1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/quic/crypto/chacha20_poly1305_decrypter.h"
7 #include "net/quic/test_tools/quic_test_utils.h"
9 using base::StringPiece
;
14 // The test vectors come from draft-agl-tls-chacha20poly1305-04 Section 7.
16 // Each test vector consists of six strings of lowercase hexadecimal digits.
17 // The strings may be empty (zero length). A test vector with a NULL |key|
18 // marks the end of an array of test vectors.
27 const char* pt
; // An empty string "" means decryption succeeded and
28 // the plaintext is zero-length. NULL means decryption
32 const TestVector test_vectors
[] = {
33 { "4290bcb154173531f314af57f3be3b5006da371ece272afa1b5dbdd110"
36 "87e229d4500845a079c0",
37 "e3e446f7ede9a19b62a4677dabf4e3d24b876bb28475", // "3896e1d6" truncated.
38 "86d09974840bded2a5ca"
40 // Modify the ciphertext (ChaCha20 encryption output).
41 { "4290bcb154173531f314af57f3be3b5006da371ece272afa1b5dbdd110"
44 "87e229d4500845a079c0",
45 "f3e446f7ede9a19b62a4677dabf4e3d24b876bb28475", // "3896e1d6" truncated.
48 // Modify the ciphertext (Poly1305 authenticator).
49 { "4290bcb154173531f314af57f3be3b5006da371ece272afa1b5dbdd110"
52 "87e229d4500845a079c0",
53 "e3e446f7ede9a19b62a4677dabf4e3d24b876bb28476", // "3896e1d6" truncated.
56 // Modify the associated data.
57 { "4290bcb154173531f314af57f3be3b5006da371ece272afa1b5dbdd110"
60 "87e229d4500845a079c0",
61 "e3e446f7ede9a19b62a4677dabf4e3d24b876bb28475", // "3896e1d6" truncated.
72 // DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing
73 // in an nonce and also to allocate the buffer needed for the plaintext.
74 QuicData
* DecryptWithNonce(ChaCha20Poly1305Decrypter
* decrypter
,
76 StringPiece associated_data
,
77 StringPiece ciphertext
) {
78 QuicPacketNumber packet_number
;
79 StringPiece
nonce_prefix(nonce
.data(), nonce
.size() - sizeof(packet_number
));
80 decrypter
->SetNoncePrefix(nonce_prefix
);
81 memcpy(&packet_number
, nonce
.data() + nonce_prefix
.size(),
82 sizeof(packet_number
));
83 scoped_ptr
<char[]> output(new char[ciphertext
.length()]);
84 size_t output_length
= 0;
85 const bool success
= decrypter
->DecryptPacket(
86 packet_number
, associated_data
, ciphertext
, output
.get(), &output_length
,
91 return new QuicData(output
.release(), output_length
, true);
94 TEST(ChaCha20Poly1305DecrypterTest
, Decrypt
) {
95 if (!ChaCha20Poly1305Decrypter::IsSupported()) {
96 LOG(INFO
) << "ChaCha20+Poly1305 not supported. Test skipped.";
100 for (size_t i
= 0; test_vectors
[i
].key
!= nullptr; i
++) {
101 // If not present then decryption is expected to fail.
102 bool has_pt
= test_vectors
[i
].pt
;
104 // Decode the test vector.
110 ASSERT_TRUE(DecodeHexString(test_vectors
[i
].key
, &key
));
111 ASSERT_TRUE(DecodeHexString(test_vectors
[i
].iv
, &iv
));
112 ASSERT_TRUE(DecodeHexString(test_vectors
[i
].aad
, &aad
));
113 ASSERT_TRUE(DecodeHexString(test_vectors
[i
].ct
, &ct
));
115 ASSERT_TRUE(DecodeHexString(test_vectors
[i
].pt
, &pt
));
118 ChaCha20Poly1305Decrypter decrypter
;
119 ASSERT_TRUE(decrypter
.SetKey(key
));
120 scoped_ptr
<QuicData
> decrypted(DecryptWithNonce(
122 // This deliberately tests that the decrypter can handle an AAD that
123 // is set to nullptr, as opposed to a zero-length, non-nullptr pointer.
124 StringPiece(aad
.length() ? aad
.data() : nullptr, aad
.length()), ct
));
125 if (!decrypted
.get()) {
126 EXPECT_FALSE(has_pt
);
131 ASSERT_EQ(pt
.length(), decrypted
->length());
132 test::CompareCharArraysWithHexError("plaintext", decrypted
->data(),
133 pt
.length(), pt
.data(), pt
.length());