#pragma once /** * @brief Miraland secp256k1 system call */ #include #ifdef __cplusplus extern "C" { #endif /** Length of a secp256k1 recover input hash */ #define SECP256K1_RECOVER_HASH_LENGTH 32 /** Length of a secp256k1 input signature */ #define SECP256K1_RECOVER_SIGNATURE_LENGTH 64 /** Length of a secp256k1 recover result */ #define SECP256K1_RECOVER_RESULT_LENGTH 64 /** The hash provided to a sol_secp256k1_recover is invalid */ #define SECP256K1_RECOVER_ERROR_INVALID_HASH 1 /** The recovery_id provided to a sol_secp256k1_recover is invalid */ #define SECP256K1_RECOVER_ERROR_INVALID_RECOVERY_ID 2 /** The signature provided to a sol_secp256k1_recover is invalid */ #define SECP256K1_RECOVER_ERROR_INVALID_SIGNATURE 3 /** * Recover public key from a signed message. * * @param hash Hashed message * @param recovery_id Tag used for public key recovery from signatures. Can be 0 or 1 * @param signature An ECDSA signature * @param result 64 byte array to hold the result. A recovered public key * @return 0 if executed successfully */ /* DO NOT MODIFY THIS GENERATED FILE. INSTEAD CHANGE sdk/sbf/c/inc/sol/inc/secp256k1.inc AND RUN `cargo run --bin gen-headers` */ #ifndef SOL_SBFV2 uint64_t sol_secp256k1_recover(const uint8_t *, uint64_t, const uint8_t *, uint8_t *); #else typedef uint64_t(*sol_secp256k1_recover_pointer_type)(const uint8_t *, uint64_t, const uint8_t *, uint8_t *); static uint64_t sol_secp256k1_recover(const uint8_t * arg1, uint64_t arg2, const uint8_t * arg3, uint8_t * arg4) { sol_secp256k1_recover_pointer_type sol_secp256k1_recover_pointer = (sol_secp256k1_recover_pointer_type) 400819024; return sol_secp256k1_recover_pointer(arg1, arg2, arg3, arg4); } #endif #ifdef __cplusplus } #endif /**@}*/