1 | /*
|
---|
2 | * Miscellaneous crypt32 tests
|
---|
3 | *
|
---|
4 | * Copyright 2005 Juan Lang
|
---|
5 | *
|
---|
6 | * This library is free software; you can redistribute it and/or
|
---|
7 | * modify it under the terms of the GNU Lesser General Public
|
---|
8 | * License as published by the Free Software Foundation; either
|
---|
9 | * version 2.1 of the License, or (at your option) any later version.
|
---|
10 | *
|
---|
11 | * This library is distributed in the hope that it will be useful,
|
---|
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
14 | * Lesser General Public License for more details.
|
---|
15 | *
|
---|
16 | * You should have received a copy of the GNU Lesser General Public
|
---|
17 | * License along with this library; if not, write to the Free Software
|
---|
18 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
---|
19 | */
|
---|
20 |
|
---|
21 | #include <stdio.h>
|
---|
22 | #include <stdarg.h>
|
---|
23 | #include <windef.h>
|
---|
24 | #include <winbase.h>
|
---|
25 | #include <winerror.h>
|
---|
26 | #include <wincrypt.h>
|
---|
27 | #include <winreg.h>
|
---|
28 |
|
---|
29 | #include "wine/test.h"
|
---|
30 |
|
---|
31 | HMODULE hCrypt;
|
---|
32 |
|
---|
33 | static void test_findAttribute(void)
|
---|
34 | {
|
---|
35 | PCRYPT_ATTRIBUTE ret;
|
---|
36 | BYTE blobbin[] = {0x02,0x01,0x01};
|
---|
37 | static CHAR oid[] = "1.2.3";
|
---|
38 | CRYPT_ATTR_BLOB blobs[] = { { sizeof blobbin, blobbin }, };
|
---|
39 | CRYPT_ATTRIBUTE attr = { oid, sizeof(blobs) / sizeof(blobs[0]), blobs };
|
---|
40 |
|
---|
41 | /* returns NULL, last error not set */
|
---|
42 | SetLastError(0xdeadbeef);
|
---|
43 | ret = CertFindAttribute(NULL, 0, NULL);
|
---|
44 | ok(ret == NULL, "Expected failure\n");
|
---|
45 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
46 | GetLastError());
|
---|
47 | if (0)
|
---|
48 | {
|
---|
49 | /* crashes */
|
---|
50 | SetLastError(0xdeadbeef);
|
---|
51 | ret = CertFindAttribute(NULL, 1, NULL);
|
---|
52 | /* returns NULL, last error is ERROR_INVALID_PARAMETER
|
---|
53 | * crashes on Vista
|
---|
54 | */
|
---|
55 | SetLastError(0xdeadbeef);
|
---|
56 | ret = CertFindAttribute(NULL, 1, &attr);
|
---|
57 | ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
58 | "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(),
|
---|
59 | GetLastError());
|
---|
60 | }
|
---|
61 | /* returns NULL, last error not set */
|
---|
62 | SetLastError(0xdeadbeef);
|
---|
63 | ret = CertFindAttribute("bogus", 1, &attr);
|
---|
64 | ok(ret == NULL, "Expected failure\n");
|
---|
65 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
66 | GetLastError());
|
---|
67 | /* returns NULL, last error not set */
|
---|
68 | SetLastError(0xdeadbeef);
|
---|
69 | ret = CertFindAttribute("1.2.4", 1, &attr);
|
---|
70 | ok(ret == NULL, "Expected failure\n");
|
---|
71 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
72 | GetLastError());
|
---|
73 | /* succeeds, last error not set */
|
---|
74 | SetLastError(0xdeadbeef);
|
---|
75 | ret = CertFindAttribute("1.2.3", 1, &attr);
|
---|
76 | ok(ret != NULL, "CertFindAttribute failed: %08x\n", GetLastError());
|
---|
77 | }
|
---|
78 |
|
---|
79 | static void test_findExtension(void)
|
---|
80 | {
|
---|
81 | PCERT_EXTENSION ret;
|
---|
82 | static CHAR oid[] = "1.2.3";
|
---|
83 | BYTE blobbin[] = {0x02,0x01,0x01};
|
---|
84 | CERT_EXTENSION ext = { oid, TRUE, { sizeof blobbin, blobbin } };
|
---|
85 |
|
---|
86 | /* returns NULL, last error not set */
|
---|
87 | SetLastError(0xdeadbeef);
|
---|
88 | ret = CertFindExtension(NULL, 0, NULL);
|
---|
89 | ok(ret == NULL, "Expected failure\n");
|
---|
90 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
91 | GetLastError());
|
---|
92 | if (0)
|
---|
93 | {
|
---|
94 | /* crashes */
|
---|
95 | SetLastError(0xdeadbeef);
|
---|
96 | ret = CertFindExtension(NULL, 1, NULL);
|
---|
97 | /* returns NULL, last error is ERROR_INVALID_PARAMETER
|
---|
98 | * crashes on Vista
|
---|
99 | */
|
---|
100 | SetLastError(0xdeadbeef);
|
---|
101 | ret = CertFindExtension(NULL, 1, &ext);
|
---|
102 | ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
103 | "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(),
|
---|
104 | GetLastError());
|
---|
105 | }
|
---|
106 | /* returns NULL, last error not set */
|
---|
107 | SetLastError(0xdeadbeef);
|
---|
108 | ret = CertFindExtension("bogus", 1, &ext);
|
---|
109 | ok(ret == NULL, "Expected failure\n");
|
---|
110 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
111 | GetLastError());
|
---|
112 | /* returns NULL, last error not set */
|
---|
113 | SetLastError(0xdeadbeef);
|
---|
114 | ret = CertFindExtension("1.2.4", 1, &ext);
|
---|
115 | ok(ret == NULL, "Expected failure\n");
|
---|
116 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
117 | GetLastError());
|
---|
118 | /* succeeds, last error not set */
|
---|
119 | SetLastError(0xdeadbeef);
|
---|
120 | ret = CertFindExtension("1.2.3", 1, &ext);
|
---|
121 | ok(ret != NULL, "CertFindExtension failed: %08x\n", GetLastError());
|
---|
122 | }
|
---|
123 |
|
---|
124 | static void test_findRDNAttr(void)
|
---|
125 | {
|
---|
126 | PCERT_RDN_ATTR ret;
|
---|
127 | static CHAR oid[] = "1.2.3";
|
---|
128 | BYTE bin[] = { 0x16,0x09,'J','u','a','n',' ','L','a','n','g' };
|
---|
129 | CERT_RDN_ATTR attrs[] = {
|
---|
130 | { oid, CERT_RDN_IA5_STRING, { sizeof bin, bin } },
|
---|
131 | };
|
---|
132 | CERT_RDN rdns[] = {
|
---|
133 | { sizeof(attrs) / sizeof(attrs[0]), attrs },
|
---|
134 | };
|
---|
135 | CERT_NAME_INFO nameInfo = { sizeof(rdns) / sizeof(rdns[0]), rdns };
|
---|
136 |
|
---|
137 | if (0)
|
---|
138 | {
|
---|
139 | /* crashes */
|
---|
140 | SetLastError(0xdeadbeef);
|
---|
141 | ret = CertFindRDNAttr(NULL, NULL);
|
---|
142 | /* returns NULL, last error is ERROR_INVALID_PARAMETER
|
---|
143 | * crashes on Vista
|
---|
144 | */
|
---|
145 | SetLastError(0xdeadbeef);
|
---|
146 | ret = CertFindRDNAttr(NULL, &nameInfo);
|
---|
147 | ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
148 | "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(),
|
---|
149 | GetLastError());
|
---|
150 | }
|
---|
151 | /* returns NULL, last error not set */
|
---|
152 | SetLastError(0xdeadbeef);
|
---|
153 | ret = CertFindRDNAttr("bogus", &nameInfo);
|
---|
154 | ok(ret == NULL, "Expected failure\n");
|
---|
155 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
156 | GetLastError());
|
---|
157 | /* returns NULL, last error not set */
|
---|
158 | SetLastError(0xdeadbeef);
|
---|
159 | ret = CertFindRDNAttr("1.2.4", &nameInfo);
|
---|
160 | ok(ret == NULL, "Expected failure\n");
|
---|
161 | ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n",
|
---|
162 | GetLastError());
|
---|
163 | /* succeeds, last error not set */
|
---|
164 | SetLastError(0xdeadbeef);
|
---|
165 | ret = CertFindRDNAttr("1.2.3", &nameInfo);
|
---|
166 | ok(ret != NULL, "CertFindRDNAttr failed: %08x\n", GetLastError());
|
---|
167 | }
|
---|
168 |
|
---|
169 | static void test_verifyTimeValidity(void)
|
---|
170 | {
|
---|
171 | SYSTEMTIME sysTime;
|
---|
172 | FILETIME fileTime;
|
---|
173 | CERT_INFO info = { 0 };
|
---|
174 | LONG ret;
|
---|
175 |
|
---|
176 | GetSystemTime(&sysTime);
|
---|
177 | SystemTimeToFileTime(&sysTime, &fileTime);
|
---|
178 | /* crashes
|
---|
179 | ret = CertVerifyTimeValidity(NULL, NULL);
|
---|
180 | ret = CertVerifyTimeValidity(&fileTime, NULL);
|
---|
181 | */
|
---|
182 | /* Check with 0 NotBefore and NotAfter */
|
---|
183 | ret = CertVerifyTimeValidity(&fileTime, &info);
|
---|
184 | ok(ret == 1, "Expected 1, got %d\n", ret);
|
---|
185 | memcpy(&info.NotAfter, &fileTime, sizeof(info.NotAfter));
|
---|
186 | /* Check with NotAfter equal to comparison time */
|
---|
187 | ret = CertVerifyTimeValidity(&fileTime, &info);
|
---|
188 | ok(ret == 0, "Expected 0, got %d\n", ret);
|
---|
189 | /* Check with NotBefore after comparison time */
|
---|
190 | memcpy(&info.NotBefore, &fileTime, sizeof(info.NotBefore));
|
---|
191 | info.NotBefore.dwLowDateTime += 5000;
|
---|
192 | ret = CertVerifyTimeValidity(&fileTime, &info);
|
---|
193 | ok(ret == -1, "Expected -1, got %d\n", ret);
|
---|
194 | }
|
---|
195 |
|
---|
196 | static void test_cryptAllocate(void)
|
---|
197 | {
|
---|
198 | LPVOID buf;
|
---|
199 |
|
---|
200 | buf = CryptMemAlloc(0);
|
---|
201 | ok(buf != NULL, "CryptMemAlloc failed: %08x\n", GetLastError());
|
---|
202 | CryptMemFree(buf);
|
---|
203 | /* CryptMemRealloc(NULL, 0) fails pre-Vista */
|
---|
204 | buf = CryptMemAlloc(0);
|
---|
205 | buf = CryptMemRealloc(buf, 1);
|
---|
206 | ok(buf != NULL, "CryptMemRealloc failed: %08x\n", GetLastError());
|
---|
207 | CryptMemFree(buf);
|
---|
208 | }
|
---|
209 |
|
---|
210 | typedef DWORD (WINAPI *I_CryptAllocTlsFunc)(void);
|
---|
211 | typedef LPVOID (WINAPI *I_CryptDetachTlsFunc)(DWORD dwTlsIndex);
|
---|
212 | typedef LPVOID (WINAPI *I_CryptGetTlsFunc)(DWORD dwTlsIndex);
|
---|
213 | typedef BOOL (WINAPI *I_CryptSetTlsFunc)(DWORD dwTlsIndex, LPVOID lpTlsValue);
|
---|
214 | typedef BOOL (WINAPI *I_CryptFreeTlsFunc)(DWORD dwTlsIndex, DWORD unknown);
|
---|
215 |
|
