Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 2c77320

Browse files
committedOct 25, 2024·
remove debug info
1 parent 8300bf7 commit 2c77320

File tree

4 files changed

+10
-64
lines changed

4 files changed

+10
-64
lines changed
 

‎eth-types/src/sign_types.rs

+5-37
Original file line numberDiff line numberDiff line change
@@ -57,21 +57,14 @@ pub fn sign<
5757
.expect("point is the identity")
5858
.x();
5959

60-
println!("x_Fp {:?}", x);
61-
println!("Fq modulus {:?}", Fq::MODULUS);
62-
println!("x.repr {:?}", x.to_repr());
63-
6460
let mut x_bytes = [0u8; 64];
6561
x_bytes[..32].copy_from_slice(&x.to_repr());
6662

67-
let sig_r = Fq::from_uniform_bytes(&x_bytes); // get x cordinate (E::Base) on E::Scalar
63+
// get x cordinate (E::Base) on E::Scalar
64+
let sig_r = Fq::from_uniform_bytes(&x_bytes);
6865

6966
let sig_s = randomness_inv * (msg_hash + sig_r * sk);
7067

71-
println!("sig_point {:?}", sig_point.to_affine());
72-
println!("sig_r {:?}", sig_r);
73-
println!("sig_s {:?}", sig_s);
74-
7568
(sig_r, sig_s, u8::from(sig_v))
7669
}
7770

@@ -88,36 +81,23 @@ pub fn verify<
8881
s: Fq,
8982
msg_hash: Fq,
9083
// if pubkey is provided rather than from recovered , v is not neccessary.
91-
v: Option<bool>,
84+
_v: Option<bool>,
9285
) -> bool {
93-
println!("r {:?}", r);
94-
println!("s {:?}", s);
95-
println!("pub_key {:?}", pub_key);
96-
println!("msg_hash {:?}", msg_hash);
9786
// Verify
9887
let s_inv = s.invert().unwrap();
9988
let u_1 = msg_hash * s_inv;
100-
println!("verify u_1: {:?}", u_1);
10189
let u_2 = r * s_inv;
102-
println!("verify u_2: {:?}", u_2);
10390

10491
let g = Affine::generator();
10592
let u1_affine = g * u_1;
106-
println!(
107-
"verify u1_affine: {:?}",
108-
u1_affine.to_affine().coordinates().unwrap()
109-
);
11093

11194
let u2_affine = pub_key * u_2;
112-
println!(
113-
"verify u2_affine: {:?}",
114-
u2_affine.to_affine().coordinates().unwrap()
115-
);
11695

11796
let r_point = (u1_affine + u2_affine).to_affine().coordinates().unwrap();
11897
let x_candidate = r_point.x();
11998
let r_candidate = mod_n(*x_candidate);
12099

100+
// v is used to recovery y, not use it for now.
121101
r == r_candidate
122102
}
123103

@@ -199,7 +179,7 @@ impl SignData<Fq_R1, Secp256r1Affine> {
199179
if self.pk.is_identity().into() {
200180
return Address::zero();
201181
}
202-
let pk_hash = keccak256(pk_bytes_swap_endianness(&pk_bytes_le_p256(&self.pk)));
182+
let pk_hash = keccak256(pk_bytes_swap_endianness(&pk_bytes_le_generic(&self.pk)));
203183
Address::from_slice(&pk_hash[12..])
204184
}
205185
}
@@ -326,19 +306,7 @@ pub fn pk_bytes_le_generic<
326306
) -> [u8; 64] {
327307
let pk_coord = Option::<Coordinates<_>>::from(pk.coordinates()).expect("point is the identity");
328308
let mut pk_le = [0u8; 64];
329-
//pk_le[..32].copy_from_slice(&pk_coord.x().to_bytes());
330-
//pk_le[32..].copy_from_slice(&pk_coord.y().to_bytes());
331309
pk_le[..32].copy_from_slice(&pk_coord.x().to_repr());
332310
pk_le[32..].copy_from_slice(&pk_coord.y().to_repr());
333311
pk_le
334312
}
335-
336-
// TODO: refactor to generic type: `pk_bytes_le_<Affine: CurveAffineExt>(pk: &Affine)`
337-
/// Return the secp256k1 public key (x, y) coordinates in little endian bytes.
338-
pub fn pk_bytes_le_p256(pk: &Secp256r1Affine) -> [u8; 64] {
339-
let pk_coord = Option::<Coordinates<_>>::from(pk.coordinates()).expect("point is the identity");
340-
let mut pk_le = [0u8; 64];
341-
pk_le[..32].copy_from_slice(&pk_coord.x().to_bytes());
342-
pk_le[32..].copy_from_slice(&pk_coord.y().to_bytes());
343-
pk_le
344-
}

‎zkevm-circuits/src/sig_circuit.rs

+4
Original file line numberDiff line numberDiff line change
@@ -257,6 +257,9 @@ impl<F: Field> SigCircuitConfig<F> {
257257
pub struct SigCircuit<F: Field> {
258258
/// Max number of verifications
259259
pub max_verif: usize,
260+
/// TODO: split max_verif to max_verify_k1 and max_verify_r1
261+
/// pub max_verif_k1: usize,
262+
/// pub max_verif_r1: usize,
260263
/// Without padding Secp256k1 signatures
261264
pub signatures_k1: Vec<SignData<Fq_K1, Secp256k1Affine>>,
262265
/// Without padding Secp256r1 signatures
@@ -413,6 +416,7 @@ impl<F: Field> SigCircuit<F> {
413416
let pk_assigned = ecc_chip.load_private(ctx, (Value::known(pk.x), Value::known(pk.y)));
414417
let pk_is_valid = ecc_chip.is_on_curve_or_infinity::<Secp256k1Affine>(ctx, &pk_assigned);
415418
gate.assert_is_const(ctx, &pk_is_valid, F::one());
419+
println!("pk_is_valid {:?}", pk_is_valid);
416420

417421
// build Fq chip from Fp chip
418422
// TODO: check if need to add new fq_chip_r

‎zkevm-circuits/src/sig_circuit/ecdsa.rs

+1-26
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,6 @@ where
4343
modulus::<SF>(),
4444
);
4545
let n = scalar_chip.load_constant(ctx, scalar_chip.p.to_biguint().unwrap());
46-
println!("n of scalar_chip {:?}", n);
4746

4847
// check whether the pubkey is (0, 0), i.e. in the case of ecrecover, no pubkey could be
4948
// recovered.
@@ -80,12 +79,6 @@ where
8079
.gate()
8180
.or(ctx, Existing(s_is_zero), Existing(s_in_range));
8281

83-
println!("r {:?}", r);
84-
println!("s {:?}", s);
85-
println!("pub_key {:?}", pubkey);
86-
println!("msg_hash {:?}", msghash);
87-
println!("r_is_valid {:?}", r_is_valid);
88-
println!("s_is_valid {:?}", s_is_valid);
8982
// load required constants
9083
let zero = scalar_chip.load_constant(ctx, FpConfig::<F, SF>::fe_to_constant(SF::ZERO));
9184
let one = scalar_chip.load_constant(ctx, FpConfig::<F, SF>::fe_to_constant(SF::ONE));
@@ -103,12 +96,9 @@ where
10396
let u1 = scalar_chip.divide(ctx, msghash, &s_prime);
10497
let u1 = scalar_chip.select(ctx, &zero, &u1, &s_is_zero);
10598

106-
println!("u1 after: {:?}", u1);
107-
10899
// compute u2 = r * s^{-1} mod n
109100
let u2 = scalar_chip.divide(ctx, r, &s_prime);
110101
let u2 = scalar_chip.select(ctx, &zero, &u2, &s_is_zero);
111-
println!("u2 after: {:?}", u2);
112102

113103
// we want to compute u1*G + u2*PK, there are two edge cases
114104
// 1. either u1 or u2 is 0; we use binary selections to handle the this case
@@ -127,17 +117,13 @@ where
127117
base_chip.limb_bits,
128118
fixed_window_bits,
129119
);
130-
println!("u1_mul point {:?}", u1_mul_affine);
131-
println!("u1_is_zero {:?}", u1_is_zero);
132120

133121
let u1_mul = ecc_chip.select(ctx, &point_at_infinity, &u1_mul_affine, &u1_is_zero);
134122

135123
// compute u2 * pubkey
136124
let u2_prime = scalar_chip.select(ctx, &one, &u2, &s_is_zero);
137125
let pubkey_prime = ecc_chip.load_random_point::<GA>(ctx);
138126
let pubkey_prime = ecc_chip.select(ctx, &pubkey_prime, pubkey, &is_pubkey_zero);
139-
println!("u2_prime {:?}", u2_prime);
140-
println!("pubkey_prime {:?}", pubkey_prime);
141127

142128
let u2_mul_affine = scalar_multiply::<F, _, GA>(
143129
base_chip,
@@ -148,15 +134,12 @@ where
148134
var_window_bits,
149135
);
150136

151-
println!("u2_mul_affine point {:?}", u2_mul_affine);
152-
153137
let u2_is_zero =
154138
base_chip
155139
.range()
156140
.gate()
157141
.or(ctx, Existing(s_is_zero), Existing(is_pubkey_zero));
158142
let u2_mul = ecc_chip.select(ctx, &point_at_infinity, &u2_mul_affine, &u2_is_zero);
159-
println!("u2_is_zero {:?}", u2_is_zero);
160143

161144
// =================================
162145
// case 2:
@@ -173,7 +156,6 @@ where
173156
.and(ctx, Existing(u1_is_zero), Existing(u2_is_zero));
174157
let u1_u2_x_eq = base_chip.is_equal(ctx, u1_mul.x(), u2_mul.x());
175158

176-
println!("u1_u2_x_eq {:?}", u1_u2_x_eq);
177159
let u1_u2_y_neg = {
178160
let u2_y_neg = base_chip.negate(ctx, u2_mul.y());
179161
base_chip.is_equal(ctx, u1_mul.y(), &u2_y_neg)
@@ -185,13 +167,10 @@ where
185167
Existing(u1_u2_y_neg),
186168
);
187169

188-
println!("sum_is_infinity {:?}", sum_is_infinity);
189-
190170
let sum_is_not_infinity = base_chip
191171
.gate()
192172
.not(ctx, QuantumCell::Existing(sum_is_infinity));
193173

194-
println!("sum_is_not_infinity {:?}", sum_is_not_infinity);
195174
// For a valid ECDSA signature, the x co-ordinate of u1.G + u2.Pk, i.e. x_3, MUST EQUAL r
196175
//
197176
// For ec_add:
@@ -221,8 +200,7 @@ where
221200
let x_3 = base_chip.carry_mod(ctx, &x_3_no_carry);
222201
let dx_13 = base_chip.sub_no_carry(ctx, u1_mul.x(), &x_3);
223202
let lambda_dx_13 = base_chip.mul_no_carry(ctx, &lambda, &dx_13);
224-
//let y_3_no_carry = base_chip.sub_no_carry(ctx, &lambda_dx_13, u1_mul.y());
225-
let y_3_no_carry = base_chip.add_no_carry(ctx, &lambda_dx_13, u1_mul.y());
203+
let y_3_no_carry = base_chip.sub_no_carry(ctx, &lambda_dx_13, u1_mul.y());
226204

227205
let y_3 = base_chip.carry_mod(ctx, &y_3_no_carry);
228206

@@ -280,9 +258,6 @@ where
280258
);
281259

282260
println!("equal_check {:?}", equal_check);
283-
println!("x_3 {:?}", x_3);
284-
println!("y_3 {:?}", y_3);
285-
println!("res {:?}", res);
286261

287262
(res, is_pubkey_zero, y_3)
288263
}

‎zkevm-circuits/src/tx_circuit.rs

-1
Original file line numberDiff line numberDiff line change
@@ -4549,7 +4549,6 @@ pub(crate) fn get_sign_data(
45494549
})
45504550
}
45514551
})
4552-
// TODO: add p256 signatures here ?
45534552
.collect::<Result<Vec<SignData<secp256k1::Fq, Secp256k1Affine>>, halo2_proofs::plonk::Error>>()?;
45544553
Ok(signatures)
45554554
}

0 commit comments

Comments
 (0)
Please sign in to comment.