From 413b997e7fabf5870aee2fff8da1ed7409d5edc9 Mon Sep 17 00:00:00 2001 From: aidan garske Date: Wed, 3 Jul 2024 10:25:58 -0700 Subject: [PATCH] ecc_sign_determinisitic.c test for for deterministic ECDSA Prime Field for SECP256R1, SECP384R1, and SECP521R .gitignore addition and binary file exclusion. --- .gitignore | 1 + pk/ecc/ecc_sign_deterministic | Bin 35280 -> 0 bytes pk/ecc/ecc_sign_deterministic.c | 17 +++++++---------- 3 files changed, 8 insertions(+), 10 deletions(-) delete mode 100755 pk/ecc/ecc_sign_deterministic diff --git a/.gitignore b/.gitignore index e18ad5de..0447f299 100644 --- a/.gitignore +++ b/.gitignore @@ -224,6 +224,7 @@ pk/rsa-pss/sign.txt pk/rsa/rsa-nb pk/ecc/ecc_verify pk/ecc/ecc_sign +pk/ecc/ecc_sign_determinisitc pk/ecc/ecc_pub pk/ecc/ecc_keys diff --git a/pk/ecc/ecc_sign_deterministic b/pk/ecc/ecc_sign_deterministic deleted file mode 100755 index 3893ba21919fcb32dbef56777dc0b06a7ae00a81..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 35280 zcmeHQeQ;FO6~CK+B7W=^6%jvJksuHahOeTC4VZ_InqW$Zr~`d&Hk)K8$tJTOLbPiG zn^j()TNy1DS{>4l>9kcx>r5yz;si)dm@@5-lQPuuM>oO&hY+p7}CTxB(#CakO!-$8r#;GMQx4-Nn zOa@)6FPHtqV>;v4B+)U>kiS?wQ5zc*x&2MMSNc0(YvlR7!4%uyCAPpYg0Xls9BCNi zC(ien?XTJHC*FC{8aOZbYmLOlC+v=|>`OAfHrt5!3G;P2L)$PCkuBj!oe_@Iw=zF5 zzBg=twB~dX?~Y0K$dcA|H^?x`S8Z5j-1p$RYPq^)GOqkOx@*ceB3dgS$S@jO$7lID z{y14+P$uos;*0Q~Ww)ss&)bT%>mJa`*UG2_t^S0315a1>GFek!eh88*fd$1!b~ymC z*yeNFS;W}PK=;;^5XGqHJtM@Ap-1Ug1)_`Ag9!H-%l)W7>zenp5Pnce6pesNN z6S3&R=5X!8y7uNe@O0e(qBvf-=h^qZbM)?gyMNK~LBnOSg80I< ztjuvQM>B6i-%fDRy*zH!iM5&1inhapb$_9 zCy)5Kssx1QY@a0fm4hapb$_9Cz#zl%VPZhoL|8_r?|x;1$j{@`7=gl=kQb@Sk3qobo{ z_a>COxvPqpOa;nvGp(cQOP8Ufnd>Q572Y(=Md~0~2=6oa(|GD4L*eb5$z5dc_imSZ z1nJ(`o%1ln!43ZGnejk&%4$xvd@RqesM^&-)87K_C=a< z43j+$H9(M$J6nPMX%_z1ST=%VJfY)$i(;h*`38TQALj z^O4*(Y{>9lzSCY$KY?f_N6f^qZq^K%l_$$h?L?nO%2<@-2yn;9B9$D*O3_9T2nPZ0 zH7q=Nr+2&TJ^@AA%h0Et=hb=+LqzxRFHehP!hb%PZifGvt z+ORjZk^4@V+A&KzRw#u}!x#p`#ab3}-AasDT9(kRIhOZ7)9IfBsT{-`utu?n_+3biMdn(^vli4V|`jLfVcChvqCm0i&n{I7R_a7rjkCiXah_t zc@nMJXkqECO5dU1dyvrE`KCs8!*~9NS!zS z2A$`yx5?C`PAA=#$O<+-i4IF+{d=W;*C)_7ocgy)eRfoaj=XKxxNQO1B42f@W<(DH z8_(f#pk!;7_LzrqPdQws`Ih1cJl;;kk9(>AAx>RPB0Zf3v=UjX#s?2P?f}*@KY{d3 zcE216w+E?l+^;#+_+e|+3|f^ZZ8v(Ro75^YT5m-r!vKsrEeP{evKJxPG2I{^OB{j* z&HOlb$u@h~gSLcF-c^(-n~&7jmw0D&!k-ZI{Mk>t$#Q?d7Ov09p9-_GUp|OBYhY(T ze!eW5lsL4j3sPXziA`m84lUpo<&YmOS>j=vdpPoUddBu`hB=Vs_j~>jH zp3(abVY;Kaa*8r@P*8Gpplxcs42qpxy_8(tGFkkj^HZmeom_1EMRZsi>!-){-$7I4 zo|JdCJKNavy;6yteF!Dn*>dTOSG?P4yO1VrXUvP}K%4!Xk!|+#{c%4d zj8SsLN(`440olaSydsVAF)Sc9 z{Ss1+(^>NsGh_DPp`O>FEsSWh`8jNhGt;}r^|5xv8R9+tc_UW*B^2`xUXyK>e^0h~ z0<<3&IuvY
8(M=2XOAMwuWz`Qs=@x9Z9CSI&-2y^+p)2BU4{e4;|Rk`=s`O4p- zIzV3}=J7W~Zaxc>J4??TC?ln-rP4eMo-0M$#6)YddS>NxNLKClL#G^1gWYHF5u)u# zC3oOvdjvvgyb1MpNC9r&<0VdJna|AxhbYQeuO^H8cPI1*p#K)>S7a(X&0qCRnnO%q z`J5?q_vX^)9YfIVLV=Je*18ks-85Voj@&YctVD-y9)^RzfPsTk(CE{4(EUb=>93&y@Q=dD#a}ht zxvjSgHu$P}1(o-5*YibB4buzhteH67r%_&G{E-#fX>Vo|+ISG0)q|BI-hE4^AciMp z3=#D3XU{i_q<*T$^Og_IJ)itFbq?!7pB7MGFV*ScGXx^f&@{D?q1_a9W@V{VxS7;b zy}r#yMvHO~jTU{#?j z%WJrt&gBd)XL5NXmp60i=W;febGV$#d!uSKU!mcYC$I z3YEV+6c0sP!jW(+9uE4e!wnJthEOa%Rg{MtQ2UGOrV5e<;)!TTa*1Ft6pKw2YXaeB zDZJZX1it9bMGyN0eM`zK7HDZ}4&^x^j=uhr6WW2q^rlU>Y;5@1@fX%r9r@j|+;^uv z`HkA*Y2Jog9=kAbpy<(;OOFOViod(GrLkx2{^wT&&NcrrTwC(kslEH!3orPl?0Fy&dBq)1?fuG@9~}PHz?#{60Jyl(9?n@~`hxbl)4f7;wY{&L+PHbK z|JH;3vt-TJSVOYD4k_?;kRR-{?I0Vf@j&5vvR>fO)!0sUM$gT;tQ0Yl)1ngT7^` zpFVu3re8=@Q(96@Ka!}Xl%<;9-c-|17^>+DnCffn`dYiD&kK^%tBPv8ueruEk!$){ zMsnH@O|`_x*Fm2h#8aMAJ&SA6AuClX1QY@a0fm4hapb$_9Cy)5Kssx1QY@a0fm4hapb$_9C6q16M(Dy2+2lO830%)#B6yR_QPc7&PP#0)F z=r{=H+jww1gl7?G11Ju95ws6<0(1&gQYbuM1#Jbr3OWv&glG+1!N#Uoyve8wMDbtU zlcXio5(~viPFyS=2sRO8)Z=uAiIRpyAX+DE17Wm9!;yHsFk)>+usIZnatjAZ#JLd- z1?r4MB!;6SLUl$hjRnPc>%}ssk`W6(5rSqs+8lz#mY}gF8VaqCG;sU=P+W^fTcg!+ z3@t@#F`v*)!mziV_eRVA|i4@OI7DQvSUn* zkTx0vu|}uQ$3xL@eY-=9|A4-_y22XnPyhP3SEFtYV^2bVZT3G@K}r{>6QTVz325icl<$H3r0^g(8ciKMH9vYG?_X z2>3P_hjHdcPZJee=*Ga64P^_v3c3nEaK#_`{N?Q208A63iI?8yEkPiyw9I*Gl8D zcyE&Yn7{ch{vH>vyZDVRzTU+rTs)nbCI2BXTrax#AG!FSyZAmAf5OFo;NlB0Qz??; z-QeQstQ=?mY8SuJ#YbE`o##SlxzIT-bao469-Y}T4MbQqW}N^ diff --git a/pk/ecc/ecc_sign_deterministic.c b/pk/ecc/ecc_sign_deterministic.c index d564c44d..c85366f9 100644 --- a/pk/ecc/ecc_sign_deterministic.c +++ b/pk/ecc/ecc_sign_deterministic.c @@ -466,14 +466,14 @@ int main() uint8_t sig[ECC_KEY_SIZE*2]; uint32_t sigSz = 0; -#ifdef DEBUG_WOLFSSL - wolfSSL_Debugging_ON(); -#endif + #ifdef DEBUG_WOLFSSL + wolfSSL_Debugging_ON(); + #endif -if (ECC_KEY_SIZE == 66) - printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8)-7, DIGEST_SZ*8); -else - printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8), DIGEST_SZ*8); + if (ECC_KEY_SIZE == 66) + printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8)-7, DIGEST_SZ*8); + else + printf("Running NIST P-%d,SHA-%d Deterministic Sign Test\n", (ECC_KEY_SIZE*8), DIGEST_SZ*8); memset(sig, 0, sizeof(sig)); @@ -487,9 +487,6 @@ else print_hex(hash, sizeof(hash)); /* Sign hash using private key */ - /* Note: result of an ECC sign varies for each call even with same - private key and hash. This is because a new random public key is - used for each operation. */ sigSz = sizeof(sig); ret = crypto_ecc_sign( kPrivKey, sizeof(kPrivKey), /* private key */