diff options
author | Jack Lloyd <[email protected]> | 2019-06-15 10:59:16 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2019-06-15 11:17:07 -0400 |
commit | 4e82b87cf944a9e709030e2b7c02a7ac0d368013 (patch) | |
tree | 1abfd3d9afd18b2c0cb898a96be6072d85ec44e6 /src/tests | |
parent | d10292e88c272921c3866135a8ddff14601ee2de (diff) |
Add a compatability shim for libsodium
Not complete, just trying to hit the most commonly used APIs plus the
ones that are easy to do.
Diffstat (limited to 'src/tests')
-rw-r--r-- | src/tests/test_sodium.cpp | 609 |
1 files changed, 609 insertions, 0 deletions
diff --git a/src/tests/test_sodium.cpp b/src/tests/test_sodium.cpp new file mode 100644 index 000000000..933a24a38 --- /dev/null +++ b/src/tests/test_sodium.cpp @@ -0,0 +1,609 @@ +/* +* (C) 2019 Jack Lloyd +* +* Botan is released under the Simplified BSD License (see license.txt) +*/ + +#include "tests.h" + +#if defined(BOTAN_HAS_SODIUM_API) + #include <botan/sodium.h> +#endif + +namespace Botan_Tests { + +#if defined(BOTAN_HAS_SODIUM_API) + +class Sodium_API_Tests : public Test + { + public: + std::vector<Test::Result> run() override + { + std::vector<Test::Result> results; + + results.push_back(aead_chacha20poly1305()); + results.push_back(aead_chacha20poly1305_ietf()); + results.push_back(aead_xchacha20poly1305()); + results.push_back(auth_hmacsha256()); + results.push_back(auth_hmacsha512()); + results.push_back(auth_hmacsha512256()); + results.push_back(auth_poly1305()); + results.push_back(box_curve25519xsalsa20poly1305()); + results.push_back(hash_sha256()); + results.push_back(hash_sha512()); + results.push_back(randombytes_buf_deterministic()); + results.push_back(secretbox_xsalsa20poly1305()); + results.push_back(secretbox_xsalsa20poly1305_detached()); + results.push_back(shorthash_siphash24()); + results.push_back(stream_chacha20()); + results.push_back(stream_salsa20()); + results.push_back(stream_xchacha20()); + results.push_back(stream_xsalsa20()); + results.push_back(sign_ed25519()); + results.push_back(sodium_malloc()); + results.push_back(sodium_utils()); + + return results; + } + + private: + + Test::Result sodium_malloc() + { + Test::Result result("sodium_malloc"); + + void* p = Botan::Sodium::sodium_malloc(50); + std::memset(p, 0xFF, 50); + + Botan::Sodium::sodium_free(p); + Botan::Sodium::sodium_free(nullptr); + + result.test_success("Didn't crash"); + + return result; + } + + Test::Result sodium_utils() + { + Test::Result result("sodium math utils"); + + result.confirm("sodium_is_zero", Botan::Sodium::sodium_is_zero(nullptr, 0) == 1); + + std::vector<uint8_t> a(5); + result.confirm("sodium_is_zero", Botan::Sodium::sodium_is_zero(a.data(), a.size()) == 1); + Botan::Sodium::sodium_increment(a.data(), a.size()); + result.test_eq("sodium_increment", a, "0100000000"); + result.confirm("sodium_is_zero", Botan::Sodium::sodium_is_zero(a.data(), a.size()) == 0); + + std::memset(a.data(), 0xFF, a.size()); + Botan::Sodium::sodium_increment(a.data(), a.size()); + result.test_eq("sodium_increment", a, "0000000000"); + Botan::Sodium::sodium_increment(a.data(), a.size()); + result.test_eq("sodium_increment", a, "0100000000"); + + result.confirm("sodium_compare", Botan::Sodium::sodium_compare(a.data(), a.data(), a.size()) == 0); + result.confirm("sodium_memcmp", Botan::Sodium::sodium_memcmp(a.data(), a.data(), a.size()) == 