Zhiyi Zhang
39f96c1fa9
rasenh/tests: Fix a test failure.
...
Signed-off-by: Zhiyi Zhang <zzhang@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2020-01-21 20:55:48 +01:00
Zhiyi Zhang
af605f8b38
rsaenh: Implement RSA OAEP.
...
Implement RSA optimal asymmetric encryption padding according to RFC 8017.
Signed-off-by: Zhiyi Zhang <zzhang@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2018-10-04 09:13:24 -05:00
Michael Stefaniuc
9b0ed6bc31
rsaenh/tests: Use the available ARRAY_SIZE() macro.
...
Signed-off-by: Michael Stefaniuc <mstefani@winehq.org>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2018-05-31 09:25:25 +02:00
Huw Davies
d192e9a199
rsaenh: CALG_AES is not supported.
...
This is the correct fix for what commit f5c687e365
was trying to fix.
Signed-off-by: Huw Davies <huw@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2017-11-16 14:03:07 +01:00
Akihiro Sagawa
e705dfc27f
rsaenh: Don't import a public key to a key container.
...
Signed-off-by: Akihiro Sagawa <sagawa.aki@gmail.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2017-05-01 19:29:14 +02:00
Akihiro Sagawa
b6ca68259f
rsaenh/tests: Add CryptImportKey tests with a public key.
...
Signed-off-by: Akihiro Sagawa <sagawa.aki@gmail.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2017-05-01 19:29:14 +02:00
Huw Davies
0a17b70140
rsaenh/tests: Skip broken TLS1 tests on Windows 8 and greater.
...
Signed-off-by: Huw Davies <huw@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2016-11-08 16:59:10 +01:00
Huw Davies
441fe55a4b
rsaenh/tests: Don't initialize the environment, the tests that follow do that.
...
This also ensures that the permissions tests are actually run.
Signed-off-by: Huw Davies <huw@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2016-11-07 17:49:18 +01:00
Michael Stefaniuc
899207b6c9
rsaenh/tests: Mark an old behavior as broken (PVS-Studio).
...
All newer Windows support salt in their AES provider.
Signed-off-by: Michael Stefaniuc <mstefani@redhat.de>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2015-10-28 22:31:26 +09:00
André Hentschel
86b1e74f5c
rsaenh/tests: Adjust length value to pass on Win 10.
...
Signed-off-by: André Hentschel <nerv@dawncrow.de>
2015-10-02 18:11:31 +09:00
Bruno Jesus
4d43d364e8
rsaenh/tests: Fix a copy & paste issue.
2015-02-18 23:28:00 +09:00
Bruno Jesus
6bad16363b
rsaenh: Don't reset the salt length after setting a salt for Base and Strong providers.
2015-01-13 20:48:42 +01:00
Francois Gouget
0dd5cb1cef
Assorted spelling fixes.
2014-09-29 10:36:36 +02:00
Francois Gouget
3745640790
rsaenh/tests: Add a trailing '\n' to some ok() calls.
2014-08-19 14:48:23 +02:00
Bruno Jesus
d59011a9fb
rsaenh: A 40 bit key on Enhanced provider will not have salt even if asked for.
2014-08-05 16:37:35 +02:00
Bruno Jesus
d7aae7d728
rsaenh: Use the remaining hash data as salt if requested.
2014-08-05 16:37:25 +02:00
Bruno Jesus
fb58e7eca6
rsaenh: Handle the failure to set Base provider effective key length properly.
2014-08-05 16:37:21 +02:00
Bruno Jesus
aa1b5b65c9
rsaenh/tests: Update some tests.
...
Some function results and out parameters were not being tested.
2014-08-05 16:37:11 +02:00
Bruno Jesus
edb5e2b7d5
rsaenh/tests: Add SHA-256 tests.
2014-08-05 16:37:06 +02:00
Bruno Jesus
86dd877f4e
rsaenh: The RC2 algorithm from Base provider supports only 40 bit keys.
2014-08-04 14:24:26 +02:00
Bruno Jesus
d429e602af
rsaenh/tests: Run the tests in the Base and Strong providers too.
2014-07-30 16:17:02 -05:00
Bruno Jesus
f5c687e365
rsaenh: CALG_AES cannot be used if the key length was not specified.
