2013-03-10 17:25:19 -03:00
|
|
|
#include <assert.h>
|
|
|
|
|
2013-03-16 11:51:55 -03:00
|
|
|
#include "num.cpp"
|
|
|
|
#include "field.cpp"
|
|
|
|
#include "group.cpp"
|
|
|
|
#include "ecmult.cpp"
|
|
|
|
#include "ecdsa.cpp"
|
2013-03-10 17:25:19 -03:00
|
|
|
|
2013-03-24 06:38:35 -03:00
|
|
|
// #define COUNT 2
|
|
|
|
#define COUNT 100
|
|
|
|
|
2013-03-10 17:25:19 -03:00
|
|
|
using namespace secp256k1;
|
|
|
|
|
2013-03-10 21:19:24 -03:00
|
|
|
void test_run_ecmult_chain() {
|
2013-03-10 18:23:33 -03:00
|
|
|
// random starting point A (on the curve)
|
2013-03-10 17:25:19 -03:00
|
|
|
FieldElem ax; ax.SetHex("8b30bbe9ae2a990696b22f670709dff3727fd8bc04d3362c6c7bf458e2846004");
|
|
|
|
FieldElem ay; ay.SetHex("a357ae915c4a65281309edf20504740f0eb3343990216b4f81063cb65f2f7e0f");
|
|
|
|
GroupElemJac a(ax,ay);
|
2013-03-10 18:23:33 -03:00
|
|
|
// two random initial factors xn and gn
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_t xn;
|
|
|
|
secp256k1_num_init(&xn);
|
|
|
|
secp256k1_num_set_hex(&xn, "84cc5452f7fde1edb4d38a8ce9b1b84ccef31f146e569be9705d357a42985407", 64);
|
|
|
|
secp256k1_num_t gn;
|
|
|
|
secp256k1_num_init(&gn);
|
|
|
|
secp256k1_num_set_hex(&gn, "a1e58d22553dcd42b23980625d4c57a96e9323d42b3152e5ca2c3990edc7c9de", 64);
|
2013-03-10 18:23:33 -03:00
|
|
|
// two small multipliers to be applied to xn and gn in every iteration:
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_t xf;
|
|
|
|
secp256k1_num_init(&xf);
|
|
|
|
secp256k1_num_set_hex(&xf, "1337", 4);
|
|
|
|
secp256k1_num_t gf;
|
|
|
|
secp256k1_num_init(&gf);
|
|
|
|
secp256k1_num_set_hex(&gf, "7113", 4);
|
2013-03-10 18:23:33 -03:00
|
|
|
// accumulators with the resulting coefficients to A and G
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_t ae;
|
|
|
|
secp256k1_num_init(&ae);
|
|
|
|
secp256k1_num_set_int(&ae, 1);
|
|
|
|
secp256k1_num_t ge;
|
|
|
|
secp256k1_num_init(&ge);
|
|
|
|
secp256k1_num_set_int(&ge, 0);
|
2013-03-10 18:23:33 -03:00
|
|
|
// the point being computed
|
2013-03-10 17:41:54 -03:00
|
|
|
GroupElemJac x = a;
|
2013-03-24 06:38:35 -03:00
|
|
|
const secp256k1_num_t &order = GetGroupConst().order;
|
|
|
|
for (int i=0; i<200*COUNT; i++) {
|
2013-03-10 17:41:54 -03:00
|
|
|
// in each iteration, compute X = xn*X + gn*G;
|
2013-03-13 21:20:10 -03:00
|
|
|
ECMult(x, x, xn, gn);
|
2013-03-10 17:41:54 -03:00
|
|
|
// also compute ae and ge: the actual accumulated factors for A and G
|
|
|
|
// if X was (ae*A+ge*G), xn*X + gn*G results in (xn*ae*A + (xn*ge+gn)*G)
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_mod_mul(&ae, &ae, &xn, &order);
|
|
|
|
secp256k1_num_mod_mul(&ge, &ge, &xn, &order);
|
|
|
|
secp256k1_num_add(&ge, &ge, &gn);
|
|
|
|
secp256k1_num_mod(&ge, &ge, &order);
|
2013-03-10 17:41:54 -03:00
|
|
|
// modify xn and gn
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_mod_mul(&xn, &xn, &xf, &order);
|
|
|
|
secp256k1_num_mod_mul(&gn, &gn, &gf, &order);
|
2013-03-10 17:25:19 -03:00
|
|
|
}
|
2013-03-10 17:41:54 -03:00
