Create basic test suite for CryptProtectData/CryptUnprotectData.

This commit is contained in:
Kees Cook 2005-05-24 09:58:26 +00:00 committed by Alexandre Julliard
parent fbb3ba488f
commit 255541a16e
6 changed files with 236 additions and 1 deletions

3
configure vendored

File diff suppressed because one or more lines are too long

View File

@ -1548,6 +1548,7 @@ dlls/comctl32/tests/Makefile
dlls/commdlg/Makefile
dlls/crtdll/Makefile
dlls/crypt32/Makefile
dlls/crypt32/tests/Makefile
dlls/cryptdll/Makefile
dlls/ctl3d/Makefile
dlls/d3d8/Makefile

View File

@ -13,6 +13,8 @@ C_SRCS = \
protectdata.c \
main.c
SUBDIRS = tests
@MAKE_DLL_RULES@
### Dependencies:

View File

@ -0,0 +1,3 @@
Makefile
protectdata.ok
testlist.c

View File

@ -0,0 +1,13 @@
TOPSRCDIR = @top_srcdir@
TOPOBJDIR = ../../..
SRCDIR = @srcdir@
VPATH = @srcdir@
TESTDLL = crypt32.dll
IMPORTS = crypt32
CTESTS = \
protectdata.c
@MAKE_TEST_RULES@
### Dependencies:

View File

@ -0,0 +1,215 @@
/*
* Unit test suite for crypt32.dll's CryptProtectData/CryptUnprotectData
*
* Copyright 2005 Kees Cook <kees@outflux.net>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include <stdio.h>
#include <stdarg.h>
#include <windef.h>
#include <winbase.h>
#include <winerror.h>
#include <wincrypt.h>
#include "wine/test.h"
static const char * secret = "I am a super secret string that no one can see!";
static const char * secret2 = "I am a super secret string indescribable string";
static const char * key = "Wibble wibble wibble";
static const WCHAR desc[] = {'U','l','t','r','a',' ','s','e','c','r','e','t',' ','t','e','s','t',' ','m','e','s','s','a','g','e',0};
static BOOL protected = FALSE; /* if true, the unprotect tests can run */
static DATA_BLOB cipher;
static DATA_BLOB cipher_entropy;
static DATA_BLOB cipher_no_desc;
static void test_cryptprotectdata(void)
{
LONG r;
DATA_BLOB plain;
DATA_BLOB entropy;
plain.pbData=(void*)secret;
plain.cbData=strlen(secret)+1;
entropy.pbData=(void*)key;
entropy.cbData=strlen(key)+1;
SetLastError(0xDEADBEEF);
protected = CryptProtectData(NULL,desc,NULL,NULL,NULL,0,&cipher);
ok(!protected, "Encrypting without plain data source.\n");
r = GetLastError();
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
SetLastError(0xDEADBEEF);
protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,NULL);
ok(!protected, "Encrypting without cipher destination.\n");
r = GetLastError();
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
cipher.pbData=NULL;
cipher.cbData=0;
/* without entropy */
SetLastError(0xDEADBEEF);
protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,&cipher);
ok(protected, "Encrypting without entropy.\n");
r = GetLastError();
ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
cipher_entropy.pbData=NULL;
cipher_entropy.cbData=0;
/* with entropy */
SetLastError(0xDEADBEEF);
protected = CryptProtectData(&plain,desc,&entropy,NULL,NULL,0,&cipher_entropy);
ok(protected, "Encrypting with entropy.\n");
r = GetLastError();
ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
cipher_no_desc.pbData=NULL;
cipher_no_desc.cbData=0;
/* with entropy but no description */
plain.pbData=(void*)secret2;
plain.cbData=strlen(secret2)+1;
SetLastError(0xDEADBEEF);
protected = CryptProtectData(&plain,NULL,&entropy,NULL,NULL,0,&cipher_no_desc);
ok(protected, "Encrypting with entropy and no description.\n");
r = GetLastError();
ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
}
static void test_cryptunprotectdata(void)
{
LONG r;
DATA_BLOB plain;
DATA_BLOB entropy;
BOOL okay;
WCHAR * data_desc;
entropy.pbData=(void*)key;
entropy.cbData=strlen(key)+1;
ok(protected, "CryptProtectData failed to run, so I can't test its output\n");
if (!protected) return;
plain.pbData=NULL;
plain.cbData=0;
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(&cipher,NULL,NULL,NULL,NULL,0,NULL);
ok(!okay,"Decrypting without destination\n");
r = GetLastError();
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(NULL,NULL,NULL,NULL,NULL,0,&plain);
ok(!okay,"Decrypting without source\n");
r = GetLastError();
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
plain.pbData=NULL;
plain.cbData=0;
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(&cipher_entropy,NULL,NULL,NULL,NULL,0,&plain);
ok(!okay,"Decrypting without needed entropy\n");
r = GetLastError();
ok(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n", r);
plain.pbData=NULL;
plain.cbData=0;
data_desc=NULL;
/* without entropy */
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(&cipher,&data_desc,NULL,NULL,NULL,0,&plain);
ok(okay,"Decrypting without entropy\n");
r = GetLastError();
ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
ok(!strcmp(plain.pbData,secret),"Plain does not match secret\n");
ok(data_desc!=NULL,"Description not allocated\n");
ok(!lstrcmpW(data_desc,desc),"Description does not match\n");
LocalFree(plain.pbData);
LocalFree(data_desc);
plain.pbData=NULL;
plain.cbData=0;
data_desc=NULL;
/* with wrong entropy */
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(&cipher_entropy,&data_desc,&cipher_entropy,NULL,NULL,0,&plain);
ok(!okay,"Decrypting with wrong entropy\n");
r = GetLastError();
ok(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n",r);
/* with entropy */
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(&cipher_entropy,&data_desc,&entropy,NULL,NULL,0,&plain);
ok(okay,"Decrypting with entropy\n");
r = GetLastError();
ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
ok(!strcmp(plain.pbData,secret),"Plain does not match secret\n");
ok(data_desc!=NULL,"Description not allocated\n");
ok(!lstrcmpW(data_desc,desc),"Description does not match\n");
LocalFree(plain.pbData);
LocalFree(data_desc);
plain.pbData=NULL;
plain.cbData=0;
data_desc=NULL;
/* with entropy but no description */
SetLastError(0xDEADBEEF);
okay = CryptUnprotectData(&cipher_no_desc,&data_desc,&entropy,NULL,NULL,0,&plain);
ok(okay,"Decrypting with entropy and no description\n");
r = GetLastError();
ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
ok(plain.cbData==strlen(secret2)+1,"Plain DATA_BLOB wrong length\n");
ok(!strcmp(plain.pbData,secret2),"Plain does not match secret\n");
ok(data_desc!=NULL,"Description not allocated\n");
ok(data_desc[0]=='\0',"Description not empty\n");
LocalFree(plain.pbData);
plain.pbData=NULL;
plain.cbData=0;
}
START_TEST(protectdata)
{
protected=FALSE;
test_cryptprotectdata();
test_cryptunprotectdata();
/* deinit globals here */
if (cipher.pbData) LocalFree(cipher.pbData);
if (cipher_entropy.pbData) LocalFree(cipher_entropy.pbData);
if (cipher_no_desc.pbData) LocalFree(cipher_no_desc.pbData);
}