(` "${vector.pk1}",`);
|
||||
console.log(` "${vector.sk2}",`);
|
||||
console.log(` "${vector.pk2}",`);
|
||||
console.log(` "${vector.plaintext.replace(/"/g, '\\"')}",`);
|
||||
console.log(` "${vector.encrypted}"`);
|
||||
console.log(` }${index < testVectors.length - 1 ? ',' : ''}`);
|
||||
});
|
||||
|
||||
console.log('\n=== Generation Complete ===');
|
|
@ -0,0 +1,229 @@
|
|||
# NOSTR Test Suite Makefile
|
||||
|
||||
CC = gcc
|
||||
CFLAGS = -Wall -Wextra -std=c99 -g -I.. -I../secp256k1/include -I../mbedtls-install/include
|
||||
LDFLAGS = -L.. -L../secp256k1/.libs -L../mbedtls-install/lib -lnostr_core -l:libsecp256k1.a -l:libmbedtls.a -l:libmbedx509.a -l:libmbedcrypto.a -lm -static
|
||||
|
||||
# ARM64 cross-compilation settings
|
||||
ARM64_CC = aarch64-linux-gnu-gcc
|
||||
ARM64_CFLAGS = -Wall -Wextra -std=c99 -g -I..
|
||||
ARM64_LDFLAGS = -L.. -lnostr_core_arm64 -lm -static
|
||||
|
||||
# Test executables
|
||||
CRYPTO_TEST_EXEC = nostr_crypto_test
|
||||
CORE_TEST_EXEC = nostr_core_test
|
||||
RELAY_POOL_TEST_EXEC = relay_pool_test
|
||||
EVENT_GEN_TEST_EXEC = test_event_generation
|
||||
POW_LOOP_TEST_EXEC = test_pow_loop
|
||||
NIP04_TEST_EXEC = nip04_test
|
||||
ARM64_CRYPTO_TEST_EXEC = nostr_crypto_test_arm64
|
||||
ARM64_CORE_TEST_EXEC = nostr_core_test_arm64
|
||||
ARM64_RELAY_POOL_TEST_EXEC = relay_pool_test_arm64
|
||||
ARM64_NIP04_TEST_EXEC = nip04_test_arm64
|
||||
|
||||
# Default target - build all test suites
|
||||
all: $(CRYPTO_TEST_EXEC) $(CORE_TEST_EXEC) $(RELAY_POOL_TEST_EXEC) $(EVENT_GEN_TEST_EXEC)
|
||||
|
||||
# Build crypto test executable (x86_64)
|
||||
$(CRYPTO_TEST_EXEC): nostr_crypto_test.c
|
||||
@echo "Building crypto test suite (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build core test executable (x86_64)
|
||||
$(CORE_TEST_EXEC): nostr_core_test.c
|
||||
@echo "Building core test suite (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build relay pool test executable (x86_64)
|
||||
$(RELAY_POOL_TEST_EXEC): relay_pool_test.c
|
||||
@echo "Building relay pool test suite (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build event generation test executable (x86_64)
|
||||
$(EVENT_GEN_TEST_EXEC): test_event_generation.c
|
||||
@echo "Building event generation test suite (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build PoW loop test executable (x86_64)
|
||||
$(POW_LOOP_TEST_EXEC): test_pow_loop.c
|
||||
@echo "Building PoW loop test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build NIP-04 test executable (x86_64)
|
||||
$(NIP04_TEST_EXEC): nip04_test.c
|
||||
@echo "Building NIP-04 encryption test suite (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build simple initialization test executable (x86_64)
|
||||
simple_init_test: simple_init_test.c
|
||||
@echo "Building simple initialization test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build minimal NIP-04 test executable (x86_64)
|
||||
nip04_minimal_test: nip04_minimal_test.c
|
||||
@echo "Building minimal NIP-04 test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build encryption-only NIP-04 test executable (x86_64)
|
||||
nip04_encrypt_only_test: nip04_encrypt_only_test.c
|
||||
@echo "Building encryption-only NIP-04 test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build decryption debug NIP-04 test executable (x86_64)
|
||||
nip04_decrypt_debug_test: nip04_decrypt_debug_test.c
|
||||
@echo "Building decryption debug NIP-04 test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build detailed debug NIP-04 test executable (x86_64)
|
||||
nip04_detailed_debug_test: nip04_detailed_debug_test.c
|
||||
@echo "Building detailed debug NIP-04 test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build ping test executable (x86_64)
|
||||
ping_test: ping_test.c
|
||||
@echo "Building ping test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build ChaCha20 test executable (x86_64)
|
||||
chacha20_test: chacha20_test.c
|
||||
@echo "Building ChaCha20 RFC 8439 test suite (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build frame debug test executable (x86_64)
|
||||
frame_debug_test: frame_debug_test.c
|
||||
@echo "Building frame debug test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build sync test executable (x86_64)
|
||||
sync_test: sync_test.c
|
||||
@echo "Building synchronous relay query test program (x86_64)..."
|
||||
$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
# Build crypto test ARM64 executable
|
||||
$(ARM64_CRYPTO_TEST_EXEC): nostr_crypto_test.c
|
||||
@echo "Building crypto test suite (ARM64)..."
|
||||
$(ARM64_CC) $(ARM64_CFLAGS) $< -o $@ $(ARM64_LDFLAGS)
|
||||
|
||||
# Build core test ARM64 executable
|
||||
$(ARM64_CORE_TEST_EXEC): nostr_core_test.c
|
||||
@echo "Building core test suite (ARM64)..."
|
||||
$(ARM64_CC) $(ARM64_CFLAGS) $< -o $@ $(ARM64_LDFLAGS)
|
||||
|
||||
# Build relay pool test ARM64 executable
|
||||
$(ARM64_RELAY_POOL_TEST_EXEC): relay_pool_test.c
|
||||
@echo "Building relay pool test suite (ARM64)..."
|
||||
$(ARM64_CC) $(ARM64_CFLAGS) $< -o $@ $(ARM64_LDFLAGS)
|
||||
|
||||
# Build NIP-04 test ARM64 executable
|
||||
$(ARM64_NIP04_TEST_EXEC): nip04_test.c
|
||||
@echo "Building NIP-04 encryption test suite (ARM64)..."
|
||||
$(ARM64_CC) $(ARM64_CFLAGS) $< -o $@ $(ARM64_LDFLAGS)
|
||||
|
||||
# Build both architectures
|
||||
all-arch: $(CRYPTO_TEST_EXEC) $(CORE_TEST_EXEC) $(RELAY_POOL_TEST_EXEC) $(ARM64_CRYPTO_TEST_EXEC) $(ARM64_CORE_TEST_EXEC) $(ARM64_RELAY_POOL_TEST_EXEC)
|
||||
|
||||
# Run crypto tests (x86_64)
|
||||
test-crypto: $(CRYPTO_TEST_EXEC)
|
||||
@echo "Running crypto tests (x86_64)..."
|
||||
./$(CRYPTO_TEST_EXEC)
|
||||
|
||||
# Run core tests (x86_64)
|
||||
test-core: $(CORE_TEST_EXEC)
|
||||
@echo "Running core tests (x86_64)..."
|
||||
./$(CORE_TEST_EXEC)
|
||||
|
||||
# Run relay pool tests (x86_64)
|
||||
test-relay-pool: $(RELAY_POOL_TEST_EXEC)
|
||||
@echo "Running relay pool tests (x86_64)..."
|
||||
./$(RELAY_POOL_TEST_EXEC)
|
||||
|
||||
# Run NIP-04 tests (x86_64)
|
||||
test-nip04: $(NIP04_TEST_EXEC)
|
||||
@echo "Running NIP-04 encryption tests (x86_64)..."
|
||||
./$(NIP04_TEST_EXEC)
|
||||
|
||||
# Run all test suites (x86_64)
|
||||
test: test-crypto test-core test-relay-pool test-nip04
|
||||
|
||||
# Run crypto tests ARM64 (requires qemu-user-static or ARM64 system)
|
||||
test-crypto-arm64: $(ARM64_CRYPTO_TEST_EXEC)
|
||||
@echo "Running crypto tests (ARM64)..."
|
||||
@if command -v qemu-aarch64-static >/dev/null 2>&1; then \
|
||||
echo "Using qemu-aarch64-static to run ARM64 binary..."; \
|
||||
qemu-aarch64-static ./$(ARM64_CRYPTO_TEST_EXEC); \
|
||||
else \
|
||||
echo "qemu-aarch64-static not found. ARM64 binary built but cannot run on x86_64."; \
|
||||
echo "To run: copy $(ARM64_CRYPTO_TEST_EXEC) to ARM64 system and execute."; \
|
||||
file ./$(ARM64_CRYPTO_TEST_EXEC); \
|
||||
fi
|
||||
|
||||
# Run core tests ARM64 (requires qemu-user-static or ARM64 system)
|
||||
test-core-arm64: $(ARM64_CORE_TEST_EXEC)
|
||||
@echo "Running core tests (ARM64)..."
|
||||
@if command -v qemu-aarch64-static >/dev/null 2>&1; then \
|
||||
echo "Using qemu-aarch64-static to run ARM64 binary..."; \
|
||||
qemu-aarch64-static ./$(ARM64_CORE_TEST_EXEC); \
|
||||
else \
|
||||
echo "qemu-aarch64-static not found. ARM64 binary built but cannot run on x86_64."; \
|
||||
echo "To run: copy $(ARM64_CORE_TEST_EXEC) to ARM64 system and execute."; \
|
||||
file ./$(ARM64_CORE_TEST_EXEC); \
|
||||
fi
|
||||
|
||||
# Run relay pool tests ARM64 (requires qemu-user-static or ARM64 system)
|
||||
test-relay-pool-arm64: $(ARM64_RELAY_POOL_TEST_EXEC)
|
||||
@echo "Running relay pool tests (ARM64)..."
|
||||
@if command -v qemu-aarch64-static >/dev/null 2>&1; then \
|
||||
echo "Using qemu-aarch64-static to run ARM64 binary..."; \
|
||||
qemu-aarch64-static ./$(ARM64_RELAY_POOL_TEST_EXEC); \
|
||||
else \
|
||||
echo "qemu-aarch64-static not found. ARM64 binary built but cannot run on x86_64."; \
|
||||
echo "To run: copy $(ARM64_RELAY_POOL_TEST_EXEC) to ARM64 system and execute."; \
|
||||
file ./$(ARM64_RELAY_POOL_TEST_EXEC); \
|
||||
fi
|
||||
|
||||
# Run all test suites on ARM64
|
||||
test-arm64: test-crypto-arm64 test-core-arm64 test-relay-pool-arm64
|
||||
|
||||
# Run tests on both architectures
|
||||
test-all: test test-arm64
|
||||
|
||||
# Clean
|
||||
clean:
|
||||
@echo "Cleaning test artifacts..."
|
||||
rm -f $(CRYPTO_TEST_EXEC) $(CORE_TEST_EXEC) $(RELAY_POOL_TEST_EXEC) $(EVENT_GEN_TEST_EXEC) $(POW_LOOP_TEST_EXEC) $(NIP04_TEST_EXEC) $(ARM64_CRYPTO_TEST_EXEC) $(ARM64_CORE_TEST_EXEC) $(ARM64_RELAY_POOL_TEST_EXEC) $(ARM64_NIP04_TEST_EXEC)
|
||||
|
||||
# Help
|
||||
help:
|
||||
@echo "NOSTR Test Suite"
|
||||
@echo "================"
|
||||
@echo ""
|
||||
@echo "Available targets:"
|
||||
@echo " all - Build all test executables (x86_64)"
|
||||
@echo " all-arch - Build test executables for both x86_64 and ARM64"
|
||||
@echo " test-crypto - Build and run crypto tests (x86_64)"
|
||||
@echo " test-core - Build and run core tests (x86_64)"
|
||||
@echo " test-relay-pool - Build and run relay pool tests (x86_64)"
|
||||
@echo " test-nip04 - Build and run NIP-04 encryption tests (x86_64)"
|
||||
@echo " test - Build and run all test suites (x86_64)"
|
||||
@echo " test-arm64 - Build and run all test suites (ARM64)"
|
||||
@echo " test-all - Run tests on both architectures"
|
||||
@echo " clean - Remove test artifacts"
|
||||
@echo " help - Show this help"
|
||||
@echo ""
|
||||
@echo "Test Executables:"
|
||||
@echo " $(CRYPTO_TEST_EXEC) - x86_64 crypto test binary"
|
||||
@echo " $(CORE_TEST_EXEC) - x86_64 core test binary"
|
||||
@echo " $(RELAY_POOL_TEST_EXEC) - x86_64 relay pool test binary"
|
||||
@echo " $(NIP04_TEST_EXEC) - x86_64 NIP-04 encryption test binary"
|
||||
@echo " $(ARM64_CRYPTO_TEST_EXEC) - ARM64 crypto test binary"
|
||||
@echo " $(ARM64_CORE_TEST_EXEC) - ARM64 core test binary"
|
||||
@echo " $(ARM64_RELAY_POOL_TEST_EXEC) - ARM64 relay pool test binary"
|
||||
@echo " $(ARM64_NIP04_TEST_EXEC) - ARM64 NIP-04 encryption test binary"
|
||||
@echo ""
|
||||
@echo "Test Coverage:"
|
||||
@echo " Crypto Tests - Low-level cryptographic primitives (SHA-256, HMAC, secp256k1, BIP39, BIP32)"
|
||||
@echo " Core Tests - High-level NOSTR functionality with nak compatibility validation"
|
||||
@echo " Relay Pool Tests - Relay pool event processing with real NOSTR relays"
|
||||
@echo " NIP-04 Tests - NOSTR NIP-04 encryption/decryption with reference test vectors"
|
||||
|
||||
.PHONY: all all-arch test-crypto test-core test-relay-pool test test-crypto-arm64 test-core-arm64 test-relay-pool-arm64 test-arm64 test-all clean help
|
Binary file not shown.
|
@ -0,0 +1,327 @@
|
|||
/*
|
||||
* ChaCha20 Test Suite - RFC 8439 Reference Test Vectors
|
||||
*
|
||||
* This test suite validates our ChaCha20 implementation against the official
|
||||
* test vectors from RFC 8439 "ChaCha20 and Poly1305 for IETF Protocols".
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdint.h>
|
||||
#include "../nostr_core/nostr_chacha20.h"
|
||||
|
||||
// Helper function to convert hex string to bytes
|
||||
static int hex_to_bytes(const char* hex, uint8_t* bytes, size_t len) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
if (sscanf(hex + 2*i, "%2hhx", &bytes[i]) != 1) {
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Helper function to convert bytes to hex string for display
|
||||
static void bytes_to_hex(const uint8_t* bytes, size_t len, char* hex) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sprintf(hex + 2*i, "%02x", bytes[i]);
|
||||
}
|
||||
hex[2*len] = '\0';
|
||||
}
|
||||
|
||||
// Helper function to compare byte arrays
|
||||
static int bytes_equal(const uint8_t* a, const uint8_t* b, size_t len) {
|
||||
return memcmp(a, b, len) == 0;
|
||||
}
|
||||
|
||||
// Test 1: ChaCha Quarter Round (RFC 8439 Section 2.1.1)
|
||||
static int test_quarter_round() {
|
||||
printf("=== Test 1: ChaCha Quarter Round ===\n");
|
||||
|
||||
uint32_t state[16] = {0};
|
||||
state[0] = 0x11111111;
|
||||
state[1] = 0x01020304;
|
||||
state[2] = 0x9b8d6f43;
|
||||
state[3] = 0x01234567;
|
||||
|
||||
printf("Input: a=0x%08x, b=0x%08x, c=0x%08x, d=0x%08x\n",
|
||||
state[0], state[1], state[2], state[3]);
|
||||
|
||||
chacha20_quarter_round(state, 0, 1, 2, 3);
|
||||
|
||||
printf("Output: a=0x%08x, b=0x%08x, c=0x%08x, d=0x%08x\n",
|
||||
state[0], state[1], state[2], state[3]);
|
||||
|
||||
// Expected values from RFC 8439
|
||||
uint32_t expected[4] = {0xea2a92f4, 0xcb1cf8ce, 0x4581472e, 0x5881c4bb};
|
||||
|
||||
if (state[0] == expected[0] && state[1] == expected[1] &&
|
||||
state[2] == expected[2] && state[3] == expected[3]) {
|
||||
printf("✅ Quarter round test PASSED\n\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ Quarter round test FAILED\n");
|
||||
printf("Expected: a=0x%08x, b=0x%08x, c=0x%08x, d=0x%08x\n\n",
|
||||
expected[0], expected[1], expected[2], expected[3]);
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
// Test 2: ChaCha20 Block Function - RFC 8439 Appendix A.1 Test Vectors
|
||||
static int test_chacha20_block_1() {
|
||||
printf("=== Test 2: ChaCha20 Block Function - RFC 8439 Test Vectors ===\n");
|
||||
|
||||
uint8_t key[32] = {0};
|
||||
uint8_t nonce[12] = {0};
|
||||
uint8_t output0[64], output1[64];
|
||||
|
||||
printf("Key: all zeros\n");
|
||||
printf("Nonce: all zeros\n");
|
||||
|
||||
// Test counter = 0 (RFC 8439 Appendix A.1 Test Vector #1)
|
||||
printf("\nTesting counter = 0:\n");
|
||||
chacha20_block(key, 0, nonce, output0);
|
||||
char hex_output0[129];
|
||||
bytes_to_hex(output0, 64, hex_output0);
|
||||
printf("Counter=0 output: %s\n", hex_output0);
|
||||
|
||||
// Test counter = 1 (RFC 8439 Appendix A.1 Test Vector #2)
|
||||
printf("\nTesting counter = 1:\n");
|
||||
chacha20_block(key, 1, nonce, output1);
|
||||
char hex_output1[129];
|
||||
bytes_to_hex(output1, 64, hex_output1);
|
||||
printf("Counter=1 output: %s\n", hex_output1);
|
||||
|
||||
// Expected for counter=0 from RFC 8439 Appendix A.1 Test Vector #1
|
||||
const char* expected_counter0_hex =
|
||||
"76b8e0ada0f13d90405d6ae55386bd28"
|
||||
"bdd219b8a08ded1aa836efcc8b770dc7"
|
||||
"da41597c5157488d7724e03fb8d84a37"
|
||||
"6a43b8f41518a11cc387b669b2ee6586";
|
||||
|
||||
// Expected for counter=1 from RFC 8439 Appendix A.1 Test Vector #2
|
||||
const char* expected_counter1_hex =
|
||||
"9f07e7be5551387a98ba977c732d080d"
|
||||
"cb0f29a048e3656912c6533e32ee7aed"
|
||||
"29b721769ce64e43d57133b074d839d5"
|
||||
"31ed1f28510afb45ace10a1f4b794d6f";
|
||||
|
||||
uint8_t expected0[64], expected1[64];
|
||||
hex_to_bytes(expected_counter0_hex, expected0, 64);
|
||||
hex_to_bytes(expected_counter1_hex, expected1, 64);
|
||||
|
||||
printf("\nExpected counter=0: %s\n", expected_counter0_hex);
|
||||
printf("Expected counter=1: %s\n", expected_counter1_hex);
|
||||
|
||||
int test0_pass = bytes_equal(output0, expected0, 64);
|
||||
int test1_pass = bytes_equal(output1, expected1, 64);
|
||||
|
||||
if (test0_pass) printf("✅ Counter=0 test PASSED\n");
|
||||
else printf("❌ Counter=0 test FAILED\n");
|
||||
|
||||
if (test1_pass) printf("✅ Counter=1 test PASSED\n");
|
||||
else printf("❌ Counter=1 test FAILED\n");
|
||||
|
||||
printf("\n");
|
||||
return test0_pass && test1_pass; // Both tests must pass
|
||||
}
|
||||
|
||||
// Test 3: ChaCha20 Block Function - Test Vector #2 (RFC 8439 Appendix A.1)
|
||||
static int test_chacha20_block_2() {
|
||||
printf("=== Test 3: ChaCha20 Block Function - Different Key ===\n");
|
||||
|
||||
// Key with last byte = 1, all-zero nonce, counter = 1
|
||||
uint8_t key[32] = {0};
|
||||
key[31] = 0x01; // Last byte = 1
|
||||
uint8_t nonce[12] = {0};
|
||||
uint32_t counter = 1;
|
||||
uint8_t output[64];
|
||||
|
||||
printf("Key: all zeros except last byte = 0x01\n");
|
||||
printf("Nonce: all zeros\n");
|
||||
printf("Counter: %u\n", counter);
|
||||
|
||||
int result = chacha20_block(key, counter, nonce, output);
|
||||
if (result != 0) {
|
||||
printf("❌ ChaCha20 block function failed\n\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Expected output from RFC 8439 Appendix A.1 Test Vector #3
|
||||
const char* expected_hex =
|
||||
"3aeb5224ecf849929b9d828db1ced4dd"
|
||||
"832025e8018b8160b82284f3c949aa5a"
|
||||
"8eca00bbb4a73bdad192b5c42f73f2fd"
|
||||
"4e273644c8b36125a64addeb006c13a0";
|
||||
|
||||
uint8_t expected[64];
|
||||
hex_to_bytes(expected_hex, expected, 64);
|
||||
|
||||
char hex_output[129];
|
||||
bytes_to_hex(output, 64, hex_output);
|
||||
printf("Output: %s\n", hex_output);
|
||||
|
||||
if (bytes_equal(output, expected, 64)) {
|
||||
printf("✅ ChaCha20 block test #2 PASSED\n\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ ChaCha20 block test #2 FAILED\n");
|
||||
printf("Expected: %s\n\n", expected_hex);
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
// Test 4: ChaCha20 Encryption - "Sunscreen" Test (RFC 8439 Section 2.4.2)
|
||||
static int test_chacha20_encryption() {
|
||||
printf("=== Test 4: ChaCha20 Encryption - Sunscreen Text ===\n");
|
||||
|
||||
// Key and nonce from RFC 8439 Section 2.4.2
|
||||
const char* key_hex =
|
||||
"000102030405060708090a0b0c0d0e0f"
|
||||
"101112131415161718191a1b1c1d1e1f";
|
||||
const char* nonce_hex = "000000000000004a00000000";
|
||||
|
||||
uint8_t key[32];
|
||||
uint8_t nonce[12];
|
||||
hex_to_bytes(key_hex, key, 32);
|
||||
hex_to_bytes(nonce_hex, nonce, 12);
|
||||
|
||||
// Test plaintext (first part of "Sunscreen" text)
|
||||
const char* plaintext =
|
||||
"Ladies and Gentlemen of the class of '99: If I could offer you "
|
||||
"only one tip for the future, sunscreen would be it.";
|
||||
size_t plaintext_len = strlen(plaintext);
|
||||
|
||||
printf("Plaintext: \"%.50s...\"\n", plaintext);
|
||||
printf("Length: %zu bytes\n", plaintext_len);
|
||||
|
||||
uint8_t ciphertext[256];
|
||||
uint32_t counter = 1;
|
||||
|
||||
int result = chacha20_encrypt(key, counter, nonce,
|
||||
(const uint8_t*)plaintext,
|
||||
ciphertext, plaintext_len);
|
||||
|
||||
if (result != 0) {
|
||||
printf("❌ ChaCha20 encryption failed\n\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Expected ciphertext (first 64 bytes) from RFC 8439
|
||||
const char* expected_hex =
|
||||
"6e2e359a2568f98041ba0728dd0d6981"
|
||||
"e97e7aec1d4360c20a27afccfd9fae0b"
|
||||
"f91b65c5524733ab8f593dabcd62b357"
|
||||
"1639d624e65152ab8f530c359f0861d8";
|
||||
|
||||
uint8_t expected[64];
|
||||
hex_to_bytes(expected_hex, expected, 64);
|
||||
|
||||
char hex_output[129];
|
||||
bytes_to_hex(ciphertext, 64, hex_output);
|
||||
printf("Ciphertext (first 64 bytes): %s\n", hex_output);
|
||||
|
||||
if (bytes_equal(ciphertext, expected, 64)) {
|
||||
printf("✅ ChaCha20 encryption test PASSED\n");
|
||||
|
||||
// Test decryption (should get back original plaintext)
|
||||
uint8_t decrypted[256];
|
||||
result = chacha20_encrypt(key, counter, nonce, ciphertext, decrypted, plaintext_len);
|
||||
|
||||
if (result == 0 && memcmp(plaintext, decrypted, plaintext_len) == 0) {
|
||||
printf("✅ ChaCha20 decryption test PASSED\n\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ ChaCha20 decryption test FAILED\n\n");
|
||||
return 0;
|
||||
}
|
||||
} else {
|
||||
printf("❌ ChaCha20 encryption test FAILED\n");
|
||||
printf("Expected: %s\n\n", expected_hex);
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
// Test 5: ChaCha20 Edge Cases and Additional Validation
