/*
This file is part of GNUnet.
Copyright (C) 2015 GNUnet e.V.
GNUnet is free software: you can redistribute it and/or modify it
under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
GNUnet is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see .
SPDX-License-Identifier: AGPL3.0-or-later
*/
/**
* @file util/test_crypto_ecc_dlog.c
* @brief testcase for ECC DLOG calculation
* @author Christian Grothoff
*/
#include "platform.h"
#include "gnunet_util_lib.h"
#include
/**
* Name of the curve we are using. Note that we have hard-coded
* structs that use 256 bits, so using a bigger curve will require
* changes that break stuff badly. The name of the curve given here
* must be agreed by all peers and be supported by libgcrypt.
*/
#define CURVE "Ed25519"
/**
* Maximum value we test dlog for.
*/
#define MAX_FACT 100
/**
* Maximum memory to use, sqrt(MAX_FACT) is a good choice.
*/
#define MAX_MEM 10
/**
* How many values do we test?
*/
#define TEST_ITER 10
/**
* Range of values to use for MATH tests.
*/
#define MATH_MAX 5
/**
* Do some DLOG operations for testing.
*
* @param edc context for ECC operations
*/
static void
test_dlog (struct GNUNET_CRYPTO_EccDlogContext *edc)
{
gcry_mpi_t fact;
gcry_mpi_t n;
gcry_ctx_t ctx;
gcry_mpi_point_t q;
gcry_mpi_point_t g;
unsigned int i;
int x;
int iret;
GNUNET_assert (0 == gcry_mpi_ec_new (&ctx, NULL, CURVE));
g = gcry_mpi_ec_get_point ("g", ctx, 0);
GNUNET_assert (NULL != g);
n = gcry_mpi_ec_get_mpi ("n", ctx, 0);
q = gcry_mpi_point_new (0);
fact = gcry_mpi_new (0);
for (i = 0; i < TEST_ITER; i++)
{
fprintf (stderr, ".");
x = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
MAX_FACT);
if (0 == GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
2))
{
gcry_mpi_set_ui (fact, x);
gcry_mpi_sub (fact, n, fact);
x = -x;
}
else
{
gcry_mpi_set_ui (fact, x);
}
gcry_mpi_ec_mul (q, fact, g, ctx);
if (x !=
(iret = GNUNET_CRYPTO_ecc_dlog (edc,
q)))
{
fprintf (stderr,
"DLOG failed for value %d (%d)\n",
x,
iret);
GNUNET_assert (0);
}
}
gcry_mpi_release (fact);
gcry_mpi_release (n);
gcry_mpi_point_release (g);
gcry_mpi_point_release (q);
gcry_ctx_release (ctx);
fprintf (stderr, "\n");
}
/**
* Do some arithmetic operations for testing.
*
* @param edc context for ECC operations
*/
static void
test_math (struct GNUNET_CRYPTO_EccDlogContext *edc)
{
int i;
int j;
gcry_mpi_point_t ip;
gcry_mpi_point_t jp;
gcry_mpi_point_t r;
gcry_mpi_point_t ir;
gcry_mpi_point_t irj;
gcry_mpi_point_t r_inv;
gcry_mpi_point_t sum;
for (i = -MATH_MAX; i < MATH_MAX; i++)
{
ip = GNUNET_CRYPTO_ecc_dexp (edc, i);
for (j = -MATH_MAX; j < MATH_MAX; j++)
{
fprintf (stderr, ".");
jp = GNUNET_CRYPTO_ecc_dexp (edc, j);
GNUNET_CRYPTO_ecc_rnd (edc,
&r,
&r_inv);
ir = GNUNET_CRYPTO_ecc_add (edc, ip, r);
irj = GNUNET_CRYPTO_ecc_add (edc, ir, jp);
sum = GNUNET_CRYPTO_ecc_add (edc, irj, r_inv);
GNUNET_assert (i + j ==
GNUNET_CRYPTO_ecc_dlog (edc,
sum));
GNUNET_CRYPTO_ecc_free (jp);
GNUNET_CRYPTO_ecc_free (ir);
GNUNET_CRYPTO_ecc_free (irj);
GNUNET_CRYPTO_ecc_free (r);
GNUNET_CRYPTO_ecc_free (r_inv);
GNUNET_CRYPTO_ecc_free (sum);
}
GNUNET_CRYPTO_ecc_free (ip);
}
fprintf (stderr, "\n");
}
int
main (int argc, char *argv[])
{
struct GNUNET_CRYPTO_EccDlogContext *edc;
if (! gcry_check_version ("1.6.0"))
{
fprintf (stderr,
_
(
"libgcrypt has not the expected version (version %s is required).\n"),
"1.6.0");
return 0;
}
if (getenv ("GNUNET_GCRYPT_DEBUG"))
gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u, 0);
GNUNET_log_setup ("test-crypto-ecc-dlog",
"WARNING",
NULL);
edc = GNUNET_CRYPTO_ecc_dlog_prepare (MAX_FACT,
MAX_MEM);
test_dlog (edc);
test_math (edc);
GNUNET_CRYPTO_ecc_dlog_release (edc);
return 0;
}
/* end of test_crypto_ecc_dlog.c */