Santino Mazza : ncrypt/tests: Test for NCryptEncrypt with RSA and PKCS1 padding.

Alexandre Julliard julliard at winehq.org
Wed Aug 3 15:31:40 CDT 2022


Module: wine
Branch: master
Commit: 68f6d6ba9e649599412e291b47424497a4ae0622
URL:    https://gitlab.winehq.org/wine/wine/-/commit/68f6d6ba9e649599412e291b47424497a4ae0622

Author: Santino Mazza <mazzasantino1206 at gmail.com>
Date:   Tue Jul 26 19:39:37 2022 -0300

ncrypt/tests: Test for NCryptEncrypt with RSA and PKCS1 padding.

Signed-off-by: Santino Mazza <mazzasantino1206 at gmail.com>

---

 dlls/ncrypt/tests/ncrypt.c | 76 ++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 76 insertions(+)

diff --git a/dlls/ncrypt/tests/ncrypt.c b/dlls/ncrypt/tests/ncrypt.c
index 5808a3bb30a..81b737c9a21 100644
--- a/dlls/ncrypt/tests/ncrypt.c
+++ b/dlls/ncrypt/tests/ncrypt.c
@@ -539,6 +539,81 @@ static void test_NCryptIsAlgSupported(void)
     NCryptFreeObject(prov);
 }
 
+static UCHAR data_to_encrypt[12] = "Hello world";
+
+static void test_NCryptEncrypt(void)
+{
+    NCRYPT_PROV_HANDLE prov;
+    NCRYPT_KEY_HANDLE key;
+    SECURITY_STATUS ret;
+    BYTE *output_a;
+    BYTE *output_b;
+    DWORD output_size;
+
+    todo_wine {
+    NCryptOpenStorageProvider(&prov, NULL, 0);
+    NCryptCreatePersistedKey(prov, &key, BCRYPT_RSA_ALGORITHM, NULL, 0, 0);
+
+    /* Test encrypt with invalid key handle */
+    ret = NCryptEncrypt(prov, data_to_encrypt, sizeof(data_to_encrypt), NULL, NULL, 0,
+                        &output_size, NCRYPT_PAD_PKCS1_FLAG);
+    ok(ret == NTE_INVALID_HANDLE, "got %lx\n", ret);
+
+    /* Test encrypt with a non finalized key */
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, NULL, 0,
+                        &output_size, NCRYPT_PAD_PKCS1_FLAG);
+    ok(ret == NTE_BAD_KEY_STATE, "got %lx\n", ret);
+
+    NCryptFinalizeKey(key, 0);
+
+    /* Test encrypt with invalid flags */
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, NULL, 0,
+                        &output_size, 51342);
+    ok(ret == NTE_BAD_FLAGS, "got %lx\n", ret);
+
+    /* Test no padding with RSA */
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, NULL, 0, &output_size,
+                        NCRYPT_NO_PADDING_FLAG);
+    ok(ret == ERROR_SUCCESS, "got %lx\n", ret);
+    ok(output_size == 128, "got %ld\n", output_size);
+
+    output_a = malloc(output_size);
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, output_a, output_size,
+                        &output_size, NCRYPT_NO_PADDING_FLAG);
+    ok(ret == NTE_INVALID_PARAMETER, "got %lx\n", ret);
+    free(output_a);
+
+    /* Test output RSA with PKCS1. PKCS1 should append a random padding to the data, so the output should be different
+     * with each call. */
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, NULL, 0,
+                        &output_size, NCRYPT_PAD_PKCS1_FLAG);
+    ok(ret == ERROR_SUCCESS, "got %lx\n", ret);
+    ok(output_size == 128, "got %ld\n", output_size);
+
+    output_a = malloc(output_size);
+    output_b = malloc(output_size);
+
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, output_a, 12,
+                        &output_size, NCRYPT_PAD_PKCS1_FLAG);
+    ok(ret == NTE_BUFFER_TOO_SMALL, "got %lx\n", ret);
+
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, output_a, output_size,
+                        &output_size, NCRYPT_PAD_PKCS1_FLAG);
+    ok(ret == ERROR_SUCCESS, "got %lx\n", ret);
+
+    ret = NCryptEncrypt(key, data_to_encrypt, sizeof(data_to_encrypt), NULL, output_b, output_size,
+                        &output_size, NCRYPT_PAD_PKCS1_FLAG);
+    ok(ret == ERROR_SUCCESS, "got %lx\n", ret);
+    ok(memcmp(output_a, output_b, 128), "expected to have different outputs.\n");
+
+    NCryptFreeObject(key);
+    free(output_a);
+    free(output_b);
+
+    NCryptFreeObject(prov);
+    }
+}
+
 START_TEST(ncrypt)
 {
     test_key_import_rsa();
@@ -549,4 +624,5 @@ START_TEST(ncrypt)
     test_finalize_key();
     test_verify_signature();
     test_NCryptIsAlgSupported();
+    test_NCryptEncrypt();
 }




More information about the wine-cvs mailing list