test_ARC2.py 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. # -*- coding: utf-8 -*-
  2. #
  3. # SelfTest/Cipher/ARC2.py: Self-test for the Alleged-RC2 cipher
  4. #
  5. # Written in 2008 by Dwayne C. Litzenberger <dlitz@dlitz.net>
  6. #
  7. # ===================================================================
  8. # The contents of this file are dedicated to the public domain. To
  9. # the extent that dedication to the public domain is not available,
  10. # everyone is granted a worldwide, perpetual, royalty-free,
  11. # non-exclusive license to exercise all rights associated with the
  12. # contents of this file for any purpose whatsoever.
  13. # No rights are reserved.
  14. #
  15. # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  16. # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  17. # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  18. # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
  19. # BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
  20. # ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  21. # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  22. # SOFTWARE.
  23. # ===================================================================
  24. """Self-test suite for Crypto.Cipher.ARC2"""
  25. import unittest
  26. from tls.Crypto.Util.py3compat import b, bchr
  27. from tls.Crypto.Cipher import ARC2
  28. # This is a list of (plaintext, ciphertext, key[, description[, extra_params]]) tuples.
  29. test_data = [
  30. # Test vectors from RFC 2268
  31. # 63-bit effective key length
  32. ('0000000000000000', 'ebb773f993278eff', '0000000000000000',
  33. 'RFC2268-1', dict(effective_keylen=63)),
  34. # 64-bit effective key length
  35. ('ffffffffffffffff', '278b27e42e2f0d49', 'ffffffffffffffff',
  36. 'RFC2268-2', dict(effective_keylen=64)),
  37. ('1000000000000001', '30649edf9be7d2c2', '3000000000000000',
  38. 'RFC2268-3', dict(effective_keylen=64)),
  39. #('0000000000000000', '61a8a244adacccf0', '88',
  40. # 'RFC2268-4', dict(effective_keylen=64)),
  41. ('0000000000000000', '6ccf4308974c267f', '88bca90e90875a',
  42. 'RFC2268-5', dict(effective_keylen=64)),
  43. ('0000000000000000', '1a807d272bbe5db1', '88bca90e90875a7f0f79c384627bafb2',
  44. 'RFC2268-6', dict(effective_keylen=64)),
  45. # 128-bit effective key length
  46. ('0000000000000000', '2269552ab0f85ca6', '88bca90e90875a7f0f79c384627bafb2',
  47. "RFC2268-7", dict(effective_keylen=128)),
  48. ('0000000000000000', '5b78d3a43dfff1f1',
  49. '88bca90e90875a7f0f79c384627bafb216f80a6f85920584c42fceb0be255daf1e',
  50. "RFC2268-8", dict(effective_keylen=129)),
  51. # Test vectors from PyCrypto 2.0.1's testdata.py
  52. # 1024-bit effective key length
  53. ('0000000000000000', '624fb3e887419e48', '5068696c6970476c617373',
  54. 'PCTv201-0'),
  55. ('ffffffffffffffff', '79cadef44c4a5a85', '5068696c6970476c617373',
  56. 'PCTv201-1'),
  57. ('0001020304050607', '90411525b34e4c2c', '5068696c6970476c617373',
  58. 'PCTv201-2'),
  59. ('0011223344556677', '078656aaba61cbfb', '5068696c6970476c617373',
  60. 'PCTv201-3'),
  61. ('0000000000000000', 'd7bcc5dbb4d6e56a', 'ffffffffffffffff',
  62. 'PCTv201-4'),
  63. ('ffffffffffffffff', '7259018ec557b357', 'ffffffffffffffff',
  64. 'PCTv201-5'),
  65. ('0001020304050607', '93d20a497f2ccb62', 'ffffffffffffffff',
  66. 'PCTv201-6'),
  67. ('0011223344556677', 'cb15a7f819c0014d', 'ffffffffffffffff',
  68. 'PCTv201-7'),
  69. ('0000000000000000', '63ac98cdf3843a7a', 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
  70. 'PCTv201-8'),
  71. ('ffffffffffffffff', '3fb49e2fa12371dd', 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
  72. 'PCTv201-9'),
  73. ('0001020304050607', '46414781ab387d5f', 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
  74. 'PCTv201-10'),
  75. ('0011223344556677', 'be09dc81feaca271', 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
  76. 'PCTv201-11'),
  77. ('0000000000000000', 'e64221e608be30ab', '53e5ffe553',
  78. 'PCTv201-12'),
  79. ('ffffffffffffffff', '862bc60fdcd4d9a9', '53e5ffe553',
  80. 'PCTv201-13'),
  81. ('0001020304050607', '6a34da50fa5e47de', '53e5ffe553',
  82. 'PCTv201-14'),
  83. ('0011223344556677', '584644c34503122c', '53e5ffe553',
  84. 'PCTv201-15'),
  85. ]
  86. class BufferOverflowTest(unittest.TestCase):
  87. # Test a buffer overflow found in older versions of PyCrypto
  88. def runTest(self):
  89. """ARC2 with keylength > 128"""
  90. key = b("x") * 16384
  91. self.assertRaises(ValueError, ARC2.new, key, ARC2.MODE_ECB)
  92. class KeyLength(unittest.TestCase):
  93. def runTest(self):
  94. ARC2.new(b'\x00' * 16, ARC2.MODE_ECB, effective_keylen=40)
  95. self.assertRaises(ValueError, ARC2.new, bchr(0) * 4, ARC2.MODE_ECB)
  96. self.assertRaises(ValueError, ARC2.new, bchr(0) * 129, ARC2.MODE_ECB)
  97. self.assertRaises(ValueError, ARC2.new, bchr(0) * 16, ARC2.MODE_ECB,
  98. effective_keylen=39)
  99. self.assertRaises(ValueError, ARC2.new, bchr(0) * 16, ARC2.MODE_ECB,
  100. effective_keylen=1025)
  101. class TestOutput(unittest.TestCase):
  102. def runTest(self):
  103. # Encrypt/Decrypt data and test output parameter
  104. cipher = ARC2.new(b'4'*16, ARC2.MODE_ECB)
  105. pt = b'5' * 16
  106. ct = cipher.encrypt(pt)
  107. output = bytearray(16)
  108. res = cipher.encrypt(pt, output=output)
  109. self.assertEqual(ct, output)
  110. self.assertEqual(res, None)
  111. res = cipher.decrypt(ct, output=output)
  112. self.assertEqual(pt, output)
  113. self.assertEqual(res, None)
  114. import sys
  115. if sys.version[:3] != '2.6':
  116. output = memoryview(bytearray(16))
  117. cipher.encrypt(pt, output=output)
  118. self.assertEqual(ct, output)
  119. cipher.decrypt(ct, output=output)
  120. self.assertEqual(pt, output)
  121. self.assertRaises(TypeError, cipher.encrypt, pt, output=b'0'*16)
  122. self.assertRaises(TypeError, cipher.decrypt, ct, output=b'0'*16)
  123. shorter_output = bytearray(7)
  124. self.assertRaises(ValueError, cipher.encrypt, pt, output=shorter_output)
  125. self.assertRaises(ValueError, cipher.decrypt, ct, output=shorter_output)
  126. def get_tests(config={}):
  127. from tls.Crypto.Cipher import ARC2
  128. from .common import make_block_tests
  129. tests = make_block_tests(ARC2, "ARC2", test_data)
  130. tests.append(BufferOverflowTest())
  131. tests.append(KeyLength())
  132. tests += [TestOutput()]
  133. return tests
  134. if __name__ == '__main__':
  135. import unittest
  136. suite = lambda: unittest.TestSuite(get_tests())
  137. unittest.main(defaultTest='suite')
  138. # vim:set ts=4 sw=4 sts=4 expandtab: