1 | /*
|
---|
2 | * Subject Interface Package tests
|
---|
3 | *
|
---|
4 | * Copyright 2006 Paul Vriens
|
---|
5 | * Copyright 2008 Juan Lang
|
---|
6 | *
|
---|
7 | * This library is free software; you can redistribute it and/or
|
---|
8 | * modify it under the terms of the GNU Lesser General Public
|
---|
9 | * License as published by the Free Software Foundation; either
|
---|
10 | * version 2.1 of the License, or (at your option) any later version.
|
---|
11 | *
|
---|
12 | * This library is distributed in the hope that it will be useful,
|
---|
13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
15 | * Lesser General Public License for more details.
|
---|
16 | *
|
---|
17 | * You should have received a copy of the GNU Lesser General Public
|
---|
18 | * License along with this library; if not, write to the Free Software
|
---|
19 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
---|
20 | */
|
---|
21 |
|
---|
22 | #include <stdio.h>
|
---|
23 | #include <stdarg.h>
|
---|
24 | #include <windef.h>
|
---|
25 | #include <winbase.h>
|
---|
26 | #include <winerror.h>
|
---|
27 | #include <winnls.h>
|
---|
28 | #include <wincrypt.h>
|
---|
29 | #include <mssip.h>
|
---|
30 |
|
---|
31 | #include "wine/test.h"
|
---|
32 |
|
---|
33 | static BOOL (WINAPI * funcCryptSIPGetSignedDataMsg)(SIP_SUBJECTINFO *,DWORD *,DWORD,DWORD *,BYTE *);
|
---|
34 | static BOOL (WINAPI * funcCryptSIPPutSignedDataMsg)(SIP_SUBJECTINFO *,DWORD,DWORD *,DWORD,BYTE *);
|
---|
35 | static BOOL (WINAPI * funcCryptSIPCreateIndirectData)(SIP_SUBJECTINFO *,DWORD *,SIP_INDIRECT_DATA *);
|
---|
36 | static BOOL (WINAPI * funcCryptSIPVerifyIndirectData)(SIP_SUBJECTINFO *,SIP_INDIRECT_DATA *);
|
---|
37 | static BOOL (WINAPI * funcCryptSIPRemoveSignedDataMsg)(SIP_SUBJECTINFO *,DWORD);
|
---|
38 |
|
---|
39 | static char *show_guid(const GUID *guid, char *buf)
|
---|
40 | {
|
---|
41 | sprintf(buf,
|
---|
42 | "{%08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x}",
|
---|
43 | guid->Data1, guid->Data2, guid->Data3,
|
---|
44 | guid->Data4[0], guid->Data4[1], guid->Data4[2], guid->Data4[3],
|
---|
45 | guid->Data4[4], guid->Data4[5], guid->Data4[6], guid->Data4[7] );
|
---|
46 |
|
---|
47 | return buf;
|
---|
48 | }
|
---|
49 |
|
---|
50 | static void test_AddRemoveProvider(void)
|
---|
51 | {
|
---|
52 | BOOL ret;
|
---|
53 | SIP_ADD_NEWPROVIDER newprov;
|
---|
54 | GUID actionid = { 0xdeadbe, 0xefde, 0xadbe, { 0xef,0xde,0xad,0xbe,0xef,0xde,0xad,0xbe }};
|
---|
55 | static WCHAR dummydll[] = {'d','e','a','d','b','e','e','f','.','d','l','l',0 };
|
---|
56 | static WCHAR dummyfunction[] = {'d','u','m','m','y','f','u','n','c','t','i','o','n',0 };
|
---|
57 |
|
---|
58 | /* NULL check */
|
---|
59 | SetLastError(0xdeadbeef);
|
---|
60 | ret = CryptSIPRemoveProvider(NULL);
|
---|
61 | ok (!ret, "Expected CryptSIPRemoveProvider to fail.\n");
|
---|
62 | ok (GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
63 | "Expected ERROR_INVALID_PARAMETER, got %d.\n", GetLastError());
|
---|
64 |
|
---|
65 | /* nonexistent provider should result in a registry error */
|
---|
66 | SetLastError(0xdeadbeef);
|
---|
67 | ret = CryptSIPRemoveProvider(&actionid);
|
---|
68 | if (!ret && GetLastError() == ERROR_ACCESS_DENIED)
|
---|
69 | {
|
---|
70 | /* Apparently the needed rights are checked before the existence of the provider */
|
---|
71 | skip("Need admin rights\n");
|
---|
72 | }
|
---|
73 | else
|
---|
74 | {
|
---|
75 | ok (!ret, "Expected CryptSIPRemoveProvider to fail.\n");
|
---|
76 | ok (GetLastError() == ERROR_FILE_NOT_FOUND,
|
---|
77 | "Expected ERROR_FILE_NOT_FOUND, got %d.\n", GetLastError());
|
---|
78 | }
|
---|
79 |
|
---|
80 | /* Everything OK, pwszIsFunctionName and pwszIsFunctionNameFmt2 are left NULL
|
---|
81 | * as allowed */
|
---|
82 |
|
---|
83 | memset(&newprov, 0, sizeof(SIP_ADD_NEWPROVIDER));
|
---|
84 | newprov.cbStruct = sizeof(SIP_ADD_NEWPROVIDER);
|
---|
85 | newprov.pgSubject = &actionid;
|
---|
86 | newprov.pwszDLLFileName = dummydll;
|
---|
87 | newprov.pwszGetFuncName = dummyfunction;
|
---|
88 | newprov.pwszPutFuncName = dummyfunction;
|
---|
89 | newprov.pwszCreateFuncName = dummyfunction;
|
---|
90 | newprov.pwszVerifyFuncName = dummyfunction;
|
---|
91 | newprov.pwszRemoveFuncName = dummyfunction;
|
---|
92 | SetLastError(0xdeadbeef);
|
---|
93 | ret = CryptSIPAddProvider(&newprov);
|
---|
94 | if (!ret && GetLastError() == ERROR_ACCESS_DENIED)
|
---|
95 | {
|
---|
96 | skip("Need admin rights\n");
|
---|
97 | return;
|
---|
98 | }
|
---|
99 | ok ( ret, "CryptSIPAddProvider should have succeeded\n");
|
---|
100 |
|
---|
101 | /* Dummy provider will be deleted, but the function still fails because
|
---|
102 | * pwszIsFunctionName and pwszIsFunctionNameFmt2 are not present in the
|
---|
103 | * registry.
|
---|
104 | */
|
---|
105 | SetLastError(0xdeadbeef);
|
---|
106 | ret = CryptSIPRemoveProvider(&actionid);
|
---|
107 | ok (!ret, "Expected CryptSIPRemoveProvider to fail.\n");
|
---|
108 | ok (GetLastError() == ERROR_FILE_NOT_FOUND,
|
---|
109 | "Expected ERROR_FILE_NOT_FOUND, got %d.\n", GetLastError());
|
---|
110 |
|
---|
111 | /* Everything OK */
|
---|
112 | memset(&newprov, 0, sizeof(SIP_ADD_NEWPROVIDER));
|
---|
113 | newprov.cbStruct = sizeof(SIP_ADD_NEWPROVIDER);
|
---|
114 | newprov.pgSubject = &actionid;
|
---|
115 | newprov.pwszDLLFileName = dummydll;
|
---|
116 | newprov.pwszGetFuncName = dummyfunction;
|
---|
117 | newprov.pwszPutFuncName = dummyfunction;
|
---|
118 | newprov.pwszCreateFuncName = dummyfunction;
|
---|
119 | newprov.pwszVerifyFuncName = dummyfunction;
|
---|
120 | newprov.pwszRemoveFuncName = dummyfunction;
|
---|
121 | newprov.pwszIsFunctionNameFmt2 = dummyfunction;
|
---|
122 | newprov.pwszIsFunctionName = dummyfunction;
|
---|
123 | SetLastError(0xdeadbeef);
|
---|
124 | ret = CryptSIPAddProvider(&newprov);
|
---|
125 | ok ( ret, "CryptSIPAddProvider should have succeeded\n");
|
---|
126 |
|
---|
127 | /* Dummy provider should be deleted */
|
---|
128 | SetLastError(0xdeadbeef);
|
---|
129 | ret = CryptSIPRemoveProvider(&actionid);
|
---|
130 | ok ( ret, "CryptSIPRemoveProvider should have succeeded\n");
|
---|
131 | }
|
---|
132 |
|
---|
133 | static const BYTE cabFileData[] = {
|
---|
134 | 0x4d,0x53,0x43,0x46,0x00,0x00,0x00,0x00,0x50,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
---|
135 | 0x2c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x03,0x01,0x01,0x00,0x01,0x00,0x00,0x00,
|
---|
136 | 0xef,0xbe,0xff,0xff,0x42,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x06,0x00,0x00,0x00,
|
---|
137 | 0x00,0x00,0x00,0x00,0x00,0x00,0xf7,0x38,0x4b,0xac,0x00,0x00,0x61,0x2e,0x74,0x78,
|
---|
138 | 0x74,0x00,0x6d,0x5a,0x72,0x78,0x06,0x00,0x06,0x00,0x61,0x2e,0x74,0x78,0x74,0x0a,
|
---|
139 | };
|
---|
140 |
|
---|
141 | static void test_SIPRetrieveSubjectGUID(void)
|
---|
142 | {
|
---|
143 | BOOL ret;
|
---|
144 | GUID subject;
|
---|
145 | HANDLE file;
|
---|
146 | static const CHAR windir[] = "windir";
|
---|
147 | static const CHAR regeditExe[] = "regedit.exe";
|
---|
148 | static const GUID nullSubject = { 0x0, 0x0, 0x0, { 0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0 }};
|
---|
149 | static const WCHAR deadbeef[] = { 'c',':','\\','d','e','a','d','b','e','e','f','.','d','b','f',0 };
|
---|
150 | /* Couldn't find a name for this GUID, it's the one used for 95% of the files */
|
---|
151 | static const GUID unknownGUID = { 0xC689AAB8, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
|
---|
152 | static const GUID cabGUID = { 0xc689aaba, 0x8e78, 0x11d0, {0x8c,0x47,0x00,0xc0,0x4f,0xc2,0x95,0xee }};
|
---|
153 | static CHAR regeditPath[MAX_PATH];
|
---|
154 | static WCHAR regeditPathW[MAX_PATH];
|
---|
155 | static CHAR path[MAX_PATH];
|
---|
156 | static CHAR tempfile[MAX_PATH];
|
---|
157 | static WCHAR tempfileW[MAX_PATH];
|
---|
158 | static char guid1[39], guid2[39];
|
---|
159 | DWORD written;
|
---|
160 |
|
---|
161 | /* NULL check */
|
---|
162 | SetLastError(0xdeadbeef);
|
---|
163 | ret = CryptSIPRetrieveSubjectGuid(NULL, NULL, NULL);
|
---|
164 | ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n");
|
---|
165 | ok (GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
166 | "Expected ERROR_INVALID_PARAMETER, got %d.\n", GetLastError());
|
---|
167 |
|
---|
168 | /* Test with a nonexistent file (hopefully) */
|
---|
169 | SetLastError(0xdeadbeef);
|
---|
170 | /* Set subject to something other than zeros */
|
---|
171 | memset(&subject, 1, sizeof(GUID));
|
---|
172 | ret = CryptSIPRetrieveSubjectGuid(deadbeef, NULL, &subject);
|
---|
173 | ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n");
|
---|
174 | ok (GetLastError() == ERROR_FILE_NOT_FOUND,
|
---|
175 | "Expected ERROR_FILE_NOT_FOUND, got %d.\n", GetLastError());
|
---|
176 | ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)),
|
---|
177 | "Expected a NULL GUID for c:\\deadbeef.dbf, not %s\n", show_guid(&subject, guid1));
|
---|
178 |
|
---|
179 | /* Now with an executable that should exist
|
---|
180 | *
|
---|
181 | * Use A-functions where possible as that should be available on all platforms
|
---|