0); + + std::vector<uint8_t> b(5, 0x10); + result.confirm("sodium_compare a<b", Botan::Sodium::sodium_compare(a.data(), b.data(), a.size()) == -1); + result.confirm("sodium_compare b<a", Botan::Sodium::sodium_compare(b.data(), a.data(), a.size()) == 1); + result.confirm("sodium_memcmp a<b", Botan::Sodium::sodium_memcmp(a.data(), b.data(), a.size()) == -1); + result.confirm("sodium_memcmp b<a", Botan::Sodium::sodium_memcmp(b.data(), a.data(), a.size()) == -1); + + Botan::Sodium::sodium_add(a.data(), b.data(), a.size()); + result.test_eq("sodium_add", a, "1110101010"); + Botan::Sodium::sodium_add(b.data(), a.data(), a.size()); + result.test_eq("sodium_add", b, "2120202020"); + Botan::Sodium::sodium_add(a.data(), b.data(), a.size()); + result.test_eq("sodium_add", a, "3230303030"); + Botan::Sodium::sodium_add(b.data(), a.data(), a.size()); + result.test_eq("sodium_add", b, "5350505050"); + + return result; + } + + Test::Result randombytes_buf_deterministic() + { + Test::Result result("randombytes_buf_deterministic"); + + const uint8_t seed[32] = { 1, 0 }; + std::vector<uint8_t> output(18); + + Botan::Sodium::randombytes_buf_deterministic(output.data(), output.size(), seed); + + result.test_eq("output", output, "04069B5F37E82F91DC37FD5EB99F1A4124B1"); + + return result; + } + + Test::Result hash_sha512() + { + Test::Result result("crypto_hash_sha512"); + + std::vector<uint8_t> output(64); + Botan::Sodium::crypto_hash_sha512(output.data(), nullptr, 0); + + result.test_eq("expected output", output, + "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"); + + return result; + } + + Test::Result hash_sha256() + { + Test::Result result("crypto_hash_sha256"); + + std::vector<uint8_t> output(32); + Botan::Sodium::crypto_hash_sha256(output.data(), nullptr, 0); + + result.test_eq("expected output", output, + "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"); + + return result; + } + + Test::Result box_curve25519xsalsa20poly1305() + { + Test::Result result("crypto_box_curve25519xsalsa20poly1305"); + + const std::vector<uint8_t> seed(32); + + std::vector<uint8_t> pk1(32), sk1(32); + result.test_rc_ok("seed_keypair", Botan::Sodium::crypto_box_seed_keypair(pk1.data(), sk1.data(), seed.data())); + result.test_eq("pk1", pk1, "5BF55C73B82EBE22BE80F3430667AF570FAE2556A6415E6B30D4065300AA947D"); + result.test_eq("sk1", sk1, "5046ADC1DBA838867B2BBBFDD0C3423E58B57970B5267A90F57960924A87F196"); + + std::vector<uint8_t> pk2(32), sk2(32); + result.test_rc_ok("seed_keypair", Botan::Sodium::crypto_box_seed_keypair(pk2.data(), sk2.data(), sk1.data())); + result.test_eq("pk2", pk2, "E0CFC9C6B2FE5BF85F48671691225C03D763F2305206FE3D3B0ED7B76153684A"); + result.test_eq("sk2", sk2, "58E2E4C71F138FBC97F9341735B4581746761F9A104540007FE12CFC4D9FDA15"); + + const std::vector<uint8_t> ptext(15); + std::vector<uint8_t> ctext(ptext.size() + 16); + const std::vector<uint8_t> nonce(Botan::Sodium::crypto_box_noncebytes()); + + result.test_rc_ok("crypto_box_easy", + Botan::Sodium::crypto_box_easy(ctext.data(), ptext.data(), ptext.size(), nonce.data(), + pk2.data(), sk1.data())); + + result.test_eq("ctext1", ctext, "11D78D4C32C5674390C0425D8BBB5928AFE7F767E2A7E4427E1A1362F1FD92"); + + result.test_rc_ok("crypto_box_easy", + Botan::Sodium::crypto_box_easy(ctext.data(), ptext.data(), ptext.size(), nonce.data(), + pk1.data(), sk2.data())); + + // same