1
1
mirror of https://github.com/henrydcase/pqc.git synced 2024-11-26 17:31:38 +00:00
pqcrypto/crypto_kem/test.c
2019-01-15 16:03:38 +01:00

109 lines
2.5 KiB
C

#include "api.h"
#include "randombytes.h"
#include <stdio.h>
#include <string.h>
#define NTESTS 10000
int test_keys()
{
unsigned char key_a[CRYPTO_BYTES], key_b[CRYPTO_BYTES];
unsigned char pk[CRYPTO_PUBLICKEYBYTES];
unsigned char sendb[CRYPTO_CIPHERTEXTBYTES];
unsigned char sk_a[CRYPTO_SECRETKEYBYTES];
int i;
for(i=0; i<NTESTS; i++)
{
//Alice generates a public key
crypto_kem_keypair(pk, sk_a);
//Bob derives a secret key and creates a response
crypto_kem_enc(sendb, key_b, pk);
//Alice uses Bobs response to get her secret key
crypto_kem_dec(key_a, sendb, sk_a);
if(memcmp(key_a, key_b, CRYPTO_BYTES))
printf("ERROR keys\n");
}
return 0;
}
int test_invalid_sk_a()
{
unsigned char sk_a[CRYPTO_SECRETKEYBYTES];
unsigned char key_a[CRYPTO_BYTES], key_b[CRYPTO_BYTES];
unsigned char pk[CRYPTO_PUBLICKEYBYTES];
unsigned char sendb[CRYPTO_CIPHERTEXTBYTES];
int i;
for(i=0; i<NTESTS; i++)
{
//Alice generates a public key
crypto_kem_keypair(pk, sk_a);
//Bob derives a secret key and creates a response
crypto_kem_enc(sendb, key_b, pk);
//Replace secret key with random values
randombytes(sk_a, CRYPTO_SECRETKEYBYTES);
//Alice uses Bobs response to get her secre key
crypto_kem_dec(key_a, sendb, sk_a);
if(!memcmp(key_a, key_b, CRYPTO_BYTES))
printf("ERROR invalid sk_a\n");
}
return 0;
}
int test_invalid_ciphertext()
{
unsigned char sk_a[CRYPTO_SECRETKEYBYTES];
unsigned char key_a[CRYPTO_BYTES], key_b[CRYPTO_BYTES];
unsigned char pk[CRYPTO_PUBLICKEYBYTES];
unsigned char sendb[CRYPTO_CIPHERTEXTBYTES];
int i;
size_t pos;
for(i=0; i<NTESTS; i++)
{
randombytes((unsigned char *)&pos, sizeof(size_t));
//Alice generates a public key
crypto_kem_keypair(pk, sk_a);
//Bob derives a secret key and creates a response
crypto_kem_enc(sendb, key_b, pk);
//Change some byte in the ciphertext (i.e., encapsulated key)
sendb[pos % CRYPTO_CIPHERTEXTBYTES] ^= 23;
//Alice uses Bobs response to get her secre key
crypto_kem_dec(key_a, sendb, sk_a);
if(!memcmp(key_a, key_b, CRYPTO_BYTES))
printf("ERROR invalid ciphertext\n");
}
return 0;
}
int main(void)
{
test_keys();
test_invalid_sk_a();
test_invalid_ciphertext();
printf("CRYPTO_SECRETKEYBYTES: %d\n",CRYPTO_SECRETKEYBYTES);
printf("CRYPTO_PUBLICKEYBYTES: %d\n",CRYPTO_PUBLICKEYBYTES);
printf("CRYPTO_CIPHERTEXTBYTES: %d\n",CRYPTO_CIPHERTEXTBYTES);
return 0;
}