revert 17709 for it break streach for windows mode. That why I did only got black...
[reactos.git] / reactos / regtests / winetests / advapi32 / crypt.c
1 /*
2 * Unit tests for crypt functions
3 *
4 * Copyright (c) 2004 Michael Jung
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 */
20
21 #include <stdarg.h>
22
23 #include "windef.h"
24 #include "winbase.h"
25 #include "wincrypt.h"
26 #include "winerror.h"
27 #include "winreg.h"
28
29 #include "wine/test.h"
30
31 static const char szRsaBaseProv[] = MS_DEF_PROV_A;
32 static const char szNonExistentProv[] = "Wine Nonexistent Cryptographic Provider v11.2";
33 static const char szKeySet[] = "wine_test_keyset";
34 static const char szBadKeySet[] = "wine_test_bad_keyset";
35 #define NON_DEF_PROV_TYPE 999
36
37 static HMODULE hadvapi32;
38 static BOOL (WINAPI *pCryptAcquireContextA)(HCRYPTPROV*,LPCSTR,LPCSTR,DWORD,DWORD);
39 static BOOL (WINAPI *pCryptEnumProviderTypesA)(DWORD, DWORD*, DWORD, DWORD*, LPSTR, DWORD*);
40 static BOOL (WINAPI *pCryptEnumProvidersA)(DWORD, DWORD*, DWORD, DWORD*, LPSTR, DWORD*);
41 static BOOL (WINAPI *pCryptGetDefaultProviderA)(DWORD, DWORD*, DWORD, LPSTR, DWORD*);
42 static BOOL (WINAPI *pCryptReleaseContext)(HCRYPTPROV, DWORD);
43 static BOOL (WINAPI *pCryptSetProviderExA)(LPCSTR, DWORD, DWORD*, DWORD);
44 static BOOL (WINAPI *pCryptCreateHash)(HCRYPTPROV, ALG_ID, HCRYPTKEY, DWORD, HCRYPTHASH*);
45 static BOOL (WINAPI *pCryptDestroyHash)(HCRYPTHASH);
46 static BOOL (WINAPI *pCryptGenRandom)(HCRYPTPROV, DWORD, BYTE*);
47 static BOOL (WINAPI *pCryptContextAddRef)(HCRYPTPROV, DWORD*, DWORD dwFlags);
48 static BOOL (WINAPI *pCryptGenKey)(HCRYPTPROV, ALG_ID, DWORD, HCRYPTKEY*);
49 static BOOL (WINAPI *pCryptDestroyKey)(HCRYPTKEY);
50 static BOOL (WINAPI *pCryptDecrypt)(HCRYPTKEY, HCRYPTHASH, BOOL, DWORD, BYTE*, DWORD*);
51 static BOOL (WINAPI *pCryptDeriveKey)(HCRYPTPROV, ALG_ID, HCRYPTHASH, DWORD, HCRYPTKEY*);
52 static BOOL (WINAPI *pCryptDuplicateHash)(HCRYPTHASH, DWORD*, DWORD, HCRYPTHASH*);
53 static BOOL (WINAPI *pCryptDuplicateKey)(HCRYPTKEY, DWORD*, DWORD, HCRYPTKEY*);
54 static BOOL (WINAPI *pCryptEncrypt)(HCRYPTKEY, HCRYPTHASH, BOOL, DWORD, BYTE*, DWORD*, DWORD);
55 static BOOL (WINAPI *pCryptExportKey)(HCRYPTKEY, HCRYPTKEY, DWORD, DWORD, BYTE*, DWORD*);
56 static BOOL (WINAPI *pCryptGetHashParam)(HCRYPTHASH, DWORD, BYTE*, DWORD*, DWORD);
57 static BOOL (WINAPI *pCryptGetKeyParam)(HCRYPTKEY, DWORD, BYTE*, DWORD*, DWORD);
58 static BOOL (WINAPI *pCryptGetProvParam)(HCRYPTPROV, DWORD, BYTE*, DWORD*, DWORD);
59 static BOOL (WINAPI *pCryptGetUserKey)(HCRYPTPROV, DWORD, HCRYPTKEY*);
60 static BOOL (WINAPI *pCryptHashData)(HCRYPTHASH, BYTE*, DWORD, DWORD);
61 static BOOL (WINAPI *pCryptHashSessionKey)(HCRYPTHASH, HCRYPTKEY, DWORD);
62 static BOOL (WINAPI *pCryptImportKey)(HCRYPTPROV, BYTE*, DWORD, HCRYPTKEY, DWORD, HCRYPTKEY*);
63 static BOOL (WINAPI *pCryptSignHashW)(HCRYPTHASH, DWORD, LPCWSTR, DWORD, BYTE*, DWORD*);
64 static BOOL (WINAPI *pCryptSetHashParam)(HCRYPTKEY, DWORD, BYTE*, DWORD);
65 static BOOL (WINAPI *pCryptSetKeyParam)(HCRYPTKEY, DWORD, BYTE*, DWORD);
66 static BOOL (WINAPI *pCryptSetProvParam)(HCRYPTPROV, DWORD, BYTE*, DWORD);
67 static BOOL (WINAPI *pCryptVerifySignatureW)(HCRYPTHASH, BYTE*, DWORD, HCRYPTKEY, LPCWSTR, DWORD);
68
69 static void init_function_pointers(void)
70 {
71 hadvapi32 = GetModuleHandleA("advapi32.dll");
72
73 if(hadvapi32)
74 {
75 pCryptAcquireContextA = (void*)GetProcAddress(hadvapi32, "CryptAcquireContextA");
76 pCryptEnumProviderTypesA = (void*)GetProcAddress(hadvapi32, "CryptEnumProviderTypesA");
77 pCryptEnumProvidersA = (void*)GetProcAddress(hadvapi32, "CryptEnumProvidersA");
78 pCryptGetDefaultProviderA = (void*)GetProcAddress(hadvapi32, "CryptGetDefaultProviderA");
79 pCryptReleaseContext = (void*)GetProcAddress(hadvapi32, "CryptReleaseContext");
80 pCryptSetProviderExA = (void*)GetProcAddress(hadvapi32, "CryptSetProviderExA");
81 pCryptCreateHash = (void*)GetProcAddress(hadvapi32, "CryptCreateHash");
82 pCryptDestroyHash = (void*)GetProcAddress(hadvapi32, "CryptDestroyHash");
83 pCryptGenRandom = (void*)GetProcAddress(hadvapi32, "CryptGenRandom");
84 pCryptContextAddRef = (void*)GetProcAddress(hadvapi32, "CryptContextAddRef");
85 pCryptGenKey = (void*)GetProcAddress(hadvapi32, "CryptGenKey");
86 pCryptDestroyKey = (void*)GetProcAddress(hadvapi32, "CryptDestroyKey");
87 pCryptDecrypt = (void*)GetProcAddress(hadvapi32, "CryptDecrypt");
88 pCryptDeriveKey = (void*)GetProcAddress(hadvapi32, "CryptDeriveKey");
89 pCryptDuplicateHash = (void*)GetProcAddress(hadvapi32, "CryptDuplicateHash");
90 pCryptDuplicateKey = (void*)GetProcAddress(hadvapi32, "CryptDuplicateKey");
91 pCryptEncrypt = (void*)GetProcAddress(hadvapi32, "CryptEncrypt");
92 pCryptExportKey = (void*)GetProcAddress(hadvapi32, "CryptExportKey");
93 pCryptGetHashParam = (void*)GetProcAddress(hadvapi32, "CryptGetHashParam");
94 pCryptGetKeyParam = (void*)GetProcAddress(hadvapi32, "CryptGetKeyParam");
95 pCryptGetProvParam = (void*)GetProcAddress(hadvapi32, "CryptGetProvParam");
96 pCryptGetUserKey = (void*)GetProcAddress(hadvapi32, "CryptGetUserKey");
97 pCryptHashData = (void*)GetProcAddress(hadvapi32, "CryptHashData");
98 pCryptHashSessionKey = (void*)GetProcAddress(hadvapi32, "CryptHashSessionKey");
99 pCryptImportKey = (void*)GetProcAddress(hadvapi32, "CryptImportKey");
100 pCryptSignHashW = (void*)GetProcAddress(hadvapi32, "CryptSignHashW");
101 pCryptSetHashParam = (void*)GetProcAddress(hadvapi32, "CryptSetHashParam");
102 pCryptSetKeyParam = (void*)GetProcAddress(hadvapi32, "CryptSetKeyParam");
103 pCryptSetProvParam = (void*)GetProcAddress(hadvapi32, "CryptSetProvParam");
104 pCryptVerifySignatureW = (void*)GetProcAddress(hadvapi32, "CryptVerifySignatureW");
105 }
106 }
107
108 static void init_environment(void)
109 {
110 HCRYPTPROV hProv;
111
112 /* Ensure that container "wine_test_keyset" does exist */
113 if (!pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
114 {
115 pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET);
116 }
117 pCryptReleaseContext(hProv, 0);
118
119 /* Ensure that container "wine_test_keyset" does exist in default PROV_RSA_FULL type provider */
120 if (!pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
121 {
122 pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET);
123 }
124 pCryptReleaseContext(hProv, 0);
125
126 /* Ensure that container "wine_test_bad_keyset" does not exist. */
127 if (pCryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
128 {
129 pCryptReleaseContext(hProv, 0);
130 pCryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
131 }
132 }
133
134 static void clean_up_environment(void)
135 {
136 HCRYPTPROV hProv;
137
138 /* Remove container "wine_test_keyset" */
139 if (pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
140 {
141 pCryptReleaseContext(hProv, 0);
142 pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
143 }
144
145 /* Remove container "wine_test_keyset" from default PROV_RSA_FULL type provider */
146 if (pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
147 {
148 pCryptReleaseContext(hProv, 0);
149 pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
150 }
151 }
152
153 static void test_acquire_context(void)
154 {
155 BOOL result;
156 HCRYPTPROV hProv;
157
158 /* Provoke all kinds of error conditions (which are easy to provoke).
159 * The order of the error tests seems to match Windows XP's rsaenh.dll CSP,
160 * but since this is likely to change between CSP versions, we don't check
161 * this. Please don't change the order of tests. */
162 result = pCryptAcquireContextA(&hProv, NULL, NULL, 0, 0);
163 ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
164
165 result = pCryptAcquireContextA(&hProv, NULL, NULL, 1000, 0);
166 ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
167
168 result = pCryptAcquireContextA(&hProv, NULL, NULL, NON_DEF_PROV_TYPE, 0);
169 ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%ld\n", GetLastError());
170
171 result = pCryptAcquireContextA(&hProv, szKeySet, szNonExistentProv, PROV_RSA_FULL, 0);
172 ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%ld\n", GetLastError());
173
174 result = pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, NON_DEF_PROV_TYPE, 0);
175 ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%ld\n", GetLastError());
176
177 /* This test fails under Win2k SP4:
178 result = TRUE, GetLastError() == ERROR_INVALID_PARAMETER
179 SetLastError(0xdeadbeef);
180 result = pCryptAcquireContextA(NULL, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
181 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%ld\n", result, GetLastError());
182 */
183
184 /* Last not least, try to really acquire a context. */
185 hProv = 0;
186 SetLastError(0xdeadbeef);
187 result = pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
188 ok(result && (GetLastError() == ERROR_ENVVAR_NOT_FOUND || GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_RING2_STACK_IN_USE || GetLastError() == NTE_FAIL), "%d/%ld\n", result, GetLastError());
189
190 if (hProv)
191 pCryptReleaseContext(hProv, 0);
192
193 /* Try again, witch an empty ("\0") szProvider parameter */
194 hProv = 0;
195 SetLastError(0xdeadbeef);
196 result = pCryptAcquireContextA(&hProv, szKeySet, "", PROV_RSA_FULL, 0);
197 ok(result && (GetLastError() == ERROR_ENVVAR_NOT_FOUND || GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_RING2_STACK_IN_USE || GetLastError() == NTE_FAIL), "%d/%ld\n", result, GetLastError());
198
199 if (hProv)
200 pCryptReleaseContext(hProv, 0);
201 }
202
203 static void test_incorrect_api_usage(void)
204 {
205 BOOL result;
206 HCRYPTPROV hProv, hProv2;
207 HCRYPTHASH hHash, hHash2;
208 HCRYPTKEY hKey, hKey2;
209 BYTE temp;
210 DWORD dwLen, dwTemp;
211
212 /* This is to document incorrect api usage in the
213 * "Uru - Ages beyond Myst Demo" installer as reported by Paul Vriens.
214 *
215 * The installer destroys a hash object after having released the context
216 * with which the hash was created. This is not allowed according to MSDN,
217 * since CryptReleaseContext destroys all hash and key objects belonging to
218 * the respective context. However, while wine used to crash, Windows is more
219 * robust here and returns an ERROR_INVALID_PARAMETER code.
220 */
221
222 result = pCryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv,
223 PROV_RSA_FULL, CRYPT_NEWKEYSET);
224 ok (result, "%08lx\n", GetLastError());
225 if (!result) return;
226
227 result = pCryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash);
228 ok (result, "%ld\n", GetLastError());
229 if (!result) return;
230
231 result = pCryptGenKey(hProv, CALG_RC4, 0, &hKey);
232 ok (result, "%ld\n", GetLastError());
233 if (!result) return;
234
235 result = pCryptGenKey(hProv, CALG_RC4, 0, &hKey2);
236 ok (result, "%ld\n", GetLastError());
237 if (!result) return;
238
239 result = pCryptDestroyKey(hKey2);
240 ok (result, "%ld\n", GetLastError());
241
242 dwTemp = CRYPT_MODE_ECB;
243 result = pCryptSetKeyParam(hKey2, KP_MODE, (BYTE*)&dwTemp, sizeof(DWORD));
244 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
245
246 result = pCryptAcquireContextA(&hProv2, szBadKeySet, NULL, PROV_RSA_FULL,
247 CRYPT_DELETEKEYSET);
248 ok (result, "%ld\n", GetLastError());
249 if (!result) return;
250
251 result = pCryptReleaseContext(hProv, 0);
252 ok (result, "%ld\n", GetLastError());
253 if (!result) return;
254
255 result = pCryptReleaseContext(hProv, 0);
256 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
257
258 result = pCryptGenRandom(hProv, 1, &temp);
259 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
260
261 #ifdef CRASHES_ON_NT40
262 result = pCryptContextAddRef(hProv, NULL, 0);
263 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
264 #endif
265
266 result = pCryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash2);
267 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
268
269 dwLen = 1;
270 result = pCryptDecrypt(hKey, (HCRYPTHASH)NULL, TRUE, 0, &temp, &dwLen);
271 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
272
273 dwLen = 1;
274 result = pCryptEncrypt(hKey, (HCRYPTHASH)NULL, TRUE, 0, &temp, &dwLen, 1);
275 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
276
277 result = pCryptDeriveKey(hProv, CALG_RC4, hHash, 0, &hKey2);
278 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
279
280 #ifdef CRASHES_ON_NT40
281 result = pCryptDuplicateHash(hHash, NULL, 0, &hHash2);
282 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
283
284 result = pCryptDuplicateKey(hKey, NULL, 0, &hKey2);
285 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
286 #endif
287
288 dwLen = 1;
289 result = pCryptExportKey(hKey, (HCRYPTPROV)NULL, 0, 0, &temp, &dwLen);
290 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
291
292 result = pCryptGenKey(hProv, CALG_RC4, 0, &hKey2);
293 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
294
295 dwLen = 1;
296 result = pCryptGetHashParam(hHash, 0, &temp, &dwLen, 0);
297 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
298
299 dwLen = 1;
300 result = pCryptGetKeyParam(hKey, 0, &temp, &dwLen, 0);
301 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
302
303 dwLen = 1;
304 result = pCryptGetProvParam(hProv, 0, &temp, &dwLen, 0);
305 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
306
307 result = pCryptGetUserKey(hProv, 0, &hKey2);
308 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
309
310 result = pCryptHashData(hHash, &temp, 1, 0);
311 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
312
313 result = pCryptHashSessionKey(hHash, hKey, 0);
314 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
315
316 result = pCryptImportKey(hProv, &temp, 1, (HCRYPTKEY)NULL, 0, &hKey2);
317 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
318
319 dwLen = 1;
320 result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen);
321 ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
322 GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError());
323
324 result = pCryptSetKeyParam(hKey, 0, &temp, 1);
325 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
326
327 result = pCryptSetHashParam(hHash, 0, &temp, 1);
328 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
329
330 result = pCryptSetProvParam(hProv, 0, &temp, 1);
331 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
332
333 result = pCryptVerifySignatureW(hHash, &temp, 1, hKey, NULL, 0);
334 ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
335 GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError());
336
337 result = pCryptDestroyHash(hHash);
338 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
339
340 result = pCryptDestroyKey(hKey);
341 ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
342 }
343
344 static BOOL FindProvRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszProvName,
345 DWORD *pcbProvName, DWORD *pdwProvCount)
346 {
347 HKEY hKey;
348 HKEY subkey;
349 DWORD size = sizeof(DWORD);
350
351 if (RegOpenKey(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\Defaults\\Provider", &hKey))
352 return FALSE;
353
354 RegQueryInfoKey(hKey, NULL, NULL, NULL, pdwProvCount, pcbProvName,
355 NULL, NULL, NULL, NULL, NULL, NULL);
356 (*pcbProvName)++;
357
358 if (!(*pszProvName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbProvName))))
359 return FALSE;
360
361 RegEnumKeyEx(hKey, dwIndex, *pszProvName, pcbProvName, NULL, NULL, NULL, NULL);
362 (*pcbProvName)++;
363
364 RegOpenKey(hKey, *pszProvName, &subkey);
365 RegQueryValueEx(subkey, "Type", NULL, NULL, (BYTE*)pdwProvType, &size);
366
367 RegCloseKey(subkey);
368 RegCloseKey(hKey);
369
370 return TRUE;
371 }
372
373 static void test_enum_providers(void)
374 {
375 /* expected results */
376 CHAR *pszProvName = NULL;
377 DWORD cbName;
378 DWORD dwType;
379 DWORD provCount;
380 DWORD dwIndex = 0;
381
382 /* actual results */
383 CHAR *provider = NULL;
384 DWORD providerLen;
385 DWORD type;
386 DWORD count;
387 BOOL result;
388 DWORD notNull = 5;
389 DWORD notZeroFlags = 5;
390
391 if(!pCryptEnumProvidersA)
392 {
393 trace("skipping CryptEnumProviders tests\n");
394 return;
395 }
396
397 if (!FindProvRegVals(dwIndex, &dwType, &pszProvName, &cbName, &provCount))
398 return;
399
400 /* check pdwReserved flag for NULL */
401 result = pCryptEnumProvidersA(dwIndex, &notNull, 0, &type, NULL, &providerLen);
402 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
403
404 /* check dwFlags == 0 */
405 result = pCryptEnumProvidersA(dwIndex, NULL, notZeroFlags, &type, NULL, &providerLen);
406 ok(!result && GetLastError()==NTE_BAD_FLAGS, "%ld\n", GetLastError());
407
408 /* alloc provider to half the size required
409 * cbName holds the size required */
410 providerLen = cbName / 2;
411 if (!(provider = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, providerLen))))
412 return;
413
414 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
415 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
416 ERROR_MORE_DATA, GetLastError());
417
418 LocalFree(provider);
419
420 /* loop through the providers to get the number of providers
421 * after loop ends, count should be provCount + 1 so subtract 1
422 * to get actual number of providers */
423 count = 0;
424 while(pCryptEnumProvidersA(count++, NULL, 0, &type, NULL, &providerLen))
425 ;
426 count--;
427 ok(count==provCount, "expected %i, got %i\n", (int)provCount, (int)count);
428
429 /* loop past the actual number of providers to get the error
430 * ERROR_NO_MORE_ITEMS */
431 for (count = 0; count < provCount + 1; count++)
432 result = pCryptEnumProvidersA(count, NULL, 0, &type, NULL, &providerLen);
433 ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
434 ERROR_NO_MORE_ITEMS, GetLastError());
435
436 /* check expected versus actual values returned */
437 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, NULL, &providerLen);
438 ok(result && providerLen==cbName, "expected %i, got %i\n", (int)cbName, (int)providerLen);
439 if (!(provider = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, providerLen))))
440 return;
441
442 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
443 ok(result && type==dwType, "expected %ld, got %ld\n",
444 dwType, type);
445 ok(result && !strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
446 ok(result && cbName==providerLen, "expected %ld, got %ld\n",
447 cbName, providerLen);
448
449 LocalFree(provider);
450 }
451
452 static BOOL FindProvTypesRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszTypeName,
453 DWORD *pcbTypeName, DWORD *pdwTypeCount)
454 {
455 HKEY hKey;
456 HKEY hSubKey;
457 PSTR ch;
458
459 if (RegOpenKey(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\Defaults\\Provider Types", &hKey))
460 return FALSE;
461
462 if (RegQueryInfoKey(hKey, NULL, NULL, NULL, pdwTypeCount, pcbTypeName, NULL,
463 NULL, NULL, NULL, NULL, NULL))
464 return FALSE;
465 (*pcbTypeName)++;
466
467 if (!(*pszTypeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbTypeName))))
468 return FALSE;
469
470 if (RegEnumKeyEx(hKey, dwIndex, *pszTypeName, pcbTypeName, NULL, NULL, NULL, NULL))
471 return FALSE;
472 (*pcbTypeName)++;
473 ch = *pszTypeName + strlen(*pszTypeName);
474 /* Convert "Type 000" to 0, etc/ */
475 *pdwProvType = *(--ch) - '0';
476 *pdwProvType += (*(--ch) - '0') * 10;
477 *pdwProvType += (*(--ch) - '0') * 100;
478
479 if (RegOpenKey(hKey, *pszTypeName, &hSubKey))
480 return FALSE;
481
482 if (RegQueryValueEx(hSubKey, "TypeName", NULL, NULL, NULL, pcbTypeName))
483 return FALSE;
484
485 if (!(*pszTypeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbTypeName))))
486 return FALSE;
487
488 if (RegQueryValueEx(hSubKey, "TypeName", NULL, NULL, *pszTypeName, pcbTypeName))
489 return FALSE;
490
491 RegCloseKey(hSubKey);
492 RegCloseKey(hKey);
493
494 return TRUE;
495 }
496
497 static void test_enum_provider_types()
498 {
499 /* expected values */
500 DWORD dwProvType;
501 LPSTR pszTypeName = NULL;
502 DWORD cbTypeName;
503 DWORD dwTypeCount;
504
505 /* actual values */
506 DWORD index = 0;
507 DWORD provType;
508 LPSTR typeName = NULL;
509 DWORD typeNameSize;
510 DWORD typeCount;
511 DWORD result;
512 DWORD notNull = 5;
513 DWORD notZeroFlags = 5;
514
515 if(!pCryptEnumProviderTypesA)
516 {
517 trace("skipping CryptEnumProviderTypes tests\n");
518 return;
519 }
520
521 if (!FindProvTypesRegVals(index, &dwProvType, &pszTypeName, &cbTypeName, &dwTypeCount))
522 {
523 trace("could not find provider types in registry, skipping the test\n");
524 return;
525 }
526
527 /* check pdwReserved for NULL */
528 result = pCryptEnumProviderTypesA(index, &notNull, 0, &provType, typeName, &typeNameSize);
529 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
530 ERROR_INVALID_PARAMETER, GetLastError());
531
532 /* check dwFlags == zero */
533 result = pCryptEnumProviderTypesA(index, NULL, notZeroFlags, &provType, typeName, &typeNameSize);
534 ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %i, got %ld\n",
535 ERROR_INVALID_PARAMETER, GetLastError());
536
537 /* alloc provider type to half the size required
538 * cbTypeName holds the size required */
539 typeNameSize = cbTypeName / 2;
540 if (!(typeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, typeNameSize))))
541 return;
542
543 /* This test fails under Win2k SP4:
544 result = TRUE, GetLastError() == 0xdeadbeef
545 SetLastError(0xdeadbeef);
546 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
547 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %d/%08lx\n",
548 result, GetLastError());
549 */
550
551 LocalFree(typeName);
552
553 /* loop through the provider types to get the number of provider types
554 * after loop ends, count should be dwTypeCount + 1 so subtract 1
555 * to get actual number of provider types */
556 typeCount = 0;
557 while(pCryptEnumProviderTypesA(typeCount++, NULL, 0, &provType, NULL, &typeNameSize))
558 ;
559 typeCount--;
560 ok(typeCount==dwTypeCount, "expected %ld, got %ld\n", dwTypeCount, typeCount);
561
562 /* loop past the actual number of provider types to get the error
563 * ERROR_NO_MORE_ITEMS */
564 for (typeCount = 0; typeCount < dwTypeCount + 1; typeCount++)
565 result = pCryptEnumProviderTypesA(typeCount, NULL, 0, &provType, NULL, &typeNameSize);
566 ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
567 ERROR_NO_MORE_ITEMS, GetLastError());
568
569
570 /* check expected versus actual values returned */
571 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, NULL, &typeNameSize);
572 ok(result && typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
573 if (!(typeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, typeNameSize))))
574 return;
575
576 typeNameSize = 0xdeadbeef;
577 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
578 ok(result, "expected TRUE, got %ld\n", result);
579 ok(provType==dwProvType, "expected %ld, got %ld\n", dwProvType, provType);
580 if (pszTypeName)
581 ok(!strcmp(pszTypeName, typeName), "expected %s, got %s\n", pszTypeName, typeName);
582 ok(typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
583
584 LocalFree(typeName);
585 }
586
587 static BOOL FindDfltProvRegVals(DWORD dwProvType, DWORD dwFlags, LPSTR *pszProvName, DWORD *pcbProvName)
588 {
589 HKEY hKey;
590 PSTR keyname;
591 PSTR ptr;
592 DWORD user = dwFlags & CRYPT_USER_DEFAULT;
593
594 LPSTR MACHINESTR = "Software\\Microsoft\\Cryptography\\Defaults\\Provider Types\\Type XXX";
595 LPSTR USERSTR = "Software\\Microsoft\\Cryptography\\Provider Type XXX";
596
597 keyname = LocalAlloc(LMEM_ZEROINIT, (user ? strlen(USERSTR) : strlen(MACHINESTR)) + 1);
598 if (keyname)
599 {
600 user ? strcpy(keyname, USERSTR) : strcpy(keyname, MACHINESTR);
601 ptr = keyname + strlen(keyname);
602 *(--ptr) = (dwProvType % 10) + '0';
603 *(--ptr) = ((dwProvType / 10) % 10) + '0';
604 *(--ptr) = (dwProvType / 100) + '0';
605 } else
606 return FALSE;
607
608 if (RegOpenKey((dwFlags & CRYPT_USER_DEFAULT) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE ,keyname, &hKey))
609 {
610 LocalFree(keyname);
611 return FALSE;
612 }
613 LocalFree(keyname);
614
615 if (RegQueryValueEx(hKey, "Name", NULL, NULL, *pszProvName, pcbProvName))
616 {
617 if (GetLastError() != ERROR_MORE_DATA)
618 SetLastError(NTE_PROV_TYPE_ENTRY_BAD);
619 return FALSE;
620 }
621
622 if (!(*pszProvName = LocalAlloc(LMEM_ZEROINIT, *pcbProvName)))
623 return FALSE;
624
625 if (RegQueryValueEx(hKey, "Name", NULL, NULL, *pszProvName, pcbProvName))
626 {
627 if (GetLastError() != ERROR_MORE_DATA)
628 SetLastError(NTE_PROV_TYPE_ENTRY_BAD);
629 return FALSE;
630 }
631
632 RegCloseKey(hKey);
633
634 return TRUE;
635 }
636
637 static void test_get_default_provider()
638 {
639 /* expected results */
640 DWORD dwProvType = PROV_RSA_FULL;
641 DWORD dwFlags = CRYPT_MACHINE_DEFAULT;
642 LPSTR pszProvName = NULL;
643 DWORD cbProvName;
644
645 /* actual results */
646 DWORD provType = PROV_RSA_FULL;
647 DWORD flags = CRYPT_MACHINE_DEFAULT;
648 LPSTR provName = NULL;
649 DWORD provNameSize;
650 DWORD result;
651 DWORD notNull = 5;
652
653 if(!pCryptGetDefaultProviderA)
654 {
