Changeset View
Changeset View
Standalone View
Standalone View
src/secp256k1/src/modules/schnorr/tests_impl.h
Show First 20 Lines • Show All 72 Lines • ▼ Show 20 Lines | for (i = 0; i < SIG_COUNT; i++) { | ||||
CHECK(secp256k1_schnorr_sig_verify(&ctx->ecmult_ctx, sig64[i], &pubkey[i], msg32) == 0); | CHECK(secp256k1_schnorr_sig_verify(&ctx->ecmult_ctx, sig64[i], &pubkey[i], msg32) == 0); | ||||
sig64[i][pos] ^= mod; | sig64[i][pos] ^= mod; | ||||
} | } | ||||
} | } | ||||
} | } | ||||
#undef SIG_COUNT | #undef SIG_COUNT | ||||
void run_schnorr_compact_test(void) { | void run_schnorr_test_vectors(void) { | ||||
{ | { | ||||
/* Test vector 1 */ | /* Test vector 1 */ | ||||
static const unsigned char pkbuf[33] = { | static const unsigned char pkbuf[33] = { | ||||
0x02, | 0x02, | ||||
0x79, 0xBE, 0x66, 0x7E, 0xF9, 0xDC, 0xBB, 0xAC, | 0x79, 0xBE, 0x66, 0x7E, 0xF9, 0xDC, 0xBB, 0xAC, | ||||
0x55, 0xA0, 0x62, 0x95, 0xCE, 0x87, 0x0B, 0x07, | 0x55, 0xA0, 0x62, 0x95, 0xCE, 0x87, 0x0B, 0x07, | ||||
0x02, 0x9B, 0xFC, 0xDB, 0x2D, 0xCE, 0x28, 0xD9, | 0x02, 0x9B, 0xFC, 0xDB, 0x2D, 0xCE, 0x28, 0xD9, | ||||
0x59, 0xF2, 0x81, 0x5B, 0x16, 0xF8, 0x17, 0x98, | 0x59, 0xF2, 0x81, 0x5B, 0x16, 0xF8, 0x17, 0x98, | ||||
▲ Show 20 Lines • Show All 412 Lines • ▼ Show 20 Lines | void run_schnorr_test_vectors(void) { | ||||
0xBA, 0xAE, 0xDC, 0xE6, 0xAF, 0x48, 0xA0, 0x3B, | 0xBA, 0xAE, 0xDC, 0xE6, 0xAF, 0x48, 0xA0, 0x3B, | ||||
0xBF, 0xD2, 0x5E, 0x8C, 0xD0, 0x36, 0x41, 0x41, | 0xBF, 0xD2, 0x5E, 0x8C, 0xD0, 0x36, 0x41, 0x41, | ||||
}; | }; | ||||
secp256k1_pubkey pubkey; | secp256k1_pubkey pubkey; | ||||
CHECK(secp256k1_ec_pubkey_parse(ctx, &pubkey, pkbuf, 33)); | CHECK(secp256k1_ec_pubkey_parse(ctx, &pubkey, pkbuf, 33)); | ||||
CHECK(secp256k1_schnorr_verify(ctx, sig, msg, &pubkey) == 0); | CHECK(secp256k1_schnorr_verify(ctx, sig, msg, &pubkey) == 0); | ||||
} | } | ||||
{ | |||||
/* Combine 2 keys */ | |||||
static const unsigned char skbuf[2][32] = {{ | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, | |||||
}, { | |||||
0xB7, 0xE1, 0x51, 0x62, 0x8A, 0xED, 0x2A, 0x6A, | |||||
0xBF, 0x71, 0x58, 0x80, 0x9C, 0xF4, 0xF3, 0xC7, | |||||
0x62, 0xE7, 0x16, 0x0F, 0x38, 0xB4, 0xDA, 0x56, | |||||
