File: crypto_kem_sntrup4591761test.c

package info (click to toggle)
tinyssh 20190101-1%2Bdeb11u1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 2,208 kB
  • sloc: ansic: 11,914; sh: 1,005; python: 385; makefile: 18
file content (77 lines) | stat: -rw-r--r-- 3,250 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
/*
20181229
Jan Mojzis
Public domain.
*/

#include "misc.h"
#include "crypto_kem_sntrup4591761.h"
#include "crypto_kem_sntrup4591761test.data"

unsigned char sk[crypto_kem_sntrup4591761_SECRETKEYBYTES + 16];
unsigned char pk[crypto_kem_sntrup4591761_PUBLICKEYBYTES + 16];
unsigned char c[crypto_kem_sntrup4591761_CIPHERTEXTBYTES + 16];
unsigned char k1[crypto_kem_sntrup4591761_BYTES + 16];
unsigned char k2[crypto_kem_sntrup4591761_BYTES + 16];
#define xk2 k2

static void test_random(void) {

    long long i, j;

    for (i = 0; i < 16; ++i) {
        if (crypto_kem_sntrup4591761_keypair(pk + i, sk + i) != 0) {
            fail_printdata("pk", pk + i, crypto_kem_sntrup4591761_PUBLICKEYBYTES);
            fail_printdata("sk", sk + i, crypto_kem_sntrup4591761_SECRETKEYBYTES);
            fail("crypto_kem_sntrup4591761_keypair() failure, please report it !!!!!!!!!");
        }
        if (crypto_kem_sntrup4591761_enc(c + i, k1 + i, pk + i) != 0) {
            fail_printdata("pk", pk + i, crypto_kem_sntrup4591761_PUBLICKEYBYTES);
            fail_printdata("sk", sk + i, crypto_kem_sntrup4591761_SECRETKEYBYTES);
            fail_printdata("c", c + i, crypto_kem_sntrup4591761_CIPHERTEXTBYTES);
            fail_printdata("k1", k1 + i, crypto_kem_sntrup4591761_BYTES);
            fail("crypto_kem_sntrup4591761_enc() failure, please report it !!!!!!!!!");
        }
        if (crypto_kem_sntrup4591761_dec(k2 + i, c + i, sk + i) != 0) {
            fail_printdata("pk", pk + i, crypto_kem_sntrup4591761_PUBLICKEYBYTES);
            fail_printdata("sk", sk + i, crypto_kem_sntrup4591761_SECRETKEYBYTES);
            fail_printdata("c", c + i, crypto_kem_sntrup4591761_CIPHERTEXTBYTES);
            fail_printdata("k1", k1 + i, crypto_kem_sntrup4591761_BYTES);
            fail_printdata("k2", k2 + i, crypto_kem_sntrup4591761_BYTES);
            fail("crypto_kem_sntrup4591761_dec() failure, please report it !!!!!!!!!");
        }
        for (j = 0; j < crypto_kem_sntrup4591761_BYTES; ++j) if (k1[i + j] != k2[i + j]) {
            fail_printdata("pk", pk + i, crypto_kem_sntrup4591761_PUBLICKEYBYTES);
            fail_printdata("sk", sk + i, crypto_kem_sntrup4591761_SECRETKEYBYTES);
            fail_printdata("c", c + i, crypto_kem_sntrup4591761_CIPHERTEXTBYTES);
            fail_printdata("k1", k1 + i, crypto_kem_sntrup4591761_BYTES);
            fail_printdata("k2", k2 + i, crypto_kem_sntrup4591761_BYTES);
            fail("crypto_kem_sntrup4591761_dec() failure, please report it !!!!!!!!!");
        }
    }
}

static void test_dec(void) {

    long long j;

    if (crypto_kem_sntrup4591761_dec(xk2, xc, xsk) != 0) {
        fail_printdata("xk1", xk1, crypto_kem_sntrup4591761_BYTES);
        fail_printdata("xk2", xk2, crypto_kem_sntrup4591761_BYTES);
        fail("crypto_kem_sntrup4591761_dec() failure, please report it !!!!!!!!!");
    }
    for (j = 0; j < crypto_kem_sntrup4591761_BYTES; ++j) if (xk1[j] != xk2[j]) {
        fail_printdata("xk1", xk1, crypto_kem_sntrup4591761_BYTES);
        fail_printdata("xk2", xk2, crypto_kem_sntrup4591761_BYTES);
        fail("crypto_kem_sntrup4591761_dec() failure, please report it !!!!!!!!!");
    }
}


int main(void) {

    test_dec();
    test_random();

    _exit(0);
}