1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-15 10:58:09 +00:00
trezor-firmware/crypto/monero/xmr.c

151 lines
4.6 KiB
C
Raw Normal View History

2018-07-05 00:10:34 +00:00
//
// Created by Dusan Klinec on 10/05/2018.
//
#include "xmr.h"
2021-10-25 13:43:19 +00:00
#include "../byte_order.h"
2018-07-05 00:10:34 +00:00
#include "int-util.h"
#include "rand.h"
#include "serialize.h"
2018-07-05 00:10:34 +00:00
const ge25519 ALIGN(16) xmr_h = {
{0x1861ec7, 0x1ceac77, 0x2f11626, 0x1f261d3, 0x346107c, 0x06d8c4a,
0x254201d, 0x1675c09, 0x1301c3f, 0x0211d73},
{0x326feb4, 0x12e30cc, 0x0cf54b4, 0x1117305, 0x318f5d5, 0x06cf754,
0x2e578a1, 0x1daf058, 0x34430a1, 0x04410e9},
{0x0fde4d2, 0x0774049, 0x22ca951, 0x05aec2b, 0x07a36a5, 0x1394f13,
0x3c5385c, 0x1adb924, 0x2b6c581, 0x0a55fa4},
{0x24517f7, 0x05ee936, 0x3acf5d9, 0x14b08aa, 0x3363738, 0x1051745,
0x360601e, 0x0f3f2c9, 0x1ead2cd, 0x1d3e3df}};
2018-07-05 00:10:34 +00:00
void ge25519_set_xmr_h(ge25519 *r) { ge25519_copy(r, &xmr_h); }
2018-07-05 00:10:34 +00:00
void xmr_random_scalar(bignum256modm m) {
unsigned char buff[32] = {0};
random_buffer(buff, sizeof(buff));
expand256_modm(m, buff, sizeof(buff));
2018-07-05 00:10:34 +00:00
}
void xmr_fast_hash(uint8_t *hash, const void *data, size_t length) {
hasher_Raw(HASHER_SHA3K, data, length, hash);
2018-07-05 00:10:34 +00:00
}
void xmr_hasher_init(Hasher *hasher) { hasher_Init(hasher, HASHER_SHA3K); }
2018-07-05 00:10:34 +00:00
void xmr_hasher_update(Hasher *hasher, const void *data, size_t length) {
hasher_Update(hasher, data, length);
2018-07-05 00:10:34 +00:00
}
void xmr_hasher_final(Hasher *hasher, uint8_t *hash) {
hasher_Final(hasher, hash);
2018-07-05 00:10:34 +00:00
}
void xmr_hasher_copy(Hasher *dst, const Hasher *src) {
memcpy(dst, src, sizeof(Hasher));
2018-07-05 00:10:34 +00:00
}
void xmr_hash_to_scalar(bignum256modm r, const void *data, size_t length) {
uint8_t hash[HASHER_DIGEST_LENGTH] = {0};
hasher_Raw(HASHER_SHA3K, data, length, hash);
expand256_modm(r, hash, HASHER_DIGEST_LENGTH);
2018-07-05 00:10:34 +00:00
}
void xmr_hash_to_ec(ge25519 *P, const void *data, size_t length) {
ge25519 point2 = {0};
uint8_t hash[HASHER_DIGEST_LENGTH] = {0};
hasher_Raw(HASHER_SHA3K, data, length, hash);
2018-07-05 00:10:34 +00:00
ge25519_fromfe_frombytes_vartime(&point2, hash);
ge25519_mul8(P, &point2);
2018-07-05 00:10:34 +00:00
}
void xmr_derivation_to_scalar(bignum256modm s, const ge25519 *p,
uint32_t output_index) {
uint8_t buff[32 + 8] = {0};
ge25519_pack(buff, p);
int written = xmr_write_varint(buff + 32, 8, output_index);
xmr_hash_to_scalar(s, buff, 32u + written);
2018-07-05 00:10:34 +00:00
}
void xmr_generate_key_derivation(ge25519 *r, const ge25519 *A,
const bignum256modm b) {
ge25519 bA = {0};
ge25519_scalarmult(&bA, A, b);
ge25519_mul8(r, &bA);
2018-07-05 00:10:34 +00:00
}
void xmr_derive_private_key(bignum256modm s, const ge25519 *deriv, uint32_t idx,
const bignum256modm base) {
xmr_derivation_to_scalar(s, deriv, idx);
add256_modm(s, s, base);
2018-07-05 00:10:34 +00:00
}
void xmr_derive_public_key(ge25519 *r, const ge25519 *deriv, uint32_t idx,
const ge25519 *base) {
bignum256modm s = {0};
ge25519 p2 = {0};
2018-07-05 00:10:34 +00:00
xmr_derivation_to_scalar(s, deriv, idx);
ge25519_scalarmult_base_wrapper(&p2, s);
ge25519_add(r, base, &p2, 0);
2018-07-05 00:10:34 +00:00
}
void xmr_add_keys2(ge25519 *r, const bignum256modm a, const bignum256modm b,
const ge25519 *B) {
// aG + bB, G is basepoint
ge25519 aG = {0}, bB = {0};
ge25519_scalarmult_base_wrapper(&aG, a);
ge25519_scalarmult(&bB, B, b);
ge25519_add(r, &aG, &bB, 0);
2018-07-05 00:10:34 +00:00
}
void xmr_add_keys2_vartime(ge25519 *r, const bignum256modm a,
const bignum256modm b, const ge25519 *B) {
// aG + bB, G is basepoint
ge25519_double_scalarmult_vartime(r, B, b, a);
2018-07-05 00:10:34 +00:00
}
void xmr_add_keys3(ge25519 *r, const bignum256modm a, const ge25519 *A,
const bignum256modm b, const ge25519 *B) {
// aA + bB
ge25519 aA = {0}, bB = {0};
ge25519_scalarmult(&aA, A, a);
ge25519_scalarmult(&bB, B, b);
ge25519_add(r, &aA, &bB, 0);
2018-07-05 00:10:34 +00:00
}
void xmr_add_keys3_vartime(ge25519 *r, const bignum256modm a, const ge25519 *A,
const bignum256modm b, const ge25519 *B) {
// aA + bB
ge25519_double_scalarmult_vartime2(r, A, a, B, b);
2018-07-05 00:10:34 +00:00
}
void xmr_get_subaddress_secret_key(bignum256modm r, uint32_t major,
uint32_t minor, const bignum256modm m) {
const char prefix[] = "SubAddr";
unsigned char buff[32] = {0};
contract256_modm(buff, m);
2018-07-05 00:10:34 +00:00
char data[sizeof(prefix) + sizeof(buff) + 2 * sizeof(uint32_t)] = {0};
memcpy(data, prefix, sizeof(prefix));
memcpy(data + sizeof(prefix), buff, sizeof(buff));
2021-10-25 13:43:19 +00:00
#if BYTE_ORDER == BIG_ENDIAN
REVERSE32(major, major);
REVERSE32(minor, minor);
#endif
memcpy(data + sizeof(prefix) + sizeof(buff), &major, sizeof(uint32_t));
memcpy(data + sizeof(prefix) + sizeof(buff) + sizeof(uint32_t), &minor,
sizeof(uint32_t));
2018-07-05 00:10:34 +00:00
xmr_hash_to_scalar(r, data, sizeof(data));
2018-07-05 00:10:34 +00:00
}
void xmr_gen_c(ge25519 *r, const bignum256modm a, uint64_t amount) {
// C = aG + bH
bignum256modm b = {0};
set256_modm(b, amount);
xmr_add_keys2(r, a, b, &xmr_h);
2018-07-05 00:10:34 +00:00
}