summaryrefslogtreecommitdiff
path: root/test/python/genkat_aead.py
diff options
context:
space:
mode:
authorKévin Le Gouguec <kevin.legouguec@gmail.com>2019-03-23 19:31:06 +0100
committerKévin Le Gouguec <kevin.legouguec@gmail.com>2019-03-23 19:43:23 +0100
commitc0d7ffb343d38a301773ea49975de6c54c91e264 (patch)
treed5f0065139d04e396872842e835d54d291bad40c /test/python/genkat_aead.py
parent80c311262daf19f796a190cc99e850d199315c0a (diff)
downloadlilliput-ae-implem-c0d7ffb343d38a301773ea49975de6c54c91e264.tar.xz
[implem-python] Intégration à la soumission (suite et fin)
En plus du paquet Python "lilliput", chaque dossier embarque - un script "genkat_aead.py" qui génère les vecteurs de test via l'API du module "crypto_aead", - un module "crypto_aead" servant de point d'entrée générique, - un module "parameters", qui permet à crypto_aead d'instancier Lilliput-AE avec le bon mode et la bonne taille de clé. Livraison dans ./crypto_aead sans se soucier de l'arborescence du dépôt, par homogénéité avec make-package.sh. Quelques ajustement dans genkat_aead.py pour que le lien avec genkat_aead.c soit plus évident.
Diffstat (limited to 'test/python/genkat_aead.py')
-rwxr-xr-xtest/python/genkat_aead.py24
1 files changed, 16 insertions, 8 deletions
diff --git a/test/python/genkat_aead.py b/test/python/genkat_aead.py
index 01bed6f..5e953c4 100755
--- a/test/python/genkat_aead.py
+++ b/test/python/genkat_aead.py
@@ -3,8 +3,13 @@
import crypto_aead
+class DecryptionError(Exception):
+ def __init__(self):
+ super().__init__('crypto_aead_decrypt did not recover the plaintext')
+
+
MAX_MESSAGE_LENGTH = 32
-MAX_ADATA_LENGTH = 32
+MAX_ASSOCIATED_DATA_LENGTH = 32
def print_bstr(output, label, buf):
@@ -12,23 +17,25 @@ def print_bstr(output, label, buf):
def generate_test_vectors():
- output_path = 'LWC_AEAD_KAT_{key}_{npub}.txt'.format(
+ count = 1
+ filename = 'LWC_AEAD_KAT_{key}_{npub}.txt'.format(
key=crypto_aead.KEYBYTES*8, npub=crypto_aead.NPUBBYTES*8
)
npub = bytes(range(crypto_aead.NPUBBYTES))
key = bytes(range(crypto_aead.KEYBYTES))
- with open(output_path, 'w') as output:
+ with open(filename, 'w') as output:
- count = 1
for mlen in range(MAX_MESSAGE_LENGTH+1):
- for adlen in range(MAX_ADATA_LENGTH+1):
- print('Count = {c}'.format(c=count), file=output)
+ for adlen in range(MAX_ASSOCIATED_DATA_LENGTH+1):
msg = bytes(range(mlen))
ad = bytes(range(adlen))
+ print('Count = {c}'.format(c=count), file=output)
+ count += 1
+
print_bstr(output, 'Key', key)
print_bstr(output, 'Nonce', npub)
print_bstr(output, 'PT', msg)
@@ -38,9 +45,10 @@ def generate_test_vectors():
print_bstr(output, 'CT', ct)
- crypto_aead.decrypt(ct, ad, npub, key)
+ msg2 = crypto_aead.decrypt(ct, ad, npub, key)
- count += 1
+ if msg != msg2:
+ raise DecryptionError()
print(file=output)