2022-03-01 06:16:17 -05:00
|
|
|
// Copyright (c) 2014-2022, The Monero Project
|
2016-05-14 05:30:11 -04:00
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
//
|
|
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
|
|
|
|
#include "gtest/gtest.h"
|
|
|
|
|
|
|
|
#include <cstdint>
|
2016-05-27 14:40:18 -04:00
|
|
|
#include <algorithm>
|
2017-02-27 13:33:16 -05:00
|
|
|
#include <sstream>
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
#include "ringct/rctTypes.h"
|
|
|
|
#include "ringct/rctSigs.h"
|
|
|
|
#include "ringct/rctOps.h"
|
2018-02-20 11:01:27 -05:00
|
|
|
#include "device/device.hpp"
|
2019-06-09 09:02:16 -04:00
|
|
|
#include "string_tools.h"
|
2016-05-14 05:30:11 -04:00
|
|
|
|
2017-10-10 10:47:08 -04:00
|
|
|
using namespace std;
|
2016-05-14 05:30:11 -04:00
|
|
|
using namespace crypto;
|
|
|
|
using namespace rct;
|
|
|
|
|
2016-11-17 18:17:21 -05:00
|
|
|
TEST(ringct, Borromean)
|
2016-05-14 05:30:11 -04:00
|
|
|
{
|
|
|
|
int j = 0;
|
|
|
|
|
2016-11-17 18:17:21 -05:00
|
|
|
//Tests for Borromean signatures
|
|
|
|
//#boro true one, false one, C != sum Ci, and one out of the range..
|
2016-05-14 05:30:11 -04:00
|
|
|
int N = 64;
|
|
|
|
key64 xv;
|
|
|
|
key64 P1v;
|
|
|
|
key64 P2v;
|
|
|
|
bits indi;
|
|
|
|
|
|
|
|
for (j = 0 ; j < N ; j++) {
|
|
|
|
indi[j] = (int)randXmrAmount(2);
|
|
|
|
|
|
|
|
xv[j] = skGen();
|
|
|
|
if ( (int)indi[j] == 0 ) {
|
2016-11-17 18:27:00 -05:00
|
|
|
scalarmultBase(P1v[j], xv[j]);
|
2016-05-14 05:30:11 -04:00
|
|
|
} else {
|
2016-11-17 18:27:00 -05:00
|
|
|
addKeys1(P1v[j], xv[j], H2[j]);
|
2016-05-14 05:30:11 -04:00
|
|
|
}
|
2016-11-17 18:27:00 -05:00
|
|
|
subKeys(P2v[j], P1v[j], H2[j]);
|
2016-05-14 05:30:11 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
//#true one
|
2016-11-17 18:27:00 -05:00
|
|
|
boroSig bb = genBorromean(xv, P1v, P2v, indi);
|
2016-11-17 18:17:21 -05:00
|
|
|
ASSERT_TRUE(verifyBorromean(bb, P1v, P2v));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//#false one
|
|
|
|
indi[3] = (indi[3] + 1) % 2;
|
2016-11-17 18:17:21 -05:00
|
|
|
bb = genBorromean(xv, P1v, P2v, indi);
|
|
|
|
ASSERT_FALSE(verifyBorromean(bb, P1v, P2v));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
2016-05-14 07:21:53 -04:00
|
|
|
//#true one again
|
|
|
|
indi[3] = (indi[3] + 1) % 2;
|
2016-11-17 18:17:21 -05:00
|
|
|
bb = genBorromean(xv, P1v, P2v, indi);
|
|
|
|
ASSERT_TRUE(verifyBorromean(bb, P1v, P2v));
|
2016-05-14 07:21:53 -04:00
|
|
|
|
|
|
|
//#false one
|
2016-11-17 18:17:21 -05:00
|
|
|
bb = genBorromean(xv, P2v, P1v, indi);
|
|
|
|
ASSERT_FALSE(verifyBorromean(bb, P1v, P2v));
|
2016-05-14 05:30:11 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, MG_sigs)
|
|
|
|
{
|
|
|
|
int j = 0;
|
|
|
|
int N = 0;
|
|
|
|
|
|
|
|
//Tests for MG Sigs
|
|
|
|
//#MG sig: true one
|
|
|
|
N = 3;// #cols
|
|
|
|
int R = 3;// #rows
|
|
|
|
keyV xtmp = skvGen(R);
|
|
|
|
keyM xm = keyMInit(R, N);// = [[None]*N] #just used to generate test public keys
|
|
|
|
keyV sk = skvGen(R);
|
|
|
|
keyM P = keyMInit(R, N);// = keyM[[None]*N] #stores the public keys;
|
|
|
|
int ind = 2;
|
|
|
|
int i = 0;
|
|
|
|
for (j = 0 ; j < R ; j++) {
|
|
|
|
for (i = 0 ; i < N ; i++)
|
|
|
|
{
|
|
|
|
xm[i][j] = skGen();
|
|
|
|
P[i][j] = scalarmultBase(xm[i][j]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (j = 0 ; j < R ; j++) {
|
|
|
|
sk[j] = xm[ind][j];
|
|
|
|
}
|
|
|
|
key message = identity();
|
2021-12-06 05:25:01 -05:00
|
|
|
mgSig IIccss = MLSAG_Gen(message, P, sk, ind, R, hw::get_device("default"));
|
2016-08-09 06:38:54 -04:00
|
|
|
ASSERT_TRUE(MLSAG_Ver(message, P, IIccss, R));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//#MG sig: false one
|
|
|
|
N = 3;// #cols
|
|
|
|
R = 3;// #rows
|
|
|
|
xtmp = skvGen(R);
|
|
|
|
keyM xx(N, xtmp);// = [[None]*N] #just used to generate test public keys
|
|
|
|
sk = skvGen(R);
|
|
|
|
//P (N, xtmp);// = keyM[[None]*N] #stores the public keys;
|
|
|
|
|
|
|
|
ind = 2;
|
|
|
|
for (j = 0 ; j < R ; j++) {
|
|
|
|
for (i = 0 ; i < N ; i++)
|
|
|
|
{
|
|
|
|
xx[i][j] = skGen();
|
|
|
|
P[i][j] = scalarmultBase(xx[i][j]);
|
|
|
|
}
|
|
|
|
sk[j] = xx[ind][j];
|
|
|
|
}
|
2018-01-19 02:54:14 -05:00
|
|
|
sk[2] = skGen();//assume we don't know one of the private keys..
|
2021-12-06 05:25:01 -05:00
|
|
|
IIccss = MLSAG_Gen(message, P, sk, ind, R, hw::get_device("default"));
|
2016-08-09 06:38:54 -04:00
|
|
|
ASSERT_FALSE(MLSAG_Ver(message, P, IIccss, R));
|
2016-05-14 05:30:11 -04:00
|
|
|
}
|
|
|
|
|
2019-06-09 09:02:16 -04:00
|
|
|
TEST(ringct, CLSAG)
|
|
|
|
{
|
2020-03-10 18:46:37 -04:00
|
|
|
const size_t N = 11;
|
2019-06-09 09:02:16 -04:00
|
|
|
const size_t idx = 5;
|
2020-03-10 18:46:37 -04:00
|
|
|
ctkeyV pubs;
|
|
|
|
key p, t, t2, u;
|
2019-06-09 09:02:16 -04:00
|
|
|
const key message = identity();
|
2020-03-10 18:46:37 -04:00
|
|
|
ctkey backup;
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag clsag;
|
|
|
|
|
2020-03-10 18:46:37 -04:00
|
|
|
for (size_t i = 0; i < N; ++i)
|
2019-06-09 09:02:16 -04:00
|
|
|
{
|
2020-03-10 18:46:37 -04:00
|
|
|
key sk;
|
|
|
|
ctkey tmp;
|
|
|
|
|
|
|
|
skpkGen(sk, tmp.dest);
|
|
|
|
skpkGen(sk, tmp.mask);
|
|
|
|
|
|
|
|
pubs.push_back(tmp);
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
|
2020-03-10 18:46:37 -04:00
|
|
|
// Set P[idx]
|
|
|
|
skpkGen(p, pubs[idx].dest);
|
|
|
|
|
|
|
|
// Set C[idx]
|
|
|
|
t = skGen();
|
|
|
|
u = skGen();
|
|
|
|
addKeys2(pubs[idx].mask,t,u,H);
|
|
|
|
|
|
|
|
// Set commitment offset
|
|
|
|
key Cout;
|
|
|
|
t2 = skGen();
|
|
|
|
addKeys2(Cout,t2,u,H);
|
|
|
|
|
|
|
|
// Prepare generation inputs
|
|
|
|
ctkey insk;
|
|
|
|
insk.dest = p;
|
|
|
|
insk.mask = t;
|
|
|
|
|
|
|
|
// bad message
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(zero(),pubs,insk,t2,Cout,idx,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// bad index at creation
|
|
|
|
try
|
|
|
|
{
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(message,pubs,insk,t2,Cout,(idx + 1) % N,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
catch (...) { /* either exception, or failure to verify above */ }
|
|
|
|
|
|
|
|
// bad z at creation
|
|
|
|
try
|
|
|
|
{
|
2020-03-10 18:46:37 -04:00
|
|
|
ctkey insk2;
|
|
|
|
insk2.dest = insk.dest;
|
|
|
|
insk2.mask = skGen();
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(message,pubs,insk2,t2,Cout,idx,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
catch (...) { /* either exception, or failure to verify above */ }
|
|
|
|
|
|
|
|
// bad C at creation
|
2020-03-10 18:46:37 -04:00
|
|
|
backup = pubs[idx];
|
|
|
|
pubs[idx].mask = scalarmultBase(skGen());
|
2019-06-09 09:02:16 -04:00
|
|
|
try
|
|
|
|
{
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(message,pubs,insk,t2,Cout,idx,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
catch (...) { /* either exception, or failure to verify above */ }
|
2020-03-10 18:46:37 -04:00
|
|
|
pubs[idx] = backup;
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// bad p at creation
|
|
|
|
try
|
|
|
|
{
|
2020-03-10 18:46:37 -04:00
|
|
|
ctkey insk2;
|
|
|
|
insk2.dest = skGen();
|
|
|
|
insk2.mask = insk.mask;
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(message,pubs,insk2,t2,Cout,idx,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
catch (...) { /* either exception, or failure to verify above */ }
|
|
|
|
|
|
|
|
// bad P at creation
|
2020-03-10 18:46:37 -04:00
|
|
|
backup = pubs[idx];
|
|
|
|
pubs[idx].dest = scalarmultBase(skGen());
|
2019-06-09 09:02:16 -04:00
|
|
|
try
|
|
|
|
{
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(message,pubs,insk,t2,Cout,idx,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
catch (...) { /* either exception, or failure to verify above */ }
|
2020-03-10 18:46:37 -04:00
|
|
|
pubs[idx] = backup;
|
|
|
|
|
|
|
|
// Test correct signature
|
2021-12-06 05:25:01 -05:00
|
|
|
clsag = rct::proveRctCLSAGSimple(message,pubs,insk,t2,Cout,idx,hw::get_device("default"));
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_TRUE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// empty s
|
|
|
|
auto sbackup = clsag.s;
|
|
|
|
clsag.s.clear();
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag.s = sbackup;
|
|
|
|
|
|
|
|
// too few s elements
|
2020-03-10 18:46:37 -04:00
|
|
|
key backup_key;
|
|
|
|
backup_key = clsag.s.back();
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag.s.pop_back();
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
|
|
|
clsag.s.push_back(backup_key);
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// too many s elements
|
|
|
|
clsag.s.push_back(skGen());
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag.s.pop_back();
|
|
|
|
|
|
|
|
// bad s in clsag at verification
|
|
|
|
for (auto &s: clsag.s)
|
|
|
|
{
|
2020-03-10 18:46:37 -04:00
|
|
|
backup_key = s;
|
2019-06-09 09:02:16 -04:00
|
|
|
s = skGen();
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
|
|
|
s = backup_key;
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// bad c1 in clsag at verification
|
2020-03-10 18:46:37 -04:00
|
|
|
backup_key = clsag.c1;
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag.c1 = skGen();
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
|
|
|
clsag.c1 = backup_key;
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// bad I in clsag at verification
|
2020-03-10 18:46:37 -04:00
|
|
|
backup_key = clsag.I;
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag.I = scalarmultBase(skGen());
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
|
|
|
clsag.I = backup_key;
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// bad D in clsag at verification
|
2020-03-10 18:46:37 -04:00
|
|
|
backup_key = clsag.D;
|
2019-06-09 09:02:16 -04:00
|
|
|
clsag.D = scalarmultBase(skGen());
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
|
|
|
clsag.D = backup_key;
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// D not in main subgroup in clsag at verification
|
2020-03-10 18:46:37 -04:00
|
|
|
backup_key = clsag.D;
|
2019-06-09 09:02:16 -04:00
|
|
|
rct::key x;
|
|
|
|
ASSERT_TRUE(epee::string_tools::hex_to_pod("c7176a703d4dd84fba3c0b760d10670f2a2053fa2c39ccc64ec7fd7792ac03fa", x));
|
|
|
|
clsag.D = rct::addKeys(clsag.D, x);
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
|
|
|
clsag.D = backup_key;
|
2019-06-09 09:02:16 -04:00
|
|
|
|
|
|
|
// swapped I and D in clsag at verification
|
|
|
|
std::swap(clsag.I, clsag.D);
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_FALSE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
std::swap(clsag.I, clsag.D);
|
|
|
|
|
|
|
|
// check it's still good, in case we failed to restore
|
2020-03-10 18:46:37 -04:00
|
|
|
ASSERT_TRUE(rct::verRctCLSAGSimple(message,clsag,pubs,Cout));
|
2019-06-09 09:02:16 -04:00
|
|
|
}
|
|
|
|
|
2016-05-14 05:30:11 -04:00
|
|
|
TEST(ringct, range_proofs)
|
|
|
|
{
|
|
|
|
//Ring CT Stuff
|
|
|
|
//ct range proofs
|
|
|
|
ctkeyV sc, pc;
|
|
|
|
ctkey sctmp, pctmp;
|
2019-04-11 14:41:41 -04:00
|
|
|
std::vector<uint64_t> inamounts;
|
|
|
|
//add fake input 6000
|
|
|
|
inamounts.push_back(6000);
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(inamounts.back());
|
2016-05-14 05:30:11 -04:00
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
inamounts.push_back(7000);
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(inamounts.back());
|
2016-05-14 05:30:11 -04:00
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
vector<xmr_amount >amounts;
|
2016-07-24 12:53:34 -04:00
|
|
|
rct::keyV amount_keys;
|
|
|
|
key mask;
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//add output 500
|
|
|
|
amounts.push_back(500);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(rct::hash_to_scalar(rct::zero()));
|
2016-05-14 05:30:11 -04:00
|
|
|
keyV destinations;
|
|
|
|
key Sk, Pk;
|
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
|
|
|
|
|
2016-06-12 16:53:01 -04:00
|
|
|
//add output for 12500
|
|
|
|
amounts.push_back(12500);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(rct::hash_to_scalar(rct::zero()));
|
2016-06-12 16:53:01 -04:00
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
|
2019-01-06 08:47:16 -05:00
|
|
|
const rct::RCTConfig rct_config { RangeProofBorromean, 0 };
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
//compute rct data with mixin 3 - should fail since full type with > 1 input
|
|
|
|
bool ok = false;
|
2021-12-06 05:25:01 -05:00
|
|
|
try { genRct(rct::zero(), sc, pc, destinations, amounts, amount_keys, 3, rct_config, hw::get_device("default")); }
|
2019-04-11 14:41:41 -04:00
|
|
|
catch(...) { ok = true; }
|
|
|
|
ASSERT_TRUE(ok);
|
|
|
|
|
|
|
|
//compute rct data with mixin 3
|
2021-12-06 05:25:01 -05:00
|
|
|
rctSig s = genRctSimple(rct::zero(), sc, pc, destinations, inamounts, amounts, amount_keys, 0, 3, rct_config, hw::get_device("default"));
|
2016-06-12 16:53:01 -04:00
|
|
|
|
|
|
|
//verify rct data
|
2019-04-11 14:41:41 -04:00
|
|
|
ASSERT_TRUE(verRctSimple(s));
|
2016-06-12 16:53:01 -04:00
|
|
|
|
|
|
|
//decode received amount
|
2019-04-11 14:41:41 -04:00
|
|
|
decodeRctSimple(s, amount_keys[1], 1, mask, hw::get_device("default"));
|
2016-06-12 16:53:01 -04:00
|
|
|
|
|
|
|
// Ring CT with failing MG sig part should not verify!
|
|
|
|
// Since sum of inputs != outputs
|
|
|
|
|
|
|
|
amounts[1] = 12501;
|
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations[1] = Pk;
|
|
|
|
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
//compute rct data with mixin 3
|
2021-12-06 05:25:01 -05:00
|
|
|
s = genRctSimple(rct::zero(), sc, pc, destinations, inamounts, amounts, amount_keys, 0, 3, rct_config, hw::get_device("default"));
|
2016-06-12 16:53:01 -04:00
|
|
|
|
|
|
|
//verify rct data
|
2019-04-11 14:41:41 -04:00
|
|
|
ASSERT_FALSE(verRctSimple(s));
|
2016-06-12 16:53:01 -04:00
|
|
|
|
|
|
|
//decode received amount
|
2019-04-11 14:41:41 -04:00
|
|
|
decodeRctSimple(s, amount_keys[1], 1, mask, hw::get_device("default"));
|
2016-06-12 16:53:01 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_with_fee)
|
|
|
|
{
|
|
|
|
//Ring CT Stuff
|
|
|
|
//ct range proofs
|
|
|
|
ctkeyV sc, pc;
|
|
|
|
ctkey sctmp, pctmp;
|
2019-04-11 14:41:41 -04:00
|
|
|
std::vector<uint64_t> inamounts;
|
|
|
|
//add fake input 6001
|
|
|
|
inamounts.push_back(6001);
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(inamounts.back());
|
2016-06-12 16:53:01 -04:00
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
inamounts.push_back(7000);
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(inamounts.back());
|
2016-06-12 16:53:01 -04:00
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
vector<xmr_amount >amounts;
|
2016-07-24 12:53:34 -04:00
|
|
|
keyV amount_keys;
|
|
|
|
key mask;
|
2016-06-12 16:53:01 -04:00
|
|
|
|
|
|
|
//add output 500
|
|
|
|
amounts.push_back(500);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(rct::hash_to_scalar(rct::zero()));
|
2016-06-12 16:53:01 -04:00
|
|
|
keyV destinations;
|
|
|
|
key Sk, Pk;
|
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
|
2016-05-14 05:30:11 -04:00
|
|
|
//add output for 12500
|
|
|
|
amounts.push_back(12500);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(hash_to_scalar(zero()));
|
2016-05-14 05:30:11 -04:00
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
|
2019-01-06 08:47:16 -05:00
|
|
|
const rct::RCTConfig rct_config { RangeProofBorromean, 0 };
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
//compute rct data with mixin 3
|
2021-12-06 05:25:01 -05:00
|
|
|
rctSig s = genRctSimple(rct::zero(), sc, pc, destinations, inamounts, amounts, amount_keys, 1, 3, rct_config, hw::get_device("default"));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//verify rct data
|
2019-04-11 14:41:41 -04:00
|
|
|
ASSERT_TRUE(verRctSimple(s));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//decode received amount
|
2019-04-11 14:41:41 -04:00
|
|
|
decodeRctSimple(s, amount_keys[1], 1, mask, hw::get_device("default"));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
// Ring CT with failing MG sig part should not verify!
