-rw-r--r-- 1324 libmceliece-20241009/crypto_kem/6960119/avx/kem_enc.c raw
// 20240805 djb: more mask usage
// 20230102 djb: rename encrypt() as pke_encrypt()
// 20221230 djb: add linker lines
// 20221230 djb: split out of operations.c
// linker define operation_enc
// linker use pke_encrypt
#include "operations.h"
#include "hash.h"
#include "encrypt.h"
#include "params.h"
#include "util.h"
#include <stdint.h>
#include <string.h>
#include "crypto_int8.h"
/* check if the padding bits of pk are all zero */
static int check_pk_padding(const unsigned char * pk)
{
unsigned char b;
int i;
b = 0;
for (i = 0; i < PK_NROWS; i++)
b |= pk[i*PK_ROW_BYTES + PK_ROW_BYTES-1];
b >>= (PK_NCOLS % 8);
return crypto_int8_nonzero_mask(b);
}
int operation_enc(
unsigned char *c,
unsigned char *key,
const unsigned char *pk
)
{
unsigned char e[ SYS_N/8 ];
unsigned char one_ec[ 1 + SYS_N/8 + SYND_BYTES ] = {1};
unsigned char mask;
int i, padding_ok;
//
padding_ok = check_pk_padding(pk);
pke_encrypt(c, pk, e);
memcpy(one_ec + 1, e, SYS_N/8);
memcpy(one_ec + 1 + SYS_N/8, c, SYND_BYTES);
crypto_hash_32b(key, one_ec, sizeof(one_ec));
// clear outputs (set to all 0's) if padding bits are not all zero
mask = padding_ok;
mask ^= 0xFF;
for (i = 0; i < SYND_BYTES; i++)
c[i] &= mask;
for (i = 0; i < 32; i++)
key[i] &= mask;
return padding_ok;
}