And a supporting P256 scalar (private key) testing function. The function to actually generate the P256 private key is not included, as it can be generated using hkdf, a simple keccak256, entropy, or a hardware secret; and then the generation is fallible and recovery mechanism might vary depending on the application.
The curve order here can be verified against a rust crate, a website, and from the NIST spec manually.
And a supporting P256 scalar (private key) testing function. The function to actually generate the P256 private key is not included, as it can be generated using hkdf, a simple
keccak256
, entropy, or a hardware secret; and then the generation is fallible and recovery mechanism might vary depending on the application.The curve order here can be verified against a rust crate, a website, and from the NIST spec manually.