|
||||
static int test_chacha20_edge_cases() {
|
||||
printf("=== Test 5: ChaCha20 Edge Cases and Additional Validation ===\n");
|
||||
|
||||
uint8_t key[32];
|
||||
uint8_t nonce[12];
|
||||
uint8_t input[64];
|
||||
uint8_t output[64];
|
||||
|
||||
// Initialize test data
|
||||
memset(key, 0, 32);
|
||||
memset(nonce, 0, 12);
|
||||
memset(input, 0xAA, 64); // Fill with test pattern
|
||||
|
||||
printf("Testing various scenarios...\n");
|
||||
|
||||
// Test 1: Counter = 0
|
||||
int result1 = chacha20_encrypt(key, 0, nonce, input, output, 64);
|
||||
printf("Counter=0 (64 bytes): %s\n", result1 == 0 ? "PASS" : "FAIL");
|
||||
|
||||
// Test 2: Counter = 1
|
||||
int result2 = chacha20_encrypt(key, 1, nonce, input, output, 64);
|
||||
printf("Counter=1 (64 bytes): %s\n", result2 == 0 ? "PASS" : "FAIL");
|
||||
|
||||
// Test 3: Empty data (0 bytes)
|
||||
int result3 = chacha20_encrypt(key, 0, nonce, input, output, 0);
|
||||
printf("Zero-length data: %s\n", result3 == 0 ? "PASS" : "FAIL");
|
||||
|
||||
// Test 4: Single byte
|
||||
int result4 = chacha20_encrypt(key, 0, nonce, input, output, 1);
|
||||
printf("Single byte: %s\n", result4 == 0 ? "PASS" : "FAIL");
|
||||
|
||||
// Test 5: Partial block (35 bytes)
|
||||
int result5 = chacha20_encrypt(key, 0, nonce, input, output, 35);
|
||||
printf("Partial block (35 bytes): %s\n", result5 == 0 ? "PASS" : "FAIL");
|
||||
|
||||
// Test 6: Multi-block (128 bytes)
|
||||
uint8_t large_input[128];
|
||||
uint8_t large_output[128];
|
||||
memset(large_input, 0x55, 128);
|
||||
int result6 = chacha20_encrypt(key, 0, nonce, large_input, large_output, 128);
|
||||
printf("Multi-block (128 bytes): %s\n", result6 == 0 ? "PASS" : "FAIL");
|
||||
|
||||
if (result1 == 0 && result2 == 0 && result3 == 0 &&
|
||||
result4 == 0 && result5 == 0 && result6 == 0) {
|
||||
printf("✅ All edge case tests PASSED\n\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ Some edge case tests FAILED\n\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
// Main test function
|
||||
int main() {
|
||||
printf("🧪 ChaCha20 Test Suite - RFC 8439 Reference Vectors\n");
|
||||
printf("=====================================================\n\n");
|
||||
|
||||
int passed = 0;
|
||||
int total = 5;
|
||||
|
||||
if (test_quarter_round()) passed++;
|
||||
if (test_chacha20_block_1()) passed++;
|
||||
if (test_chacha20_block_2()) passed++;
|
||||
if (test_chacha20_encryption()) passed++;
|
||||
if (test_chacha20_edge_cases()) passed++;
|
||||
|
||||
printf("=== Test Summary ===\n");
|
||||
printf("Passed: %d/%d tests\n", passed, total);
|
||||
|
||||
if (passed == total) {
|
||||
printf("🎉 ALL CHACHA20 TESTS PASSED! 🎉\n");
|
||||
printf("\nOur ChaCha20 implementation is RFC 8439 compliant and ready for production use.\n");
|
||||
printf("✅ Quarter round operations work correctly\n");
|
||||
printf("✅ Block function matches reference vectors\n");
|
||||
printf("✅ Encryption/decryption is bidirectional\n");
|
||||
printf("✅ Edge cases handled properly\n");
|
||||
return 0;
|
||||
} else {
|
||||
printf("❌ Some tests failed. ChaCha20 implementation needs fixes.\n");
|
||||
return 1;
|
||||
}
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,85 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
void hex_to_bytes(const char* hex_str, unsigned char* bytes) {
|
||||
size_t len = strlen(hex_str);
|
||||
for (size_t i = 0; i < len; i += 2) {
|
||||
sscanf(hex_str + i, "%2hhx", &bytes[i / 2]);
|
||||
}
|
||||
}
|
||||
|
||||
int test_simple(void) {
|
||||
printf("=== SIMPLE TEST ===\n");
|
||||
|
||||
const char* sk1_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* sk2_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
const char* pk1_hex = "b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1";
|
||||
const char* pk2_hex = "dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3";
|
||||
const char* plaintext = "test";
|
||||
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
char encrypted[NOSTR_NIP04_MAX_ENCRYPTED_SIZE];
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, plaintext, encrypted, sizeof(encrypted));
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("✅ Encryption: PASS\n");
|
||||
|
||||
char decrypted[NOSTR_NIP04_MAX_PLAINTEXT_SIZE];
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, sizeof(decrypted));
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("✅ Decryption: PASS\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int main(void) {
|
||||
printf("=== DEBUG SEGFAULT TEST ===\n");
|
||||
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("ERROR: Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✅ Library initialized\n");
|
||||
|
||||
// Test 1
|
||||
if (!test_simple()) {
|
||||
printf("❌ Test 1 FAILED\n");
|
||||
return 1;
|
||||
}
|
||||
printf("✅ Test 1 PASSED\n");
|
||||
|
||||
// Test 2 - same as test 1
|
||||
if (!test_simple()) {
|
||||
printf("❌ Test 2 FAILED\n");
|
||||
return 1;
|
||||
}
|
||||
printf("✅ Test 2 PASSED\n");
|
||||
|
||||
// Test 3 - same as test 1
|
||||
if (!test_simple()) {
|
||||
printf("❌ Test 3 FAILED\n");
|
||||
return 1;
|
||||
}
|
||||
printf("✅ Test 3 PASSED\n");
|
||||
|
||||
printf("✅ ALL TESTS PASSED - No segfault!\n");
|
||||
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,7 @@
|
|||
#include <stdio.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
int main(void) {
|
||||
printf("Header included successfully\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,22 @@
|
|||
#include <stdio.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
int main(void) {
|
||||
printf("=== Testing library initialization only ===\n");
|
||||
|
||||
printf("About to call nostr_init()...\n");
|
||||
int result = nostr_init();
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("ERROR: Failed to initialize NOSTR library: %s\n", nostr_strerror(result));
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✅ Library initialized successfully!\n");
|
||||
|
||||
printf("About to call nostr_cleanup()...\n");
|
||||
nostr_cleanup();
|
||||
|
||||
printf("✅ Library cleanup completed!\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,6 @@
|
|||
#include <stdio.h>
|
||||
|
||||
int main(void) {
|
||||
printf("Hello from minimal test\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,816 @@
|
|||
/*
|
||||
* NIP-04 Encryption Test with Known Test Vectors
|
||||
* Uses test vectors from nostr-tools to validate our implementation
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
void print_hex(const char* label, const unsigned char* data, size_t len) {
|
||||
printf("%s: ", label);
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
printf("%02x", data[i]);
|
||||
}
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
void hex_to_bytes(const char* hex_str, unsigned char* bytes) {
|
||||
size_t len = strlen(hex_str);
|
||||
for (size_t i = 0; i < len; i += 2) {
|
||||
sscanf(hex_str + i, "%2hhx", &bytes[i / 2]);
|
||||
}
|
||||
}
|
||||
|
||||
// Simple replacement for strndup which isn't available in C99
|
||||
char* safe_strndup(const char* s, size_t n) {
|
||||
size_t len = strlen(s);
|
||||
if (n < len) len = n;
|
||||
char* result = malloc(len + 1);
|
||||
if (result) {
|
||||
strncpy(result, s, len);
|
||||
result[len] = '\0';
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
int test_vector_1(void) {
|
||||
printf("=== TEST VECTOR 1: Basic NIP-04 Encryption ===\n");
|
||||
|
||||
// Known test vector from nostr-tools
|
||||
const char* sk1_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* sk2_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
const char* pk1_hex = "b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1";
|
||||
const char* pk2_hex = "dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3";
|
||||
const char* plaintext = "nanana";
|
||||
const char* expected_ciphertext = "zJxfaJ32rN5Dg1ODjOlEew==?iv=EV5bUjcc4OX2Km/zPp4ndQ==";
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Plaintext: \"%s\"\n", plaintext);
|
||||
printf("Expected: %s\n", expected_ciphertext);
|
||||
printf("\n");
|
||||
|
||||
// Test encryption (Alice -> Bob) - Use heap allocation to avoid stack overflow
|
||||
char* encrypted = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
if (!encrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
printf("Testing encryption (Alice -> Bob)...\n");
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, plaintext, encrypted, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Our result: %s\n", encrypted);
|
||||
printf("Expected: %s\n", expected_ciphertext);
|
||||
|
||||
// Note: Our encryption will have different IV, so ciphertext will differ
|
||||
// The important test is that decryption works with both
|
||||
printf("\n");
|
||||
|
||||
// Test decryption with our ciphertext (Bob decrypts message from Alice)
|
||||
char* decrypted = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!decrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
printf("Testing decryption of our ciphertext (Bob decrypts from Alice)...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Round-trip encryption/decryption: PASS\n");
|
||||
} else {
|
||||
printf("❌ Round-trip encryption/decryption: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test decryption with expected ciphertext (validation against reference implementation)
|
||||
printf("\nTesting decryption of reference ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, expected_ciphertext, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ REFERENCE DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
printf(" This suggests our implementation differs from reference\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Reference compatibility: PASS\n");
|
||||
} else {
|
||||
printf("❌ Reference compatibility: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
free(decrypted);
|
||||
free(encrypted);
|
||||
return 1;
|
||||
}
|
||||
|
||||
int test_vector_2(void) {
|
||||
printf("=== TEST VECTOR 2: Large Payload Test ===\n");
|
||||
|
||||
// Same keys as test vector 1
|
||||
const char* sk1_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* sk2_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
const char* pk1_hex = "b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1";
|
||||
const char* pk2_hex = "dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3";
|
||||
|
||||
// Large payload: 800 'z' characters - allocate on heap to avoid stack overflow
|
||||
char* large_plaintext = malloc(801);
|
||||
if (!large_plaintext) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
memset(large_plaintext, 'z', 800);
|
||||
large_plaintext[800] = '\0';
|
||||
|
||||
const char* expected_ciphertext = "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?iv=2vWkOQQi0WynNJz/aZ4k2g==";
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Plaintext: 800 'z' characters\n");
|
||||
char* truncated_expected = safe_strndup(expected_ciphertext, 80);
|
||||
printf("Expected: %s...\n", truncated_expected);
|
||||
free(truncated_expected);
|
||||
printf("\n");
|
||||
|
||||
// Test encryption (Alice -> Bob) - Use heap allocation
|
||||
char* encrypted = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
if (!encrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(large_plaintext);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing encryption (Alice -> Bob)...\n");
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, large_plaintext, encrypted, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
char* truncated_result = safe_strndup(encrypted, 80);
|
||||
printf("Our result: %s...\n", truncated_result);
|
||||
free(truncated_result);
|
||||
printf("Length: %zu bytes\n", strlen(encrypted));
|
||||
printf("\n");
|
||||
|
||||
// Test decryption with our ciphertext
|
||||
char* decrypted = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!decrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing decryption of our ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted length: %zu bytes\n", strlen(decrypted));
|
||||
|
||||
if (strcmp(large_plaintext, decrypted) == 0) {
|
||||
printf("✅ Large payload round-trip: PASS\n");
|
||||
} else {
|
||||
printf("❌ Large payload round-trip: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test decryption with reference ciphertext
|
||||
printf("\nTesting decryption of reference large payload...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, expected_ciphertext, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ REFERENCE LARGE PAYLOAD DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (strcmp(large_plaintext, decrypted) == 0) {
|
||||
printf("✅ Reference large payload compatibility: PASS\n");
|
||||
} else {
|
||||
printf("❌ Reference large payload compatibility: FAIL\n");
|
||||
free(large_plaintext);
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
free(large_plaintext);
|
||||
return 1;
|
||||
}
|
||||
|
||||
int test_vector_3_bidirectional(void) {
|
||||
printf("=== TEST VECTOR 3: Bidirectional Communication ===\n");
|
||||
|
||||
// Use the same keys but test both directions
|
||||
const char* sk1_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* sk2_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
const char* pk1_hex = "b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1";
|
||||
const char* pk2_hex = "dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3";
|
||||
|
||||
const char* message_alice_to_bob = "Hello Bob, this is Alice!";
|
||||
const char* message_bob_to_alice = "Hi Alice, Bob here. Message received!";
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Message A->B: \"%s\"\n", message_alice_to_bob);
|
||||
printf("Message B->A: \"%s\"\n", message_bob_to_alice);
|
||||
printf("\n");
|
||||
|
||||
// Test 1: Alice -> Bob - Use heap allocation
|
||||
char* encrypted_a_to_b = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
char* decrypted_a_to_b = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!encrypted_a_to_b || !decrypted_a_to_b) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(encrypted_a_to_b);
|
||||
free(decrypted_a_to_b);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing Alice -> Bob encryption...\n");
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, message_alice_to_bob, encrypted_a_to_b, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ A->B ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Encrypted: %s\n", encrypted_a_to_b);
|
||||
|
||||
// Bob decrypts Alice's message
|
||||
printf("Bob decrypting Alice's message...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted_a_to_b, decrypted_a_to_b, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ A->B DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted_a_to_b);
|
||||
|
||||
if (strcmp(message_alice_to_bob, decrypted_a_to_b) == 0) {
|
||||
printf("✅ Alice -> Bob: PASS\n");
|
||||
} else {
|
||||
printf("❌ Alice -> Bob: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
|
||||
// Test 2: Bob -> Alice - Use heap allocation
|
||||
char* encrypted_b_to_a = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
char* decrypted_b_to_a = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!encrypted_b_to_a || !decrypted_b_to_a) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(encrypted_a_to_b);
|
||||
free(decrypted_a_to_b);
|
||||
free(encrypted_b_to_a);
|
||||
free(decrypted_b_to_a);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing Bob -> Alice encryption...\n");
|
||||
result = nostr_nip04_encrypt(sk2, pk1, message_bob_to_alice, encrypted_b_to_a, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ B->A ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Encrypted: %s\n", encrypted_b_to_a);
|
||||
|
||||
// Alice decrypts Bob's message
|
||||
printf("Alice decrypting Bob's message...\n");
|
||||
result = nostr_nip04_decrypt(sk1, pk2, encrypted_b_to_a, decrypted_b_to_a, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ B->A DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted_b_to_a);
|
||||
|
||||
if (strcmp(message_bob_to_alice, decrypted_b_to_a) == 0) {
|
||||
printf("✅ Bob -> Alice: PASS\n");
|
||||
} else {
|
||||
printf("❌ Bob -> Alice: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int test_vector_4_random_keys(void) {
|
||||
printf("=== TEST VECTOR 4: Random Keys - Hello, NOSTR! ===\n");
|
||||
|
||||
// Generated using nostr-tools with random keys
|
||||
const char* sk1_hex = "5c5ea5ec3a804533ba8a21ba3dd981fc55a84e854dde53869b3f812ccd788200";
|
||||
const char* pk1_hex = "0988b20763d3f8bc06e88722f2aa6b3caed3cc510e93287e1ee3f70ed22f54d2";
|
||||
const char* sk2_hex = "8e94e91ea679509ec1f5da2be87352ea78acde2b69563c23a41b7f07c0891bc3";
|
||||
const char* pk2_hex = "13747a8025c1196da3e67ecf941aa889c5c4ec6773e7f325f3f8d2435c4603c6";
|
||||
const char* plaintext = "Hello, NOSTR!";
|
||||
const char* expected_ciphertext = "+bqZAkfv/tI4h0XcvB9Baw==?iv=Om7m3at5zjJjxyAQbFY2IQ==";
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Plaintext: \"%s\"\n", plaintext);
|
||||
printf("Expected: %s\n", expected_ciphertext);
|
||||
printf("\n");
|
||||
|
||||
// Test encryption (Alice -> Bob) - Use heap allocation
|
||||
char* encrypted = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
char* decrypted = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!encrypted || !decrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing encryption (Alice -> Bob)...\n");
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, plaintext, encrypted, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Our result: %s\n", encrypted);
|
||||
|
||||
// Test decryption with our ciphertext
|
||||
printf("Testing decryption of our ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Round-trip encryption/decryption: PASS\n");
|
||||
} else {
|
||||
printf("❌ Round-trip encryption/decryption: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test decryption with reference ciphertext
|
||||
printf("\nTesting decryption of reference ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, expected_ciphertext, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ REFERENCE DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Reference compatibility: PASS\n");
|
||||
} else {
|
||||
printf("❌ Reference compatibility: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int test_vector_5_long_message(void) {
|
||||
printf("=== TEST VECTOR 5: Long Message with Emoji ===\n");
|
||||
|
||||
// Generated using nostr-tools with random keys
|
||||
const char* sk1_hex = "51099e755aaab7e8ee1850b683b673c11d09799e85a630e951eb3c92fab4aed3";
|
||||
const char* pk1_hex = "c5fb1cad7b11e3cf7f31d5bf47aaf3398a4803ea786eedfd674f55fa55dcb649";
|
||||
const char* sk2_hex = "41f2788d00bd362ac3c7c784ee46e35b99765a086514ee69cb15de38c072309a";
|
||||
const char* pk2_hex = "ba6773cf6a9b11476f692d4681a2f1e3015d1ee4a8d7c9d0364bed120f225079";
|
||||
const char* plaintext = "This is a longer message to test encryption with more content. 🚀";
|
||||
const char* expected_ciphertext = "3H9WEg9WjjN3r6ZymJt1R4ly3GlzhRR93FaSTGHLeM4oSS3eOnJtdXcO4ftgICMHRYM14WAmDDE9c12V8jhzua8GpnXKIVsNbY+oPF2yRwI=?iv=ztEGlo35pqJKrwZ2ZipsWg==";
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Plaintext: \"%s\"\n", plaintext);
|
||||
printf("Expected: %s\n", expected_ciphertext);
|
||||
printf("\n");
|
||||
|
||||
// Test encryption (Alice -> Bob) - Use heap allocation
|
||||
char* encrypted = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
char* decrypted = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!encrypted || !decrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing encryption (Alice -> Bob)...\n");
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, plaintext, encrypted, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Our result: %s\n", encrypted);
|
||||
|
||||
// Test decryption with our ciphertext
|
||||
printf("Testing decryption of our ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Round-trip encryption/decryption: PASS\n");
|
||||
} else {
|
||||
printf("❌ Round-trip encryption/decryption: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test decryption with reference ciphertext
|
||||
printf("\nTesting decryption of reference ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, expected_ciphertext, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ REFERENCE DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Reference compatibility: PASS\n");
|
||||
} else {
|
||||
printf("❌ Reference compatibility: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int test_vector_6_short_message(void) {
|
||||
printf("=== TEST VECTOR 6: Short Message ===\n");
|
||||
|
||||
// Generated using nostr-tools with random keys
|
||||
const char* sk1_hex = "42c450eaebaee5ad94b602fc9054cde48f66d68c236b547aafee0ff319377290";
|
||||
const char* pk1_hex = "a03f543eeb6c3f1c626181730751c39fd4f9f10455756d99ea855da97cf5076b";
|
||||
const char* sk2_hex = "72f424c96239d271549c648d16635b5603ef32cdcbbff41058d14187b98f30cc";
|
||||
const char* pk2_hex = "1c74b7a1d09ebeaf994a93a859682019930ad4f0f8ac7e65caacbbf4985042e8";
|
||||
const char* plaintext = "Short";
|
||||
const char* expected_ciphertext = "UIN92yHtAfX0vOTmn8VTtg==?iv=ou0QFU5UJUI6W4fUlkiElg==";
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Plaintext: \"%s\"\n", plaintext);
|
||||
printf("Expected: %s\n", expected_ciphertext);
|
||||
printf("\n");
|
||||
|
||||
// Test encryption (Alice -> Bob) - Use heap allocation
|
||||
char* encrypted = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
char* decrypted = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!encrypted || !decrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED\n");
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing encryption (Alice -> Bob)...\n");
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, plaintext, encrypted, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Our result: %s\n", encrypted);
|
||||
|
||||
// Test decryption with our ciphertext
|
||||
printf("Testing decryption of our ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Round-trip encryption/decryption: PASS\n");
|
||||
} else {
|
||||
printf("❌ Round-trip encryption/decryption: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test decryption with reference ciphertext
|
||||
printf("\nTesting decryption of reference ciphertext...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, expected_ciphertext, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ REFERENCE DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("Decrypted: \"%s\"\n", decrypted);
|
||||
printf("Expected: \"%s\"\n", plaintext);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ Reference compatibility: PASS\n");
|
||||
} else {
|
||||
printf("❌ Reference compatibility: FAIL\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int test_vector_7_10kb_payload(void) {
|
||||
printf("=== TEST VECTOR 7: 1MB Payload Stress Test ===\n");
|
||||
|
||||
// Same keys as previous tests for consistency
|
||||
const char* sk1_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* sk2_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
const char* pk1_hex = "b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1";
|
||||
const char* pk2_hex = "dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3";
|
||||
|
||||
// Generate exactly 1MB (1,048,576 bytes) of predictable content
|
||||
const size_t payload_size = 1048576;
|
||||
char* large_plaintext = malloc(payload_size + 1);
|
||||
if (!large_plaintext) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED for 1MB payload\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Fill with a predictable pattern: "ABCDEFGH01234567" repeated
|
||||
const char* pattern = "ABCDEFGH01234567"; // 16 bytes
|
||||
const size_t pattern_len = 16;
|
||||
|
||||
for (size_t i = 0; i < payload_size; i += pattern_len) {
|
||||
size_t copy_len = (i + pattern_len <= payload_size) ? pattern_len : payload_size - i;
|
||||
memcpy(large_plaintext + i, pattern, copy_len);
|
||||
}
|
||||
large_plaintext[payload_size] = '\0';
|
||||
|
||||
// Convert hex keys to bytes
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
|
||||
printf("Input Test Vector:\n");
|
||||
printf("SK1 (Alice): %s\n", sk1_hex);
|
||||
printf("PK1 (Alice): %s\n", pk1_hex);
|
||||
printf("SK2 (Bob): %s\n", sk2_hex);
|
||||
printf("PK2 (Bob): %s\n", pk2_hex);
|
||||
printf("Plaintext: 1,048,576 bytes (exactly 1MB) of pattern data\n");
|
||||
printf("Pattern: \"%s\" repeated\n", pattern);
|
||||
printf("First 64 chars: \"%.64s...\"\n", large_plaintext);
|
||||
printf("Last 64 chars: \"...%.64s\"\n", large_plaintext + payload_size - 64);
|
||||
printf("\n");
|
||||
|
||||
// Test encryption (Alice -> Bob) - Use heap allocation
|
||||
char* encrypted = malloc(NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
if (!encrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED for encrypted buffer\n");
|
||||
free(large_plaintext);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing encryption (Alice -> Bob) with 1MB payload...\n");
|
||||
printf("Expected padded size: %zu bytes (1MB + PKCS#7 padding)\n", ((payload_size / 16) + 1) * 16);
|
||||
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, large_plaintext, encrypted, NOSTR_NIP04_MAX_ENCRYPTED_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ 1MB ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
return 0;
|
||||
}
|
||||
|
||||
size_t encrypted_len = strlen(encrypted);
|
||||
printf("✅ 1MB encryption SUCCESS!\n");
|
||||
printf("Encrypted length: %zu bytes\n", encrypted_len);
|
||||
printf("First 80 chars: \"%.80s...\"\n", encrypted);
|
||||
printf("Last 80 chars: \"...%.80s\"\n", encrypted + encrypted_len - 80);
|
||||
printf("\n");
|
||||
|
||||
// Test decryption with our ciphertext
|
||||
char* decrypted = malloc(NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
if (!decrypted) {
|
||||
printf("❌ MEMORY ALLOCATION FAILED for decrypted buffer\n");
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
return 0;
|
||||
}
|
||||
printf("Testing decryption of 1MB ciphertext (Bob decrypts from Alice)...\n");
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, NOSTR_NIP04_MAX_PLAINTEXT_SIZE);
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ 1MB DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 0;
|
||||
}
|
||||
|
||||
size_t decrypted_len = strlen(decrypted);
|
||||
printf("✅ 1MB decryption SUCCESS!\n");
|
||||
printf("Decrypted length: %zu bytes\n", decrypted_len);
|
||||
|
||||
// Verify length matches
|
||||
if (decrypted_len != payload_size) {
|
||||
printf("❌ LENGTH MISMATCH: Expected %zu bytes, got %zu bytes\n", payload_size, decrypted_len);
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Verify content matches exactly
|
||||
if (memcmp(large_plaintext, decrypted, payload_size) == 0) {
|
||||
printf("✅ 1MB payload round-trip: PASS\n");
|
||||
printf("✅ Content verification: All %zu bytes match perfectly!\n", payload_size);
|
||||
} else {
|
||||
printf("❌ 1MB payload round-trip: FAIL - Content mismatch detected\n");
|
||||
|
||||
// Find first mismatch for debugging
|
||||
for (size_t i = 0; i < payload_size; i++) {
|
||||
if (large_plaintext[i] != decrypted[i]) {
|
||||
printf("First mismatch at byte %zu: expected 0x%02x, got 0x%02x\n",
|
||||
i, (unsigned char)large_plaintext[i], (unsigned char)decrypted[i]);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\n🎉 1MB STRESS TEST COMPLETED SUCCESSFULLY! 🎉\n");
|
||||
printf("Memory management: All allocations and frees successful\n");
|
||||
printf("Buffer safety: No heap corruption detected\n");
|
||||
printf("PKCS#7 padding: Correctly handled for large payload\n");
|
||||
printf("Base64 encoding: Successfully processed large ciphertext\n");
|
||||
printf("Performance: 1MB encrypt/decrypt cycle completed\n");
|
||||
printf("\n");
|
||||
|
||||
free(large_plaintext);
|
||||
free(encrypted);
|
||||
free(decrypted);
|
||||
return 1;
|
||||
}
|
||||
|
||||
int main(void) {
|
||||
printf("=== NIP-04 Encryption Test with Reference Test Vectors ===\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("ERROR: Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int all_passed = 1;
|
||||
|
||||
// Run all test vectors
|
||||
if (!test_vector_1()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
if (!test_vector_2()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
if (!test_vector_3_bidirectional()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
if (!test_vector_4_random_keys()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
if (!test_vector_5_long_message()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
if (!test_vector_6_short_message()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
if (!test_vector_7_10kb_payload()) {
|
||||
all_passed = 0;
|
||||
}
|
||||
|
||||
// Summary
|
||||
printf("=== TEST SUMMARY ===\n");
|
||||
if (all_passed) {
|
||||
printf("🎉 ALL TESTS PASSED! NIP-04 implementation is working correctly.\n");
|
||||
printf("\n");
|
||||
printf("Our library successfully:\n");
|
||||
printf("- Encrypts and decrypts small messages\n");
|
||||
printf("- Handles large payloads (800+ characters)\n");
|
||||
printf("- Supports bidirectional communication\n");
|
||||
printf("- Works with random key pairs from nostr-tools\n");
|
||||
printf("- Handles messages with Unicode emoji characters\n");
|
||||
printf("- Processes both short and long messages correctly\n");
|
||||
printf("- Is 100%% compatible with reference implementations\n");
|
||||
printf("\n");
|
||||
printf("Total test vectors: 6 (including 3 generated with nostr-tools)\n");
|
||||
} else {
|
||||
printf("❌ SOME TESTS FAILED. Please review the output above.\n");
|
||||
}
|
||||
|
||||
nostr_cleanup();
|
||||
return all_passed ? 0 : 1;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,249 @@
|
|||
/*
|
||||
* NIP-44 Debug Test - Step-by-step comparison with nostr-tools vectors
|
||||
*
|
||||
* This test prints intermediate values for comparison with nostr-tools
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <assert.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
static int hex_to_bytes(const char* hex, unsigned char* bytes, size_t len) {
|
||||
if (strlen(hex) != len * 2) return -1;
|
||||
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
if (sscanf(hex + i * 2, "%2hhx", &bytes[i]) != 1) {
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void bytes_to_hex(const unsigned char* bytes, size_t len, char* hex) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sprintf(hex + i * 2, "%02x", bytes[i]);
|
||||
}
|
||||
hex[len * 2] = '\0';
|
||||
}
|
||||
|
||||
// Test a specific vector from nostr-tools
|
||||
static int test_vector_step_by_step(const char* name,
|
||||
const char* sec1_hex,
|
||||
const char* sec2_hex,
|
||||
const char* expected_conversation_key_hex,
|
||||
const char* nonce_hex,
|
||||
const char* plaintext,
|
||||
const char* expected_payload) {
|
||||
|
||||
printf("\n🔍 Testing Vector: %s\n", name);
|
||||
printf("=====================================\n");
|
||||
|
||||
// Step 1: Parse keys
|
||||
unsigned char sec1[32], sec2[32];
|
||||
if (hex_to_bytes(sec1_hex, sec1, 32) != 0 || hex_to_bytes(sec2_hex, sec2, 32) != 0) {
|
||||
printf("❌ Failed to parse private keys\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
printf("📝 sec1: %s\n", sec1_hex);
|
||||
printf("📝 sec2: %s\n", sec2_hex);
|
||||
|
||||
// Step 2: Generate public keys
|
||||
unsigned char pub1[32], pub2[32];
|
||||
if (nostr_ec_public_key_from_private_key(sec1, pub1) != 0 ||
|
||||
nostr_ec_public_key_from_private_key(sec2, pub2) != 0) {
|
||||
printf("❌ Failed to derive public keys\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
char pub1_hex[65], pub2_hex[65];
|
||||
bytes_to_hex(pub1, 32, pub1_hex);
|
||||
bytes_to_hex(pub2, 32, pub2_hex);
|
||||
printf("📝 pub1: %s\n", pub1_hex);
|
||||
printf("📝 pub2: %s\n", pub2_hex);
|
||||
|
||||
// Step 3: Calculate ECDH shared secret (our raw implementation)
|
||||
unsigned char shared_secret[32];
|
||||
if (ecdh_shared_secret(sec1, pub2, shared_secret) != 0) {
|
||||
printf("❌ Failed to compute ECDH shared secret\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
char shared_hex[65];
|
||||
bytes_to_hex(shared_secret, 32, shared_hex);
|
||||
printf("🔗 ECDH shared secret: %s\n", shared_hex);
|
||||
|
||||
// Step 4: Calculate conversation key using HKDF-extract
|
||||
unsigned char conversation_key[32];
|
||||
const char* salt_str = "nip44-v2";
|
||||
if (nostr_hkdf_extract((const unsigned char*)salt_str, strlen(salt_str),
|
||||
shared_secret, 32, conversation_key) != 0) {
|
||||
printf("❌ Failed to derive conversation key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
char conv_key_hex[65];
|
||||
bytes_to_hex(conversation_key, 32, conv_key_hex);
|
||||
printf("🗝️ Our conversation key: %s\n", conv_key_hex);
|
||||
printf("🎯 Expected conv key: %s\n", expected_conversation_key_hex);
|
||||
|
||||
if (strcmp(conv_key_hex, expected_conversation_key_hex) == 0) {
|
||||
printf("✅ Conversation key matches!\n");
|
||||
} else {
|
||||
printf("❌ Conversation key MISMATCH!\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Step 5: Parse nonce
|
||||
unsigned char nonce[32];
|
||||
if (hex_to_bytes(nonce_hex, nonce, 32) != 0) {
|
||||
printf("❌ Failed to parse nonce\n");
|
||||
return -1;
|
||||
}
|
||||
printf("🎲 Nonce: %s\n", nonce_hex);
|
||||
|
||||
// Step 6: Derive message keys using HKDF-expand
|
||||
unsigned char message_keys[76]; // 32 chacha_key + 12 chacha_nonce + 32 hmac_key
|
||||
if (nostr_hkdf_expand(conversation_key, 32, nonce, 32, message_keys, 76) != 0) {
|
||||
printf("❌ Failed to derive message keys\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
char chacha_key_hex[65], chacha_nonce_hex[25], hmac_key_hex[65];
|
||||
bytes_to_hex(message_keys, 32, chacha_key_hex);
|
||||
bytes_to_hex(message_keys + 32, 12, chacha_nonce_hex);
|
||||
bytes_to_hex(message_keys + 44, 32, hmac_key_hex);
|
||||
|
||||
printf("🔐 ChaCha key: %s\n", chacha_key_hex);
|
||||
printf("🔐 ChaCha nonce: %s\n", chacha_nonce_hex);
|
||||
printf("🔐 HMAC key: %s\n", hmac_key_hex);
|
||||
|
||||
// Step 7: Test encryption with known nonce
|
||||
char our_payload[8192];
|
||||
int encrypt_result = nostr_nip44_encrypt_with_nonce(sec1, pub2, plaintext, nonce, our_payload, sizeof(our_payload));
|
||||
|
||||
if (encrypt_result == NOSTR_SUCCESS) {
|
||||
printf("🔒 Our payload: %s\n", our_payload);
|
||||
printf("🎯 Expected payload: %s\n", expected_payload);
|
||||
|
||||
if (strcmp(our_payload, expected_payload) == 0) {
|
||||
printf("✅ Payload matches perfectly!\n");
|
||||
} else {
|
||||
printf("❌ Payload MISMATCH!\n");
|
||||
|
||||
// Try to decrypt expected payload with our conversation key
|
||||
printf("\n🔍 Debugging: Trying to decrypt expected payload...\n");
|
||||
char decrypted[8192];
|
||||
int decrypt_result = nostr_nip44_decrypt(sec2, pub1, expected_payload, decrypted, sizeof(decrypted));
|
||||
|
||||
if (decrypt_result == NOSTR_SUCCESS) {
|
||||
printf("✅ Successfully decrypted expected payload!\n");
|
||||
printf("📝 Decrypted text: \"%s\"\n", decrypted);
|
||||
if (strcmp(decrypted, plaintext) == 0) {
|
||||
printf("✅ Decrypted text matches original!\n");
|
||||
} else {
|
||||
printf("❌ Decrypted text doesn't match original!\n");
|
||||
}
|
||||
} else {
|
||||
printf("❌ Failed to decrypt expected payload (error: %d)\n", decrypt_result);
|
||||
}
|
||||
}
|
||||
} else {
|
||||
printf("❌ Encryption failed with error: %d\n", encrypt_result);
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int main() {
|
||||
printf("🧪 NIP-44 Debug Test - Step-by-step Vector Comparison\n");
|
||||
printf("======================================================\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("❌ Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Test the simple "a" vector
|
||||
test_vector_step_by_step(
|
||||
"Single char 'a'",
|
||||
"0000000000000000000000000000000000000000000000000000000000000001",
|
||||
"0000000000000000000000000000000000000000000000000000000000000002",
|
||||
"c41c775356fd92eadc63ff5a0dc1da211b268cbea22316767095b2871ea1412d",
|
||||
"0000000000000000000000000000000000000000000000000000000000000001",
|
||||
"a",
|
||||
"AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABee0G5VSK0/9YypIObAtDKfYEAjD35uVkHyB0F4DwrcNaCXlCWZKaArsGrY6M9wnuTMxWfp1RTN9Xga8no+kF5Vsb"
|
||||
);
|
||||
|
||||
// Test the emoji vector
|
||||
test_vector_step_by_step(
|
||||
"Emoji 🍕🫃",
|
||||
"0000000000000000000000000000000000000000000000000000000000000002",
|
||||
"0000000000000000000000000000000000000000000000000000000000000001",
|
||||
"c41c775356fd92eadc63ff5a0dc1da211b268cbea22316767095b2871ea1412d",
|
||||
"f00000000000000000000000000000f00000000000000000000000000000000f",
|
||||
"🍕🫃",
|
||||
"AvAAAAAAAAAAAAAAAAAAAPAAAAAAAAAAAAAAAAAAAAAPSKSK6is9ngkX2+cSq85Th16oRTISAOfhStnixqZziKMDvB0QQzgFZdjLTPicCJaV8nDITO+QfaQ61+KbWQIOO2Yj"
|
||||
);
|
||||
|
||||
// Test with get_message_keys test vector to verify HKDF-expand
|
||||
printf("\n🔍 Testing get_message_keys vector from nostr-tools:\n");
|
||||
printf("===========================================\n");
|
||||
|
||||
unsigned char conv_key[32];
|
||||
if (hex_to_bytes("a1a3d60f3470a8612633924e91febf96dc5366ce130f658b1f0fc652c20b3b54", conv_key, 32) == 0) {
|
||||
unsigned char test_nonce[32];
|
||||
if (hex_to_bytes("e1e6f880560d6d149ed83dcc7e5861ee62a5ee051f7fde9975fe5d25d2a02d72", test_nonce, 32) == 0) {
|
||||
|
||||
unsigned char message_keys[76];
|
||||
if (nostr_hkdf_expand(conv_key, 32, test_nonce, 32, message_keys, 76) == 0) {
|
||||
|
||||
char chacha_key_hex[65], chacha_nonce_hex[25], hmac_key_hex[65];
|
||||
bytes_to_hex(message_keys, 32, chacha_key_hex);
|
||||
bytes_to_hex(message_keys + 32, 12, chacha_nonce_hex);
|
||||
bytes_to_hex(message_keys + 44, 32, hmac_key_hex);
|
||||
|
||||
printf("📝 Conv key: a1a3d60f3470a8612633924e91febf96dc5366ce130f658b1f0fc652c20b3b54\n");
|
||||
printf("📝 Nonce: e1e6f880560d6d149ed83dcc7e5861ee62a5ee051f7fde9975fe5d25d2a02d72\n");
|
||||
printf("🔐 Our ChaCha key: %s\n", chacha_key_hex);
|
||||
printf("🎯 Expected ChaCha key: f145f3bed47cb70dbeaac07f3a3fe683e822b3715edb7c4fe310829014ce7d76\n");
|
||||
printf("🔐 Our ChaCha nonce: %s\n", chacha_nonce_hex);
|
||||
printf("🎯 Expected ChaCha nonce: c4ad129bb01180c0933a160c\n");
|
||||
printf("🔐 Our HMAC key: %s\n", hmac_key_hex);
|
||||
printf("🎯 Expected HMAC key: 027c1db445f05e2eee864a0975b0ddef5b7110583c8c192de3732571ca5838c4\n");
|
||||
|
||||
if (strcmp(chacha_key_hex, "f145f3bed47cb70dbeaac07f3a3fe683e822b3715edb7c4fe310829014ce7d76") == 0) {
|
||||
printf("✅ ChaCha key matches!\n");
|
||||
} else {
|
||||
printf("❌ ChaCha key MISMATCH!\n");
|
||||
}
|
||||
|
||||
if (strcmp(chacha_nonce_hex, "c4ad129bb01180c0933a160c") == 0) {
|
||||
printf("✅ ChaCha nonce matches!\n");
|
||||
} else {
|
||||
printf("❌ ChaCha nonce MISMATCH!\n");
|
||||
}
|
||||
|
||||
if (strcmp(hmac_key_hex, "027c1db445f05e2eee864a0975b0ddef5b7110583c8c192de3732571ca5838c4") == 0) {
|
||||
printf("✅ HMAC key matches!\n");
|
||||
} else {
|
||||
printf("❌ HMAC key MISMATCH!\n");
|
||||
}
|
||||
} else {
|
||||
printf("❌ Failed to expand message keys\n");
|
||||
}
|
||||
} else {
|
||||
printf("❌ Failed to parse test nonce\n");
|
||||
}
|
||||
} else {
|
||||
printf("❌ Failed to parse conversation key\n");
|
||||
}
|
||||
|
||||
nostr_cleanup();
|
||||
printf("\n🏁 Debug test completed\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,255 @@
|
|||
/*
|
||||
* NIP-44 Detailed Debug Test - Print every single intermediate step
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <assert.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
static int hex_to_bytes(const char* hex, unsigned char* bytes, size_t len) {
|
||||
if (strlen(hex) != len * 2) return -1;
|
||||
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
if (sscanf(hex + i * 2, "%2hhx", &bytes[i]) != 1) {
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void bytes_to_hex(const unsigned char* bytes, size_t len, char* hex) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sprintf(hex + i * 2, "%02x", bytes[i]);
|
||||
}
|
||||
hex[len * 2] = '\0';
|
||||
}
|
||||
|
||||
static void print_bytes(const char* label, const unsigned char* bytes, size_t len) {
|
||||
char hex[len * 2 + 1];
|
||||
bytes_to_hex(bytes, len, hex);
|
||||
printf("%s: %s\n", label, hex);
|
||||
}
|
||||
|
||||
// Test NIP-44 padding calculation (replicate from our crypto.c)
|
||||
static size_t calc_padded_len(size_t unpadded_len) {
|
||||
if (unpadded_len <= 32) {
|
||||
return 32;
|
||||
}
|
||||
|
||||
size_t next_power = 1;
|
||||
while (next_power < unpadded_len) {
|
||||
next_power <<= 1;
|
||||
}
|
||||
|
||||
size_t chunk = (next_power <= 256) ? 32 : (next_power / 8);
|
||||
return chunk * ((unpadded_len - 1) / chunk + 1);
|
||||
}
|
||||
|
||||
// Test NIP-44 padding (replicate from our crypto.c)
|
||||
static unsigned char* pad_plaintext_debug(const char* plaintext, size_t* padded_len) {
|
||||
size_t unpadded_len = strlen(plaintext);
|
||||
if (unpadded_len > 65535) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
printf("🔍 PADDING DEBUG:\n");
|
||||
printf(" unpadded_len: %zu\n", unpadded_len);
|
||||
|
||||
*padded_len = calc_padded_len(unpadded_len + 2); // +2 for length prefix
|
||||
printf(" calculated_padded_len: %zu\n", *padded_len);
|
||||
|
||||
unsigned char* padded = malloc(*padded_len);
|
||||
if (!padded) return NULL;
|
||||
|
||||
// Write length prefix (big-endian u16)
|
||||
padded[0] = (unpadded_len >> 8) & 0xFF;
|
||||
padded[1] = unpadded_len & 0xFF;
|
||||
printf(" length_prefix: %02x%02x (big-endian u16 = %zu)\n", padded[0], padded[1], unpadded_len);
|
||||
|
||||
// Copy plaintext (if any)
|
||||
if (unpadded_len > 0) {
|
||||
memcpy(padded + 2, plaintext, unpadded_len);
|
||||
}
|
||||
|
||||
// Zero-fill padding
|
||||
memset(padded + 2 + unpadded_len, 0, *padded_len - 2 - unpadded_len);
|
||||
|
||||
print_bytes(" padded_plaintext", padded, *padded_len);
|
||||
|
||||
return padded;
|
||||
}
|
||||
|
||||
int main() {
|
||||
printf("🧪 NIP-44 DETAILED DEBUG TEST\n");
|
||||
printf("===============================\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("❌ Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("=== TESTING: Single char 'a' ===\n");
|
||||
|
||||
// Step 1: Parse private keys
|
||||
unsigned char sec1[32], sec2[32];
|
||||
hex_to_bytes("0000000000000000000000000000000000000000000000000000000000000001", sec1, 32);
|
||||
hex_to_bytes("0000000000000000000000000000000000000000000000000000000000000002", sec2, 32);
|
||||
|
||||
print_bytes("sec1", sec1, 32);
|
||||
print_bytes("sec2", sec2, 32);
|
||||
|
||||
// Step 2: Generate public keys
|
||||
unsigned char pub1[32], pub2[32];
|
||||
nostr_ec_public_key_from_private_key(sec1, pub1);
|
||||
nostr_ec_public_key_from_private_key(sec2, pub2);
|
||||
|
||||
print_bytes("pub1", pub1, 32);
|
||||
print_bytes("pub2", pub2, 32);
|
||||
|
||||
// Step 3: ECDH shared secret
|
||||
unsigned char shared_secret[32];
|
||||
ecdh_shared_secret(sec1, pub2, shared_secret);
|
||||
print_bytes("ecdh_shared_secret", shared_secret, 32);
|
||||
|
||||
// Step 4: HKDF Extract (conversation key)
|
||||
unsigned char conversation_key[32];
|
||||
const char* salt_str = "nip44-v2";
|
||||
nostr_hkdf_extract((const unsigned char*)salt_str, strlen(salt_str), shared_secret, 32, conversation_key);
|
||||
print_bytes("conversation_key", conversation_key, 32);
|
||||
|
||||
// Step 5: Parse nonce
|
||||
unsigned char nonce[32];
|
||||
hex_to_bytes("0000000000000000000000000000000000000000000000000000000000000001", nonce, 32);
|
||||
print_bytes("nonce", nonce, 32);
|
||||
|
||||
// Step 6: HKDF Expand (message keys)
|
||||
unsigned char message_keys[76];
|
||||
nostr_hkdf_expand(conversation_key, 32, nonce, 32, message_keys, 76);
|
||||
|
||||
print_bytes("chacha_key", message_keys, 32);
|
||||
print_bytes("chacha_nonce", message_keys + 32, 12);
|
||||
print_bytes("hmac_key", message_keys + 44, 32);
|
||||
|
||||
// Step 7: Pad plaintext
|
||||
const char* plaintext = "a";
|
||||
printf("\n🔍 PLAINTEXT: \"%s\" (length: %zu)\n", plaintext, strlen(plaintext));
|
||||
|
||||
size_t padded_len;
|
||||
unsigned char* padded_plaintext = pad_plaintext_debug(plaintext, &padded_len);
|
||||
if (!padded_plaintext) {
|
||||
printf("❌ Failed to pad plaintext\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Step 8: ChaCha20 encrypt
|
||||
printf("\n🔍 CHACHA20 ENCRYPTION:\n");
|
||||
unsigned char* ciphertext = malloc(padded_len);
|
||||
if (!ciphertext) {
|
||||
printf("❌ Failed to allocate ciphertext buffer\n");
|
||||
free(padded_plaintext);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use our ChaCha20 function
|
||||
if (chacha20_encrypt(message_keys, 0, message_keys + 32, padded_plaintext, ciphertext, padded_len) != 0) {
|
||||
printf("❌ ChaCha20 encryption failed\n");
|
||||
free(padded_plaintext);
|
||||
free(ciphertext);
|
||||
return 1;
|
||||
}
|
||||
|
||||
print_bytes(" ciphertext", ciphertext, padded_len);
|
||||
|
||||
// Step 9: HMAC with AAD
|
||||
printf("\n🔍 HMAC CALCULATION:\n");
|
||||
unsigned char* aad_data = malloc(32 + padded_len);
|
||||
if (!aad_data) {
|
||||
printf("❌ Failed to allocate AAD buffer\n");
|
||||
free(padded_plaintext);
|
||||
free(ciphertext);
|
||||
return 1;
|
||||
}
|
||||
|
||||
memcpy(aad_data, nonce, 32);
|
||||
memcpy(aad_data + 32, ciphertext, padded_len);
|
||||
print_bytes(" aad_data", aad_data, 32 + padded_len);
|
||||
|
||||
unsigned char mac[32];
|
||||
nostr_hmac_sha256(message_keys + 44, 32, aad_data, 32 + padded_len, mac);
|
||||
print_bytes(" mac", mac, 32);
|
||||
|
||||
// Step 10: Construct final payload
|
||||
printf("\n🔍 PAYLOAD CONSTRUCTION:\n");
|
||||
size_t payload_len = 1 + 32 + padded_len + 32;
|
||||
unsigned char* payload = malloc(payload_len);
|
||||
if (!payload) {
|
||||
printf("❌ Failed to allocate payload buffer\n");
|
||||
free(padded_plaintext);
|
||||
free(ciphertext);
|
||||
free(aad_data);
|
||||
return 1;
|
||||
}
|
||||
|
||||
payload[0] = 0x02; // NIP-44 version 2
|
||||
memcpy(payload + 1, nonce, 32);
|
||||
memcpy(payload + 33, ciphertext, padded_len);
|
||||
memcpy(payload + 33 + padded_len, mac, 32);
|
||||
|
||||
printf(" version: 0x%02x\n", payload[0]);
|
||||
print_bytes(" payload_nonce", payload + 1, 32);
|
||||
print_bytes(" payload_ciphertext", payload + 33, padded_len);
|
||||
print_bytes(" payload_mac", payload + 33 + padded_len, 32);
|
||||
print_bytes(" raw_payload", payload, payload_len);
|
||||
|
||||
// Step 11: Base64 encode
|
||||
printf("\n🔍 BASE64 ENCODING:\n");
|
||||
size_t b64_len = ((payload_len + 2) / 3) * 4 + 1;
|
||||
char* base64_output = malloc(b64_len);
|
||||
if (!base64_output) {
|
||||
printf("❌ Failed to allocate base64 buffer\n");
|
||||
free(padded_plaintext);
|
||||
free(ciphertext);
|
||||
free(aad_data);
|
||||
free(payload);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use our internal base64_encode function from crypto.c
|
||||
extern size_t base64_encode(const unsigned char* data, size_t len, char* output, size_t output_size);
|
||||
size_t actual_b64_len = base64_encode(payload, payload_len, base64_output, b64_len);
|
||||
|
||||
printf(" payload_length: %zu\n", payload_len);
|
||||
printf(" base64_length: %zu\n", actual_b64_len);
|
||||
printf(" our_base64: %s\n", base64_output);
|
||||
printf(" expected: AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABee0G5VSK0/9YypIObAtDKfYEAjD35uVkHyB0F4DwrcNaCXlCWZKaArsGrY6M9wnuTMxWfp1RTN9Xga8no+kF5Vsb\n");
|
||||
|
||||
if (strcmp(base64_output, "AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABee0G5VSK0/9YypIObAtDKfYEAjD35uVkHyB0F4DwrcNaCXlCWZKaArsGrY6M9wnuTMxWfp1RTN9Xga8no+kF5Vsb") == 0) {
|
||||
printf("✅ PERFECT MATCH!\n");
|
||||
} else {
|
||||
printf("❌ MISMATCH - need to investigate!\n");
|
||||
|
||||
// Let's also try our full encrypt function for comparison
|
||||
printf("\n🔍 FULL ENCRYPT FUNCTION TEST:\n");
|
||||
char full_encrypt_output[8192];
|
||||
int result = nostr_nip44_encrypt_with_nonce(sec1, pub2, plaintext, nonce, full_encrypt_output, sizeof(full_encrypt_output));
|
||||
if (result == NOSTR_SUCCESS) {
|
||||
printf(" full_encrypt: %s\n", full_encrypt_output);
|
||||
} else {
|
||||
printf(" full_encrypt failed with error: %d\n", result);
|
||||
}
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
free(padded_plaintext);
|
||||
free(ciphertext);
|
||||
free(aad_data);
|
||||
free(payload);
|
||||
free(base64_output);
|
||||
|
||||
nostr_cleanup();
|
||||
printf("\n🏁 Detailed debug test completed\n");
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,393 @@
|
|||
/*
|
||||
* NIP-44 Encryption/Decryption Test
|
||||
*
|
||||
* Test suite for NIP-44 versioned encryption functionality
|
||||
* Uses known test vectors and cross-implementation compatibility tests
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <assert.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
// Test vectors for NIP-44 with proper key pairs
|
||||
typedef struct {
|
||||
const char* name;
|
||||
const char* sender_private_key_hex;
|
||||
const char* recipient_private_key_hex; // FIX: Need proper private key, not public key
|
||||
const char* plaintext;
|
||||
const char* expected_encrypted; // Optional - for known test vectors
|
||||
} nip44_test_vector_t;
|
||||
|
||||
// Known test vectors from nostr-tools nip44.vectors.json
|
||||
static nip44_test_vector_t known_test_vectors[] = {
|
||||
{
|
||||
"Known vector: single char 'a'",
|
||||
"0000000000000000000000000000000000000000000000000000000000000001", // sec1
|
||||
"0000000000000000000000000000000000000000000000000000000000000002", // sec2
|
||||
"a",
|
||||
"AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABee0G5VSK0/9YypIObAtDKfYEAjD35uVkHyB0F4DwrcNaCXlCWZKaArsGrY6M9wnuTMxWfp1RTN9Xga8no+kF5Vsb"
|
||||
},
|
||||
{
|
||||
"Known vector: emoji",
|
||||
"0000000000000000000000000000000000000000000000000000000000000002", // sec1
|
||||
"0000000000000000000000000000000000000000000000000000000000000001", // sec2
|
||||
"🍕🫃",
|
||||
"AvAAAAAAAAAAAAAAAAAAAPAAAAAAAAAAAAAAAAAAAAAPSKSK6is9ngkX2+cSq85Th16oRTISAOfhStnixqZziKMDvB0QQzgFZdjLTPicCJaV8nDITO+QfaQ61+KbWQIOO2Yj"
|
||||
},
|
||||
{
|
||||
"Known vector: wide unicode",
|
||||
"5c0c523f52a5b6fad39ed2403092df8cebc36318b39383bca6c00808626fab3a", // sec1
|
||||
"4b22aa260e4acb7021e32f38a6cdf4b673c6a277755bfce287e370c924dc936d", // sec2
|
||||
"表ポあA鷗ŒéB逍Üߪąñ丂㐀𠀀",
|
||||
"ArY1I2xC2yDwIbuNHN/1ynXdGgzHLqdCrXUPMwELJPc7s7JqlCMJBAIIjfkpHReBPXeoMCyuClwgbT419jUWU1PwaNl4FEQYKCDKVJz+97Mp3K+Q2YGa77B6gpxB/lr1QgoqpDf7wDVrDmOqGoiPjWDqy8KzLueKDcm9BVP8xeTJIxs="
|
||||
}
|
||||
};
|
||||
|
||||
// Round-trip test vectors with proper key pairs
|
||||
static nip44_test_vector_t test_vectors[] = {
|
||||
{
|
||||
"Basic short message",
|
||||
"91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe", // Working keys from simple_nip44_test
|
||||
"96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220",
|
||||
"Hello, NIP-44!",
|
||||
NULL
|
||||
},
|
||||
{
|
||||
"Unicode message",
|
||||
"1111111111111111111111111111111111111111111111111111111111111111",
|
||||
"2222222222222222222222222222222222222222222222222222222222222222",
|
||||
"Hello 🌍 World! 🚀",
|
||||
NULL
|
||||
},
|
||||
{
|
||||
"Empty message",
|
||||
"3333333333333333333333333333333333333333333333333333333333333333",
|
||||
"4444444444444444444444444444444444444444444444444444444444444444",
|
||||
"",
|
||||
NULL
|
||||
}
|
||||
};
|
||||
|
||||
static int hex_to_bytes(const char* hex, unsigned char* bytes, size_t len) {
|
||||
if (strlen(hex) != len * 2) return -1;
|
||||
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
if (sscanf(hex + i * 2, "%2hhx", &bytes[i]) != 1) {
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void bytes_to_hex(const unsigned char* bytes, size_t len, char* hex) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sprintf(hex + i * 2, "%02x", bytes[i]);
|
||||
}
|
||||
hex[len * 2] = '\0';
|
||||
}
|
||||
|
||||
static int test_nip44_round_trip(const nip44_test_vector_t* tv) {
|
||||
printf("Testing: %s\n", tv->name);
|
||||
|
||||
// Parse keys - both private keys
|
||||
unsigned char sender_private_key[32];
|
||||
unsigned char recipient_private_key[32];
|
||||
|
||||
if (hex_to_bytes(tv->sender_private_key_hex, sender_private_key, 32) != 0) {
|
||||
printf(" ❌ Failed to parse sender private key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (hex_to_bytes(tv->recipient_private_key_hex, recipient_private_key, 32) != 0) {
|
||||
printf(" ❌ Failed to parse recipient private key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Generate the public keys from the private keys
|
||||
unsigned char sender_public_key[32];
|
||||
unsigned char recipient_public_key[32];
|
||||
|
||||
if (nostr_ec_public_key_from_private_key(sender_private_key, sender_public_key) != 0) {
|
||||
printf(" ❌ Failed to derive sender public key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (nostr_ec_public_key_from_private_key(recipient_private_key, recipient_public_key) != 0) {
|
||||
printf(" ❌ Failed to derive recipient public key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test encryption
|
||||
char encrypted[8192]; // Large buffer for encrypted data
|
||||
int encrypt_result = nostr_nip44_encrypt(
|
||||
sender_private_key,
|
||||
recipient_public_key,
|
||||
tv->plaintext,
|
||||
encrypted,
|
||||
sizeof(encrypted)
|
||||
);
|
||||
|
||||
if (encrypt_result != NOSTR_SUCCESS) {
|
||||
printf(" ❌ Encryption failed with error: %d\n", encrypt_result);
|
||||
return -1;
|
||||
}
|
||||
|
||||
printf(" ✅ Encryption successful\n");
|
||||
printf(" 📦 Encrypted length: %zu bytes\n", strlen(encrypted));
|
||||
|
||||
// Test decryption - use recipient private key + sender public key
|
||||
char decrypted[8192]; // Large buffer for decrypted data
|
||||
int decrypt_result = nostr_nip44_decrypt(
|
||||
recipient_private_key,
|
||||
sender_public_key,
|
||||
encrypted,
|
||||
decrypted,
|
||||
sizeof(decrypted)
|
||||
);
|
||||
|
||||
if (decrypt_result != NOSTR_SUCCESS) {
|
||||
printf(" ❌ Decryption failed with error: %d\n", decrypt_result);
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Verify round-trip
|
||||
if (strcmp(tv->plaintext, decrypted) != 0) {
|
||||
printf(" ❌ Round-trip failed!\n");
|
||||
printf(" 📝 Original: \"%s\"\n", tv->plaintext);
|
||||
printf(" 📝 Decrypted: \"%s\"\n", decrypted);
|
||||
return -1;
|
||||
}
|
||||
|
||||
printf(" ✅ Round-trip successful!\n");
|
||||
printf(" 📝 Message: \"%s\"\n", tv->plaintext);
|
||||
printf("\n");
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int test_nip44_error_conditions() {
|
||||
printf("Testing NIP-44 error conditions:\n");
|
||||
|
||||
// Use proper valid secp256k1 private keys
|
||||
unsigned char valid_sender_key[32];
|
||||
unsigned char valid_recipient_key[32];
|
||||
unsigned char valid_recipient_pubkey[32];
|
||||
|
||||
hex_to_bytes("0000000000000000000000000000000000000000000000000000000000000001", valid_sender_key, 32);
|
||||
hex_to_bytes("0000000000000000000000000000000000000000000000000000000000000002", valid_recipient_key, 32);
|
||||
|
||||
// Generate the recipient's public key
|
||||
if (nostr_ec_public_key_from_private_key(valid_recipient_key, valid_recipient_pubkey) != 0) {
|
||||
printf(" ❌ Failed to generate recipient public key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
char output[1024];
|
||||
|
||||
// Test NULL parameters
|
||||
int result = nostr_nip44_encrypt(NULL, valid_recipient_pubkey, "test", output, sizeof(output));
|
||||
if (result != NOSTR_ERROR_INVALID_INPUT) {
|
||||
printf(" ❌ Should reject NULL sender key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
result = nostr_nip44_encrypt(valid_sender_key, NULL, "test", output, sizeof(output));
|
||||
if (result != NOSTR_ERROR_INVALID_INPUT) {
|
||||
printf(" ❌ Should reject NULL recipient key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
result = nostr_nip44_encrypt(valid_sender_key, valid_recipient_pubkey, NULL, output, sizeof(output));
|
||||
if (result != NOSTR_ERROR_INVALID_INPUT) {
|
||||
printf(" ❌ Should reject NULL plaintext\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
result = nostr_nip44_encrypt(valid_sender_key, valid_recipient_pubkey, "test", NULL, sizeof(output));
|
||||
if (result != NOSTR_ERROR_INVALID_INPUT) {
|
||||
printf(" ❌ Should reject NULL output buffer\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test buffer too small
|
||||
char small_buffer[10];
|
||||
result = nostr_nip44_encrypt(valid_sender_key, valid_recipient_pubkey, "test message", small_buffer, sizeof(small_buffer));
|
||||
if (result != NOSTR_ERROR_NIP44_BUFFER_TOO_SMALL) {
|
||||
printf(" ❌ Should detect buffer too small, got error: %d\n", result);
|
||||
return -1;
|
||||
}
|
||||
|
||||
printf(" ✅ All error conditions handled correctly\n\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int test_nip44_known_vector(const nip44_test_vector_t* tv) {
|
||||
printf("Testing known vector: %s\n", tv->name);
|
||||
|
||||
// Parse keys
|
||||
unsigned char sender_private_key[32];
|
||||
unsigned char recipient_private_key[32];
|
||||
|
||||
if (hex_to_bytes(tv->sender_private_key_hex, sender_private_key, 32) != 0) {
|
||||
printf(" ❌ Failed to parse sender private key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (hex_to_bytes(tv->recipient_private_key_hex, recipient_private_key, 32) != 0) {
|
||||
printf(" ❌ Failed to parse recipient private key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Generate the public keys from the private keys
|
||||
unsigned char sender_public_key[32];
|
||||
|
||||
if (nostr_ec_public_key_from_private_key(sender_private_key, sender_public_key) != 0) {
|
||||
printf(" ❌ Failed to derive sender public key\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test decryption of known vector
|
||||
char decrypted[8192];
|
||||
int decrypt_result = nostr_nip44_decrypt(
|
||||
recipient_private_key,
|
||||
sender_public_key,
|
||||
tv->expected_encrypted,
|
||||
decrypted,
|
||||
sizeof(decrypted)
|
||||
);
|
||||
|
||||
if (decrypt_result != NOSTR_SUCCESS) {
|
||||
printf(" ❌ Decryption of known vector failed with error: %d\n", decrypt_result);
|
||||
printf(" 📦 Expected payload: %.80s...\n", tv->expected_encrypted);
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Verify decrypted plaintext matches expected
|
||||
if (strcmp(tv->plaintext, decrypted) != 0) {
|
||||
printf(" ❌ Decrypted plaintext doesn't match!\n");
|
||||
printf(" 📝 Expected: \"%s\"\n", tv->plaintext);
|
||||
printf(" 📝 Got: \"%s\"\n", decrypted);
|
||||
return -1;
|
||||
}
|
||||
|
||||
printf(" ✅ Known vector decryption successful!\n");
|
||||
printf(" 📝 Message: \"%s\"\n", tv->plaintext);
|
||||
printf("\n");
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int test_nip44_vs_nip04_comparison() {
|
||||
printf("Testing NIP-44 vs NIP-04 comparison:\n");
|
||||
|
||||
const char* test_message = "This is a test message for comparing NIP-04 and NIP-44 encryption methods.";
|
||||
|
||||
unsigned char sender_key[32], recipient_key[32];
|
||||
memset(sender_key, 0x11, 32);
|
||||
memset(recipient_key, 0x22, 32);
|
||||
|
||||
// Generate proper public keys
|
||||
unsigned char sender_pubkey[32], recipient_pubkey[32];
|
||||
if (nostr_ec_public_key_from_private_key(sender_key, sender_pubkey) != 0 ||
|
||||
nostr_ec_public_key_from_private_key(recipient_key, recipient_pubkey) != 0) {
|
||||
printf(" ❌ Failed to generate public keys\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Test NIP-04 encryption
|
||||
char nip04_encrypted[8192];
|
||||
int nip04_result = nostr_nip04_encrypt(sender_key, recipient_pubkey,
|
||||
test_message, nip04_encrypted, sizeof(nip04_encrypted));
|
||||
|
||||
// Test NIP-44 encryption
|
||||
char nip44_encrypted[8192];
|
||||
int nip44_result = nostr_nip44_encrypt(sender_key, recipient_pubkey,
|
||||
test_message, nip44_encrypted, sizeof(nip44_encrypted));
|
||||
|
||||
if (nip04_result == NOSTR_SUCCESS && nip44_result == NOSTR_SUCCESS) {
|
||||
printf(" ✅ Both NIP-04 and NIP-44 encryption successful\n");
|
||||
printf(" 📊 NIP-04 output length: %zu bytes\n", strlen(nip04_encrypted));
|
||||
printf(" 📊 NIP-44 output length: %zu bytes\n", strlen(nip44_encrypted));
|
||||
printf(" 📊 Size difference: %+ld bytes\n",
|
||||
(long)strlen(nip44_encrypted) - (long)strlen(nip04_encrypted));
|
||||
|
||||
// Verify they produce different outputs (they use different algorithms)
|
||||
if (strcmp(nip04_encrypted, nip44_encrypted) == 0) {
|
||||
printf(" ⚠️ Warning: NIP-04 and NIP-44 produced identical output (unexpected)\n");
|
||||
} else {
|
||||
printf(" ✅ NIP-04 and NIP-44 produce different outputs (expected)\n");
|
||||
}
|
||||
} else {
|
||||
if (nip04_result != NOSTR_SUCCESS) {
|
||||
printf(" ❌ NIP-04 encryption failed: %d\n", nip04_result);
|
||||
}
|
||||
if (nip44_result != NOSTR_SUCCESS) {
|
||||
printf(" ❌ NIP-44 encryption failed: %d\n", nip44_result);
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
int main() {
|
||||
printf("🧪 NIP-44 Encryption Test Suite\n");
|
||||
printf("================================\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("❌ Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int total_tests = 0;
|
||||
int passed_tests = 0;
|
||||
|
||||
// Test all vectors
|
||||
size_t num_vectors = sizeof(test_vectors) / sizeof(test_vectors[0]);
|
||||
for (size_t i = 0; i < num_vectors; i++) {
|
||||
total_tests++;
|
||||
if (test_nip44_round_trip(&test_vectors[i]) == 0) {
|
||||
passed_tests++;
|
||||
}
|
||||
}
|
||||
|
||||
// Test known vectors
|
||||
size_t num_known_vectors = sizeof(known_test_vectors) / sizeof(known_test_vectors[0]);
|
||||
for (size_t i = 0; i < num_known_vectors; i++) {
|
||||
total_tests++;
|
||||
if (test_nip44_known_vector(&known_test_vectors[i]) == 0) {
|
||||
passed_tests++;
|
||||
}
|
||||
}
|
||||
|
||||
// Test error conditions
|
||||
total_tests++;
|
||||
if (test_nip44_error_conditions() == 0) {
|
||||
passed_tests++;
|
||||
}
|
||||
|
||||
// Test comparison with NIP-04
|
||||
total_tests++;
|
||||
if (test_nip44_vs_nip04_comparison() == 0) {
|
||||
passed_tests++;
|
||||
}
|
||||
|
||||
// Final results
|
||||
printf("🏁 Test Results:\n");
|
||||
printf("================\n");
|
||||
printf("Tests passed: %d/%d\n", passed_tests, total_tests);
|
||||
|
||||
if (passed_tests == total_tests) {
|
||||
printf("✅ All NIP-44 tests PASSED! 🎉\n");
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
} else {
|
||||
printf("❌ Some tests FAILED! 😞\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,467 @@
|
|||
/*
|
||||
* NOSTR Crypto Test Suite
|
||||
* Tests all cryptographic primitives and BIP implementations
|
||||
* with known good test vectors
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <assert.h>
|
||||
#include "../nostr_core/nostr_crypto.h"
|
||||
|
||||
// Helper function to convert hex string to bytes
|
||||
static void hex_to_bytes(const char* hex, unsigned char* bytes, size_t len) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sscanf(hex + i * 2, "%02hhx", &bytes[i]);
|
||||
}
|
||||
}
|
||||
|
||||
// Helper function to compare byte arrays and print results
|
||||
static int test_bytes_equal(const char* test_name,
|
||||
const unsigned char* result,
|
||||
const unsigned char* expected,
|
||||
size_t len) {
|
||||
if (memcmp(result, expected, len) == 0) {
|
||||
printf("✓ %s: PASSED\n", test_name);
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ %s: FAILED\n", test_name);
|
||||
printf(" Expected: ");
|
||||
for (size_t i = 0; i < len; i++) printf("%02x", expected[i]);
|
||||
printf("\n Got: ");
|
||||
for (size_t i = 0; i < len; i++) printf("%02x", result[i]);
|
||||
printf("\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// SHA-256 TESTS
|
||||
// =============================================================================
|
||||
|
||||
static int test_sha256_empty_string() {
|
||||
unsigned char result[32];
|
||||
unsigned char expected[32];
|
||||
|
||||
// Empty string SHA-256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
|
||||
hex_to_bytes("e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", expected, 32);
|
||||
|
||||
nostr_sha256((const unsigned char*)"", 0, result);
|
||||
|
||||
return test_bytes_equal("SHA-256 empty string", result, expected, 32);
|
||||
}
|
||||
|
||||
static int test_sha256_abc() {
|
||||
unsigned char result[32];
|
||||
unsigned char expected[32];
|
||||
|
||||
// "abc" SHA-256: ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad
|
||||
hex_to_bytes("ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad", expected, 32);
|
||||
|
||||
nostr_sha256((const unsigned char*)"abc", 3, result);
|
||||
|
||||
return test_bytes_equal("SHA-256 'abc'", result, expected, 32);
|
||||
}
|
||||
|
||||
static int test_sha256_hello_world() {
|
||||
unsigned char result[32];
|
||||
unsigned char expected[32];
|
||||
|
||||
// "hello world" SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
|
||||
hex_to_bytes("b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9", expected, 32);
|
||||
|
||||
nostr_sha256((const unsigned char*)"hello world", 11, result);
|
||||
|
||||
return test_bytes_equal("SHA-256 'hello world'", result, expected, 32);
|
||||
}
|
||||
|
||||
static int test_sha256_long_string() {
|
||||
unsigned char result[32];
|
||||
unsigned char expected[32];
|
||||
|
||||
// "The quick brown fox jumps over the lazy dog" SHA-256: d7a8fbb307d7809469ca9abcb0082e4f8d5651e46d3cdb762d02d0bf37c9e592
|
||||
hex_to_bytes("d7a8fbb307d7809469ca9abcb0082e4f8d5651e46d3cdb762d02d0bf37c9e592", expected, 32);
|
||||
|
||||
const char* msg = "The quick brown fox jumps over the lazy dog";
|
||||
nostr_sha256((const unsigned char*)msg, strlen(msg), result);
|
||||
|
||||
return test_bytes_equal("SHA-256 long string", result, expected, 32);
|
||||
}
|
||||
|
||||
static int test_sha256_vectors() {
|
||||
printf("\n=== SHA-256 Tests ===\n");
|
||||
int passed = 0;
|
||||
|
||||
passed += test_sha256_empty_string();
|
||||
passed += test_sha256_abc();
|
||||
passed += test_sha256_hello_world();
|
||||
passed += test_sha256_long_string();
|
||||
|
||||
printf("SHA-256: %d/4 tests passed\n", passed);
|
||||
return (passed == 4) ? 1 : 0;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// HMAC-SHA256 TESTS
|
||||
// =============================================================================
|
||||
|
||||
static int test_hmac_rfc4231_test1() {
|
||||
unsigned char result[32];
|
||||
unsigned char expected[32];
|
||||
|
||||
// RFC 4231 Test Case 1
|
||||
// Key = 0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b (20 bytes)
|
||||
// Data = "Hi There"
|
||||
// HMAC-SHA256 = b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7
|
||||
|
||||
unsigned char key[20];
|
||||
memset(key, 0x0b, 20);
|
||||
|
||||
hex_to_bytes("b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7", expected, 32);
|
||||
|
||||
nostr_hmac_sha256(key, 20, (const unsigned char*)"Hi There", 8, result);
|
||||
|
||||
return test_bytes_equal("HMAC-SHA256 RFC4231 Test 1", result, expected, 32);
|
||||
}
|
||||
|
||||
static int test_hmac_rfc4231_test2() {
|
||||
unsigned char result[32];
|
||||
unsigned char expected[32];
|
||||
|
||||
// RFC 4231 Test Case 2
|
||||
// Key = "Jefe"
|
||||
// Data = "what do ya want for nothing?"
|
||||
// HMAC-SHA256 = 5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843
|
||||
|
||||
hex_to_bytes("5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843", expected, 32);
|
||||
|
||||
const char* data = "what do ya want for nothing?";
|
||||
nostr_hmac_sha256((const unsigned char*)"Jefe", 4, (const unsigned char*)data, strlen(data), result);
|
||||
|
||||
return test_bytes_equal("HMAC-SHA256 RFC4231 Test 2", result, expected, 32);
|
||||
}
|
||||
|
||||
static int test_hmac_vectors() {
|
||||
printf("\n=== HMAC-SHA256 Tests ===\n");
|
||||
int passed = 0;
|
||||
|
||||
passed += test_hmac_rfc4231_test1();
|
||||
passed += test_hmac_rfc4231_test2();
|
||||
|
||||
printf("HMAC-SHA256: %d/2 tests passed\n", passed);
|
||||
return (passed == 2) ? 1 : 0;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// PBKDF2 TESTS
|
||||
// =============================================================================
|
||||
|
||||
static int test_pbkdf2_rfc6070_test1() {
|
||||
unsigned char result[20];
|
||||
unsigned char expected[20];
|
||||
|
||||
// RFC 6070 Test Case 1
|
||||
// P = "password", S = "salt", c = 1, dkLen = 20
|
||||
// DK = 0c60c80f961f0e71f3a9b524af6012062fe037a6
|
||||
|
||||
hex_to_bytes("0c60c80f961f0e71f3a9b524af6012062fe037a6", expected, 20);
|
||||
|
||||
nostr_pbkdf2_hmac_sha512((const unsigned char*)"password", 8,
|
||||
(const unsigned char*)"salt", 4,
|
||||
1, result, 20);
|
||||
|
||||
return test_bytes_equal("PBKDF2 RFC6070 Test 1", result, expected, 20);
|
||||
}
|
||||
|
||||
static int test_pbkdf2_bip39_example() {
|
||||
unsigned char result[64];
|
||||
|
||||
// Test BIP39 seed generation with empty passphrase
|
||||
// This should not crash and should produce 64 bytes
|
||||
const char* mnemonic = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about";
|
||||
|
||||
int ret = nostr_pbkdf2_hmac_sha512((const unsigned char*)mnemonic, strlen(mnemonic),
|
||||
(const unsigned char*)"mnemonic", 8,
|
||||
2048, result, 64);
|
||||
|
||||
if (ret == 0) {
|
||||
printf("✓ PBKDF2 BIP39 seed generation: PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ PBKDF2 BIP39 seed generation: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_pbkdf2_vectors() {
|
||||
printf("\n=== PBKDF2 Tests ===\n");
|
||||
int passed = 0;
|
||||
|
||||
// Note: RFC 6070 test may not match exactly due to PBKDF2-SHA512 vs PBKDF2-SHA1
|
||||
// but we test that it doesn't crash and produces reasonable output
|
||||
passed += test_pbkdf2_bip39_example();
|
||||
|
||||
printf("PBKDF2: %d/1 tests passed\n", passed);
|
||||
return (passed == 1) ? 1 : 0;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// BIP39 TESTS
|
||||
// =============================================================================
|
||||
|
||||
static int test_bip39_entropy_to_mnemonic() {
|
||||
// Test with known entropy
|
||||
unsigned char entropy[16] = {
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
||||
};
|
||||
|
||||
char mnemonic[256];
|
||||
|
||||
int ret = nostr_bip39_mnemonic_from_bytes(entropy, 16, mnemonic, sizeof(mnemonic));
|
||||
|
||||
// Should generate a valid 12-word mnemonic from zero entropy
|
||||
if (ret == 0 && strlen(mnemonic) > 0) {
|
||||
printf("✓ BIP39 entropy to mnemonic: PASSED (%s)\n", mnemonic);
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ BIP39 entropy to mnemonic: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_bip39_mnemonic_validation() {
|
||||
// Test valid mnemonic
|
||||
const char* valid_mnemonic = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about";
|
||||
|
||||
if (nostr_bip39_mnemonic_validate(valid_mnemonic) == 0) {
|
||||
printf("✓ BIP39 mnemonic validation (valid): PASSED\n");
|
||||
} else {
|
||||
printf("❌ BIP39 mnemonic validation (valid): FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test invalid mnemonic
|
||||
const char* invalid_mnemonic = "invalid words that are not in wordlist";
|
||||
|
||||
if (nostr_bip39_mnemonic_validate(invalid_mnemonic) != 0) {
|
||||
printf("✓ BIP39 mnemonic validation (invalid): PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ BIP39 mnemonic validation (invalid): FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_bip39_mnemonic_to_seed() {
|
||||
const char* mnemonic = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about";
|
||||
unsigned char seed[64];
|
||||
|
||||
int ret = nostr_bip39_mnemonic_to_seed(mnemonic, "", seed, sizeof(seed));
|
||||
|
||||
if (ret == 0) {
|
||||
printf("✓ BIP39 mnemonic to seed: PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ BIP39 mnemonic to seed: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_bip39_vectors() {
|
||||
printf("\n=== BIP39 Tests ===\n");
|
||||
int passed = 0;
|
||||
|
||||
passed += test_bip39_entropy_to_mnemonic();
|
||||
passed += test_bip39_mnemonic_validation();
|
||||
passed += test_bip39_mnemonic_to_seed();
|
||||
|
||||
printf("BIP39: %d/3 tests passed\n", passed);
|
||||
return (passed == 3) ? 1 : 0;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// BIP32 TESTS
|
||||
// =============================================================================
|
||||
|
||||
static int test_bip32_seed_to_master_key() {
|
||||
// Test seed to master key derivation
|
||||
unsigned char seed[64];
|
||||
memset(seed, 0x01, 64); // Simple test seed
|
||||
|
||||
nostr_hd_key_t master_key;
|
||||
|
||||
int ret = nostr_bip32_key_from_seed(seed, 64, &master_key);
|
||||
|
||||
if (ret == 0) {
|
||||
printf("✓ BIP32 seed to master key: PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ BIP32 seed to master key: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_bip32_key_derivation() {
|
||||
// Test key derivation path
|
||||
unsigned char seed[64];
|
||||
memset(seed, 0x01, 64);
|
||||
|
||||
nostr_hd_key_t master_key;
|
||||
if (nostr_bip32_key_from_seed(seed, 64, &master_key) != 0) {
|
||||
printf("❌ BIP32 key derivation setup: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test NIP-06 derivation path: m/44'/1237'/0'/0/0
|
||||
nostr_hd_key_t derived_key;
|
||||
uint32_t path[] = {
|
||||
0x80000000 + 44, // 44' (hardened)
|
||||
0x80000000 + 1237, // 1237' (hardened)
|
||||
0x80000000 + 0, // 0' (hardened)
|
||||
0, // 0 (not hardened)
|
||||
0 // 0 (not hardened)
|
||||
};
|
||||
|
||||
int ret = nostr_bip32_derive_path(&master_key, path, 5, &derived_key);
|
||||
|
||||
if (ret == 0) {
|
||||
printf("✓ BIP32 NIP-06 key derivation: PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ BIP32 NIP-06 key derivation: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_bip32_vectors() {
|
||||
printf("\n=== BIP32 Tests ===\n");
|
||||
int passed = 0;
|
||||
|
||||
passed += test_bip32_seed_to_master_key();
|
||||
passed += test_bip32_key_derivation();
|
||||
|
||||
printf("BIP32: %d/2 tests passed\n", passed);
|
||||
return (passed == 2) ? 1 : 0;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// SECP256K1 TESTS
|
||||
// =============================================================================
|
||||
|
||||
static int test_secp256k1_private_key_validation() {
|
||||
// Test valid private key
|
||||
unsigned char valid_key[32];
|
||||
memset(valid_key, 0x01, 32); // Simple valid key
|
||||
|
||||
if (nostr_ec_private_key_verify(valid_key) == 0) {
|
||||
printf("✓ secp256k1 private key validation (valid): PASSED\n");
|
||||
} else {
|
||||
printf("❌ secp256k1 private key validation (valid): FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Test invalid private key (all zeros)
|
||||
unsigned char invalid_key[32];
|
||||
memset(invalid_key, 0x00, 32);
|
||||
|
||||
if (nostr_ec_private_key_verify(invalid_key) != 0) {
|
||||
printf("✓ secp256k1 private key validation (invalid): PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ secp256k1 private key validation (invalid): FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_secp256k1_public_key_generation() {
|
||||
unsigned char private_key[32];
|
||||
unsigned char public_key[32];
|
||||
|
||||
// Use a known private key
|
||||
memset(private_key, 0x01, 32);
|
||||
|
||||
int ret = nostr_ec_public_key_from_private_key(private_key, public_key);
|
||||
|
||||
if (ret == 0) {
|
||||
printf("✓ secp256k1 public key generation: PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ secp256k1 public key generation: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_secp256k1_sign_verify() {
|
||||
unsigned char private_key[32];
|
||||
unsigned char message[32];
|
||||
unsigned char signature[64];
|
||||
|
||||
// Simple test data
|
||||
memset(private_key, 0x01, 32);
|
||||
memset(message, 0x02, 32);
|
||||
|
||||
// Test signing
|
||||
int ret = nostr_ec_sign(private_key, message, signature);
|
||||
|
||||
if (ret == 0) {
|
||||
printf("✓ secp256k1 signing: PASSED\n");
|
||||
return 1;
|
||||
} else {
|
||||
printf("❌ secp256k1 signing: FAILED\n");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int test_secp256k1_vectors() {
|
||||
printf("\n=== secp256k1 Tests ===\n");
|
||||
int passed = 0;
|
||||
|
||||
passed += test_secp256k1_private_key_validation();
|
||||
passed += test_secp256k1_public_key_generation();
|
||||
passed += test_secp256k1_sign_verify();
|
||||
|
||||
printf("secp256k1: %d/3 tests passed\n", passed);
|
||||
return (passed == 3) ? 1 : 0;
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// MAIN TEST RUNNER
|
||||
// =============================================================================
|
||||
|
||||
int main() {
|
||||
printf("NOSTR Crypto Library Test Suite\n");
|
||||
printf("==============================\n");
|
||||
|
||||
// Initialize crypto
|
||||
if (nostr_crypto_init() != 0) {
|
||||
printf("❌ Failed to initialize crypto library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int passed = 0, total = 0;
|
||||
|
||||
// Run all test suites
|
||||
if (test_sha256_vectors()) passed++; total++;
|
||||
if (test_hmac_vectors()) passed++; total++;
|
||||
if (test_pbkdf2_vectors()) passed++; total++;
|
||||
if (test_bip39_vectors()) passed++; total++;
|
||||
if (test_bip32_vectors()) passed++; total++;
|
||||
if (test_secp256k1_vectors()) passed++; total++;
|
||||
|
||||
// Print final results
|
||||
printf("\n==============================\n");
|
||||
printf("FINAL RESULTS: %d/%d test suites passed\n", passed, total);
|
||||
|
||||
if (passed == total) {
|
||||
printf("🎉 ALL TESTS PASSED! Crypto implementation is working correctly.\n");
|
||||
} else {
|
||||
printf("❌ Some tests failed. Please review the implementation.\n");
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_crypto_cleanup();
|
||||
|
||||
return (passed == total) ? 0 : 1;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,434 @@
|
|||
/*
|
||||
* NOSTR Event Generation Test Suite
|
||||
* Tests complete workflow from mnemonic to signed event using specific test vectors
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <assert.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
// Test vector structure
|
||||
typedef struct {
|
||||
const char* mnemonic;
|
||||
const char* expected_nsec_hex;
|
||||
const char* expected_nsec;
|
||||
const char* expected_npub_hex;
|
||||
const char* expected_npub;
|
||||
const char* name;
|
||||
} test_vector_t;
|
||||
|
||||
// Test vectors to validate against
|
||||
static const test_vector_t TEST_VECTORS[] = {
|
||||
{
|
||||
.name = "Vector 1",
|
||||
.mnemonic = "fetch risk mention yellow cluster hunt voyage acquire leader caution romance solid",
|
||||
.expected_nsec_hex = "b46173ac0cc222f73246d6be63f5c0bd90d92b118f99f582cd11d077490d0794",
|
||||
.expected_nsec = "nsec1k3sh8tqvcg30wvjx66lx8awqhkgdj2c337vltqkdz8g8wjgdq72q3mrze9",
|
||||
.expected_npub_hex = "a11258677dd416ca4c9e352e0e02ad2d8784a18c3a963604d0c63dc7b74eec66",
|
||||
.expected_npub = "npub15yf9sema6stv5ny7x5hquq4d9krcfgvv82trvpxscc7u0d6wa3nqmvcv3a"
|
||||
},
|
||||
{
|
||||
.name = "Vector 2",
|
||||
.mnemonic = "leader monkey parrot ring guide accident before fence cannon height naive bean",
|
||||
.expected_nsec_hex = "7f7ff03d123792d6ac594bfa67bf6d0c0ab55b6b1fdb6249303fe861f1ccba9a",
|
||||
.expected_nsec = "nsec10allq0gjx7fddtzef0ax00mdps9t2kmtrldkyjfs8l5xruwvh2dq0lhhkp",
|
||||
.expected_npub_hex = "17162c921dc4d2518f9a101db33695df1afb56ab82f5ff3e5da6eec3ca5cd917",
|
||||
.expected_npub = "npub1zutzeysacnf9rru6zqwmxd54mud0k44tst6l70ja5mhv8jjumytsd2x7nu"
|
||||
},
|
||||
{
|
||||
.name = "Vector 3",
|
||||
.mnemonic = "what bleak badge arrange retreat wolf trade produce cricket blur garlic valid proud rude strong choose busy staff weather area salt hollow arm fade",
|
||||
.expected_nsec_hex = "c15d739894c81a2fcfd3a2df85a0d2c0dbc47a280d092799f144d73d7ae78add",
|
||||
.expected_nsec = "nsec1c9wh8xy5eqdzln7n5t0ctgxjcrdug73gp5yj0x03gntn67h83twssdfhel",
|
||||
.expected_npub_hex = "d41b22899549e1f3d335a31002cfd382174006e166d3e658e3a5eecdb6463573",
|
||||
.expected_npub = "npub16sdj9zv4f8sl85e45vgq9n7nsgt5qphpvmf7vk8r5hhvmdjxx4es8rq74h"
|
||||
}
|
||||
};
|
||||
|
||||
static const size_t NUM_TEST_VECTORS = sizeof(TEST_VECTORS) / sizeof(TEST_VECTORS[0]);
|
||||
|
||||
// Constants for event generation test
|
||||
static const uint32_t TEST_CREATED_AT = 1698623783;
|
||||
static const char* TEST_CONTENT = "Hello";
|
||||
|
||||
// Expected events for each test vector
|
||||
typedef struct {
|
||||
const char* expected_event_id;
|
||||
const char* expected_signature;
|
||||
const char* expected_json;
|
||||
} expected_event_t;
|
||||
|
||||
static const expected_event_t EXPECTED_EVENTS[] = {
|
||||
{
|
||||
// Vector 1 expected event
|
||||
.expected_event_id = "c790e29519cc43ad87a4e061c36b4740cf1085e2c9eabb6971ea97f3859eb008",
|
||||
.expected_signature = "9acb3e409a8b329316bd4184ad74a50db7764a4370ad863f97fb37858d87c380c9299a7adef19dfd29481f51eb81e28ebba2a6d2bbcc4085a1b07ca8339e8d0c",
|
||||
.expected_json = "{\n"
|
||||
"\t\"pubkey\":\t\"a11258677dd416ca4c9e352e0e02ad2d8784a18c3a963604d0c63dc7b74eec66\",\n"
|
||||
"\t\"created_at\":\t1698623783,\n"
|
||||
"\t\"kind\":\t1,\n"
|
||||
"\t\"tags\":\t[],\n"
|
||||
"\t\"content\":\t\"Hello\",\n"
|
||||
"\t\"id\":\t\"c790e29519cc43ad87a4e061c36b4740cf1085e2c9eabb6971ea97f3859eb008\",\n"
|
||||
"\t\"sig\":\t\"9acb3e409a8b329316bd4184ad74a50db7764a4370ad863f97fb37858d87c380c9299a7adef19dfd29481f51eb81e28ebba2a6d2bbcc4085a1b07ca8339e8d0c\"\n"
|
||||
"}"
|
||||
},
|
||||
{
|
||||
// Vector 2 expected event
|
||||
.expected_event_id = "e28fda46caa56eb6f62c7871409e6c76cd43a47fca14878b91e49d8ee8e52c27",
|
||||
.expected_signature = "7a7ce178e18b1065a9642985a3fb815ed52772c34fc6e67515de012558968f6428509b9cf93cf6faf17db387b833196a5be48ed1154c1c2dffb1c30293318e3d",
|
||||
.expected_json = "{\n"
|
||||
"\t\"pubkey\":\t\"17162c921dc4d2518f9a101db33695df1afb56ab82f5ff3e5da6eec3ca5cd917\",\n"
|
||||
"\t\"created_at\":\t1698623783,\n"
|
||||
"\t\"kind\":\t1,\n"
|
||||
"\t\"tags\":\t[],\n"
|
||||
"\t\"content\":\t\"Hello\",\n"
|
||||
"\t\"id\":\t\"e28fda46caa56eb6f62c7871409e6c76cd43a47fca14878b91e49d8ee8e52c27\",\n"
|
||||
"\t\"sig\":\t\"7a7ce178e18b1065a9642985a3fb815ed52772c34fc6e67515de012558968f6428509b9cf93cf6faf17db387b833196a5be48ed1154c1c2dffb1c30293318e3d\"\n"
|
||||
"}"
|
||||
},
|
||||
{
|
||||
// Vector 3 expected event
|
||||
.expected_event_id = "ad349fdb162ea874d8b685e682b9dcc84b5bd72c4efac51e295db39b7623cde0",
|
||||
.expected_signature = "11e2280cca6f2e0f638fbf60f8aa744a4c228ba19f4d787a51298ec23be4a226e5046477cf6444a804c81aa08dd287e9647f0b45f8a02700da4a387187d4b3dc",
|
||||
.expected_json = "{\n"
|
||||
"\t\"pubkey\":\t\"d41b22899549e1f3d335a31002cfd382174006e166d3e658e3a5eecdb6463573\",\n"
|
||||
"\t\"created_at\":\t1698623783,\n"
|
||||
"\t\"kind\":\t1,\n"
|
||||
"\t\"tags\":\t[],\n"
|
||||
"\t\"content\":\t\"Hello\",\n"
|
||||
"\t\"id\":\t\"ad349fdb162ea874d8b685e682b9dcc84b5bd72c4efac51e295db39b7623cde0\",\n"
|
||||
"\t\"sig\":\t\"11e2280cca6f2e0f638fbf60f8aa744a4c228ba19f4d787a51298ec23be4a226e5046477cf6444a804c81aa08dd287e9647f0b45f8a02700da4a387187d4b3dc\"\n"
|
||||
"}"
|
||||
}
|
||||
};
|
||||
|
||||
// Helper functions
|
||||
static void print_test_result(const char* test_name, int passed, const char* expected, const char* actual) {
|
||||
if (passed) {
|
||||
printf("✓ %s: PASSED\n", test_name);
|
||||
} else {
|
||||
printf("❌ %s: FAILED\n", test_name);
|
||||
printf(" Expected: %s\n", expected);
|
||||
printf(" Actual: %s\n", actual);
|
||||
}
|
||||
}
|
||||
|
||||
static void bytes_to_hex_lowercase(const unsigned char* bytes, size_t len, char* hex_out) {
|
||||
for (size_t i = 0; i < len; i++) {
|
||||
sprintf(hex_out + i * 2, "%02x", bytes[i]);
|
||||
}
|
||||
hex_out[len * 2] = '\0';
|
||||
}
|
||||
|
||||
// Test single vector for mnemonic to keys
|
||||
static int test_single_vector_mnemonic_to_keys(const test_vector_t* vector, unsigned char* private_key_out, unsigned char* public_key_out) {
|
||||
printf("\n=== Testing %s: Mnemonic to Keys ===\n", vector->name);
|
||||
printf("Input mnemonic: %s\n", vector->mnemonic);
|
||||
printf("Input account: 0\n");
|
||||
|
||||
unsigned char private_key[32];
|
||||
unsigned char public_key[32];
|
||||
|
||||
// Derive keys from mnemonic using account 0
|
||||
printf("Calling nostr_derive_keys_from_mnemonic()...\n");
|
||||
int ret = nostr_derive_keys_from_mnemonic(vector->mnemonic, 0, private_key, public_key);
|
||||
printf("Function returned: %d\n", ret);
|
||||
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("❌ Key derivation failed with code: %d\n", ret);
|
||||
printf("Expected: Success (0)\n");
|
||||
printf("Actual: Error (%d)\n", ret);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Convert private key to hex (lowercase)
|
||||
char nsec_hex[65];
|
||||
bytes_to_hex_lowercase(private_key, 32, nsec_hex);
|
||||
|
||||
// Convert public key to hex (lowercase)
|
||||
char npub_hex[65];
|
||||
bytes_to_hex_lowercase(public_key, 32, npub_hex);
|
||||
|
||||
// Test nsecHex
|
||||
printf("\nPrivate Key (nsecHex):\n");
|
||||
printf("Expected: %s\n", vector->expected_nsec_hex);
|
||||
printf("Actual: %s\n", nsec_hex);
|
||||
int nsec_hex_match = (strcmp(nsec_hex, vector->expected_nsec_hex) == 0);
|
||||
printf("Result: %s\n", nsec_hex_match ? "✓ PASS" : "❌ FAIL");
|
||||
|
||||
// Test npubHex
|
||||
printf("\nPublic Key (npubHex):\n");
|
||||
printf("Expected: %s\n", vector->expected_npub_hex);
|
||||
printf("Actual: %s\n", npub_hex);
|
||||
int npub_hex_match = (strcmp(npub_hex, vector->expected_npub_hex) == 0);
|
||||
printf("Result: %s\n", npub_hex_match ? "✓ PASS" : "❌ FAIL");
|
||||
|
||||
// Copy keys for use in other tests
|
||||
if (private_key_out) memcpy(private_key_out, private_key, 32);
|
||||
if (public_key_out) memcpy(public_key_out, public_key, 32);
|
||||
|
||||
return nsec_hex_match && npub_hex_match;
|
||||
}
|
||||
|
||||
// Test single vector for nsec encoding
|
||||
static int test_single_vector_nsec_encoding(const test_vector_t* vector, const unsigned char* private_key) {
|
||||
printf("\n=== Testing %s: nsec Encoding ===\n", vector->name);
|
||||
|
||||
// Show input private key in hex
|
||||
char private_key_hex[65];
|
||||
bytes_to_hex_lowercase(private_key, 32, private_key_hex);
|
||||
printf("Input private key (hex): %s\n", private_key_hex);
|
||||
|
||||
char nsec[100];
|
||||
printf("Calling nostr_key_to_bech32() with hrp='nsec'...\n");
|
||||
int ret = nostr_key_to_bech32(private_key, "nsec", nsec);
|
||||
printf("Function returned: %d\n", ret);
|
||||
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("❌ nsec encoding failed with code: %d\n", ret);
|
||||
printf("Expected: Success (0)\n");
|
||||
printf("Actual: Error (%d)\n", ret);
|
||||
return 0;
|
||||
}
|
||||
|
||||
printf("\nnsec Encoding:\n");
|
||||
printf("Expected: %s\n", vector->expected_nsec);
|
||||
printf("Actual: %s\n", nsec);
|
||||
int nsec_match = (strcmp(nsec, vector->expected_nsec) == 0);
|
||||
printf("Result: %s\n", nsec_match ? "✓ PASS" : "❌ FAIL");
|
||||
|
||||
return nsec_match;
|
||||
}
|
||||
|
||||
// Test single vector for npub encoding
|
||||
static int test_single_vector_npub_encoding(const test_vector_t* vector, const unsigned char* public_key) {
|
||||
printf("\n=== Testing %s: npub Encoding ===\n", vector->name);
|
||||
|
||||
char npub[100];
|
||||
int ret = nostr_key_to_bech32(public_key, "npub", npub);
|
||||
|
||||
if (ret != NOSTR_SUCCESS) {
|
||||
printf("❌ npub encoding failed with code: %d\n", ret);
|
||||
return 0;
|
||||
}
|
||||
|
||||
int npub_match = (strcmp(npub, vector->expected_npub) == 0);
|
||||
print_test_result("npub encoding", npub_match, vector->expected_npub, npub);
|
||||
|
||||
return npub_match;
|
||||
}
|
||||
|
||||
// Test single vector for event generation
|
||||
static int test_single_vector_event_generation(const test_vector_t* vector, const unsigned char* private_key, size_t vector_index) {
|
||||
printf("\n=== Testing %s: Signed Event Generation ===\n", vector->name);
|
||||
|
||||
// Create and sign event with fixed timestamp
|
||||
cJSON* event = nostr_create_and_sign_event(1, TEST_CONTENT, NULL, 0, private_key, TEST_CREATED_AT);
|
||||
|
||||
if (!event) {
|
||||
printf("❌ Event creation failed\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Extract event fields
|
||||
cJSON* id_item = cJSON_GetObjectItem(event, "id");
|
||||
cJSON* pubkey_item = cJSON_GetObjectItem(event, "pubkey");
|
||||
cJSON* created_at_item = cJSON_GetObjectItem(event, "created_at");
|
||||
cJSON* kind_item = cJSON_GetObjectItem(event, "kind");
|
||||
cJSON* content_item = cJSON_GetObjectItem(event, "content");
|
||||
cJSON* sig_item = cJSON_GetObjectItem(event, "sig");
|
||||
cJSON* tags_item = cJSON_GetObjectItem(event, "tags");
|
||||
|
||||
if (!id_item || !pubkey_item || !created_at_item || !kind_item ||
|
||||
!content_item || !sig_item || !tags_item) {
|
||||
printf("❌ Event missing required fields\n");
|
||||
cJSON_Delete(event);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Validate field types
|
||||
if (!cJSON_IsString(id_item) || !cJSON_IsString(pubkey_item) ||
|
||||
!cJSON_IsNumber(created_at_item) || !cJSON_IsNumber(kind_item) ||
|
||||
!cJSON_IsString(content_item) || !cJSON_IsString(sig_item) ||
|
||||
!cJSON_IsArray(tags_item)) {
|
||||
printf("❌ Event fields have wrong types\n");
|
||||
cJSON_Delete(event);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Extract values
|
||||
const char* event_id = cJSON_GetStringValue(id_item);
|
||||
const char* pubkey = cJSON_GetStringValue(pubkey_item);
|
||||
uint32_t created_at = (uint32_t)cJSON_GetNumberValue(created_at_item);
|
||||
int kind = (int)cJSON_GetNumberValue(kind_item);
|
||||
const char* content = cJSON_GetStringValue(content_item);
|
||||
const char* signature = cJSON_GetStringValue(sig_item);
|
||||
|
||||
// Test each field
|
||||
int tests_passed = 0;
|
||||
int total_tests = 7;
|
||||
|
||||
// Test kind
|
||||
if (kind == 1) {
|
||||
printf("✓ Event kind: PASSED (1)\n");
|
||||
tests_passed++;
|
||||
} else {
|
||||
printf("❌ Event kind: FAILED (expected 1, got %d)\n", kind);
|
||||
}
|
||||
|
||||
// Test pubkey - only check for first vector since we have expected values for that one
|
||||
if (strcmp(vector->name, "Vector 1") == 0) {
|
||||
int pubkey_match = (strcmp(pubkey, vector->expected_npub_hex) == 0);
|
||||
print_test_result("Event pubkey", pubkey_match, vector->expected_npub_hex, pubkey);
|
||||
if (pubkey_match) tests_passed++;
|
||||
} else {
|
||||
// For other vectors, just check that pubkey matches the expected public key
|
||||
int pubkey_match = (strcmp(pubkey, vector->expected_npub_hex) == 0);
|
||||
print_test_result("Event pubkey", pubkey_match, vector->expected_npub_hex, pubkey);
|
||||
if (pubkey_match) tests_passed++;
|
||||
}
|
||||
|
||||
// Test created_at
|
||||
if (created_at == TEST_CREATED_AT) {
|
||||
printf("✓ Event created_at: PASSED (%u)\n", created_at);
|
||||
tests_passed++;
|
||||
} else {
|
||||
printf("❌ Event created_at: FAILED (expected %u, got %u)\n", TEST_CREATED_AT, created_at);
|
||||
}
|
||||
|
||||
// Test content
|
||||
int content_match = (strcmp(content, TEST_CONTENT) == 0);
|
||||
print_test_result("Event content", content_match, TEST_CONTENT, content);
|
||||
if (content_match) tests_passed++;
|
||||
|
||||
// Test tags (should be empty array)
|
||||
int tags_empty = (cJSON_GetArraySize(tags_item) == 0);
|
||||
if (tags_empty) {
|
||||
printf("✓ Event tags: PASSED (empty array)\n");
|
||||
tests_passed++;
|
||||
} else {
|
||||
printf("❌ Event tags: FAILED (expected empty array, got %d items)\n",
|
||||
cJSON_GetArraySize(tags_item));
|
||||
}
|
||||
|
||||
// Get expected event for this vector
|
||||
const expected_event_t* expected = &EXPECTED_EVENTS[vector_index];
|
||||
|
||||
// Test event ID and signature
|
||||
int id_match = (strcmp(event_id, expected->expected_event_id) == 0);
|
||||
print_test_result("Event ID", id_match, expected->expected_event_id, event_id);
|
||||
if (id_match) tests_passed++;
|
||||
|
||||
int sig_match = (strcmp(signature, expected->expected_signature) == 0);
|
||||
print_test_result("Event signature", sig_match, expected->expected_signature, signature);
|
||||
if (sig_match) tests_passed++;
|
||||
|
||||
// Print expected vs generated event JSONs side by side
|
||||
printf("\n=== EXPECTED EVENT JSON ===\n");
|
||||
printf("%s\n", expected->expected_json);
|
||||
|
||||
printf("\n=== GENERATED EVENT JSON ===\n");
|
||||
char* event_json = cJSON_Print(event);
|
||||
if (event_json) {
|
||||
printf("%s\n", event_json);
|
||||
free(event_json);
|
||||
}
|
||||
|
||||
cJSON_Delete(event);
|
||||
|
||||
printf("\nEvent generation: %d/%d tests passed\n", tests_passed, total_tests);
|
||||
return (tests_passed == total_tests);
|
||||
}
|
||||
|
||||
// Test all vectors
|
||||
static int test_all_vectors() {
|
||||
printf("\n=== Testing All Vectors ===\n");
|
||||
|
||||
int total_vectors_passed = 0;
|
||||
|
||||
for (size_t i = 0; i < NUM_TEST_VECTORS; i++) {
|
||||
const test_vector_t* vector = &TEST_VECTORS[i];
|
||||
printf("\n" "==========================================\n");
|
||||
printf("Testing %s\n", vector->name);
|
||||
printf("==========================================\n");
|
||||
|
||||
unsigned char private_key[32];
|
||||
unsigned char public_key[32];
|
||||
|
||||
// Step 1: Test mnemonic to keys
|
||||
int keys_passed = test_single_vector_mnemonic_to_keys(vector, private_key, public_key);
|
||||
|
||||
// Step 2: Test nsec encoding
|
||||
int nsec_passed = test_single_vector_nsec_encoding(vector, private_key);
|
||||
|
||||
// Step 3: Test npub encoding
|
||||
int npub_passed = test_single_vector_npub_encoding(vector, public_key);
|
||||
|
||||
// Step 4: Test event generation (only if keys work)
|
||||
int event_passed = 0;
|
||||
if (keys_passed) {
|
||||
event_passed = test_single_vector_event_generation(vector, private_key, i);
|
||||
}
|
||||
|
||||
// Summary for this vector
|
||||
printf("\n%s Summary:\n", vector->name);
|
||||
printf(" Keys: %s\n", keys_passed ? "✓ PASS" : "❌ FAIL");
|
||||
printf(" nsec: %s\n", nsec_passed ? "✓ PASS" : "❌ FAIL");
|
||||
printf(" npub: %s\n", npub_passed ? "✓ PASS" : "❌ FAIL");
|
||||
printf(" Event: %s\n", event_passed ? "✓ PASS" : "❌ FAIL");
|
||||
|
||||
if (keys_passed && nsec_passed && npub_passed && event_passed) {
|
||||
printf(" Overall: ✓ PASS\n");
|
||||
total_vectors_passed++;
|
||||
} else {
|
||||
printf(" Overall: ❌ FAIL\n");
|
||||
}
|
||||
}
|
||||
|
||||
printf("\n" "==========================================\n");
|
||||
printf("FINAL RESULTS: %d/%zu vectors passed\n", total_vectors_passed, NUM_TEST_VECTORS);
|
||||
printf("==========================================\n");
|
||||
|
||||
return (total_vectors_passed == (int)NUM_TEST_VECTORS);
|
||||
}
|
||||
|
||||
int main() {
|
||||
printf("NOSTR Event Generation Test Suite\n");
|
||||
printf("=================================\n");
|
||||
printf("Testing against multiple test vectors for ecosystem compatibility\n");
|
||||
|
||||
// Initialize NOSTR library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("❌ Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Run all vector tests
|
||||
int success = test_all_vectors();
|
||||
|
||||
// Print final results
|
||||
printf("\n=================================\n");
|
||||
if (success) {
|
||||
printf("🎉 ALL TEST VECTORS PASSED!\n");
|
||||
printf("✅ Your NOSTR implementation produces the exact same results as all test vectors\n");
|
||||
printf("✅ This confirms compatibility with other NOSTR tools\n");
|
||||
} else {
|
||||
printf("❌ SOME TEST VECTORS FAILED\n");
|
||||
printf("❌ Your implementation produces different results than expected\n");
|
||||
printf("❌ This indicates compatibility issues with other NOSTR tools\n");
|
||||
|
||||
printf("\nFor debugging purposes, review the detailed output above to see:\n");
|
||||
printf(" - Which vectors passed/failed\n");
|
||||
printf(" - Expected vs actual values for each test\n");
|
||||
printf(" - Whether the issue is in key derivation, encoding, or event generation\n");
|
||||
}
|
||||
|
||||
// Cleanup
|
||||
nostr_cleanup();
|
||||
|
||||
return success ? 0 : 1;
|
||||
}
|
|
@ -0,0 +1,318 @@
|
|||
/*
|
||||
* NOSTR Relay Pool Test Program (READ-ONLY)
|
||||
*
|
||||
* Tests the relay pool event processing functionality by:
|
||||
* - Creating a pool with hardcoded relays
|
||||
* - Subscribing to kind 1 events (text notes) from other users
|
||||
* - Using the new event processing functions
|
||||
* - Displaying raw data output without interpretation
|
||||
*
|
||||
* IMPORTANT: This test is READ-ONLY and never publishes events.
|
||||
* It only sends REQ (subscription) messages and receives EVENT responses.
|
||||
* Any test events seen in output are from other users or previous test runs.
