Jo Shields 3c1f479b9d Imported Upstream version 4.0.0~alpha1
Former-commit-id: 806294f5ded97629b74c85c09952f2a74fe182d9
2015-04-07 09:35:12 +01:00

238 lines
7.4 KiB
C#

//
// RC2CryptoServiceProviderTest.cs - Unit tests for
// System.Security.Cryptography.RC2CryptoServiceProvider
//
// Author:
// Sebastien Pouliot <sebastien@ximian.com>
//
// Copyright (C) 2005 Novell, Inc (http://www.novell.com)
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to
// permit persons to whom the Software is furnished to do so, subject to
// the following conditions:
//
// The above copyright notice and this permission notice shall be
// included in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
using System;
using System.Security.Cryptography;
using NUnit.Framework;
namespace MonoTests.System.Security.Cryptography {
[TestFixture]
public class RC2CryptoServiceProviderTest {
private RC2CryptoServiceProvider rc2;
[SetUp]
public void SetUp ()
{
rc2 = new RC2CryptoServiceProvider ();
}
[Test]
[ExpectedException (typeof (CryptographicException))]
public void CreateEncryptor_KeyNull ()
{
ICryptoTransform encryptor = rc2.CreateEncryptor (null, rc2.IV);
byte[] data = new byte[encryptor.InputBlockSize];
byte[] encdata = encryptor.TransformFinalBlock (data, 0, data.Length);
ICryptoTransform decryptor = rc2.CreateDecryptor (rc2.Key, rc2.IV);
byte[] decdata = decryptor.TransformFinalBlock (encdata, 0, encdata.Length);
// null key != SymmetricAlgorithm.Key
// in about 1 out of 256 runs the exception will not be thrown because the padding will be
// the same as expected - however this still won't produce the right results (next check)
Assert.IsFalse (BitConverter.ToString (data) == BitConverter.ToString (decdata), "Compare");
// so this case is ok too, throw the expected exception to make the unit test succeed
throw new CryptographicException ("1/256");
}
[Test]
public void CreateEncryptor_IvNull ()
{
ICryptoTransform encryptor = rc2.CreateEncryptor (rc2.Key, null);
byte[] data = new byte[encryptor.InputBlockSize];
byte[] encdata = encryptor.TransformFinalBlock (data, 0, data.Length);
ICryptoTransform decryptor = rc2.CreateDecryptor (rc2.Key, rc2.IV);
byte[] decdata = decryptor.TransformFinalBlock (encdata, 0, encdata.Length);
Assert.IsFalse (BitConverter.ToString (data) == BitConverter.ToString (decdata), "Compare");
// null iv != SymmetricAlgorithm.IV
}
[Test]
public void CreateEncryptor_KeyIv ()
{
byte[] originalKey = rc2.Key;
byte[] originalIV = rc2.IV;
byte[] key = (byte[])rc2.Key.Clone ();
Array.Reverse (key);
byte[] iv = (byte[])rc2.IV.Clone ();
Array.Reverse (iv);
Assert.IsNotNull (rc2.CreateEncryptor (key, iv), "CreateEncryptor");
Assert.AreEqual (originalKey, rc2.Key, "Key");
Assert.AreEqual (originalIV, rc2.IV, "IV");
// SymmetricAlgorithm Key and IV not changed by CreateEncryptor
}
[Test]
[ExpectedException (typeof (CryptographicException))]
public void CreateDecryptor_KeyNull ()
{
ICryptoTransform encryptor = rc2.CreateEncryptor (rc2.Key, rc2.IV);
byte[] data = new byte[encryptor.InputBlockSize];
byte[] encdata = encryptor.TransformFinalBlock (data, 0, data.Length);
ICryptoTransform decryptor = rc2.CreateDecryptor (null, rc2.IV);
byte[] decdata = decryptor.TransformFinalBlock (encdata, 0, encdata.Length);
// null key != SymmetricAlgorithm.Key
// in about 1 out of 256 runs the exception will not be thrown because the padding will be
// the same as expected - however this still won't produce the right results (next check)
Assert.IsFalse (BitConverter.ToString (data) == BitConverter.ToString (decdata), "Compare");
// so this case is ok too, throw the expected exception to make the unit test succeed
throw new CryptographicException ("1/256");
}
[Test]
public void CreateDecryptor_IvNull ()
{
ICryptoTransform encryptor = rc2.CreateEncryptor (rc2.Key, rc2.IV);
byte[] data = new byte[encryptor.InputBlockSize];
byte[] encdata = encryptor.TransformFinalBlock (data, 0, data.Length);
ICryptoTransform decryptor = rc2.CreateDecryptor (rc2.Key, null);
byte[] decdata = decryptor.TransformFinalBlock (encdata, 0, encdata.Length);
Assert.IsFalse (BitConverter.ToString (data) == BitConverter.ToString (decdata), "Compare");
// null iv != SymmetricAlgorithm.IV
}
[Test]
public void CreateDecryptor_KeyIv ()
{
byte[] originalKey = rc2.Key;
byte[] originalIV = rc2.IV;
byte[] key = (byte[]) rc2.Key.Clone ();
Array.Reverse (key);
byte[] iv = (byte[]) rc2.IV.Clone ();
Array.Reverse (iv);
Assert.IsNotNull (rc2.CreateEncryptor (key, iv), "CreateDecryptor");
Assert.AreEqual (originalKey, rc2.Key, "Key");
Assert.AreEqual (originalIV, rc2.IV, "IV");
// SymmetricAlgorithm Key and IV not changed by CreateDecryptor
}
// Setting the IV is more restrictive than supplying an IV to
// CreateEncryptor and CreateDecryptor. See bug #76483
private ICryptoTransform CreateEncryptor_IV (int size)
{
byte[] iv = (size == -1) ? null : new byte[size];
return rc2.CreateEncryptor (rc2.Key, iv);
}
[Test]
public void CreateEncryptor_IV_Null ()
{
int size = (rc2.BlockSize >> 3) - 1;
CreateEncryptor_IV (-1);
}
[Test]
[ExpectedException (typeof (CryptographicException))]
public void CreateEncryptor_IV_Zero ()
{
int size = (rc2.BlockSize >> 3) - 1;
CreateEncryptor_IV (0);
}
[Test]
[ExpectedException (typeof (CryptographicException))]
public void CreateEncryptor_IV_TooSmall ()
{
int size = (rc2.BlockSize >> 3) - 1;
CreateEncryptor_IV (size);
}
[Test]
public void CreateEncryptor_IV_BlockSize ()
{
int size = (rc2.BlockSize >> 3);
CreateEncryptor_IV (size);
}
[Test]
public void CreateEncryptor_IV_TooBig ()
{
int size = rc2.BlockSize; // 8 times too big
CreateEncryptor_IV (size);
}
private ICryptoTransform CreateDecryptor_IV (int size)
{
byte[] iv = (size == -1) ? null : new byte[size];
return rc2.CreateDecryptor (rc2.Key, iv);
}
[Test]
public void CreateDecryptor_IV_Null ()
{
int size = (rc2.BlockSize >> 3) - 1;
CreateDecryptor_IV (-1);
}
[Test]
[ExpectedException (typeof (CryptographicException))]
public void CreateDecryptor_IV_Zero ()
{
int size = (rc2.BlockSize >> 3) - 1;
CreateDecryptor_IV (0);
}
[Test]
[ExpectedException (typeof (CryptographicException))]
public void CreateDecryptor_IV_TooSmall ()
{
int size = (rc2.BlockSize >> 3) - 1;
CreateDecryptor_IV (size);
}
[Test]
public void CreateDecryptor_IV_BlockSize ()
{
int size = (rc2.BlockSize >> 3);
CreateDecryptor_IV (size);
}
[Test]
public void CreateDecryptor_IV_TooBig ()
{
int size = rc2.BlockSize; // 8 times too big
CreateDecryptor_IV (size);
}
}
}