rsaenh/tests: Added more key state tests.
This commit is contained in:
parent
20bf02910b
commit
b84e11ecbd
|
@ -773,7 +773,7 @@ static void test_3des112(void)
|
||||||
HCRYPTKEY hKey;
|
HCRYPTKEY hKey;
|
||||||
BOOL result;
|
BOOL result;
|
||||||
DWORD dwLen;
|
DWORD dwLen;
|
||||||
unsigned char pbData[16];
|
unsigned char pbData[16], enc_data[16], bad_data[16];
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
result = derive_key(CALG_3DES_112, &hKey, 0);
|
result = derive_key(CALG_3DES_112, &hKey, 0);
|
||||||
|
@ -800,6 +800,7 @@ static void test_3des112(void)
|
||||||
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
memcpy(enc_data, pbData, cTestData[i].buflen);
|
||||||
|
|
||||||
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
@ -811,6 +812,42 @@ static void test_3des112(void)
|
||||||
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
printBytes("got",pbData,dwLen);
|
printBytes("got",pbData,dwLen);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Test bad data:
|
||||||
|
Decrypting a block of bad data with Final = TRUE should restore the
|
||||||
|
initial state of the key as well as decrypting a block of good data.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* Changing key state by setting Final = FALSE */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, FALSE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
|
||||||
|
/* Restoring key state by decrypting bad_data with Final = TRUE */
|
||||||
|
memcpy(bad_data, enc_data, cTestData[i].buflen);
|
||||||
|
bad_data[cTestData[i].buflen - 1] = ~bad_data[cTestData[i].buflen - 1];
|
||||||
|
SetLastError(0xdeadbeef);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, bad_data, &dwLen);
|
||||||
|
ok(!result, "CryptDecrypt should failed!\n");
|
||||||
|
ok(GetLastError() == NTE_BAD_DATA, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
|
||||||
|
/* Checking key state */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].enclen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].enclen);
|
||||||
|
todo_wine
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
if((dwLen != cTestData[i].enclen) ||
|
||||||
|
memcmp(pbData,cTestData[i].decstr,cTestData[i].enclen))
|
||||||
|
{
|
||||||
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
|
printBytes("got",pbData,dwLen);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
result = CryptDestroyKey(hKey);
|
result = CryptDestroyKey(hKey);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
@ -821,7 +858,7 @@ static void test_des(void)
|
||||||
HCRYPTKEY hKey;
|
HCRYPTKEY hKey;
|
||||||
BOOL result;
|
BOOL result;
|
||||||
DWORD dwLen, dwMode;
|
DWORD dwLen, dwMode;
|
||||||
unsigned char pbData[16];
|
unsigned char pbData[16], enc_data[16], bad_data[16];
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
result = derive_key(CALG_DES, &hKey, 56);
|
result = derive_key(CALG_DES, &hKey, 56);
|
||||||
|
@ -856,6 +893,7 @@ static void test_des(void)
|
||||||
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
memcpy(enc_data, pbData, cTestData[i].buflen);
|
||||||
|
|
||||||
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
@ -867,6 +905,41 @@ static void test_des(void)
|
||||||
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
printBytes("got",pbData,dwLen);
|
printBytes("got",pbData,dwLen);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Test bad data:
|
||||||
|
Decrypting a block of bad data with Final = TRUE should restore the
|
||||||
|
initial state of the key as well as decrypting a block of good data.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* Changing key state by setting Final = FALSE */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, FALSE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
|
||||||
|
/* Restoring key state by decrypting bad_data with Final = TRUE */
|
||||||
|
memcpy(bad_data, enc_data, cTestData[i].buflen);
|
||||||
|
bad_data[cTestData[i].buflen - 1] = ~bad_data[cTestData[i].buflen - 1];
|
||||||
|
SetLastError(0xdeadbeef);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, bad_data, &dwLen);
|
||||||
|
ok(!result, "CryptDecrypt should failed!\n");
|
||||||
|
ok(GetLastError() == NTE_BAD_DATA, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
|
||||||
|
/* Checking key state */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].enclen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].enclen);
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
if((dwLen != cTestData[i].enclen) ||
|
||||||
|
memcmp(pbData,cTestData[i].decstr,cTestData[i].enclen))
|
||||||
|
{
|
||||||
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
|
printBytes("got",pbData,dwLen);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
result = CryptDestroyKey(hKey);
|
result = CryptDestroyKey(hKey);
|
||||||
|
@ -878,7 +951,7 @@ static void test_3des(void)
|
||||||
HCRYPTKEY hKey;
|
HCRYPTKEY hKey;
|
||||||
BOOL result;
|
BOOL result;
|
||||||
DWORD dwLen;
|
DWORD dwLen;
|
||||||
unsigned char pbData[16];
|
unsigned char pbData[16], enc_data[16], bad_data[16];
|
||||||
static const BYTE des3[16] = {
|
static const BYTE des3[16] = {
|
||||||
0x7b, 0xba, 0xdd, 0xa2, 0x39, 0xd3, 0x7b, 0xb3,
|
0x7b, 0xba, 0xdd, 0xa2, 0x39, 0xd3, 0x7b, 0xb3,
|
||||||
0xc7, 0x51, 0x81, 0x41, 0x53, 0xe8, 0xcf, 0xeb };
|
0xc7, 0x51, 0x81, 0x41, 0x53, 0xe8, 0xcf, 0xeb };
|
||||||
|
@ -906,6 +979,7 @@ static void test_3des(void)
|
||||||
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
memcpy(enc_data, pbData, cTestData[i].buflen);
|
||||||
|
|
||||||
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
@ -917,6 +991,42 @@ static void test_3des(void)
|
||||||
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
printBytes("got",pbData,dwLen);
|
printBytes("got",pbData,dwLen);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Test bad data:
|
||||||
|
Decrypting a block of bad data with Final = TRUE should restore the
|
||||||
|
initial state of the key as well as decrypting a block of good data.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* Changing key state by setting Final = FALSE */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, FALSE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
|
||||||
|
/* Restoring key state by decrypting bad_data with Final = TRUE */
|
||||||
|
memcpy(bad_data, enc_data, cTestData[i].buflen);
|
||||||
|
bad_data[cTestData[i].buflen - 1] = ~bad_data[cTestData[i].buflen - 1];
|
||||||
|
SetLastError(0xdeadbeef);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, bad_data, &dwLen);
|
||||||
|
ok(!result, "CryptDecrypt should failed!\n");
|
||||||
|
ok(GetLastError() == NTE_BAD_DATA, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
|
||||||
|
/* Checking key state */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].enclen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].enclen);
|
||||||
|
todo_wine
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
if((dwLen != cTestData[i].enclen) ||
|
||||||
|
memcmp(pbData,cTestData[i].decstr,cTestData[i].enclen))
|
||||||
|
{
|
||||||
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
|
printBytes("got",pbData,dwLen);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
result = CryptDestroyKey(hKey);
|
result = CryptDestroyKey(hKey);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
@ -927,7 +1037,7 @@ static void test_aes(int keylen)
|
||||||
HCRYPTKEY hKey;
|
HCRYPTKEY hKey;
|
||||||
BOOL result;
|
BOOL result;
|
||||||
DWORD dwLen;
|
DWORD dwLen;
|
||||||
unsigned char pbData[16];
|
unsigned char pbData[16], enc_data[16], bad_data[16];
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
switch (keylen)
|
switch (keylen)
|
||||||
|
@ -969,6 +1079,7 @@ static void test_aes(int keylen)
|
||||||
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
result = CryptEncrypt(hKey, 0, TRUE, 0, pbData, &dwLen, cTestData[i].buflen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
memcpy(enc_data, pbData, cTestData[i].buflen);
|
||||||
|
|
||||||
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
@ -980,6 +1091,41 @@ static void test_aes(int keylen)
|
||||||
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
printBytes("got",pbData,dwLen);
|
printBytes("got",pbData,dwLen);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Test bad data:
|
||||||
|
Decrypting a block of bad data with Final = TRUE should restore the
|
||||||
|
initial state of the key as well as decrypting a block of good data.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* Changing key state by setting Final = FALSE */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, FALSE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
|
||||||
|
/* Restoring key state by decrypting bad_data with Final = TRUE */
|
||||||
|
memcpy(bad_data, enc_data, cTestData[i].buflen);
|
||||||
|
bad_data[cTestData[i].buflen - 1] = ~bad_data[cTestData[i].buflen - 1];
|
||||||
|
SetLastError(0xdeadbeef);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, bad_data, &dwLen);
|
||||||
|
ok(!result, "CryptDecrypt should failed!\n");
|
||||||
|
ok(GetLastError() == NTE_BAD_DATA, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].buflen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].buflen);
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
|
||||||
|
/* Checking key state */
|
||||||
|
dwLen = cTestData[i].buflen;
|
||||||
|
memcpy(pbData, enc_data, cTestData[i].buflen);
|
||||||
|
result = CryptDecrypt(hKey, 0, TRUE, 0, pbData, &dwLen);
|
||||||
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
ok(dwLen==cTestData[i].enclen,"length incorrect, got %d, expected %d\n",dwLen,cTestData[i].enclen);
|
||||||
|
ok(memcmp(pbData,cTestData[i].decstr,cTestData[1].enclen)==0,"decryption incorrect %d\n",i);
|
||||||
|
if((dwLen != cTestData[i].enclen) ||
|
||||||
|
memcmp(pbData,cTestData[i].decstr,cTestData[i].enclen))
|
||||||
|
{
|
||||||
|
printBytes("expected",cTestData[i].decstr,cTestData[i].strlen);
|
||||||
|
printBytes("got",pbData,dwLen);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
result = CryptDestroyKey(hKey);
|
result = CryptDestroyKey(hKey);
|
||||||
ok(result, "%08x\n", GetLastError());
|
ok(result, "%08x\n", GetLastError());
|
||||||
|
|
Loading…
Reference in New Issue