Added alg_version details to test output (#2080)

* Added alg_version details as test output

Signed-off-by: Pablo Gutiérrez <pablogf@uma.es>
This commit is contained in:
Pablo Gutiérrez 2025-02-25 17:21:11 +01:00 committed by GitHub
parent f5a044874d
commit c2a6559c22
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
5 changed files with 9 additions and 0 deletions

View File

@ -151,6 +151,7 @@ static OQS_STATUS kem_test_correctness(const char *method_name) {
printf("================================================================================\n");
printf("Sample computation for KEM %s\n", kem->method_name);
printf("Version source: %s\n", kem->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(kem->length_public_key + 2 * sizeof(magic_t));

View File

@ -51,6 +51,7 @@ static OQS_STATUS kem_test_correctness(const char *method_name, KEM_OPS op) {
case KEM_KEYGEN:
printf("================================================================================\n");
printf("Executing keygen for KEM %s\n", kem->method_name);
printf("Version source: %s\n", kem->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(kem->length_public_key);
@ -78,6 +79,7 @@ static OQS_STATUS kem_test_correctness(const char *method_name, KEM_OPS op) {
case KEM_ENCAPS:
printf("================================================================================\n");
printf("Executing encaps for KEM %s\n", kem->method_name);
printf("Version source: %s\n", kem->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(kem->length_public_key);
@ -113,6 +115,7 @@ static OQS_STATUS kem_test_correctness(const char *method_name, KEM_OPS op) {
case KEM_DECAPS:
printf("================================================================================\n");
printf("Executing decaps for KEM %s\n", kem->method_name);
printf("Version source: %s\n", kem->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(kem->length_public_key);

View File

@ -54,6 +54,7 @@ static OQS_STATUS sig_test_correctness(const char *method_name) {
printf("================================================================================\n");
printf("Sample computation for signature %s\n", sig->method_name);
printf("Version source: %s\n", sig->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(sig->length_public_key + 2 * sizeof(magic_t));

View File

@ -40,6 +40,7 @@ static OQS_STATUS sig_test_correctness(const char *method_name, SIG_OPS op) {
case SIG_KEYGEN:
printf("================================================================================\n");
printf("Executing keygen for SIGALG %s\n", sig->method_name);
printf("Version source: %s\n", sig->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(sig->length_public_key);
@ -65,6 +66,7 @@ static OQS_STATUS sig_test_correctness(const char *method_name, SIG_OPS op) {
case SIG_SIGN:
printf("================================================================================\n");
printf("Executing sign for SIGALG %s\n", sig->method_name);
printf("Version source: %s\n", sig->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(sig->length_public_key);
@ -102,6 +104,7 @@ static OQS_STATUS sig_test_correctness(const char *method_name, SIG_OPS op) {
case SIG_VERIFY:
printf("================================================================================\n");
printf("Executing verify for SIGALG %s\n", sig->method_name);
printf("Version source: %s\n", sig->alg_version);
printf("================================================================================\n");
public_key = OQS_MEM_malloc(sig->length_public_key);

View File

@ -441,6 +441,7 @@ static OQS_STATUS sig_stfl_test_correctness(const char *method_name, const char
printf("================================================================================\n");
printf("Sample computation for stateful signature %s\n", sig->method_name);
printf("Version source: %s\n", sig->alg_version);
printf("================================================================================\n");
secret_key = OQS_SIG_STFL_SECRET_KEY_new(sig->method_name);