1771 lines
50 KiB
C++
1771 lines
50 KiB
C++
// Copyright (c) 2020-2021 Zano Project
|
|
// Copyright (c) 2020-2021 sowle (val@zano.org, crypto.sowle@gmail.com)
|
|
// Distributed under the MIT/X11 software license, see the accompanying
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
#define USE_INSECURE_RANDOM_RPNG_ROUTINES // turns on random manupulation for tests
|
|
#include <utility>
|
|
#include "crypto/crypto.h"
|
|
#include "epee/include/misc_log_ex.h"
|
|
#include "epee/include/profile_tools.h"
|
|
#include "include_base_utils.h"
|
|
#include "common/crypto_stream_operators.h"
|
|
#include "common/varint.h"
|
|
#include "currency_core/difficulty.h"
|
|
|
|
#include "crypto/crypto-sugar.h"
|
|
#include "crypto/range_proofs.h"
|
|
|
|
using namespace crypto;
|
|
|
|
namespace mp = boost::multiprecision;
|
|
|
|
// out = z ^ s (mod l)
|
|
void sc_exp(unsigned char* out, const unsigned char* z, const unsigned char* s)
|
|
{
|
|
sc_0(out);
|
|
out[0] = 1;
|
|
if (sc_isnonzero(s) == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// calc position of the most significant bit of s
|
|
size_t msb_s = 0;
|
|
for (size_t i = 31; i != SIZE_MAX; --i)
|
|
{
|
|
if (s[i] != 0)
|
|
{
|
|
msb_s = 8 * i;
|
|
uint8_t t = s[i] >> 1;
|
|
while (t)
|
|
{
|
|
t >>= 1;
|
|
++msb_s;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
for (size_t i = msb_s; i != SIZE_MAX; --i)
|
|
{
|
|
sc_mul(out, out, out);
|
|
//std::cout << "sc_mul(out, out, out);" << std::endl;
|
|
uint8_t bit = (s[i / 8] >> (i % 8)) & 1;
|
|
if (bit)
|
|
{
|
|
sc_mul(out, out, z);
|
|
//std::cout << "sc_mul(out, out, z);" << std::endl;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
Input:
|
|
s[0]+256*s[1]+...+256^31*s[31] = s
|
|
a[0]+256*a[1]+...+256^31*a[31] = a
|
|
n
|
|
*
|
|
Output:
|
|
s[0]+256*s[1]+...+256^31*s[31] = a * s^(2^n) mod l
|
|
where l = 2^252 + 27742317777372353535851937790883648493.
|
|
Overwrites s in place.
|
|
*/
|
|
|
|
static inline void
|
|
sc_sqmul(unsigned char s[32], const int n, const unsigned char a[32])
|
|
{
|
|
int i;
|
|
for (i = 0; i < n; ++i)
|
|
sc_mul(s, s, s);
|
|
sc_mul(s, s, a);
|
|
}
|
|
|
|
// out = z ^ -1 (= z ^ (L - 2) according to Fermat little theorem)
|
|
void sc_invert2(unsigned char* out, const unsigned char* z)
|
|
{
|
|
memcpy(out, z, 32);
|
|
for (size_t i = 0; i < 128; ++i)
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
sc_mul(out, out, out);
|
|
sc_mul(out, out, z);
|
|
}
|
|
|
|
extern void *sha3(const void *in, size_t inlen, void *md, int mdlen);
|
|
|
|
|
|
uint64_t rand_in_range(uint64_t from_including, uint64_t to_not_including)
|
|
{
|
|
uint64_t result = 0;
|
|
crypto::generate_random_bytes(sizeof result, &result);
|
|
return from_including + result % (to_not_including - from_including);
|
|
}
|
|
|
|
|
|
|
|
|
|
static const fe scalar_L_fe = { 16110573, 10012311, -6632702, 16062397, 5471207, 0, 0, 0, 0, 4194304 };
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
// test helpers
|
|
//
|
|
|
|
inline std::ostream& operator<<(std::ostream& ss, const fe &f)
|
|
{
|
|
constexpr size_t fe_index_max = (sizeof f / sizeof f[0]) - 1;
|
|
ss << "{";
|
|
for (size_t i = 0; i <= fe_index_max; ++i)
|
|
ss << f[i] << ", ";
|
|
return ss << f[fe_index_max] << "}";
|
|
}
|
|
|
|
point_t point_from_str(const std::string& str)
|
|
{
|
|
crypto::public_key pk;
|
|
if (!epee::string_tools::parse_tpod_from_hex_string(str, pk))
|
|
throw std::runtime_error("couldn't parse pub key");
|
|
|
|
point_t result;
|
|
if (!result.from_public_key(pk))
|
|
throw std::runtime_error("invalid pub key");
|
|
|
|
return result;
|
|
}
|
|
|
|
scalar_t scalar_from_str(const std::string& str)
|
|
{
|
|
crypto::secret_key sk;
|
|
if (!epee::string_tools::parse_tpod_from_hex_string(str, sk))
|
|
throw std::runtime_error("couldn't parse sec key");
|
|
|
|
scalar_t result;
|
|
result.from_secret_key(sk);
|
|
if (result > c_scalar_Lm1)
|
|
throw std::runtime_error("sec key scalar >= L");
|
|
|
|
return result;
|
|
}
|
|
|
|
crypto::hash hash_from_str(const std::string& str)
|
|
{
|
|
crypto::hash hash;
|
|
if (!epee::string_tools::parse_tpod_from_hex_string(str, hash))
|
|
throw std::runtime_error("couldn't parse hash");
|
|
|
|
return hash;
|
|
}
|
|
|
|
std::string point_to_str(const point_t& point)
|
|
{
|
|
crypto::public_key pk = point.to_public_key();
|
|
return epee::string_tools::pod_to_hex(pk);
|
|
}
|
|
|
|
std::string scalar_to_str(const scalar_t& scalar)
|
|
{
|
|
return epee::string_tools::pod_to_hex(scalar);
|
|
}
|
|
|
|
bool generate_test_ring_and_sec_keys(size_t N, size_t L, std::vector<point_t>& ring, std::vector<scalar_t>& secret_keys,
|
|
std::vector<size_t>& ring_mapping, std::vector<point_t>& key_images)
|
|
{
|
|
secret_keys.resize(L);
|
|
for (size_t i = 0; i < L; ++i)
|
|
secret_keys[i].make_random();
|
|
|
|
std::vector<point_t> fake_pub_keys(N / 2 - L);
|
|
for (size_t i = 0; i < fake_pub_keys.size(); ++i)
|
|
fake_pub_keys[i] = hash_helper_t::hp(i * c_point_G);
|
|
|
|
ring_mapping.resize(N / 2);
|
|
for (size_t i = 0; i < N / 2; ++i)
|
|
ring_mapping[i] = i;
|
|
|
|
std::shuffle(ring_mapping.begin(), ring_mapping.end(), crypto::uniform_random_bit_generator());
|
|
|
|
ring.resize(N / 2);
|
|
for (size_t i = 0; i < ring.size(); ++i)
|
|
{
|
|
if (i < L)
|
|
{
|
|
// own keys
|
|
ring[ring_mapping[i]] = secret_keys[i] * c_point_G;
|
|
}
|
|
else
|
|
{
|
|
// fake keys
|
|
ring[ring_mapping[i]] = fake_pub_keys[i - L];
|
|
}
|
|
}
|
|
|
|
ring_mapping.resize(L);
|
|
|
|
key_images.resize(L);
|
|
for (size_t i = 0; i < L; ++i)
|
|
key_images[i] = hash_helper_t::hp(ring[ring_mapping[i]]) / secret_keys[i];
|
|
|
|
return true;
|
|
}
|
|
|
|
bool generate_test_ring_and_sec_keys(size_t N, size_t L, std::vector<crypto::public_key>& ring, std::vector<crypto::secret_key>& secret_keys,
|
|
std::vector<size_t>& ring_mapping, std::vector<crypto::key_image> & key_images)
|
|
{
|
|
secret_keys.resize(L);
|
|
for (size_t i = 0; i < L; ++i)
|
|
secret_keys[i] = scalar_t::random().as_secret_key();
|
|
|
|
std::vector<point_t> fake_pub_keys(N / 2 - L);
|
|
for (size_t i = 0; i < fake_pub_keys.size(); ++i)
|
|
fake_pub_keys[i] = hash_helper_t::hp(i * c_point_G);
|
|
|
|
ring_mapping.resize(N / 2);
|
|
for (size_t i = 0; i < N / 2; ++i)
|
|
ring_mapping[i] = i;
|
|
|
|
std::shuffle(ring_mapping.begin(), ring_mapping.end(), crypto::uniform_random_bit_generator());
|
|
|
|
ring.resize(N / 2);
|
|
for (size_t i = 0; i < ring.size(); ++i)
|
|
{
|
|
if (i < L)
|
|
{
|
|
// own keys
|
|
ring[ring_mapping[i]] = (secret_keys[i] * c_point_G).to_public_key();
|
|
}
|
|
else
|
|
{
|
|
// fake keys
|
|
ring[ring_mapping[i]] = fake_pub_keys[i - L].to_public_key();
|
|
}
|
|
}
|
|
|
|
ring_mapping.resize(L);
|
|
|
|
key_images.resize(L);
|
|
for (size_t i = 0; i < L; ++i)
|
|
key_images[i] = (hash_helper_t::hp(ring[ring_mapping[i]]) / secret_keys[i]).to_key_image();
|
|
|
|
return true;
|
|
}
|
|
|
|
uint64_t hash_64(const void* data, size_t size)
|
|
{
|
|
crypto::hash h = crypto::cn_fast_hash(data, size);
|
|
uint64_t* phash_as_array = (uint64_t*)&h;
|
|
return phash_as_array[0] ^ phash_as_array[1] ^ phash_as_array[2] ^ phash_as_array[3];
|
|
}
|
|
|
|
|
|
|
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
/*
|
|
* tiny facade to gtest-alike interface to make simplier further tests transfer to unit_tests
|
|
*/
|
|
#define TEST(test_name_a, test_name_b) \
|
|
static bool test_name_a ## _ ## test_name_b(); \
|
|
static test_keeper_t test_name_a ## _ ## test_name_b ## _ ## keeper(STR(COMBINE(test_name_a ## _, test_name_b)), & test_name_a ## _ ## test_name_b); \
|
|
static bool test_name_a ## _ ## test_name_b()
|
|
#define ASSERT_TRUE(expr) CHECK_AND_ASSERT_MES(expr, false, "This is not true: " #expr)
|
|
#define ASSERT_FALSE(expr) CHECK_AND_ASSERT_MES((expr) == false, false, "This is not false: " #expr)
|
|
#define ASSERT_EQ(a, b) CHECK_AND_ASSERT_MES(a == b, false, #a " != " #b "\n " << a << " != " << b)
|
|
|
|
typedef bool(*bool_func_ptr_t)();
|
|
static std::vector<std::pair<std::string, bool_func_ptr_t>> g_tests;
|
|
struct test_keeper_t
|
|
{
|
|
test_keeper_t(const char* name, bool_func_ptr_t func_p)
|
|
{
|
|
g_tests.push_back(std::make_pair(name, func_p));
|
|
}
|
|
};
|
|
|
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
#include "L2S.h"
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
//
|
|
// Tests
|
|
//
|
|
|
|
#include "crypto_tests_performance.h"
|
|
|
|
|
|
TEST(crypto, ge_scalarmult_vartime_p3)
|
|
{
|
|
// make sure that my ge_scalarmult_vartime_p3 gives the same result as ge_scalarmul_p3
|
|
|
|
size_t N = 5000;
|
|
std::vector<point_t> points;
|
|
points.push_back(0 * c_point_G);
|
|
points.push_back(1 * c_point_G);
|
|
points.push_back(c_scalar_Lm1 * c_point_G);
|
|
points.push_back(c_scalar_L * c_point_G);
|
|
points.push_back((c_scalar_L + 1) * c_point_G);
|
|
size_t i = points.size();
|
|
points.resize(N); // should have kept previously added points
|
|
ASSERT_EQ(points[0], points[3]);
|
|
ASSERT_EQ(points[1], points[4]);
|
|
|
|
for (; i < points.size(); ++i)
|
|
{
|
|
if (i & 1)
|
|
points[i] = scalar_t::random() * c_point_G;
|
|
else
|
|
points[i] = hash_helper_t::hp(points[i - 1]);
|
|
}
|
|
|
|
for (size_t j = 0; j < points.size(); ++j)
|
|
{
|
|
scalar_t r;
|
|
r.make_random();
|
|
|
|
point_t A;
|
|
ge_scalarmult_p3(&A.m_p3, r.data(), &points[j].m_p3);
|
|
|
|
point_t B;
|
|
ge_scalarmult_vartime_p3(&B.m_p3, r.data(), &points[j].m_p3);
|
|
|
|
ASSERT_EQ(A, B);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
size_t find_pos_hash(const boost::multiprecision::uint256_t& L_div_D, const currency::wide_difficulty_type& D, const uint64_t amount,
|
|
uint64_t& kernel, scalar_t& d0, uint64_t& d1)
|
|
{
|
|
static const boost::multiprecision::uint256_t c_L_w = c_scalar_L.as_boost_mp_type<boost::multiprecision::uint256_t>();
|
|
|
|
crypto::generate_random_bytes(sizeof kernel, &kernel);
|
|
|
|
const boost::multiprecision::uint512_t L_div_D_mul_v = boost::multiprecision::uint512_t(L_div_D) * amount;
|
|
scalar_t L_div_D_mul_v_sc;
|
|
if (L_div_D_mul_v < c_L_w)
|
|
L_div_D_mul_v_sc = scalar_t(L_div_D_mul_v); // here we assured that L_div_D_mul_v < 2**256
|
|
else
|
|
L_div_D_mul_v_sc = scalar_t(c_L_w); // too small D or too big amount, so any h would go
|
|
|
|
size_t i = 0;
|
|
for (; i < 1000000; ++i)
|
|
{
|
|
scalar_t h = hash_helper_t::hs(&kernel, sizeof kernel);
|
|
if (h < L_div_D_mul_v_sc)
|
|
{
|
|
// found!
|
|
boost::multiprecision::uint512_t h_w = h.as_boost_mp_type<boost::multiprecision::uint512_t>();
|
|
boost::multiprecision::uint512_t d0_w = h_w / amount * D;
|
|
ASSERT_TRUE(d0_w < c_L_w);
|
|
d0 = scalar_t(d0_w);
|
|
|
|
boost::multiprecision::uint512_t ddv = (d0_w / D) * amount;
|
|
ASSERT_TRUE(h_w < ddv);
|
|
if (h_w == ddv)
|
|
{
|
|
ASSERT_TRUE(false);
|
|
}
|
|
|
|
boost::multiprecision::uint512_t d1_w = ddv - h_w;
|
|
ASSERT_TRUE(d1_w <= UINT64_MAX);
|
|
|
|
d1 = d1_w.convert_to<uint64_t>();
|
|
break;
|
|
}
|
|
++kernel;
|
|
}
|
|
|
|
return i;
|
|
}
|
|
|
|
TEST(crypto, pos)
|
|
{
|
|
//scalar_t D = 10000000000000001u;
|
|
scalar_t D = 13042196742415129u; // prime number
|
|
currency::wide_difficulty_type D_w = D.as_boost_mp_type<boost::multiprecision::uint256_t>().convert_to<currency::wide_difficulty_type>();
|
|
uint64_t amount = 1000000000000;
|
|
size_t count_old = 0;
|
|
size_t count_new = 0;
|
|
size_t count_3 = 0;
|
|
scalar_t x;
|
|
x.make_random();
|
|
|
|
const boost::multiprecision::uint512_t c_2_pow_256_m1(std::numeric_limits<boost::multiprecision::uint256_t>::max());
|
|
|
|
|
|
const boost::multiprecision::uint256_t c_L_w = c_scalar_L.as_boost_mp_type<boost::multiprecision::uint256_t>();
|
|
const boost::multiprecision::uint256_t c_L_div_D_w = c_L_w / D_w;
|
|
boost::multiprecision::uint512_t h_tres = c_L_div_D_w * amount;
|
|
|
|
currency::wide_difficulty_type final_diff = D_w / amount;
|
|
|
|
boost::multiprecision::uint512_t Lv = boost::multiprecision::uint512_t(c_L_w) * amount;
|
|
|
|
constexpr uint64_t COIN = 1000000000000;
|
|
const uint64_t amounts[] = {
|
|
COIN / 100,
|
|
COIN / 50,
|
|
COIN / 20,
|
|
COIN / 10,
|
|
COIN / 5,
|
|
COIN / 2,
|
|
COIN * 1,
|
|
COIN * 2,
|
|
COIN * 5,
|
|
COIN * 10,
|
|
COIN * 20,
|
|
COIN * 50,
|
|
COIN * 100,
|
|
COIN * 200,
|
|
COIN * 500,
