Santino Mazza : bcrypt/tests: Test for BCryptEncrypt with RSA keys.

Alexandre Julliard julliard at winehq.org
Wed Aug 3 15:31:40 CDT 2022


Module: wine
Branch: master
Commit: 4a395899eabab73c3c5045a17d728e7668225b8f
URL:    https://gitlab.winehq.org/wine/wine/-/commit/4a395899eabab73c3c5045a17d728e7668225b8f

Author: Santino Mazza <mazzasantino1206 at gmail.com>
Date:   Thu Jul 28 14:10:27 2022 -0300

bcrypt/tests: Test for BCryptEncrypt with RSA keys.

Signed-off-by: Santino Mazza <mazzasantino1206 at gmail.com>

---

 dlls/bcrypt/tests/bcrypt.c | 111 +++++++++++++++++++++++++++++++++++++++++++++
 include/bcrypt.h           |   6 +++
 2 files changed, 117 insertions(+)

diff --git a/dlls/bcrypt/tests/bcrypt.c b/dlls/bcrypt/tests/bcrypt.c
index 08ce360cac0..fca7ae4e1ed 100644
--- a/dlls/bcrypt/tests/bcrypt.c
+++ b/dlls/bcrypt/tests/bcrypt.c
@@ -2019,6 +2019,114 @@ static UCHAR rsaPublicBlobWithInvalidPublicExpSize[] =
     0x87, 0x75, 0x33, 0x15, 0xb8, 0xde, 0x32, 0x30, 0xb4, 0x5e, 0xfd
 };
 
+static void test_rsa_encrypt(void)
+{
+    static UCHAR input[] = "Hello World!";
+    static UCHAR input_no_padding[64] = { 0 };
+    BCRYPT_ALG_HANDLE rsa = 0;
+    BCRYPT_KEY_HANDLE key = 0;
+    NTSTATUS ret = 0;
+    DWORD encrypted_size = 60;
+    UCHAR *encrypted_a = NULL;
+    UCHAR *encrypted_b = NULL;
+    DWORD decrypted_size = 0;
+    UCHAR *decrypted = NULL;
+    BCRYPT_OAEP_PADDING_INFO oaep_pad;
+    oaep_pad.pszAlgId = BCRYPT_MD5_ALGORITHM;
+    oaep_pad.pbLabel = (PUCHAR)"test";
+    oaep_pad.cbLabel = 5;
+
+    BCryptOpenAlgorithmProvider(&rsa, BCRYPT_RSA_ALGORITHM, NULL, 0);
+    BCryptGenerateKeyPair(rsa, &key, 512, 0);
+
+    todo_wine {
+    /* Not finalized key */
+    ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, NULL, 0, &encrypted_size, 0);
+    ok(ret == STATUS_INVALID_HANDLE, "got %lx\n", ret);
+
+    BCryptFinalizeKeyPair(key, 0);
+
+    /*   No padding    */
+    memset(input_no_padding, 0, sizeof(input_no_padding));
+    strcpy((char *)input_no_padding, "Hello World");
+    ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, NULL, 0, &encrypted_size, BCRYPT_PAD_NONE);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ok(encrypted_size == 64, "got size of %ld\n", encrypted_size);
+
+    encrypted_a = malloc(encrypted_size);
+    memset(encrypted_a, 0, encrypted_size);
+    encrypted_b = malloc(encrypted_size);
+    memset(encrypted_b, 0xff, encrypted_size);
+
+    ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_NONE);
+    ok(ret == STATUS_INVALID_PARAMETER, "got %lx\n", ret);
+
+    ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, encrypted_a, 12, &encrypted_size, BCRYPT_PAD_NONE);
+    ok(ret == STATUS_BUFFER_TOO_SMALL, "got %lx\n", ret);
+
+    ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_NONE);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ret = BCryptEncrypt(key, input_no_padding, sizeof(input_no_padding), NULL, NULL, 0, encrypted_b, encrypted_size, &encrypted_size, BCRYPT_PAD_NONE);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ok(!memcmp(encrypted_a, encrypted_b, encrypted_size), "Both outputs should be the same\n");
+
+    BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, NULL, 0, &decrypted_size, BCRYPT_PAD_NONE);
+    decrypted = malloc(decrypted_size);
+    BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, decrypted, decrypted_size, &decrypted_size, BCRYPT_PAD_NONE);
+    ok(!memcmp(decrypted, input_no_padding, sizeof(input_no_padding)), "Decrypted output it's not what expected\n");
+    free(decrypted);
+
+    encrypted_size = 60;
+    /*  PKCS1 Padding  */
+    ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, NULL, 0, &encrypted_size, BCRYPT_PAD_PKCS1);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ok(encrypted_size == 64, "got size of %ld\n", encrypted_size);
+
+    encrypted_a = realloc(encrypted_a, encrypted_size);
+    memset(encrypted_a, 0, encrypted_size);
+    encrypted_b = realloc(encrypted_b, encrypted_size);
+    memset(encrypted_b, 0, encrypted_size);
+
+    ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_PKCS1);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ret = BCryptEncrypt(key, input, sizeof(input), NULL, NULL, 0, encrypted_b, encrypted_size, &encrypted_size, BCRYPT_PAD_PKCS1);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ok(memcmp(encrypted_a, encrypted_b, encrypted_size), "Both outputs are the same\n");
+
+    BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, NULL, 0, &decrypted_size, BCRYPT_PAD_PKCS1);
+    decrypted = malloc(decrypted_size);
+    BCryptDecrypt(key, encrypted_a, encrypted_size, NULL, NULL, 0, decrypted, decrypted_size, &decrypted_size, BCRYPT_PAD_PKCS1);
+    ok(!memcmp(decrypted, input, sizeof(input)), "Decrypted output it's not what expected\n");
+    free(decrypted);
+
+    encrypted_size = 60;
+    /*  OAEP Padding  */
+    ret = BCryptEncrypt(key, input, sizeof(input), &oaep_pad, NULL, 0, NULL, 0, &encrypted_size, BCRYPT_PAD_OAEP);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ok(encrypted_size == 64, "got size of %ld\n", encrypted_size);
+
+    encrypted_a = realloc(encrypted_a, encrypted_size);
+    memset(encrypted_a, 0, encrypted_size);
+    encrypted_b = realloc(encrypted_b, encrypted_size);
+    memset(encrypted_b, 0, encrypted_size);
+
+    ret = BCryptEncrypt(key, input, sizeof(input), &oaep_pad, NULL, 0, encrypted_a, encrypted_size, &encrypted_size, BCRYPT_PAD_OAEP);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ret = BCryptEncrypt(key, input, sizeof(input), &oaep_pad, NULL, 0, encrypted_b, encrypted_size, &encrypted_size, BCRYPT_PAD_OAEP);
+    ok(ret == STATUS_SUCCESS, "got %lx\n", ret);
+    ok(memcmp(encrypted_a, encrypted_b, encrypted_size), "Both outputs are the same\n");
+
+    BCryptDecrypt(key, encrypted_a, encrypted_size, &oaep_pad, NULL, 0, NULL, 0, &decrypted_size, BCRYPT_PAD_OAEP);
+    decrypted = malloc(decrypted_size);
+    BCryptDecrypt(key, encrypted_a, encrypted_size, &oaep_pad, NULL, 0, decrypted, decrypted_size, &decrypted_size, BCRYPT_PAD_OAEP);
+    ok(!memcmp(decrypted, input, sizeof(input)), "Decrypted output it's not what expected\n");
+    }
+    free(decrypted);
+
+    free(encrypted_a);
+    free(encrypted_b);
+}
+
 static void test_RSA(void)
 {
     static UCHAR hash[] =
@@ -2202,6 +2310,9 @@ static void test_RSA(void)
 
     ret = BCryptCloseAlgorithmProvider(alg, 0);
     ok(!ret, "got %#lx\n", ret);
+
+    /* RSA encryption */
+    test_rsa_encrypt();
 }
 
 static void test_RSA_SIGN(void)
diff --git a/include/bcrypt.h b/include/bcrypt.h
index fbfb5099c09..fd660c1843c 100644
--- a/include/bcrypt.h
+++ b/include/bcrypt.h
@@ -284,6 +284,12 @@ typedef struct _BCRYPT_PKCS1_PADDING_INFO
     LPCWSTR pszAlgId;
 } BCRYPT_PKCS1_PADDING_INFO;
 
+typedef struct _BCRYPT_OAEP_PADDING_INFO {
+    LPCWSTR pszAlgId;
+    PUCHAR  pbLabel;
+    ULONG   cbLabel;
+} BCRYPT_OAEP_PADDING_INFO;
+
 #define BCRYPT_PAD_NONE                     0x00000001
 #define BCRYPT_PAD_PKCS1                    0x00000002
 #define BCRYPT_PAD_OAEP                     0x00000004




More information about the wine-cvs mailing list