Mercurial > dropbear
comparison libtomcrypt/src/pk/ecc/ecc_test.c @ 382:0cbe8f6dbf9e
propagate from branch 'au.asn.ucc.matt.ltc.dropbear' (head 2af22fb4e878750b88f80f90d439b316d229796f)
to branch 'au.asn.ucc.matt.dropbear' (head 02c413252c90e9de8e03d91e9939dde3029f5c0a)
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 11 Jan 2007 02:41:05 +0000 |
parents | |
children | f849a5ca2efc |
comparison
equal
deleted
inserted
replaced
379:b66a00272a90 | 382:0cbe8f6dbf9e |
---|---|
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis | |
2 * | |
3 * LibTomCrypt is a library that provides various cryptographic | |
4 * algorithms in a highly modular and flexible manner. | |
5 * | |
6 * The library is free for all purposes without any express | |
7 * guarantee it works. | |
8 * | |
9 * Tom St Denis, [email protected], http://libtomcrypt.com | |
10 */ | |
11 | |
12 /* Implements ECC over Z/pZ for curve y^2 = x^3 - 3x + b | |
13 * | |
14 * All curves taken from NIST recommendation paper of July 1999 | |
15 * Available at http://csrc.nist.gov/cryptval/dss.htm | |
16 */ | |
17 #include "tomcrypt.h" | |
18 | |
19 /** | |
20 @file ecc_test.c | |
21 ECC Crypto, Tom St Denis | |
22 */ | |
23 | |
24 #ifdef MECC | |
25 | |
26 /** | |
27 Perform on the ECC system | |
28 @return CRYPT_OK if successful | |
29 */ | |
30 int ecc_test(void) | |
31 { | |
32 void *modulus, *order; | |
33 ecc_point *G, *GG; | |
34 int i, err, primality; | |
35 | |
36 if ((err = mp_init_multi(&modulus, &order, NULL)) != CRYPT_OK) { | |
37 return err; | |
38 } | |
39 | |
40 G = ltc_ecc_new_point(); | |
41 GG = ltc_ecc_new_point(); | |
42 if (G == NULL || GG == NULL) { | |
43 mp_clear_multi(modulus, order, NULL); | |
44 ltc_ecc_del_point(G); | |
45 ltc_ecc_del_point(GG); | |
46 return CRYPT_MEM; | |
47 } | |
48 | |
49 for (i = 0; ltc_ecc_sets[i].size; i++) { | |
50 #if 0 | |
51 printf("Testing %d\n", ltc_ecc_sets[i].size); | |
52 #endif | |
53 if ((err = mp_read_radix(modulus, (char *)ltc_ecc_sets[i].prime, 16)) != CRYPT_OK) { goto done; } | |
54 if ((err = mp_read_radix(order, (char *)ltc_ecc_sets[i].order, 16)) != CRYPT_OK) { goto done; } | |
55 | |
56 /* is prime actually prime? */ | |
57 if ((err = mp_prime_is_prime(modulus, 8, &primality)) != CRYPT_OK) { goto done; } | |
58 if (primality == 0) { | |
59 err = CRYPT_FAIL_TESTVECTOR; | |
60 goto done; | |
61 } | |
62 | |
63 /* is order prime ? */ | |
64 if ((err = mp_prime_is_prime(order, 8, &primality)) != CRYPT_OK) { goto done; } | |
65 if (primality == 0) { | |
66 err = CRYPT_FAIL_TESTVECTOR; | |
67 goto done; | |
68 } | |
69 | |
70 if ((err = mp_read_radix(G->x, (char *)ltc_ecc_sets[i].Gx, 16)) != CRYPT_OK) { goto done; } | |
71 if ((err = mp_read_radix(G->y, (char *)ltc_ecc_sets[i].Gy, 16)) != CRYPT_OK) { goto done; } | |
72 mp_set(G->z, 1); | |
73 | |
74 /* then we should have G == (order + 1)G */ | |
75 if ((err = mp_add_d(order, 1, order)) != CRYPT_OK) { goto done; } | |
76 if ((err = ltc_mp.ecc_ptmul(order, G, GG, modulus, 1)) != CRYPT_OK) { goto done; } | |
77 if (mp_cmp(G->x, GG->x) != LTC_MP_EQ || mp_cmp(G->y, GG->y) != LTC_MP_EQ) { | |
78 err = CRYPT_FAIL_TESTVECTOR; | |
79 goto done; | |
80 } | |
81 } | |
82 err = CRYPT_OK; | |
83 done: | |
84 ltc_ecc_del_point(GG); | |
85 ltc_ecc_del_point(G); | |
86 mp_clear_multi(order, modulus, NULL); | |
87 return err; | |
88 } | |
89 | |
90 #endif | |
91 | |
92 /* $Source: /cvs/libtom/libtomcrypt/src/pk/ecc/ecc_test.c,v $ */ | |
93 /* $Revision: 1.10 $ */ | |
94 /* $Date: 2006/12/04 02:19:48 $ */ | |
95 |