Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
ba01e7b2
Commit
ba01e7b2
authored
Jan 28, 2009
by
Juan Lang
Committed by
Alexandre Julliard
Jan 29, 2009
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
rsaenh: Add tests for key permissions.
parent
7f3c70c5
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
158 additions
and
7 deletions
+158
-7
rsaenh.c
dlls/rsaenh/tests/rsaenh.c
+158
-7
No files found.
dlls/rsaenh/tests/rsaenh.c
View file @
ba01e7b2
...
@@ -112,7 +112,7 @@ static void trace_hex(BYTE *pbData, DWORD dwLen) {
...
@@ -112,7 +112,7 @@ static void trace_hex(BYTE *pbData, DWORD dwLen) {
}
}
*/
*/
static
int
init_base_environment
(
void
)
static
int
init_base_environment
(
DWORD
dwKeyFlags
)
{
{
HCRYPTKEY
hKey
;
HCRYPTKEY
hKey
;
BOOL
result
;
BOOL
result
;
...
@@ -132,10 +132,10 @@ static int init_base_environment(void)
...
@@ -132,10 +132,10 @@ static int init_base_environment(void)
CRYPT_NEWKEYSET
);
CRYPT_NEWKEYSET
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
if
(
!
result
)
return
0
;
if
(
!
result
)
return
0
;
result
=
CryptGenKey
(
hProv
,
AT_KEYEXCHANGE
,
0
,
&
hKey
);
result
=
CryptGenKey
(
hProv
,
AT_KEYEXCHANGE
,
dwKeyFlags
,
&
hKey
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
if
(
result
)
CryptDestroyKey
(
hKey
);
if
(
result
)
CryptDestroyKey
(
hKey
);
result
=
CryptGenKey
(
hProv
,
AT_SIGNATURE
,
0
,
&
hKey
);
result
=
CryptGenKey
(
hProv
,
AT_SIGNATURE
,
dwKeyFlags
,
&
hKey
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
if
(
result
)
CryptDestroyKey
(
hKey
);
if
(
result
)
CryptDestroyKey
(
hKey
);
}
}
...
@@ -788,6 +788,15 @@ static void test_rc2(void)
...
@@ -788,6 +788,15 @@ static void test_rc2(void)
result
=
CryptGetKeyParam
(
hKey
,
KP_MODE_BITS
,
(
BYTE
*
)
&
dwModeBits
,
&
dwLen
,
0
);
result
=
CryptGetKeyParam
(
hKey
,
KP_MODE_BITS
,
(
BYTE
*
)
&
dwModeBits
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
dwModeBits
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwModeBits
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
dwModeBits
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwModeBits
);
dwLen
=
sizeof
(
DWORD
);
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwModeBits
,
&
dwLen
,
0
);
result
=
CryptGetKeyParam
(
hKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwModeBits
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
...
@@ -1177,7 +1186,7 @@ static BYTE abPlainPrivateKey[596] = {
...
@@ -1177,7 +1186,7 @@ static BYTE abPlainPrivateKey[596] = {
static
void
test_import_private
(
void
)
static
void
test_import_private
(
void
)
{
{
DWORD
dwLen
;
DWORD
dwLen
,
dwVal
;
HCRYPTKEY
hKeyExchangeKey
,
hSessionKey
;
HCRYPTKEY
hKeyExchangeKey
,
hSessionKey
;
BOOL
result
;
BOOL
result
;
static
BYTE
abSessionKey
[
148
]
=
{
static
BYTE
abSessionKey
[
148
]
=
{
...
@@ -1218,6 +1227,15 @@ static void test_import_private(void)
...
@@ -1218,6 +1227,15 @@ static void test_import_private(void)
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
if
(
!
result
)
return
;
if
(
!
result
)
return
;
dwVal
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hSessionKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
dwLen
=
(
DWORD
)
sizeof
(
abEncryptedMessage
);
dwLen
=
(
DWORD
)
sizeof
(
abEncryptedMessage
);
result
=
CryptDecrypt
(
hSessionKey
,
0
,
TRUE
,
0
,
abEncryptedMessage
,
&
dwLen
);
result
=
CryptDecrypt
(
hSessionKey
,
0
,
TRUE
,
0
,
abEncryptedMessage
,
&
dwLen
);
ok
(
result
&&
dwLen
==
12
&&
!
memcmp
(
abEncryptedMessage
,
"Wine rocks!"
,
12
),
ok
(
result
&&
dwLen
==
12
&&
!
memcmp
(
abEncryptedMessage
,
"Wine rocks!"
,
12
),
...
@@ -1522,7 +1540,7 @@ static void test_rsa_encrypt(void)
...
@@ -1522,7 +1540,7 @@ static void test_rsa_encrypt(void)
HCRYPTKEY
hRSAKey
;
HCRYPTKEY
hRSAKey
;
BYTE
abData
[
2048
]
=
"Wine rocks!"
;
BYTE
abData
[
2048
]
=
"Wine rocks!"
;
BOOL
result
;
BOOL
result
;
DWORD
dwLen
;
DWORD
dw
Val
,
dw
Len
;
/* It is allowed to use the key exchange key for encryption/decryption */
/* It is allowed to use the key exchange key for encryption/decryption */
result
=
CryptGetUserKey
(
hProv
,
AT_KEYEXCHANGE
,
&
hRSAKey
);
result
=
CryptGetUserKey
(
hProv
,
AT_KEYEXCHANGE
,
&
hRSAKey
);
...
@@ -1541,6 +1559,32 @@ static void test_rsa_encrypt(void)
...
@@ -1541,6 +1559,32 @@ static void test_rsa_encrypt(void)
result
=
CryptDecrypt
(
hRSAKey
,
0
,
TRUE
,
0
,
abData
,
&
dwLen
);
result
=
CryptDecrypt
(
hRSAKey
,
0
,
TRUE
,
0
,
abData
,
&
dwLen
);
ok
(
result
&&
dwLen
==
12
&&
!
memcmp
(
abData
,
"Wine rocks!"
,
12
),
"%08x
\n
"
,
GetLastError
());
ok
(
result
&&
dwLen
==
12
&&
!
memcmp
(
abData
,
"Wine rocks!"
,
12
),
"%08x
\n
"
,
GetLastError
());
dwVal
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hRSAKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
/* The key exchange key's public key may be exported.. */
result
=
CryptExportKey
(
hRSAKey
,
0
,
PUBLICKEYBLOB
,
0
,
NULL
,
&
dwLen
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
/* but its private key may not be. */
SetLastError
(
0xdeadbeef
);
result
=
CryptExportKey
(
hRSAKey
,
0
,
PRIVATEKEYBLOB
,
0
,
NULL
,
&
dwLen
);
todo_wine
ok
(
!
result
&&
GetLastError
()
==
NTE_BAD_KEY_STATE
,
"expected NTE_BAD_KEY_STATE, got %08x
\n
"
,
GetLastError
());
/* Setting the permissions of the key exchange key isn't allowed, either. */
dwVal
|=
CRYPT_EXPORT
;
SetLastError
(
0xdeadbeef
);
result
=
CryptSetKeyParam
(
hRSAKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
0
);
todo_wine
ok
(
!
result
&&
GetLastError
()
==
NTE_BAD_DATA
,
"expected NTE_BAD_DATA, got %08x
\n
"
,
GetLastError
());
CryptDestroyKey
(
hRSAKey
);
CryptDestroyKey
(
hRSAKey
);
/* It is not allowed to use the signature key for encryption/decryption */
/* It is not allowed to use the signature key for encryption/decryption */
...
@@ -1548,6 +1592,32 @@ static void test_rsa_encrypt(void)
...
@@ -1548,6 +1592,32 @@ static void test_rsa_encrypt(void)
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
if
(
!
result
)
return
;
if
(
!
result
)
return
;
dwVal
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hRSAKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
/* The signature key's public key may also be exported.. */
result
=
CryptExportKey
(
hRSAKey
,
0
,
PUBLICKEYBLOB
,
0
,
NULL
,
&
dwLen
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
/* but its private key may not be. */
SetLastError
(
0xdeadbeef
);
result
=
CryptExportKey
(
hRSAKey
,
0
,
PRIVATEKEYBLOB
,
0
,
NULL
,
&
dwLen
);
todo_wine
ok
(
!
result
&&
GetLastError
()
==
NTE_BAD_KEY_STATE
,
"expected NTE_BAD_KEY_STATE, got %08x
\n
"
,
GetLastError
());
/* Setting the permissions of the signature key isn't allowed, either. */
dwVal
|=
CRYPT_EXPORT
;
SetLastError
(
0xdeadbeef
);
result
=
CryptSetKeyParam
(
hRSAKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
0
);
todo_wine
ok
(
!
result
&&
GetLastError
()
==
NTE_BAD_DATA
,
"expected NTE_BAD_DATA, got %08x
\n
"
,
GetLastError
());
dwLen
=
12
;
dwLen
=
12
;
result
=
CryptEncrypt
(
hRSAKey
,
0
,
TRUE
,
0
,
abData
,
&
dwLen
,
(
DWORD
)
sizeof
(
abData
));
result
=
CryptEncrypt
(
hRSAKey
,
0
,
TRUE
,
0
,
abData
,
&
dwLen
,
(
DWORD
)
sizeof
(
abData
));
ok
(
!
result
&&
GetLastError
()
==
NTE_BAD_KEY
,
"%08x
\n
"
,
GetLastError
());
ok
(
!
result
&&
GetLastError
()
==
NTE_BAD_KEY
,
"%08x
\n
"
,
GetLastError
());
...
@@ -1557,7 +1627,7 @@ static void test_rsa_encrypt(void)
...
@@ -1557,7 +1627,7 @@ static void test_rsa_encrypt(void)
static
void
test_import_export
(
void
)
static
void
test_import_export
(
void
)
{
{
DWORD
dwLen
,
dwDataLen
;
DWORD
dwLen
,
dwDataLen
,
dwVal
;
HCRYPTKEY
hPublicKey
;
HCRYPTKEY
hPublicKey
;
BOOL
result
;
BOOL
result
;
ALG_ID
algID
;
ALG_ID
algID
;
...