655 trace("skipping CryptGetDefaultProvider tests\n");
656 return;
657 }
658
659 FindDfltProvRegVals(dwProvType, dwFlags, &pszProvName, &cbProvName);
660
661 /* check pdwReserved for NULL */
662 result = pCryptGetDefaultProviderA(provType, &notNull, flags, provName, &provNameSize);
663 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
664 ERROR_INVALID_PARAMETER, GetLastError());
665
666 /* check for invalid flag */
667 flags = 0xdeadbeef;
668 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
669 ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %ld, got %ld\n",
670 NTE_BAD_FLAGS, GetLastError());
671 flags = CRYPT_MACHINE_DEFAULT;
672
673 /* check for invalid prov type */
674 provType = 0xdeadbeef;
675 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
676 ok(!result && (GetLastError() == NTE_BAD_PROV_TYPE ||
677 GetLastError() == ERROR_INVALID_PARAMETER),
678 "expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %ld/%ld\n",
679 result, GetLastError());
680 provType = PROV_RSA_FULL;
681
682 SetLastError(0);
683
684 /* alloc provName to half the size required
685 * cbProvName holds the size required */
686 provNameSize = cbProvName / 2;
687 if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
688 return;
689
690 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
691 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
692 ERROR_MORE_DATA, GetLastError());
693
694 LocalFree(provName);
695
696 /* check expected versus actual values returned */
697 result = pCryptGetDefaultProviderA(provType, NULL, flags, NULL, &provNameSize);
698 ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
699 provNameSize = cbProvName;
700
701 if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
702 return;
703
704 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
705 ok(result && !strcmp(pszProvName, provName), "expected %s, got %s\n", pszProvName, provName);
706 ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
707
708 LocalFree(provName);
709 }
710
711 static void test_set_provider_ex()
712 {
713 DWORD result;
714 DWORD notNull = 5;
715
716 /* results */
717 LPSTR pszProvName = NULL;
718 DWORD cbProvName;
719
720 if(!pCryptGetDefaultProviderA || !pCryptSetProviderExA)
721 {
722 trace("skipping CryptSetProviderEx tests\n");
723 return;
724 }
725
726 /* check pdwReserved for NULL */
727 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, &notNull, CRYPT_MACHINE_DEFAULT);
728 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
729 ERROR_INVALID_PARAMETER, GetLastError());
730
731 /* remove the default provider and then set it to MS_DEF_PROV/PROV_RSA_FULL */
732 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT | CRYPT_DELETE_DEFAULT);
733 ok(result, "%ld\n", GetLastError());
734
735 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
736 ok(result, "%ld\n", GetLastError());
737
738 /* call CryptGetDefaultProvider to see if they match */
739 result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, NULL, &cbProvName);
740 if (!(pszProvName = LocalAlloc(LMEM_ZEROINIT, cbProvName)))
741 return;
742
743 result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, pszProvName, &cbProvName);
744 ok(result && !strcmp(MS_DEF_PROV, pszProvName), "expected %s, got %s\n", MS_DEF_PROV, pszProvName);
745 ok(result && cbProvName==(strlen(MS_DEF_PROV) + 1), "expected %i, got %ld\n", (strlen(MS_DEF_PROV) + 1), cbProvName);
746
747 LocalFree(pszProvName);
748 }
749
750 START_TEST(crypt)
751 {
752 init_function_pointers();
753 if(pCryptAcquireContextA && pCryptReleaseContext) {
754 init_environment();
755 test_acquire_context();
756 test_incorrect_api_usage();
757 clean_up_environment();
758 }
759
760 test_enum_providers();
761 test_enum_provider_types();
762 test_get_default_provider();
763 test_set_provider_ex();
764 }