/[smecontribs]/rpms/openssl3/contribs10/ectest.c
ViewVC logotype

Annotation of /rpms/openssl3/contribs10/ectest.c

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.1 - (hide annotations) (download)
Wed Jan 31 17:24:55 2024 UTC (9 months, 3 weeks ago) by jpp
Branch: MAIN
CVS Tags: openssl3-3_0_7-5_el7_sme_1, HEAD
Content type: text/plain
Initial import

1 jpp 1.1 /*
2     * Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved.
3     * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
4     *
5     * Licensed under the Apache License 2.0 (the "License"). You may not use
6     * this file except in compliance with the License. You can obtain a copy
7     * in the file LICENSE in the source distribution or at
8     * https://www.openssl.org/source/license.html
9     */
10    
11     /*
12     * EC_KEY low level APIs are deprecated for public use, but still ok for
13     * internal use.
14     */
15     #include "internal/deprecated.h"
16    
17     #include <string.h>
18     #include "internal/nelem.h"
19     #include "testutil.h"
20    
21     #include <openssl/ec.h>
22     #ifndef OPENSSL_NO_ENGINE
23     # include <openssl/engine.h>
24     #endif
25     #include <openssl/err.h>
26     #include <openssl/obj_mac.h>
27     #include <openssl/objects.h>
28     #include <openssl/rand.h>
29     #include <openssl/bn.h>
30     #include <openssl/opensslconf.h>
31     #include <openssl/core_names.h>
32     #include <openssl/param_build.h>
33     #include <openssl/evp.h>
34    
35     static size_t crv_len = 0;
36     static EC_builtin_curve *curves = NULL;
37    
38     /* test multiplication with group order, long and negative scalars */
39     static int group_order_tests(EC_GROUP *group)
40     {
41     BIGNUM *n1 = NULL, *n2 = NULL, *order = NULL;
42     EC_POINT *P = NULL, *Q = NULL, *R = NULL, *S = NULL;
43     const EC_POINT *G = NULL;
44     BN_CTX *ctx = NULL;
45     int i = 0, r = 0;
46    
47     if (!TEST_ptr(n1 = BN_new())
48     || !TEST_ptr(n2 = BN_new())
49     || !TEST_ptr(order = BN_new())
50     || !TEST_ptr(ctx = BN_CTX_new())
51     || !TEST_ptr(G = EC_GROUP_get0_generator(group))
52     || !TEST_ptr(P = EC_POINT_new(group))
53     || !TEST_ptr(Q = EC_POINT_new(group))
54     || !TEST_ptr(R = EC_POINT_new(group))
55     || !TEST_ptr(S = EC_POINT_new(group)))
56     goto err;
57    
58     if (!TEST_true(EC_GROUP_get_order(group, order, ctx))
59     || !TEST_true(EC_POINT_mul(group, Q, order, NULL, NULL, ctx))
60     || !TEST_true(EC_POINT_is_at_infinity(group, Q))
61     #ifndef OPENSSL_NO_DEPRECATED_3_0
62     || !TEST_true(EC_GROUP_precompute_mult(group, ctx))
63     #endif
64     || !TEST_true(EC_POINT_mul(group, Q, order, NULL, NULL, ctx))
65     || !TEST_true(EC_POINT_is_at_infinity(group, Q))
66     || !TEST_true(EC_POINT_copy(P, G))
67     || !TEST_true(BN_one(n1))
68     || !TEST_true(EC_POINT_mul(group, Q, n1, NULL, NULL, ctx))
69     || !TEST_int_eq(0, EC_POINT_cmp(group, Q, P, ctx))
70     || !TEST_true(BN_sub(n1, order, n1))
71     || !TEST_true(EC_POINT_mul(group, Q, n1, NULL, NULL, ctx))
72     || !TEST_true(EC_POINT_invert(group, Q, ctx))
73     || !TEST_int_eq(0, EC_POINT_cmp(group, Q, P, ctx)))
74     goto err;
75    
76     for (i = 1; i <= 2; i++) {
77     #ifndef OPENSSL_NO_DEPRECATED_3_0
78     const BIGNUM *scalars[6];
79     const EC_POINT *points[6];
80     #endif
81    
82     if (!TEST_true(BN_set_word(n1, i))
83     /*
84     * If i == 1, P will be the predefined generator for which
85     * EC_GROUP_precompute_mult has set up precomputation.
86     */
87     || !TEST_true(EC_POINT_mul(group, P, n1, NULL, NULL, ctx))
88     || (i == 1 && !TEST_int_eq(0, EC_POINT_cmp(group, P, G, ctx)))
89     || !TEST_true(BN_one(n1))
90     /* n1 = 1 - order */
91     || !TEST_true(BN_sub(n1, n1, order))
92     || !TEST_true(EC_POINT_mul(group, Q, NULL, P, n1, ctx))
93     || !TEST_int_eq(0, EC_POINT_cmp(group, Q, P, ctx))
94    
95     /* n2 = 1 + order */
96     || !TEST_true(BN_add(n2, order, BN_value_one()))
97     || !TEST_true(EC_POINT_mul(group, Q, NULL, P, n2, ctx))
98     || !TEST_int_eq(0, EC_POINT_cmp(group, Q, P, ctx))
99    
100     /* n2 = (1 - order) * (1 + order) = 1 - order^2 */
101     || !TEST_true(BN_mul(n2, n1, n2, ctx))
102     || !TEST_true(EC_POINT_mul(group, Q, NULL, P, n2, ctx))
103     || !TEST_int_eq(0, EC_POINT_cmp(group, Q, P, ctx)))
104     goto err;
105    
106     /* n2 = order^2 - 1 */
107     BN_set_negative(n2, 0);
108     if (!TEST_true(EC_POINT_mul(group, Q, NULL, P, n2, ctx))
109     /* Add P to verify the result. */
110     || !TEST_true(EC_POINT_add(group, Q, Q, P, ctx))
111     || !TEST_true(EC_POINT_is_at_infinity(group, Q))
112     || !TEST_false(EC_POINT_is_at_infinity(group, P)))
113     goto err;
114    
115     #ifndef OPENSSL_NO_DEPRECATED_3_0
116     /* Exercise EC_POINTs_mul, including corner cases. */
117     scalars[0] = scalars[1] = BN_value_one();
118     points[0] = points[1] = P;
119    
120     if (!TEST_true(EC_POINTs_mul(group, R, NULL, 2, points, scalars, ctx))
121     || !TEST_true(EC_POINT_dbl(group, S, points[0], ctx))
122     || !TEST_int_eq(0, EC_POINT_cmp(group, R, S, ctx)))
123     goto err;
124    
125     scalars[0] = n1;
126     points[0] = Q; /* => infinity */
127     scalars[1] = n2;
128     points[1] = P; /* => -P */
129     scalars[2] = n1;
130     points[2] = Q; /* => infinity */
131     scalars[3] = n2;
132     points[3] = Q; /* => infinity */
133     scalars[4] = n1;
134     points[4] = P; /* => P */
135     scalars[5] = n2;
136     points[5] = Q; /* => infinity */
137     if (!TEST_true(EC_POINTs_mul(group, P, NULL, 6, points, scalars, ctx))
138     || !TEST_true(EC_POINT_is_at_infinity(group, P)))
139     goto err;
140     #endif
141     }
142    
143     r = 1;
144     err:
145     if (r == 0 && i != 0)
146     TEST_info(i == 1 ? "allowing precomputation" :
147     "without precomputation");
148     EC_POINT_free(P);
149     EC_POINT_free(Q);
150     EC_POINT_free(R);
151     EC_POINT_free(S);
152     BN_free(n1);
153     BN_free(n2);
154     BN_free(order);
155     BN_CTX_free(ctx);
156     return r;
157     }
158    
159     static int prime_field_tests(void)
160     {
161     BN_CTX *ctx = NULL;
162     BIGNUM *p = NULL, *a = NULL, *b = NULL, *scalar3 = NULL;
163     EC_GROUP *group = NULL;
164     EC_POINT *P = NULL, *Q = NULL, *R = NULL;
165     BIGNUM *x = NULL, *y = NULL, *z = NULL, *yplusone = NULL;
166     #ifndef OPENSSL_NO_DEPRECATED_3_0
167     const EC_POINT *points[4];
168     const BIGNUM *scalars[4];
169     #endif
170     unsigned char buf[100];
171     size_t len, r = 0;
172     int k;
173    
174     if (!TEST_ptr(ctx = BN_CTX_new())
175     || !TEST_ptr(p = BN_new())
176     || !TEST_ptr(a = BN_new())
177     || !TEST_ptr(b = BN_new())
178     /*
179     * applications should use EC_GROUP_new_curve_GFp so
180     * that the library gets to choose the EC_METHOD
181     */
182     || !TEST_ptr(group = EC_GROUP_new(EC_GFp_mont_method())))
183     goto err;
184    
185     buf[0] = 0;
186     if (!TEST_ptr(P = EC_POINT_new(group))
187     || !TEST_ptr(Q = EC_POINT_new(group))
188     || !TEST_ptr(R = EC_POINT_new(group))
189     || !TEST_ptr(x = BN_new())
190     || !TEST_ptr(y = BN_new())
191     || !TEST_ptr(z = BN_new())
192     || !TEST_ptr(yplusone = BN_new()))
193     goto err;
194    
195     /* Curve P-224 (FIPS PUB 186-2, App. 6) */
196    
197     if (!TEST_true(BN_hex2bn(&p, "FFFFFFFFFFFFFFFFFFFFFFFF"
198     "FFFFFFFF000000000000000000000001"))
199     || !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
200     || !TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFF"
201     "FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE"))
202     || !TEST_true(BN_hex2bn(&b, "B4050A850C04B3ABF5413256"
203     "5044B0B7D7BFD8BA270B39432355FFB4"))
204     || !TEST_true(EC_GROUP_set_curve(group, p, a, b, ctx))
205     || !TEST_true(BN_hex2bn(&x, "B70E0CBD6BB4BF7F321390B9"
206     "4A03C1D356C21122343280D6115C1D21"))
207     || !TEST_true(EC_POINT_set_compressed_coordinates(group, P, x, 0, ctx))
208     || !TEST_int_gt(EC_POINT_is_on_curve(group, P, ctx), 0)
209     || !TEST_true(BN_hex2bn(&z, "FFFFFFFFFFFFFFFFFFFFFFFF"
210     "FFFF16A2E0B8F03E13DD29455C5C2A3D"))
211     || !TEST_true(EC_GROUP_set_generator(group, P, z, BN_value_one()))
212     || !TEST_true(EC_POINT_get_affine_coordinates(group, P, x, y, ctx)))
213     goto err;
214    
215     TEST_info("NIST curve P-224 -- Generator");
216     test_output_bignum("x", x);
217     test_output_bignum("y", y);
218     /* G_y value taken from the standard: */
219     if (!TEST_true(BN_hex2bn(&z, "BD376388B5F723FB4C22DFE6"
220     "CD4375A05A07476444D5819985007E34"))
221     || !TEST_BN_eq(y, z)
222     || !TEST_true(BN_add(yplusone, y, BN_value_one()))
223     /*
224     * When (x, y) is on the curve, (x, y + 1) is, as it happens, not,
225     * and therefore setting the coordinates should fail.
226     */
227     || !TEST_false(EC_POINT_set_affine_coordinates(group, P, x, yplusone,
228     ctx))
229     || !TEST_int_eq(EC_GROUP_get_degree(group), 224)
230     || !group_order_tests(group)
231    
232     /* Curve P-256 (FIPS PUB 186-2, App. 6) */
233    
234     || !TEST_true(BN_hex2bn(&p, "FFFFFFFF000000010000000000000000"
235     "00000000FFFFFFFFFFFFFFFFFFFFFFFF"))
236     || !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
237     || !TEST_true(BN_hex2bn(&a, "FFFFFFFF000000010000000000000000"
238     "00000000FFFFFFFFFFFFFFFFFFFFFFFC"))
239     || !TEST_true(BN_hex2bn(&b, "5AC635D8AA3A93E7B3EBBD55769886BC"
240     "651D06B0CC53B0F63BCE3C3E27D2604B"))
241     || !TEST_true(EC_GROUP_set_curve(group, p, a, b, ctx))
242    
243     || !TEST_true(BN_hex2bn(&x, "6B17D1F2E12C4247F8BCE6E563A440F2"
244     "77037D812DEB33A0F4A13945D898C296"))
245     || !TEST_true(EC_POINT_set_compressed_coordinates(group, P, x, 1, ctx))
246     || !TEST_int_gt(EC_POINT_is_on_curve(group, P, ctx), 0)
247     || !TEST_true(BN_hex2bn(&z, "FFFFFFFF00000000FFFFFFFFFFFFFFFF"
248     "BCE6FAADA7179E84F3B9CAC2FC632551"))
249     || !TEST_true(EC_GROUP_set_generator(group, P, z, BN_value_one()))
250     || !TEST_true(EC_POINT_get_affine_coordinates(group, P, x, y, ctx)))
251     goto err;
252    
253     TEST_info("NIST curve P-256 -- Generator");
254     test_output_bignum("x", x);
255     test_output_bignum("y", y);
256     /* G_y value taken from the standard: */
257     if (!TEST_true(BN_hex2bn(&z, "4FE342E2FE1A7F9B8EE7EB4A7C0F9E16"
258     "2BCE33576B315ECECBB6406837BF51F5"))
259     || !TEST_BN_eq(y, z)
260     || !TEST_true(BN_add(yplusone, y, BN_value_one()))
261     /*
262     * When (x, y) is on the curve, (x, y + 1) is, as it happens, not,
263     * and therefore setting the coordinates should fail.
264     */
265     || !TEST_false(EC_POINT_set_affine_coordinates(group, P, x, yplusone,
266     ctx))
267     || !TEST_int_eq(EC_GROUP_get_degree(group), 256)
268     || !group_order_tests(group)
269    
270     /* Curve P-384 (FIPS PUB 186-2, App. 6) */
271    
272     || !TEST_true(BN_hex2bn(&p, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
273     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE"
274     "FFFFFFFF0000000000000000FFFFFFFF"))
275     || !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
276     || !TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
277     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE"
278     "FFFFFFFF0000000000000000FFFFFFFC"))
279     || !TEST_true(BN_hex2bn(&b, "B3312FA7E23EE7E4988E056BE3F82D19"
280     "181D9C6EFE8141120314088F5013875A"
281     "C656398D8A2ED19D2A85C8EDD3EC2AEF"))
282     || !TEST_true(EC_GROUP_set_curve(group, p, a, b, ctx))
283    
284     || !TEST_true(BN_hex2bn(&x, "AA87CA22BE8B05378EB1C71EF320AD74"
285     "6E1D3B628BA79B9859F741E082542A38"
286     "5502F25DBF55296C3A545E3872760AB7"))
287     || !TEST_true(EC_POINT_set_compressed_coordinates(group, P, x, 1, ctx))
288     || !TEST_int_gt(EC_POINT_is_on_curve(group, P, ctx), 0)
289     || !TEST_true(BN_hex2bn(&z, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
290     "FFFFFFFFFFFFFFFFC7634D81F4372DDF"
291     "581A0DB248B0A77AECEC196ACCC52973"))
292     || !TEST_true(EC_GROUP_set_generator(group, P, z, BN_value_one()))
293     || !TEST_true(EC_POINT_get_affine_coordinates(group, P, x, y, ctx)))
294     goto err;
295    
296     TEST_info("NIST curve P-384 -- Generator");
297     test_output_bignum("x", x);
298     test_output_bignum("y", y);
299     /* G_y value taken from the standard: */
300     if (!TEST_true(BN_hex2bn(&z, "3617DE4A96262C6F5D9E98BF9292DC29"
301     "F8F41DBD289A147CE9DA3113B5F0B8C0"
302     "0A60B1CE1D7E819D7A431D7C90EA0E5F"))
303     || !TEST_BN_eq(y, z)
304     || !TEST_true(BN_add(yplusone, y, BN_value_one()))
305     /*
306     * When (x, y) is on the curve, (x, y + 1) is, as it happens, not,
307     * and therefore setting the coordinates should fail.
308     */
309     || !TEST_false(EC_POINT_set_affine_coordinates(group, P, x, yplusone,
310     ctx))
311     || !TEST_int_eq(EC_GROUP_get_degree(group), 384)
312     || !group_order_tests(group)
313    
314     /* Curve P-521 (FIPS PUB 186-2, App. 6) */
315     || !TEST_true(BN_hex2bn(&p, "1FF"
316     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
317     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
318     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
319     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"))
320     || !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
321     || !TEST_true(BN_hex2bn(&a, "1FF"
322     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
323     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
324     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
325     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC"))
326     || !TEST_true(BN_hex2bn(&b, "051"
327     "953EB9618E1C9A1F929A21A0B68540EE"
328     "A2DA725B99B315F3B8B489918EF109E1"
329     "56193951EC7E937B1652C0BD3BB1BF07"
330     "3573DF883D2C34F1EF451FD46B503F00"))
331     || !TEST_true(EC_GROUP_set_curve(group, p, a, b, ctx))
332     || !TEST_true(BN_hex2bn(&x, "C6"
333     "858E06B70404E9CD9E3ECB662395B442"
334     "9C648139053FB521F828AF606B4D3DBA"
335     "A14B5E77EFE75928FE1DC127A2FFA8DE"
336     "3348B3C1856A429BF97E7E31C2E5BD66"))
337     || !TEST_true(EC_POINT_set_compressed_coordinates(group, P, x, 0, ctx))
338     || !TEST_int_gt(EC_POINT_is_on_curve(group, P, ctx), 0)
339     || !TEST_true(BN_hex2bn(&z, "1FF"
340     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
341     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA"
342     "51868783BF2F966B7FCC0148F709A5D0"
343     "3BB5C9B8899C47AEBB6FB71E91386409"))
344     || !TEST_true(EC_GROUP_set_generator(group, P, z, BN_value_one()))
345     || !TEST_true(EC_POINT_get_affine_coordinates(group, P, x, y, ctx)))
346     goto err;
347    
348     TEST_info("NIST curve P-521 -- Generator");
349     test_output_bignum("x", x);
350     test_output_bignum("y", y);
351     /* G_y value taken from the standard: */
352     if (!TEST_true(BN_hex2bn(&z, "118"
353     "39296A789A3BC0045C8A5FB42C7D1BD9"
354     "98F54449579B446817AFBD17273E662C"
355     "97EE72995EF42640C550B9013FAD0761"
356     "353C7086A272C24088BE94769FD16650"))
357     || !TEST_BN_eq(y, z)
358     || !TEST_true(BN_add(yplusone, y, BN_value_one()))
359     /*
360     * When (x, y) is on the curve, (x, y + 1) is, as it happens, not,
361     * and therefore setting the coordinates should fail.
362     */
363     || !TEST_false(EC_POINT_set_affine_coordinates(group, P, x, yplusone,
364     ctx))
365     || !TEST_int_eq(EC_GROUP_get_degree(group), 521)
366     || !group_order_tests(group)
367    
368     /* more tests using the last curve */
369    
370     /* Restore the point that got mangled in the (x, y + 1) test. */
371     || !TEST_true(EC_POINT_set_affine_coordinates(group, P, x, y, ctx))
372     || !TEST_true(EC_POINT_copy(Q, P))
373     || !TEST_false(EC_POINT_is_at_infinity(group, Q))
374     || !TEST_true(EC_POINT_dbl(group, P, P, ctx))
375     || !TEST_int_gt(EC_POINT_is_on_curve(group, P, ctx), 0)
376     || !TEST_true(EC_POINT_invert(group, Q, ctx)) /* P = -2Q */
377     || !TEST_true(EC_POINT_add(group, R, P, Q, ctx))
378     || !TEST_true(EC_POINT_add(group, R, R, Q, ctx))
379     || !TEST_true(EC_POINT_is_at_infinity(group, R)) /* R = P + 2Q */
380     || !TEST_false(EC_POINT_is_at_infinity(group, Q)))
381     goto err;
382    
383     #ifndef OPENSSL_NO_DEPRECATED_3_0
384     TEST_note("combined multiplication ...");
385     points[0] = Q;
386     points[1] = Q;
387     points[2] = Q;
388     points[3] = Q;
389    
390     if (!TEST_true(EC_GROUP_get_order(group, z, ctx))
391     || !TEST_true(BN_add(y, z, BN_value_one()))
392     || !TEST_BN_even(y)
393     || !TEST_true(BN_rshift1(y, y)))
394     goto err;
395    
396     scalars[0] = y; /* (group order + 1)/2, so y*Q + y*Q = Q */
397     scalars[1] = y;
398    
399     /* z is still the group order */
400     if (!TEST_true(EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx))
401     || !TEST_true(EC_POINTs_mul(group, R, z, 2, points, scalars, ctx))
402     || !TEST_int_eq(0, EC_POINT_cmp(group, P, R, ctx))
403     || !TEST_int_eq(0, EC_POINT_cmp(group, R, Q, ctx))
404     || !TEST_true(BN_rand(y, BN_num_bits(y), 0, 0))
405     || !TEST_true(BN_add(z, z, y)))
406     goto err;
407     BN_set_negative(z, 1);
408     scalars[0] = y;
409     scalars[1] = z; /* z = -(order + y) */
410    
411     if (!TEST_true(EC_POINTs_mul(group, P, NULL, 2, points, scalars, ctx))
412     || !TEST_true(EC_POINT_is_at_infinity(group, P))
413     || !TEST_true(BN_rand(x, BN_num_bits(y) - 1, 0, 0))
414     || !TEST_true(BN_add(z, x, y)))
415     goto err;
416     BN_set_negative(z, 1);
417     scalars[0] = x;
418     scalars[1] = y;
419     scalars[2] = z; /* z = -(x+y) */
420    
421     if (!TEST_ptr(scalar3 = BN_new()))
422     goto err;
423     BN_zero(scalar3);
424     scalars[3] = scalar3;
425    
426     if (!TEST_true(EC_POINTs_mul(group, P, NULL, 4, points, scalars, ctx))
427     || !TEST_true(EC_POINT_is_at_infinity(group, P)))
428     goto err;
429     #endif
430     TEST_note(" ok\n");
431     r = 1;
432     err:
433     BN_CTX_free(ctx);
434     BN_free(p);
435     BN_free(a);
436     BN_free(b);
437     EC_GROUP_free(group);
438     EC_POINT_free(P);
439     EC_POINT_free(Q);
440     EC_POINT_free(R);
441     BN_free(x);
442     BN_free(y);
443     BN_free(z);
444     BN_free(yplusone);
445     BN_free(scalar3);
446     return r;
447     }
448    
449     static int internal_curve_test(int n)
450     {
451     EC_GROUP *group = NULL;
452     int nid = curves[n].nid;
453    
454     if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(nid))) {
455     TEST_info("EC_GROUP_new_curve_name() failed with curve %s\n",
456     OBJ_nid2sn(nid));
457     return 0;
458     }
459     if (!TEST_true(EC_GROUP_check(group, NULL))) {
460     TEST_info("EC_GROUP_check() failed with curve %s\n", OBJ_nid2sn(nid));
461     EC_GROUP_free(group);
462     return 0;
463     }
464     EC_GROUP_free(group);
465     return 1;
466     }
467    
468     static int internal_curve_test_method(int n)
469     {
470     int r, nid = curves[n].nid;
471     EC_GROUP *group;
472    
473     if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(nid))) {
474     TEST_info("Curve %s failed\n", OBJ_nid2sn(nid));
475     return 0;
476     }
477     r = group_order_tests(group);
478     EC_GROUP_free(group);
479     return r;
480     }
481    
482     static int group_field_test(void)
483     {
484     int r = 1;
485     BIGNUM *secp521r1_field = NULL;
486     BIGNUM *sect163r2_field = NULL;
487     EC_GROUP *secp521r1_group = NULL;
488     EC_GROUP *sect163r2_group = NULL;
489    
490     BN_hex2bn(&secp521r1_field,
491     "01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
492     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
493     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
494     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
495     "FFFF");
496    
497    
498     BN_hex2bn(&sect163r2_field,
499     "08000000000000000000000000000000"
500     "00000000C9");
501    
502     secp521r1_group = EC_GROUP_new_by_curve_name(NID_secp521r1);
503     if (BN_cmp(secp521r1_field, EC_GROUP_get0_field(secp521r1_group)))
504     r = 0;
505    
506     # ifndef OPENSSL_NO_EC2M
507     sect163r2_group = EC_GROUP_new_by_curve_name(NID_sect163r2);
508     if (BN_cmp(sect163r2_field, EC_GROUP_get0_field(sect163r2_group)))
509     r = 0;
510     # endif
511    
512     EC_GROUP_free(secp521r1_group);
513     EC_GROUP_free(sect163r2_group);
514     BN_free(secp521r1_field);
515     BN_free(sect163r2_field);
516     return r;
517     }
518     /*
519     * nistp_test_params contains magic numbers for testing
520     * several NIST curves with characteristic > 3.
521     */
522     struct nistp_test_params {
523     const int nid;
524     int degree;
525     /*
526     * Qx, Qy and D are taken from
527     * http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/ECDSA_Prime.pdf
528     * Otherwise, values are standard curve parameters from FIPS 180-3
529     */
530     const char *p, *a, *b, *Qx, *Qy, *Gx, *Gy, *order, *d;
531     };
532    
533     static const struct nistp_test_params nistp_tests_params[] = {
534     {
535     /* P-224 */
536     NID_secp224r1,
537     224,
538     /* p */
539     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001",
540     /* a */
541     "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE",
542     /* b */
543     "B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4",
544     /* Qx */
545     "E84FB0B8E7000CB657D7973CF6B42ED78B301674276DF744AF130B3E",
546     /* Qy */
547     "4376675C6FC5612C21A0FF2D2A89D2987DF7A2BC52183B5982298555",
548     /* Gx */
549     "B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21",
550     /* Gy */
551     "BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34",
552     /* order */
553     "FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D",
554     /* d */
555     "3F0C488E987C80BE0FEE521F8D90BE6034EC69AE11CA72AA777481E8",
556     },
557     {
558     /* P-256 */
559     NID_X9_62_prime256v1,
560     256,
561     /* p */
562     "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
563     /* a */
564     "ffffffff00000001000000000000000000000000fffffffffffffffffffffffc",
565     /* b */
566     "5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b",
567     /* Qx */
568     "b7e08afdfe94bad3f1dc8c734798ba1c62b3a0ad1e9ea2a38201cd0889bc7a19",
569     /* Qy */
570     "3603f747959dbf7a4bb226e41928729063adc7ae43529e61b563bbc606cc5e09",
571     /* Gx */
572     "6b17d1f2e12c4247f8bce6e563a440f277037d812deb33a0f4a13945d898c296",
573     /* Gy */
574     "4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5",
575     /* order */
576     "ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551",
577     /* d */
578     "c477f9f65c22cce20657faa5b2d1d8122336f851a508a1ed04e479c34985bf96",
579     },
580     {
581     /* P-521 */
582     NID_secp521r1,
583     521,
584     /* p */
585     "1ff"
586     "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"
587     "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
588     /* a */
589     "1ff"
590     "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"
591     "fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc",
592     /* b */
593     "051"
594     "953eb9618e1c9a1f929a21a0b68540eea2da725b99b315f3b8b489918ef109e1"
595     "56193951ec7e937b1652c0bd3bb1bf073573df883d2c34f1ef451fd46b503f00",
596     /* Qx */
597     "0098"
598     "e91eef9a68452822309c52fab453f5f117c1da8ed796b255e9ab8f6410cca16e"
599     "59df403a6bdc6ca467a37056b1e54b3005d8ac030decfeb68df18b171885d5c4",
600     /* Qy */
601     "0164"
602     "350c321aecfc1cca1ba4364c9b15656150b4b78d6a48d7d28e7f31985ef17be8"
603     "554376b72900712c4b83ad668327231526e313f5f092999a4632fd50d946bc2e",
604     /* Gx */
605     "c6"
606     "858e06b70404e9cd9e3ecb662395b4429c648139053fb521f828af606b4d3dba"
607     "a14b5e77efe75928fe1dc127a2ffa8de3348b3c1856a429bf97e7e31c2e5bd66",
608     /* Gy */
609     "118"
610     "39296a789a3bc0045c8a5fb42c7d1bd998f54449579b446817afbd17273e662c"
611     "97ee72995ef42640c550b9013fad0761353c7086a272c24088be94769fd16650",
612     /* order */
613     "1ff"
614     "fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa"
615     "51868783bf2f966b7fcc0148f709a5d03bb5c9b8899c47aebb6fb71e91386409",
616     /* d */
617     "0100"
618     "085f47b8e1b8b11b7eb33028c0b2888e304bfc98501955b45bba1478dc184eee"
619     "df09b86a5f7c21994406072787205e69a63709fe35aa93ba333514b24f961722",
620     },
621     };
622    
623     static int nistp_single_test(int idx)
624     {
625     const struct nistp_test_params *test = nistp_tests_params + idx;
626     BN_CTX *ctx = NULL;
627     BIGNUM *p = NULL, *a = NULL, *b = NULL, *x = NULL, *y = NULL;
628     BIGNUM *n = NULL, *m = NULL, *order = NULL, *yplusone = NULL;
629     EC_GROUP *NISTP = NULL;
630     EC_POINT *G = NULL, *P = NULL, *Q = NULL, *Q_CHECK = NULL;
631     int r = 0;
632    
633     TEST_note("NIST curve P-%d (optimised implementation):",
634     test->degree);
635     if (!TEST_ptr(ctx = BN_CTX_new())
636     || !TEST_ptr(p = BN_new())
637     || !TEST_ptr(a = BN_new())
638     || !TEST_ptr(b = BN_new())
639     || !TEST_ptr(x = BN_new())
640     || !TEST_ptr(y = BN_new())
641     || !TEST_ptr(m = BN_new())
642     || !TEST_ptr(n = BN_new())
643     || !TEST_ptr(order = BN_new())
644     || !TEST_ptr(yplusone = BN_new())
645    
646     || !TEST_ptr(NISTP = EC_GROUP_new_by_curve_name(test->nid))
647     || !TEST_true(BN_hex2bn(&p, test->p))
648     || !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
649     || !TEST_true(BN_hex2bn(&a, test->a))
650     || !TEST_true(BN_hex2bn(&b, test->b))
651     || !TEST_true(EC_GROUP_set_curve(NISTP, p, a, b, ctx))
652     || !TEST_ptr(G = EC_POINT_new(NISTP))
653     || !TEST_ptr(P = EC_POINT_new(NISTP))
654     || !TEST_ptr(Q = EC_POINT_new(NISTP))
655     || !TEST_ptr(Q_CHECK = EC_POINT_new(NISTP))
656     || !TEST_true(BN_hex2bn(&x, test->Qx))
657     || !TEST_true(BN_hex2bn(&y, test->Qy))
658     || !TEST_true(BN_add(yplusone, y, BN_value_one()))
659     /*
660     * When (x, y) is on the curve, (x, y + 1) is, as it happens, not,
661     * and therefore setting the coordinates should fail.
662     */
663     || !TEST_false(EC_POINT_set_affine_coordinates(NISTP, Q_CHECK, x,
664     yplusone, ctx))
665     || !TEST_true(EC_POINT_set_affine_coordinates(NISTP, Q_CHECK, x, y,
666     ctx))
667     || !TEST_true(BN_hex2bn(&x, test->Gx))
668     || !TEST_true(BN_hex2bn(&y, test->Gy))
669     || !TEST_true(EC_POINT_set_affine_coordinates(NISTP, G, x, y, ctx))
670     || !TEST_true(BN_hex2bn(&order, test->order))
671     || !TEST_true(EC_GROUP_set_generator(NISTP, G, order, BN_value_one()))
672     || !TEST_int_eq(EC_GROUP_get_degree(NISTP), test->degree))
673     goto err;
674    
675     TEST_note("NIST test vectors ... ");
676     if (!TEST_true(BN_hex2bn(&n, test->d)))
677     goto err;
678     /* fixed point multiplication */
679     EC_POINT_mul(NISTP, Q, n, NULL, NULL, ctx);
680     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx)))
681     goto err;
682     /* random point multiplication */
683     EC_POINT_mul(NISTP, Q, NULL, G, n, ctx);
684     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx))
685    
686     /* set generator to P = 2*G, where G is the standard generator */
687     || !TEST_true(EC_POINT_dbl(NISTP, P, G, ctx))
688     || !TEST_true(EC_GROUP_set_generator(NISTP, P, order, BN_value_one()))
689     /* set the scalar to m=n/2, where n is the NIST test scalar */
690     || !TEST_true(BN_rshift(m, n, 1)))
691     goto err;
692    
693     /* test the non-standard generator */
694     /* fixed point multiplication */
695     EC_POINT_mul(NISTP, Q, m, NULL, NULL, ctx);
696     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx)))
697     goto err;
698     /* random point multiplication */
699     EC_POINT_mul(NISTP, Q, NULL, P, m, ctx);
700     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx))
701     #ifndef OPENSSL_NO_DEPRECATED_3_0
702     /* We have not performed precomp so this should be false */
703     || !TEST_false(EC_GROUP_have_precompute_mult(NISTP))
704     /* now repeat all tests with precomputation */
705     || !TEST_true(EC_GROUP_precompute_mult(NISTP, ctx))
706     #endif
707     )
708     goto err;
709    
710     /* fixed point multiplication */
711     EC_POINT_mul(NISTP, Q, m, NULL, NULL, ctx);
712     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx)))
713     goto err;
714     /* random point multiplication */
715     EC_POINT_mul(NISTP, Q, NULL, P, m, ctx);
716     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx))
717    
718     /* reset generator */
719     || !TEST_true(EC_GROUP_set_generator(NISTP, G, order, BN_value_one())))
720     goto err;
721     /* fixed point multiplication */
722     EC_POINT_mul(NISTP, Q, n, NULL, NULL, ctx);
723     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx)))
724     goto err;
725     /* random point multiplication */
726     EC_POINT_mul(NISTP, Q, NULL, G, n, ctx);
727     if (!TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, Q_CHECK, ctx)))
728     goto err;
729    
730     /* regression test for felem_neg bug */
731     if (!TEST_true(BN_set_word(m, 32))
732     || !TEST_true(BN_set_word(n, 31))
733     || !TEST_true(EC_POINT_copy(P, G))
734     || !TEST_true(EC_POINT_invert(NISTP, P, ctx))
735     || !TEST_true(EC_POINT_mul(NISTP, Q, m, P, n, ctx))
736     || !TEST_int_eq(0, EC_POINT_cmp(NISTP, Q, G, ctx)))
737     goto err;
738    
739     r = 1;
740     err:
741     EC_GROUP_free(NISTP);
742     EC_POINT_free(G);
743     EC_POINT_free(P);
744     EC_POINT_free(Q);
745     EC_POINT_free(Q_CHECK);
746     BN_free(n);
747     BN_free(m);
748     BN_free(p);
749     BN_free(a);
750     BN_free(b);
751     BN_free(x);
752     BN_free(y);
753     BN_free(order);
754     BN_free(yplusone);
755     BN_CTX_free(ctx);
756     return r;
757     }
758    
759     static const unsigned char p521_named[] = {
760     0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x23,
761     };
762    
763     static const unsigned char p521_explicit[] = {
764     0x30, 0x82, 0x01, 0xc3, 0x02, 0x01, 0x01, 0x30, 0x4d, 0x06, 0x07, 0x2a,
765     0x86, 0x48, 0xce, 0x3d, 0x01, 0x01, 0x02, 0x42, 0x01, 0xff, 0xff, 0xff,
766     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
767     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
768     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
769     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
770     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
771     0xff, 0xff, 0x30, 0x81, 0x9f, 0x04, 0x42, 0x01, 0xff, 0xff, 0xff, 0xff,
772     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
773     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
774     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
775     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
776     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
777     0xfc, 0x04, 0x42, 0x00, 0x51, 0x95, 0x3e, 0xb9, 0x61, 0x8e, 0x1c, 0x9a,
778     0x1f, 0x92, 0x9a, 0x21, 0xa0, 0xb6, 0x85, 0x40, 0xee, 0xa2, 0xda, 0x72,
779     0x5b, 0x99, 0xb3, 0x15, 0xf3, 0xb8, 0xb4, 0x89, 0x91, 0x8e, 0xf1, 0x09,
780     0xe1, 0x56, 0x19, 0x39, 0x51, 0xec, 0x7e, 0x93, 0x7b, 0x16, 0x52, 0xc0,
781     0xbd, 0x3b, 0xb1, 0xbf, 0x07, 0x35, 0x73, 0xdf, 0x88, 0x3d, 0x2c, 0x34,
782     0xf1, 0xef, 0x45, 0x1f, 0xd4, 0x6b, 0x50, 0x3f, 0x00, 0x03, 0x15, 0x00,
783     0xd0, 0x9e, 0x88, 0x00, 0x29, 0x1c, 0xb8, 0x53, 0x96, 0xcc, 0x67, 0x17,
784     0x39, 0x32, 0x84, 0xaa, 0xa0, 0xda, 0x64, 0xba, 0x04, 0x81, 0x85, 0x04,
785     0x00, 0xc6, 0x85, 0x8e, 0x06, 0xb7, 0x04, 0x04, 0xe9, 0xcd, 0x9e, 0x3e,
786     0xcb, 0x66, 0x23, 0x95, 0xb4, 0x42, 0x9c, 0x64, 0x81, 0x39, 0x05, 0x3f,
787     0xb5, 0x21, 0xf8, 0x28, 0xaf, 0x60, 0x6b, 0x4d, 0x3d, 0xba, 0xa1, 0x4b,
788     0x5e, 0x77, 0xef, 0xe7, 0x59, 0x28, 0xfe, 0x1d, 0xc1, 0x27, 0xa2, 0xff,
789     0xa8, 0xde, 0x33, 0x48, 0xb3, 0xc1, 0x85, 0x6a, 0x42, 0x9b, 0xf9, 0x7e,
790     0x7e, 0x31, 0xc2, 0xe5, 0xbd, 0x66, 0x01, 0x18, 0x39, 0x29, 0x6a, 0x78,
791     0x9a, 0x3b, 0xc0, 0x04, 0x5c, 0x8a, 0x5f, 0xb4, 0x2c, 0x7d, 0x1b, 0xd9,
792     0x98, 0xf5, 0x44, 0x49, 0x57, 0x9b, 0x44, 0x68, 0x17, 0xaf, 0xbd, 0x17,
793     0x27, 0x3e, 0x66, 0x2c, 0x97, 0xee, 0x72, 0x99, 0x5e, 0xf4, 0x26, 0x40,
794     0xc5, 0x50, 0xb9, 0x01, 0x3f, 0xad, 0x07, 0x61, 0x35, 0x3c, 0x70, 0x86,
795     0xa2, 0x72, 0xc2, 0x40, 0x88, 0xbe, 0x94, 0x76, 0x9f, 0xd1, 0x66, 0x50,
796     0x02, 0x42, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
797     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
798     0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa,
799     0x51, 0x86, 0x87, 0x83, 0xbf, 0x2f, 0x96, 0x6b, 0x7f, 0xcc, 0x01, 0x48,
800     0xf7, 0x09, 0xa5, 0xd0, 0x3b, 0xb5, 0xc9, 0xb8, 0x89, 0x9c, 0x47, 0xae,
801     0xbb, 0x6f, 0xb7, 0x1e, 0x91, 0x38, 0x64, 0x09, 0x02, 0x01, 0x01,
802     };
803    
804     /*
805     * This test validates a named curve's group parameters using
806     * EC_GROUP_check_named_curve(). It also checks that modifying any of the
807     * group parameters results in the curve not being valid.
808     */
809     static int check_named_curve_test(int id)
810     {
811     int ret = 0, nid, field_nid, has_seed;
812     EC_GROUP *group = NULL, *gtest = NULL;
813     const EC_POINT *group_gen = NULL;
814     EC_POINT *other_gen = NULL;
815     BIGNUM *group_p = NULL, *group_a = NULL, *group_b = NULL;
816     BIGNUM *other_p = NULL, *other_a = NULL, *other_b = NULL;
817     BIGNUM *group_cofactor = NULL, *other_cofactor = NULL;
818     BIGNUM *other_order = NULL;
819     const BIGNUM *group_order = NULL;
820     BN_CTX *bn_ctx = NULL;
821     static const unsigned char invalid_seed[] = "THIS IS NOT A VALID SEED";
822     static size_t invalid_seed_len = sizeof(invalid_seed);
823    
824     /* Do some setup */
825     nid = curves[id].nid;
826     if (!TEST_ptr(bn_ctx = BN_CTX_new())
827     || !TEST_ptr(group = EC_GROUP_new_by_curve_name(nid))
828     || !TEST_ptr(gtest = EC_GROUP_dup(group))
829     || !TEST_ptr(group_p = BN_new())
830     || !TEST_ptr(group_a = BN_new())
831     || !TEST_ptr(group_b = BN_new())
832     || !TEST_ptr(group_cofactor = BN_new())
833     || !TEST_ptr(group_gen = EC_GROUP_get0_generator(group))
834     || !TEST_ptr(group_order = EC_GROUP_get0_order(group))
835     || !TEST_true(EC_GROUP_get_cofactor(group, group_cofactor, NULL))
836     || !TEST_true(EC_GROUP_get_curve(group, group_p, group_a, group_b, NULL))
837     || !TEST_ptr(other_gen = EC_POINT_dup(group_gen, group))
838     || !TEST_true(EC_POINT_add(group, other_gen, group_gen, group_gen, NULL))
839     || !TEST_ptr(other_order = BN_dup(group_order))
840     || !TEST_true(BN_add_word(other_order, 1))
841     || !TEST_ptr(other_a = BN_dup(group_a))
842     || !TEST_true(BN_add_word(other_a, 1))
843     || !TEST_ptr(other_b = BN_dup(group_b))
844     || !TEST_true(BN_add_word(other_b, 1))
845     || !TEST_ptr(other_cofactor = BN_dup(group_cofactor))
846     || !TEST_true(BN_add_word(other_cofactor, 1)))
847     goto err;
848    
849     /* Determine if the built-in curve has a seed field set */
850     has_seed = (EC_GROUP_get_seed_len(group) > 0);
851     field_nid = EC_GROUP_get_field_type(group);
852     if (field_nid == NID_X9_62_characteristic_two_field) {
853     if (!TEST_ptr(other_p = BN_dup(group_p))
854     || !TEST_true(BN_lshift1(other_p, other_p)))
855     goto err;
856     } else {
857     if (!TEST_ptr(other_p = BN_dup(group_p)))
858     goto err;
859     /*
860     * Just choosing any arbitrary prime does not work..
861     * Setting p via ec_GFp_nist_group_set_curve() needs the prime to be a
862     * nist prime. So only select one of these as an alternate prime.
863     */
864     if (!TEST_ptr(BN_copy(other_p,
865     BN_ucmp(BN_get0_nist_prime_192(), other_p) == 0 ?
866     BN_get0_nist_prime_256() :
867     BN_get0_nist_prime_192())))
868     goto err;
869     }
870    
871     /* Passes because this is a valid curve */
872     if (!TEST_int_eq(EC_GROUP_check_named_curve(group, 0, NULL), nid)
873     /* Only NIST curves pass */
874     || !TEST_int_eq(EC_GROUP_check_named_curve(group, 1, NULL),
875     EC_curve_nid2nist(nid) != NULL ? nid : NID_undef))
876     goto err;
877    
878     /* Fail if the curve name doesn't match the parameters */
879     EC_GROUP_set_curve_name(group, nid + 1);
880     ERR_set_mark();
881     if (!TEST_int_le(EC_GROUP_check_named_curve(group, 0, NULL), 0))
882     goto err;
883     ERR_pop_to_mark();
884    
885     /* Restore curve name and ensure it's passing */
886     EC_GROUP_set_curve_name(group, nid);
887     if (!TEST_int_eq(EC_GROUP_check_named_curve(group, 0, NULL), nid))
888     goto err;
889    
890     if (!TEST_int_eq(EC_GROUP_set_seed(group, invalid_seed, invalid_seed_len),
891     invalid_seed_len))
892     goto err;
893    
894     if (has_seed) {
895     /*
896     * If the built-in curve has a seed and we set the seed to another value
897     * then it will fail the check.
898     */
899     if (!TEST_int_eq(EC_GROUP_check_named_curve(group, 0, NULL), 0))
900     goto err;
901     } else {
902     /*
903     * If the built-in curve does not have a seed then setting the seed will
904     * pass the check (as the seed is optional).
905     */
906     if (!TEST_int_eq(EC_GROUP_check_named_curve(group, 0, NULL), nid))
907     goto err;
908     }
909     /* Pass if the seed is unknown (as it is optional) */
910     if (!TEST_int_eq(EC_GROUP_set_seed(group, NULL, 0), 1)
911     || !TEST_int_eq(EC_GROUP_check_named_curve(group, 0, NULL), nid))
912     goto err;
913    
914     /* Check that a duped group passes */
915     if (!TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), nid))
916     goto err;
917    
918     /* check that changing any generator parameter fails */
919     if (!TEST_true(EC_GROUP_set_generator(gtest, other_gen, group_order,
920     group_cofactor))
921     || !TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), 0)
922     || !TEST_true(EC_GROUP_set_generator(gtest, group_gen, other_order,
923     group_cofactor))
924     || !TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), 0)
925     /* The order is not an optional field, so this should fail */
926     || !TEST_false(EC_GROUP_set_generator(gtest, group_gen, NULL,
927     group_cofactor))
928     || !TEST_true(EC_GROUP_set_generator(gtest, group_gen, group_order,
929     other_cofactor))
930     || !TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), 0)
931     /* Check that if the cofactor is not set then it still passes */
932     || !TEST_true(EC_GROUP_set_generator(gtest, group_gen, group_order,
933     NULL))
934     || !TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), nid)
935     /* check that restoring the generator passes */
936     || !TEST_true(EC_GROUP_set_generator(gtest, group_gen, group_order,
937     group_cofactor))
938     || !TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), nid))
939     goto err;
940    
941     /*
942     * check that changing any curve parameter fails
943     *
944     * Setting arbitrary p, a or b might fail for some EC_GROUPs
945     * depending on the internal EC_METHOD implementation, hence run
946     * these tests conditionally to the success of EC_GROUP_set_curve().
947     */
948     ERR_set_mark();
949     if (EC_GROUP_set_curve(gtest, other_p, group_a, group_b, NULL)) {
950     if (!TEST_int_le(EC_GROUP_check_named_curve(gtest, 0, NULL), 0))
951     goto err;
952     } else {
953     /* clear the error stack if EC_GROUP_set_curve() failed */
954     ERR_pop_to_mark();
955     ERR_set_mark();
956     }
957     if (EC_GROUP_set_curve(gtest, group_p, other_a, group_b, NULL)) {
958     if (!TEST_int_le(EC_GROUP_check_named_curve(gtest, 0, NULL), 0))
959     goto err;
960     } else {
961     /* clear the error stack if EC_GROUP_set_curve() failed */
962     ERR_pop_to_mark();
963     ERR_set_mark();
964     }
965     if (EC_GROUP_set_curve(gtest, group_p, group_a, other_b, NULL)) {
966     if (!TEST_int_le(EC_GROUP_check_named_curve(gtest, 0, NULL), 0))
967     goto err;
968     } else {
969     /* clear the error stack if EC_GROUP_set_curve() failed */
970     ERR_pop_to_mark();
971     ERR_set_mark();
972     }
973     ERR_pop_to_mark();
974    
975     /* Check that restoring the curve parameters passes */
976     if (!TEST_true(EC_GROUP_set_curve(gtest, group_p, group_a, group_b, NULL))
977     || !TEST_int_eq(EC_GROUP_check_named_curve(gtest, 0, NULL), nid))
978     goto err;
979    
980     ret = 1;
981     err:
982     BN_free(group_p);
983     BN_free(other_p);
984     BN_free(group_a);
985     BN_free(other_a);
986     BN_free(group_b);
987     BN_free(other_b);
988     BN_free(group_cofactor);
989     BN_free(other_cofactor);
990     BN_free(other_order);
991     EC_POINT_free(other_gen);
992     EC_GROUP_free(gtest);
993     EC_GROUP_free(group);
994     BN_CTX_free(bn_ctx);
995     return ret;
996     }
997    
998     /*
999     * This checks the lookup capability of EC_GROUP_check_named_curve()
1000     * when the given group was created with explicit parameters.
1001     *
1002     * It is possible to retrieve an alternative alias that does not match
1003     * the original nid in this case.
1004     */
1005     static int check_named_curve_lookup_test(int id)
1006     {
1007     int ret = 0, nid, rv = 0;
1008     EC_GROUP *g = NULL , *ga = NULL;
1009     ECPARAMETERS *p = NULL, *pa = NULL;
1010     BN_CTX *ctx = NULL;
1011    
1012     /* Do some setup */
1013     nid = curves[id].nid;
1014     if (!TEST_ptr(ctx = BN_CTX_new())
1015     || !TEST_ptr(g = EC_GROUP_new_by_curve_name(nid))
1016     || !TEST_ptr(p = EC_GROUP_get_ecparameters(g, NULL)))
1017     goto err;
1018    
1019     /* replace with group from explicit parameters */
1020     EC_GROUP_free(g);
1021     if (!TEST_ptr(g = EC_GROUP_new_from_ecparameters(p)))
1022     goto err;
1023    
1024     if (!TEST_int_gt(rv = EC_GROUP_check_named_curve(g, 0, NULL), 0))
1025     goto err;
1026     if (rv != nid) {
1027     /*
1028     * Found an alias:
1029     * fail if the returned nid is not an alias of the original group.
1030     *
1031     * The comparison here is done by comparing two explicit
1032     * parameter EC_GROUPs with EC_GROUP_cmp(), to ensure the
1033     * comparison happens with unnamed EC_GROUPs using the same
1034     * EC_METHODs.
1035     */
1036     if (!TEST_ptr(ga = EC_GROUP_new_by_curve_name(rv))
1037     || !TEST_ptr(pa = EC_GROUP_get_ecparameters(ga, NULL)))
1038     goto err;
1039    
1040     /* replace with group from explicit parameters, then compare */
1041     EC_GROUP_free(ga);
1042     if (!TEST_ptr(ga = EC_GROUP_new_from_ecparameters(pa))
1043     || !TEST_int_eq(EC_GROUP_cmp(g, ga, ctx), 0))
1044     goto err;
1045     }
1046    
1047     ret = 1;
1048    
1049     err:
1050     EC_GROUP_free(g);
1051     EC_GROUP_free(ga);
1052     ECPARAMETERS_free(p);
1053     ECPARAMETERS_free(pa);
1054     BN_CTX_free(ctx);
1055    
1056     return ret;
1057     }
1058    
1059     /*
1060     * Sometime we cannot compare nids for equality, as the built-in curve table
1061     * includes aliases with different names for the same curve.
1062     *
1063     * This function returns TRUE (1) if the checked nids are identical, or if they
1064     * alias to the same curve. FALSE (0) otherwise.
1065     */
1066     static ossl_inline
1067     int are_ec_nids_compatible(int n1d, int n2d)
1068     {
1069     int ret = 0;
1070     switch (n1d) {
1071     #ifndef OPENSSL_NO_EC2M
1072     case NID_sect113r1:
1073     case NID_wap_wsg_idm_ecid_wtls4:
1074     ret = (n2d == NID_sect113r1 || n2d == NID_wap_wsg_idm_ecid_wtls4);
1075     break;
1076     case NID_sect163k1:
1077     case NID_wap_wsg_idm_ecid_wtls3:
1078     ret = (n2d == NID_sect163k1 || n2d == NID_wap_wsg_idm_ecid_wtls3);
1079     break;
1080     case NID_sect233k1:
1081     case NID_wap_wsg_idm_ecid_wtls10:
1082     ret = (n2d == NID_sect233k1 || n2d == NID_wap_wsg_idm_ecid_wtls10);
1083     break;
1084     case NID_sect233r1:
1085     case NID_wap_wsg_idm_ecid_wtls11:
1086     ret = (n2d == NID_sect233r1 || n2d == NID_wap_wsg_idm_ecid_wtls11);
1087     break;
1088     case NID_X9_62_c2pnb163v1:
1089     case NID_wap_wsg_idm_ecid_wtls5:
1090     ret = (n2d == NID_X9_62_c2pnb163v1
1091     || n2d == NID_wap_wsg_idm_ecid_wtls5);
1092     break;
1093     #endif /* OPENSSL_NO_EC2M */
1094     case NID_secp112r1:
1095     case NID_wap_wsg_idm_ecid_wtls6:
1096     ret = (n2d == NID_secp112r1 || n2d == NID_wap_wsg_idm_ecid_wtls6);
1097     break;
1098     case NID_secp160r2:
1099     case NID_wap_wsg_idm_ecid_wtls7:
1100     ret = (n2d == NID_secp160r2 || n2d == NID_wap_wsg_idm_ecid_wtls7);
1101     break;
1102     #ifdef OPENSSL_NO_EC_NISTP_64_GCC_128
1103     case NID_secp224r1:
1104     case NID_wap_wsg_idm_ecid_wtls12:
1105     ret = (n2d == NID_secp224r1 || n2d == NID_wap_wsg_idm_ecid_wtls12);
1106     break;
1107     #else
1108     /*
1109     * For SEC P-224 we want to ensure that the SECP nid is returned, as
1110     * that is associated with a specialized method.
1111     */
1112     case NID_wap_wsg_idm_ecid_wtls12:
1113     ret = (n2d == NID_secp224r1);
1114     break;
1115     #endif /* def(OPENSSL_NO_EC_NISTP_64_GCC_128) */
1116    
1117     default:
1118     ret = (n1d == n2d);
1119     }
1120     return ret;
1121     }
1122    
1123     /*
1124     * This checks that EC_GROUP_bew_from_ecparameters() returns a "named"
1125     * EC_GROUP for built-in curves.
1126     *
1127     * Note that it is possible to retrieve an alternative alias that does not match
1128     * the original nid.
1129     *
1130     * Ensure that the OPENSSL_EC_EXPLICIT_CURVE ASN1 flag is set.
1131     */
1132     static int check_named_curve_from_ecparameters(int id)
1133     {
1134     int ret = 0, nid, tnid;
1135     EC_GROUP *group = NULL, *tgroup = NULL, *tmpg = NULL;
1136     const EC_POINT *group_gen = NULL;
1137     EC_POINT *other_gen = NULL;
1138     BIGNUM *group_cofactor = NULL, *other_cofactor = NULL;
1139     BIGNUM *other_gen_x = NULL, *other_gen_y = NULL;
1140     const BIGNUM *group_order = NULL;
1141     BIGNUM *other_order = NULL;
1142     BN_CTX *bn_ctx = NULL;
1143     static const unsigned char invalid_seed[] = "THIS IS NOT A VALID SEED";
1144     static size_t invalid_seed_len = sizeof(invalid_seed);
1145     ECPARAMETERS *params = NULL, *other_params = NULL;
1146     EC_GROUP *g_ary[8] = {NULL};
1147     EC_GROUP **g_next = &g_ary[0];
1148     ECPARAMETERS *p_ary[8] = {NULL};
1149     ECPARAMETERS **p_next = &p_ary[0];
1150    
1151     /* Do some setup */
1152     nid = curves[id].nid;
1153     TEST_note("Curve %s", OBJ_nid2sn(nid));
1154     if (!TEST_ptr(bn_ctx = BN_CTX_new()))
1155     return ret;
1156     BN_CTX_start(bn_ctx);
1157    
1158     if (/* Allocations */
1159     !TEST_ptr(group_cofactor = BN_CTX_get(bn_ctx))
1160     || !TEST_ptr(other_gen_x = BN_CTX_get(bn_ctx))
1161     || !TEST_ptr(other_gen_y = BN_CTX_get(bn_ctx))
1162     || !TEST_ptr(other_order = BN_CTX_get(bn_ctx))
1163     || !TEST_ptr(other_cofactor = BN_CTX_get(bn_ctx))
1164     /* Generate reference group and params */
1165     || !TEST_ptr(group = EC_GROUP_new_by_curve_name(nid))
1166     || !TEST_ptr(params = EC_GROUP_get_ecparameters(group, NULL))
1167     || !TEST_ptr(group_gen = EC_GROUP_get0_generator(group))
1168     || !TEST_ptr(group_order = EC_GROUP_get0_order(group))
1169     || !TEST_true(EC_GROUP_get_cofactor(group, group_cofactor, NULL))
1170     /* compute `other_*` values */
1171     || !TEST_ptr(tmpg = EC_GROUP_dup(group))
1172     || !TEST_ptr(other_gen = EC_POINT_dup(group_gen, group))
1173     || !TEST_true(EC_POINT_add(group, other_gen, group_gen, group_gen, NULL))
1174     || !TEST_true(EC_POINT_get_affine_coordinates(group, other_gen,
1175     other_gen_x, other_gen_y, bn_ctx))
1176     || !TEST_true(BN_copy(other_order, group_order))
1177     || !TEST_true(BN_add_word(other_order, 1))
1178     || !TEST_true(BN_copy(other_cofactor, group_cofactor))
1179     || !TEST_true(BN_add_word(other_cofactor, 1)))
1180     goto err;
1181    
1182     EC_POINT_free(other_gen);
1183     other_gen = NULL;
1184    
1185     if (!TEST_ptr(other_gen = EC_POINT_new(tmpg))
1186     || !TEST_true(EC_POINT_set_affine_coordinates(tmpg, other_gen,
1187     other_gen_x, other_gen_y,
1188     bn_ctx)))
1189     goto err;
1190    
1191     /*
1192     * ###########################
1193     * # Actual tests start here #
1194     * ###########################
1195     */
1196    
1197     /*
1198     * Creating a group from built-in explicit parameters returns a
1199     * "named" EC_GROUP
1200     */
1201     if (!TEST_ptr(tgroup = *g_next++ = EC_GROUP_new_from_ecparameters(params))
1202     || !TEST_int_ne((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef))
1203     goto err;
1204     /*
1205     * We cannot always guarantee the names match, as the built-in table
1206     * contains aliases for the same curve with different names.
1207     */
1208     if (!TEST_true(are_ec_nids_compatible(nid, tnid))) {
1209     TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid));
1210     goto err;
1211     }
1212     /* Ensure that the OPENSSL_EC_EXPLICIT_CURVE ASN1 flag is set. */
1213     if (!TEST_int_eq(EC_GROUP_get_asn1_flag(tgroup), OPENSSL_EC_EXPLICIT_CURVE))
1214     goto err;
1215    
1216     /*
1217     * An invalid seed in the parameters should be ignored: expect a "named"
1218     * group.
1219     */
1220     if (!TEST_int_eq(EC_GROUP_set_seed(tmpg, invalid_seed, invalid_seed_len),
1221     invalid_seed_len)
1222     || !TEST_ptr(other_params = *p_next++ =
1223     EC_GROUP_get_ecparameters(tmpg, NULL))
1224     || !TEST_ptr(tgroup = *g_next++ =
1225     EC_GROUP_new_from_ecparameters(other_params))
1226     || !TEST_int_ne((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1227     || !TEST_true(are_ec_nids_compatible(nid, tnid))
1228     || !TEST_int_eq(EC_GROUP_get_asn1_flag(tgroup),
1229     OPENSSL_EC_EXPLICIT_CURVE)) {
1230     TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid));
1231     goto err;
1232     }
1233    
1234     /*
1235     * A null seed in the parameters should be ignored, as it is optional:
1236     * expect a "named" group.
1237     */
1238     if (!TEST_int_eq(EC_GROUP_set_seed(tmpg, NULL, 0), 1)
1239     || !TEST_ptr(other_params = *p_next++ =
1240     EC_GROUP_get_ecparameters(tmpg, NULL))
1241     || !TEST_ptr(tgroup = *g_next++ =
1242     EC_GROUP_new_from_ecparameters(other_params))
1243     || !TEST_int_ne((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1244     || !TEST_true(are_ec_nids_compatible(nid, tnid))
1245     || !TEST_int_eq(EC_GROUP_get_asn1_flag(tgroup),
1246     OPENSSL_EC_EXPLICIT_CURVE)) {
1247     TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid));
1248     goto err;
1249     }
1250    
1251     /*
1252     * Check that changing any of the generator parameters does not yield a
1253     * match with the built-in curves
1254     */
1255     if (/* Other gen, same group order & cofactor */
1256     !TEST_true(EC_GROUP_set_generator(tmpg, other_gen, group_order,
1257     group_cofactor))
1258     || !TEST_ptr(other_params = *p_next++ =
1259     EC_GROUP_get_ecparameters(tmpg, NULL))
1260     || !TEST_ptr(tgroup = *g_next++ =
1261     EC_GROUP_new_from_ecparameters(other_params))
1262     || !TEST_int_eq((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1263     /* Same gen & cofactor, different order */
1264     || !TEST_true(EC_GROUP_set_generator(tmpg, group_gen, other_order,
1265     group_cofactor))
1266     || !TEST_ptr(other_params = *p_next++ =
1267     EC_GROUP_get_ecparameters(tmpg, NULL))
1268     || !TEST_ptr(tgroup = *g_next++ =
1269     EC_GROUP_new_from_ecparameters(other_params))
1270     || !TEST_int_eq((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1271     /* The order is not an optional field, so this should fail */
1272     || !TEST_false(EC_GROUP_set_generator(tmpg, group_gen, NULL,
1273     group_cofactor))
1274     /* Check that a wrong cofactor is ignored, and we still match */
1275     || !TEST_true(EC_GROUP_set_generator(tmpg, group_gen, group_order,
1276     other_cofactor))
1277     || !TEST_ptr(other_params = *p_next++ =
1278     EC_GROUP_get_ecparameters(tmpg, NULL))
1279     || !TEST_ptr(tgroup = *g_next++ =
1280     EC_GROUP_new_from_ecparameters(other_params))
1281     || !TEST_int_ne((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1282     || !TEST_true(are_ec_nids_compatible(nid, tnid))
1283     || !TEST_int_eq(EC_GROUP_get_asn1_flag(tgroup),
1284     OPENSSL_EC_EXPLICIT_CURVE)
1285     /* Check that if the cofactor is not set then it still matches */
1286     || !TEST_true(EC_GROUP_set_generator(tmpg, group_gen, group_order,
1287     NULL))
1288     || !TEST_ptr(other_params = *p_next++ =
1289     EC_GROUP_get_ecparameters(tmpg, NULL))
1290     || !TEST_ptr(tgroup = *g_next++ =
1291     EC_GROUP_new_from_ecparameters(other_params))
1292     || !TEST_int_ne((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1293     || !TEST_true(are_ec_nids_compatible(nid, tnid))
1294     || !TEST_int_eq(EC_GROUP_get_asn1_flag(tgroup),
1295     OPENSSL_EC_EXPLICIT_CURVE)
1296     /* check that restoring the generator passes */
1297     || !TEST_true(EC_GROUP_set_generator(tmpg, group_gen, group_order,
1298     group_cofactor))
1299     || !TEST_ptr(other_params = *p_next++ =
1300     EC_GROUP_get_ecparameters(tmpg, NULL))
1301     || !TEST_ptr(tgroup = *g_next++ =
1302     EC_GROUP_new_from_ecparameters(other_params))
1303     || !TEST_int_ne((tnid = EC_GROUP_get_curve_name(tgroup)), NID_undef)
1304     || !TEST_true(are_ec_nids_compatible(nid, tnid))
1305     || !TEST_int_eq(EC_GROUP_get_asn1_flag(tgroup),
1306     OPENSSL_EC_EXPLICIT_CURVE))
1307     goto err;
1308    
1309     ret = 1;
1310     err:
1311     for (g_next = &g_ary[0]; g_next < g_ary + OSSL_NELEM(g_ary); g_next++)
1312     EC_GROUP_free(*g_next);
1313     for (p_next = &p_ary[0]; p_next < p_ary + OSSL_NELEM(g_ary); p_next++)
1314     ECPARAMETERS_free(*p_next);
1315     ECPARAMETERS_free(params);
1316     EC_POINT_free(other_gen);
1317     EC_GROUP_free(tmpg);
1318     EC_GROUP_free(group);
1319     BN_CTX_end(bn_ctx);
1320     BN_CTX_free(bn_ctx);
1321     return ret;
1322     }
1323    
1324    
1325     static int parameter_test(void)
1326     {
1327     EC_GROUP *group = NULL, *group2 = NULL;
1328     ECPARAMETERS *ecparameters = NULL;
1329     unsigned char *buf = NULL;
1330     int r = 0, len;
1331     if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(NID_secp384r1))
1332     || !TEST_ptr(ecparameters = EC_GROUP_get_ecparameters(group, NULL))
1333     || !TEST_ptr(group2 = EC_GROUP_new_from_ecparameters(ecparameters))
1334     || !TEST_int_eq(EC_GROUP_cmp(group, group2, NULL), 0))
1335     goto err;
1336    
1337     EC_GROUP_free(group);
1338     group = NULL;
1339    
1340     /* Test the named curve encoding, which should be default. */
1341     if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(NID_secp521r1))
1342     || !TEST_true((len = i2d_ECPKParameters(group, &buf)) >= 0)
1343     || !TEST_mem_eq(buf, len, p521_named, sizeof(p521_named)))
1344     goto err;
1345    
1346     OPENSSL_free(buf);
1347     buf = NULL;
1348    
1349     /*
1350     * Test the explicit encoding. P-521 requires correctly zero-padding the
1351     * curve coefficients.
1352     */
1353     EC_GROUP_set_asn1_flag(group, OPENSSL_EC_EXPLICIT_CURVE);
1354     if (!TEST_true((len = i2d_ECPKParameters(group, &buf)) >= 0)
1355     || !TEST_mem_eq(buf, len, p521_explicit, sizeof(p521_explicit)))
1356     goto err;
1357    
1358     r = 1;
1359     err:
1360     EC_GROUP_free(group);
1361     EC_GROUP_free(group2);
1362     ECPARAMETERS_free(ecparameters);
1363     OPENSSL_free(buf);
1364     return r;
1365     }
1366    
1367     /*-
1368     * random 256-bit explicit parameters curve, cofactor absent
1369     * order: 0x0c38d96a9f892b88772ec2e39614a82f4f (132 bit)
1370     * cofactor: 0x12bc94785251297abfafddf1565100da (125 bit)
1371     */
1372     static const unsigned char params_cf_pass[] = {
1373     0x30, 0x81, 0xcd, 0x02, 0x01, 0x01, 0x30, 0x2c, 0x06, 0x07, 0x2a, 0x86,
1374     0x48, 0xce, 0x3d, 0x01, 0x01, 0x02, 0x21, 0x00, 0xe5, 0x00, 0x1f, 0xc5,
1375     0xca, 0x71, 0x9d, 0x8e, 0xf7, 0x07, 0x4b, 0x48, 0x37, 0xf9, 0x33, 0x2d,
1376     0x71, 0xbf, 0x79, 0xe7, 0xdc, 0x91, 0xc2, 0xff, 0xb6, 0x7b, 0xc3, 0x93,
1377     0x44, 0x88, 0xe6, 0x91, 0x30, 0x44, 0x04, 0x20, 0xe5, 0x00, 0x1f, 0xc5,
1378     0xca, 0x71, 0x9d, 0x8e, 0xf7, 0x07, 0x4b, 0x48, 0x37, 0xf9, 0x33, 0x2d,
1379     0x71, 0xbf, 0x79, 0xe7, 0xdc, 0x91, 0xc2, 0xff, 0xb6, 0x7b, 0xc3, 0x93,
1380     0x44, 0x88, 0xe6, 0x8e, 0x04, 0x20, 0x18, 0x8c, 0x59, 0x57, 0xc4, 0xbc,
1381     0x85, 0x57, 0xc3, 0x66, 0x9f, 0x89, 0xd5, 0x92, 0x0d, 0x7e, 0x42, 0x27,
1382     0x07, 0x64, 0xaa, 0x26, 0xed, 0x89, 0xc4, 0x09, 0x05, 0x4d, 0xc7, 0x23,
1383     0x47, 0xda, 0x04, 0x41, 0x04, 0x1b, 0x6b, 0x41, 0x0b, 0xf9, 0xfb, 0x77,
1384     0xfd, 0x50, 0xb7, 0x3e, 0x23, 0xa3, 0xec, 0x9a, 0x3b, 0x09, 0x31, 0x6b,
1385     0xfa, 0xf6, 0xce, 0x1f, 0xff, 0xeb, 0x57, 0x93, 0x24, 0x70, 0xf3, 0xf4,
1386     0xba, 0x7e, 0xfa, 0x86, 0x6e, 0x19, 0x89, 0xe3, 0x55, 0x6d, 0x5a, 0xe9,
1387     0xc0, 0x3d, 0xbc, 0xfb, 0xaf, 0xad, 0xd4, 0x7e, 0xa6, 0xe5, 0xfa, 0x1a,
1388     0x58, 0x07, 0x9e, 0x8f, 0x0d, 0x3b, 0xf7, 0x38, 0xca, 0x02, 0x11, 0x0c,
1389     0x38, 0xd9, 0x6a, 0x9f, 0x89, 0x2b, 0x88, 0x77, 0x2e, 0xc2, 0xe3, 0x96,
1390     0x14, 0xa8, 0x2f, 0x4f
1391     };
1392    
1393     /*-
1394     * random 256-bit explicit parameters curve, cofactor absent
1395     * order: 0x045a75c0c17228ebd9b169a10e34a22101 (131 bit)
1396     * cofactor: 0x2e134b4ede82649f67a2e559d361e5fe (126 bit)
1397     */
1398     static const unsigned char params_cf_fail[] = {
1399     0x30, 0x81, 0xcd, 0x02, 0x01, 0x01, 0x30, 0x2c, 0x06, 0x07, 0x2a, 0x86,
1400     0x48, 0xce, 0x3d, 0x01, 0x01, 0x02, 0x21, 0x00, 0xc8, 0x95, 0x27, 0x37,
1401     0xe8, 0xe1, 0xfd, 0xcc, 0xf9, 0x6e, 0x0c, 0xa6, 0x21, 0xc1, 0x7d, 0x6b,
1402     0x9d, 0x44, 0x42, 0xea, 0x73, 0x4e, 0x04, 0xb6, 0xac, 0x62, 0x50, 0xd0,
1403     0x33, 0xc2, 0xea, 0x13, 0x30, 0x44, 0x04, 0x20, 0xc8, 0x95, 0x27, 0x37,
1404     0xe8, 0xe1, 0xfd, 0xcc, 0xf9, 0x6e, 0x0c, 0xa6, 0x21, 0xc1, 0x7d, 0x6b,
1405     0x9d, 0x44, 0x42, 0xea, 0x73, 0x4e, 0x04, 0xb6, 0xac, 0x62, 0x50, 0xd0,
1406     0x33, 0xc2, 0xea, 0x10, 0x04, 0x20, 0xbf, 0xa6, 0xa8, 0x05, 0x1d, 0x09,
1407     0xac, 0x70, 0x39, 0xbb, 0x4d, 0xb2, 0x90, 0x8a, 0x15, 0x41, 0x14, 0x1d,
1408     0x11, 0x86, 0x9f, 0x13, 0xa2, 0x63, 0x1a, 0xda, 0x95, 0x22, 0x4d, 0x02,
1409     0x15, 0x0a, 0x04, 0x41, 0x04, 0xaf, 0x16, 0x71, 0xf9, 0xc4, 0xc8, 0x59,
1410     0x1d, 0xa3, 0x6f, 0xe7, 0xc3, 0x57, 0xa1, 0xfa, 0x9f, 0x49, 0x7c, 0x11,
1411     0x27, 0x05, 0xa0, 0x7f, 0xff, 0xf9, 0xe0, 0xe7, 0x92, 0xdd, 0x9c, 0x24,
1412     0x8e, 0xc7, 0xb9, 0x52, 0x71, 0x3f, 0xbc, 0x7f, 0x6a, 0x9f, 0x35, 0x70,
1413     0xe1, 0x27, 0xd5, 0x35, 0x8a, 0x13, 0xfa, 0xa8, 0x33, 0x3e, 0xd4, 0x73,
1414     0x1c, 0x14, 0x58, 0x9e, 0xc7, 0x0a, 0x87, 0x65, 0x8d, 0x02, 0x11, 0x04,
1415     0x5a, 0x75, 0xc0, 0xc1, 0x72, 0x28, 0xeb, 0xd9, 0xb1, 0x69, 0xa1, 0x0e,
1416     0x34, 0xa2, 0x21, 0x01
1417     };
1418    
1419     /*-
1420     * Test two random 256-bit explicit parameters curves with absent cofactor.
1421     * The two curves are chosen to roughly straddle the bounds at which the lib
1422     * can compute the cofactor automatically, roughly 4*sqrt(p). So test that:
1423     *
1424     * - params_cf_pass: order is sufficiently close to p to compute cofactor
1425     * - params_cf_fail: order is too far away from p to compute cofactor
1426     *
1427     * For standards-compliant curves, cofactor is chosen as small as possible.
1428     * So you can see neither of these curves are fit for cryptographic use.
1429     *
1430     * Some standards even mandate an upper bound on the cofactor, e.g. SECG1 v2:
1431     * h <= 2**(t/8) where t is the security level of the curve, for which the lib
1432     * will always succeed in computing the cofactor. Neither of these curves
1433     * conform to that -- this is just robustness testing.
1434     */
1435     static int cofactor_range_test(void)
1436     {
1437     EC_GROUP *group = NULL;
1438     BIGNUM *cf = NULL;
1439     int ret = 0;
1440     const unsigned char *b1 = (const unsigned char *)params_cf_fail;
1441     const unsigned char *b2 = (const unsigned char *)params_cf_pass;
1442    
1443     if (!TEST_ptr(group = d2i_ECPKParameters(NULL, &b1, sizeof(params_cf_fail)))
1444     || !TEST_BN_eq_zero(EC_GROUP_get0_cofactor(group))
1445     || !TEST_ptr(group = d2i_ECPKParameters(&group, &b2,
1446     sizeof(params_cf_pass)))
1447     || !TEST_int_gt(BN_hex2bn(&cf, "12bc94785251297abfafddf1565100da"), 0)
1448     || !TEST_BN_eq(cf, EC_GROUP_get0_cofactor(group)))
1449     goto err;
1450     ret = 1;
1451     err:
1452     BN_free(cf);
1453     EC_GROUP_free(group);
1454     return ret;
1455     }
1456    
1457     /*-
1458     * For named curves, test that:
1459     * - the lib correctly computes the cofactor if passed a NULL or zero cofactor
1460     * - a nonsensical cofactor throws an error (negative test)
1461     * - nonsensical orders throw errors (negative tests)
1462     */
1463     static int cardinality_test(int n)
1464     {
1465     int ret = 0, is_binary = 0;
1466     int nid = curves[n].nid;
1467     BN_CTX *ctx = NULL;
1468     EC_GROUP *g1 = NULL, *g2 = NULL;
1469     EC_POINT *g2_gen = NULL;
1470     BIGNUM *g1_p = NULL, *g1_a = NULL, *g1_b = NULL, *g1_x = NULL, *g1_y = NULL,
1471     *g1_order = NULL, *g1_cf = NULL, *g2_cf = NULL;
1472    
1473     TEST_info("Curve %s cardinality test", OBJ_nid2sn(nid));
1474    
1475     if (!TEST_ptr(ctx = BN_CTX_new())
1476     || !TEST_ptr(g1 = EC_GROUP_new_by_curve_name(nid))) {
1477     BN_CTX_free(ctx);
1478     return 0;
1479     }
1480    
1481     is_binary = (EC_GROUP_get_field_type(g1) == NID_X9_62_characteristic_two_field);
1482    
1483     BN_CTX_start(ctx);
1484     g1_p = BN_CTX_get(ctx);
1485     g1_a = BN_CTX_get(ctx);
1486     g1_b = BN_CTX_get(ctx);
1487     g1_x = BN_CTX_get(ctx);
1488     g1_y = BN_CTX_get(ctx);
1489     g1_order = BN_CTX_get(ctx);
1490     g1_cf = BN_CTX_get(ctx);
1491    
1492     if (!TEST_ptr(g2_cf = BN_CTX_get(ctx))
1493     /* pull out the explicit curve parameters */
1494     || !TEST_true(EC_GROUP_get_curve(g1, g1_p, g1_a, g1_b, ctx))
1495     || !TEST_true(EC_POINT_get_affine_coordinates(g1,
1496     EC_GROUP_get0_generator(g1), g1_x, g1_y, ctx))
1497     || !TEST_true(BN_copy(g1_order, EC_GROUP_get0_order(g1)))
1498     || !TEST_true(EC_GROUP_get_cofactor(g1, g1_cf, ctx))
1499     /* construct g2 manually with g1 parameters */
1500     #ifndef OPENSSL_NO_EC2M
1501     || !TEST_ptr(g2 = (is_binary) ?
1502     EC_GROUP_new_curve_GF2m(g1_p, g1_a, g1_b, ctx) :
1503     EC_GROUP_new_curve_GFp(g1_p, g1_a, g1_b, ctx))
1504     #else
1505     || !TEST_int_eq(0, is_binary)
1506     || !TEST_ptr(g2 = EC_GROUP_new_curve_GFp(g1_p, g1_a, g1_b, ctx))
1507     #endif
1508     || !TEST_ptr(g2_gen = EC_POINT_new(g2))
1509     || !TEST_true(EC_POINT_set_affine_coordinates(g2, g2_gen, g1_x, g1_y, ctx))
1510     /* pass NULL cofactor: lib should compute it */
1511     || !TEST_true(EC_GROUP_set_generator(g2, g2_gen, g1_order, NULL))
1512     || !TEST_true(EC_GROUP_get_cofactor(g2, g2_cf, ctx))
1513     || !TEST_BN_eq(g1_cf, g2_cf)
1514     /* pass zero cofactor: lib should compute it */
1515     || !TEST_true(BN_set_word(g2_cf, 0))
1516     || !TEST_true(EC_GROUP_set_generator(g2, g2_gen, g1_order, g2_cf))
1517     || !TEST_true(EC_GROUP_get_cofactor(g2, g2_cf, ctx))
1518     || !TEST_BN_eq(g1_cf, g2_cf)
1519     /* negative test for invalid cofactor */
1520     || !TEST_true(BN_set_word(g2_cf, 0))
1521     || !TEST_true(BN_sub(g2_cf, g2_cf, BN_value_one()))
1522     || !TEST_false(EC_GROUP_set_generator(g2, g2_gen, g1_order, g2_cf))
1523     /* negative test for NULL order */
1524     || !TEST_false(EC_GROUP_set_generator(g2, g2_gen, NULL, NULL))
1525     /* negative test for zero order */
1526     || !TEST_true(BN_set_word(g1_order, 0))
1527     || !TEST_false(EC_GROUP_set_generator(g2, g2_gen, g1_order, NULL))
1528     /* negative test for negative order */
1529     || !TEST_true(BN_set_word(g2_cf, 0))
1530     || !TEST_true(BN_sub(g2_cf, g2_cf, BN_value_one()))
1531     || !TEST_false(EC_GROUP_set_generator(g2, g2_gen, g1_order, NULL))
1532     /* negative test for too large order */
1533     || !TEST_true(BN_lshift(g1_order, g1_p, 2))
1534     || !TEST_false(EC_GROUP_set_generator(g2, g2_gen, g1_order, NULL)))
1535     goto err;
1536     ret = 1;
1537     err:
1538     EC_POINT_free(g2_gen);
1539     EC_GROUP_free(g1);
1540     EC_GROUP_free(g2);
1541     BN_CTX_end(ctx);
1542     BN_CTX_free(ctx);
1543     return ret;
1544     }
1545    
1546     static int check_ec_key_field_public_range_test(int id)
1547     {
1548     int ret = 0, type = 0;
1549     const EC_POINT *pub = NULL;
1550     const EC_GROUP *group = NULL;
1551     const BIGNUM *field = NULL;
1552     BIGNUM *x = NULL, *y = NULL;
1553     EC_KEY *key = NULL;
1554    
1555     if (!TEST_ptr(x = BN_new())
1556     || !TEST_ptr(y = BN_new())
1557     || !TEST_ptr(key = EC_KEY_new_by_curve_name(curves[id].nid))
1558     || !TEST_ptr(group = EC_KEY_get0_group(key))
1559     || !TEST_ptr(field = EC_GROUP_get0_field(group))
1560     || !TEST_int_gt(EC_KEY_generate_key(key), 0)
1561     || !TEST_int_gt(EC_KEY_check_key(key), 0)
1562     || !TEST_ptr(pub = EC_KEY_get0_public_key(key))
1563     || !TEST_int_gt(EC_POINT_get_affine_coordinates(group, pub, x, y,
1564     NULL), 0))
1565     goto err;
1566    
1567     /*
1568     * Make the public point out of range by adding the field (which will still
1569     * be the same point on the curve). The add is different for char2 fields.
1570     */
1571     type = EC_GROUP_get_field_type(group);
1572     #ifndef OPENSSL_NO_EC2M
1573     if (type == NID_X9_62_characteristic_two_field) {
1574     /* test for binary curves */
1575     if (!TEST_true(BN_GF2m_add(x, x, field)))
1576     goto err;
1577     } else
1578     #endif
1579     if (type == NID_X9_62_prime_field) {
1580     /* test for prime curves */
1581     if (!TEST_true(BN_add(x, x, field)))
1582     goto err;
1583     } else {
1584     /* this should never happen */
1585     TEST_error("Unsupported EC_METHOD field_type");
1586     goto err;
1587     }
1588     if (!TEST_int_le(EC_KEY_set_public_key_affine_coordinates(key, x, y), 0))
1589     goto err;
1590    
1591     ret = 1;
1592     err:
1593     BN_free(x);
1594     BN_free(y);
1595     EC_KEY_free(key);
1596     return ret;
1597     }
1598    
1599     /*
1600     * Helper for ec_point_hex2point_test
1601     *
1602     * Self-tests EC_POINT_point2hex() against EC_POINT_hex2point() for the given
1603     * (group,P) pair.
1604     *
1605     * If P is NULL use point at infinity.
1606     */
1607     static ossl_inline
1608     int ec_point_hex2point_test_helper(const EC_GROUP *group, const EC_POINT *P,
1609     point_conversion_form_t form,
1610     BN_CTX *bnctx)
1611     {
1612     int ret = 0;
1613     EC_POINT *Q = NULL, *Pinf = NULL;
1614     char *hex = NULL;
1615    
1616     if (P == NULL) {
1617     /* If P is NULL use point at infinity. */
1618     if (!TEST_ptr(Pinf = EC_POINT_new(group))
1619     || !TEST_true(EC_POINT_set_to_infinity(group, Pinf)))
1620     goto err;
1621     P = Pinf;
1622     }
1623    
1624     if (!TEST_ptr(hex = EC_POINT_point2hex(group, P, form, bnctx))
1625     || !TEST_ptr(Q = EC_POINT_hex2point(group, hex, NULL, bnctx))
1626     || !TEST_int_eq(0, EC_POINT_cmp(group, Q, P, bnctx)))
1627     goto err;
1628    
1629     /*
1630     * The next check is most likely superfluous, as EC_POINT_cmp should already
1631     * cover this.
1632     * Nonetheless it increases the test coverage for EC_POINT_is_at_infinity,
1633     * so we include it anyway!
1634     */
1635     if (Pinf != NULL
1636     && !TEST_true(EC_POINT_is_at_infinity(group, Q)))
1637     goto err;
1638    
1639     ret = 1;
1640    
1641     err:
1642     EC_POINT_free(Pinf);
1643     OPENSSL_free(hex);
1644     EC_POINT_free(Q);
1645    
1646     return ret;
1647     }
1648    
1649     /*
1650     * This test self-validates EC_POINT_hex2point() and EC_POINT_point2hex()
1651     */
1652     static int ec_point_hex2point_test(int id)
1653     {
1654     int ret = 0, nid;
1655     EC_GROUP *group = NULL;
1656     const EC_POINT *G = NULL;
1657     EC_POINT *P = NULL;
1658     BN_CTX * bnctx = NULL;
1659    
1660     /* Do some setup */
1661     nid = curves[id].nid;
1662     if (!TEST_ptr(bnctx = BN_CTX_new())
1663     || !TEST_ptr(group = EC_GROUP_new_by_curve_name(nid))
1664     || !TEST_ptr(G = EC_GROUP_get0_generator(group))
1665     || !TEST_ptr(P = EC_POINT_dup(G, group)))
1666     goto err;
1667    
1668     if (!TEST_true(ec_point_hex2point_test_helper(group, P,
1669     POINT_CONVERSION_COMPRESSED,
1670     bnctx))
1671     || !TEST_true(ec_point_hex2point_test_helper(group, NULL,
1672     POINT_CONVERSION_COMPRESSED,
1673     bnctx))
1674     || !TEST_true(ec_point_hex2point_test_helper(group, P,
1675     POINT_CONVERSION_UNCOMPRESSED,
1676     bnctx))
1677     || !TEST_true(ec_point_hex2point_test_helper(group, NULL,
1678     POINT_CONVERSION_UNCOMPRESSED,
1679     bnctx))
1680     || !TEST_true(ec_point_hex2point_test_helper(group, P,
1681     POINT_CONVERSION_HYBRID,
1682     bnctx))
1683     || !TEST_true(ec_point_hex2point_test_helper(group, NULL,
1684     POINT_CONVERSION_HYBRID,
1685     bnctx)))
1686     goto err;
1687    
1688     ret = 1;
1689    
1690     err:
1691     EC_POINT_free(P);
1692     EC_GROUP_free(group);
1693     BN_CTX_free(bnctx);
1694    
1695     return ret;
1696     }
1697    
1698     static int do_test_custom_explicit_fromdata(EC_GROUP *group, BN_CTX *ctx,
1699     unsigned char *gen, int gen_size)
1700     {
1701     int ret = 0, i_out;
1702     EVP_PKEY_CTX *pctx = NULL;
1703     EVP_PKEY *pkeyparam = NULL;
1704     OSSL_PARAM_BLD *bld = NULL;
1705     const char *field_name;
1706     OSSL_PARAM *params = NULL;
1707     const OSSL_PARAM *gettable;
1708     BIGNUM *p, *a, *b;
1709     BIGNUM *p_out = NULL, *a_out = NULL, *b_out = NULL;
1710     BIGNUM *order_out = NULL, *cofactor_out = NULL;
1711     char name[80];
1712     unsigned char buf[1024];
1713     size_t buf_len, name_len;
1714     #ifndef OPENSSL_NO_EC2M
1715     unsigned int k1 = 0, k2 = 0, k3 = 0;
1716     const char *basis_name = NULL;
1717     #endif
1718    
1719     p = BN_CTX_get(ctx);
1720     a = BN_CTX_get(ctx);
1721     b = BN_CTX_get(ctx);
1722    
1723     if (!TEST_ptr(b)
1724     || !TEST_ptr(bld = OSSL_PARAM_BLD_new()))
1725     goto err;
1726    
1727     if (EC_GROUP_get_field_type(group) == NID_X9_62_prime_field) {
1728     field_name = SN_X9_62_prime_field;
1729     } else {
1730     field_name = SN_X9_62_characteristic_two_field;
1731     #ifndef OPENSSL_NO_EC2M
1732     if (EC_GROUP_get_basis_type(group) == NID_X9_62_tpBasis) {
1733     basis_name = SN_X9_62_tpBasis;
1734     if (!TEST_true(EC_GROUP_get_trinomial_basis(group, &k1)))
1735     goto err;
1736     } else {
1737     basis_name = SN_X9_62_ppBasis;
1738     if (!TEST_true(EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3)))
1739     goto err;
1740     }
1741     #endif /* OPENSSL_NO_EC2M */
1742     }
1743     if (!TEST_true(EC_GROUP_get_curve(group, p, a, b, ctx))
1744     || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld,
1745     OSSL_PKEY_PARAM_EC_FIELD_TYPE, field_name, 0))
1746     || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_P, p))
1747     || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_A, a))
1748     || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_B, b)))
1749     goto err;
1750    
1751     if (EC_GROUP_get0_seed(group) != NULL) {
1752     if (!TEST_true(OSSL_PARAM_BLD_push_octet_string(bld,
1753     OSSL_PKEY_PARAM_EC_SEED, EC_GROUP_get0_seed(group),
1754     EC_GROUP_get_seed_len(group))))
1755     goto err;
1756     }
1757     if (EC_GROUP_get0_cofactor(group) != NULL) {
1758     if (!TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_COFACTOR,
1759     EC_GROUP_get0_cofactor(group))))
1760     goto err;
1761     }
1762    
1763     if (!TEST_true(OSSL_PARAM_BLD_push_octet_string(bld,
1764     OSSL_PKEY_PARAM_EC_GENERATOR, gen, gen_size))
1765     || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_ORDER,
1766     EC_GROUP_get0_order(group))))
1767     goto err;
1768    
1769     if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))
1770     || !TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL))
1771     || !TEST_int_gt(EVP_PKEY_fromdata_init(pctx), 0)
1772     || !TEST_int_gt(EVP_PKEY_fromdata(pctx, &pkeyparam,
1773     EVP_PKEY_KEY_PARAMETERS, params), 0))
1774     goto err;
1775    
1776     /*- Check that all the set values are retrievable -*/
1777    
1778     /* There should be no match to a group name since the generator changed */
1779     if (!TEST_false(EVP_PKEY_get_utf8_string_param(pkeyparam,
1780     OSSL_PKEY_PARAM_GROUP_NAME, name, sizeof(name),
1781     &name_len)))
1782     goto err;
1783    
1784     /* The encoding should be explicit as it has no group */
1785     if (!TEST_true(EVP_PKEY_get_utf8_string_param(pkeyparam,
1786     OSSL_PKEY_PARAM_EC_ENCODING,
1787     name, sizeof(name), &name_len))
1788     || !TEST_str_eq(name, OSSL_PKEY_EC_ENCODING_EXPLICIT))
1789     goto err;
1790    
1791     if (!TEST_true(EVP_PKEY_get_utf8_string_param(pkeyparam,
1792     OSSL_PKEY_PARAM_EC_FIELD_TYPE, name, sizeof(name),
1793     &name_len))
1794     || !TEST_str_eq(name, field_name))
1795     goto err;
1796    
1797     if (!TEST_true(EVP_PKEY_get_octet_string_param(pkeyparam,
1798     OSSL_PKEY_PARAM_EC_GENERATOR, buf, sizeof(buf), &buf_len))
1799     || !TEST_mem_eq(buf, (int)buf_len, gen, gen_size))
1800     goto err;
1801    
1802     if (!TEST_true(EVP_PKEY_get_bn_param(pkeyparam, OSSL_PKEY_PARAM_EC_P, &p_out))
1803     || !TEST_BN_eq(p_out, p)
1804     || !TEST_true(EVP_PKEY_get_bn_param(pkeyparam, OSSL_PKEY_PARAM_EC_A,
1805     &a_out))
1806     || !TEST_BN_eq(a_out, a)
1807     || !TEST_true(EVP_PKEY_get_bn_param(pkeyparam, OSSL_PKEY_PARAM_EC_B,
1808     &b_out))
1809     || !TEST_BN_eq(b_out, b)
1810     || !TEST_true(EVP_PKEY_get_bn_param(pkeyparam, OSSL_PKEY_PARAM_EC_ORDER,
1811     &order_out))
1812     || !TEST_BN_eq(order_out, EC_GROUP_get0_order(group)))
1813     goto err;
1814    
1815     if (EC_GROUP_get0_cofactor(group) != NULL) {
1816     if (!TEST_true(EVP_PKEY_get_bn_param(pkeyparam,
1817     OSSL_PKEY_PARAM_EC_COFACTOR, &cofactor_out))
1818     || !TEST_BN_eq(cofactor_out, EC_GROUP_get0_cofactor(group)))
1819     goto err;
1820     }
1821     if (EC_GROUP_get0_seed(group) != NULL) {
1822     if (!TEST_true(EVP_PKEY_get_octet_string_param(pkeyparam,
1823     OSSL_PKEY_PARAM_EC_SEED, buf, sizeof(buf), &buf_len))
1824     || !TEST_mem_eq(buf, buf_len, EC_GROUP_get0_seed(group),
1825     EC_GROUP_get_seed_len(group)))
1826     goto err;
1827     }
1828    
1829     if (EC_GROUP_get_field_type(group) == NID_X9_62_prime_field) {
1830     /* No extra fields should be set for a prime field */
1831     if (!TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1832     OSSL_PKEY_PARAM_EC_CHAR2_M, &i_out))
1833     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1834     OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS, &i_out))
1835     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1836     OSSL_PKEY_PARAM_EC_CHAR2_PP_K1, &i_out))
1837     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1838     OSSL_PKEY_PARAM_EC_CHAR2_PP_K2, &i_out))
1839     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1840     OSSL_PKEY_PARAM_EC_CHAR2_PP_K3, &i_out))
1841     || !TEST_false(EVP_PKEY_get_utf8_string_param(pkeyparam,
1842     OSSL_PKEY_PARAM_EC_CHAR2_TYPE, name, sizeof(name),
1843     &name_len)))
1844     goto err;
1845     } else {
1846     #ifndef OPENSSL_NO_EC2M
1847     if (!TEST_true(EVP_PKEY_get_int_param(pkeyparam,
1848     OSSL_PKEY_PARAM_EC_CHAR2_M, &i_out))
1849     || !TEST_int_eq(EC_GROUP_get_degree(group), i_out)
1850     || !TEST_true(EVP_PKEY_get_utf8_string_param(pkeyparam,
1851     OSSL_PKEY_PARAM_EC_CHAR2_TYPE, name, sizeof(name),
1852     &name_len))
1853     || !TEST_str_eq(name, basis_name))
1854     goto err;
1855    
1856     if (EC_GROUP_get_basis_type(group) == NID_X9_62_tpBasis) {
1857     if (!TEST_true(EVP_PKEY_get_int_param(pkeyparam,
1858     OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS, &i_out))
1859     || !TEST_int_eq(k1, i_out)
1860     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1861     OSSL_PKEY_PARAM_EC_CHAR2_PP_K1, &i_out))
1862     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1863     OSSL_PKEY_PARAM_EC_CHAR2_PP_K2, &i_out))
1864     || !TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1865     OSSL_PKEY_PARAM_EC_CHAR2_PP_K3, &i_out)))
1866     goto err;
1867     } else {
1868     if (!TEST_false(EVP_PKEY_get_int_param(pkeyparam,
1869     OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS, &i_out))
1870     || !TEST_true(EVP_PKEY_get_int_param(pkeyparam,
1871     OSSL_PKEY_PARAM_EC_CHAR2_PP_K1, &i_out))
1872     || !TEST_int_eq(k1, i_out)
1873     || !TEST_true(EVP_PKEY_get_int_param(pkeyparam,
1874     OSSL_PKEY_PARAM_EC_CHAR2_PP_K2, &i_out))
1875     || !TEST_int_eq(k2, i_out)
1876     || !TEST_true(EVP_PKEY_get_int_param(pkeyparam,
1877     OSSL_PKEY_PARAM_EC_CHAR2_PP_K3, &i_out))
1878     || !TEST_int_eq(k3, i_out))
1879     goto err;
1880     }
1881     #endif /* OPENSSL_NO_EC2M */
1882     }
1883     if (!TEST_ptr(gettable = EVP_PKEY_gettable_params(pkeyparam))
1884     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_GROUP_NAME))
1885     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_ENCODING))
1886     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_FIELD_TYPE))
1887     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_P))
1888     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_A))
1889     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_B))
1890     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_GENERATOR))
1891     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_ORDER))
1892     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_COFACTOR))
1893     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_SEED))
1894     #ifndef OPENSSL_NO_EC2M
1895     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_CHAR2_M))
1896     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_CHAR2_TYPE))
1897     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS))
1898     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_CHAR2_PP_K1))
1899     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_CHAR2_PP_K2))
1900     || !TEST_ptr(OSSL_PARAM_locate_const(gettable, OSSL_PKEY_PARAM_EC_CHAR2_PP_K3))
1901     #endif
1902     )
1903     goto err;
1904     ret = 1;
1905     err:
1906     BN_free(order_out);
1907     BN_free(cofactor_out);
1908     BN_free(a_out);
1909     BN_free(b_out);
1910     BN_free(p_out);
1911     OSSL_PARAM_free(params);
1912     OSSL_PARAM_BLD_free(bld);
1913     EVP_PKEY_free(pkeyparam);
1914     EVP_PKEY_CTX_free(pctx);
1915     return ret;
1916     }
1917    
1918     /*
1919     * check the EC_METHOD respects the supplied EC_GROUP_set_generator G
1920     */
1921     static int custom_generator_test(int id)
1922     {
1923     int ret = 0, nid, bsize;
1924     EC_GROUP *group = NULL;
1925     EC_POINT *G2 = NULL, *Q1 = NULL, *Q2 = NULL;
1926     BN_CTX *ctx = NULL;
1927     BIGNUM *k = NULL;
1928     unsigned char *b1 = NULL, *b2 = NULL;
1929    
1930     /* Do some setup */
1931     nid = curves[id].nid;
1932     TEST_note("Curve %s", OBJ_nid2sn(nid));
1933     if (!TEST_ptr(ctx = BN_CTX_new()))
1934     return 0;
1935    
1936     BN_CTX_start(ctx);
1937    
1938     if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(nid)))
1939     goto err;
1940    
1941     /* expected byte length of encoded points */
1942     bsize = (EC_GROUP_get_degree(group) + 7) / 8;
1943     bsize = 1 + 2 * bsize; /* UNCOMPRESSED_POINT format */
1944    
1945     if (!TEST_ptr(k = BN_CTX_get(ctx))
1946     /* fetch a testing scalar k != 0,1 */
1947     || !TEST_true(BN_rand(k, EC_GROUP_order_bits(group) - 1,
1948     BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY))
1949     /* make k even */
1950     || !TEST_true(BN_clear_bit(k, 0))
1951     || !TEST_ptr(G2 = EC_POINT_new(group))
1952     || !TEST_ptr(Q1 = EC_POINT_new(group))
1953     /* Q1 := kG */
1954     || !TEST_true(EC_POINT_mul(group, Q1, k, NULL, NULL, ctx))
1955     /* pull out the bytes of that */
1956     || !TEST_int_eq(EC_POINT_point2oct(group, Q1,
1957     POINT_CONVERSION_UNCOMPRESSED, NULL,
1958     0, ctx), bsize)
1959     || !TEST_ptr(b1 = OPENSSL_malloc(bsize))
1960     || !TEST_int_eq(EC_POINT_point2oct(group, Q1,
1961     POINT_CONVERSION_UNCOMPRESSED, b1,
1962     bsize, ctx), bsize)
1963     /* new generator is G2 := 2G */
1964     || !TEST_true(EC_POINT_dbl(group, G2, EC_GROUP_get0_generator(group),
1965     ctx))
1966     || !TEST_true(EC_GROUP_set_generator(group, G2,
1967     EC_GROUP_get0_order(group),
1968     EC_GROUP_get0_cofactor(group)))
1969     || !TEST_ptr(Q2 = EC_POINT_new(group))
1970     || !TEST_true(BN_rshift1(k, k))
1971     /* Q2 := k/2 G2 */
1972     || !TEST_true(EC_POINT_mul(group, Q2, k, NULL, NULL, ctx))
1973     || !TEST_int_eq(EC_POINT_point2oct(group, Q2,
1974     POINT_CONVERSION_UNCOMPRESSED, NULL,
1975     0, ctx), bsize)
1976     || !TEST_ptr(b2 = OPENSSL_malloc(bsize))
1977     || !TEST_int_eq(EC_POINT_point2oct(group, Q2,
1978     POINT_CONVERSION_UNCOMPRESSED, b2,
1979     bsize, ctx), bsize)
1980     /* Q1 = kG = k/2 G2 = Q2 should hold */
1981     || !TEST_mem_eq(b1, bsize, b2, bsize))
1982     goto err;
1983    
1984     if (!do_test_custom_explicit_fromdata(group, ctx, b1, bsize))
1985     goto err;
1986    
1987     ret = 1;
1988    
1989     err:
1990     EC_POINT_free(Q1);
1991     EC_POINT_free(Q2);
1992     EC_POINT_free(G2);
1993     EC_GROUP_free(group);
1994     BN_CTX_end(ctx);
1995     BN_CTX_free(ctx);
1996     OPENSSL_free(b1);
1997     OPENSSL_free(b2);
1998    
1999     return ret;
2000     }
2001    
2002     /*
2003     * check creation of curves from explicit params through the public API
2004     */
2005     static int custom_params_test(int id)
2006     {
2007     int ret = 0, nid, bsize;
2008     const char *curve_name = NULL;
2009     EC_GROUP *group = NULL, *altgroup = NULL;
2010     EC_POINT *G2 = NULL, *Q1 = NULL, *Q2 = NULL;
2011     const EC_POINT *Q = NULL;
2012     BN_CTX *ctx = NULL;
2013     BIGNUM *k = NULL;
2014     unsigned char *buf1 = NULL, *buf2 = NULL;
2015     const BIGNUM *z = NULL, *cof = NULL, *priv1 = NULL;
2016     BIGNUM *p = NULL, *a = NULL, *b = NULL;
2017     int is_prime = 0;
2018     EC_KEY *eckey1 = NULL, *eckey2 = NULL;
2019     EVP_PKEY *pkey1 = NULL, *pkey2 = NULL;
2020     EVP_PKEY_CTX *pctx1 = NULL, *pctx2 = NULL;
2021     size_t sslen, t;
2022     unsigned char *pub1 = NULL , *pub2 = NULL;
2023     OSSL_PARAM_BLD *param_bld = NULL;
2024     OSSL_PARAM *params1 = NULL, *params2 = NULL;
2025    
2026     /* Do some setup */
2027     nid = curves[id].nid;
2028     curve_name = OBJ_nid2sn(nid);
2029     TEST_note("Curve %s", curve_name);
2030    
2031     if (nid == NID_sm2)
2032     return TEST_skip("custom params not supported with SM2");
2033    
2034     if (!TEST_ptr(ctx = BN_CTX_new()))
2035     return 0;
2036    
2037     if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(nid)))
2038     goto err;
2039    
2040     is_prime = EC_GROUP_get_field_type(group) == NID_X9_62_prime_field;
2041     #ifdef OPENSSL_NO_EC2M
2042     if (!is_prime) {
2043     ret = TEST_skip("binary curves not supported in this build");
2044     goto err;
2045     }
2046     #endif
2047    
2048     BN_CTX_start(ctx);
2049     if (!TEST_ptr(p = BN_CTX_get(ctx))
2050     || !TEST_ptr(a = BN_CTX_get(ctx))
2051     || !TEST_ptr(b = BN_CTX_get(ctx))
2052     || !TEST_ptr(k = BN_CTX_get(ctx)))
2053     goto err;
2054    
2055     /* expected byte length of encoded points */
2056     bsize = (EC_GROUP_get_degree(group) + 7) / 8;
2057     bsize = 1 + 2 * bsize; /* UNCOMPRESSED_POINT format */
2058    
2059     /* extract parameters from built-in curve */
2060     if (!TEST_true(EC_GROUP_get_curve(group, p, a, b, ctx))
2061     || !TEST_ptr(G2 = EC_POINT_new(group))
2062     /* new generator is G2 := 2G */
2063     || !TEST_true(EC_POINT_dbl(group, G2,
2064     EC_GROUP_get0_generator(group), ctx))
2065     /* pull out the bytes of that */
2066     || !TEST_int_eq(EC_POINT_point2oct(group, G2,
2067     POINT_CONVERSION_UNCOMPRESSED,
2068     NULL, 0, ctx), bsize)
2069     || !TEST_ptr(buf1 = OPENSSL_malloc(bsize))
2070     || !TEST_int_eq(EC_POINT_point2oct(group, G2,
2071     POINT_CONVERSION_UNCOMPRESSED,
2072     buf1, bsize, ctx), bsize)
2073     || !TEST_ptr(z = EC_GROUP_get0_order(group))
2074     || !TEST_ptr(cof = EC_GROUP_get0_cofactor(group))
2075     )
2076     goto err;
2077    
2078     /* create a new group using same params (but different generator) */
2079     if (is_prime) {
2080     if (!TEST_ptr(altgroup = EC_GROUP_new_curve_GFp(p, a, b, ctx)))
2081     goto err;
2082     }
2083     #ifndef OPENSSL_NO_EC2M
2084     else {
2085     if (!TEST_ptr(altgroup = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
2086     goto err;
2087     }
2088     #endif
2089    
2090     /* set 2*G as the generator of altgroup */
2091     EC_POINT_free(G2); /* discard G2 as it refers to the original group */
2092     if (!TEST_ptr(G2 = EC_POINT_new(altgroup))
2093     || !TEST_true(EC_POINT_oct2point(altgroup, G2, buf1, bsize, ctx))
2094     || !TEST_int_eq(EC_POINT_is_on_curve(altgroup, G2, ctx), 1)
2095     || !TEST_true(EC_GROUP_set_generator(altgroup, G2, z, cof))
2096     )
2097     goto err;
2098    
2099     /* verify math checks out */
2100     if (/* allocate temporary points on group and altgroup */
2101     !TEST_ptr(Q1 = EC_POINT_new(group))
2102     || !TEST_ptr(Q2 = EC_POINT_new(altgroup))
2103     /* fetch a testing scalar k != 0,1 */
2104     || !TEST_true(BN_rand(k, EC_GROUP_order_bits(group) - 1,
2105     BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY))
2106     /* make k even */
2107     || !TEST_true(BN_clear_bit(k, 0))
2108     /* Q1 := kG on group */
2109     || !TEST_true(EC_POINT_mul(group, Q1, k, NULL, NULL, ctx))
2110     /* pull out the bytes of that */
2111     || !TEST_int_eq(EC_POINT_point2oct(group, Q1,
2112     POINT_CONVERSION_UNCOMPRESSED,
2113     NULL, 0, ctx), bsize)
2114     || !TEST_int_eq(EC_POINT_point2oct(group, Q1,
2115     POINT_CONVERSION_UNCOMPRESSED,
2116     buf1, bsize, ctx), bsize)
2117     /* k := k/2 */
2118     || !TEST_true(BN_rshift1(k, k))
2119     /* Q2 := k/2 G2 on altgroup */
2120     || !TEST_true(EC_POINT_mul(altgroup, Q2, k, NULL, NULL, ctx))
2121     /* pull out the bytes of that */
2122     || !TEST_int_eq(EC_POINT_point2oct(altgroup, Q2,
2123     POINT_CONVERSION_UNCOMPRESSED,
2124     NULL, 0, ctx), bsize)
2125     || !TEST_ptr(buf2 = OPENSSL_malloc(bsize))
2126     || !TEST_int_eq(EC_POINT_point2oct(altgroup, Q2,
2127     POINT_CONVERSION_UNCOMPRESSED,
2128     buf2, bsize, ctx), bsize)
2129     /* Q1 = kG = k/2 G2 = Q2 should hold */
2130     || !TEST_mem_eq(buf1, bsize, buf2, bsize))
2131     goto err;
2132    
2133     /* create two `EC_KEY`s on altgroup */
2134     if (!TEST_ptr(eckey1 = EC_KEY_new())
2135     || !TEST_true(EC_KEY_set_group(eckey1, altgroup))
2136     || !TEST_true(EC_KEY_generate_key(eckey1))
2137     || !TEST_ptr(eckey2 = EC_KEY_new())
2138     || !TEST_true(EC_KEY_set_group(eckey2, altgroup))
2139     || !TEST_true(EC_KEY_generate_key(eckey2)))
2140     goto err;
2141    
2142     /* retrieve priv1 for later */
2143     if (!TEST_ptr(priv1 = EC_KEY_get0_private_key(eckey1)))
2144     goto err;
2145    
2146     /*
2147     * retrieve bytes for pub1 for later
2148     *
2149     * We compute the pub key in the original group as we will later use it to
2150     * define a provider key in the built-in group.
2151     */
2152     if (!TEST_true(EC_POINT_mul(group, Q1, priv1, NULL, NULL, ctx))
2153     || !TEST_int_eq(EC_POINT_point2oct(group, Q1,
2154     POINT_CONVERSION_UNCOMPRESSED,
2155     NULL, 0, ctx), bsize)
2156     || !TEST_ptr(pub1 = OPENSSL_malloc(bsize))
2157     || !TEST_int_eq(EC_POINT_point2oct(group, Q1,
2158     POINT_CONVERSION_UNCOMPRESSED,
2159     pub1, bsize, ctx), bsize))
2160     goto err;
2161    
2162     /* retrieve bytes for pub2 for later */
2163     if (!TEST_ptr(Q = EC_KEY_get0_public_key(eckey2))
2164     || !TEST_int_eq(EC_POINT_point2oct(altgroup, Q,
2165     POINT_CONVERSION_UNCOMPRESSED,
2166     NULL, 0, ctx), bsize)
2167     || !TEST_ptr(pub2 = OPENSSL_malloc(bsize))
2168     || !TEST_int_eq(EC_POINT_point2oct(altgroup, Q,
2169     POINT_CONVERSION_UNCOMPRESSED,
2170     pub2, bsize, ctx), bsize))
2171     goto err;
2172    
2173     /* create two `EVP_PKEY`s from the `EC_KEY`s */
2174     if(!TEST_ptr(pkey1 = EVP_PKEY_new())
2175     || !TEST_int_eq(EVP_PKEY_assign_EC_KEY(pkey1, eckey1), 1))
2176     goto err;
2177     eckey1 = NULL; /* ownership passed to pkey1 */
2178     if(!TEST_ptr(pkey2 = EVP_PKEY_new())
2179     || !TEST_int_eq(EVP_PKEY_assign_EC_KEY(pkey2, eckey2), 1))
2180     goto err;
2181     eckey2 = NULL; /* ownership passed to pkey2 */
2182    
2183     /* Compute keyexchange in both directions */
2184     if (!TEST_ptr(pctx1 = EVP_PKEY_CTX_new(pkey1, NULL))
2185     || !TEST_int_eq(EVP_PKEY_derive_init(pctx1), 1)
2186     || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx1, pkey2), 1)
2187     || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1)
2188     || !TEST_int_gt(bsize, sslen)
2189     || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1))
2190     goto err;
2191     if (!TEST_ptr(pctx2 = EVP_PKEY_CTX_new(pkey2, NULL))
2192     || !TEST_int_eq(EVP_PKEY_derive_init(pctx2), 1)
2193     || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx2, pkey1), 1)
2194     || !TEST_int_eq(EVP_PKEY_derive(pctx2, NULL, &t), 1)
2195     || !TEST_int_gt(bsize, t)
2196     || !TEST_int_le(sslen, t)
2197     || !TEST_int_eq(EVP_PKEY_derive(pctx2, buf2, &t), 1))
2198     goto err;
2199    
2200     /* Both sides should expect the same shared secret */
2201     if (!TEST_mem_eq(buf1, sslen, buf2, t))
2202     goto err;
2203    
2204     /* Build parameters for provider-native keys */
2205     if (!TEST_ptr(param_bld = OSSL_PARAM_BLD_new())
2206     || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(param_bld,
2207     OSSL_PKEY_PARAM_GROUP_NAME,
2208     curve_name, 0))
2209     || !TEST_true(OSSL_PARAM_BLD_push_octet_string(param_bld,
2210     OSSL_PKEY_PARAM_PUB_KEY,
2211     pub1, bsize))
2212     || !TEST_true(OSSL_PARAM_BLD_push_BN(param_bld,
2213     OSSL_PKEY_PARAM_PRIV_KEY,
2214     priv1))
2215     || !TEST_ptr(params1 = OSSL_PARAM_BLD_to_param(param_bld)))
2216     goto err;
2217    
2218     OSSL_PARAM_BLD_free(param_bld);
2219     if (!TEST_ptr(param_bld = OSSL_PARAM_BLD_new())
2220     || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(param_bld,
2221     OSSL_PKEY_PARAM_GROUP_NAME,
2222     curve_name, 0))
2223     || !TEST_true(OSSL_PARAM_BLD_push_octet_string(param_bld,
2224     OSSL_PKEY_PARAM_PUB_KEY,
2225     pub2, bsize))
2226     || !TEST_ptr(params2 = OSSL_PARAM_BLD_to_param(param_bld)))
2227     goto err;
2228    
2229     /* create two new provider-native `EVP_PKEY`s */
2230     EVP_PKEY_CTX_free(pctx2);
2231     if (!TEST_ptr(pctx2 = EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL))
2232     || !TEST_true(EVP_PKEY_fromdata_init(pctx2))
2233     || !TEST_true(EVP_PKEY_fromdata(pctx2, &pkey1, EVP_PKEY_KEYPAIR,
2234     params1))
2235     || !TEST_true(EVP_PKEY_fromdata(pctx2, &pkey2, EVP_PKEY_PUBLIC_KEY,
2236     params2)))
2237     goto err;
2238    
2239     /* compute keyexchange once more using the provider keys */
2240     EVP_PKEY_CTX_free(pctx1);
2241     if (!TEST_ptr(pctx1 = EVP_PKEY_CTX_new(pkey1, NULL))
2242     || !TEST_int_eq(EVP_PKEY_derive_init(pctx1), 1)
2243     || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx1, pkey2), 1)
2244     || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &t), 1)
2245     || !TEST_int_gt(bsize, t)
2246     || !TEST_int_le(sslen, t)
2247     || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &t), 1)
2248     /* compare with previous result */
2249     || !TEST_mem_eq(buf1, t, buf2, sslen))
2250     goto err;
2251    
2252     ret = 1;
2253    
2254     err:
2255     BN_CTX_end(ctx);
2256     BN_CTX_free(ctx);
2257     OSSL_PARAM_BLD_free(param_bld);
2258     OSSL_PARAM_free(params1);
2259     OSSL_PARAM_free(params2);
2260     EC_POINT_free(Q1);
2261     EC_POINT_free(Q2);
2262     EC_POINT_free(G2);
2263     EC_GROUP_free(group);
2264     EC_GROUP_free(altgroup);
2265     OPENSSL_free(buf1);
2266     OPENSSL_free(buf2);
2267     OPENSSL_free(pub1);
2268     OPENSSL_free(pub2);
2269     EC_KEY_free(eckey1);
2270     EC_KEY_free(eckey2);
2271     EVP_PKEY_free(pkey1);
2272     EVP_PKEY_free(pkey2);
2273     EVP_PKEY_CTX_free(pctx1);
2274     EVP_PKEY_CTX_free(pctx2);
2275    
2276     return ret;
2277     }
2278    
2279     int setup_tests(void)
2280     {
2281     crv_len = EC_get_builtin_curves(NULL, 0);
2282     if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len))
2283     || !TEST_true(EC_get_builtin_curves(curves, crv_len)))
2284     return 0;
2285    
2286     ADD_TEST(parameter_test);
2287     /*ADD_TEST(cofactor_range_test);*/
2288     ADD_ALL_TESTS(cardinality_test, crv_len);
2289     ADD_TEST(prime_field_tests);
2290     #ifndef OPENSSL_NO_EC2M
2291     ADD_TEST(char2_field_tests);
2292     ADD_ALL_TESTS(char2_curve_test, OSSL_NELEM(char2_curve_tests));
2293     #endif
2294     ADD_ALL_TESTS(nistp_single_test, OSSL_NELEM(nistp_tests_params));
2295     ADD_ALL_TESTS(internal_curve_test, crv_len);
2296     ADD_ALL_TESTS(internal_curve_test_method, crv_len);
2297     ADD_TEST(group_field_test);
2298     ADD_ALL_TESTS(check_named_curve_test, crv_len);
2299     ADD_ALL_TESTS(check_named_curve_lookup_test, crv_len);
2300     ADD_ALL_TESTS(check_ec_key_field_public_range_test, crv_len);
2301     ADD_ALL_TESTS(check_named_curve_from_ecparameters, crv_len);
2302     ADD_ALL_TESTS(ec_point_hex2point_test, crv_len);
2303     /* ADD_ALL_TESTS(custom_generator_test, crv_len);
2304     ADD_ALL_TESTS(custom_params_test, crv_len); */
2305     return 1;
2306     }
2307    
2308     void cleanup_tests(void)
2309     {
2310     OPENSSL_free(curves);
2311     }

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed