2014-08-05 13:32:25 -07:00
|
|
|
|
|
|
|
#define TEST_NAME "ed25519_convert"
|
|
|
|
#include "cmptest.h"
|
|
|
|
|
2017-02-23 03:28:12 -07:00
|
|
|
static const unsigned char keypair_seed[crypto_sign_ed25519_SEEDBYTES] = {
|
|
|
|
0x42, 0x11, 0x51, 0xa4, 0x59, 0xfa, 0xea, 0xde, 0x3d, 0x24, 0x71,
|
|
|
|
0x15, 0xf9, 0x4a, 0xed, 0xae, 0x42, 0x31, 0x81, 0x24, 0x09, 0x5a,
|
|
|
|
0xfa, 0xbe, 0x4d, 0x14, 0x51, 0xa5, 0x59, 0xfa, 0xed, 0xee
|
|
|
|
};
|
2014-08-05 13:32:25 -07:00
|
|
|
|
2017-02-23 03:28:12 -07:00
|
|
|
int
|
|
|
|
main(void)
|
2014-08-05 13:32:25 -07:00
|
|
|
{
|
2014-09-14 11:32:55 -07:00
|
|
|
unsigned char ed25519_pk[crypto_sign_ed25519_PUBLICKEYBYTES];
|
|
|
|
unsigned char ed25519_skpk[crypto_sign_ed25519_SECRETKEYBYTES];
|
|
|
|
unsigned char curve25519_pk[crypto_scalarmult_curve25519_BYTES];
|
|
|
|
unsigned char curve25519_pk2[crypto_scalarmult_curve25519_BYTES];
|
|
|
|
unsigned char curve25519_sk[crypto_scalarmult_curve25519_BYTES];
|
2017-02-23 03:28:12 -07:00
|
|
|
char curve25519_pk_hex[crypto_scalarmult_curve25519_BYTES * 2 + 1];
|
|
|
|
char curve25519_sk_hex[crypto_scalarmult_curve25519_BYTES * 2 + 1];
|
|
|
|
unsigned int i;
|
2014-08-05 13:32:25 -07:00
|
|
|
|
|
|
|
crypto_sign_ed25519_seed_keypair(ed25519_pk, ed25519_skpk, keypair_seed);
|
2015-11-01 05:57:51 -07:00
|
|
|
if (crypto_sign_ed25519_pk_to_curve25519(curve25519_pk, ed25519_pk) != 0) {
|
|
|
|
printf("conversion failed\n");
|
|
|
|
}
|
2014-08-05 13:32:25 -07:00
|
|
|
crypto_sign_ed25519_sk_to_curve25519(curve25519_sk, ed25519_skpk);
|
2014-09-14 11:32:55 -07:00
|
|
|
sodium_bin2hex(curve25519_pk_hex, sizeof curve25519_pk_hex, curve25519_pk,
|
|
|
|
sizeof curve25519_pk);
|
|
|
|
sodium_bin2hex(curve25519_sk_hex, sizeof curve25519_sk_hex, curve25519_sk,
|
|
|
|
sizeof curve25519_sk);
|
2014-08-05 13:32:25 -07:00
|
|
|
|
|
|
|
printf("curve25519 pk: [%s]\n", curve25519_pk_hex);
|
|
|
|
printf("curve25519 sk: [%s]\n", curve25519_sk_hex);
|
|
|
|
|
|
|
|
for (i = 0U; i < 500U; i++) {
|
|
|
|
crypto_sign_ed25519_keypair(ed25519_pk, ed25519_skpk);
|
2017-02-23 03:28:12 -07:00
|
|
|
if (crypto_sign_ed25519_pk_to_curve25519(curve25519_pk, ed25519_pk) !=
|
|
|
|
0) {
|
2015-11-01 05:57:51 -07:00
|
|
|
printf("conversion failed\n");
|
|
|
|
}
|
2014-08-05 13:32:25 -07:00
|
|
|
crypto_sign_ed25519_sk_to_curve25519(curve25519_sk, ed25519_skpk);
|
|
|
|
crypto_scalarmult_curve25519_base(curve25519_pk2, curve25519_sk);
|
|
|
|
if (memcmp(curve25519_pk, curve25519_pk2, sizeof curve25519_pk) != 0) {
|
|
|
|
printf("conversion failed\n");
|
|
|
|
}
|
|
|
|
}
|
2017-07-24 14:56:56 -07:00
|
|
|
|
|
|
|
sodium_hex2bin(ed25519_pk, crypto_sign_ed25519_PUBLICKEYBYTES,
|
|
|
|
"0000000000000000000000000000000000000000000000000000000000000000"
|
|
|
|
"0000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
64, NULL, NULL, NULL);
|
|
|
|
assert(crypto_sign_ed25519_pk_to_curve25519(curve25519_pk, ed25519_pk) == -1);
|
2017-07-29 12:34:40 -07:00
|
|
|
sodium_hex2bin(ed25519_pk, crypto_sign_ed25519_PUBLICKEYBYTES,
|
|
|
|
"0200000000000000000000000000000000000000000000000000000000000000"
|
|
|
|
"0000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
64, NULL, NULL, NULL);
|
|
|
|
assert(crypto_sign_ed25519_pk_to_curve25519(curve25519_pk, ed25519_pk) == -1);
|
2017-07-24 14:56:56 -07:00
|
|
|
sodium_hex2bin(ed25519_pk, crypto_sign_ed25519_PUBLICKEYBYTES,
|
|
|
|
"0500000000000000000000000000000000000000000000000000000000000000"
|
|
|
|
"0000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
64, NULL, NULL, NULL);
|
|
|
|
assert(crypto_sign_ed25519_pk_to_curve25519(curve25519_pk, ed25519_pk) == -1);
|
|
|
|
|
2014-08-05 13:32:25 -07:00
|
|
|
printf("ok\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|