| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204 |
- //
- // Created by Dusan Klinec on 10/05/2018.
- //
- #include "options.h"
- #if USE_MONERO
- #include "xmr.h"
- #include "../byte_order.h"
- #include "int_util.h"
- #include "../rand.h"
- #include "serialize.h"
- const ge25519 ALIGN(16) xmr_h = {
- {0x1861ec7,
- 0x1ceac77,
- 0x2f11626,
- 0x1f261d3,
- 0x346107c,
- 0x06d8c4a,
- 0x254201d,
- 0x1675c09,
- 0x1301c3f,
- 0x0211d73},
- {0x326feb4,
- 0x12e30cc,
- 0x0cf54b4,
- 0x1117305,
- 0x318f5d5,
- 0x06cf754,
- 0x2e578a1,
- 0x1daf058,
- 0x34430a1,
- 0x04410e9},
- {0x0fde4d2,
- 0x0774049,
- 0x22ca951,
- 0x05aec2b,
- 0x07a36a5,
- 0x1394f13,
- 0x3c5385c,
- 0x1adb924,
- 0x2b6c581,
- 0x0a55fa4},
- {0x24517f7,
- 0x05ee936,
- 0x3acf5d9,
- 0x14b08aa,
- 0x3363738,
- 0x1051745,
- 0x360601e,
- 0x0f3f2c9,
- 0x1ead2cd,
- 0x1d3e3df}};
- void ge25519_set_xmr_h(ge25519* r) {
- ge25519_copy(r, &xmr_h);
- }
- void xmr_random_scalar(bignum256modm m) {
- unsigned char buff[32] = {0};
- random_buffer(buff, sizeof(buff));
- expand256_modm(m, buff, sizeof(buff));
- }
- void xmr_fast_hash(uint8_t* hash, const void* data, size_t length) {
- hasher_Raw(HASHER_SHA3K, data, length, hash);
- }
- void xmr_hasher_init(Hasher* hasher) {
- hasher_Init(hasher, HASHER_SHA3K);
- }
- void xmr_hasher_update(Hasher* hasher, const void* data, size_t length) {
- hasher_Update(hasher, data, length);
- }
- void xmr_hasher_final(Hasher* hasher, uint8_t* hash) {
- hasher_Final(hasher, hash);
- }
- void xmr_hasher_copy(Hasher* dst, const Hasher* src) {
- memcpy(dst, src, sizeof(Hasher));
- }
- void xmr_hash_to_scalar(bignum256modm r, const void* data, size_t length) {
- uint8_t hash[HASHER_DIGEST_LENGTH] = {0};
- hasher_Raw(HASHER_SHA3K, data, length, hash);
- expand256_modm(r, hash, HASHER_DIGEST_LENGTH);
- }
- void xmr_hash_to_ec(ge25519* P, const void* data, size_t length) {
- ge25519 point2 = {0};
- uint8_t hash[HASHER_DIGEST_LENGTH] = {0};
- hasher_Raw(HASHER_SHA3K, data, length, hash);
- ge25519_fromfe_frombytes_vartime(&point2, hash);
- ge25519_mul8(P, &point2);
- }
- void xmr_derivation_to_scalar(bignum256modm s, const ge25519* p, uint32_t output_index) {
- uint8_t buff[32 + 8] = {0};
- ge25519_pack(buff, p);
- int written = xmr_write_varint(buff + 32, 8, output_index);
- xmr_hash_to_scalar(s, buff, 32u + written);
- }
- void xmr_generate_key_derivation(ge25519* r, const ge25519* A, const bignum256modm b) {
- ge25519 bA = {0};
- ge25519_scalarmult(&bA, A, b);
- ge25519_mul8(r, &bA);
- }
- void xmr_derive_private_key(
- bignum256modm s,
- const ge25519* deriv,
- uint32_t idx,
- const bignum256modm base) {
- xmr_derivation_to_scalar(s, deriv, idx);
- add256_modm(s, s, base);
- }
- void xmr_derive_public_key(ge25519* r, const ge25519* deriv, uint32_t idx, const ge25519* base) {
- bignum256modm s = {0};
- ge25519 p2 = {0};
- xmr_derivation_to_scalar(s, deriv, idx);
- ge25519_scalarmult_base_niels(&p2, ge25519_niels_base_multiples, s);
- ge25519_add(r, base, &p2, 0);
- }
- void xmr_add_keys2(ge25519* r, const bignum256modm a, const bignum256modm b, const ge25519* B) {
- // aG + bB, G is basepoint
- ge25519 aG = {0}, bB = {0};
- ge25519_scalarmult_base_niels(&aG, ge25519_niels_base_multiples, a);
- ge25519_scalarmult(&bB, B, b);
- ge25519_add(r, &aG, &bB, 0);
- }
- void xmr_add_keys2_vartime(
- ge25519* r,
- const bignum256modm a,
- const bignum256modm b,
- const ge25519* B) {
- // aG + bB, G is basepoint
- ge25519_double_scalarmult_vartime(r, B, b, a);
- }
- void xmr_add_keys3(
- ge25519* r,
- const bignum256modm a,
- const ge25519* A,
- const bignum256modm b,
- const ge25519* B) {
- // aA + bB
- ge25519 aA = {0}, bB = {0};
- ge25519_scalarmult(&aA, A, a);
- ge25519_scalarmult(&bB, B, b);
- ge25519_add(r, &aA, &bB, 0);
- }
- void xmr_add_keys3_vartime(
- ge25519* r,
- const bignum256modm a,
- const ge25519* A,
- const bignum256modm b,
- const ge25519* B) {
- // aA + bB
- ge25519_double_scalarmult_vartime2(r, A, a, B, b);
- }
- void xmr_get_subaddress_secret_key(
- bignum256modm r,
- uint32_t major,
- uint32_t minor,
- const bignum256modm m) {
- const char prefix[] = "SubAddr";
- unsigned char buff[32] = {0};
- contract256_modm(buff, m);
- char data[sizeof(prefix) + sizeof(buff) + 2 * sizeof(uint32_t)] = {0};
- memcpy(data, prefix, sizeof(prefix));
- memcpy(data + sizeof(prefix), buff, sizeof(buff));
- #if BYTE_ORDER == BIG_ENDIAN
- REVERSE32(major, major);
- REVERSE32(minor, minor);
- #endif
- memcpy(data + sizeof(prefix) + sizeof(buff), &major, sizeof(uint32_t));
- memcpy(data + sizeof(prefix) + sizeof(buff) + sizeof(uint32_t), &minor, sizeof(uint32_t));
- xmr_hash_to_scalar(r, data, sizeof(data));
- }
- void xmr_gen_c(ge25519* r, const bignum256modm a, uint64_t amount) {
- // C = aG + bH
- bignum256modm b = {0};
- set256_modm(b, amount);
- xmr_add_keys2(r, a, b, &xmr_h);
- }
- #endif // USE_MONERO
|