summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2023-04-18 08:05:18 +0000
committertb <>2023-04-18 08:05:18 +0000
commit34d778dc6843b11c87f54acca2c3481187e3f313 (patch)
treeba22f089b99f4dcb5baf90e844208f3781412f2b
parent8e21d4d0d1f4bcd323f8bef2d16ad73528e7a834 (diff)
downloadopenbsd-34d778dc6843b11c87f54acca2c3481187e3f313.tar.gz
openbsd-34d778dc6843b11c87f54acca2c3481187e3f313.tar.bz2
openbsd-34d778dc6843b11c87f54acca2c3481187e3f313.zip
ec_point_conversion: drop test for sect571k1
Maybe it should be replaced by another test, although P-256 seems enough.
-rw-r--r--src/regress/lib/libcrypto/ec/ec_point_conversion.c352
1 files changed, 2 insertions, 350 deletions
diff --git a/src/regress/lib/libcrypto/ec/ec_point_conversion.c b/src/regress/lib/libcrypto/ec/ec_point_conversion.c
index 1b40ddc2eb..398f868615 100644
--- a/src/regress/lib/libcrypto/ec/ec_point_conversion.c
+++ b/src/regress/lib/libcrypto/ec/ec_point_conversion.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ec_point_conversion.c,v 1.11 2023/04/17 21:00:35 tb Exp $ */ 1/* $OpenBSD: ec_point_conversion.c,v 1.12 2023/04/18 08:05:18 tb Exp $ */
2/* 2/*
3 * Copyright (c) 2021 Theo Buehler <tb@openbsd.org> 3 * Copyright (c) 2021 Theo Buehler <tb@openbsd.org>
4 * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> 4 * Copyright (c) 2021 Joel Sing <jsing@openbsd.org>
@@ -110,43 +110,6 @@ roundtrip(EC_GROUP *group, EC_POINT *point, int form, BIGNUM *x, BIGNUM *y)
110 return failed; 110 return failed;
111} 111}
112 112
113#ifndef OPENSSL_NO_EC2M
114static int
115test_hybrid_corner_case(void)
116{
117 BIGNUM *x = NULL, *y = NULL;
118 EC_GROUP *group;
119 EC_POINT *point;
120 size_t i;
121 int failed = 0;
122
123 if (!BN_hex2bn(&x, "0"))
124 errx(1, "BN_hex2bn x");
125 if (!BN_hex2bn(&y, "01"))
126 errx(1, "BN_hex2bn y");
127
128 if ((group = EC_GROUP_new_by_curve_name(NID_sect571k1)) == NULL)
129 errx(1, "group");
130 if ((point = EC_POINT_new(group)) == NULL)
131 errx(1, "point");
132
133 if (!EC_POINT_set_affine_coordinates(group, point, x, y, NULL))
134 errx(1, "set affine");
135
136 for (i = 0; i < N_FORMS; i++)
137 failed |= roundtrip(group, point, forms[i], x, y);
138
139 fprintf(stderr, "%s %s\n", __func__, failed ? ": FAILED" : "");
140
141 EC_GROUP_free(group);
142 EC_POINT_free(point);
143 BN_free(x);
144 BN_free(y);
145
146 return failed;
147}
148#endif
149
150/* XXX This only tests multiples of the generator for now... */ 113/* XXX This only tests multiples of the generator for now... */
151static int 114static int
152test_random_points_on_curve(EC_builtin_curve *curve) 115test_random_points_on_curve(EC_builtin_curve *curve)
@@ -258,315 +221,7 @@ static const struct point_conversion {
258 uint8_t octets_len; 221 uint8_t octets_len;
259 int valid; 222 int valid;
260} point_conversions[] = { 223} point_conversions[] = {
261#ifndef OPENSSL_NO_EC2M 224 /* XXX - now that sect571 is no longer tested, add another test? */
262 {
263 .description = "point at infinity on sect571k1",
264 .nid = NID_sect571k1,
265 .octets = { 0x00 },
266 .octets_len = 1,
267 .valid = 1,
268 },
269 {
270 .description = "point at infinity on sect571k1 (flipped y_bit)",
271 .nid = NID_sect571k1,
272 .octets = { 0x01 },
273 .octets_len = 1,
274 .valid = 0,
275 },
276 {
277 .description = "zero x compressed point on sect571k1",
278 .nid = NID_sect571k1,
279 .octets = {
280 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
281 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
282 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
283 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
284 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
285 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
286 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
287 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
288 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
289 0x00,
290 },
291 .octets_len = 73,
292 .valid = 1,
293 },
294 {
295 .description =
296 "zero x compressed point on sect571k1 (flipped y_bit)",
297 .nid = NID_sect571k1,
298 .octets = {
299 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
300 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
301 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
302 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
303 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
304 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
305 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
306 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
307 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
308 0x00,
309 },
310 .octets_len = 73,
311 .valid = 0,
312 },
313 {
314 .description = "generic compressed point on sect571k1",
315 .nid = NID_sect571k1,
316 .octets = {
317 0x02, 0x00, 0x5e, 0x33, 0x9f, 0xd6, 0xf1, 0xae,
318 0x10, 0xbd, 0x48, 0xcf, 0xf1, 0x0d, 0x8e, 0x0e,
319 0xd7, 0x83, 0xce, 0xf0, 0x3d, 0x14, 0x06, 0x41,
320 0x29, 0x7d, 0x7e, 0xa3, 0x01, 0xf4, 0x9b, 0xa2,
321 0x8c, 0xa6, 0xab, 0x24, 0xa0, 0x9e, 0xfd, 0xc4,
322 0x2d, 0xc2, 0x95, 0xb4, 0xf9, 0xd4, 0xf4, 0x97,
323 0x53, 0x5d, 0xe9, 0xe3, 0x47, 0xc3, 0xa8, 0x6b,
324 0xbb, 0x27, 0x74, 0x6b, 0xfb, 0x26, 0xca, 0x96,
325 0x76, 0x5b, 0x36, 0xe8, 0x87, 0xb5, 0xc5, 0x6a,
326 0xc5,
327 },
328 .octets_len = 73,
329 .valid = 1,
330 },
331 {
332 .description =
333 "generic compressed point on sect571k1 (flipped y_bit)",
334 .nid = NID_sect571k1,
335 .octets = {
336 0x03, 0x00, 0x5e, 0x33, 0x9f, 0xd6, 0xf1, 0xae,
337 0x10, 0xbd, 0x48, 0xcf, 0xf1, 0x0d, 0x8e, 0x0e,
338 0xd7, 0x83, 0xce, 0xf0, 0x3d, 0x14, 0x06, 0x41,
339 0x29, 0x7d, 0x7e, 0xa3, 0x01, 0xf4, 0x9b, 0xa2,
340 0x8c, 0xa6, 0xab, 0x24, 0xa0, 0x9e, 0xfd, 0xc4,
341 0x2d, 0xc2, 0x95, 0xb4, 0xf9, 0xd4, 0xf4, 0x97,
342 0x53, 0x5d, 0xe9, 0xe3, 0x47, 0xc3, 0xa8, 0x6b,
343 0xbb, 0x27, 0x74, 0x6b, 0xfb, 0x26, 0xca, 0x96,
344 0x76, 0x5b, 0x36, 0xe8, 0x87, 0xb5, 0xc5, 0x6a,
345 0xc5,
346 },
347 .octets_len = 73,
348 .valid = 1,
349 },
350 {
351 .description = "zero x uncompressed point on sect571k1",
352 .nid = NID_sect571k1,
353 .octets = {
354 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
355 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
356 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
357 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
358 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
359 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
360 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
361 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
362 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
363 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
364 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
365 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
366 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
367 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
368 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
369 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
370 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
371 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
372 0x01,
373 },
374 .octets_len = 145,
375 .valid = 1,
376 },
377 {
378 .description = "zero x uncompressed point on sect571k1",
379 .nid = NID_sect571k1,
380 .octets = {
381 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
382 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
383 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
384 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
385 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
386 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
387 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
388 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
389 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
390 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
391 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
392 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
393 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
394 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
395 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
396 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
397 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
398 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
399 0x01,
400 },
401 .octets_len = 145,
402 .valid = 0,
403 },
404 {
405 .description = "generic uncompressed point on sect571k1",
406 .nid = NID_sect571k1,
407 .octets = {
408 0x04, 0x02, 0x2d, 0xf4, 0x72, 0x38, 0xc2, 0xbe,
409 0x0d, 0xa4, 0xf1, 0xfc, 0xe8, 0x78, 0xe6, 0xad,
410 0x5c, 0xaa, 0xd9, 0x7f, 0x7c, 0xa9, 0x4c, 0xe4,
411 0xd2, 0xae, 0xba, 0xaa, 0x8c, 0x9d, 0x4c, 0xac,
412 0x85, 0x00, 0xe1, 0xfa, 0x33, 0x73, 0x51, 0x52,
413 0x5a, 0x4e, 0x75, 0x67, 0x1d, 0x0a, 0x2a, 0xd2,
414 0x38, 0xb2, 0x9b, 0xe8, 0xec, 0xbe, 0x07, 0x8b,
415 0xc0, 0x95, 0x77, 0xe9, 0x55, 0x0c, 0x6c, 0x0e,
416 0x02, 0x3b, 0x34, 0xe2, 0xa8, 0x29, 0xd2, 0x97,
417 0xd9, 0x05, 0xa2, 0x6f, 0xa8, 0x6f, 0x1c, 0x3a,
418 0xf6, 0x12, 0x42, 0x1a, 0x26, 0x6e, 0x87, 0xf3,
419 0x19, 0x04, 0x20, 0xa5, 0x29, 0x78, 0xee, 0xcf,
420 0x91, 0x06, 0xd2, 0x5a, 0x62, 0x2a, 0x7f, 0x1d,
421 0xa0, 0x7b, 0xb4, 0x31, 0x9c, 0xd2, 0x14, 0x60,
422 0xf5, 0x9b, 0xea, 0x4a, 0x41, 0xad, 0x47, 0x72,
423 0xf9, 0x01, 0xed, 0x7f, 0x5a, 0x27, 0x64, 0xa2,
424 0x53, 0x4e, 0x18, 0x51, 0x33, 0xa8, 0x1e, 0x3a,
425 0xc2, 0xe7, 0x2c, 0xe3, 0x63, 0x6d, 0x06, 0x29,
426 0x28,
427 },
428 .octets_len = 145,
429 .valid = 1,
430 },
431 {
432 .description =
433 "generic uncompressed point on sect571k1 (flipped y_bit)",
434 .nid = NID_sect571k1,
435 .octets = {
436 0x05, 0x02, 0x2d, 0xf4, 0x72, 0x38, 0xc2, 0xbe,
437 0x0d, 0xa4, 0xf1, 0xfc, 0xe8, 0x78, 0xe6, 0xad,
438 0x5c, 0xaa, 0xd9, 0x7f, 0x7c, 0xa9, 0x4c, 0xe4,
439 0xd2, 0xae, 0xba, 0xaa, 0x8c, 0x9d, 0x4c, 0xac,
440 0x85, 0x00, 0xe1, 0xfa, 0x33, 0x73, 0x51, 0x52,
441 0x5a, 0x4e, 0x75, 0x67, 0x1d, 0x0a, 0x2a, 0xd2,
442 0x38, 0xb2, 0x9b, 0xe8, 0xec, 0xbe, 0x07, 0x8b,
443 0xc0, 0x95, 0x77, 0xe9, 0x55, 0x0c, 0x6c, 0x0e,
444 0x02, 0x3b, 0x34, 0xe2, 0xa8, 0x29, 0xd2, 0x97,
445 0xd9, 0x05, 0xa2, 0x6f, 0xa8, 0x6f, 0x1c, 0x3a,
446 0xf6, 0x12, 0x42, 0x1a, 0x26, 0x6e, 0x87, 0xf3,
447 0x19, 0x04, 0x20, 0xa5, 0x29, 0x78, 0xee, 0xcf,
448 0x91, 0x06, 0xd2, 0x5a, 0x62, 0x2a, 0x7f, 0x1d,
449 0xa0, 0x7b, 0xb4, 0x31, 0x9c, 0xd2, 0x14, 0x60,
450 0xf5, 0x9b, 0xea, 0x4a, 0x41, 0xad, 0x47, 0x72,
451 0xf9, 0x01, 0xed, 0x7f, 0x5a, 0x27, 0x64, 0xa2,
452 0x53, 0x4e, 0x18, 0x51, 0x33, 0xa8, 0x1e, 0x3a,
453 0xc2, 0xe7, 0x2c, 0xe3, 0x63, 0x6d, 0x06, 0x29,
454 0x28,
455 },
456 .octets_len = 145,
457 .valid = 0,
458 },
459 {
460 .description = "zero x hybrid point on sect571k1",
461 .nid = NID_sect571k1,
462 .octets = {
463 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
464 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
465 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
466 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
467 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
468 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
469 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
470 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
471 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
472 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
473 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
474 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
475 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
476 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
477 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
478 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
479 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
480 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
481 0x01,
482 },
483 .octets_len = 145,
484 .valid = 1,
485 },
486 {
487 .description =
488 "zero x hybrid point on sect571k1 (flipped y_bit)",
489 .nid = NID_sect571k1,
490 .octets = {
491 0x07, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
492 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
493 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
494 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
495 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
496 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
497 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
498 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
499 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
500 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
501 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
502 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
503 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
504 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
505 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
506 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
507 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
508 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
509 0x01,
510 },
511 .octets_len = 145,
512 .valid = 0,
513 },
514 {
515 .description = "generic hybrid point on sect571k1",
516 .nid = NID_sect571k1,
517 .octets = {
518 0x07, 0x02, 0x2d, 0xf4, 0x72, 0x38, 0xc2, 0xbe,
519 0x0d, 0xa4, 0xf1, 0xfc, 0xe8, 0x78, 0xe6, 0xad,
520 0x5c, 0xaa, 0xd9, 0x7f, 0x7c, 0xa9, 0x4c, 0xe4,
521 0xd2, 0xae, 0xba, 0xaa, 0x8c, 0x9d, 0x4c, 0xac,
522 0x85, 0x00, 0xe1, 0xfa, 0x33, 0x73, 0x51, 0x52,
523 0x5a, 0x4e, 0x75, 0x67, 0x1d, 0x0a, 0x2a, 0xd2,
524 0x38, 0xb2, 0x9b, 0xe8, 0xec, 0xbe, 0x07, 0x8b,
525 0xc0, 0x95, 0x77, 0xe9, 0x55, 0x0c, 0x6c, 0x0e,
526 0x02, 0x3b, 0x34, 0xe2, 0xa8, 0x29, 0xd2, 0x97,
527 0xd9, 0x05, 0xa2, 0x6f, 0xa8, 0x6f, 0x1c, 0x3a,
528 0xf6, 0x12, 0x42, 0x1a, 0x26, 0x6e, 0x87, 0xf3,
529 0x19, 0x04, 0x20, 0xa5, 0x29, 0x78, 0xee, 0xcf,
530 0x91, 0x06, 0xd2, 0x5a, 0x62, 0x2a, 0x7f, 0x1d,
531 0xa0, 0x7b, 0xb4, 0x31, 0x9c, 0xd2, 0x14, 0x60,
532 0xf5, 0x9b, 0xea, 0x4a, 0x41, 0xad, 0x47, 0x72,
533 0xf9, 0x01, 0xed, 0x7f, 0x5a, 0x27, 0x64, 0xa2,
534 0x53, 0x4e, 0x18, 0x51, 0x33, 0xa8, 0x1e, 0x3a,
535 0xc2, 0xe7, 0x2c, 0xe3, 0x63, 0x6d, 0x06, 0x29,
536 0x28,
537 },
538 .octets_len = 145,
539 .valid = 1,
540 },
541 {
542 .description =
543 "generic hybrid point on sect571k1 (flipped y_bit)",
544 .nid = NID_sect571k1,
545 .octets = {
546 0x06, 0x02, 0x2d, 0xf4, 0x72, 0x38, 0xc2, 0xbe,
547 0x0d, 0xa4, 0xf1, 0xfc, 0xe8, 0x78, 0xe6, 0xad,
548 0x5c, 0xaa, 0xd9, 0x7f, 0x7c, 0xa9, 0x4c, 0xe4,
549 0xd2, 0xae, 0xba, 0xaa, 0x8c, 0x9d, 0x4c, 0xac,
550 0x85, 0x00, 0xe1, 0xfa, 0x33, 0x73, 0x51, 0x52,
551 0x5a, 0x4e, 0x75, 0x67, 0x1d, 0x0a, 0x2a, 0xd2,
552 0x38, 0xb2, 0x9b, 0xe8, 0xec, 0xbe, 0x07, 0x8b,
553 0xc0, 0x95, 0x77, 0xe9, 0x55, 0x0c, 0x6c, 0x0e,
554 0x02, 0x3b, 0x34, 0xe2, 0xa8, 0x29, 0xd2, 0x97,
555 0xd9, 0x05, 0xa2, 0x6f, 0xa8, 0x6f, 0x1c, 0x3a,
556 0xf6, 0x12, 0x42, 0x1a, 0x26, 0x6e, 0x87, 0xf3,
557 0x19, 0x04, 0x20, 0xa5, 0x29, 0x78, 0xee, 0xcf,
558 0x91, 0x06, 0xd2, 0x5a, 0x62, 0x2a, 0x7f, 0x1d,
559 0xa0, 0x7b, 0xb4, 0x31, 0x9c, 0xd2, 0x14, 0x60,
560 0xf5, 0x9b, 0xea, 0x4a, 0x41, 0xad, 0x47, 0x72,
561 0xf9, 0x01, 0xed, 0x7f, 0x5a, 0x27, 0x64, 0xa2,
562 0x53, 0x4e, 0x18, 0x51, 0x33, 0xa8, 0x1e, 0x3a,
563 0xc2, 0xe7, 0x2c, 0xe3, 0x63, 0x6d, 0x06, 0x29,
564 0x28,
565 },
566 .octets_len = 145,
567 .valid = 0,
568 },
569#endif
570 { 225 {
571 .description = "point at infinity on secp256r1", 226 .description = "point at infinity on secp256r1",
572 .nid = NID_X9_62_prime256v1, 227 .nid = NID_X9_62_prime256v1,
@@ -897,9 +552,6 @@ main(int argc, char **argv)
897 int failed = 0; 552 int failed = 0;
898 553
899 failed |= test_random_points(); 554 failed |= test_random_points();
900#ifndef OPENSSL_NO_EC2M
901 failed |= test_hybrid_corner_case();
902#endif
903 failed |= test_point_conversions(); 555 failed |= test_point_conversions();
904 556
905 return failed; 557 return failed;