@@ -203,3 +203,73 @@ fn test_chacha20_poly1305_2() {
203203 assert_eq ! ( out_plaintext2, plaintext2) ;
204204 assert_eq ! ( out_auth_tag_2, auth_tag_2) ;
205205}
206+
207+ #[ test]
208+ #[ cfg( xchacha20_poly1305) ]
209+ fn test_xchacha20_poly1305 ( ) {
210+ const PLAINTEXT : & [ u8 ] = & [
211+ 0x4cu8 , 0x61 , 0x64 , 0x69 , 0x65 , 0x73 , 0x20 , 0x61 ,
212+ 0x6e , 0x64 , 0x20 , 0x47 , 0x65 , 0x6e , 0x74 , 0x6c , /* Ladies and Gentl */
213+ 0x65 , 0x6d , 0x65 , 0x6e , 0x20 , 0x6f , 0x66 , 0x20 ,
214+ 0x74 , 0x68 , 0x65 , 0x20 , 0x63 , 0x6c , 0x61 , 0x73 , /* emen of the clas */
215+ 0x73 , 0x20 , 0x6f , 0x66 , 0x20 , 0x27 , 0x39 , 0x39 ,
216+ 0x3a , 0x20 , 0x49 , 0x66 , 0x20 , 0x49 , 0x20 , 0x63 , /* s of '99: If I c */
217+ 0x6f , 0x75 , 0x6c , 0x64 , 0x20 , 0x6f , 0x66 , 0x66 ,
218+ 0x65 , 0x72 , 0x20 , 0x79 , 0x6f , 0x75 , 0x20 , 0x6f , /* ould offer you o */
219+ 0x6e , 0x6c , 0x79 , 0x20 , 0x6f , 0x6e , 0x65 , 0x20 ,
220+ 0x74 , 0x69 , 0x70 , 0x20 , 0x66 , 0x6f , 0x72 , 0x20 , /* nly one tip for */
221+ 0x74 , 0x68 , 0x65 , 0x20 , 0x66 , 0x75 , 0x74 , 0x75 ,
222+ 0x72 , 0x65 , 0x2c , 0x20 , 0x73 , 0x75 , 0x6e , 0x73 , /* the future, suns */
223+ 0x63 , 0x72 , 0x65 , 0x65 , 0x6e , 0x20 , 0x77 , 0x6f ,
224+ 0x75 , 0x6c , 0x64 , 0x20 , 0x62 , 0x65 , 0x20 , 0x69 , /* creen would be i */
225+ 0x74 , 0x2e ] ; /* t. */
226+
227+ let aad = [
228+ 0x50u8 , 0x51 , 0x52 , 0x53 , 0xc0 , 0xc1 , 0xc2 , 0xc3 ,
229+ 0xc4 , 0xc5 , 0xc6 , 0xc7
230+ ] ; /* PQRS........ */
231+
232+ let key = [
233+ 0x80u8 , 0x81 , 0x82 , 0x83 , 0x84 , 0x85 , 0x86 , 0x87 ,
234+ 0x88 , 0x89 , 0x8a , 0x8b , 0x8c , 0x8d , 0x8e , 0x8f ,
235+ 0x90 , 0x91 , 0x92 , 0x93 , 0x94 , 0x95 , 0x96 , 0x97 ,
236+ 0x98 , 0x99 , 0x9a , 0x9b , 0x9c , 0x9d , 0x9e , 0x9f
237+ ] ;
238+
239+ let iv = [
240+ 0x40u8 , 0x41 , 0x42 , 0x43 , 0x44 , 0x45 , 0x46 , 0x47 ,
241+ 0x48 , 0x49 , 0x4a , 0x4b , 0x4c , 0x4d , 0x4e , 0x4f , /* @ABCDEFGHIJKLMNO */
242+ 0x50 , 0x51 , 0x52 , 0x53 , 0x54 , 0x55 , 0x56 , 0x57 /* PQRSTUVW */
243+ ] ;
244+
245+ let expected_ciphertext = [
246+ 0xbdu8 , 0x6d , 0x17 , 0x9d , 0x3e , 0x83 , 0xd4 , 0x3b ,
247+ 0x95 , 0x76 , 0x57 , 0x94 , 0x93 , 0xc0 , 0xe9 , 0x39 ,
248+ 0x57 , 0x2a , 0x17 , 0x00 , 0x25 , 0x2b , 0xfa , 0xcc ,
249+ 0xbe , 0xd2 , 0x90 , 0x2c , 0x21 , 0x39 , 0x6c , 0xbb ,
250+ 0x73 , 0x1c , 0x7f , 0x1b , 0x0b , 0x4a , 0xa6 , 0x44 ,
251+ 0x0b , 0xf3 , 0xa8 , 0x2f , 0x4e , 0xda , 0x7e , 0x39 ,
252+ 0xae , 0x64 , 0xc6 , 0x70 , 0x8c , 0x54 , 0xc2 , 0x16 ,
253+ 0xcb , 0x96 , 0xb7 , 0x2e , 0x12 , 0x13 , 0xb4 , 0x52 ,
254+ 0x2f , 0x8c , 0x9b , 0xa4 , 0x0d , 0xb5 , 0xd9 , 0x45 ,
255+ 0xb1 , 0x1b , 0x69 , 0xb9 , 0x82 , 0xc1 , 0xbb , 0x9e ,
256+ 0x3f , 0x3f , 0xac , 0x2b , 0xc3 , 0x69 , 0x48 , 0x8f ,
257+ 0x76 , 0xb2 , 0x38 , 0x35 , 0x65 , 0xd3 , 0xff , 0xf9 ,
258+ 0x21 , 0xf9 , 0x66 , 0x4c , 0x97 , 0x63 , 0x7d , 0xa9 ,
259+ 0x76 , 0x88 , 0x12 , 0xf6 , 0x15 , 0xc6 , 0x8b , 0x13 ,
260+ 0xb5 , 0x2e
261+ ] ;
262+
263+ let expected_tag = [
264+ 0xc0u8 , 0x87 , 0x59 , 0x24 , 0xc1 , 0xc7 , 0x98 , 0x79 ,
265+ 0x47 , 0xde , 0xaf , 0xd8 , 0x78 , 0x0a , 0xcf , 0x49
266+ ] ;
267+
268+ let mut ciphertext_buffer = [ 0u8 ; PLAINTEXT . len ( ) + XChaCha20Poly1305 :: AUTH_TAG_SIZE ] ;
269+ XChaCha20Poly1305 :: encrypt ( & key, & iv, & aad, PLAINTEXT , & mut ciphertext_buffer) . expect ( "Error with encrypt()" ) ;
270+ assert_eq ! ( ciphertext_buffer[ 0 ..expected_ciphertext. len( ) ] , expected_ciphertext) ;
271+ assert_eq ! ( ciphertext_buffer[ expected_ciphertext. len( ) ..] , expected_tag) ;
272+ let mut plaintext_buffer = [ 0u8 ; PLAINTEXT . len ( ) ] ;
273+ XChaCha20Poly1305 :: decrypt ( & key, & iv, & aad, & ciphertext_buffer, & mut plaintext_buffer) . expect ( "Error with decrypt()" ) ;
274+ assert_eq ! ( plaintext_buffer, PLAINTEXT ) ;
275+ }
0 commit comments