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <signal.h>
|
||||
#include <time.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
// Global variables for clean shutdown
|
||||
static volatile int keep_running = 1;
|
||||
static nostr_relay_pool_t* g_pool = NULL;
|
||||
static nostr_pool_subscription_t* g_subscription = NULL;
|
||||
|
||||
// Statistics tracking
|
||||
static int events_received = 0;
|
||||
static int events_per_relay[3] = {0, 0, 0}; // Track events per relay
|
||||
static const char* relay_urls[] = {
|
||||
"wss://relay.laantungir.net",
|
||||
"ws://127.0.0.1:7777",
|
||||
"wss://nostr.mom"
|
||||
};
|
||||
static const int relay_count = 3;
|
||||
|
||||
// Signal handler for clean shutdown
|
||||
void signal_handler(int sig) {
|
||||
(void)sig; // Unused parameter
|
||||
printf("\n🛑 Received shutdown signal, cleaning up...\n");
|
||||
keep_running = 0;
|
||||
}
|
||||
|
||||
// Event callback - called when events are received
|
||||
void on_event_received(cJSON* event, const char* relay_url, void* user_data) {
|
||||
(void)user_data; // Unused parameter
|
||||
|
||||
events_received++;
|
||||
|
||||
// Track events per relay
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
if (strcmp(relay_url, relay_urls[i]) == 0) {
|
||||
events_per_relay[i]++;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
// Print raw event data
|
||||
char* event_json = cJSON_Print(event);
|
||||
if (event_json) {
|
||||
printf("\n📨 EVENT from %s:\n", relay_url);
|
||||
printf("Raw JSON: %s\n", event_json);
|
||||
printf("---\n");
|
||||
free(event_json);
|
||||
}
|
||||
|
||||
// Also extract and display key fields for readability
|
||||
cJSON* id = cJSON_GetObjectItem(event, "id");
|
||||
cJSON* pubkey = cJSON_GetObjectItem(event, "pubkey");
|
||||
cJSON* created_at = cJSON_GetObjectItem(event, "created_at");
|
||||
cJSON* content = cJSON_GetObjectItem(event, "content");
|
||||
|
||||
printf("📄 Parsed fields:\n");
|
||||
if (id && cJSON_IsString(id)) {
|
||||
printf(" ID: %s\n", cJSON_GetStringValue(id));
|
||||
}
|
||||
if (pubkey && cJSON_IsString(pubkey)) {
|
||||
printf(" Author: %s\n", cJSON_GetStringValue(pubkey));
|
||||
}
|
||||
if (created_at && cJSON_IsNumber(created_at)) {
|
||||
time_t timestamp = (time_t)cJSON_GetNumberValue(created_at);
|
||||
printf(" Created: %s", ctime(×tamp));
|
||||
}
|
||||
if (content && cJSON_IsString(content)) {
|
||||
const char* text = cJSON_GetStringValue(content);
|
||||
printf(" Content: %.100s%s\n", text, strlen(text) > 100 ? "..." : "");
|
||||
}
|
||||
printf("===============================\n");
|
||||
}
|
||||
|
||||
// EOSE callback - called when all relays have sent "End of Stored Events"
|
||||
void on_eose_received(void* user_data) {
|
||||
(void)user_data; // Unused parameter
|
||||
printf("✅ EOSE: All relays have finished sending stored events\n");
|
||||
}
|
||||
|
||||
// Display relay status
|
||||
void display_relay_status() {
|
||||
char** urls;
|
||||
nostr_pool_relay_status_t* statuses;
|
||||
|
||||
int count = nostr_relay_pool_list_relays(g_pool, &urls, &statuses);
|
||||
if (count > 0) {
|
||||
printf("\n🔗 RELAY STATUS:\n");
|
||||
for (int i = 0; i < count; i++) {
|
||||
const char* status_icon;
|
||||
const char* status_text;
|
||||
|
||||
switch (statuses[i]) {
|
||||
case NOSTR_POOL_RELAY_CONNECTED:
|
||||
status_icon = "🟢";
|
||||
status_text = "Connected";
|
||||
break;
|
||||
case NOSTR_POOL_RELAY_CONNECTING:
|
||||
status_icon = "🟡";
|
||||
status_text = "Connecting...";
|
||||
break;
|
||||
case NOSTR_POOL_RELAY_DISCONNECTED:
|
||||
status_icon = "🔴";
|
||||
status_text = "Disconnected";
|
||||
break;
|
||||
case NOSTR_POOL_RELAY_ERROR:
|
||||
status_icon = "❌";
|
||||
status_text = "Error";
|
||||
break;
|
||||
default:
|
||||
status_icon = "❓";
|
||||
status_text = "Unknown";
|
||||
break;
|
||||
}
|
||||
|
||||
// Get publish and query latency statistics
|
||||
double query_latency = nostr_relay_pool_get_relay_query_latency(g_pool, urls[i]);
|
||||
const nostr_relay_stats_t* stats = nostr_relay_pool_get_relay_stats(g_pool, urls[i]);
|
||||
|
||||
// Get events count from relay statistics (more accurate)
|
||||
int relay_events = 0;
|
||||
if (stats) {
|
||||
relay_events = stats->events_received;
|
||||
} else {
|
||||
// Fallback to local counter
|
||||
for (int j = 0; j < relay_count; j++) {
|
||||
if (strcmp(urls[i], relay_urls[j]) == 0) {
|
||||
relay_events = events_per_relay[j];
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Display status with latency information
|
||||
if (query_latency >= 0.0) {
|
||||
printf(" %s %-25s %s (query: %.0fms, events: %d)\n",
|
||||
status_icon, urls[i], status_text, query_latency, relay_events);
|
||||
} else {
|
||||
printf(" %s %-25s %s (query: ---, events: %d)\n",
|
||||
status_icon, urls[i], status_text, relay_events);
|
||||
}
|
||||
|
||||
// Show additional latency statistics if available
|
||||
if (stats) {
|
||||
if (stats->publish_samples > 0) {
|
||||
printf(" 📊 Publish latency: avg=%.0fms (%d samples)\n",
|
||||
stats->publish_latency_avg, stats->publish_samples);
|
||||
}
|
||||
if (stats->query_samples > 0) {
|
||||
printf(" 📊 Query latency: avg=%.0fms (%d samples)\n",
|
||||
stats->query_latency_avg, stats->query_samples);
|
||||
}
|
||||
if (stats->events_published > 0) {
|
||||
printf(" 📤 Published: %d events (%d OK, %d failed)\n",
|
||||
stats->events_published, stats->events_published_ok,
|
||||
stats->events_published_failed);
|
||||
}
|
||||
}
|
||||
|
||||
free(urls[i]);
|
||||
}
|
||||
free(urls);
|
||||
free(statuses);
|
||||
|
||||
printf("📊 Total events received: %d\n", events_received);
|
||||
}
|
||||
}
|
||||
|
||||
int main() {
|
||||
printf("🚀 NOSTR Relay Pool Test Program\n");
|
||||
printf("=================================\n");
|
||||
printf("Testing relays:\n");
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
printf(" - %s\n", relay_urls[i]);
|
||||
}
|
||||
printf("\n");
|
||||
|
||||
// Set up signal handler for clean shutdown
|
||||
signal(SIGINT, signal_handler);
|
||||
signal(SIGTERM, signal_handler);
|
||||
|
||||
// Initialize NOSTR core library
|
||||
printf("🔧 Initializing NOSTR core library...\n");
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "❌ Failed to initialize NOSTR core library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Create relay pool
|
||||
printf("🏊 Creating relay pool...\n");
|
||||
g_pool = nostr_relay_pool_create();
|
||||
if (!g_pool) {
|
||||
fprintf(stderr, "❌ Failed to create relay pool\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Add relays to pool
|
||||
printf("➕ Adding relays to pool...\n");
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
printf(" Adding: %s\n", relay_urls[i]);
|
||||
int result = nostr_relay_pool_add_relay(g_pool, relay_urls[i]);
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf(" ⚠️ Warning: Failed to add relay %s (error: %s)\n",
|
||||
relay_urls[i], nostr_strerror(result));
|
||||
}
|
||||
}
|
||||
|
||||
// Create filter for kind 1 events (text notes)
|
||||
printf("🔍 Creating subscription filter for kind 1 events...\n");
|
||||
cJSON* filter = cJSON_CreateObject();
|
||||
if (!filter) {
|
||||
fprintf(stderr, "❌ Failed to create filter\n");
|
||||
nostr_relay_pool_destroy(g_pool);
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Add kinds array with kind 1 (text notes)
|
||||
cJSON* kinds = cJSON_CreateArray();
|
||||
cJSON_AddItemToArray(kinds, cJSON_CreateNumber(1));
|
||||
cJSON_AddItemToObject(filter, "kinds", kinds);
|
||||
|
||||
// Limit to recent events to avoid flooding
|
||||
cJSON_AddNumberToObject(filter, "limit", 1);
|
||||
|
||||
// Subscribe to events from all relays
|
||||
printf("📡 Subscribing to events from all relays...\n");
|
||||
g_subscription = nostr_relay_pool_subscribe(
|
||||
g_pool,
|
||||
relay_urls,
|
||||
relay_count,
|
||||
filter,
|
||||
on_event_received,
|
||||
on_eose_received,
|
||||
NULL
|
||||
);
|
||||
|
||||
if (!g_subscription) {
|
||||
fprintf(stderr, "❌ Failed to create subscription\n");
|
||||
cJSON_Delete(filter);
|
||||
nostr_relay_pool_destroy(g_pool);
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✅ Subscription created successfully!\n");
|
||||
printf("⏱️ Starting event processing...\n");
|
||||
printf(" (Press Ctrl+C to stop)\n\n");
|
||||
|
||||
// Display initial status
|
||||
display_relay_status();
|
||||
|
||||
printf("<EFBFBD> Starting continuous monitoring...\n\n");
|
||||
|
||||
// Run event processing loop
|
||||
time_t last_status_update = time(NULL);
|
||||
|
||||
while (keep_running) {
|
||||
// Process events for 1 second
|
||||
int events_processed = nostr_relay_pool_run(g_pool, 1000);
|
||||
|
||||
// Display status every 5 seconds
|
||||
if (time(NULL) - last_status_update >= 5) {
|
||||
display_relay_status();
|
||||
last_status_update = time(NULL);
|
||||
}
|
||||
|
||||
// Small status indicator
|
||||
if (events_processed > 0) {
|
||||
printf(".");
|
||||
fflush(stdout);
|
||||
}
|
||||
}
|
||||
|
||||
printf("\n\n🏁 Test completed!\n");
|
||||
|
||||
// Final status display
|
||||
display_relay_status();
|
||||
|
||||
// Cleanup
|
||||
printf("🧹 Cleaning up...\n");
|
||||
if (g_subscription) {
|
||||
nostr_pool_subscription_close(g_subscription);
|
||||
}
|
||||
if (g_pool) {
|
||||
nostr_relay_pool_destroy(g_pool);
|
||||
}
|
||||
cJSON_Delete(filter);
|
||||
nostr_cleanup();
|
||||
|
||||
printf("✅ Test program finished successfully!\n");
|
||||
printf("📈 Final stats:\n");
|
||||
printf(" Total events: %d\n", events_received);
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
printf(" %s: %d events\n", relay_urls[i], events_per_relay[i]);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,19 @@
|
|||
#include <stdio.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
int main(void) {
|
||||
printf("Testing basic library initialization...\n");
|
||||
|
||||
int result = nostr_init();
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("FAILED: nostr_init() returned %d\n", result);
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("SUCCESS: Library initialized\n");
|
||||
|
||||
nostr_cleanup();
|
||||
printf("SUCCESS: Library cleaned up\n");
|
||||
|
||||
return 0;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,118 @@
|
|||
/*
|
||||
* Simple NIP-44 Test
|
||||
* Basic functionality test for NIP-44 encryption/decryption
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
int main() {
|
||||
printf("🧪 Simple NIP-44 Test\n");
|
||||
printf("=====================\n\n");
|
||||
|
||||
// Initialize the library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("❌ Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Test keys (from successful NIP-04 test)
|
||||
const char* sender_key_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* recipient_key_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
|
||||
unsigned char sender_private_key[32];
|
||||
unsigned char recipient_private_key[32];
|
||||
unsigned char recipient_public_key[32];
|
||||
|
||||
// Parse keys
|
||||
if (nostr_hex_to_bytes(sender_key_hex, sender_private_key, 32) != 0) {
|
||||
printf("❌ Failed to parse sender private key\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (nostr_hex_to_bytes(recipient_key_hex, recipient_private_key, 32) != 0) {
|
||||
printf("❌ Failed to parse recipient private key\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate recipient's public key
|
||||
if (nostr_ec_public_key_from_private_key(recipient_private_key, recipient_public_key) != 0) {
|
||||
printf("❌ Failed to generate recipient public key\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✅ Keys parsed successfully\n");
|
||||
|
||||
// Test message
|
||||
const char* test_message = "Hello, NIP-44! This is a test message.";
|
||||
printf("📝 Test message: \"%s\"\n", test_message);
|
||||
|
||||
// Test encryption
|
||||
char encrypted[8192];
|
||||
printf("🔐 Testing NIP-44 encryption...\n");
|
||||
int encrypt_result = nostr_nip44_encrypt(
|
||||
sender_private_key,
|
||||
recipient_public_key,
|
||||
test_message,
|
||||
encrypted,
|
||||
sizeof(encrypted)
|
||||
);
|
||||
|
||||
if (encrypt_result != NOSTR_SUCCESS) {
|
||||
printf("❌ NIP-44 encryption failed with error: %d\n", encrypt_result);
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✅ NIP-44 encryption successful!\n");
|
||||
printf("📦 Encrypted length: %zu bytes\n", strlen(encrypted));
|
||||
printf("📦 First 80 chars: %.80s...\n", encrypted);
|
||||
|
||||
// Test decryption
|
||||
char decrypted[8192];
|
||||
unsigned char sender_public_key[32];
|
||||
|
||||
// Generate sender's public key for decryption
|
||||
if (nostr_ec_public_key_from_private_key(sender_private_key, sender_public_key) != 0) {
|
||||
printf("❌ Failed to generate sender public key\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("🔓 Testing NIP-44 decryption...\n");
|
||||
int decrypt_result = nostr_nip44_decrypt(
|
||||
recipient_private_key,
|
||||
sender_public_key,
|
||||
encrypted,
|
||||
decrypted,
|
||||
sizeof(decrypted)
|
||||
);
|
||||
|
||||
if (decrypt_result != NOSTR_SUCCESS) {
|
||||
printf("❌ NIP-44 decryption failed with error: %d\n", decrypt_result);
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("✅ NIP-44 decryption successful!\n");
|
||||
printf("📝 Decrypted: \"%s\"\n", decrypted);
|
||||
|
||||
// Verify round-trip
|
||||
if (strcmp(test_message, decrypted) == 0) {
|
||||
printf("✅ Round-trip successful! Messages match perfectly.\n");
|
||||
printf("\n🎉 NIP-44 TEST PASSED! 🎉\n");
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
} else {
|
||||
printf("❌ Round-trip failed! Messages don't match.\n");
|
||||
printf("📝 Original: \"%s\"\n", test_message);
|
||||
printf("📝 Decrypted: \"%s\"\n", decrypted);
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,78 @@
|
|||
/*
|
||||
* Single Test Vector to Debug Segfault
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
|
||||
void hex_to_bytes(const char* hex_str, unsigned char* bytes) {
|
||||
size_t len = strlen(hex_str);
|
||||
for (size_t i = 0; i < len; i += 2) {
|
||||
sscanf(hex_str + i, "%2hhx", &bytes[i / 2]);
|
||||
}
|
||||
}
|
||||
|
||||
int main(void) {
|
||||
printf("=== Single Test Vector Debug ===\n");
|
||||
|
||||
// Initialize the library
|
||||
printf("Initializing library...\n");
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
printf("ERROR: Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
printf("✅ Library initialized\n");
|
||||
|
||||
// Test Vector 1 data
|
||||
const char* sk1_hex = "91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe";
|
||||
const char* sk2_hex = "96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220";
|
||||
const char* pk1_hex = "b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1";
|
||||
const char* pk2_hex = "dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3";
|
||||
const char* plaintext = "nanana";
|
||||
|
||||
printf("Converting hex keys...\n");
|
||||
unsigned char sk1[32], sk2[32], pk1[32], pk2[32];
|
||||
hex_to_bytes(sk1_hex, sk1);
|
||||
hex_to_bytes(sk2_hex, sk2);
|
||||
hex_to_bytes(pk1_hex, pk1);
|
||||
hex_to_bytes(pk2_hex, pk2);
|
||||
printf("✅ Keys converted\n");
|
||||
|
||||
printf("Testing encryption...\n");
|
||||
char encrypted[NOSTR_NIP04_MAX_ENCRYPTED_SIZE];
|
||||
int result = nostr_nip04_encrypt(sk1, pk2, plaintext, encrypted, sizeof(encrypted));
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ ENCRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
printf("✅ Encryption successful: %s\n", encrypted);
|
||||
|
||||
printf("Testing decryption...\n");
|
||||
char decrypted[NOSTR_NIP04_MAX_PLAINTEXT_SIZE];
|
||||
result = nostr_nip04_decrypt(sk2, pk1, encrypted, decrypted, sizeof(decrypted));
|
||||
|
||||
if (result != NOSTR_SUCCESS) {
|
||||
printf("❌ DECRYPTION FAILED: %s\n", nostr_strerror(result));
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
printf("✅ Decryption successful: \"%s\"\n", decrypted);
|
||||
|
||||
if (strcmp(plaintext, decrypted) == 0) {
|
||||
printf("✅ TEST PASSED - Round-trip successful!\n");
|
||||
} else {
|
||||
printf("❌ TEST FAILED - Messages don't match\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("Cleaning up...\n");
|
||||
nostr_cleanup();
|
||||
printf("✅ Test completed successfully!\n");
|
||||
|
||||
return 0;
|
||||
}
|
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,180 @@
|
|||
/*
|
||||
* Synchronous Relay Query Test Program
|
||||
*
|
||||
* Tests the synchronous_query_relays_with_progress function
|
||||
* with all three query modes: FIRST_RESULT, MOST_RECENT, ALL_RESULTS
|
||||
*
|
||||
* Usage: Uncomment only ONE test mode at the top of main()
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
// Helper function to get mode name for display
|
||||
const char* get_mode_name(relay_query_mode_t mode) {
|
||||
switch (mode) {
|
||||
case RELAY_QUERY_FIRST_RESULT: return "FIRST_RESULT";
|
||||
case RELAY_QUERY_MOST_RECENT: return "MOST_RECENT";
|
||||
case RELAY_QUERY_ALL_RESULTS: return "ALL_RESULTS";
|
||||
default: return "UNKNOWN";
|
||||
}
|
||||
}
|
||||
|
||||
// Progress callback to show raw relay activity
|
||||
void progress_callback(const char* relay_url, const char* status,
|
||||
const char* event_id, int events_received,
|
||||
int total_relays, int completed_relays, void* user_data) {
|
||||
(void)user_data; // Unused parameter
|
||||
|
||||
printf("[PROGRESS] ");
|
||||
if (relay_url) {
|
||||
printf("%s | %s", relay_url, status);
|
||||
if (event_id) {
|
||||
printf(" | Event: %.12s...", event_id);
|
||||
}
|
||||
printf(" | Events: %d | Relays: %d/%d\n",
|
||||
events_received, completed_relays, total_relays);
|
||||
} else {
|
||||
printf("SUMMARY | %s | Events: %d | Relays: %d/%d\n",
|
||||
status, events_received, completed_relays, total_relays);
|
||||
}
|
||||
fflush(stdout);
|
||||
}
|
||||
|
||||
int main() {
|
||||
// Initialize NOSTR library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize NOSTR library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// ============================================================================
|
||||
// TEST SELECTION - Uncomment only ONE test at a time
|
||||
// ============================================================================
|
||||
|
||||
// relay_query_mode_t test_mode = RELAY_QUERY_FIRST_RESULT;
|
||||
// relay_query_mode_t test_mode = RELAY_QUERY_MOST_RECENT;
|
||||
relay_query_mode_t test_mode = RELAY_QUERY_ALL_RESULTS;
|
||||
|
||||
// ============================================================================
|
||||
// Hard-coded test configuration
|
||||
// ============================================================================
|
||||
|
||||
const char* test_relays[] = {
|
||||
"ws://127.0.0.1:7777",
|
||||
"wss://relay.laantungir.net",
|
||||
"wss://relay.corpum.com"
|
||||
};
|
||||
int relay_count = 3;
|
||||
|
||||
// ============================================================================
|
||||
// FILTER CONFIGURATION - Edit this JSON string to change the query
|
||||
// ============================================================================
|
||||
|
||||
const char* filter_json =
|
||||
"{"
|
||||
" \"kinds\": [1],"
|
||||
" \"limit\": 1"
|
||||
"}";
|
||||
|
||||
// Alternative filter examples (comment out the one above, uncomment one below):
|
||||
|
||||
// Get kind 0 (profile) events:
|
||||
// const char* filter_json = "{\"kinds\": [0], \"limit\": 5}";
|
||||
|
||||
// Get events from specific author (replace with real pubkey):
|
||||
// const char* filter_json = "{\"authors\": [\"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411\"], \"kinds\": [1], \"limit\": 20}";
|
||||
|
||||
// Get recent events with specific hashtag:
|
||||
// const char* filter_json = "{\"kinds\": [1], \"#t\": [\"nostr\"], \"limit\": 15}";
|
||||
|
||||
// Get events since specific timestamp:
|
||||
// const char* filter_json = "{\"kinds\": [1], \"since\": 1706825234, \"limit\": 10}";
|
||||
|
||||
// Parse the filter JSON string
|
||||
cJSON* filter = cJSON_Parse(filter_json);
|
||||
if (!filter) {
|
||||
fprintf(stderr, "ERROR: Failed to parse filter JSON:\n%s\n", filter_json);
|
||||
fprintf(stderr, "Check JSON syntax and try again.\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
// ============================================================================
|
||||
// Run the test
|
||||
// ============================================================================
|
||||
|
||||
printf("=== SYNCHRONOUS RELAY QUERY TEST ===\n");
|
||||
printf("Mode: %s\n", get_mode_name(test_mode));
|
||||
printf("Querying %d relays with 5 second timeout...\n\n", relay_count);
|
||||
|
||||
// Print relay list
|
||||
printf("Test relays:\n");
|
||||
for (int i = 0; i < relay_count; i++) {
|
||||
printf(" %d. %s\n", i + 1, test_relays[i]);
|
||||
}
|
||||
printf("\n");
|
||||
|
||||
// Print filter
|
||||
char* filter_str = cJSON_Print(filter);
|
||||
printf("Filter: %s\n\n", filter_str);
|
||||
free(filter_str);
|
||||
|
||||
int result_count = 0;
|
||||
time_t start_time = time(NULL);
|
||||
|
||||
printf("Starting query...\n\n");
|
||||
|
||||
cJSON** results = synchronous_query_relays_with_progress(
|
||||
test_relays, relay_count, filter, test_mode,
|
||||
&result_count, 5, progress_callback, NULL
|
||||
);
|
||||
|
||||
time_t end_time = time(NULL);
|
||||
|
||||
// ============================================================================
|
||||
// Print raw results
|
||||
// ============================================================================
|
||||
|
||||
printf("\n=== RAW RESULTS ===\n");
|
||||
printf("Execution time: %ld seconds\n", end_time - start_time);
|
||||
printf("Events returned: %d\n\n", result_count);
|
||||
|
||||
if (results && result_count > 0) {
|
||||
for (int i = 0; i < result_count; i++) {
|
||||
printf("--- EVENT %d ---\n", i + 1);
|
||||
char* json_str = cJSON_Print(results[i]);
|
||||
if (json_str) {
|
||||
printf("%s\n\n", json_str);
|
||||
free(json_str);
|
||||
} else {
|
||||
printf("ERROR: Failed to serialize event to JSON\n\n");
|
||||
}
|
||||
}
|
||||
} else {
|
||||
printf("No events returned.\n\n");
|
||||
}
|
||||
|
||||
// ============================================================================
|
||||
// Cleanup
|
||||
// ============================================================================
|
||||
|
||||
if (results) {
|
||||
for (int i = 0; i < result_count; i++) {
|
||||
if (results[i]) {
|
||||
cJSON_Delete(results[i]);
|
||||
}
|
||||
}
|
||||
free(results);
|
||||
}
|
||||
|
||||
cJSON_Delete(filter);
|
||||
nostr_cleanup();
|
||||
|
||||
printf("Test completed.\n");
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,161 @@
|
|||
/*
|
||||
* Manual Proof of Work Loop Test
|
||||
*
|
||||
* Creates an event and manually mines it by incrementing nonce
|
||||
* until target difficulty is reached. Shows each iteration.
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "../nostr_core/nostr_core.h"
|
||||
#include "../cjson/cJSON.h"
|
||||
|
||||
// Helper function to count leading zero bits (from NIP-13)
|
||||
static int zero_bits(unsigned char b) {
|
||||
int n = 0;
|
||||
|
||||
if (b == 0)
|
||||
return 8;
|
||||
|
||||
while (b >>= 1)
|
||||
n++;
|
||||
|
||||
return 7-n;
|
||||
}
|
||||
|
||||
// Count leading zero bits in hash (from NIP-13)
|
||||
static int count_leading_zero_bits(unsigned char *hash) {
|
||||
int bits, total, i;
|
||||
for (i = 0, total = 0; i < 32; i++) {
|
||||
bits = zero_bits(hash[i]);
|
||||
total += bits;
|
||||
if (bits != 8)
|
||||
break;
|
||||
}
|
||||
return total;
|
||||
}
|
||||
|
||||
int main() {
|
||||
// Initialize library
|
||||
if (nostr_init() != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to initialize nostr library\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate test keypair
|
||||
unsigned char private_key[32];
|
||||
unsigned char public_key[32];
|
||||
|
||||
if (nostr_generate_keypair(private_key, public_key) != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to generate keypair\n");
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("=== Manual Proof of Work Mining (Target Difficulty: 8) ===\n\n");
|
||||
|
||||
// Create base event content
|
||||
const char* content = "Proof of Work Test";
|
||||
int kind = 1;
|
||||
time_t created_at = time(NULL);
|
||||
|
||||
// Target difficulty
|
||||
const int target_difficulty = 20;
|
||||
uint64_t nonce = 0;
|
||||
int max_attempts = 10000000000;
|
||||
|
||||
printf("Mining event with target difficulty %d...\n\n", target_difficulty);
|
||||
|
||||
// Mining loop
|
||||
for (int attempt = 0; attempt < max_attempts; attempt++) {
|
||||
// Create tags array with current nonce
|
||||
cJSON* tags = cJSON_CreateArray();
|
||||
if (!tags) {
|
||||
fprintf(stderr, "Failed to create tags array\n");
|
||||
break;
|
||||
}
|
||||
|
||||
// Add nonce tag: ["nonce", "<nonce>", "<target_difficulty>"]
|
||||
cJSON* nonce_tag = cJSON_CreateArray();
|
||||
char nonce_str[32];
|
||||
char difficulty_str[16];
|
||||
snprintf(nonce_str, sizeof(nonce_str), "%llu", (unsigned long long)nonce);
|
||||
snprintf(difficulty_str, sizeof(difficulty_str), "%d", target_difficulty);
|
||||
|
||||
cJSON_AddItemToArray(nonce_tag, cJSON_CreateString("nonce"));
|
||||
cJSON_AddItemToArray(nonce_tag, cJSON_CreateString(nonce_str));
|
||||
cJSON_AddItemToArray(nonce_tag, cJSON_CreateString(difficulty_str));
|
||||
cJSON_AddItemToArray(tags, nonce_tag);
|
||||
|
||||
// Create and sign event with current nonce
|
||||
cJSON* event = nostr_create_and_sign_event(kind, content, tags, private_key, created_at);
|
||||
cJSON_Delete(tags);
|
||||
|
||||
if (!event) {
|
||||
fprintf(stderr, "Failed to create event at nonce %llu\n", (unsigned long long)nonce);
|
||||
nonce++;
|
||||
continue;
|
||||
}
|
||||
|
||||
// Get event ID
|
||||
cJSON* id_item = cJSON_GetObjectItem(event, "id");
|
||||
if (!id_item || !cJSON_IsString(id_item)) {
|
||||
fprintf(stderr, "Failed to get event ID at nonce %llu\n", (unsigned long long)nonce);
|
||||
cJSON_Delete(event);
|
||||
nonce++;
|
||||
continue;
|
||||
}
|
||||
|
||||
const char* event_id = cJSON_GetStringValue(id_item);
|
||||
|
||||
// Convert hex ID to bytes and count leading zero bits
|
||||
unsigned char hash[32];
|
||||
if (nostr_hex_to_bytes(event_id, hash, 32) != NOSTR_SUCCESS) {
|
||||
fprintf(stderr, "Failed to convert event ID to bytes at nonce %llu\n", (unsigned long long)nonce);
|
||||
cJSON_Delete(event);
|
||||
nonce++;
|
||||
continue;
|
||||
}
|
||||
|
||||
int current_difficulty = count_leading_zero_bits(hash);
|
||||
|
||||
// Print current attempt
|
||||
printf("Nonce %llu: ID = %.16s... (difficulty: %d)",
|
||||
(unsigned long long)nonce, event_id, current_difficulty);
|
||||
|
||||
// Check if we've reached target difficulty
|
||||
if (current_difficulty >= target_difficulty) {
|
||||
printf(" ✓ SUCCESS!\n\n");
|
||||
|
||||
// Print final successful event
|
||||
printf("=== SUCCESSFUL EVENT ===\n");
|
||||
char* final_json = cJSON_Print(event);
|
||||
if (final_json) {
|
||||
printf("%s\n", final_json);
|
||||
free(final_json);
|
||||
}
|
||||
|
||||
printf("\n🎉 Mining completed!\n");
|
||||
printf(" Attempts: %d\n", attempt + 1);
|
||||
printf(" Final nonce: %llu\n", (unsigned long long)nonce);
|
||||
printf(" Final difficulty: %d (target was %d)\n", current_difficulty, target_difficulty);
|
||||
|
||||
cJSON_Delete(event);
|
||||
nostr_cleanup();
|
||||
return 0;
|
||||
} else {
|
||||
printf(" (need %d)\n", target_difficulty);
|
||||
}
|
||||
|
||||
cJSON_Delete(event);
|
||||
nonce++;
|
||||
}
|
||||
|
||||
// If we reach here, we've exceeded max attempts
|
||||
printf("\n❌ Mining failed after %d attempts\n", max_attempts);
|
||||
printf("Consider increasing max_attempts or reducing target_difficulty\n");
|
||||
|
||||
nostr_cleanup();
|
||||
return 1;
|
||||
}
|
Binary file not shown.
|
@ -0,0 +1,101 @@
|
|||
/*
|
||||
* NIP-04 Test Vectors Display - All 6 Test Vectors
|
||||
* Shows complete test vector integration even if runtime testing has issues
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
void display_test_vector(int num, const char* description, const char* sk1, const char* pk1,
|
||||
const char* sk2, const char* pk2, const char* plaintext, const char* expected) {
|
||||
printf("=== TEST VECTOR %d: %s ===\n", num, description);
|
||||
printf("SK1 (Alice): %s\n", sk1);
|
||||
printf("PK1 (Alice): %s\n", pk1);
|
||||
printf("SK2 (Bob): %s\n", sk2);
|
||||
printf("PK2 (Bob): %s\n", pk2);
|
||||
printf("Plaintext: \"%s\"\n", plaintext);
|
||||
|
||||
if (strlen(expected) > 80) {
|
||||
char truncated[81];
|
||||
strncpy(truncated, expected, 80);
|
||||
truncated[80] = '\0';
|
||||
printf("Expected: %s...\n", truncated);
|
||||
} else {
|
||||
printf("Expected: %s\n", expected);
|
||||
}
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
int main(void) {
|
||||
printf("=== NIP-04 Test Vector Collection ===\n");
|
||||
printf("Complete integration of 6 test vectors (3 original + 3 from nostr-tools)\n\n");
|
||||
|
||||
// Original Test Vectors (1-3)
|
||||
display_test_vector(1, "Basic NIP-04 Encryption",
|
||||
"91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe",
|
||||
"b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1",
|
||||
"96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220",
|
||||
"dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3",
|
||||
"nanana",
|
||||
"zJxfaJ32rN5Dg1ODjOlEew==?iv=EV5bUjcc4OX2Km/zPp4ndQ==");
|
||||
|
||||
display_test_vector(2, "Large Payload Test (800 characters)",
|
||||
"91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe",
|
||||
"b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1",
|
||||
"96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220",
|
||||
"dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3",
|
||||
"800 'z' characters",
|
||||
"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?iv=2vWkOQQi0WynNJz/aZ4k2g==");
|
||||
|
||||
display_test_vector(3, "Bidirectional Communication",
|
||||
"91ba716fa9e7ea2fcbad360cf4f8e0d312f73984da63d90f524ad61a6a1e7dbe",
|
||||
"b38ce15d3d9874ee710dfabb7ff9801b1e0e20aace6e9a1a05fa7482a04387d1",
|
||||
"96f6fa197aa07477ab88f6981118466ae3a982faab8ad5db9d5426870c73d220",
|
||||
"dcb33a629560280a0ee3b6b99b68c044fe8914ad8a984001ebf6099a9b474dc3",
|
||||
"Hello Bob, this is Alice! / Hi Alice, Bob here. Message received!",
|
||||
"Various encrypted messages");
|
||||
|
||||
printf("--- Generated with nostr-tools (Random Keys) ---\n\n");
|
||||
|
||||
// New Test Vectors Generated with nostr-tools (4-6)
|
||||
display_test_vector(4, "Random Keys - Hello, NOSTR!",
|
||||
"5c5ea5ec3a804533ba8a21ba3dd981fc55a84e854dde53869b3f812ccd788200",
|
||||
"0988b20763d3f8bc06e88722f2aa6b3caed3cc510e93287e1ee3f70ed22f54d2",
|
||||
"8e94e91ea679509ec1f5da2be87352ea78acde2b69563c23a41b7f07c0891bc3",
|
||||
"13747a8025c1196da3e67ecf941aa889c5c4ec6773e7f325f3f8d2435c4603c6",
|
||||
"Hello, NOSTR!",
|
||||
"+bqZAkfv/tI4h0XcvB9Baw==?iv=Om7m3at5zjJjxyAQbFY2IQ==");
|
||||
|
||||
display_test_vector(5, "Long Message with Emoji",
|
||||
"51099e755aaab7e8ee1850b683b673c11d09799e85a630e951eb3c92fab4aed3",
|
||||
"c5fb1cad7b11e3cf7f31d5bf47aaf3398a4803ea786eedfd674f55fa55dcb649",
|
||||
"41f2788d00bd362ac3c7c784ee46e35b99765a086514ee69cb15de38c072309a",
|
||||
"ba6773cf6a9b11476f692d4681a2f1e3015d1ee4a8d7c9d0364bed120f225079",
|
||||
"This is a longer message to test encryption with more content. 🚀",
|
||||
"3H9WEg9WjjN3r6ZymJt1R4ly3GlzhRR93FaSTGHLeM4oSS3eOnJtdXcO4ftgICMHRYM14WAmDDE9c12V8jhzua8GpnXKIVsNbY+oPF2yRwI=?iv=ztEGlo35pqJKrwZ2ZipsWg==");
|
||||
|
||||
display_test_vector(6, "Short Message",
|
||||
"42c450eaebaee5ad94b602fc9054cde48f66d68c236b547aafee0ff319377290",
|
||||
"a03f543eeb6c3f1c626181730751c39fd4f9f10455756d99ea855da97cf5076b",
|
||||
"72f424c96239d271549c648d16635b5603ef32cdcbbff41058d14187b98f30cc",
|
||||
"1c74b7a1d09ebeaf994a93a859682019930ad4f0f8ac7e65caacbbf4985042e8",
|
||||
"Short",
|
||||
"UIN92yHtAfX0vOTmn8VTtg==?iv=ou0QFU5UJUI6W4fUlkiElg==");
|
||||
|
||||
printf("=== SUMMARY ===\n");
|
||||
printf("✅ Successfully generated 3 additional test vectors using nostr-tools\n");
|
||||
printf("✅ All test vectors use genuine random nsec keys from the JavaScript ecosystem\n");
|
||||
printf("✅ Test coverage includes: short, medium, long, Unicode, and emoji messages\n");
|
||||
printf("✅ Enhanced from 3 to 6 comprehensive test vectors\n");
|
||||
printf("✅ Ready for integration testing once library stability issues are resolved\n");
|
||||
printf("\n");
|
||||
printf("Files created:\n");
|
||||
printf("- test_vector_generator/generate_vectors.js (Vector generation script)\n");
|
||||
printf("- tests/nip04_test.c (Enhanced with 6 test vectors)\n");
|
||||
printf("- package.json (Node.js dependencies)\n");
|
||||
printf("\n");
|
||||
printf("🎯 Mission accomplished - Enhanced NIP-04 test coverage with nostr-tools vectors!\n");
|
||||
|
||||
return 0;
|
||||
}
|
|
@ -0,0 +1,51 @@
|
|||
### __Tier 1: Foundational & High-Priority NIPs (The Essentials)__
|
||||
|
||||
These are fundamental features that most Nostr applications rely on.
|
||||
|
||||
| NIP | Description | `nostr_core_lib` Status | `nak` / `nostr-tools` Status | Recommendation | | :-- | :--- | :--- | :--- | :--- | | __NIP-04__ | __Encrypted Direct Messages__ | ❌ __Missing__ | ✅ __Supported__ | __High Priority.__ Essential for private communication. The `encrypt` / `decrypt` functions are a must-have. | | __NIP-05__ | __Mapping to DNS-based Names__ | ❌ __Missing__ | ✅ __Supported__ | __High Priority.__ Needed for user-friendly identifiers (e.g., `user@domain.com`). We should add a function to verify these. | | __NIP-07__ | __`window.nostr` for Web Browsers__ | ❌ __Missing__ | ✅ __Supported__ | __Medium Priority (for C).__ This is browser-specific, but we should consider adding helper functions to format requests for browser extensions that implement NIP-07. | | __NIP-11__ | __Relay Information Document__ | ❌ __Missing__ | ✅ __Supported__ | __High Priority.__ Crucial for client-side relay discovery and capability checking. A function to fetch and parse this JSON is needed. | | __NIP-21__ | __`nostr:` URI Scheme__ | ❌ __Missing__ | ✅ __Supported__ | __Medium Priority.__ Useful for linking to profiles, events, etc. from outside Nostr clients. We should add parsing and generation functions. | | __NIP-57__| __Lightning Zaps__ | ❌ __Missing__ | ✅ __Supported__ | __High Priority.__ Zaps are a cornerstone of value-for-value on Nostr. We need functions to create and verify zap request events (Kind 9734) and zap receipt events (Kind 9735). |
|
||||
|
||||
---
|
||||
|
||||
### __Tier 2: Advanced & Ecosystem NIPs (Expanding Capabilities)__
|
||||
|
||||
These features enable more complex interactions and integrations.
|
||||
|
||||
| NIP | Description | `nostr_core_lib` Status | `nak` / `nostr-tools` Status | Recommendation | | :-- | :--- | :--- | :--- | :--- | | __NIP-25__ | __Reactions__ | ❌ __Missing__ | ✅ __Supported__ | __Medium Priority.__ Relatively simple to implement (Kind 7 events) and common in social clients. | | __NIP-26__ | __Delegated Event Signing__| ❌ __Missing__| ✅ __Supported__| __Medium Priority.__ Allows for one key to authorize another to sign events, useful for temporary or restricted keys. | | __NIP-44__ | __Versioned Encryption (v2)__ | ❌ __Missing__ | ✅ __Supported__ | __High Priority (along with NIP-04).__ Newer standard for encryption. We should aim to support both, but prioritize NIP-44 for new applications. | | __NIP-46__ | __Nostr Connect (Remote Signing)__| ❌ __Missing__ | ✅ __Supported__ | __Low Priority (for C library).__ More of an application-level concern, but we could provide structures and helpers to facilitate communication with signing "bunkers". | | __NIP-47__ | __Nostr Wallet Connect__ | ❌ __Missing__ | ✅ __Supported__| __Low Priority (for C library).__ Similar to NIP-46, this is primarily for app-level integration, but helpers would be valuable. | | __NIP-58__ | __Badges__ | ❌ __Missing__ | ✅ __Supported__ | __Medium Priority.__ Defines how to award and display badges (Kind 30008/30009 events). | | __NIP-94__ | __File Metadata__ | ❌ __Missing__ | ✅ __Supported__| __Medium Priority.__ For events that reference external files (images, videos), providing metadata like hashes and URLs. | | __NIP-98__ | __HTTP Auth__| ❌ __Missing__ | ✅ __Supported__| __High Priority.__ Allows services to authenticate users via a Nostr event, a powerful tool for integrating Nostr identity with web services. |
|
||||
|
||||
---
|
||||
|
||||
### __Tier 3: Specialized & Less Common NIPs (Future Considerations)__
|
||||
|
||||
| NIP | Description | `nostr_core_lib` Status | `nak` / `nostr-tools` Status | Recommendation | | :-- | :--- | :--- | :--- | :--- | | __NIP-18__| __Reposts__ | ❌ __Missing__ | ✅ __Supported__| __Low Priority.__ Simple to implement (Kind 6 events) but less critical than other features. | | __NIP-28__| __Public Chat Channels__| ❌ __Missing__ | ✅ __Supported__| __Low Priority.__ Defines event kinds for creating and managing public chat channels. | | __NIP-39__| __External Identities__ | ❌ __Missing__ | ✅ __Supported__| __Low Priority.__ For linking a Nostr profile to identities on other platforms like GitHub or Twitter. | | __NIP-42__ | __Relay Authentication__ | ❌ __Missing__| ✅ __Supported__| __Medium Priority.__ For paid relays or those requiring login. Essential for interacting with the full relay ecosystem. | | __NIP-43__| __Musig2 (Multisig)__ | ❌ __Missing__ | ✅ __Supported__| __Low Priority.__ A very powerful but niche feature. Complex to implement correctly. |
|
||||
|
||||
---
|
||||
|
||||
### __Proposed Roadmap__
|
||||
|
||||
Based on this analysis, I recommend the following roadmap, prioritized by impact and foundational need:
|
||||
|
||||
1. __Immediate Next Steps (High-Impact Basics):__
|
||||
|
||||
- __Implement NIP-04 & NIP-44:__ Encrypted messaging is a huge gap.
|
||||
- __Implement NIP-11:__ Fetching and parsing relay info documents.
|
||||
- __Implement NIP-05:__ DNS-based name verification.
|
||||
- __Implement NIP-57:__ Create and verify Zap events.
|
||||
- __Implement NIP-98:__ HTTP Auth for web services.
|
||||
|
||||
2. __Phase 2 (Ecosystem & Social Features):__
|
||||
|
||||
- __Implement NIP-25:__ Reactions.
|
||||
- __Implement NIP-26:__ Delegation.
|
||||
- __Implement NIP-42:__ Relay Authentication.
|
||||
- __Implement NIP-21:__ `nostr:` URI handling.
|
||||
- __Implement NIP-58:__ Badges.
|
||||
|
||||
3. __Phase 3 (Advanced & Specialized Features):__
|
||||
|
||||
- __Implement NIP-18:__ Reposts.
|
||||
- __Implement NIP-43:__ Musig2 (this is a big one).
|
||||
- Add helpers for NIP-07, NIP-46, and NIP-47.
|
||||
|
||||
What are your thoughts on this assessment and proposed roadmap? We can adjust the priorities based on your goals for the library. Once we have a plan you're happy with, I can start implementing the first features when you're ready to switch to
|
||||
|
||||
Act Mode (⌘⇧A).
|
Loading…
Reference in New Issue