// Copyright (c) 2024, The Monero Project // // All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, are // permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this list of // conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, this list // of conditions and the following disclaimer in the documentation and/or other // materials provided with the distribution. // // 3. Neither the name of the copyright holder nor the names of its contributors may be // used to endorse or promote products derived from this software without specific // prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL // THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF // THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. #include "gtest/gtest.h" #include "carrot_core/output_set_finalization.h" #include "carrot_core/payment_proposal.h" #include "carrot_mock_helpers.h" using namespace carrot; //--------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, ECDH_cryptonote_completeness) { crypto::secret_key k_view = rct::rct2sk(rct::skGen()); crypto::public_key view_pubkey = rct::rct2pk(rct::scalarmultBase(rct::sk2rct(k_view))); crypto::secret_key k_ephem = rct::rct2sk(rct::skGen()); ASSERT_NE(k_view, k_ephem); mx25519_pubkey enote_ephemeral_pubkey; make_carrot_enote_ephemeral_pubkey_cryptonote(k_ephem, enote_ephemeral_pubkey); mx25519_pubkey s_sr_sender; ASSERT_TRUE(make_carrot_uncontextualized_shared_key_sender(k_ephem, view_pubkey, s_sr_sender)); mx25519_pubkey s_sr_receiver; ASSERT_TRUE(make_carrot_uncontextualized_shared_key_receiver(k_view, enote_ephemeral_pubkey, s_sr_receiver)); EXPECT_EQ(s_sr_sender, s_sr_receiver); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, ECDH_subaddress_completeness) { crypto::secret_key k_view = rct::rct2sk(rct::skGen()); crypto::public_key spend_pubkey = rct::rct2pk(rct::pkGen()); crypto::public_key view_pubkey = rct::rct2pk(rct::scalarmultKey(rct::pk2rct(spend_pubkey), rct::sk2rct(k_view))); crypto::secret_key k_ephem = rct::rct2sk(rct::skGen()); ASSERT_NE(k_view, k_ephem); mx25519_pubkey enote_ephemeral_pubkey; make_carrot_enote_ephemeral_pubkey_subaddress(k_ephem, spend_pubkey, enote_ephemeral_pubkey); mx25519_pubkey s_sr_sender; ASSERT_TRUE(make_carrot_uncontextualized_shared_key_sender(k_ephem, view_pubkey, s_sr_sender)); mx25519_pubkey s_sr_receiver; ASSERT_TRUE(make_carrot_uncontextualized_shared_key_receiver(k_view, enote_ephemeral_pubkey, s_sr_receiver)); EXPECT_EQ(s_sr_sender, s_sr_receiver); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, ECDH_mx25519_convergence) { const mx25519_pubkey P = gen_x25519_pubkey(); const crypto::secret_key a = rct::rct2sk(rct::skGen()); const mx25519_impl *impl = mx25519_select_impl(MX25519_TYPE_AUTO); ASSERT_NE(nullptr, impl); // do Q = a * P using mx25519 mx25519_pubkey Q_mx25519; mx25519_scmul_key(impl, &Q_mx25519, reinterpret_cast(&a), &P); // do Q = a * P using make_carrot_uncontextualized_shared_key_receiver() mx25519_pubkey Q_carrot; ASSERT_TRUE(make_carrot_uncontextualized_shared_key_receiver(a, P, Q_carrot)); // check equal EXPECT_EQ(Q_mx25519, Q_carrot); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, main_address_normal_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const CarrotDestinationV1 main_address = keys.cryptonote_address(); const CarrotPaymentProposalV1 proposal = CarrotPaymentProposalV1{ .destination = main_address, .amount = crypto::rand(), .randomness = gen_janus_anchor() }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; encrypted_payment_id_t encrypted_payment_id; get_output_proposal_normal_v1(proposal, tx_first_key_image, enote_proposal, encrypted_payment_id); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); mx25519_pubkey s_sender_receiver_unctx; make_carrot_uncontextualized_shared_key_receiver(keys.legacy_acb.get_keys().m_view_secret_key, enote_proposal.enote.enote_ephemeral_pubkey, s_sender_receiver_unctx); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; encrypted_payment_id_t recovered_payment_id; CarrotEnoteType recovered_enote_type; const bool scan_success = try_scan_carrot_enote_external(enote_proposal.enote, encrypted_payment_id, s_sender_receiver_unctx, keys.k_view_incoming_dev, keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_payment_id, recovered_enote_type); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination.address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(null_payment_id, recovered_payment_id); EXPECT_EQ(CarrotEnoteType::PAYMENT, recovered_enote_type); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, subaddress_normal_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const uint32_t j_major = crypto::rand_idx(mock::MAX_SUBADDRESS_MAJOR_INDEX); const uint32_t j_minor = crypto::rand_idx(mock::MAX_SUBADDRESS_MINOR_INDEX); const CarrotDestinationV1 subaddress = keys.subaddress({{j_major, j_minor}}); const CarrotPaymentProposalV1 proposal = CarrotPaymentProposalV1{ .destination = subaddress, .amount = crypto::rand(), .randomness = gen_janus_anchor() }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; encrypted_payment_id_t encrypted_payment_id; get_output_proposal_normal_v1(proposal, tx_first_key_image, enote_proposal, encrypted_payment_id); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); mx25519_pubkey s_sender_receiver_unctx; make_carrot_uncontextualized_shared_key_receiver(keys.legacy_acb.get_keys().m_view_secret_key, enote_proposal.enote.enote_ephemeral_pubkey, s_sender_receiver_unctx); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; encrypted_payment_id_t recovered_payment_id; CarrotEnoteType recovered_enote_type; const bool scan_success = try_scan_carrot_enote_external(enote_proposal.enote, encrypted_payment_id, s_sender_receiver_unctx, keys.k_view_incoming_dev, keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_payment_id, recovered_enote_type); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination.address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(null_payment_id, recovered_payment_id); EXPECT_EQ(CarrotEnoteType::PAYMENT, recovered_enote_type); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, integrated_address_normal_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const CarrotDestinationV1 integrated_address = keys.cryptonote_address(gen_payment_id()); const CarrotPaymentProposalV1 proposal = CarrotPaymentProposalV1{ .destination = integrated_address, .amount = crypto::rand(), .randomness = gen_janus_anchor() }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; encrypted_payment_id_t encrypted_payment_id; get_output_proposal_normal_v1(proposal, tx_first_key_image, enote_proposal, encrypted_payment_id); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); mx25519_pubkey s_sender_receiver_unctx; make_carrot_uncontextualized_shared_key_receiver(keys.legacy_acb.get_keys().m_view_secret_key, enote_proposal.enote.enote_ephemeral_pubkey, s_sender_receiver_unctx); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; encrypted_payment_id_t recovered_payment_id; CarrotEnoteType recovered_enote_type; const bool scan_success = try_scan_carrot_enote_external(enote_proposal.enote, encrypted_payment_id, s_sender_receiver_unctx, keys.k_view_incoming_dev, keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_payment_id, recovered_enote_type); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination.address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(integrated_address.payment_id, recovered_payment_id); EXPECT_EQ(CarrotEnoteType::PAYMENT, recovered_enote_type); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, main_address_special_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); // try once with PAYMENT, once with CHANGE for (int i = 0; i < 2; ++i) { const CarrotEnoteType enote_type = i ? CarrotEnoteType::PAYMENT : CarrotEnoteType::CHANGE; const CarrotPaymentProposalSelfSendV1 proposal = CarrotPaymentProposalSelfSendV1{ .destination_address_spend_pubkey = keys.carrot_account_spend_pubkey, .amount = crypto::rand(), .enote_type = enote_type, .enote_ephemeral_pubkey = gen_x25519_pubkey(), }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; get_output_proposal_special_v1(proposal, keys.k_view_incoming_dev, tx_first_key_image, std::nullopt, enote_proposal); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); mx25519_pubkey s_sender_receiver_unctx; make_carrot_uncontextualized_shared_key_receiver(keys.legacy_acb.get_keys().m_view_secret_key, enote_proposal.enote.enote_ephemeral_pubkey, s_sender_receiver_unctx); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; encrypted_payment_id_t recovered_payment_id; CarrotEnoteType recovered_enote_type; const bool scan_success = try_scan_carrot_enote_external(enote_proposal.enote, std::nullopt, s_sender_receiver_unctx, keys.k_view_incoming_dev, keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_payment_id, recovered_enote_type); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination_address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(null_payment_id, recovered_payment_id); EXPECT_EQ(enote_type, recovered_enote_type); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, subaddress_special_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const uint32_t j_major = crypto::rand_idx(mock::MAX_SUBADDRESS_MAJOR_INDEX); const uint32_t j_minor = crypto::rand_idx(mock::MAX_SUBADDRESS_MINOR_INDEX); const CarrotDestinationV1 subaddress = keys.subaddress({{j_major, j_minor}}); // try once with PAYMENT, once with CHANGE for (int i = 0; i < 2; ++i) { const CarrotEnoteType enote_type = i ? CarrotEnoteType::PAYMENT : CarrotEnoteType::CHANGE; const CarrotPaymentProposalSelfSendV1 proposal = CarrotPaymentProposalSelfSendV1{ .destination_address_spend_pubkey = subaddress.address_spend_pubkey, .amount = crypto::rand(), .enote_type = enote_type, .enote_ephemeral_pubkey = gen_x25519_pubkey(), }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; get_output_proposal_special_v1(proposal, keys.k_view_incoming_dev, tx_first_key_image, std::nullopt, enote_proposal); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); mx25519_pubkey s_sender_receiver_unctx; make_carrot_uncontextualized_shared_key_receiver(keys.legacy_acb.get_keys().m_view_secret_key, enote_proposal.enote.enote_ephemeral_pubkey, s_sender_receiver_unctx); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; encrypted_payment_id_t recovered_payment_id; CarrotEnoteType recovered_enote_type; const bool scan_success = try_scan_carrot_enote_external(enote_proposal.enote, std::nullopt, s_sender_receiver_unctx, keys.k_view_incoming_dev, keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_payment_id, recovered_enote_type); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination_address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(null_payment_id, recovered_payment_id); EXPECT_EQ(enote_type, recovered_enote_type); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, main_address_internal_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const CarrotDestinationV1 main_address = keys.cryptonote_address(); // try once with PAYMENT, once with CHANGE for (int i = 0; i < 2; ++i) { const CarrotEnoteType enote_type = i ? CarrotEnoteType::PAYMENT : CarrotEnoteType::CHANGE; const CarrotPaymentProposalSelfSendV1 proposal = CarrotPaymentProposalSelfSendV1{ .destination_address_spend_pubkey = main_address.address_spend_pubkey, .amount = crypto::rand(), .enote_type = enote_type, .enote_ephemeral_pubkey = gen_x25519_pubkey(), .internal_message = gen_janus_anchor() }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; get_output_proposal_internal_v1(proposal, keys.s_view_balance_dev, tx_first_key_image, std::nullopt, enote_proposal); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; CarrotEnoteType recovered_enote_type; janus_anchor_t recovered_internal_message; const bool scan_success = try_scan_carrot_enote_internal(enote_proposal.enote, keys.s_view_balance_dev, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_enote_type, recovered_internal_message); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination_address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(enote_type, recovered_enote_type); EXPECT_EQ(proposal.internal_message, recovered_internal_message); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, subaddress_internal_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const uint32_t j_major = crypto::rand_idx(mock::MAX_SUBADDRESS_MAJOR_INDEX); const uint32_t j_minor = crypto::rand_idx(mock::MAX_SUBADDRESS_MINOR_INDEX); const CarrotDestinationV1 subaddress = keys.subaddress({{j_major, j_minor}}); // try once with PAYMENT, once with CHANGE for (int i = 0; i < 2; ++i) { const CarrotEnoteType enote_type = i ? CarrotEnoteType::PAYMENT : CarrotEnoteType::CHANGE; const CarrotPaymentProposalSelfSendV1 proposal = CarrotPaymentProposalSelfSendV1{ .destination_address_spend_pubkey = subaddress.address_spend_pubkey, .amount = crypto::rand(), .enote_type = enote_type, .enote_ephemeral_pubkey = gen_x25519_pubkey(), .internal_message = gen_janus_anchor() }; const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); RCTOutputEnoteProposal enote_proposal; get_output_proposal_internal_v1(proposal, keys.s_view_balance_dev, tx_first_key_image, std::nullopt, enote_proposal); ASSERT_EQ(proposal.amount, enote_proposal.amount); const rct::key recomputed_amount_commitment = rct::commit(enote_proposal.amount, rct::sk2rct(enote_proposal.amount_blinding_factor)); ASSERT_EQ(enote_proposal.enote.amount_commitment, recomputed_amount_commitment); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; crypto::public_key recovered_address_spend_pubkey; rct::xmr_amount recovered_amount; crypto::secret_key recovered_amount_blinding_factor; CarrotEnoteType recovered_enote_type; janus_anchor_t recovered_internal_message; const bool scan_success = try_scan_carrot_enote_internal(enote_proposal.enote, keys.s_view_balance_dev, recovered_sender_extension_g, recovered_sender_extension_t, recovered_address_spend_pubkey, recovered_amount, recovered_amount_blinding_factor, recovered_enote_type, recovered_internal_message); ASSERT_TRUE(scan_success); // check recovered data EXPECT_EQ(proposal.destination_address_spend_pubkey, recovered_address_spend_pubkey); EXPECT_EQ(proposal.amount, recovered_amount); EXPECT_EQ(enote_proposal.amount_blinding_factor, recovered_amount_blinding_factor); EXPECT_EQ(enote_type, recovered_enote_type); EXPECT_EQ(proposal.internal_message, recovered_internal_message); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address(recovered_address_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote_proposal.enote.onetime_address)); } } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, main_address_coinbase_scan_completeness) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); const CarrotDestinationV1 main_address = keys.cryptonote_address(); const CarrotPaymentProposalV1 proposal = CarrotPaymentProposalV1{ .destination = main_address, .amount = crypto::rand(), .randomness = gen_janus_anchor() }; const uint64_t block_index = crypto::rand(); CarrotCoinbaseEnoteV1 enote; get_coinbase_output_proposal_v1(proposal, block_index, enote); ASSERT_EQ(proposal.amount, enote.amount); crypto::secret_key recovered_sender_extension_g; crypto::secret_key recovered_sender_extension_t; const bool scan_success = try_ecdh_and_scan_carrot_coinbase_enote(enote, keys.k_view_incoming_dev, keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t); ASSERT_TRUE(scan_success); // check spendability EXPECT_TRUE(keys.can_open_fcmp_onetime_address( keys.carrot_account_spend_pubkey, recovered_sender_extension_g, recovered_sender_extension_t, enote.onetime_address)); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, keys_opening_for_main_address) { mock::mock_carrot_and_legacy_keys keys; keys.generate(); crypto::secret_key x; crypto::secret_key y; crypto::public_key address_spend_pubkey; keys.opening_for_subaddress({{0, 0}}, x, y, address_spend_pubkey); EXPECT_EQ(keys.carrot_account_spend_pubkey, address_spend_pubkey); } //---------------------------------------------------------------------------------------------------------------------- static void subtest_2out_transfer_get_output_enote_proposals_completeness(const bool alice_subaddress, const bool bob_subaddress, const bool bob_integrated, const CarrotEnoteType alice_selfsend_type, const bool alice_internal_selfsends) { // generate alice keys and address mock::mock_carrot_and_legacy_keys alice; alice.generate(); const uint32_t alice_j_major = crypto::rand_idx(mock::MAX_SUBADDRESS_MAJOR_INDEX); const uint32_t alice_j_minor = crypto::rand_idx(mock::MAX_SUBADDRESS_MINOR_INDEX); CarrotDestinationV1 alice_address; if (alice_subaddress) { alice_address = alice.subaddress({{alice_j_major, alice_j_minor}}); } else // alice main address { alice_address = alice.cryptonote_address(); } // generate bob keys and address mock::mock_carrot_and_legacy_keys bob; bob.generate(); const uint32_t bob_j_major = crypto::rand_idx(mock::MAX_SUBADDRESS_MAJOR_INDEX); const uint32_t bob_j_minor = crypto::rand_idx(mock::MAX_SUBADDRESS_MINOR_INDEX); CarrotDestinationV1 bob_address; if (bob_subaddress) { bob_address = bob.subaddress({{bob_j_major, bob_j_minor}}); } else if (bob_integrated) { bob_address = bob.cryptonote_address(gen_payment_id()); } else // bob main address { bob_address = bob.cryptonote_address(); } // generate input context const crypto::key_image tx_first_key_image = rct::rct2ki(rct::pkGen()); input_context_t input_context; make_carrot_input_context(tx_first_key_image, input_context); // outgoing payment proposal to bob const CarrotPaymentProposalV1 bob_payment_proposal = CarrotPaymentProposalV1{ .destination = bob_address, .amount = crypto::rand_idx(1000000), .randomness = gen_janus_anchor() }; // selfsend payment proposal to alice const CarrotPaymentProposalSelfSendV1 alice_payment_proposal = CarrotPaymentProposalSelfSendV1{ .destination_address_spend_pubkey = alice_address.address_spend_pubkey, .amount = crypto::rand_idx(1000000), .enote_type = CarrotEnoteType::CHANGE, .enote_ephemeral_pubkey = get_enote_ephemeral_pubkey(bob_payment_proposal, input_context), .internal_message = alice_internal_selfsends ? std::make_optional(gen_janus_anchor()) : std::nullopt }; // calculate dummy encrypted pid const std::optional dummy_encrypted_pid = bob_integrated ? std::optional{} : gen_payment_id(); // turn payment proposals into enotes, passing dummy pid_enc if bob isn't integrated std::vector enote_proposals; encrypted_payment_id_t encrypted_payment_id; get_output_enote_proposals({bob_payment_proposal}, {alice_payment_proposal}, dummy_encrypted_pid, alice_internal_selfsends ? &alice.s_view_balance_dev : nullptr, &alice.k_view_incoming_dev, tx_first_key_image, enote_proposals, encrypted_payment_id); ASSERT_EQ(2, enote_proposals.size()); // 2-out tx // collect enotes std::vector enotes; for (const RCTOutputEnoteProposal &enote_proposal : enote_proposals) enotes.push_back(enote_proposal.enote); // check that alice scanned 1 enote std::vector alice_scan_vec; mock::mock_scan_enote_set(enotes, encrypted_payment_id, alice, alice_scan_vec); ASSERT_EQ(1, alice_scan_vec.size()); mock::mock_scan_result_t alice_scan = alice_scan_vec.front(); // check that bob scanned 1 enote std::vector bob_scan_vec; mock::mock_scan_enote_set(enotes, encrypted_payment_id, bob, bob_scan_vec); ASSERT_EQ(1, bob_scan_vec.size()); mock::mock_scan_result_t bob_scan = bob_scan_vec.front(); // set named references to enotes ASSERT_TRUE((alice_scan.output_index == 0 && bob_scan.output_index == 1) || (alice_scan.output_index == 1 && bob_scan.output_index == 0)); const CarrotEnoteV1 &alice_enote = enotes.at(alice_scan.output_index); const CarrotEnoteV1 &bob_enote = enotes.at(bob_scan.output_index); // check Alice's recovered data EXPECT_EQ(alice_payment_proposal.destination_address_spend_pubkey, alice_scan.address_spend_pubkey); EXPECT_EQ(alice_payment_proposal.amount, alice_scan.amount); EXPECT_EQ(alice_enote.amount_commitment, rct::commit(alice_scan.amount, rct::sk2rct(alice_scan.amount_blinding_factor))); EXPECT_EQ(null_payment_id, alice_scan.payment_id); EXPECT_EQ(alice_payment_proposal.enote_type, alice_scan.enote_type); if (alice_internal_selfsends) { EXPECT_EQ(alice_payment_proposal.internal_message, alice_scan.internal_message); } // check Bob's recovered data EXPECT_EQ(bob_payment_proposal.destination.address_spend_pubkey, bob_scan.address_spend_pubkey); EXPECT_EQ(bob_payment_proposal.amount, bob_scan.amount); EXPECT_EQ(bob_enote.amount_commitment, rct::commit(bob_scan.amount, rct::sk2rct(bob_scan.amount_blinding_factor))); EXPECT_EQ(bob_integrated ? bob_address.payment_id : null_payment_id, bob_scan.payment_id); EXPECT_EQ(CarrotEnoteType::PAYMENT, bob_scan.enote_type); // check Alice spendability EXPECT_TRUE(alice.can_open_fcmp_onetime_address(alice_payment_proposal.destination_address_spend_pubkey, alice_scan.sender_extension_g, alice_scan.sender_extension_t, alice_enote.onetime_address)); // check Bob spendability EXPECT_TRUE(bob.can_open_fcmp_onetime_address(bob_payment_proposal.destination.address_spend_pubkey, bob_scan.sender_extension_g, bob_scan.sender_extension_t, bob_enote.onetime_address)); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_internal_ss_main2main_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, false, CarrotEnoteType::PAYMENT, true); subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, false, CarrotEnoteType::CHANGE, true); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_internal_ss_main2sub_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(false, true, false, CarrotEnoteType::PAYMENT, true); subtest_2out_transfer_get_output_enote_proposals_completeness(false, true, false, CarrotEnoteType::CHANGE, true); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_internal_ss_main2integ_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, true, CarrotEnoteType::PAYMENT, true); subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, true, CarrotEnoteType::CHANGE, true); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_internal_ss_sub2main_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, false, CarrotEnoteType::PAYMENT, true); subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, false, CarrotEnoteType::CHANGE, true); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_internal_ss_sub2sub_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(true, true, false, CarrotEnoteType::PAYMENT, true); subtest_2out_transfer_get_output_enote_proposals_completeness(true, true, false, CarrotEnoteType::CHANGE, true); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_internal_ss_sub2integ_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, true, CarrotEnoteType::PAYMENT, true); subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, true, CarrotEnoteType::CHANGE, true); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_external_ss_main2main_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, false, CarrotEnoteType::PAYMENT, false); subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, false, CarrotEnoteType::CHANGE, false); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_external_ss_main2sub_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(false, true, false, CarrotEnoteType::PAYMENT, false); subtest_2out_transfer_get_output_enote_proposals_completeness(false, true, false, CarrotEnoteType::CHANGE, false); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_external_ss_main2integ_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, true, CarrotEnoteType::PAYMENT, false); subtest_2out_transfer_get_output_enote_proposals_completeness(false, false, true, CarrotEnoteType::CHANGE, false); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_external_ss_sub2main_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, false, CarrotEnoteType::PAYMENT, false); subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, false, CarrotEnoteType::CHANGE, false); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_external_ss_sub2sub_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(true, true, false, CarrotEnoteType::PAYMENT, false); subtest_2out_transfer_get_output_enote_proposals_completeness(true, true, false, CarrotEnoteType::CHANGE, false); } //---------------------------------------------------------------------------------------------------------------------- TEST(carrot_core, get_enote_output_proposals_external_ss_sub2integ_completeness) { subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, true, CarrotEnoteType::PAYMENT, false); subtest_2out_transfer_get_output_enote_proposals_completeness(true, false, true, CarrotEnoteType::CHANGE, false); } //----------------------------------------------------------------------------------------------------------------------