|
|
|
std::string res = x.ToString();
|
2013-03-24 06:38:35 -03:00
|
|
|
if (COUNT == 100) {
|
|
|
|
assert(res == "(D6E96687F9B10D092A6F35439D86CEBEA4535D0D409F53586440BD74B933E830,B95CBCA2C77DA786539BE8FD53354D2D3B4F566AE658045407ED6015EE1B2A88)");
|
|
|
|
}
|
2013-03-10 17:41:54 -03:00
|
|
|
// redo the computation, but directly with the resulting ae and ge coefficients:
|
2013-03-13 21:20:10 -03:00
|
|
|
GroupElemJac x2; ECMult(x2, a, ae, ge);
|
2013-03-10 17:41:54 -03:00
|
|
|
std::string res2 = x2.ToString();
|
|
|
|
assert(res == res2);
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_free(&xn);
|
|
|
|
secp256k1_num_free(&gn);
|
|
|
|
secp256k1_num_free(&xf);
|
|
|
|
secp256k1_num_free(&gf);
|
|
|
|
secp256k1_num_free(&ae);
|
|
|
|
secp256k1_num_free(&ge);
|
2013-03-10 17:25:19 -03:00
|
|
|
}
|
|
|
|
|
2013-03-10 21:19:24 -03:00
|
|
|
void test_point_times_order(const GroupElemJac &point) {
|
|
|
|
// either the point is not on the curve, or multiplying it by the order results in O
|
|
|
|
if (!point.IsValid())
|
|
|
|
return;
|
|
|
|
|
|
|
|
const GroupConstants &c = GetGroupConst();
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_t zero;
|
|
|
|
secp256k1_num_init(&zero);
|
|
|
|
secp256k1_num_set_int(&zero, 0);
|
2013-03-10 21:19:24 -03:00
|
|
|
GroupElemJac res;
|
2013-03-13 21:20:10 -03:00
|
|
|
ECMult(res, point, c.order, zero); // calc res = order * point + 0 * G;
|
2013-03-10 21:19:24 -03:00
|
|
|
assert(res.IsInfinity());
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_free(&zero);
|
2013-03-10 21:19:24 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
void test_run_point_times_order() {
|
2013-03-10 21:35:46 -03:00
|
|
|
FieldElem x; x.SetHex("02");
|
2013-03-10 21:19:24 -03:00
|
|
|
for (int i=0; i<500; i++) {
|
|
|
|
GroupElemJac j; j.SetCompressed(x, true);
|
|
|
|
test_point_times_order(j);
|
|
|
|
x.SetSquare(x);
|
|
|
|
}
|
2013-03-10 21:40:29 -03:00
|
|
|
assert(x.ToString() == "7603CB59B0EF6C63FE6084792A0C378CDB3233A80F8A9A09A877DEAD31B38C45"); // 0x02 ^ (2^500)
|
2013-03-10 21:19:24 -03:00
|
|
|
}
|
|
|
|
|
2013-03-24 06:38:35 -03:00
|
|
|
void test_wnaf(const secp256k1_num_t &number, int w) {
|
|
|
|
secp256k1_num_t x, two, t;
|
|
|
|
secp256k1_num_init(&x);
|
|
|
|
secp256k1_num_init(&two);
|
|
|
|
secp256k1_num_init(&t);
|
|
|
|
secp256k1_num_set_int(&x, 0);
|
|
|
|
secp256k1_num_set_int(&two, 2);
|
2013-03-13 21:20:10 -03:00
|
|
|
WNAF<1023> wnaf(number, w);
|
2013-03-10 21:19:24 -03:00
|
|
|
int zeroes = -1;
|
|
|
|
for (int i=wnaf.GetSize()-1; i>=0; i--) {
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_mul(&x, &x, &two);
|
2013-03-10 21:19:24 -03:00
|
|
|
int v = wnaf.Get(i);
|
|
|
|
if (v) {
|
|
|
|
assert(zeroes == -1 || zeroes >= w-1); // check that distance between non-zero elements is at least w-1
|
|
|
|
zeroes=0;
|
|
|
|
assert((v & 1) == 1); // check non-zero elements are odd
|
|
|
|
assert(v <= (1 << (w-1)) - 1); // check range below
|
|
|
|
assert(v >= -(1 << (w-1)) - 1); // check range above
