bitcoin/tests.cpp

183 lines
6.3 KiB
C++
Raw Normal View History

2013-03-10 17:25:19 -03:00
#include <assert.h>
2013-03-16 11:51:55 -03:00
#include "num.cpp"
#include "field.cpp"
#include "group.cpp"
#include "ecmult.cpp"
#include "ecdsa.cpp"
2013-03-10 17:25:19 -03:00
2013-03-24 06:38:35 -03:00
// #define COUNT 2
#define COUNT 100
2013-03-10 17:25:19 -03:00
using namespace secp256k1;
2013-03-10 21:19:24 -03:00
void test_run_ecmult_chain() {
2013-03-10 18:23:33 -03:00
// random starting point A (on the curve)
2013-03-10 17:25:19 -03:00
FieldElem ax; ax.SetHex("8b30bbe9ae2a990696b22f670709dff3727fd8bc04d3362c6c7bf458e2846004");
FieldElem ay; ay.SetHex("a357ae915c4a65281309edf20504740f0eb3343990216b4f81063cb65f2f7e0f");
GroupElemJac a(ax,ay);
2013-03-10 18:23:33 -03:00
// two random initial factors xn and gn
2013-03-24 06:38:35 -03:00
secp256k1_num_t xn;
secp256k1_num_init(&xn);
secp256k1_num_set_hex(&xn, "84cc5452f7fde1edb4d38a8ce9b1b84ccef31f146e569be9705d357a42985407", 64);
secp256k1_num_t gn;
secp256k1_num_init(&gn);
secp256k1_num_set_hex(&gn, "a1e58d22553dcd42b23980625d4c57a96e9323d42b3152e5ca2c3990edc7c9de", 64);
2013-03-10 18:23:33 -03:00
// two small multipliers to be applied to xn and gn in every iteration:
2013-03-24 06:38:35 -03:00
secp256k1_num_t xf;
secp256k1_num_init(&xf);
secp256k1_num_set_hex(&xf, "1337", 4);
secp256k1_num_t gf;
secp256k1_num_init(&gf);
secp256k1_num_set_hex(&gf, "7113", 4);
2013-03-10 18:23:33 -03:00
// accumulators with the resulting coefficients to A and G
2013-03-24 06:38:35 -03:00
secp256k1_num_t ae;
secp256k1_num_init(&ae);
secp256k1_num_set_int(&ae, 1);
secp256k1_num_t ge;
secp256k1_num_init(&ge);
secp256k1_num_set_int(&ge, 0);
2013-03-10 18:23:33 -03:00
// the point being computed
2013-03-10 17:41:54 -03:00
GroupElemJac x = a;
2013-03-24 06:38:35 -03:00
const secp256k1_num_t &order = GetGroupConst().order;
for (int i=0; i<200*COUNT; i++) {
2013-03-10 17:41:54 -03:00
// in each iteration, compute X = xn*X + gn*G;
ECMult(x, x, xn, gn);
2013-03-10 17:41:54 -03:00
// also compute ae and ge: the actual accumulated factors for A and G
// if X was (ae*A+ge*G), xn*X + gn*G results in (xn*ae*A + (xn*ge+gn)*G)
2013-03-24 06:38:35 -03:00
secp256k1_num_mod_mul(&ae, &ae, &xn, &order);
secp256k1_num_mod_mul(&ge, &ge, &xn, &order);
secp256k1_num_add(&ge, &ge, &gn);
secp256k1_num_mod(&ge, &ge, &order);
2013-03-10 17:41:54 -03:00
// modify xn and gn
2013-03-24 06:38:35 -03:00
secp256k1_num_mod_mul(&xn, &xn, &xf, &order);
secp256k1_num_mod_mul(&gn, &gn, &gf, &order);
2013-03-10 17:25:19 -03:00
}
2013-03-10 17:41:54 -03:00
std::string res = x.ToString();
2013-03-24 06:38:35 -03:00
if (COUNT == 100) {
assert(res == "(D6E96687F9B10D092A6F35439D86CEBEA4535D0D409F53586440BD74B933E830,B95CBCA2C77DA786539BE8FD53354D2D3B4F566AE658045407ED6015EE1B2A88)");
}
2013-03-10 17:41:54 -03:00
// redo the computation, but directly with the resulting ae and ge coefficients:
GroupElemJac x2; ECMult(x2, a, ae, ge);
2013-03-10 17:41:54 -03:00
std::string res2 = x2.ToString();
assert(res == res2);
2013-03-24 06:38:35 -03:00
secp256k1_num_free(&xn);
secp256k1_num_free(&gn);
secp256k1_num_free(&xf);
secp256k1_num_free(&gf);
secp256k1_num_free(&ae);
secp256k1_num_free(&ge);
2013-03-10 17:25:19 -03:00
}
2013-03-10 21:19:24 -03:00
void test_point_times_order(const GroupElemJac &point) {
// either the point is not on the curve, or multiplying it by the order results in O
if (!point.IsValid())
return;
const GroupConstants &c = GetGroupConst();
2013-03-24 06:38:35 -03:00
secp256k1_num_t zero;
secp256k1_num_init(&zero);
secp256k1_num_set_int(&zero, 0);
2013-03-10 21:19:24 -03:00
GroupElemJac res;
ECMult(res, point, c.order, zero); // calc res = order * point + 0 * G;
2013-03-10 21:19:24 -03:00
assert(res.IsInfinity());
2013-03-24 06:38:35 -03:00
secp256k1_num_free(&zero);
2013-03-10 21:19:24 -03:00
}
void test_run_point_times_order() {
2013-03-10 21:35:46 -03:00
FieldElem x; x.SetHex("02");
2013-03-10 21:19:24 -03:00
for (int i=0; i<500; i++) {
GroupElemJac j; j.SetCompressed(x, true);
test_point_times_order(j);
x.SetSquare(x);
}
2013-03-10 21:40:29 -03:00
assert(x.ToString() == "7603CB59B0EF6C63FE6084792A0C378CDB3233A80F8A9A09A877DEAD31B38C45"); // 0x02 ^ (2^500)
2013-03-10 21:19:24 -03:00
}
2013-03-24 06:38:35 -03:00
void test_wnaf(const secp256k1_num_t &number, int w) {
secp256k1_num_t x, two, t;
secp256k1_num_init(&x);
secp256k1_num_init(&two);
secp256k1_num_init(&t);
secp256k1_num_set_int(&x, 0);
secp256k1_num_set_int(&two, 2);
WNAF<1023> wnaf(number, w);
2013-03-10 21:19:24 -03:00
int zeroes = -1;
for (int i=wnaf.GetSize()-1; i>=0; i--) {
2013-03-24 06:38:35 -03:00
secp256k1_num_mul(&x, &x, &two);
2013-03-10 21:19:24 -03:00
int v = wnaf.Get(i);
if (v) {
assert(zeroes == -1 || zeroes >= w-1); // check that distance between non-zero elements is at least w-1
zeroes=0;
assert((v & 1) == 1); // check non-zero elements are odd
assert(v <= (1 << (w-1)) - 1); // check range below
assert(v >= -(1 << (w-1)) - 1); // check range above
} else {
assert(zeroes != -1); // check that no unnecessary zero padding exists
zeroes++;
}
2013-03-24 06:38:35 -03:00
secp256k1_num_set_int(&t, v);
secp256k1_num_add(&x, &x, &t);
2013-03-10 21:19:24 -03:00
}
2013-03-24 06:38:35 -03:00
assert(secp256k1_num_cmp(&x, &number) == 0); // check that wnaf represents number
secp256k1_num_free(&x);
secp256k1_num_free(&two);
secp256k1_num_free(&t);
2013-03-10 21:19:24 -03:00
}
void test_run_wnaf() {
2013-03-24 06:38:35 -03:00
secp256k1_num_t range, min, n;
secp256k1_num_init(&range);
secp256k1_num_init(&min);
secp256k1_num_init(&n);
secp256k1_num_set_hex(&range, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", 256);
secp256k1_num_copy(&min, &range);
secp256k1_num_shift(&min, 1);
secp256k1_num_negate(&min);
for (int i=0; i<COUNT; i++) {
secp256k1_num_set_rand(&n, &range);
secp256k1_num_add(&n, &n, &min);
2013-03-10 21:19:24 -03:00
test_wnaf(n, 4+(i%10));
}
2013-03-24 06:38:35 -03:00
secp256k1_num_free(&range);
secp256k1_num_free(&min);
secp256k1_num_free(&n);
2013-03-10 21:19:24 -03:00
}
2013-03-10 17:25:19 -03:00
2013-03-17 22:41:01 -03:00
void test_ecdsa_sign_verify() {
const GroupConstants &c = GetGroupConst();
2013-03-24 06:38:35 -03:00
secp256k1_num_t msg, key, nonce;
secp256k1_num_init(&msg);
secp256k1_num_set_rand(&msg, &c.order);
secp256k1_num_init(&key);
secp256k1_num_set_rand(&key, &c.order);
secp256k1_num_init(&nonce);
2013-03-17 22:41:01 -03:00
GroupElemJac pub; ECMultBase(pub, key);
Signature sig;
do {
2013-03-24 06:38:35 -03:00
secp256k1_num_set_rand(&nonce, &c.order);
2013-03-17 22:41:01 -03:00
} while(!sig.Sign(key, msg, nonce));
assert(sig.Verify(pub, msg));
2013-03-24 06:38:35 -03:00
secp256k1_num_inc(&msg);
2013-03-17 22:41:01 -03:00
assert(!sig.Verify(pub, msg));
2013-03-24 06:38:35 -03:00
secp256k1_num_free(&msg);
secp256k1_num_free(&key);
secp256k1_num_free(&nonce);
2013-03-17 22:41:01 -03:00
}
void test_run_ecdsa_sign_verify() {
2013-03-24 06:38:35 -03:00
for (int i=0; i<10*COUNT; i++) {
2013-03-17 22:41:01 -03:00
test_ecdsa_sign_verify();
}
}
2013-03-10 17:25:19 -03:00
int main(void) {
2013-03-24 06:38:35 -03:00
secp256k1_num_start();
2013-03-10 21:19:24 -03:00
test_run_wnaf();
test_run_point_times_order();
test_run_ecmult_chain();
2013-03-17 22:41:01 -03:00
test_run_ecdsa_sign_verify();
2013-03-10 17:25:19 -03:00
return 0;
}