Richard Kiss [ARCHIVE] on Nostr: 📅 Original date posted:2015-10-03 📝 Original message: > > > Ah, it looks like ...
📅 Original date posted:2015-10-03
📝 Original message:
>
>
> Ah, it looks like the problem is that libsec256k1 actually goes a step
> further and runs SHA256(y||x), where "x" is the value I'm getting and y
> is '\x02' is the y value is even and '\x03' if it's odd. If I try both,
> one of them turns out right:
>
> Secret1: d9946724c6bd8d5b58bdd2256a0251816a42f9707c794427a410075e4dbb199c
> Secret2: 105e0c04f0a910d72dcf2683c21903ba08cd8b225e4124afc41bb2341dc40f49
>
> Unfortunately openssl throws away y and just gives us x, so I'm not sure
> if I can work out the right secret directly. I guess I can run the HMAC
> twice and pick the value that worked?
>
> Okay, we'll see if we can get any further tomorrow.
>
> Cheers,
> aj
>
My open source library pycoin has a function that will give you Y from X,
so you can use that or just pilfer enough code to reproduce it (it's not
native, but it's not a very complex operation).
https://github.com/richardkiss/pycoin/blob/master/pycoin/ecdsa/ecdsa.py#L115Richard
--
http://richardkiss.com/-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20151003/4c630e5d/attachment.html>
Published at
2023-06-09 12:44:43Event JSON
{
"id": "98dd36df4c1a0af63e6cd367a040c311c49168ac6d2c99d3be56c9d805438d2f",
"pubkey": "8e47fc91b77ea5383602890e640ba7a5d4547ac3d2790a72c63c9e9885c4fc22",
"created_at": 1686314683,
"kind": 1,
"tags": [
[
"e",
"8068f367a334368b30aff76cd525cce9c5bc6d9781f504af87639b9a503f0531",
"",
"root"
],
[
"e",
"2a8128248abd67e94031c02cd4d81b5ef43d08e83ec8ed1681c261e75070f807",
"",
"reply"
],
[
"p",
"f0feda6ad58ea9f486e469f87b3b9996494363a26982b864667c5d8acb0542ab"
]
],
"content": "📅 Original date posted:2015-10-03\n📝 Original message:\n\u003e\n\u003e\n\u003e Ah, it looks like the problem is that libsec256k1 actually goes a step\n\u003e further and runs SHA256(y||x), where \"x\" is the value I'm getting and y\n\u003e is '\\x02' is the y value is even and '\\x03' if it's odd. If I try both,\n\u003e one of them turns out right:\n\u003e\n\u003e Secret1: d9946724c6bd8d5b58bdd2256a0251816a42f9707c794427a410075e4dbb199c\n\u003e Secret2: 105e0c04f0a910d72dcf2683c21903ba08cd8b225e4124afc41bb2341dc40f49\n\u003e\n\u003e Unfortunately openssl throws away y and just gives us x, so I'm not sure\n\u003e if I can work out the right secret directly. I guess I can run the HMAC\n\u003e twice and pick the value that worked?\n\u003e\n\u003e Okay, we'll see if we can get any further tomorrow.\n\u003e\n\u003e Cheers,\n\u003e aj\n\u003e\n\nMy open source library pycoin has a function that will give you Y from X,\nso you can use that or just pilfer enough code to reproduce it (it's not\nnative, but it's not a very complex operation).\n\nhttps://github.com/richardkiss/pycoin/blob/master/pycoin/ecdsa/ecdsa.py#L115\n\nRichard\n\n-- \nhttp://richardkiss.com/\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20151003/4c630e5d/attachment.html\u003e",
"sig": "a6c8357d30a8015ba84ebd812f148b3f461b42412076d879093d860ef12149d7400790f132037ea406e4e26031a39c37b6a738027edb9c06ca349a1a6f755860"
}