xref: /freebsd/crypto/openssh/sntrup761.c (revision 8c784bb8cf36911b828652f0bf7e88f443abec50)
1 /*  $OpenBSD: sntrup761.c,v 1.6 2023/01/11 02:13:52 djm Exp $ */
2 
3 /*
4  * Public Domain, Authors:
5  * - Daniel J. Bernstein
6  * - Chitchanok Chuengsatiansup
7  * - Tanja Lange
8  * - Christine van Vredendaal
9  */
10 
11 #include "includes.h"
12 
13 #ifdef USE_SNTRUP761X25519
14 
15 #include <string.h>
16 #include "crypto_api.h"
17 
18 #define int8 crypto_int8
19 #define uint8 crypto_uint8
20 #define int16 crypto_int16
21 #define uint16 crypto_uint16
22 #define int32 crypto_int32
23 #define uint32 crypto_uint32
24 #define int64 crypto_int64
25 #define uint64 crypto_uint64
26 
27 /* from supercop-20201130/crypto_sort/int32/portable4/int32_minmax.inc */
28 #define int32_MINMAX(a,b) \
29 do { \
30   int64_t ab = (int64_t)b ^ (int64_t)a; \
31   int64_t c = (int64_t)b - (int64_t)a; \
32   c ^= ab & (c ^ b); \
33   c >>= 31; \
34   c &= ab; \
35   a ^= c; \
36   b ^= c; \
37 } while(0)
38 
39 /* from supercop-20201130/crypto_sort/int32/portable4/sort.c */
40 
41 
42 static void crypto_sort_int32(void *array,long long n)
43 {
44   long long top,p,q,r,i,j;
45   int32 *x = array;
46 
47   if (n < 2) return;
48   top = 1;
49   while (top < n - top) top += top;
50 
51   for (p = top;p >= 1;p >>= 1) {
52     i = 0;
53     while (i + 2 * p <= n) {
54       for (j = i;j < i + p;++j)
55         int32_MINMAX(x[j],x[j+p]);
56       i += 2 * p;
57     }
58     for (j = i;j < n - p;++j)
59       int32_MINMAX(x[j],x[j+p]);
60 
61     i = 0;
62     j = 0;
63     for (q = top;q > p;q >>= 1) {
64       if (j != i) for (;;) {
65         if (j == n - q) goto done;
66         int32 a = x[j + p];
67         for (r = q;r > p;r >>= 1)
68           int32_MINMAX(a,x[j + r]);
69         x[j + p] = a;
70         ++j;
71         if (j == i + p) {
72           i += 2 * p;
73           break;
74         }
75       }
76       while (i + p <= n - q) {
77         for (j = i;j < i + p;++j) {
78           int32 a = x[j + p];
79           for (r = q;r > p;r >>= 1)
80             int32_MINMAX(a,x[j+r]);
81           x[j + p] = a;
82         }
83         i += 2 * p;
84       }
85       /* now i + p > n - q */
86       j = i;
87       while (j < n - q) {
88         int32 a = x[j + p];
89         for (r = q;r > p;r >>= 1)
90           int32_MINMAX(a,x[j+r]);
91         x[j + p] = a;
92         ++j;
93       }
94 
95       done: ;
96     }
97   }
98 }
99 
100 /* from supercop-20201130/crypto_sort/uint32/useint32/sort.c */
101 
102 /* can save time by vectorizing xor loops */
103 /* can save time by integrating xor loops with int32_sort */
104 
105 static void crypto_sort_uint32(void *array,long long n)
106 {
107   crypto_uint32 *x = array;
108   long long j;
109   for (j = 0;j < n;++j) x[j] ^= 0x80000000;
110   crypto_sort_int32(array,n);
111   for (j = 0;j < n;++j) x[j] ^= 0x80000000;
112 }
113 
114 /* from supercop-20201130/crypto_kem/sntrup761/ref/uint32.c */
115 
116 /*
117 CPU division instruction typically takes time depending on x.
118 This software is designed to take time independent of x.
119 Time still varies depending on m; user must ensure that m is constant.
120 Time also varies on CPUs where multiplication is variable-time.
121 There could be more CPU issues.
122 There could also be compiler issues.
123 */
124 
125 static void uint32_divmod_uint14(uint32 *q,uint16 *r,uint32 x,uint16 m)
126 {
127   uint32 v = 0x80000000;
128   uint32 qpart;
129   uint32 mask;
130 
131   v /= m;
132 
133   /* caller guarantees m > 0 */
134   /* caller guarantees m < 16384 */
135   /* vm <= 2^31 <= vm+m-1 */
136   /* xvm <= 2^31 x <= xvm+x(m-1) */
137 
138   *q = 0;
139 
140   qpart = (x*(uint64)v)>>31;
141   /* 2^31 qpart <= xv <= 2^31 qpart + 2^31-1 */
142   /* 2^31 qpart m <= xvm <= 2^31 qpart m + (2^31-1)m */
143   /* 2^31 qpart m <= 2^31 x <= 2^31 qpart m + (2^31-1)m + x(m-1) */
144   /* 0 <= 2^31 newx <= (2^31-1)m + x(m-1) */
145   /* 0 <= newx <= (1-1/2^31)m + x(m-1)/2^31 */
146   /* 0 <= newx <= (1-1/2^31)(2^14-1) + (2^32-1)((2^14-1)-1)/2^31 */
147 
148   x -= qpart*m; *q += qpart;
149   /* x <= 49146 */
150 
151   qpart = (x*(uint64)v)>>31;
152   /* 0 <= newx <= (1-1/2^31)m + x(m-1)/2^31 */
153   /* 0 <= newx <= m + 49146(2^14-1)/2^31 */
154   /* 0 <= newx <= m + 0.4 */
155   /* 0 <= newx <= m */
156 
157   x -= qpart*m; *q += qpart;
158   /* x <= m */
159 
160   x -= m; *q += 1;
161   mask = -(x>>31);
162   x += mask&(uint32)m; *q += mask;
163   /* x < m */
164 
165   *r = x;
166 }
167 
168 
169 static uint16 uint32_mod_uint14(uint32 x,uint16 m)
170 {
171   uint32 q;
172   uint16 r;
173   uint32_divmod_uint14(&q,&r,x,m);
174   return r;
175 }
176 
177 /* from supercop-20201130/crypto_kem/sntrup761/ref/int32.c */
178 
179 static void int32_divmod_uint14(int32 *q,uint16 *r,int32 x,uint16 m)
180 {
181   uint32 uq,uq2;
182   uint16 ur,ur2;
183   uint32 mask;
184 
185   uint32_divmod_uint14(&uq,&ur,0x80000000+(uint32)x,m);
186   uint32_divmod_uint14(&uq2,&ur2,0x80000000,m);
187   ur -= ur2; uq -= uq2;
188   mask = -(uint32)(ur>>15);
189   ur += mask&m; uq += mask;
190   *r = ur; *q = uq;
191 }
192 
193 
194 static uint16 int32_mod_uint14(int32 x,uint16 m)
195 {
196   int32 q;
197   uint16 r;
198   int32_divmod_uint14(&q,&r,x,m);
199   return r;
200 }
201 
202 /* from supercop-20201130/crypto_kem/sntrup761/ref/paramsmenu.h */
203 /* pick one of these three: */
204 #define SIZE761
205 #undef SIZE653
206 #undef SIZE857
207 
208 /* pick one of these two: */
209 #define SNTRUP /* Streamlined NTRU Prime */
210 #undef LPR /* NTRU LPRime */
211 
212 /* from supercop-20201130/crypto_kem/sntrup761/ref/params.h */
213 #ifndef params_H
214 #define params_H
215 
216 /* menu of parameter choices: */
217 
218 
219 /* what the menu means: */
220 
221 #if defined(SIZE761)
222 #define p 761
223 #define q 4591
224 #define Rounded_bytes 1007
225 #ifndef LPR
226 #define Rq_bytes 1158
227 #define w 286
228 #else
229 #define w 250
230 #define tau0 2156
231 #define tau1 114
232 #define tau2 2007
233 #define tau3 287
234 #endif
235 
236 #elif defined(SIZE653)
237 #define p 653
238 #define q 4621
239 #define Rounded_bytes 865
240 #ifndef LPR
241 #define Rq_bytes 994
242 #define w 288
243 #else
244 #define w 252
245 #define tau0 2175
246 #define tau1 113
247 #define tau2 2031
248 #define tau3 290
249 #endif
250 
251 #elif defined(SIZE857)
252 #define p 857
253 #define q 5167
254 #define Rounded_bytes 1152
255 #ifndef LPR
256 #define Rq_bytes 1322
257 #define w 322
258 #else
259 #define w 281
260 #define tau0 2433
261 #define tau1 101
262 #define tau2 2265
263 #define tau3 324
264 #endif
265 
266 #else
267 #error "no parameter set defined"
268 #endif
269 
270 #ifdef LPR
271 #define I 256
272 #endif
273 
274 #endif
275 
276 /* from supercop-20201130/crypto_kem/sntrup761/ref/Decode.h */
277 #ifndef Decode_H
278 #define Decode_H
279 
280 
281 /* Decode(R,s,M,len) */
282 /* assumes 0 < M[i] < 16384 */
283 /* produces 0 <= R[i] < M[i] */
284 
285 #endif
286 
287 /* from supercop-20201130/crypto_kem/sntrup761/ref/Decode.c */
288 
289 static void Decode(uint16 *out,const unsigned char *S,const uint16 *M,long long len)
290 {
291   if (len == 1) {
292     if (M[0] == 1)
293       *out = 0;
294     else if (M[0] <= 256)
295       *out = uint32_mod_uint14(S[0],M[0]);
296     else
297       *out = uint32_mod_uint14(S[0]+(((uint16)S[1])<<8),M[0]);
298   }
299   if (len > 1) {
300     uint16 R2[(len+1)/2];
301     uint16 M2[(len+1)/2];
302     uint16 bottomr[len/2];
303     uint32 bottomt[len/2];
304     long long i;
305     for (i = 0;i < len-1;i += 2) {
306       uint32 m = M[i]*(uint32) M[i+1];
307       if (m > 256*16383) {
308         bottomt[i/2] = 256*256;
309         bottomr[i/2] = S[0]+256*S[1];
310         S += 2;
311         M2[i/2] = (((m+255)>>8)+255)>>8;
312       } else if (m >= 16384) {
313         bottomt[i/2] = 256;
314         bottomr[i/2] = S[0];
315         S += 1;
316         M2[i/2] = (m+255)>>8;
317       } else {
318         bottomt[i/2] = 1;
319         bottomr[i/2] = 0;
320         M2[i/2] = m;
321       }
322     }
323     if (i < len)
324       M2[i/2] = M[i];
325     Decode(R2,S,M2,(len+1)/2);
326     for (i = 0;i < len-1;i += 2) {
327       uint32 r = bottomr[i/2];
328       uint32 r1;
329       uint16 r0;
330       r += bottomt[i/2]*R2[i/2];
331       uint32_divmod_uint14(&r1,&r0,r,M[i]);
332       r1 = uint32_mod_uint14(r1,M[i+1]); /* only needed for invalid inputs */
333       *out++ = r0;
334       *out++ = r1;
335     }
336     if (i < len)
337       *out++ = R2[i/2];
338   }
339 }
340 
341 /* from supercop-20201130/crypto_kem/sntrup761/ref/Encode.h */
342 #ifndef Encode_H
343 #define Encode_H
344 
345 
346 /* Encode(s,R,M,len) */
347 /* assumes 0 <= R[i] < M[i] < 16384 */
348 
349 #endif
350 
351 /* from supercop-20201130/crypto_kem/sntrup761/ref/Encode.c */
352 
353 /* 0 <= R[i] < M[i] < 16384 */
354 static void Encode(unsigned char *out,const uint16 *R,const uint16 *M,long long len)
355 {
356   if (len == 1) {
357     uint16 r = R[0];
358     uint16 m = M[0];
359     while (m > 1) {
360       *out++ = r;
361       r >>= 8;
362       m = (m+255)>>8;
363     }
364   }
365   if (len > 1) {
366     uint16 R2[(len+1)/2];
367     uint16 M2[(len+1)/2];
368     long long i;
369     for (i = 0;i < len-1;i += 2) {
370       uint32 m0 = M[i];
371       uint32 r = R[i]+R[i+1]*m0;
372       uint32 m = M[i+1]*m0;
373       while (m >= 16384) {
374         *out++ = r;
375         r >>= 8;
376         m = (m+255)>>8;
377       }
378       R2[i/2] = r;
379       M2[i/2] = m;
380     }
381     if (i < len) {
382       R2[i/2] = R[i];
383       M2[i/2] = M[i];
384     }
385     Encode(out,R2,M2,(len+1)/2);
386   }
387 }
388 
389 /* from supercop-20201130/crypto_kem/sntrup761/ref/kem.c */
390 
391 #ifdef LPR
392 #endif
393 
394 
395 /* ----- masks */
396 
397 #ifndef LPR
398 
399 /* return -1 if x!=0; else return 0 */
400 static int int16_nonzero_mask(int16 x)
401 {
402   uint16 u = x; /* 0, else 1...65535 */
403   uint32 v = u; /* 0, else 1...65535 */
404   v = -v; /* 0, else 2^32-65535...2^32-1 */
405   v >>= 31; /* 0, else 1 */
406   return -v; /* 0, else -1 */
407 }
408 
409 #endif
410 
411 /* return -1 if x<0; otherwise return 0 */
412 static int int16_negative_mask(int16 x)
413 {
414   uint16 u = x;
415   u >>= 15;
416   return -(int) u;
417   /* alternative with gcc -fwrapv: */
418   /* x>>15 compiles to CPU's arithmetic right shift */
419 }
420 
421 /* ----- arithmetic mod 3 */
422 
423 typedef int8 small;
424 
425 /* F3 is always represented as -1,0,1 */
426 /* so ZZ_fromF3 is a no-op */
427 
428 /* x must not be close to top int16 */
429 static small F3_freeze(int16 x)
430 {
431   return int32_mod_uint14(x+1,3)-1;
432 }
433 
434 /* ----- arithmetic mod q */
435 
436 #define q12 ((q-1)/2)
437 typedef int16 Fq;
438 /* always represented as -q12...q12 */
439 /* so ZZ_fromFq is a no-op */
440 
441 /* x must not be close to top int32 */
442 static Fq Fq_freeze(int32 x)
443 {
444   return int32_mod_uint14(x+q12,q)-q12;
445 }
446 
447 #ifndef LPR
448 
449 static Fq Fq_recip(Fq a1)
450 {
451   int i = 1;
452   Fq ai = a1;
453 
454   while (i < q-2) {
455     ai = Fq_freeze(a1*(int32)ai);
456     i += 1;
457   }
458   return ai;
459 }
460 
461 #endif
462 
463 /* ----- Top and Right */
464 
465 #ifdef LPR
466 #define tau 16
467 
468 static int8 Top(Fq C)
469 {
470   return (tau1*(int32)(C+tau0)+16384)>>15;
471 }
472 
473 static Fq Right(int8 T)
474 {
475   return Fq_freeze(tau3*(int32)T-tau2);
476 }
477 #endif
478 
479 /* ----- small polynomials */
480 
481 #ifndef LPR
482 
483 /* 0 if Weightw_is(r), else -1 */
484 static int Weightw_mask(small *r)
485 {
486   int weight = 0;
487   int i;
488 
489   for (i = 0;i < p;++i) weight += r[i]&1;
490   return int16_nonzero_mask(weight-w);
491 }
492 
493 /* R3_fromR(R_fromRq(r)) */
494 static void R3_fromRq(small *out,const Fq *r)
495 {
496   int i;
497   for (i = 0;i < p;++i) out[i] = F3_freeze(r[i]);
498 }
499 
500 /* h = f*g in the ring R3 */
501 static void R3_mult(small *h,const small *f,const small *g)
502 {
503   small fg[p+p-1];
504   small result;
505   int i,j;
506 
507   for (i = 0;i < p;++i) {
508     result = 0;
509     for (j = 0;j <= i;++j) result = F3_freeze(result+f[j]*g[i-j]);
510     fg[i] = result;
511   }
512   for (i = p;i < p+p-1;++i) {
513     result = 0;
514     for (j = i-p+1;j < p;++j) result = F3_freeze(result+f[j]*g[i-j]);
515     fg[i] = result;
516   }
517 
518   for (i = p+p-2;i >= p;--i) {
519     fg[i-p] = F3_freeze(fg[i-p]+fg[i]);
520     fg[i-p+1] = F3_freeze(fg[i-p+1]+fg[i]);
521   }
522 
523   for (i = 0;i < p;++i) h[i] = fg[i];
524 }
525 
526 /* returns 0 if recip succeeded; else -1 */
527 static int R3_recip(small *out,const small *in)
528 {
529   small f[p+1],g[p+1],v[p+1],r[p+1];
530   int i,loop,delta;
531   int sign,swap,t;
532 
533   for (i = 0;i < p+1;++i) v[i] = 0;
534   for (i = 0;i < p+1;++i) r[i] = 0;
535   r[0] = 1;
536   for (i = 0;i < p;++i) f[i] = 0;
537   f[0] = 1; f[p-1] = f[p] = -1;
538   for (i = 0;i < p;++i) g[p-1-i] = in[i];
539   g[p] = 0;
540 
541   delta = 1;
542 
543   for (loop = 0;loop < 2*p-1;++loop) {
544     for (i = p;i > 0;--i) v[i] = v[i-1];
545     v[0] = 0;
546 
547     sign = -g[0]*f[0];
548     swap = int16_negative_mask(-delta) & int16_nonzero_mask(g[0]);
549     delta ^= swap&(delta^-delta);
550     delta += 1;
551 
552     for (i = 0;i < p+1;++i) {
553       t = swap&(f[i]^g[i]); f[i] ^= t; g[i] ^= t;
554       t = swap&(v[i]^r[i]); v[i] ^= t; r[i] ^= t;
555     }
556 
557     for (i = 0;i < p+1;++i) g[i] = F3_freeze(g[i]+sign*f[i]);
558     for (i = 0;i < p+1;++i) r[i] = F3_freeze(r[i]+sign*v[i]);
559 
560     for (i = 0;i < p;++i) g[i] = g[i+1];
561     g[p] = 0;
562   }
563 
564   sign = f[0];
565   for (i = 0;i < p;++i) out[i] = sign*v[p-1-i];
566 
567   return int16_nonzero_mask(delta);
568 }
569 
570 #endif
571 
572 /* ----- polynomials mod q */
573 
574 /* h = f*g in the ring Rq */
575 static void Rq_mult_small(Fq *h,const Fq *f,const small *g)
576 {
577   Fq fg[p+p-1];
578   Fq result;
579   int i,j;
580 
581   for (i = 0;i < p;++i) {
582     result = 0;
583     for (j = 0;j <= i;++j) result = Fq_freeze(result+f[j]*(int32)g[i-j]);
584     fg[i] = result;
585   }
586   for (i = p;i < p+p-1;++i) {
587     result = 0;
588     for (j = i-p+1;j < p;++j) result = Fq_freeze(result+f[j]*(int32)g[i-j]);
589     fg[i] = result;
590   }
591 
592   for (i = p+p-2;i >= p;--i) {
593     fg[i-p] = Fq_freeze(fg[i-p]+fg[i]);
594     fg[i-p+1] = Fq_freeze(fg[i-p+1]+fg[i]);
595   }
596 
597   for (i = 0;i < p;++i) h[i] = fg[i];
598 }
599 
600 #ifndef LPR
601 
602 /* h = 3f in Rq */
603 static void Rq_mult3(Fq *h,const Fq *f)
604 {
605   int i;
606 
607   for (i = 0;i < p;++i) h[i] = Fq_freeze(3*f[i]);
608 }
609 
610 /* out = 1/(3*in) in Rq */
611 /* returns 0 if recip succeeded; else -1 */
612 static int Rq_recip3(Fq *out,const small *in)
613 {
614   Fq f[p+1],g[p+1],v[p+1],r[p+1];
615   int i,loop,delta;
616   int swap,t;
617   int32 f0,g0;