0xA7, 0x84, 0xD9, 0x04, 0x51, 0x90, 0xCF, 0xEF, | |||||
}}; | |||||
static const unsigned char partial_skbuf[2][32] = {{ | |||||
0x50, 0x15, 0x5e, 0x3f, 0x22, 0x43, 0x62, 0x01, | |||||
0x62, 0x69, 0xb5, 0xeb, 0x59, 0x5b, 0xe6, 0x71, | |||||
0x0d, 0xcb, 0x6c, 0xf7, 0x2f, 0x72, 0x01, 0x47, | |||||
0x49, 0x5e, 0x5f, 0x5e, 0x57, 0xb5, 0xd9, 0xb3, | |||||
}, { | |||||
0x06, 0xea, 0x81, 0xd7, 0xe3, 0xf3, 0x64, 0x98, | |||||
0xca, 0x79, 0xfa, 0xff, 0x6d, 0x62, 0xad, 0x5b, | |||||
0xbf, 0x6a, 0x69, 0x4a, 0x33, 0x9f, 0x6b, 0xe6, | |||||
0x6b, 0xbb, 0x44, 0x0f, 0x2e, 0x9b, 0x1c, 0x7e, | |||||
}}; | |||||
static const unsigned char pkbuf[2][33] = {{ | |||||
0x02, | |||||
0x79, 0xBE, 0x66, 0x7E, 0xF9, 0xDC, 0xBB, 0xAC, | |||||
0x55, 0xA0, 0x62, 0x95, 0xCE, 0x87, 0x0B, 0x07, | |||||
0x02, 0x9B, 0xFC, 0xDB, 0x2D, 0xCE, 0x28, 0xD9, | |||||
0x59, 0xF2, 0x81, 0x5B, 0x16, 0xF8, 0x17, 0x98, | |||||
}, { | |||||
0x02, | |||||
0xDF, 0xF1, 0xD7, 0x7F, 0x2A, 0x67, 0x1C, 0x5F, | |||||
0x36, 0x18, 0x37, 0x26, 0xDB, 0x23, 0x41, 0xBE, | |||||
0x58, 0xFE, 0xAE, 0x1D, 0xA2, 0xDE, 0xCE, 0xD8, | |||||
0x43, 0x24, 0x0F, 0x7B, 0x50, 0x2B, 0xA6, 0x59, | |||||
}}; | |||||
static const unsigned char combined_pkbuf[33] = { | |||||
0x02, | |||||
0x3f, 0x65, 0x73, 0xd0, 0xe6, 0x0c, 0x56, 0x97, | |||||
0xc3, 0xf8, 0xe5, 0xce, 0xd7, 0xd5, 0x6e, 0xe1, | |||||
0xcf, 0x3b, 0xb6, 0xc2, 0x7e, 0x9d, 0x22, 0x87, | |||||
0xf8, 0xce, 0xaa, 0xb6, 0x47, 0x61, 0x90, 0x90, | |||||
}; | |||||
int i; | |||||
unsigned char C[32], computed_pkbuf[33], computed_skbuf[2][32]; | |||||
size_t size = 33; | |||||
secp256k1_pubkey combined_pubkey; | |||||
secp256k1_pubkey pks[2]; | |||||
for (i = 0; i < 2; i++) { | |||||
CHECK(secp256k1_ec_pubkey_parse(ctx, &pks[i], pkbuf[i], 33)); | |||||
} | |||||
CHECK(secp256k1_schnorr_combine_keys(ctx, C, &combined_pubkey, pks, 2)); | |||||
CHECK(secp256k1_ec_pubkey_serialize(ctx, computed_pkbuf, &size, &combined_pubkey, SECP256K1_EC_COMPRESSED)); | |||||
CHECK(size == 33); | |||||
CHECK(memcmp(combined_pkbuf, computed_pkbuf, size) == 0); | |||||
for (i = 0; i < 2; i++) { | |||||
CHECK(secp256k1_schnorr_get_partial_key(ctx, computed_skbuf[i], C, skbuf[i], &pks[i])); | |||||
CHECK(memcmp(partial_skbuf[i], computed_skbuf[i], 32) == 0); | |||||
