mirror of
https://github.com/monero-project/monero.git
synced 2024-11-18 10:01:02 +00:00
ringct: add simple input validation
Throw when inputs aren't the expected size.
This commit is contained in:
parent
57779abe27
commit
4d7f073491
2 changed files with 74 additions and 32 deletions
|
@ -28,6 +28,7 @@
|
||||||
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
||||||
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
|
#include "misc_log_ex.h"
|
||||||
#include "rctSigs.h"
|
#include "rctSigs.h"
|
||||||
using namespace crypto;
|
using namespace crypto;
|
||||||
using namespace std;
|
using namespace std;
|
||||||
|
@ -50,7 +51,7 @@ namespace rct {
|
||||||
hash_to_scalar(c1, L2);
|
hash_to_scalar(c1, L2);
|
||||||
sc_mulsub(s1.bytes, x.bytes, c1.bytes, a.bytes);
|
sc_mulsub(s1.bytes, x.bytes, c1.bytes, a.bytes);
|
||||||
}
|
}
|
||||||
if (index == 1) {
|
else if (index == 1) {
|
||||||
scalarmultBase(L2, a);
|
scalarmultBase(L2, a);
|
||||||
skGen(s1);
|
skGen(s1);
|
||||||
hash_to_scalar(c1, L2);
|
hash_to_scalar(c1, L2);
|
||||||
|
@ -58,6 +59,9 @@ namespace rct {
|
||||||
hash_to_scalar(c2, L1);
|
hash_to_scalar(c2, L1);
|
||||||
sc_mulsub(s2.bytes, x.bytes, c2.bytes, a.bytes);
|
sc_mulsub(s2.bytes, x.bytes, c2.bytes, a.bytes);
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
|
throw std::runtime_error("GenSchnorrNonLinkable: invalid index (should be 0 or 1)");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
//Schnorr Non-linkable
|
//Schnorr Non-linkable
|
||||||
|
@ -100,7 +104,7 @@ namespace rct {
|
||||||
// Gen gives a signature which proves the signer knows, for each i,
|
// Gen gives a signature which proves the signer knows, for each i,
|
||||||
// an x[i] such that x[i]G = one of P1[i] or P2[i]
|
// an x[i] such that x[i]G = one of P1[i] or P2[i]
|
||||||
// Ver Verifies the signer knows a key for one of P1[i], P2[i] at each i
|
// Ver Verifies the signer knows a key for one of P1[i], P2[i] at each i
|
||||||
bool VerASNL(key64 P1, key64 P2, asnlSig &as) {
|
bool VerASNL(const key64 P1, const key64 P2, const asnlSig &as) {
|
||||||
DP("Verifying Aggregate Schnorr Non-linkable Ring Signature\n");
|
DP("Verifying Aggregate Schnorr Non-linkable Ring Signature\n");
|
||||||
key LHS = identity();
|
key LHS = identity();
|
||||||
key RHS = scalarmultBase(as.s);
|
key RHS = scalarmultBase(as.s);
|
||||||
|
@ -145,14 +149,19 @@ namespace rct {
|
||||||
// Gen creates a signature which proves that for some column in the keymatrix "pk"
|
// Gen creates a signature which proves that for some column in the keymatrix "pk"
|
||||||
// the signer knows a secret key for each row in that column
|
// the signer knows a secret key for each row in that column
|
||||||
// Ver verifies that the MG sig was created correctly
|
// Ver verifies that the MG sig was created correctly
|
||||||
mgSig MLSAG_Gen(key message, const keyM & pk, const keyV & xx, const int index) {
|
mgSig MLSAG_Gen(key message, const keyM & pk, const keyV & xx, const unsigned int index) {
|
||||||
mgSig rv;
|
mgSig rv;
|
||||||
int rows = pk[0].size();
|
size_t cols = pk.size();
|
||||||
int cols = pk.size();
|
CHECK_AND_ASSERT_THROW_MES(cols >= 2, "Error! What is c if cols = 1!");
|
||||||
if (cols < 2) {
|
CHECK_AND_ASSERT_THROW_MES(index < cols, "Index out of range");
|
||||||
printf("Error! What is c if cols = 1!");
|
size_t rows = pk[0].size();