shared secret, same nonce, same data -> same ciphertext + result.test_eq("ctext2", ctext, "11D78D4C32C5674390C0425D8BBB5928AFE7F767E2A7E4427E1A1362F1FD92"); + + std::vector<uint8_t> recovered(15); + + result.test_rc_ok("crypto_box_open_easy", + Botan::Sodium::crypto_box_open_easy(recovered.data(), ctext.data(), ctext.size(), + nonce.data(), pk1.data(), sk2.data())); + + result.test_eq("recover1", recovered, ptext); + + result.test_rc_ok("crypto_box_open_easy", + Botan::Sodium::crypto_box_open_easy(recovered.data(), ctext.data(), ctext.size(), + nonce.data(), pk2.data(), sk1.data())); + + result.test_eq("recover1", recovered, ptext); + + return result; + } + + Test::Result aead_chacha20poly1305() + { + Test::Result result("crypto_aead_chacha20poly1305"); + + const std::vector<uint8_t> key = Botan::hex_decode("0000000000000000000000000000000000000000000000000000000000000000"); + const std::vector<uint8_t> ad; + const std::vector<uint8_t> nonce = Botan::hex_decode("0000000000000000"); + const std::vector<uint8_t> in = Botan::hex_decode("000000000000000000000000000000"); + + result.test_eq("key len", Botan::Sodium::crypto_aead_chacha20poly1305_keybytes(), key.size()); + result.test_eq("nonce len", Botan::Sodium::crypto_aead_chacha20poly1305_npubbytes(), nonce.size()); + + std::vector<uint8_t> ctext(in.size()); + std::vector<uint8_t> mac(16); + unsigned long long maclen = 0; + Botan::Sodium::crypto_aead_chacha20poly1305_encrypt_detached( + ctext.data(), mac.data(), &maclen, in.data(), in.size(), + ad.data(), ad.size(), nullptr, nonce.data(), key.data()); + + result.test_eq("maclen", size_t(maclen), 16); + result.test_eq("mac", mac, "09998877ABA156DDC68F8344098F68B9"); + result.test_eq("ctext", ctext, "9F07E7BE5551387A98BA977C732D08"); + + std::vector<uint8_t> recovered(ctext.size()); + result.test_rc_ok("decrypt", Botan::Sodium::crypto_aead_chacha20poly1305_decrypt_detached( + recovered.data(), nullptr, ctext.data(), ctext.size(), mac.data(), + ad.data(), ad.size(), nonce.data(), key.data())); + + result.test_eq("plaintext", recovered, in); + + mac[0] ^= 1; + result.test_rc_fail("decrypt", "invalid ciphertext", Botan::Sodium::crypto_aead_chacha20poly1305_decrypt_detached( + recovered.data(), nullptr, ctext.data(), ctext.size(), mac.data(), + ad.data(), ad.size(), nonce.data(), key.data())); + + ctext.resize(in.size() + mac.size()); + unsigned long long ctext_len; + result.test_rc_ok("encrypt", Botan::Sodium::crypto_aead_chacha20poly1305_encrypt( + ctext.data(), &ctext_len, in.data(), in.size(), + ad.data(), ad.size(), nullptr, nonce.data(), key.data())); + + result.test_eq("ctext_len", size_t(ctext_len), ctext.size()); + result.test_eq("ctext", ctext, "9F07E7BE5551387A98BA977C732D0809998877ABA156DDC68F8344098F68B9"); + + return result; + } + + Test::Result aead_chacha20poly1305_ietf() + { + Test::Result result("crypto_aead_chacha20poly1305_ietf"); + + const std::vector<uint8_t> key = Botan::hex_decode("0000000000000000000000000000000000000000000000000000000000000000"); + const std::vector<uint8_t> ad; + const std::vector<uint8_t> nonce = Botan::hex_decode("000000000000000000000000"); + const std::vector<uint8_t> in = Botan::hex_decode("000000000000000000000000000000"); + + result.test_eq("key len", Botan::Sodium::crypto_aead_chacha20poly1305_ietf_keybytes(), key.size()); + result.test_eq("nonce len", Botan::Sodium::crypto_aead_chacha20poly1305_ietf_npubbytes(), nonce.size()); + + std::vector<uint8_t> ctext(in.size()); + std::vector<uint8_t> mac(16); + unsigned long long maclen = 0; + Botan::Sodium::crypto_aead_chacha20poly1305_ietf_encrypt_detached( + ctext.data(), mac.data(), &maclen, in.data(), in.size(), + ad.data(), ad.size(), nullptr, nonce.data(), key.data()); + + result.test_eq("maclen", size_t(maclen), 16); + result.test_eq("mac", mac, "3679F1FB9843FD81E26D962888296954"); + result.test_eq("ctext", ctext, "9F07E7BE5551387A98BA977C732D08"); + + std::vector<uint8_t> recovered(ctext.size()); + result.test_rc_ok("decrypt", Botan::Sodium::crypto_aead_chacha20poly1305_ietf_decrypt_detached( + recovered.data(), nullptr, ctext.data(), ctext.size(), mac.data(), + ad.data(), ad.size(), nonce.data(), key.data())); + + result.test_eq("plaintext", recovered, in); + + mac[0] ^= 1; + result.test_rc_fail("decrypt", "invalid ciphertext", Botan::Sodium::crypto_aead_chacha20poly1305_ietf_decrypt_detached( + recovered.data(), nullptr, ctext.data(), ctext.size(), mac.data(), + ad.data(), ad.size(), nonce.data(), key.data())); + + ctext.resize(in.size() + mac.size()); + unsigned long long ctext_len; + result.test_rc_ok("encrypt", Botan::Sodium::crypto_aead_chacha20poly1305_ietf_encrypt( + ctext.data(), &ctext_len, in.data(), in.size(), + ad.data(), ad.size(), nullptr, nonce.data(), key.data())); + + result.test_eq("ctext_len", size_t(ctext_len), ctext.size()); + result.test_eq("ctext", ctext, "9F07E7BE5551387A98BA977C732D083679F1FB9843FD81E26D962888296954"); + + return result; + } + + Test::Result aead_xchacha20poly1305() + { + Test::Result result("crypto_aead_xchacha20poly1305"); + + const std::vector<uint8_t> key = Botan::hex_decode("0000000000000000000000000000000000000000000000000000000000000000"); + const std::vector<uint8_t> ad; + const std::vector<uint8_t> nonce = Botan::hex_decode("000000000000000000000000000000000000000000000000"); + const std::vector<uint8_t> in = Botan::hex_decode("000000000000000000000000000000"); + + result.test_eq("key len", Botan::Sodium::crypto_aead_xchacha20poly1305_ietf_keybytes(), key.size()); + result.test_eq("nonce len", Botan::Sodium::crypto_aead_xchacha20poly1305_ietf_npubbytes(), nonce.size()); + + std::vector<uint8_t> ctext(in.size()); + std::vector<uint8_t> mac(16); + unsigned long long maclen = 0; + Botan::Sodium::crypto_aead_xchacha20poly1305_ietf_encrypt_detached( + ctext.data(), mac.data(), &maclen, in.data(), in.size(), + ad.data(), ad.size(), nullptr, nonce.data(), key.data()); + + result.test_eq("maclen", size_t(maclen), 16); + result.test_eq("mac", mac, "b2f7033812ac9ebd3745e2c99c7bbfeb"); + result.test_eq("ctext", ctext, "789e9689e5208d7fd9e1f3c5b5341f"); + + std::vector<uint8_t> recovered(ctext.size()); + result.test_rc_ok("decrypt", + Botan::Sodium::crypto_aead_xchacha20poly1305_ietf_decrypt_detached( + recovered.data(), nullptr, ctext.data(), ctext.size(), mac.data(), + ad.data(), ad.size(), nonce.data(), key.data())); + + result.test_eq("plaintext", recovered, in); + + mac[0] ^= 1; + result.test_rc_fail("decrypt", "invalid ciphertext", Botan::Sodium::crypto_aead_xchacha20poly1305_ietf_decrypt_detached( + recovered.data(), nullptr, ctext.data(), ctext.size(), mac.data(), + ad.data(), ad.size(), nonce.data(), key.data())); + + ctext.resize(in.size() + mac.size()); + unsigned long long