-rw-r--r-- 10067 libntruprime-20240825/command/ntruprime-test_kem_sntrup653.c raw
/* ----- kem/sntrup653, derived from supercop/crypto_kem/try.c */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdint.h>
#include <ntruprime.h>
#include "ntruprime_test.h"
#define fail ((ok = 0),printf)
static const char *kem_sntrup653_checksums[] = {
"dda0bd7591a594a50d92d582175ec8465f5e17e464d115d3320de3b3baf82d1f",
"573607988fa717eb6a3f951e4263581130b77f80b3c4b3a05c416069ae8c4cf3",
} ;
static int (*crypto_kem_keypair)(unsigned char *,unsigned char *);
static int (*crypto_kem_enc)(unsigned char *,unsigned char *,const unsigned char *);
static int (*crypto_kem_dec)(unsigned char *,const unsigned char *,const unsigned char *);
#define crypto_kem_SECRETKEYBYTES ntruprime_kem_sntrup653_SECRETKEYBYTES
#define crypto_kem_PUBLICKEYBYTES ntruprime_kem_sntrup653_PUBLICKEYBYTES
#define crypto_kem_CIPHERTEXTBYTES ntruprime_kem_sntrup653_CIPHERTEXTBYTES
#define crypto_kem_BYTES ntruprime_kem_sntrup653_BYTES
static void *storage_kem_sntrup653_p;
static unsigned char *test_kem_sntrup653_p;
static void *storage_kem_sntrup653_s;
static unsigned char *test_kem_sntrup653_s;
static void *storage_kem_sntrup653_k;
static unsigned char *test_kem_sntrup653_k;
static void *storage_kem_sntrup653_c;
static unsigned char *test_kem_sntrup653_c;
static void *storage_kem_sntrup653_t;
static unsigned char *test_kem_sntrup653_t;
static void *storage_kem_sntrup653_p2;
static unsigned char *test_kem_sntrup653_p2;
static void *storage_kem_sntrup653_s2;
static unsigned char *test_kem_sntrup653_s2;
static void *storage_kem_sntrup653_k2;
static unsigned char *test_kem_sntrup653_k2;
static void *storage_kem_sntrup653_c2;
static unsigned char *test_kem_sntrup653_c2;
static void *storage_kem_sntrup653_t2;
static unsigned char *test_kem_sntrup653_t2;
static void test_kem_sntrup653_impl(long long impl)
{
unsigned char *p = test_kem_sntrup653_p;
unsigned char *s = test_kem_sntrup653_s;
unsigned char *k = test_kem_sntrup653_k;
unsigned char *c = test_kem_sntrup653_c;
unsigned char *t = test_kem_sntrup653_t;
unsigned char *p2 = test_kem_sntrup653_p2;
unsigned char *s2 = test_kem_sntrup653_s2;
unsigned char *k2 = test_kem_sntrup653_k2;
unsigned char *c2 = test_kem_sntrup653_c2;
unsigned char *t2 = test_kem_sntrup653_t2;
long long plen = crypto_kem_PUBLICKEYBYTES;
long long slen = crypto_kem_SECRETKEYBYTES;
long long klen = crypto_kem_BYTES;
long long clen = crypto_kem_CIPHERTEXTBYTES;
long long tlen = crypto_kem_BYTES;
if (targeti && strcmp(targeti,".") && strcmp(targeti,ntruprime_dispatch_kem_sntrup653_implementation(impl))) return;
if (targetn && atol(targetn) != impl) return;
if (impl >= 0) {
crypto_kem_keypair = ntruprime_dispatch_kem_sntrup653_keypair(impl);
crypto_kem_enc = ntruprime_dispatch_kem_sntrup653_enc(impl);
crypto_kem_dec = ntruprime_dispatch_kem_sntrup653_dec(impl);
printf("kem_sntrup653 %lld implementation %s compiler %s\n",impl,ntruprime_dispatch_kem_sntrup653_implementation(impl),ntruprime_dispatch_kem_sntrup653_compiler(impl));
} else {
crypto_kem_keypair = ntruprime_kem_sntrup653_keypair;
crypto_kem_enc = ntruprime_kem_sntrup653_enc;
crypto_kem_dec = ntruprime_kem_sntrup653_dec;
printf("kem_sntrup653 selected implementation %s compiler %s\n",ntruprime_kem_sntrup653_implementation(),ntruprime_kem_sntrup653_compiler());
}
for (long long checksumbig = 0;checksumbig < 2;++checksumbig) {
long long loops = checksumbig ? 64 : 8;
checksum_clear();
for (long long loop = 0;loop < loops;++loop) {
int result;
output_prepare(p2,p,plen);
output_prepare(s2,s,slen);
result = crypto_kem_keypair(p,s);
public(&result,sizeof result);
if (result != 0) fail("failure: crypto_kem_keypair returns nonzero\n");
public(p,plen);
public(s,slen);
checksum(p,plen);
checksum(s,slen);
output_compare(p2,p,plen,"crypto_kem_keypair");
output_compare(s2,s,slen,"crypto_kem_keypair");
output_prepare(c2,c,clen);
output_prepare(k2,k,klen);
memcpy(p2,p,plen);
double_canary(p2,p,plen);
secret(p,plen);
result = crypto_kem_enc(c,k,p);
public(&result,sizeof result);
if (result != 0) fail("failure: crypto_kem_enc returns nonzero\n");
public(p,plen);
public(c,clen);
public(k,klen);
checksum(c,clen);
checksum(k,klen);
output_compare(c2,c,clen,"crypto_kem_enc");
output_compare(k2,k,klen,"crypto_kem_enc");
input_compare(p2,p,plen,"crypto_kem_enc");
output_prepare(t2,t,tlen);
memcpy(c2,c,clen);
double_canary(c2,c,clen);
memcpy(s2,s,slen);
double_canary(s2,s,slen);
secret(c,clen);
secret(s,slen);
result = crypto_kem_dec(t,c,s);
public(&result,sizeof result);
if (result != 0) fail("failure: crypto_kem_dec returns nonzero\n");
public(c,clen);
public(s,slen);
public(t,tlen);
if (memcmp(t,k,klen) != 0) fail("failure: crypto_kem_dec does not match k\n");
checksum(t,tlen);
output_compare(t2,t,tlen,"crypto_kem_dec");
input_compare(c2,c,clen,"crypto_kem_dec");
input_compare(s2,s,slen,"crypto_kem_dec");
double_canary(t2,t,tlen);
double_canary(c2,c,clen);
double_canary(s2,s,slen);
secret(c2,clen);
secret(s2,slen);
result = crypto_kem_dec(t2,c2,s2);
public(&result,sizeof result);
if (result != 0) fail("failure: crypto_kem_dec returns nonzero\n");
public(c2,clen);
public(s2,slen);
public(t2,tlen);
if (memcmp(t2,t,tlen) != 0) fail("failure: crypto_kem_dec is nondeterministic\n");
double_canary(t2,t,tlen);
double_canary(c2,c,clen);
double_canary(s2,s,slen);
secret(c2,clen);
secret(s,slen);
result = crypto_kem_dec(c2,c2,s);
public(&result,sizeof result);
if (result != 0) fail("failure: crypto_kem_dec with c=t overlap returns nonzero\n");
public(c2,tlen);
public(s,slen);
if (memcmp(c2,t,tlen) != 0) fail("failure: crypto_kem_dec does not handle c=t overlap\n");
memcpy(c2,c,clen);
secret(c,clen);
secret(s2,slen);
result = crypto_kem_dec(s2,c,s2);
public(&result,sizeof result);
if (result != 0) fail("failure: crypto_kem_dec with s=t overlap returns nonzero\n");
public(s2,tlen);
public(c,clen);
if (memcmp(s2,t,tlen) != 0) fail("failure: crypto_kem_dec does not handle s=t overlap\n");
memcpy(s2,s,slen);
c[myrandom() % clen] += 1 + (myrandom() % 255);
if (crypto_kem_dec(t,c,s) == 0)
checksum(t,tlen);
else
checksum(c,clen);
c[myrandom() % clen] += 1 + (myrandom() % 255);
if (crypto_kem_dec(t,c,s) == 0)
checksum(t,tlen);
else
checksum(c,clen);
c[myrandom() % clen] += 1 + (myrandom() % 255);
if (crypto_kem_dec(t,c,s) == 0)
checksum(t,tlen);
else
checksum(c,clen);
}
checksum_expected(kem_sntrup653_checksums[checksumbig]);
}
}
void test_kem_sntrup653(void)
{
long long maxalloc = 0;
if (targeto && strcmp(targeto,"kem")) return;
if (targetp && strcmp(targetp,"sntrup653")) return;
storage_kem_sntrup653_p = callocplus(crypto_kem_PUBLICKEYBYTES);
test_kem_sntrup653_p = aligned(storage_kem_sntrup653_p,crypto_kem_PUBLICKEYBYTES);
if (crypto_kem_PUBLICKEYBYTES > maxalloc) maxalloc = crypto_kem_PUBLICKEYBYTES;
storage_kem_sntrup653_s = callocplus(crypto_kem_SECRETKEYBYTES);
test_kem_sntrup653_s = aligned(storage_kem_sntrup653_s,crypto_kem_SECRETKEYBYTES);
if (crypto_kem_SECRETKEYBYTES > maxalloc) maxalloc = crypto_kem_SECRETKEYBYTES;
storage_kem_sntrup653_k = callocplus(crypto_kem_BYTES);
test_kem_sntrup653_k = aligned(storage_kem_sntrup653_k,crypto_kem_BYTES);
if (crypto_kem_BYTES > maxalloc) maxalloc = crypto_kem_BYTES;
storage_kem_sntrup653_c = callocplus(crypto_kem_CIPHERTEXTBYTES);
test_kem_sntrup653_c = aligned(storage_kem_sntrup653_c,crypto_kem_CIPHERTEXTBYTES);
if (crypto_kem_CIPHERTEXTBYTES > maxalloc) maxalloc = crypto_kem_CIPHERTEXTBYTES;
storage_kem_sntrup653_t = callocplus(crypto_kem_BYTES);
test_kem_sntrup653_t = aligned(storage_kem_sntrup653_t,crypto_kem_BYTES);
if (crypto_kem_BYTES > maxalloc) maxalloc = crypto_kem_BYTES;
storage_kem_sntrup653_p2 = callocplus(maxalloc);
test_kem_sntrup653_p2 = aligned(storage_kem_sntrup653_p2,crypto_kem_PUBLICKEYBYTES);
storage_kem_sntrup653_s2 = callocplus(maxalloc);
test_kem_sntrup653_s2 = aligned(storage_kem_sntrup653_s2,crypto_kem_SECRETKEYBYTES);
storage_kem_sntrup653_k2 = callocplus(maxalloc);
test_kem_sntrup653_k2 = aligned(storage_kem_sntrup653_k2,crypto_kem_BYTES);
storage_kem_sntrup653_c2 = callocplus(maxalloc);
test_kem_sntrup653_c2 = aligned(storage_kem_sntrup653_c2,crypto_kem_CIPHERTEXTBYTES);
storage_kem_sntrup653_t2 = callocplus(maxalloc);
test_kem_sntrup653_t2 = aligned(storage_kem_sntrup653_t2,crypto_kem_BYTES);
for (long long offset = 0;offset < 2;++offset) {
if (targetoffset && atol(targetoffset) != offset) continue;
if (offset && valgrind) break;
printf("kem_sntrup653 offset %lld\n",offset);
for (long long impl = -1;impl < ntruprime_numimpl_kem_sntrup653();++impl)
forked(test_kem_sntrup653_impl,impl);
++test_kem_sntrup653_p;
++test_kem_sntrup653_s;
++test_kem_sntrup653_k;
++test_kem_sntrup653_c;
++test_kem_sntrup653_t;
++test_kem_sntrup653_p2;
++test_kem_sntrup653_s2;
++test_kem_sntrup653_k2;
++test_kem_sntrup653_c2;
++test_kem_sntrup653_t2;
}
free(storage_kem_sntrup653_t2);
free(storage_kem_sntrup653_c2);
free(storage_kem_sntrup653_k2);
free(storage_kem_sntrup653_s2);
free(storage_kem_sntrup653_p2);
free(storage_kem_sntrup653_t);
free(storage_kem_sntrup653_c);
free(storage_kem_sntrup653_k);
free(storage_kem_sntrup653_s);
free(storage_kem_sntrup653_p);
}
#undef crypto_kem_SECRETKEYBYTES
#undef crypto_kem_PUBLICKEYBYTES
#undef crypto_kem_CIPHERTEXTBYTES
#undef crypto_kem_BYTES