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rows >= 1, "Empty pk");
|
||||||
|
for (size_t i = 1; i < cols; ++i) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(pk[i].size() == rows, "pk is not rectangular");
|
||||||
}
|
}
|
||||||
int i = 0, j = 0;
|
CHECK_AND_ASSERT_THROW_MES(xx.size() == rows, "Bad xx size");
|
||||||
|
|
||||||
|
size_t i = 0, j = 0;
|
||||||
key c, c_old, L, R, Hi;
|
key c, c_old, L, R, Hi;
|
||||||
sc_0(c_old.bytes);
|
sc_0(c_old.bytes);
|
||||||
vector<geDsmp> Ip(rows);
|
vector<geDsmp> Ip(rows);
|
||||||
|
@ -218,14 +227,22 @@ namespace rct {
|
||||||
// Gen creates a signature which proves that for some column in the keymatrix "pk"
|
// Gen creates a signature which proves that for some column in the keymatrix "pk"
|
||||||
// the signer knows a secret key for each row in that column
|
// the signer knows a secret key for each row in that column
|
||||||
// Ver verifies that the MG sig was created correctly
|
// Ver verifies that the MG sig was created correctly
|
||||||
bool MLSAG_Ver(key message, keyM & pk, mgSig & rv) {
|
bool MLSAG_Ver(key message, const keyM & pk, const mgSig & rv) {
|
||||||
|
|
||||||
int rows = pk[0].size();
|
size_t cols = pk.size();
|
||||||
int cols = pk.size();
|
CHECK_AND_ASSERT_THROW_MES(cols >= 2, "Error! What is c if cols = 1!");
|
||||||
if (cols < 2) {
|
size_t rows = pk[0].size();
|
||||||
printf("Error! What is c if cols = 1!");
|
CHECK_AND_ASSERT_THROW_MES(rows >= 1, "Empty pk");
|
||||||
|
for (size_t i = 1; i < cols; ++i) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(pk[i].size() == rows, "pk is not rectangular");
|
||||||
}
|
}
|
||||||
int i = 0, j = 0;
|
CHECK_AND_ASSERT_THROW_MES(rv.II.size() == rows, "Bad rv.II size");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rv.ss.size() == cols, "Bad rv.ss size");
|
||||||
|
for (size_t i = 0; i < cols; ++i) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rv.ss[i].size() == rows, "rv.ss is not rectangular");
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t i = 0, j = 0;
|
||||||
key c, L, R, Hi;
|
key c, L, R, Hi;
|
||||||
key c_old = copy(rv.cc);
|
key c_old = copy(rv.cc);
|
||||||
vector<geDsmp> Ip(rows);
|
vector<geDsmp> Ip(rows);
|
||||||
|
@ -301,7 +318,7 @@ namespace rct {
|
||||||
// thus this proves that "amount" is in [0, 2^64]
|
// thus this proves that "amount" is in [0, 2^64]
|
||||||
// mask is a such that C = aG + bH, and b = amount
|
// mask is a such that C = aG + bH, and b = amount
|
||||||
//verRange verifies that \sum Ci = C and that each Ci is a commitment to 0 or 2^i
|
//verRange verifies that \sum Ci = C and that each Ci is a commitment to 0 or 2^i
|
||||||
bool verRange(key & C, rangeSig & as) {
|
bool verRange(const key & C, const rangeSig & as) {
|
||||||
key64 CiH;
|
key64 CiH;
|
||||||
int i = 0;
|
int i = 0;
|
||||||
key Ctmp = identity();
|
key Ctmp = identity();
|
||||||
|
@ -326,14 +343,22 @@ namespace rct {
|
||||||
// this shows that sum inputs = sum outputs
|
// this shows that sum inputs = sum outputs
|
||||||
//Ver:
|
//Ver:
|
||||||
// verifies the above sig is created corretly
|
// verifies the above sig is created corretly
|
||||||
mgSig proveRctMG(const ctkeyM & pubs, const ctkeyV & inSk, const ctkeyV &outSk, const ctkeyV & outPk, int index) {
|
mgSig proveRctMG(const ctkeyM & pubs, const ctkeyV & inSk, const ctkeyV &outSk, const ctkeyV & outPk, unsigned int index) {
|
||||||
mgSig mg;
|
mgSig mg;
|
||||||
//setup vars
|
//setup vars
|
||||||
int rows = pubs[0].size();
|
size_t cols = pubs.size();
|
||||||
int cols = pubs.size();
|
CHECK_AND_ASSERT_THROW_MES(cols >= 1, "Empty pubs");
|
||||||
|
size_t rows = pubs[0].size();
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rows >= 1, "Empty pubs");
|
||||||
|
for (size_t i = 1; i < cols; ++i) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(pubs[i].size() == rows, "pubs is not rectangular");
|
||||||
|
}
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(inSk.size() == rows, "Bad inSk size");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(outSk.size() == outPk.size(), "Bad outSk/outPk size");
|
||||||
|
|
||||||
keyV sk(rows + 1);
|
keyV sk(rows + 1);
|
||||||
keyV tmp(rows + 1);
|
keyV tmp(rows + 1);
|
||||||
int i = 0, j = 0;
|
size_t i = 0, j = 0;
|
||||||
for (i = 0; i < rows + 1; i++) {
|
for (i = 0; i < rows + 1; i++) {
|
||||||
sc_0(sk[i].bytes);
|
sc_0(sk[i].bytes);
|
||||||
identity(tmp[i]);
|
identity(tmp[i]);
|
||||||
|
@ -373,12 +398,18 @@ namespace rct {
|
||||||
// this shows that sum inputs = sum outputs
|
// this shows that sum inputs = sum outputs
|
||||||
//Ver:
|
//Ver:
|
||||||
// verifies the above sig is created corretly
|
// verifies the above sig is created corretly
|
||||||
bool verRctMG(mgSig mg, ctkeyM & pubs, ctkeyV & outPk) {
|
bool verRctMG(mgSig mg, const ctkeyM & pubs, const ctkeyV & outPk) {
|
||||||
//setup vars
|
//setup vars
|
||||||
int rows = pubs[0].size();
|
size_t cols = pubs.size();
|
||||||
int cols = pubs.size();
|
CHECK_AND_ASSERT_THROW_MES(cols >= 1, "Empty pubs");
|
||||||
|
size_t rows = pubs[0].size();
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rows >= 1, "Empty pubs");
|
||||||
|
for (size_t i = 1; i < cols; ++i) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(pubs[i].size() == rows, "pubs is not rectangular");
|
||||||
|
}
|
||||||
|
|
||||||
keyV tmp(rows + 1);
|
keyV tmp(rows + 1);
|
||||||
int i = 0, j = 0;
|
size_t i = 0, j = 0;
|
||||||
for (i = 0; i < rows + 1; i++) {
|
for (i = 0; i < rows + 1; i++) {
|
||||||
identity(tmp[i]);
|
identity(tmp[i]);
|
||||||
}
|
}
|
||||||
|
@ -445,6 +476,10 @@ namespace rct {
|
||||||
// uses the attached ecdh info to find the amounts represented by each output commitment
|
// uses the attached ecdh info to find the amounts represented by each output commitment
|
||||||
// must know the destination private key to find the correct amount, else will return a random number
|
// must know the destination private key to find the correct amount, else will return a random number
|
||||||
rctSig genRct(ctkeyV & inSk, ctkeyV & inPk, const keyV & destinations, const vector<xmr_amount> amounts, const int mixin) {
|
rctSig genRct(ctkeyV & inSk, ctkeyV & inPk, const keyV & destinations, const vector<xmr_amount> amounts, const int mixin) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(mixin >= 0, "Mixin must be positive");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(amounts.size() > 0, "Amounts must not be empty");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(inSk.size() == inPk.size(), "Different number of public/private keys");
|
||||||
|
|
||||||
rctSig rv;
|
rctSig rv;
|
||||||
rv.outPk.resize(destinations.size());
|
rv.outPk.resize(destinations.size());
|
||||||
rv.rangeSigs.resize(destinations.size());
|
rv.rangeSigs.resize(destinations.size());
|
||||||
|
@ -469,7 +504,7 @@ namespace rct {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int index;
|
unsigned int index;
|
||||||
tie(rv.mixRing, index) = populateFromBlockchain(inPk, mixin);
|
tie(rv.mixRing, index) = populateFromBlockchain(inPk, mixin);
|
||||||
rv.MG = proveRctMG(rv.mixRing, inSk, outSk, rv.outPk, index);
|
rv.MG = proveRctMG(rv.mixRing, inSk, outSk, rv.outPk, index);
|
||||||
return rv;
|
return rv;
|
||||||
|
@ -486,6 +521,9 @@ namespace rct {
|
||||||
// uses the attached ecdh info to find the amounts represented by each output commitment
|
// uses the attached ecdh info to find the amounts represented by each output commitment
|
||||||
// must know the destination private key to find the correct amount, else will return a random number
|
// must know the destination private key to find the correct amount, else will return a random number
|
||||||
bool verRct(rctSig & rv) {
|
bool verRct(rctSig & rv) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rv.rangeSigs.size() > 0, "Empty rv.rangeSigs");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rv.outPk.size() == rv.rangeSigs.size(), "Mismatched sizes of rv.outPk and rv.rangeSigs");
|
||||||
|
|
||||||
size_t i = 0;
|
size_t i = 0;
|
||||||
bool rvb = true;
|
bool rvb = true;
|
||||||
bool tmp;
|
bool tmp;
|
||||||
|
@ -512,7 +550,11 @@ namespace rct {
|
||||||
//decodeRct: (c.f. http://eprint.iacr.org/2015/1098 section 5.1.1)
|
//decodeRct: (c.f. http://eprint.iacr.org/2015/1098 section 5.1.1)
|
||||||
// uses the attached ecdh info to find the amounts represented by each output commitment
|
// uses the attached ecdh info to find the amounts represented by each output commitment
|
||||||
// must know the destination private key to find the correct amount, else will return a random number
|
// must know the destination private key to find the correct amount, else will return a random number
|
||||||
xmr_amount decodeRct(rctSig & rv, key & sk, int i) {
|
xmr_amount decodeRct(rctSig & rv, key & sk, unsigned int i) {
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rv.rangeSigs.size() > 0, "Empty rv.rangeSigs");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(rv.outPk.size() == rv.rangeSigs.size(), "Mismatched sizes of rv.outPk and rv.rangeSigs");
|
||||||
|
CHECK_AND_ASSERT_THROW_MES(i < rv.ecdhInfo.size(), "Bad index");
|
||||||
|
|
||||||
//mask amount and mask
|
//mask amount and mask
|
||||||
ecdhDecode(rv.ecdhInfo[i], sk);
|
ecdhDecode(rv.ecdhInfo[i], sk);
|
||||||
key mask = rv.ecdhInfo[i].mask;
|
key mask = rv.ecdhInfo[i].mask;
|
||||||
|
|
|
@ -80,7 +80,7 @@ namespace rct {
|
||||||
// an x[i] such that x[i]G = one of P1[i] or P2[i]
|
// an x[i] such that x[i]G = one of P1[i] or P2[i]
|
||||||
// Ver Verifies the signer knows a key for one of P1[i], P2[i] at each i
|
// Ver Verifies the signer knows a key for one of P1[i], P2[i] at each i
|
||||||
asnlSig GenASNL(key64 x, key64 P1, key64 P2, bits indices);
|
asnlSig GenASNL(key64 x, key64 P1, key64 P2, bits indices);
|
||||||
bool VerASNL(key64 P1, key64 P2, asnlSig &as);
|
bool VerASNL(const key64 P1, const key64 P2, const asnlSig &as);
|
||||||
|
|
||||||
//Multilayered Spontaneous Anonymous Group Signatures (MLSAG signatures)
|
//Multilayered Spontaneous Anonymous Group Signatures (MLSAG signatures)
|
||||||
//These are aka MG signatutes in earlier drafts of the ring ct paper
|
//These are aka MG signatutes in earlier drafts of the ring ct paper
|
||||||
|
@ -90,8 +90,8 @@ namespace rct {
|
||||||
// the signer knows a secret key for each row in that column
|
// the signer knows a secret key for each row in that column
|
||||||
// Ver verifies that the MG sig was created correctly
|
// Ver verifies that the MG sig was created correctly
|
||||||
keyV keyImageV(const keyV &xx);
|
keyV keyImageV(const keyV &xx);
|
||||||
mgSig MLSAG_Gen(key message, const keyM & pk, const keyV & xx, const int index);
|
mgSig MLSAG_Gen(key message, const keyM & pk, const keyV & xx, const unsigned int index);
|
||||||
bool MLSAG_Ver(key message, keyM &pk, mgSig &sig);
|
bool MLSAG_Ver(key message, const keyM &pk, const mgSig &sig);
|
||||||
//mgSig MLSAG_Gen_Old(const keyM & pk, const keyV & xx, const int index);
|
//mgSig MLSAG_Gen_Old(const keyM & pk, const keyV & xx, const int index);
|
||||||
|
|
||||||
//proveRange and verRange
|
//proveRange and verRange
|
||||||
|
@ -102,7 +102,7 @@ namespace rct {
|
||||||
// mask is a such that C = aG + bH, and b = amount
|
// mask is a such that C = aG + bH, and b = amount
|
||||||
//verRange verifies that \sum Ci = C and that each Ci is a commitment to 0 or 2^i
|
//verRange verifies that \sum Ci = C and that each Ci is a commitment to 0 or 2^i
|
||||||
rangeSig proveRange(key & C, key & mask, const xmr_amount & amount);
|
rangeSig proveRange(key & C, key & mask, const xmr_amount & amount);
|
||||||
bool verRange(key & C, rangeSig & as);
|
bool verRange(const key & C, const rangeSig & as);
|
||||||
|
|
||||||
//Ring-ct MG sigs
|
//Ring-ct MG sigs
|
||||||
//Prove:
|
//Prove:
|
||||||
|
@ -112,8 +112,8 @@ namespace rct {
|
||||||
// this shows that sum inputs = sum outputs
|
// this shows that sum inputs = sum outputs
|
||||||
//Ver:
|
//Ver:
|
||||||
// verifies the above sig is created corretly
|
// verifies the above sig is created corretly
|
||||||
mgSig proveRctMG(const ctkeyM & pubs, const ctkeyV & inSk, const keyV &outMasks, const ctkeyV & outPk, int index);
|
mgSig proveRctMG(const ctkeyM & pubs, const ctkeyV & inSk, const keyV &outMasks, const ctkeyV & outPk, unsigned int index);
|
||||||
bool verRctMG(mgSig mg, ctkeyM & pubs, ctkeyV & outPk);
|
bool verRctMG(mgSig mg, const ctkeyM & pubs, const ctkeyV & outPk);
|
||||||
|
|
||||||
//These functions get keys from blockchain
|
//These functions get keys from blockchain
|
||||||
//replace these when connecting blockchain
|
//replace these when connecting blockchain
|
||||||
|
@ -135,7 +135,7 @@ namespace rct {
|
||||||
// must know the destination private key to find the correct amount, else will return a random number
|
// must know the destination private key to find the correct amount, else will return a random number
|
||||||
rctSig genRct(ctkeyV & inSk, ctkeyV & inPk, const keyV & destinations, const vector<xmr_amount> amounts, const int mixin);
|
rctSig genRct(ctkeyV & inSk, ctkeyV & inPk, const keyV & destinations, const vector<xmr_amount> amounts, const int mixin);
|
||||||
bool verRct(rctSig & rv);
|
bool verRct(rctSig & rv);
|
||||||
xmr_amount decodeRct(rctSig & rv, key & sk, int i);
|
xmr_amount decodeRct(rctSig & rv, key & sk, unsigned int i);
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue