#include #include #include #include #include #include TEST(KEM,OneOff) { for (int i=0; i ct(pqc_ciphertext_bsz(p)); std::vector ss1(pqc_shared_secret_bsz(p)); std::vector ss2(pqc_shared_secret_bsz(p)); std::vector sk(pqc_private_key_bsz(p)); std::vector pk(pqc_public_key_bsz(p)); ASSERT_TRUE( pqc_keygen(p, pk.data(), sk.data())); ASSERT_TRUE( pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data())); ASSERT_TRUE( pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data())); ASSERT_TRUE( std::equal(ss1.begin(), ss1.end(), ss2.begin())); } } TEST(SIGN,OneOff) { std::random_device rd; std::uniform_int_distribution dist(0, 0xFF); uint8_t msg[1234] = {0}; for (int i=0; i sig(pqc_signature_bsz(p)); std::vector sk(pqc_private_key_bsz(p)); std::vector pk(pqc_public_key_bsz(p)); ASSERT_TRUE( pqc_keygen(p, pk.data(), sk.data())); uint64_t sigsz = sig.size(); ASSERT_TRUE( pqc_sig_create(p, sig.data(), &sigsz, msg, 1234, sk.data())); ASSERT_TRUE( pqc_sig_verify(p, sig.data(), sigsz, msg, 1234, pk.data())); } } TEST(Frodo, Decaps) { const pqc_ctx_t *p = pqc_kem_alg_by_id(PQC_ALG_KEM_FRODOKEM640SHAKE); std::vector ct(pqc_ciphertext_bsz(p)); std::vector ss1(pqc_shared_secret_bsz(p)); std::vector ss2(pqc_shared_secret_bsz(p)); std::vector sk(pqc_private_key_bsz(p)); std::vector pk(pqc_public_key_bsz(p)); bool res; ASSERT_TRUE( pqc_keygen(p, pk.data(), sk.data())); ct_poison(sk.data(), 16 /*CRYPTO_BYTES*/); ASSERT_TRUE( pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data())); // Decapsulate res = pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data()); // Purify res to allow non-ct check by ASSERT_TRUE ct_purify(&res, 1); ASSERT_TRUE(res); // ss2 needs to be purified as it originates from poisoned data ct_purify(ss2.data(), ss2.size()); ASSERT_EQ(ss2, ss1); } TEST(Frodo, Decaps_Negative) { const pqc_ctx_t *p = pqc_kem_alg_by_id(PQC_ALG_KEM_FRODOKEM640SHAKE); std::vector ct(pqc_ciphertext_bsz(p)); std::vector ss1(pqc_shared_secret_bsz(p)); std::vector ss2(pqc_shared_secret_bsz(p)); std::vector sk(pqc_private_key_bsz(p)); std::vector pk(pqc_public_key_bsz(p)); bool res; // Setup ASSERT_TRUE( pqc_keygen(p, pk.data(), sk.data())); ct_poison(sk.data(), 16); ASSERT_TRUE( pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data())); // Ensure C2 of ciphertext is altered ct[ct.size() - 1] ^= 1; res = pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data()); // Purify res to allow non-ct check by ASSERT_TRUE ct_purify(&res, 1); ASSERT_TRUE(res); // ss2 needs to be purified as it originates from poisoned data ct_purify(ss2.data(), ss2.size()); ASSERT_NE(ss2, ss1); }