Commit Graph

154 Commits

Author SHA1 Message Date
Zhiyi Zhang 39f96c1fa9 rasenh/tests: Fix a test failure.
Signed-off-by: Zhiyi Zhang <zzhang@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2020-01-21 20:55:48 +01:00
Zhiyi Zhang af605f8b38 rsaenh: Implement RSA OAEP.
Implement RSA optimal asymmetric encryption padding according to RFC 8017.

Signed-off-by: Zhiyi Zhang <zzhang@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2018-10-04 09:13:24 -05:00
Michael Stefaniuc 9b0ed6bc31 rsaenh/tests: Use the available ARRAY_SIZE() macro.
Signed-off-by: Michael Stefaniuc <mstefani@winehq.org>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2018-05-31 09:25:25 +02:00
Huw Davies d192e9a199 rsaenh: CALG_AES is not supported.
This is the correct fix for what commit f5c687e365
was trying to fix.

Signed-off-by: Huw Davies <huw@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2017-11-16 14:03:07 +01:00
Akihiro Sagawa e705dfc27f rsaenh: Don't import a public key to a key container.
Signed-off-by: Akihiro Sagawa <sagawa.aki@gmail.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2017-05-01 19:29:14 +02:00
Akihiro Sagawa b6ca68259f rsaenh/tests: Add CryptImportKey tests with a public key.
Signed-off-by: Akihiro Sagawa <sagawa.aki@gmail.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2017-05-01 19:29:14 +02:00
Huw Davies 0a17b70140 rsaenh/tests: Skip broken TLS1 tests on Windows 8 and greater.
Signed-off-by: Huw Davies <huw@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2016-11-08 16:59:10 +01:00
Huw Davies 441fe55a4b rsaenh/tests: Don't initialize the environment, the tests that follow do that.
This also ensures that the permissions tests are actually run.

Signed-off-by: Huw Davies <huw@codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2016-11-07 17:49:18 +01:00
Michael Stefaniuc 899207b6c9 rsaenh/tests: Mark an old behavior as broken (PVS-Studio).
All newer Windows support salt in their AES provider.

Signed-off-by: Michael Stefaniuc <mstefani@redhat.de>
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
2015-10-28 22:31:26 +09:00
André Hentschel 86b1e74f5c rsaenh/tests: Adjust length value to pass on Win 10.
Signed-off-by: André Hentschel <nerv@dawncrow.de>
2015-10-02 18:11:31 +09:00
Bruno Jesus 4d43d364e8 rsaenh/tests: Fix a copy & paste issue. 2015-02-18 23:28:00 +09:00
Bruno Jesus 6bad16363b rsaenh: Don't reset the salt length after setting a salt for Base and Strong providers. 2015-01-13 20:48:42 +01:00
Francois Gouget 0dd5cb1cef Assorted spelling fixes. 2014-09-29 10:36:36 +02:00
Francois Gouget 3745640790 rsaenh/tests: Add a trailing '\n' to some ok() calls. 2014-08-19 14:48:23 +02:00
Bruno Jesus d59011a9fb rsaenh: A 40 bit key on Enhanced provider will not have salt even if asked for. 2014-08-05 16:37:35 +02:00
Bruno Jesus d7aae7d728 rsaenh: Use the remaining hash data as salt if requested. 2014-08-05 16:37:25 +02:00
Bruno Jesus fb58e7eca6 rsaenh: Handle the failure to set Base provider effective key length properly. 2014-08-05 16:37:21 +02:00
Bruno Jesus aa1b5b65c9 rsaenh/tests: Update some tests.
Some function results and out parameters were not being tested.
2014-08-05 16:37:11 +02:00
Bruno Jesus edb5e2b7d5 rsaenh/tests: Add SHA-256 tests. 2014-08-05 16:37:06 +02:00
Bruno Jesus 86dd877f4e rsaenh: The RC2 algorithm from Base provider supports only 40 bit keys. 2014-08-04 14:24:26 +02:00
Bruno Jesus d429e602af rsaenh/tests: Run the tests in the Base and Strong providers too. 2014-07-30 16:17:02 -05:00
Bruno Jesus f5c687e365 rsaenh: CALG_AES cannot be used if the key length was not specified. 2014-07-23 21:24:23 +02:00
Bruno Jesus 453d6dc105 rsaenh: Change the way AES 128 is derived to match Windows behavior. 2014-07-23 21:24:22 +02:00
Bruno Jesus e55dc35020 rsaenh: Change the default AES chaining mode to CBC. 2014-07-23 21:24:22 +02:00
Bruno Jesus 0f31d82c04 rsaenh/tests: Add many tests related to key derivation. 2014-07-23 21:24:21 +02:00
Bruno Jesus 7e456b8f25 rsaenh/tests: Fix some Windows 8 tests. 2014-07-21 11:51:23 +02:00
Bruno Jesus 3a7b89e4c0 rsaenh/tests: Simplify broken NT4 tests.
Based on Dmitry Timoshkov idea.
2014-07-21 11:50:16 +02:00
Bruno Jesus 3b7c61dc2a rsaenh/tests: Add a pre XP DES compatibility test. 2014-07-14 17:22:45 +02:00
Bruno Jesus c579945b98 rsaenh/tests: Add DES/3DES-112 const buffer test. 2014-07-14 17:22:44 +02:00
Bruno Jesus 50ded4b2f8 rsaenh/tests: Make the tests pass in Windows <= NT4. 2014-07-14 17:22:43 +02:00
Bruno Jesus 87f214c7ff rsaenh/tests: Add more AES encrypt/decrypt tests. 2014-07-01 12:53:04 +02:00
Bruno Jesus b6efe8c9c1 rsaenh/tests: Add tests for the default encryption chaining mode. 2014-06-30 22:04:52 +02:00
Frédéric Delanoy 0f2bed51bd Assorted spelling fixes. 2014-02-10 15:47:29 +01:00
Alexandre Julliard 99ef0d6ff0 makefiles: Get rid of the MAKE_TEST_RULES variable. 2014-01-02 12:13:16 +01:00
Frédéric Delanoy 7377aa1683 rsaenh/tests: Use BOOL type where appropriate. 2013-11-25 15:15:53 +01:00
André Hentschel 4a8452dfdb rsaenh/tests: Fix tests compilation with __WINESRC__ defined. 2013-10-24 10:48:46 +02:00
Nikolay Sivov bfd2c533be rsaenh: Fail on unsupported flag values only in CryptHashData(). 2013-10-18 11:31:23 +02:00
Michael Stefaniuc 0e681027a2 tests: Compile the tests by default with -D__WINESRC__. 2013-10-02 11:04:02 +02:00
Qian Hong 2d0653e2b2 rsaenh: Restore key state even after decrypting a block of bad data. 2013-07-01 19:51:57 +02:00
Qian Hong b84e11ecbd rsaenh/tests: Added more key state tests. 2013-07-01 19:51:47 +02:00
Juan Lang 2d658db553 rsaenh: Infer private exponent length from data length. 2011-11-01 10:43:43 +01:00
Juan Lang f0e2cba471 rsaenh: Test importing a key with an input buffer that's too small for the key it contains. 2011-11-01 10:43:37 +01:00
David Hedberg f8755d8422 rsaenh: Don't fail on signature verification if the signed hash lacks the OID. 2011-06-15 20:04:38 +02:00
André Hentschel e0d712da61 rsaenh/tests: Test the reported length on success. 2011-02-16 14:26:26 +01:00
Juan Lang 8e479f7803 rsaenh: Disallow deriving schannel encryption keys before setting the encryption algorithm. 2011-02-11 17:42:01 +01:00
Juan Lang ea43c5989c rsaenh: Disallow creating schannel master hashes before setting the client random and server random. 2011-02-11 17:41:57 +01:00
Juan Lang b0ae8ca7c7 rsaenh/tests: Test errors creating schannel keys and hashes before parameters are set. 2011-02-11 17:41:51 +01:00
Austin English 13b0e284b3 rsaenh/tests: Make sure to use return values (LLVM/Clang). 2011-02-07 10:10:24 -06:00
Nikolay Sivov 0a46f9b678 rsaenh/tests: Fix a key leak (Valgrind). 2011-01-17 14:29:35 +01:00
Juan Lang c91afb9733 rsaenh: Add support for CRYPT_IPSEC_HMAC_KEY. 2011-01-14 18:26:17 +01:00