|
|
COIN * 1000,
|
|
COIN * 2000,
|
|
COIN * 5000,
|
|
COIN * 10000,
|
|
COIN * 20000,
|
|
COIN * 50000,
|
|
COIN * 100000,
|
|
COIN * 200000,
|
|
COIN * 500000
|
|
};
|
|
|
|
uint64_t kernel = 0;
|
|
scalar_t d0 = 0;
|
|
uint64_t d1 = 0;
|
|
|
|
|
|
/*
|
|
for (size_t i = 0, size = sizeof pos_diffs / sizeof pos_diffs[0]; i < size; ++i)
|
|
{
|
|
auto& D = pos_diffs[i].difficulty;
|
|
boost::multiprecision::uint256_t L_dvi_D = c_L_w / D;
|
|
|
|
for (size_t j = 0, size_j = sizeof amounts / sizeof amounts[0]; j < size_j; ++j)
|
|
{
|
|
uint64_t amount = rand_in_range(amounts[j], amounts[j] + amounts[j] / 10);
|
|
size_t iter = find_pos_hash(L_dvi_D, D, amount, kernel, d0, d1);
|
|
LOG_PRINT_L0(i << ", " << amount << ", " << iter);
|
|
}
|
|
}
|
|
*/
|
|
|
|
return true;
|
|
}
|
|
|
|
struct sig_check_t
|
|
{
|
|
crypto::hash prefix_hash;
|
|
crypto::key_image ki;
|
|
std::vector<crypto::public_key> pub_keys;
|
|
std::vector<const crypto::public_key*> pub_keys_p;
|
|
crypto::secret_key xi;
|
|
size_t secret_key_index;
|
|
std::vector<crypto::signature> sigs;
|
|
|
|
sig_check_t()
|
|
{}
|
|
|
|
void prepare_random_data(size_t decoy_set_size)
|
|
{
|
|
crypto::public_key Pi;
|
|
crypto::generate_keys(Pi, xi);
|
|
|
|
crypto::generate_random_bytes(sizeof prefix_hash, &prefix_hash);
|
|
|
|
for (size_t i = 0; i + 1 < decoy_set_size; ++i)
|
|
{
|
|
crypto::public_key p;
|
|
crypto::secret_key s;
|
|
crypto::generate_keys(p, s);
|
|
pub_keys.push_back(p);
|
|
}
|
|
|
|
secret_key_index = rand_in_range(0, pub_keys.size());
|
|
pub_keys.insert(pub_keys.begin() + secret_key_index, Pi);
|
|
|
|
for (auto& pk : pub_keys)
|
|
pub_keys_p.push_back(&pk);
|
|
|
|
crypto::generate_key_image(Pi, xi, ki);
|
|
|
|
sigs.resize(pub_keys.size());
|
|
}
|
|
|
|
void generate()
|
|
{
|
|
crypto::generate_ring_signature(prefix_hash, ki, pub_keys_p, xi, secret_key_index, sigs.data());
|
|
}
|
|
|
|
bool check()
|
|
{
|
|
return crypto::check_ring_signature(prefix_hash, ki, pub_keys_p, sigs.data());
|
|
}
|
|
};
|
|
|
|
|
|
TEST(crypto, ring_sigs)
|
|
{
|
|
return true;
|
|
size_t n = 1000;
|
|
size_t decoy_set_size = 8;
|
|
|
|
std::cout << "using decoy set with size = " << decoy_set_size << std::endl;
|
|
|
|
std::vector<sig_check_t> sigs;
|
|
sigs.resize(n);
|
|
|
|
for (size_t i = 0; i < sigs.size(); ++i)
|
|
sigs[i].prepare_random_data(decoy_set_size);
|
|
|
|
std::cout << n << " random sigs prepared" << std::endl;
|
|
|
|
bool r = true;
|
|
|
|
TIME_MEASURE_START(gen_mcs);
|
|
for (size_t i = 0; i < sigs.size(); ++i)
|
|
{
|
|
sigs[i].generate();
|
|
}
|
|
TIME_MEASURE_FINISH(gen_mcs);
|
|
|
|
std::cout << n << " random sigs generated in " << gen_mcs / 1000 << " s" << std::endl;
|
|
|
|
TIME_MEASURE_START(check_mcs);
|
|
for (size_t i = 0; i < sigs.size(); ++i)
|
|
{
|
|
if (!sigs[i].check())
|
|
{
|
|
r = false;
|
|
break;
|
|
}
|
|
}
|
|
TIME_MEASURE_FINISH(check_mcs);
|
|
|
|
ASSERT_TRUE(r);
|
|
|
|
std::cout << n << " random sigs checked:" << std::endl;
|
|
std::cout << " " << std::right << std::setw(8) << gen_mcs / 1000 << " ms for generation total" << std::endl;
|
|
std::cout << " " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << double(gen_mcs) / n << " mcs for generating per one signature" << std::endl;
|
|
std::cout << " " << std::right << std::setw(8) << check_mcs / 1000 << " ms for checking total" << std::endl;
|
|
std::cout << " " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << double(check_mcs) / n << " mcs for checking per one signature" << std::endl;
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, keys)
|
|
{
|
|
// keypair: sk: 407b3b73df8f11737494bdde6ca47a42e1b537390aec2fa781a2d170335c440f
|
|
// pk: 1b546af91d31fdb1c476fd62fbb65b6fd5ed47804185fc77d48bc4cc00f47ef0
|
|
|
|
bool r = false;
|
|
crypto::public_key pk;
|
|
r = epee::string_tools::parse_tpod_from_hex_string("1b546af91d31fdb1c476fd62fbb65b6fd5ed47804185fc77d48bc4cc00f47ef0", pk);
|
|
ASSERT_TRUE(r);
|
|
|
|
crypto::secret_key sk;
|
|
r = epee::string_tools::parse_tpod_from_hex_string("407b3b73df8f11737494bdde6ca47a42e1b537390aec2fa781a2d170335c440f", sk);
|
|
ASSERT_TRUE(r);
|
|
|
|
crypto::public_key pk2;
|
|
r = crypto::secret_key_to_public_key(sk, pk2);
|
|
ASSERT_TRUE(r);
|
|
|
|
std::cout << pk << std::endl;
|
|
std::cout << pk2 << std::endl;
|
|
|
|
ASSERT_EQ(pk, pk2);
|
|
ASSERT_TRUE(crypto::check_key(pk));
|
|
ASSERT_TRUE(crypto::check_key(pk2));
|
|
|
|
std::cout << std::endl;
|
|
|
|
crypto::generate_keys(pk, sk);
|
|
r = crypto::secret_key_to_public_key(sk, pk2);
|
|
ASSERT_TRUE(r);
|
|
|
|
ASSERT_EQ(pk, pk2);
|
|
|
|
ASSERT_TRUE(crypto::check_key(pk));
|
|
ASSERT_TRUE(crypto::check_key(pk2));
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
TEST(crypto, scalar_basics)
|
|
{
|
|
scalar_t zero = 0;
|
|
ASSERT_TRUE(zero.is_zero());
|
|
scalar_t one = 1;
|
|
ASSERT_FALSE(one.is_zero());
|
|
ASSERT_TRUE(one > zero);
|
|
ASSERT_TRUE(one.muladd(zero, zero) == zero);
|
|
|
|
scalar_t z = 0;
|
|
for (size_t j = 0; j < 1000; ++j)
|
|
{
|
|
z.make_random();
|
|
ASSERT_FALSE(z.is_zero());
|
|
ASSERT_TRUE(z.is_reduced());
|
|
ASSERT_TRUE(z > z - 1);
|
|
ASSERT_TRUE(z < z + 1);
|
|
ASSERT_TRUE(z.muladd(one, zero) == z);
|
|
ASSERT_TRUE(z.muladd(zero, one) == one);
|
|
ASSERT_TRUE(z.muladd(z, z) == z * z + z);
|
|
}
|
|
|
|
ASSERT_TRUE(c_scalar_L > 0 && !(c_scalar_L < 0));
|
|
ASSERT_TRUE(c_scalar_Lm1 > 0 && !(c_scalar_Lm1 < 0));
|
|
ASSERT_TRUE(c_scalar_Lm1 < c_scalar_L);
|
|
ASSERT_FALSE(c_scalar_Lm1 > c_scalar_L);
|
|
ASSERT_TRUE(c_scalar_P > c_scalar_Pm1);
|
|
ASSERT_FALSE(c_scalar_P < c_scalar_Pm1);
|
|
|
|
std::cout << "0 = " << zero << std::endl;
|
|
std::cout << "1 = " << one << std::endl;
|
|
std::cout << "L = " << c_scalar_L << std::endl;
|
|
std::cout << "L-1 = " << c_scalar_Lm1 << std::endl;
|
|
std::cout << "P = " << c_scalar_P << std::endl;
|
|
std::cout << "P-1 = " << c_scalar_Pm1 << std::endl;
|
|
std::cout << std::endl;
|
|
|
|
// check rolling over L for scalars arithmetics
|
|
ASSERT_EQ(c_scalar_Lm1 + 1, 0);
|
|
ASSERT_EQ(scalar_t(0) - 1, c_scalar_Lm1);
|
|
ASSERT_EQ(c_scalar_Lm1 * 2, c_scalar_Lm1 - 1); // (L - 1) * 2 = L + L - 2 = (L - 1) - 1 (mod L)
