Browse Source

fixup! Fix uint8_t to uint16_t upcast in Frodo

kyber
Thom Wiggers 4 years ago
committed by Kris Kwiatkowski
parent
commit
5b5956c2ef
12 changed files with 12 additions and 12 deletions
  1. +1
    -1
      crypto_kem/frodokem1344aes/clean/kem.c
  2. +1
    -1
      crypto_kem/frodokem1344aes/opt/kem.c
  3. +1
    -1
      crypto_kem/frodokem1344shake/clean/kem.c
  4. +1
    -1
      crypto_kem/frodokem1344shake/opt/kem.c
  5. +1
    -1
      crypto_kem/frodokem640aes/clean/kem.c
  6. +1
    -1
      crypto_kem/frodokem640aes/opt/kem.c
  7. +1
    -1
      crypto_kem/frodokem640shake/clean/kem.c
  8. +1
    -1
      crypto_kem/frodokem640shake/opt/kem.c
  9. +1
    -1
      crypto_kem/frodokem976aes/clean/kem.c
  10. +1
    -1
      crypto_kem/frodokem976aes/opt/kem.c
  11. +1
    -1
      crypto_kem/frodokem976shake/clean/kem.c
  12. +1
    -1
      crypto_kem/frodokem976shake/opt/kem.c

+ 1
- 1
crypto_kem/frodokem1344aes/clean/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem1344aes/opt/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, c
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem1344shake/clean/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *c
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem1344shake/opt/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem640aes/clean/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem640aes/opt/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, co
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem640shake/clean/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem640shake/opt/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem976aes/clean/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem976aes/opt/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, co
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem976shake/clean/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


+ 1
- 1
crypto_kem/frodokem976shake/opt/kem.c View File

@@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data

for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
S[i] = sk_S[2 * i] | (sk_S[2 * i + 1] << 8);
}

// Compute W = C - Bp*S (mod q), and decode the randomness mu


Loading…
Cancel
Save