@@ -180,7 +180,7 @@ static int IsKyberLevelAvailable(const char* line)
180180 begin += 6 ;
181181 end = XSTRSTR (begin , " " );
182182
183- #ifndef WOLFSSL_NO_ML_KEM
183+ #ifndef WOLFSSL_NO_ML_KEM
184184 if ((size_t )end - (size_t )begin == 10 ) {
185185 #ifndef WOLFSSL_NO_ML_KEM_512
186186 if (XSTRNCMP (begin , "ML_KEM_512" , 10 ) == 0 ) {
@@ -200,8 +200,64 @@ static int IsKyberLevelAvailable(const char* line)
200200 }
201201 }
202202 #endif
203- #endif
204- #ifdef WOLFSSL_MLKEM_KYBER
203+ #if !defined(WOLFSSL_NO_ML_KEM_768 ) && defined(HAVE_ECC )
204+ if ((size_t )end - (size_t )begin == 17 ) {
205+ if (XSTRNCMP (begin , "SecP256r1MLKEM768" , 17 ) == 0 ) {
206+ available = 1 ;
207+ }
208+ }
209+ #endif /* !WOLFSSL_NO_ML_KEM_768 && HAVE_ECC */
210+ #if !defined(WOLFSSL_NO_ML_KEM_768 ) && defined(HAVE_CURVE25519 )
211+ if ((size_t )end - (size_t )begin == 14 ) {
212+ if (XSTRNCMP (begin , "X25519MLKEM768" , 14 ) == 0 ) {
213+ available = 1 ;
214+ }
215+ }
216+ #endif /* !WOLFSSL_NO_ML_KEM_768 && HAVE_CURVE25519 */
217+ #if !defined(WOLFSSL_NO_ML_KEM_1024 ) && defined(HAVE_ECC384 )
218+ if ((size_t )end - (size_t )begin == 18 ) {
219+ if (XSTRNCMP (begin , "SecP384r1MLKEM1024" , 18 ) == 0 ) {
220+ available = 1 ;
221+ }
222+ }
223+ #endif /* !WOLFSSL_NO_ML_KEM_1024 && HAVE_ECC384 */
224+ #if !defined(WOLFSSL_NO_ML_KEM_512 ) && defined(HAVE_ECC )
225+ if ((size_t )end - (size_t )begin == 17 ) {
226+ if (XSTRNCMP (begin , "SecP256r1MLKEM512" , 17 ) == 0 ) {
227+ available = 1 ;
228+ }
229+ }
230+ #endif /* !WOLFSSL_NO_ML_KEM_512 && HAVE_ECC */
231+ #if !defined(WOLFSSL_NO_ML_KEM_512 ) && defined(HAVE_CURVE25519 )
232+ if ((size_t )end - (size_t )begin == 14 ) {
233+ if (XSTRNCMP (begin , "X25519MLKEM512" , 14 ) == 0 ) {
234+ available = 1 ;
235+ }
236+ }
237+ #endif /* !WOLFSSL_NO_ML_KEM_512 && HAVE_CURVE25519 */
238+ #if !defined(WOLFSSL_NO_ML_KEM_768 ) && defined(HAVE_ECC384 )
239+ if ((size_t )end - (size_t )begin == 17 ) {
240+ if (XSTRNCMP (begin , "SecP384r1MLKEM768" , 17 ) == 0 ) {
241+ available = 1 ;
242+ }
243+ }
244+ #endif /* !WOLFSSL_NO_ML_KEM_768 && HAVE_ECC384 */
245+ #if !defined(WOLFSSL_NO_ML_KEM_768 ) && defined(HAVE_CURVE448 )
246+ if ((size_t )end - (size_t )begin == 12 ) {
247+ if (XSTRNCMP (begin , "X448MLKEM768" , 12 ) == 0 ) {
248+ available = 1 ;
249+ }
250+ }
251+ #endif /* !WOLFSSL_NO_ML_KEM_768 && HAVE_CURVE448 */
252+ #if !defined(WOLFSSL_NO_ML_KEM_1024 ) && defined(HAVE_ECC521 )
253+ if ((size_t )end - (size_t )begin == 18 ) {
254+ if (XSTRNCMP (begin , "SecP521r1MLKEM1024" , 18 ) == 0 ) {
255+ available = 1 ;
256+ }
257+ }
258+ #endif /* !WOLFSSL_NO_ML_KEM_1024 */
259+ #endif /* !WOLFSSL_NO_ML_KEM */
260+ #ifdef WOLFSSL_MLKEM_KYBER
205261 if ((size_t )end - (size_t )begin == 12 ) {
206262 #ifndef WOLFSSL_NO_KYBER512
207263 if (XSTRNCMP (begin , "KYBER_LEVEL1" , 12 ) == 0 ) {
@@ -219,7 +275,8 @@ static int IsKyberLevelAvailable(const char* line)
219275 }
220276 #endif
221277 }
222- #endif
278+ #endif /* WOLFSSL_MLKEM_KYBER */
279+ (void ) end ;
223280 }
224281
225282#if defined(WOLFSSL_MLKEM_NO_MAKE_KEY ) || \
@@ -910,7 +967,7 @@ int SuiteTest(int argc, char** argv)
910967 char * myArgv [3 ];
911968
912969#ifdef WOLFSSL_STATIC_MEMORY
913- byte memory [200000 ];
970+ byte memory [320000 ];
914971#endif
915972
916973 printf (" Begin Cipher Suite Tests\n" );
0 commit comments