|
|
ASSERT_EQ(c_scalar_Lm1 * 100, c_scalar_Lm1 - 99);
|
|
ASSERT_EQ(c_scalar_Lm1 * c_scalar_Lm1, 1); // (L - 1) * (L - 1) = L*L - 2L + 1 = 1 (mod L)
|
|
ASSERT_EQ(c_scalar_Lm1 * (c_scalar_Lm1 - 1) * c_scalar_Lm1, c_scalar_Lm1 - 1);
|
|
ASSERT_EQ(c_scalar_L * c_scalar_L, 0);
|
|
|
|
ASSERT_EQ(scalar_t(3) / c_scalar_Lm1, scalar_t(3) * c_scalar_Lm1); // because (L - 1) ^ 2 = 1
|
|
|
|
// check is_reduced
|
|
ASSERT_TRUE(c_scalar_Lm1.is_reduced());
|
|
ASSERT_FALSE(c_scalar_L.is_reduced());
|
|
scalar_t p = c_scalar_L;
|
|
ASSERT_FALSE(p.is_reduced());
|
|
p = p + 1;
|
|
ASSERT_TRUE(p.is_reduced());
|
|
p = 0;
|
|
p = p + c_scalar_P;
|
|
ASSERT_TRUE(p.is_reduced());
|
|
mp::uint256_t mp_p_mod_l = c_scalar_P.as_boost_mp_type<mp::uint256_t>() % c_scalar_L.as_boost_mp_type<mp::uint256_t>();
|
|
ASSERT_EQ(p, scalar_t(mp_p_mod_l));
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, sc_mul_performance)
|
|
{
|
|
std::vector<scalar_t> scalars(100000);
|
|
for (auto& s : scalars)
|
|
s.make_random();
|
|
|
|
scalar_t m = 1;
|
|
|
|
TIME_MEASURE_START(t);
|
|
for (auto& s : scalars)
|
|
m *= s;
|
|
TIME_MEASURE_FINISH(t);
|
|
|
|
std::cout << m << std::endl;
|
|
|
|
LOG_PRINT_L0("sc_mul: " << std::fixed << std::setprecision(3) << t / 1000.0 << " ms");
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, hp)
|
|
{
|
|
bool r = false;
|
|
scalar_t sk;
|
|
r = epee::string_tools::parse_tpod_from_hex_string("407b3b73df8f11737494bdde6ca47a42e1b537390aec2fa781a2d170335c440f", sk);
|
|
ASSERT_TRUE(r);
|
|
crypto::public_key pk;
|
|
r = epee::string_tools::parse_tpod_from_hex_string("1b546af91d31fdb1c476fd62fbb65b6fd5ed47804185fc77d48bc4cc00f47ef0", pk);
|
|
ASSERT_TRUE(r);
|
|
|
|
point_t P;
|
|
ASSERT_TRUE(P.from_public_key(pk));
|
|
// make sure pk and sk are pair
|
|
ASSERT_EQ(P, sk * c_point_G);
|
|
|
|
// make sure generate_key_image does the same as sk * hash_helper::hp(pk)
|
|
crypto::key_image ki;
|
|
crypto::generate_key_image(pk, sk.as_secret_key(), ki);
|
|
point_t KI;
|
|
ASSERT_TRUE(KI.from_public_key((crypto::public_key&)ki)); // key image is a point
|
|
|
|
ASSERT_EQ(KI, sk * hash_helper_t::hp(P));
|
|
|
|
LOG_PRINT_L0(sk.as_secret_key() << " * G = " << P);
|
|
|
|
point_t P1 = hash_helper_t::hp(P);
|
|
LOG_PRINT_L0("Hp(" << P << ") = " << P1);
|
|
ASSERT_EQ(P1, point_from_str("f9506848342ddb23b014e5975462757f5d296a6acfa0e9837ff940f7655becdb"));
|
|
|
|
point_t P100 = P;
|
|
for (size_t i = 0; i < 100; ++i)
|
|
P100 = hash_helper_t::hp(P100);
|
|
|
|
ASSERT_EQ(P100, point_from_str("925f195fc629fa15f768c775f7eed3a43dcd45c702974d161eb610a9ab9df4f0"));
|
|
|
|
|
|
crypto::hash hash;
|
|
crypto::cn_fast_hash(sk.data(), sizeof sk, hash);
|
|
|
|
LOG_PRINT_L0("cn_fast_hash(" << sk.as_secret_key() << ") = " << hash);
|
|
ASSERT_EQ(hash, hash_from_str("ee05b0f64eebf20da306eec142da99283154316391caf474be41ff010afb4298"));
|
|
|
|
crypto::cn_fast_hash(nullptr, 0, hash);
|
|
LOG_PRINT_L0("cn_fast_hash('') = " << hash);
|
|
ASSERT_EQ(hash, hash_from_str("c5d2460186f7233c927e7db2dcc703c0e500b653ca82273b7bfad8045d85a470"));
|
|
|
|
scalar_t z(hash);
|
|
point_t zG = z * c_point_G;
|
|
LOG_PRINT_L0("cn_fast_hash('') * G = " << zG.to_public_key() << " (pub_key)");
|
|
ASSERT_EQ(zG, point_from_str("7849297236cd7c0d6c69a3c8c179c038d3c1c434735741bb3c8995c3c9d6f2ac"));
|
|
|
|
crypto::cn_fast_hash("zano", 4, hash);
|
|
LOG_PRINT_L0("cn_fast_hash('zano') = " << hash);
|
|
ASSERT_EQ(hash, hash_from_str("23cea10abfdf3ace0b7132291d51e4eb5a392afb2147e67f907ff4f8f5dd4f9f"));
|
|
|
|
z = hash;
|
|
zG = z * c_point_G;
|
|
LOG_PRINT_L0("cn_fast_hash('zano') * G = " << zG.to_public_key() << " (pub_key)");
|
|
ASSERT_EQ(zG, point_from_str("71407d59e9d671fa02f26a6a7f4726c3087d8f1732453396638a1dc2929fb57a"));
|
|
|
|
char buf[2000];
|
|
for (size_t i = 0; i < sizeof buf; i += 4)
|
|
*(uint32_t*)&buf[i] = *(uint32_t*)"zano";
|
|
crypto::cn_fast_hash(buf, sizeof buf, (char*)&hash);
|
|
LOG_PRINT_L0("cn_fast_hash('zano' x 500) = " << hash);
|
|
ASSERT_EQ(hash, hash_from_str("16d87120c601a6ef3e4ffa5e58176a36b814288199f23ec09ef178c554e8879b"));
|
|
|
|
z = hash;
|
|
zG = z * c_point_G;
|
|
LOG_PRINT_L0("cn_fast_hash('zano' x 500) * G = " << zG.to_public_key() << " (pub_key)");
|
|
ASSERT_EQ(zG, point_from_str("dd93067a02fb8661aa64504ac1503402a34426f43650d970c35147cec4b61d55"));
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, cn_fast_hash_perf)
|
|
{
|
|
//return true;
|
|
const crypto::hash h_initial = *(crypto::hash*)(&scalar_t::random());
|
|
|
|
std::vector<std::vector<uint8_t>> test_data;
|
|
test_data.push_back(std::vector<uint8_t>(32, 0));
|
|
test_data.push_back(std::vector<uint8_t>(63, 0));
|
|
test_data.push_back(std::vector<uint8_t>(127, 0));
|
|
test_data.push_back(std::vector<uint8_t>(135, 0));
|
|
test_data.push_back(std::vector<uint8_t>(255, 0));
|
|
test_data.push_back(std::vector<uint8_t>(271, 0)); // 271 = 136 * 2 - 1
|
|
test_data.push_back(std::vector<uint8_t>(2030, 0));
|
|
|
|
for (size_t j = 0, sz = test_data.size(); j < sz; ++j)
|
|
crypto::generate_random_bytes(test_data[j].size(), test_data[j].data());
|
|
|
|
struct times_t
|
|
{
|
|
uint64_t t_old{ 0 }, t_new{ 0 };
|
|
crypto::hash h_old{};
|
|
double diff{ 0 };
|
|
};
|
|
std::vector<times_t> results(test_data.size());
|
|
|
|
size_t n = 50000;
|
|
double diff_sum = 0;
|
|
|
|
for (size_t k = 0; k < 50; ++k)
|
|
{
|
|
for (size_t j = 0, sz = test_data.size(); j < sz; ++j)
|
|
{
|
|
crypto::hash h = h_initial;
|
|
TIME_MEASURE_START(t_old);
|
|
for (size_t i = 0; i < n; ++i)
|
|
{
|
|
*(crypto::hash*)(test_data[j].data()) = h;
|
|
cn_fast_hash_old(test_data[j].data(), test_data[j].size(), (char*)&h);
|
|
}
|
|
TIME_MEASURE_FINISH(t_old);
|
|
results[j].t_old = t_old;
|
|
results[j].h_old = h;
|
|
}
|
|
|
|
for (size_t j = 0, sz = test_data.size(); j < sz; ++j)
|
|
{
|
|
crypto::hash h = h_initial;
|
|
TIME_MEASURE_START(t_new);
|
|
for (size_t i = 0; i < n; ++i)
|
|
{
|
|
*(crypto::hash*)(test_data[j].data()) = h;
|
|
cn_fast_hash(test_data[j].data(), test_data[j].size(), (char*)&h);
|
|
}
|
|
TIME_MEASURE_FINISH(t_new);
|
|
results[j].t_new = t_new;
|
|
ASSERT_EQ(h, results[j].h_old);
|
|
}
|
|
|
|
std::stringstream ss;
|
|
double diff_round = 0;
|
|
for (size_t j = 0, sz = test_data.size(); j < sz; ++j)
|
|
{
|
|
double diff = ((int64_t)results[j].t_old - (int64_t)results[j].t_new) / (double)n;
|
|
|
|
ss << std::fixed << std::setprecision(3) << results[j].t_old / (double)n << "/" <<
|
|
std::fixed << std::setprecision(3) << results[j].t_new / (double)n << " ";
|
|
|
|
results[j].diff += diff;
|
|
diff_round += diff;
|
|
}
|
|
|
|
diff_sum += diff_round;
|
|
|
|
LOG_PRINT_L0("cn_fast_hash (old/new) [" << std::setw(2) << k << "]: " << ss.str() << " mcs, diff_round = " << std::fixed << std::setprecision(4) << diff_round <<
|
|
" diff_sum = " << std::fixed << std::setprecision(4) << diff_sum);
|
|
}
|
|
|
|
std::stringstream ss;
|
|
for (size_t j = 0, sz = results.size(); j < sz; ++j)
|
|
ss << std::fixed << std::setprecision(4) << results[j].diff << " ";
|
|
LOG_PRINT_L0(" " << ss.str());
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
TEST(crypto, sc_invert_performance)
|
|
{
|
|
std::vector<scalar_t> scalars(10000);
|
|
LOG_PRINT_L0("Running " << scalars.size() << " sc_invert tests...");
|
|
|
|
for (auto& s : scalars)
|
|
{
|
|
s.make_random();
|
|
scalar_t a, b;
|
|
sc_invert(&a.m_s[0], &s.m_s[0]);
|
|
sc_invert2(&b.m_s[0], &s.m_s[0]);
|
|
ASSERT_EQ(a, b);
|
|
}
|
|
|
|
std::vector<scalar_t> results_0(scalars.size());
|
|
std::vector<scalar_t> results_1(scalars.size());
|
|
std::vector<scalar_t> results_2(scalars.size());
|
|
|
|
for (size_t j = 0; j < 10; ++j)
|
|
{
|
|
LOG_PRINT_L0("Run #" << j);
|
|
|
|
// warm-up
|
|
for (size_t i = 0; i < scalars.size(); ++i)
|
|
sc_invert(&results_0[i].m_s[0], &scalars[i].m_s[0]);
|
|
|
|
TIME_MEASURE_START(t_1);
|
|
for (size_t i = 0; i < scalars.size(); ++i)
|
|
sc_invert(&results_1[i].m_s[0], &scalars[i].m_s[0]);
|
|
TIME_MEASURE_FINISH(t_1);
|
|
|
|
TIME_MEASURE_START(t_2);
|
|
for (size_t i = 0; i < scalars.size(); ++i)
|
|
sc_invert(&results_2[i].m_s[0], &scalars[i].m_s[0]);
|
|
TIME_MEASURE_FINISH(t_2);
|
|
|
|
LOG_PRINT_L0("sc_invert: " << std::fixed << std::setprecision(3) << 1.0 * t_1 / scalars.size() << " mcs " << (t_1 < t_2 ? "WIN" : ""));
|
|
LOG_PRINT_L0("sc_invert2: " << std::fixed << std::setprecision(3) << 1.0 * t_2 / scalars.size() << " mcs " << (t_1 < t_2 ? "" : " WIN"));
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, scalar_arithmetic_assignment)
|
|
{
|
|
std::vector<scalar_t> scalars(1000);
|
|
scalar_t mm = 1, sum = 0;
|
|
for (auto& s : scalars)
|
|
{
|
|
s.make_random();
|
|
mm /= s;
|
|
sum += s;
|
|
}
|
|
ASSERT_TRUE(!mm.is_zero() && mm != scalar_t(1));
|
|
ASSERT_TRUE(!sum.is_zero());
|
|
std::shuffle(scalars.begin(), scalars.end(), crypto::uniform_random_bit_generator());
|
|
for (auto& s : scalars)
|
|
{
|
|
mm *= s;
|
|
sum -= s;
|
|
}
|
|
ASSERT_EQ(mm, 1);
|
|
ASSERT_EQ(sum, 0);
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, point_basics)
|
|
{
|
|
scalar_t s = 4;
|
|
point_t E = s * c_point_G;
|
|
point_t X = 4 * E;
|
|
point_t K = 193847 * c_point_G;
|
|
point_t C = E + K;
|
|
|
|
ASSERT_EQ(X, 16 * c_point_G);
|
|
ASSERT_EQ(C - K, E);
|
|
ASSERT_EQ(C - E, K);
|
|
ASSERT_EQ(C, (193847 + 4) * c_point_G);
|
|
|
|
ASSERT_EQ(c_point_G / 1, 1 * c_point_G);
|
|
ASSERT_EQ(C / 3, E / 3 + K / 3);
|
|
//ASSERT_EQ(K, 61 * (K / (61)));
|
|
//ASSERT_EQ(K, 192847 * (K / scalar_t(192847)));
|
|
ASSERT_EQ(K, 61 * (283 * (192847 * (K / (192847ull * 283 * 61)))));
|
|
|
|
ASSERT_EQ(E, c_point_G + c_point_G + c_point_G + c_point_G);
|
|
ASSERT_EQ(E - c_point_G, 3 * c_point_G);
|
|
|
|
for (size_t i = 0; i < 1000; ++i)
|
|
{
|
|
E = hash_helper_t::hp(E);
|
|
point_t Z = 0 * E;
|
|
ASSERT_TRUE(Z.is_zero());
|
|
scalar_t rnd;
|
|
rnd.make_random();
|
|
Z = rnd * E;
|
|
Z = Z - E;
|
|
Z = Z - (rnd - 1) * E;
|
|
ASSERT_TRUE(Z.is_zero());
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, neg_identity)
|
|
{
|
|
point_t z = c_point_0; // 0 group element (identity)
|
|
public_key z_pk = z.to_public_key(); // pub key, corresponding to 0 ge (pub key is not zero bitwise)
|
|
public_key z_neg_pk = z_pk;
|
|
((unsigned char*)&z_neg_pk)[31] = 0x80; // set sign bit manually
|
|
std::cout << "-Identity = " << z_pk << ENDL;
|
|
point_t z_neg;
|
|
ASSERT_FALSE(z_neg.from_public_key(z_neg_pk)); // negative identity should not be loaded
|
|
|
|
key_image z_ki;
|
|
memset(&z_ki, 0, sizeof(z_ki));
|
|
((unsigned char*)&z_ki)[00] = 0x01; // y = 1
|
|
|
|
ASSERT_TRUE(validate_key_image(z_ki));
|
|
|
|
key_image z_neg_ki = z_ki;
|
|
((unsigned char*)&z_neg_ki)[31] = 0x80; // set sign bit manually
|
|
|
|
ASSERT_FALSE(validate_key_image(z_neg_ki)); // negative identity should not be loaded
|
|
|
|
|
|
// also do zero-byte pub key / key image checks
|
|
|
|
public_key zzz_pk;
|
|
memset(&zzz_pk, 0, sizeof public_key);
|
|
|
|
ASSERT_TRUE(check_key(zzz_pk));
|
|
|
|
point_t zzz;
|
|
ASSERT_TRUE(zzz.from_public_key(zzz_pk));
|
|
ASSERT_FALSE(zzz.is_in_main_subgroup());
|
|
|
|
key_image zzz_ki;
|
|
memset(&zzz_ki, 0, sizeof key_image);
|
|
|
|
ASSERT_FALSE(validate_key_image(zzz_ki));
|
|
|
|
point_t zzz2;
|
|
ASSERT_TRUE(zzz2.from_key_image(zzz_ki));
|
|
ASSERT_FALSE(zzz2.is_in_main_subgroup());
|
|
ASSERT_EQ(zzz, zzz2);
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(crypto, scalar_reciprocal)
|
|
{
|
|
int64_t test_nums[] = { 1, 2, 10 };
|
|
|
|
for (size_t i = 0; i < sizeof test_nums / sizeof test_nums[0]; ++i)
|
|
{
|
|
scalar_t s = test_nums[i];
|
|
scalar_t z = s - s;
|
|
ASSERT_TRUE(z.is_zero());
|
|
}
|
|
|
|
scalar_t s = 20;
|
|
scalar_t d = 5;
|
|
scalar_t e = s / d;
|
|
scalar_t m = e * d;
|
|
|
|
ASSERT_TRUE(m == s);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
TEST(crypto, scalars)
|
|
{
|
|
scalar_t s = 20;
|
|
scalar_t d = 5;
|
|
scalar_t e = s / d;
|
|
scalar_t m = e * d;
|
|
|
|
ASSERT_TRUE(m == s);
|
|
|
|
return true;
|
|
}
|
|
|
|
//
|
|
// ML2S tests
|
|
//
|
|
|
|
TEST(ml2s, rsum)
|
|
{
|
|
// Ref: Rsum(3, 8, [1, 2, 3, 4, 5, 6, 7, 8], { 1: 1, 2 : 2, 3 : 3 }, { 1: 4, 2 : 5 }) == 659
|
|
|
|
point_t A = scalar_t::random() * c_point_G;
|
|
point_t result;
|
|
|
|
bool r = ml2s_rsum(3, std::vector<point_t>{ A, 2 * A, 3 * A, 4 * A, 5 * A, 6 * A, 7 * A, 8 * A },
|
|
std::vector<scalar_t>{ 1, 2, 3 }, std::vector<scalar_t>{ 4, 5 }, result);
|
|
ASSERT_TRUE(r);
|
|
ASSERT_EQ(result, 659 * A);
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(ml2s, hs)
|
|
{
|
|
mp::uint512_t L = c_scalar_L.as_boost_mp_type<mp::uint512_t>();
|
|
L *= 15;
|
|
mp::uint256_t c_256_bit_max = ((mp::uint512_t(1) << 256) - 1).convert_to<mp::uint256_t>();
|
|
std::cout << std::hex << c_256_bit_max << ENDL;
|
|
|
|
ASSERT_TRUE(L < c_256_bit_max);
|
|
|
|
scalar_t L15(L);
|
|
|
|
scalar_t k = epee::string_tools::hex_to_pod<scalar_t>("deefd263cbfed62a3711dd133df3ccbd1c4dc4aac21d7405fd667498bf8ebaa1");
|
|
std::cout << k << ENDL;
|
|
std::cout << k.to_string_as_secret_key() << ENDL;
|
|
mp::uint256_t kw = k.as_boost_mp_type<mp::uint256_t>();
|
|
sc_reduce32(k.m_s);
|
|
std::cout << k << ENDL;
|
|
std::cout << k.to_string_as_secret_key() << ENDL;
|
|
|
|
std::cout << kw << ENDL;
|
|
kw = kw % c_scalar_L.as_boost_mp_type<mp::uint256_t>();
|
|
std::cout << kw << ENDL;
|
|
|
|
|
|
for (size_t i = 0; i < 100000; ++i)
|
|
{
|
|
scalar_t x, y;
|
|
crypto::generate_random_bytes(32, y.m_s);
|
|
x = y;
|
|
memset(x.m_s + 18, 0xff, 13);
|
|
sc_reduce32(x.m_s);
|
|
uint64_t lo = *(uint64_t*)(x.m_s + 18);
|
|
uint64_t hi = *(uint64_t*)(x.m_s + 26) & 0xffffffffff;
|
|
ASSERT_EQ(lo, 0xffffffffffffffff);
|
|
ASSERT_EQ(hi, 0xffffffffff);
|
|
}
|
|
|
|
|
|
scalar_t x = 2, p = 250;
|
|
//sc_exp(r.data(), x.data(), p.data());
|
|
|
|
x = 0;
|
|
|
|
crypto::hash h;
|
|
scalar_t r;
|
|
|
|
sha3(0, 0, &h, sizeof h);
|
|
LOG_PRINT("SHA3() -> " << h, LOG_LEVEL_0);
|
|
LOG_PRINT("SHA3() -> " << (scalar_t&)h, LOG_LEVEL_0);
|
|
|
|
h = crypto::cn_fast_hash(0, 0);
|
|
LOG_PRINT("CN() -> " << h, LOG_LEVEL_0);
|
|
LOG_PRINT("CN() -> " << (scalar_t&)h, LOG_LEVEL_0);
|
|
|
|
std::string abc("abc");
|
|
sha3(abc.c_str(), abc.size(), &h, sizeof h);
|
|
LOG_PRINT("SHA3(" << abc << ") -> " << h, LOG_LEVEL_0);
|
|
LOG_PRINT("SHA3(" << abc << ") -> " << (scalar_t&)h, LOG_LEVEL_0);
|
|
|
|
h = crypto::cn_fast_hash(abc.c_str(), abc.size());
|
|
LOG_PRINT("CN(" << abc << ") -> " << h, LOG_LEVEL_0);
|
|
LOG_PRINT("CN(" << abc << ") -> " << (scalar_t&)h, LOG_LEVEL_0);
|
|
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(ml2s, hsc)
|
|
{
|
|
hash_helper_t::hs_t hsc;
|
|
hsc.add_point(c_point_G);
|
|
LOG_PRINT_L0("hsc(G) = " << hsc.calc_hash().as_secret_key());
|
|
|
|
hsc.add_point(c_point_G);
|
|
hsc.add_scalar(scalar_from_str("0b2900d8eaf9996d2c5345833b280ef93be5c6881dc26f89ecad7a86441cc10e"));
|
|
hsc.add_point(c_point_G);
|
|
LOG_PRINT_L0("hsc(GsG) = " << hsc.calc_hash().as_secret_key());
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
TEST(ml2s, py2cpp)
|
|
{
|
|
// verify a signature generated by python's reference code
|
|
|
|
std::vector<point_t> B_array = { point_from_str("2f1132ca61ab38dff00f2fea3228f24c6c71d58085b80e47e19515cb27e8d047"), point_from_str("5866666666666666666666666666666666666666666666666666666666666666") };
|
|
ml2s_signature sig;
|
|
sig.z = scalar_from_str("0b2900d8eaf9996d2c5345833b280ef93be5c6881dc26f89ecad7a86441cc10e");
|
|
{
|
|
ml2s_signature_element e;
|
|
e.H_array = { point_from_str("de6169b6f9e4e3dcf450c87f5f9cc5954db82fea3a0afccf285ffff0590cc343"), point_from_str("0d09ad5376090d844afde60f7b0ba78e8010987724e76eeb1f73d490e26ef114") };
|
|
e.T = point_from_str("8df512bbe80238bbb5579e41caab69f209c35560f03a7fdde5d1369b059e38f8");
|
|
e.T0 = point_from_str("fb973d514bb0df3f2bb30038dfe50164a9cd48ef6e7b9ac7a253cbc328f214ab");
|
|
e.Z = point_from_str("27b77c99771a4d8198fd5ebcfae71dc063bd2286006fb9f4a72b72dbcf552c30");
|
|
e.Z0 = point_from_str("a6dd57fcfb5d00c9ad866df931732df491fa0dde14ac76a817399fc2e212666d");
|
|
e.r_array = { scalar_from_str("12921a30105714028187e9ecccf2106d04f6e08dbe7d07001fe3e93a1ffa6e04"), scalar_from_str("fbe2fb0ff0481309db53791b77557eab7359d6cf8274d8dac6ad5092075ec009") };
|
|
e.t = scalar_from_str("002fca7de8af4c57b94b4b49ba2792644dddf09baf729fe31be1c265d2df2e0e");
|
|
e.t0 = scalar_from_str("e0c20ec9adbb047d3b26f8073b49e21e700b9bfe6601b6565ec5ec0e83ad230a");
|
|
sig.elements.emplace_back(e);
|
|
}
|
|
{
|
|
ml2s_signature_element e;
|
|
e.H_array = { point_from_str("661f05591cc6e0a42bc94b5f9d45318248051368306bc199d555306598c6330a"), point_from_str("5281aa630ee6e7ef9af5d758fd98fbf72680e8a97e3329827c9ba24577b06aea") };
|
|
e.T = point_from_str("97463bbf9bf49474853e4e68bb927b8aeb53472b33315930583887ee63d0e341");
|
|
e.T0 = point_from_str("e4877f4e8a9dd8a57955a13a66a2ced96f3e7f2a64ff40beef9641ad4eecbf91");
|
|
e.Z = point_from_str("24a64d04e530772d23a3455047b89569fe796d002dc3d40b57f2ab350eddff47");
|
|
e.Z0 = point_from_str("8db841a90faac3c019f42824fac7177505ca9fb51a21ba0fd8d4112ec9dd9e89");
|
|
e.r_array = { scalar_from_str("52038eb19d0eaffe10cc379ce5a739557adccf4a95ccf77c3159c71d2f166b0f"), scalar_from_str("aebb28319c552708ad2495802a3f585780ae1286146d6e5a845e3074607c0a03") };
|
|
e.t = scalar_from_str("285a411ddcf56747fe11f5053ec3bff7617ad3ed9c6f1929874d90d91fb7680a");
|
|
e.t0 = scalar_from_str("44552f3136dbee1b5b63d4a1a9d8799aed54ddd75ed9ebdf6de0a6e032ac7505");
|
|
sig.elements.emplace_back(e);
|
|
}
|
|
|
|
scalar_t m = 31337;
|
|
|
|
uint8_t err = 0;
|
|
bool r = ml2s_lnk_sig_verif(m, B_array, sig, &err);
|
|
|
|
ASSERT_TRUE(r);
|
|
|
|
return true;
|
|
}
|
|
|
|
std::string ml2s_sig_to_python(const std::vector<point_t>& B_array, const ml2s_signature& sig, const std::vector<point_t>& I_array)
|
|
{
|
|
std::string str;
|
|
if (B_array.empty() || sig.elements.empty())
|
|
return str;
|
|
|
|
auto points_array_to_dict = [](const std::vector<point_t>& v) -> std::string
|
|
{
|
|
std::string s;
|
|
size_t idx = 1;
|
|
for (auto& p : v)
|
|
s += epee::string_tools::num_to_string_fast(idx++) + ": ed25519.Point('" + p.to_string() + "'), ";
|
|
if (s.size() > 2)
|
|
s.erase(s.end() - 2, s.end());
|
|
return s;
|
|
};
|
|
|
|
auto points_array_to_array = [](const std::vector<point_t>& v) -> std::string
|
|
{
|
|
std::string s;
|
|
for (auto& p : v)
|
|
s += "ed25519.Point('" + p.to_string() + "'), ";
|
|
if (s.size() > 2)
|
|
s.erase(s.end() - 2, s.end());
|
|
return s;
|
|
};
|
|
|
|
auto scalars_array_to_dict = [](const std::vector<scalar_t>& v) -> std::string
|
|
{
|
|
std::string s;
|
|
size_t idx = 1;
|
|
for (auto& p : v)
|
|
s += epee::string_tools::num_to_string_fast(idx++) + ": 0x" + p.to_string_as_hex_number() + ", ";
|
|
if (s.size() > 2)
|
|
s.erase(s.end() - 2, s.end());
|
|
return s;
|
|
};
|
|
|
|
std::string indent = " ";
|
|
|
|
str += indent + "B_array = [ ";
|
|
for (auto& B : B_array)
|
|
str += std::string("ed25519.Point('") + B.to_string() + "'), ";
|
|
str.erase(str.end() - 2, str.end());
|
|
str += " ]\n";
|
|
|
|
str += indent + "signature = (0x" + sig.z.to_string_as_hex_number() + ", [\n";
|
|
for (size_t i = 0; i < sig.elements.size(); ++i)
|
|
{
|
|
const auto& sel = sig.elements[i];
|
|
str += indent + indent + "{\n";
|
|
str += indent + indent + indent + "'H' : { " + points_array_to_dict(sel.H_array) + " },\n";
|
|
str += indent + indent + indent + "'T' : ed25519.Point('" + sel.T.to_string() + "'),\n";
|
|
str += indent + indent + indent + "'T0' : ed25519.Point('" + sel.T0.to_string() + "'),\n";
|
|
str += indent + indent + indent + "'Z' : ed25519.Point('" + sel.Z.to_string() + "'),\n";
|
|
str += indent + indent + indent + "'Z0' : ed25519.Point('" + sel.Z0.to_string() + "'),\n";
|
|
str += indent + indent + indent + "'r' : { " + scalars_array_to_dict(sel.r_array) + " },\n";
|
|
str += indent + indent + indent + "'t' : 0x" + sel.t.to_string_as_hex_number() + ",\n";
|
|
str += indent + indent + indent + "'t0' : 0x" + sel.t0.to_string_as_hex_number() + "\n";
|
|
str += indent + indent + "},\n";
|
|
}
|
|
str.erase(str.end() - 2, str.end());
|
|
str += "\n";
|
|
str += indent + "])\n";
|
|
str += "\n";
|
|
|
|
str += indent + "I_reference = [ " + points_array_to_array(I_array) + " ]\n";
|
|
|
|
return str;
|
|
}
|
|
|
|
TEST(ml2s, cpp2py)
|
|
{
|
|
// Generate a random sig and python code to check it
|
|
scalar_t m;
|
|
m.make_random();
|
|
size_t n = 8;
|
|
size_t N = 1ull << n;
|
|
size_t L = 8;
|
|
|
|
// generate a signature
|
|
|
|
std::vector<point_t> ring;
|
|
std::vector<scalar_t> secret_keys;
|
|
std::vector<size_t> ring_mapping;
|
|
std::vector<point_t> key_images;
|
|
generate_test_ring_and_sec_keys(N, L, ring, secret_keys, ring_mapping, key_images);
|
|
|
|
ml2s_signature sig;
|
|
ASSERT_TRUE(ml2s_lnk_sig_gen(m, ring, secret_keys, ring_mapping, sig));
|
|
|
|
ASSERT_TRUE(ml2s_lnk_sig_verif(m, ring, sig, nullptr, &key_images));
|
|
|
|
// generate Python code
|
|
|
|
std::string str, indent = " ";
|
|
str += "import ed25519\n";
|
|
str += "import L2S\n";
|
|
str += "\n";
|
|
str += "def check_sig():\n";
|
|
str += ml2s_sig_to_python(ring, sig, key_images);
|
|
str += indent + "m = 0x" + m.to_string_as_hex_number() + "\n";
|
|
str += indent + "result = L2S.mL2SLnkSig_Verif(len(B_array) * 2, B_array, m, signature)\n";
|
|
str += indent + "print(f\"Verif returned : {result}\")\n";
|
|
str += indent + "\n";
|
|
str += indent + "if result != I_reference:\n";
|
|
str += indent + indent + "print(\"ERROR: Key images don't match\")\n";
|
|
str += indent + indent + "return False\n";
|
|
str += indent + "\n";
|
|
str += indent + "return True\n";
|
|
str += "\n";
|
|
str += "if check_sig():\n";
|
|
str += indent + "print(\"Signature verified, key images matched\")\n";
|
|
|
|
epee::file_io_utils::save_string_to_file("ml2s_sig_check_test.py", str);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
TEST(ml2s, sig_verif_performance)
|
|
{
|
|
// sig inputs
|
|
scalar_t m = 31337;
|
|
size_t n = 8;
|
|
size_t N = 1ull << n;
|
|
size_t L = 8;
|
|
|
|
// perf counters
|
|
uint64_t t_sig = 0;
|
|
uint64_t t_verif = 0;
|
|
size_t tests_cnt = 20;
|
|
|
|
LOG_PRINT_L0("N / 2 = " << N / 2 << ", L = " << L);
|
|
for (size_t p = 0; p < tests_cnt; ++p)
|
|
{
|
|
std::vector<point_t> ring;
|
|
std::vector<scalar_t> secret_keys;
|
|
std::vector<size_t> ring_mapping;
|
|
std::vector<point_t> key_images;
|
|
generate_test_ring_and_sec_keys(N, L, ring, secret_keys, ring_mapping, key_images);
|
|
|
|
ml2s_signature sig;
|
|
uint8_t err = 0;
|
|
TIME_MEASURE_START(time_sig);
|
|
bool r = ml2s_lnk_sig_gen(m, ring, secret_keys, ring_mapping, sig, &err);
|
|
TIME_MEASURE_FINISH(time_sig);
|
|
t_sig += time_sig;
|
|
ASSERT_TRUE(r);
|
|
|
|
err = 0;
|
|
TIME_MEASURE_START(time_verif);
|
|
r = ml2s_lnk_sig_verif(m, ring, sig, &err);
|
|
TIME_MEASURE_FINISH(time_verif);
|
|
t_verif += time_verif;
|
|
ASSERT_TRUE(r);
|
|
|
|
LOG_PRINT_L0(" stats over " << p + 1 << " runs:");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_gen avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_sig / double(p + 1) / 1000.0 << " ms");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_verif avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_verif / double(p + 1) / 1000.0 << " ms");
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(ml2s, sig_verif_performance_2)
|
|
{
|
|
// sig inputs
|
|
scalar_t m = 31337;
|
|
crypto::hash mh = crypto::cn_fast_hash(&m, sizeof m);
|
|
size_t n = 8;
|
|
size_t N = 1ull << n;
|
|
size_t L = 1;
|
|
|
|
// perf counters
|
|
uint64_t t_sig = 0;
|
|
uint64_t t_verif = 0;
|
|
uint64_t t_sig_v2 = 0;
|
|
uint64_t t_verif_v2 = 0;
|
|
uint64_t t_sig_v3 = 0;
|
|
uint64_t t_verif_v3 = 0;
|
|
size_t tests_cnt = 200;
|
|
|
|
LOG_PRINT_L0("N / 2 = " << N / 2 << ", L = " << L);
|
|
for (size_t p = 0; p < tests_cnt; ++p)
|
|
{
|
|
std::vector<point_t> ring;
|
|
std::vector<scalar_t> secret_keys;
|
|
std::vector<size_t> ring_mapping;
|
|
std::vector<point_t> key_images;
|
|
generate_test_ring_and_sec_keys(N, L, ring, secret_keys, ring_mapping, key_images);
|
|
|
|
ml2s_signature sig;
|
|
uint8_t err = 0;
|
|
TIME_MEASURE_START(time_sig);
|
|
bool r = ml2s_lnk_sig_gen(m, ring, secret_keys, ring_mapping, sig, &err);
|
|
TIME_MEASURE_FINISH(time_sig);
|
|
t_sig += time_sig;
|
|
ASSERT_TRUE(r);
|
|
|
|
err = 0;
|
|
TIME_MEASURE_START(time_verif);
|
|
r = ml2s_lnk_sig_verif(m, ring, sig, &err);
|
|
TIME_MEASURE_FINISH(time_verif);
|
|
t_verif += time_verif;
|
|
ASSERT_TRUE(r);
|
|
|
|
///////////////////////////
|
|
// v2
|
|
ml2s_signature_v2 sig_v2;
|
|
