// PKCS1MaskGenerationMethodTest.cs - NUnit Test Cases for PKCS1MaskGenerationMethod
//
// Author:
-// Sebastien Pouliot (spouliot@motus.com)
+// Sebastien Pouliot (sebastien@ximian.com)
//
-// (C) 2002 Motus Technologies Inc. (http://www.motus.com)
+// (C) 2002, 2003 Motus Technologies Inc. (http://www.motus.com)
+// Copyright (C) 2004 Novell, Inc (http://www.novell.com)
+//
+// Permission is hereby granted, free of charge, to any person obtaining
+// a copy of this software and associated documentation files (the
+// "Software"), to deal in the Software without restriction, including
+// without limitation the rights to use, copy, modify, merge, publish,
+// distribute, sublicense, and/or sell copies of the Software, and to
+// permit persons to whom the Software is furnished to do so, subject to
+// the following conditions:
+//
+// The above copyright notice and this permission notice shall be
+// included in all copies or substantial portions of the Software.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
+// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
+// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
+// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
using NUnit.Framework;
using System;
using System.Security.Cryptography;
-using System.Text;
-
-namespace MonoTests.System.Security.Cryptography
-{
-public class PKCS1MaskGenerationMethodTest : TestCase
-{
- protected PKCS1MaskGenerationMethod pkcs1;
+namespace MonoTests.System.Security.Cryptography {
- protected override void SetUp ()
- {
- pkcs1 = new PKCS1MaskGenerationMethod();
- }
+ // References:
+ // a. PKCS#1: RSA Cryptography Standard
+ // http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/index.html
- protected override void TearDown () {}
+ [TestFixture]
+ public class PKCS1MaskGenerationMethodTest {
- public void AssertEquals (string msg, byte[] array1, byte[] array2)
- {
- AllTests.AssertEquals (msg, array1, array2);
- }
+ protected PKCS1MaskGenerationMethod pkcs1;
- public void TestProperties ()
- {
- // default value
- AssertEquals ("PKCS1MaskGenerationMethod HashName(default)", "SHA1", pkcs1.HashName);
- // return to default
- pkcs1.HashName = null;
- AssertEquals ("PKCS1MaskGenerationMethod HashName(null)", "SHA1", pkcs1.HashName);
- // bad hash accepted
- pkcs1.HashName = "SHA2";
- AssertEquals ("PKCS1MaskGenerationMethod HashName(bad)", "SHA2", pkcs1.HashName);
- // tostring
- AssertEquals ("PKCS1MaskGenerationMethod ToString()", "System.Security.Cryptography.PKCS1MaskGenerationMethod", pkcs1.ToString ());
- }
+ [SetUp]
+ public void SetUp ()
+ {
+ pkcs1 = new PKCS1MaskGenerationMethod ();
+ }
- public void TestEmptyMask ()
- {
- // pretty much useless but supported
- byte[] random = { 0x01 };
- byte[] mask = pkcs1.GenerateMask (random, 0);
- AssertEquals ("PKCS1MaskGenerationMethod Empty Mask", 0, mask.Length);
- }
+ public void AssertEquals (string msg, byte[] array1, byte[] array2)
+ {
+ AllTests.AssertEquals (msg, array1, array2);
+ }
- public void TestBadParameters ()
- {
- try {
- byte[] mask = pkcs1.GenerateMask (null, 10);
- Fail ("Expecting NullReferenceException but none");
+ [Test]
+ public void Properties ()
+ {
+ // default value
+ Assertion.AssertEquals ("PKCS1MaskGenerationMethod HashName(default)", "SHA1", pkcs1.HashName);
+ // return to default
+ pkcs1.HashName = null;
+ Assertion.AssertEquals ("PKCS1MaskGenerationMethod HashName(null)", "SHA1", pkcs1.HashName);
+ // bad hash accepted
+ pkcs1.HashName = "SHA2";
+ Assertion.AssertEquals ("PKCS1MaskGenerationMethod HashName(bad)", "SHA2", pkcs1.HashName);
