2018-06-07 14:51:29 -06:00
|
|
|
//! The `sigverify` module provides digital signature verification functions.
|
|
|
|
//! By default, signatures are verified in parallel using all available CPU
|
2019-09-26 13:36:51 -07:00
|
|
|
//! cores. When perf-libs are available signature verification is offloaded
|
|
|
|
//! to the GPU.
|
2018-06-07 14:51:29 -06:00
|
|
|
//!
|
|
|
|
|
2019-06-27 09:32:32 +02:00
|
|
|
use crate::cuda_runtime::PinnedVec;
|
2019-04-17 18:15:50 -07:00
|
|
|
use crate::packet::{Packet, Packets};
|
2019-06-27 09:32:32 +02:00
|
|
|
use crate::recycler::Recycler;
|
2019-11-01 14:23:03 -07:00
|
|
|
use crate::sigverify_stage::SigVerifier;
|
2019-05-22 18:23:16 -04:00
|
|
|
use bincode::serialized_size;
|
2019-05-29 17:16:36 -07:00
|
|
|
use rayon::ThreadPool;
|
2019-10-18 10:28:51 -06:00
|
|
|
use solana_ledger::perf_libs;
|
2019-05-17 07:00:06 -07:00
|
|
|
use solana_metrics::inc_new_counter_debug;
|
2019-05-22 18:23:16 -04:00
|
|
|
use solana_sdk::message::MessageHeader;
|
2018-10-26 14:43:34 -07:00
|
|
|
use solana_sdk::pubkey::Pubkey;
|
2019-03-25 09:15:16 -06:00
|
|
|
use solana_sdk::short_vec::decode_len;
|
2018-12-03 10:26:28 -08:00
|
|
|
use solana_sdk::signature::Signature;
|
2018-11-29 16:18:47 -08:00
|
|
|
#[cfg(test)]
|
|
|
|
use solana_sdk::transaction::Transaction;
|
2018-04-06 15:43:05 -06:00
|
|
|
use std::mem::size_of;
|
2018-03-26 21:07:11 -07:00
|
|
|
|
2019-10-28 16:07:51 -07:00
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct TransactionSigVerifier {
|
|
|
|
recycler: Recycler<TxOffset>,
|
|
|
|
recycler_out: Recycler<PinnedVec<u8>>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for TransactionSigVerifier {
|
|
|
|
fn default() -> Self {
|
|
|
|
init();
|
|
|
|
Self {
|
|
|
|
recycler: Recycler::default(),
|
|
|
|
recycler_out: Recycler::default(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl SigVerifier for TransactionSigVerifier {
|
2019-11-01 14:23:03 -07:00
|
|
|
fn verify_batch(&self, mut batch: Vec<Packets>) -> Vec<Packets> {
|
2019-10-28 16:07:51 -07:00
|
|
|
let r = ed25519_verify(&batch, &self.recycler, &self.recycler_out);
|
2019-11-01 14:23:03 -07:00
|
|
|
mark_disabled(&mut batch, &r);
|
|
|
|
batch
|
2019-10-28 16:07:51 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-01 14:23:03 -07:00
|
|
|
pub fn mark_disabled(batches: &mut Vec<Packets>, r: &[Vec<u8>]) {
|
|
|
|
batches.iter_mut().zip(r).for_each(|(b, v)| {
|
|
|
|
b.packets
|
|
|
|
.iter_mut()
|
|
|
|
.zip(v)
|
|
|
|
.for_each(|(p, f)| p.meta.discard = *f == 0)
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-09-12 11:39:39 -07:00
|
|
|
use solana_rayon_threadlimit::get_thread_count;
|
2019-05-29 17:16:36 -07:00
|
|
|
use std::cell::RefCell;
|
|
|
|
|
|
|
|
thread_local!(static PAR_THREAD_POOL: RefCell<ThreadPool> = RefCell::new(rayon::ThreadPoolBuilder::new()
|
2019-09-12 11:39:39 -07:00
|
|
|
.num_threads(get_thread_count())
|
2019-10-28 10:29:38 -07:00
|
|
|
.thread_name(|ix| format!("sigverify_{}", ix))
|
2019-05-29 17:16:36 -07:00
|
|
|
.build()
|
|
|
|
.unwrap()));
|
|
|
|
|
2019-06-27 09:32:32 +02:00
|
|
|
pub type TxOffset = PinnedVec<u32>;
|
|
|
|
|
|
|
|
type TxOffsets = (TxOffset, TxOffset, TxOffset, TxOffset, Vec<Vec<u32>>);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
#[derive(Debug, PartialEq, Eq)]
|
|
|
|
struct PacketOffsets {
|
|
|
|
pub sig_len: u32,
|
|
|
|
pub sig_start: u32,
|
|
|
|
pub msg_start: u32,
|
|
|
|
pub pubkey_start: u32,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PacketOffsets {
|
|
|
|
pub fn new(sig_len: u32, sig_start: u32, msg_start: u32, pubkey_start: u32) -> Self {
|
|
|
|
Self {
|
|
|
|
sig_len,
|
|
|
|
sig_start,
|
|
|
|
msg_start,
|
|
|
|
pubkey_start,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
#[derive(Debug, PartialEq)]
|
|
|
|
pub enum PacketError {
|
|
|
|
InvalidLen,
|
|
|
|
InvalidPubkeyLen,
|
|
|
|
InvalidShortVec,
|
2019-10-18 21:39:05 -06:00
|
|
|
InvalidSignatureLen,
|
|
|
|
MismatchSignatureLen,
|
|
|
|
PayerNotDebitable,
|
2019-10-19 01:48:35 +09:00
|
|
|
}
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
impl std::convert::From<std::boxed::Box<bincode::ErrorKind>> for PacketError {
|
|
|
|
fn from(_e: std::boxed::Box<bincode::ErrorKind>) -> PacketError {