err = 0;
|
|
TIME_MEASURE_START(time_sig_v2);
|
|
r = ml2s_lnk_sig_gen_v2(m, ring, secret_keys, ring_mapping, key_images, sig_v2, &err);
|
|
TIME_MEASURE_FINISH(time_sig_v2);
|
|
t_sig_v2 += time_sig_v2;
|
|
ASSERT_TRUE(r);
|
|
|
|
err = 0;
|
|
TIME_MEASURE_START(time_verif_v2);
|
|
r = ml2s_lnk_sig_verif_v2(m, ring, key_images, sig_v2, &err);
|
|
TIME_MEASURE_FINISH(time_verif_v2);
|
|
t_verif_v2 += time_verif_v2;
|
|
ASSERT_TRUE(r);
|
|
|
|
///////////////////////////
|
|
// v3
|
|
{
|
|
std::vector<crypto::public_key> ring;
|
|
std::vector<crypto::secret_key> secret_keys;
|
|
std::vector<size_t> ring_mapping;
|
|
std::vector<crypto::key_image> key_images;
|
|
generate_test_ring_and_sec_keys(N, L, ring, secret_keys, ring_mapping, key_images);
|
|
|
|
ml2s_signature_v3 sig_v3;
|
|
err = 0;
|
|
TIME_MEASURE_START(time_sig_v3);
|
|
r = ml2s_lnk_sig_gen_v3(mh, ring, secret_keys, ring_mapping, key_images, sig_v3, &err);
|
|
TIME_MEASURE_FINISH(time_sig_v3);
|
|
t_sig_v3 += time_sig_v3;
|
|
ASSERT_TRUE(r);
|
|
|
|
err = 0;
|
|
TIME_MEASURE_START(time_verif_v3);
|
|
r = ml2s_lnk_sig_verif_v3(mh, ring, key_images, sig_v3, &err);
|
|
TIME_MEASURE_FINISH(time_verif_v3);
|
|
t_verif_v3 += time_verif_v3;
|
|
ASSERT_TRUE(r);
|
|
}
|
|
|
|
|
|
LOG_PRINT_L0(" stats over " << p + 1 << " runs:");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_gen avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_sig / double(p + 1) / 1000.0 << " ms");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_gen_v2 avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_sig_v2 / double(p + 1) / 1000.0 << " ms");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_gen_v3 avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_sig_v3 / double(p + 1) / 1000.0 << " ms");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_verif avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_verif / double(p + 1) / 1000.0 << " ms");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_verif_v2 avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_verif_v2 / double(p + 1) / 1000.0 << " ms");
|
|
LOG_PRINT_L0("ml2s_lnk_sig_verif_v3 avg: " << std::right << std::setw(8) << std::fixed << std::setprecision(1) << t_verif_v3 / double(p + 1) / 1000.0 << " ms");
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
TEST(crypto, hex_tools)
|
|
{
|
|
ASSERT_EQ(parse_tpod_from_hex_string<uint8_t>("00"), 0x00);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<uint8_t>("01"), 0x01);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<uint8_t>("f1"), 0xf1);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<uint8_t>("fe"), 0xfe);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<uint64_t>("efcdab8967452301"), 0x0123456789abcdef);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<uint64_t>("0123456789abcdef"), 0xefcdab8967452301);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<scalar_t>("ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f"), c_scalar_Pm1);
|
|
ASSERT_EQ(parse_tpod_from_hex_string<scalar_t>("792fdce229e50661d0da1c7db39dd30700000000000000000000000000000006"), c_scalar_1div8);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
TEST(crypto, calc_lsb_32)
|
|
{
|
|
auto local_calc_lsb = [](uint32_t v) {
|
|
uint8_t r = 0;
|
|
while (v != 0 && (v & 1) == 0)
|
|
{
|
|
v >>= 1;
|
|
++r;
|
|
}
|
|
return r;
|
|
};
|
|
|
|
for (uint32_t x = 0; x < UINT32_MAX; ++x)
|
|
{
|
|
if (x % 10000000 == 0)
|
|
std::cout << x << ENDL;
|
|
ASSERT_EQ((int)local_calc_lsb(x), (int)calc_lsb_32(x));
|
|
}
|
|
ASSERT_EQ((int)local_calc_lsb(UINT32_MAX), (int)calc_lsb_32(UINT32_MAX));
|
|
|
|
return true;
|
|
}
|
|
|
|
//
|
|
// test's runner
|
|
//
|
|
|
|
bool wildcard_match(const std::string& needle, const std::string& haystack)
|
|
{
|
|
size_t h = 0;
|
|
for (size_t n = 0; n < needle.size(); ++n)
|
|
{
|
|
switch (needle[n])
|
|
{
|
|
case '?':
|
|
if (h == haystack.size())
|
|
return false;
|
|
++h;
|
|
break;
|
|
case '*':
|
|
if (n + 1 == needle.size())
|
|
return true;
|
|
for (size_t i = 0; i + h < haystack.size(); i++)
|
|
if (wildcard_match(needle.substr(n + 1), haystack.substr(h + i)))
|
|
return true;
|
|
return false;
|
|
default:
|
|
if (haystack[h] != needle[n])
|
|
return false;
|
|
++h;
|
|
}
|
|
}
|
|
return h == haystack.size();
|
|
}
|
|
|
|
int crypto_tests(const std::string& cmd_line_param)
|
|
{
|
|
epee::log_space::get_set_log_detalisation_level(true, LOG_LEVEL_3);
|
|
epee::log_space::log_singletone::add_logger(LOGGER_CONSOLE, NULL, NULL, LOG_LEVEL_3);
|
|
epee::log_space::log_singletone::add_logger(LOGGER_FILE,
|
|
epee::log_space::log_singletone::get_default_log_file().c_str(),
|
|
epee::log_space::log_singletone::get_default_log_folder().c_str());
|
|
|
|
|
|
|
|
std::vector<size_t> failed_tests;
|
|
for (size_t i = 0; i < g_tests.size(); ++i)
|
|
{
|
|
auto& test = g_tests[i];
|
|
|
|
if (!wildcard_match(cmd_line_param.c_str(), test.first.c_str()))
|
|
continue;
|
|
|
|
LOG_PRINT(" " << std::setw(40) << std::left << test.first << " >", LOG_LEVEL_0);
|
|
TIME_MEASURE_START(runtime);
|
|
bool r = false;
|
|
try
|
|
{
|
|
r = test.second();
|
|
}
|
|
catch (std::exception& e)
|
|
{
|
|
LOG_PRINT_RED("EXCEPTION: " << e.what(), LOG_LEVEL_0);
|
|
}
|
|
catch (...)
|
|
{
|
|
LOG_PRINT_RED("EXCEPTION: unknown", LOG_LEVEL_0);
|
|
}
|
|
TIME_MEASURE_FINISH(runtime);
|
|
uint64_t runtime_ms = runtime / 1000;
|
|
uint64_t runtime_mcs = runtime % 1000;
|
|
if (r)
|
|
{
|
|
LOG_PRINT_GREEN(" " << std::setw(40) << std::left << test.first << "OK [" << runtime_ms << "." << std::setw(3) << std::setfill('0') << runtime_mcs << " ms]", LOG_LEVEL_0);
|
|
}
|
|
else
|
|
{
|
|
LOG_PRINT_RED(ENDL << " " << std::setw(40) << std::left << test.first << "FAILED" << ENDL, LOG_LEVEL_0);
|
|
failed_tests.push_back(i);
|
|
}
|
|
}
|
|
|
|
if (failed_tests.empty())
|
|
{
|
|
LOG_PRINT_GREEN(ENDL, LOG_LEVEL_0);
|
|
LOG_PRINT_GREEN("All tests passed okay", LOG_LEVEL_0);
|
|
return 0;
|
|
}
|
|
|
|
LOG_PRINT_RED_L0(ENDL);
|
|
LOG_PRINT_RED_L0(ENDL << "Failed tests:");
|
|
for (size_t i : failed_tests)
|
|
{
|
|
LOG_PRINT_RED_L0(g_tests[i].first);
|
|
}
|
|
|
|
return 1;
|
|
}
|