mirror of
https://github.com/monero-project/monero.git
synced 2024-12-18 02:04:22 -05:00
5b4fea72cf
Co-authored-by: plowsof <plowsof@protonmail.com> extra files
104 lines
3.9 KiB
C++
104 lines
3.9 KiB
C++
// Copyright (c) 2014-2023, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
#include "crypto/crypto.cpp"
|
|
|
|
#include "crypto-tests.h"
|
|
|
|
static void get_ge_p3_for_identity_test(const crypto::public_key &point, crypto::ge_p3 &result_out_p3)
|
|
{
|
|
// compute (K + K) - K - K to get a specific ge_p3 point representation of identity
|
|
crypto::ge_cached temp_cache;
|
|
crypto::ge_p1p1 temp_p1p1;
|
|
|
|
crypto::ge_frombytes_vartime(&result_out_p3, &point); // K
|
|
crypto::ge_p3_to_cached(&temp_cache, &result_out_p3);
|
|
crypto::ge_add(&temp_p1p1, &result_out_p3, &temp_cache); // K + K
|
|
crypto::ge_p1p1_to_p3(&result_out_p3, &temp_p1p1);
|
|
crypto::ge_sub(&temp_p1p1, &result_out_p3, &temp_cache); // (K + K) - K
|
|
crypto::ge_p1p1_to_p3(&result_out_p3, &temp_p1p1);
|
|
crypto::ge_sub(&temp_p1p1, &result_out_p3, &temp_cache); // ((K + K) - K) - K
|
|
crypto::ge_p1p1_to_p3(&result_out_p3, &temp_p1p1);
|
|
}
|
|
|
|
static int ge_p3_is_point_at_infinity_vartime_bad(const crypto::ge_p3 *p) {
|
|
// X = 0 and Y == Z
|
|
// bad: components of 'p' are not reduced mod q
|
|
int n;
|
|
for (n = 0; n < 10; ++n)
|
|
{
|
|
if (p->X[n] | p->T[n])
|
|
return 0;
|
|
if (p->Y[n] != p->Z[n])
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
bool check_scalar(const crypto::ec_scalar &scalar) {
|
|
return crypto::sc_check(crypto::operator &(scalar)) == 0;
|
|
}
|
|
|
|
void random_scalar(crypto::ec_scalar &res) {
|
|
crypto::random_scalar(res);
|
|
}
|
|
|
|
void hash_to_scalar(const void *data, std::size_t length, crypto::ec_scalar &res) {
|
|
crypto::hash_to_scalar(data, length, res);
|
|
}
|
|
|
|
void hash_to_point(const crypto::hash &h, crypto::ec_point &res) {
|
|
crypto::ge_p2 point;
|
|
crypto::ge_fromfe_frombytes_vartime(&point, reinterpret_cast<const unsigned char *>(&h));
|
|
crypto::ge_tobytes(crypto::operator &(res), &point);
|
|
}
|
|
|
|
void hash_to_ec(const crypto::public_key &key, crypto::ec_point &res) {
|
|
crypto::ge_p3 tmp;
|
|
crypto::hash_to_ec(key, tmp);
|
|
crypto::ge_p3_tobytes(crypto::operator &(res), &tmp);
|
|
}
|
|
|
|
bool check_ge_p3_identity_failure(const crypto::public_key &point)
|
|
{
|
|
crypto::ge_p3 ident_p3;
|
|
get_ge_p3_for_identity_test(point, ident_p3);
|
|
|
|
return ge_p3_is_point_at_infinity_vartime_bad(&ident_p3) == 1;
|
|
}
|
|
|
|
bool check_ge_p3_identity_success(const crypto::public_key &point)
|
|
{
|
|
crypto::ge_p3 ident_p3;
|
|
get_ge_p3_for_identity_test(point, ident_p3);
|
|
|
|
return crypto::ge_p3_is_point_at_infinity_vartime(&ident_p3) == 1;
|
|
}
|