blob: c4b05422d7a9d16e29b929360ab3df0cb6bbf783 [file] [log] [blame]
/* Copyright lowRISC contributors. */
/* Licensed under the Apache License, Version 2.0, see LICENSE for details. */
/* SPDX-License-Identifier: Apache-2.0 */
/**
* Standalone elliptic curve P-256 ECDSA sign test
*
* Uses OTBN ECC P-256 lib to perform an ECDSA signing operation.
* An example message digest, the private signing key and a random value k are
* provided in the .data section below. Note that this test does not yet use
* OTBN's entropy interface as a source for the random value in the ECDSA
* operation.
*
* Resulting R and S of the signature are copied to the wide registers. See
* comment at the end of the file for expected values.
*/
.text
ecdsa_sign_test:
jal x1, p256_init
jal x1, p256_sign
/* pointer to R */
lw x21, 12(x0)
/* pointer to S */
lw x22, 16(x0)
/* copy result to wide reg file */
li x8, 0
bn.lid x8, 0(x21)
li x9, 1
bn.lid x9, 0(x22)
ecall
.data
/* pointer to k (dptr_k) */
.word 0x00000020
/* pointer to rnd (dptr_rnd) */
.word 0x00000040
/* pointer to msg (dptr_msg) */
.word 0x00000060
/* pointer to R (dptr_r) */
.word 0x00000080
/* pointer to S (dptr_s) */
.word 0x000000a0
/* pointer to X (dptr_x) */
.word 0x000000c0
/* pointer to Y (dptr_y) */
.word 0x000000e0
/* pointer to D (dptr_d) */
.word 0x00000100
/* example random scalar k */
.word 0xfe6d1071
.word 0x21d0a016
.word 0xb0b2c781
.word 0x9590ef5d
.word 0x3fdfa379
.word 0x1b76ebe8
.word 0x74210263
.word 0x1420fc41
/* message digest */
.skip 32
.word 0x4456fd21
.word 0x400bdd7d
.word 0xb54d7452
.word 0x17d015f1
.word 0x90d4d90b
.word 0xb028ad8a
.word 0x6ce90fef
.word 0x06d71207
/* private key d */
.skip 128
.word 0xc7df1a56
.word 0xfbd94efe
.word 0xaa847f52
.word 0x2d869bf4
.word 0x543b963b
.word 0xe5f2cbee
.word 0x9144233d
.word 0xc0fbe256
/* Expected values wide register file (w0=R, w1=S):
w0 = 0x815215ad7dd27f336b35843cbe064de299504edd0c7d87dd1147ea5680a9674a
w1 = 0xa3991e01c444042086e30cd999e589ad4dad9404e90a6d17d0b1051ec93fd605
*/