2021-03-24 10:25:45 +00:00
|
|
|
#include <algorithm>
|
|
|
|
#include <vector>
|
|
|
|
#include <gtest/gtest.h>
|
2021-03-24 23:34:34 +00:00
|
|
|
#include <pqc/pqc.h>
|
2021-03-24 10:25:45 +00:00
|
|
|
|
2021-05-10 14:01:57 +01:00
|
|
|
TEST(RoundTrip,KEM) {
|
2021-03-24 10:25:45 +00:00
|
|
|
|
2021-03-24 23:22:44 +00:00
|
|
|
for (int i=0; i<PQC_ALG_KEM_MAX; i++) {
|
|
|
|
const params_t *p = pqc_kem_alg_by_id(i);
|
2021-03-24 10:25:45 +00:00
|
|
|
|
|
|
|
std::vector<uint8_t> ct(ciphertext_bsz(p));
|
|
|
|
std::vector<uint8_t> ss1(shared_secret_bsz(p));
|
|
|
|
std::vector<uint8_t> ss2(shared_secret_bsz(p));
|
|
|
|
std::vector<uint8_t> sk(private_key_bsz(p));
|
|
|
|
std::vector<uint8_t> pk(public_key_bsz(p));
|
|
|
|
|
|
|
|
ASSERT_TRUE(
|
|
|
|
pqc_keygen(p, pk.data(), sk.data()));
|
|
|
|
ASSERT_TRUE(
|
|
|
|
pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data()));
|
|
|
|
ASSERT_TRUE(
|
|
|
|
pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data()));
|
|
|
|
ASSERT_TRUE(
|
|
|
|
std::equal(ss1.begin(), ss1.end(), ss2.begin()));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-10 14:01:57 +01:00
|
|
|
TEST(RoundTrip,SIGN) {
|
2021-03-24 10:25:45 +00:00
|
|
|
|
2021-05-10 14:01:57 +01:00
|
|
|
for (int i=PICNIC3L1; i<PQC_ALG_SIG_MAX; i++) {
|
2021-03-24 23:22:44 +00:00
|
|
|
const params_t *p = pqc_sig_alg_by_id(i);
|
2021-03-24 10:25:45 +00:00
|
|
|
|
|
|
|
uint8_t msg[1234];
|
|
|
|
std::vector<uint8_t> sig(signature_bsz(p));
|
|
|
|
std::vector<uint8_t> sk(private_key_bsz(p));
|
|
|
|
std::vector<uint8_t> pk(public_key_bsz(p));
|
|
|
|
|
|
|
|
ASSERT_TRUE(
|
|
|
|
pqc_keygen(p, pk.data(), sk.data()));
|
|
|
|
uint64_t sigsz = sig.size();
|
|
|
|
ASSERT_TRUE(
|
|
|
|
pqc_sig_create(p, sig.data(), &sigsz, msg, 1234, sk.data()));
|
|
|
|
ASSERT_TRUE(
|
|
|
|
pqc_sig_verify(p, sig.data(), sigsz, msg, 1234, pk.data()));
|
|
|
|
}
|
|
|
|
}
|