Bitcoin Core  27.99.0
P2P Digital Currency
crypto_tests.cpp
Go to the documentation of this file.
1 // Copyright (c) 2014-2021 The Bitcoin Core developers
2 // Distributed under the MIT software license, see the accompanying
3 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 
5 #include <crypto/aes.h>
6 #include <crypto/chacha20.h>
9 #include <crypto/hmac_sha256.h>
10 #include <crypto/hmac_sha512.h>
11 #include <crypto/poly1305.h>
12 #include <crypto/ripemd160.h>
13 #include <crypto/sha1.h>
14 #include <crypto/sha256.h>
15 #include <crypto/sha3.h>
16 #include <crypto/sha512.h>
17 #include <crypto/muhash.h>
18 #include <random.h>
19 #include <streams.h>
20 #include <test/util/random.h>
21 #include <test/util/setup_common.h>
22 #include <util/strencodings.h>
23 
24 #include <vector>
25 
26 #include <boost/test/unit_test.hpp>
27 
28 BOOST_FIXTURE_TEST_SUITE(crypto_tests, BasicTestingSetup)
29 
30 template<typename Hasher, typename In, typename Out>
31 static void TestVector(const Hasher &h, const In &in, const Out &out) {
32  Out hash;
33  BOOST_CHECK(out.size() == h.OUTPUT_SIZE);
34  hash.resize(out.size());
35  {
36  // Test that writing the whole input string at once works.
37  Hasher(h).Write((const uint8_t*)in.data(), in.size()).Finalize(hash.data());
38  BOOST_CHECK(hash == out);
39  }
40  for (int i=0; i<32; i++) {
41  // Test that writing the string broken up in random pieces works.
42  Hasher hasher(h);
43  size_t pos = 0;
44  while (pos < in.size()) {
45  size_t len = InsecureRandRange((in.size() - pos + 1) / 2 + 1);
46  hasher.Write((const uint8_t*)in.data() + pos, len);
47  pos += len;
48  if (pos > 0 && pos + 2 * out.size() > in.size() && pos < in.size()) {
49  // Test that writing the rest at once to a copy of a hasher works.
50  Hasher(hasher).Write((const uint8_t*)in.data() + pos, in.size() - pos).Finalize(hash.data());
51  BOOST_CHECK(hash == out);
52  }
53  }
54  hasher.Finalize(hash.data());
55  BOOST_CHECK(hash == out);
56  }
57 }
58 
59 static void TestSHA1(const std::string &in, const std::string &hexout) { TestVector(CSHA1(), in, ParseHex(hexout));}
60 static void TestSHA256(const std::string &in, const std::string &hexout) { TestVector(CSHA256(), in, ParseHex(hexout));}
61 static void TestSHA512(const std::string &in, const std::string &hexout) { TestVector(CSHA512(), in, ParseHex(hexout));}
62 static void TestRIPEMD160(const std::string &in, const std::string &hexout) { TestVector(CRIPEMD160(), in, ParseHex(hexout));}
63 
64 static void TestHMACSHA256(const std::string &hexkey, const std::string &hexin, const std::string &hexout) {
65  std::vector<unsigned char> key = ParseHex(hexkey);
66  TestVector(CHMAC_SHA256(key.data(), key.size()), ParseHex(hexin), ParseHex(hexout));
67 }
68 
69 static void TestHMACSHA512(const std::string &hexkey, const std::string &hexin, const std::string &hexout) {
70  std::vector<unsigned char> key = ParseHex(hexkey);
71  TestVector(CHMAC_SHA512(key.data(), key.size()), ParseHex(hexin), ParseHex(hexout));
72 }
73 
74 static void TestAES256(const std::string &hexkey, const std::string &hexin, const std::string &hexout)
75 {
76  std::vector<unsigned char> key = ParseHex(hexkey);
77  std::vector<unsigned char> in = ParseHex(hexin);
78  std::vector<unsigned char> correctout = ParseHex(hexout);
79  std::vector<unsigned char> buf;
80 
81  assert(key.size() == 32);
82  assert(in.size() == 16);
83  assert(correctout.size() == 16);
84  AES256Encrypt enc(key.data());
85  buf.resize(correctout.size());
86  enc.Encrypt(buf.data(), in.data());
87  BOOST_CHECK(buf == correctout);
88  AES256Decrypt dec(key.data());
89  dec.Decrypt(buf.data(), buf.data());
90  BOOST_CHECK(buf == in);
91 }
92 
93 static void TestAES256CBC(const std::string &hexkey, const std::string &hexiv, bool pad, const std::string &hexin, const std::string &hexout)
94 {
95  std::vector<unsigned char> key = ParseHex(hexkey);
96  std::vector<unsigned char> iv = ParseHex(hexiv);
97  std::vector<unsigned char> in = ParseHex(hexin);
98  std::vector<unsigned char> correctout = ParseHex(hexout);
99  std::vector<unsigned char> realout(in.size() + AES_BLOCKSIZE);
100 
101  // Encrypt the plaintext and verify that it equals the cipher
102  AES256CBCEncrypt enc(key.data(), iv.data(), pad);
103  int size = enc.Encrypt(in.data(), in.size(), realout.data());
104  realout.resize(size);
105  BOOST_CHECK(realout.size() == correctout.size());
106  BOOST_CHECK_MESSAGE(realout == correctout, HexStr(realout) + std::string(" != ") + hexout);
107 
108  // Decrypt the cipher and verify that it equals the plaintext
109  std::vector<unsigned char> decrypted(correctout.size());
110  AES256CBCDecrypt dec(key.data(), iv.data(), pad);
111  size = dec.Decrypt(correctout.data(), correctout.size(), decrypted.data());
112  decrypted.resize(size);
113  BOOST_CHECK(decrypted.size() == in.size());
114  BOOST_CHECK_MESSAGE(decrypted == in, HexStr(decrypted) + std::string(" != ") + hexin);
115 
116  // Encrypt and re-decrypt substrings of the plaintext and verify that they equal each-other
117  for(std::vector<unsigned char>::iterator i(in.begin()); i != in.end(); ++i)
118  {
119  std::vector<unsigned char> sub(i, in.end());
120  std::vector<unsigned char> subout(sub.size() + AES_BLOCKSIZE);
121  int _size = enc.Encrypt(sub.data(), sub.size(), subout.data());
122  if (_size != 0)
123  {
124  subout.resize(_size);
125  std::vector<unsigned char> subdecrypted(subout.size());
126  _size = dec.Decrypt(subout.data(), subout.size(), subdecrypted.data());
127  subdecrypted.resize(_size);
128  BOOST_CHECK(decrypted.size() == in.size());
129  BOOST_CHECK_MESSAGE(subdecrypted == sub, HexStr(subdecrypted) + std::string(" != ") + HexStr(sub));
130  }
131  }
132 }
133 
134 static void TestChaCha20(const std::string &hex_message, const std::string &hexkey, ChaCha20::Nonce96 nonce, uint32_t seek, const std::string& hexout)
135 {
136  auto key = ParseHex<std::byte>(hexkey);
137  assert(key.size() == 32);
138  auto m = ParseHex<std::byte>(hex_message);
139  ChaCha20 rng{key};
140  rng.Seek(nonce, seek);
141  std::vector<std::byte> outres;
142  outres.resize(hexout.size() / 2);
143  assert(hex_message.empty() || m.size() * 2 == hexout.size());
144 
145  // perform the ChaCha20 round(s), if message is provided it will output the encrypted ciphertext otherwise the keystream
146  if (!hex_message.empty()) {
147  rng.Crypt(m, outres);
148  } else {
149  rng.Keystream(outres);
150  }
151  BOOST_CHECK_EQUAL(hexout, HexStr(outres));
152  if (!hex_message.empty()) {
153  // Manually XOR with the keystream and compare the output
154  rng.Seek(nonce, seek);
155  std::vector<std::byte> only_keystream(outres.size());
156  rng.Keystream(only_keystream);
157  for (size_t i = 0; i != m.size(); i++) {
158  outres[i] = m[i] ^ only_keystream[i];
159  }
160  BOOST_CHECK_EQUAL(hexout, HexStr(outres));
161  }
162 
163  // Repeat 10x, but fragmented into 3 chunks, to exercise the ChaCha20 class's caching.
164  for (int i = 0; i < 10; ++i) {
165  size_t lens[3];
166  lens[0] = InsecureRandRange(hexout.size() / 2U + 1U);
167  lens[1] = InsecureRandRange(hexout.size() / 2U + 1U - lens[0]);
168  lens[2] = hexout.size() / 2U - lens[0] - lens[1];
169 
170  rng.Seek(nonce, seek);
171  outres.assign(hexout.size() / 2U, {});
172  size_t pos = 0;
173  for (int j = 0; j < 3; ++j) {
174  if (!hex_message.empty()) {
175  rng.Crypt(Span{m}.subspan(pos, lens[j]), Span{outres}.subspan(pos, lens[j]));
176  } else {
177  rng.Keystream(Span{outres}.subspan(pos, lens[j]));
178  }
179  pos += lens[j];
180  }
181  BOOST_CHECK_EQUAL(hexout, HexStr(outres));
182  }
183 }
184 
185 static void TestFSChaCha20(const std::string& hex_plaintext, const std::string& hexkey, uint32_t rekey_interval, const std::string& ciphertext_after_rotation)
186 {
187  auto key = ParseHex<std::byte>(hexkey);
189 
190  auto plaintext = ParseHex<std::byte>(hex_plaintext);
191 
192  auto fsc20 = FSChaCha20{key, rekey_interval};
193  auto c20 = ChaCha20{key};
194 
195  std::vector<std::byte> fsc20_output;
196  fsc20_output.resize(plaintext.size());
197 
198  std::vector<std::byte> c20_output;
199  c20_output.resize(plaintext.size());
200 
201  for (size_t i = 0; i < rekey_interval; i++) {
202  fsc20.Crypt(plaintext, fsc20_output);
203  c20.Crypt(plaintext, c20_output);
204  BOOST_CHECK(c20_output == fsc20_output);
205  }
206 
207  // At the rotation interval, the outputs will no longer match
208  fsc20.Crypt(plaintext, fsc20_output);
209  auto c20_copy = c20;
210  c20.Crypt(plaintext, c20_output);
211  BOOST_CHECK(c20_output != fsc20_output);
212 
213  std::byte new_key[FSChaCha20::KEYLEN];
214  c20_copy.Keystream(new_key);
215  c20.SetKey(new_key);
216  c20.Seek({0, 1}, 0);
217 
218  // Outputs should match again after simulating key rotation
219  c20.Crypt(plaintext, c20_output);
220  BOOST_CHECK(c20_output == fsc20_output);
221 
222  BOOST_CHECK_EQUAL(HexStr(fsc20_output), ciphertext_after_rotation);
223 }
224 
225 static void TestPoly1305(const std::string &hexmessage, const std::string &hexkey, const std::string& hextag)
226 {
227  auto key = ParseHex<std::byte>(hexkey);
228  auto m = ParseHex<std::byte>(hexmessage);
229  std::vector<std::byte> tagres(Poly1305::TAGLEN);
230  Poly1305{key}.Update(m).Finalize(tagres);
231  BOOST_CHECK_EQUAL(HexStr(tagres), hextag);
232 
233  // Test incremental interface
234  for (int splits = 0; splits < 10; ++splits) {
235  for (int iter = 0; iter < 10; ++iter) {
236  auto data = Span{m};
237  Poly1305 poly1305{key};
238  for (int chunk = 0; chunk < splits; ++chunk) {
239  size_t now = InsecureRandRange(data.size() + 1);
240  poly1305.Update(data.first(now));
241  data = data.subspan(now);
242  }
243  tagres.assign(Poly1305::TAGLEN, std::byte{});
244  poly1305.Update(data).Finalize(tagres);
245  BOOST_CHECK_EQUAL(HexStr(tagres), hextag);
246  }
247  }
248 }
249 
250 static void TestChaCha20Poly1305(const std::string& plain_hex, const std::string& aad_hex, const std::string& key_hex, ChaCha20::Nonce96 nonce, const std::string& cipher_hex)
251 {
252  auto plain = ParseHex<std::byte>(plain_hex);
253  auto aad = ParseHex<std::byte>(aad_hex);
254  auto key = ParseHex<std::byte>(key_hex);
255  auto expected_cipher = ParseHex<std::byte>(cipher_hex);
256 
257  for (int i = 0; i < 10; ++i) {
258  // During i=0, use single-plain Encrypt/Decrypt; others use a split at prefix.
259  size_t prefix = i ? InsecureRandRange(plain.size() + 1) : plain.size();
260  // Encrypt.
261  std::vector<std::byte> cipher(plain.size() + AEADChaCha20Poly1305::EXPANSION);
262  AEADChaCha20Poly1305 aead{key};
263  if (i == 0) {
264  aead.Encrypt(plain, aad, nonce, cipher);
265  } else {
266  aead.Encrypt(Span{plain}.first(prefix), Span{plain}.subspan(prefix), aad, nonce, cipher);
267  }
268  BOOST_CHECK(cipher == expected_cipher);
269 
270  // Decrypt.
271  std::vector<std::byte> decipher(cipher.size() - AEADChaCha20Poly1305::EXPANSION);
272  bool ret{false};
273  if (i == 0) {
274  ret = aead.Decrypt(cipher, aad, nonce, decipher);
275  } else {
276  ret = aead.Decrypt(cipher, aad, nonce, Span{decipher}.first(prefix), Span{decipher}.subspan(prefix));
277  }
278  BOOST_CHECK(ret);
279  BOOST_CHECK(decipher == plain);
280  }
281 
282  // Test Keystream output.