ctext_len; + result.test_rc_ok("encrypt", Botan::Sodium::crypto_aead_xchacha20poly1305_ietf_encrypt( + ctext.data(), &ctext_len, in.data(), in.size(), + ad.data(), ad.size(), nullptr, nonce.data(), key.data())); + + result.test_eq("ctext_len", size_t(ctext_len), ctext.size()); + result.test_eq("ctext", ctext, "789e9689e5208d7fd9e1f3c5b5341fb2f7033812ac9ebd3745e2c99c7bbfeb"); + + return result; + } + + Test::Result auth_hmacsha512() + { + Test::Result result("crypto_auth_hmacsha512"); + + const std::vector<uint8_t> key = Botan::hex_decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"); + const std::vector<uint8_t> in = Botan::hex_decode("616263"); + + result.test_eq("key_size", key.size(), Botan::Sodium::crypto_auth_hmacsha512_keybytes()); + + std::vector<uint8_t> mac(64); + Botan::Sodium::crypto_auth_hmacsha512(mac.data(), in.data(), in.size(), key.data()); + + result.test_eq("expected mac", mac, + "69D4A21E226BF0D348CB9A847C01CF24E93E8AC30D7C951704B936F82F795A624B470E23ABD33AC8700E797F0F2A499B932BAC7D283BBBB37D8FECF70D5E08A7"); + + return result; + } + + Test::Result auth_hmacsha512256() + { + Test::Result result("crypto_auth_hmacsha512256"); + + const std::vector<uint8_t> key = Botan::hex_decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"); + const std::vector<uint8_t> in = Botan::hex_decode("616263"); + + std::vector<uint8_t> mac(32); + Botan::Sodium::crypto_auth_hmacsha512256(mac.data(), in.data(), in.size(), key.data()); + + result.test_eq("expected mac", mac, + "69D4A21E226BF0D348CB9A847C01CF24E93E8AC30D7C951704B936F82F795A62"); + + return result; + } + + Test::Result auth_hmacsha256() + { + Test::Result result("crypto_auth_hmacsha256"); + + const std::vector<uint8_t> key = Botan::hex_decode("0102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F20"); + const std::vector<uint8_t> in = Botan::hex_decode("616263"); + + std::vector<uint8_t> mac(32); + Botan::Sodium::crypto_auth_hmacsha256(mac.data(), in.data(), in.size(), key.data()); + + result.test_eq("expected mac", mac, + "A21B1F5D4CF4F73A4DD939750F7A066A7F98CC131CB16A6692759021CFAB8181"); + + return result; + } + + Test::Result auth_poly1305() + { + Test::Result result("crypto_onetimeauth_poly1305"); + + const std::vector<uint8_t> key(Botan::Sodium::crypto_onetimeauth_keybytes(), 0x42); + const std::vector<uint8_t> in(15); + + std::vector<uint8_t> mac(16); + + result.test_rc_ok("poly1305", + Botan::Sodium::crypto_onetimeauth_poly1305(mac.data(), in.data(), in.size(), key.data())); + + result.test_eq("expected mac", mac, "12154512151545121515451215154584"); + + result.test_rc_ok("poly1305 verify", + Botan::Sodium::crypto_onetimeauth_poly1305_verify(mac.data(), in.data(), in.size(), key.data())); + + mac[0] ^= 1; + result.test_rc_fail("poly1305 verify", "invalid mac", + Botan::Sodium::crypto_onetimeauth_poly1305_verify(mac.data(), in.data(), in.size(), key.data())); + + return result; + } + + Test::Result shorthash_siphash24() + { + Test::Result result("crypto_shorthash_siphash24"); + + const std::vector<uint8_t> key = Botan::hex_decode("000102030405060708090A0B0C0D0E0F"); + const std::vector<uint8_t> in = Botan::hex_decode("000102030405060708090A0B0C0D0E"); + + std::vector<uint8_t> mac(8); + Botan::Sodium::crypto_shorthash_siphash24(mac.data(), in.data(), in.size(), key.data()); + + result.test_eq("expected mac", mac, "E545BE4961CA29A1"); + + return result; + } + + Test::Result secretbox_xsalsa20poly1305() + { + Test::Result result("secretbox_xsalsa20poly1305"); + + const std::vector<uint8_t> ptext(33); + std::vector<uint8_t> ctext(33); + const std::vector<uint8_t> nonce(Botan::Sodium::crypto_secretbox_xsalsa20poly1305_noncebytes()); + const std::vector<uint8_t> key(Botan::Sodium::crypto_secretbox_xsalsa20poly1305_keybytes()); + + result.test_rc_ok("encrypt", + Botan::Sodium::crypto_secretbox_xsalsa20poly1305(ctext.data(), + ptext.data(), + ptext.size(), + nonce.data(), + key.data())); + + result.test_eq("ctext", ctext, "0000000000000000000000000000000042E45EB764A1B706D4776A849BC2526BC6"); + + std::vector<uint8_t> recovered(33); + result.test_rc_ok("decrypt", + Botan::Sodium::crypto_secretbox_xsalsa20poly1305_open( + recovered.data(), + ctext.data(), + ctext.size(), + nonce.data(), + key.data())); + + result.test_eq("decrypted", recovered, ptext); + + return result; + } + + Test::Result secretbox_xsalsa20poly1305_detached() + { + Test::Result result("secretbox_xsalsa20poly1305"); + + const std::vector<uint8_t> ptext(33); + const std::vector<uint8_t> nonce(Botan::Sodium::crypto_secretbox_xsalsa20poly1305_noncebytes()); + const std::vector<uint8_t> key(Botan::Sodium::crypto_secretbox_xsalsa20poly1305_keybytes()); + std::vector<uint8_t> ctext(33); + std::vector<uint8_t> mac(16); + + result.test_rc_ok("encrypt detached", + Botan::Sodium::crypto_secretbox_detached(ctext.data(), + mac.data(), + ptext.data(), + ptext.size(), + nonce.data(), + key.data())); + + result.test_eq("ctext", ctext, "C63EBBFFFE85CE2CEBDEF7DC42F494576D05BDD7B929EBB045F2A793F740277D05"); + result.test_eq("mac", mac, "0D6681DCED740667C699F0AC71BFD1BD"); + + std::vector<uint8_t> recovered(ctext.size()); + + result.test_rc_ok("open detached", + Botan::Sodium::crypto_secretbox_open_detached(recovered.data(), + ctext.data(), + mac.data(), + ctext.size(), + nonce.data(), + key.data())); + + result.test_eq("recovered", recovered, ptext); + + return result; + } + + Test::Result sign_ed25519() + { + Test::Result result("crypto_sign_ed25519"); + + const std::vector<uint8_t> seed(32); + std::vector<uint8_t> pk(32), sk(64); + + result.test_rc_ok("seed_keypair", Botan::Sodium::crypto_sign_ed25519_seed_keypair(pk.data(), sk.data(), seed.data())); + + result.test_eq("pk", pk, "3B6A27BCCEB6A42D62A3A8D02A6F0D73653215771DE243A63AC048A18B59DA29"); + result.test_eq("sk", sk, "00000000000000000000000000000000000000000000000000000000000000003B6A27BCCEB6A42D62A3A8D02A6F0D73653215771DE243A63AC048A18B59DA29"); + + const std::vector<uint8_t> msg = { 1, 2, 3 }; + std::vector<uint8_t> sig(64); + unsigned long long sig_len = 0; + result.test_rc_ok("sign_detached", Botan::Sodium::crypto_sign_ed25519_detached(sig.data(), &sig_len, msg.data(), msg.size(), sk.data())); + result.confirm("sig len", sig_len == 64); + + result.test_eq("sig", sig, "2A26779BA6CBB5E54292257F725AF112B273C38728329682D99ED81BA6D7670350AE4CC53C5456FA437128D19298A5D949AB46E3D41AB3DBCFB0B35C895E9304"); + + result.test_rc_ok("verify", Botan::Sodium::crypto_sign_ed25519_verify_detached(sig.data(), msg.data(), msg.size(), pk.data())); + + sig[0] ^= 1; + result.test_rc_fail("verify", "reject invalid", + Botan::Sodium::crypto_sign_ed25519_verify_detached(sig.data(), msg.data(), msg.size(), pk.data())); + + return result; + } + + Test::Result stream_salsa20() + { + Test::Result result("crypto_stream_salsa20"); + + const std::vector<uint8_t> key = Botan::hex_decode("0F62B5085BAE0154A7FA4DA0F34699EC3F92E5388BDE3184D72A7DD02376C91C"); + const std::vector<uint8_t> nonce = Botan::hex_decode("288FF65DC42B92F9"); + const std::vector<uint8_t> expected = Botan::hex_decode( + "5E5E71F90199340304ABB22A37B6625BF883FB89CE3B21F54A10B81066EF87DA"); + + std::vector<uint8_t> output(32); + Botan::Sodium::crypto_stream_salsa20(output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", output, expected); + + std::vector<uint8_t> xor_output(32); + Botan::Sodium::crypto_stream_salsa20_xor(xor_output.data(), output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", xor_output, std::vector<uint8_t>(32)); // all zeros + + return result; + } + + Test::Result stream_xsalsa20() + { + Test::Result result("crypto_stream_xsalsa20"); + + const std::vector<uint8_t> key = Botan::hex_decode("1B27556473E985D462CD51197A9A46C76009549EAC6474F206C4EE0844F68389"); + const std::vector<uint8_t> nonce = Botan::hex_decode("69696EE955B62B73CD62BDA875FC73D68219E0036B7A0B37"); + const std::vector<uint8_t> expected = Botan::hex_decode( + "EEA6A7251C1E72916D11C2CB214D3C252539121D8E234E652D651FA4C8CFF880"); + + std::vector<uint8_t> output(32); + Botan::Sodium::crypto_stream_xsalsa20(output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", output, expected); + + std::vector<uint8_t> xor_output(32); + Botan::Sodium::crypto_stream_xsalsa20_xor(xor_output.data(), output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", xor_output, std::vector<uint8_t>(32)); // all zeros + + return result; + } + + Test::Result stream_chacha20() + { + Test::Result result("crypto_stream_chacha20"); + + const std::vector<uint8_t> key = Botan::hex_decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"); + const std::vector<uint8_t> nonce = Botan::hex_decode("0001020304050607"); + const std::vector<uint8_t> expected = Botan::hex_decode( + "F798A189F195E66982105FFB640BB7757F579DA31602FC93EC01AC56F85AC3C1"); + + std::vector<uint8_t> output(32); + Botan::Sodium::crypto_stream_chacha20(output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", output, expected); + + std::vector<uint8_t> xor_output(32); + Botan::Sodium::crypto_stream_chacha20_xor(xor_output.data(), output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", xor_output, std::vector<uint8_t>(32)); // all zeros + + return result; + } + + Test::Result stream_xchacha20() + { + Test::Result result("crypto_stream_xchacha20"); + + const std::vector<uint8_t> key = Botan::hex_decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"); + const std::vector<uint8_t> nonce = Botan::hex_decode("000102030405060708090a0b0c0d0e0f1011121314151617"); + const std::vector<uint8_t> expected = Botan::hex_decode( + "e53a61cef151e81401067de33adfc02e90ab205361b49b539fda7f0e63b1bc7d"); + + std::vector<uint8_t> output(32); + Botan::Sodium::crypto_stream_xchacha20(output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", output, expected); + + std::vector<uint8_t> xor_output(32); + Botan::Sodium::crypto_stream_xchacha20_xor(xor_output.data(), output.data(), output.size(), nonce.data(), key.data()); + result.test_eq("stream", xor_output, std::vector<uint8_t>(32)); // all zeros + + return result; + } + + }; + +BOTAN_REGISTER_TEST("sodium", Sodium_API_Tests); + +#endif + +} |