a575963da9
Former-commit-id: da6be194a6b1221998fc28233f2503bd61dd9d14
207 lines
7.9 KiB
C#
207 lines
7.9 KiB
C#
//
|
|
// RijndaelTest.cs - NUnit Test Cases for Rijndael
|
|
//
|
|
// Author:
|
|
// Sebastien Pouliot (sebastien@ximian.com)
|
|
//
|
|
// (C) 2002 Motus Technologies Inc. (http://www.motus.com)
|
|
// Copyright (C) 2004 Novell, Inc (http://www.novell.com)
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining
|
|
// a copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to
|
|
// permit persons to whom the Software is furnished to do so, subject to
|
|
// the following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be
|
|
// included in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
//
|
|
|
|
using NUnit.Framework;
|
|
using System;
|
|
using System.Security.Cryptography;
|
|
using System.Text;
|
|
|
|
namespace MonoTests.System.Security.Cryptography {
|
|
|
|
[TestFixture]
|
|
public class RijndaelTest {
|
|
|
|
protected Rijndael aes;
|
|
|
|
[SetUp]
|
|
public void SetUp ()
|
|
{
|
|
aes = Rijndael.Create ();
|
|
}
|
|
|
|
public void AssertEquals (string msg, byte[] array1, byte[] array2)
|
|
{
|
|
AllTests.AssertEquals (msg, array1, array2);
|
|
}
|
|
|
|
[Test]
|
|
public void DefaultProperties ()
|
|
{
|
|
Rijndael algo = aes;
|
|
Assert.AreEqual (128, algo.BlockSize, "BlockSize");
|
|
Assert.AreEqual (128, algo.FeedbackSize, "FeedbackSize");
|
|
Assert.AreEqual (256, algo.KeySize, "KeySize");
|
|
Assert.AreEqual (CipherMode.CBC, algo.Mode, "Mode");
|
|
Assert.AreEqual (PaddingMode.PKCS7, algo.Padding, "Padding");
|
|
Assert.AreEqual (1, algo.LegalBlockSizes.Length, "LegalBlockSizes");
|
|
Assert.AreEqual (256, algo.LegalBlockSizes [0].MaxSize, "LegalBlockSizes.MaxSize");
|
|
Assert.AreEqual (128, algo.LegalBlockSizes [0].MinSize, "LegalBlockSizes.MinSize");
|
|
Assert.AreEqual (64, algo.LegalBlockSizes [0].SkipSize, "LegalBlockSizes.SkipSize");
|
|
Assert.AreEqual (1, algo.LegalKeySizes.Length, "LegalKeySizes");
|
|
Assert.AreEqual (256, algo.LegalKeySizes [0].MaxSize, "LegalKeySizes.MaxSize");
|
|
Assert.AreEqual (128, algo.LegalKeySizes [0].MinSize, "LegalKeySizes.MinSize");
|
|
Assert.AreEqual (64, algo.LegalKeySizes [0].SkipSize, "LegalKeySizes.SkipSize");
|
|
}
|
|
|
|
// FIPS197 B
|
|
public void TestFIPS197_AppendixB ()
|
|
{
|
|
byte[] key = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c };
|
|
byte[] iv = new byte[16]; // empty - not used for ECB
|
|
byte[] input = { 0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2, 0xe0, 0x37, 0x07, 0x34 };
|
|
byte[] expected = { 0x39, 0x25, 0x84, 0x1d, 0x02, 0xdc, 0x09, 0xfb, 0xdc, 0x11, 0x85, 0x97, 0x19, 0x6a, 0x0b, 0x32 };
|
|
|
|
aes.Mode = CipherMode.ECB;
|
|
aes.KeySize = 128;
|
|
aes.Padding = PaddingMode.Zeros;
|
|
|
|
byte[] output = new byte [input.Length];
|
|
ICryptoTransform encryptor = aes.CreateEncryptor (key, iv);
|
|
encryptor.TransformBlock (input, 0, input.Length, output, 0);
|
|
AssertEquals ("FIPS197 B Encrypt", expected, output);
|
|
|
|
byte[] original = new byte [output.Length];
|
|
ICryptoTransform decryptor = aes.CreateDecryptor(key, iv);
|
|
decryptor.TransformBlock (output, 0, output.Length, original, 0);
|
|
AssertEquals ("FIPS197 B Decrypt", input, original);
|
|
}
|
|
|
|
// FIPS197 C.1 AES-128 (Nk=4, Nr=10)
|
|
public void TestFIPS197_AppendixC1 ()
|
|
{
|
|
byte[] key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f };
|
|
byte[] iv = new byte[16]; // empty - not used for ECB
|
|
byte[] input = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff };
|
|
byte[] expected = { 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a };
|
|
|
|
aes.Mode = CipherMode.ECB;
|
|
aes.KeySize = 128;
|
|
aes.Padding = PaddingMode.Zeros;
|
|
|
|
byte[] output = new byte [input.Length];
|
|
ICryptoTransform encryptor = aes.CreateEncryptor (key, iv);
|
|
encryptor.TransformBlock(input, 0, input.Length, output, 0);
|
|
AssertEquals ("FIPS197 C1 Encrypt", expected, output);
|
|
|
|
byte[] original = new byte [output.Length];
|
|
ICryptoTransform decryptor = aes.CreateDecryptor(key, iv);
|
|
decryptor.TransformBlock(output, 0, output.Length, original, 0);
|
|
AssertEquals ("FIPS197 C1 Decrypt", input, original);
|
|
}
|
|
|
|
// FIPS197 C.2 AES-192 (Nk=6, Nr=12)
|
|
public void TestFIPS197_AppendixC2 ()
|
|
{
|
|
byte[] key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 };
|
|
byte[] iv = new byte[16]; // empty - not used for ECB
|
|
byte[] input = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff };
|
|
byte[] expected = { 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 };
|
|
|
|
aes.Mode = CipherMode.ECB;
|
|
aes.KeySize = 192;
|
|
aes.Padding = PaddingMode.Zeros;
|
|
|
|
byte[] output = new byte [input.Length];
|
|
ICryptoTransform encryptor = aes.CreateEncryptor (key, iv);
|
|
encryptor.TransformBlock(input, 0, input.Length, output, 0);
|
|
AssertEquals ("FIPS197 C2 Encrypt", expected, output);
|
|
|
|
byte[] original = new byte [output.Length];
|
|
ICryptoTransform decryptor = aes.CreateDecryptor(key, iv);
|
|
decryptor.TransformBlock(output, 0, output.Length, original, 0);
|
|
AssertEquals ("FIPS197 C2 Decrypt", input, original);
|
|
}
|
|
|
|
// C.3 AES-256 (Nk=8, Nr=14)
|
|
public void TestFIPS197_AppendixC3 ()
|
|
{
|
|
byte[] key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f };
|
|
byte[] iv = new byte[16]; // empty - not used for ECB
|
|
byte[] input = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff };
|
|
byte[] expected = { 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 };
|
|
|
|
aes.Mode = CipherMode.ECB;
|
|
aes.KeySize = 256;
|
|
aes.Padding = PaddingMode.Zeros;
|
|
|
|
byte[] output = new byte [input.Length];
|
|
ICryptoTransform encryptor = aes.CreateEncryptor (key, iv);
|
|
encryptor.TransformBlock(input, 0, input.Length, output, 0);
|
|
AssertEquals ("FIPS197 C3 Encrypt", expected, output);
|
|
|
|
byte[] original = new byte [output.Length];
|
|
ICryptoTransform decryptor = aes.CreateDecryptor(key, iv);
|
|
decryptor.TransformBlock(output, 0, output.Length, original, 0);
|
|
AssertEquals ("FIPS197 C3 Decrypt", input, original);
|
|
}
|
|
|
|
[Test]
|
|
public void ChangingKeySize ()
|
|
{
|
|
byte[] original_key = aes.Key;
|
|
byte[] original_iv = aes.IV;
|
|
foreach (KeySizes ks in aes.LegalKeySizes) {
|
|
for (int key_size = ks.MinSize; key_size <= ks.MaxSize; key_size += ks.SkipSize) {
|
|
aes.KeySize = key_size;
|
|
string s = key_size.ToString ();
|
|
// key is updated
|
|
Assert.AreEqual ((key_size >> 3), aes.Key.Length, s + ".Key.Length");
|
|
// iv isn't
|
|
Assert.AreEqual (original_iv, aes.IV, s + ".IV");
|
|
}
|
|
}
|
|
}
|
|
|
|
[Test]
|
|
public void ChangingBlockSize ()
|
|
{
|
|
byte[] original_key = aes.Key;
|
|
byte[] original_iv = aes.IV;
|
|
foreach (KeySizes bs in aes.LegalBlockSizes) {
|
|
for (int block_size = bs.MinSize; block_size <= bs.MaxSize; block_size += bs.SkipSize) {
|
|
aes.BlockSize = block_size;
|
|
string s = block_size.ToString ();
|
|
// key isn't updated
|
|
Assert.AreEqual (original_key, aes.Key, s + ".Key");
|
|
// iv is updated
|
|
Assert.AreEqual ((block_size >> 3), aes.IV.Length, s + ".IV.Length");
|
|
}
|
|
}
|
|
}
|
|
|
|
[Test]
|
|
[ExpectedException (typeof (CryptographicException))]
|
|
public void FeedbackSize_NotMultipleOf8 ()
|
|
{
|
|
aes.FeedbackSize = 9;
|
|
}
|
|
}
|
|
|
|
}
|