283  std::vector<std::byte> keystream(plain.size());
284  AEADChaCha20Poly1305 aead{key};
285  aead.Keystream(nonce, keystream);
286  for (size_t i = 0; i < plain.size(); ++i) {
287  BOOST_CHECK_EQUAL(plain[i] ^ keystream[i], expected_cipher[i]);
288  }
289 }
290 
291 static void TestFSChaCha20Poly1305(const std::string& plain_hex, const std::string& aad_hex, const std::string& key_hex, uint64_t msg_idx, const std::string& cipher_hex)
292 {
293  auto plain = ParseHex<std::byte>(plain_hex);
294  auto aad = ParseHex<std::byte>(aad_hex);
295  auto key = ParseHex<std::byte>(key_hex);
296  auto expected_cipher = ParseHex<std::byte>(cipher_hex);
297  std::vector<std::byte> cipher(plain.size() + FSChaCha20Poly1305::EXPANSION);
298 
299  for (int it = 0; it < 10; ++it) {
300  // During it==0 we use the single-plain Encrypt/Decrypt; others use a split at prefix.
301  size_t prefix = it ? InsecureRandRange(plain.size() + 1) : plain.size();
302  std::byte dummy_tag[FSChaCha20Poly1305::EXPANSION] = {{}};
303 
304  // Do msg_idx dummy encryptions to seek to the correct packet.
305  FSChaCha20Poly1305 enc_aead{key, 224};
306  for (uint64_t i = 0; i < msg_idx; ++i) {
307  enc_aead.Encrypt(Span{dummy_tag}.first(0), Span{dummy_tag}.first(0), dummy_tag);
308  }
309 
310  // Invoke single-plain or plain1/plain2 Encrypt.
311  if (it == 0) {
312  enc_aead.Encrypt(plain, aad, cipher);
313  } else {
314  enc_aead.Encrypt(Span{plain}.first(prefix), Span{plain}.subspan(prefix), aad, cipher);
315  }
316  BOOST_CHECK(cipher == expected_cipher);
317 
318  // Do msg_idx dummy decryptions to seek to the correct packet.
319  FSChaCha20Poly1305 dec_aead{key, 224};
320  for (uint64_t i = 0; i < msg_idx; ++i) {
321  dec_aead.Decrypt(dummy_tag, Span{dummy_tag}.first(0), Span{dummy_tag}.first(0));
322  }
323 
324  // Invoke single-plain or plain1/plain2 Decrypt.
325  std::vector<std::byte> decipher(cipher.size() - AEADChaCha20Poly1305::EXPANSION);
326  bool ret{false};
327  if (it == 0) {
328  ret = dec_aead.Decrypt(cipher, aad, decipher);
329  } else {
330  ret = dec_aead.Decrypt(cipher, aad, Span{decipher}.first(prefix), Span{decipher}.subspan(prefix));
331  }
332  BOOST_CHECK(ret);
333  BOOST_CHECK(decipher == plain);
334  }
335 }
336 
337 static void TestHKDF_SHA256_32(const std::string &ikm_hex, const std::string &salt_hex, const std::string &info_hex, const std::string &okm_check_hex) {
338  std::vector<unsigned char> initial_key_material = ParseHex(ikm_hex);
339  std::vector<unsigned char> salt = ParseHex(salt_hex);
340  std::vector<unsigned char> info = ParseHex(info_hex);
341 
342 
343  // our implementation only supports strings for the "info" and "salt", stringify them
344  std::string salt_stringified(reinterpret_cast<char*>(salt.data()), salt.size());
345  std::string info_stringified(reinterpret_cast<char*>(info.data()), info.size());
346 
347  CHKDF_HMAC_SHA256_L32 hkdf32(initial_key_material.data(), initial_key_material.size(), salt_stringified);
348  unsigned char out[32];
349  hkdf32.Expand32(info_stringified, out);
350  BOOST_CHECK(HexStr(out) == okm_check_hex);
351 }
352 
353 static std::string LongTestString()
354 {
355  std::string ret;
356  for (int i = 0; i < 200000; i++) {
357  ret += (char)(i);
358  ret += (char)(i >> 4);
359  ret += (char)(i >> 8);
360  ret += (char)(i >> 12);
361  ret += (char)(i >> 16);
362  }
363  return ret;
364 }
365 
366 const std::string test1 = LongTestString();
367 
368 BOOST_AUTO_TEST_CASE(ripemd160_testvectors) {
369  TestRIPEMD160("", "9c1185a5c5e9fc54612808977ee8f548b2258d31");
370  TestRIPEMD160("abc", "8eb208f7e05d987a9b044a8e98c6b087f15a0bfc");
371  TestRIPEMD160("message digest", "5d0689ef49d2fae572b881b123a85ffa21595f36");
372  TestRIPEMD160("secure hash algorithm", "20397528223b6a5f4cbc2808aba0464e645544f9");
373  TestRIPEMD160("RIPEMD160 is considered to be safe", "a7d78608c7af8a8e728778e81576870734122b66");
374  TestRIPEMD160("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
375  "12a053384a9c0c88e405a06c27dcf49ada62eb2b");
376  TestRIPEMD160("For this sample, this 63-byte string will be used as input data",
377  "de90dbfee14b63fb5abf27c2ad4a82aaa5f27a11");
378  TestRIPEMD160("This is exactly 64 bytes long, not counting the terminating byte",
379  "eda31d51d3a623b81e19eb02e24ff65d27d67b37");
380  TestRIPEMD160(std::string(1000000, 'a'), "52783243c1697bdbe16d37f97f68f08325dc1528");
381  TestRIPEMD160(test1, "464243587bd146ea835cdf57bdae582f25ec45f1");
382 }
383 
384 BOOST_AUTO_TEST_CASE(sha1_testvectors) {
385  TestSHA1("", "da39a3ee5e6b4b0d3255bfef95601890afd80709");
386  TestSHA1("abc", "a9993e364706816aba3e25717850c26c9cd0d89d");
387  TestSHA1("message digest", "c12252ceda8be8994d5fa0290a47231c1d16aae3");
388  TestSHA1("secure hash algorithm", "d4d6d2f0ebe317513bbd8d967d89bac5819c2f60");
389  TestSHA1("SHA1 is considered to be safe", "f2b6650569ad3a8720348dd6ea6c497dee3a842a");
390  TestSHA1("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
391  "84983e441c3bd26ebaae4aa1f95129e5e54670f1");
392  TestSHA1("For this sample, this 63-byte string will be used as input data",
393  "4f0ea5cd0585a23d028abdc1a6684e5a8094dc49");
394  TestSHA1("This is exactly 64 bytes long, not counting the terminating byte",
395  "fb679f23e7d1ce053313e66e127ab1b444397057");
396  TestSHA1(std::string(1000000, 'a'), "34aa973cd4c4daa4f61eeb2bdbad27316534016f");
397  TestSHA1(test1, "b7755760681cbfd971451668f32af5774f4656b5");
398 }
399 
400 BOOST_AUTO_TEST_CASE(sha256_testvectors) {
401  TestSHA256("", "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855");
402  TestSHA256("abc", "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad");
403  TestSHA256("message digest",
404  "f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650");
405  TestSHA256("secure hash algorithm",
406  "f30ceb2bb2829e79e4ca9753d35a8ecc00262d164cc077080295381cbd643f0d");
407  TestSHA256("SHA256 is considered to be safe",
408  "6819d915c73f4d1e77e4e1b52d1fa0f9cf9beaead3939f15874bd988e2a23630");
409  TestSHA256("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
410  "248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1");
411  TestSHA256("For this sample, this 63-byte string will be used as input data",
412  "f08a78cbbaee082b052ae0708f32fa1e50c5c421aa772ba5dbb406a2ea6be342");
413  TestSHA256("This is exactly 64 bytes long, not counting the terminating byte",
414  "ab64eff7e88e2e46165e29f2bce41826bd4c7b3552f6b382a9e7d3af47c245f8");
415  TestSHA256("As Bitcoin relies on 80 byte header hashes, we want to have an example for that.",
416  "7406e8de7d6e4fffc573daef05aefb8806e7790f55eab5576f31349743cca743");
417  TestSHA256(std::string(1000000, 'a'),
418  "cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0");
419  TestSHA256(test1, "a316d55510b49662420f49d145d42fb83f31ef8dc016aa4e32df049991a91e26");
420 }
421 
422 BOOST_AUTO_TEST_CASE(sha512_testvectors) {
423  TestSHA512("",
424  "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce"
425  "47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e");
426  TestSHA512("abc",
427  "ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a"
428  "2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f");
429  TestSHA512("message digest",
430  "107dbf389d9e9f71a3a95f6c055b9251bc5268c2be16d6c13492ea45b0199f33"
431  "09e16455ab1e96118e8a905d5597b72038ddb372a89826046de66687bb420e7c");
432  TestSHA512("secure hash algorithm",
433  "7746d91f3de30c68cec0dd693120a7e8b04d8073cb699bdce1a3f64127bca7a3"
434  "d5db502e814bb63c063a7a5043b2df87c61133395f4ad1edca7fcf4b30c3236e");
435  TestSHA512("SHA512 is considered to be safe",
436  "099e6468d889e1c79092a89ae925a9499b5408e01b66cb5b0a3bd0dfa51a9964"
437  "6b4a3901caab1318189f74cd8cf2e941829012f2449df52067d3dd5b978456c2");
438  TestSHA512("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
439  "204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c335"
440  "96fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445");
441  TestSHA512("For this sample, this 63-byte string will be used as input data",
442  "b3de4afbc516d2478fe9b518d063bda6c8dd65fc38402dd81d1eb7364e72fb6e"
443  "6663cf6d2771c8f5a6da09601712fb3d2a36c6ffea3e28b0818b05b0a8660766");
444  TestSHA512("This is exactly 64 bytes long, not counting the terminating byte",
445  "70aefeaa0e7ac4f8fe17532d7185a289bee3b428d950c14fa8b713ca09814a38"
446  "7d245870e007a80ad97c369d193e41701aa07f3221d15f0e65a1ff970cedf030");
447  TestSHA512("abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno"
448  "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
449  "8e959b75dae313da8cf4f72814fc143f8f7779c6eb9f7fa17299aeadb6889018"
450  "501d289e4900f7e4331b99dec4b5433ac7d329eeb6dd26545e96e55b874be909");
451  TestSHA512(std::string(1000000, 'a'),
452  "e718483d0ce769644e2e42c7bc15b4638e1f98b13b2044285632a803afa973eb"
453  "de0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b");
455  "40cac46c147e6131c5193dd5f34e9d8bb4951395f27b08c558c65ff4ba2de594"
456  "37de8c3ef5459d76a52cedc02dc499a3c9ed9dedbfb3281afd9653b8a112fafc");
457 }
458 
459 BOOST_AUTO_TEST_CASE(hmac_sha256_testvectors) {
460  // test cases 1, 2, 3, 4, 6 and 7 of RFC 4231
461  TestHMACSHA256("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
462  "4869205468657265",
463  "b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7");
464  TestHMACSHA256("4a656665",
465  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
466  "5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843");
467  TestHMACSHA256("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
468  "dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd"
469  "dddddddddddddddddddddddddddddddddddd",
470  "773ea91e36800e46854db8ebd09181a72959098b3ef8c122d9635514ced565fe");
471  TestHMACSHA256("0102030405060708090a0b0c0d0e0f10111213141516171819",
472  "cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd"
473  "cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd",
474  "82558a389a443c0ea4cc819899f2083a85f0faa3e578f8077a2e3ff46729665b");
475  TestHMACSHA256("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
476  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
477  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
478  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
479  "aaaaaa",
480  "54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a"
481  "65204b6579202d2048617368204b6579204669727374",
482  "60e431591ee0b67f0d8a26aacbf5b77f8e0bc6213728c5140546040f0ee37f54");
483  TestHMACSHA256("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
484  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
485  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
486  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
487  "aaaaaa",
488  "5468697320697320612074657374207573696e672061206c6172676572207468"
489  "616e20626c6f636b2d73697a65206b657920616e642061206c61726765722074"
490  "68616e20626c6f636b2d73697a6520646174612e20546865206b6579206e6565"
491  "647320746f20626520686173686564206265666f7265206265696e6720757365"
492  "642062792074686520484d414320616c676f726974686d2e",
493  "9b09ffa71b942fcb27635fbcd5b0e944bfdc63644f0713938a7f51535c3a35e2");
494  // Test case with key length 63 bytes.
495  TestHMACSHA256("4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
496  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a6566",
497  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
498  "9de4b546756c83516720a4ad7fe7bdbeac4298c6fdd82b15f895a6d10b0769a6");
499  // Test case with key length 64 bytes.
500  TestHMACSHA256("4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
501  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665",
502  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
503  "528c609a4c9254c274585334946b7c2661bad8f1fc406b20f6892478d19163dd");
504  // Test case with key length 65 bytes.