} | |||||
} | |||||
{ | |||||
/* Combine 2 opposite keys */ | |||||
static const unsigned char skbuf[2][32] = {{ | |||||
0xB7, 0xE1, 0x51, 0x62, 0x8A, 0xED, 0x2A, 0x6A, | |||||
0xBF, 0x71, 0x58, 0x80, 0x9C, 0xF4, 0xF3, 0xC7, | |||||
0x62, 0xE7, 0x16, 0x0F, 0x38, 0xB4, 0xDA, 0x56, | |||||
0xA7, 0x84, 0xD9, 0x04, 0x51, 0x90, 0xCF, 0xEF, | |||||
}, { | |||||
0x48, 0x1e, 0xae, 0x9d, 0x75, 0x12, 0xd5, 0x95, | |||||
0x40, 0x8e, 0xa7, 0x7f, 0x63, 0x0b, 0x0c, 0x37, | |||||
0x57, 0xc7, 0xc6, 0xd7, 0x76, 0x93, 0xc5, 0xe5, | |||||
0x18, 0x4d, 0x85, 0x88, 0x7e, 0xa5, 0x71, 0x52, | |||||
}}; | |||||
static const unsigned char partial_skbuf[2][32] = {{ | |||||
0xf4, 0xa3, 0x57, 0x59, 0xab, 0x54, 0x88, 0x05, | |||||
0x78, 0x12, 0x25, 0xc0, 0x97, 0x6a, 0xb9, 0x13, | |||||
0x1d, 0x7d, 0xc4, 0xac, 0x3a, 0xcd, 0x6f, 0xa7, | |||||
0xc3, 0xda, 0x99, 0xa8, 0x2f, 0x25, 0x97, 0x58, | |||||
}, { | |||||
0x1e, 0x35, 0x02, 0x6d, 0xd7, 0x03, 0x0e, 0x77, | |||||
0xcc, 0x1e, 0x41, 0x7d, 0x9c, 0x32, 0xa2, 0x8d, | |||||
0x17, 0x16, 0x12, 0xba, 0x9e, 0x7d, 0x35, 0xe1, | |||||
0xa3, 0xd8, 0x1b, 0xdd, 0x4b, 0x22, 0x1d, 0x24, | |||||
}}; | |||||
static const unsigned char pkbuf[2][33] = {{ | |||||
0x02, | |||||
0xDF, 0xF1, 0xD7, 0x7F, 0x2A, 0x67, 0x1C, 0x5F, | |||||
0x36, 0x18, 0x37, 0x26, 0xDB, 0x23, 0x41, 0xBE, | |||||
0x58, 0xFE, 0xAE, 0x1D, 0xA2, 0xDE, 0xCE, 0xD8, | |||||
0x43, 0x24, 0x0F, 0x7B, 0x50, 0x2B, 0xA6, 0x59, | |||||
}, { | |||||
0x03, | |||||
0xDF, 0xF1, 0xD7, 0x7F, 0x2A, 0x67, 0x1C, 0x5F, | |||||
0x36, 0x18, 0x37, 0x26, 0xDB, 0x23, 0x41, 0xBE, | |||||
0x58, 0xFE, 0xAE, 0x1D, 0xA2, 0xDE, 0xCE, 0xD8, | |||||
0x43, 0x24, 0x0F, 0x7B, 0x50, 0x2B, 0xA6, 0x59, | |||||
}}; | |||||
static const unsigned char combined_pkbuf[33] = { | |||||
0x02, | |||||
0x41, 0xc3, 0x18, 0xc6, 0x50, 0x7f, 0xec, 0x98, | |||||
0x9c, 0x0d, 0xfd, 0x42, 0x35, 0x3b, 0x67, 0x8b, | |||||
0x93, 0xec, 0xb6, 0x17, 0x7a, 0xd8, 0x6b, 0x16, | |||||
0x0d, 0xe8, 0xc9, 0x39, 0xdd, 0x07, 0x8b, 0xab, | |||||
}; | |||||
int i; | |||||
unsigned char C[32], computed_pkbuf[33], computed_skbuf[2][32]; | |||||
size_t size = 33; | |||||
secp256k1_pubkey combined_pubkey; | |||||
secp256k1_pubkey pks[2]; | |||||
for (i = 0; i < 2; i++) { | |||||
CHECK(secp256k1_ec_pubkey_parse(ctx, &pks[i], pkbuf[i], 33)); | |||||
} | |||||
CHECK(secp256k1_schnorr_combine_keys(ctx, C, &combined_pubkey, pks, 2)); | |||||
CHECK(secp256k1_ec_pubkey_serialize(ctx, computed_pkbuf, &size, &combined_pubkey, SECP256K1_EC_COMPRESSED)); | |||||
CHECK(size == 33); | |||||
CHECK(memcmp(combined_pkbuf, computed_pkbuf, size) == 0); | |||||
for (i = 0; i < 2; i++) { | |||||
CHECK(secp256k1_schnorr_get_partial_key(ctx, computed_skbuf[i], C, skbuf[i], &pks[i])); | |||||
CHECK(memcmp(partial_skbuf[i], computed_skbuf[i], 32) == 0); | |||||
} | |||||
} | |||||
{ | |||||
/* Combine 3 keys */ | |||||
static const unsigned char skbuf[3][32] = {{ | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, | |||||
}, { | |||||
0xB7, 0xE1, 0x51, 0x62, 0x8A, 0xED, 0x2A, 0x6A, | |||||
0xBF, 0x71, 0x58, 0x80, 0x9C, 0xF4, 0xF3, 0xC7, | |||||
0x62, 0xE7, 0x16, 0x0F, 0x38, 0xB4, 0xDA, 0x56, | |||||
0xA7, 0x84, 0xD9, 0x04, 0x51, 0x90, 0xCF, 0xEF, | |||||
}, { | |||||
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, | |||||
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, | |||||
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, | |||||
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x14, 0xE5, 0xC7, | |||||
}}; | |||||
static const unsigned char partial_skbuf[3][32] = {{ | |||||
0xff, 0x49, 0xbd, 0xf0, 0xff, 0x1e, 0x4d, 0x9c, | |||||
0xa2, 0x32, 0x19, 0x9a, 0x56, 0x98, 0x7a, 0x16, | |||||
0x77, 0xec, 0x95, 0x83, 0xfa, 0x84, 0xb2, 0xbe, | |||||
0xa3, 0x2c, 0x4f, 0xcf, 0x2c, 0x23, 0x17, 0xea, | |||||
}, { | |||||
0xca, 0x39, 0x96, 0x91, 0xa4, 0x9e, 0xa4, 0x47, | |||||
0x5f, 0xdb, 0x3b, 0x1f, 0x2e, 0x34, 0xd1, 0xfa, | |||||
0xfc, 0x33, 0xdf, 0x77, 0x55, 0xc3, 0xf3, 0x3e, | |||||
0xf8, 0xfe, 0x18, 0x7d, 0x0f, 0xb7, 0x35, 0x1a, | |||||
}, { | |||||
0xe8, 0x3e, 0xff, 0xbb, 0x13, 0x3f, 0xcd, 0x39, | |||||
0xd1, 0x0d, 0xf1, 0x99, 0x93, 0xa0, 0xc1, 0x90, | |||||
0x90, 0xd8, 0x3e, 0x6c, 0x94, 0x59, 0x35, 0xc4, | |||||
0xb5, 0xc6, 0x59, 0x92, 0x61, 0x50, 0xd7, 0xb1, | |||||
}}; | |||||
static const unsigned char pkbuf[3][33] = {{ | |||||
0x02, | |||||
0x79, 0xBE, 0x66, 0x7E, 0xF9, 0xDC, 0xBB, 0xAC, | |||||
