Merge bitcoin-core/secp256k1#920: Test all ecmult functions with many j*2^i combinations
5eb519e1f6
ci: reduce TEST_ITERS in memcheck run (Pieter Wuille)e2cf77328a
Test ecmult functions for all i*2^j for j=0..255 and odd i=1..255. (Pieter Wuille) Pull request description: Instead of just testing properties of the points xG for x=-36..36: * also compute all xG where x=j*2^i for i=0..255 and odd j=1..255. * test them against known exact results (SHA256 all of them, and compared against an independently created result) * test all 4 ecmult functions (and for secp256k1_ecmult and secp256k1_ecmult_multi_var, both as G, and through the generic point input) ACKs for top commit: real-or-random: ACK5eb519e1f6
jonasnick: ACK5eb519e1f6
Tree-SHA512: 5d3fcbff754e859ba27d4f4581fa91fafb450fa3f7880364667dba51287e7f02f489af19b9de6a6e0f52faa183c0c7ae46db6add05180c3d4f45a6557b00c0ed
This commit is contained in:
commit
486205aa68
|
@ -290,7 +290,7 @@ task:
|
|||
env:
|
||||
# The `--error-exitcode` is required to make the test fail if valgrind found errors, otherwise it'll return 0 (https://www.valgrind.org/docs/manual/manual-core.html)
|
||||
WRAPPER_CMD: "valgrind --error-exitcode=42"
|
||||
SECP256K1_TEST_ITERS: 16
|
||||
SECP256K1_TEST_ITERS: 2
|
||||
- name: "UBSan, ASan, LSan"
|
||||
env:
|
||||
CFLAGS: "-fsanitize=undefined,address -g"
|
||||
|
|
102
src/tests.c
102
src/tests.c
|
@ -4489,37 +4489,89 @@ void run_wnaf(void) {
|
|||
CHECK(secp256k1_scalar_is_zero(&n));
|
||||
}
|
||||
|
||||
static int test_ecmult_accumulate_cb(secp256k1_scalar* sc, secp256k1_ge* pt, size_t idx, void* data) {
|
||||
const secp256k1_scalar* indata = (const secp256k1_scalar*)data;
|
||||
*sc = *indata;
|
||||
*pt = secp256k1_ge_const_g;
|
||||
CHECK(idx == 0);
|
||||
return 1;
|
||||
}
|
||||
|
||||
void test_ecmult_accumulate(secp256k1_sha256* acc, const secp256k1_scalar* x, secp256k1_scratch* scratch) {
|
||||
/* Compute x*G in 6 different ways, serialize it uncompressed, and feed it into acc. */
|
||||
secp256k1_gej rj1, rj2, rj3, rj4, rj5, rj6, gj, infj;
|
||||
secp256k1_ge r;
|
||||
const secp256k1_scalar zero = SECP256K1_SCALAR_CONST(0, 0, 0, 0, 0, 0, 0, 0);
|
||||
unsigned char bytes[65];
|
||||
size_t size = 65;
|
||||
secp256k1_gej_set_ge(&gj, &secp256k1_ge_const_g);
|
||||
secp256k1_gej_set_infinity(&infj);
|
||||
secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &rj1, x);
|
||||
secp256k1_ecmult(&rj2, &gj, x, &zero);
|
||||
secp256k1_ecmult(&rj3, &infj, &zero, x);
|
||||
secp256k1_ecmult_multi_var(NULL, scratch, &rj4, x, NULL, NULL, 0);
|
||||
secp256k1_ecmult_multi_var(NULL, scratch, &rj5, &zero, test_ecmult_accumulate_cb, (void*)x, 1);
|
||||
secp256k1_ecmult_const(&rj6, &secp256k1_ge_const_g, x, 256);
|
||||
secp256k1_ge_set_gej_var(&r, &rj1);
|
||||
ge_equals_gej(&r, &rj2);
|
||||
ge_equals_gej(&r, &rj3);
|
||||
ge_equals_gej(&r, &rj4);
|
||||
ge_equals_gej(&r, &rj5);
|
||||
ge_equals_gej(&r, &rj6);
|
||||
if (secp256k1_ge_is_infinity(&r)) {
|
||||
/* Store infinity as 0x00 */
|
||||
const unsigned char zerobyte[1] = {0};
|
||||
secp256k1_sha256_write(acc, zerobyte, 1);
|
||||
} else {
|
||||
/* Store other points using their uncompressed serialization. */
|
||||
secp256k1_eckey_pubkey_serialize(&r, bytes, &size, 0);
|
||||
CHECK(size == 65);
|
||||
secp256k1_sha256_write(acc, bytes, size);
|
||||
}
|
||||
}
|
||||
|
||||
void test_ecmult_constants(void) {
|
||||
/* Test ecmult_gen() for [0..36) and [order-36..0). */
|
||||
/* Test ecmult_gen for:
|
||||
* - For i in 0..36:
|
||||
* - Key i
|
||||
* - Key -i
|
||||
* - For i in 0..255:
|
||||
* - For j in 1..255 (only odd values):
|
||||
* - Key (j*2^i) mod order
|
||||
*/
|
||||
secp256k1_scalar x;
|
||||
secp256k1_gej r;
|
||||
secp256k1_ge ng;
|
||||
int i;
|
||||
int j;
|
||||
secp256k1_ge_neg(&ng, &secp256k1_ge_const_g);
|
||||
for (i = 0; i < 36; i++ ) {
|
||||
secp256k1_scalar_set_int(&x, i);
|
||||
secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &r, &x);
|
||||
for (j = 0; j < i; j++) {
|
||||
if (j == i - 1) {
|
||||
ge_equals_gej(&secp256k1_ge_const_g, &r);
|
||||
}
|
||||
secp256k1_gej_add_ge(&r, &r, &ng);
|
||||
}
|
||||
CHECK(secp256k1_gej_is_infinity(&r));
|
||||
}
|
||||
for (i = 1; i <= 36; i++ ) {
|
||||
secp256k1_sha256 acc;
|
||||
unsigned char b32[32];
|
||||
int i, j;
|
||||
secp256k1_scratch_space *scratch = secp256k1_scratch_space_create(ctx, 65536);
|
||||
|
||||
/* Expected hash of all the computed points; created with an independent
|
||||
* implementation. */
|
||||
static const unsigned char expected32[32] = {
|
||||
0xe4, 0x71, 0x1b, 0x4d, 0x14, 0x1e, 0x68, 0x48,
|
||||
0xb7, 0xaf, 0x47, 0x2b, 0x4c, 0xd2, 0x04, 0x14,
|
||||
0x3a, 0x75, 0x87, 0x60, 0x1a, 0xf9, 0x63, 0x60,
|
||||
0xd0, 0xcb, 0x1f, 0xaa, 0x85, 0x9a, 0xb7, 0xb4
|
||||
};
|
||||
secp256k1_sha256_initialize(&acc);
|
||||
for (i = 0; i <= 36; ++i) {
|
||||
secp256k1_scalar_set_int(&x, i);
|
||||
test_ecmult_accumulate(&acc, &x, scratch);
|
||||
secp256k1_scalar_negate(&x, &x);
|
||||
secp256k1_ecmult_gen(&ctx->ecmult_gen_ctx, &r, &x);
|
||||
for (j = 0; j < i; j++) {
|
||||
if (j == i - 1) {
|
||||
ge_equals_gej(&ng, &r);
|
||||
test_ecmult_accumulate(&acc, &x, scratch);
|
||||
};
|
||||
for (i = 0; i < 256; ++i) {
|
||||
for (j = 1; j < 256; j += 2) {
|
||||
int k;
|
||||
secp256k1_scalar_set_int(&x, j);
|
||||
for (k = 0; k < i; ++k) secp256k1_scalar_add(&x, &x, &x);
|
||||
test_ecmult_accumulate(&acc, &x, scratch);
|
||||
}
|
||||
secp256k1_gej_add_ge(&r, &r, &secp256k1_ge_const_g);
|
||||
}
|
||||
CHECK(secp256k1_gej_is_infinity(&r));
|
||||
}
|
||||
secp256k1_sha256_finalize(&acc, b32);
|
||||
CHECK(secp256k1_memcmp_var(b32, expected32, 32) == 0);
|
||||
|
||||
secp256k1_scratch_space_destroy(ctx, scratch);
|
||||
}
|
||||
|
||||
void run_ecmult_constants(void) {
|
||||
|
|
Loading…
Reference in New Issue