@@ -1585,6 +1655,14 @@ static void test_import_export(void)
...
@@ -1585,6 +1655,14 @@ static void test_import_export(void)
ok
(
result
,
"failed to get the KP_ALGID from the imported public key
\n
"
);
ok
(
result
,
"failed to get the KP_ALGID from the imported public key
\n
"
);
ok
(
algID
==
CALG_RSA_KEYX
,
"Expected CALG_RSA_KEYX, got %x
\n
"
,
algID
);
ok
(
algID
==
CALG_RSA_KEYX
,
"Expected CALG_RSA_KEYX, got %x
\n
"
,
algID
);
dwVal
=
0xdeadbeef
;
dwDataLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hPublicKey
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwDataLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
result
=
CryptExportKey
(
hPublicKey
,
0
,
PUBLICKEYBLOB
,
0
,
emptyKey
,
&
dwLen
);
result
=
CryptExportKey
(
hPublicKey
,
0
,
PUBLICKEYBLOB
,
0
,
emptyKey
,
&
dwLen
);
ok
(
result
,
"failed to export the fresh imported public key
\n
"
);
ok
(
result
,
"failed to export the fresh imported public key
\n
"
);
ok
(
dwLen
==
84
,
"Expected exported key to be 84 bytes long but got %d bytes.
\n
"
,
dwLen
);
ok
(
dwLen
==
84
,
"Expected exported key to be 84 bytes long but got %d bytes.
\n
"
,
dwLen
);
...
@@ -2041,9 +2119,81 @@ static void test_null_provider(void)
...
@@ -2041,9 +2119,81 @@ static void test_null_provider(void)
}
}
static
void
test_key_permissions
(
void
)
{
HCRYPTKEY
hKey1
,
hKey2
;
DWORD
dwVal
,
dwLen
;
BOOL
result
;
/* Create keys that are exportable */
if
(
!
init_base_environment
(
CRYPT_EXPORTABLE
))
return
;
result
=
CryptGetUserKey
(
hProv
,
AT_KEYEXCHANGE
,
&
hKey1
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
if
(
!
result
)
return
;
dwVal
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hKey1
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
todo_wine
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_EXPORT
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_EXPORT|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
/* The key exchange key's public key may be exported.. */
result
=
CryptExportKey
(
hKey1
,
0
,
PUBLICKEYBLOB
,
0
,
NULL
,
&
dwLen
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
/* and its private key may be too. */
result
=
CryptExportKey
(
hKey1
,
0
,
PRIVATEKEYBLOB
,
0
,
NULL
,
&
dwLen
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
/* Turning off the key's export permissions is "allowed".. */
dwVal
&=
~
CRYPT_EXPORT
;
result
=
CryptSetKeyParam
(
hKey1
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
/* but it has no effect. */
dwVal
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hKey1
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
todo_wine
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_EXPORT
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_EXPORT|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
/* Thus, changing the export flag of the key doesn't affect whether the key
* may be exported.
*/
result
=
CryptExportKey
(
hKey1
,
0
,
PRIVATEKEYBLOB
,
0
,
NULL
,
&
dwLen
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
result
=
CryptGetUserKey
(
hProv
,
AT_KEYEXCHANGE
,
&
hKey2
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
/* A subsequent get of the same key, into a different handle, also doesn't
* show that the permissions have been changed.
*/
dwVal
=
0xdeadbeef
;
dwLen
=
sizeof
(
DWORD
);
result
=
CryptGetKeyParam
(
hKey2
,
KP_PERMISSIONS
,
(
BYTE
*
)
&
dwVal
,
&
dwLen
,
0
);
ok
(
result
,
"%08x
\n
"
,
GetLastError
());
todo_wine
ok
(
dwVal
==
(
CRYPT_MAC
|
CRYPT_WRITE
|
CRYPT_READ
|
CRYPT_EXPORT
|
CRYPT_DECRYPT
|
CRYPT_ENCRYPT
),
"expected CRYPT_MAC|CRYPT_WRITE|CRYPT_READ|CRYPT_EXPORT|CRYPT_DECRYPT|CRYPT_ENCRYPT,"
" got %08x
\n
"
,
dwVal
);
CryptDestroyKey
(
hKey2
);
CryptDestroyKey
(
hKey1
);
clean_up_base_environment
();
}
START_TEST
(
rsaenh
)
START_TEST
(
rsaenh
)
{
{
if
(
!
init_base_environment
())
if
(
!
init_base_environment
(
0
))
return
;
return
;
test_prov
();
test_prov
();
test_gen_random
();
test_gen_random
();
...
@@ -2062,6 +2212,7 @@ START_TEST(rsaenh)
...
@@ -2062,6 +2212,7 @@ START_TEST(rsaenh)
test_import_export
();
test_import_export
();
test_enum_container
();
test_enum_container
();
clean_up_base_environment
();
clean_up_base_environment
();
test_key_permissions
();
test_schannel_provider
();
test_schannel_provider
();
test_null_provider
();
test_null_provider
();
if
(
!
init_aes_environment
())
if
(
!
init_aes_environment
())
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment