1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
|
#!/usr/bin/env python3
import lilliput
MAX_MESSAGE_LENGTH = 32
MAX_ADATA_LENGTH = 32
CRYPTO_NPUBBYTES = 120//8
def bstr(buf):
return ''.join('{:02X}'.format(b) for b in buf)
def print_bstr(output, label, buf):
print('{l} = {b}'.format(l=label, b=bstr(buf)), file=output)
class DecryptionError(Exception):
def __init__(self, expected, actual, mode, keylen):
self.expected = expected
self.actual = actual
self.mode = mode
self.keylen = keylen
def __str__(self):
return '({s.mode} / {s.keylen}) Expected {exp}; got {act}'.format(
s=self,
exp=bstr(self.expected),
act=bstr(self.actual)
)
def generate_test_vectors(mode, keylen):
print('generating for', mode, keylen)
output_path = 'LWC_AEAD_KAT_{mode}_{keylen}'.format(mode=mode, keylen=keylen)
with open(output_path, 'w') as output:
count = 1
for mlen in range(MAX_MESSAGE_LENGTH+1):
for adlen in range(MAX_ADATA_LENGTH+1):
print('Count = {c}'.format(c=count), file=output)
msg = bytes(range(mlen))
ad = bytes(range(adlen))
print_bstr(output, 'Key', bytes(range(keylen//8)))
print_bstr(output, 'Nonce', bytes(range(CRYPTO_NPUBBYTES)))
print_bstr(output, 'PT', msg)
print_bstr(output, 'AD', ad)
ct, tag = lilliput.mainEnc(msg, ad, mode, keylen)
print_bstr(output, 'CT', ct+tag)
msg2 = lilliput.mainDec(ct, tag, ad, mode, keylen)
if msg != msg2:
raise DecryptionError(msg, msg2, mode, keylen)
count+=1
print(file=output)
if __name__ == '__main__':
for mode in 1, 2:
for keylen in 128, 192, 256:
generate_test_vectors(mode, keylen)
|