crypt32 [4/4]: (un)protectdata test suite

Kees Cook kees at outflux.net
Thu May 19 05:20:21 CDT 2005


ChangeLog:
	Create basic test suite for CryptProtectData/CryptUnprotectData.

-- 
Kees Cook                                            @outflux.net
-------------- next part --------------
Index: configure.ac
===================================================================
RCS file: /home/wine/wine/configure.ac,v
retrieving revision 1.353
diff -u -p -r1.353 configure.ac
--- configure.ac	18 May 2005 18:20:23 -0000	1.353
+++ configure.ac	19 May 2005 10:14:58 -0000
@@ -1538,6 +1538,7 @@ dlls/comctl32/tests/Makefile
 dlls/commdlg/Makefile
 dlls/crtdll/Makefile
 dlls/crypt32/Makefile
+dlls/crypt32/tests/Makefile
 dlls/cryptdll/Makefile
 dlls/ctl3d/Makefile
 dlls/d3d8/Makefile
--- /dev/null	2005-05-18 18:52:32.424436018 -0700
+++ dlls/crypt32/tests/Makefile.in	2005-04-05 17:58:16.000000000 -0700
@@ -0,0 +1,14 @@
+EXTRADEFS = -D_CRYPT32_
+TOPSRCDIR = @top_srcdir@
+TOPOBJDIR = ../../..
+SRCDIR    = @srcdir@
+VPATH     = @srcdir@
+TESTDLL   = crypt32.dll
+IMPORTS   = crypt32
+
+CTESTS = \
+	protectdata.c
+
+ at MAKE_TEST_RULES@
+
+### Dependencies:
--- /dev/null	2005-05-18 18:52:32.424436018 -0700
+++ dlls/crypt32/tests/protectdata.c	2005-05-15 22:27:05.000000000 -0700
@@ -0,0 +1,235 @@
+/*
+ * Unit test suite for crypt32.dll's CryptProtectData/CryptUnprotectData
+ *
+ * Copyright 2005 Kees Cook <kees at outflux.net>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
+ */
+
+#include <stdio.h>
+#include <stdarg.h>
+#include <windef.h>
+#include <winbase.h>
+
+#ifndef STANDALONE
+#include "wine/test.h"
+#define ok2 ok
+#else
+/* To build outside Wine tree, compile with cl -DSTANDALONE -D_X86_ protectdata.c crypt32.lib */
+#include <assert.h>
+#include <stdio.h>
+#define START_TEST(name) main(int argc, char **argv)
+#define ok(condition, msg)       \
+    do { if(!(condition)) {  \
+        fprintf(stderr,"failed at %d, msg:" msg "\n",__LINE__); \
+        exit(1);         \
+    } } while(0)
+#define ok2(condition, msg, arg) \
+    do { if(!(condition)) {  \
+        fprintf(stderr,"failed at %d, msg:" msg "\n",__LINE__, arg); \
+        exit(1);         \
+    } } while(0)
+#define todo_wine
+#endif
+
+#include <winerror.h>
+#include <wincrypt.h>
+
+static const char * secret  = "I am a super secret string that no one can see!";
+static const char * secret2 = "I am a super secret string indescribable string";
+static const char * key = "Wibble wibble wibble";
+static const WCHAR desc[] = {'U','l','t','r','a',' ','s','e','c','r','e','t',' ','t','e','s','t',' ','m','e','s','s','a','g','e',0};
+static BOOL protected = FALSE; /* if true, the unprotect tests can run */
+static DATA_BLOB cipher;
+static DATA_BLOB cipher_entropy;
+static DATA_BLOB cipher_no_desc;
+
+static void test_cryptprotectdata(void)
+{
+    LONG r;
+    DATA_BLOB plain;
+    DATA_BLOB entropy;
+
+    plain.pbData=(void*)secret;
+    plain.cbData=strlen(secret)+1;
+
+    entropy.pbData=(void*)key;
+    entropy.cbData=strlen(key)+1;
+
+    SetLastError(0xDEADBEEF);
+    protected = CryptProtectData(NULL,desc,NULL,NULL,NULL,0,&cipher);
+    ok(!protected, "Encrypting without plain data source.\n");
+    r = GetLastError();
+    ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+    SetLastError(0xDEADBEEF);
+    protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,NULL);
+    ok(!protected, "Encrypting without cipher destination.\n");
+    r = GetLastError();
+    ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+    cipher.pbData=NULL;
+    cipher.cbData=0;
+
+    /* without entropy */
+    SetLastError(0xDEADBEEF);
+    protected = CryptProtectData(&plain,desc,NULL,NULL,NULL,0,&cipher);
+    ok(protected, "Encrypting without entropy.\n");
+    r = GetLastError();
+    ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+    cipher_entropy.pbData=NULL;
+    cipher_entropy.cbData=0;
+
+    /* with entropy */
+    SetLastError(0xDEADBEEF);
+    protected = CryptProtectData(&plain,desc,&entropy,NULL,NULL,0,&cipher_entropy);
+    ok(protected, "Encrypting with entropy.\n");
+    r = GetLastError();
+    ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+    cipher_no_desc.pbData=NULL;
+    cipher_no_desc.cbData=0;
+
+    /* with entropy but no description */
+    plain.pbData=(void*)secret2;
+    plain.cbData=strlen(secret2)+1;
+    SetLastError(0xDEADBEEF);
+    protected = CryptProtectData(&plain,NULL,&entropy,NULL,NULL,0,&cipher_no_desc);
+    ok(protected, "Encrypting with entropy and no description.\n");
+    r = GetLastError();
+    ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+}
+
+static void test_cryptunprotectdata(void)
+{
+    LONG r;
+    DATA_BLOB plain;
+    DATA_BLOB entropy;
+    BOOL okay;
+    WCHAR * data_desc;
+
+    entropy.pbData=(void*)key;
+    entropy.cbData=strlen(key)+1;
+
+    ok(protected, "CryptProtectData failed to run, so I can't test its output\n");
+    if (!protected) return;
+
+    plain.pbData=NULL;
+    plain.cbData=0;
+
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(&cipher,NULL,NULL,NULL,NULL,0,NULL);
+    ok(!okay,"Decrypting without destination\n");
+    r = GetLastError();
+    ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(NULL,NULL,NULL,NULL,NULL,0,&plain);
+    ok(!okay,"Decrypting without source\n");
+    r = GetLastError();
+    ok2(r == ERROR_INVALID_PARAMETER, "Wrong (%lu) GetLastError seen\n",r);
+
+    plain.pbData=NULL;
+    plain.cbData=0;
+
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(&cipher_entropy,NULL,NULL,NULL,NULL,0,&plain);
+    ok(!okay,"Decrypting without needed entropy\n");
+    r = GetLastError();
+    ok2(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n", r);
+
+    plain.pbData=NULL;
+    plain.cbData=0;
+    data_desc=NULL;
+
+    /* without entropy */
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(&cipher,&data_desc,NULL,NULL,NULL,0,&plain);
+    ok(okay,"Decrypting without entropy\n");
+    r = GetLastError();
+    ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+    ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
+    ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
+    ok(!strcmp(plain.pbData,secret),"Plain does not match secret\n");
+    ok(data_desc!=NULL,"Description not allocated\n");
+    ok(!lstrcmpW(data_desc,desc),"Description does not match\n");
+
+    LocalFree(plain.pbData);
+    LocalFree(data_desc);
+
+    plain.pbData=NULL;
+    plain.cbData=0;
+    data_desc=NULL;
+
+    /* with wrong entropy */
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(&cipher_entropy,&data_desc,&cipher_entropy,NULL,NULL,0,&plain);
+    ok(!okay,"Decrypting with wrong entropy\n");
+    r = GetLastError();
+    ok2(r == ERROR_INVALID_DATA, "Wrong (%lu) GetLastError seen\n",r);
+
+    /* with entropy */
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(&cipher_entropy,&data_desc,&entropy,NULL,NULL,0,&plain);
+    ok(okay,"Decrypting with entropy\n");
+    r = GetLastError();
+    ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+    ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
+    ok(plain.cbData==strlen(secret)+1,"Plain DATA_BLOB wrong length\n");
+    ok(!strcmp(plain.pbData,secret),"Plain does not match secret\n");
+    ok(data_desc!=NULL,"Description not allocated\n");
+    ok(!lstrcmpW(data_desc,desc),"Description does not match\n");
+
+    LocalFree(plain.pbData);
+    LocalFree(data_desc);
+
+    plain.pbData=NULL;
+    plain.cbData=0;
+    data_desc=NULL;
+
+    /* with entropy but no description */
+    SetLastError(0xDEADBEEF);
+    okay = CryptUnprotectData(&cipher_no_desc,&data_desc,&entropy,NULL,NULL,0,&plain);
+    ok(okay,"Decrypting with entropy and no description\n");
+    r = GetLastError();
+    ok2(r == ERROR_SUCCESS, "Wrong (%lu) GetLastError seen\n",r);
+
+    ok(plain.pbData!=NULL,"Plain DATA_BLOB missing data\n");
+    ok(plain.cbData==strlen(secret2)+1,"Plain DATA_BLOB wrong length\n");
+    ok(!strcmp(plain.pbData,secret2),"Plain does not match secret\n");
+    ok(data_desc!=NULL,"Description not allocated\n");
+    ok(data_desc[0]=='\0',"Description not empty\n");
+
+    LocalFree(plain.pbData);
+
+    plain.pbData=NULL;
+    plain.cbData=0;
+}
+
+START_TEST(protectdata)
+{
+    protected=FALSE;
+
+    test_cryptprotectdata();
+    test_cryptunprotectdata();
+
+    /* deinit globals here */
+    if (cipher.pbData) LocalFree(cipher.pbData);
+    if (cipher_entropy.pbData) LocalFree(cipher_entropy.pbData);
+    if (cipher_no_desc.pbData) LocalFree(cipher_no_desc.pbData);
+}


More information about the wine-patches mailing list