use libc::c_int;
pub const PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_SECRETKEYBYTES: usize = 1792;
pub const PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_PUBLICKEYBYTES: usize = 1824;
pub const PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_CIPHERTEXTBYTES: usize = 2176;
pub const PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_BYTES: usize = 32;
pub const PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_SECRETKEYBYTES: usize = 3680;
pub const PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_PUBLICKEYBYTES: usize = 1824;
pub const PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_CIPHERTEXTBYTES: usize = 2208;
pub const PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_BYTES: usize = 32;
pub const PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_SECRETKEYBYTES: usize = 896;
pub const PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_PUBLICKEYBYTES: usize = 928;
pub const PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_CIPHERTEXTBYTES: usize = 1088;
pub const PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_BYTES: usize = 32;
pub const PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_SECRETKEYBYTES: usize = 1888;
pub const PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_PUBLICKEYBYTES: usize = 928;
pub const PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_CIPHERTEXTBYTES: usize = 1120;
pub const PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_BYTES: usize = 32;
#[link(name = "newhope1024cpa_clean")]
extern "C" {
pub fn PQCLEAN_NEWHOPE1024CPA_CLEAN_crypto_kem_keypair(pk: *mut u8, sk: *mut u8) -> c_int;
pub fn PQCLEAN_NEWHOPE1024CPA_CLEAN_crypto_kem_enc(
ct: *mut u8,
ss: *mut u8,
pk: *const u8,
) -> c_int;
pub fn PQCLEAN_NEWHOPE1024CPA_CLEAN_crypto_kem_dec(
ss: *mut u8,
ct: *const u8,
sk: *const u8,
) -> c_int;
}
#[link(name = "newhope1024cca_clean")]
extern "C" {
pub fn PQCLEAN_NEWHOPE1024CCA_CLEAN_crypto_kem_keypair(pk: *mut u8, sk: *mut u8) -> c_int;
pub fn PQCLEAN_NEWHOPE1024CCA_CLEAN_crypto_kem_enc(
ct: *mut u8,
ss: *mut u8,
pk: *const u8,
) -> c_int;
pub fn PQCLEAN_NEWHOPE1024CCA_CLEAN_crypto_kem_dec(
ss: *mut u8,
ct: *const u8,
sk: *const u8,
) -> c_int;
}
#[link(name = "newhope512cpa_clean")]
extern "C" {
pub fn PQCLEAN_NEWHOPE512CPA_CLEAN_crypto_kem_keypair(pk: *mut u8, sk: *mut u8) -> c_int;
pub fn PQCLEAN_NEWHOPE512CPA_CLEAN_crypto_kem_enc(
ct: *mut u8,
ss: *mut u8,
pk: *const u8,
) -> c_int;
pub fn PQCLEAN_NEWHOPE512CPA_CLEAN_crypto_kem_dec(
ss: *mut u8,
ct: *const u8,
sk: *const u8,
) -> c_int;
}
#[link(name = "newhope512cca_clean")]
extern "C" {
pub fn PQCLEAN_NEWHOPE512CCA_CLEAN_crypto_kem_keypair(pk: *mut u8, sk: *mut u8) -> c_int;
pub fn PQCLEAN_NEWHOPE512CCA_CLEAN_crypto_kem_enc(
ct: *mut u8,
ss: *mut u8,
pk: *const u8,
) -> c_int;
pub fn PQCLEAN_NEWHOPE512CCA_CLEAN_crypto_kem_dec(
ss: *mut u8,
ct: *const u8,
sk: *const u8,
) -> c_int;
}
#[cfg(test)]
mod test_newhope1024cpa_clean {
use super::*;
#[test]
fn test_ffi() {
unsafe {
let mut pk = vec![0u8; PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_PUBLICKEYBYTES];
let mut sk = vec![0u8; PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_SECRETKEYBYTES];
let mut ct = vec![0u8; PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_CIPHERTEXTBYTES];
let mut ss1 = vec![0u8; PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_BYTES];
let mut ss2 = vec![0u8; PQCLEAN_NEWHOPE1024CPA_CLEAN_CRYPTO_BYTES];
assert_eq!(
0,
PQCLEAN_NEWHOPE1024CPA_CLEAN_crypto_kem_keypair(pk.as_mut_ptr(), sk.as_mut_ptr())
);
assert_eq!(
0,
PQCLEAN_NEWHOPE1024CPA_CLEAN_crypto_kem_enc(
ct.as_mut_ptr(),
ss1.as_mut_ptr(),
pk.as_ptr()
)
);
assert_eq!(
0,
PQCLEAN_NEWHOPE1024CPA_CLEAN_crypto_kem_dec(
ss2.as_mut_ptr(),
ct.as_ptr(),
sk.as_ptr()
)
);
assert_eq!(&ss1[..], &ss2[..], "Shared secrets should be equal");
}
}
}
#[cfg(test)]
mod test_newhope1024cca_clean {
use super::*;
#[test]
fn test_ffi() {
unsafe {
let mut pk = vec![0u8; PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_PUBLICKEYBYTES];
let mut sk = vec![0u8; PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_SECRETKEYBYTES];
let mut ct = vec![0u8; PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_CIPHERTEXTBYTES];
let mut ss1 = vec![0u8; PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_BYTES];
let mut ss2 = vec![0u8; PQCLEAN_NEWHOPE1024CCA_CLEAN_CRYPTO_BYTES];
assert_eq!(
0,
PQCLEAN_NEWHOPE1024CCA_CLEAN_crypto_kem_keypair(pk.as_mut_ptr(), sk.as_mut_ptr())
);
assert_eq!(
0,
PQCLEAN_NEWHOPE1024CCA_CLEAN_crypto_kem_enc(
ct.as_mut_ptr(),
ss1.as_mut_ptr(),
pk.as_ptr()
)
);
assert_eq!(
0,
PQCLEAN_NEWHOPE1024CCA_CLEAN_crypto_kem_dec(
ss2.as_mut_ptr(),
ct.as_ptr(),
sk.as_ptr()
)
);
assert_eq!(&ss1[..], &ss2[..], "Shared secrets should be equal");
}
}
}
#[cfg(test)]
mod test_newhope512cpa_clean {
use super::*;
#[test]
fn test_ffi() {
unsafe {
let mut pk = vec![0u8; PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_PUBLICKEYBYTES];
let mut sk = vec![0u8; PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_SECRETKEYBYTES];
let mut ct = vec![0u8; PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_CIPHERTEXTBYTES];
let mut ss1 = vec![0u8; PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_BYTES];
let mut ss2 = vec![0u8; PQCLEAN_NEWHOPE512CPA_CLEAN_CRYPTO_BYTES];
assert_eq!(
0,
PQCLEAN_NEWHOPE512CPA_CLEAN_crypto_kem_keypair(pk.as_mut_ptr(), sk.as_mut_ptr())
);
assert_eq!(
0,
PQCLEAN_NEWHOPE512CPA_CLEAN_crypto_kem_enc(
ct.as_mut_ptr(),
ss1.as_mut_ptr(),
pk.as_ptr()
)
);
assert_eq!(
0,
PQCLEAN_NEWHOPE512CPA_CLEAN_crypto_kem_dec(
ss2.as_mut_ptr(),
ct.as_ptr(),
sk.as_ptr()
)
);
assert_eq!(&ss1[..], &ss2[..], "Shared secrets should be equal");
}
}
}
#[cfg(test)]
mod test_newhope512cca_clean {
use super::*;
#[test]
fn test_ffi() {
unsafe {
let mut pk = vec![0u8; PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_PUBLICKEYBYTES];
let mut sk = vec![0u8; PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_SECRETKEYBYTES];
let mut ct = vec![0u8; PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_CIPHERTEXTBYTES];
let mut ss1 = vec![0u8; PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_BYTES];
let mut ss2 = vec![0u8; PQCLEAN_NEWHOPE512CCA_CLEAN_CRYPTO_BYTES];
assert_eq!(
0,
PQCLEAN_NEWHOPE512CCA_CLEAN_crypto_kem_keypair(pk.as_mut_ptr(), sk.as_mut_ptr())
);
assert_eq!(
0,
PQCLEAN_NEWHOPE512CCA_CLEAN_crypto_kem_enc(
ct.as_mut_ptr(),
ss1.as_mut_ptr(),
pk.as_ptr()
)
);
assert_eq!(
0,
PQCLEAN_NEWHOPE512CCA_CLEAN_crypto_kem_dec(
ss2.as_mut_ptr(),
ct.as_ptr(),
sk.as_ptr()
)
);
assert_eq!(&ss1[..], &ss2[..], "Shared secrets should be equal");
}
}
}