Source file src/crypto/rc4/rc4_test.go

     1  // Copyright 2009 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package rc4
     6  
     7  import (
     8  	"bytes"
     9  	"crypto/cipher"
    10  	"crypto/internal/cryptotest"
    11  	"fmt"
    12  	"testing"
    13  )
    14  
    15  type rc4Test struct {
    16  	key, keystream []byte
    17  }
    18  
    19  var golden = []rc4Test{
    20  	// Test vectors from the original cypherpunk posting of ARC4:
    21  	//   https://groups.google.com/group/sci.crypt/msg/10a300c9d21afca0?pli=1
    22  	{
    23  		[]byte{0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef},
    24  		[]byte{0x74, 0x94, 0xc2, 0xe7, 0x10, 0x4b, 0x08, 0x79},
    25  	},
    26  	{
    27  		[]byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
    28  		[]byte{0xde, 0x18, 0x89, 0x41, 0xa3, 0x37, 0x5d, 0x3a},
    29  	},
    30  	{
    31  		[]byte{0xef, 0x01, 0x23, 0x45},
    32  		[]byte{0xd6, 0xa1, 0x41, 0xa7, 0xec, 0x3c, 0x38, 0xdf, 0xbd, 0x61},
    33  	},
    34  
    35  	// Test vectors from the Wikipedia page: https://en.wikipedia.org/wiki/RC4
    36  	{
    37  		[]byte{0x4b, 0x65, 0x79},
    38  		[]byte{0xeb, 0x9f, 0x77, 0x81, 0xb7, 0x34, 0xca, 0x72, 0xa7, 0x19},
    39  	},
    40  	{
    41  		[]byte{0x57, 0x69, 0x6b, 0x69},
    42  		[]byte{0x60, 0x44, 0xdb, 0x6d, 0x41, 0xb7},
    43  	},
    44  	{
    45  		[]byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
    46  		[]byte{
    47  			0xde, 0x18, 0x89, 0x41, 0xa3, 0x37, 0x5d, 0x3a,
    48  			0x8a, 0x06, 0x1e, 0x67, 0x57, 0x6e, 0x92, 0x6d,
    49  			0xc7, 0x1a, 0x7f, 0xa3, 0xf0, 0xcc, 0xeb, 0x97,
    50  			0x45, 0x2b, 0x4d, 0x32, 0x27, 0x96, 0x5f, 0x9e,
    51  			0xa8, 0xcc, 0x75, 0x07, 0x6d, 0x9f, 0xb9, 0xc5,
    52  			0x41, 0x7a, 0xa5, 0xcb, 0x30, 0xfc, 0x22, 0x19,
    53  			0x8b, 0x34, 0x98, 0x2d, 0xbb, 0x62, 0x9e, 0xc0,
    54  			0x4b, 0x4f, 0x8b, 0x05, 0xa0, 0x71, 0x08, 0x50,
    55  			0x92, 0xa0, 0xc3, 0x58, 0x4a, 0x48, 0xe4, 0xa3,
    56  			0x0a, 0x39, 0x7b, 0x8a, 0xcd, 0x1d, 0x00, 0x9e,
    57  			0xc8, 0x7d, 0x68, 0x11, 0xf2, 0x2c, 0xf4, 0x9c,
    58  			0xa3, 0xe5, 0x93, 0x54, 0xb9, 0x45, 0x15, 0x35,
    59  			0xa2, 0x18, 0x7a, 0x86, 0x42, 0x6c, 0xca, 0x7d,
    60  			0x5e, 0x82, 0x3e, 0xba, 0x00, 0x44, 0x12, 0x67,
    61  			0x12, 0x57, 0xb8, 0xd8, 0x60, 0xae, 0x4c, 0xbd,
    62  			0x4c, 0x49, 0x06, 0xbb, 0xc5, 0x35, 0xef, 0xe1,
    63  			0x58, 0x7f, 0x08, 0xdb, 0x33, 0x95, 0x5c, 0xdb,
    64  			0xcb, 0xad, 0x9b, 0x10, 0xf5, 0x3f, 0xc4, 0xe5,
    65  			0x2c, 0x59, 0x15, 0x65, 0x51, 0x84, 0x87, 0xfe,
    66  			0x08, 0x4d, 0x0e, 0x3f, 0x03, 0xde, 0xbc, 0xc9,
    67  			0xda, 0x1c, 0xe9, 0x0d, 0x08, 0x5c, 0x2d, 0x8a,
    68  			0x19, 0xd8, 0x37, 0x30, 0x86, 0x16, 0x36, 0x92,
    69  			0x14, 0x2b, 0xd8, 0xfc, 0x5d, 0x7a, 0x73, 0x49,
    70  			0x6a, 0x8e, 0x59, 0xee, 0x7e, 0xcf, 0x6b, 0x94,
    71  			0x06, 0x63, 0xf4, 0xa6, 0xbe, 0xe6, 0x5b, 0xd2,
    72  			0xc8, 0x5c, 0x46, 0x98, 0x6c, 0x1b, 0xef, 0x34,
    73  			0x90, 0xd3, 0x7b, 0x38, 0xda, 0x85, 0xd3, 0x2e,
    74  			0x97, 0x39, 0xcb, 0x23, 0x4a, 0x2b, 0xe7, 0x40,
    75  		},
    76  	},
    77  }
    78  
    79  func testEncrypt(t *testing.T, desc string, c *Cipher, src, expect []byte) {
    80  	dst := make([]byte, len(src))
    81  	c.XORKeyStream(dst, src)
    82  	for i, v := range dst {
    83  		if v != expect[i] {
    84  			t.Fatalf("%s: mismatch at byte %d:\nhave %x\nwant %x", desc, i, dst, expect)
    85  		}
    86  	}
    87  }
    88  
    89  func TestGolden(t *testing.T) {
    90  	for gi, g := range golden {
    91  		data := make([]byte, len(g.keystream))
    92  		for i := range data {
    93  			data[i] = byte(i)
    94  		}
    95  
    96  		expect := make([]byte, len(g.keystream))
    97  		for i := range expect {
    98  			expect[i] = byte(i) ^ g.keystream[i]
    99  		}
   100  
   101  		for size := 1; size <= len(g.keystream); size++ {
   102  			c, err := NewCipher(g.key)
   103  			if err != nil {
   104  				t.Fatalf("#%d: NewCipher: %v", gi, err)
   105  			}
   106  
   107  			off := 0
   108  			for off < len(g.keystream) {
   109  				n := len(g.keystream) - off
   110  				if n > size {
   111  					n = size
   112  				}
   113  				desc := fmt.Sprintf("#%d@[%d:%d]", gi, off, off+n)
   114  				testEncrypt(t, desc, c, data[off:off+n], expect[off:off+n])
   115  				off += n
   116  			}
   117  		}
   118  	}
   119  }
   120  
   121  func TestBlock(t *testing.T) {
   122  	c1a, _ := NewCipher(golden[0].key)
   123  	c1b, _ := NewCipher(golden[1].key)
   124  	data1 := make([]byte, 1<<20)
   125  	for i := range data1 {
   126  		c1a.XORKeyStream(data1[i:i+1], data1[i:i+1])
   127  		c1b.XORKeyStream(data1[i:i+1], data1[i:i+1])
   128  	}
   129  
   130  	c2a, _ := NewCipher(golden[0].key)
   131  	c2b, _ := NewCipher(golden[1].key)
   132  	data2 := make([]byte, 1<<20)
   133  	c2a.XORKeyStream(data2, data2)
   134  	c2b.XORKeyStream(data2, data2)
   135  
   136  	if !bytes.Equal(data1, data2) {
   137  		t.Fatalf("bad block")
   138  	}
   139  }
   140  
   141  func TestRC4Stream(t *testing.T) {
   142  	cryptotest.TestStream(t, func() cipher.Stream {
   143  		c, _ := NewCipher(golden[0].key)
   144  		return c
   145  	})
   146  }
   147  
   148  func benchmark(b *testing.B, size int64) {
   149  	buf := make([]byte, size)
   150  	c, err := NewCipher(golden[0].key)
   151  	if err != nil {
   152  		panic(err)
   153  	}
   154  	b.SetBytes(size)
   155  
   156  	for i := 0; i < b.N; i++ {
   157  		c.XORKeyStream(buf, buf)
   158  	}
   159  }
   160  
   161  func BenchmarkRC4_128(b *testing.B) {
   162  	benchmark(b, 128)
   163  }
   164  
   165  func BenchmarkRC4_1K(b *testing.B) {
   166  	benchmark(b, 1024)
   167  }
   168  
   169  func BenchmarkRC4_8K(b *testing.B) {
   170  	benchmark(b, 8096)
   171  }
   172  

View as plain text