Commit 88a8a9e0 authored by Niels Möller's avatar Niels Möller

New testcase for curve25519 add.

parent a79c2ac5
2014-07-14 Niels Möller <nisse@lysator.liu.se>
* testsuite/curve25519-add-test.c: New test case.
* testsuite/Makefile.in (TS_HOGWEED_SOURCES): Added
curve25519-add-test.c.
* ecc-add-ehh.c (ecc_add_ehh, ecc_add_ehh_itch): New file, new
functions.
* ecc.h (ecc_add_ehh, ecc_add_ehh_itch): Declare them.
......
......@@ -190,6 +190,9 @@ dsa-keygen-test$(EXEEXT): dsa-keygen-test.$(OBJEXT)
curve25519-dup-test$(EXEEXT): curve25519-dup-test.$(OBJEXT)
$(LINK) curve25519-dup-test.$(OBJEXT) $(TEST_OBJS) -o curve25519-dup-test$(EXEEXT)
curve25519-add-test$(EXEEXT): curve25519-add-test.$(OBJEXT)
$(LINK) curve25519-add-test.$(OBJEXT) $(TEST_OBJS) -o curve25519-add-test$(EXEEXT)
ecc-mod-test$(EXEEXT): ecc-mod-test.$(OBJEXT)
$(LINK) ecc-mod-test.$(OBJEXT) $(TEST_OBJS) -o ecc-mod-test$(EXEEXT)
......
......@@ -38,7 +38,7 @@ TS_HOGWEED_SOURCES = sexp-test.c sexp-format-test.c \
pkcs1-test.c \
rsa-test.c rsa-encrypt-test.c rsa-keygen-test.c \
dsa-test.c dsa-keygen-test.c \
curve25519-dup-test.c \
curve25519-dup-test.c curve25519-add-test.c \
ecc-mod-test.c ecc-modinv-test.c ecc-redc-test.c \
ecc-mul-g-test.c ecc-mul-a-test.c \
ecdsa-sign-test.c ecdsa-verify-test.c ecdsa-keygen-test.c
......
#include "testutils.h"
static int
point_zero_p (const struct ecc_curve *ecc, const mp_limb_t *p)
{
mp_limb_t *d;
int ret;
mp_size_t i;
d = xalloc_limbs (ecc->size);
ecc_modp_sub (ecc, d, p + ecc->size, p + 2*ecc->size);
while (mpn_cmp (d, ecc->p, ecc->size) >= 0)
mpn_sub_n (d, d, ecc->p, ecc->size);
for (i = 0, ret = 1; i < ecc->size; i++)
if (d[i])
{
ret = 0;
break;
}
free (d);
return ret;
}
void
test_main (void)
{
const struct ecc_curve *ecc = &nettle_curve25519;
mp_limb_t *g;
mp_limb_t *z;
mp_limb_t *pe;
mp_limb_t *pa;
mp_limb_t *scratch;
const struct ecc_ref_point rg =
{
"9",
"20ae19a1b8a086b4e01edd2c7748d14c923d4d7e6d7c61b229e9c5a27eced3d9"
};
const struct ecc_ref_point rg2 =
{ /* In Edwards coordinates:
x = 0x1a1c31f8665368131698fecfd54233fcdc638bb46d25cc61d8bc4bcdbfbb4459,
y = 0x2260cdf3092329c21da25ee8c9a21f5697390f51643851560e5f46ae6af8a3c9
*/
"20d342d51873f1b7d9750c687d157114"
"8f3f5ced1e350b5c5cae469cdd684efb",
"13b57e011700e8ae050a00945d2ba2f3"
"77659eb28d8d391ebcd70465c72df563"
};
const struct ecc_ref_point rg3 =
{
"1c12bc1a6d57abe645534d91c21bba64"
"f8824e67621c0859c00a03affb713c12",
"2986855cbe387eaeaceea446532c338c"
"536af570f71ef7cf75c665019c41222b"
};
const struct ecc_ref_point rg4 =
{
"79ce98b7e0689d7de7d1d074a15b315f"
"fe1805dfcd5d2a230fee85e4550013ef",
"075af5bf4ebdc75c8fe26873427d275d"
"73c0fb13da361077a565539f46de1c30"
};
g = xalloc_limbs (ecc_size_j (ecc));
z = xalloc_limbs (ecc_size_j (ecc));
pe = xalloc_limbs (ecc_size_j (ecc));
pa = xalloc_limbs (ecc_size_j (ecc));
scratch = xalloc_limbs (ECC_ADD_EHH_ITCH(ecc->size));
mpn_copyi (g, ecc->g, 2*ecc->size);
g[2*ecc->size] = 1;
mpn_zero (g+2*ecc->size + 1, ecc->size - 1);
/* Zero point has x = 0, y = 1, z = 1 */
mpn_zero (z, 3*ecc->size);
z[ecc->size] = z[2*ecc->size] = 1;
ecc_add_ehh (ecc, pe, z, z, scratch);
if (!point_zero_p (ecc, pe))
die ("dup of zero point failed.\n");
ecc_add_ehh (ecc, pe, g, pe, scratch);
ecc_eh_to_a (ecc, 0, pa, pe, scratch);
test_ecc_point (ecc, &rg, pa);
ecc_add_ehh (ecc, pe, g, pe, scratch);
ecc_eh_to_a (ecc, 0, pa, pe, scratch);
test_ecc_point (ecc, &rg2, pa);
ecc_add_ehh (ecc, pe, g, pe, scratch);
ecc_eh_to_a (ecc, 0, pa, pe, scratch);
test_ecc_point (ecc, &rg3, pa);
ecc_add_ehh (ecc, pe, g, pe, scratch);
ecc_eh_to_a (ecc, 0, pa, pe, scratch);
test_ecc_point (ecc, &rg4, pa);
}
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment