-rwxr-xr-x 5416 libmceliece-20241009/autogen/cli raw
#!/usr/bin/env python3
import re
keypair = r'''/* WARNING: auto-generated (by autogen/cli); do not edit */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include "mceliece.h" /* -lmceliece */
#include "limits.inc"
static unsigned char pk[PRIMITIVE_PUBLICKEYBYTES];
static unsigned char sk[PRIMITIVE_SECRETKEYBYTES];
static void die_temp(const char *why,const char *why2)
{
if (why2)
fprintf(stderr,"PRIMITIVE-keypair: fatal: %s: %s\n",why,why2);
else
fprintf(stderr,"PRIMITIVE-keypair: fatal: %s\n",why);
exit(111);
}
int main()
{
FILE *pkfile;
FILE *skfile;
limits();
pkfile = fdopen(5,"w");
if (!pkfile) {
fprintf(stderr,"PRIMITIVE-keypair: usage: PRIMITIVE-keypair 5>publickey 9>secretkey\n");
die_temp("fdopen 5 failed",strerror(errno));
}
skfile = fdopen(9,"w");
if (!skfile) {
fprintf(stderr,"PRIMITIVE-keypair: usage: PRIMITIVE-keypair 5>publickey 9>secretkey\n");
die_temp("fdopen 9 failed",strerror(errno));
}
PRIMITIVE_keypair(pk,sk);
if (fwrite(pk,1,sizeof pk,pkfile) < sizeof pk)
die_temp("write publickey failed",strerror(errno));
if (fflush(pkfile))
die_temp("write publickey failed",strerror(errno));
fclose(pkfile);
if (fwrite(sk,1,sizeof sk,skfile) < sizeof sk)
die_temp("write secretkey failed",strerror(errno));
if (fflush(skfile))
die_temp("write secretkey failed",strerror(errno));
fclose(skfile);
return 0;
}
'''
enc = r'''/* WARNING: auto-generated (by autogen/cli); do not edit */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include "mceliece.h" /* -lmceliece */
#include "limits.inc"
static unsigned char pk[PRIMITIVE_PUBLICKEYBYTES];
static unsigned char c[PRIMITIVE_CIPHERTEXTBYTES];
static unsigned char k[PRIMITIVE_BYTES];
static void die_temp(const char *why,const char *why2)
{
if (why2)
fprintf(stderr,"PRIMITIVE-enc: fatal: %s: %s\n",why,why2);
else
fprintf(stderr,"PRIMITIVE-enc: fatal: %s\n",why);
exit(111);
}
int main()
{
FILE *pkfile;
FILE *kfile;
limits();
pkfile = fdopen(4,"r");
if (!pkfile) {
fprintf(stderr,"PRIMITIVE-enc: usage: PRIMITIVE-enc >ciphertext 7>sessionkey 4<publickey\n");
die_temp("fdopen 4 failed",strerror(errno));
}
kfile = fdopen(7,"w");
if (!kfile) {
fprintf(stderr,"PRIMITIVE-enc: usage: PRIMITIVE-enc >ciphertext 7>sessionkey 4<publickey\n");
die_temp("fdopen 7 failed",strerror(errno));
}
if (fread(pk,1,sizeof pk,pkfile) < sizeof pk) {
if (ferror(pkfile))
die_temp("read publickey failed",strerror(errno));
die_temp("read publickey failed","end of file");
}
fclose(pkfile);
if (PRIMITIVE_enc(c,k,pk)) die_temp("encapsulation failed",0);
if (fwrite(c,1,sizeof c,stdout) < sizeof c)
die_temp("write ciphertext failed",strerror(errno));
if (fflush(stdout))
die_temp("write ciphertext failed",strerror(errno));
fclose(stdout);
if (fwrite(k,1,sizeof k,kfile) < sizeof k)
die_temp("write sessionkey failed",strerror(errno));
if (fflush(kfile))
die_temp("write sessionkey failed",strerror(errno));
fclose(kfile);
return 0;
}
'''
dec = r'''/* WARNING: auto-generated (by autogen/cli); do not edit */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include "mceliece.h" /* -lmceliece */
#include "limits.inc"
static unsigned char sk[PRIMITIVE_SECRETKEYBYTES];
static unsigned char c[PRIMITIVE_CIPHERTEXTBYTES];
static unsigned char k[PRIMITIVE_BYTES];
static void die_temp(const char *why,const char *why2)
{
if (why2)
fprintf(stderr,"PRIMITIVE-dec: fatal: %s: %s\n",why,why2);
else
fprintf(stderr,"PRIMITIVE-dec: fatal: %s\n",why);
exit(111);
}
int main()
{
FILE *skfile;
FILE *kfile;
limits();
skfile = fdopen(8,"r");
if (!skfile) {
fprintf(stderr,"PRIMITIVE-dec: usage: PRIMITIVE-dec 7>sessionkey <ciphertext 8<secretkey\n");
die_temp("fdopen 8 failed",strerror(errno));
}
kfile = fdopen(7,"w");
if (!kfile) {
fprintf(stderr,"PRIMITIVE-dec: usage: PRIMITIVE-dec 7>sessionkey <ciphertext 8<secretkey\n");
die_temp("fdopen 7 failed",strerror(errno));
}
if (fread(sk,1,sizeof sk,skfile) < sizeof sk) {
if (ferror(skfile))
die_temp("read secretkey failed",strerror(errno));
die_temp("read secretkey failed","end of file");
}
fclose(skfile);
if (fread(c,1,sizeof c,stdin) < sizeof c) {
if (ferror(stdin))
die_temp("read ciphertext failed",strerror(errno));
die_temp("read ciphertext failed","end of file");
}
fclose(stdin);
if (PRIMITIVE_dec(k,c,sk)) die_temp("decapsulation failed",0);
if (fwrite(k,1,sizeof k,kfile) < sizeof k)
die_temp("write sessionkey failed",strerror(errno));
if (fflush(kfile))
die_temp("write sessionkey failed",strerror(errno));
fclose(kfile);
return 0;
}
'''
for size in '6960119','6688128','8192128','460896','348864':
for primitive in 'mceliece'+size,'mceliece'+size+'pc':
with open('command/%s-keypair.c'%primitive,'w') as f:
f.write(re.sub('PRIMITIVE',primitive,keypair))
with open('command/%s-enc.c'%primitive,'w') as f:
f.write(re.sub('PRIMITIVE',primitive,enc))
with open('command/%s-dec.c'%primitive,'w') as f:
f.write(re.sub('PRIMITIVE',primitive,dec))
with open('command/%sf-keypair.c'%primitive,'w') as f:
f.write(re.sub('PRIMITIVE',primitive+'f',keypair))