123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150 |
- /*
- * Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the OpenSSL licenses, (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- * https://www.openssl.org/source/license.html
- * or in the file LICENSE in the source distribution.
- */
- #include "internal/nelem.h"
- #include "testutil.h"
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <ctype.h>
- #define NUM_REPEATS "1000000"
- static int64_t num_repeats;
- static int print_mode = 0;
- #ifndef OPENSSL_NO_EC
- # include <openssl/ec.h>
- # include <openssl/err.h>
- # include <openssl/obj_mac.h>
- # include <openssl/objects.h>
- # include <openssl/rand.h>
- # include <openssl/bn.h>
- # include <openssl/opensslconf.h>
- static const char *kP256DefaultResult =
- "A1E24B223B8E81BC1FFF99BAFB909EDB895FACDE7D6DA5EF5E7B3255FB378E0F";
- /*
- * Perform a deterministic walk on the curve, by starting from |point| and
- * using the X-coordinate of the previous point as the next scalar for
- * point multiplication.
- * Returns the X-coordinate of the end result or NULL on error.
- */
- static BIGNUM *walk_curve(const EC_GROUP *group, EC_POINT *point, int64_t num)
- {
- BIGNUM *scalar = NULL;
- int64_t i;
- if (!TEST_ptr(scalar = BN_new())
- || !TEST_true(EC_POINT_get_affine_coordinates_GFp(group, point,
- scalar,
- NULL, NULL)))
- goto err;
- for (i = 0; i < num; i++) {
- if (!TEST_true(EC_POINT_mul(group, point, NULL, point, scalar, NULL))
- || !TEST_true(EC_POINT_get_affine_coordinates_GFp(group, point,
- scalar,
- NULL, NULL)))
- goto err;
- }
- return scalar;
- err:
- BN_free(scalar);
- return NULL;
- }
- static int test_curve(void)
- {
- EC_GROUP *group = NULL;
- EC_POINT *point = NULL;
- BIGNUM *result = NULL, *expected_result = NULL;
- int ret = 0;
- /*
- * We currently hard-code P-256, though adaptation to other curves.
- * would be straightforward.
- */
- if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1))
- || !TEST_ptr(point = EC_POINT_dup(EC_GROUP_get0_generator(group),
- group))
- || !TEST_ptr(result = walk_curve(group, point, num_repeats)))
- return 0;
- if (print_mode) {
- BN_print(bio_out, result);
- BIO_printf(bio_out, "\n");
- ret = 1;
- } else {
- if (!TEST_true(BN_hex2bn(&expected_result, kP256DefaultResult))
- || !TEST_ptr(expected_result)
- || !TEST_BN_eq(result, expected_result))
- goto err;
- ret = 1;
- }
- err:
- EC_GROUP_free(group);
- EC_POINT_free(point);
- BN_free(result);
- BN_free(expected_result);
- return ret;
- }
- #endif
- static int atoi64(const char *in, int64_t *result)
- {
- int64_t ret = 0;
- for ( ; *in != '\0'; in++) {
- char c = *in;
- if (!isdigit((unsigned char)c))
- return 0;
- ret *= 10;
- ret += (c - '0');
- }
- *result = ret;
- return 1;
- }
- /*
- * Stress test the curve. If the '-num' argument is given, runs the loop
- * |num| times and prints the resulting X-coordinate. Otherwise runs the test
- * the default number of times and compares against the expected result.
- */
- int setup_tests(void)
- {
- const char *p;
- if (!atoi64(NUM_REPEATS, &num_repeats)) {
- TEST_error("Cannot parse " NUM_REPEATS);
- return 0;
- }
- /*
- * TODO(openssl-team): code under test/ should be able to reuse the option
- * parsing framework currently in apps/.
- */
- p = test_get_option_argument("-num");
- if (p != NULL) {
- if (!atoi64(p, &num_repeats)
- || num_repeats < 0)
- return 0;
- print_mode = 1;
- }
- #ifndef OPENSSL_NO_EC
- ADD_TEST(test_curve);
- #endif
- return 1;
- }
|