0x55, 0xA0, 0x62, 0x95, 0xCE, 0x87, 0x0B, 0x07, | |||||
0x02, 0x9B, 0xFC, 0xDB, 0x2D, 0xCE, 0x28, 0xD9, | |||||
0x59, 0xF2, 0x81, 0x5B, 0x16, 0xF8, 0x17, 0x98, | |||||
}, { | |||||
0x02, | |||||
0xDF, 0xF1, 0xD7, 0x7F, 0x2A, 0x67, 0x1C, 0x5F, | |||||
0x36, 0x18, 0x37, 0x26, 0xDB, 0x23, 0x41, 0xBE, | |||||
0x58, 0xFE, 0xAE, 0x1D, 0xA2, 0xDE, 0xCE, 0xD8, | |||||
0x43, 0x24, 0x0F, 0x7B, 0x50, 0x2B, 0xA6, 0x59, | |||||
}, { | |||||
0x03, | |||||
0xFA, 0xC2, 0x11, 0x4C, 0x2F, 0xBB, 0x09, 0x15, | |||||
0x27, 0xEB, 0x7C, 0x64, 0xEC, 0xB1, 0x1F, 0x80, | |||||
0x21, 0xCB, 0x45, 0xE8, 0xE7, 0x80, 0x9D, 0x3C, | |||||
0x09, 0x38, 0xE4, 0xB8, 0xC0, 0xE5, 0xF8, 0x4B, | |||||
}}; | |||||
static const unsigned char combined_pkbuf[33] = { | |||||
0x02, | |||||
0x7c, 0xba, 0x0b, 0x6a, 0xd6, 0x63, 0xef, 0x22, | |||||
0xa8, 0xa4, 0x22, 0x6e, 0xf5, 0x8b, 0x2b, 0x1a, | |||||
0x57, 0x55, 0x00, 0xe2, 0x5e, 0xa0, 0x67, 0x88, | |||||
0x09, 0xa7, 0x12, 0xac, 0x66, 0x26, 0x00, 0x23, | |||||
}; | |||||
int i; | |||||
unsigned char C[32], computed_pkbuf[33], computed_skbuf[3][32]; | |||||
size_t size = 33; | |||||
secp256k1_pubkey combined_pubkey; | |||||
secp256k1_pubkey pks[3]; | |||||
for (i = 0; i < 3; i++) { | |||||
CHECK(secp256k1_ec_pubkey_parse(ctx, &pks[i], pkbuf[i], 33)); | |||||
} | |||||
CHECK(secp256k1_schnorr_combine_keys(ctx, C, &combined_pubkey, pks, 3)); | |||||
CHECK(secp256k1_ec_pubkey_serialize(ctx, computed_pkbuf, &size, &combined_pubkey, SECP256K1_EC_COMPRESSED)); | |||||
CHECK(size == 33); | |||||
CHECK(memcmp(combined_pkbuf, computed_pkbuf, size) == 0); | |||||
for (i = 0; i < 3; i++) { | |||||
CHECK(secp256k1_schnorr_get_partial_key(ctx, computed_skbuf[i], C, skbuf[i], &pks[i])); | |||||
CHECK(memcmp(partial_skbuf[i], computed_skbuf[i], 32) == 0); | |||||
} | |||||
} | |||||
} | } | ||||
void run_schnorr_tests(void) { | void run_schnorr_tests(void) { | ||||
int i; | int i; | ||||
for (i = 0; i < 32 * count; i++) { | for (i = 0; i < 32 * count; i++) { | ||||
test_schnorr_end_to_end(); | test_schnorr_end_to_end(); | ||||
} | } | ||||
test_schnorr_sign_verify(); | test_schnorr_sign_verify(); | ||||
run_schnorr_compact_test(); | run_schnorr_test_vectors(); | ||||
} | } | ||||
#endif | #endif |