150 lines
3.9 KiB
C
150 lines
3.9 KiB
C
/*
|
|
* Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL licenses, (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
* https://www.openssl.org/source/license.html
|
|
* or in the file LICENSE in the source distribution.
|
|
*/
|
|
|
|
#include "internal/nelem.h"
|
|
#include "testutil.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
|
|
#define NUM_REPEATS "1000000"
|
|
|
|
static int64_t num_repeats;
|
|
static int print_mode = 0;
|
|
|
|
#ifndef OPENSSL_NO_EC
|
|
# include <openssl/ec.h>
|
|
# include <openssl/err.h>
|
|
# include <openssl/obj_mac.h>
|
|
# include <openssl/objects.h>
|
|
# include <openssl/rand.h>
|
|
# include <openssl/bn.h>
|
|
# include <openssl/opensslconf.h>
|
|
|
|
static const char *kP256DefaultResult =
|
|
"A1E24B223B8E81BC1FFF99BAFB909EDB895FACDE7D6DA5EF5E7B3255FB378E0F";
|
|
|
|
/*
|
|
* Perform a deterministic walk on the curve, by starting from |point| and
|
|
* using the X-coordinate of the previous point as the next scalar for
|
|
* point multiplication.
|
|
* Returns the X-coordinate of the end result or NULL on error.
|
|
*/
|
|
static BIGNUM *walk_curve(const EC_GROUP *group, EC_POINT *point, int64_t num)
|
|
{
|
|
BIGNUM *scalar = NULL;
|
|
int64_t i;
|
|
|
|
if (!TEST_ptr(scalar = BN_new())
|
|
|| !TEST_true(EC_POINT_get_affine_coordinates(group, point, scalar,
|
|
NULL, NULL)))
|
|
goto err;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
if (!TEST_true(EC_POINT_mul(group, point, NULL, point, scalar, NULL))
|
|
|| !TEST_true(EC_POINT_get_affine_coordinates(group, point,
|
|
scalar,
|
|
NULL, NULL)))
|
|
goto err;
|
|
}
|
|
return scalar;
|
|
|
|
err:
|
|
BN_free(scalar);
|
|
return NULL;
|
|
}
|
|
|
|
static int test_curve(void)
|
|
{
|
|
EC_GROUP *group = NULL;
|
|
EC_POINT *point = NULL;
|
|
BIGNUM *result = NULL, *expected_result = NULL;
|
|
int ret = 0;
|
|
|
|
/*
|
|
* We currently hard-code P-256, though adaptation to other curves.
|
|
* would be straightforward.
|
|
*/
|
|
if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1))
|
|
|| !TEST_ptr(point = EC_POINT_dup(EC_GROUP_get0_generator(group),
|
|
group))
|
|
|| !TEST_ptr(result = walk_curve(group, point, num_repeats)))
|
|
return 0;
|
|
|
|
if (print_mode) {
|
|
BN_print(bio_out, result);
|
|
BIO_printf(bio_out, "\n");
|
|
ret = 1;
|
|
} else {
|
|
if (!TEST_true(BN_hex2bn(&expected_result, kP256DefaultResult))
|
|
|| !TEST_ptr(expected_result)
|
|
|| !TEST_BN_eq(result, expected_result))
|
|
goto err;
|
|
ret = 1;
|
|
}
|
|
|
|
err:
|
|
EC_GROUP_free(group);
|
|
EC_POINT_free(point);
|
|
BN_free(result);
|
|
BN_free(expected_result);
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
static int atoi64(const char *in, int64_t *result)
|
|
{
|
|
int64_t ret = 0;
|
|
|
|
for ( ; *in != '\0'; in++) {
|
|
char c = *in;
|
|
|
|
if (!isdigit((unsigned char)c))
|
|
return 0;
|
|
ret *= 10;
|
|
ret += (c - '0');
|
|
}
|
|
*result = ret;
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Stress test the curve. If the '-num' argument is given, runs the loop
|
|
* |num| times and prints the resulting X-coordinate. Otherwise runs the test
|
|
* the default number of times and compares against the expected result.
|
|
*/
|
|
int setup_tests(void)
|
|
{
|
|
const char *p;
|
|
|
|
if (!atoi64(NUM_REPEATS, &num_repeats)) {
|
|
TEST_error("Cannot parse " NUM_REPEATS);
|
|
return 0;
|
|
}
|
|
/*
|
|
* TODO(openssl-team): code under test/ should be able to reuse the option
|
|
* parsing framework currently in apps/.
|
|
*/
|
|
p = test_get_option_argument("-num");
|
|
if (p != NULL) {
|
|
if (!atoi64(p, &num_repeats)
|
|
|| num_repeats < 0)
|
|
return 0;
|
|
print_mode = 1;
|
|
}
|
|
|
|
#ifndef OPENSSL_NO_EC
|
|
ADD_TEST(test_curve);
|
|
#endif
|
|
return 1;
|
|
}
|