liboqs/tests/dump_alg_info.c
Douglas Stebila b72b89efdb
Add test suite comparing parameters in C with parameters in YML (#1070)
* Add test suite comparing parameters in C with parameters in YML

* Fix/bypass CI failures for test_alg_info
2021-08-05 15:32:43 -04:00

56 lines
1.7 KiB
C

/*
* dump_alg_info.c
*
* Print algorithm information in YAML format; used in conjunction with test_alg_info.py.
*
* SPDX-License-Identifier: MIT
*/
#include <stdbool.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <oqs/oqs.h>
int main(void) {
// iterate through KEMs and print info
printf("KEMs:\n");
for (size_t i = 0; i < OQS_KEM_algs_length; i++) {
const char *kem_name = OQS_KEM_alg_identifier(i);
printf(" %s:\n", kem_name);
OQS_KEM *kem = OQS_KEM_new(kem_name);
if (kem == NULL) {
printf(" isnull: true\n");
continue;
}
printf(" isnull: false\n");
printf(" claimed-nist-level: %d\n", kem->claimed_nist_level);
printf(" claimed-security: %s\n", kem->ind_cca ? "IND-CCA2" : "IND-CPA");
printf(" length-public-key: %zu\n", kem->length_public_key);
printf(" length-ciphertext: %zu\n", kem->length_ciphertext);
printf(" length-secret-key: %zu\n", kem->length_secret_key);
printf(" length-shared-secret: %zu\n", kem->length_shared_secret);
}
// iterate through signature schemes and print info
printf("SIGs:\n");
for (size_t i = 0; i < OQS_SIG_algs_length; i++) {
const char *sig_name = OQS_SIG_alg_identifier(i);
printf(" %s:\n", sig_name);
OQS_SIG *sig = OQS_SIG_new(sig_name);
if (sig == NULL) {
printf(" isnull: true\n");
continue;
}
printf(" isnull: false\n");
printf(" claimed-nist-level: %d\n", sig->claimed_nist_level);
printf(" claimed-security: %s\n", sig->euf_cma ? "EUF-CMA" : "none");
printf(" length-public-key: %zu\n", sig->length_public_key);
printf(" length-secret-key: %zu\n", sig->length_secret_key);
printf(" length-signature: %zu\n", sig->length_signature);
}
}