#include #include #include #include #include #include #include #include #include #include "ec.h" #include "aes_tight.h" #include "util.h" #include "sys_ec2m.h" #include "ec2m_kern.h" #include "test.h" /* * list all embedded elliptic curves in openssl: * # openssl ecparam -list_curves */ #define curve_sect163k1 "sect163k1" #define curve_sect163r1 "sect163r1" #define curve_sect233k1 "sect233k1" #define curve_sect233r1 "sect233r1" /* Lopez-Dahab coordinates */ #define __LD__ /* Affine Coordinates */ #define __AFFINE__ const int sz_buf = 1024; const int cntUS = 1000000; BN_CTX *ctx; EC_GROUP *ec_group; const EC_POINT *G; static BIGNUM *p = NULL; static BIGNUM *a = NULL; static BIGNUM *b = NULL; static BIGNUM *x = NULL; static BIGNUM *y = NULL; static BIGNUM *n = NULL; static BIGNUM *h = NULL; static int a_is_one = 0; static int b_is_one = 0; int initDomainParameters(int argc, char** argv){ ctx = BN_CTX_new(); ec_group = EC_GROUP_new_by_curve_name(OBJ_sn2nid("sect163k1")); p = BN_new(); a = BN_new(); b = BN_new(); x = BN_new(); y = BN_new(); n = BN_new(); h = BN_new(); assert(EC_GROUP_get_curve_GF2m(ec_group, p, a, b, NULL)); assert(EC_GROUP_get_order(ec_group, n, NULL)); assert(EC_GROUP_get_cofactor(ec_group, h, NULL)); G = EC_GROUP_get0_generator(ec_group); assert(G); assert(EC_POINT_get_affine_coordinates_GF2m(ec_group, G, x, y, NULL)); if (BN_is_one(a)) a_is_one = 1; if (BN_is_one(b)) b_is_one = 1; init_sqr_table(); return 1; } void domain_parameters_print() { assert(p && a && b && x && y && n && h); printf("p = 0x %s\n", BN_bn2str(p)); printf("a = 0x %s\n", BN_bn2str(a)); printf("b = 0x %s\n", BN_bn2str(b)); printf("x = 0x %s\n", BN_bn2str(x)); printf("y = 0x %s\n", BN_bn2str(y)); printf("n = 0x %s\n", BN_bn2str(n)); printf("h = 0x %s\n", BN_bn2str(h)); } void ec_point_set_infinity(ec_point_t *P) { BN_one(P->X); BN_zero(P->Y); BN_zero(P->Z); } void ec_point_set_affine_xy(ec_point_t *P, const BIGNUM *ax, const BIGNUM *ay) { BN_copy(P->X, ax); BN_copy(P->Y, ay); BN_one(P->Z); } void ec_point_ld_to_affine(ec_point_t *P) { } /* in Lopez-Dahab co-ordinates * the point at infinity (oo) is (1: 0: 0) * and -(X: Y: Z) is (X: X+Y: Z) */ int ec_point_is_at_infinity(const ec_point_t __LD__ *P) { assert(P->X && P->Y && P->Z); if (BN_is_one(P->X) && BN_is_zero(P->Y) && BN_is_zero(P->Z)) return 1; return 0; } void ec_point_copy(ec_point_t *R, const ec_point_t *P) { BN_copy(R->X, P->X); BN_copy(R->Y, P->Y); BN_copy(R->Z, P->Z); } /* * Algorithm 3.24 in "Guide to Elliptic Curve Cryptography" * P = (X1: Y1: Z1) * R = 2P = (X3: Y3: Z3) */ void ec_point_double(ec_point_t __LD__ *R, const ec_point_t __LD__ *P) { int r; BN_CTX *ctx = BN_CTX_new(); const BIGNUM *X1 = P->X; const BIGNUM *Y1 = P->Y; const BIGNUM *Z1 = P->Z; BIGNUM *X3 = R->X; BIGNUM *Y3 = R->Y; BIGNUM *Z3 = R->Z; BIGNUM *T1 = BN_new(); BIGNUM *T2 = BN_new(); debug(" 1. if P == oo, return P. "); if (ec_point_is_at_infinity(P)) { debug("P == oo\n"); ec_point_copy(R, P); return; } else { debug("P != oo\n"); } debug(" 2. T1 = Z1^2"); r = BN_GF2m_mod_sqr(T1, Z1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug(" 3. T2 = X1^2"); r = BN_GF2m_mod_sqr(T2, X1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug(" 4. Z3 = T1 * T2"); r = BN_GF2m_mod_mul(Z3, T1, T2, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(Z3)); debug(" 5. X3 = T2^2"); r = BN_GF2m_mod_sqr(X3, T2, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug(" 6. T1 = T1^2"); r = BN_GF2m_mod_sqr(T1, T1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug(" 7. T2 = T1 * b"); if (b_is_one) BN_copy(T2, T1); else r = BN_GF2m_mod_mul(T2, T1, b, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug(" 8. X3 = X3 + T2"); r = BN_GF2m_add(X3, X3, T2); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug(" 9. T1 = Y1^2"); r = BN_GF2m_mod_sqr(T1, Y1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug("10. if a==1, T1 = T1 + Z3, "); if (a_is_one) { debug("a == 1, T1 = T1 + Z3"); r = BN_GF2m_add(T1, T1, Z3); assert(r); debug(" = %s\n", BN_bn2str(T1)); } else { debug("a != 1, do nothing\n"); } debug("11. T1 = T1 + T2"); r = BN_GF2m_add(T1, T1, T2); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug("12. Y3 = X3 * T1"); r = BN_GF2m_mod_mul(Y3, X3, T1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug("13. T1 = T2 * Z3"); r = BN_GF2m_mod_mul(T1, T2, Z3, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug("14. Y3 = Y3 + T1"); r = BN_GF2m_add(Y3, Y3, T1); assert(r); debug(" = %s\n", BN_bn2str(Y3)); debug("15. return (X3: Y3: Z3) = (%s: %s: %s)\n", BN_bn2str(X3), BN_bn2str(Y3), BN_bn2str(Z3)); return; } void ec_point_add(ec_point_t __LD__ *R, const ec_point_t __LD__ *P, const ec_point_t __AFFINE__ *Q) { int r; BN_CTX *ctx = BN_CTX_new(); const BIGNUM *X1 = P->X; const BIGNUM *Y1 = P->Y; const BIGNUM *Z1 = P->Z; const BIGNUM *x2 = Q->X; const BIGNUM *y2 = Q->Y; BIGNUM *X3 = R->X; BIGNUM *Y3 = R->Y; BIGNUM *Z3 = R->Z; BIGNUM *T1 = BN_new(); BIGNUM *T2 = BN_new(); BIGNUM *T3 = BN_new(); debug(" 1. if Q == oo, return P. Q should not be oo\n"); debug(" 2. if P == oo, return Q. "); if (ec_point_is_at_infinity(P)) { debug(" P == oo, return Q\n"); ec_point_copy(R, Q); return; } else { debug(" P != oo\n"); } debug(" 3. T1 = Z1 * x2"); r = BN_GF2m_mod_mul(T1, Z1, x2, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug(" 4. T2 = Z1^2"); r = BN_GF2m_mod_sqr(T2, Z1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug(" 5. X3 = X1 + T1"); r = BN_GF2m_add(X3, X1, T1); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug(" 6. T1 = Z1 * X3"); r = BN_GF2m_mod_mul(T1, Z1, X3, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug(" 7. T3 = T2 * y2"); r = BN_GF2m_mod_mul(T3, T2, y2, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T3)); debug(" 8. Y3 = Y1 + T3"); r = BN_GF2m_add(Y3, Y1, T3); assert(r); debug(" = %s\n", BN_bn2str(Y3)); /* 9. if X3 == 0, if Y3 == 0, (X3: Y3: Z3) = 2(x2: y2: 1) else return oo */ debug(" 9. if X3 == 0 { if Y3== 0, return 2(x2: y2: 1) } else return oo\n"); if (BN_is_zero(X3)) { debug("X3 == 0\n"); if (BN_is_zero(Y3)) { debug("Y3 == 0\n"); ec_point_double(R, P); return; } } debug("10. Z3 = T1^2"); r = BN_GF2m_mod_sqr(Z3, T1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(Z3)); debug("11. T3 = T1 * Y3"); r = BN_GF2m_mod_mul(T3, T1, Y3, p, ctx); debug(" = %s\n", BN_bn2str(T3)); debug("12. if a==1, T1 = T1 + T2\n"); if (a_is_one) { debug("a == 1, T1 = T1 + T2"); r = BN_GF2m_add(T1, T1, T2); debug(" = %s\n", BN_bn2str(T1)); } debug("13. T2 = X3^2"); r = BN_GF2m_mod_sqr(T2, X3, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug("14. X3 = T2 * T1"); r = BN_GF2m_mod_mul(X3, T2, T1, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug("15. T2 = Y3^2"); r = BN_GF2m_mod_sqr(T2, Y3, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug("16. X3 = X3 + T2"); r = BN_GF2m_add(X3, X3, T2); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug("17. X3 = X3 + T3"); r = BN_GF2m_add(X3, X3, T3); assert(r); debug(" = %s\n", BN_bn2str(X3)); debug("18. T2 = x2 * Z3"); r = BN_GF2m_mod_mul(T2, x2, Z3, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug("19. T2 = T2 + X3"); r = BN_GF2m_add(T2, T2, X3); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug("20. T1 = Z3^2"); r = BN_GF2m_mod_sqr(T1, Z3, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T1)); debug("21. T3 = T3 + Z3"); r = BN_GF2m_add(T3, T3, Z3); assert(r); debug(" = %s\n", BN_bn2str(T3)); debug("22. Y3 = T3 * T2"); r = BN_GF2m_mod_mul(Y3, T3, T2, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(Y3)); debug("23. T2 = x2 + y2"); r = BN_GF2m_add(T2, x2, y2); assert(r); debug(" = %s\n", BN_bn2str(T2)); debug("24. T3 = T1 * T2"); r = BN_GF2m_mod_mul(T3, T1, T2, p, ctx); assert(r); debug(" = %s\n", BN_bn2str(T3)); debug("25. Y3 = Y3 + T3"); r = BN_GF2m_add(Y3, Y3, T3); assert(r); debug(" = %s\n", BN_bn2str(Y3)); debug("26. return (X3: Y3: Z3) = (%s: %s: %s)\n", BN_bn2str(X3), BN_bn2str(Y3), BN_bn2str(Z3)); return; } void ec_point_multiply(ec_point_t __LD__ *R, const ec_point_t __AFFINE__ *P, const BIGNUM* K){ const int t = 163; int i; int b; ec_point_t Q; debug("1. Q = infinity\n"); ec_point_init(&Q); BN_set_word(Q.X, 1); BN_set_word(Q.Y, 0); BN_set_word(Q.Z, 0); debug("2. for i from t - 1 downto 0 do\n"); for(i = t - 1; i >= 0; i--){ b = BN_is_bit_set(K, i); if(b){ // printf("k_%d = %d\n", i, b); } debug("2.1 Q = 2Q\n"); ec_point_double(R, &Q); ec_point_copy(&Q, R); debug("2.2 if ki = 1 then Q = Q + P\n"); if(b == 1){ ec_point_add(R, &Q, P); ec_point_copy(&Q, R); } } debug("3. return Q\n"); ec_point_copy(R, &Q); } int testFieldArithmetic(){ mm_256 ma, mb, mr; char* pa, *pb, *pr; BIGNUM* ta = BN_new(); BIGNUM* tb = BN_new(); BIGNUM* tr = BN_new(); int passed = 0; int failed = 0; printf("test arithmetic operations on gf2m:\n"); assert(BN_rand_range(ta, n)); assert(BN_rand_range(tb, n)); // addition BN_GF2m_add(tr, ta, tb); pa = BN_bn2hex(ta); pb = BN_bn2hex(tb); pr = BN_bn2hex(tr); printf("0x%s + 0x%s = 0x%s ... ", pa, pb, pr); OPENSSL_free(pa); OPENSSL_free(pb); OPENSSL_free(pr); bn_to_mm256(ta, &ma); bn_to_mm256(tb, &mb); gf2_add(&ma, &mb, &mr); if(cmp_mm_256_with_bn(&mr, tr) == 0){ passed ++; printf("passed!\n"); } else { failed ++; mm256_to_bn(&mr, tr); pr = BN_bn2hex(tr); printf("failed! got %s\n", pr); OPENSSL_free(pr); } // multiplication BN_GF2m_mod_mul(tr, ta, tb, p, ctx); pa = BN_bn2hex(ta); pb = BN_bn2hex(tb); pr = BN_bn2hex(tr); printf("0x%s * 0x%s = 0x%s ... ", pa, pb, pr); OPENSSL_free(pa); OPENSSL_free(pb); OPENSSL_free(pr); bn_to_mm256(ta, &ma); bn_to_mm256(tb, &mb); gf2_mod_mul(&ma, &mb, &mr); if(cmp_mm_256_with_bn(&mr, tr) == 0){ passed ++; printf("passed!\n"); } else { failed ++; mm256_to_bn(&mr, tr); pr = BN_bn2hex(tr); printf("failed! got 0x%s\n", pr); OPENSSL_free(pr); } // square mod BN_GF2m_mod_sqr(tr, ta, p, ctx); pa = BN_bn2hex(ta); pr = BN_bn2hex(tr); printf("0x%s ^ 2 = 0x%s ... ", pa, pr); OPENSSL_free(pa); OPENSSL_free(pr); bn_to_mm256(ta, &ma); gf2_mod_sqr(&ma, &mr); if(cmp_mm_256_with_bn(&mr, tr) == 0){ passed ++; printf("passed!\n"); } else { failed ++; mm256_to_bn(&mr, tr); pr = BN_bn2hex(tr); printf("failed! got 0x%s\n", pr); OPENSSL_free(pr); } mm_256 mrt; gf2_sqr(&ma, &mr, &mrt); mm256_to_bn(&mr, tr); pr = BN_bn2hex(tr); mm256_to_bn(&mrt, ta); pa = BN_bn2hex(ta); printf("sqr: (%s, %s)\n", pa, pr); OPENSSL_free(pr); OPENSSL_free(pa); /* ma.iv[0] = 1; */ /* ma.iv[1] = 2; */ /* ma.iv[2] = 3; */ /* mb.iv[0] = 1; */ /* mb.iv[1] = 1; */ /* mb.iv[2] = 1; */ /* gf2_mul(&ma, &mb, &mr, &mrt); */ /* mm256_to_bn(&mr, tr); */ /* pr = BN_bn2hex(tr); */ /* mm256_to_bn(&mrt, ta); */ /* pa = BN_bn2hex(ta); */ /* printf("mul: (%s, %s)\n", pa, pr); */ /* OPENSSL_free(pr); */ /* OPENSSL_free(pa); */ bn_to_mm256(ta, &ma); gf2m_inv_asm(&ma, &mr); mm256_to_bn(&mr, tr); pa = BN_bn2hex(ta); pr = BN_bn2hex(tr); printf("inv: %s, %s\n", pa, pr); OPENSSL_free(pr); OPENSSL_free(pa); bn_to_mm256(ta, &ma); gf2m_inv(&ma, &mr); mm256_to_bn(&mr, tr); pa = BN_bn2hex(ta); pr = BN_bn2hex(tr); printf("inv: %s, %s\n", pa, pr); OPENSSL_free(pr); OPENSSL_free(pa); mb = mr; gf2_mod_mul(&ma, &mb, &mr); mm256_to_bn(&ma, ta); mm256_to_bn(&mb, tb); mm256_to_bn(&mr, tr); pa = BN_bn2hex(ta); pb = BN_bn2hex(tb); pr = BN_bn2hex(tr); printf("0x%s * 0x%s = 0x%s ... ", pa, pb, pr); OPENSSL_free(pa); OPENSSL_free(pb); OPENSSL_free(pr); // summary printf("%d/%d test(s) passed.\n", passed, (passed + failed)); return failed; } int testAES(){ const int sz_buf = 1024; const int sz_ymm_group = 512; int passed = 0, failed = 0; uint8_t key[SIZE_AES_KEY_256] = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31}; uint8_t pt[SIZE_AES_BLOCK] = {'T', 'h', 'i', 's', ' ', 'i', 's', ' ', 'a', ' ', 't', 'e', 's', 't', '!', 0x0}; uint8_t ct[SIZE_AES_BLOCK]; AES_KEY ssl_key; uint8_t ssl_ct[sz_buf]; uint8_t buf1[sz_buf], buf2[sz_buf]; int i; // aes 128 printf("AES128:\n"); printf("plaintext: "); printHex(pt, SIZE_AES_BLOCK); printf("\n"); // openssl assert(AES_set_encrypt_key(key, 128, &ssl_key) == 0); AES_encrypt(pt, ssl_ct, &ssl_key); printf("ciphertext by openssl: "); printHex(ssl_ct, SIZE_AES_BLOCK); printf("\n"); // tight aes memcpy(ct, pt, SIZE_AES_BLOCK); tight_aes_128_set_key(key); tight_aes_128_enc(ct); printf("ciphertext by tight aes 128: "); printHex(ct, SIZE_AES_BLOCK); printf("\n"); if(memcmp(ssl_ct, ct, SIZE_AES_BLOCK) == 0){ passed++; printf("passed!\n"); } else { failed++; printf("failed!\n"); } // decrypt by tight aes tight_aes_128_set_key(key); //tight_aes_enc(ct); tight_aes_128_dec(ct); printf("plain by tight aes 128: "); printHex(ct, SIZE_AES_BLOCK); printf("\n"); if(memcmp(pt, ct, SIZE_AES_BLOCK) == 0){ passed++; printf("passed!\n"); } else { failed++; printf("failed!\n"); } // aes 256 printf("AES256:\n"); printf("plaintext: "); printHex(pt, SIZE_AES_BLOCK); printf("\n"); // openssl assert(AES_set_encrypt_key(key, 256, &ssl_key) == 0); AES_encrypt(pt, ssl_ct, &ssl_key); printf("ciphertext by openssl: "); printHex(ssl_ct, SIZE_AES_BLOCK); printf("\n"); // tight aes memcpy(ct, pt, SIZE_AES_BLOCK); tight_aes_256_set_key(key); tight_aes_256_enc(ct); printf("ciphertext by tight aes 256: "); printHex(ct, SIZE_AES_BLOCK); printf("\n"); if(memcmp(ssl_ct, ct, SIZE_AES_BLOCK) == 0){ passed++; printf("passed!\n"); } else { failed++; printf("failed!\n"); } // decrypt by tight aes tight_aes_256_set_key(key); //memcpy(ct, pt, sizeof(pt)); //tight_aes_enc(ct); tight_aes_256_dec(ct); printf("plaintext by tight aes 256: "); printHex(ct, SIZE_AES_BLOCK); printf("\n"); if(memcmp(pt, ct, SIZE_AES_BLOCK) == 0){ passed++; printf("passed!\n"); } else { failed++; printf("failed!\n"); } // test encrypt ymm group printf("encrypt ymm group:\n"); memset(buf1, 0, sz_buf); memset(buf2, 0, sz_buf); memset(ssl_ct, 0, sz_buf); for(i = 0; i < sz_ymm_group; i++) buf1[i] = rand() & 0xff; tight_aes_256_set_key(key); load_ymm_group(buf1); aes_256_enc_ymm_group(buf2); printf("plaintext in ymm group:\n"); for(i = 0; i < 16; i++){ printHex(buf1 + i * 32, 32); printf("\n"); } for(i = 0; i < 32; i++){ AES_encrypt(buf1 + i * 16, ssl_ct + i * 16, &ssl_key); } if(memcmp(ssl_ct, buf2, sz_ymm_group) == 0){ passed++; printf("passed!\n"); } else { failed++; printf("failed!\n"); for(i = 0; i < 16; i++){ printf("ymm%d\n", i); printHex(buf2 + i * 32, 32); printf("\n"); printHex(ssl_ct + i * 32, 32); printf("\n"); } } // test decrypt ymm group printf("decrypt ymm group:\n"); tight_aes_256_set_key(key); aes_256_dec_ymm_group(ssl_ct); save_ymm_group(buf2); if(memcmp(buf1, buf2, sz_ymm_group) == 0){ passed++; printf("passed!\n"); } else { failed++; printf("failed!\n"); for(i = 0; i < 16; i++){ printf("ymm%d\n", i); printHex(buf1 + i * 32, 32); printf("\n"); printHex(buf2 + i * 32, 32); printf("\n"); } } printf("%d/%d test(s) passed.\n", passed, (passed + failed)); return failed; } struct ec_method_st { /* Various method flags */ int flags; /* used by EC_METHOD_get_field_type: */ int field_type; /* a NID */ /* used by EC_GROUP_new, EC_GROUP_free, EC_GROUP_clear_free, EC_GROUP_copy: */ int (*group_init)(EC_GROUP *); void (*group_finish)(EC_GROUP *); void (*group_clear_finish)(EC_GROUP *); int (*group_copy)(EC_GROUP *, const EC_GROUP *); /* used by EC_GROUP_set_curve_GFp, EC_GROUP_get_curve_GFp, */ /* EC_GROUP_set_curve_GF2m, and EC_GROUP_get_curve_GF2m: */ int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); int (*group_get_curve)(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); /* used by EC_GROUP_get_degree: */ int (*group_get_degree)(const EC_GROUP *); /* used by EC_GROUP_check: */ int (*group_check_discriminant)(const EC_GROUP *, BN_CTX *); /* used by EC_POINT_new, EC_POINT_free, EC_POINT_clear_free, EC_POINT_copy: */ int (*point_init)(EC_POINT *); void (*point_finish)(EC_POINT *); void (*point_clear_finish)(EC_POINT *); int (*point_copy)(EC_POINT *, const EC_POINT *); /* used by EC_POINT_set_to_infinity, * EC_POINT_set_Jprojective_coordinates_GFp, * EC_POINT_get_Jprojective_coordinates_GFp, * EC_POINT_set_affine_coordinates_GFp, ..._GF2m, * EC_POINT_get_affine_coordinates_GFp, ..._GF2m, * EC_POINT_set_compressed_coordinates_GFp, ..._GF2m: */ int (*point_set_to_infinity)(const EC_GROUP *, EC_POINT *); int (*point_set_Jprojective_coordinates_GFp)(const EC_GROUP *, EC_POINT *, const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *); int (*point_get_Jprojective_coordinates_GFp)(const EC_GROUP *, const EC_POINT *, BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *); int (*point_set_affine_coordinates)(const EC_GROUP *, EC_POINT *, const BIGNUM *x, const BIGNUM *y, BN_CTX *); int (*point_get_affine_coordinates)(const EC_GROUP *, const EC_POINT *, BIGNUM *x, BIGNUM *y, BN_CTX *); int (*point_set_compressed_coordinates)(const EC_GROUP *, EC_POINT *, const BIGNUM *x, int y_bit, BN_CTX *); /* used by EC_POINT_point2oct, EC_POINT_oct2point: */ size_t (*point2oct)(const EC_GROUP *, const EC_POINT *, point_conversion_form_t form, unsigned char *buf, size_t len, BN_CTX *); int (*oct2point)(const EC_GROUP *, EC_POINT *, const unsigned char *buf, size_t len, BN_CTX *); /* used by EC_POINT_add, EC_POINT_dbl, ECP_POINT_invert: */ int (*add)(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *); int (*dbl)(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, BN_CTX *); int (*invert)(const EC_GROUP *, EC_POINT *, BN_CTX *); /* used by EC_POINT_is_at_infinity, EC_POINT_is_on_curve, EC_POINT_cmp: */ int (*is_at_infinity)(const EC_GROUP *, const EC_POINT *); int (*is_on_curve)(const EC_GROUP *, const EC_POINT *, BN_CTX *); int (*point_cmp)(const EC_GROUP *, const EC_POINT *a, const EC_POINT *b, BN_CTX *); /* used by EC_POINT_make_affine, EC_POINTs_make_affine: */ int (*make_affine)(const EC_GROUP *, EC_POINT *, BN_CTX *); int (*points_make_affine)(const EC_GROUP *, size_t num, EC_POINT *[], BN_CTX *); /* used by EC_POINTs_mul, EC_POINT_mul, EC_POINT_precompute_mult, EC_POINT_have_precompute_mult * (default implementations are used if the 'mul' pointer is 0): */ int (*mul)(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *); int (*precompute_mult)(EC_GROUP *group, BN_CTX *); int (*have_precompute_mult)(const EC_GROUP *group); /* internal functions */ /* 'field_mul', 'field_sqr', and 'field_div' can be used by 'add' and 'dbl' so that * the same implementations of point operations can be used with different * optimized implementations of expensive field operations: */ int (*field_mul)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); int (*field_sqr)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); int (*field_div)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); int (*field_encode)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); /* e.g. to Montgomery */ int (*field_decode)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); /* e.g. from Montgomery */ int (*field_set_to_one)(const EC_GROUP *, BIGNUM *r, BN_CTX *); } /* EC_METHOD */; typedef struct ec_extra_data_st { struct ec_extra_data_st *next; void *data; void *(*dup_func)(void *); void (*free_func)(void *); void (*clear_free_func)(void *); } EC_EXTRA_DATA; /* used in EC_GROUP */ struct ec_group_st { const EC_METHOD *meth; EC_POINT *generator; /* optional */ BIGNUM order, cofactor; int curve_name;/* optional NID for named curve */ int asn1_flag; /* flag to control the asn1 encoding */ point_conversion_form_t asn1_form; unsigned char *seed; /* optional seed for parameters (appears in ASN1) */ size_t seed_len; EC_EXTRA_DATA *extra_data; /* linked list */ /* The following members are handled by the method functions, * even if they appear generic */ BIGNUM field; /* Field specification. * For curves over GF(p), this is the modulus; * for curves over GF(2^m), this is the * irreducible polynomial defining the field. */ int poly[6]; /* Field specification for curves over GF(2^m). * The irreducible f(t) is then of the form: * t^poly[0] + t^poly[1] + ... + t^poly[k] * where m = poly[0] > poly[1] > ... > poly[k] = 0. * The array is terminated with poly[k+1]=-1. * All elliptic curve irreducibles have at most 5 * non-zero terms. */ BIGNUM a, b; /* Curve coefficients. * (Here the assumption is that BIGNUMs can be used * or abused for all kinds of fields, not just GF(p).) * For characteristic > 3, the curve is defined * by a Weierstrass equation of the form * y^2 = x^3 + a*x + b. * For characteristic 2, the curve is defined by * an equation of the form * y^2 + x*y = x^3 + a*x^2 + b. */ int a_is_minus3; /* enable optimized point arithmetics for special case */ void *field_data1; /* method-specific (e.g., Montgomery structure) */ void *field_data2; /* method-specific */ int (*field_mod_func)(BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); /* method-specific */ } /* EC_GROUP */; static int gf2m_Mdouble(const EC_GROUP *group, BIGNUM *x, BIGNUM *z, BN_CTX *ctx) { BIGNUM *t1; int ret = 0; /* Since Mdouble is static we can guarantee that ctx != NULL. */ BN_CTX_start(ctx); t1 = BN_CTX_get(ctx); if (t1 == NULL) goto err; if (!group->meth->field_sqr(group, x, x, ctx)) goto err; if (!group->meth->field_sqr(group, t1, z, ctx)) goto err; if (!group->meth->field_mul(group, z, x, t1, ctx)) goto err; if (!group->meth->field_sqr(group, x, x, ctx)) goto err; if (!group->meth->field_sqr(group, t1, t1, ctx)) goto err; if (!group->meth->field_mul(group, t1, &group->b, t1, ctx)) goto err; if (!BN_GF2m_add(x, x, t1)) goto err; ret = 1; err: BN_CTX_end(ctx); return ret; } static int gf2m_Madd(const EC_GROUP *group, const BIGNUM *x, BIGNUM *x1, BIGNUM *z1, const BIGNUM *x2, const BIGNUM *z2, BN_CTX *ctx) { BIGNUM *t1, *t2; int ret = 0; /* Since Madd is static we can guarantee that ctx != NULL. */ BN_CTX_start(ctx); t1 = BN_CTX_get(ctx); t2 = BN_CTX_get(ctx); if (t2 == NULL) goto err; if (!BN_copy(t1, x)) goto err; if (!group->meth->field_mul(group, x1, x1, z2, ctx)) goto err; if (!group->meth->field_mul(group, z1, z1, x2, ctx)) goto err; if (!group->meth->field_mul(group, t2, x1, z1, ctx)) goto err; if (!BN_GF2m_add(z1, z1, x1)) goto err; if (!group->meth->field_sqr(group, z1, z1, ctx)) goto err; if (!group->meth->field_mul(group, x1, z1, t1, ctx)) goto err; if (!BN_GF2m_add(x1, x1, t2)) goto err; ret = 1; err: BN_CTX_end(ctx); return ret; } int benchmark_EC2() { const int cntTest = 1000; int i; struct timeval ts, te; long td; BIGNUM* bnsrc1[cntTest]; BIGNUM* bnsrc2[cntTest]; BIGNUM* bndst; mm_256 mmsrc1[cntTest]; mm_256 mmsrc2[cntTest]; mm_256 mmdst; ec_point_t epsrc[cntTest], epdst; BIGNUM *bnk[cntTest]; mm256_point_t mpsrc[cntTest], mpdst; mm_256 mk[cntTest]; int r; int nid; EC_KEY *key; const BIGNUM* rkey; const EC_GROUP* group; const EC_POINT* ukey; const EC_POINT* G; EC_POINT* br; ctx = BN_CTX_new(); nid = OBJ_sn2nid(SN_sect163k1); // generate the key key = EC_KEY_new_by_curve_name(nid); assert(key != NULL); r = EC_KEY_generate_key(key); assert(r == 1); group = EC_KEY_get0_group(key); // get generator G = EC_GROUP_get0_generator(group); // get private key rkey = EC_KEY_get0_private_key(key); ukey = EC_KEY_get0_public_key(key); br = EC_POINT_new(group); // 1. generate $cntTest test cases bndst = BN_new(); ec_point_init(&epdst); for(i = 0; i < cntTest; i++){ bnsrc1[i] = BN_new(); bnsrc2[i] = BN_new(); assert(BN_rand_range(bnsrc1[i], n)); assert(BN_rand_range(bnsrc2[i], n)); bn_to_mm256(bnsrc1[i], &mmsrc1[i]); bn_to_mm256(bnsrc2[i], &mmsrc2[i]); bnk[i] = BN_new(); ec_point_init(&epsrc[i]); assert(BN_rand_range(epsrc[i].X, n)); assert(BN_rand_range(epsrc[i].Y, n)); assert(BN_rand_range(epsrc[i].Z, n)); assert(BN_rand_range(bnk[i], n)); bn_point_to_mm_point(&epsrc[i], mpsrc + i); bn_to_mm256(bnk[i], mk + i); } // do addition / multiplication / square for $cntTest times gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ BN_GF2m_add(bndst, bnsrc1[i], bnsrc2[i]); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("bignum addition: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_add(&mmsrc1[i], &mmsrc2[i], &mmdst); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure addition: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ BN_GF2m_mod_mul_arr(bndst, bnsrc1[i], bnsrc2[i], group->poly, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("bignum multiplication: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_mod_mul(&mmsrc1[i], &mmsrc2[i], &mmdst); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure multiplication: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); mm_256 mmt; gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_mul(&mmsrc1[i], &mmsrc2[i], &mmdst, &mmt); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure multiplication only: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ BN_GF2m_mod_sqr_arr(bndst, bnsrc1[i], group->poly, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("bignum square: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_mod_sqr(&mmsrc1[i], &mmdst); //gf2_sqr(&mmsrc1[i], &mmdst, &t); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure squre: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ BN_GF2m_mod_inv(bndst, bnsrc1[i], p, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("bignum inv: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2m_inv(&mmsrc1[i], &mmdst); /* gf2_mod_sqr(&mmsrc1[i], &mmdst); */ //gf2_sqr(&mmsrc1[i], &mmdst, &t); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure inv: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2m_inv_asm(&mmsrc1[i], &mmdst); /* gf2_mod_sqr(&mmsrc1[i], &mmdst); */ //gf2_sqr(&mmsrc1[i], &mmdst, &t); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure inv asm: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); BIGNUM* x1, *z1, * x2, *z2; x1 = BN_CTX_get(ctx); z1 = BN_CTX_get(ctx); x2 = BN_CTX_get(ctx); z2 = BN_CTX_get(ctx); BN_rand(x1, EC_GROUP_get_degree(group), 0, 1); BN_rand(z1, EC_GROUP_get_degree(group), 0, 1); BN_rand(x2, EC_GROUP_get_degree(group), 0, 1); BN_rand(z2, EC_GROUP_get_degree(group), 0, 1); gettimeofday(&ts, NULL); // openssl point multiplication for(i = 0; i < cntTest; i++){ gf2m_Mdouble(group, x1, z1, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("openssl mont point dbl: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); // openssl point multiplication for(i = 0; i < cntTest; i++){ gf2m_Madd(group, rkey, x1, z1, x2, z2, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("openssl mont point add: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); // openssl point multiplication for(i = 0; i < cntTest; i++){ EC_POINT_add(group, br, G, ukey, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("openssl point add: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_point_add(mpsrc + i, mpsrc + (i + 1) % cntTest, &mpdst, 1, 1); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure point addition: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); // openssl point multiplication for(i = 0; i < cntTest; i++){ EC_POINT_dbl(group, br, G, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("openssl point doubling: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_point_dbl(mpsrc + i, &mpdst, 1, 1); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure point doubling: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); // openssl point multiplication for(i = 0; i < cntTest; i++){ EC_POINT_mul(group, br, NULL, G, rkey, ctx); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("openssl point mul: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ gf2_point_mul(mpsrc + i, mk + i, &mpdst, 1, 1); //gf2_point_dbl(mp + i, mr + i, 1, 1); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("secure point multiplication: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); ec2m_kern_init(); ec2m_import_key(&mk[0]); gettimeofday(&ts, NULL); for(i = 0; i < cntTest; i++){ ec2m_private_operation(mpsrc + i, &mpdst); } gettimeofday(&te, NULL); td = cntUS * (te.tv_sec - ts.tv_sec) + (te.tv_usec - ts.tv_usec); printf("kernel point multiplication: "); printf("%d cases, %lfs used, %lfus for each cases\n", cntTest, (double)td / cntUS, (double)td / cntTest); ec2m_kern_clean(); return 0; } int testPointArithmetic(){ int passed = 0, failed = 0; BIGNUM* K; ec_point_t P, Q, R, T; mm256_point_t mp, mq, mr; mm_256 mk; domain_parameters_print(); ec_point_init(&P); ec_point_init(&Q); ec_point_init(&R); ec_point_init(&T); // point double // special cases // P = infinity BN_set_word(P.X, 1); bn_point_to_mm_point(&P, &mp); ec_point_double(&R, &P); gf2_point_dbl(&mp, &mr, 1, 1); print_bn_point(&P); printf(" * 2 = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // a general case ec_point_set_affine_xy(&P, x, y); //BN_rand_range(P.Z, n); bn_point_to_mm_point(&P, &mp); ec_point_double(&R, &P); gf2_point_dbl(&mp, &mr, 1, 1); print_bn_point(&P); printf(" * 2 = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // double again ec_point_copy(&P, &R); bn_point_to_mm_point(&P, &mp); ec_point_double(&R, &P); gf2_point_dbl(&mp, &mr, 1, 1); print_bn_point(&P); printf(" * 2 = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // point add ec_point_copy(&T, &R); // special cases // P = infinity BN_set_word(P.X, 1); BN_set_word(P.Y, 0); BN_set_word(P.Z, 0); ec_point_copy(&Q, &T); BN_set_word(Q.Z, 1); bn_point_to_mm_point(&P, &mp); bn_point_to_mm_point(&Q, &mq); ec_point_add(&R, &P, &Q); gf2_point_add(&mp, &mq, &mr, 1, 1); print_bn_point(&P); printf(" + "); print_bn_point(&Q); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // a general case ec_point_copy(&P, &T); ec_point_set_affine_xy(&Q, x, y); bn_point_to_mm_point(&P, &mp); bn_point_to_mm_point(&Q, &mq); ec_point_add(&R, &P, &Q); gf2_point_add(&mp, &mq, &mr, BN_get_word(a), BN_get_word(b)); print_bn_point(&P); printf(" + "); print_affine_bn_point(&Q); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // point multiply ec_point_set_affine_xy(&P, x, y); bn_point_to_mm_point(&P, &mp); K = BN_new(); BN_rand_range(K, n); bn_to_mm256(K, &mk); ec_point_multiply(&R, &P, K); gf2_point_mul(&mp, &mk, &mr, BN_get_word(a), BN_get_word(b)); print_bn_point(&P); printf(" * "); printf("%s", BN_bn2str(K)); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // point multiply with key preset __asm__ __volatile__ ("vmovdqu %0, %%ymm15" : : "m"(mk)); gf2_point_mul_with_preset_key(&mp, &mr, BN_get_word(a), BN_get_word(b)); print_bn_point(&P); printf(" * "); printf("%s", BN_bn2str(K)); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } ec2m_kern_init(); ec2m_import_key(&mk); ec2m_private_operation(&mp, &mr); print_bn_point(&P); printf(" * "); printf("%s", BN_bn2str(K)); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } ec2m_kern_clean(); printf("%d/%d test(s) passed.\n", passed, (passed + failed)); return failed; } int testKernelEc2m() { int r; int rid; ec_point_t P, R; mm256_point_t mp, mr; BIGNUM* tk = BN_new(); mm_256 mk; BN_rand_range(tk, n); bn_to_mm256(tk, &mk); ec_point_init(&P); ec_point_init(&R); ec_point_set_affine_xy(&P, x, y); bn_point_to_mm_point(&P, &mp); printf("alloc ec2m resource... "); rid = sys_ec2m_alloc(); printf(" got %d\n", rid); if(rid < 0) return 1; r = sys_ec2m_setkey(rid, &mk, BN_get_word(a), BN_get_word(b)); printf("setkey: %d\n", r); printf("encrypt: %d\n", r); // point multiply ec_point_set_affine_xy(&P, x, y); ec_point_multiply(&R, &P, tk); sys_ec2m_encrypt(rid, &mp, &mr); print_bn_point(&P); printf(" * "); printf("%s", BN_bn2str(tk)); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ printf(" ... passed!\n"); } else { printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } r = sys_ec2m_free(rid); printf("free: %d\n", r); return 0; } int testMisc(){ int passed = 0, failed = 0; BIGNUM* K; ec_point_t P, Q, R, T; mm256_point_t mp, mr; mm_256 mk; domain_parameters_print(); ec_point_init(&P); ec_point_init(&Q); ec_point_init(&R); ec_point_init(&T); /* // point double // a general case ec_point_set_affine_xy(&P, x, y); BN_rand_range(P.Z, n); BN_set_word(P.Z, 4); bn_point_to_mm_point(&P, &mp); ec_point_double(&R, &P); gf2_point_dbl(&mp, &mr, 1, 1); print_bn_point(&P); printf(" * 2 = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } // point add ec_point_copy(&T, &R); // special cases // P = infinity BN_set_word(P.X, 1); BN_set_word(P.Y, 0); BN_set_word(P.Z, 0); ec_point_copy(&Q, &T); BN_set_word(Q.Z, 1); bn_point_to_mm_point(&P, &mp); bn_point_to_mm_point(&Q, &mq); ec_point_add(&R, &P, &Q); gf2_point_add(&mp, &mq, &mr, 1, 1); print_bn_point(&P); printf(" + "); print_bn_point(&Q); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } */ // point multiply ec_point_set_affine_xy(&P, x, y); bn_point_to_mm_point(&P, &mp); K = BN_new(); BN_rand_range(K, n); //K->d[0] = 3; //K->d[2] = 2; bn_to_mm256(K, &mk); ec_point_multiply(&R, &P, K); gf2_point_mul(&mp, &mk, &mr, BN_get_word(a), BN_get_word(b)); print_bn_point(&P); printf(" * "); printf("%s", BN_bn2str(K)); printf(" = "); print_bn_point(&R); if(cmp_mm_point_with_bn_point(&mr, &R) == 0){ passed++; printf(" ... passed!\n"); } else { failed++; printf(" ... failed! got "); print_mm_point(&mr); printf("\n"); } return failed; } int benchmark_cycles(){ mm_256 ma, mb, mr; const int cases = 1000; unsigned long hi_s, lo_s, hi_e, lo_e, s, e; unsigned long td[cases]; unsigned long t_base, t_min, t_sum, t_avg; int i; const char* item; // calculate the bases for(i = 0; i < cases; i++){ rdtsc_begin(hi_s, lo_s); rdtsc_end(hi_e, lo_e); s = (hi_s << 32) | lo_s; e = (hi_e << 32) | lo_e; td[i] = e - s; } item = "base"; t_min = td[0]; t_sum = 0; for(i = 0; i < cases; i++){ if(t_min > td[i]){ t_min = td[i]; } t_sum += td[i]; } t_avg = t_sum / cases; t_base = t_min; #ifdef KERN printk(KERN_INFO"base: %lu\n", t_min); #else printf("%s: %lu, %lu, %lu\n", item, t_min, t_sum, t_avg); #endif gf2_add(&ma, &mb, &mr); for(i = 0; i < cases; i++){ rdtsc_begin(hi_s, lo_s); gf2_add(&ma, &mb, &mr); rdtsc_end(hi_e, lo_e); s = (hi_s << 32) | lo_s; e = (hi_e << 32) | lo_e; td[i] = e - s; } item = "add"; t_sum = 0; t_min = td[0]; for(i = 0; i < cases; i++){ if(t_min > td[i]){ t_min = td[i]; } t_sum += td[i]; } t_avg = t_sum / cases; #ifdef KERN printk(KERN_INFO "add: %lu, %lu\n", t_min, t_min - t_base); #else printf("%s: %lu, %lu, %lu, %lu\n", item, t_min, t_min - t_base, t_sum, t_avg); #endif for(i = 0; i < cases; i++){ rdtsc_begin(hi_s, lo_s); gf2_mod_mul(&ma, &mb, &mr); rdtsc_end(hi_e, lo_e); s = (hi_s << 32) | lo_s; e = (hi_e << 32) | lo_e; td[i] = e - s; } item = "mul"; t_sum = 0; t_min = td[0]; for(i = 0; i < cases; i++){ if(t_min > td[i]){ t_min = td[i]; } t_sum += td[i]; } t_avg = t_sum / cases; #ifdef KERN printk(KERN_INFO "add: %lu, %lu\n", t_min, t_min - t_base); #else printf("%s: %lu, %lu, %lu, %lu\n", item, t_min, t_min - t_base, t_sum, t_avg); #endif for(i = 0; i < cases; i++){ rdtsc_begin(hi_s, lo_s); gf2_mod_sqr(&ma, &mr); rdtsc_end(hi_e, lo_e); s = (hi_s << 32) | lo_s; e = (hi_e << 32) | lo_e; td[i] = e - s; } item = "sqr"; t_sum = 0; t_min = td[0]; for(i = 0; i < cases; i++){ if(t_min > td[i]){ t_min = td[i]; } t_sum += td[i]; } t_avg = t_sum / cases; #ifdef KERN printk(KERN_INFO "add: %lu, %lu\n", t_min, t_min - t_base); #else printf("%s: %lu, %lu, %lu, %lu\n", item, t_min, t_min - t_base, t_sum, t_avg); #endif return 0; }