|
|
|
|
PacketError::InvalidShortVec
|
2019-10-19 01:48:35 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-14 22:58:08 +00:00
|
|
|
pub fn init() {
|
2019-09-26 13:36:51 -07:00
|
|
|
if let Some(api) = perf_libs::api() {
|
|
|
|
unsafe {
|
|
|
|
(api.ed25519_set_verbose)(true);
|
|
|
|
if !(api.ed25519_init)() {
|
|
|
|
panic!("ed25519_init() failed");
|
|
|
|
}
|
|
|
|
(api.ed25519_set_verbose)(false);
|
|
|
|
}
|
|
|
|
}
|
2018-07-14 22:58:08 +00:00
|
|
|
}
|
|
|
|
|
2018-03-26 21:07:11 -07:00
|
|
|
fn verify_packet(packet: &Packet) -> u8 {
|
2019-10-19 01:48:35 +09:00
|
|
|
let packet_offsets = get_packet_offsets(packet, 0);
|
|
|
|
let mut sig_start = packet_offsets.sig_start as usize;
|
|
|
|
let mut pubkey_start = packet_offsets.pubkey_start as usize;
|
|
|
|
let msg_start = packet_offsets.msg_start as usize;
|
|
|
|
|
|
|
|
if packet_offsets.sig_len == 0 {
|
|
|
|
return 0;
|
|
|
|
}
|
2018-03-26 21:07:11 -07:00
|
|
|
|
2018-04-06 15:24:15 -06:00
|
|
|
if packet.meta.size <= msg_start {
|
2018-03-26 21:07:11 -07:00
|
|
|
return 0;
|
|
|
|
}
|
2018-04-06 15:24:15 -06:00
|
|
|
|
|
|
|
let msg_end = packet.meta.size;
|
2019-10-19 01:48:35 +09:00
|
|
|
for _ in 0..packet_offsets.sig_len {
|
2018-10-26 14:43:34 -07:00
|
|
|
let pubkey_end = pubkey_start as usize + size_of::<Pubkey>();
|
|
|
|
let sig_end = sig_start as usize + size_of::<Signature>();
|
|
|
|
|
|
|
|
if pubkey_end >= packet.meta.size || sig_end >= packet.meta.size {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-18 14:37:20 -06:00
|
|
|
let signature = Signature::new(&packet.data[sig_start..sig_end]);
|
|
|
|
if !signature.verify(
|
|
|
|
&packet.data[pubkey_start..pubkey_end],
|
|
|
|
&packet.data[msg_start..msg_end],
|
|
|
|
) {
|
2018-10-26 14:43:34 -07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
pubkey_start += size_of::<Pubkey>();
|
|
|
|
sig_start += size_of::<Signature>();
|
|
|
|
}
|
|
|
|
1
|
2018-03-26 21:07:11 -07:00
|
|
|
}
|
|
|
|
|
2019-10-28 10:29:38 -07:00
|
|
|
pub fn batch_size(batches: &[Packets]) -> usize {
|
2019-04-17 18:15:50 -07:00
|
|
|
batches.iter().map(|p| p.packets.len()).sum()
|
2018-05-24 23:18:41 -07:00
|
|
|
}
|
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
// internal function to be unit-tested; should be used only by get_packet_offsets
|
2019-10-18 17:52:59 -07:00
|
|
|
fn do_get_packet_offsets(
|
|
|
|
packet: &Packet,
|
|
|
|
current_offset: u32,
|
|
|
|
) -> Result<PacketOffsets, PacketError> {
|
|
|
|
let message_header_size = serialized_size(&MessageHeader::default()).unwrap() as usize;
|
|
|
|
// should have at least 1 signature, sig lengths and the message header
|
|
|
|
if (1 + size_of::<Signature>() + message_header_size) > packet.meta.size {
|
|
|
|
return Err(PacketError::InvalidLen);
|
|
|
|
}
|
|
|
|
|
|
|
|
// read the length of Transaction.signatures (serialized with short_vec)
|
|
|
|
let (sig_len_untrusted, sig_size) = decode_len(&packet.data)?;
|
2019-10-19 01:48:35 +09:00
|
|
|
|
|
|
|
// Using msg_start_offset which is based on sig_len_untrusted introduces uncertainty.
|
|
|
|
// Ultimately, the actual sigverify will determine the uncertainty.
|
2019-10-18 17:52:59 -07:00
|
|
|
let msg_start_offset = sig_size + sig_len_untrusted * size_of::<Signature>();
|
|
|
|
|
|
|
|
// Packet should have data at least for signatures, MessageHeader, 1 byte for Message.account_keys.len
|
|
|
|
if (msg_start_offset + message_header_size + 1) > packet.meta.size {
|
|
|
|
return Err(PacketError::InvalidSignatureLen);
|
|
|
|
}
|
|
|
|
|
|
|
|
// read MessageHeader.num_required_signatures (serialized with u8)
|
2019-10-19 01:48:35 +09:00
|
|
|
let sig_len_maybe_trusted = packet.data[msg_start_offset] as usize;
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
let message_account_keys_len_offset = msg_start_offset + message_header_size;
|
2019-03-24 22:51:56 -07:00
|
|
|
|
2019-10-18 21:39:05 -06:00
|
|
|
// This reads and compares the MessageHeader num_required_signatures and
|
|
|
|
// num_credit_only_signed_accounts bytes. If num_required_signatures is not larger than
|
|
|
|
// num_credit_only_signed_accounts, the first account is not debitable, and cannot be charged
|
|
|
|
// required transaction fees.
|
|
|
|
if packet.data[msg_start_offset] <= packet.data[msg_start_offset + 1] {
|
|
|
|
return Err(PacketError::PayerNotDebitable);
|
|
|
|
}
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
// read the length of Message.account_keys (serialized with short_vec)
|
|
|
|
let (pubkey_len, pubkey_len_size) =
|
|
|
|
decode_len(&packet.data[message_account_keys_len_offset..])?;
|
|
|
|
|
|
|
|
if (message_account_keys_len_offset + pubkey_len * size_of::<Pubkey>() + pubkey_len_size)
|
|
|
|
> packet.meta.size
|
|
|
|
{
|
|
|
|
return Err(PacketError::InvalidPubkeyLen);
|
|
|
|
}
|
2019-03-24 22:51:56 -07:00
|
|
|
|
2019-03-25 09:15:16 -06:00
|
|
|
let sig_start = current_offset as usize + sig_size;
|
2019-03-28 23:20:04 -06:00
|
|
|
let msg_start = current_offset as usize + msg_start_offset;
|
2019-10-18 17:52:59 -07:00
|
|
|
let pubkey_start = msg_start + message_header_size + pubkey_len_size;
|
|
|
|
|
|
|
|
if sig_len_maybe_trusted != sig_len_untrusted {
|
|
|
|
return Err(PacketError::MismatchSignatureLen);
|
|
|
|
}
|
2019-03-24 22:51:56 -07:00
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
Ok(PacketOffsets::new(
|
2019-10-19 01:48:35 +09:00
|
|
|
sig_len_untrusted as u32,
|
2019-03-25 09:15:16 -06:00
|
|
|
sig_start as u32,
|
2019-03-28 23:20:04 -06:00
|
|
|
msg_start as u32,
|
|
|
|
pubkey_start as u32,
|
2019-10-18 17:52:59 -07:00
|
|
|
))
|
2018-10-26 14:43:34 -07:00
|
|
|
}
|
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
fn get_packet_offsets(packet: &Packet, current_offset: u32) -> PacketOffsets {
|
|
|
|
let unsanitized_packet_offsets = do_get_packet_offsets(packet, current_offset);
|
2019-10-18 17:52:59 -07:00
|
|
|
if let Ok(offsets) = unsanitized_packet_offsets {
|
|
|
|
offsets
|
2019-10-19 01:48:35 +09:00
|
|
|
} else {
|
|
|
|
// force sigverify to fail by returning zeros
|
|
|
|
PacketOffsets::new(0, 0, 0, 0)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
pub fn generate_offsets(
|
|
|
|
batches: &[Packets],
|
|
|
|
recycler: &Recycler<TxOffset>,
|
|
|
|
) -> Result<TxOffsets, ()> {
|
2019-06-27 09:32:32 +02:00
|
|
|
debug!("allocating..");
|
|
|
|
let mut signature_offsets: PinnedVec<_> = recycler.allocate("sig_offsets");
|
|
|
|
signature_offsets.set_pinnable();
|
|
|
|
let mut pubkey_offsets: PinnedVec<_> = recycler.allocate("pubkey_offsets");
|
|
|
|
pubkey_offsets.set_pinnable();
|
|
|
|
let mut msg_start_offsets: PinnedVec<_> = recycler.allocate("msg_start_offsets");
|
|
|
|
msg_start_offsets.set_pinnable();
|
|
|
|
let mut msg_sizes: PinnedVec<_> = recycler.allocate("msg_size_offsets");
|
|
|
|
msg_sizes.set_pinnable();
|
2018-10-26 14:43:34 -07:00
|
|
|
let mut current_packet = 0;
|
|
|
|
let mut v_sig_lens = Vec::new();
|
2019-02-08 14:19:28 -08:00
|
|
|
batches.iter().for_each(|p| {
|
2018-10-26 14:43:34 -07:00
|
|
|
let mut sig_lens = Vec::new();
|
2019-04-17 18:15:50 -07:00
|
|
|
p.packets.iter().for_each(|packet| {
|
2018-10-26 14:43:34 -07:00
|
|
|
let current_offset = current_packet as u32 * size_of::<Packet>() as u32;
|
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
let packet_offsets = get_packet_offsets(packet, current_offset);
|
|
|
|
|
|
|
|
sig_lens.push(packet_offsets.sig_len);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
trace!("pubkey_offset: {}", packet_offsets.pubkey_start);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
let mut pubkey_offset = packet_offsets.pubkey_start;
|
|
|
|
let mut sig_offset = packet_offsets.sig_start;
|
|
|
|
for _ in 0..packet_offsets.sig_len {
|
2018-10-26 14:43:34 -07:00
|
|
|
signature_offsets.push(sig_offset);
|
|
|
|
sig_offset += size_of::<Signature>() as u32;
|
|
|
|
|
|
|
|
pubkey_offsets.push(pubkey_offset);
|
|
|
|
pubkey_offset += size_of::<Pubkey>() as u32;
|
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
msg_start_offsets.push(packet_offsets.msg_start);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
msg_sizes
|
|
|
|
.push(current_offset + (packet.meta.size as u32) - packet_offsets.msg_start);
|
2018-10-26 14:43:34 -07:00
|
|
|
}
|
|
|
|
current_packet += 1;
|
|
|
|
});
|
|
|
|
v_sig_lens.push(sig_lens);
|
|
|
|
});
|
|
|
|
Ok((
|
|
|
|
signature_offsets,
|
|
|
|
pubkey_offsets,
|
|
|
|
msg_start_offsets,
|
|
|
|
msg_sizes,
|
|
|
|
v_sig_lens,
|
|
|
|
))
|
|
|
|
}
|
|
|
|
|
2019-04-17 18:15:50 -07:00
|
|
|
pub fn ed25519_verify_cpu(batches: &[Packets]) -> Vec<Vec<u8>> {
|
2018-04-06 15:43:05 -06:00
|
|
|
use rayon::prelude::*;
|
2018-05-30 21:24:21 -07:00
|
|
|
let count = batch_size(batches);
|
2019-04-16 18:25:53 -07:00
|
|
|
debug!("CPU ECDSA for {}", batch_size(batches));
|
2019-05-29 17:16:36 -07:00
|
|
|
let rv = PAR_THREAD_POOL.with(|thread_pool| {
|
|
|
|
thread_pool.borrow().install(|| {
|
|
|
|
batches
|
|
|
|
.into_par_iter()
|
|
|
|
.map(|p| p.packets.par_iter().map(verify_packet).collect())
|
|
|
|
.collect()
|
|
|
|
})
|
|
|
|
});
|
2019-05-17 07:00:06 -07:00
|
|
|
inc_new_counter_debug!("ed25519_verify_cpu", count);
|
2018-05-30 21:24:21 -07:00
|
|
|
rv
|
2018-03-26 21:07:11 -07:00
|
|
|
}
|
|
|
|
|
2019-04-17 18:15:50 -07:00
|
|
|
pub fn ed25519_verify_disabled(batches: &[Packets]) -> Vec<Vec<u8>> {
|
2018-07-31 16:54:24 -07:00
|
|
|
use rayon::prelude::*;
|
|
|
|
let count = batch_size(batches);
|
2019-04-16 18:25:53 -07:00
|
|
|
debug!("disabled ECDSA for {}", batch_size(batches));
|
2018-07-31 16:54:24 -07:00
|
|
|
let rv = batches
|
|
|
|
.into_par_iter()
|
2019-04-19 14:18:19 -07:00
|
|
|
.map(|p| vec![1u8; p.packets.len()])
|
2018-12-07 20:01:28 -07:00
|
|
|
.collect();
|
2019-05-17 07:00:06 -07:00
|
|
|
inc_new_counter_debug!("ed25519_verify_disabled", count);
|
2018-07-31 16:54:24 -07:00
|
|
|
rv
|
|
|
|
}
|
|
|
|
|
2019-10-28 10:29:38 -07:00
|
|
|
pub fn copy_return_values(sig_lens: &[Vec<u32>], out: &PinnedVec<u8>, rvs: &mut Vec<Vec<u8>>) {
|
|
|
|
let mut num = 0;
|
|
|
|
for (vs, sig_vs) in rvs.iter_mut().zip(sig_lens.iter()) {
|
|
|
|
for (v, sig_v) in vs.iter_mut().zip(sig_vs.iter()) {
|
|
|
|
if *sig_v == 0 {
|
|
|
|
*v = 0;
|
|
|
|
} else {
|
|
|
|
let mut vout = 1;
|
|
|
|
for _ in 0..*sig_v {
|
|
|
|
if 0 == out[num] {
|
|
|
|
vout = 0;
|
|
|
|
}
|
|
|
|
num += 1;
|
|
|
|
}
|
|
|
|
*v = vout;
|
|
|
|
}
|
|
|
|
if *v != 0 {
|
|
|
|
trace!("VERIFIED PACKET!!!!!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-27 09:32:32 +02:00
|
|
|
pub fn ed25519_verify(
|
|
|
|
batches: &[Packets],
|
|
|
|
recycler: &Recycler<TxOffset>,
|
|
|
|
recycler_out: &Recycler<PinnedVec<u8>>,
|
|
|
|
) -> Vec<Vec<u8>> {
|
2019-09-26 13:36:51 -07:00
|
|
|
let api = perf_libs::api();
|
|
|
|
if api.is_none() {
|
|
|
|
return ed25519_verify_cpu(batches);
|
|
|
|
}
|
|
|
|
let api = api.unwrap();
|
|
|
|
|
2018-12-08 22:40:42 -07:00
|
|
|
use crate::packet::PACKET_DATA_SIZE;
|
2018-05-30 21:24:21 -07:00
|
|
|
let count = batch_size(batches);
|
2018-08-01 14:10:39 -07:00
|
|
|
|
|
|
|
// micro-benchmarks show GPU time for smallest batch around 15-20ms
|
2018-08-09 09:26:21 -06:00
|
|
|
// and CPU speed for 64-128 sigverifies around 10-20ms. 64 is a nice
|
2018-08-01 14:10:39 -07:00
|
|
|
// power-of-two number around that accounting for the fact that the CPU
|
2019-10-11 13:30:52 -06:00
|
|
|
// may be busy doing other things while being a real validator
|
2018-08-01 14:10:39 -07:00
|
|
|
// TODO: dynamically adjust this crossover
|
|
|
|
if count < 64 {
|
|
|
|
return ed25519_verify_cpu(batches);
|
|
|
|
}
|
|
|
|
|
2018-10-26 14:43:34 -07:00
|
|
|
let (signature_offsets, pubkey_offsets, msg_start_offsets, msg_sizes, sig_lens) =
|
2019-06-27 09:32:32 +02:00
|
|
|
generate_offsets(batches, recycler).unwrap();
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-04-16 18:25:53 -07:00
|
|
|
debug!("CUDA ECDSA for {}", batch_size(batches));
|
2019-06-27 09:32:32 +02:00
|
|
|
debug!("allocating out..");
|
|
|
|
let mut out = recycler_out.allocate("out_buffer");
|
|
|
|
out.set_pinnable();
|
2018-03-26 21:07:11 -07:00
|
|
|
let mut elems = Vec::new();
|
|
|
|
let mut rvs = Vec::new();
|
|
|
|
|
2018-10-26 14:43:34 -07:00
|
|
|
let mut num_packets = 0;
|
2019-04-17 18:15:50 -07:00
|
|
|
for p in batches {
|
2019-09-26 13:36:51 -07:00
|
|
|
elems.push(perf_libs::Elems {
|
2018-03-26 21:07:11 -07:00
|
|
|
elems: p.packets.as_ptr(),
|
|
|
|
num: p.packets.len() as u32,
|
|
|
|
});
|
|
|
|
let mut v = Vec::new();
|
|
|
|
v.resize(p.packets.len(), 0);
|
|
|
|
rvs.push(v);
|
2018-10-26 14:43:34 -07:00
|
|
|
num_packets += p.packets.len();
|
2018-03-26 21:07:11 -07:00
|
|
|
}
|
2018-10-26 14:43:34 -07:00
|
|
|
out.resize(signature_offsets.len(), 0);
|
|
|
|
trace!("Starting verify num packets: {}", num_packets);
|
2018-03-26 21:07:11 -07:00
|
|
|
trace!("elem len: {}", elems.len() as u32);
|
|
|
|
trace!("packet sizeof: {}", size_of::<Packet>() as u32);
|
|
|
|
trace!("len offset: {}", PACKET_DATA_SIZE as u32);
|
2019-04-30 13:34:46 -07:00
|
|
|
const USE_NON_DEFAULT_STREAM: u8 = 1;
|
2018-03-26 21:07:11 -07:00
|
|
|
unsafe {
|
2019-09-26 13:36:51 -07:00
|
|
|
let res = (api.ed25519_verify_many)(
|
2018-03-26 21:07:11 -07:00
|
|
|
elems.as_ptr(),
|
|
|
|
elems.len() as u32,
|
|
|
|
size_of::<Packet>() as u32,
|
2018-10-26 14:43:34 -07:00
|
|
|
num_packets as u32,
|
|
|
|
signature_offsets.len() as u32,
|
|
|
|
msg_sizes.as_ptr(),
|
|
|
|
pubkey_offsets.as_ptr(),
|
|
|
|
signature_offsets.as_ptr(),
|
|
|
|
msg_start_offsets.as_ptr(),
|
2018-03-26 21:07:11 -07:00
|
|
|
out.as_mut_ptr(),
|
2019-04-30 13:34:46 -07:00
|
|
|
USE_NON_DEFAULT_STREAM,
|
2018-03-26 21:07:11 -07:00
|
|
|
);
|
|
|
|
if res != 0 {
|
|
|
|
trace!("RETURN!!!: {}", res);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
trace!("done verify");
|
2019-10-28 10:29:38 -07:00
|
|
|
copy_return_values(&sig_lens, &out, &mut rvs);
|
2019-05-17 07:00:06 -07:00
|
|
|
inc_new_counter_debug!("ed25519_verify_gpu", count);
|
2019-06-27 09:32:32 +02:00
|
|
|
recycler_out.recycle(out);
|
|
|
|
recycler.recycle(signature_offsets);
|
|
|
|
recycler.recycle(pubkey_offsets);
|
|
|
|
recycler.recycle(msg_sizes);
|
|
|
|
recycler.recycle(msg_start_offsets);
|
2018-03-26 21:07:11 -07:00
|
|
|
rvs
|
|
|
|
}
|
2018-04-11 12:18:00 -07:00
|
|
|
|
2018-10-26 14:43:34 -07:00
|
|
|
#[cfg(test)]
|
|
|
|
pub fn make_packet_from_transaction(tx: Transaction) -> Packet {
|
|
|
|
use bincode::serialize;
|
|
|
|
|
|
|
|
let tx_bytes = serialize(&tx).unwrap();
|
|
|
|
let mut packet = Packet::default();
|
|
|
|
packet.meta.size = tx_bytes.len();
|
|
|
|
packet.data[..packet.meta.size].copy_from_slice(&tx_bytes);
|
|
|
|
return packet;
|
|
|
|
}
|
|
|
|
|
2018-04-11 12:18:00 -07:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2019-10-18 17:52:59 -07:00
|
|
|
use super::PacketError;
|
2019-04-17 18:15:50 -07:00
|
|
|
use crate::packet::{Packet, Packets};
|
2019-06-27 09:32:32 +02:00
|
|
|
use crate::recycler::Recycler;
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::sigverify;
|
2019-10-19 01:48:35 +09:00
|
|
|
use crate::sigverify::PacketOffsets;
|
2019-03-28 19:11:16 -06:00
|
|
|
use crate::test_tx::{test_multisig_tx, test_tx};
|
2019-10-18 17:52:59 -07:00
|
|
|
use bincode::{deserialize, serialize};
|
2019-10-17 03:09:17 +09:00
|
|
|
use solana_sdk::hash::Hash;
|
|
|
|
use solana_sdk::message::{Message, MessageHeader};
|
|
|
|
use solana_sdk::signature::Signature;
|
2019-03-23 21:12:27 -06:00
|
|
|
use solana_sdk::transaction::Transaction;
|
2019-01-24 21:14:15 -08:00
|
|
|
|
2019-03-25 09:15:16 -06:00
|
|
|
const SIG_OFFSET: usize = 1;
|
2018-12-04 15:37:11 -08:00
|
|
|
|
|
|
|
pub fn memfind<A: Eq>(a: &[A], b: &[A]) -> Option<usize> {
|
|
|
|
assert!(a.len() >= b.len());
|
|
|
|
let end = a.len() - b.len() + 1;
|
|
|
|
for i in 0..end {
|
|
|
|
if a[i..i + b.len()] == b[..] {
|
|
|
|
return Some(i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
}
|
2018-05-15 12:15:29 -06:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_layout() {
|
2018-05-25 16:05:37 -06:00
|
|
|
let tx = test_tx();
|
|
|
|
let tx_bytes = serialize(&tx).unwrap();
|
|
|
|
let packet = serialize(&tx).unwrap();
|
2019-03-25 09:15:16 -06:00
|
|
|
assert_matches!(memfind(&packet, &tx_bytes), Some(0));
|
2018-05-15 12:15:29 -06:00
|
|
|
assert_matches!(memfind(&packet, &[0, 1, 2, 3, 4, 5, 6, 7, 8, 9]), None);
|
|
|
|
}
|
2018-04-11 12:18:00 -07:00
|
|
|
|
2018-12-04 15:37:11 -08:00
|
|
|
#[test]
|
|
|
|
fn test_system_transaction_layout() {
|
|
|
|
let tx = test_tx();
|
|
|
|
let tx_bytes = serialize(&tx).unwrap();
|
2019-03-29 07:47:35 -06:00
|
|
|
let message_data = tx.message_data();
|
2018-12-04 15:37:11 -08:00
|
|
|
let packet = sigverify::make_packet_from_transaction(tx.clone());
|
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
let packet_offsets = sigverify::get_packet_offsets(&packet, 0);
|
2018-12-04 15:37:11 -08:00
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
memfind(&tx_bytes, &tx.signatures[0].as_ref()),
|
|
|
|
Some(SIG_OFFSET)
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2019-03-29 10:05:06 -06:00
|
|
|
memfind(&tx_bytes, &tx.message().account_keys[0].as_ref()),
|
2019-10-19 01:48:35 +09:00
|
|
|
Some(packet_offsets.pubkey_start as usize)
|
2018-12-04 15:37:11 -08:00
|
|
|
);
|
|
|
|
assert_eq!(
|
2019-03-29 07:47:35 -06:00
|
|
|
memfind(&tx_bytes, &message_data),
|
2019-10-19 01:48:35 +09:00
|
|
|
Some(packet_offsets.msg_start as usize)
|
2018-12-04 15:37:11 -08:00
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
memfind(&tx_bytes, &tx.signatures[0].as_ref()),
|
2019-10-19 01:48:35 +09:00
|
|
|
Some(packet_offsets.sig_start as usize)
|
|
|
|
);
|
|
|
|
assert_eq!(packet_offsets.sig_len, 1);
|
|
|
|
}
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
fn packet_from_num_sigs(required_num_sigs: u8, actual_num_sigs: usize) -> Packet {
|
2019-10-19 01:48:35 +09:00
|
|
|
let message = Message {
|
|
|
|
header: MessageHeader {
|
|
|
|
num_required_signatures: required_num_sigs,
|
|
|
|
num_credit_only_signed_accounts: 12,
|
|
|
|
num_credit_only_unsigned_accounts: 11,
|
|
|
|
},
|
|
|
|
account_keys: vec![],
|
|
|
|
recent_blockhash: Hash::default(),
|
|
|
|
instructions: vec![],
|
|
|
|
};
|
|
|
|
let mut tx = Transaction::new_unsigned(message);
|
|
|
|
tx.signatures = vec![Signature::default(); actual_num_sigs as usize];
|
2019-10-18 17:52:59 -07:00
|
|
|
sigverify::make_packet_from_transaction(tx)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_untrustworthy_sigs() {
|
|
|
|
let required_num_sigs = 14;
|
|
|
|
let actual_num_sigs = 5;
|
|
|
|
|
|
|
|
let packet = packet_from_num_sigs(required_num_sigs, actual_num_sigs);
|
2019-10-19 01:48:35 +09:00
|
|
|
|
|
|
|
let unsanitized_packet_offsets = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
|
|
|
|
assert_eq!(
|
2019-10-18 17:52:59 -07:00
|
|
|
unsanitized_packet_offsets,
|
|
|
|
Err(PacketError::MismatchSignatureLen)
|
2018-12-04 15:37:11 -08:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-10-17 03:09:17 +09:00
|
|
|
#[test]
|
|
|
|
fn test_large_sigs() {
|
|
|
|
// use any large number to be misinterpreted as 2 bytes when decoded as short_vec
|
|
|
|
let required_num_sigs = 214;
|
|
|
|
let actual_num_sigs = 5;
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
let packet = packet_from_num_sigs(required_num_sigs, actual_num_sigs);
|
2019-10-17 03:09:17 +09:00
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
let unsanitized_packet_offsets = sigverify::do_get_packet_offsets(&packet, 0);
|
2019-10-17 03:09:17 +09:00
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
assert_eq!(
|
2019-10-18 17:52:59 -07:00
|
|
|
unsanitized_packet_offsets,
|
|
|
|
Err(PacketError::MismatchSignatureLen)
|
2019-10-19 01:48:35 +09:00
|
|
|
);
|
2019-10-17 03:09:17 +09:00
|
|
|
}
|
|
|
|
|
2019-10-18 17:52:59 -07:00
|
|
|
#[test]
|
|
|
|
fn test_small_packet() {
|
|
|
|
let tx = test_tx();
|
|
|
|
let mut packet = sigverify::make_packet_from_transaction(tx.clone());
|
|
|
|
|
|
|
|
packet.data[0] = 0xff;
|
|
|
|
packet.data[1] = 0xff;
|
|
|
|
packet.meta.size = 2;
|
|
|
|
|
|
|
|
let res = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
assert_eq!(res, Err(PacketError::InvalidLen));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_large_sig_len() {
|
|
|
|
let tx = test_tx();
|
|
|
|
let mut packet = sigverify::make_packet_from_transaction(tx.clone());
|
|
|
|
|
|
|
|
// Make the signatures len huge
|
2019-10-18 19:56:48 -07:00
|
|
|
packet.data[0] = 0x7f;
|
2019-10-18 17:52:59 -07:00
|
|
|
|
|
|
|
let res = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
assert_eq!(res, Err(PacketError::InvalidSignatureLen));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_really_large_sig_len() {
|
|
|
|
let tx = test_tx();
|
|
|
|
let mut packet = sigverify::make_packet_from_transaction(tx.clone());
|
|
|
|
|
|
|
|
// Make the signatures len huge
|
|
|
|
packet.data[0] = 0xff;
|
|
|
|
packet.data[1] = 0xff;
|
|
|
|
packet.data[2] = 0xff;
|
|
|
|
packet.data[3] = 0xff;
|
|
|
|
|
|
|
|
let res = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
assert_eq!(res, Err(PacketError::InvalidShortVec));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_invalid_pubkey_len() {
|
|
|
|
let tx = test_tx();
|
|
|
|
let mut packet = sigverify::make_packet_from_transaction(tx.clone());
|
|
|
|
|
|
|
|
let res = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
|
|
|
|
// make pubkey len huge
|
2019-10-18 19:56:48 -07:00
|
|
|
packet.data[res.unwrap().pubkey_start as usize - 1] = 0x7f;
|
2019-10-18 17:52:59 -07:00
|
|
|
|
|
|
|
let res = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
assert_eq!(res, Err(PacketError::InvalidPubkeyLen));
|
|
|
|
}
|
|
|
|
|
2019-10-18 21:39:05 -06:00
|
|
|
#[test]
|
|
|
|
fn test_fee_payer_is_debitable() {
|
|
|
|
let message = Message {
|
|
|
|
header: MessageHeader {
|
|
|
|
num_required_signatures: 1,
|
|
|
|
num_credit_only_signed_accounts: 1,
|
|
|
|
num_credit_only_unsigned_accounts: 1,
|
|
|
|
},
|
|
|
|
account_keys: vec![],
|
|
|
|
recent_blockhash: Hash::default(),
|
|
|
|
instructions: vec![],
|
|
|
|
};
|
|
|
|
let mut tx = Transaction::new_unsigned(message);
|
|
|
|
tx.signatures = vec![Signature::default()];
|
|
|
|
let packet = sigverify::make_packet_from_transaction(tx.clone());
|
|
|
|
let res = sigverify::do_get_packet_offsets(&packet, 0);
|
|
|
|
|
|
|
|
assert_eq!(res, Err(PacketError::PayerNotDebitable));
|
|
|
|
}
|
|
|
|
|
2018-12-04 15:37:11 -08:00
|
|
|
#[test]
|
2019-03-14 10:48:27 -06:00
|
|
|
fn test_system_transaction_data_layout() {
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::packet::PACKET_DATA_SIZE;
|
2018-12-04 15:37:11 -08:00
|
|
|
let mut tx0 = test_tx();
|
2019-03-29 10:05:06 -06:00
|
|
|
tx0.message.instructions[0].data = vec![1, 2, 3];
|
2019-03-29 07:47:35 -06:00
|
|
|
let message0a = tx0.message_data();
|
2018-12-04 15:37:11 -08:00
|
|
|
let tx_bytes = serialize(&tx0).unwrap();
|
|
|
|
assert!(tx_bytes.len() < PACKET_DATA_SIZE);
|
|
|
|
assert_eq!(
|
|
|
|
memfind(&tx_bytes, &tx0.signatures[0].as_ref()),
|
|
|
|
Some(SIG_OFFSET)
|
|
|
|
);
|
|
|
|
let tx1 = deserialize(&tx_bytes).unwrap();
|
|
|
|
assert_eq!(tx0, tx1);
|
2019-03-29 10:05:06 -06:00
|
|
|
assert_eq!(tx1.message().instructions[0].data, vec![1, 2, 3]);
|
2018-12-04 15:37:11 -08:00
|
|
|
|
2019-03-29 10:05:06 -06:00
|
|
|
tx0.message.instructions[0].data = vec![1, 2, 4];
|
2019-03-29 07:47:35 -06:00
|
|
|
let message0b = tx0.message_data();
|
2019-01-25 23:41:20 -07:00
|
|
|
assert_ne!(message0a, message0b);
|
2018-12-04 15:37:11 -08:00
|
|
|
}
|
|
|
|
|
2019-03-28 19:11:16 -06:00
|
|
|
// Just like get_packet_offsets, but not returning redundant information.
|
2019-10-19 01:48:35 +09:00
|
|
|
fn get_packet_offsets_from_tx(tx: Transaction, current_offset: u32) -> PacketOffsets {
|
2018-10-26 14:43:34 -07:00
|
|
|
let packet = sigverify::make_packet_from_transaction(tx);
|
2019-10-19 01:48:35 +09:00
|
|
|
let packet_offsets = sigverify::get_packet_offsets(&packet, current_offset);
|
|
|
|
PacketOffsets::new(
|
|
|
|
packet_offsets.sig_len,
|
|
|
|
packet_offsets.sig_start - current_offset,
|
|
|
|
packet_offsets.msg_start - packet_offsets.sig_start,
|
|
|
|
packet_offsets.pubkey_start - packet_offsets.msg_start,
|
2019-03-28 19:11:16 -06:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_get_packet_offsets() {
|
2019-10-19 01:48:35 +09:00
|
|
|
assert_eq!(
|
|
|
|
get_packet_offsets_from_tx(test_tx(), 0),
|
|
|
|
PacketOffsets::new(1, 1, 64, 4)
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
get_packet_offsets_from_tx(test_tx(), 100),
|
|
|
|
PacketOffsets::new(1, 1, 64, 4)
|
|
|
|
);
|
2019-03-28 23:20:04 -06:00
|
|
|
|
|
|
|
// Ensure we're not indexing packet by the `current_offset` parameter.
|
|
|
|
assert_eq!(
|
|
|
|
get_packet_offsets_from_tx(test_tx(), 1_000_000),
|
2019-10-19 01:48:35 +09:00
|
|
|
PacketOffsets::new(1, 1, 64, 4)
|
2019-03-28 23:20:04 -06:00
|
|
|
);
|
|
|
|
|
|
|
|
// Ensure we're returning sig_len, not sig_size.
|
2019-03-28 19:11:16 -06:00
|
|
|
assert_eq!(
|
|
|
|
get_packet_offsets_from_tx(test_multisig_tx(), 0),
|
2019-10-19 01:48:35 +09:00
|
|
|
PacketOffsets::new(2, 1, 128, 4)
|
2019-03-28 19:11:16 -06:00
|
|
|
);
|
2018-10-26 14:43:34 -07:00
|
|
|
}
|
2018-04-11 12:18:00 -07:00
|
|
|
|
2018-10-26 14:43:34 -07:00
|
|
|
fn generate_packet_vec(
|
|
|
|
packet: &Packet,
|
|
|
|
num_packets_per_batch: usize,
|
|
|
|
num_batches: usize,
|
2019-04-17 18:15:50 -07:00
|
|
|
) -> Vec<Packets> {
|
2018-04-11 12:18:00 -07:00
|
|
|
// generate packet vector
|
2018-10-26 14:43:34 -07:00
|
|
|
let batches: Vec<_> = (0..num_batches)
|
2018-09-18 08:02:57 -07:00
|
|
|
.map(|_| {
|
2019-04-17 18:15:50 -07:00
|
|
|
let mut packets = Packets::default();
|
|
|
|
packets.packets.resize(0, Packet::default());
|
2018-10-26 14:43:34 -07:00
|
|
|
for _ in 0..num_packets_per_batch {
|
2019-04-17 18:15:50 -07:00
|
|
|
packets.packets.push(packet.clone());
|
2018-09-18 08:02:57 -07:00
|
|
|
}
|
2019-04-17 18:15:50 -07:00
|
|
|
assert_eq!(packets.packets.len(), num_packets_per_batch);
|
2018-09-18 08:02:57 -07:00
|
|
|
packets
|
2018-12-07 20:01:28 -07:00
|
|
|
})
|
|
|
|
.collect();
|
2018-10-26 14:43:34 -07:00
|
|
|
assert_eq!(batches.len(), num_batches);
|
|
|
|
|
|
|
|
batches
|
|
|
|
}
|
|
|
|
|
|
|
|
fn test_verify_n(n: usize, modify_data: bool) {
|
|
|
|
let tx = test_tx();
|
|
|
|
let mut packet = sigverify::make_packet_from_transaction(tx);
|
|
|
|
|
|
|
|
// jumble some data to test failure
|
|
|
|
if modify_data {
|
|
|
|
packet.data[20] = packet.data[20].wrapping_add(10);
|
|
|
|
}
|
|
|
|
|
|
|
|
let batches = generate_packet_vec(&packet, n, 2);
|
2018-04-11 12:18:00 -07:00
|
|
|
|
2019-06-27 09:32:32 +02:00
|
|
|
let recycler = Recycler::default();
|
|
|
|
let recycler_out = Recycler::default();
|
2018-04-11 12:18:00 -07:00
|
|
|
// verify packets
|
2019-06-27 09:32:32 +02:00
|
|
|
let ans = sigverify::ed25519_verify(&batches, &recycler, &recycler_out);
|
2018-04-11 12:18:00 -07:00
|
|
|
|
|
|
|
// check result
|
|
|
|
let ref_ans = if modify_data { 0u8 } else { 1u8 };
|
|
|
|
assert_eq!(ans, vec![vec![ref_ans; n], vec![ref_ans; n]]);
|
|
|
|
}
|
|
|
|
|
2019-10-19 01:48:35 +09:00
|
|
|
#[test]
|
|
|
|
fn test_verify_tampered_sig_len() {
|
|
|
|
let mut tx = test_tx().clone();
|
|
|
|
// pretend malicious leader dropped a signature...
|
|
|
|
tx.signatures.pop();
|
|
|
|
let packet = sigverify::make_packet_from_transaction(tx);
|
|
|
|
|
|
|
|
let batches = generate_packet_vec(&packet, 1, 1);
|
|
|
|
|
|
|
|
let recycler = Recycler::default();
|
|
|
|
let recycler_out = Recycler::default();
|
|
|
|
// verify packets
|
|
|
|
let ans = sigverify::ed25519_verify(&batches, &recycler, &recycler_out);
|
|
|
|
|
|
|
|
assert_eq!(ans, vec![vec![0u8; 1]]);
|
|
|
|
}
|
|
|
|
|
2018-04-11 12:18:00 -07:00
|
|
|
#[test]
|
|
|
|
fn test_verify_zero() {
|
|
|
|
test_verify_n(0, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_verify_one() {
|
|
|
|
test_verify_n(1, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_verify_seventy_one() {
|
|
|
|
test_verify_n(71, false);
|
|
|
|
}
|
|
|
|
|
2018-10-26 14:43:34 -07:00
|
|
|
#[test]
|
2019-03-28 19:11:16 -06:00
|
|
|
fn test_verify_multisig() {
|
2018-12-14 12:36:50 -08:00
|
|
|
solana_logger::setup();
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-03-28 19:11:16 -06:00
|
|
|
let tx = test_multisig_tx();
|
2018-10-26 14:43:34 -07:00
|
|
|
let mut packet = sigverify::make_packet_from_transaction(tx);
|
|
|
|
|
|
|
|
let n = 4;
|
|
|
|
let num_batches = 3;
|
2019-04-17 18:15:50 -07:00
|
|
|
let mut batches = generate_packet_vec(&packet, n, num_batches);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
|
|
|
packet.data[40] = packet.data[40].wrapping_add(8);
|
|
|
|
|
2019-04-17 18:15:50 -07:00
|
|
|
batches[0].packets.push(packet);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
2019-06-27 09:32:32 +02:00
|
|
|
let recycler = Recycler::default();
|
|
|
|
let recycler_out = Recycler::default();
|
2018-10-26 14:43:34 -07:00
|
|
|
// verify packets
|
2019-06-27 09:32:32 +02:00
|
|
|
let ans = sigverify::ed25519_verify(&batches, &recycler, &recycler_out);
|
2018-10-26 14:43:34 -07:00
|
|
|
|
|
|
|
// check result
|
|
|
|
let ref_ans = 1u8;
|
|
|
|
let mut ref_vec = vec![vec![ref_ans; n]; num_batches];
|
|
|
|
ref_vec[0].push(0u8);
|
|
|
|
assert_eq!(ans, ref_vec);
|
|
|
|
}
|
|
|
|
|
2018-04-11 12:18:00 -07:00
|
|
|
#[test]
|
|
|
|
fn test_verify_fail() {
|
|
|
|
test_verify_n(5, true);
|
|
|
|
}
|
|
|
|
}
|