1*f447f37aSriastradh
2*f447f37aSriastradh #define TEST_NAME "scalarmult"
3*f447f37aSriastradh #include "cmptest.h"
4*f447f37aSriastradh
5*f447f37aSriastradh static const unsigned char alicesk[crypto_scalarmult_BYTES] = {
6*f447f37aSriastradh 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 0x3c, 0x16, 0xc1,
7*f447f37aSriastradh 0x72, 0x51, 0xb2, 0x66, 0x45, 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0,
8*f447f37aSriastradh 0x99, 0x2a, 0xb1, 0x77, 0xfb, 0xa5, 0x1d, 0xb9, 0x2c, 0x2a
9*f447f37aSriastradh };
10*f447f37aSriastradh
11*f447f37aSriastradh static const unsigned char bobsk[crypto_scalarmult_BYTES] = {
12*f447f37aSriastradh 0x5d, 0xab, 0x08, 0x7e, 0x62, 0x4a, 0x8a, 0x4b, 0x79, 0xe1, 0x7f,
13*f447f37aSriastradh 0x8b, 0x83, 0x80, 0x0e, 0xe6, 0x6f, 0x3b, 0xb1, 0x29, 0x26, 0x18,
14*f447f37aSriastradh 0xb6, 0xfd, 0x1c, 0x2f, 0x8b, 0x27, 0xff, 0x88, 0xe0, 0xeb
15*f447f37aSriastradh };
16*f447f37aSriastradh
17*f447f37aSriastradh static const unsigned char small_order_p[crypto_scalarmult_BYTES] = {
18*f447f37aSriastradh 0xe0, 0xeb, 0x7a, 0x7c, 0x3b, 0x41, 0xb8, 0xae, 0x16, 0x56, 0xe3,
19*f447f37aSriastradh 0xfa, 0xf1, 0x9f, 0xc4, 0x6a, 0xda, 0x09, 0x8d, 0xeb, 0x9c, 0x32,
20*f447f37aSriastradh 0xb1, 0xfd, 0x86, 0x62, 0x05, 0x16, 0x5f, 0x49, 0xb8, 0x00
21*f447f37aSriastradh };
22*f447f37aSriastradh
23*f447f37aSriastradh static char hex[crypto_scalarmult_BYTES * 2 + 1];
24*f447f37aSriastradh
25*f447f37aSriastradh int
main(void)26*f447f37aSriastradh main(void)
27*f447f37aSriastradh {
28*f447f37aSriastradh unsigned char *alicepk =
29*f447f37aSriastradh (unsigned char *) sodium_malloc(crypto_scalarmult_BYTES);
30*f447f37aSriastradh unsigned char *bobpk =
31*f447f37aSriastradh (unsigned char *) sodium_malloc(crypto_scalarmult_BYTES);
32*f447f37aSriastradh unsigned char *k = (unsigned char *) sodium_malloc(crypto_scalarmult_BYTES);
33*f447f37aSriastradh int ret;
34*f447f37aSriastradh
35*f447f37aSriastradh assert(alicepk != NULL && bobpk != NULL && k != NULL);
36*f447f37aSriastradh
37*f447f37aSriastradh crypto_scalarmult_base(alicepk, alicesk);
38*f447f37aSriastradh sodium_bin2hex(hex, sizeof hex, alicepk, crypto_scalarmult_BYTES);
39*f447f37aSriastradh printf("%s\n", hex);
40*f447f37aSriastradh
41*f447f37aSriastradh crypto_scalarmult_base(bobpk, bobsk);
42*f447f37aSriastradh sodium_bin2hex(hex, sizeof hex, bobpk, crypto_scalarmult_BYTES);
43*f447f37aSriastradh printf("%s\n", hex);
44*f447f37aSriastradh
45*f447f37aSriastradh ret = crypto_scalarmult(k, alicesk, bobpk);
46*f447f37aSriastradh assert(ret == 0);
47*f447f37aSriastradh sodium_bin2hex(hex, sizeof hex, k, crypto_scalarmult_BYTES);
48*f447f37aSriastradh printf("%s\n", hex);
49*f447f37aSriastradh
50*f447f37aSriastradh ret = crypto_scalarmult(k, bobsk, alicepk);
51*f447f37aSriastradh assert(ret == 0);
52*f447f37aSriastradh sodium_bin2hex(hex, sizeof hex, k, crypto_scalarmult_BYTES);
53*f447f37aSriastradh printf("%s\n", hex);
54*f447f37aSriastradh
55*f447f37aSriastradh ret = crypto_scalarmult(k, bobsk, small_order_p);
56*f447f37aSriastradh assert(ret == -1);
57*f447f37aSriastradh
58*f447f37aSriastradh sodium_free(bobpk);
59*f447f37aSriastradh sodium_free(alicepk);
60*f447f37aSriastradh sodium_free(k);
61*f447f37aSriastradh
62*f447f37aSriastradh assert(crypto_scalarmult_bytes() > 0U);
63*f447f37aSriastradh assert(crypto_scalarmult_scalarbytes() > 0U);
64*f447f37aSriastradh assert(strcmp(crypto_scalarmult_primitive(), "curve25519") == 0);
65*f447f37aSriastradh assert(crypto_scalarmult_bytes() == crypto_scalarmult_curve25519_bytes());
66*f447f37aSriastradh assert(crypto_scalarmult_scalarbytes() ==
67*f447f37aSriastradh crypto_scalarmult_curve25519_scalarbytes());
68*f447f37aSriastradh assert(crypto_scalarmult_bytes() == crypto_scalarmult_scalarbytes());
69*f447f37aSriastradh
70*f447f37aSriastradh return 0;
71*f447f37aSriastradh }
72