2014-07-23 21:24:23 +02:00
Bruno Jesus
453d6dc105
rsaenh: Change the way AES 128 is derived to match Windows behavior.
2014-07-23 21:24:22 +02:00
Bruno Jesus
e55dc35020
rsaenh: Change the default AES chaining mode to CBC.
2014-07-23 21:24:22 +02:00
Bruno Jesus
0f31d82c04
rsaenh/tests: Add many tests related to key derivation.
2014-07-23 21:24:21 +02:00
Bruno Jesus
7e456b8f25
rsaenh/tests: Fix some Windows 8 tests.
2014-07-21 11:51:23 +02:00
Bruno Jesus
3a7b89e4c0
rsaenh/tests: Simplify broken NT4 tests.
...
Based on Dmitry Timoshkov idea.
2014-07-21 11:50:16 +02:00
Bruno Jesus
3b7c61dc2a
rsaenh/tests: Add a pre XP DES compatibility test.
2014-07-14 17:22:45 +02:00
Bruno Jesus
c579945b98
rsaenh/tests: Add DES/3DES-112 const buffer test.
2014-07-14 17:22:44 +02:00
Bruno Jesus
50ded4b2f8
rsaenh/tests: Make the tests pass in Windows <= NT4.
2014-07-14 17:22:43 +02:00
Bruno Jesus
87f214c7ff
rsaenh/tests: Add more AES encrypt/decrypt tests.
2014-07-01 12:53:04 +02:00
Bruno Jesus
b6efe8c9c1
rsaenh/tests: Add tests for the default encryption chaining mode.
2014-06-30 22:04:52 +02:00
Frédéric Delanoy
0f2bed51bd
Assorted spelling fixes.
2014-02-10 15:47:29 +01:00
Alexandre Julliard
99ef0d6ff0
makefiles: Get rid of the MAKE_TEST_RULES variable.
2014-01-02 12:13:16 +01:00
Frédéric Delanoy
7377aa1683
rsaenh/tests: Use BOOL type where appropriate.
2013-11-25 15:15:53 +01:00
André Hentschel
4a8452dfdb
rsaenh/tests: Fix tests compilation with __WINESRC__ defined.
2013-10-24 10:48:46 +02:00
Nikolay Sivov
bfd2c533be
rsaenh: Fail on unsupported flag values only in CryptHashData().
2013-10-18 11:31:23 +02:00
Michael Stefaniuc
0e681027a2
tests: Compile the tests by default with -D__WINESRC__.
2013-10-02 11:04:02 +02:00
Qian Hong
2d0653e2b2
rsaenh: Restore key state even after decrypting a block of bad data.
2013-07-01 19:51:57 +02:00
Qian Hong
b84e11ecbd
rsaenh/tests: Added more key state tests.
2013-07-01 19:51:47 +02:00
Juan Lang
2d658db553
rsaenh: Infer private exponent length from data length.
2011-11-01 10:43:43 +01:00
Juan Lang
f0e2cba471
rsaenh: Test importing a key with an input buffer that's too small for the key it contains.
2011-11-01 10:43:37 +01:00
David Hedberg
f8755d8422
rsaenh: Don't fail on signature verification if the signed hash lacks the OID.
2011-06-15 20:04:38 +02:00
André Hentschel
e0d712da61
rsaenh/tests: Test the reported length on success.
2011-02-16 14:26:26 +01:00
Juan Lang
8e479f7803
rsaenh: Disallow deriving schannel encryption keys before setting the encryption algorithm.
2011-02-11 17:42:01 +01:00
Juan Lang
ea43c5989c
rsaenh: Disallow creating schannel master hashes before setting the client random and server random.
2011-02-11 17:41:57 +01:00
Juan Lang
b0ae8ca7c7
rsaenh/tests: Test errors creating schannel keys and hashes before parameters are set.
2011-02-11 17:41:51 +01:00
Austin English
13b0e284b3
rsaenh/tests: Make sure to use return values (LLVM/Clang).
2011-02-07 10:10:24 -06:00
Nikolay Sivov
0a46f9b678
rsaenh/tests: Fix a key leak (Valgrind).
2011-01-17 14:29:35 +01:00
Juan Lang
c91afb9733
rsaenh: Add support for CRYPT_IPSEC_HMAC_KEY.
2011-01-14 18:26:17 +01:00