|
|
|
|
} else {
|
|
|
|
assert(zeroes != -1); // check that no unnecessary zero padding exists
|
|
|
|
zeroes++;
|
|
|
|
}
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_set_int(&t, v);
|
|
|
|
secp256k1_num_add(&x, &x, &t);
|
2013-03-10 21:19:24 -03:00
|
|
|
}
|
2013-03-24 06:38:35 -03:00
|
|
|
assert(secp256k1_num_cmp(&x, &number) == 0); // check that wnaf represents number
|
|
|
|
secp256k1_num_free(&x);
|
|
|
|
secp256k1_num_free(&two);
|
|
|
|
secp256k1_num_free(&t);
|
2013-03-10 21:19:24 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
void test_run_wnaf() {
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_t range, min, n;
|
|
|
|
secp256k1_num_init(&range);
|
|
|
|
secp256k1_num_init(&min);
|
|
|
|
secp256k1_num_init(&n);
|
|
|
|
secp256k1_num_set_hex(&range, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", 256);
|
|
|
|
secp256k1_num_copy(&min, &range);
|
|
|
|
secp256k1_num_shift(&min, 1);
|
|
|
|
secp256k1_num_negate(&min);
|
|
|
|
for (int i=0; i<COUNT; i++) {
|
|
|
|
secp256k1_num_set_rand(&n, &range);
|
|
|
|
secp256k1_num_add(&n, &n, &min);
|
2013-03-10 21:19:24 -03:00
|
|
|
test_wnaf(n, 4+(i%10));
|
|
|
|
}
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_free(&range);
|
|
|
|
secp256k1_num_free(&min);
|
|
|
|
secp256k1_num_free(&n);
|
2013-03-10 21:19:24 -03:00
|
|
|
}
|
2013-03-10 17:25:19 -03:00
|
|
|
|
2013-03-17 22:41:01 -03:00
|
|
|
void test_ecdsa_sign_verify() {
|
|
|
|
const GroupConstants &c = GetGroupConst();
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_t msg, key, nonce;
|
|
|
|
secp256k1_num_init(&msg);
|
|
|
|
secp256k1_num_set_rand(&msg, &c.order);
|
|
|
|
secp256k1_num_init(&key);
|
|
|
|
secp256k1_num_set_rand(&key, &c.order);
|
|
|
|
secp256k1_num_init(&nonce);
|
2013-03-17 22:41:01 -03:00
|
|
|
GroupElemJac pub; ECMultBase(pub, key);
|
|
|
|
Signature sig;
|
|
|
|
do {
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_set_rand(&nonce, &c.order);
|
2013-03-17 22:41:01 -03:00
|
|
|
} while(!sig.Sign(key, msg, nonce));
|
|
|
|
assert(sig.Verify(pub, msg));
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_inc(&msg);
|
2013-03-17 22:41:01 -03:00
|
|
|
assert(!sig.Verify(pub, msg));
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_free(&msg);
|
|
|
|
secp256k1_num_free(&key);
|
|
|
|
secp256k1_num_free(&nonce);
|
2013-03-17 22:41:01 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
void test_run_ecdsa_sign_verify() {
|
2013-03-24 06:38:35 -03:00
|
|
|
for (int i=0; i<10*COUNT; i++) {
|
2013-03-17 22:41:01 -03:00
|
|
|
test_ecdsa_sign_verify();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-10 17:25:19 -03:00
|
|
|
int main(void) {
|
2013-03-24 06:38:35 -03:00
|
|
|
secp256k1_num_start();
|
|
|
|
|
2013-03-10 21:19:24 -03:00
|
|
|
test_run_wnaf();
|
|
|
|
test_run_point_times_order();
|
|
|
|
test_run_ecmult_chain();
|
2013-03-17 22:41:01 -03:00
|
|
|
test_run_ecdsa_sign_verify();
|
2013-03-10 17:25:19 -03:00
|
|
|
return 0;
|
|
|
|
}
|