[21311] | 1 | /*
|
---|
| 2 | * Miscellaneous crypt32 tests
|
---|
| 3 | *
|
---|
| 4 | * Copyright 2005 Juan Lang
|
---|
| 5 | *
|
---|
| 6 | * This library is free software; you can redistribute it and/or
|
---|
| 7 | * modify it under the terms of the GNU Lesser General Public
|
---|
| 8 | * License as published by the Free Software Foundation; either
|
---|
| 9 | * version 2.1 of the License, or (at your option) any later version.
|
---|
| 10 | *
|
---|
| 11 | * This library is distributed in the hope that it will be useful,
|
---|
| 12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
| 14 | * Lesser General Public License for more details.
|
---|
| 15 | *
|
---|
| 16 | * You should have received a copy of the GNU Lesser General Public
|
---|
| 17 | * License along with this library; if not, write to the Free Software
|
---|
| 18 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
---|
| 19 | */
|
---|
| 20 |
|
---|
| 21 | #include <stdio.h>
|
---|
| 22 | #include <stdarg.h>
|
---|
| 23 | #include <windef.h>
|
---|
| 24 | #include <winbase.h>
|
---|
| 25 | #include <winerror.h>
|
---|
| 26 | #include <wincrypt.h>
|
---|
| 27 | #include <winreg.h>
|
---|
| 28 |
|
---|
| 29 | #include "wine/test.h"
|
---|
| 30 |
|
---|
| 31 | HMODULE hCrypt;
|
---|
| 32 |
|
---|
| 33 | static void test_findAttribute(void)
|
---|
| 34 | {
|
---|
| 35 | PCRYPT_ATTRIBUTE ret;
|
---|
| 36 | BYTE blobbin[] = {0x02,0x01,0x01};
|
---|
| 37 | static CHAR oid[] = "1.2.3";
|
---|
| 38 | CRYPT_ATTR_BLOB blobs[] = { { sizeof blobbin, blobbin }, };
|
---|
| 39 | CRYPT_ATTRIBUTE attr = { oid, sizeof(blobs) / sizeof(blobs[0]), blobs };
|
---|
| 40 |
|
---|
| 41 | /* returns NULL, last error not set */
|
---|
| 42 | SetLastError(0xdeadbeef);
|
---|
| 43 | ret = CertFindAttribute(NULL, 0, NULL);
|
---|
| 44 | ok(ret == NULL, "Expected failure\n");
|
---|
| 45 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 46 | GetLastError());
|
---|
| 47 | if (0)
|
---|
| 48 | {
|
---|
| 49 | /* crashes */
|
---|
| 50 | SetLastError(0xdeadbeef);
|
---|
| 51 | ret = CertFindAttribute(NULL, 1, NULL);
|
---|
| 52 | /* returns NULL, last error is ERROR_INVALID_PARAMETER
|
---|
| 53 | * crashes on Vista
|
---|
| 54 | */
|
---|
| 55 | SetLastError(0xdeadbeef);
|
---|
| 56 | ret = CertFindAttribute(NULL, 1, &attr);
|
---|
| 57 | ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
| 58 | "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(),
|
---|
| 59 | GetLastError());
|
---|
| 60 | }
|
---|
| 61 | /* returns NULL, last error not set */
|
---|
| 62 | SetLastError(0xdeadbeef);
|
---|
| 63 | ret = CertFindAttribute("bogus", 1, &attr);
|
---|
| 64 | ok(ret == NULL, "Expected failure\n");
|
---|
| 65 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 66 | GetLastError());
|
---|
| 67 | /* returns NULL, last error not set */
|
---|
| 68 | SetLastError(0xdeadbeef);
|
---|
| 69 | ret = CertFindAttribute("1.2.4", 1, &attr);
|
---|
| 70 | ok(ret == NULL, "Expected failure\n");
|
---|
| 71 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 72 | GetLastError());
|
---|
| 73 | /* succeeds, last error not set */
|
---|
| 74 | SetLastError(0xdeadbeef);
|
---|
| 75 | ret = CertFindAttribute("1.2.3", 1, &attr);
|
---|
| 76 | ok(ret != NULL, "CertFindAttribute failed: %08x\n", GetLastError());
|
---|
| 77 | }
|
---|
| 78 |
|
---|
| 79 | static void test_findExtension(void)
|
---|
| 80 | {
|
---|
| 81 | PCERT_EXTENSION ret;
|
---|
| 82 | static CHAR oid[] = "1.2.3";
|
---|
| 83 | BYTE blobbin[] = {0x02,0x01,0x01};
|
---|
| 84 | CERT_EXTENSION ext = { oid, TRUE, { sizeof blobbin, blobbin } };
|
---|
| 85 |
|
---|
| 86 | /* returns NULL, last error not set */
|
---|
| 87 | SetLastError(0xdeadbeef);
|
---|
| 88 | ret = CertFindExtension(NULL, 0, NULL);
|
---|
| 89 | ok(ret == NULL, "Expected failure\n");
|
---|
| 90 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 91 | GetLastError());
|
---|
| 92 | if (0)
|
---|
| 93 | {
|
---|
| 94 | /* crashes */
|
---|
| 95 | SetLastError(0xdeadbeef);
|
---|
| 96 | ret = CertFindExtension(NULL, 1, NULL);
|
---|
| 97 | /* returns NULL, last error is ERROR_INVALID_PARAMETER
|
---|
| 98 | * crashes on Vista
|
---|
| 99 | */
|
---|
| 100 | SetLastError(0xdeadbeef);
|
---|
| 101 | ret = CertFindExtension(NULL, 1, &ext);
|
---|
| 102 | ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
| 103 | "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(),
|
---|
| 104 | GetLastError());
|
---|
| 105 | }
|
---|
| 106 | /* returns NULL, last error not set */
|
---|
| 107 | SetLastError(0xdeadbeef);
|
---|
| 108 | ret = CertFindExtension("bogus", 1, &ext);
|
---|
| 109 | ok(ret == NULL, "Expected failure\n");
|
---|
| 110 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 111 | GetLastError());
|
---|
| 112 | /* returns NULL, last error not set */
|
---|
| 113 | SetLastError(0xdeadbeef);
|
---|
| 114 | ret = CertFindExtension("1.2.4", 1, &ext);
|
---|
| 115 | ok(ret == NULL, "Expected failure\n");
|
---|
| 116 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 117 | GetLastError());
|
---|
| 118 | /* succeeds, last error not set */
|
---|
| 119 | SetLastError(0xdeadbeef);
|
---|
| 120 | ret = CertFindExtension("1.2.3", 1, &ext);
|
---|
| 121 | ok(ret != NULL, "CertFindExtension failed: %08x\n", GetLastError());
|
---|
| 122 | }
|
---|
| 123 |
|
---|
| 124 | static void test_findRDNAttr(void)
|
---|
| 125 | {
|
---|
| 126 | PCERT_RDN_ATTR ret;
|
---|
| 127 | static CHAR oid[] = "1.2.3";
|
---|
| 128 | BYTE bin[] = { 0x16,0x09,'J','u','a','n',' ','L','a','n','g' };
|
---|
| 129 | CERT_RDN_ATTR attrs[] = {
|
---|
| 130 | { oid, CERT_RDN_IA5_STRING, { sizeof bin, bin } },
|
---|
| 131 | };
|
---|
| 132 | CERT_RDN rdns[] = {
|
---|
| 133 | { sizeof(attrs) / sizeof(attrs[0]), attrs },
