summaryrefslogtreecommitdiff
path: root/regress/lib/libcrypto/mlkem/mlkem768_decap_tests.c
blob: 96dc435c4d8b2feaff1bfd6e19841939ba7ce5b8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/*	$OpenBSD: mlkem768_decap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */
/*
 * Copyright (c) 2024, Google Inc.
 * Copyright (c) 2024, Bob Beck <beck@obtuse.com>
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#include <openssl/bytestring.h>
#include <openssl/mlkem.h>

#include "mlkem_tests_util.h"

static void
MlkemDecapFileTest(CBS *c, CBS *k, CBS *dk, int should_fail)
{
	uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES];
	struct MLKEM768_private_key priv;
	int parse_ok, decap_ok;

	parse_ok = MLKEM768_parse_private_key(&priv, dk);
	if (!parse_ok) {
		TEST(!should_fail, "parse_private_key");
		return;
	}
	decap_ok = MLKEM768_decap(shared_secret, CBS_data(c), CBS_len(c),
	    &priv);
	if (!decap_ok) {
		TEST(!should_fail, "decap");
		return;
	}
	TEST_DATAEQ(shared_secret, CBS_data(k),
	    MLKEM_SHARED_SECRET_BYTES, "shared_secret");
}

#define S_START 0
#define S_COMMENT 1
#define S_PRIVATE_KEY 2
#define S_CIPHERTEXT 3
#define S_RESULT 4
#define S_SHARED_SECRET  5

int
main(int argc, char **argv)
{
	CBS ciphertext, shared_secret, private_key;
	const uint8_t *p = NULL;
	int should_fail = 0;
	char *buf;
	FILE *fp;
	int state;

	fprintf(stderr, "Testing decap test vectors in %s\n", argv[1]);
	TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file");
	MALLOC(buf, 16*1024);
	state = S_COMMENT;
	test_number = 1;
	while (fgets(buf, 16*1024, fp) != NULL) {
		switch (state) {
		case S_START:
			if (strcmp(buf, "\n") != 0)
				break;
			state = S_COMMENT;
			break;
		case S_COMMENT:
			if (strncmp(buf, "#", 1) != 0)
				break;
			state = S_PRIVATE_KEY;
			break;
		case S_PRIVATE_KEY:
			if (strncmp(buf, "private_key: ",
			    strlen("private_key: ")) != 0)
				break;
			grab_data(&private_key, buf, strlen("private_key: "));
			p = CBS_data(&private_key);
			state = S_CIPHERTEXT;
			break;
		case S_CIPHERTEXT:
			if (strncmp(buf, "ciphertext: ",
			    strlen("ciphertext: ")) != 0)
				break;
			grab_data(&ciphertext, buf, strlen("ciphertext: "));
			state = S_RESULT;
			break;
		case S_RESULT:
			if (strncmp(buf, "result: pass",
			    strlen("result: pass")) != 0)
				should_fail = 1;
			else
				should_fail = 0;
			state = S_SHARED_SECRET;
			break;
		case S_SHARED_SECRET:
			if (strncmp(buf, "shared_secret: ",
			    strlen("shared_secret: ")) != 0)
				break;
			grab_data(&shared_secret, buf,
			    strlen("shared_secret: "));
			MlkemDecapFileTest(&ciphertext, &shared_secret,
			    &private_key, should_fail);
			free((void *)CBS_data(&ciphertext));
			free((void *)CBS_data(&shared_secret));
			free((void *)p);

			test_number++;
			state = S_START;
			break;
		}
	}

	free(buf);
	exit(failure);
}