github.com/evdatsion/aphelion-dpos-bft@v0.32.1/crypto/xchacha20poly1305/vector_test.go (about)

     1  package xchacha20poly1305
     2  
     3  import (
     4  	"bytes"
     5  	"encoding/hex"
     6  	"testing"
     7  )
     8  
     9  func toHex(bits []byte) string {
    10  	return hex.EncodeToString(bits)
    11  }
    12  
    13  func fromHex(bits string) []byte {
    14  	b, err := hex.DecodeString(bits)
    15  	if err != nil {
    16  		panic(err)
    17  	}
    18  	return b
    19  }
    20  
    21  func TestHChaCha20(t *testing.T) {
    22  	for i, v := range hChaCha20Vectors {
    23  		var key [32]byte
    24  		var nonce [16]byte
    25  		copy(key[:], v.key)
    26  		copy(nonce[:], v.nonce)
    27  
    28  		HChaCha20(&key, &nonce, &key)
    29  		if !bytes.Equal(key[:], v.keystream) {
    30  			t.Errorf("Test %d: keystream mismatch:\n \t got:  %s\n \t want: %s", i, toHex(key[:]), toHex(v.keystream))
    31  		}
    32  	}
    33  }
    34  
    35  var hChaCha20Vectors = []struct {
    36  	key, nonce, keystream []byte
    37  }{
    38  	{
    39  		fromHex("0000000000000000000000000000000000000000000000000000000000000000"),
    40  		fromHex("000000000000000000000000000000000000000000000000"),
    41  		fromHex("1140704c328d1d5d0e30086cdf209dbd6a43b8f41518a11cc387b669b2ee6586"),
    42  	},
    43  	{
    44  		fromHex("8000000000000000000000000000000000000000000000000000000000000000"),
    45  		fromHex("000000000000000000000000000000000000000000000000"),
    46  		fromHex("7d266a7fd808cae4c02a0a70dcbfbcc250dae65ce3eae7fc210f54cc8f77df86"),
    47  	},
    48  	{
    49  		fromHex("0000000000000000000000000000000000000000000000000000000000000001"),
    50  		fromHex("000000000000000000000000000000000000000000000002"),
    51  		fromHex("e0c77ff931bb9163a5460c02ac281c2b53d792b1c43fea817e9ad275ae546963"),
    52  	},
    53  	{
    54  		fromHex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"),
    55  		fromHex("000102030405060708090a0b0c0d0e0f1011121314151617"),
    56  		fromHex("51e3ff45a895675c4b33b46c64f4a9ace110d34df6a2ceab486372bacbd3eff6"),
    57  	},
    58  	{
    59  		fromHex("24f11cce8a1b3d61e441561a696c1c1b7e173d084fd4812425435a8896a013dc"),
    60  		fromHex("d9660c5900ae19ddad28d6e06e45fe5e"),
    61  		fromHex("5966b3eec3bff1189f831f06afe4d4e3be97fa9235ec8c20d08acfbbb4e851e3"),
    62  	},
    63  }
    64  
    65  func TestVectors(t *testing.T) {
    66  	for i, v := range vectors {
    67  		if len(v.plaintext) == 0 {
    68  			v.plaintext = make([]byte, len(v.ciphertext))
    69  		}
    70  
    71  		var nonce [24]byte
    72  		copy(nonce[:], v.nonce)
    73  
    74  		aead, err := New(v.key)
    75  		if err != nil {
    76  			t.Error(err)
    77  		}
    78  
    79  		dst := aead.Seal(nil, nonce[:], v.plaintext, v.ad)
    80  		if !bytes.Equal(dst, v.ciphertext) {
    81  			t.Errorf("Test %d: ciphertext mismatch:\n \t got:  %s\n \t want: %s", i, toHex(dst), toHex(v.ciphertext))
    82  		}
    83  		open, err := aead.Open(nil, nonce[:], dst, v.ad)
    84  		if err != nil {
    85  			t.Error(err)
    86  		}
    87  		if !bytes.Equal(open, v.plaintext) {
    88  			t.Errorf("Test %d: plaintext mismatch:\n \t got:  %s\n \t want: %s", i, string(open), string(v.plaintext))
    89  		}
    90  	}
    91  }
    92  
    93  var vectors = []struct {
    94  	key, nonce, ad, plaintext, ciphertext []byte
    95  }{
    96  	{
    97  		[]byte{0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f},
    98  		[]byte{0x07, 0x00, 0x00, 0x00, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b},
    99  		[]byte{0x50, 0x51, 0x52, 0x53, 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7},
   100  		[]byte("Ladies and Gentlemen of the class of '99: If I could offer you only one tip for the future, sunscreen would be it."),
   101  		[]byte{0x45, 0x3c, 0x06, 0x93, 0xa7, 0x40, 0x7f, 0x04, 0xff, 0x4c, 0x56, 0xae, 0xdb, 0x17, 0xa3, 0xc0, 0xa1, 0xaf, 0xff, 0x01, 0x17, 0x49, 0x30, 0xfc, 0x22, 0x28, 0x7c, 0x33, 0xdb, 0xcf, 0x0a, 0xc8, 0xb8, 0x9a, 0xd9, 0x29, 0x53, 0x0a, 0x1b, 0xb3, 0xab, 0x5e, 0x69, 0xf2, 0x4c, 0x7f, 0x60, 0x70, 0xc8, 0xf8, 0x40, 0xc9, 0xab, 0xb4, 0xf6, 0x9f, 0xbf, 0xc8, 0xa7, 0xff, 0x51, 0x26, 0xfa, 0xee, 0xbb, 0xb5, 0x58, 0x05, 0xee, 0x9c, 0x1c, 0xf2, 0xce, 0x5a, 0x57, 0x26, 0x32, 0x87, 0xae, 0xc5, 0x78, 0x0f, 0x04, 0xec, 0x32, 0x4c, 0x35, 0x14, 0x12, 0x2c, 0xfc, 0x32, 0x31, 0xfc, 0x1a, 0x8b, 0x71, 0x8a, 0x62, 0x86, 0x37, 0x30, 0xa2, 0x70, 0x2b, 0xb7, 0x63, 0x66, 0x11, 0x6b, 0xed, 0x09, 0xe0, 0xfd, 0x5c, 0x6d, 0x84, 0xb6, 0xb0, 0xc1, 0xab, 0xaf, 0x24, 0x9d, 0x5d, 0xd0, 0xf7, 0xf5, 0xa7, 0xea},
   102  	},
   103  }