+ // tostring
+ Assertion.AssertEquals ("PKCS1MaskGenerationMethod ToString()", "System.Security.Cryptography.PKCS1MaskGenerationMethod", pkcs1.ToString ());
}
- catch (NullReferenceException) {
- // do nothing, this is what we expect
+
+ [Test]
+ public void EmptyMask ()
+ {
+ // pretty much useless but supported
+ byte[] random = { 0x01 };
+ byte[] mask = pkcs1.GenerateMask (random, 0);
+ Assertion.AssertEquals ("PKCS1MaskGenerationMethod Empty Mask", 0, mask.Length);
}
- catch (Exception e) {
- Fail ("Expecting NullReferenceException but got: " + e.ToString ());
+
+ [Test]
+ [ExpectedException (typeof (NullReferenceException))]
+ public void NullSeed ()
+ {
+ byte[] mask = pkcs1.GenerateMask (null, 10);
}
- byte[] random = { 0x01 };
- try {
+ [Test]
+ [ExpectedException (typeof (OverflowException))]
+ public void NegativeReturnRequest ()
+ {
+ byte[] random = { 0x01 };
byte[] mask = pkcs1.GenerateMask (random, -1);
- Fail ("Expecting OverflowException but none");
}
- catch (OverflowException) {
- // do nothing, this is what we expect
- }
- catch (Exception e) {
- Fail ("Expecting OverflowException but got: " + e.ToString ());
+
+ // This test will FAIL with MS framework 1.0 and 1.1 as their MGF1 implementation is buggy
+ // see ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip for RSA tests vector
+ [Test]
+#if ! NET_2_0
+ [Category ("NotDotNet")] // Known to fail under MS runtime - both 1.0 and 1.1
+#endif
+ public void PKCS1v21TestVector ()
+ {
+ pkcs1.HashName = "SHA1";
+
+ // seed = random string of octets (well not random in the tests ;-)
+ byte[] seed = { 0xaa, 0xfd, 0x12, 0xf6, 0x59, 0xca, 0xe6, 0x34, 0x89, 0xb4, 0x79, 0xe5, 0x07, 0x6d, 0xde, 0xc2, 0xf0, 0x6c, 0xb5, 0x8f };
+ int LengthDB = 107;
+
+ // dbMask = MGF(seed, length(DB))
+ byte[] dbMask = pkcs1.GenerateMask (seed, LengthDB);
+ byte[] expectedDBMask = { 0x06, 0xe1, 0xde, 0xb2, 0x36, 0x9a, 0xa5, 0xa5, 0xc7, 0x07, 0xd8, 0x2c, 0x8e, 0x4e, 0x93, 0x24,
+ 0x8a, 0xc7, 0x83, 0xde, 0xe0, 0xb2, 0xc0, 0x46, 0x26, 0xf5, 0xaf, 0xf9, 0x3e, 0xdc, 0xfb, 0x25,
+ 0xc9, 0xc2, 0xb3, 0xff, 0x8a, 0xe1, 0x0e, 0x83, 0x9a, 0x2d, 0xdb, 0x4c, 0xdc, 0xfe, 0x4f, 0xf4,
+ 0x77, 0x28, 0xb4, 0xa1, 0xb7, 0xc1, 0x36, 0x2b, 0xaa, 0xd2, 0x9a, 0xb4, 0x8d, 0x28, 0x69, 0xd5,
+ 0x02, 0x41, 0x21, 0x43, 0x58, 0x11, 0x59, 0x1b, 0xe3, 0x92, 0xf9, 0x82, 0xfb, 0x3e, 0x87, 0xd0,
+ 0x95, 0xae, 0xb4, 0x04, 0x48, 0xdb, 0x97, 0x2f, 0x3a, 0xc1, 0x4e, 0xaf, 0xf4, 0x9c, 0x8c, 0x3b,
+ 0x7c, 0xfc, 0x95, 0x1a, 0x51, 0xec, 0xd1, 0xdd, 0xe6, 0x12, 0x64 };
+ AssertEquals ("PKCS1v21TestVector 1", expectedDBMask, dbMask);
+
+ // maskedDB = DB xor dbMask
+ byte[] DB = { 0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90,
+ 0xaf, 0xd8, 0x07, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd4, 0x36, 0xe9, 0x95, 0x69,
+ 0xfd, 0x32, 0xa7, 0xc8, 0xa0, 0x5b, 0xbc, 0x90, 0xd3, 0x2c, 0x49 };
+ byte[] maskedDB = new byte [dbMask.Length];
+ for (int i = 0; i < dbMask.Length; i++)
+ maskedDB [i] = Convert.ToByte (DB [i] ^ dbMask [i]);
+
+ // seedMask = MGF(maskedDB, length(seed))
+ byte[] seedMask = pkcs1.GenerateMask (maskedDB, seed.Length);
+ byte[] expectedSeedMask = { 0x41, 0x87, 0x0b, 0x5a, 0xb0, 0x29, 0xe6, 0x57, 0xd9, 0x57, 0x50, 0xb5, 0x4c, 0x28, 0x3c, 0x08, 0x72, 0x5d, 0xbe, 0xa9 };
+ AssertEquals ("PKCS1v21TestVector 2", expectedSeedMask, seedMask);
}
}
-
- // test part of PKCS#1 v.2.1 test vector
- // FIXME: Commented as we are now compatible with MS implementation
- // (i.e. not with the PKCS#1 specification).
-/* public void TestPKCS1v21TestVector ()
- {
- pkcs1.HashName = "SHA1";
-
- // seed = random string of octets (well not random in the tests ;-)
- byte[] seed = { 0xaa, 0xfd, 0x12, 0xf6, 0x59, 0xca, 0xe6, 0x34, 0x89, 0xb4, 0x79, 0xe5, 0x07, 0x6d, 0xde, 0xc2, 0xf0, 0x6c, 0xb5, 0x8f };
- int LengthDB = 107;
-
- // dbMask = MGF(seed, length(DB))
- byte[] dbMask = pkcs1.GenerateMask (seed, LengthDB);
- byte[] expectedDBMask = { 0x06, 0xe1, 0xde, 0xb2, 0x36, 0x9a, 0xa5, 0xa5, 0xc7, 0x07, 0xd8, 0x2c, 0x8e, 0x4e, 0x93, 0x24,
- 0x8a, 0xc7, 0x83, 0xde, 0xe0, 0xb2, 0xc0, 0x46, 0x26, 0xf5, 0xaf, 0xf9, 0x3e, 0xdc, 0xfb, 0x25,
- 0xc9, 0xc2, 0xb3, 0xff, 0x8a, 0xe1, 0x0e, 0x83, 0x9a, 0x2d, 0xdb, 0x4c, 0xdc, 0xfe, 0x4f, 0xf4,
- 0x77, 0x28, 0xb4, 0xa1, 0xb7, 0xc1, 0x36, 0x2b, 0xaa, 0xd2, 0x9a, 0xb4, 0x8d, 0x28, 0x69, 0xd5,
- 0x02, 0x41, 0x21, 0x43, 0x58, 0x11, 0x59, 0x1b, 0xe3, 0x92, 0xf9, 0x82, 0xfb, 0x3e, 0x87, 0xd0,
- 0x95, 0xae, 0xb4, 0x04, 0x48, 0xdb, 0x97, 0x2f, 0x3a, 0xc1, 0x4e, 0xaf, 0xf4, 0x9c, 0x8c, 0x3b,
- 0x7c, 0xfc, 0x95, 0x1a, 0x51, 0xec, 0xd1, 0xdd, 0xe6, 0x12, 0x64 };;
- AssertEquals ("PKCS1MaskGenerationMethod 1", expectedDBMask, dbMask);
-
- // maskedDB = DB xor dbMask
- byte[] DB = { 0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90,
- 0xaf, 0xd8, 0x07, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd4, 0x36, 0xe9, 0x95, 0x69,
- 0xfd, 0x32, 0xa7, 0xc8, 0xa0, 0x5b, 0xbc, 0x90, 0xd3, 0x2c, 0x49 };
- byte[] maskedDB = new byte [dbMask.Length];
- for (int i = 0; i < dbMask.Length; i++)
- maskedDB [i] = Convert.ToByte (DB [i] ^ dbMask [i]);
-
- // seedMask = MGF(maskedDB, length(seed))
- byte[] seedMask = pkcs1.GenerateMask (maskedDB, seed.Length);
- byte[] expectedSeedMask = { 0x41, 0x87, 0x0b, 0x5a, 0xb0, 0x29, 0xe6, 0x57, 0xd9, 0x57, 0x50, 0xb5, 0x4c, 0x28, 0x3c, 0x08, 0x72, 0x5d, 0xbe, 0xa9 };
- AssertEquals ("PKCS1MaskGenerationMethod 2", expectedSeedMask, seedMask);
- }*/
-
-}
-
}
-
-