505  TestHMACSHA256("4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
506  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
507  "4a",
508  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
509  "d06af337f359a2330deffb8e3cbe4b5b7aa8ca1f208528cdbd245d5dc63c4483");
510 }
511 
512 BOOST_AUTO_TEST_CASE(hmac_sha512_testvectors) {
513  // test cases 1, 2, 3, 4, 6 and 7 of RFC 4231
514  TestHMACSHA512("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
515  "4869205468657265",
516  "87aa7cdea5ef619d4ff0b4241a1d6cb02379f4e2ce4ec2787ad0b30545e17cde"
517  "daa833b7d6b8a702038b274eaea3f4e4be9d914eeb61f1702e696c203a126854");
518  TestHMACSHA512("4a656665",
519  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
520  "164b7a7bfcf819e2e395fbe73b56e0a387bd64222e831fd610270cd7ea250554"
521  "9758bf75c05a994a6d034f65f8f0e6fdcaeab1a34d4a6b4b636e070a38bce737");
522  TestHMACSHA512("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
523  "dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd"
524  "dddddddddddddddddddddddddddddddddddd",
525  "fa73b0089d56a284efb0f0756c890be9b1b5dbdd8ee81a3655f83e33b2279d39"
526  "bf3e848279a722c806b485a47e67c807b946a337bee8942674278859e13292fb");
527  TestHMACSHA512("0102030405060708090a0b0c0d0e0f10111213141516171819",
528  "cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd"
529  "cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd",
530  "b0ba465637458c6990e5a8c5f61d4af7e576d97ff94b872de76f8050361ee3db"
531  "a91ca5c11aa25eb4d679275cc5788063a5f19741120c4f2de2adebeb10a298dd");
532  TestHMACSHA512("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
533  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
534  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
535  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
536  "aaaaaa",
537  "54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a"
538  "65204b6579202d2048617368204b6579204669727374",
539  "80b24263c7c1a3ebb71493c1dd7be8b49b46d1f41b4aeec1121b013783f8f352"
540  "6b56d037e05f2598bd0fd2215d6a1e5295e64f73f63f0aec8b915a985d786598");
541  TestHMACSHA512("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
542  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
543  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
544  "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
545  "aaaaaa",
546  "5468697320697320612074657374207573696e672061206c6172676572207468"
547  "616e20626c6f636b2d73697a65206b657920616e642061206c61726765722074"
548  "68616e20626c6f636b2d73697a6520646174612e20546865206b6579206e6565"
549  "647320746f20626520686173686564206265666f7265206265696e6720757365"
550  "642062792074686520484d414320616c676f726974686d2e",
551  "e37b6a775dc87dbaa4dfa9f96e5e3ffddebd71f8867289865df5a32d20cdc944"
552  "b6022cac3c4982b10d5eeb55c3e4de15134676fb6de0446065c97440fa8c6a58");
553  // Test case with key length 127 bytes.
554  TestHMACSHA512("4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
555  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
556  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
557  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a6566",
558  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
559  "267424dfb8eeb999f3e5ec39a4fe9fd14c923e6187e0897063e5c9e02b2e624a"
560  "c04413e762977df71a9fb5d562b37f89dfdfb930fce2ed1fa783bbc2a203d80e");
561  // Test case with key length 128 bytes.
562  TestHMACSHA512("4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
563  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
564  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
565  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665",
566  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
567  "43aaac07bb1dd97c82c04df921f83b16a68d76815cd1a30d3455ad43a3d80484"
568  "2bb35462be42cc2e4b5902de4d204c1c66d93b47d1383e3e13a3788687d61258");
569  // Test case with key length 129 bytes.
570  TestHMACSHA512("4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
571  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
572  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
573  "4a6566654a6566654a6566654a6566654a6566654a6566654a6566654a656665"
574  "4a",
575  "7768617420646f2079612077616e7420666f72206e6f7468696e673f",
576  "0b273325191cfc1b4b71d5075c8fcad67696309d292b1dad2cd23983a35feb8e"
577  "fb29795e79f2ef27f68cb1e16d76178c307a67beaad9456fac5fdffeadb16e2c");
578 }
579 
580 BOOST_AUTO_TEST_CASE(aes_testvectors) {
581  // AES test vectors from FIPS 197.
582  TestAES256("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f", "00112233445566778899aabbccddeeff", "8ea2b7ca516745bfeafc49904b496089");
583 
584  // AES-ECB test vectors from NIST sp800-38a.
585  TestAES256("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", "6bc1bee22e409f96e93d7e117393172a", "f3eed1bdb5d2a03c064b5a7e3db181f8");
586  TestAES256("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", "ae2d8a571e03ac9c9eb76fac45af8e51", "591ccb10d410ed26dc5ba74a31362870");
587  TestAES256("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", "30c81c46a35ce411e5fbc1191a0a52ef", "b6ed21b99ca6f4f9f153e7b1beafed1d");
588  TestAES256("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", "f69f2445df4f9b17ad2b417be66c3710", "23304b7a39f9f3ff067d8d8f9e24ecc7");
589 }
590 
591 BOOST_AUTO_TEST_CASE(aes_cbc_testvectors) {
592  // NIST AES CBC 256-bit encryption test-vectors
593  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
594  "000102030405060708090A0B0C0D0E0F", false, "6bc1bee22e409f96e93d7e117393172a", \
595  "f58c4c04d6e5f1ba779eabfb5f7bfbd6");
596  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
597  "F58C4C04D6E5F1BA779EABFB5F7BFBD6", false, "ae2d8a571e03ac9c9eb76fac45af8e51", \
598  "9cfc4e967edb808d679f777bc6702c7d");
599  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
600  "9CFC4E967EDB808D679F777BC6702C7D", false, "30c81c46a35ce411e5fbc1191a0a52ef",
601  "39f23369a9d9bacfa530e26304231461");
602  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
603  "39F23369A9D9BACFA530E26304231461", false, "f69f2445df4f9b17ad2b417be66c3710", \
604  "b2eb05e2c39be9fcda6c19078c6a9d1b");
605 
606  // The same vectors with padding enabled
607  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
608  "000102030405060708090A0B0C0D0E0F", true, "6bc1bee22e409f96e93d7e117393172a", \
609  "f58c4c04d6e5f1ba779eabfb5f7bfbd6485a5c81519cf378fa36d42b8547edc0");
610  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
611  "F58C4C04D6E5F1BA779EABFB5F7BFBD6", true, "ae2d8a571e03ac9c9eb76fac45af8e51", \
612  "9cfc4e967edb808d679f777bc6702c7d3a3aa5e0213db1a9901f9036cf5102d2");
613  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
614  "9CFC4E967EDB808D679F777BC6702C7D", true, "30c81c46a35ce411e5fbc1191a0a52ef",
615  "39f23369a9d9bacfa530e263042314612f8da707643c90a6f732b3de1d3f5cee");
616  TestAES256CBC("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", \
617  "39F23369A9D9BACFA530E26304231461", true, "f69f2445df4f9b17ad2b417be66c3710", \
618  "b2eb05e2c39be9fcda6c19078c6a9d1b3f461796d6b0d6b2e0c2a72b4d80e644");
619 }
620 
621 
622 BOOST_AUTO_TEST_CASE(chacha20_testvector)
623 {
624  /* Example from RFC8439 section 2.3.2. */
625  TestChaCha20("",
626  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
627  {0x09000000, 0x4a000000}, 1,
628  "10f1e7e4d13b5915500fdd1fa32071c4c7d1f4c733c068030422aa9ac3d46c4e"
629  "d2826446079faa0914c2d705d98b02a2b5129cd1de164eb9cbd083e8a2503c4e");
630 
631  /* Example from RFC8439 section 2.4.2. */
632  TestChaCha20("4c616469657320616e642047656e746c656d656e206f662074686520636c6173"
633  "73206f66202739393a204966204920636f756c64206f6666657220796f75206f"
634  "6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73"
635  "637265656e20776f756c642062652069742e",
636  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
637  {0, 0x4a000000}, 1,
638  "6e2e359a2568f98041ba0728dd0d6981e97e7aec1d4360c20a27afccfd9fae0b"
639  "f91b65c5524733ab8f593dabcd62b3571639d624e65152ab8f530c359f0861d8"
640  "07ca0dbf500d6a6156a38e088a22b65e52bc514d16ccf806818ce91ab7793736"
641  "5af90bbf74a35be6b40b8eedf2785e42874d");
642 
643  // RFC 7539/8439 A.1 Test Vector #1:
644  TestChaCha20("",
645  "0000000000000000000000000000000000000000000000000000000000000000",
646  {0, 0}, 0,
647  "76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7"
648  "da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586");
649 
650  // RFC 7539/8439 A.1 Test Vector #2:
651  TestChaCha20("",
652  "0000000000000000000000000000000000000000000000000000000000000000",
653  {0, 0}, 1,
654  "9f07e7be5551387a98ba977c732d080dcb0f29a048e3656912c6533e32ee7aed"
655  "29b721769ce64e43d57133b074d839d531ed1f28510afb45ace10a1f4b794d6f");
656 
657  // RFC 7539/8439 A.1 Test Vector #3:
658  TestChaCha20("",
659  "0000000000000000000000000000000000000000000000000000000000000001",
660  {0, 0}, 1,
661  "3aeb5224ecf849929b9d828db1ced4dd832025e8018b8160b82284f3c949aa5a"
662  "8eca00bbb4a73bdad192b5c42f73f2fd4e273644c8b36125a64addeb006c13a0");
663 
664  // RFC 7539/8439 A.1 Test Vector #4:
665  TestChaCha20("",
666  "00ff000000000000000000000000000000000000000000000000000000000000",
667  {0, 0}, 2,
668  "72d54dfbf12ec44b362692df94137f328fea8da73990265ec1bbbea1ae9af0ca"
669  "13b25aa26cb4a648cb9b9d1be65b2c0924a66c54d545ec1b7374f4872e99f096");
670 
671  // RFC 7539/8439 A.1 Test Vector #5:
672  TestChaCha20("",
673  "0000000000000000000000000000000000000000000000000000000000000000",
674  {0, 0x200000000000000}, 0,
675  "c2c64d378cd536374ae204b9ef933fcd1a8b2288b3dfa49672ab765b54ee27c7"
676  "8a970e0e955c14f3a88e741b97c286f75f8fc299e8148362fa198a39531bed6d");
677 
678  // RFC 7539/8439 A.2 Test Vector #1:
679  TestChaCha20("0000000000000000000000000000000000000000000000000000000000000000"
680  "0000000000000000000000000000000000000000000000000000000000000000",
681  "0000000000000000000000000000000000000000000000000000000000000000",
682  {0, 0}, 0,
683  "76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7"
684  "da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586");
685 
686  // RFC 7539/8439 A.2 Test Vector #2:
687  TestChaCha20("416e79207375626d697373696f6e20746f20746865204945544620696e74656e"
688  "6465642062792074686520436f6e7472696275746f7220666f72207075626c69"
689  "636174696f6e20617320616c6c206f722070617274206f6620616e2049455446"
690  "20496e7465726e65742d4472616674206f722052464320616e6420616e792073"
691  "746174656d656e74206d6164652077697468696e2074686520636f6e74657874"
692  "206f6620616e204945544620616374697669747920697320636f6e7369646572"
693  "656420616e20224945544620436f6e747269627574696f6e222e205375636820"
694  "73746174656d656e747320696e636c756465206f72616c2073746174656d656e"
695  "747320696e20494554462073657373696f6e732c2061732077656c6c20617320"
696  "7772697474656e20616e6420656c656374726f6e696320636f6d6d756e696361"
697  "74696f6e73206d61646520617420616e792074696d65206f7220706c6163652c"
698  "207768696368206172652061646472657373656420746f",
699  "0000000000000000000000000000000000000000000000000000000000000001",
700  {0, 0x200000000000000}, 1,
701  "a3fbf07df3fa2fde4f376ca23e82737041605d9f4f4f57bd8cff2c1d4b7955ec"
702  "2a97948bd3722915c8f3d337f7d370050e9e96d647b7c39f56e031ca5eb6250d"
703  "4042e02785ececfa4b4bb5e8ead0440e20b6e8db09d881a7c6132f420e527950"
704  "42bdfa7773d8a9051447b3291ce1411c680465552aa6c405b7764d5e87bea85a"
705  "d00f8449ed8f72d0d662ab052691ca66424bc86d2df80ea41f43abf937d3259d"
706  "c4b2d0dfb48a6c9139ddd7f76966e928e635553ba76c5c879d7b35d49eb2e62b"
707  "0871cdac638939e25e8a1e0ef9d5280fa8ca328b351c3c765989cbcf3daa8b6c"
708  "cc3aaf9f3979c92b3720fc88dc95ed84a1be059c6499b9fda236e7e818b04b0b"
709  "c39c1e876b193bfe5569753f88128cc08aaa9b63d1a16f80ef2554d7189c411f"
710  "5869ca52c5b83fa36ff216b9c1d30062bebcfd2dc5bce0911934fda79a86f6e6"
711  "98ced759c3ff9b6477338f3da4f9cd8514ea9982ccafb341b2384dd902f3d1ab"
712  "7ac61dd29c6f21ba5b862f3730e37cfdc4fd806c22f221");
713 
714  // RFC 7539/8439 A.2 Test Vector #3:
715  TestChaCha20("2754776173206272696c6c69672c20616e642074686520736c6974687920746f"
716  "7665730a446964206779726520616e642067696d626c6520696e207468652077"
717  "6162653a0a416c6c206d696d737920776572652074686520626f726f676f7665"
718  "732c0a416e6420746865206d6f6d65207261746873206f757467726162652e",
719  "1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
720  {0, 0x200000000000000}, 42,
721  "62e6347f95ed87a45ffae7426f27a1df5fb69110044c0d73118effa95b01e5cf"
722  "166d3df2d721caf9b21e5fb14c616871fd84c54f9d65b283196c7fe4f60553eb"
723  "f39c6402c42234e32a356b3e764312a61a5532055716ead6962568f87d3f3f77"
724  "04c6a8d1bcd1bf4d50d6154b6da731b187b58dfd728afa36757a797ac188d1");
725 
726  // RFC 7539/8439 A.4 Test Vector #1:
727  TestChaCha20("",
728  "0000000000000000000000000000000000000000000000000000000000000000",
729  {0, 0}, 0,
730  "76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7");
731 
732  // RFC 7539/8439 A.4 Test Vector #2:
733  TestChaCha20("",
734  "0000000000000000000000000000000000000000000000000000000000000001",
735  {0, 0x200000000000000}, 0,
736  "ecfa254f845f647473d3cb140da9e87606cb33066c447b87bc2666dde3fbb739");
737 
738  // RFC 7539/8439 A.4 Test Vector #3:
739  TestChaCha20("",
740  "1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
741  {0, 0x200000000000000}, 0,
742  "965e3bc6f9ec7ed9560808f4d229f94b137ff275ca9b3fcbdd59deaad23310ae");
743 
744  // test encryption
745  TestChaCha20("4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393a204966204920636f756"
746  "c64206f6666657220796f75206f6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73637265656e"
747  "20776f756c642062652069742e",
748  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f", {0, 0x4a000000UL}, 1,
749  "6e2e359a2568f98041ba0728dd0d6981e97e7aec1d4360c20a27afccfd9fae0bf91b65c5524733ab8f593dabcd62b3571639d"
750  "624e65152ab8f530c359f0861d807ca0dbf500d6a6156a38e088a22b65e52bc514d16ccf806818ce91ab77937365af90bbf74"
751  "a35be6b40b8eedf2785e42874d"
752  );
753 
754  // test keystream output
755  TestChaCha20("", "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f", {0, 0x4a000000UL}, 1,
756  "224f51f3401bd9e12fde276fb8631ded8c131f823d2c06e27e4fcaec9ef3cf788a3b0aa372600a92b57974cded2b9334794cb"
757  "a40c63e34cdea212c4cf07d41b769a6749f3f630f4122cafe28ec4dc47e26d4346d70b98c73f3e9c53ac40c5945398b6eda1a"
758  "832c89c167eacd901d7e2bf363");
759 
760  // Test vectors from https://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-04#section-7
761  // The first one is identical to the above one from the RFC8439 A.1 vectors, but repeated here
762  // for completeness.
763  TestChaCha20("",
764  "0000000000000000000000000000000000000000000000000000000000000000",
765  {0, 0}, 0,
766  "76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7"
767  "da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586");
768  TestChaCha20("",
769  "0000000000000000000000000000000000000000000000000000000000000001",
770  {0, 0}, 0,
771  "4540f05a9f1fb296d7736e7b208e3c96eb4fe1834688d2604f450952ed432d41"
772  "bbe2a0b6ea7566d2a5d1e7e20d42af2c53d792b1c43fea817e9ad275ae546963");
773  TestChaCha20("",
774  "0000000000000000000000000000000000000000000000000000000000000000",
775  {0, 0x0100000000000000ULL}, 0,
776  "de9cba7bf3d69ef5e786dc63973f653a0b49e015adbff7134fcb7df137821031"
777  "e85a050278a7084527214f73efc7fa5b5277062eb7a0433e445f41e3");
778  TestChaCha20("",
779  "0000000000000000000000000000000000000000000000000000000000000000",
780  {0, 1}, 0,
781  "ef3fdfd6c61578fbf5cf35bd3dd33b8009631634d21e42ac33960bd138e50d32"
782  "111e4caf237ee53ca8ad6426194a88545ddc497a0b466e7d6bbdb0041b2f586b");
783  TestChaCha20("",
784  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
785  {0, 0x0706050403020100ULL}, 0,
786  "f798a189f195e66982105ffb640bb7757f579da31602fc93ec01ac56f85ac3c1"
787  "34a4547b733b46413042c9440049176905d3be59ea1c53f15916155c2be8241a"
788  "38008b9a26bc35941e2444177c8ade6689de95264986d95889fb60e84629c9bd"
789  "9a5acb1cc118be563eb9b3a4a472f82e09a7e778492b562ef7130e88dfe031c7"
790  "9db9d4f7c7a899151b9a475032b63fc385245fe054e3dd5a97a5f576fe064025"
791  "d3ce042c566ab2c507b138db853e3d6959660996546cc9c4a6eafdc777c040d7"
792  "0eaf46f76dad3979e5c5360c3317166a1c894c94a371876a94df7628fe4eaaf2"
793  "ccb27d5aaae0ad7ad0f9d4b6ad3b54098746d4524d38407a6deb3ab78fab78c9");
794 
795  // Test overflow of 32-bit block counter, should increment the first 32-bit
796  // part of the nonce to retain compatibility with >256 GiB output.
797  // The test data was generated with an implementation that uses a 64-bit
798  // counter and a 64-bit initialization vector (PyCryptodome's ChaCha20 class
799  // with 8 bytes nonce length).
800  TestChaCha20("",
801  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
802  {0, 0xdeadbeef12345678}, 0xffffffff,
803  "2d292c880513397b91221c3a647cfb0765a4815894715f411e3df5e0dd0ba9df"
804  "fd565dea5addbdb914208fde7950f23e0385f9a727143f6a6ac51d84b1c0fb3e"
805  "2e3b00b63d6841a1cc6d1538b1d3a74bef1eb2f54c7b7281e36e484dba89b351"
806  "c8f572617e61e342879f211b0e4c515df50ea9d0771518fad96cd0baee62deb6");
807 
808  // Forward secure ChaCha20
809  TestFSChaCha20("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
810  "0000000000000000000000000000000000000000000000000000000000000000",
811  256,
812  "a93df4ef03011f3db95f60d996e1785df5de38fc39bfcb663a47bb5561928349");
813  TestFSChaCha20("01",
814  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
815  5,
816  "ea");
817  TestFSChaCha20("e93fdb5c762804b9a706816aca31e35b11d2aa3080108ef46a5b1f1508819c0a",
818  "8ec4c3ccdaea336bdeb245636970be01266509b33f3d2642504eaf412206207a",
819  4096,
820  "8bfaa4eacff308fdb4a94a5ff25bd9d0c1f84b77f81239f67ff39d6e1ac280c9");
821 }
822 
823 BOOST_AUTO_TEST_CASE(chacha20_midblock)
824 {
825  auto key = ParseHex<std::byte>("0000000000000000000000000000000000000000000000000000000000000000");
826  ChaCha20 c20{key};
827  // get one block of keystream
828  std::byte block[64];
829  c20.Keystream(block);
830  std::byte b1[5], b2[7], b3[52];
831  c20 = ChaCha20{key};
832  c20.Keystream(b1);
833  c20.Keystream(b2);
834  c20.Keystream(b3);
835 
836  BOOST_CHECK(Span{block}.first(5) == Span{b1});
837  BOOST_CHECK(Span{block}.subspan(5, 7) == Span{b2});
838  BOOST_CHECK(Span{block}.last(52) == Span{b3});
839 }
840 
841 BOOST_AUTO_TEST_CASE(poly1305_testvector)
842 {
843  // RFC 7539, section 2.5.2.
844  TestPoly1305("43727970746f6772617068696320466f72756d2052657365617263682047726f7570",
845  "85d6be7857556d337f4452fe42d506a80103808afb0db2fd4abff6af4149f51b",
846  "a8061dc1305136c6c22b8baf0c0127a9");
847 
848  // RFC 7539, section A.3.
849  TestPoly1305("00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
850  "000000000000000000000000000",
851  "0000000000000000000000000000000000000000000000000000000000000000",
852  "00000000000000000000000000000000");
853 
854  TestPoly1305("416e79207375626d697373696f6e20746f20746865204945544620696e74656e6465642062792074686520436f6e747269627"
855  "5746f7220666f72207075626c69636174696f6e20617320616c6c206f722070617274206f6620616e204945544620496e7465"
856  "726e65742d4472616674206f722052464320616e6420616e792073746174656d656e74206d6164652077697468696e2074686"
857  "520636f6e74657874206f6620616e204945544620616374697669747920697320636f6e7369646572656420616e2022494554"
858  "4620436f6e747269627574696f6e222e20537563682073746174656d656e747320696e636c756465206f72616c20737461746"
859  "56d656e747320696e20494554462073657373696f6e732c2061732077656c6c206173207772697474656e20616e6420656c65"
860  "6374726f6e696320636f6d6d756e69636174696f6e73206d61646520617420616e792074696d65206f7220706c6163652c207"
861  "768696368206172652061646472657373656420746f",
862  "0000000000000000000000000000000036e5f6b5c5e06070f0efca96227a863e",
863  "36e5f6b5c5e06070f0efca96227a863e");
864 
865  TestPoly1305("416e79207375626d697373696f6e20746f20746865204945544620696e74656e6465642062792074686520436f6e747269627"
866  "5746f7220666f72207075626c69636174696f6e20617320616c6c206f722070617274206f6620616e204945544620496e7465"
867  "726e65742d4472616674206f722052464320616e6420616e792073746174656d656e74206d6164652077697468696e2074686"
868  "520636f6e74657874206f6620616e204945544620616374697669747920697320636f6e7369646572656420616e2022494554"
869  "4620436f6e747269627574696f6e222e20537563682073746174656d656e747320696e636c756465206f72616c20737461746"
870  "56d656e747320696e20494554462073657373696f6e732c2061732077656c6c206173207772697474656e20616e6420656c65"
871  "6374726f6e696320636f6d6d756e69636174696f6e73206d61646520617420616e792074696d65206f7220706c6163652c207"
872  "768696368206172652061646472657373656420746f",
873  "36e5f6b5c5e06070f0efca96227a863e00000000000000000000000000000000",
874  "f3477e7cd95417af89a6b8794c310cf0");
875 
876  TestPoly1305("2754776173206272696c6c69672c20616e642074686520736c6974687920746f7665730a446964206779726520616e6420676"
877  "96d626c6520696e2074686520776162653a0a416c6c206d696d737920776572652074686520626f726f676f7665732c0a416e"
878  "6420746865206d6f6d65207261746873206f757467726162652e",
879  "1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
880  "4541669a7eaaee61e708dc7cbcc5eb62");
881 
882  TestPoly1305("ffffffffffffffffffffffffffffffff",
883  "0200000000000000000000000000000000000000000000000000000000000000",
884  "03000000000000000000000000000000");
885 
886  TestPoly1305("02000000000000000000000000000000",
887  "02000000000000000000000000000000ffffffffffffffffffffffffffffffff",
888  "03000000000000000000000000000000");
889 
890  TestPoly1305("fffffffffffffffffffffffffffffffff0ffffffffffffffffffffffffffffff11000000000000000000000000000000",
891  "0100000000000000000000000000000000000000000000000000000000000000",
892  "05000000000000000000000000000000");
893 
894  TestPoly1305("fffffffffffffffffffffffffffffffffbfefefefefefefefefefefefefefefe01010101010101010101010101010101",
895  "0100000000000000000000000000000000000000000000000000000000000000",
896  "00000000000000000000000000000000");
897 
898  TestPoly1305("fdffffffffffffffffffffffffffffff",
899  "0200000000000000000000000000000000000000000000000000000000000000",
900  "faffffffffffffffffffffffffffffff");
901 
902  TestPoly1305("e33594d7505e43b900000000000000003394d7505e4379cd01000000000000000000000000000000000000000000000001000000000000000000000000000000",
903  "0100000000000000040000000000000000000000000000000000000000000000",
904  "14000000000000005500000000000000");
905 
906  TestPoly1305("e33594d7505e43b900000000000000003394d7505e4379cd010000000000000000000000000000000000000000000000",
907  "0100000000000000040000000000000000000000000000000000000000000000",
908  "13000000000000000000000000000000");
909 
910  // Tests from https://github.com/floodyberry/poly1305-donna/blob/master/poly1305-donna.c
911  TestPoly1305("8e993b9f48681273c29650ba32fc76ce48332ea7164d96a4476fb8c531a1186a"
912  "c0dfc17c98dce87b4da7f011ec48c97271d2c20f9b928fe2270d6fb863d51738"
913  "b48eeee314a7cc8ab932164548e526ae90224368517acfeabd6bb3732bc0e9da"
914  "99832b61ca01b6de56244a9e88d5f9b37973f622a43d14a6599b1f654cb45a74"
915  "e355a5",
916  "eea6a7251c1e72916d11c2cb214d3c252539121d8e234e652d651fa4c8cff880",
917  "f3ffc7703f9400e52a7dfb4b3d3305d9");
918  {
919  // mac of the macs of messages of length 0 to 256, where the key and messages have all
920  // their values set to the length.
921  auto total_key = ParseHex<std::byte>("01020304050607fffefdfcfbfaf9ffffffffffffffffffffffffffff00000000");
922  Poly1305 total_ctx(total_key);
923  for (unsigned i = 0; i < 256; ++i) {
924  std::vector<std::byte> key(32, std::byte{uint8_t(i)});
925  std::vector<std::byte> msg(i, std::byte{uint8_t(i)});
926  std::array<std::byte, Poly1305::TAGLEN> tag;
927  Poly1305{key}.Update(msg).Finalize(tag);
928  total_ctx.Update(tag);
929  }
930  std::vector<std::byte> total_tag(Poly1305::TAGLEN);
931  total_ctx.Finalize(total_tag);
932  BOOST_CHECK_EQUAL(HexStr(total_tag), "64afe2e8d6ad7bbdd287f97c44623d39");
933  }
934 
935  // Tests with sparse messages and random keys.
936  TestPoly1305("000000000000000000000094000000000000b07c4300000000002c002600d500"
937  "00000000000000000000000000bc58000000000000000000c9000000dd000000"
938  "00000000000000d34c000000000000000000000000f9009100000000000000c2"
939  "4b0000e900000000000000000000000000000000000e00000027000074000000"
940  "0000000003000000000000f1000000000000dce2000000000000003900000000"
941  "0000000000000000000000000000000000000000000000520000000000000000"
942  "000000000000000000000000009500000000000000000000000000cf00826700"
943  "000000a900000000000000000000000000000000000000000079000000000000"
944  "0000de0000004c000000000033000000000000000000000000002800aa000000"
945  "00003300860000e000000000",
946  "6e543496db3cf677592989891ab021f58390feb84fb419fbc7bb516a60bfa302",
947  "7ea80968354d40d9d790b45310caf7f3");
948  TestPoly1305("0000005900000000c40000002f00000000000000000000000000000029690000"
949  "0000e8000037000000000000000000000000000b000000000000000000000000"
950  "000000000000000000000000001800006e0000000000a4000000000000000000"
951  "00000000000000004d00000000000000b0000000000000000000005a00000000"
952  "0000000000b7c300000000000000540000000000000000000000000a00000000"
953  "00005b0000000000000000000000000000000000002d00e70000000000000000"
954  "000000000000003400006800d700000000000000000000360000000000000000"
955  "00eb000000000000000000000000000000000000000000000000000028000000"
956  "37000000000000000000000000000000000000000000000000000000008f0000"
957  "000000000000000000000000",
958  "f0b659a4f3143d8a1e1dacb9a409fe7e7cd501dfb58b16a2623046c5d337922a",
959  "0e410fa9d7a40ac582e77546be9a72bb");
960 }
961 
962 BOOST_AUTO_TEST_CASE(chacha20poly1305_testvectors)
963 {
964  // Note that in our implementation, the authentication is suffixed to the ciphertext.
965  // The RFC test vectors specify them separately.
966 
967  // RFC 8439 Example from section 2.8.2
968  TestChaCha20Poly1305("4c616469657320616e642047656e746c656d656e206f662074686520636c6173"
969  "73206f66202739393a204966204920636f756c64206f6666657220796f75206f"
970  "6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73"
971  "637265656e20776f756c642062652069742e",
972  "50515253c0c1c2c3c4c5c6c7",
973  "808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f",
974  {7, 0x4746454443424140},
975  "d31a8d34648e60db7b86afbc53ef7ec2a4aded51296e08fea9e2b5a736ee62d6"
976  "3dbea45e8ca9671282fafb69da92728b1a71de0a9e060b2905d6a5b67ecd3b36"
977  "92ddbd7f2d778b8c9803aee328091b58fab324e4fad675945585808b4831d7bc"
978  "3ff4def08e4b7a9de576d26586cec64b61161ae10b594f09e26a7e902ecbd060"
979  "0691");
980 
981  // RFC 8439 Test vector A.5
982  TestChaCha20Poly1305("496e7465726e65742d4472616674732061726520647261667420646f63756d65"
983  "6e74732076616c696420666f722061206d6178696d756d206f6620736978206d"
984  "6f6e74687320616e64206d617920626520757064617465642c207265706c6163"
985  "65642c206f72206f62736f6c65746564206279206f7468657220646f63756d65"
986  "6e747320617420616e792074696d652e20497420697320696e617070726f7072"
987  "6961746520746f2075736520496e7465726e65742d4472616674732061732072"
988  "65666572656e6365206d6174657269616c206f7220746f206369746520746865"
989  "6d206f74686572207468616e206173202fe2809c776f726b20696e2070726f67"
990  "726573732e2fe2809d",
991  "f33388860000000000004e91",
992  "1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
993  {0, 0x0807060504030201},
994  "64a0861575861af460f062c79be643bd5e805cfd345cf389f108670ac76c8cb2"
995  "4c6cfc18755d43eea09ee94e382d26b0bdb7b73c321b0100d4f03b7f355894cf"
996  "332f830e710b97ce98c8a84abd0b948114ad176e008d33bd60f982b1ff37c855"
997  "9797a06ef4f0ef61c186324e2b3506383606907b6a7c02b0f9f6157b53c867e4"
998  "b9166c767b804d46a59b5216cde7a4e99040c5a40433225ee282a1b0a06c523e"
999  "af4534d7f83fa1155b0047718cbc546a0d072b04b3564eea1b422273f548271a"
1000  "0bb2316053fa76991955ebd63159434ecebb4e466dae5a1073a6727627097a10"
1001  "49e617d91d361094fa68f0ff77987130305beaba2eda04df997b714d6c6f2c29"
1002  "a6ad5cb4022b02709beead9d67890cbb22392336fea1851f38");
1003 
1004  // Test vectors exercising aad and plaintext which are multiples of 16 bytes.
1005  TestChaCha20Poly1305("8d2d6a8befd9716fab35819eaac83b33269afb9f1a00fddf66095a6c0cd91951"
1006  "a6b7ad3db580be0674c3f0b55f618e34",
1007  "",
1008  "72ddc73f07101282bbbcf853b9012a9f9695fc5d36b303a97fd0845d0314e0c3",
1009  {0x3432b75f, 0xb3585537eb7f4024},
1010  "f760b8224fb2a317b1b07875092606131232a5b86ae142df5df1c846a7f6341a"
1011  "f2564483dd77f836be45e6230808ffe402a6f0a3e8be074b3d1f4ea8a7b09451");
1013  "36970d8a704c065de16250c18033de5a400520ac1b5842b24551e5823a3314f3"
1014  "946285171e04a81ebfbe3566e312e74ab80e94c7dd2ff4e10de0098a58d0f503",
1015  "77adda51d6730b9ad6c995658cbd49f581b2547e7c0c08fcc24ceec797461021",
1016  {0x1f90da88, 0x75dafa3ef84471a4},
1017  "aaae5bb81e8407c94b2ae86ae0c7efbe");
1018 
1019  // FSChaCha20Poly1305 tests.
1020  TestFSChaCha20Poly1305("d6a4cb04ef0f7c09c1866ed29dc24d820e75b0491032a51b4c3366f9ca35c19e"
1021  "a3047ec6be9d45f9637b63e1cf9eb4c2523a5aab7b851ebeba87199db0e839cf"
1022  "0d5c25e50168306377aedbe9089fd2463ded88b83211cf51b73b150608cc7a60"
1023  "0d0f11b9a742948482e1b109d8faf15b450aa7322e892fa2208c6691e3fecf4c"
1024  "711191b14d75a72147",
1025  "786cb9b6ebf44288974cf0",
1026  "5c9e1c3951a74fba66708bf9d2c217571684556b6a6a3573bff2847d38612654",
1027  500,
1028  "9dcebbd3281ea3dd8e9a1ef7d55a97abd6743e56ebc0c190cb2c4e14160b385e"
1029  "0bf508dddf754bd02c7c208447c131ce23e47a4a14dfaf5dd8bc601323950f75"
1030  "4e05d46e9232f83fc5120fbbef6f5347a826ec79a93820718d4ec7a2b7cfaaa4"
1031  "4b21e16d726448b62f803811aff4f6d827ed78e738ce8a507b81a8ae13131192"
1032  "8039213de18a5120dc9b7370baca878f50ff254418de3da50c");
1033  TestFSChaCha20Poly1305("8349b7a2690b63d01204800c288ff1138a1d473c832c90ea8b3fc102d0bb3adc"
1034  "44261b247c7c3d6760bfbe979d061c305f46d94c0582ac3099f0bf249f8cb234",
1035  "",
1036  "3bd2093fcbcb0d034d8c569583c5425c1a53171ea299f8cc3bbf9ae3530adfce",
1037  60000,
1038  "30a6757ff8439b975363f166a0fa0e36722ab35936abd704297948f45083f4d4"
1039  "99433137ce931f7fca28a0acd3bc30f57b550acbc21cbd45bbef0739d9caf30c"
1040  "14b94829deb27f0b1923a2af704ae5d6");
1041 }
1042 
1043 BOOST_AUTO_TEST_CASE(hkdf_hmac_sha256_l32_tests)
1044 {
1045  // Use rfc5869 test vectors but truncated to 32 bytes (our implementation only support length 32)
1047  /*ikm_hex=*/"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
1048  /*salt_hex=*/"000102030405060708090a0b0c",
1049  /*info_hex=*/"f0f1f2f3f4f5f6f7f8f9",
1050  /*okm_check_hex=*/"3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf");
1052  "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f",
1053  "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
1054  "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
1055  "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c");
1057  "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
1058  "",
1059  "",
1060  "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d");
1061 }
1062 
1064 {
1065  for (int i = 0; i <= 32; ++i) {
1066  unsigned char in[64 * 32];
1067  unsigned char out1[32 * 32], out2[32 * 32];
1068  for (int j = 0; j < 64 * i; ++j) {
1069  in[j] = InsecureRandBits(8);
1070  }
1071  for (int j = 0; j < i; ++j) {
1072  CHash256().Write({in + 64 * j, 64}).Finalize({out1 + 32 * j, 32});
1073  }
1074  SHA256D64(out2, in, i);
1075  BOOST_CHECK(memcmp(out1, out2, 32 * i) == 0);
1076  }
1077 }
1078 
1079 static void TestSHA3_256(const std::string& input, const std::string& output)
1080 {
1081  const auto in_bytes = ParseHex(input);
1082  const auto out_bytes = ParseHex(output);
1083 
1084  SHA3_256 sha;
1085  // Hash the whole thing.
1086  unsigned char out[SHA3_256::OUTPUT_SIZE];
1087  sha.Write(in_bytes).Finalize(out);
1088  assert(out_bytes.size() == sizeof(out));
1089  BOOST_CHECK(std::equal(std::begin(out_bytes), std::end(out_bytes), out));
1090 
1091  // Reset and split randomly in 3
1092  sha.Reset();
1093  int s1 = InsecureRandRange(in_bytes.size() + 1);
1094  int s2 = InsecureRandRange(in_bytes.size() + 1 - s1);
1095  int s3 = in_bytes.size() - s1 - s2;
1096  sha.Write(Span{in_bytes}.first(s1)).Write(Span{in_bytes}.subspan(s1, s2));
1097  sha.Write(Span{in_bytes}.last(s3)).Finalize(out);
1098  BOOST_CHECK(std::equal(std::begin(out_bytes), std::end(out_bytes), out));
1099 }
1100 
1102 {
1103  // Start with the zero state.
1104  uint64_t state[25] = {0};
1105  CSHA256 tester;
1106  for (int i = 0; i < 262144; ++i) {
1107  KeccakF(state);
1108  for (int j = 0; j < 25; ++j) {
1109  unsigned char buf[8];
1110  WriteLE64(buf, state[j]);
1111  tester.Write(buf, 8);
1112  }
1113  }
1114  uint256 out;
1115  tester.Finalize(out.begin());
1116  // Expected hash of the concatenated serialized states after 1...262144 iterations of KeccakF.
1117  // Verified against an independent implementation.
1118  BOOST_CHECK_EQUAL(out.ToString(), "5f4a7f2eca7d57740ef9f1a077b4fc67328092ec62620447fe27ad8ed5f7e34f");
1119 }
1120 
1121 BOOST_AUTO_TEST_CASE(sha3_256_tests)
1122 {
1123  // Test vectors from https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/sha3/sha-3bytetestvectors.zip
1124 
1125  // SHA3-256 Short test vectors (SHA3_256ShortMsg.rsp)
1126  TestSHA3_256("", "a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a");
1127  TestSHA3_256("e9", "f0d04dd1e6cfc29a4460d521796852f25d9ef8d28b44ee91ff5b759d72c1e6d6");
1128  TestSHA3_256("d477", "94279e8f5ccdf6e17f292b59698ab4e614dfe696a46c46da78305fc6a3146ab7");
1129  TestSHA3_256("b053fa", "9d0ff086cd0ec06a682c51c094dc73abdc492004292344bd41b82a60498ccfdb");
1130  TestSHA3_256("e7372105", "3a42b68ab079f28c4ca3c752296f279006c4fe78b1eb79d989777f051e4046ae");
1131  TestSHA3_256("0296f2c40a", "53a018937221081d09ed0497377e32a1fa724025dfdc1871fa503d545df4b40d");
1132  TestSHA3_256("e6fd42037f80", "2294f8d3834f24aa9037c431f8c233a66a57b23fa3de10530bbb6911f6e1850f");
1133  TestSHA3_256("37b442385e0538", "cfa55031e716bbd7a83f2157513099e229a88891bb899d9ccd317191819998f8");
1134  TestSHA3_256("8bca931c8a132d2f", "dbb8be5dec1d715bd117b24566dc3f24f2cc0c799795d0638d9537481ef1e03e");
1135  TestSHA3_256("fb8dfa3a132f9813ac", "fd09b3501888445ffc8c3bb95d106440ceee469415fce1474743273094306e2e");
1136  TestSHA3_256("71fbacdbf8541779c24a", "cc4e5a216b01f987f24ab9cad5eb196e89d32ed4aac85acb727e18e40ceef00e");
1137  TestSHA3_256("7e8f1fd1882e4a7c49e674", "79bef78c78aa71e11a3375394c2562037cd0f82a033b48a6cc932cc43358fd9e");
1138  TestSHA3_256("5c56a6b18c39e66e1b7a993a", "b697556cb30d6df448ee38b973cb6942559de4c2567b1556240188c55ec0841c");
1139  TestSHA3_256("9c76ca5b6f8d1212d8e6896ad8", "69dfc3a25865f3535f18b4a7bd9c0c69d78455f1fc1f4bf4e29fc82bf32818ec");
1140  TestSHA3_256("687ff7485b7eb51fe208f6ff9a1b", "fe7e68ae3e1a91944e4d1d2146d9360e5333c099a256f3711edc372bc6eeb226");
1141  TestSHA3_256("4149f41be1d265e668c536b85dde41", "229a7702448c640f55dafed08a52aa0b1139657ba9fc4c5eb8587e174ecd9b92");
1142  TestSHA3_256("d83c721ee51b060c5a41438a8221e040", "b87d9e4722edd3918729ded9a6d03af8256998ee088a1ae662ef4bcaff142a96");
1143  TestSHA3_256("266e8cbd3e73d80df2a49cfdaf0dc39cd1", "6c2de3c95900a1bcec6bd4ca780056af4acf3aa36ee640474b6e870187f59361");
1144  TestSHA3_256("a1d7ce5104eb25d6131bb8f66e1fb13f3523", "ee9062f39720b821b88be5e64621d7e0ca026a9fe7248d78150b14bdbaa40bed");
1145  TestSHA3_256("d751ccd2cd65f27db539176920a70057a08a6b", "7aaca80dbeb8dc3677d18b84795985463650d72f2543e0ec709c9e70b8cd7b79");
1146  TestSHA3_256("b32dec58865ab74614ea982efb93c08d9acb1bb0", "6a12e535dbfddab6d374058d92338e760b1a211451a6c09be9b61ee22f3bb467");
1147  TestSHA3_256("4e0cc4f5c6dcf0e2efca1f9f129372e2dcbca57ea6", "d2b7717864e9438dd02a4f8bb0203b77e2d3cd8f8ffcf9dc684e63de5ef39f0d");
1148  TestSHA3_256("d16d978dfbaecf2c8a04090f6eebdb421a5a711137a6", "7f497913318defdc60c924b3704b65ada7ca3ba203f23fb918c6fb03d4b0c0da");
1149  TestSHA3_256("47249c7cb85d8f0242ab240efd164b9c8b0bd3104bba3b", "435e276f06ae73aa5d5d6018f58e0f009be351eada47b677c2f7c06455f384e7");
1150  TestSHA3_256("cf549a383c0ac31eae870c40867eeb94fa1b6f3cac4473f2", "cdfd1afa793e48fd0ee5b34dfc53fbcee43e9d2ac21515e4746475453ab3831f");
1151  TestSHA3_256("9b3fdf8d448680840d6284f2997d3af55ffd85f6f4b33d7f8d", "25005d10e84ff97c74a589013be42fb37f68db64bdfc7626efc0dd628077493a");
1152  TestSHA3_256("6b22fe94be2d0b2528d9847e127eb6c7d6967e7ec8b9660e77cc", "157a52b0477639b3bc179667b35c1cdfbb3eef845e4486f0f84a526e940b518c");
1153  TestSHA3_256("d8decafdad377904a2789551135e782e302aed8450a42cfb89600c", "3ddecf5bba51643cd77ebde2141c8545f862067b209990d4cb65bfa65f4fa0c0");
1154  TestSHA3_256("938fe6afdbf14d1229e03576e532f078898769e20620ae2164f5abfa", "9511abd13c756772b852114578ef9b96f9dc7d0f2b8dcde6ea7d1bd14c518890");
1155  TestSHA3_256("66eb5e7396f5b451a02f39699da4dbc50538fb10678ec39a5e28baa3c0", "540acf81810a199996a612e885781308802fe460e9c638cc022e17076be8597a");
1156  TestSHA3_256("de98968c8bd9408bd562ac6efbca2b10f5769aacaa01365763e1b2ce8048", "6b2f2547781449d4fa158180a178ef68d7056121bf8a2f2f49891afc24978521");
1157  TestSHA3_256("94464e8fafd82f630e6aab9aa339d981db0a372dc5c1efb177305995ae2dc0", "ea7952ad759653cd47a18004ac2dbb9cf4a1e7bba8a530cf070570c711a634ea");
1158  TestSHA3_256("c178ce0f720a6d73c6cf1caa905ee724d5ba941c2e2628136e3aad7d853733ba", "64537b87892835ff0963ef9ad5145ab4cfce5d303a0cb0415b3b03f9d16e7d6b");
1159  TestSHA3_256("14365d3301150d7c5ba6bb8c1fc26e9dab218fc5d01c9ed528b72482aadee9c27bef667907797d55514468f68791f053daa2df598d7db7d54beea493bdcbb0c75c7b36ad84b9996dca96354190bd96d9d7fbe8ff54ffaf77c55eb92985da50825ee3b4179f5ec88b6fa60bb361d0caf9493494fe4d28ef843f0f498a2a9331b82a", "9b690531dee948a9c559a2e0efab2ec824151a9175f2730a030b748d07cbaa7f");
1160  TestSHA3_256("4a757db93f6d4c6529211d70d5f8491799c0f73ae7f24bbd2138db2eaf2c63a85063b9f7adaa03fc348f275323248334e3ffdf9798859f9cf6693d29566ff7d50976c505ecb58e543c459b39acdf4ce4b5e80a682eaa7c1f1ce5fe4acb864ff91eb6892b23165735ea49626898b40ceeb78161f5d0ea4a103cb404d937f9d1dc362b", "1ac7cc7e2e8ea14fb1b90096f41265100712c5dd41519d78b2786cfb6355af72");
1161  TestSHA3_256("da11c39c77250f6264dda4b096341ff9c4cc2c900633b20ea1664bf32193f790a923112488f882450cf334819bbaca46ffb88eff0265aa803bc79ca42739e4347c6bff0bb9aa99780261ffe42be0d3b5135d03723338fb2776841a0b4bc26360f9ef769b34c2bec5ed2feb216e2fa30fa5c37430c0360ecbfba3af6fb6b8dedacbb95c", "c163cd43de224ac5c262ae39db746cfcad66074ebaec4a6da23d86b310520f21");
1162  TestSHA3_256("3341ca020d4835838b0d6c8f93aaaebb7af60730d208c85283f6369f1ee27fd96d38f2674f316ef9c29c1b6b42dd59ec5236f65f5845a401adceaa4cf5bbd91cac61c21102052634e99faedd6cdddcd4426b42b6a372f29a5a5f35f51ce580bb1845a3c7cfcd447d269e8caeb9b320bb731f53fe5c969a65b12f40603a685afed86bfe53", "6c3e93f2b49f493344cc3eb1e9454f79363032beee2f7ea65b3d994b5cae438f");
1163  TestSHA3_256("989fc49594afc73405bacee4dbbe7135804f800368de39e2ea3bbec04e59c6c52752927ee3aa233ba0d8aab5410240f4c109d770c8c570777c928fce9a0bec9bc5156c821e204f0f14a9ab547e0319d3e758ae9e28eb2dbc3d9f7acf51bd52f41bf23aeb6d97b5780a35ba08b94965989744edd3b1d6d67ad26c68099af85f98d0f0e4fff9", "b10adeb6a9395a48788931d45a7b4e4f69300a76d8b716c40c614c3113a0f051");
1164  TestSHA3_256("e5022f4c7dfe2dbd207105e2f27aaedd5a765c27c0bc60de958b49609440501848ccf398cf66dfe8dd7d131e04f1432f32827a057b8904d218e68ba3b0398038d755bd13d5f168cfa8a11ab34c0540873940c2a62eace3552dcd6953c683fdb29983d4e417078f1988c560c9521e6f8c78997c32618fc510db282a985f868f2d973f82351d11", "3293a4b9aeb8a65e1014d3847500ffc8241594e9c4564cbd7ce978bfa50767fe");
1165  TestSHA3_256("b1f6076509938432145bb15dbe1a7b2e007934be5f753908b50fd24333455970a7429f2ffbd28bd6fe1804c4688311f318fe3fcd9f6744410243e115bcb00d7e039a4fee4c326c2d119c42abd2e8f4155a44472643704cc0bc72403b8a8ab0fd4d68e04a059d6e5ed45033b906326abb4eb4147052779bad6a03b55ca5bd8b140e131bed2dfada", "f82d9602b231d332d902cb6436b15aef89acc591cb8626233ced20c0a6e80d7a");
1166  TestSHA3_256("56ea14d7fcb0db748ff649aaa5d0afdc2357528a9aad6076d73b2805b53d89e73681abfad26bee6c0f3d20215295f354f538ae80990d2281be6de0f6919aa9eb048c26b524f4d91ca87b54c0c54aa9b54ad02171e8bf31e8d158a9f586e92ffce994ecce9a5185cc80364d50a6f7b94849a914242fcb73f33a86ecc83c3403630d20650ddb8cd9c4", "4beae3515ba35ec8cbd1d94567e22b0d7809c466abfbafe9610349597ba15b45");
1167 
1168  // SHA3-256 Long test vectors (SHA3_256LongMsg.rsp)
1169  TestSHA3_256("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", "cb5648a1d61c6c5bdacd96f81c9591debc3950dcf658145b8d996570ba881a05");
1170  TestSHA3_256("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", "095dcd0bc55206d2e1e715fb7173fc16a81979f278495dfc69a6d8f3174eba5a");
1171  TestSHA3_256("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", "cb1c691c87244c0caf733aacd427f83412cd48820b358c1b15dd9fadee54e5af");
1172  TestSHA3_256("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", "5ac9275e02543410359a3f364b2ae3b85763321fd6d374d13fe54314e5561b01");
1173  TestSHA3_256("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", "68f62c418a6b97026cc70f6abf8419b671ee373709fa13074e37bd39f0a50fcb");
1174  TestSHA3_256("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", "7d495ddf961cbff060f80b509f2b9e20bed95319eef61c7adb5edeec18e64713");
1175  TestSHA3_256("c8a2a26587d0126abe9ba8031f37d8a7d18219c41fe639bc7281f32d7c83c376b7d8f9770e080d98d95b320c0f402d57b7ef680da04e42dd5211aacf4426ecca5050ca596312cfae79cee0e8c92e14913cc3c66b24ece86c2bfa99078991faad7b513e94f0b601b7853ddb1eb3c9345f47445a651389d070e482ea5db48d962820257daf1cbe4bb8e5f04a3637d836c8c1bc4d83d6eda5f165f2c2592be268412712ae324ef054bb812f56b8bc25c1d59071c64dd3e00df896924c84575817027861faa5f016c5c74142272daa767e8c9dacee4c732ab08b5fa9ad65a0b74c73fb5a889169f645e50d70e41d689415f7d0b4ec071e9238b5a88110856fc6ae9b9944817e21597d1ccd03b60e60472d1e11d3e9063de24a7b59609b6a2a4ee68238690cf2800614746941c48af9566e07494f0dd236e091e75a8f769e3b179b30c10f5277eec7b3f5c97337189b8b82bc5e717ff27355b2009356caa908e976ae1d7f7a94d36202a8d5e03641aeac0e453a8168ee5a0858ceecfcbf11fb8c1f033201add297a0a89476d2ea8b9a82bda8c3c7ef4f55c3295a4ecb7c607ac73d37eadc13b7a2494ec1928f7a80c8d534efe38a3d9ccb4ccdab9f092a1def6478532c5ad3cd5c259b3812600fa89e6d1e228114795d246cedc9c9fff0d1c1297a5ddfc1169c2efb3800df8dd18a8511214785abcc1bc7eb31bdb2f5f70358dfe860ed5a03ab7e95cc21df5ee7aee68be568d6985e5c1e91408e4432663b1c4e6d613d6dc382b5b900a4fc1b7a9c27a1138c5e2356ab9026c34465006602753daf6ab7427da93c307c901d0bb1ddb21c53bc0493dd8d857161e8ffa51fdecb75568243205aa979c2e7ed2a77b5f8edc34cffb0321a8c653bc381f96ab85a86bf0bb2c9518208d636eac40aa7ad754260a75d4a46362f994c90173b975afb0ee17601311b1c51ba562c1ca7e3c2dd18b90bdebb1858fe876c71b3ad742c4bcba33e7763c750098de856fde8731cb6d698218be9f0a98298630e5b374957d126cf0b1c489c48bab6b50f6fb59ee28be6c3916bbd16514234f80e1ac15d0215852b87f9c6e429eb9f85007bf6ae3de1af0202861fd177c7c4f51af533f956a051815815c6e51e25af20d02893e95442991f1de5f86a4397ae20d9f675657bf9f397267831e94cef4e4d287f759850350ce0898f2e29de3c5c41f4246fe998a8d1359a2bed36ded1e4d6b08682025843700fee8cab56703e342212870acdd53655255b35e414fa53d9810f47a37195f22d72f6e555392023a08adc282c585b2ae62e129efccdc9fe9617eecac12b2ecdabd247a1161a17750740f90ebed3520ceb17676f1fa87259815ff415c2794c5953f689c8d5407dbbd10d1241a986e265cea901af34ec1ded0323ca3290a317208ba865637af4797e65b9cfcad3b931bbf6ac896623e2f4408529172911f1b6a9bcae8279ec7e33452d0cd7b026b46a99cbe8a69cd4d21cdc6d3a84002fab527c4fd18a121526d49890ced3fb89beb384b524015a2e03c049241eb9", "b8d4b29b086ef6d6f73802b9e7a4f2001e384c8258e7046e6779662fd958517e");
1176  TestSHA3_256("3a86a182b54704a3af811e3e660abcfbaef2fb8f39bab09115c1068976ff694bb6f5a3839ae44590d73e4996d45af5ceb26b03218ab3fef6f5f4ef48d22839fb4371c270f9535357b22142c4ffb54e854b64cab41932fe888d41ca702e908c63eae244715bfbf69f481250f16f848dc881c6996e6f9d76f0e491de2c129f2a2ab22e72b04644f610a2fabc45aa2d7b3e5d77b87a135d2fd502ca74a207bddaf9a43e945245961a53c7bfcfe73a1ae090e6606ffe8ddbf1e0f0d6d4fa94526578c6faf282dd592b10bf4bce00a7b1846625690623667e83b9b59b465d42c6944e224ad36698f5f2ee938404b7775c2e66207bc41025adaf07590312f398812d24c0178126fdd334964a54b8353482a83be17cf2ee52d23b72e5f57fe31eebf8a1a64742eb9459bcb0eca231a1658ab88b7056d8e47554f0a46058d6565c6cbf6edec45fdde6f051e38255b82493de27ffd3efbe1b179b9642d2166073db6d4832707420237a00bad7125795e645e5bc3e1431ecbabf0ff5f74416626322545c966241cce6d8f2c035a78f100e030741f13b02a9eaf618d468bc40274db98bc342be12ad4d892c2ba546e571c556ac7cbf4e4c3fd3431efd40457cf65a297845dd8cce09811418c3cef941ff32c43c375157f6f49c2e893625e4b216b1f985aa0fd25f29a9011d4f59c78b037ed71f384e5de8116e3fc148c0a3cad07cb119b9829aac55eed9a299edb9abc5d017be485f690add70ff2efbb889ac6ce0da9b3bdbeb9dd47823116733d58a8d510b7f2e2c8244a2cbf53816b59e413207fb75f9c5ce1af06e67d182d3250ea3283bcbb45cb07ea6a6aa486361eb6f69199c0eb8e6490beff82e4ab274b1204e7f2f0ba097fba0332aa4c4a861771f5b3d45ce43e667581a40fee4bebe7fa9d87b70a5bb876c928f7e6d16ae604b3a4e9c7f1d616e2deab96b6207705b9a8f87468503cdd20a3c02cc8da43d046da68b5ed163d926a5a714a4df1b8ef007bca408f68b9e20de86d6398ad81df5e74d5aaac40874b5d6787211ff88e128cf1676e84ca7f51aee5951efee1915dcc11502a8df74fac4c8451dda49b631a8fb87470f0ebe9b67449bbd1640ceee6101e8cd82aa1033fa84f75b28450e461b93f65da5c43759b0e83660d50961702bb1ad015dad42e600117475237cf6e7279d4a02d1f67cf59de0108355d03963e3d84ce7647173dd7d77a6b3f275d7de74236d7bbb2df437d536136dbe1dbe8f307facc7bc7d0cde1abf745cbeb81af1ab2c46138cf007e901f22668377958bcbbadb7e9905973b27ff0c5baaece25e974c1bd116cc81dd1c81a30bae86a6fb12c6a5494068e122153128313eb3e628d76e9babc823c9eb9d3b81bacfa7a6b372abe6b1246a350f23e2e95b09c9037a75aac255ef7d4f267cad3ce869531b4165db2e5a9792094efea4ae3d9ea4d0efdc712e63df21882a353743190e016b2166e4da8a2c78e48defc7155d5fdfc4e596624e6a19c91b43719a22c1204b1cefe05989d455773d3881fa8d3eefc255f81dfe90bd41dc6f1e9c265a753298a6e98c999acd9525a9db5f9f9456a0f51a93dd9693e1d9c3fa283f7c58a9c752afcaa635abea8dfc80e2c326b939260069457fdad68c341852dcb5fcbbd351318defd7ae3b9f827478eb77306a5ae14cf8895f2bc6f0f361ffc8aa37e286629dc7e59b73a8712525e851c64d363065631edc1609f3d49a09575876a", "b71ec00c0fcc4f8663312711540df1cd236eb52f237409415b749ff9436dc331");
1177  TestSHA3_256("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", "ad635385a289163fbaf04b5850285bfe3759774aee7fd0211d770f63985e1b44");
1178  TestSHA3_256("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", "2a6283b1c02c6aaf74c4155091ff54a904bb700077f96a9c4bd84e8e51b54d01");
1179  TestSHA3_256("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", "4e75bf3c580474575c96ec7faa03feb732379f95660b77149974133644f5d2a0");
1180  TestSHA3_256("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", "2e07737d271b9a0162eb2f4be1be54887118c462317eb6bd9f9baf1e24111848");
1181  TestSHA3_256("119a356f8c0790bbd5e9f3b4c5c4a70e97f462364c88cad04d5435645342b35484e94e12df61908fd95546f74859849b817ee92fbd242435c210b7b9bfbffb3f77f965faa1a9073e8feb5a380f673add8fde32208402fa680c8b3e41d187a15131f1028f9d86feaf3fd4b6e0e094d2ba0839c67267c9535173ec51645343ad74fcfaae389aa17cca3137e2588488531c36ba2b8e2f2238d8415c798a0b9a258f1e3cef605fa18977ad3d6707c3ecc5ea5f86ebdaa4b4b0e5bc023d1bc335138ae0de506cb52f2d9efa0ecc546468310cccc88ec08d28c3602e07257f41bb7e4d8a0956c564f3712761d199a931a39e69c5a69aa7b3257931dd92b91e4ed56fbf64e48bd334945cfa2aaf576df04614eb914899f7df54db4012cc8261b12bedcab69876feedbbf7009dcf8d076af89b797ad71217d75cf07514dc07ae34640055c74c9faf560f491f015ac3e167623cfbc67b8e7163e7c1b92debd06e9d28b049e0298f4c38395a40a0778162af2cfe5abe5b946c4d9a54f2a321660ab521068c4957cd3f5be0324cc04f50f209fdea7caaa0ac705c1fb30abfa550e844f509074afde1ee87adda29aa09b7f93e7d064ad2715ee5571ee6e7c9a01672124cc2a22b4354c3844759c1a6ce3fdf17555cac7df73334073ef3730939410fe6cf37463352ad241958b7fafbc66e0d592df48bf55ab2c33428e494c6995826892572d9ab52747b1085fcbef318cfe9cfacd4cd80c164fba584c1344ae7e321c4f77b44db6b322f2f7831f4d4ede7dc407b065c6754cf4424f9903adb4c6b675ded58700bc36da83fd95e84e76c404f7342921ef23d7d07772f5b8ec2f077601cae13448385b04e074f895574be61a831a87efd68a1f6aa67cf291847fa8f74cbe3b4a78ad780895183bc51c30ad2514255d4e013abc097bc8103c0b1933b0b303341836ae167c1e31dfe5f1b791cb06ef29cae398065343eecf06e4ae2048d1547c4bf69ccec5e86c45867c633c62f7d27dc51234b6debb5b9f80a5810716240c64443d0c098c80220d0520a5f5834369b9eb019325e23e88f237c24440bf27959caf7e7e4f1671fda710630255a2962f7e9b3625dc243a0177aacf6a758a68aa85dc3f56181a4a59a406c7fae5575c9e2c64248f520b5a5f904821661e2e43a5a058f445fd0e55b07476c4122d18033053b45112201e0bfdcc9e7cb9931155018ca431a0564930aca8defbca954b2680753a4060bec2cb668d2c15e77cba29589b5c7c07bc7177a8b1adb3a6968732f9213476fd96901514626fa17243af1d156cd037eea81d773f1f71a018d942b524b851794b300c7591ecd783ec8066ccb261bdf9b7a183dbda42b92593b614297dcb0fabcc23ae69797d0251b8ab57a4da2a544615216b01f4dbe2d8c9b5520c7ed9cd9312e9ec6d05a36e7f693d1821d727518169b03976394b9d1e1d7fa2daa25529d391eb5d0cf0f07a8160be2ee043d9345037c655c4f2023689f14d8d2072dd92c1dba056a5b5d4c4fc4196e25caab05b1701ec666ac9a04d90f7d7575a7ac3970252c18fd3bec0cc448e5ff8f3765d546a4a8ad1d41a9640c79375b80534b7b50989976f238654fefea981c9413130beae943a3e9d8f64ce9256d1259d1b2a6b3c02ca5af1a701db8f25a4e9c255dad8785172f323728c3585a45206ae988c283e30a2f9ea9b47f07a7521b0f36e9c504c14bd96027e8d24161e70f196576d8a74a5e9c26acda7cc452a90e550e625a49e50829db70de808c827c67d00c23ee073d4e72aeed891dd73b86acd6756e753e3975a80cdab1d521052caef6a5380f8b03023ba0326a6928aa127ffb33b51dcb05bbdd592d0ad9e8321e6ef2f95c401be6a37e634425689fe7750e2a0fe05ad89001502b309095ca517b2e2ed0388b9f2c59c45feb61222539d6e1ccd397344d23708aebacec10ada96a7711f173f7ff1e4b94fceec6a0a0ea5d814a4581b412063012ff6ac5527b8314d00326b68c2304a276a217fde9fa4034750a2e47e10f816870d12fc4641a27a1c16c35a953f32685f2b92cae0519848045765591c42ddc402dc7c6914d74dd38d2b5e7f35358cb1d91a9f681fde7fd6c7af5840663525ee1d04bf6d3156fed018c44043d95383d92dada3d1cd84af51d9bee814ec8675073e1c48632c5f59e257682542e1f7dc20b56b5c92a9e2cb2be30cb1512fb55fa1de99a3f5864ed3acc19d79e6ffb0da3b08ba0615157747d75c1f308fa0202a4086f34e9eafa3e071dfbacaca731d228aa0304cf390c0a9e6ad7ce22ade758965cfbfc4c9390d24e41a667447fc7b29821464ad98bc5d65dc7f9c42bd4b23e174015592ff92c905660a2722f9fc7973d3cdad848ef88bf02b1b03dea16699b71dc46b35bc4d96069a0753335ae38685d244918e30c5fb0d45283a1281c1659ea591573999d9c2acd2ca9141d55230d41011b70748b518e1cd2fa58ad8dc05fcbdf0bffaf2c7fd6cb2ac67bb13b8f6d31fad64ac113664223599dca411270955c95aec06518894dabc352d2b70984727437040d944da7b42e0ef560ac532de3e4a4891e8509c275b51ed780f8660b0354e12c21b3e11bcc88198980b5f7ff31ad342182d5a933373164dced3cfb2a081720d7eee676cb7378a3e19326a7ee67fd6c00521f9de37c66bcea814b6feb6a061b8cdcf7b4bd8f45d48602c5", "c26d0b064e409df64819cd7c1a3b8076f19815b9823adac4e3ce0b4d3a29de18");
1182  TestSHA3_256("72c57c359e10684d0517e46653a02d18d29eff803eb009e4d5eb9e95add9ad1a4ac1f38a70296f3a369a16985ca3c957de2084cdc9bdd8994eb59b8815e0debad4ec1f001feac089820db8becdaf896aaf95721e8674e5d476b43bd2b873a7d135cd685f545b438210f9319e4dcd55986c85303c1ddf18dc746fe63a409df0a998ed376eb683e16c09e6e9018504152b3e7628ef350659fb716e058a5263a18823d2f2f6ee6a8091945a48ae1c5cb1694cf2c1fe76ef9177953afe8899cfa2b7fe0603bfa3180937dadfb66fbbdd119bbf8063338aa4a699075a3bfdbae8db7e5211d0917e9665a702fc9b0a0a901d08bea97654162d82a9f05622b060b634244779c33427eb7a29353a5f48b07cbefa72f3622ac5900bef77b71d6b314296f304c8426f451f32049b1f6af156a9dab702e8907d3cd72bb2c50493f4d593e731b285b70c803b74825b3524cda3205a8897106615260ac93c01c5ec14f5b11127783989d1824527e99e04f6a340e827b559f24db9292fcdd354838f9339a5fa1d7f6b2087f04835828b13463dd40927866f16ae33ed501ec0e6c4e63948768c5aeea3e4f6754985954bea7d61088c44430204ef491b74a64bde1358cecb2cad28ee6a3de5b752ff6a051104d88478653339457ac45ba44cbb65f54d1969d047cda746931d5e6a8b48e211416aefd5729f3d60b56b54e7f85aa2f42de3cb69419240c24e67139a11790a709edef2ac52cf35dd0a08af45926ebe9761f498ff83bfe263d6897ee97943a4b982fe3404ef0b4a45e06113c60340e0664f14799bf59cb4b3934b465fabefd87155905ee5309ba41e9e402973311831ea600b16437f71df39ee77130490c4d0227e5d1757fdc66af3ae6b9953053ed9aafca0160209858a7d4dd38fe10e0cb153672d08633ed6c54977aa0a6e67f9ff2f8c9d22dd7b21de08192960fd0e0da68d77c8d810db11dcaa61c725cd4092cbff76c8e1debd8d0361bb3f2e607911d45716f53067bdc0d89dd4889177765166a424e9fc0cb711201099dda213355e6639ac7eb86eca2ae0ab38b7f674f37ef8a6fcca1a6f52f55d9e1dcd631d2c3c82bba129172feb991d5af51afecd9d61a88b6832e4107480e392aed61a8644f551665ebff6b20953b635737a4f895e429fddcfe801f606fbda74b3bf6f5767d0fac14907fcfd0aa1d4c11b9e91b01d68052399b51a29f1ae6acd965109977c14a555cbcbd21ad8cb9f8853506d4bc21c01e62d61d7b21be1b923be54914e6b0a7ca84dd11f1159193e1184568a6134a6bbadf5b4df986edcf2019390ae841cfaa44435e28ce877d3dae4177992fa5d4e5c005876dbe3d1e63bec7dcc0942762b48b1ecc6c1a918409a8a72812a1e245c0c67be6e729c2b49bc6ee4d24a8f63e78e75db45655c26a9a78aff36fcd67117f26b8f654dca664b9f0e30681874cb749e1a692720078856286c2560b0292cc837933423147569350955c9571bf8941ba128fd339cb4268f46b94bc6ee203eb7026813706ea51c4f24c91866fc23a724bf2501327e6ae89c29f8db315dc28d2c7c719514036367e018f4835f63fdecd71f9bdced7132b6c4f8b13c69a517026fcd3622d67cb632320d5e7308f78f4b7cea11f6291b137851dc6cd6366f2785c71c3f237f81a7658b2a8d512b61e0ad5a4710b7b124151689fcb2116063fbff7e9115fed7b93de834970b838e49f8f8ba5f1f874c354078b5810a55ae289a56da563f1da6cd80a3757d6073fa55e016e45ac6cec1f69d871c92fd0ae9670c74249045e6b464787f9504128736309fed205f8df4d90e332908581298d9c75a3fa36ab0c3c9272e62de53ab290c803d67b696fd615c260a47bffad16746f18ba1a10a061bacbea9369693b3c042eec36bed289d7d12e52bca8aa1c2dff88ca7816498d25626d0f1e106ebb0b4a12138e00f3df5b1c2f49d98b1756e69b641b7c6353d99dbff050f4d76842c6cf1c2a4b062fc8e6336fa689b7c9d5c6b4ab8c15a5c20e514ff070a602d85ae52fa7810c22f8eeffd34a095b93342144f7a98d024216b3d68ed7bea047517bfcd83ec83febd1ba0e5858e2bdc1d8b1f7b0f89e90ccc432a3f930cb8209462e64556c5054c56ca2a85f16b32eb83a10459d13516faa4d23302b7607b9bd38dab2239ac9e9440c314433fdfb3ceadab4b4f87415ed6f240e017221f3b5f7ac196cdf54957bec42fe6893994b46de3d27dc7fb58ca88feb5b9e79cf20053d12530ac524337b22a3629bea52f40b06d3e2128f32060f9105847daed81d35f20e2002817434659baff64494c5b5c7f9216bfda38412a0f70511159dc73bb6bae1f8eaa0ef08d99bcb31f94f6be12c29c83df45926430b366c99fca3270c15fc4056398fdf3135b7779e3066a006961d1ac0ad1c83179ce39e87a96b722ec23aabc065badf3e188347a360772ca6a447abac7e6a44f0d4632d52926332e44a0a86bff5ce699fd063bdda3ffd4c41b53ded49fecec67f40599b934e16e3fd1bc063ad7026f8d71bfd4cbaf56599586774723194b692036f1b6bb242e2ffb9c600b5215b412764599476ce475c9e5b396fbcebd6be323dcf4d0048077400aac7500db41dc95fc7f7edbe7c9c2ec5ea89943fe13b42217eef530bbd023671509e12dfce4e1c1c82955d965e6a68aa66f6967dba48feda572db1f099d9a6dc4bc8edade852b5e824a06890dc48a6a6510ecaf8cf7620d757290e3166d431abecc624fa9ac2234d2eb783308ead45544910c633a94964b2ef5fbc409cb8835ac4147d384e12e0a5e13951f7de0ee13eafcb0ca0c04946d7804040c0a3cd088352424b097adb7aad1ca4495952f3e6c0158c02d2bcec33bfda69301434a84d9027ce02c0b9725dad118", "d894b86261436362e64241e61f6b3e6589daf64dc641f60570c4c0bf3b1f2ca3");
1183 }
1184 
1185 static MuHash3072 FromInt(unsigned char i) {
1186  unsigned char tmp[32] = {i, 0};
1187  return MuHash3072(tmp);
1188 }
1189 
1191 {
1192  uint256 out;
1193 
1194  for (int iter = 0; iter < 10; ++iter) {
1195  uint256 res;
1196  int table[4];
1197  for (int i = 0; i < 4; ++i) {
1198  table[i] = g_insecure_rand_ctx.randbits(3);
1199  }
1200  for (int order = 0; order < 4; ++order) {
1201  MuHash3072 acc;
1202  for (int i = 0; i < 4; ++i) {
1203  int t = table[i ^ order];
1204  if (t & 4) {
1205  acc /= FromInt(t & 3);
1206  } else {
1207  acc *= FromInt(t & 3);
1208  }
1209  }
1210  acc.Finalize(out);
1211  if (order == 0) {
1212  res = out;
1213  } else {
1214  BOOST_CHECK(res == out);
1215  }
1216  }
1217 
1219  MuHash3072 y = FromInt(g_insecure_rand_ctx.randbits(4)); // x=X, y=Y
1220  MuHash3072 z; // x=X, y=Y, z=1
1221  z *= x; // x=X, y=Y, z=X
1222  z *= y; // x=X, y=Y, z=X*Y
1223  y *= x; // x=X, y=Y*X, z=X*Y
1224  z /= y; // x=X, y=Y*X, z=1
1225  z.Finalize(out);
1226 
1227  uint256 out2;
1228  MuHash3072 a;
1229  a.Finalize(out2);
1230 
1231  BOOST_CHECK_EQUAL(out, out2);
1232  }
1233 
1234  MuHash3072 acc = FromInt(0);
1235  acc *= FromInt(1);
1236  acc /= FromInt(2);
1237  acc.Finalize(out);
1238  BOOST_CHECK_EQUAL(out, uint256S("10d312b100cbd32ada024a6646e40d3482fcff103668d2625f10002a607d5863"));
1239 
1240  MuHash3072 acc2 = FromInt(0);
1241  unsigned char tmp[32] = {1, 0};
1242  acc2.Insert(tmp);
1243  unsigned char tmp2[32] = {2, 0};
1244  acc2.Remove(tmp2);
1245  acc2.Finalize(out);
1246  BOOST_CHECK_EQUAL(out, uint256S("10d312b100cbd32ada024a6646e40d3482fcff103668d2625f10002a607d5863"));
1247 
1248  // Test MuHash3072 serialization
1249  MuHash3072 serchk = FromInt(1); serchk *= FromInt(2);
1250  std::string ser_exp = "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";
1251  DataStream ss_chk{};
1252  ss_chk << serchk;
1253  BOOST_CHECK_EQUAL(ser_exp, HexStr(ss_chk.str()));
1254 
1255  // Test MuHash3072 deserialization
1256  MuHash3072 deserchk;
1257  ss_chk >> deserchk;
1258  uint256 out3;
1259  serchk.Finalize(out);
1260  deserchk.Finalize(out3);
1262 
1263  // Test MuHash3072 overflow, meaning the internal data is larger than the modulus.
1264  DataStream ss_max{ParseHex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")};
1265  MuHash3072 overflowchk;
1266  ss_max >> overflowchk;
1267 
1268  uint256 out4;
1269  overflowchk.Finalize(out4);
1270  BOOST_CHECK_EQUAL(HexStr(out4), "3a31e6903aff0de9f62f9a9f7f8b861de76ce2cda09822b90014319ae5dc2271");
1271 }
1272 
static const int AES_BLOCKSIZE
Definition: aes.h:14
int ret
The AEAD_CHACHA20_POLY1305 authenticated encryption algorithm from RFC8439 section 2....
void Encrypt(Span< const std::byte > plain, Span< const std::byte > aad, Nonce96 nonce, Span< std::byte > cipher) noexcept
Encrypt a message with a specified 96-bit nonce and aad.
static constexpr unsigned EXPANSION
Expansion when encrypting.
void Keystream(Nonce96 nonce, Span< std::byte > keystream) noexcept
Get a number of keystream bytes from the underlying stream cipher.
int Decrypt(const unsigned char *data, int size, unsigned char *out) const
Definition: aes.cpp:144
int Encrypt(const unsigned char *data, int size, unsigned char *out) const
Definition: aes.cpp:127
A decryption class for AES-256.
Definition: aes.h:31
void Decrypt(unsigned char plaintext[16], const unsigned char ciphertext[16]) const
Definition: aes.cpp:38
An encryption class for AES-256.
Definition: aes.h:19
void Encrypt(unsigned char ciphertext[16], const unsigned char plaintext[16]) const
Definition: aes.cpp:23
A rfc5869 HKDF implementation with HMAC_SHA256 and fixed key output length of 32 bytes (L=32)
void Expand32(const std::string &info, unsigned char hash[OUTPUT_SIZE])
A hasher class for HMAC-SHA-256.
Definition: hmac_sha256.h:15
A hasher class for HMAC-SHA-512.
Definition: hmac_sha512.h:15
A hasher class for Bitcoin's 256-bit hash (double SHA-256).
Definition: hash.h:24
CHash256 & Write(Span< const unsigned char > input)
Definition: hash.h:37
A hasher class for RIPEMD-160.
Definition: ripemd160.h:13
A hasher class for SHA1.
Definition: sha1.h:13
A hasher class for SHA-256.
Definition: sha256.h:14
void Finalize(unsigned char hash[OUTPUT_SIZE])
Definition: sha256.cpp:728
CSHA256 & Write(const unsigned char *data, size_t len)
Definition: sha256.cpp:702
A hasher class for SHA-512.
Definition: sha512.h:13
Unrestricted ChaCha20 cipher.
Definition: chacha20.h:78
void Crypt(Span< const std::byte > in_bytes, Span< std::byte > out_bytes) noexcept
en/deciphers the message <in_bytes> and write the result into <out_bytes>
Definition: chacha20.cpp:303
void Keystream(Span< std::byte > out) noexcept
outputs the keystream to out.
Definition: chacha20.cpp:282
void Seek(Nonce96 nonce, uint32_t block_counter) noexcept
Set the 96-bit nonce and 32-bit block counter.
Definition: chacha20.h:104
ChaCha20Aligned::Nonce96 Nonce96
96-bit nonce type.
Definition: chacha20.h:101
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:147
Forward-secure ChaCha20.
Definition: chacha20.h:128
static constexpr unsigned KEYLEN
Length of keys expected by the constructor.
Definition: chacha20.h:144
Forward-secure wrapper around AEADChaCha20Poly1305.
bool Decrypt(Span< const std::byte > cipher, Span< const std::byte > aad, Span< std::byte > plain) noexcept
Decrypt a message with a specified aad.
static constexpr auto EXPANSION
Expansion when encrypting.
void Encrypt(Span< const std::byte > plain, Span< const std::byte > aad, Span< std::byte > cipher) noexcept
Encrypt a message with a specified aad.
uint64_t randbits(int bits) noexcept
Generate a random (bits)-bit integer.
Definition: random.h:185
A class representing MuHash sets.
Definition: muhash.h:91
void Finalize(uint256 &out) noexcept
Definition: muhash.cpp:314
MuHash3072 & Remove(Span< const unsigned char > in) noexcept
Definition: muhash.cpp:344
MuHash3072 & Insert(Span< const unsigned char > in) noexcept
Definition: muhash.cpp:339
C++ wrapper with std::byte Span interface around poly1305_donna code.
Definition: poly1305.h:38
Poly1305 & Update(Span< const std::byte > msg) noexcept
Process message bytes.
Definition: poly1305.h:56
void Finalize(Span< std::byte > out) noexcept
Write authentication tag to 16-byte out.
Definition: poly1305.h:63
static constexpr unsigned TAGLEN
Length of the output produced by Finalize().
Definition: poly1305.h:43
Definition: sha3.h:17
SHA3_256 & Write(Span< const unsigned char > data)
Definition: sha3.cpp:106
SHA3_256 & Reset()
Definition: sha3.cpp:150
SHA3_256 & Finalize(Span< unsigned char > output)
Definition: sha3.cpp:136
static constexpr size_t OUTPUT_SIZE
Definition: sha3.h:33
A Span is an object that can refer to a contiguous sequence of objects.
Definition: span.h:98
CONSTEXPR_IF_NOT_DEBUG Span< C > last(std::size_t count) const noexcept
Definition: span.h:210
CONSTEXPR_IF_NOT_DEBUG Span< C > first(std::size_t count) const noexcept
Definition: span.h:205
CONSTEXPR_IF_NOT_DEBUG Span< C > subspan(std::size_t offset) const noexcept
Definition: span.h:195
256-bit opaque blob.
Definition: uint256.h:106
static void WriteLE64(unsigned char *ptr, uint64_t x)
Definition: common.h:46
static void TestSHA512(const std::string &in, const std::string &hexout)
static void TestChaCha20(const std::string &hex_message, const std::string &hexkey, ChaCha20::Nonce96 nonce, uint32_t seek, const std::string &hexout)
static void TestHMACSHA256(const std::string &hexkey, const std::string &hexin, const std::string &hexout)
static void TestFSChaCha20(const std::string &hex_plaintext, const std::string &hexkey, uint32_t rekey_interval, const std::string &ciphertext_after_rotation)
const std::string test1
static void TestAES256CBC(const std::string &hexkey, const std::string &hexiv, bool pad, const std::string &hexin, const std::string &hexout)
static void TestVector(const Hasher &h, const In &in, const Out &out)
static void TestFSChaCha20Poly1305(const std::string &plain_hex, const std::string &aad_hex, const std::string &key_hex, uint64_t msg_idx, const std::string &cipher_hex)
static void TestAES256(const std::string &hexkey, const std::string &hexin, const std::string &hexout)
static void TestSHA1(const std::string &in, const std::string &hexout)
static MuHash3072 FromInt(unsigned char i)
static void TestHMACSHA512(const std::string &hexkey, const std::string &hexin, const std::string &hexout)
static void TestHKDF_SHA256_32(const std::string &ikm_hex, const std::string &salt_hex, const std::string &info_hex, const std::string &okm_check_hex)
static void TestSHA3_256(const std::string &input, const std::string &output)
static std::string LongTestString()
static void TestPoly1305(const std::string &hexmessage, const std::string &hexkey, const std::string &hextag)
static void TestRIPEMD160(const std::string &in, const std::string &hexout)
BOOST_AUTO_TEST_CASE(ripemd160_testvectors)
static void TestSHA256(const std::string &in, const std::string &hexout)
static void TestChaCha20Poly1305(const std::string &plain_hex, const std::string &aad_hex, const std::string &key_hex, ChaCha20::Nonce96 nonce, const std::string &cipher_hex)
BOOST_AUTO_TEST_SUITE_END()
unsigned int nonce
Definition: miner_tests.cpp:71
#define BOOST_CHECK_EQUAL(v1, v2)
Definition: object.cpp:18
#define BOOST_CHECK(expr)
Definition: object.cpp:17
const char * prefix
Definition: rest.cpp:1007
void SHA256D64(unsigned char *out, const unsigned char *in, size_t blocks)
Compute multiple double-SHA256's of 64-byte blobs.
Definition: sha256.cpp:752
void KeccakF(uint64_t(&st)[25])
The Keccak-f[1600] transform.
Definition: sha3.cpp:18
std::vector< Byte > ParseHex(std::string_view hex_str)
Like TryParseHex, but returns an empty vector on invalid input.
Definition: strencodings.h:65
Basic testing setup.
Definition: setup_common.h:52
FastRandomContext g_insecure_rand_ctx
This global and the helpers that use it are not thread-safe.
Definition: random.cpp:14
static uint64_t InsecureRandRange(uint64_t range)
Definition: random.h:60
static uint64_t InsecureRandBits(int bits)
Definition: random.h:55
uint256 uint256S(const char *str)
Definition: uint256.h:119
std::string HexStr(const Span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
assert(!tx.IsCoinBase())