-rw-r--r-- 9150 libntruprime-20241021/command/ntruprime-test_kem_sntrup653.c raw
/* ----- kem/sntrup653, derived from supercop/crypto_kem/try.c */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <stdint.h> #include <ntruprime.h> #include "ntruprime_test.h" #define fail ((ok = 0),printf) static const char *kem_sntrup653_checksums[] = { "dda0bd7591a594a50d92d582175ec8465f5e17e464d115d3320de3b3baf82d1f", "573607988fa717eb6a3f951e4263581130b77f80b3c4b3a05c416069ae8c4cf3", } ; static void (*crypto_kem_keypair)(unsigned char *,unsigned char *); static void (*crypto_kem_enc)(unsigned char *,unsigned char *,const unsigned char *); static void (*crypto_kem_dec)(unsigned char *,const unsigned char *,const unsigned char *); #define crypto_kem_SECRETKEYBYTES ntruprime_kem_sntrup653_SECRETKEYBYTES #define crypto_kem_PUBLICKEYBYTES ntruprime_kem_sntrup653_PUBLICKEYBYTES #define crypto_kem_CIPHERTEXTBYTES ntruprime_kem_sntrup653_CIPHERTEXTBYTES #define crypto_kem_BYTES ntruprime_kem_sntrup653_BYTES static void *storage_kem_sntrup653_p; static unsigned char *test_kem_sntrup653_p; static void *storage_kem_sntrup653_s; static unsigned char *test_kem_sntrup653_s; static void *storage_kem_sntrup653_k; static unsigned char *test_kem_sntrup653_k; static void *storage_kem_sntrup653_c; static unsigned char *test_kem_sntrup653_c; static void *storage_kem_sntrup653_t; static unsigned char *test_kem_sntrup653_t; static void *storage_kem_sntrup653_p2; static unsigned char *test_kem_sntrup653_p2; static void *storage_kem_sntrup653_s2; static unsigned char *test_kem_sntrup653_s2; static void *storage_kem_sntrup653_k2; static unsigned char *test_kem_sntrup653_k2; static void *storage_kem_sntrup653_c2; static unsigned char *test_kem_sntrup653_c2; static void *storage_kem_sntrup653_t2; static unsigned char *test_kem_sntrup653_t2; static void test_kem_sntrup653_impl(long long impl) { unsigned char *p = test_kem_sntrup653_p; unsigned char *s = test_kem_sntrup653_s; unsigned char *k = test_kem_sntrup653_k; unsigned char *c = test_kem_sntrup653_c; unsigned char *t = test_kem_sntrup653_t; unsigned char *p2 = test_kem_sntrup653_p2; unsigned char *s2 = test_kem_sntrup653_s2; unsigned char *k2 = test_kem_sntrup653_k2; unsigned char *c2 = test_kem_sntrup653_c2; unsigned char *t2 = test_kem_sntrup653_t2; long long plen = crypto_kem_PUBLICKEYBYTES; long long slen = crypto_kem_SECRETKEYBYTES; long long klen = crypto_kem_BYTES; long long clen = crypto_kem_CIPHERTEXTBYTES; long long tlen = crypto_kem_BYTES; if (targeti && strcmp(targeti,".") && strcmp(targeti,ntruprime_dispatch_kem_sntrup653_implementation(impl))) return; if (targetn && atol(targetn) != impl) return; if (impl >= 0) { crypto_kem_keypair = ntruprime_dispatch_kem_sntrup653_keypair(impl); crypto_kem_enc = ntruprime_dispatch_kem_sntrup653_enc(impl); crypto_kem_dec = ntruprime_dispatch_kem_sntrup653_dec(impl); printf("kem_sntrup653 %lld implementation %s compiler %s\n",impl,ntruprime_dispatch_kem_sntrup653_implementation(impl),ntruprime_dispatch_kem_sntrup653_compiler(impl)); } else { crypto_kem_keypair = ntruprime_kem_sntrup653_keypair; crypto_kem_enc = ntruprime_kem_sntrup653_enc; crypto_kem_dec = ntruprime_kem_sntrup653_dec; printf("kem_sntrup653 selected implementation %s compiler %s\n",ntruprime_kem_sntrup653_implementation(),ntruprime_kem_sntrup653_compiler()); } for (long long checksumbig = 0;checksumbig < 2;++checksumbig) { long long loops = checksumbig ? 64 : 8; checksum_clear(); for (long long loop = 0;loop < loops;++loop) { output_prepare(p2,p,plen); output_prepare(s2,s,slen); crypto_kem_keypair(p,s); public(p,plen); public(s,slen); checksum(p,plen); checksum(s,slen); output_compare(p2,p,plen,"crypto_kem_keypair"); output_compare(s2,s,slen,"crypto_kem_keypair"); output_prepare(c2,c,clen); output_prepare(k2,k,klen); memcpy(p2,p,plen); double_canary(p2,p,plen); secret(p,plen); crypto_kem_enc(c,k,p); public(p,plen); public(c,clen); public(k,klen); checksum(c,clen); checksum(k,klen); output_compare(c2,c,clen,"crypto_kem_enc"); output_compare(k2,k,klen,"crypto_kem_enc"); input_compare(p2,p,plen,"crypto_kem_enc"); output_prepare(t2,t,tlen); memcpy(c2,c,clen); double_canary(c2,c,clen); memcpy(s2,s,slen); double_canary(s2,s,slen); secret(c,clen); secret(s,slen); crypto_kem_dec(t,c,s); public(c,clen); public(s,slen); public(t,tlen); if (memcmp(t,k,klen) != 0) fail("failure: crypto_kem_dec does not match k\n"); checksum(t,tlen); output_compare(t2,t,tlen,"crypto_kem_dec"); input_compare(c2,c,clen,"crypto_kem_dec"); input_compare(s2,s,slen,"crypto_kem_dec"); double_canary(t2,t,tlen); double_canary(c2,c,clen); double_canary(s2,s,slen); secret(c2,clen); secret(s2,slen); crypto_kem_dec(t2,c2,s2); public(c2,clen); public(s2,slen); public(t2,tlen); if (memcmp(t2,t,tlen) != 0) fail("failure: crypto_kem_dec is nondeterministic\n"); double_canary(t2,t,tlen); double_canary(c2,c,clen); double_canary(s2,s,slen); secret(c2,clen); secret(s,slen); crypto_kem_dec(c2,c2,s); public(c2,tlen); public(s,slen); if (memcmp(c2,t,tlen) != 0) fail("failure: crypto_kem_dec does not handle c=t overlap\n"); memcpy(c2,c,clen); secret(c,clen); secret(s2,slen); crypto_kem_dec(s2,c,s2); public(s2,tlen); public(c,clen); if (memcmp(s2,t,tlen) != 0) fail("failure: crypto_kem_dec does not handle s=t overlap\n"); memcpy(s2,s,slen); c[myrandom() % clen] += 1 + (myrandom() % 255); crypto_kem_dec(t,c,s); checksum(t,tlen); c[myrandom() % clen] += 1 + (myrandom() % 255); crypto_kem_dec(t,c,s); checksum(t,tlen); c[myrandom() % clen] += 1 + (myrandom() % 255); crypto_kem_dec(t,c,s); checksum(t,tlen); } checksum_expected(kem_sntrup653_checksums[checksumbig]); } } void test_kem_sntrup653(void) { long long maxalloc = 0; if (targeto && strcmp(targeto,"kem")) return; if (targetp && strcmp(targetp,"sntrup653")) return; storage_kem_sntrup653_p = callocplus(crypto_kem_PUBLICKEYBYTES); test_kem_sntrup653_p = aligned(storage_kem_sntrup653_p,crypto_kem_PUBLICKEYBYTES); if (crypto_kem_PUBLICKEYBYTES > maxalloc) maxalloc = crypto_kem_PUBLICKEYBYTES; storage_kem_sntrup653_s = callocplus(crypto_kem_SECRETKEYBYTES); test_kem_sntrup653_s = aligned(storage_kem_sntrup653_s,crypto_kem_SECRETKEYBYTES); if (crypto_kem_SECRETKEYBYTES > maxalloc) maxalloc = crypto_kem_SECRETKEYBYTES; storage_kem_sntrup653_k = callocplus(crypto_kem_BYTES); test_kem_sntrup653_k = aligned(storage_kem_sntrup653_k,crypto_kem_BYTES); if (crypto_kem_BYTES > maxalloc) maxalloc = crypto_kem_BYTES; storage_kem_sntrup653_c = callocplus(crypto_kem_CIPHERTEXTBYTES); test_kem_sntrup653_c = aligned(storage_kem_sntrup653_c,crypto_kem_CIPHERTEXTBYTES); if (crypto_kem_CIPHERTEXTBYTES > maxalloc) maxalloc = crypto_kem_CIPHERTEXTBYTES; storage_kem_sntrup653_t = callocplus(crypto_kem_BYTES); test_kem_sntrup653_t = aligned(storage_kem_sntrup653_t,crypto_kem_BYTES); if (crypto_kem_BYTES > maxalloc) maxalloc = crypto_kem_BYTES; storage_kem_sntrup653_p2 = callocplus(maxalloc); test_kem_sntrup653_p2 = aligned(storage_kem_sntrup653_p2,crypto_kem_PUBLICKEYBYTES); storage_kem_sntrup653_s2 = callocplus(maxalloc); test_kem_sntrup653_s2 = aligned(storage_kem_sntrup653_s2,crypto_kem_SECRETKEYBYTES); storage_kem_sntrup653_k2 = callocplus(maxalloc); test_kem_sntrup653_k2 = aligned(storage_kem_sntrup653_k2,crypto_kem_BYTES); storage_kem_sntrup653_c2 = callocplus(maxalloc); test_kem_sntrup653_c2 = aligned(storage_kem_sntrup653_c2,crypto_kem_CIPHERTEXTBYTES); storage_kem_sntrup653_t2 = callocplus(maxalloc); test_kem_sntrup653_t2 = aligned(storage_kem_sntrup653_t2,crypto_kem_BYTES); for (long long offset = 0;offset < 2;++offset) { if (targetoffset && atol(targetoffset) != offset) continue; if (offset && valgrind) break; printf("kem_sntrup653 offset %lld\n",offset); for (long long impl = -1;impl < ntruprime_numimpl_kem_sntrup653();++impl) forked(test_kem_sntrup653_impl,impl); ++test_kem_sntrup653_p; ++test_kem_sntrup653_s; ++test_kem_sntrup653_k; ++test_kem_sntrup653_c; ++test_kem_sntrup653_t; ++test_kem_sntrup653_p2; ++test_kem_sntrup653_s2; ++test_kem_sntrup653_k2; ++test_kem_sntrup653_c2; ++test_kem_sntrup653_t2; } free(storage_kem_sntrup653_t2); free(storage_kem_sntrup653_c2); free(storage_kem_sntrup653_k2); free(storage_kem_sntrup653_s2); free(storage_kem_sntrup653_p2); free(storage_kem_sntrup653_t); free(storage_kem_sntrup653_c); free(storage_kem_sntrup653_k); free(storage_kem_sntrup653_s); free(storage_kem_sntrup653_p); } #undef crypto_kem_SECRETKEYBYTES #undef crypto_kem_PUBLICKEYBYTES #undef crypto_kem_CIPHERTEXTBYTES #undef crypto_kem_BYTES