|
|
|
|
// Since sum of inputs != outputs
|
|
|
|
|
|
|
|
amounts[1] = 12501;
|
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations[1] = Pk;
|
|
|
|
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
//compute rct data with mixin 3
|
2021-12-06 05:25:01 -05:00
|
|
|
s = genRctSimple(rct::zero(), sc, pc, destinations, inamounts, amounts, amount_keys, 500, 3, rct_config, hw::get_device("default"));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//verify rct data
|
2019-04-11 14:41:41 -04:00
|
|
|
ASSERT_FALSE(verRctSimple(s));
|
2016-05-14 05:30:11 -04:00
|
|
|
|
|
|
|
//decode received amount
|
2019-04-11 14:41:41 -04:00
|
|
|
decodeRctSimple(s, amount_keys[1], 1, mask, hw::get_device("default"));
|
2016-05-14 05:30:11 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 07:57:22 -04:00
|
|
|
TEST(ringct, simple)
|
|
|
|
{
|
|
|
|
ctkeyV sc, pc;
|
|
|
|
ctkey sctmp, pctmp;
|
|
|
|
//this vector corresponds to output amounts
|
|
|
|
vector<xmr_amount>outamounts;
|
|
|
|
//this vector corresponds to input amounts
|
|
|
|
vector<xmr_amount>inamounts;
|
|
|
|
//this keyV corresponds to destination pubkeys
|
|
|
|
keyV destinations;
|
2016-07-24 12:53:34 -04:00
|
|
|
keyV amount_keys;
|
|
|
|
key mask;
|
2016-07-10 07:57:22 -04:00
|
|
|
|
|
|
|
//add fake input 3000
|
|
|
|
//the sc is secret data
|
|
|
|
//pc is public data
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(3000);
|
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
inamounts.push_back(3000);
|
|
|
|
|
|
|
|
//add fake input 3000
|
|
|
|
//the sc is secret data
|
|
|
|
//pc is public data
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(3000);
|
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
inamounts.push_back(3000);
|
|
|
|
|
|
|
|
//add output 5000
|
|
|
|
outamounts.push_back(5000);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(rct::hash_to_scalar(rct::zero()));
|
2016-07-10 07:57:22 -04:00
|
|
|
//add the corresponding destination pubkey
|
|
|
|
key Sk, Pk;
|
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
|
|
|
|
//add output 999
|
|
|
|
outamounts.push_back(999);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(rct::hash_to_scalar(rct::zero()));
|
2016-07-10 07:57:22 -04:00
|
|
|
//add the corresponding destination pubkey
|
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
|
|
|
|
key message = skGen(); //real message later (hash of txn..)
|
|
|
|
|
|
|
|
//compute sig with mixin 2
|
|
|
|
xmr_amount txnfee = 1;
|
|
|
|
|
2019-01-06 08:47:16 -05:00
|
|
|
const rct::RCTConfig rct_config { RangeProofBorromean, 0 };
|
2021-12-06 05:25:01 -05:00
|
|
|
rctSig s = genRctSimple(message, sc, pc, destinations,inamounts, outamounts, amount_keys, txnfee, 2, rct_config, hw::get_device("default"));
|
2016-07-10 07:57:22 -04:00
|
|
|
|
|
|
|
//verify ring ct signature
|
|
|
|
ASSERT_TRUE(verRctSimple(s));
|
|
|
|
|
|
|
|
//decode received amount corresponding to output pubkey index 1
|
2018-02-20 11:01:27 -05:00
|
|
|
decodeRctSimple(s, amount_keys[1], 1, mask, hw::get_device("default"));
|
2016-07-10 07:57:22 -04:00
|
|
|
}
|
|
|
|
|
2016-06-17 16:29:21 -04:00
|
|
|
static rct::rctSig make_sample_rct_sig(int n_inputs, const uint64_t input_amounts[], int n_outputs, const uint64_t output_amounts[], bool last_is_fee)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
|
|
|
ctkeyV sc, pc;
|
|
|
|
ctkey sctmp, pctmp;
|
|
|
|
vector<xmr_amount >amounts;
|
|
|
|
keyV destinations;
|
2016-07-24 12:53:34 -04:00
|
|
|
keyV amount_keys;
|
2016-05-27 14:40:18 -04:00
|
|
|
key Sk, Pk;
|
|
|
|
|
|
|
|
for (int n = 0; n < n_inputs; ++n) {
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(input_amounts[n]);
|
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (int n = 0; n < n_outputs; ++n) {
|
|
|
|
amounts.push_back(output_amounts[n]);
|
|
|
|
skpkGen(Sk, Pk);
|
2016-06-14 12:15:49 -04:00
|
|
|
if (n < n_outputs - 1 || !last_is_fee)
|
2016-10-29 08:33:08 -04:00
|
|
|
{
|
2016-06-14 12:15:49 -04:00
|
|
|
destinations.push_back(Pk);
|
2016-10-29 08:33:08 -04:00
|
|
|
amount_keys.push_back(rct::hash_to_scalar(rct::zero()));
|
|
|
|
}
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2019-01-06 08:47:16 -05:00
|
|
|
const rct::RCTConfig rct_config { RangeProofBorromean, 0 };
|
2021-12-06 05:25:01 -05:00
|
|
|
return genRct(rct::zero(), sc, pc, destinations, amounts, amount_keys, 3, rct_config, hw::get_device("default"));
|
2016-06-17 16:29:21 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
static rct::rctSig make_sample_simple_rct_sig(int n_inputs, const uint64_t input_amounts[], int n_outputs, const uint64_t output_amounts[], uint64_t fee)
|
|
|
|
{
|
|
|
|
ctkeyV sc, pc;
|
|
|
|
ctkey sctmp, pctmp;
|
|
|
|
vector<xmr_amount> inamounts, outamounts;
|
|
|
|
keyV destinations;
|
2016-07-24 12:53:34 -04:00
|
|
|
keyV amount_keys;
|
2016-07-10 17:55:26 -04:00
|
|
|
key Sk, Pk;
|
|
|
|
|
|
|
|
for (int n = 0; n < n_inputs; ++n) {
|
|
|
|
inamounts.push_back(input_amounts[n]);
|
|
|
|
tie(sctmp, pctmp) = ctskpkGen(input_amounts[n]);
|
|
|
|
sc.push_back(sctmp);
|
|
|
|
pc.push_back(pctmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (int n = 0; n < n_outputs; ++n) {
|
|
|
|
outamounts.push_back(output_amounts[n]);
|
2016-07-24 12:53:34 -04:00
|
|
|
amount_keys.push_back(hash_to_scalar(zero()));
|
2016-07-10 17:55:26 -04:00
|
|
|
skpkGen(Sk, Pk);
|
|
|
|
destinations.push_back(Pk);
|
|
|
|
}
|
|
|
|
|
2019-01-06 08:47:16 -05:00
|
|
|
const rct::RCTConfig rct_config { RangeProofBorromean, 0 };
|
2021-12-06 05:25:01 -05:00
|
|
|
return genRctSimple(rct::zero(), sc, pc, destinations, inamounts, outamounts, amount_keys, fee, 3, rct_config, hw::get_device("default"));
|
2016-07-10 17:55:26 -04:00
|
|
|
}
|
|
|
|
|
2016-06-17 16:29:21 -04:00
|
|
|
static bool range_proof_test(bool expected_valid,
|
2016-07-10 17:55:26 -04:00
|
|
|
int n_inputs, const uint64_t input_amounts[], int n_outputs, const uint64_t output_amounts[], bool last_is_fee, bool simple)
|
2016-06-17 16:29:21 -04:00
|
|
|
{
|
2016-05-27 14:40:18 -04:00
|
|
|
//compute rct data
|
|
|
|
bool valid;
