229 lines
7.7 KiB
C
229 lines
7.7 KiB
C
/*
|
|
* Unit test suite for crypt32.dll's CryptProtectData/CryptUnprotectData
|
|
*
|
|
* Copyright 2005 Kees Cook <kees@outflux.net>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdarg.h>
|
|
#include <windef.h>
|
|
#include <winbase.h>
|
|
#include <winerror.h>
|
|
#include <wincrypt.h>
|
|
|
|
#include "wine/test.h"
|
|
|
|
static char secret[] = "I am a super secret string that no one can see!";
|
|
static char secret2[] = "I am a super secret string indescribable string";
|
|
static char key[] = "Wibble wibble wibble";
|
|
static BOOL protected = FALSE; /* if true, the unprotect tests can run */
|
|
static DATA_BLOB cipher;
|
|
static DATA_BLOB cipher_entropy;
|
|
static DATA_BLOB cipher_no_desc;
|
|
|
|
static void test_cryptprotectdata(void)
|
|
{
|
|
LONG r;
|
|
DATA_BLOB plain;
|
|
DATA_BLOB entropy;
|
|
|
|
plain.pbData=(void*)secret;
|
|
plain.cbData=strlen(secret)+1;
|
|
|
|
entropy.pbData=(void*)key;
|
|
entropy.cbData=strlen(key)+1;
|
|
|
|
SetLastError(0xDEADBEEF);
|
|
protected = CryptProtectData(NULL, L"Ultra secret test message", NULL, NULL, NULL, 0, &cipher);
|
|
ok(!protected, "Encrypting without plain data source.\n");
|
|
r = GetLastError();
|
|
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
|
|
|
|
SetLastError(0xDEADBEEF);
|
|
protected = CryptProtectData(&plain, L"Ultra secret test message", NULL, NULL, NULL, 0, NULL);
|
|
ok(!protected, "Encrypting without cipher destination.\n");
|
|
r = GetLastError();
|
|
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
|
|
|
|
cipher.pbData=NULL;
|
|
cipher.cbData=0;
|
|
|
|
/* without entropy */
|
|
SetLastError(0xDEADBEEF);
|
|
protected = CryptProtectData(&plain, L"Ultra secret test message", NULL, NULL, NULL, 0, &cipher);
|
|
ok(protected, "Encrypting without entropy.\n");
|
|
if (protected)
|
|
{
|
|
r = GetLastError();
|
|
ok(r == ERROR_SUCCESS, "Expected ERROR_SUCCESS, got %ld\n",r);
|
|
}
|
|
|
|
cipher_entropy.pbData=NULL;
|
|
cipher_entropy.cbData=0;
|
|
|
|
/* with entropy */
|
|
SetLastError(0xDEADBEEF);
|
|
protected = CryptProtectData(&plain, L"Ultra secret test message", &entropy, NULL, NULL, 0, &cipher_entropy);
|
|
ok(protected, "Encrypting with entropy.\n");
|
|
|
|
cipher_no_desc.pbData=NULL;
|
|
cipher_no_desc.cbData=0;
|
|
|
|
/* with entropy but no description */
|
|
plain.pbData=(void*)secret2;
|
|
plain.cbData=strlen(secret2)+1;
|
|
SetLastError(0xDEADBEEF);
|
|
protected = CryptProtectData(&plain,NULL,&entropy,NULL,NULL,0,&cipher_no_desc);
|
|
ok(protected, "Encrypting with entropy.\n");
|
|
}
|
|
|
|
static void test_cryptunprotectdata(void)
|
|
{
|
|
LONG r;
|
|
DATA_BLOB plain;
|
|
DATA_BLOB entropy;
|
|
BOOL okay;
|
|
WCHAR * data_desc;
|
|
|
|
entropy.pbData=(void*)key;
|
|
entropy.cbData=strlen(key)+1;
|
|
|
|
plain.pbData=NULL;
|
|
plain.cbData=0;
|
|
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(&cipher,NULL,NULL,NULL,NULL,0,NULL);
|
|
ok(!okay,"Decrypting without destination\n");
|
|
r = GetLastError();
|
|
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
|
|
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(NULL,NULL,NULL,NULL,NULL,0,&plain);
|
|
ok(!okay,"Decrypting without source\n");
|
|
r = GetLastError();
|
|
ok(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
|
|
|
|
plain.pbData=NULL;
|
|
plain.cbData=0;
|
|
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(&cipher_entropy,NULL,NULL,NULL,NULL,0,&plain);
|
|
ok(!okay,"Decrypting without needed entropy\n");
|
|
r = GetLastError();
|
|
ok(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n", r);
|
|
|
|
plain.pbData=NULL;
|
|
plain.cbData=0;
|
|
data_desc=NULL;
|
|
|
|
/* without entropy */
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(&cipher,&data_desc,NULL,NULL,NULL,0,&plain);
|
|
ok(okay,"Decrypting without entropy\n");
|
|
|
|
ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
|
|
ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
|
|
ok(!strcmp((const char*)plain.pbData,secret),"Plain does not match secret\n");
|
|
ok(data_desc!=NULL,"Description not allocated\n");
|
|
ok(!lstrcmpW(data_desc, L"Ultra secret test message"),"Description does not match\n");
|
|
|
|
LocalFree(plain.pbData);
|
|
LocalFree(data_desc);
|
|
|
|
plain.pbData=NULL;
|
|
plain.cbData=0;
|
|
data_desc=NULL;
|
|
|
|
/* with wrong entropy */
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(&cipher_entropy,&data_desc,&cipher_entropy,NULL,NULL,0,&plain);
|
|
ok(!okay,"Decrypting with wrong entropy\n");
|
|
r = GetLastError();
|
|
ok(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n",r);
|
|
|
|
/* with entropy */
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(&cipher_entropy,&data_desc,&entropy,NULL,NULL,0,&plain);
|
|
ok(okay,"Decrypting with entropy\n");
|
|
|
|
ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
|
|
ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
|
|
ok(!strcmp((const char*)plain.pbData,secret),"Plain does not match secret\n");
|
|
ok(data_desc!=NULL,"Description not allocated\n");
|
|
ok(!lstrcmpW(data_desc, L"Ultra secret test message"),"Description does not match\n");
|
|
|
|
LocalFree(plain.pbData);
|
|
LocalFree(data_desc);
|
|
|
|
plain.pbData=NULL;
|
|
plain.cbData=0;
|
|
data_desc=NULL;
|
|
|
|
/* with entropy but no description */
|
|
SetLastError(0xDEADBEEF);
|
|
okay = CryptUnprotectData(&cipher_no_desc,&data_desc,&entropy,NULL,NULL,0,&plain);
|
|
ok(okay,"Decrypting with entropy and no description\n");
|
|
|
|
ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
|
|
ok(plain.cbData==strlen(secret2)+1,"Plain DATA_BLOB wrong length\n");
|
|
ok(!strcmp((const char*)plain.pbData,secret2),"Plain does not match secret\n");
|
|
ok(data_desc!=NULL,"Description not allocated\n");
|
|
ok(data_desc[0]=='\0',"Description not empty\n");
|
|
|
|
LocalFree(data_desc);
|
|
LocalFree(plain.pbData);
|
|
|
|
plain.pbData=NULL;
|
|
plain.cbData=0;
|
|
}
|
|
|
|
static void test_simpleroundtrip(const char *plaintext)
|
|
{
|
|
DATA_BLOB input;
|
|
DATA_BLOB encrypted;
|
|
DATA_BLOB output;
|
|
int res;
|
|
WCHAR emptyW[1];
|
|
|
|
emptyW[0] = 0;
|
|
input.pbData = (unsigned char *)plaintext;
|
|
input.cbData = strlen(plaintext);
|
|
res = CryptProtectData(&input, emptyW, NULL, NULL, NULL, 0, &encrypted);
|
|
ok(res != 0, "can't protect\n");
|
|
|
|
res = CryptUnprotectData(&encrypted, NULL, NULL, NULL, NULL, 0, &output);
|
|
ok(res != 0, "can't unprotect; last error %lu\n", GetLastError());
|
|
ok(output.cbData == strlen(plaintext), "output wrong length %ld for input '%s', wanted %d\n", output.cbData, plaintext, lstrlenA(plaintext));
|
|
ok(!memcmp(plaintext, (char *)output.pbData, output.cbData), "output wrong contents for input '%s'\n", plaintext);
|
|
LocalFree(output.pbData);
|
|
LocalFree(encrypted.pbData);
|
|
}
|
|
|
|
START_TEST(protectdata)
|
|
{
|
|
protected = FALSE;
|
|
test_cryptprotectdata();
|
|
test_cryptunprotectdata();
|
|
test_simpleroundtrip("");
|
|
test_simpleroundtrip("hello");
|
|
|
|
/* deinit globals here */
|
|
if (cipher.pbData) LocalFree(cipher.pbData);
|
|
if (cipher_entropy.pbData) LocalFree(cipher_entropy.pbData);
|
|
if (cipher_no_desc.pbData) LocalFree(cipher_no_desc.pbData);
|
|
}
|