blob: 5f6f149f18a9f7802da78db3a5bc77023eb46703 [file] [log] [blame]
# Imported from Wycheproof's x25519_test.json.
# This file is generated by convert_wycheproof.go. Do not edit by hand.
#
# Algorithm: X25519
# Generator version: 0.4.6
[curve = curve25519]
# tcId = 1
# normal case
curve = curve25519
private = 4852834d9d6b77dadeabaaf2e11dca66d19fe74993a7bec36c6e16a0983feaba
public = 9c647d9ae589b9f58fdc3ca4947efbc915c4b2e08e744a0edf469dac59c8f85a
result = valid
shared = 87b7f212b627f7a54ca5e0bcdaddd5389d9de6156cdbcf8ebe14ffbcfb436551
# tcId = 2
# normal case
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 9c647d9ae589b9f58fdc3ca4947efbc915c4b2e08e744a0edf469dac59c8f85a
result = valid
shared = 4b82bd8650ea9b81a42181840926a4ffa16434d1bf298de1db87efb5b0a9e34e
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 3
# public key on twist
curve = curve25519
private = 588c061a50804ac488ad774ac716c3f5ba714b2712e048491379a500211998a8
public = 63aa40c6e38346c5caf23a6df0a5e6c80889a08647e551b3563449befcfc9733
result = acceptable
shared = b1a707519495ffffb298ff941716b06dfab87cf8d91123fe2be9a233dda22212
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 4
# public key on twist
curve = curve25519
private = b05bfd32e55325d9fd648cb302848039000b390e44d521e58aab3b29a6960ba8
public = 0f83c36fded9d32fadf4efa3ae93a90bb5cfa66893bc412c43fa7287dbb99779
result = acceptable
shared = 67dd4a6e165533534c0e3f172e4ab8576bca923a5f07b2c069b4c310ff2e935b
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 5
# public key on twist
curve = curve25519
private = 70e34bcbe1f47fbc0fddfd7c1e1aa53d57bfe0f66d243067b424bb6210bed19c
public = 0b8211a2b6049097f6871c6c052d3c5fc1ba17da9e32ae458403b05bb283092a
result = acceptable
shared = 4a0638cfaa9ef1933b47f8939296a6b25be541ef7f70e844c0bcc00b134de64a
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 6
# public key on twist
curve = curve25519
private = 68c1f3a653a4cdb1d37bba94738f8b957a57beb24d646e994dc29a276aad458d
public = 343ac20a3b9c6a27b1008176509ad30735856ec1c8d8fcae13912d08d152f46c
result = acceptable
shared = 399491fce8dfab73b4f9f611de8ea0b27b28f85994250b0f475d585d042ac207
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 7
# public key on twist
curve = curve25519
private = d877b26d06dff9d9f7fd4c5b3769f8cdd5b30516a5ab806be324ff3eb69ea0b2
public = fa695fc7be8d1be5bf704898f388c452bafdd3b8eae805f8681a8d15c2d4e142
result = acceptable
shared = 2c4fe11d490a53861776b13b4354abd4cf5a97699db6e6c68c1626d07662f758
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 8
# public key = 0
curve = curve25519
private = 207494038f2bb811d47805bcdf04a2ac585ada7f2f23389bfd4658f9ddd4debc
public = 0000000000000000000000000000000000000000000000000000000000000000
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# The public key is insecure and does not belong to a valid private key. Some
# libraries reject such keys.
# tcId = 9
# public key = 1
curve = curve25519
private = 202e8972b61c7e61930eb9450b5070eae1c670475685541f0476217e4818cfab
public = 0100000000000000000000000000000000000000000000000000000000000000
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# The public key is insecure and does not belong to a valid private key. Some
# libraries reject such keys.
# tcId = 10
# edge case on twist
curve = curve25519
private = 38dde9f3e7b799045f9ac3793d4a9277dadeadc41bec0290f81f744f73775f84
public = 0200000000000000000000000000000000000000000000000000000000000000
result = acceptable
shared = 9a2cfe84ff9c4a9739625cae4a3b82a906877a441946f8d7b3d795fe8f5d1639
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 11
# edge case on twist
curve = curve25519
private = 9857a914e3c29036fd9a442ba526b5cdcdf28216153e636c10677acab6bd6aa5
public = 0300000000000000000000000000000000000000000000000000000000000000
result = acceptable
shared = 4da4e0aa072c232ee2f0fa4e519ae50b52c1edd08a534d4ef346c2e106d21d60
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 12
# edge case on twist
curve = curve25519
private = 48e2130d723305ed05e6e5894d398a5e33367a8c6aac8fcdf0a88e4b42820db7
public = ffffff030000f8ffff1f0000c0ffffff000000feffff070000f0ffff3f000000
result = acceptable
shared = 9ed10c53747f647f82f45125d3de15a1e6b824496ab40410ffcc3cfe95760f3b
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 13
# edge case on twist
curve = curve25519
private = 28f41011691851b3a62b641553b30d0dfddcb8fffcf53700a7be2f6a872e9fb0
public = 000000fcffff070000e0ffff3f000000ffffff010000f8ffff0f0000c0ffff7f
result = acceptable
shared = cf72b4aa6aa1c9f894f4165b86109aa468517648e1f0cc70e1ab08460176506b
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 14
# edge case on twist
curve = curve25519
private = 18a93b6499b9f6b3225ca02fef410e0adec23532321d2d8ef1a6d602a8c65b83
public = 00000000ffffffff00000000ffffffff00000000ffffffff00000000ffffff7f
result = acceptable
shared = 5d50b62836bb69579410386cf7bb811c14bf85b1c7b17e5924c7ffea91ef9e12
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 15
# edge case on twist
curve = curve25519
private = c01d1305a1338a1fcac2ba7e2e032b427e0b04903165aca957d8d0553d8717b0
public = eaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 19230eb148d5d67c3c22ab1daeff80a57eae4265ce2872657b2c8099fc698e50
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 16
# edge case for public key
curve = curve25519
private = 386f7f16c50731d64f82e6a170b142a4e34f31fd7768fcb8902925e7d1e21abe
public = 0400000000000000000000000000000000000000000000000000000000000000
result = valid
shared = 0fcab5d842a078d7a71fc59b57bfb4ca0be6873b49dcdb9f44e14ae8fbdfa542
# tcId = 17
# edge case for public key
curve = curve25519
private = e023a289bd5e90fa2804ddc019a05ef3e79d434bb6ea2f522ecb643a75296e95
public = ffffffff00000000ffffffff00000000ffffffff00000000ffffffff00000000
result = valid
shared = 54ce8f2275c077e3b1306a3939c5e03eef6bbb88060544758d9fef59b0bc3e4f
# tcId = 18
# edge case for public key
curve = curve25519
private = 68f010d62ee8d926053a361c3a75c6ea4ebdc8606ab285003a6f8f4076b01e83
public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03
result = valid
shared = f136775c5beb0af8110af10b20372332043cab752419678775a223df57c9d30d
# tcId = 19
# edge case for public key
curve = curve25519
private = 58ebcb35b0f8845caf1ec630f96576b62c4b7b6c36b29deb2cb0084651755c96
public = fffffffbfffffbffffdfffffdffffffffefffffefffff7fffff7ffffbfffff3f
result = valid
shared = bf9affd06b844085586460962ef2146ff3d4533d9444aab006eb88cc3054407d
# tcId = 20
# edge case for public key
curve = curve25519
private = 188c4bc5b9c44b38bb658b9b2ae82d5b01015e093184b17cb7863503a783e1bb
public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f
result = valid
shared = d480de04f699cb3be0684a9cc2e31281ea0bc5a9dcc157d3d20158d46ca5246d
# tcId = 21
# edge case for public key
curve = curve25519
private = e06c11bb2e13ce3dc7673f67f5482242909423a9ae95ee986a988d98faee23a2
public = fffffffffeffff7ffffffffffeffff7ffffffffffeffff7ffffffffffeffff7f
result = valid
shared = 4c4401cce6b51e4cb18f2790246c9bf914db667750a1cb89069092af07292276
# tcId = 22
# edge case for public key
curve = curve25519
private = c0658c46dde18129293877535b1162b6f9f5414a23cf4d2cbc140a4d99da2b8f
public = ebffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = valid
shared = 578ba8cc2dbdc575afcf9df2b3ee6189f5337d6854c79b4ce165ea12293b3a0f
# tcId = 23
# public key with low order
curve = curve25519
private = 10255c9230a97a30a458ca284a629669293a31890cda9d147febc7d1e22d6bb1
public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b800
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 24
# public key with low order
curve = curve25519
private = 78f1e8edf14481b389448dac8f59c70b038e7cf92ef2c7eff57a72466e115296
public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f1157
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 25
# public key with low order
curve = curve25519
private = a0a05a3e8f9f44204d5f8059a94ac7dfc39a49ac016dd743dbfa43c5d671fd88
public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 26
# public key with low order
curve = curve25519
private = d0dbb3ed1906663f15420af31f4eaf6509d9a9949723500605ad7c1c6e7450a9
public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 27
# public key with low order
curve = curve25519
private = c0b1d0eb22b244fe3291140072cdd9d989b5f0ecd96c100feb5bca241c1d9f8f
public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 28
# public key with low order
curve = curve25519
private = 480bf45f594942a8bc0f3353c6e8b8853d77f351f1c2ca6c2d1abf8a00b4229c
public = 0000000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 29
# public key with low order
curve = curve25519
private = 30f993fcf8514fc89bd8db14cd43ba0d4b2530e73c4276a05e1b145d420cedb4
public = 0100000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 30
# public key with low order
curve = curve25519
private = c04974b758380e2a5b5df6eb09bb2f6b3434f982722a8e676d3da251d1b3de83
public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b880
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 31
# public key with low order
curve = curve25519
private = 502a31373db32446842fe5add3e024022ea54f274182afc3d9f1bb3d39534eb5
public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f11d7
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 32
# public key with low order
curve = curve25519
private = 90fa6417b0e37030fd6e43eff2abaef14c6793117a039cf621318ba90f4e98be
public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 33
# public key with low order
curve = curve25519
private = 78ad3f26027f1c9fdd975a1613b947779bad2cf2b741ade01840885a30bb979c
public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 34
# public key with low order
curve = curve25519
private = 98e23de7b1e0926ed9c87e7b14baf55f497a1d7096f93977680e44dc1c7b7b8b
public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# Curve25519 or its twist contains some points of low order. This test vector
# contains a public key with such a point. While many libraries reject such
# public keys, doing so is not a strict requirement according to RFC 7748.
# tcId = 35
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 0000000000000000000000000000000000000000000000000000000000000000
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 36
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 0100000000000000000000000000000000000000000000000000000000000000
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 37
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 38
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f1157
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 39
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b800
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 40
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 41
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 42
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 0000000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 43
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 0100000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 44
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 45
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = 5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f11d7
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 46
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b880
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 47
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 48
# public key with low order
curve = curve25519
private = 1064a67da639a8f6df4fbea2d63358b65bca80a770712e14ea8a72df5a3313ae
public = eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000000
# tcId = 49
# public key >= p
curve = curve25519
private = f01e48dafac9d7bcf589cbc382c878d18bda3550589ffb5d50b523bebe329dae
public = efffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = bd36a0790eb883098c988b21786773de0b3a4df162282cf110de18dd484ce74b
# tcId = 50
# public key >= p
curve = curve25519
private = 288796bc5aff4b81a37501757bc0753a3c21964790d38699308debc17a6eaf8d
public = f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = b4e0dd76da7b071728b61f856771aa356e57eda78a5b1655cc3820fb5f854c5c
# tcId = 51
# public key >= p
curve = curve25519
private = 98df845f6651bf1138221f119041f72b6dbc3c4ace7143d99fd55ad867480da8
public = f1ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 6fdf6c37611dbd5304dc0f2eb7c9517eb3c50e12fd050ac6dec27071d4bfc034
# tcId = 52
# public key >= p
curve = curve25519
private = f09498e46f02f878829e78b803d316a2ed695d0498a08abdf8276930e24edcb0
public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
result = acceptable
shared = 4c8fc4b1c6ab88fb21f18f6d4c810240d4e94651ba44f7a2c863cec7dc56602d
# tcId = 53
# public key >= p
curve = curve25519
private = 1813c10a5c7f21f96e17f288c0cc37607c04c5f5aea2db134f9e2ffc66bd9db8
public = 0200000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 1cd0b28267dc541c642d6d7dca44a8b38a63736eef5c4e6501ffbbb1780c033c
# tcId = 54
# public key >= p
curve = curve25519
private = 7857fb808653645a0beb138a64f5f4d733a45ea84c3cda11a9c06f7e7139149e
public = 0300000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 8755be01c60a7e825cff3e0e78cb3aa4333861516aa59b1c51a8b2a543dfa822
# tcId = 55
# public key >= p
curve = curve25519
private = e03aa842e2abc56e81e87b8b9f417b2a1e5913c723eed28d752f8d47a59f498f
public = 0400000000000000000000000000000000000000000000000000000000000080
result = acceptable
shared = 54c9a1ed95e546d27822a360931dda60a1df049da6f904253c0612bbdc087476
# tcId = 56
# public key >= p
curve = curve25519
private = f8f707b7999b18cb0d6b96124f2045972ca274bfc154ad0c87038c24c6d0d4b2
public = daffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = cc1f40d743cdc2230e1043daba8b75e810f1fbab7f255269bd9ebb29e6bf494f
# tcId = 57
# public key >= p
curve = curve25519
private = a034f684fa631e1a348118c1ce4c98231f2d9eec9ba5365b4a05d69a785b0796
public = dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 54998ee43a5b007bf499f078e736524400a8b5c7e9b9b43771748c7cdf880412
# tcId = 58
# public key >= p
curve = curve25519
private = 30b6c6a0f2ffa680768f992ba89e152d5bc9893d38c9119be4f767bfab6e0ca5
public = dcffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = ead9b38efdd723637934e55ab717a7ae09eb86a21dc36a3feeb88b759e391e09
# tcId = 59
# public key >= p
curve = curve25519
private = 901b9dcf881e01e027575035d40b43bdc1c5242e030847495b0c7286469b6591
public = eaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 602ff40789b54b41805915fe2a6221f07a50ffc2c3fc94cf61f13d7904e88e0e
# tcId = 60
# public key >= p
curve = curve25519
private = 8046677c28fd82c9a1bdb71a1a1a34faba1225e2507fe3f54d10bd5b0d865f8e
public = ebffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = e00ae8b143471247ba24f12c885536c3cb981b58e1e56b2baf35c12ae1f79c26
# tcId = 61
# public key >= p
curve = curve25519
private = 602f7e2f68a846b82cc269b1d48e939886ae54fd636c1fe074d710127d472491
public = efffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 98cb9b50dd3fc2b0d4f2d2bf7c5cfdd10c8fcd31fc40af1ad44f47c131376362
# tcId = 62
# public key >= p
curve = curve25519
private = 60887b3dc72443026ebedbbbb70665f42b87add1440e7768fbd7e8e2ce5f639d
public = f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 38d6304c4a7e6d9f7959334fb5245bd2c754525d4c91db950206926234c1f633
# tcId = 63
# public key >= p
curve = curve25519
private = 78d31dfa854497d72d8def8a1b7fb006cec2d8c4924647c93814ae56faeda495
public = f1ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 786cd54996f014a5a031ec14db812ed08355061fdb5de680a800ac521f318e23
# tcId = 64
# public key >= p
curve = curve25519
private = c04c5baefa8302ddded6a4bb957761b4eb97aefa4fc3b8043085f96a5659b3a5
public = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
result = acceptable
shared = 29ae8bc73e9b10a08b4f681c43c3e0ac1a171d31b38f1a48efba29ae639ea134
# tcId = 65
# RFC 7748
curve = curve25519
private = a046e36bf0527c9d3b16154b82465edd62144c0ac1fc5a18506a2244ba449a44
public = e6db6867583030db3594c1a424b15f7c726624ec26b3353b10a903a6d0ab1c4c
result = valid
shared = c3da55379de9c6908e94ea4df28d084f32eccf03491c71f754b4075577a28552
# tcId = 66
# RFC 7748
curve = curve25519
private = 4866e9d4d1b4673c5ad22691957d6af5c11b6421e0ea01d42ca4169e7918ba4d
public = e5210f12786811d3f4b7959d0538ae2c31dbe7106fc03c3efc4cd549c715a413
result = valid
shared = 95cbde9476e8907d7aade45cb4b873f88b595a68799fa152e6f8f7647aac7957
# tcId = 67
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 0ab4e76380d84dde4f6833c58f2a9fb8f83bb0169b172be4b6e0592887741a36
result = acceptable
shared = 0200000000000000000000000000000000000000000000000000000000000000
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 68
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 89e10d5701b4337d2d032181538b1064bd4084401ceca1fd12663a1959388000
result = valid
shared = 0900000000000000000000000000000000000000000000000000000000000000
# tcId = 69
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 2b55d3aa4a8f80c8c0b2ae5f933e85af49beac36c2fa7394bab76c8933f8f81d
result = valid
shared = 1000000000000000000000000000000000000000000000000000000000000000
# tcId = 70
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 63e5b1fe9601fe84385d8866b0421262f78fbfa5aff9585e626679b18547d959
result = acceptable
shared = feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 71
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = e428f3dac17809f827a522ce32355058d07369364aa78902ee10139b9f9dd653
result = valid
shared = fcffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f
# tcId = 72
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = b3b50e3ed3a407b95de942ef74575b5ab8a10c09ee103544d60bdfed8138ab2b
result = acceptable
shared = f9ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 73
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 213fffe93d5ea8cd242e462844029922c43c77c9e3e42f562f485d24c501a20b
result = valid
shared = f3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff3f
# tcId = 74
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 91b232a178b3cd530932441e6139418f72172292f1da4c1834fc5ebfefb51e3f
result = valid
shared = ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03
# tcId = 75
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 045c6e11c5d332556c7822fe94ebf89b56a3878dc27ca079103058849fabcb4f
result = acceptable
shared = e5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 76
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 1ca2190b71163539063c35773bda0c9c928e9136f0620aeb093f099197b7f74e
result = acceptable
shared = e3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 77
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = f76e9010ac33c5043b2d3b76a842171000c4916222e9e85897a0aec7f6350b3c
result = valid
shared = ddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
# tcId = 78
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = bb72688d8f8aa7a39cd6060cd5c8093cdec6fe341937c3886a99346cd07faa55
result = acceptable
shared = dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 79
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 88fddea193391c6a5933ef9b71901549447205aae9da928a6b91a352ba10f41f
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000000002
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 80
# edge case for shared secret
curve = curve25519
private = a0a4f130b98a5be4b1cedb7cb85584a3520e142d474dc9ccb909a073a976bf63
public = 303b392f153116cad9cc682a00ccc44c95ff0d3bbe568beb6c4e739bafdc2c68
result = acceptable
shared = 0000000000000000000000000000000000000000000000000000000000008000
# Public keys are either points on curve25519 or points on its twist.
# Implementations may either reject such keys or compute X25519 using the twist.
# If a point multiplication is performed then it is important that the result is
# correct, since otherwise attacks with invalid keys are possible.
# tcId = 81
# checking for overflow
curve = curve25519
private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2
public = fd300aeb40e1fa582518412b49b208a7842b1e1f056a040178ea4141534f652d
result = valid
shared = b734105dc257585d73b566ccb76f062795ccbec89128e52b02f3e59639f13c46
# tcId = 82
# checking for overflow
curve = curve25519
private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2
public = c8ef79b514d7682677bc7931e06ee5c27c9b392b4ae9484473f554e6678ecc2e
result = valid
shared = 647a46b6fc3f40d62141ee3cee706b4d7a9271593a7b143e8e2e2279883e4550
# tcId = 83
# checking for overflow
curve = curve25519
private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2
public = 64aeac2504144861532b7bbcb6c87d67dd4c1f07ebc2e06effb95aecc6170b2c
result = valid
shared = 4ff03d5fb43cd8657a3cf37c138cadcecce509e4eba089d0ef40b4e4fb946155
# tcId = 84
# checking for overflow
curve = curve25519
private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2
public = bf68e35e9bdb7eee1b50570221860f5dcdad8acbab031b14974cc49013c49831
result = valid
shared = 21cee52efdbc812e1d021a4af1e1d8bc4db3c400e4d2a2c56a3926db4d99c65b
# tcId = 85
# checking for overflow
curve = curve25519
private = c81724704000b26d31703cc97e3a378d56fad8219361c88cca8bd7c5719b12b2
public = 5347c491331a64b43ddc683034e677f53dc32b52a52a577c15a83bf298e99f19
result = valid
shared = 18cb89e4e20c0c2bd324305245266c9327690bbe79acb88f5b8fb3f74eca3e52
# tcId = 86
# private key == -1 (mod order)
curve = curve25519
private = a023cdd083ef5bb82f10d62e59e15a6800000000000000000000000000000050
public = 258e04523b8d253ee65719fc6906c657192d80717edc828fa0af21686e2faa75
result = valid
shared = 258e04523b8d253ee65719fc6906c657192d80717edc828fa0af21686e2faa75
# tcId = 87
# private key == 1 (mod order) on twist
curve = curve25519
private = 58083dd261ad91eff952322ec824c682ffffffffffffffffffffffffffffff5f
public = 2eae5ec3dd494e9f2d37d258f873a8e6e9d0dbd1e383ef64d98bb91b3e0be035
result = acceptable
shared = 2eae5ec3dd494e9f2d37d258f873a8e6e9d0dbd1e383ef64d98bb91b3e0be035