|
|
|
|
try {
|
2016-07-10 17:55:26 -04:00
|
|
|
rctSig s;
|
|
|
|
// simple takes fee as a parameter, non-simple takes it as an extra element to output amounts
|
|
|
|
if (simple) {
|
|
|
|
s = make_sample_simple_rct_sig(n_inputs, input_amounts, last_is_fee ? n_outputs - 1 : n_outputs, output_amounts, last_is_fee ? output_amounts[n_outputs - 1] : 0);
|
|
|
|
valid = verRctSimple(s);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
s = make_sample_rct_sig(n_inputs, input_amounts, n_outputs, output_amounts, last_is_fee);
|
|
|
|
valid = verRct(s);
|
|
|
|
}
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
catch (const std::exception &e) {
|
|
|
|
valid = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (valid == expected_valid) {
|
|
|
|
return testing::AssertionSuccess();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
return testing::AssertionFailure();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define NELTS(array) (sizeof(array)/sizeof(array[0]))
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_empty_outs)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_empty_outs_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_empty_ins)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {};
|
|
|
|
const uint64_t outputs[] = {5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_empty_ins_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_all_empty)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {};
|
|
|
|
const uint64_t outputs[] = {};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_all_empty_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {};
|
|
|
|
const uint64_t outputs[] = {};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-06-14 12:15:49 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_empty)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {0};
|
|
|
|
const uint64_t outputs[] = {};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_zero_empty_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {0};
|
|
|
|
const uint64_t outputs[] = {};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_empty_zero)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {};
|
|
|
|
const uint64_t outputs[] = {0};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_empty_zero_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {};
|
|
|
|
const uint64_t outputs[] = {0};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 18:33:23 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_zero)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {0};
|
|
|
|
const uint64_t outputs[] = {0};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_zero_zero_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {0};
|
|
|
|
const uint64_t outputs[] = {0};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 18:33:23 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_out_first)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {0, 5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_zero_out_first_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {0, 5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 18:33:23 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_out_last)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {5000, 0};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_zero_out_last_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {5000, 0};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 18:33:23 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_out_middle)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {2500, 0, 2500};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_zero_out_middle_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {2500, 0, 2500};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2019-04-11 14:41:41 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero)
|
2016-05-27 14:40:18 -04:00
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
const uint64_t inputs[] = {0};
|
|
|
|
const uint64_t outputs[] = {0};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_zero_in_first_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {0, 5000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_in_last_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000, 0};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST(ringct, range_proofs_accept_zero_in_middle_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {2500, 0, 2500};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_lower)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {1};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_lower_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {1};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_higher)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {5001};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_higher_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {5001};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_out_negative)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {(uint64_t)-1000ll};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_out_negative_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {(uint64_t)-1000ll};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_out_negative_first)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {(uint64_t)-1000ll, 6000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_out_negative_first_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {(uint64_t)-1000ll, 6000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_out_negative_last)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {6000, (uint64_t)-1000ll};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_out_negative_last_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {6000, (uint64_t)-1000ll};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_out_negative_middle)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {3000, (uint64_t)-1000ll, 3000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_out_negative_middle_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {3000, (uint64_t)-1000ll, 3000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_in_negative)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {(uint64_t)-1000ll};
|
|
|
|
const uint64_t outputs[] = {5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_single_in_negative_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {(uint64_t)-1000ll};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_in_negative_first)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {(uint64_t)-1000ll, 6000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_in_negative_first_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {(uint64_t)-1000ll, 6000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_in_negative_last)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {6000, (uint64_t)-1000ll};
|
|
|
|
const uint64_t outputs[] = {5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_in_negative_last_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {6000, (uint64_t)-1000ll};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_in_negative_middle)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {3000, (uint64_t)-1000ll, 3000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_in_negative_middle_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {3000, (uint64_t)-1000ll, 3000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_higher_list)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {1000, 1000, 1000, 1000, 1000, 1000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_reject_higher_list_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {1000, 1000, 1000, 1000, 1000, 1000};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_1_to_1)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_1_to_1_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_1_to_N)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {1000, 1000, 1000, 1000, 1000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, range_proofs_accept_1_to_N_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {5000};
|
|
|
|
const uint64_t outputs[] = {1000, 1000, 1000, 1000, 1000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false,true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST(ringct, range_proofs_accept_N_to_1_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000, 1000, 1000, 1000};
|
|
|
|
const uint64_t outputs[] = {5000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST(ringct, range_proofs_accept_N_to_N_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000, 1000, 1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1000, 1000, 1000, 1000, 1000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST(ringct, range_proofs_accept_very_long_simple)
|
|
|
|
{
|
|
|
|
const size_t N=12;
|
2016-05-27 14:40:18 -04:00
|
|
|
uint64_t inputs[N];
|
|
|
|
uint64_t outputs[N];
|
|
|
|
for (size_t n = 0; n < N; ++n) {
|
|
|
|
inputs[n] = n;
|
|
|
|
outputs[n] = n;
|
|
|
|
}
|
2019-07-03 05:05:01 -04:00
|
|
|
std::shuffle(inputs, inputs + N, crypto::random_device{});
|
|
|
|
std::shuffle(outputs, outputs + N, crypto::random_device{});
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, false, true));
|
2016-05-27 14:40:18 -04:00
|
|
|
}
|
|
|
|
|
2016-06-02 14:04:10 -04:00
|
|
|
TEST(ringct, HPow2)
|
|
|
|
{
|
|
|
|
key G = scalarmultBase(d2h(1));
|
|
|
|
|
2019-08-27 16:22:44 -04:00
|
|
|
// Note that H is computed differently than standard hashing
|
|
|
|
// This method is not guaranteed to return a curvepoint for all inputs
|
|
|
|
// Don't use it elsewhere
|
|
|
|
key H = cn_fast_hash(G);
|
|
|
|
ge_p3 H_p3;
|
|
|
|
int decode = ge_frombytes_vartime(&H_p3, H.bytes);
|
|
|
|
ASSERT_EQ(decode, 0); // this is known to pass for the particular value G
|
|
|
|
ge_p2 H_p2;
|
|
|
|
ge_p3_to_p2(&H_p2, &H_p3);
|
|
|
|
ge_p1p1 H8_p1p1;
|
|
|
|
ge_mul8(&H8_p1p1, &H_p2);
|
|
|
|
ge_p1p1_to_p3(&H_p3, &H8_p1p1);
|
|
|
|
ge_p3_tobytes(H.bytes, &H_p3);
|
|
|
|
|
2016-06-02 14:04:10 -04:00
|
|
|
for (int j = 0 ; j < ATOMS ; j++) {
|
|
|
|
ASSERT_TRUE(equalKeys(H, H2[j]));
|
|
|
|
addKeys(H, H, H);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-14 07:21:53 -04:00
|
|
|
static const xmr_amount test_amounts[]={0, 1, 2, 3, 4, 5, 10000, 10000000000000000000ull, 10203040506070809000ull, 123456789123456789};
|
|
|
|
|
|
|
|
TEST(ringct, d2h)
|
|
|
|
{
|
|
|
|
key k, P1;
|
|
|
|
skpkGen(k, P1);
|
|
|
|
for (auto amount: test_amounts) {
|
|
|
|
d2h(k, amount);
|
|
|
|
ASSERT_TRUE(amount == h2d(k));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, d2b)
|
|
|
|
{
|
|
|
|
for (auto amount: test_amounts) {
|
|
|
|
bits b;
|
|
|
|
d2b(b, amount);
|
|
|
|
ASSERT_TRUE(amount == b2d(b));
|
|
|
|
}
|
|
|
|
}
|
2016-05-30 03:56:23 -04:00
|
|
|
|
|
|
|
TEST(ringct, prooveRange_is_non_deterministic)
|
|
|
|
{
|
|
|
|
key C[2], mask[2];
|
|
|
|
for (int n = 0; n < 2; ++n)
|
|
|
|
proveRange(C[n], mask[n], 80);
|
|
|
|
ASSERT_TRUE(memcmp(C[0].bytes, C[1].bytes, sizeof(C[0].bytes)));
|
|
|
|
ASSERT_TRUE(memcmp(mask[0].bytes, mask[1].bytes, sizeof(mask[0].bytes)));
|
|
|
|
}
|
2016-06-14 12:15:49 -04:00
|
|
|
|
|
|
|
TEST(ringct, fee_0_valid)
|
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
const uint64_t inputs[] = {2000};
|
2016-06-14 12:15:49 -04:00
|
|
|
const uint64_t outputs[] = {2000, 0};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_0_valid_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {2000, 0};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, true));
|
2016-06-14 12:15:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_non_0_valid)
|
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
const uint64_t inputs[] = {2000};
|
2016-06-14 12:15:49 -04:00
|
|
|
const uint64_t outputs[] = {1900, 100};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_non_0_valid_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1900, 100};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, true));
|
2016-06-14 12:15:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_non_0_invalid_higher)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1990, 100};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, true, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_non_0_invalid_higher_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1990, 100};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, true, true));
|
2016-06-14 12:15:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_non_0_invalid_lower)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1000, 100};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, true, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_non_0_invalid_lower_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1000, 100};
|
|
|
|
EXPECT_TRUE(range_proof_test(false, NELTS(inputs), inputs, NELTS(outputs), outputs, true, true));
|
2016-06-14 12:15:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_burn_valid_one_out)
|
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
const uint64_t inputs[] = {2000};
|
2016-06-14 12:15:49 -04:00
|
|
|
const uint64_t outputs[] = {0, 2000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_burn_valid_one_out_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {0, 2000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, true));
|
2016-06-14 12:15:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_burn_valid_zero_out)
|
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
const uint64_t inputs[] = {2000};
|
2016-06-14 12:15:49 -04:00
|
|
|
const uint64_t outputs[] = {2000};
|
2016-07-10 17:55:26 -04:00
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, false));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, fee_burn_valid_zero_out_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {2000};
|
|
|
|
EXPECT_TRUE(range_proof_test(true, NELTS(inputs), inputs, NELTS(outputs), outputs, true, true));
|
2016-06-14 12:15:49 -04:00
|
|
|
}
|
|
|
|
|
2018-06-27 06:09:33 -04:00
|
|
|
static rctSig make_sig()
|
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
static const uint64_t inputs[] = {2000};
|
2018-06-27 06:09:33 -04:00
|
|
|
static const uint64_t outputs[] = {1000, 1000};
|
|
|
|
static rct::rctSig sig = make_sample_rct_sig(NELTS(inputs), inputs, NELTS(outputs), outputs, true);
|
|
|
|
return sig;
|
|
|
|
}
|
|
|
|
|
2016-06-17 16:29:21 -04:00
|
|
|
#define TEST_rctSig_elements(name, op) \
|
|
|
|
TEST(ringct, rctSig_##name) \
|
|
|
|
{ \
|
2018-06-27 06:09:33 -04:00
|
|
|
rct::rctSig sig = make_sig(); \
|
2016-06-17 16:29:21 -04:00
|
|
|
ASSERT_TRUE(rct::verRct(sig)); \
|
|
|
|
op; \
|
|
|
|
ASSERT_FALSE(rct::verRct(sig)); \
|
|
|
|
}
|
|
|
|
|
2016-08-09 16:34:09 -04:00
|
|
|
TEST_rctSig_elements(rangeSigs_empty, sig.p.rangeSigs.resize(0));
|
|
|
|
TEST_rctSig_elements(rangeSigs_too_many, sig.p.rangeSigs.push_back(sig.p.rangeSigs.back()));
|
|
|
|
TEST_rctSig_elements(rangeSigs_too_few, sig.p.rangeSigs.pop_back());
|
|
|
|
TEST_rctSig_elements(mgSig_MG_empty, sig.p.MGs.resize(0));
|
|
|
|
TEST_rctSig_elements(mgSig_ss_empty, sig.p.MGs[0].ss.resize(0));
|
|
|
|
TEST_rctSig_elements(mgSig_ss_too_many, sig.p.MGs[0].ss.push_back(sig.p.MGs[0].ss.back()));
|
|
|
|
TEST_rctSig_elements(mgSig_ss_too_few, sig.p.MGs[0].ss.pop_back());
|
|
|
|
TEST_rctSig_elements(mgSig_ss0_empty, sig.p.MGs[0].ss[0].resize(0));
|
|
|
|
TEST_rctSig_elements(mgSig_ss0_too_many, sig.p.MGs[0].ss[0].push_back(sig.p.MGs[0].ss[0].back()));
|
|
|
|
TEST_rctSig_elements(mgSig_ss0_too_few, sig.p.MGs[0].ss[0].pop_back());
|
|
|
|
TEST_rctSig_elements(mgSig_II_empty, sig.p.MGs[0].II.resize(0));
|
|
|
|
TEST_rctSig_elements(mgSig_II_too_many, sig.p.MGs[0].II.push_back(sig.p.MGs[0].II.back()));
|
|
|
|
TEST_rctSig_elements(mgSig_II_too_few, sig.p.MGs[0].II.pop_back());
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST_rctSig_elements(mixRing_empty, sig.mixRing.resize(0));
|
|
|
|
TEST_rctSig_elements(mixRing_too_many, sig.mixRing.push_back(sig.mixRing.back()));
|
|
|
|
TEST_rctSig_elements(mixRing_too_few, sig.mixRing.pop_back());
|
|
|
|
TEST_rctSig_elements(mixRing0_empty, sig.mixRing[0].resize(0));
|
|
|
|
TEST_rctSig_elements(mixRing0_too_many, sig.mixRing[0].push_back(sig.mixRing[0].back()));
|
|
|
|
TEST_rctSig_elements(mixRing0_too_few, sig.mixRing[0].pop_back());
|
2016-06-17 16:29:21 -04:00
|
|
|
TEST_rctSig_elements(ecdhInfo_empty, sig.ecdhInfo.resize(0));
|
|
|
|
TEST_rctSig_elements(ecdhInfo_too_many, sig.ecdhInfo.push_back(sig.ecdhInfo.back()));
|
|
|
|
TEST_rctSig_elements(ecdhInfo_too_few, sig.ecdhInfo.pop_back());
|
|
|
|
TEST_rctSig_elements(outPk_empty, sig.outPk.resize(0));
|
|
|
|
TEST_rctSig_elements(outPk_too_many, sig.outPk.push_back(sig.outPk.back()));
|
|
|
|
TEST_rctSig_elements(outPk_too_few, sig.outPk.pop_back());
|
|
|
|
|
2018-06-27 06:09:33 -04:00
|
|
|
static rct::rctSig make_sig_simple()
|
|
|
|
{
|
|
|
|
static const uint64_t inputs[] = {1000, 1000};
|
|
|
|
static const uint64_t outputs[] = {1000};
|
|
|
|
static rct::rctSig sig = make_sample_simple_rct_sig(NELTS(inputs), inputs, NELTS(outputs), outputs, 1000);
|
|
|
|
return sig;
|
|
|
|
}
|
|
|
|
|
2016-07-10 17:55:26 -04:00
|
|
|
#define TEST_rctSig_elements_simple(name, op) \
|
|
|
|
TEST(ringct, rctSig_##name##_simple) \
|
|
|
|
{ \
|
2018-06-27 06:09:33 -04:00
|
|
|
rct::rctSig sig = make_sig_simple(); \
|
2016-07-10 17:55:26 -04:00
|
|
|
ASSERT_TRUE(rct::verRctSimple(sig)); \
|
|
|
|
op; \
|
|
|
|
ASSERT_FALSE(rct::verRctSimple(sig)); \
|
|
|
|
}
|
|
|
|
|
2016-08-09 16:34:09 -04:00
|
|
|
TEST_rctSig_elements_simple(rangeSigs_empty, sig.p.rangeSigs.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(rangeSigs_too_many, sig.p.rangeSigs.push_back(sig.p.rangeSigs.back()));
|
|
|
|
TEST_rctSig_elements_simple(rangeSigs_too_few, sig.p.rangeSigs.pop_back());
|
|
|
|
TEST_rctSig_elements_simple(mgSig_empty, sig.p.MGs.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(mgSig_too_many, sig.p.MGs.push_back(sig.p.MGs.back()));
|
|
|
|
TEST_rctSig_elements_simple(mgSig_too_few, sig.p.MGs.pop_back());
|
|
|
|
TEST_rctSig_elements_simple(mgSig0_ss_empty, sig.p.MGs[0].ss.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(mgSig0_ss_too_many, sig.p.MGs[0].ss.push_back(sig.p.MGs[0].ss.back()));
|
|
|
|
TEST_rctSig_elements_simple(mgSig0_ss_too_few, sig.p.MGs[0].ss.pop_back());
|
|
|
|
TEST_rctSig_elements_simple(mgSig_ss0_empty, sig.p.MGs[0].ss[0].resize(0));
|
|
|
|
TEST_rctSig_elements_simple(mgSig_ss0_too_many, sig.p.MGs[0].ss[0].push_back(sig.p.MGs[0].ss[0].back()));
|
|
|
|
TEST_rctSig_elements_simple(mgSig_ss0_too_few, sig.p.MGs[0].ss[0].pop_back());
|
|
|
|
TEST_rctSig_elements_simple(mgSig0_II_empty, sig.p.MGs[0].II.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(mgSig0_II_too_many, sig.p.MGs[0].II.push_back(sig.p.MGs[0].II.back()));
|
|
|
|
TEST_rctSig_elements_simple(mgSig0_II_too_few, sig.p.MGs[0].II.pop_back());
|
2016-07-10 17:55:26 -04:00
|
|
|
TEST_rctSig_elements_simple(mixRing_empty, sig.mixRing.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(mixRing_too_many, sig.mixRing.push_back(sig.mixRing.back()));
|
|
|
|
TEST_rctSig_elements_simple(mixRing_too_few, sig.mixRing.pop_back());
|
|
|
|
TEST_rctSig_elements_simple(mixRing0_empty, sig.mixRing[0].resize(0));
|
|
|
|
TEST_rctSig_elements_simple(mixRing0_too_many, sig.mixRing[0].push_back(sig.mixRing[0].back()));
|
|
|
|
TEST_rctSig_elements_simple(mixRing0_too_few, sig.mixRing[0].pop_back());
|
|
|
|
TEST_rctSig_elements_simple(pseudoOuts_empty, sig.pseudoOuts.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(pseudoOuts_too_many, sig.pseudoOuts.push_back(sig.pseudoOuts.back()));
|
|
|
|
TEST_rctSig_elements_simple(pseudoOuts_too_few, sig.pseudoOuts.pop_back());
|
|
|
|
TEST_rctSig_elements_simple(ecdhInfo_empty, sig.ecdhInfo.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(ecdhInfo_too_many, sig.ecdhInfo.push_back(sig.ecdhInfo.back()));
|
|
|
|
TEST_rctSig_elements_simple(ecdhInfo_too_few, sig.ecdhInfo.pop_back());
|
|
|
|
TEST_rctSig_elements_simple(outPk_empty, sig.outPk.resize(0));
|
|
|
|
TEST_rctSig_elements_simple(outPk_too_many, sig.outPk.push_back(sig.outPk.back()));
|
|
|
|
TEST_rctSig_elements_simple(outPk_too_few, sig.outPk.pop_back());
|
|
|
|
|
|
|
|
TEST(ringct, reject_gen_simple_ver_non_simple)
|
|
|
|
{
|
|
|
|
const uint64_t inputs[] = {1000, 1000};
|
|
|
|
const uint64_t outputs[] = {1000};
|
|
|
|
rct::rctSig sig = make_sample_simple_rct_sig(NELTS(inputs), inputs, NELTS(outputs), outputs, 1000);
|
|
|
|
ASSERT_FALSE(rct::verRct(sig));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, reject_gen_non_simple_ver_simple)
|
|
|
|
{
|
2019-04-11 14:41:41 -04:00
|
|
|
const uint64_t inputs[] = {2000};
|
2016-07-10 17:55:26 -04:00
|
|
|
const uint64_t outputs[] = {1000, 1000};
|
|
|
|
rct::rctSig sig = make_sample_rct_sig(NELTS(inputs), inputs, NELTS(outputs), outputs, true);
|
|
|
|
ASSERT_FALSE(rct::verRctSimple(sig));
|
|
|
|
}
|
2017-02-27 13:33:16 -05:00
|
|
|
|
|
|
|
TEST(ringct, key_ostream)
|
|
|
|
{
|
|
|
|
std::stringstream out;
|
|
|
|
out << "BEGIN" << rct::H << "END";
|
|
|
|
EXPECT_EQ(
|
|
|
|
std::string{"BEGIN<8b655970153799af2aeadc9ff1add0ea6c7251d54154cfa92c173a0dd39c1f94>END"},
|
|
|
|
out.str()
|
|
|
|
);
|
|
|
|
}
|
2018-06-06 05:05:14 -04:00
|
|
|
|
|
|
|
TEST(ringct, zeroCommmit)
|
|
|
|
{
|
|
|
|
static const uint64_t amount = crypto::rand<uint64_t>();
|
|
|
|
const rct::key z = rct::zeroCommit(amount);
|
|
|
|
const rct::key a = rct::scalarmultBase(rct::identity());
|
|
|
|
const rct::key b = rct::scalarmultH(rct::d2h(amount));
|
|
|
|
const rct::key manual = rct::addKeys(a, b);
|
|
|
|
ASSERT_EQ(z, manual);
|
|
|
|
}
|
2018-02-03 09:36:29 -05:00
|
|
|
|
2018-11-04 10:38:59 -05:00
|
|
|
static rct::key uncachedZeroCommit(uint64_t amount)
|
|
|
|
{
|
|
|
|
const rct::key am = rct::d2h(amount);
|
|
|
|
const rct::key bH = rct::scalarmultH(am);
|
|
|
|
return rct::addKeys(rct::G, bH);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ringct, zeroCommitCache)
|
|
|
|
{
|
|
|
|
ASSERT_EQ(rct::zeroCommit(0), uncachedZeroCommit(0));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(1), uncachedZeroCommit(1));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(2), uncachedZeroCommit(2));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(10), uncachedZeroCommit(10));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(200), uncachedZeroCommit(200));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(1000000000), uncachedZeroCommit(1000000000));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(3000000000000), uncachedZeroCommit(3000000000000));
|
|
|
|
ASSERT_EQ(rct::zeroCommit(900000000000000), uncachedZeroCommit(900000000000000));
|
|
|
|
}
|
|
|
|
|
2018-05-24 15:14:09 -04:00
|
|
|
TEST(ringct, H)
|
|
|
|
{
|
|
|
|
ge_p3 p3;
|
|
|
|
ASSERT_EQ(ge_frombytes_vartime(&p3, rct::H.bytes), 0);
|
|
|
|
ASSERT_EQ(memcmp(&p3, &ge_p3_H, sizeof(ge_p3)), 0);
|
|
|
|
}
|
|
|
|
|
2018-08-06 11:21:07 -04:00
|
|
|
TEST(ringct, mul8)
|
|
|
|
{
|
2020-04-14 20:31:30 -04:00
|
|
|
ge_p3 p3;
|
|
|
|
rct::key key;
|
2018-08-06 11:21:07 -04:00
|
|
|
ASSERT_EQ(rct::scalarmult8(rct::identity()), rct::identity());
|
2020-04-14 20:31:30 -04:00
|
|
|
rct::scalarmult8(p3,rct::identity());
|
|
|
|
ge_p3_tobytes(key.bytes, &p3);
|
|
|
|
ASSERT_EQ(key, rct::identity());
|
2018-08-06 11:21:07 -04:00
|
|
|
ASSERT_EQ(rct::scalarmult8(rct::H), rct::scalarmultKey(rct::H, rct::EIGHT));
|
2020-04-14 20:31:30 -04:00
|
|
|
rct::scalarmult8(p3,rct::H);
|
|
|
|
ge_p3_tobytes(key.bytes, &p3);
|
|
|
|
ASSERT_EQ(key, rct::scalarmultKey(rct::H, rct::EIGHT));
|
2018-08-06 11:21:07 -04:00
|
|
|
ASSERT_EQ(rct::scalarmultKey(rct::scalarmultKey(rct::H, rct::INV_EIGHT), rct::EIGHT), rct::H);
|
|
|
|
}
|
|
|
|
|
2018-02-03 09:36:29 -05:00
|
|
|
TEST(ringct, aggregated)
|
|
|
|
{
|
|
|
|
static const size_t N_PROOFS = 16;
|
|
|
|
std::vector<rctSig> s(N_PROOFS);
|
|
|
|
std::vector<const rctSig*> sp(N_PROOFS);
|
|
|
|
|
|
|
|
for (size_t n = 0; n < N_PROOFS; ++n)
|
|
|
|
{
|
|
|
|
static const uint64_t inputs[] = {1000, 1000};
|
|
|
|
static const uint64_t outputs[] = {500, 1500};
|
|
|
|
s[n] = make_sample_simple_rct_sig(NELTS(inputs), inputs, NELTS(outputs), outputs, 0);
|
|
|
|
sp[n] = &s[n];
|
|
|
|
}
|
|
|
|
|
|
|
|
ASSERT_TRUE(verRctSemanticsSimple(sp));
|
|
|
|
}
|