|
---|
| 134 | };
|
---|
| 135 | CERT_NAME_INFO nameInfo = { sizeof(rdns) / sizeof(rdns[0]), rdns };
|
---|
| 136 |
|
---|
| 137 | if (0)
|
---|
| 138 | {
|
---|
| 139 | /* crashes */
|
---|
| 140 | SetLastError(0xdeadbeef);
|
---|
| 141 | ret = CertFindRDNAttr(NULL, NULL);
|
---|
| 142 | /* returns NULL, last error is ERROR_INVALID_PARAMETER
|
---|
| 143 | * crashes on Vista
|
---|
| 144 | */
|
---|
| 145 | SetLastError(0xdeadbeef);
|
---|
| 146 | ret = CertFindRDNAttr(NULL, &nameInfo);
|
---|
| 147 | ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
| 148 | "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(),
|
---|
| 149 | GetLastError());
|
---|
| 150 | }
|
---|
| 151 | /* returns NULL, last error not set */
|
---|
| 152 | SetLastError(0xdeadbeef);
|
---|
| 153 | ret = CertFindRDNAttr("bogus", &nameInfo);
|
---|
| 154 | ok(ret == NULL, "Expected failure\n");
|
---|
| 155 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 156 | GetLastError());
|
---|
| 157 | /* returns NULL, last error not set */
|
---|
| 158 | SetLastError(0xdeadbeef);
|
---|
| 159 | ret = CertFindRDNAttr("1.2.4", &nameInfo);
|
---|
| 160 | ok(ret == NULL, "Expected failure\n");
|
---|
| 161 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
| 162 | GetLastError());
|
---|
| 163 | /* succeeds, last error not set */
|
---|
| 164 | SetLastError(0xdeadbeef);
|
---|
| 165 | ret = CertFindRDNAttr("1.2.3", &nameInfo);
|
---|
| 166 | ok(ret != NULL, "CertFindRDNAttr failed: %08x\n", GetLastError());
|
---|
| 167 | }
|
---|
| 168 |
|
---|
| 169 | static void test_verifyTimeValidity(void)
|
---|
| 170 | {
|
---|
| 171 | SYSTEMTIME sysTime;
|
---|
| 172 | FILETIME fileTime;
|
---|
| 173 | CERT_INFO info = { 0 };
|
---|
| 174 | LONG ret;
|
---|
| 175 |
|
---|
| 176 | GetSystemTime(&sysTime);
|
---|
| 177 | SystemTimeToFileTime(&sysTime, &fileTime);
|
---|
| 178 | /* crashes
|
---|
| 179 | ret = CertVerifyTimeValidity(NULL, NULL);
|
---|
| 180 | ret = CertVerifyTimeValidity(&fileTime, NULL);
|
---|
| 181 | */
|
---|
| 182 | /* Check with 0 NotBefore and NotAfter */
|
---|
| 183 | ret = CertVerifyTimeValidity(&fileTime, &info);
|
---|
| 184 | ok(ret == 1, "Expected 1, got %d\n", ret);
|
---|
| 185 | memcpy(&info.NotAfter, &fileTime, sizeof(info.NotAfter));
|
---|
| 186 | /* Check with NotAfter equal to comparison time */
|
---|
| 187 | ret = CertVerifyTimeValidity(&fileTime, &info);
|
---|
| 188 | ok(ret == 0, "Expected 0, got %d\n", ret);
|
---|
| 189 | /* Check with NotBefore after comparison time */
|
---|
| 190 | memcpy(&info.NotBefore, &fileTime, sizeof(info.NotBefore));
|
---|
| 191 | info.NotBefore.dwLowDateTime += 5000;
|
---|
| 192 | ret = CertVerifyTimeValidity(&fileTime, &info);
|
---|
| 193 | ok(ret == -1, "Expected -1, got %d\n", ret);
|
---|
| 194 | }
|
---|
| 195 |
|
---|
| 196 | static void test_cryptAllocate(void)
|
---|
| 197 | {
|
---|
| 198 | LPVOID buf;
|
---|
| 199 |
|
---|
| 200 | buf = CryptMemAlloc(0);
|
---|
| 201 | ok(buf != NULL, "CryptMemAlloc failed: %08x\n", GetLastError());
|
---|
| 202 | CryptMemFree(buf);
|
---|
| 203 | /* CryptMemRealloc(NULL, 0) fails pre-Vista */
|
---|
| 204 | buf = CryptMemAlloc(0);
|
---|
| 205 | buf = CryptMemRealloc(buf, 1);
|
---|
| 206 | ok(buf != NULL, "CryptMemRealloc failed: %08x\n", GetLastError());
|
---|
| 207 | CryptMemFree(buf);
|
---|
| 208 | }
|
---|
| 209 |
|
---|
| 210 | typedef DWORD (WINAPI *I_CryptAllocTlsFunc)(void);
|
---|
| 211 | typedef LPVOID (WINAPI *I_CryptDetachTlsFunc)(DWORD dwTlsIndex);
|
---|
| 212 | typedef LPVOID (WINAPI *I_CryptGetTlsFunc)(DWORD dwTlsIndex);
|
---|
| 213 | typedef BOOL (WINAPI *I_CryptSetTlsFunc)(DWORD dwTlsIndex, LPVOID lpTlsValue);
|
---|
| 214 | typedef BOOL (WINAPI *I_CryptFreeTlsFunc)(DWORD dwTlsIndex, DWORD unknown);
|
---|
| 215 |
|
---|
| 216 | static I_CryptAllocTlsFunc pI_CryptAllocTls;
|
---|
| 217 | static I_CryptDetachTlsFunc pI_CryptDetachTls;
|
---|
| 218 | static I_CryptGetTlsFunc pI_CryptGetTls;
|
---|
| 219 | static I_CryptSetTlsFunc pI_CryptSetTls;
|
---|
| 220 | static I_CryptFreeTlsFunc pI_CryptFreeTls;
|
---|
| 221 |
|
---|
| 222 | static void test_cryptTls(void)
|
---|
| 223 | {
|
---|
| 224 | DWORD index;
|
---|
| 225 | BOOL ret;
|
---|
| 226 |
|
---|
| 227 | pI_CryptAllocTls = (I_CryptAllocTlsFunc)GetProcAddress(hCrypt,
|
---|
| 228 | "I_CryptAllocTls");
|
---|
| 229 | pI_CryptDetachTls = (I_CryptDetachTlsFunc)GetProcAddress(hCrypt,
|
---|
| 230 | "I_CryptDetachTls");
|
---|
| 231 | pI_CryptGetTls = (I_CryptGetTlsFunc)GetProcAddress(hCrypt,
|
---|
| 232 | "I_CryptGetTls");
|
---|
| 233 | pI_CryptSetTls = (I_CryptSetTlsFunc)GetProcAddress(hCrypt,
|
---|
| 234 | "I_CryptSetTls");
|
---|
| 235 | pI_CryptFreeTls = (I_CryptFreeTlsFunc)GetProcAddress(hCrypt,
|
---|
| 236 | "I_CryptFreeTls");
|
---|
| 237 |
|
---|
| 238 | /* One normal pass */
|
---|
| 239 | index = pI_CryptAllocTls();
|
---|
| 240 | ok(index, "I_CryptAllocTls failed: %08x\n", GetLastError());
|
---|
| 241 | if (index)
|
---|
| 242 | {
|
---|
| 243 | LPVOID ptr;
|
---|
| 244 |
|
---|
| 245 | ptr = pI_CryptGetTls(index);
|
---|
| 246 | ok(!ptr, "Expected NULL\n");
|
---|
| 247 | ret = pI_CryptSetTls(index, (LPVOID)0xdeadbeef);
|
---|
| 248 | ok(ret, "I_CryptSetTls failed: %08x\n", GetLastError());
|
---|
| 249 | ptr = pI_CryptGetTls(index);
|
---|
| 250 | ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr);
|
---|
| 251 | /* This crashes
|
---|
| 252 | ret = pI_CryptFreeTls(index, 1);
|
---|
| 253 | */
|
---|
| 254 | ret = pI_CryptFreeTls(index, 0);
|
---|
| 255 | ok(ret, "I_CryptFreeTls failed: %08x\n", GetLastError());
|
---|
| 256 | ret = pI_CryptFreeTls(index, 0);
|
---|
| 257 | /* Not sure if this fails because TlsFree should fail, so leave as
|
---|
| 258 | * todo for now.
|
---|
| 259 | */
|
---|
| 260 | todo_wine ok(!ret && GetLastError() == E_INVALIDARG,
|
---|
| 261 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
| 262 | }
|
---|
| 263 | /* Similar pass, check I_CryptDetachTls */
|
---|
| 264 | index = pI_CryptAllocTls();
|
---|
| 265 | ok(index, "I_CryptAllocTls failed: %08x\n", GetLastError());
|
---|
| 266 | if (index)
|
---|
| 267 | {
|
---|
| 268 | LPVOID ptr;
|
---|
| 269 |
|
---|
| 270 | ptr = pI_CryptGetTls(index);
|
---|
| 271 | ok(!ptr, "Expected NULL\n");
|
---|
| 272 | ret = pI_CryptSetTls(index, (LPVOID)0xdeadbeef);
|
---|
| 273 | ok(ret, "I_CryptSetTls failed: %08x\n", GetLastError());
|
---|
| 274 | ptr = pI_CryptGetTls(index);
|
---|
| 275 | ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr);
|
---|
| 276 | ptr = pI_CryptDetachTls(index);
|
---|
| 277 | ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr);
|
---|
| 278 | ptr = pI_CryptGetTls(index);
|
---|
| 279 | ok(!ptr, "Expected NULL\n");
|
---|
| 280 | }
|
---|
| 281 | }
|
---|
| 282 |
|
---|
| 283 | typedef BOOL (WINAPI *I_CryptReadTrustedPublisherDWORDValueFromRegistryFunc)
|
---|
| 284 | (LPCWSTR, DWORD *);
|
---|
| 285 |
|
---|
| 286 | static void test_readTrustedPublisherDWORD(void)
|
---|
| 287 | {
|
---|
| 288 | I_CryptReadTrustedPublisherDWORDValueFromRegistryFunc pReadDWORD;
|
---|
| 289 |
|
---|
| 290 | pReadDWORD =
|
---|
| 291 | (I_CryptReadTrustedPublisherDWORDValueFromRegistryFunc)GetProcAddress(
|
---|
| 292 | hCrypt, "I_CryptReadTrustedPublisherDWORDValueFromRegistry");
|
---|
| 293 | if (pReadDWORD)
|
---|
| 294 | {
|
---|
| 295 | static const WCHAR safer[] = {
|
---|
| 296 | 'S','o','f','t','w','a','r','e','\\',
|
---|
| 297 | 'P','o','l','i','c','i','e','s','\\',
|
---|
| 298 | 'M','i','c','r','o','s','o','f','t','\\','S','y','s','t','e','m',
|
---|
| 299 | 'C','e','r','t','i','f','i','c','a','t','e','s','\\',
|
---|
| 300 | 'T','r','u','s','t','e','d','P','u','b','l','i','s','h','e','r',
|
---|
| 301 | '\\','S','a','f','e','r',0 };
|
---|
| 302 | static const WCHAR authenticodeFlags[] = { 'A','u','t','h','e','n',
|
---|
| 303 | 't','i','c','o','d','e','F','l','a','g','s',0 };
|
---|
| 304 | BOOL ret, exists = FALSE;
|
---|
| 305 | DWORD size, readFlags = 0, returnedFlags;
|
---|
| 306 | HKEY key;
|
---|
| 307 | LONG rc;
|
---|
| 308 |
|
---|
| 309 | rc = RegOpenKeyW(HKEY_LOCAL_MACHINE, safer, &key);
|
---|
| 310 | if (rc == ERROR_SUCCESS)
|
---|
| 311 | {
|
---|
| 312 | size = sizeof(readFlags);
|
---|
| 313 | rc = RegQueryValueExW(key, authenticodeFlags, NULL, NULL,
|
---|
| 314 | (LPBYTE)&readFlags, &size);
|
---|
| 315 | if (rc == ERROR_SUCCESS)
|
---|
| 316 | exists = TRUE;
|
---|
| 317 | }
|
---|
| 318 | returnedFlags = 0xdeadbeef;
|
---|
| 319 | ret = pReadDWORD(authenticodeFlags, &returnedFlags);
|
---|
| 320 | ok(ret == exists, "Unexpected return value\n");
|
---|
| 321 | ok(readFlags == returnedFlags,
|
---|
| 322 | "Expected flags %08x, got %08x\n", readFlags, returnedFlags);
|
---|
| 323 | }
|
---|
| 324 | }
|
---|
| 325 |
|
---|
| 326 | typedef HCRYPTPROV (WINAPI *I_CryptGetDefaultCryptProvFunc)(DWORD w);
|
---|
| 327 |
|
---|
| 328 | static void test_getDefaultCryptProv(void)
|
---|
| 329 | {
|
---|
| 330 | I_CryptGetDefaultCryptProvFunc pI_CryptGetDefaultCryptProv;
|
---|
| 331 | HCRYPTPROV prov;
|
---|
| 332 |
|
---|
| 333 | pI_CryptGetDefaultCryptProv = (I_CryptGetDefaultCryptProvFunc)
|
---|
| 334 | GetProcAddress(hCrypt, "I_CryptGetDefaultCryptProv");
|
---|
| 335 | if (!pI_CryptGetDefaultCryptProv) return;
|
---|
| 336 |
|
---|
| 337 | prov = pI_CryptGetDefaultCryptProv(0xdeadbeef);
|
---|
| 338 | ok(prov == 0 && GetLastError() == E_INVALIDARG,
|
---|
| 339 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
| 340 | prov = pI_CryptGetDefaultCryptProv(PROV_RSA_FULL);
|
---|
| 341 | ok(prov == 0 && GetLastError() == E_INVALIDARG,
|
---|
| 342 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
| 343 | prov = pI_CryptGetDefaultCryptProv(1);
|
---|
| 344 | ok(prov == 0 && GetLastError() == E_INVALIDARG,
|
---|
| 345 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
| 346 | prov = pI_CryptGetDefaultCryptProv(0);
|
---|
| 347 | ok(prov != 0, "I_CryptGetDefaultCryptProv failed: %08x\n", GetLastError());
|
---|
| 348 | CryptReleaseContext(prov, 0);
|
---|
| 349 | }
|
---|
| 350 |
|
---|
| 351 | typedef int (WINAPI *I_CryptInstallOssGlobal)(DWORD,DWORD,DWORD);
|
---|
| 352 |
|
---|
| 353 | static void test_CryptInstallOssGlobal(void)
|
---|
| 354 | {
|
---|
| 355 | int ret,i;
|
---|
| 356 | I_CryptInstallOssGlobal pI_CryptInstallOssGlobal;
|
---|
| 357 |
|
---|
| 358 | pI_CryptInstallOssGlobal= (I_CryptInstallOssGlobal)GetProcAddress(hCrypt,"I_CryptInstallOssGlobal");
|
---|
| 359 | /* passing in some random values to I_CryptInstallOssGlobal, it always returns 9 the first time, then 10, 11 etc.*/
|
---|
| 360 | for(i=0;i<30;i++)
|
---|
| 361 | {
|
---|
| 362 | ret = pI_CryptInstallOssGlobal(rand(),rand(),rand());
|
---|
| 363 | ok((9+i) == ret ||
|
---|
| 364 | ret == 0, /* Vista */
|
---|
| 365 | "Expected %d or 0, got %d\n",(9+i),ret);
|
---|
| 366 | }
|
---|
| 367 | }
|
---|
| 368 |
|
---|
| 369 | static BOOL (WINAPI *pCryptFormatObject)(DWORD dwEncoding, DWORD dwFormatType,
|
---|
| 370 | DWORD dwFormatStrType, void *pFormatStruct, LPCSTR lpszStructType,
|
---|
| 371 | const BYTE *pbEncoded, DWORD dwEncoded, void *pbFormat, DWORD *pcbFormat);
|
---|
| 372 |
|
---|
| 373 | static const BYTE encodedInt[] = { 0x02,0x01,0x01 };
|
---|
| 374 | static const WCHAR encodedIntStr[] = { '0','2',' ','0','1',' ','0','1',0 };
|
---|
| 375 | static const BYTE encodedBigInt[] = { 0x02,0x1f,0x01,0x02,0x03,0x04,0x05,0x06,
|
---|
| 376 | 0x07,0x08,0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,0x10,0x11,0x12,0x13,0x14,0x15,
|
---|
| 377 | 0x16,0x17,0x18,0x19,0x1a,0x1b,0x1c,0x1d,0x1e,0x1f };
|
---|
| 378 | static const WCHAR encodedBigIntStr[] = { '0','2',' ','1','f',' ','0','1',' ',
|
---|
| 379 | '0','2',' ','0','3',' ','0','4',' ','0','5',' ','0','6',' ','0','7',' ','0',
|
---|
| 380 | '8',' ','0','9',' ','0','a',' ','0','b',' ','0','c',' ','0','d',' ','0','e',
|
---|
| 381 | ' ','0','f',' ','1','0',' ','1','1',' ','1','2',' ','1','3',' ','1','4',' ',
|
---|
| 382 | '1','5',' ','1','6',' ','1','7',' ','1','8',' ','1','9',' ','1','a',' ','1',
|
---|
| 383 | 'b',' ','1','c',' ','1','d',' ','1','e',' ','1','f',0 };
|
---|
| 384 |
|
---|
| 385 | static void test_format_object(void)
|
---|
| 386 | {
|
---|
| 387 | BOOL ret;
|
---|
| 388 | DWORD size;
|
---|
| 389 | LPWSTR str;
|
---|
| 390 |
|
---|
| 391 | pCryptFormatObject = (void *)GetProcAddress(hCrypt, "CryptFormatObject");
|
---|
| 392 | if (!pCryptFormatObject)
|
---|
| 393 | {
|
---|
| 394 | skip("No CryptFormatObject\n");
|
---|
| 395 | return;
|
---|
| 396 | }
|
---|
| 397 | /* Crash */
|
---|
| 398 | if (0)
|
---|
| 399 | {
|
---|
| 400 | ret = pCryptFormatObject(0, 0, 0, NULL, NULL, NULL, 0, NULL, NULL);
|
---|
| 401 | }
|
---|
| 402 | /* When called with any but the default encoding, it fails to find a
|
---|
| 403 | * formatting function.
|
---|
| 404 | */
|
---|
| 405 | SetLastError(0xdeadbeef);
|
---|
| 406 | ret = pCryptFormatObject(0, 0, 0, NULL, NULL, NULL, 0, NULL, &size);
|
---|
| 407 | ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
---|
| 408 | "expected ERROR_FILE_NOT_FOUND, got %d\n", GetLastError());
|
---|
| 409 | /* When called with the default encoding type for any undefined struct type
|
---|
| 410 | * (including none), it succeeds: the default encoding is a hex string
|
---|
| 411 | * encoding.
|
---|
| 412 | */
|
---|
| 413 | SetLastError(0xdeadbeef);
|
---|
| 414 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0,
|
---|
| 415 | NULL, &size);
|
---|
| 416 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
| 417 | if (ret)
|
---|
| 418 | {
|
---|
| 419 | if (size == 0 && GetLastError() == ERROR_FILE_NOT_FOUND)
|
---|
| 420 | {
|
---|
| 421 | win_skip("CryptFormatObject has no default implementation\n");
|
---|
| 422 | return;
|
---|
| 423 | }
|
---|
| 424 | ok(size == sizeof(WCHAR), "unexpected size %d\n", size);
|
---|
| 425 | str = HeapAlloc(GetProcessHeap(), 0, size);
|
---|
| 426 | SetLastError(0xdeadbeef);
|
---|
| 427 | size = 0;
|
---|
| 428 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0,
|
---|
| 429 | str, &size);
|
---|
| 430 | ok(!ret && GetLastError() == ERROR_MORE_DATA,
|
---|
| 431 | "expected ERROR_MORE_DATA, got %d\n", GetLastError());
|
---|
| 432 | size = sizeof(WCHAR);
|
---|
| 433 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0,
|
---|
| 434 | str, &size);
|
---|
| 435 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
| 436 | ok(!str[0], "expected empty string\n");
|
---|
| 437 | HeapFree(GetProcessHeap(), 0, str);
|
---|
| 438 | }
|
---|
| 439 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, encodedInt,
|
---|
| 440 | sizeof(encodedInt), NULL, &size);
|
---|
| 441 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
| 442 | if (ret)
|
---|
| 443 | {
|
---|
| 444 | str = HeapAlloc(GetProcessHeap(), 0, size);
|
---|
| 445 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
---|
| 446 | encodedInt, sizeof(encodedInt), str, &size);
|
---|
| 447 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
| 448 | ok(!lstrcmpW(str, encodedIntStr), "unexpected format string\n");
|
---|
| 449 | HeapFree(GetProcessHeap(), 0, str);
|
---|
| 450 | }
|
---|
| 451 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
---|
| 452 | encodedBigInt, sizeof(encodedBigInt), NULL, &size);
|
---|
| 453 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
| 454 | if (ret)
|
---|
| 455 | {
|
---|
| 456 | str = HeapAlloc(GetProcessHeap(), 0, size);
|
---|
| 457 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
---|
| 458 | encodedBigInt, sizeof(encodedBigInt), str, &size);
|
---|
| 459 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
| 460 | ok(!lstrcmpiW(str, encodedBigIntStr), "unexpected format string\n");
|
---|
| 461 | HeapFree(GetProcessHeap(), 0, str);
|
---|
| 462 | }
|
---|
| 463 | /* When called with the default encoding type for any undefined struct
|
---|
| 464 | * type but CRYPT_FORMAT_STR_NO_HEX specified, it fails to find a
|
---|
| 465 | * formatting function.
|
---|
| 466 | */
|
---|
| 467 | SetLastError(0xdeadbeef);
|
---|
| 468 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, CRYPT_FORMAT_STR_NO_HEX,
|
---|
| 469 | NULL, NULL, NULL, 0, NULL, &size);
|
---|
| 470 | ok(!ret, "CryptFormatObject succeeded\n");
|
---|
| 471 | ok(GetLastError() == ERROR_FILE_NOT_FOUND ||
|
---|
| 472 | GetLastError() == 0xdeadbeef, /* Vista, W2K8 */
|
---|
| 473 | "expected ERROR_FILE_NOT_FOUND or no change, got %d\n", GetLastError());
|
---|
| 474 | /* When called to format an AUTHORITY_KEY_ID2_INFO, it fails when no
|
---|
| 475 | * data are given.
|
---|
| 476 | */
|
---|
| 477 | SetLastError(0xdeadbeef);
|
---|
| 478 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL,
|
---|
| 479 | szOID_AUTHORITY_KEY_IDENTIFIER2, NULL, 0, NULL, &size);
|
---|
| 480 | ok(!ret && GetLastError() == E_INVALIDARG,
|
---|
| 481 | "expected E_INVALIDARG, got %d\n", GetLastError());
|
---|
| 482 | }
|
---|
| 483 |
|
---|
| 484 | START_TEST(main)
|
---|
| 485 | {
|
---|
| 486 | hCrypt = GetModuleHandleA("crypt32.dll");
|
---|
| 487 |
|
---|
| 488 | test_findAttribute();
|
---|
| 489 | test_findExtension();
|
---|
| 490 | test_findRDNAttr();
|
---|
| 491 | test_verifyTimeValidity();
|
---|
| 492 | test_cryptAllocate();
|
---|
| 493 | test_cryptTls();
|
---|
| 494 | test_readTrustedPublisherDWORD();
|
---|
| 495 | test_getDefaultCryptProv();
|
---|
| 496 | test_CryptInstallOssGlobal();
|
---|
| 497 | test_format_object();
|
---|
| 498 | }
|
---|