in Education by
I'm using an identical call to "CryptUnprotectData" (exposed from Crypt32.dll) between XP and Vista. Works fine in XP. I get the following exception when I run in Vista: "Decryption failed. Key not valid for use in specified state." As expected, the versions of crypt32.dll are different between XP and Vista (w/XP actually having the more recent, possibly as a result of SP3 or some other update). More specifically, I'm encrypting data, putting it in the registry, then reading and decrypting using "CryptUnprotectData". UAC is turned off. Anyone seen this one before? JavaScript questions and answers, JavaScript questions pdf, JavaScript question bank, JavaScript questions and answers pdf, mcq on JavaScript pdf, JavaScript questions and solutions, JavaScript mcq Test , Interview JavaScript questions, JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)

1 Answer

0 votes
by
The CryptUnprotectData function documentation states that it usually only works when the user has the same logon credentials as the encrypter. This suggests to me that maybe the key is tied to the user's current token. Since you mention Vista, this makes me think UAC and restricted tokens. Can you show us some code? Can you give us more information about what you're doing with the data -- i.e. are you moving it between processes, or users, or computers?

Related questions

0 votes
    I have an android class which is encoding and decoding my text using a key but I want to create ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 17, 2022 in Education by JackTerrance
0 votes
    Currently I am working in dev env on my local machine where I am storing passwords in plain text using ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 6, 2022 in Education by JackTerrance
0 votes
    In which of the following encryption key is used to encrypt and decrypt the data? (a) Public key ( ... Answers, Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in ... Answers, Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    Which of the following requires no password travel across the internet? (a) Readable system (b) ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    I want to install a Letsencrypt certificate on my Chef server. I followed this guide: git clone https:/ ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 16, 2022 in Education by JackTerrance
0 votes
    When using ASP.NET protected configuration, how can I encrypt the config with just the public key? I can ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Mar 5, 2022 in Education by JackTerrance
0 votes
    24 ina rsa system the public key(e,n) of user a is defined as (7,187).Calculate totient(n) and private ... you encrypt message m=88? Select the correct answer from above options...
asked Dec 20, 2021 in Education by JackTerrance
0 votes
    ____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Some Trojans carry ransomware with them to encrypt the data and ask for ransom. (a) True (b) False ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Ansible has two type of servers (i)Only node (ii)controlling machines & nodes...
asked Jan 24, 2023 in Technology by JackTerrance
0 votes
    What is the name of Artificial Intelligence which allows machines to handle vague information with a deftness that mimics ... ) Boolean logic c) Functional logic d) Fuzzy logic...
asked Jan 15, 2023 in Education by JackTerrance
...