/* * Unit test suite for crypt32.dll's CryptProtectData/CryptUnprotectData * * Copyright 2005 Kees Cook * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #include #include #include #include #include #include #include "wine/test.h" static const char * secret = "I am a super secret string that no one can see!"; static const char * secret2 = "I am a super secret string indescribable string"; static const char * key = "Wibble wibble wibble"; static const WCHAR desc[] = {'U','l','t','r','a',' ','s','e','c','r','e','t',' ','t','e','s','t',' ','m','e','s','s','a','g','e',0}; static BOOL protected = FALSE; /* if true, the unprotect tests can run */ static DATA_BLOB cipher; static DATA_BLOB cipher_entropy; static DATA_BLOB cipher_no_desc; static void test_cryptprotectdata(void) { LONG r; DATA_BLOB plain; DATA_BLOB entropy; plain.pbData=(void*)secret; plain.cbData=strlen(secret)+1; entropy.pbData=(void*)key; entropy.cbData=strlen(key)+1; SetLastError(0xDEADBEEF); protected = CryptProtectData(NULL,desc,NULL,NULL,NULL,0,&cipher); ok(!protected, "Encrypting without plain data source.\n"); r = GetLastError(); ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r); SetLastError(0xDEADBEEF); protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,NULL); ok(!protected, "Encrypting without cipher destination.\n"); r = GetLastError(); ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r); cipher.pbData=NULL; cipher.cbData=0; /* without entropy */ SetLastError(0xDEADBEEF); protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,&cipher); ok(protected, "Encrypting without entropy.\n"); r = GetLastError(); ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r); cipher_entropy.pbData=NULL; cipher_entropy.cbData=0; /* with entropy */ SetLastError(0xDEADBEEF); protected = CryptProtectData(&plain,desc,&entropy,NULL,NULL,0,&cipher_entropy); ok(protected, "Encrypting with entropy.\n"); r = GetLastError(); ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r); cipher_no_desc.pbData=NULL; cipher_no_desc.cbData=0; /* with entropy but no description */ plain.pbData=(void*)secret2; plain.cbData=strlen(secret2)+1; SetLastError(0xDEADBEEF); protected = CryptProtectData(&plain,NULL,&entropy,NULL,NULL,0,&cipher_no_desc); ok(protected, "Encrypting with entropy and no description.\n"); r = GetLastError(); ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r); } static void test_cryptunprotectdata(void) { LONG r; DATA_BLOB plain; DATA_BLOB entropy; BOOL okay; WCHAR * data_desc; entropy.pbData=(void*)key; entropy.cbData=strlen(key)+1; ok(protected, "CryptProtectData failed to run, so I can't test its output\n"); if (!protected) return; plain.pbData=NULL; plain.cbData=0; SetLastError(0xDEADBEEF); okay = CryptUnprotectData(&cipher,NULL,NULL,NULL,NULL,0,NULL); ok(!okay,"Decrypting without destination\n"); r = GetLastError(); ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r); SetLastError(0xDEADBEEF); okay = CryptUnprotectData(NULL,NULL,NULL,NULL,NULL,0,&plain); ok(!okay,"Decrypting without source\n"); r = GetLastError(); ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r); plain.pbData=NULL; plain.cbData=0; SetLastError(0xDEADBEEF); okay = CryptUnprotectData(&cipher_entropy,NULL,NULL,NULL,NULL,0,&plain); ok(!okay,"Decrypting without needed entropy\n"); r = GetLastError(); ok(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n", r); plain.pbData=NULL; plain.cbData=0; data_desc=NULL; /* without entropy */ SetLastError(0xDEADBEEF); okay = CryptUnprotectData(&cipher,&data_desc,NULL,NULL,NULL,0,&plain); ok(okay,"Decrypting without entropy\n"); r = GetLastError(); ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r); ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n"); ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n"); ok(!strcmp((const char*)plain.pbData,secret),"Plain does not match secret\n"); ok(data_desc!=NULL,"Description not allocated\n"); ok(!lstrcmpW(data_desc,desc),"Description does not match\n"); LocalFree(plain.pbData); LocalFree(data_desc); plain.pbData=NULL; plain.cbData=0; data_desc=NULL; /* with wrong entropy */ SetLastError(0xDEADBEEF); okay = CryptUnprotectData(&cipher_entropy,&data_desc,&cipher_entropy,NULL,NULL,0,&plain); ok(!okay,"Decrypting with wrong entropy\n"); r = GetLastError(); ok(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n",r); /* with entropy */ SetLastError(0xDEADBEEF); okay = CryptUnprotectData(&cipher_entropy,&data_desc,&entropy,NULL,NULL,0,&plain); ok(okay,"Decrypting with entropy\n"); r = GetLastError(); ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r); ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n"); ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n"); ok(!strcmp((const char*)plain.pbData,secret),"Plain does not match secret\n"); ok(data_desc!=NULL,"Description not allocated\n"); ok(!lstrcmpW(data_desc,desc),"Description does not match\n"); LocalFree(plain.pbData); LocalFree(data_desc); plain.pbData=NULL; plain.cbData=0; data_desc=NULL; /* with entropy but no description */ SetLastError(0xDEADBEEF); okay = CryptUnprotectData(&cipher_no_desc,&data_desc,&entropy,NULL,NULL,0,&plain); ok(okay,"Decrypting with entropy and no description\n"); r = GetLastError(); ok(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r); ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n"); ok(plain.cbData==strlen(secret2)+1,"Plain DATA_BLOB wrong length\n"); ok(!strcmp((const char*)plain.pbData,secret2),"Plain does not match secret\n"); ok(data_desc!=NULL,"Description not allocated\n"); ok(data_desc[0]=='\0',"Description not empty\n"); LocalFree(plain.pbData); plain.pbData=NULL; plain.cbData=0; } START_TEST(protectdata) { protected=FALSE; test_cryptprotectdata(); test_cryptunprotectdata(); /* deinit globals here */ if (cipher.pbData) LocalFree(cipher.pbData); if (cipher_entropy.pbData) LocalFree(cipher_entropy.pbData); if (cipher_no_desc.pbData) LocalFree(cipher_no_desc.pbData); }