2016-05-13 19:45:20 +00:00
|
|
|
// Copyright (c) 2016, Monero Research Labs
|
|
|
|
//
|
|
|
|
// Author: Shen Noether <shen.noether@gmx.com>
|
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
2017-11-25 22:25:05 +00:00
|
|
|
#include <boost/lexical_cast.hpp>
|
2016-06-24 16:46:24 +00:00
|
|
|
#include "misc_log_ex.h"
|
2016-05-13 19:45:20 +00:00
|
|
|
#include "rctOps.h"
|
|
|
|
using namespace crypto;
|
|
|
|
using namespace std;
|
|
|
|
|
Change logging to easylogging++
This replaces the epee and data_loggers logging systems with
a single one, and also adds filename:line and explicit severity
levels. Categories may be defined, and logging severity set
by category (or set of categories). epee style 0-4 log level
maps to a sensible severity configuration. Log files now also
rotate when reaching 100 MB.
To select which logs to output, use the MONERO_LOGS environment
variable, with a comma separated list of categories (globs are
supported), with their requested severity level after a colon.
If a log matches more than one such setting, the last one in
the configuration string applies. A few examples:
This one is (mostly) silent, only outputting fatal errors:
MONERO_LOGS=*:FATAL
This one is very verbose:
MONERO_LOGS=*:TRACE
This one is totally silent (logwise):
MONERO_LOGS=""
This one outputs all errors and warnings, except for the
"verify" category, which prints just fatal errors (the verify
category is used for logs about incoming transactions and
blocks, and it is expected that some/many will fail to verify,
hence we don't want the spam):
MONERO_LOGS=*:WARNING,verify:FATAL
Log levels are, in decreasing order of priority:
FATAL, ERROR, WARNING, INFO, DEBUG, TRACE
Subcategories may be added using prefixes and globs. This
example will output net.p2p logs at the TRACE level, but all
other net* logs only at INFO:
MONERO_LOGS=*:ERROR,net*:INFO,net.p2p:TRACE
Logs which are intended for the user (which Monero was using
a lot through epee, but really isn't a nice way to go things)
should use the "global" category. There are a few helper macros
for using this category, eg: MGINFO("this shows up by default")
or MGINFO_RED("this is red"), to try to keep a similar look
and feel for now.
Existing epee log macros still exist, and map to the new log
levels, but since they're used as a "user facing" UI element
as much as a logging system, they often don't map well to log
severities (ie, a log level 0 log may be an error, or may be
something we want the user to see, such as an important info).
In those cases, I tried to use the new macros. In other cases,
I left the existing macros in. When modifying logs, it is
probably best to switch to the new macros with explicit levels.
The --log-level options and set_log commands now also accept
category settings, in addition to the epee style log levels.
2017-01-01 16:34:23 +00:00
|
|
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
|
|
|
#define MONERO_DEFAULT_LOG_CATEGORY "ringct"
|
|
|
|
|
2017-03-22 21:26:38 +00:00
|
|
|
#define CHECK_AND_ASSERT_THROW_MES_L1(expr, message) {if(!(expr)) {MWARNING(message); throw std::runtime_error(message);}}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
namespace rct {
|
|
|
|
|
|
|
|
//Various key initialization functions
|
|
|
|
|
|
|
|
//initializes a key matrix;
|
|
|
|
//first parameter is rows,
|
|
|
|
//second is columns
|
2016-10-23 15:10:17 +00:00
|
|
|
keyM keyMInit(size_t rows, size_t cols) {
|
2016-05-13 19:45:20 +00:00
|
|
|
keyM rv(cols);
|
2016-10-23 15:10:17 +00:00
|
|
|
size_t i = 0;
|
2016-05-13 19:45:20 +00:00
|
|
|
for (i = 0 ; i < cols ; i++) {
|
|
|
|
rv[i] = keyV(rows);
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//Various key generation functions
|
|
|
|
|
2018-06-29 14:03:00 +00:00
|
|
|
bool toPointCheckOrder(ge_p3 *P, const unsigned char *data)
|
|
|
|
{
|
|
|
|
if (ge_frombytes_vartime(P, data))
|
|
|
|
return false;
|
|
|
|
ge_p2 R;
|
|
|
|
ge_scalarmult(&R, curveOrder().bytes, P);
|
|
|
|
key tmp;
|
|
|
|
ge_tobytes(tmp.bytes, &R);
|
|
|
|
return tmp == identity();
|
|
|
|
}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
//generates a random scalar which can be used as a secret key or mask
|
|
|
|
void skGen(key &sk) {
|
2018-07-04 21:17:20 +00:00
|
|
|
random32_unbiased(sk.bytes);
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
//generates a random scalar which can be used as a secret key or mask
|
|
|
|
key skGen() {
|
2018-07-04 21:17:20 +00:00
|
|
|
key sk;
|
|
|
|
skGen(sk);
|
2016-05-13 19:45:20 +00:00
|
|
|
return sk;
|
|
|
|
}
|
|
|
|
|
|
|
|
//Generates a vector of secret key
|
|
|
|
//Mainly used in testing
|
2016-10-23 15:10:17 +00:00
|
|
|
keyV skvGen(size_t rows ) {
|
2017-12-12 11:08:11 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES(rows > 0, "0 keys requested");
|
2016-05-13 19:45:20 +00:00
|
|
|
keyV rv(rows);
|
2016-10-23 15:10:17 +00:00
|
|
|
size_t i = 0;
|
2016-05-13 19:45:20 +00:00
|
|
|
for (i = 0 ; i < rows ; i++) {
|
2018-07-04 21:17:20 +00:00
|
|
|
skGen(rv[i]);
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
//generates a random curve point (for testing)
|
|
|
|
key pkGen() {
|
|
|
|
key sk = skGen();
|
|
|
|
key pk = scalarmultBase(sk);
|
|
|
|
return pk;
|
|
|
|
}
|
|
|
|
|
|
|
|
//generates a random secret and corresponding public key
|
|
|
|
void skpkGen(key &sk, key &pk) {
|
|
|
|
skGen(sk);
|
|
|
|
scalarmultBase(pk, sk);
|
|
|
|
}
|
|
|
|
|
|
|
|
//generates a random secret and corresponding public key
|
|
|
|
tuple<key, key> skpkGen() {
|
|
|
|
key sk = skGen();
|
|
|
|
key pk = scalarmultBase(sk);
|
|
|
|
return make_tuple(sk, pk);
|
|
|
|
}
|
|
|
|
|
2016-07-09 18:30:28 +00:00
|
|
|
//generates C =aG + bH from b, a is given..
|
|
|
|
void genC(key & C, const key & a, xmr_amount amount) {
|
|
|
|
key bH = scalarmultH(d2h(amount));
|
|
|
|
addKeys1(C, a, bH);
|
|
|
|
}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
//generates a <secret , public> / Pedersen commitment to the amount
|
|
|
|
tuple<ctkey, ctkey> ctskpkGen(xmr_amount amount) {
|
|
|
|
ctkey sk, pk;
|
|
|
|
skpkGen(sk.dest, pk.dest);
|
|
|
|
skpkGen(sk.mask, pk.mask);
|
|
|
|
key am = d2h(amount);
|
2016-06-02 18:03:35 +00:00
|
|
|
key bH = scalarmultH(am);
|
|
|
|
addKeys(pk.mask, pk.mask, bH);
|
2016-05-13 19:45:20 +00:00
|
|
|
return make_tuple(sk, pk);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//generates a <secret , public> / Pedersen commitment but takes bH as input
|
2016-10-23 15:10:17 +00:00
|
|
|
tuple<ctkey, ctkey> ctskpkGen(const key &bH) {
|
2016-05-13 19:45:20 +00:00
|
|
|
ctkey sk, pk;
|
|
|
|
skpkGen(sk.dest, pk.dest);
|
|
|
|
skpkGen(sk.mask, pk.mask);
|
|
|
|
addKeys(pk.mask, pk.mask, bH);
|
|
|
|
return make_tuple(sk, pk);
|
|
|
|
}
|
|
|
|
|
2016-06-15 21:47:09 +00:00
|
|
|
key zeroCommit(xmr_amount amount) {
|
|
|
|
key am = d2h(amount);
|
|
|
|
key bH = scalarmultH(am);
|
2018-06-06 09:05:14 +00:00
|
|
|
return addKeys(G, bH);
|
2016-06-15 21:47:09 +00:00
|
|
|
}
|
|
|
|
|
2016-10-23 15:10:17 +00:00
|
|
|
key commit(xmr_amount amount, const key &mask) {
|
|
|
|
key c = scalarmultBase(mask);
|
2016-06-15 21:47:09 +00:00
|
|
|
key am = d2h(amount);
|
|
|
|
key bH = scalarmultH(am);
|
2016-10-23 15:10:17 +00:00
|
|
|
addKeys(c, c, bH);
|
|
|
|
return c;
|
2016-06-15 21:47:09 +00:00
|
|
|
}
|
|
|
|
|
2016-06-02 18:03:35 +00:00
|
|
|
//generates a random uint long long (for testing)
|
2016-05-13 19:45:20 +00:00
|
|
|
xmr_amount randXmrAmount(xmr_amount upperlimit) {
|
|
|
|
return h2d(skGen()) % (upperlimit);
|
|
|
|
}
|
|
|
|
|
|
|
|
//Scalar multiplications of curve points
|
|
|
|
|
|
|
|
//does a * G where a is a scalar and G is the curve basepoint
|
|
|
|
void scalarmultBase(key &aG,const key &a) {
|
|
|
|
ge_p3 point;
|
|
|
|
sc_reduce32copy(aG.bytes, a.bytes); //do this beforehand!
|
|
|
|
ge_scalarmult_base(&point, aG.bytes);
|
|
|
|
ge_p3_tobytes(aG.bytes, &point);
|
|
|
|
}
|
|
|
|
|
|
|
|
//does a * G where a is a scalar and G is the curve basepoint
|
|
|
|
key scalarmultBase(const key & a) {
|
|
|
|
ge_p3 point;
|
|
|
|
key aG;
|
|
|
|
sc_reduce32copy(aG.bytes, a.bytes); //do this beforehand
|
|
|
|
ge_scalarmult_base(&point, aG.bytes);
|
|
|
|
ge_p3_tobytes(aG.bytes, &point);
|
|
|
|
return aG;
|
|
|
|
}
|
|
|
|
|
|
|
|
//does a * P where a is a scalar and P is an arbitrary point
|
|
|
|
void scalarmultKey(key & aP, const key &P, const key &a) {
|
|
|
|
ge_p3 A;
|
|
|
|
ge_p2 R;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&A, P.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_scalarmult(&R, a.bytes, &A);
|
|
|
|
ge_tobytes(aP.bytes, &R);
|
|
|
|
}
|
|
|
|
|
|
|
|
//does a * P where a is a scalar and P is an arbitrary point
|
|
|
|
key scalarmultKey(const key & P, const key & a) {
|
|
|
|
ge_p3 A;
|
|
|
|
ge_p2 R;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&A, P.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_scalarmult(&R, a.bytes, &A);
|
|
|
|
key aP;
|
|
|
|
ge_tobytes(aP.bytes, &R);
|
|
|
|
return aP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//Computes aH where H= toPoint(cn_fast_hash(G)), G the basepoint
|
|
|
|
key scalarmultH(const key & a) {
|
|
|
|
ge_p2 R;
|
2018-05-24 19:14:09 +00:00
|
|
|
ge_scalarmult(&R, a.bytes, &ge_p3_H);
|
2016-05-13 19:45:20 +00:00
|
|
|
key aP;
|
|
|
|
ge_tobytes(aP.bytes, &R);
|
|
|
|
return aP;
|
|
|
|
}
|
|
|
|
|
2018-08-06 15:21:07 +00:00
|
|
|
//Computes 8P
|
|
|
|
key scalarmult8(const key & P) {
|
|
|
|
ge_p3 p3;
|
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&p3, P.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
|
|
|
ge_p2 p2;
|
|
|
|
ge_p3_to_p2(&p2, &p3);
|
|
|
|
ge_p1p1 p1;
|
|
|
|
ge_mul8(&p1, &p2);
|
|
|
|
ge_p1p1_to_p2(&p2, &p1);
|
|
|
|
rct::key res;
|
|
|
|
ge_tobytes(res.bytes, &p2);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2018-06-29 14:03:00 +00:00
|
|
|
//Computes aL where L is the curve order
|
|
|
|
bool isInMainSubgroup(const key & a) {
|
|
|
|
ge_p3 p3;
|
|
|
|
return toPointCheckOrder(&p3, a.bytes);
|
|
|
|
}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
//Curve addition / subtractions
|
|
|
|
|
|
|
|
//for curve points: AB = A + B
|
|
|
|
void addKeys(key &AB, const key &A, const key &B) {
|
|
|
|
ge_p3 B2, A2;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&B2, B.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&A2, A.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_cached tmp2;
|
|
|
|
ge_p3_to_cached(&tmp2, &B2);
|
|
|
|
ge_p1p1 tmp3;
|
|
|
|
ge_add(&tmp3, &A2, &tmp2);
|
|
|
|
ge_p1p1_to_p3(&A2, &tmp3);
|
|
|
|
ge_p3_tobytes(AB.bytes, &A2);
|
|
|
|
}
|
|
|
|
|
2017-11-21 14:13:20 +00:00
|
|
|
rct::key addKeys(const key &A, const key &B) {
|
|
|
|
key k;
|
|
|
|
addKeys(k, A, B);
|
|
|
|
return k;
|
|
|
|
}
|
2016-05-13 19:45:20 +00:00
|
|
|
|
2018-06-24 20:59:49 +00:00
|
|
|
rct::key addKeys(const keyV &A) {
|
|
|
|
if (A.empty())
|
|
|
|
return rct::identity();
|
|
|
|
ge_p3 p3, tmp;
|
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&p3, A[0].bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
|
|
|
for (size_t i = 1; i < A.size(); ++i)
|
|
|
|
{
|
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&tmp, A[i].bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
|
|
|
ge_cached p2;
|
|
|
|
ge_p3_to_cached(&p2, &tmp);
|
|
|
|
ge_p1p1 p1;
|
|
|
|
ge_add(&p1, &p3, &p2);
|
|
|
|
ge_p1p1_to_p3(&p3, &p1);
|
|
|
|
}
|
|
|
|
rct::key res;
|
|
|
|
ge_p3_tobytes(res.bytes, &p3);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
//addKeys1
|
|
|
|
//aGB = aG + B where a is a scalar, G is the basepoint, and B is a point
|
|
|
|
void addKeys1(key &aGB, const key &a, const key & B) {
|
|
|
|
key aG = scalarmultBase(a);
|
|
|
|
addKeys(aGB, aG, B);
|
|
|
|
}
|
|
|
|
|
|
|
|
//addKeys2
|
|
|
|
//aGbB = aG + bB where a, b are scalars, G is the basepoint and B is a point
|
|
|
|
void addKeys2(key &aGbB, const key &a, const key &b, const key & B) {
|
|
|
|
ge_p2 rv;
|
|
|
|
ge_p3 B2;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&B2, B.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_double_scalarmult_base_vartime(&rv, b.bytes, &B2, a.bytes);
|
|
|
|
ge_tobytes(aGbB.bytes, &rv);
|
|
|
|
}
|
|
|
|
|
|
|
|
//Does some precomputation to make addKeys3 more efficient
|
|
|
|
// input B a curve point and output a ge_dsmp which has precomputation applied
|
|
|
|
void precomp(ge_dsmp rv, const key & B) {
|
|
|
|
ge_p3 B2;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&B2, B.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_dsm_precomp(rv, &B2);
|
|
|
|
}
|
|
|
|
|
|
|
|
//addKeys3
|
|
|
|
//aAbB = a*A + b*B where a, b are scalars, A, B are curve points
|
|
|
|
//B must be input after applying "precomp"
|
|
|
|
void addKeys3(key &aAbB, const key &a, const key &A, const key &b, const ge_dsmp B) {
|
|
|
|
ge_p2 rv;
|
|
|
|
ge_p3 A2;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&A2, A.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_double_scalarmult_precomp_vartime(&rv, a.bytes, &A2, b.bytes, B);
|
|
|
|
ge_tobytes(aAbB.bytes, &rv);
|
|
|
|
}
|
|
|
|
|
2017-11-21 22:55:57 +00:00
|
|
|
//addKeys3
|
|
|
|
//aAbB = a*A + b*B where a, b are scalars, A, B are curve points
|
|
|
|
//A and B must be input after applying "precomp"
|
|
|
|
void addKeys3(key &aAbB, const key &a, const ge_dsmp A, const key &b, const ge_dsmp B) {
|
|
|
|
ge_p2 rv;
|
|
|
|
ge_double_scalarmult_precomp_vartime2(&rv, a.bytes, A, b.bytes, B);
|
|
|
|
ge_tobytes(aAbB.bytes, &rv);
|
|
|
|
}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
|
|
|
|
//subtract Keys (subtracts curve points)
|
|
|
|
//AB = A - B where A, B are curve points
|
|
|
|
void subKeys(key & AB, const key &A, const key &B) {
|
|
|
|
ge_p3 B2, A2;
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&B2, B.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&A2, A.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_cached tmp2;
|
|
|
|
ge_p3_to_cached(&tmp2, &B2);
|
|
|
|
ge_p1p1 tmp3;
|
|
|
|
ge_sub(&tmp3, &A2, &tmp2);
|
|
|
|
ge_p1p1_to_p3(&A2, &tmp3);
|
|
|
|
ge_p3_tobytes(AB.bytes, &A2);
|
|
|
|
}
|
|
|
|
|
2016-11-17 23:17:21 +00:00
|
|
|
//checks if A, B are equal in terms of bytes (may say no if one is a non-reduced scalar)
|
2016-05-13 19:45:20 +00:00
|
|
|
//without doing curve operations
|
|
|
|
bool equalKeys(const key & a, const key & b) {
|
2016-06-02 16:24:42 +00:00
|
|
|
bool rv = true;
|
|
|
|
for (int i = 0; i < 32; ++i) {
|
|
|
|
if (a.bytes[i] != b.bytes[i]) {
|
|
|
|
rv = false;
|
|
|
|
}
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
2016-06-02 16:24:42 +00:00
|
|
|
return rv;
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
//Hashing - cn_fast_hash
|
|
|
|
//be careful these are also in crypto namespace
|
|
|
|
//cn_fast_hash for arbitrary multiples of 32 bytes
|
|
|
|
void cn_fast_hash(key &hash, const void * data, const std::size_t l) {
|
2016-10-10 22:36:01 +00:00
|
|
|
keccak((const uint8_t *)data, l, hash.bytes, 32);
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void hash_to_scalar(key &hash, const void * data, const std::size_t l) {
|
|
|
|
cn_fast_hash(hash, data, l);
|
|
|
|
sc_reduce32(hash.bytes);
|
|
|
|
}
|
|
|
|
|
|
|
|
//cn_fast_hash for a 32 byte key
|
|
|
|
void cn_fast_hash(key & hash, const key & in) {
|
2016-10-10 22:36:01 +00:00
|
|
|
keccak((const uint8_t *)in.bytes, 32, hash.bytes, 32);
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void hash_to_scalar(key & hash, const key & in) {
|
|
|
|
cn_fast_hash(hash, in);
|
|
|
|
sc_reduce32(hash.bytes);
|
|
|
|
}
|
|
|
|
|
|
|
|
//cn_fast_hash for a 32 byte key
|
|
|
|
key cn_fast_hash(const key & in) {
|
|
|
|
key hash;
|
2016-10-10 22:36:01 +00:00
|
|
|
keccak((const uint8_t *)in.bytes, 32, hash.bytes, 32);
|
2016-05-13 19:45:20 +00:00
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
|
|
|
key hash_to_scalar(const key & in) {
|
|
|
|
key hash = cn_fast_hash(in);
|
|
|
|
sc_reduce32(hash.bytes);
|
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
|
|
|
//cn_fast_hash for a 128 byte unsigned char
|
|
|
|
key cn_fast_hash128(const void * in) {
|
|
|
|
key hash;
|
2016-10-10 22:36:01 +00:00
|
|
|
keccak((const uint8_t *)in, 128, hash.bytes, 32);
|
2016-05-13 19:45:20 +00:00
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
|
|
|
key hash_to_scalar128(const void * in) {
|
|
|
|
key hash = cn_fast_hash128(in);
|
|
|
|
sc_reduce32(hash.bytes);
|
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
|
|
|
//cn_fast_hash for multisig purpose
|
|
|
|
//This takes the outputs and commitments
|
|
|
|
//and hashes them into a 32 byte sized key
|
2016-10-10 22:07:20 +00:00
|
|
|
key cn_fast_hash(const ctkeyV &PC) {
|
2017-12-12 11:08:11 +00:00
|
|
|
if (PC.empty()) return rct::hash2rct(crypto::cn_fast_hash("", 0));
|
2016-10-10 22:37:02 +00:00
|
|
|
key rv;
|
|
|
|
cn_fast_hash(rv, &PC[0], 64*PC.size());
|
2016-05-13 19:45:20 +00:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-10-10 22:07:20 +00:00
|
|
|
key hash_to_scalar(const ctkeyV &PC) {
|
2016-05-13 19:45:20 +00:00
|
|
|
key rv = cn_fast_hash(PC);
|
|
|
|
sc_reduce32(rv.bytes);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-07-09 19:04:23 +00:00
|
|
|
//cn_fast_hash for a key-vector of arbitrary length
|
|
|
|
//this is useful since you take a number of keys
|
|
|
|
//put them in the key vector and it concatenates them
|
|
|
|
//and then hashes them
|
|
|
|
key cn_fast_hash(const keyV &keys) {
|
2017-12-12 11:08:11 +00:00
|
|
|
if (keys.empty()) return rct::hash2rct(crypto::cn_fast_hash("", 0));
|
2016-07-09 19:04:23 +00:00
|
|
|
key rv;
|
2016-10-10 22:37:02 +00:00
|
|
|
cn_fast_hash(rv, &keys[0], keys.size() * sizeof(keys[0]));
|
2016-07-09 19:04:23 +00:00
|
|
|
//dp(rv);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
key hash_to_scalar(const keyV &keys) {
|
|
|
|
key rv = cn_fast_hash(keys);
|
|
|
|
sc_reduce32(rv.bytes);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-11-17 23:17:21 +00:00
|
|
|
key cn_fast_hash(const key64 keys) {
|
|
|
|
key rv;
|
|
|
|
cn_fast_hash(rv, &keys[0], 64 * sizeof(keys[0]));
|
|
|
|
//dp(rv);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
key hash_to_scalar(const key64 keys) {
|
|
|
|
key rv = cn_fast_hash(keys);
|
|
|
|
sc_reduce32(rv.bytes);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2016-05-13 19:45:20 +00:00
|
|
|
key hashToPointSimple(const key & hh) {
|
|
|
|
key pointk;
|
2016-06-02 18:02:54 +00:00
|
|
|
ge_p1p1 point2;
|
|
|
|
ge_p2 point;
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_p3 res;
|
|
|
|
key h = cn_fast_hash(hh);
|
2017-03-22 21:26:38 +00:00
|
|
|
CHECK_AND_ASSERT_THROW_MES_L1(ge_frombytes_vartime(&res, h.bytes) == 0, "ge_frombytes_vartime failed at "+boost::lexical_cast<std::string>(__LINE__));
|
2016-06-02 18:02:54 +00:00
|
|
|
ge_p3_to_p2(&point, &res);
|
|
|
|
ge_mul8(&point2, &point);
|
|
|
|
ge_p1p1_to_p3(&res, &point2);
|
2016-05-13 19:45:20 +00:00
|
|
|
ge_p3_tobytes(pointk.bytes, &res);
|
|
|
|
return pointk;
|
|
|
|
}
|
|
|
|
|
|
|
|
key hashToPoint(const key & hh) {
|
|
|
|
key pointk;
|
|
|
|
ge_p2 point;
|
|
|
|
ge_p1p1 point2;
|
|
|
|
ge_p3 res;
|
|
|
|
key h = cn_fast_hash(hh);
|
|
|
|
ge_fromfe_frombytes_vartime(&point, h.bytes);
|
|
|
|
ge_mul8(&point2, &point);
|
|
|
|
ge_p1p1_to_p3(&res, &point2);
|
|
|
|
ge_p3_tobytes(pointk.bytes, &res);
|
|
|
|
return pointk;
|
|
|
|
}
|
|
|
|
|
|
|
|
void hashToPoint(key & pointk, const key & hh) {
|
|
|
|
ge_p2 point;
|
|
|
|
ge_p1p1 point2;
|
|
|
|
ge_p3 res;
|
|
|
|
key h = cn_fast_hash(hh);
|
|
|
|
ge_fromfe_frombytes_vartime(&point, h.bytes);
|
|
|
|
ge_mul8(&point2, &point);
|
|
|
|
ge_p1p1_to_p3(&res, &point2);
|
|
|
|
ge_p3_tobytes(pointk.bytes, &res);
|
|
|
|
}
|
|
|
|
|
|
|
|
//sums a vector of curve points (for scalars use sc_add)
|
|
|
|
void sumKeys(key & Csum, const keyV & Cis) {
|
|
|
|
identity(Csum);
|
|
|
|
size_t i = 0;
|
|
|
|
for (i = 0; i < Cis.size(); i++) {
|
|
|
|
addKeys(Csum, Csum, Cis[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//Elliptic Curve Diffie Helman: encodes and decodes the amount b and mask a
|
|
|
|
// where C= aG + bH
|
2016-08-10 11:48:20 +00:00
|
|
|
void ecdhEncode(ecdhTuple & unmasked, const key & sharedSec) {
|
|
|
|
key sharedSec1 = hash_to_scalar(sharedSec);
|
2016-07-24 16:53:34 +00:00
|
|
|
key sharedSec2 = hash_to_scalar(sharedSec1);
|
|
|
|
//encode
|
|
|
|
sc_add(unmasked.mask.bytes, unmasked.mask.bytes, sharedSec1.bytes);
|
|
|
|
sc_add(unmasked.amount.bytes, unmasked.amount.bytes, sharedSec2.bytes);
|
|
|
|
}
|
2016-08-10 11:48:20 +00:00
|
|
|
void ecdhDecode(ecdhTuple & masked, const key & sharedSec) {
|
|
|
|
key sharedSec1 = hash_to_scalar(sharedSec);
|
2016-05-13 19:45:20 +00:00
|
|
|
key sharedSec2 = hash_to_scalar(sharedSec1);
|
2016-07-24 16:53:34 +00:00
|
|
|
//decode
|
|
|
|
sc_sub(masked.mask.bytes, masked.mask.bytes, sharedSec1.bytes);
|
|
|
|
sc_sub(masked.amount.bytes, masked.amount.bytes, sharedSec2.bytes);
|
2016-05-13 19:45:20 +00:00
|
|
|
}
|
|
|
|
}
|