182 | */
|
---|
183 | ret = GetEnvironmentVariableA(windir, regeditPath, MAX_PATH);
|
---|
184 | ok (ret > 0, "expected GEVA(windir) to succeed, last error %d\n", GetLastError());
|
---|
185 | strcat(regeditPath, "\\");
|
---|
186 | strcat(regeditPath, regeditExe);
|
---|
187 | MultiByteToWideChar( CP_ACP, 0, regeditPath,
|
---|
188 | strlen(regeditPath)+1, regeditPathW,
|
---|
189 | sizeof(regeditPathW)/sizeof(regeditPathW[0]) );
|
---|
190 |
|
---|
191 | SetLastError(0xdeadbeef);
|
---|
192 | memset(&subject, 1, sizeof(GUID));
|
---|
193 | ret = CryptSIPRetrieveSubjectGuid(regeditPathW, NULL, &subject);
|
---|
194 | ok ( ret, "Expected CryptSIPRetrieveSubjectGuid to succeed\n");
|
---|
195 | ok ( !memcmp(&subject, &unknownGUID, sizeof(GUID)),
|
---|
196 | "Expected (%s), got (%s).\n", show_guid(&unknownGUID, guid1), show_guid(&subject, guid2));
|
---|
197 |
|
---|
198 | /* The same thing but now with a handle instead of a filename */
|
---|
199 | file = CreateFileA(regeditPath, GENERIC_READ, 0, NULL, OPEN_EXISTING, 0, NULL);
|
---|
200 | SetLastError(0xdeadbeef);
|
---|
201 | memset(&subject, 1, sizeof(GUID));
|
---|
202 | ret = CryptSIPRetrieveSubjectGuid(NULL, file, &subject);
|
---|
203 | ok ( ret, "Expected CryptSIPRetrieveSubjectGuid to succeed\n");
|
---|
204 | ok ( !memcmp(&subject, &unknownGUID, sizeof(GUID)),
|
---|
205 | "Expected (%s), got (%s).\n", show_guid(&unknownGUID, guid1), show_guid(&subject, guid2));
|
---|
206 | CloseHandle(file);
|
---|
207 |
|
---|
208 | /* And both */
|
---|
209 | file = CreateFileA(regeditPath, GENERIC_READ, 0, NULL, OPEN_EXISTING, 0, NULL);
|
---|
210 | SetLastError(0xdeadbeef);
|
---|
211 | memset(&subject, 1, sizeof(GUID));
|
---|
212 | ret = CryptSIPRetrieveSubjectGuid(regeditPathW, file, &subject);
|
---|
213 | ok ( ret, "Expected CryptSIPRetrieveSubjectGuid to succeed\n");
|
---|
214 | ok ( !memcmp(&subject, &unknownGUID, sizeof(GUID)),
|
---|
215 | "Expected (%s), got (%s).\n", show_guid(&unknownGUID, guid1), show_guid(&subject, guid2));
|
---|
216 | CloseHandle(file);
|
---|
217 |
|
---|
218 | /* Now with an empty file */
|
---|
219 | GetTempPathA(sizeof(path), path);
|
---|
220 | GetTempFileNameA(path, "sip", 0 , tempfile);
|
---|
221 | MultiByteToWideChar( CP_ACP, 0, tempfile,
|
---|
222 | strlen(tempfile)+1, tempfileW,
|
---|
223 | sizeof(tempfileW)/sizeof(tempfileW[0]) );
|
---|
224 |
|
---|
225 | SetLastError(0xdeadbeef);
|
---|
226 | memset(&subject, 1, sizeof(GUID));
|
---|
227 | ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject);
|
---|
228 | ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n");
|
---|
229 | ok ( GetLastError() == ERROR_FILE_INVALID ||
|
---|
230 | GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ ||
|
---|
231 | GetLastError() == ERROR_SUCCESS /* Win98 */,
|
---|
232 | "Expected ERROR_FILE_INVALID, ERROR_INVALID_PARAMETER or ERROR_SUCCESS, got 0x%08x\n", GetLastError());
|
---|
233 | ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)),
|
---|
234 | "Expected a NULL GUID for empty file %s, not %s\n", tempfile, show_guid(&subject, guid1));
|
---|
235 |
|
---|
236 | /* Use a file with a size of 3 (at least < 4) */
|
---|
237 | file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);
|
---|
238 | WriteFile(file, "123", 3, &written, NULL);
|
---|
239 | CloseHandle(file);
|
---|
240 |
|
---|
241 | SetLastError(0xdeadbeef);
|
---|
242 | memset(&subject, 1, sizeof(GUID));
|
---|
243 | ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject);
|
---|
244 | ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n");
|
---|
245 | ok ( GetLastError() == ERROR_INVALID_PARAMETER ||
|
---|
246 | GetLastError() == ERROR_SUCCESS /* Win98 */,
|
---|
247 | "Expected ERROR_INVALID_PARAMETER or ERROR_SUCCESS, got 0x%08x\n", GetLastError());
|
---|
248 | ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)),
|
---|
249 | "Expected a NULL GUID for empty file %s, not %s\n", tempfile, show_guid(&subject, guid1));
|
---|
250 |
|
---|
251 | /* And now >= 4 */
|
---|
252 | file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);
|
---|
253 | WriteFile(file, "1234", 4, &written, NULL);
|
---|
254 | CloseHandle(file);
|
---|
255 |
|
---|
256 | SetLastError(0xdeadbeef);
|
---|
257 | memset(&subject, 1, sizeof(GUID));
|
---|
258 | ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject);
|
---|
259 | ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n");
|
---|
260 | ok ( GetLastError() == TRUST_E_SUBJECT_FORM_UNKNOWN ||
|
---|
261 | GetLastError() == ERROR_SUCCESS /* Win98 */,
|
---|
262 | "Expected TRUST_E_SUBJECT_FORM_UNKNOWN or ERROR_SUCCESS, got 0x%08x\n", GetLastError());
|
---|
263 | ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)),
|
---|
264 | "Expected a NULL GUID for empty file %s, not %s\n", tempfile, show_guid(&subject, guid1));
|
---|
265 |
|
---|
266 | /* Clean up */
|
---|
267 | DeleteFileA(tempfile);
|
---|
268 |
|
---|
269 | /* Create a file with just the .cab header 'MSCF' */
|
---|
270 | SetLastError(0xdeadbeef);
|
---|
271 | file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, CREATE_NEW, 0, NULL);
|
---|
272 | ok(file != INVALID_HANDLE_VALUE, "failed with %u\n", GetLastError());
|
---|
273 | WriteFile(file, cabFileData, 4, &written, NULL);
|
---|
274 | CloseHandle(file);
|
---|
275 |
|
---|
276 | SetLastError(0xdeadbeef);
|
---|
277 | memset(&subject, 1, sizeof(GUID));
|
---|
278 | ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject);
|
---|
279 | ok( ret, "CryptSIPRetrieveSubjectGuid failed: %d (0x%08x)\n",
|
---|
280 | GetLastError(), GetLastError() );
|
---|
281 | ok ( !memcmp(&subject, &cabGUID, sizeof(GUID)),
|
---|
282 | "Expected GUID %s for cabinet file, not %s\n", show_guid(&cabGUID, guid1), show_guid(&subject, guid2));
|
---|
283 |
|
---|
284 | /* Clean up */
|
---|
285 | DeleteFileA(tempfile);
|
---|
286 |
|
---|
287 | /* Create a .cab file */
|
---|
288 | SetLastError(0xdeadbeef);
|
---|
289 | file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, CREATE_NEW, 0, NULL);
|
---|
290 | ok(file != INVALID_HANDLE_VALUE, "failed with %u\n", GetLastError());
|
---|
291 | WriteFile(file, cabFileData, sizeof(cabFileData), &written, NULL);
|
---|
292 | CloseHandle(file);
|
---|
293 |
|
---|
294 | SetLastError(0xdeadbeef);
|
---|
295 | memset(&subject, 1, sizeof(GUID));
|
---|
296 | ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject);
|
---|
297 | ok( ret, "CryptSIPRetrieveSubjectGuid failed: %d (0x%08x)\n",
|
---|
298 | GetLastError(), GetLastError() );
|
---|
299 | ok ( !memcmp(&subject, &cabGUID, sizeof(GUID)),
|
---|
300 | "Expected GUID %s for cabinet file, not %s\n", show_guid(&cabGUID, guid1), show_guid(&subject, guid2));
|
---|
301 |
|
---|
302 | /* Clean up */
|
---|
303 | DeleteFileA(tempfile);
|
---|
304 | }
|
---|
305 |
|
---|
306 | static void test_SIPLoad(void)
|
---|
307 | {
|
---|
308 | BOOL ret;
|
---|
309 | GUID subject;
|
---|
310 | static GUID dummySubject = { 0xdeadbeef, 0xdead, 0xbeef, { 0xde,0xad,0xbe,0xef,0xde,0xad,0xbe,0xef }};
|
---|
311 | static GUID unknown = { 0xC689AABA, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }}; /* WINTRUST.DLL */
|
---|
312 | static GUID unknown2 = { 0xDE351A43, 0x8E59, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }}; /* WINTRUST.DLL */
|
---|
313 | /* The next SIP is available on Windows and on Wine */
|
---|
314 | static GUID unknown3 = { 0x000C10F1, 0x0000, 0x0000, { 0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46 }}; /* MSISIP.DLL */
|
---|
315 | SIP_DISPATCH_INFO sdi;
|
---|
316 | HMODULE hCrypt;
|
---|
317 |
|
---|
318 | /* All NULL */
|
---|
319 | SetLastError(0xdeadbeef);
|
---|
320 | ret = CryptSIPLoad(NULL, 0, NULL);
|
---|
321 | ok ( !ret, "Expected CryptSIPLoad to fail\n");
|
---|
322 | ok ( GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
323 | "Expected ERROR_INVALID_PARAMETER, got 0x%08x\n", GetLastError());
|
---|
324 |
|
---|
325 | /* Only pSipDispatch NULL */
|
---|
326 | SetLastError(0xdeadbeef);
|
---|
327 | ret = CryptSIPLoad(&subject, 0, NULL);
|
---|
328 | ok ( !ret, "Expected CryptSIPLoad to fail\n");
|
---|
329 | ok ( GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
330 | "Expected ERROR_INVALID_PARAMETER, got 0x%08x\n", GetLastError());
|
---|
331 |
|
---|
332 | /* No NULLs, but nonexistent pgSubject */
|
---|
333 | SetLastError(0xdeadbeef);
|
---|
334 | memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO));
|
---|
335 | sdi.cbSize = sizeof(SIP_DISPATCH_INFO);
|
---|
336 | sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef;
|
---|
337 | ret = CryptSIPLoad(&dummySubject, 0, &sdi);
|
---|
338 | ok ( !ret, "Expected CryptSIPLoad to fail\n");
|
---|
339 | ok ( GetLastError() == TRUST_E_SUBJECT_FORM_UNKNOWN,
|
---|
340 | "Expected TRUST_E_SUBJECT_FORM_UNKNOWN, got 0x%08x\n", GetLastError());
|
---|
341 | ok( sdi.pfGet == (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected no change to the function pointer\n");
|
---|
342 |
|
---|
343 | hCrypt = GetModuleHandleA("crypt32.dll");
|
---|
344 | funcCryptSIPGetSignedDataMsg = (void*)GetProcAddress(hCrypt, "CryptSIPGetSignedDataMsg");
|
---|
345 | funcCryptSIPPutSignedDataMsg = (void*)GetProcAddress(hCrypt, "CryptSIPPutSignedDataMsg");
|
---|
346 | funcCryptSIPCreateIndirectData = (void*)GetProcAddress(hCrypt, "CryptSIPCreateIndirectData");
|
---|
347 | funcCryptSIPVerifyIndirectData = (void*)GetProcAddress(hCrypt, "CryptSIPVerifyIndirectData");
|
---|
348 | funcCryptSIPRemoveSignedDataMsg = (void*)GetProcAddress(hCrypt, "CryptSIPRemoveSignedDataMsg");
|
---|
349 |
|
---|
350 | /* All OK */
|
---|
351 | SetLastError(0xdeadbeef);
|
---|
352 | memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO));
|
---|
353 | sdi.cbSize = sizeof(SIP_DISPATCH_INFO);
|
---|
354 | sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef;
|
---|
355 | ret = CryptSIPLoad(&unknown, 0, &sdi);
|
---|
356 | ok ( ret, "Expected CryptSIPLoad to succeed\n");
|
---|
357 | /* On native the last error will always be ERROR_PROC_NOT_FOUND as native searches for the function DllCanUnloadNow
|
---|
358 | * in WINTRUST.DLL (in this case). This function is not available in WINTRUST.DLL.
|
---|
359 | * For now there's no need to implement this is Wine as I doubt any program will rely on
|
---|
360 | * this last error when the call succeeded.
|
---|
361 | */
|
---|
362 | ok( sdi.pfGet != (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected a function pointer to be loaded.\n");
|
---|
363 |
|
---|
364 | /* The function addresses returned by CryptSIPLoad are actually the addresses of
|
---|
365 | * crypt32's own functions. A function calling these addresses will end up first
|
---|
366 | * calling crypt32 functions which in its turn call the equivalent in the SIP
|
---|
367 | * as dictated by the given GUID.
|
---|
368 | */
|
---|
369 | if (funcCryptSIPGetSignedDataMsg && funcCryptSIPPutSignedDataMsg && funcCryptSIPCreateIndirectData &&
|
---|
370 | funcCryptSIPVerifyIndirectData && funcCryptSIPRemoveSignedDataMsg)
|
---|
371 | ok (sdi.pfGet == funcCryptSIPGetSignedDataMsg &&
|
---|
372 | sdi.pfPut == funcCryptSIPPutSignedDataMsg &&
|
---|
373 | sdi.pfCreate == funcCryptSIPCreateIndirectData &&
|
---|
374 | sdi.pfVerify == funcCryptSIPVerifyIndirectData &&
|
---|
375 | sdi.pfRemove == funcCryptSIPRemoveSignedDataMsg,
|
---|
376 | "Expected function addresses to be from crypt32\n");
|
---|
377 | else
|
---|
378 | trace("Couldn't load function pointers\n");
|
---|
379 |
|
---|
380 | /* All OK, but different GUID (same SIP though) */
|
---|
381 | SetLastError(0xdeadbeef);
|
---|
382 | memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO));
|
---|
383 | sdi.cbSize = sizeof(SIP_DISPATCH_INFO);
|
---|
384 | sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef;
|
---|
385 | ret = CryptSIPLoad(&unknown2, 0, &sdi);
|
---|
386 | ok ( ret, "Expected CryptSIPLoad to succeed\n");
|
---|
387 | /* This call on its own would have resulted in an ERROR_PROC_NOT_FOUND, but the previous
|
---|
388 | * call to CryptSIPLoad already loaded wintrust.dll. As this information is cached,
|
---|
389 | * CryptSIPLoad will not try to search for the already mentioned DllCanUnloadNow.
|
---|
390 | */
|
---|
391 | ok( sdi.pfGet != (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected a function pointer to be loaded.\n");
|
---|
392 |
|
---|
393 | /* All OK, but other SIP */
|
---|
394 | SetLastError(0xdeadbeef);
|
---|
395 | memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO));
|
---|
396 | sdi.cbSize = sizeof(SIP_DISPATCH_INFO);
|
---|
397 | sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef;
|
---|
398 | ret = CryptSIPLoad(&unknown3, 0, &sdi);
|
---|
399 | if (ret)
|
---|
400 | {
|
---|
401 | /* The SIP is known so we can safely assume that the next tests can be done */
|
---|
402 |
|
---|
403 | /* As msisip.dll is not checked yet by any of the previous calls, the
|
---|
404 | * function DllCanUnloadNow will be checked again in msisip.dll (it's not present)
|
---|
405 | */
|
---|
406 | ok( sdi.pfGet != (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected a function pointer to be loaded.\n");
|
---|
407 |
|
---|
408 | /* This is another SIP but this test proves the function addresses are the same as
|
---|
409 | * in the previous test.
|
---|
410 | */
|
---|
411 | if (funcCryptSIPGetSignedDataMsg && funcCryptSIPPutSignedDataMsg && funcCryptSIPCreateIndirectData &&
|
---|
412 | funcCryptSIPVerifyIndirectData && funcCryptSIPRemoveSignedDataMsg)
|
---|
413 | ok (sdi.pfGet == funcCryptSIPGetSignedDataMsg &&
|
---|
414 | sdi.pfPut == funcCryptSIPPutSignedDataMsg &&
|
---|
415 | sdi.pfCreate == funcCryptSIPCreateIndirectData &&
|
---|
416 | sdi.pfVerify == funcCryptSIPVerifyIndirectData &&
|
---|
417 | sdi.pfRemove == funcCryptSIPRemoveSignedDataMsg,
|
---|
418 | "Expected function addresses to be from crypt32\n");
|
---|
419 | else
|
---|
420 | trace("Couldn't load function pointers\n");
|
---|
421 | }
|
---|
422 |
|
---|
423 | /* Reserved parameter not 0 */
|
---|
424 | SetLastError(0xdeadbeef);
|
---|
425 | memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO));
|
---|
426 | sdi.cbSize = sizeof(SIP_DISPATCH_INFO);
|
---|
427 | sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef;
|
---|
428 | ret = CryptSIPLoad(&unknown, 1, &sdi);
|
---|
429 | ok ( !ret, "Expected CryptSIPLoad to fail\n");
|
---|
430 | ok ( GetLastError() == ERROR_INVALID_PARAMETER,
|
---|
431 | "Expected ERROR_INVALID_PARAMETER, got 0x%08x\n", GetLastError());
|
---|
432 | ok( sdi.pfGet == (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected no change to the function pointer\n");
|
---|
433 | }
|
---|
434 |
|
---|
435 | START_TEST(sip)
|
---|
436 | {
|
---|
437 | test_AddRemoveProvider();
|
---|
438 | /* It seems that the caching for loaded dlls is shared between CryptSIPRetrieveSubjectGUID
|
---|
439 | * and CryptSIPLoad. The tests have to be in this order to succeed. This is because in the last
|
---|
440 | * test for CryptSIPRetrieveSubjectGUID, several SIPs will be loaded (on Windows).
|
---|
441 | */
|
---|
442 | test_SIPLoad();
|
---|
443 | test_SIPRetrieveSubjectGUID();
|
---|
444 | }
|
---|