Coverage Report

Created: 2026-04-29 19:21

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/tmp/bitcoin/src/util/obfuscation.h
Line
Count
Source
1
// Copyright (c) 2025-present The Bitcoin Core developers
2
// Distributed under the MIT software license, see the accompanying
3
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5
#ifndef BITCOIN_UTIL_OBFUSCATION_H
6
#define BITCOIN_UTIL_OBFUSCATION_H
7
8
#include <crypto/hex_base.h>
9
#include <span.h>
10
#include <tinyformat.h>
11
#include <util/strencodings.h>
12
13
#include <array>
14
#include <bit>
15
#include <climits>
16
#include <cstdint>
17
#include <ios>
18
#include <memory>
19
20
class Obfuscation
21
{
22
public:
23
    using KeyType = uint64_t;
24
    static constexpr size_t KEY_SIZE{sizeof(KeyType)};
25
26
20.1k
    Obfuscation() { SetRotations(0); }
27
    explicit Obfuscation(std::span<const std::byte, KEY_SIZE> key_bytes)
28
2.71k
    {
29
2.71k
        SetRotations(ToKey(key_bytes));
30
2.71k
    }
31
32
67.8M
    operator bool() const { return m_rotations[0] != 0; }
33
34
    void operator()(std::span<std::byte> target, size_t key_offset = 0) const
35
1.69M
    {
36
1.69M
        if (!*this) return;
37
38
1.32M
        KeyType rot_key{m_rotations[key_offset % KEY_SIZE]}; // Continue obfuscation from where we left off
39
1.32M
        if (target.size() > KEY_SIZE) {
40
            // Obfuscate until KEY_SIZE alignment boundary
41
928k
            if (const auto misalign{reinterpret_cast<uintptr_t>(target.data()) % KEY_SIZE}) {
42
416
                const size_t alignment{KEY_SIZE - misalign};
43
416
                XorWord(target.first(alignment), rot_key);
44
45
416
                target = {std::assume_aligned<KEY_SIZE>(target.data() + alignment), target.size() - alignment};
46
416
                rot_key = m_rotations[(key_offset + alignment) % KEY_SIZE];
47
416
            }
48
            // Aligned obfuscation in 8*KEY_SIZE chunks
49
101M
            for (constexpr auto unroll{8}; target.size() >= KEY_SIZE * unroll; target = target.subspan(KEY_SIZE * unroll)) {
50
899M
                for (size_t i{0}; i < unroll; ++i) {
51
799M
                    XorWord(target.subspan(i * KEY_SIZE, KEY_SIZE), rot_key);
52
799M
                }
53
100M
            }
54
            // Aligned obfuscation in KEY_SIZE chunks
55
3.94M
            for (; target.size() >= KEY_SIZE; target = target.subspan(KEY_SIZE)) {
56
3.01M
                XorWord(target.first<KEY_SIZE>(), rot_key);
57
3.01M
            }
58
928k
        }
59
1.32M
        XorWord(target, rot_key);
60
1.32M
    }
61
62
    template <typename Stream>
63
    void Serialize(Stream& s) const
64
1.41k
    {
65
        // Use vector serialization for convenient compact size prefix.
66
1.41k
        std::vector<std::byte> bytes{KEY_SIZE};
67
1.41k
        std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE);
68
1.41k
        s << bytes;
69
1.41k
    }
void Obfuscation::Serialize<DataStream>(DataStream&) const
Line
Count
Source
64
501
    {
65
        // Use vector serialization for convenient compact size prefix.
66
501
        std::vector<std::byte> bytes{KEY_SIZE};
67
501
        std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE);
68
501
        s << bytes;
69
501
    }
void Obfuscation::Serialize<AutoFile>(AutoFile&) const
Line
Count
Source
64
915
    {
65
        // Use vector serialization for convenient compact size prefix.
66
915
        std::vector<std::byte> bytes{KEY_SIZE};
67
915
        std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE);
68
915
        s << bytes;
69
915
    }
70
71
    template <typename Stream>
72
    void Unserialize(Stream& s)
73
1.29k
    {
74
1.29k
        std::vector<std::byte> bytes{KEY_SIZE};
75
1.29k
        s >> bytes;
76
1.29k
        if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
77
1.29k
        SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes)));
78
1.29k
    }
void Obfuscation::Unserialize<DataStream>(DataStream&)
Line
Count
Source
73
1
    {
74
1
        std::vector<std::byte> bytes{KEY_SIZE};
75
1
        s >> bytes;
76
1
        if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
77
1
        SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes)));
78
1
    }
void Obfuscation::Unserialize<SpanReader>(SpanReader&)
Line
Count
Source
73
845
    {
74
845
        std::vector<std::byte> bytes{KEY_SIZE};
75
845
        s >> bytes;
76
845
        if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
77
845
        SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes)));
78
845
    }
void Obfuscation::Unserialize<AutoFile>(AutoFile&)
Line
Count
Source
73
447
    {
74
447
        std::vector<std::byte> bytes{KEY_SIZE};
75
447
        s >> bytes;
76
447
        if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
77
447
        SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes)));
78
447
    }
79
80
    std::string HexKey() const
81
3.20k
    {
82
3.20k
        return HexStr(std::as_bytes(std::span{&m_rotations[0], 1}));
83
3.20k
    }
84
85
private:
86
    // Cached key rotations for different offsets.
87
    std::array<KeyType, KEY_SIZE> m_rotations;
88
89
    void SetRotations(KeyType key)
90
24.1k
    {
91
217k
        for (size_t i{0}; i < KEY_SIZE; ++i) {
92
193k
            int key_rotation_bits{int(CHAR_BIT * i)};
93
            if constexpr (std::endian::native == std::endian::big) key_rotation_bits *= -1;
94
193k
            m_rotations[i] = std::rotr(key, key_rotation_bits);
95
193k
        }
96
24.1k
    }
97
98
    static KeyType ToKey(std::span<const std::byte, KEY_SIZE> key_span)
99
4.00k
    {
100
4.00k
        KeyType key{};
101
4.00k
        std::memcpy(&key, key_span.data(), KEY_SIZE);
102
4.00k
        return key;
103
4.00k
    }
104
105
    static void XorWord(std::span<std::byte> target, KeyType key)
106
803M
    {
107
803M
        assert(target.size() <= KEY_SIZE);
108
803M
        if (target.empty()) return;
109
803M
        KeyType raw{};
110
803M
        std::memcpy(&raw, target.data(), target.size());
111
803M
        raw ^= key;
112
803M
        std::memcpy(target.data(), &raw, target.size());
113
803M
    }
114
};
115
116
#endif // BITCOIN_UTIL_OBFUSCATION_H