crypt32 [4/4]: (un)protectdata test suite
Kees Cook
kees at outflux.net
Thu May 19 05:20:21 CDT 2005
ChangeLog:
Create basic test suite for CryptProtectData/CryptUnprotectData.
--
Kees Cook @outflux.net
-------------- next part --------------
Index: configure.ac
===================================================================
RCS file: /home/wine/wine/configure.ac,v
retrieving revision 1.353
diff -u -p -r1.353 configure.ac
--- configure.ac 18 May 2005 18:20:23 -0000 1.353
+++ configure.ac 19 May 2005 10:14:58 -0000
@@ -1538,6 +1538,7 @@ dlls/comctl32/tests/Makefile
dlls/commdlg/Makefile
dlls/crtdll/Makefile
dlls/crypt32/Makefile
+dlls/crypt32/tests/Makefile
dlls/cryptdll/Makefile
dlls/ctl3d/Makefile
dlls/d3d8/Makefile
--- /dev/null 2005-05-18 18:52:32.424436018 -0700
+++ dlls/crypt32/tests/Makefile.in 2005-04-05 17:58:16.000000000 -0700
@@ -0,0 +1,14 @@
+EXTRADEFS = -D_CRYPT32_
+TOPSRCDIR = @top_srcdir@
+TOPOBJDIR = ../../..
+SRCDIR = @srcdir@
+VPATH = @srcdir@
+TESTDLL = crypt32.dll
+IMPORTS = crypt32
+
+CTESTS = \
+ protectdata.c
+
+ at MAKE_TEST_RULES@
+
+### Dependencies:
--- /dev/null 2005-05-18 18:52:32.424436018 -0700
+++ dlls/crypt32/tests/protectdata.c 2005-05-15 22:27:05.000000000 -0700
@@ -0,0 +1,235 @@
+/*
+ * Unit test suite for crypt32.dll's CryptProtectData/CryptUnprotectData
+ *
+ * Copyright 2005 Kees Cook <kees at outflux.net>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+#include <stdio.h>
+#include <stdarg.h>
+#include <windef.h>
+#include <winbase.h>
+
+#ifndef STANDALONE
+#include "wine/test.h"
+#define ok2 ok
+#else
+/* To build outside Wine tree, compile with cl -DSTANDALONE -D_X86_ protectdata.c crypt32.lib */
+#include <assert.h>
+#include <stdio.h>
+#define START_TEST(name) main(int argc, char **argv)
+#define ok(condition, msg) \
+ do { if(!(condition)) { \
+ fprintf(stderr,"failed at %d, msg:" msg "\n",__LINE__); \
+ exit(1); \
+ } } while(0)
+#define ok2(condition, msg, arg) \
+ do { if(!(condition)) { \
+ fprintf(stderr,"failed at %d, msg:" msg "\n",__LINE__, arg); \
+ exit(1); \
+ } } while(0)
+#define todo_wine
+#endif
+
+#include <winerror.h>
+#include <wincrypt.h>
+
+static const char * secret = "I am a super secret string that no one can see!";
+static const char * secret2 = "I am a super secret string indescribable string";
+static const char * key = "Wibble wibble wibble";
+static const WCHAR desc[] = {'U','l','t','r','a',' ','s','e','c','r','e','t',' ','t','e','s','t',' ','m','e','s','s','a','g','e',0};
+static BOOL protected = FALSE; /* if true, the unprotect tests can run */
+static DATA_BLOB cipher;
+static DATA_BLOB cipher_entropy;
+static DATA_BLOB cipher_no_desc;
+
+static void test_cryptprotectdata(void)
+{
+ LONG r;
+ DATA_BLOB plain;
+ DATA_BLOB entropy;
+
+ plain.pbData=(void*)secret;
+ plain.cbData=strlen(secret)+1;
+
+ entropy.pbData=(void*)key;
+ entropy.cbData=strlen(key)+1;
+
+ SetLastError(0xDEADBEEF);
+ protected = CryptProtectData(NULL,desc,NULL,NULL,NULL,0,&cipher);
+ ok(!protected, "Encrypting without plain data source.\n");
+ r = GetLastError();
+ ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+ SetLastError(0xDEADBEEF);
+ protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,NULL);
+ ok(!protected, "Encrypting without cipher destination.\n");
+ r = GetLastError();
+ ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+ cipher.pbData=NULL;
+ cipher.cbData=0;
+
+ /* without entropy */
+ SetLastError(0xDEADBEEF);
+ protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,&cipher);
+ ok(protected, "Encrypting without entropy.\n");
+ r = GetLastError();
+ ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+ cipher_entropy.pbData=NULL;
+ cipher_entropy.cbData=0;
+
+ /* with entropy */
+ SetLastError(0xDEADBEEF);
+ protected = CryptProtectData(&plain,desc,&entropy,NULL,NULL,0,&cipher_entropy);
+ ok(protected, "Encrypting with entropy.\n");
+ r = GetLastError();
+ ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+ cipher_no_desc.pbData=NULL;
+ cipher_no_desc.cbData=0;
+
+ /* with entropy but no description */
+ plain.pbData=(void*)secret2;
+ plain.cbData=strlen(secret2)+1;
+ SetLastError(0xDEADBEEF);
+ protected = CryptProtectData(&plain,NULL,&entropy,NULL,NULL,0,&cipher_no_desc);
+ ok(protected, "Encrypting with entropy and no description.\n");
+ r = GetLastError();
+ ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+}
+
+static void test_cryptunprotectdata(void)
+{
+ LONG r;
+ DATA_BLOB plain;
+ DATA_BLOB entropy;
+ BOOL okay;
+ WCHAR * data_desc;
+
+ entropy.pbData=(void*)key;
+ entropy.cbData=strlen(key)+1;
+
+ ok(protected, "CryptProtectData failed to run, so I can't test its output\n");
+ if (!protected) return;
+
+ plain.pbData=NULL;
+ plain.cbData=0;
+
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(&cipher,NULL,NULL,NULL,NULL,0,NULL);
+ ok(!okay,"Decrypting without destination\n");
+ r = GetLastError();
+ ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(NULL,NULL,NULL,NULL,NULL,0,&plain);
+ ok(!okay,"Decrypting without source\n");
+ r = GetLastError();
+ ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+ plain.pbData=NULL;
+ plain.cbData=0;
+
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(&cipher_entropy,NULL,NULL,NULL,NULL,0,&plain);
+ ok(!okay,"Decrypting without needed entropy\n");
+ r = GetLastError();
+ ok2(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n", r);
+
+ plain.pbData=NULL;
+ plain.cbData=0;
+ data_desc=NULL;
+
+ /* without entropy */
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(&cipher,&data_desc,NULL,NULL,NULL,0,&plain);
+ ok(okay,"Decrypting without entropy\n");
+ r = GetLastError();
+ ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+ ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
+ ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
+ ok(!strcmp(plain.pbData,secret),"Plain does not match secret\n");
+ ok(data_desc!=NULL,"Description not allocated\n");
+ ok(!lstrcmpW(data_desc,desc),"Description does not match\n");
+
+ LocalFree(plain.pbData);
+ LocalFree(data_desc);
+
+ plain.pbData=NULL;
+ plain.cbData=0;
+ data_desc=NULL;
+
+ /* with wrong entropy */
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(&cipher_entropy,&data_desc,&cipher_entropy,NULL,NULL,0,&plain);
+ ok(!okay,"Decrypting with wrong entropy\n");
+ r = GetLastError();
+ ok2(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n",r);
+
+ /* with entropy */
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(&cipher_entropy,&data_desc,&entropy,NULL,NULL,0,&plain);
+ ok(okay,"Decrypting with entropy\n");
+ r = GetLastError();
+ ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+ ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
+ ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
+ ok(!strcmp(plain.pbData,secret),"Plain does not match secret\n");
+ ok(data_desc!=NULL,"Description not allocated\n");
+ ok(!lstrcmpW(data_desc,desc),"Description does not match\n");
+
+ LocalFree(plain.pbData);
+ LocalFree(data_desc);
+
+ plain.pbData=NULL;
+ plain.cbData=0;
+ data_desc=NULL;
+
+ /* with entropy but no description */
+ SetLastError(0xDEADBEEF);
+ okay = CryptUnprotectData(&cipher_no_desc,&data_desc,&entropy,NULL,NULL,0,&plain);
+ ok(okay,"Decrypting with entropy and no description\n");
+ r = GetLastError();
+ ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+ ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
+ ok(plain.cbData==strlen(secret2)+1,"Plain DATA_BLOB wrong length\n");
+ ok(!strcmp(plain.pbData,secret2),"Plain does not match secret\n");
+ ok(data_desc!=NULL,"Description not allocated\n");
+ ok(data_desc[0]=='\0',"Description not empty\n");
+
+ LocalFree(plain.pbData);
+
+ plain.pbData=NULL;
+ plain.cbData=0;
+}
+
+START_TEST(protectdata)
+{
+ protected=FALSE;
+
+ test_cryptprotectdata();
+ test_cryptunprotectdata();
+
+ /* deinit globals here */
+ if (cipher.pbData) LocalFree(cipher.pbData);
+ if (cipher_entropy.pbData) LocalFree(cipher_entropy.pbData);
+ if (cipher_no_desc.pbData) LocalFree(cipher_no_desc.pbData);
+}
More information about the wine-patches
mailing list