ecp_curves: Added unit-tests for secp256k1
This patch introduces basic unit-testing for the `ecp_mod_p256k1()`. The method is exposed through the ecp_invasive interface, and the standard testing data is being provided by the python framework. Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
This commit is contained in:
parent
4bf08f86bb
commit
d6751dcd8b
4 changed files with 120 additions and 2 deletions
|
@ -4617,7 +4617,8 @@ MBEDTLS_STATIC_TESTABLE
|
||||||
int mbedtls_ecp_mod_p224k1(mbedtls_mpi *);
|
int mbedtls_ecp_mod_p224k1(mbedtls_mpi *);
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
|
#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
|
||||||
static int ecp_mod_p256k1(mbedtls_mpi *);
|
MBEDTLS_STATIC_TESTABLE
|
||||||
|
int ecp_mod_p256k1(mbedtls_mpi *);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(ECP_LOAD_GROUP)
|
#if defined(ECP_LOAD_GROUP)
|
||||||
|
@ -5659,7 +5660,8 @@ int mbedtls_ecp_mod_p224k1(mbedtls_mpi *N)
|
||||||
* Fast quasi-reduction modulo p256k1 = 2^256 - R,
|
* Fast quasi-reduction modulo p256k1 = 2^256 - R,
|
||||||
* with R = 2^32 + 2^9 + 2^8 + 2^7 + 2^6 + 2^4 + 1 = 0x01000003D1
|
* with R = 2^32 + 2^9 + 2^8 + 2^7 + 2^6 + 2^4 + 1 = 0x01000003D1
|
||||||
*/
|
*/
|
||||||
static int ecp_mod_p256k1(mbedtls_mpi *N)
|
MBEDTLS_STATIC_TESTABLE
|
||||||
|
int ecp_mod_p256k1(mbedtls_mpi *N)
|
||||||
{
|
{
|
||||||
static mbedtls_mpi_uint Rp[] = {
|
static mbedtls_mpi_uint Rp[] = {
|
||||||
MBEDTLS_BYTES_TO_T_UINT_8(0xD1, 0x03, 0x00, 0x00, 0x01, 0x00, 0x00,
|
MBEDTLS_BYTES_TO_T_UINT_8(0xD1, 0x03, 0x00, 0x00, 0x01, 0x00, 0x00,
|
||||||
|
|
|
@ -186,6 +186,13 @@ int mbedtls_ecp_mod_p224k1(mbedtls_mpi *N);
|
||||||
|
|
||||||
#endif /* MBEDTLS_ECP_DP_SECP224K1_ENABLED */
|
#endif /* MBEDTLS_ECP_DP_SECP224K1_ENABLED */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
|
||||||
|
|
||||||
|
MBEDTLS_STATIC_TESTABLE
|
||||||
|
int ecp_mod_p256k1(mbedtls_mpi *N);
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_ECP_DP_SECP256K1_ENABLED */
|
||||||
|
|
||||||
/** Initialise a modulus with hard-coded const curve data.
|
/** Initialise a modulus with hard-coded const curve data.
|
||||||
*
|
*
|
||||||
* \note The caller is responsible for the \p N modulus' memory.
|
* \note The caller is responsible for the \p N modulus' memory.
|
||||||
|
|
|
@ -617,3 +617,68 @@ class EcpP224K1Raw(bignum_common.ModOperationCommon,
|
||||||
@property
|
@property
|
||||||
def is_valid(self) -> bool:
|
def is_valid(self) -> bool:
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
class EcpP256K1Raw(bignum_common.ModOperationCommon,
|
||||||
|
EcpTarget):
|
||||||
|
"""Test cases for ECP P256 fast reduction."""
|
||||||
|
symbol = "-"
|
||||||
|
test_function = "ecp_mod_p256k1"
|
||||||
|
test_name = "ecp_mod_p256k1"
|
||||||
|
input_style = "fixed"
|
||||||
|
arity = 1
|
||||||
|
dependencies = ["MBEDTLS_ECP_DP_SECP256K1_ENABLED"]
|
||||||
|
|
||||||
|
moduli = ["fffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f"] # type: List[str]
|
||||||
|
|
||||||
|
input_values = [
|
||||||
|
"0", "1",
|
||||||
|
|
||||||
|
# Modulus - 1
|
||||||
|
"fffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2e",
|
||||||
|
|
||||||
|
# Modulus + 1
|
||||||
|
"fffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc30",
|
||||||
|
|
||||||
|
# 2^256 - 1
|
||||||
|
"ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||||
|
|
||||||
|
# Maximum canonical P256 multiplication result
|
||||||
|
("fffffffffffffffffffffffffffffffffffffffffffffffffffffffdfffff85c0"
|
||||||
|
"00000000000000000000000000000000000000000000001000007a4000e9844"),
|
||||||
|
|
||||||
|
# First 8 number generated by random.getrandbits(512) - seed(2,2)
|
||||||
|
("4067c3584ee207f8da94e3e8ab73738fcf1822ffbc6887782b491044d5e34124"
|
||||||
|
"5c6e433715ba2bdd177219d30e7a269fd95bafc8f2a4d27bdcf4bb99f4bea973"),
|
||||||
|
("82523e86feac7eb7dc38f519b91751dacdbd47d364be8049a372db8f6e405d93"
|
||||||
|
"ffed9235288bc781ae66267594c9c9500925e4749b575bd13653f8dd9b1f282e"),
|
||||||
|
("e8624fab5186ee32ee8d7ee9770348a05d300cb90706a045defc044a09325626"
|
||||||
|
"e6b58de744ab6cce80877b6f71e1f6d2ef8acd128b4f2fc15f3f57ebf30b94fa"),
|
||||||
|
("829a48d422fe99a22c70501e533c91352d3d854e061b90303b08c6e33c729578"
|
||||||
|
"2d6c797f8f7d9b782a1be9cd8697bbd0e2520e33e44c50556c71c4a66148a86f"),
|
||||||
|
("e89204e2e8168561867e5e15bc01bfce6a27e0dfcbf8754472154e76e4c11ab2"
|
||||||
|
"fec3f6b32e8d4b8a8f54f8ceacaab39e83844b40ffa9b9f15c14bc4a829e07b0"),
|
||||||
|
("bd143fa9b714210c665d7435c1066932f4767f26294365b2721dea3bf63f23d0"
|
||||||
|
"dbe53fcafb2147df5ca495fa5a91c89b97eeab64ca2ce6bc5d3fd983c34c769f"),
|
||||||
|
("74667bffe202849da9643a295a9ac6decbd4d3e2d4dec9ef83f0be4e80371eb9"
|
||||||
|
"7f81375eecc1cb6347733e847d718d733ff98ff387c56473a7a83ee0761ebfd2"),
|
||||||
|
("d08f1bb2531d6460f0caeef038c89b38a8acb5137c9260dc74e088a9b9492f25"
|
||||||
|
"8ebdbfe3eb9ac688b9d39cca91551e8259cc60b17604e4b4e73695c3e652c71a"),
|
||||||
|
|
||||||
|
# Next 2 number generated by random.getrandbits(256)
|
||||||
|
("c5e2486c44a4a8f69dc8db48e86ec9c6e06f291b2a838af8d5c44a4eb3172062"),
|
||||||
|
("d4c0dca8b4c9e755cc9c3adcf515a8234da4daeb4f3f87777ad1f45ae9500ec9"),
|
||||||
|
]
|
||||||
|
|
||||||
|
@property
|
||||||
|
def arg_a(self) -> str:
|
||||||
|
hex_digits = bignum_common.hex_digits_for_limb(448 // self.bits_in_limb, self.bits_in_limb)
|
||||||
|
return super().format_arg('{:x}'.format(self.int_a)).zfill(hex_digits)
|
||||||
|
|
||||||
|
def result(self) -> List[str]:
|
||||||
|
result = self.int_a % self.int_n
|
||||||
|
return [self.format_result(result)]
|
||||||
|
|
||||||
|
@property
|
||||||
|
def is_valid(self) -> bool:
|
||||||
|
return True
|
||||||
|
|
|
@ -1433,6 +1433,50 @@ exit:
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_ECP_DP_SECP256K1_ENABLED */
|
||||||
|
void ecp_mod_p256k1(char *input_N,
|
||||||
|
char *input_X,
|
||||||
|
char *result)
|
||||||
|
{
|
||||||
|
mbedtls_mpi X;
|
||||||
|
mbedtls_mpi_uint *N = NULL;
|
||||||
|
mbedtls_mpi_uint *res = NULL;
|
||||||
|
size_t limbs_N;
|
||||||
|
size_t limbs_res;
|
||||||
|
|
||||||
|
mbedtls_mpi_mod_modulus m;
|
||||||
|
mbedtls_mpi_init(&X);
|
||||||
|
mbedtls_mpi_mod_modulus_init(&m);
|
||||||
|
|
||||||
|
TEST_EQUAL(mbedtls_test_read_mpi(&X, input_X), 0);
|
||||||
|
TEST_EQUAL(mbedtls_test_read_mpi_core(&N, &limbs_N, input_N), 0);
|
||||||
|
TEST_EQUAL(mbedtls_test_read_mpi_core(&res, &limbs_res, result), 0);
|
||||||
|
|
||||||
|
size_t limbs = limbs_N;
|
||||||
|
size_t bytes = limbs * sizeof(mbedtls_mpi_uint);
|
||||||
|
|
||||||
|
TEST_EQUAL(X.s, 1);
|
||||||
|
TEST_LE_U(X.n, 2 * limbs_N);
|
||||||
|
TEST_EQUAL(limbs_res, limbs);
|
||||||
|
|
||||||
|
TEST_EQUAL(mbedtls_mpi_mod_modulus_setup(
|
||||||
|
&m, N, limbs,
|
||||||
|
MBEDTLS_MPI_MOD_REP_MONTGOMERY), 0);
|
||||||
|
|
||||||
|
TEST_EQUAL(ecp_mod_p256k1(&X), 0);
|
||||||
|
TEST_LE_U(mbedtls_mpi_core_bitlen(X.p, X.n), 256);
|
||||||
|
mbedtls_mpi_mod_raw_fix_quasi_reduction(X.p, &m);
|
||||||
|
ASSERT_COMPARE(X.p, bytes, res, bytes);
|
||||||
|
|
||||||
|
exit:
|
||||||
|
mbedtls_mpi_free(&X);
|
||||||
|
mbedtls_free(res);
|
||||||
|
|
||||||
|
mbedtls_mpi_mod_modulus_free(&m);
|
||||||
|
mbedtls_free(N);
|
||||||
|
}
|
||||||
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
|
/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
|
||||||
void ecp_mod_setup(char *input_A, int id, int ctype, int iret)
|
void ecp_mod_setup(char *input_A, int id, int ctype, int iret)
|
||||||
{
|
{
|
||||||
|
|
Loading…
Reference in a new issue