618   Fq scale;
619 
620   for (i = 0;i < p+1;++i) v[i] = 0;
621   for (i = 0;i < p+1;++i) r[i] = 0;
622   r[0] = Fq_recip(3);
623   for (i = 0;i < p;++i) f[i] = 0;
624   f[0] = 1; f[p-1] = f[p] = -1;
625   for (i = 0;i < p;++i) g[p-1-i] = in[i];
626   g[p] = 0;
627 
628   delta = 1;
629 
630   for (loop = 0;loop < 2*p-1;++loop) {
631     for (i = p;i > 0;--i) v[i] = v[i-1];
632     v[0] = 0;
633 
634     swap = int16_negative_mask(-delta) & int16_nonzero_mask(g[0]);
635     delta ^= swap&(delta^-delta);
636     delta += 1;
637 
638     for (i = 0;i < p+1;++i) {
639       t = swap&(f[i]^g[i]); f[i] ^= t; g[i] ^= t;
640       t = swap&(v[i]^r[i]); v[i] ^= t; r[i] ^= t;
641     }
642 
643     f0 = f[0];
644     g0 = g[0];
645     for (i = 0;i < p+1;++i) g[i] = Fq_freeze(f0*g[i]-g0*f[i]);
646     for (i = 0;i < p+1;++i) r[i] = Fq_freeze(f0*r[i]-g0*v[i]);
647 
648     for (i = 0;i < p;++i) g[i] = g[i+1];
649     g[p] = 0;
650   }
651 
652   scale = Fq_recip(f[0]);
653   for (i = 0;i < p;++i) out[i] = Fq_freeze(scale*(int32)v[p-1-i]);
654 
655   return int16_nonzero_mask(delta);
656 }
657 
658 #endif
659 
660 /* ----- rounded polynomials mod q */
661 
662 static void Round(Fq *out,const Fq *a)
663 {
664   int i;
665   for (i = 0;i < p;++i) out[i] = a[i]-F3_freeze(a[i]);
666 }
667 
668 /* ----- sorting to generate short polynomial */
669 
670 static void Short_fromlist(small *out,const uint32 *in)
671 {
672   uint32 L[p];
673   int i;
674 
675   for (i = 0;i < w;++i) L[i] = in[i]&(uint32)-2;
676   for (i = w;i < p;++i) L[i] = (in[i]&(uint32)-3)|1;
677   crypto_sort_uint32(L,p);
678   for (i = 0;i < p;++i) out[i] = (L[i]&3)-1;
679 }
680 
681 /* ----- underlying hash function */
682 
683 #define Hash_bytes 32
684 
685 /* e.g., b = 0 means out = Hash0(in) */
686 static void Hash_prefix(unsigned char *out,int b,const unsigned char *in,int inlen)
687 {
688   unsigned char x[inlen+1];
689   unsigned char h[64];
690   int i;
691 
692   x[0] = b;
693   for (i = 0;i < inlen;++i) x[i+1] = in[i];
694   crypto_hash_sha512(h,x,inlen+1);
695   for (i = 0;i < 32;++i) out[i] = h[i];
696 }
697 
698 /* ----- higher-level randomness */
699 
700 static uint32 urandom32(void)
701 {
702   unsigned char c[4];
703   uint32 out[4];
704 
705   randombytes(c,4);
706   out[0] = (uint32)c[0];
707   out[1] = ((uint32)c[1])<<8;
708   out[2] = ((uint32)c[2])<<16;
709   out[3] = ((uint32)c[3])<<24;
710   return out[0]+out[1]+out[2]+out[3];
711 }
712 
713 static void Short_random(small *out)
714 {
715   uint32 L[p];
716   int i;
717 
718   for (i = 0;i < p;++i) L[i] = urandom32();
719   Short_fromlist(out,L);
720 }
721 
722 #ifndef LPR
723 
724 static void Small_random(small *out)
725 {
726   int i;
727 
728   for (i = 0;i < p;++i) out[i] = (((urandom32()&0x3fffffff)*3)>>30)-1;
729 }
730 
731 #endif
732 
733 /* ----- Streamlined NTRU Prime Core */
734 
735 #ifndef LPR
736 
737 /* h,(f,ginv) = KeyGen() */
738 static void KeyGen(Fq *h,small *f,small *ginv)
739 {
740   small g[p];
741   Fq finv[p];
742 
743   for (;;) {
744     Small_random(g);
745     if (R3_recip(ginv,g) == 0) break;
746   }
747   Short_random(f);
748   Rq_recip3(finv,f); /* always works */
749   Rq_mult_small(h,finv,g);
750 }
751 
752 /* c = Encrypt(r,h) */
753 static void Encrypt(Fq *c,const small *r,const Fq *h)
754 {
755   Fq hr[p];
756 
757   Rq_mult_small(hr,h,r);
758   Round(c,hr);
759 }
760 
761 /* r = Decrypt(c,(f,ginv)) */
762 static void Decrypt(small *r,const Fq *c,const small *f,const small *ginv)
763 {
764   Fq cf[p];
765   Fq cf3[p];
766   small e[p];
767   small ev[p];
768   int mask;
769   int i;
770 
771   Rq_mult_small(cf,c,f);
772   Rq_mult3(cf3,cf);
773   R3_fromRq(e,cf3);
774   R3_mult(ev,e,ginv);
775 
776   mask = Weightw_mask(ev); /* 0 if weight w, else -1 */
777   for (i = 0;i < w;++i) r[i] = ((ev[i]^1)&~mask)^1;
778   for (i = w;i < p;++i) r[i] = ev[i]&~mask;
779 }
780 
781 #endif
782 
783 /* ----- NTRU LPRime Core */
784 
785 #ifdef LPR
786 
787 /* (G,A),a = KeyGen(G); leaves G unchanged */
788 static void KeyGen(Fq *A,small *a,const Fq *G)
789 {
790   Fq aG[p];
791 
792   Short_random(a);
793   Rq_mult_small(aG,G,a);
794   Round(A,aG);
795 }
796 
797 /* B,T = Encrypt(r,(G,A),b) */
798 static void Encrypt(Fq *B,int8 *T,const int8 *r,const Fq *G,const Fq *A,const small *b)
799 {
800   Fq bG[p];
801   Fq bA[p];
802   int i;
803 
804   Rq_mult_small(bG,G,b);
805   Round(B,bG);
806   Rq_mult_small(bA,A,b);
807   for (i = 0;i < I;++i) T[i] = Top(Fq_freeze(bA[i]+r[i]*q12));
808 }
809 
810 /* r = Decrypt((B,T),a) */
811 static void Decrypt(int8 *r,const Fq *B,const int8 *T,const small *a)
812 {
813   Fq aB[p];
814   int i;
815 
816   Rq_mult_small(aB,B,a);
817   for (i = 0;i < I;++i)
818     r[i] = -int16_negative_mask(Fq_freeze(Right(T[i])-aB[i]+4*w+1));
819 }
820 
821 #endif
822 
823 /* ----- encoding I-bit inputs */
824 
825 #ifdef LPR
826 
827 #define Inputs_bytes (I/8)
828 typedef int8 Inputs[I]; /* passed by reference */
829 
830 static void Inputs_encode(unsigned char *s,const Inputs r)
831 {
832   int i;
833   for (i = 0;i < Inputs_bytes;++i) s[i] = 0;
834   for (i = 0;i < I;++i) s[i>>3] |= r[i]<<(i&7);
835 }
836 
837 #endif
838 
839 /* ----- Expand */
840 
841 #ifdef LPR
842 
843 static const unsigned char aes_nonce[16] = {0};
844 
845 static void Expand(uint32 *L,const unsigned char *k)
846 {
847   int i;
848   crypto_stream_aes256ctr((unsigned char *) L,4*p,aes_nonce,k);
849   for (i = 0;i < p;++i) {
850     uint32 L0 = ((unsigned char *) L)[4*i];
851     uint32 L1 = ((unsigned char *) L)[4*i+1];
852     uint32 L2 = ((unsigned char *) L)[4*i+2];
853     uint32 L3 = ((unsigned char *) L)[4*i+3];
854     L[i] = L0+(L1<<8)+(L2<<16)+(L3<<24);
855   }
856 }
857 
858 #endif
859 
860 /* ----- Seeds */
861 
862 #ifdef LPR
863 
864 #define Seeds_bytes 32
865 
866 static void Seeds_random(unsigned char *s)
867 {
868   randombytes(s,Seeds_bytes);
869 }
870 
871 #endif
872 
873 /* ----- Generator, HashShort */
874 
875 #ifdef LPR
876 
877 /* G = Generator(k) */
878 static void Generator(Fq *G,const unsigned char *k)
879 {
880   uint32 L[p];
881   int i;
882 
883   Expand(L,k);
884   for (i = 0;i < p;++i) G[i] = uint32_mod_uint14(L[i],q)-q12;
885 }
886 
887 /* out = HashShort(r) */
888 static void HashShort(small *out,const Inputs r)
889 {
890   unsigned char s[Inputs_bytes];
891   unsigned char h[Hash_bytes];
892   uint32 L[p];
893 
894   Inputs_encode(s,r);
895   Hash_prefix(h,5,s,sizeof s);
896   Expand(L,h);
897   Short_fromlist(out,L);
898 }
899 
900 #endif
901 
902 /* ----- NTRU LPRime Expand */
903 
904 #ifdef LPR
905 
906 /* (S,A),a = XKeyGen() */
907 static void XKeyGen(unsigned char *S,Fq *A,small *a)
908 {
909   Fq G[p];
910 
911   Seeds_random(S);
912   Generator(G,S);
913   KeyGen(A,a,G);
914 }
915 
916 /* B,T = XEncrypt(r,(S,A)) */
917 static void XEncrypt(Fq *B,int8 *T,const int8 *r,const unsigned char *S,const Fq *A)
918 {
919   Fq G[p];
920   small b[p];
921 
922   Generator(G,S);
923   HashShort(b,r);
924   Encrypt(B,T,r,G,A,b);
925 }
926 
927 #define XDecrypt Decrypt
928 
929 #endif
930 
931 /* ----- encoding small polynomials (including short polynomials) */
932 
933 #define Small_bytes ((p+3)/4)
934 
935 /* these are the only functions that rely on p mod 4 = 1 */
936 
937 static void Small_encode(unsigned char *s,const small *f)
938 {
939   small x;
940   int i;
941 
942   for (i = 0;i < p/4;++i) {
943     x = *f++ + 1;
944     x += (*f++ + 1)<<2;
945     x += (*f++ + 1)<<4;
946     x += (*f++ + 1)<<6;
947     *s++ = x;
948   }
949   x = *f++ + 1;
950   *s++ = x;
951 }
952 
953 static void Small_decode(small *f,const unsigned char *s)
954 {
955   unsigned char x;
956   int i;
957 
958   for (i = 0;i < p/4;++i) {
959     x = *s++;
960     *f++ = ((small)(x&3))-1; x >>= 2;
961     *f++ = ((small)(x&3))-1; x >>= 2;
962     *f++ = ((small)(x&3))-1; x >>= 2;
963     *f++ = ((small)(x&3))-1;
964   }
965   x = *s++;
966   *f++ = ((small)(x&3))-1;
967 }
968 
969 /* ----- encoding general polynomials */
970 
971 #ifndef LPR
972 
973 static void Rq_encode(unsigned char *s,const Fq *r)
974 {
975   uint16 R[p],M[p];
976   int i;
977 
978   for (i = 0;i < p;++i) R[i] = r[i]+q12;
979   for (i = 0;i < p;++i) M[i] = q;
980   Encode(s,R,M,p);
981 }
982 
983 static void Rq_decode(Fq *r,const unsigned char *s)
984 {
985   uint16 R[p],M[p];
986   int i;
987 
988   for (i = 0;i < p;++i) M[i] = q;
989   Decode(R,s,M,p);
990   for (i = 0;i < p;++i) r[i] = ((Fq)R[i])-q12;
991 }
992 
993 #endif
994 
995 /* ----- encoding rounded polynomials */
996 
997 static void Rounded_encode(unsigned char *s,const Fq *r)
998 {
999   uint16 R[p],M[p];
1000   int i;
1001 
1002   for (i = 0;i < p;++i) R[i] = ((r[i]+q12)*10923)>>15;
1003   for (i = 0;i < p;++i) M[i] = (q+2)/3;
1004   Encode(s,R,M,p);
1005 }
1006 
1007 static void Rounded_decode(Fq *r,const unsigned char *s)
1008 {
1009   uint16 R[p],M[p];
1010   int i;
1011 
1012   for (i = 0;i < p;++i) M[i] = (q+2)/3;
1013   Decode(R,s,M,p);
1014   for (i = 0;i < p;++i) r[i] = R[i]*3-q12;
1015 }
1016 
1017 /* ----- encoding top polynomials */
1018 
1019 #ifdef LPR
1020 
1021 #define Top_bytes (I/2)
1022 
1023 static void Top_encode(unsigned char *s,const int8 *T)
1024 {
1025   int i;
1026   for (i = 0;i < Top_bytes;++i)
1027     s[i] = T[2*i]+(T[2*i+1]<<4);
1028 }
1029 
1030 static void Top_decode(int8 *T,const unsigned char *s)
1031 {
1032   int i;
1033   for (i = 0;i < Top_bytes;++i) {
1034     T[2*i] = s[i]&15;
1035     T[2*i+1] = s[i]>>4;
1036   }
1037 }
1038 
1039 #endif
1040 
1041 /* ----- Streamlined NTRU Prime Core plus encoding */
1042 
1043 #ifndef LPR
1044 
1045 typedef small Inputs[p]; /* passed by reference */
1046 #define Inputs_random Short_random
1047 #define Inputs_encode Small_encode
1048 #define Inputs_bytes Small_bytes
1049 
1050 #define Ciphertexts_bytes Rounded_bytes
1051 #define SecretKeys_bytes (2*Small_bytes)
1052 #define PublicKeys_bytes Rq_bytes
1053 
1054 /* pk,sk = ZKeyGen() */
1055 static void ZKeyGen(unsigned char *pk,unsigned char *sk)
1056 {
1057   Fq h[p];
1058   small f[p],v[p];
1059 
1060   KeyGen(h,f,v);
1061   Rq_encode(pk,h);
1062   Small_encode(sk,f); sk += Small_bytes;
1063   Small_encode(sk,v);
1064 }
1065 
1066 /* C = ZEncrypt(r,pk) */
1067 static void ZEncrypt(unsigned char *C,const Inputs r,const unsigned char *pk)
1068 {
1069   Fq h[p];
1070   Fq c[p];
1071   Rq_decode(h,pk);
1072   Encrypt(c,r,h);
1073   Rounded_encode(C,c);
1074 }
1075 
1076 /* r = ZDecrypt(C,sk) */
1077 static void ZDecrypt(Inputs r,const unsigned char *C,const unsigned char *sk)
1078 {
1079   small f[p],v[p];
1080   Fq c[p];
1081 
1082   Small_decode(f,sk); sk += Small_bytes;
1083   Small_decode(v,sk);
1084   Rounded_decode(c,C);
1085   Decrypt(r,c,f,v);
1086 }
1087 
1088 #endif
1089 
1090 /* ----- NTRU LPRime Expand plus encoding */
1091 
1092 #ifdef LPR
1093 
1094 #define Ciphertexts_bytes (Rounded_bytes+Top_bytes)
1095 #define SecretKeys_bytes Small_bytes
1096 #define PublicKeys_bytes (Seeds_bytes+Rounded_bytes)
1097 
1098 static void Inputs_random(Inputs r)
1099 {
1100   unsigned char s[Inputs_bytes];
1101   int i;
1102 
1103   randombytes(s,sizeof s);
1104   for (i = 0;i < I;++i) r[i] = 1&(s[i>>3]>>(i&7));
1105 }
1106 
1107 /* pk,sk = ZKeyGen() */
1108 static void ZKeyGen(unsigned char *pk,unsigned char *sk)
1109 {
1110   Fq A[p];
1111   small a[p];
1112 
1113   XKeyGen(pk,A,a); pk += Seeds_bytes;
1114   Rounded_encode(pk,A);
1115   Small_encode(sk,a);
1116 }
1117 
1118 /* c = ZEncrypt(r,pk) */
1119 static void ZEncrypt(unsigned char *c,const Inputs r,const unsigned char *pk)
1120 {
1121   Fq A[p];
1122   Fq B[p];
1123   int8 T[I];
1124 
1125   Rounded_decode(A,pk+Seeds_bytes);
1126   XEncrypt(B,T,r,pk,A);
1127   Rounded_encode(c,B); c += Rounded_bytes;
1128   Top_encode(c,T);
1129 }
1130 
1131 /* r = ZDecrypt(C,sk) */
1132 static void ZDecrypt(Inputs r,const unsigned char *c,const unsigned char *sk)
1133 {
1134   small a[p];
1135   Fq B[p];
1136   int8 T[I];
1137 
1138   Small_decode(a,sk);
1139   Rounded_decode(B,c);
1140   Top_decode(T,c+Rounded_bytes);
1141   XDecrypt(r,B,T,a);
1142 }
1143 
1144 #endif
1145 
1146 /* ----- confirmation hash */
1147 
1148 #define Confirm_bytes 32
1149 
1150 /* h = HashConfirm(r,pk,cache); cache is Hash4(pk) */
1151 static void HashConfirm(unsigned char *h,const unsigned char *r,const unsigned char *pk,const unsigned char *cache)
1152 {
1153 #ifndef LPR
1154   unsigned char x[Hash_bytes*2];
1155   int i;
1156 
1157   Hash_prefix(x,3,r,Inputs_bytes);
1158   for (i = 0;i < Hash_bytes;++i) x[Hash_bytes+i] = cache[i];
1159 #else
1160   unsigned char x[Inputs_bytes+Hash_bytes];
1161   int i;
1162 
1163   for (i = 0;i < Inputs_bytes;++i) x[i] = r[i];
1164   for (i = 0;i < Hash_bytes;++i) x[Inputs_bytes+i] = cache[i];
1165 #endif
1166   Hash_prefix(h,2,x,sizeof x);
1167 }
1168 
1169 /* ----- session-key hash */
1170 
1171 /* k = HashSession(b,y,z) */
1172 static void HashSession(unsigned char *k,int b,const unsigned char *y,const unsigned char *z)
1173 {
1174 #ifndef LPR
1175   unsigned char x[Hash_bytes+Ciphertexts_bytes+Confirm_bytes];
1176   int i;
1177 
1178   Hash_prefix(x,3,y,Inputs_bytes);
1179   for (i = 0;i < Ciphertexts_bytes+Confirm_bytes;++i) x[Hash_bytes+i] = z[i];
1180 #else
1181   unsigned char x[Inputs_bytes+Ciphertexts_bytes+Confirm_bytes];
1182   int i;
1183 
1184   for (i = 0;i < Inputs_bytes;++i) x[i] = y[i];
1185   for (i = 0;i < Ciphertexts_bytes+Confirm_bytes;++i) x[Inputs_bytes+i] = z[i];
1186 #endif
1187   Hash_prefix(k,b,x,sizeof x);
1188 }
1189 
1190 /* ----- Streamlined NTRU Prime and NTRU LPRime */
1191 
1192 /* pk,sk = KEM_KeyGen() */
1193 static void KEM_KeyGen(unsigned char *pk,unsigned char *sk)
1194 {
1195   int i;
1196 
1197   ZKeyGen(pk,sk); sk += SecretKeys_bytes;
1198   for (i = 0;i < PublicKeys_bytes;++i) *sk++ = pk[i];
1199   randombytes(sk,Inputs_bytes); sk += Inputs_bytes;
1200   Hash_prefix(sk,4,pk,PublicKeys_bytes);
1201 }
1202 
1203 /* c,r_enc = Hide(r,pk,cache); cache is Hash4(pk) */
1204 static void Hide(unsigned char *c,unsigned char *r_enc,const Inputs r,const unsigned char *pk,const unsigned char *cache)
1205 {
1206   Inputs_encode(r_enc,r);
1207   ZEncrypt(c,r,pk); c += Ciphertexts_bytes;
1208   HashConfirm(c,r_enc,pk,cache);
1209 }
1210 
1211 /* c,k = Encap(pk) */
1212 static void Encap(unsigned char *c,unsigned char *k,const unsigned char *pk)
1213 {
1214   Inputs r;
1215   unsigned char r_enc[Inputs_bytes];
1216   unsigned char cache[Hash_bytes];
1217 
1218   Hash_prefix(cache,4,pk,PublicKeys_bytes);
1219   Inputs_random(r);
1220   Hide(c,r_enc,r,pk,cache);
1221   HashSession(k,1,r_enc,c);
1222 }
1223 
1224 /* 0 if matching ciphertext+confirm, else -1 */
1225 static int Ciphertexts_diff_mask(const unsigned char *c,const unsigned char *c2)
1226 {
1227   uint16 differentbits = 0;
1228   int len = Ciphertexts_bytes+Confirm_bytes;
1229 
1230   while (len-- > 0) differentbits |= (*c++)^(*c2++);
1231   return (1&((differentbits-1)>>8))-1;
1232 }
1233 
1234 /* k = Decap(c,sk) */
1235 static void Decap(unsigned char *k,const unsigned char *c,const unsigned char *sk)
1236 {
1237   const unsigned char *pk = sk + SecretKeys_bytes;
1238   const unsigned char *rho = pk + PublicKeys_bytes;
1239   const unsigned char *cache = rho + Inputs_bytes;
1240   Inputs r;
1241   unsigned char r_enc[Inputs_bytes];
1242   unsigned char cnew[Ciphertexts_bytes+Confirm_bytes];
1243   int mask;
1244   int i;
1245 
1246   ZDecrypt(r,c,sk);
1247   Hide(cnew,r_enc,r,pk,cache);
1248   mask = Ciphertexts_diff_mask(c,cnew);
1249   for (i = 0;i < Inputs_bytes;++i) r_enc[i] ^= mask&(r_enc[i]^rho[i]);
1250   HashSession(k,1+mask,r_enc,c);
1251 }
1252 
1253 /* ----- crypto_kem API */
1254 
1255 
1256 int crypto_kem_sntrup761_keypair(unsigned char *pk,unsigned char *sk)
1257 {
1258   KEM_KeyGen(pk,sk);
1259   return 0;
1260 }
1261 
1262 int crypto_kem_sntrup761_enc(unsigned char *c,unsigned char *k,const unsigned char *pk)
1263 {
1264   Encap(c,k,pk);
1265   return 0;
1266 }
1267 
1268 int crypto_kem_sntrup761_dec(unsigned char *k,const unsigned char *c,const unsigned char *sk)
1269 {
1270   Decap(k,c,sk);
1271   return 0;
1272 }
1273 #endif /* USE_SNTRUP761X25519 */
1274