Santino Mazza : bcrypt/tests: Test for BCryptEncrypt with RSA keys.
Alexandre Julliard
julliard at winehq.org
Wed Aug 3 15:31:40 CDT 2022
Module: wine
Branch: master
Commit: 4a395899eabab73c3c5045a17d728e7668225b8f
URL: https://gitlab.winehq.org/wine/wine/-/commit/4a395899eabab73c3c5045a17d728e7668225b8f
Author: Santino Mazza <mazzasantino1206 at gmail.com>
Date: Thu Jul 28 14:10:27 2022 -0300
bcrypt/tests: Test for BCryptEncrypt with RSA keys.
Signed-off-by: Santino Mazza <mazzasantino1206 at gmail.com>
---
dlls/bcrypt/tests/bcrypt.c | 111 +++++++++++++++++++++++++++++++++++++++++++++
include/bcrypt.h | 6 +++
2 files changed, 117 insertions(+)
diff --git a/dlls/bcrypt/tests/bcrypt.c b/dlls/bcrypt/tests/bcrypt.c
index 08ce360cac0..fca7ae4e1ed 100644
--- a/dlls/bcrypt/tests/bcrypt.c
+++ b/dlls/bcrypt/tests/bcrypt.c
@@ -2019,6 +2019,114 @@ static UCHAR rsaPublicBlobWithInvalidPublicExpSize[] =
0x87, 0x75, 0x33, 0x15, 0xb8, 0xde, 0x32, 0x30, 0xb4, 0x5e, 0xfd
};
+static void test_rsa_encrypt(void)
+{
+ static UCHAR input[] = "Hello World!";
+ static UCHAR input_no_padding[64] = { 0 };
+ BCRYPT_ALG_HANDLE rsa = 0;
+ BCRYPT_KEY_HANDLE key = 0;
+ NTSTATUS ret = 0;
+ DWORD encrypted_size = 60;
+ UCHAR *encrypted_a = NULL;
+ UCHAR *encrypted_b = NULL;
+ DWORD decrypted_size = 0;
+ UCHAR *decrypted = NULL;
+ BCRYPT_OAEP_PADDING_INFO oaep_pad;
+ oaep_pad.pszAlgId = BCRYPT_MD5_ALGORITHM;
+ oaep_pad.pbLabel = (PUCHAR)"test";
+ oaep_pad.cbLabel = 5;
+
+ BCryptOpenAlgorithmProvider(&rsa, BCRYPT_RSA_ALGORITHM, NULL, 0);
+ BCryptGenerateKeyPair(rsa, &key, 512, 0);
+
+ todo_wine {
+ /* Not finalized key */
+ ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, NULL, 0, &encrypted_size, 0);
+ ok(ret == STATUS_INVALID_HANDLE, "got %lx\n", ret);
+
+ BCryptFinalizeKeyPair(key, 0);
+
+ /* No padding */
+ memset(input_no_padding, 0, sizeof(input_no_padding));
+ strcpy((char *)input_no_padding, "Hello World");
+ ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, NULL, 0, &encrypted_size, BCRYPT_PAD_NONE);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ok(encrypted_size == 64, "got size of %ld\n", encrypted_size);
+
+ encrypted_a = malloc(encrypted_size);
+ memset(encrypted_a, 0, encrypted_size);
+ encrypted_b = malloc(encrypted_size);
+ memset(encrypted_b, 0xff, encrypted_size);
+
+ ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_NONE);
+ ok(ret == STATUS_INVALID_PARAMETER, "got %lx\n", ret);
+
+ ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, encrypted_a, 12, &encrypted_size, BCRYPT_PAD_NONE);
+ ok(ret == STATUS_BUFFER_TOO_SMALL, "got %lx\n", ret);
+
+ ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_NONE);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, encrypted_b, encrypted_size, &encrypted_size, BCRYPT_PAD_NONE);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ok(!memcmp(encrypted_a, encrypted_b, encrypted_size), "Both outputs should be the same\n");
+
+ BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, NULL, 0, &decrypted_size, BCRYPT_PAD_NONE);
+ decrypted = malloc(decrypted_size);
+ BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, decrypted, decrypted_size, &decrypted_size, BCRYPT_PAD_NONE);
+ ok(!memcmp(decrypted, input_no_padding, sizeof(input_no_padding)), "Decrypted output it's not what expected\n");
+ free(decrypted);
+
+ encrypted_size = 60;
+ /* PKCS1 Padding */
+ ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, NULL, 0, &encrypted_size, BCRYPT_PAD_PKCS1);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ok(encrypted_size == 64, "got size of %ld\n", encrypted_size);
+
+ encrypted_a = realloc(encrypted_a, encrypted_size);
+ memset(encrypted_a, 0, encrypted_size);
+ encrypted_b = realloc(encrypted_b, encrypted_size);
+ memset(encrypted_b, 0, encrypted_size);
+
+ ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_PKCS1);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, encrypted_b, encrypted_size, &encrypted_size, BCRYPT_PAD_PKCS1);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ok(memcmp(encrypted_a, encrypted_b, encrypted_size), "Both outputs are the same\n");
+
+ BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, NULL, 0, &decrypted_size, BCRYPT_PAD_PKCS1);
+ decrypted = malloc(decrypted_size);
+ BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, decrypted, decrypted_size, &decrypted_size, BCRYPT_PAD_PKCS1);
+ ok(!memcmp(decrypted, input, sizeof(input)), "Decrypted output it's not what expected\n");
+ free(decrypted);
+
+ encrypted_size = 60;
+ /* OAEP Padding */
+ ret = BCryptEncrypt(key, input, sizeof(input), &oaep_pad, NULL, 0, NULL, 0, &encrypted_size, BCRYPT_PAD_OAEP);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ok(encrypted_size == 64, "got size of %ld\n", encrypted_size);
+
+ encrypted_a = realloc(encrypted_a, encrypted_size);
+ memset(encrypted_a, 0, encrypted_size);
+ encrypted_b = realloc(encrypted_b, encrypted_size);
+ memset(encrypted_b, 0, encrypted_size);
+
+ ret = BCryptEncrypt(key, input, sizeof(input), &oaep_pad, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_OAEP);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ret = BCryptEncrypt(key, input, sizeof(input), &oaep_pad, NULL, 0, encrypted_b, encrypted_size, &encrypted_size, BCRYPT_PAD_OAEP);
+ ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+ ok(memcmp(encrypted_a, encrypted_b, encrypted_size), "Both outputs are the same\n");
+
+ BCryptDecrypt(key, encrypted_a, encrypted_size, &oaep_pad, NULL, 0, NULL, 0, &decrypted_size, BCRYPT_PAD_OAEP);
+ decrypted = malloc(decrypted_size);
+ BCryptDecrypt(key, encrypted_a, encrypted_size, &oaep_pad, NULL, 0, decrypted, decrypted_size, &decrypted_size, BCRYPT_PAD_OAEP);
+ ok(!memcmp(decrypted, input, sizeof(input)), "Decrypted output it's not what expected\n");
+ }
+ free(decrypted);
+
+ free(encrypted_a);
+ free(encrypted_b);
+}
+
static void test_RSA(void)
{
static UCHAR hash[] =
@@ -2202,6 +2310,9 @@ static void test_RSA(void)
ret = BCryptCloseAlgorithmProvider(alg, 0);
ok(!ret, "got %#lx\n", ret);
+
+ /* RSA encryption */
+ test_rsa_encrypt();
}
static void test_RSA_SIGN(void)
diff --git a/include/bcrypt.h b/include/bcrypt.h
index fbfb5099c09..fd660c1843c 100644
--- a/include/bcrypt.h
+++ b/include/bcrypt.h
@@ -284,6 +284,12 @@ typedef struct _BCRYPT_PKCS1_PADDING_INFO
LPCWSTR pszAlgId;
} BCRYPT_PKCS1_PADDING_INFO;
+typedef struct _BCRYPT_OAEP_PADDING_INFO {
+ LPCWSTR pszAlgId;
+ PUCHAR pbLabel;
+ ULONG cbLabel;
+} BCRYPT_OAEP_PADDING_INFO;
+
#define BCRYPT_PAD_NONE 0x00000001
#define BCRYPT_PAD_PKCS1 0x00000002
#define BCRYPT_PAD_OAEP 0x00000004
More information about the wine-cvs
mailing list