xmr.c 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. //
  2. // Created by Dusan Klinec on 10/05/2018.
  3. //
  4. #if USE_MONERO
  5. #include "xmr.h"
  6. #include "../byte_order.h"
  7. #include "int_util.h"
  8. #include "../rand.h"
  9. #include "serialize.h"
  10. const ge25519 ALIGN(16) xmr_h = {
  11. {0x1861ec7,
  12. 0x1ceac77,
  13. 0x2f11626,
  14. 0x1f261d3,
  15. 0x346107c,
  16. 0x06d8c4a,
  17. 0x254201d,
  18. 0x1675c09,
  19. 0x1301c3f,
  20. 0x0211d73},
  21. {0x326feb4,
  22. 0x12e30cc,
  23. 0x0cf54b4,
  24. 0x1117305,
  25. 0x318f5d5,
  26. 0x06cf754,
  27. 0x2e578a1,
  28. 0x1daf058,
  29. 0x34430a1,
  30. 0x04410e9},
  31. {0x0fde4d2,
  32. 0x0774049,
  33. 0x22ca951,
  34. 0x05aec2b,
  35. 0x07a36a5,
  36. 0x1394f13,
  37. 0x3c5385c,
  38. 0x1adb924,
  39. 0x2b6c581,
  40. 0x0a55fa4},
  41. {0x24517f7,
  42. 0x05ee936,
  43. 0x3acf5d9,
  44. 0x14b08aa,
  45. 0x3363738,
  46. 0x1051745,
  47. 0x360601e,
  48. 0x0f3f2c9,
  49. 0x1ead2cd,
  50. 0x1d3e3df}};
  51. void ge25519_set_xmr_h(ge25519* r) {
  52. ge25519_copy(r, &xmr_h);
  53. }
  54. void xmr_random_scalar(bignum256modm m) {
  55. unsigned char buff[32] = {0};
  56. random_buffer(buff, sizeof(buff));
  57. expand256_modm(m, buff, sizeof(buff));
  58. }
  59. void xmr_fast_hash(uint8_t* hash, const void* data, size_t length) {
  60. hasher_Raw(HASHER_SHA3K, data, length, hash);
  61. }
  62. void xmr_hasher_init(Hasher* hasher) {
  63. hasher_Init(hasher, HASHER_SHA3K);
  64. }
  65. void xmr_hasher_update(Hasher* hasher, const void* data, size_t length) {
  66. hasher_Update(hasher, data, length);
  67. }
  68. void xmr_hasher_final(Hasher* hasher, uint8_t* hash) {
  69. hasher_Final(hasher, hash);
  70. }
  71. void xmr_hasher_copy(Hasher* dst, const Hasher* src) {
  72. memcpy(dst, src, sizeof(Hasher));
  73. }
  74. void xmr_hash_to_scalar(bignum256modm r, const void* data, size_t length) {
  75. uint8_t hash[HASHER_DIGEST_LENGTH] = {0};
  76. hasher_Raw(HASHER_SHA3K, data, length, hash);
  77. expand256_modm(r, hash, HASHER_DIGEST_LENGTH);
  78. }
  79. void xmr_hash_to_ec(ge25519* P, const void* data, size_t length) {
  80. ge25519 point2 = {0};
  81. uint8_t hash[HASHER_DIGEST_LENGTH] = {0};
  82. hasher_Raw(HASHER_SHA3K, data, length, hash);
  83. ge25519_fromfe_frombytes_vartime(&point2, hash);
  84. ge25519_mul8(P, &point2);
  85. }
  86. void xmr_derivation_to_scalar(bignum256modm s, const ge25519* p, uint32_t output_index) {
  87. uint8_t buff[32 + 8] = {0};
  88. ge25519_pack(buff, p);
  89. int written = xmr_write_varint(buff + 32, 8, output_index);
  90. xmr_hash_to_scalar(s, buff, 32u + written);
  91. }
  92. void xmr_generate_key_derivation(ge25519* r, const ge25519* A, const bignum256modm b) {
  93. ge25519 bA = {0};
  94. ge25519_scalarmult(&bA, A, b);
  95. ge25519_mul8(r, &bA);
  96. }
  97. void xmr_derive_private_key(
  98. bignum256modm s,
  99. const ge25519* deriv,
  100. uint32_t idx,
  101. const bignum256modm base) {
  102. xmr_derivation_to_scalar(s, deriv, idx);
  103. add256_modm(s, s, base);
  104. }
  105. void xmr_derive_public_key(ge25519* r, const ge25519* deriv, uint32_t idx, const ge25519* base) {
  106. bignum256modm s = {0};
  107. ge25519 p2 = {0};
  108. xmr_derivation_to_scalar(s, deriv, idx);
  109. ge25519_scalarmult_base_niels(&p2, ge25519_niels_base_multiples, s);
  110. ge25519_add(r, base, &p2, 0);
  111. }
  112. void xmr_add_keys2(ge25519* r, const bignum256modm a, const bignum256modm b, const ge25519* B) {
  113. // aG + bB, G is basepoint
  114. ge25519 aG = {0}, bB = {0};
  115. ge25519_scalarmult_base_niels(&aG, ge25519_niels_base_multiples, a);
  116. ge25519_scalarmult(&bB, B, b);
  117. ge25519_add(r, &aG, &bB, 0);
  118. }
  119. void xmr_add_keys2_vartime(
  120. ge25519* r,
  121. const bignum256modm a,
  122. const bignum256modm b,
  123. const ge25519* B) {
  124. // aG + bB, G is basepoint
  125. ge25519_double_scalarmult_vartime(r, B, b, a);
  126. }
  127. void xmr_add_keys3(
  128. ge25519* r,
  129. const bignum256modm a,
  130. const ge25519* A,
  131. const bignum256modm b,
  132. const ge25519* B) {
  133. // aA + bB
  134. ge25519 aA = {0}, bB = {0};
  135. ge25519_scalarmult(&aA, A, a);
  136. ge25519_scalarmult(&bB, B, b);
  137. ge25519_add(r, &aA, &bB, 0);
  138. }
  139. void xmr_add_keys3_vartime(
  140. ge25519* r,
  141. const bignum256modm a,
  142. const ge25519* A,
  143. const bignum256modm b,
  144. const ge25519* B) {
  145. // aA + bB
  146. ge25519_double_scalarmult_vartime2(r, A, a, B, b);
  147. }
  148. void xmr_get_subaddress_secret_key(
  149. bignum256modm r,
  150. uint32_t major,
  151. uint32_t minor,
  152. const bignum256modm m) {
  153. const char prefix[] = "SubAddr";
  154. unsigned char buff[32] = {0};
  155. contract256_modm(buff, m);
  156. char data[sizeof(prefix) + sizeof(buff) + 2 * sizeof(uint32_t)] = {0};
  157. memcpy(data, prefix, sizeof(prefix));
  158. memcpy(data + sizeof(prefix), buff, sizeof(buff));
  159. #if BYTE_ORDER == BIG_ENDIAN
  160. REVERSE32(major, major);
  161. REVERSE32(minor, minor);
  162. #endif
  163. memcpy(data + sizeof(prefix) + sizeof(buff), &major, sizeof(uint32_t));
  164. memcpy(data + sizeof(prefix) + sizeof(buff) + sizeof(uint32_t), &minor, sizeof(uint32_t));
  165. xmr_hash_to_scalar(r, data, sizeof(data));
  166. }
  167. void xmr_gen_c(ge25519* r, const bignum256modm a, uint64_t amount) {
  168. // C = aG + bH
  169. bignum256modm b = {0};
  170. set256_modm(b, amount);
  171. xmr_add_keys2(r, a, b, &xmr_h);
  172. }
  173. #endif // USE_MONERO