@@ -388,6 +388,180 @@ int sha3_shake_test(void)
388388#endif
389389}
390390
391+ int sha3_turbo_shake_test (void )
392+ {
393+ #ifndef LTC_TEST
394+ return CRYPT_NOP ;
395+ #else
396+ unsigned char hash [64 ];
397+ hash_state c ;
398+ int i ;
399+
400+ // https://www.ietf.org/archive/id/draft-irtf-cfrg-kangarootwelve-17.txt page 12
401+ const unsigned char turbo_shake_input_single_zero [] = {
402+ 0x00 ,
403+ };
404+ const unsigned char turbo_shake_input_ptn_17_pow_1 [] = {
405+ 0x00 , 0x01 , 0x02 , 0x03 , 0x04 , 0x05 , 0x06 , 0x07 , 0x08 , 0x09 , 0x0a , 0x0b , 0x0c , 0x0d , 0x0e , 0x0f ,
406+ 0x10 ,
407+ };
408+ const unsigned char turbo_shake_input_ptn_17_pow_2 [] = {
409+ 0x00 , 0x01 , 0x02 , 0x03 , 0x04 , 0x05 , 0x06 , 0x07 , 0x08 , 0x09 , 0x0a , 0x0b , 0x0c , 0x0d , 0x0e , 0x0f ,
410+ 0x10 , 0x11 , 0x12 , 0x13 , 0x14 , 0x15 , 0x16 , 0x17 , 0x18 , 0x19 , 0x1a , 0x1b , 0x1c , 0x1d , 0x1e , 0x1f ,
411+ 0x20 , 0x21 , 0x22 , 0x23 , 0x24 , 0x25 , 0x26 , 0x27 , 0x28 , 0x29 , 0x2a , 0x2b , 0x2c , 0x2d , 0x2e , 0x2f ,
412+ 0x30 , 0x31 , 0x32 , 0x33 , 0x34 , 0x35 , 0x36 , 0x37 , 0x38 , 0x39 , 0x3a , 0x3b , 0x3c , 0x3d , 0x3e , 0x3f ,
413+ 0x40 , 0x41 , 0x42 , 0x43 , 0x44 , 0x45 , 0x46 , 0x47 , 0x48 , 0x49 , 0x4a , 0x4b , 0x4c , 0x4d , 0x4e , 0x4f ,
414+ 0x50 , 0x51 , 0x52 , 0x53 , 0x54 , 0x55 , 0x56 , 0x57 , 0x58 , 0x59 , 0x5a , 0x5b , 0x5c , 0x5d , 0x5e , 0x5f ,
415+ 0x60 , 0x61 , 0x62 , 0x63 , 0x64 , 0x65 , 0x66 , 0x67 , 0x68 , 0x69 , 0x6a , 0x6b , 0x6c , 0x6d , 0x6e , 0x6f ,
416+ 0x70 , 0x71 , 0x72 , 0x73 , 0x74 , 0x75 , 0x76 , 0x77 , 0x78 , 0x79 , 0x7a , 0x7b , 0x7c , 0x7d , 0x7e , 0x7f ,
417+ 0x80 , 0x81 , 0x82 , 0x83 , 0x84 , 0x85 , 0x86 , 0x87 , 0x88 , 0x89 , 0x8a , 0x8b , 0x8c , 0x8d , 0x8e , 0x8f ,
418+ 0x90 , 0x91 , 0x92 , 0x93 , 0x94 , 0x95 , 0x96 , 0x97 , 0x98 , 0x99 , 0x9a , 0x9b , 0x9c , 0x9d , 0x9e , 0x9f ,
419+ 0xa0 , 0xa1 , 0xa2 , 0xa3 , 0xa4 , 0xa5 , 0xa6 , 0xa7 , 0xa8 , 0xa9 , 0xaa , 0xab , 0xac , 0xad , 0xae , 0xaf ,
420+ 0xb0 , 0xb1 , 0xb2 , 0xb3 , 0xb4 , 0xb5 , 0xb6 , 0xb7 , 0xb8 , 0xb9 , 0xba , 0xbb , 0xbc , 0xbd , 0xbe , 0xbf ,
421+ 0xc0 , 0xc1 , 0xc2 , 0xc3 , 0xc4 , 0xc5 , 0xc6 , 0xc7 , 0xc8 , 0xc9 , 0xca , 0xcb , 0xcc , 0xcd , 0xce , 0xcf ,
422+ 0xd0 , 0xd1 , 0xd2 , 0xd3 , 0xd4 , 0xd5 , 0xd6 , 0xd7 , 0xd8 , 0xd9 , 0xda , 0xdb , 0xdc , 0xdd , 0xde , 0xdf ,
423+ 0xe0 , 0xe1 , 0xe2 , 0xe3 , 0xe4 , 0xe5 , 0xe6 , 0xe7 , 0xe8 , 0xe9 , 0xea , 0xeb , 0xec , 0xed , 0xee , 0xef ,
424+ 0xf0 , 0xf1 , 0xf2 , 0xf3 , 0xf4 , 0xf5 , 0xf6 , 0xf7 , 0xf8 , 0xf9 , 0xfa ,
425+ 0x00 , 0x01 , 0x02 , 0x03 , 0x04 , 0x05 , 0x06 , 0x07 , 0x08 , 0x09 , 0x0a , 0x0b , 0x0c , 0x0d , 0x0e , 0x0f ,
426+ 0x10 , 0x11 , 0x12 , 0x13 , 0x14 , 0x15 , 0x16 , 0x17 , 0x18 , 0x19 , 0x1a , 0x1b , 0x1c , 0x1d , 0x1e , 0x1f ,
427+ 0x20 , 0x21 , 0x22 , 0x23 , 0x24 , 0x25 ,
428+ };
429+
430+ const unsigned char turbo_shake_128_empty [64 ] = {
431+ 0x1e , 0x41 , 0x5f , 0x1c , 0x59 , 0x83 , 0xaf , 0xf2 , 0x16 , 0x92 , 0x17 , 0x27 , 0x7d , 0x17 , 0xbb , 0x53 ,
432+ 0x8c , 0xd9 , 0x45 , 0xa3 , 0x97 , 0xdd , 0xec , 0x54 , 0x1f , 0x1c , 0xe4 , 0x1a , 0xf2 , 0xc1 , 0xb7 , 0x4c ,
433+ 0x3e , 0x8c , 0xca , 0xe2 , 0xa4 , 0xda , 0xe5 , 0x6c , 0x84 , 0xa0 , 0x4c , 0x23 , 0x85 , 0xc0 , 0x3c , 0x15 ,
434+ 0xe8 , 0x19 , 0x3b , 0xdf , 0x58 , 0x73 , 0x73 , 0x63 , 0x32 , 0x16 , 0x91 , 0xc0 , 0x54 , 0x62 , 0xc8 , 0xdf ,
435+ };
436+ const unsigned char turbo_shake_128_empty_10032 [32 ] = {
437+ 0xa3 , 0xb9 , 0xb0 , 0x38 , 0x59 , 0x00 , 0xce , 0x76 , 0x1f , 0x22 , 0xae , 0xd5 , 0x48 , 0xe7 , 0x54 , 0xda ,
438+ 0x10 , 0xa5 , 0x24 , 0x2d , 0x62 , 0xe8 , 0xc6 , 0x58 , 0xe3 , 0xf3 , 0xa9 , 0x23 , 0xa7 , 0x55 , 0x56 , 0x07 ,
439+ };
440+ const unsigned char turbo_shake_128_single_zero_byte [32 ] = {
441+ 0x55 , 0xce , 0xdd , 0x6f , 0x60 , 0xaf , 0x7b , 0xb2 , 0x9a , 0x40 , 0x42 , 0xae , 0x83 , 0x2e , 0xf3 , 0xf5 ,
442+ 0x8d , 0xb7 , 0x29 , 0x9f , 0x89 , 0x3e , 0xbb , 0x92 , 0x47 , 0x24 , 0x7d , 0x85 , 0x69 , 0x58 , 0xda , 0xa9 ,
443+ };
444+ const unsigned char turbo_shake_128_ptn_pow_1 [32 ] = {
445+ 0x9c , 0x97 , 0xd0 , 0x36 , 0xa3 , 0xba , 0xc8 , 0x19 , 0xdb , 0x70 , 0xed , 0xe0 , 0xca , 0x55 , 0x4e , 0xc6 ,
446+ 0xe4 , 0xc2 , 0xa1 , 0xa4 , 0xff , 0xbf , 0xd9 , 0xec , 0x26 , 0x9c , 0xa6 , 0xa1 , 0x11 , 0x16 , 0x12 , 0x33 ,
447+ };
448+ const unsigned char turbo_shake_128_ptn_pow_2 [32 ] = {
449+ 0x96 , 0xc7 , 0x7c , 0x27 , 0x9e , 0x01 , 0x26 , 0xf7 , 0xfc , 0x07 , 0xc9 , 0xb0 , 0x7f , 0x5c , 0xda , 0xe1 ,
450+ 0xe0 , 0xbe , 0x60 , 0xbd , 0xbe , 0x10 , 0x62 , 0x00 , 0x40 , 0xe7 , 0x5d , 0x72 , 0x23 , 0xa6 , 0x24 , 0xd2 ,
451+ };
452+
453+ const unsigned char turbo_shake_256_empty [64 ] = {
454+ 0x36 , 0x7a , 0x32 , 0x9d , 0xaf , 0xea , 0x87 , 0x1c , 0x78 , 0x02 , 0xec , 0x67 , 0xf9 , 0x05 , 0xae , 0x13 ,
455+ 0xc5 , 0x76 , 0x95 , 0xdc , 0x2c , 0x66 , 0x63 , 0xc6 , 0x10 , 0x35 , 0xf5 , 0x9a , 0x18 , 0xf8 , 0xe7 , 0xdb ,
456+ 0x11 , 0xed , 0xc0 , 0xe1 , 0x2e , 0x91 , 0xea , 0x60 , 0xeb , 0x6b , 0x32 , 0xdf , 0x06 , 0xdd , 0x7f , 0x00 ,
457+ 0x2f , 0xba , 0xfa , 0xbb , 0x6e , 0x13 , 0xec , 0x1c , 0xc2 , 0x0d , 0x99 , 0x55 , 0x47 , 0x60 , 0x0d , 0xb0 ,
458+ };
459+ const unsigned char turbo_shake_256_empty_10032 [32 ] = {
460+ 0xab , 0xef , 0xa1 , 0x16 , 0x30 , 0xc6 , 0x61 , 0x26 , 0x92 , 0x49 , 0x74 , 0x26 , 0x85 , 0xec , 0x08 , 0x2f ,
461+ 0x20 , 0x72 , 0x65 , 0xdc , 0xcf , 0x2f , 0x43 , 0x53 , 0x4e , 0x9c , 0x61 , 0xba , 0x0c , 0x9d , 0x1d , 0x75 ,
462+ };
463+ const unsigned char turbo_shake_256_single_zero_byte [64 ] = {
464+ 0x3e , 0x17 , 0x12 , 0xf9 , 0x28 , 0xf8 , 0xea , 0xf1 , 0x05 , 0x46 , 0x32 , 0xb2 , 0xaa , 0x0a , 0x24 , 0x6e ,
465+ 0xd8 , 0xb0 , 0xc3 , 0x78 , 0x72 , 0x8f , 0x60 , 0xbc , 0x97 , 0x04 , 0x10 , 0x15 , 0x5c , 0x28 , 0x82 , 0x0e ,
466+ 0x90 , 0xcc , 0x90 , 0xd8 , 0xa3 , 0x00 , 0x6a , 0xa2 , 0x37 , 0x2c , 0x5c , 0x5e , 0xa1 , 0x76 , 0xb0 , 0x68 ,
467+ 0x2b , 0xf2 , 0x2b , 0xae , 0x74 , 0x67 , 0xac , 0x94 , 0xf7 , 0x4d , 0x43 , 0xd3 , 0x9b , 0x04 , 0x82 , 0xe2 ,
468+ };
469+ const unsigned char turbo_shake_256_ptn_pow_1 [64 ] = {
470+ 0xb3 , 0xba , 0xb0 , 0x30 , 0x0e , 0x6a , 0x19 , 0x1f , 0xbe , 0x61 , 0x37 , 0x93 , 0x98 , 0x35 , 0x92 , 0x35 ,
471+ 0x78 , 0x79 , 0x4e , 0xa5 , 0x48 , 0x43 , 0xf5 , 0x01 , 0x10 , 0x90 , 0xfa , 0x2f , 0x37 , 0x80 , 0xa9 , 0xe5 ,
472+ 0xcb , 0x22 , 0xc5 , 0x9d , 0x78 , 0xb4 , 0x0a , 0x0f , 0xbf , 0xf9 , 0xe6 , 0x72 , 0xc0 , 0xfb , 0xe0 , 0x97 ,
473+ 0x0b , 0xd2 , 0xc8 , 0x45 , 0x09 , 0x1c , 0x60 , 0x44 , 0xd6 , 0x87 , 0x05 , 0x4d , 0xa5 , 0xd8 , 0xe9 , 0xc7 ,
474+ };
475+ const unsigned char turbo_shake_256_ptn_pow_2 [64 ] = {
476+ 0x66 , 0xb8 , 0x10 , 0xdb , 0x8e , 0x90 , 0x78 , 0x04 , 0x24 , 0xc0 , 0x84 , 0x73 , 0x72 , 0xfd , 0xc9 , 0x57 ,
477+ 0x10 , 0x88 , 0x2f , 0xde , 0x31 , 0xc6 , 0xdf , 0x75 , 0xbe , 0xb9 , 0xd4 , 0xcd , 0x93 , 0x05 , 0xcf , 0xca ,
478+ 0xe3 , 0x5e , 0x7b , 0x83 , 0xe8 , 0xb7 , 0xe6 , 0xeb , 0x4b , 0x78 , 0x60 , 0x58 , 0x80 , 0x11 , 0x63 , 0x16 ,
479+ 0xfe , 0x2c , 0x07 , 0x8a , 0x09 , 0xb9 , 0x4a , 0xd7 , 0xb8 , 0x21 , 0x3c , 0x0a , 0x73 , 0x8b , 0x65 , 0xc0 ,
480+ };
481+
482+ /* TurboSHAKE128 on an empty buffer */
483+ sha3_shake_init (& c , 128 );
484+ sha3_shake_turbo_done (& c , hash , 64 );
485+ if (compare_testvector (hash , 64 , turbo_shake_128_empty , sizeof (turbo_shake_128_empty ), "TurboSHAKE128" , 0 )) {
486+ return CRYPT_FAIL_TESTVECTOR ;
487+ }
488+
489+ /* TurboSHAKE128 on an empty buffer, digest length 10032 bytes, test last 32 bytes */
490+ sha3_shake_init (& c , 128 );
491+ for (i = 0 ; i != 10000 / 10 ; ++ i ){ sha3_shake_turbo_done (& c , hash , 10 ); }
492+ sha3_shake_turbo_done (& c , hash , 32 );
493+ if (compare_testvector (hash , 32 , turbo_shake_128_empty_10032 , sizeof (turbo_shake_128_empty_10032 ), "TurboSHAKE128" , 0 )) {
494+ return CRYPT_FAIL_TESTVECTOR ;
495+ }
496+
497+ /* TurboSHAKE128 on single zero byte */
498+ sha3_shake_init (& c , 128 );
499+ sha3_shake_turbo_process (& c , turbo_shake_input_single_zero , sizeof (turbo_shake_input_single_zero ));
500+ sha3_shake_turbo_done (& c , hash , 32 );
501+ if (compare_testvector (hash , 32 , turbo_shake_128_single_zero_byte , sizeof (turbo_shake_128_single_zero_byte ), "TurboSHAKE128" , 0 )) {
502+ return CRYPT_FAIL_TESTVECTOR ;
503+ }
504+
505+ /* TurboSHAKE128 on ptn(17**1) */
506+ sha3_shake_init (& c , 128 );
507+ sha3_shake_turbo_process (& c , turbo_shake_input_ptn_17_pow_1 , sizeof (turbo_shake_input_ptn_17_pow_1 ));
508+ sha3_shake_turbo_done (& c , hash , 32 );
509+ if (compare_testvector (hash , 32 , turbo_shake_128_ptn_pow_1 , sizeof (turbo_shake_128_ptn_pow_1 ), "TurboSHAKE128" , 0 )) {
510+ return CRYPT_FAIL_TESTVECTOR ;
511+ }
512+
513+ /* TurboSHAKE128 on ptn(17**2) */
514+ sha3_shake_init (& c , 128 );
515+ sha3_shake_turbo_process (& c , turbo_shake_input_ptn_17_pow_2 , sizeof (turbo_shake_input_ptn_17_pow_2 ));
516+ sha3_shake_turbo_done (& c , hash , 32 );
517+ if (compare_testvector (hash , 32 , turbo_shake_128_ptn_pow_2 , sizeof (turbo_shake_128_ptn_pow_2 ), "TurboSHAKE128" , 0 )) {
518+ return CRYPT_FAIL_TESTVECTOR ;
519+ }
520+
521+
522+ /* TurboSHAKE256 on an empty buffer */
523+ sha3_shake_init (& c , 256 );
524+ sha3_shake_turbo_done (& c , hash , 64 );
525+ if (compare_testvector (hash , 64 , turbo_shake_256_empty , sizeof (turbo_shake_256_empty ), "TurboSHAKE256" , 0 )) {
526+ return CRYPT_FAIL_TESTVECTOR ;
527+ }
528+
529+ /* TurboSHAKE256 on an empty buffer, digest length 10032 bytes, test last 32 bytes */
530+ sha3_shake_init (& c , 256 );
531+ for (i = 0 ; i != 10000 / 10 ; ++ i ){ sha3_shake_turbo_done (& c , hash , 10 ); }
532+ sha3_shake_turbo_done (& c , hash , 32 );
533+ if (compare_testvector (hash , 32 , turbo_shake_256_empty_10032 , sizeof (turbo_shake_256_empty_10032 ), "TurboSHAKE256" , 0 )) {
534+ return CRYPT_FAIL_TESTVECTOR ;
535+ }
536+
537+ /* TurboSHAKE256 on single zero byte */
538+ sha3_shake_init (& c , 256 );
539+ sha3_shake_turbo_process (& c , turbo_shake_input_single_zero , sizeof (turbo_shake_input_single_zero ));
540+ sha3_shake_turbo_done (& c , hash , 64 );
541+ if (compare_testvector (hash , 64 , turbo_shake_256_single_zero_byte , sizeof (turbo_shake_256_single_zero_byte ), "TurboSHAKE256" , 0 )) {
542+ return CRYPT_FAIL_TESTVECTOR ;
543+ }
544+
545+ /* TurboSHAKE256 on ptn(17**1) */
546+ sha3_shake_init (& c , 256 );
547+ sha3_shake_turbo_process (& c , turbo_shake_input_ptn_17_pow_1 , sizeof (turbo_shake_input_ptn_17_pow_1 ));
548+ sha3_shake_turbo_done (& c , hash , 64 );
549+ if (compare_testvector (hash , 64 , turbo_shake_256_ptn_pow_1 , sizeof (turbo_shake_256_ptn_pow_1 ), "TurboSHAKE256" , 0 )) {
550+ return CRYPT_FAIL_TESTVECTOR ;
551+ }
552+
553+ /* TurboSHAKE256 on ptn(17**2) */
554+ sha3_shake_init (& c , 256 );
555+ sha3_shake_turbo_process (& c , turbo_shake_input_ptn_17_pow_2 , sizeof (turbo_shake_input_ptn_17_pow_2 ));
556+ sha3_shake_turbo_done (& c , hash , 64 );
557+ if (compare_testvector (hash , 64 , turbo_shake_256_ptn_pow_2 , sizeof (turbo_shake_256_ptn_pow_2 ), "TurboSHAKE256" , 0 )) {
558+ return CRYPT_FAIL_TESTVECTOR ;
559+ }
560+
561+ return CRYPT_OK ;
562+ #endif
563+ }
564+
391565#endif
392566
393567#ifdef LTC_KECCAK
0 commit comments