Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
cb082b90
Commit
cb082b90
authored
Aug 16, 2012
by
Marek Chmiel
Committed by
Alexandre Julliard
Aug 17, 2012
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
dssenh/tests: Added block cipher mode tests for the DSSENH cryptographic service provider.
parent
b1a5291e
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
104 additions
and
0 deletions
+104
-0
dssenh.c
dlls/dssenh/tests/dssenh.c
+104
-0
No files found.
dlls/dssenh/tests/dssenh.c
View file @
cb082b90
...
@@ -640,10 +640,114 @@ static void test_data_encryption(const struct encrypt_test *tests, int testLen)
...
@@ -640,10 +640,114 @@ static void test_data_encryption(const struct encrypt_test *tests, int testLen)
ok
(
result
,
"Expected release of the provider
\n
"
);
ok
(
result
,
"Expected release of the provider
\n
"
);
}
}
struct
ciphermode_test
{
DWORD
cipherMode
;
BOOL
expectedResult
;
DWORD
expectedError
;
const
BYTE
*
encrypted
;
};
static
const
BYTE
encryptedCFB
[]
=
{
0x51
,
0x15
,
0x77
,
0xab
,
0x62
,
0x1f
,
0x7d
,
0xcb
,
0x35
,
0x1e
,
0xd8
,
0xd3
,
0x2a
,
0x00
,
0xf0
,
0x94
,
0x7c
,
0xa5
,
0x28
,
0xda
,
0xb8
,
0x81
,
0x15
,
0x99
,
0xd1
,
0xd5
,
0x06
,
0x18
,
0xb8
,
0x85
,
0xfc
,
0xc9
};
static
const
BYTE
encryptedCBC
[]
=
{
0x8f
,
0x7b
,
0x56
,
0xeb
,
0xad
,
0x4d
,
0x76
,
0xc2
,
0xd5
,
0x1d
,
0xf0
,
0x60
,
0x9d
,
0xde
,
0x96
,
0xe8
,
0xb7
,
0x7b
,
0xeb
,
0x4b
,
0xee
,
0x3f
,
0xae
,
0x05
,
0xdd
,
0x3b
,
0x62
,
0x47
,
0x7f
,
0x6f
,
0x79
,
0x6c
};
static
const
BYTE
encryptedECB
[]
=
{
0x8f
,
0x7b
,
0x56
,
0xeb
,
0xad
,
0x4d
,
0x76
,
0xc2
,
0x8b
,
0xe0
,
0x4e
,
0xe4
,
0x98
,
0x4f
,
0xb8
,
0x3b
,
0xf3
,
0xeb
,
0x6f
,
0x0a
,
0x57
,
0x91
,
0xdd
,
0xc7
,
0x64
,
0x8b
,
0xb9
,
0x50
,
0xe6
,
0x5e
,
0x76
,
0x72
};
static
const
struct
ciphermode_test
ciphermode_data
[]
=
{
{
CRYPT_MODE_CFB
,
TRUE
,
0xdeadbeef
,
encryptedCFB
},
/* Testing cipher block chaining */
{
CRYPT_MODE_CBC
,
TRUE
,
0xdeadbeef
,
encryptedCBC
},
/* Testing cipher feedback */
{
CRYPT_MODE_ECB
,
TRUE
,
0xdeadbeef
,
encryptedECB
},
/* Testing electronic codebook */
{
CRYPT_MODE_OFB
,
FALSE
,
NTE_BAD_DATA
}
/* DSSENH does not support Output Feedback cipher mode */
};
static
void
test_cipher_modes
(
const
struct
ciphermode_test
*
tests
,
int
testLen
)
{
HCRYPTPROV
hProv
=
0
;
HCRYPTKEY
pKey
=
0
;
HCRYPTHASH
hHash
;
const
char
plainText
[]
=
"Testing block cipher modes."
;
const
char
dataToHash
[]
=
"GSOC is awesome!"
;
unsigned
char
pbData
[
36
];
int
plainLen
=
sizeof
(
plainText
),
i
;
DWORD
mode
,
dataLen
;
BOOL
result
;
/* acquire dss enhanced provider */
SetLastError
(
0xdeadbeef
);
result
=
CryptAcquireContextA
(
&
hProv
,
NULL
,
MS_ENH_DSS_DH_PROV
,
PROV_DSS_DH
,
CRYPT_VERIFYCONTEXT
);
if
(
!
result
&&
GetLastError
()
==
NTE_KEYSET_NOT_DEF
)
{
skip
(
"DSSENH is currently not available, skipping block cipher mode tests.
\n
"
);
return
;
}
ok
(
result
,
"Expected no errors.
\n
"
);
SetLastError
(
0xdeadbeef
);
result
=
CryptCreateHash
(
hProv
,
CALG_MD5
,
0
,
0
,
&
hHash
);
ok
(
result
,
"Expected creation of a MD5 hash for key derivation.
\n
"
);
result
=
CryptHashData
(
hHash
,
(
BYTE
*
)
dataToHash
,
sizeof
(
dataToHash
),
0
);
ok
(
result
,
"Expected data to be added to hash for key derivation.
\n
"
);
/* Derive a CALG_RC2 key, but could be any other encryption cipher */
result
=
CryptDeriveKey
(
hProv
,
CALG_RC2
,
hHash
,
40
<<
16
,
&
pKey
);
ok
(
result
,
"Expected a derived key.
\n
"
);
result
=
CryptDestroyHash
(
hHash
);
ok
(
result
,
"Expected destruction of hash after deriving key.
\n
"
);
/* test block cipher modes */
for
(
i
=
0
;
i
<
testLen
;
i
++
)
{
SetLastError
(
0xdeadbeef
);
dataLen
=
plainLen
;
mode
=
tests
[
i
].
cipherMode
;
memcpy
(
pbData
,
plainText
,
plainLen
);
result
=
CryptSetKeyParam
(
pKey
,
KP_MODE
,
(
BYTE
*
)
&
mode
,
0
);
if
(
tests
[
i
].
expectedResult
)
{
ok
(
result
,
"Expected setting of KP_MODE, got %x.
\n
"
,
GetLastError
());
result
=
CryptEncrypt
(
pKey
,
0
,
TRUE
,
0
,
pbData
,
&
dataLen
,
36
);
ok
(
result
,
"Expected data encryption, got %x.
\n
"
,
GetLastError
());
/* Verify we have the correct encrypted data */
ok
(
!
memcmp
(
pbData
,
tests
[
i
].
encrypted
,
dataLen
),
"Incorrect encrypted data.
\n
"
);
result
=
CryptDecrypt
(
pKey
,
0
,
TRUE
,
0
,
pbData
,
&
dataLen
);
ok
(
result
,
"Expected data decryption, got %x.
\n
"
,
GetLastError
());
/* Verify we have the correct decrypted data */
ok
(
!
memcmp
(
pbData
,
(
BYTE
*
)
plainText
,
dataLen
),
"Incorrect decrypted data.
\n
"
);
}
else
{
/* Expected error */
ok
(
!
result
&&
GetLastError
()
==
tests
[
i
].
expectedError
,
"Expected %d, got %x.
\n
"
,
tests
[
i
].
expectedError
,
GetLastError
());
}
}
result
=
CryptDestroyKey
(
pKey
);
ok
(
result
,
"Expected no DestroyKey errors.
\n
"
);
result
=
CryptReleaseContext
(
hProv
,
0
);
ok
(
result
,
"Expected release of the provider.
\n
"
);
}
START_TEST
(
dssenh
)
START_TEST
(
dssenh
)
{
{
test_acquire_context
();
test_acquire_context
();
test_keylength
();
test_keylength
();
test_hash
(
hash_data
,
TESTLEN
(
hash_data
));
test_hash
(
hash_data
,
TESTLEN
(
hash_data
));
test_data_encryption
(
encrypt_data
,
TESTLEN
(
encrypt_data
));
test_data_encryption
(
encrypt_data
,
TESTLEN
(
encrypt_data
));
test_cipher_modes
(
ciphermode_data
,
TESTLEN
(
ciphermode_data
));
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment