summaryrefslogtreecommitdiff
path: root/testsuite/chacha-test.c
blob: f51ff19fd16090ebe26532101b091d69e4a5bd29 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
/* chacha-test.c

   Test program for the ChaCha stream cipher implementation.

   Copyright (C) 2013 Joachim Strömbergson
   Copyright (C) 2012, 2014 Niels Möller

   This file is part of GNU Nettle.

   GNU Nettle is free software: you can redistribute it and/or
   modify it under the terms of either:

     * the GNU Lesser General Public License as published by the Free
       Software Foundation; either version 3 of the License, or (at your
       option) any later version.

   or

     * the GNU General Public License as published by the Free
       Software Foundation; either version 2 of the License, or (at your
       option) any later version.

   or both in parallel, as here.

   GNU Nettle is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   General Public License for more details.

   You should have received copies of the GNU General Public License and
   the GNU Lesser General Public License along with this program.  If
   not, see http://www.gnu.org/licenses/.
*/

#include "testutils.h"

#include "chacha.h"
#include "chacha-internal.h"

static int
memzero_p (const uint8_t *p, size_t n)
{
  size_t i;
  for (i = 0; i < n; i++)
    if (p[i])
      return 0;
  return 1;
}

/* Test with simple structure of the salsa20 input, to aid
   debugging. */
static void
test_chacha_core(void)
{
  const uint32_t input[16] =
    {
     0, 1, 2, 3,
     4, 5, 6, 7,
     8, 9, 10, 11,
     /* Second block will have carry from first counter word propagate
	to next word. */
     0xffffffff, 13, 14, 15,
    };
  const struct tstring *expected
    = SHEX("32f216b0eddeee3b bade2bf5a4c0b3b3"
	   "0aab2d67b09b2a63 6127fc965d831b2c"
	   "ddc9e25ca7841f3e 938e3566a7702a0b"
	   "7f80559e639ef6da 6d39627abc7da6b1"
	   "0090a54241e68b6b d870f3b60adcaf89"
	   "09d3c7b8a8c76aa3 941d726c649636db"
	   "d6c3f0490fd38a46 070b77a757972126"
	   "6323aa95eef9d68c 7eac86e913caa80c"
	   "17dd18ae19b0b72e 0ef6e66a58c0791e"
	   "e574e44162c99484 68085365916e0fee"
	   "e3d0a5d3d2b93b4a ff245cb557af3ead"
	   "2395f5cc7a00e25a 4f69a17969360781");

  const struct tstring *expected_32 /* For 32-bit counter */
    = SHEX("32f216b0eddeee3b bade2bf5a4c0b3b3"
	   "0aab2d67b09b2a63 6127fc965d831b2c"
	   "ddc9e25ca7841f3e 938e3566a7702a0b"
	   "7f80559e639ef6da 6d39627abc7da6b1"
	   "ea56196ace461eeb f898ade2f51c425f"
	   "ff0452d728f13505 e23a1d017b40becd"
	   "6482114a4586f48a 85c5cb9f92333de6"
	   "9c248f2a809275fa 4786d5d6854fd7d7"
	   "77dd6b03073f9dbf 294eabd6affa3104"
	   "fccb19c3182a330c af2fdf0c43ebfa52"
	   "7f845ffc0a897bea 2cf27a3dfc6f31af"
	   "7db66563de442b71 f6d51f96930587ef");

  struct chacha_ctx ctx;
  uint8_t output[192];

  ASSERT (expected->length == 192);
  ASSERT (expected_32->length == 192);

  /* Three blocks, to exercises _chacha_3core, if available. */
  memcpy (&ctx, input, sizeof(ctx));
  chacha_crypt (&ctx, 192, output, expected->data);

  if (!memzero_p (output, 192))
    {
      fprintf(stderr, "chacha_crypt failed:\n");
      fprintf(stderr, "\nOutput: ");
      print_hex(192, output);
      fprintf(stderr, "\n");
      FAIL();
    }

  memcpy (&ctx, input, sizeof(ctx));
  chacha_crypt32 (&ctx, 192, output, expected_32->data);

  if (!memzero_p (output, 192))
    {
      fprintf(stderr, "chacha_crypt32 failed:\n");
      fprintf(stderr, "\nOutput: ");
      print_hex(192, output);
      fprintf(stderr, "\n");
      FAIL();
    }
}

static void
_test_chacha(const struct tstring *key, const struct tstring *nonce,
	     const struct tstring *expected, unsigned rounds,
	     const struct tstring *counter)
{
  struct chacha_ctx ctx;

  ASSERT (key->length == CHACHA_KEY_SIZE);
  chacha_set_key (&ctx, key->data);

  if (rounds == 20)
    {
      uint8_t *data = xalloc (expected->length + 2);
      size_t length;
      data++;

      for (length = 1; length <= expected->length; length++)
	{
	  data[-1] = 17;
	  memset (data, 0, length);
	  data[length] = 17;
	  if (nonce->length == CHACHA_NONCE_SIZE)
	    chacha_set_nonce(&ctx, nonce->data);
	  else if (nonce->length == CHACHA_NONCE96_SIZE)
	    {
	      chacha_set_nonce96(&ctx, nonce->data);
	      /* Use initial counter 1, for
		 draft-irtf-cfrg-chacha20-poly1305-08 test cases. */
	      ctx.state[12]++;
	    }
	  else
	    die ("Bad nonce size %u.\n", (unsigned) nonce->length);

	  if (counter)
	    {
	      if (counter->length == CHACHA_COUNTER_SIZE)
		{
		  ASSERT (nonce->length == CHACHA_NONCE_SIZE);
		  chacha_set_counter(&ctx, counter->data);
		}
	      else if (counter->length == CHACHA_COUNTER32_SIZE)
		{
		  ASSERT (nonce->length == CHACHA_NONCE96_SIZE);
		  chacha_set_counter32(&ctx, counter->data);
		}
	    }

	  if (nonce->length == CHACHA_NONCE_SIZE)
	    chacha_crypt (&ctx, length, data, data);
	  else
	    chacha_crypt32 (&ctx, length, data, data);

	  ASSERT (data[-1] == 17);
	  ASSERT (data[length] == 17);
	  if (!MEMEQ(length, data, expected->data))
	    {
	      printf("Error, length %u, expected:\n", (unsigned) length);
	      print_hex (length, expected->data);
	      printf("Got:\n");
	      print_hex(length, data);
	      FAIL ();
	    }
	}
      if (verbose)
	{
	  printf("Result after encryption:\n");
	  print_hex(expected->length, data);
	}
      free (data - 1);
    }
  else
    {
      /* Uses the _chacha_core function to be able to test different
	 numbers of rounds. */
      uint32_t out[_CHACHA_STATE_LENGTH];
      ASSERT (expected->length == CHACHA_BLOCK_SIZE);
      ASSERT (nonce->length == CHACHA_NONCE_SIZE);

      chacha_set_nonce(&ctx, nonce->data);
      if (counter)
	    chacha_set_counter(&ctx, counter->data);
      _chacha_core (out, ctx.state, rounds);

      if (!MEMEQ(CHACHA_BLOCK_SIZE, out, expected->data))
	{
	  printf("Error, expected:\n");
	  tstring_print_hex (expected);
	  printf("Got:\n");
	  print_hex(CHACHA_BLOCK_SIZE, (uint8_t *) out);
	  FAIL ();
	}

      if (verbose)
	{
	  printf("Result after encryption:\n");
	  print_hex(CHACHA_BLOCK_SIZE, (uint8_t *) out);
	}
    }
}

static void
test_chacha(const struct tstring *key, const struct tstring *nonce,
	    const struct tstring *expected, unsigned rounds)
{
  _test_chacha(key, nonce, expected, rounds, NULL);
}

static void
test_chacha_with_counter(const struct tstring *key, const struct tstring *nonce,
			 const struct tstring *expected, unsigned rounds,
			 const struct tstring *counter)
{
  _test_chacha(key, nonce, expected, rounds, counter);
}

void
test_main(void)
{
  test_chacha_core();

  /* Test vectors from draft-strombergson-chacha-test-vectors */
  test_chacha (SHEX("0000000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0000000000000000"),
	       SHEX("3e00ef2f895f40d6 7f5bb8e81f09a5a1"
		    "2c840ec3ce9a7f3b 181be188ef711a1e"
		    "984ce172b9216f41 9f445367456d5619"
		    "314a42a3da86b001 387bfdb80e0cfe42"

		    /* "d2aefa0deaa5c151 bf0adb6c01f2a5ad"
		    "c0fd581259f9a2aa dcf20f8fd566a26b"
		    "5032ec38bbc5da98 ee0c6f568b872a65"
		    "a08abf251deb21bb 4b56e5d8821e68aa" */),
	       8);

  test_chacha (SHEX("0000000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0000000000000000"),
	       SHEX("9bf49a6a0755f953 811fce125f2683d5"
		    "0429c3bb49e07414 7e0089a52eae155f"
		    "0564f879d27ae3c0 2ce82834acfa8c79"
		    "3a629f2ca0de6919 610be82f411326be"

		    /* "0bd58841203e74fe 86fc71338ce0173d"
		    "c628ebb719bdcbcc 151585214cc089b4"
		    "42258dcda14cf111 c602b8971b8cc843"
		    "e91e46ca905151c0 2744a6b017e69316" */),
	       12);

  test_chacha (SHEX("0000000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0000000000000000"),
	       SHEX("76b8e0ada0f13d90 405d6ae55386bd28"
		    "bdd219b8a08ded1a a836efcc8b770dc7"
		    "da41597c5157488d 7724e03fb8d84a37"
		    "6a43b8f41518a11c c387b669b2ee6586"

		    "9f07e7be5551387a 98ba977c732d080d"
		    "cb0f29a048e36569 12c6533e32ee7aed"
		    "29b721769ce64e43 d57133b074d839d5"
		    "31ed1f28510afb45 ace10a1f4b794d6f"),
	       20);

  /* TC2: Single bit in key set. All zero IV */
  test_chacha (SHEX("0100000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0000000000000000"),
	       SHEX("cf5ee9a0494aa961 3e05d5ed725b804b"
		    "12f4a465ee635acc 3a311de8740489ea"
		    "289d04f43c7518db 56eb4433e498a123"
		    "8cd8464d3763ddbb 9222ee3bd8fae3c8"),
	       8);

  test_chacha (SHEX("0100000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0000000000000000"),
	       SHEX("12056e595d56b0f6 eef090f0cd25a209"
		    "49248c2790525d0f 930218ff0b4ddd10"
		    "a6002239d9a454e2 9e107a7d06fefdfe"
		    "f0210feba044f9f2 9b1772c960dc29c0"),
	       12);

  test_chacha (SHEX("0100000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0000000000000000"),
	       SHEX("c5d30a7ce1ec1193 78c84f487d775a85"
		    "42f13ece238a9455 e8229e888de85bbd"
		    "29eb63d0a17a5b99 9b52da22be4023eb"
		    "07620a54f6fa6ad8 737b71eb0464dac0"

		    "10f656e6d1fd5505 3e50c4875c9930a3"
		    "3f6d0263bd14dfd6 ab8c70521c19338b"
		    "2308b95cf8d0bb7d 202d2102780ea352"
		    "8f1cb48560f76b20 f382b942500fceac"),
	       20);

  /* TC3: Single bit in IV set. All zero key */
  test_chacha (SHEX("0000000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0100000000000000"),
	       SHEX("2b8f4bb3798306ca 5130d47c4f8d4ed1"
		    "3aa0edccc1be6942 090faeeca0d7599b"
		    "7ff0fe616bb25aa0 153ad6fdc88b9549"
		    "03c22426d478b97b 22b8f9b1db00cf06"),
	       8);

  test_chacha (SHEX("0000000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0100000000000000"),
	       SHEX("64b8bdf87b828c4b 6dbaf7ef698de03d"
		    "f8b33f635714418f 9836ade59be12969"
		    "46c953a0f38ecffc 9ecb98e81d5d99a5"
		    "edfc8f9a0a45b9e4 1ef3b31f028f1d0f"),
	       12);

  test_chacha (SHEX("0000000000000000 0000000000000000"
		    "0000000000000000 0000000000000000"),
	       SHEX("0100000000000000"),
	       SHEX("ef3fdfd6c61578fb f5cf35bd3dd33b80"
		    "09631634d21e42ac 33960bd138e50d32"
		    "111e4caf237ee53c a8ad6426194a8854"
		    "5ddc497a0b466e7d 6bbdb0041b2f586b"

		    "5305e5e44aff19b2 35936144675efbe4"
		    "409eb7e8e5f1430f 5f5836aeb49bb532"
		    "8b017c4b9dc11f8a 03863fa803dc71d5"
		    "726b2b6b31aa3270 8afe5af1d6b69058"),
	       20);

  /* TC4: All bits in key and IV are set. */
  test_chacha (SHEX("ffffffffffffffff ffffffffffffffff"
		    "ffffffffffffffff ffffffffffffffff"),
	       SHEX("ffffffffffffffff"),
	       SHEX("e163bbf8c9a739d1 8925ee8362dad2cd"
		    "c973df05225afb2a a26396f2a9849a4a"
		    "445e0547d31c1623 c537df4ba85c70a9"
		    "884a35bcbf3dfab0 77e98b0f68135f54"),
	       8);

  test_chacha (SHEX("ffffffffffffffff ffffffffffffffff"
		    "ffffffffffffffff ffffffffffffffff"),
	       SHEX("ffffffffffffffff"),
	       SHEX("04bf88dae8e47a22 8fa47b7e6379434b"
		    "a664a7d28f4dab84 e5f8b464add20c3a"
		    "caa69c5ab221a23a 57eb5f345c96f4d1"
		    "322d0a2ff7a9cd43 401cd536639a615a"),
	       12);

  test_chacha (SHEX("ffffffffffffffff ffffffffffffffff"
		    "ffffffffffffffff ffffffffffffffff"),
	       SHEX("ffffffffffffffff"),
	       SHEX("d9bf3f6bce6ed0b5 4254557767fb5744"
		    "3dd4778911b60605 5c39cc25e674b836"
		    "3feabc57fde54f79 0c52c8ae43240b79"
		    "d49042b777bfd6cb 80e931270b7f50eb"

		    "5bac2acd86a836c5 dc98c116c1217ec3"
		    "1d3a63a9451319f0 97f3b4d6dab07787"
		    "19477d24d24b403a 12241d7cca064f79"
		    "0f1d51ccaff6b166 7d4bbca1958c4306"),
	       20);

  /* TC5: Every even bit set in key and IV. */
  test_chacha (SHEX("5555555555555555 5555555555555555"
		    "5555555555555555 5555555555555555"),
	       SHEX("5555555555555555"),
	       SHEX("7cb78214e4d3465b 6dc62cf7a1538c88"
		    "996952b4fb72cb61 05f1243ce3442e29"
		    "75a59ebcd2b2a598 290d7538491fe65b"
		    "dbfefd060d887981 20a70d049dc2677d"),
	       8);

  test_chacha (SHEX("5555555555555555 5555555555555555"
		    "5555555555555555 5555555555555555"),
	       SHEX("5555555555555555"),
	       SHEX("a600f07727ff93f3 da00dd74cc3e8bfb"
		    "5ca7302f6a0a2944 953de00450eecd40"
		    "b860f66049f2eaed 63b2ef39cc310d2c"
		    "488f5d9a241b615d c0ab70f921b91b95"),
	       12);

  test_chacha (SHEX("5555555555555555 5555555555555555"
		    "5555555555555555 5555555555555555"),
	       SHEX("5555555555555555"),
	       SHEX("bea9411aa453c543 4a5ae8c92862f564"
		    "396855a9ea6e22d6 d3b50ae1b3663311"
		    "a4a3606c671d605c e16c3aece8e61ea1"
		    "45c59775017bee2f a6f88afc758069f7"

		    "e0b8f676e644216f 4d2a3422d7fa36c6"
		    "c4931aca950e9da4 2788e6d0b6d1cd83"
		    "8ef652e97b145b14 871eae6c6804c700"
		    "4db5ac2fce4c68c7 26d004b10fcaba86"),
	       20);

  /* TC6: Every odd bit set in key and IV. */
  test_chacha (SHEX("aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa"
		    "aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa"),
	       SHEX("aaaaaaaaaaaaaaaa"),
	       SHEX("40f9ab86c8f9a1a0 cdc05a75e5531b61"
		    "2d71ef7f0cf9e387 df6ed6972f0aae21"
		    "311aa581f816c90e 8a99de990b6b95aa"
		    "c92450f4e1127126 67b804c99e9c6eda"),
	       8);

  test_chacha (SHEX("aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa"
		    "aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa"),
	       SHEX("aaaaaaaaaaaaaaaa"),
	       SHEX("856505b01d3b47aa e03d6a97aa0f033a"
		    "9adcc94377babd86 08864fb3f625b6e3"
		    "14f086158f9f725d 811eeb953b7f7470"
		    "76e4c3f639fa841f ad6c9a709e621397"),
	       12);

  test_chacha (SHEX("aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa"
		    "aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa"),
	       SHEX("aaaaaaaaaaaaaaaa"),
	       SHEX("9aa2a9f656efde5a a7591c5fed4b35ae"
		    "a2895dec7cb4543b 9e9f21f5e7bcbcf3"
		    "c43c748a970888f8 248393a09d43e0b7"
		    "e164bc4d0b0fb240 a2d72115c4808906"

		    "72184489440545d0 21d97ef6b693dfe5"
		    "b2c132d47e6f041c 9063651f96b623e6"
		    "2a11999a23b6f7c4 61b2153026ad5e86"
		    "6a2e597ed07b8401 dec63a0934c6b2a9"),
	       20);

  /* TC7: Sequence patterns in key and IV. */
  test_chacha (SHEX("0011223344556677 8899aabbccddeeff"
		    "ffeeddccbbaa9988 7766554433221100"),
	       SHEX("0f1e2d3c4b5a6978"),
	       SHEX("db43ad9d1e842d12 72e4530e276b3f56"
		    "8f8859b3f7cf6d9d 2c74fa53808cb515"
		    "7a8ebf46ad3dcc4b 6c7dadde131784b0"
		    "120e0e22f6d5f9ff a7407d4a21b695d9"),
	       8);

  test_chacha (SHEX("0011223344556677 8899aabbccddeeff"
		    "ffeeddccbbaa9988 7766554433221100"),
	       SHEX("0f1e2d3c4b5a6978"),
	       SHEX("7ed12a3a63912ae9 41ba6d4c0d5e862e"
		    "568b0e5589346935 505f064b8c2698db"
		    "f7d850667d8e67be 639f3b4f6a16f92e"
		    "65ea80f6c7429445 da1fc2c1b9365040"),
	       12);

  test_chacha (SHEX("0011223344556677 8899aabbccddeeff"
		    "ffeeddccbbaa9988 7766554433221100"),
	       SHEX("0f1e2d3c4b5a6978"),
	       SHEX("9fadf409c00811d0 0431d67efbd88fba"
		    "59218d5d6708b1d6 85863fabbb0e961e"
		    "ea480fd6fb532bfd 494b215101505742"
		    "3ab60a63fe4f55f7 a212e2167ccab931"

		    "fbfd29cf7bc1d279 eddf25dd316bb884"
		    "3d6edee0bd1ef121 d12fa17cbc2c574c"
		    "ccab5e275167b08b d686f8a09df87ec3"
		    "ffb35361b94ebfa1 3fec0e4889d18da5"),
	       20);

  /* TC8: hashed string patterns */
  test_chacha(SHEX("c46ec1b18ce8a878 725a37e780dfb735"
		   "1f68ed2e194c79fb c6aebee1a667975d"),
	      SHEX("1ada31d5cf688221"),
	      SHEX("838751b42d8ddd8a 3d77f48825a2ba75"
		   "2cf4047cb308a597 8ef274973be374c9"
		   "6ad848065871417b 08f034e681fe46a9"
		   "3f7d5c61d1306614 d4aaf257a7cff08b"),
	      8);

  test_chacha(SHEX("c46ec1b18ce8a878 725a37e780dfb735"
		   "1f68ed2e194c79fb c6aebee1a667975d"),
	      SHEX("1ada31d5cf688221"),
	      SHEX("1482072784bc6d06 b4e73bdc118bc010"
		   "3c7976786ca918e0 6986aa251f7e9cc1"
		   "b2749a0a16ee83b4 242d2e99b08d7c20"
		   "092b80bc466c8728 3b61b1b39d0ffbab"),
	      12);

  test_chacha(SHEX("c46ec1b18ce8a878 725a37e780dfb735"
		   "1f68ed2e194c79fb c6aebee1a667975d"),
	      SHEX("1ada31d5cf688221"),
	      SHEX("f63a89b75c2271f9 368816542ba52f06"
		   "ed49241792302b00 b5e8f80ae9a473af"
		   "c25b218f519af0fd d406362e8d69de7f"
		   "54c604a6e00f353f 110f771bdca8ab92"

		   "e5fbc34e60a1d9a9 db17345b0a402736"
		   "853bf910b060bdf1 f897b6290f01d138"
		   "ae2c4c90225ba9ea 14d518f55929dea0"
		   "98ca7a6ccfe61227 053c84e49a4a3332"),
	      20);

  /* From draft-irtf-cfrg-chacha20-poly1305-08, with 96-bit nonce */
  test_chacha(SHEX("0001020304050607 08090a0b0c0d0e0f"
		   "1011121314151617 18191a1b1c1d1e1f"),
	      SHEX("000000090000004a 00000000"),
	      SHEX("10f1e7e4d13b5915 500fdd1fa32071c4"
		   "c7d1f4c733c06803 0422aa9ac3d46c4e"
		   "d2826446079faa09 14c2d705d98b02a2"
		   "b5129cd1de164eb9 cbd083e8a2503c4e"),
	      20);

  /* This is identical to the above 96-bit nonce test, but it manually
     sets the 32-bit counter value */
  test_chacha_with_counter(SHEX("0001020304050607 08090a0b0c0d0e0f"
				"1011121314151617 18191a1b1c1d1e1f"),
			   SHEX("000000090000004a 00000000"),
			   SHEX("10f1e7e4d13b5915 500fdd1fa32071c4"
				"c7d1f4c733c06803 0422aa9ac3d46c4e"
				"d2826446079faa09 14c2d705d98b02a2"
				"b5129cd1de164eb9 cbd083e8a2503c4e"),
			   20,
			   SHEX("01000000"));

  /* This is identical to the above 96-bit nonce test, but it manually
     sets the 64-bit counter value */
  test_chacha_with_counter(SHEX("0001020304050607 08090a0b0c0d0e0f"
				"1011121314151617 18191a1b1c1d1e1f"),
			   SHEX("0000004a00000000"),
			   SHEX("10f1e7e4d13b5915 500fdd1fa32071c4"
				"c7d1f4c733c06803 0422aa9ac3d46c4e"
				"d2826446079faa09 14c2d705d98b02a2"
				"b5129cd1de164eb9 cbd083e8a2503c4e"),
			   20,
			   SHEX("0100000000000009"));
}