2005-01-31 Zoltan Varga <vargaz@freemail.hu>
[mono.git] / mcs / class / corlib / Test / System.Security.Cryptography / PKCS1MaskGenerationMethodTest.cs
index 5f835c85405a927a74ec5d92318fbf8020054a6d..765b194a97da9810f83a74951e7385930dcc05e2 100644 (file)
 // PKCS1MaskGenerationMethodTest.cs - NUnit Test Cases for PKCS1MaskGenerationMethod
 //
 // Author:
-//     Sebastien Pouliot (spouliot@motus.com)
+//     Sebastien Pouliot (sebastien@ximian.com)
 //
-// (C) 2002 Motus Technologies Inc. (http://www.motus.com)
+// (C) 2002, 2003 Motus Technologies Inc. (http://www.motus.com)
+// Copyright (C) 2004 Novell, Inc (http://www.novell.com)
+//
+// Permission is hereby granted, free of charge, to any person obtaining
+// a copy of this software and associated documentation files (the
+// "Software"), to deal in the Software without restriction, including
+// without limitation the rights to use, copy, modify, merge, publish,
+// distribute, sublicense, and/or sell copies of the Software, and to
+// permit persons to whom the Software is furnished to do so, subject to
+// the following conditions:
+// 
+// The above copyright notice and this permission notice shall be
+// included in all copies or substantial portions of the Software.
+// 
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
+// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
+// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
+// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 //
 
 using NUnit.Framework;
 using System;
 using System.Security.Cryptography;
-using System.Text;
-
-namespace MonoTests.System.Security.Cryptography
-{
 
-public class PKCS1MaskGenerationMethodTest : TestCase 
-{
-       protected PKCS1MaskGenerationMethod pkcs1;
+namespace MonoTests.System.Security.Cryptography {
 
-       protected override void SetUp () 
-       {
-               pkcs1 = new PKCS1MaskGenerationMethod();
-       }
+       // References:
+       // a.   PKCS#1: RSA Cryptography Standard 
+       //      http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/index.html
 
-       protected override void TearDown () {}
+       [TestFixture]
+       public class PKCS1MaskGenerationMethodTest {
 
-       public void AssertEquals (string msg, byte[] array1, byte[] array2)
-       {
-               AllTests.AssertEquals (msg, array1, array2);
-       }
+               protected PKCS1MaskGenerationMethod pkcs1;
 
-       public void TestProperties () 
-       {
-               // default value
-               AssertEquals ("PKCS1MaskGenerationMethod HashName(default)", "SHA1", pkcs1.HashName);
-               // return to default
-               pkcs1.HashName = null;
-               AssertEquals ("PKCS1MaskGenerationMethod HashName(null)", "SHA1", pkcs1.HashName);
-               // bad hash accepted
-               pkcs1.HashName = "SHA2";
-               AssertEquals ("PKCS1MaskGenerationMethod HashName(bad)", "SHA2", pkcs1.HashName);
-               // tostring
-               AssertEquals ("PKCS1MaskGenerationMethod ToString()", "System.Security.Cryptography.PKCS1MaskGenerationMethod", pkcs1.ToString ());
-       }
+               [SetUp]
+               public void SetUp () 
+               {
+                       pkcs1 = new PKCS1MaskGenerationMethod ();
+               }
 
-       public void TestEmptyMask () 
-       {
-               // pretty much useless but supported
-               byte[] random = { 0x01 };
-               byte[] mask = pkcs1.GenerateMask (random, 0);
-               AssertEquals ("PKCS1MaskGenerationMethod Empty Mask", 0, mask.Length);
-       }
+               public void AssertEquals (string msg, byte[] array1, byte[] array2)
+               {
+                       AllTests.AssertEquals (msg, array1, array2);
+               }
 
-       public void TestBadParameters () 
-       {
-               try {
-                       byte[] mask = pkcs1.GenerateMask (null, 10);
-                       Fail ("Expecting NullReferenceException but none");
+               [Test]
+               public void Properties () 
+               {
+                       // default value
+                       Assertion.AssertEquals ("PKCS1MaskGenerationMethod HashName(default)", "SHA1", pkcs1.HashName);
+                       // return to default
+                       pkcs1.HashName = null;
+                       Assertion.AssertEquals ("PKCS1MaskGenerationMethod HashName(null)", "SHA1", pkcs1.HashName);
+                       // bad hash accepted
+                       pkcs1.HashName = "SHA2";
+                       Assertion.AssertEquals ("PKCS1MaskGenerationMethod HashName(bad)", "SHA2", pkcs1.HashName);
+                       // tostring
+                       Assertion.AssertEquals ("PKCS1MaskGenerationMethod ToString()", "System.Security.Cryptography.PKCS1MaskGenerationMethod", pkcs1.ToString ());
                }
-               catch (NullReferenceException) {
-                       // do nothing, this is what we expect
+
+               [Test]
+               public void EmptyMask () 
+               {
+                       // pretty much useless but supported
+                       byte[] random = { 0x01 };
+                       byte[] mask = pkcs1.GenerateMask (random, 0);
+                       Assertion.AssertEquals ("PKCS1MaskGenerationMethod Empty Mask", 0, mask.Length);
                }
-               catch (Exception e) {
-                       Fail ("Expecting NullReferenceException but got: " + e.ToString ());
+
+               [Test]
+               [ExpectedException (typeof (NullReferenceException))]
+               public void NullSeed () 
+               {
+                       byte[] mask = pkcs1.GenerateMask (null, 10);
                }
 
-               byte[] random = { 0x01 };
-               try {
+               [Test]
+               [ExpectedException (typeof (OverflowException))]
+               public void NegativeReturnRequest () 
+               {
+                       byte[] random = { 0x01 };
                        byte[] mask = pkcs1.GenerateMask (random, -1);
-                       Fail ("Expecting OverflowException but none");
                }
-               catch (OverflowException) {
-                       // do nothing, this is what we expect
-               }
-               catch (Exception e) {
-                       Fail ("Expecting OverflowException but got: " + e.ToString ());
+
+               // This test will FAIL with MS framework 1.0 and 1.1 as their MGF1 implementation is buggy
+               // see ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip for RSA tests vector
+               [Test]
+#if ! NET_2_0
+               [Category ("NotDotNet")] // Known to fail under MS runtime - both 1.0 and 1.1
+#endif
+               public void PKCS1v21TestVector ()
+               {
+                       pkcs1.HashName = "SHA1";
+                       
+                       // seed     = random string of octets (well not random in the tests ;-)
+                       byte[] seed = { 0xaa, 0xfd, 0x12, 0xf6, 0x59, 0xca, 0xe6, 0x34, 0x89, 0xb4, 0x79, 0xe5, 0x07, 0x6d, 0xde, 0xc2, 0xf0, 0x6c, 0xb5, 0x8f };
+                       int LengthDB = 107;
+
+                       // dbMask     = MGF(seed, length(DB))
+                       byte[] dbMask = pkcs1.GenerateMask (seed, LengthDB);
+                       byte[] expectedDBMask = { 0x06, 0xe1, 0xde, 0xb2, 0x36, 0x9a, 0xa5, 0xa5, 0xc7, 0x07, 0xd8, 0x2c, 0x8e, 0x4e, 0x93, 0x24, 
+                               0x8a, 0xc7, 0x83, 0xde, 0xe0, 0xb2, 0xc0, 0x46, 0x26, 0xf5, 0xaf, 0xf9, 0x3e, 0xdc, 0xfb, 0x25,
+                               0xc9, 0xc2, 0xb3, 0xff, 0x8a, 0xe1, 0x0e, 0x83, 0x9a, 0x2d, 0xdb, 0x4c, 0xdc, 0xfe, 0x4f, 0xf4, 
+                               0x77, 0x28, 0xb4, 0xa1, 0xb7, 0xc1, 0x36, 0x2b, 0xaa, 0xd2, 0x9a, 0xb4, 0x8d, 0x28, 0x69, 0xd5, 
+                               0x02, 0x41, 0x21, 0x43, 0x58, 0x11, 0x59, 0x1b, 0xe3, 0x92, 0xf9, 0x82, 0xfb, 0x3e, 0x87, 0xd0, 
+                               0x95, 0xae, 0xb4, 0x04, 0x48, 0xdb, 0x97, 0x2f, 0x3a, 0xc1, 0x4e, 0xaf, 0xf4, 0x9c, 0x8c, 0x3b,
+                               0x7c, 0xfc, 0x95, 0x1a, 0x51, 0xec, 0xd1, 0xdd, 0xe6, 0x12, 0x64 };
+                       AssertEquals ("PKCS1v21TestVector 1", expectedDBMask, dbMask);
+
+                       // maskedDB   = DB xor dbMask
+                       byte[] DB =  { 0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90,
+                               0xaf, 0xd8, 0x07, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+                               0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 
+                               0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 
+                               0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 
+                               0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd4, 0x36, 0xe9, 0x95, 0x69,
+                               0xfd, 0x32, 0xa7, 0xc8, 0xa0, 0x5b, 0xbc, 0x90, 0xd3, 0x2c, 0x49 };
+                       byte[] maskedDB = new byte [dbMask.Length];
+                       for (int i = 0; i < dbMask.Length; i++)
+                               maskedDB [i] = Convert.ToByte (DB [i] ^ dbMask [i]);
+
+                       // seedMask   = MGF(maskedDB, length(seed))
+                       byte[] seedMask = pkcs1.GenerateMask (maskedDB, seed.Length);
+                       byte[] expectedSeedMask = { 0x41, 0x87, 0x0b, 0x5a, 0xb0, 0x29, 0xe6, 0x57, 0xd9, 0x57, 0x50, 0xb5, 0x4c, 0x28, 0x3c, 0x08, 0x72, 0x5d, 0xbe, 0xa9 };
+                       AssertEquals ("PKCS1v21TestVector 2", expectedSeedMask, seedMask);
                }
        }
-
-       // test part of PKCS#1 v.2.1 test vector
-       // FIXME: Commented as we are now compatible with MS implementation 
-       // (i.e. not with the PKCS#1 specification).
-/*     public void TestPKCS1v21TestVector ()
-       {
-               pkcs1.HashName = "SHA1";
-               
-               // seed     = random string of octets (well not random in the tests ;-)
-               byte[] seed = { 0xaa, 0xfd, 0x12, 0xf6, 0x59, 0xca, 0xe6, 0x34, 0x89, 0xb4, 0x79, 0xe5, 0x07, 0x6d, 0xde, 0xc2, 0xf0, 0x6c, 0xb5, 0x8f };
-               int LengthDB = 107;
-
-               // dbMask     = MGF(seed, length(DB))
-               byte[] dbMask = pkcs1.GenerateMask (seed, LengthDB);
-               byte[] expectedDBMask =  { 0x06, 0xe1, 0xde, 0xb2, 0x36, 0x9a, 0xa5, 0xa5, 0xc7, 0x07, 0xd8, 0x2c, 0x8e, 0x4e, 0x93, 0x24, 
-                       0x8a, 0xc7, 0x83, 0xde, 0xe0, 0xb2, 0xc0, 0x46, 0x26, 0xf5, 0xaf, 0xf9, 0x3e, 0xdc, 0xfb, 0x25,
-                       0xc9, 0xc2, 0xb3, 0xff, 0x8a, 0xe1, 0x0e, 0x83, 0x9a, 0x2d, 0xdb, 0x4c, 0xdc, 0xfe, 0x4f, 0xf4, 
-                       0x77, 0x28, 0xb4, 0xa1, 0xb7, 0xc1, 0x36, 0x2b, 0xaa, 0xd2, 0x9a, 0xb4, 0x8d, 0x28, 0x69, 0xd5, 
-                       0x02, 0x41, 0x21, 0x43, 0x58, 0x11, 0x59, 0x1b, 0xe3, 0x92, 0xf9, 0x82, 0xfb, 0x3e, 0x87, 0xd0, 
-                       0x95, 0xae, 0xb4, 0x04, 0x48, 0xdb, 0x97, 0x2f, 0x3a, 0xc1, 0x4e, 0xaf, 0xf4, 0x9c, 0x8c, 0x3b,
-                       0x7c, 0xfc, 0x95, 0x1a, 0x51, 0xec, 0xd1, 0xdd, 0xe6, 0x12, 0x64 };;
-               AssertEquals ("PKCS1MaskGenerationMethod 1", expectedDBMask, dbMask);
-
-               // maskedDB   = DB xor dbMask
-               byte[] DB =  { 0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90,
-                       0xaf, 0xd8, 0x07, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
-                       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 
-                       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 
-                       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 
-                       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd4, 0x36, 0xe9, 0x95, 0x69,
-                       0xfd, 0x32, 0xa7, 0xc8, 0xa0, 0x5b, 0xbc, 0x90, 0xd3, 0x2c, 0x49 };
-               byte[] maskedDB = new byte [dbMask.Length];
-               for (int i = 0; i < dbMask.Length; i++)
-                       maskedDB [i] = Convert.ToByte (DB [i] ^ dbMask [i]);
-
-               // seedMask   = MGF(maskedDB, length(seed))
-               byte[] seedMask = pkcs1.GenerateMask (maskedDB, seed.Length);
-               byte[] expectedSeedMask = { 0x41, 0x87, 0x0b, 0x5a, 0xb0, 0x29, 0xe6, 0x57, 0xd9, 0x57, 0x50, 0xb5, 0x4c, 0x28, 0x3c, 0x08, 0x72, 0x5d, 0xbe, 0xa9 };
-               AssertEquals ("PKCS1MaskGenerationMethod 2", expectedSeedMask, seedMask);
-       }*/
-
-}
-
 }
-
-