mirror of
https://github.com/henrydcase/pqc.git
synced 2024-11-22 23:48:58 +00:00
Fix uint8_t to uint16_t upcast in Frodo
This commit is contained in:
parent
d257525360
commit
3b655f3f72
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM1344AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM1344AES_CLEAN_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM1344AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, c
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, c
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM1344AES_OPT_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM1344SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *c
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *c
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM1344SHAKE_CLEAN_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM1344SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM1344SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM1344SHAKE_OPT_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM640AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM640AES_CLEAN_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM640AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, co
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, co
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM640AES_OPT_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM640SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM640SHAKE_CLEAN_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM640SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM640SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM640SHAKE_OPT_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM976AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976AES_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM976AES_CLEAN_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM976AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, co
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976AES_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct, co
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM976AES_OPT_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM976SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976SHAKE_CLEAN_crypto_kem_dec(uint8_t *ss, const uint8_t *ct
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM976SHAKE_CLEAN_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
@ -155,7 +155,7 @@ int PQCLEAN_FRODOKEM976SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
const uint8_t *ct_c2 = &ct[(PARAMS_LOGQ * PARAMS_N * PARAMS_NBAR) / 8];
|
||||||
const uint8_t *sk_s = &sk[0];
|
const uint8_t *sk_s = &sk[0];
|
||||||
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
const uint8_t *sk_pk = &sk[CRYPTO_BYTES];
|
||||||
const uint16_t *sk_S = (uint16_t *) &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
const uint8_t *sk_S = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES];
|
||||||
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
uint16_t S[PARAMS_N * PARAMS_NBAR]; // contains secret data
|
||||||
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
const uint8_t *sk_pkh = &sk[CRYPTO_BYTES + CRYPTO_PUBLICKEYBYTES + 2 * PARAMS_N * PARAMS_NBAR];
|
||||||
const uint8_t *pk_seedA = &sk_pk[0];
|
const uint8_t *pk_seedA = &sk_pk[0];
|
||||||
@ -172,7 +172,7 @@ int PQCLEAN_FRODOKEM976SHAKE_OPT_crypto_kem_dec(uint8_t *ss, const uint8_t *ct,
|
|||||||
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
uint8_t shake_input_seedSEprime[1 + CRYPTO_BYTES]; // contains secret data
|
||||||
|
|
||||||
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
for (size_t i = 0; i < PARAMS_N * PARAMS_NBAR; i++) {
|
||||||
S[i] = PQCLEAN_FRODOKEM976SHAKE_OPT_LE_TO_UINT16(sk_S[i]);
|
S[i] = sk_S[2*i] | (sk_S[2*i+1] << 8);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
// Compute W = C - Bp*S (mod q), and decode the randomness mu
|
||||||
|
Loading…
Reference in New Issue
Block a user