---|
216 | static I_CryptAllocTlsFunc pI_CryptAllocTls;
|
---|
217 | static I_CryptDetachTlsFunc pI_CryptDetachTls;
|
---|
218 | static I_CryptGetTlsFunc pI_CryptGetTls;
|
---|
219 | static I_CryptSetTlsFunc pI_CryptSetTls;
|
---|
220 | static I_CryptFreeTlsFunc pI_CryptFreeTls;
|
---|
221 |
|
---|
222 | static void test_cryptTls(void)
|
---|
223 | {
|
---|
224 | DWORD index;
|
---|
225 | BOOL ret;
|
---|
226 |
|
---|
227 | pI_CryptAllocTls = (I_CryptAllocTlsFunc)GetProcAddress(hCrypt,
|
---|
228 | "I_CryptAllocTls");
|
---|
229 | pI_CryptDetachTls = (I_CryptDetachTlsFunc)GetProcAddress(hCrypt,
|
---|
230 | "I_CryptDetachTls");
|
---|
231 | pI_CryptGetTls = (I_CryptGetTlsFunc)GetProcAddress(hCrypt,
|
---|
232 | "I_CryptGetTls");
|
---|
233 | pI_CryptSetTls = (I_CryptSetTlsFunc)GetProcAddress(hCrypt,
|
---|
234 | "I_CryptSetTls");
|
---|
235 | pI_CryptFreeTls = (I_CryptFreeTlsFunc)GetProcAddress(hCrypt,
|
---|
236 | "I_CryptFreeTls");
|
---|
237 |
|
---|
238 | /* One normal pass */
|
---|
239 | index = pI_CryptAllocTls();
|
---|
240 | ok(index, "I_CryptAllocTls failed: %08x\n", GetLastError());
|
---|
241 | if (index)
|
---|
242 | {
|
---|
243 | LPVOID ptr;
|
---|
244 |
|
---|
245 | ptr = pI_CryptGetTls(index);
|
---|
246 | ok(!ptr, "Expected NULL\n");
|
---|
247 | ret = pI_CryptSetTls(index, (LPVOID)0xdeadbeef);
|
---|
248 | ok(ret, "I_CryptSetTls failed: %08x\n", GetLastError());
|
---|
249 | ptr = pI_CryptGetTls(index);
|
---|
250 | ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr);
|
---|
251 | /* This crashes
|
---|
252 | ret = pI_CryptFreeTls(index, 1);
|
---|
253 | */
|
---|
254 | ret = pI_CryptFreeTls(index, 0);
|
---|
255 | ok(ret, "I_CryptFreeTls failed: %08x\n", GetLastError());
|
---|
256 | ret = pI_CryptFreeTls(index, 0);
|
---|
257 | /* Not sure if this fails because TlsFree should fail, so leave as
|
---|
258 | * todo for now.
|
---|
259 | */
|
---|
260 | todo_wine ok(!ret && GetLastError() == E_INVALIDARG,
|
---|
261 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
262 | }
|
---|
263 | /* Similar pass, check I_CryptDetachTls */
|
---|
264 | index = pI_CryptAllocTls();
|
---|
265 | ok(index, "I_CryptAllocTls failed: %08x\n", GetLastError());
|
---|
266 | if (index)
|
---|
267 | {
|
---|
268 | LPVOID ptr;
|
---|
269 |
|
---|
270 | ptr = pI_CryptGetTls(index);
|
---|
271 | ok(!ptr, "Expected NULL\n");
|
---|
272 | ret = pI_CryptSetTls(index, (LPVOID)0xdeadbeef);
|
---|
273 | ok(ret, "I_CryptSetTls failed: %08x\n", GetLastError());
|
---|
274 | ptr = pI_CryptGetTls(index);
|
---|
275 | ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr);
|
---|
276 | ptr = pI_CryptDetachTls(index);
|
---|
277 | ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr);
|
---|
278 | ptr = pI_CryptGetTls(index);
|
---|
279 | ok(!ptr, "Expected NULL\n");
|
---|
280 | }
|
---|
281 | }
|
---|
282 |
|
---|
283 | typedef BOOL (WINAPI *I_CryptReadTrustedPublisherDWORDValueFromRegistryFunc)
|
---|
284 | (LPCWSTR, DWORD *);
|
---|
285 |
|
---|
286 | static void test_readTrustedPublisherDWORD(void)
|
---|
287 | {
|
---|
288 | I_CryptReadTrustedPublisherDWORDValueFromRegistryFunc pReadDWORD;
|
---|
289 |
|
---|
290 | pReadDWORD =
|
---|
291 | (I_CryptReadTrustedPublisherDWORDValueFromRegistryFunc)GetProcAddress(
|
---|
292 | hCrypt, "I_CryptReadTrustedPublisherDWORDValueFromRegistry");
|
---|
293 | if (pReadDWORD)
|
---|
294 | {
|
---|
295 | static const WCHAR safer[] = {
|
---|
296 | 'S','o','f','t','w','a','r','e','\\',
|
---|
297 | 'P','o','l','i','c','i','e','s','\\',
|
---|
298 | 'M','i','c','r','o','s','o','f','t','\\','S','y','s','t','e','m',
|
---|
299 | 'C','e','r','t','i','f','i','c','a','t','e','s','\\',
|
---|
300 | 'T','r','u','s','t','e','d','P','u','b','l','i','s','h','e','r',
|
---|
301 | '\\','S','a','f','e','r',0 };
|
---|
302 | static const WCHAR authenticodeFlags[] = { 'A','u','t','h','e','n',
|
---|
303 | 't','i','c','o','d','e','F','l','a','g','s',0 };
|
---|
304 | BOOL ret, exists = FALSE;
|
---|
305 | DWORD size, readFlags = 0, returnedFlags;
|
---|
306 | HKEY key;
|
---|
307 | LONG rc;
|
---|
308 |
|
---|
309 | rc = RegOpenKeyW(HKEY_LOCAL_MACHINE, safer, &key);
|
---|
310 | if (rc == ERROR_SUCCESS)
|
---|
311 | {
|
---|
312 | size = sizeof(readFlags);
|
---|
313 | rc = RegQueryValueExW(key, authenticodeFlags, NULL, NULL,
|
---|
314 | (LPBYTE)&readFlags, &size);
|
---|
315 | if (rc == ERROR_SUCCESS)
|
---|
316 | exists = TRUE;
|
---|
317 | }
|
---|
318 | returnedFlags = 0xdeadbeef;
|
---|
319 | ret = pReadDWORD(authenticodeFlags, &returnedFlags);
|
---|
320 | ok(ret == exists, "Unexpected return value\n");
|
---|
321 | ok(readFlags == returnedFlags,
|
---|
322 | "Expected flags %08x, got %08x\n", readFlags, returnedFlags);
|
---|
323 | }
|
---|
324 | }
|
---|
325 |
|
---|
326 | typedef HCRYPTPROV (WINAPI *I_CryptGetDefaultCryptProvFunc)(DWORD w);
|
---|
327 |
|
---|
328 | static void test_getDefaultCryptProv(void)
|
---|
329 | {
|
---|
330 | I_CryptGetDefaultCryptProvFunc pI_CryptGetDefaultCryptProv;
|
---|
331 | HCRYPTPROV prov;
|
---|
332 |
|
---|
333 | pI_CryptGetDefaultCryptProv = (I_CryptGetDefaultCryptProvFunc)
|
---|
334 | GetProcAddress(hCrypt, "I_CryptGetDefaultCryptProv");
|
---|
335 | if (!pI_CryptGetDefaultCryptProv) return;
|
---|
336 |
|
---|
337 | prov = pI_CryptGetDefaultCryptProv(0xdeadbeef);
|
---|
338 | ok(prov == 0 && GetLastError() == E_INVALIDARG,
|
---|
339 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
340 | prov = pI_CryptGetDefaultCryptProv(PROV_RSA_FULL);
|
---|
341 | ok(prov == 0 && GetLastError() == E_INVALIDARG,
|
---|
342 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
343 | prov = pI_CryptGetDefaultCryptProv(1);
|
---|
344 | ok(prov == 0 && GetLastError() == E_INVALIDARG,
|
---|
345 | "Expected E_INVALIDARG, got %08x\n", GetLastError());
|
---|
346 | prov = pI_CryptGetDefaultCryptProv(0);
|
---|
347 | ok(prov != 0, "I_CryptGetDefaultCryptProv failed: %08x\n", GetLastError());
|
---|
348 | CryptReleaseContext(prov, 0);
|
---|
349 | }
|
---|
350 |
|
---|
351 | typedef int (WINAPI *I_CryptInstallOssGlobal)(DWORD,DWORD,DWORD);
|
---|
352 |
|
---|
353 | static void test_CryptInstallOssGlobal(void)
|
---|
354 | {
|
---|
355 | int ret,i;
|
---|
356 | I_CryptInstallOssGlobal pI_CryptInstallOssGlobal;
|
---|
357 |
|
---|
358 | pI_CryptInstallOssGlobal= (I_CryptInstallOssGlobal)GetProcAddress(hCrypt,"I_CryptInstallOssGlobal");
|
---|
359 | /* passing in some random values to I_CryptInstallOssGlobal, it always returns 9 the first time, then 10, 11 etc.*/
|
---|
360 | for(i=0;i<30;i++)
|
---|
361 | {
|
---|
362 | ret = pI_CryptInstallOssGlobal(rand(),rand(),rand());
|
---|
363 | ok((9+i) == ret ||
|
---|
364 | ret == 0, /* Vista */
|
---|
365 | "Expected %d or 0, got %d\n",(9+i),ret);
|
---|
366 | }
|
---|
367 | }
|
---|
368 |
|
---|
369 | static BOOL (WINAPI *pCryptFormatObject)(DWORD dwEncoding, DWORD dwFormatType,
|
---|
370 | DWORD dwFormatStrType, void *pFormatStruct, LPCSTR lpszStructType,
|
---|
371 | const BYTE *pbEncoded, DWORD dwEncoded, void *pbFormat, DWORD *pcbFormat);
|
---|
372 |
|
---|
373 | static const BYTE encodedInt[] = { 0x02,0x01,0x01 };
|
---|
374 | static const WCHAR encodedIntStr[] = { '0','2',' ','0','1',' ','0','1',0 };
|
---|
375 | static const BYTE encodedBigInt[] = { 0x02,0x1f,0x01,0x02,0x03,0x04,0x05,0x06,
|
---|
376 | 0x07,0x08,0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,0x10,0x11,0x12,0x13,0x14,0x15,
|
---|
377 | 0x16,0x17,0x18,0x19,0x1a,0x1b,0x1c,0x1d,0x1e,0x1f };
|
---|
378 | static const WCHAR encodedBigIntStr[] = { '0','2',' ','1','f',' ','0','1',' ',
|
---|
379 | '0','2',' ','0','3',' ','0','4',' ','0','5',' ','0','6',' ','0','7',' ','0',
|
---|
380 | '8',' ','0','9',' ','0','a',' ','0','b',' ','0','c',' ','0','d',' ','0','e',
|
---|
381 | ' ','0','f',' ','1','0',' ','1','1',' ','1','2',' ','1','3',' ','1','4',' ',
|
---|
382 | '1','5',' ','1','6',' ','1','7',' ','1','8',' ','1','9',' ','1','a',' ','1',
|
---|
383 | 'b',' ','1','c',' ','1','d',' ','1','e',' ','1','f',0 };
|
---|
384 |
|
---|
385 | static void test_format_object(void)
|
---|
386 | {
|
---|
387 | BOOL ret;
|
---|
388 | DWORD size;
|
---|
389 | LPWSTR str;
|
---|
390 |
|
---|
391 | pCryptFormatObject = (void *)GetProcAddress(hCrypt, "CryptFormatObject");
|
---|
392 | if (!pCryptFormatObject)
|
---|
393 | {
|
---|
394 | skip("No CryptFormatObject\n");
|
---|
395 | return;
|
---|
396 | }
|
---|
397 | /* Crash */
|
---|
398 | if (0)
|
---|
399 | {
|
---|
400 | ret = pCryptFormatObject(0, 0, 0, NULL, NULL, NULL, 0, NULL, NULL);
|
---|
401 | }
|
---|
402 | /* When called with any but the default encoding, it fails to find a
|
---|
403 | * formatting function.
|
---|
404 | */
|
---|
405 | SetLastError(0xdeadbeef);
|
---|
406 | ret = pCryptFormatObject(0, 0, 0, NULL, NULL, NULL, 0, NULL, &size);
|
---|
407 | ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
---|
408 | "expected ERROR_FILE_NOT_FOUND, got %d\n", GetLastError());
|
---|
409 | /* When called with the default encoding type for any undefined struct type
|
---|
410 | * (including none), it succeeds: the default encoding is a hex string
|
---|
411 | * encoding.
|
---|
412 | */
|
---|
413 | SetLastError(0xdeadbeef);
|
---|
414 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0,
|
---|
415 | NULL, &size);
|
---|
416 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
417 | if (ret)
|
---|
418 | {
|
---|
419 | if (size == 0 && GetLastError() == ERROR_FILE_NOT_FOUND)
|
---|
420 | {
|
---|
421 | win_skip("CryptFormatObject has no default implementation\n");
|
---|
422 | return;
|
---|
423 | }
|
---|
424 | ok(size == sizeof(WCHAR), "unexpected size %d\n", size);
|
---|
425 | str = HeapAlloc(GetProcessHeap(), 0, size);
|
---|
426 | SetLastError(0xdeadbeef);
|
---|
427 | size = 0;
|
---|
428 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0,
|
---|
429 | str, &size);
|
---|
430 | ok(!ret && GetLastError() == ERROR_MORE_DATA,
|
---|
431 | "expected ERROR_MORE_DATA, got %d\n", GetLastError());
|
---|
432 | size = sizeof(WCHAR);
|
---|
433 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0,
|
---|
434 | str, &size);
|
---|
435 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
436 | ok(!str[0], "expected empty string\n");
|
---|
437 | HeapFree(GetProcessHeap(), 0, str);
|
---|
438 | }
|
---|
439 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, encodedInt,
|
---|
440 | sizeof(encodedInt), NULL, &size);
|
---|
441 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
442 | if (ret)
|
---|
443 | {
|
---|
444 | str = HeapAlloc(GetProcessHeap(), 0, size);
|
---|
445 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
---|
446 | encodedInt, sizeof(encodedInt), str, &size);
|
---|
447 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
448 | ok(!lstrcmpW(str, encodedIntStr), "unexpected format string\n");
|
---|
449 | HeapFree(GetProcessHeap(), 0, str);
|
---|
450 | }
|
---|
451 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
---|
452 | encodedBigInt, sizeof(encodedBigInt), NULL, &size);
|
---|
453 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
454 | if (ret)
|
---|
455 | {
|
---|
456 | str = HeapAlloc(GetProcessHeap(), 0, size);
|
---|
457 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
---|
458 | encodedBigInt, sizeof(encodedBigInt), str, &size);
|
---|
459 | ok(ret, "CryptFormatObject failed: %d\n", GetLastError());
|
---|
460 | ok(!lstrcmpiW(str, encodedBigIntStr), "unexpected format string\n");
|
---|
461 | HeapFree(GetProcessHeap(), 0, str);
|
---|
462 | }
|
---|
463 | /* When called with the default encoding type for any undefined struct
|
---|
464 | * type but CRYPT_FORMAT_STR_NO_HEX specified, it fails to find a
|
---|
465 | * formatting function.
|
---|
466 | */
|
---|
467 | SetLastError(0xdeadbeef);
|
---|
468 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, CRYPT_FORMAT_STR_NO_HEX,
|
---|
469 | NULL, NULL, NULL, 0, NULL, &size);
|
---|
470 | ok(!ret, "CryptFormatObject succeeded\n");
|
---|
471 | ok(GetLastError() == ERROR_FILE_NOT_FOUND ||
|
---|
472 | GetLastError() == 0xdeadbeef, /* Vista, W2K8 */
|
---|
473 | "expected ERROR_FILE_NOT_FOUND or no change, got %d\n", GetLastError());
|
---|
474 | /* When called to format an AUTHORITY_KEY_ID2_INFO, it fails when no
|
---|
475 | * data are given.
|
---|
476 | */
|
---|
477 | SetLastError(0xdeadbeef);
|
---|
478 | ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL,
|
---|
479 | szOID_AUTHORITY_KEY_IDENTIFIER2, NULL, 0, NULL, &size);
|
---|
480 | ok(!ret && GetLastError() == E_INVALIDARG,
|
---|
481 | "expected E_INVALIDARG, got %d\n", GetLastError());
|
---|
482 | }
|
---|
483 |
|
---|
484 | START_TEST(main)
|
---|
485 | {
|
---|
486 | hCrypt = GetModuleHandleA("crypt32.dll");
|
---|
487 |
|
---|
488 | test_findAttribute();
|
---|
489 | test_findExtension();
|
---|
490 | test_findRDNAttr();
|
---|
491 | test_verifyTimeValidity();
|
---|
492 | test_cryptAllocate();
|
---|
493 | test_cryptTls();
|
---|
494 | test_readTrustedPublisherDWORD();
|
---|
495 | test_getDefaultCryptProv();
|
---|
496 | test_CryptInstallOssGlobal();
|
---|
497 | test_format_object();
|
---|
498 | }
|
---|