2006-05-31 09:31:10 +02:00
|
|
|
/*
|
|
|
|
* Unit test suite for crypt32.dll's CryptStringToBinary and CryptBinaryToString
|
|
|
|
* functions.
|
|
|
|
*
|
|
|
|
* Copyright 2006 Juan Lang
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdarg.h>
|
2018-09-25 15:55:36 +02:00
|
|
|
#include <windows.h>
|
2006-05-31 09:31:10 +02:00
|
|
|
#include <wincrypt.h>
|
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
#include "wine/heap.h"
|
2006-05-31 09:31:10 +02:00
|
|
|
#include "wine/test.h"
|
|
|
|
|
|
|
|
#define CERT_HEADER "-----BEGIN CERTIFICATE-----\r\n"
|
2011-04-23 17:18:40 +02:00
|
|
|
#define ALT_CERT_HEADER "-----BEGIN This is some arbitrary text that goes on and on-----\r\n"
|
2006-05-31 09:31:10 +02:00
|
|
|
#define CERT_TRAILER "-----END CERTIFICATE-----\r\n"
|
2011-04-23 17:18:40 +02:00
|
|
|
#define ALT_CERT_TRAILER "-----END More arbitrary text------\r\n"
|
2006-05-31 09:31:10 +02:00
|
|
|
#define CERT_REQUEST_HEADER "-----BEGIN NEW CERTIFICATE REQUEST-----\r\n"
|
|
|
|
#define CERT_REQUEST_TRAILER "-----END NEW CERTIFICATE REQUEST-----\r\n"
|
|
|
|
#define X509_HEADER "-----BEGIN X509 CRL-----\r\n"
|
|
|
|
#define X509_TRAILER "-----END X509 CRL-----\r\n"
|
|
|
|
#define CERT_HEADER_NOCR "-----BEGIN CERTIFICATE-----\n"
|
|
|
|
#define CERT_TRAILER_NOCR "-----END CERTIFICATE-----\n"
|
|
|
|
#define CERT_REQUEST_HEADER_NOCR "-----BEGIN NEW CERTIFICATE REQUEST-----\n"
|
|
|
|
#define CERT_REQUEST_TRAILER_NOCR "-----END NEW CERTIFICATE REQUEST-----\n"
|
|
|
|
#define X509_HEADER_NOCR "-----BEGIN X509 CRL-----\n"
|
|
|
|
#define X509_TRAILER_NOCR "-----END X509 CRL-----\n"
|
|
|
|
|
|
|
|
struct BinTests
|
|
|
|
{
|
|
|
|
const BYTE *toEncode;
|
|
|
|
DWORD toEncodeLen;
|
|
|
|
const char *base64;
|
|
|
|
};
|
|
|
|
|
|
|
|
static const BYTE toEncode1[] = { 0 };
|
|
|
|
static const BYTE toEncode2[] = { 1,2 };
|
2014-11-21 20:59:11 +01:00
|
|
|
/* static const BYTE toEncode3[] = { 1,2,3 }; */
|
2006-05-31 09:31:10 +02:00
|
|
|
static const BYTE toEncode4[] =
|
|
|
|
"abcdefghijlkmnopqrstuvwxyz01234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890"
|
|
|
|
"abcdefghijlkmnopqrstuvwxyz01234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890"
|
|
|
|
"abcdefghijlkmnopqrstuvwxyz01234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890";
|
2018-09-26 12:09:54 +02:00
|
|
|
static const BYTE toEncode5[] =
|
|
|
|
"abcdefghijlkmnopqrstuvwxyz01234567890ABCDEFGHI";
|
2006-05-31 09:31:10 +02:00
|
|
|
|
2010-10-01 13:36:03 +02:00
|
|
|
static const struct BinTests tests[] = {
|
2006-05-31 09:31:10 +02:00
|
|
|
{ toEncode1, sizeof(toEncode1), "AA==\r\n", },
|
|
|
|
{ toEncode2, sizeof(toEncode2), "AQI=\r\n", },
|
2008-07-31 10:13:53 +02:00
|
|
|
/* { toEncode3, sizeof(toEncode3), "AQID\r\n", }, This test fails on Vista. */
|
2006-05-31 09:31:10 +02:00
|
|
|
{ toEncode4, sizeof(toEncode4),
|
|
|
|
"YWJjZGVmZ2hpamxrbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5MEFCQ0RFRkdISUpL\r\n"
|
|
|
|
"TE1OT1BRUlNUVVZXWFlaMDEyMzQ1Njc4OTBhYmNkZWZnaGlqbGttbm9wcXJzdHV2\r\n"
|
|
|
|
"d3h5ejAxMjM0NTY3ODkwQUJDREVGR0hJSktMTU5PUFFSU1RVVldYWVowMTIzNDU2\r\n"
|
|
|
|
"Nzg5MGFiY2RlZmdoaWpsa21ub3BxcnN0dXZ3eHl6MDEyMzQ1Njc4OTBBQkNERUZH\r\n"
|
|
|
|
"SElKS0xNTk9QUVJTVFVWV1hZWjAxMjM0NTY3ODkwAA==\r\n" },
|
2018-09-26 12:09:54 +02:00
|
|
|
{ toEncode5, sizeof(toEncode5),
|
|
|
|
"YWJjZGVmZ2hpamxrbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5MEFCQ0RFRkdISQA=\r\n" },
|
2006-05-31 09:31:10 +02:00
|
|
|
};
|
|
|
|
|
2010-10-01 13:36:03 +02:00
|
|
|
static const struct BinTests testsNoCR[] = {
|
2006-05-31 09:31:10 +02:00
|
|
|
{ toEncode1, sizeof(toEncode1), "AA==\n", },
|
|
|
|
{ toEncode2, sizeof(toEncode2), "AQI=\n", },
|
2008-07-31 10:13:53 +02:00
|
|
|
/* { toEncode3, sizeof(toEncode3), "AQID\n", }, This test fails on Vista. */
|
2006-05-31 09:31:10 +02:00
|
|
|
{ toEncode4, sizeof(toEncode4),
|
|
|
|
"YWJjZGVmZ2hpamxrbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5MEFCQ0RFRkdISUpL\n"
|
|
|
|
"TE1OT1BRUlNUVVZXWFlaMDEyMzQ1Njc4OTBhYmNkZWZnaGlqbGttbm9wcXJzdHV2\n"
|
|
|
|
"d3h5ejAxMjM0NTY3ODkwQUJDREVGR0hJSktMTU5PUFFSU1RVVldYWVowMTIzNDU2\n"
|
|
|
|
"Nzg5MGFiY2RlZmdoaWpsa21ub3BxcnN0dXZ3eHl6MDEyMzQ1Njc4OTBBQkNERUZH\n"
|
|
|
|
"SElKS0xNTk9QUVJTVFVWV1hZWjAxMjM0NTY3ODkwAA==\n" },
|
2018-09-26 12:09:54 +02:00
|
|
|
{ toEncode5, sizeof(toEncode5),
|
|
|
|
"YWJjZGVmZ2hpamxrbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5MEFCQ0RFRkdISQA=\n" },
|
2006-05-31 09:31:10 +02:00
|
|
|
};
|
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
static WCHAR *strdupAtoW(const char *str)
|
|
|
|
{
|
|
|
|
WCHAR *ret = NULL;
|
|
|
|
DWORD len;
|
|
|
|
|
|
|
|
if (!str) return ret;
|
|
|
|
len = MultiByteToWideChar(CP_ACP, 0, str, -1, NULL, 0);
|
|
|
|
ret = heap_alloc(len * sizeof(WCHAR));
|
|
|
|
if (ret)
|
|
|
|
MultiByteToWideChar(CP_ACP, 0, str, -1, ret, len);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-05-31 09:31:10 +02:00
|
|
|
static void encodeAndCompareBase64_A(const BYTE *toEncode, DWORD toEncodeLen,
|
|
|
|
DWORD format, const char *expected, const char *header, const char *trailer)
|
|
|
|
{
|
2018-09-26 12:09:54 +02:00
|
|
|
DWORD strLen, strLen2, required;
|
2018-09-26 12:09:52 +02:00
|
|
|
const char *ptr;
|
2006-05-31 09:31:10 +02:00
|
|
|
LPSTR str = NULL;
|
|
|
|
BOOL ret;
|
|
|
|
|
2018-09-26 12:09:54 +02:00
|
|
|
required = strlen(expected) + 1;
|
|
|
|
if (header)
|
|
|
|
required += strlen(header);
|
|
|
|
if (trailer)
|
|
|
|
required += strlen(trailer);
|
|
|
|
|
2018-09-26 12:09:52 +02:00
|
|
|
strLen = 0;
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptBinaryToStringA(toEncode, toEncodeLen, format, NULL, &strLen);
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
2018-09-26 12:09:54 +02:00
|
|
|
ok(strLen == required, "Unexpected required length %u, expected %u.\n", required, strLen);
|
2018-09-26 12:09:52 +02:00
|
|
|
|
|
|
|
strLen2 = strLen;
|
|
|
|
ret = CryptBinaryToStringA(toEncode, toEncodeLen, format, NULL, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
2019-10-09 19:53:53 +02:00
|
|
|
ok(strLen == strLen2, "Unexpected required length %u, expected %u.\n", strLen2, strLen);
|
2018-09-26 12:09:52 +02:00
|
|
|
|
|
|
|
strLen2 = strLen - 1;
|
|
|
|
ret = CryptBinaryToStringA(toEncode, toEncodeLen, format, NULL, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
2019-10-09 19:53:53 +02:00
|
|
|
ok(strLen == strLen2, "Unexpected required length %u, expected %u.\n", strLen2, strLen);
|
2018-09-26 12:09:52 +02:00
|
|
|
|
|
|
|
str = heap_alloc(strLen);
|
|
|
|
|
|
|
|
/* Partially filled output buffer. */
|
|
|
|
strLen2 = strLen - 1;
|
|
|
|
str[0] = 0x12;
|
|
|
|
ret = CryptBinaryToStringA(toEncode, toEncodeLen, format, str, &strLen2);
|
|
|
|
ok((!ret && GetLastError() == ERROR_MORE_DATA) || broken(ret) /* XP */, "CryptBinaryToStringA failed %d, error %d.\n",
|
|
|
|
ret, GetLastError());
|
2019-10-09 19:53:53 +02:00
|
|
|
ok(strLen2 == strLen || broken(strLen2 == strLen - 1), "Expected length %d, got %d\n", strLen, strLen2);
|
2018-09-26 12:09:52 +02:00
|
|
|
if (header)
|
|
|
|
ok(str[0] == header[0], "Unexpected buffer contents %#x.\n", str[0]);
|
|
|
|
else
|
|
|
|
ok(str[0] == expected[0], "Unexpected buffer contents %#x.\n", str[0]);
|
|
|
|
strLen2 = strLen;
|
|
|
|
ret = CryptBinaryToStringA(toEncode, toEncodeLen, format, str, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
2019-10-09 19:53:53 +02:00
|
|
|
ok(strLen2 == strLen - 1, "Expected length %d, got %d\n", strLen - 1, strLen2);
|
2018-09-26 12:09:52 +02:00
|
|
|
|
|
|
|
ptr = str;
|
|
|
|
if (header)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
2018-09-26 12:09:52 +02:00
|
|
|
ok(!strncmp(header, ptr, strlen(header)), "Expected header %s, got %s\n", header, ptr);
|
|
|
|
ptr += strlen(header);
|
2006-05-31 09:31:10 +02:00
|
|
|
}
|
2018-09-26 12:09:52 +02:00
|
|
|
ok(!strncmp(expected, ptr, strlen(expected)), "Expected %s, got %s\n", expected, ptr);
|
|
|
|
ptr += strlen(expected);
|
|
|
|
if (trailer)
|
|
|
|
ok(!strncmp(trailer, ptr, strlen(trailer)), "Expected trailer %s, got %s\n", trailer, ptr);
|
|
|
|
|
|
|
|
heap_free(str);
|
2006-05-31 09:31:10 +02:00
|
|
|
}
|
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
static void encode_compare_base64_W(const BYTE *toEncode, DWORD toEncodeLen, DWORD format,
|
|
|
|
const WCHAR *expected, const char *header, const char *trailer)
|
|
|
|
{
|
2018-09-26 12:09:54 +02:00
|
|
|
WCHAR *headerW, *trailerW, required;
|
2018-09-26 12:09:52 +02:00
|
|
|
DWORD strLen, strLen2;
|
|
|
|
WCHAR *strW = NULL;
|
2018-09-25 15:55:36 +02:00
|
|
|
const WCHAR *ptr;
|
|
|
|
BOOL ret;
|
|
|
|
|
2018-09-26 12:09:54 +02:00
|
|
|
required = lstrlenW(expected) + 1;
|
|
|
|
if (header)
|
|
|
|
required += strlen(header);
|
|
|
|
if (trailer)
|
|
|
|
required += strlen(trailer);
|
|
|
|
|
2018-09-26 12:09:52 +02:00
|
|
|
strLen = 0;
|
2018-09-25 15:55:36 +02:00
|
|
|
ret = CryptBinaryToStringW(toEncode, toEncodeLen, format, NULL, &strLen);
|
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
2018-09-26 12:09:54 +02:00
|
|
|
ok(strLen == required, "Unexpected required length %u, expected %u.\n", strLen, required);
|
2018-09-25 15:55:36 +02:00
|
|
|
|
2018-09-26 12:09:52 +02:00
|
|
|
/* Same call with non-zero length value. */
|
2018-09-25 15:55:36 +02:00
|
|
|
strLen2 = strLen;
|
2018-09-26 12:09:52 +02:00
|
|
|
ret = CryptBinaryToStringW(toEncode, toEncodeLen, format, NULL, &strLen2);
|
2018-09-25 15:55:36 +02:00
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
2018-09-26 12:09:52 +02:00
|
|
|
ok(strLen == strLen2, "Unexpected required length.\n");
|
|
|
|
|
|
|
|
strLen2 = strLen - 1;
|
|
|
|
ret = CryptBinaryToStringW(toEncode, toEncodeLen, format, NULL, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
|
|
|
ok(strLen == strLen2, "Unexpected required length.\n");
|
|
|
|
|
|
|
|
strLen2 = strLen - 1;
|
|
|
|
ret = CryptBinaryToStringW(toEncode, toEncodeLen, format, NULL, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
|
|
|
ok(strLen == strLen2, "Unexpected required length.\n");
|
|
|
|
|
|
|
|
strW = heap_alloc(strLen * sizeof(WCHAR));
|
2018-09-25 15:55:36 +02:00
|
|
|
|
|
|
|
headerW = strdupAtoW(header);
|
|
|
|
trailerW = strdupAtoW(trailer);
|
|
|
|
|
2018-09-26 12:09:52 +02:00
|
|
|
strLen2 = strLen - 1;
|
|
|
|
strW[0] = 0x1234;
|
|
|
|
ret = CryptBinaryToStringW(toEncode, toEncodeLen, format, strW, &strLen2);
|
|
|
|
ok((!ret && GetLastError() == ERROR_MORE_DATA) || broken(ret) /* XP */, "CryptBinaryToStringW failed, %d, error %d\n",
|
|
|
|
ret, GetLastError());
|
|
|
|
if (headerW)
|
|
|
|
ok(strW[0] == 0x1234, "Unexpected buffer contents %#x.\n", strW[0]);
|
|
|
|
else
|
|
|
|
ok(strW[0] == 0x1234 || broken(strW[0] != 0x1234) /* XP */, "Unexpected buffer contents %#x.\n", strW[0]);
|
|
|
|
|
|
|
|
strLen2 = strLen;
|
|
|
|
ret = CryptBinaryToStringW(toEncode, toEncodeLen, format, strW, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
|
|
|
|
|
|
|
ok(strLen2 == strLen - 1, "Expected length %d, got %d\n", strLen - 1, strLen);
|
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
ptr = strW;
|
|
|
|
if (headerW)
|
|
|
|
{
|
|
|
|
ok(!memcmp(headerW, ptr, lstrlenW(headerW)), "Expected header %s, got %s.\n", wine_dbgstr_w(headerW),
|
|
|
|
wine_dbgstr_w(ptr));
|
|
|
|
ptr += lstrlenW(headerW);
|
|
|
|
}
|
|
|
|
ok(!memcmp(expected, ptr, lstrlenW(expected)), "Expected %s, got %s.\n", wine_dbgstr_w(expected),
|
|
|
|
wine_dbgstr_w(ptr));
|
|
|
|
ptr += lstrlenW(expected);
|
|
|
|
if (trailerW)
|
|
|
|
ok(!memcmp(trailerW, ptr, lstrlenW(trailerW)), "Expected trailer %s, got %s.\n", wine_dbgstr_w(trailerW),
|
|
|
|
wine_dbgstr_w(ptr));
|
|
|
|
|
|
|
|
heap_free(strW);
|
|
|
|
heap_free(headerW);
|
|
|
|
heap_free(trailerW);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_CryptBinaryToString(void)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
2018-09-25 15:55:36 +02:00
|
|
|
DWORD strLen, strLen2, i;
|
2006-05-31 09:31:10 +02:00
|
|
|
BOOL ret;
|
|
|
|
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptBinaryToStringA(NULL, 0, 0, NULL, NULL);
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
2006-09-29 23:36:26 +02:00
|
|
|
"Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
2018-09-25 15:55:36 +02:00
|
|
|
|
|
|
|
strLen = 123;
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptBinaryToStringA(NULL, 0, 0, NULL, &strLen);
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
2006-09-29 23:36:26 +02:00
|
|
|
"Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
2018-09-25 15:55:36 +02:00
|
|
|
ok(strLen == 123, "Unexpected length.\n");
|
|
|
|
|
|
|
|
if (0)
|
|
|
|
ret = CryptBinaryToStringW(NULL, 0, 0, NULL, NULL);
|
|
|
|
|
|
|
|
strLen = 123;
|
|
|
|
ret = CryptBinaryToStringW(NULL, 0, 0, NULL, &strLen);
|
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "Unexpected error %d\n", GetLastError());
|
|
|
|
ok(strLen == 123, "Unexpected length.\n");
|
|
|
|
|
2018-06-22 19:50:40 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(tests); i++)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
2018-09-25 15:55:36 +02:00
|
|
|
WCHAR *strW, *encodedW;
|
2006-05-31 09:31:10 +02:00
|
|
|
LPSTR str = NULL;
|
|
|
|
BOOL ret;
|
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
strLen = 0;
|
|
|
|
ret = CryptBinaryToStringA(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BINARY, NULL, &strLen);
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
2018-09-25 15:55:36 +02:00
|
|
|
ok(strLen == tests[i].toEncodeLen, "Unexpected required length %u.\n", strLen);
|
|
|
|
|
|
|
|
strLen2 = strLen;
|
|
|
|
str = heap_alloc(strLen);
|
|
|
|
ret = CryptBinaryToStringA(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BINARY, str, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
|
|
|
ok(strLen == strLen2, "Expected length %u, got %u\n", strLen, strLen2);
|
|
|
|
ok(!memcmp(str, tests[i].toEncode, tests[i].toEncodeLen), "Unexpected value\n");
|
|
|
|
heap_free(str);
|
|
|
|
|
|
|
|
strLen = 0;
|
|
|
|
ret = CryptBinaryToStringW(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BINARY, NULL, &strLen);
|
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
|
|
|
ok(strLen == tests[i].toEncodeLen, "Unexpected required length %u.\n", strLen);
|
2018-09-27 16:27:56 +02:00
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
strLen2 = strLen;
|
|
|
|
strW = heap_alloc(strLen);
|
|
|
|
ret = CryptBinaryToStringW(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BINARY, strW, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringW failed: %d\n", GetLastError());
|
|
|
|
ok(strLen == strLen2, "Expected length %u, got %u\n", strLen, strLen2);
|
|
|
|
ok(!memcmp(strW, tests[i].toEncode, tests[i].toEncodeLen), "Unexpected value\n");
|
|
|
|
heap_free(strW);
|
|
|
|
|
|
|
|
encodeAndCompareBase64_A(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64,
|
|
|
|
tests[i].base64, NULL, NULL);
|
|
|
|
encodeAndCompareBase64_A(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64HEADER,
|
|
|
|
tests[i].base64, CERT_HEADER, CERT_TRAILER);
|
|
|
|
encodeAndCompareBase64_A(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64REQUESTHEADER,
|
|
|
|
tests[i].base64, CERT_REQUEST_HEADER, CERT_REQUEST_TRAILER);
|
|
|
|
encodeAndCompareBase64_A(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64X509CRLHEADER,
|
|
|
|
tests[i].base64, X509_HEADER, X509_TRAILER);
|
|
|
|
|
|
|
|
encodedW = strdupAtoW(tests[i].base64);
|
|
|
|
|
|
|
|
encode_compare_base64_W(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64, encodedW, NULL, NULL);
|
|
|
|
encode_compare_base64_W(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64HEADER, encodedW,
|
|
|
|
CERT_HEADER, CERT_TRAILER);
|
|
|
|
encode_compare_base64_W(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64REQUESTHEADER,
|
|
|
|
encodedW, CERT_REQUEST_HEADER, CERT_REQUEST_TRAILER);
|
|
|
|
encode_compare_base64_W(tests[i].toEncode, tests[i].toEncodeLen, CRYPT_STRING_BASE64X509CRLHEADER, encodedW,
|
|
|
|
X509_HEADER, X509_TRAILER);
|
|
|
|
|
|
|
|
heap_free(encodedW);
|
|
|
|
}
|
|
|
|
|
2018-06-22 19:50:40 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(testsNoCR); i++)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
|
|
|
LPSTR str = NULL;
|
2018-09-25 15:55:36 +02:00
|
|
|
WCHAR *encodedW;
|
2006-05-31 09:31:10 +02:00
|
|
|
BOOL ret;
|
|
|
|
|
2018-09-25 15:55:36 +02:00
|
|
|
ret = CryptBinaryToStringA(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BINARY | CRYPT_STRING_NOCR, NULL, &strLen);
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
2018-09-25 15:55:36 +02:00
|
|
|
|
|
|
|
strLen2 = strLen;
|
|
|
|
str = heap_alloc(strLen);
|
|
|
|
ret = CryptBinaryToStringA(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BINARY | CRYPT_STRING_NOCR, str, &strLen2);
|
|
|
|
ok(ret, "CryptBinaryToStringA failed: %d\n", GetLastError());
|
|
|
|
ok(strLen == strLen2, "Expected length %d, got %d\n", strLen, strLen2);
|
|
|
|
ok(!memcmp(str, testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen), "Unexpected value\n");
|
|
|
|
heap_free(str);
|
|
|
|
|
|
|
|
encodeAndCompareBase64_A(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen, CRYPT_STRING_BASE64 | CRYPT_STRING_NOCR,
|
|
|
|
testsNoCR[i].base64, NULL, NULL);
|
|
|
|
encodeAndCompareBase64_A(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64HEADER | CRYPT_STRING_NOCR, testsNoCR[i].base64, CERT_HEADER_NOCR, CERT_TRAILER_NOCR);
|
|
|
|
encodeAndCompareBase64_A(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64REQUESTHEADER | CRYPT_STRING_NOCR, testsNoCR[i].base64, CERT_REQUEST_HEADER_NOCR,
|
|
|
|
CERT_REQUEST_TRAILER_NOCR);
|
|
|
|
encodeAndCompareBase64_A(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64X509CRLHEADER | CRYPT_STRING_NOCR, testsNoCR[i].base64, X509_HEADER_NOCR, X509_TRAILER_NOCR);
|
|
|
|
|
|
|
|
encodedW = strdupAtoW(testsNoCR[i].base64);
|
|
|
|
|
|
|
|
encode_compare_base64_W(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64 | CRYPT_STRING_NOCR, encodedW, NULL, NULL);
|
|
|
|
encode_compare_base64_W(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64HEADER | CRYPT_STRING_NOCR, encodedW, CERT_HEADER_NOCR, CERT_TRAILER_NOCR);
|
|
|
|
encode_compare_base64_W(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64REQUESTHEADER | CRYPT_STRING_NOCR, encodedW, CERT_REQUEST_HEADER_NOCR,
|
|
|
|
CERT_REQUEST_TRAILER_NOCR);
|
|
|
|
encode_compare_base64_W(testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen,
|
|
|
|
CRYPT_STRING_BASE64X509CRLHEADER | CRYPT_STRING_NOCR, encodedW,
|
|
|
|
X509_HEADER_NOCR, X509_TRAILER_NOCR);
|
|
|
|
|
|
|
|
heap_free(encodedW);
|
2006-05-31 09:31:10 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void decodeAndCompareBase64_A(LPCSTR toDecode, LPCSTR header,
|
|
|
|
LPCSTR trailer, DWORD useFormat, DWORD expectedFormat, const BYTE *expected,
|
|
|
|
DWORD expectedLen)
|
|
|
|
{
|
|
|
|
static const char garbage[] = "garbage\r\n";
|
|
|
|
LPSTR str;
|
|
|
|
DWORD len = strlen(toDecode) + strlen(garbage) + 1;
|
|
|
|
|
|
|
|
if (header)
|
|
|
|
len += strlen(header);
|
|
|
|
if (trailer)
|
|
|
|
len += strlen(trailer);
|
|
|
|
str = HeapAlloc(GetProcessHeap(), 0, len);
|
|
|
|
if (str)
|
|
|
|
{
|
|
|
|
LPBYTE buf;
|
|
|
|
DWORD bufLen = 0;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
if (header)
|
|
|
|
strcpy(str, header);
|
|
|
|
else
|
|
|
|
*str = 0;
|
|
|
|
strcat(str, toDecode);
|
|
|
|
if (trailer)
|
|
|
|
strcat(str, trailer);
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(str, 0, useFormat, NULL, &bufLen, NULL,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL);
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
buf = HeapAlloc(GetProcessHeap(), 0, bufLen);
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
DWORD skipped, usedFormat;
|
|
|
|
|
|
|
|
/* check as normal, make sure last two parameters are optional */
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(str, 0, useFormat, buf, &bufLen, NULL,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL);
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(bufLen == expectedLen,
|
2006-09-29 23:36:26 +02:00
|
|
|
"Expected length %d, got %d\n", expectedLen, bufLen);
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(!memcmp(buf, expected, bufLen), "Unexpected value\n");
|
|
|
|
/* check last two params */
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(str, 0, useFormat, buf, &bufLen,
|
2006-05-31 09:31:10 +02:00
|
|
|
&skipped, &usedFormat);
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
|
|
|
ok(skipped == 0, "Expected skipped 0, got %d\n", skipped);
|
|
|
|
ok(usedFormat == expectedFormat, "Expected format %d, got %d\n",
|
2006-05-31 09:31:10 +02:00
|
|
|
expectedFormat, usedFormat);
|
|
|
|
HeapFree(GetProcessHeap(), 0, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check again, but with garbage up front */
|
|
|
|
strcpy(str, garbage);
|
|
|
|
if (header)
|
|
|
|
strcat(str, header);
|
|
|
|
strcat(str, toDecode);
|
|
|
|
if (trailer)
|
|
|
|
strcat(str, trailer);
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(str, 0, useFormat, NULL, &bufLen, NULL,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL);
|
|
|
|
/* expect failure with no header, and success with one */
|
|
|
|
if (header)
|
2006-09-29 23:36:26 +02:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
else
|
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_DATA,
|
2008-07-22 23:25:30 +02:00
|
|
|
"Expected !ret and last error ERROR_INVALID_DATA, got ret=%d, error=%d\n", ret, GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
buf = HeapAlloc(GetProcessHeap(), 0, bufLen);
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
DWORD skipped, usedFormat;
|
|
|
|
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(str, 0, useFormat, buf, &bufLen,
|
2006-05-31 09:31:10 +02:00
|
|
|
&skipped, &usedFormat);
|
2011-02-05 01:06:38 +01:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(skipped == strlen(garbage),
|
2008-07-22 23:25:30 +02:00
|
|
|
"Expected %d characters of \"%s\" skipped when trying format %08x, got %d (used format is %08x)\n",
|
|
|
|
lstrlenA(garbage), str, useFormat, skipped, usedFormat);
|
2006-05-31 09:31:10 +02:00
|
|
|
HeapFree(GetProcessHeap(), 0, buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
HeapFree(GetProcessHeap(), 0, str);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-17 15:45:54 +01:00
|
|
|
static void decodeBase64WithLenFmtW(LPCSTR strA, int len, DWORD fmt, BOOL retA,
|
|
|
|
const BYTE *bufA, DWORD bufLenA, DWORD fmtUsedA)
|
|
|
|
{
|
|
|
|
BYTE buf[8] = {0};
|
|
|
|
DWORD bufLen = sizeof(buf)-1, fmtUsed = 0xdeadbeef;
|
|
|
|
BOOL ret;
|
|
|
|
WCHAR strW[64];
|
|
|
|
int i;
|
|
|
|
for (i = 0; (strW[i] = strA[i]) != 0; ++i);
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryW(strW, len, fmt, buf, &bufLen, NULL, &fmtUsed);
|
2017-02-17 15:45:54 +01:00
|
|
|
ok(ret == retA && bufLen == bufLenA && memcmp(bufA, buf, bufLen) == 0
|
|
|
|
&& fmtUsed == fmtUsedA, "base64 \"%s\" len %d: W and A differ\n", strA, len);
|
|
|
|
}
|
|
|
|
|
2017-02-14 15:59:32 +01:00
|
|
|
static void decodeBase64WithLenFmt(LPCSTR str, int len, DWORD fmt, LPCSTR expected, int le, BOOL isBroken)
|
|
|
|
{
|
|
|
|
BYTE buf[8] = {0};
|
2017-02-17 15:45:54 +01:00
|
|
|
DWORD bufLen = sizeof(buf)-1, fmtUsed = 0xdeadbeef;
|
2017-02-14 15:59:32 +01:00
|
|
|
BOOL ret;
|
|
|
|
SetLastError(0xdeadbeef);
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(str, len, fmt, buf, &bufLen, NULL, &fmtUsed);
|
2017-02-14 15:59:32 +01:00
|
|
|
buf[bufLen] = 0;
|
|
|
|
if (expected) {
|
|
|
|
BOOL correct = ret && strcmp(expected, (char*)buf) == 0;
|
|
|
|
ok(correct || (isBroken && broken(!ret)),
|
|
|
|
"base64 \"%s\" len %d: expected \"%s\", got \"%s\" (ret %d, le %d)\n",
|
|
|
|
str, len, expected, (char*)buf, ret, GetLastError());
|
|
|
|
if (correct)
|
|
|
|
ok(fmtUsed == fmt, "base64 \"%s\" len %d: expected fmt %d, used %d\n",
|
|
|
|
str, len, fmt, fmtUsed);
|
|
|
|
} else {
|
|
|
|
ok(!ret && GetLastError() == le,
|
|
|
|
"base64 \"%s\" len %d: expected failure, got \"%s\" (ret %d, le %d)\n",
|
|
|
|
str, len, (char*)buf, ret, GetLastError());
|
|
|
|
}
|
2018-02-27 05:21:24 +01:00
|
|
|
|
|
|
|
decodeBase64WithLenFmtW(str, len, fmt, ret, buf, bufLen, fmtUsed);
|
2017-02-14 15:59:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void decodeBase64WithLenBroken(LPCSTR str, int len, LPCSTR expected, int le)
|
|
|
|
{
|
|
|
|
decodeBase64WithLenFmt(str, len, CRYPT_STRING_BASE64, expected, le, TRUE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void decodeBase64WithLen(LPCSTR str, int len, LPCSTR expected, int le)
|
|
|
|
{
|
|
|
|
decodeBase64WithLenFmt(str, len, CRYPT_STRING_BASE64, expected, le, FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void decodeBase64WithFmt(LPCSTR str, DWORD fmt, LPCSTR expected, int le)
|
|
|
|
{
|
|
|
|
decodeBase64WithLenFmt(str, 0, fmt, expected, le, FALSE);
|
|
|
|
}
|
|
|
|
|
2006-05-31 09:31:10 +02:00
|
|
|
struct BadString
|
|
|
|
{
|
|
|
|
const char *str;
|
|
|
|
DWORD format;
|
|
|
|
};
|
|
|
|
|
2010-10-01 13:36:03 +02:00
|
|
|
static const struct BadString badStrings[] = {
|
2006-05-31 09:31:10 +02:00
|
|
|
{ "-----BEGIN X509 CRL-----\r\nAA==\r\n", CRYPT_STRING_BASE64X509CRLHEADER },
|
|
|
|
};
|
|
|
|
|
|
|
|
static void testStringToBinaryA(void)
|
|
|
|
{
|
|
|
|
BOOL ret;
|
|
|
|
DWORD bufLen = 0, i;
|
2017-02-14 15:59:32 +01:00
|
|
|
BYTE buf[8];
|
2006-05-31 09:31:10 +02:00
|
|
|
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(NULL, 0, 0, NULL, NULL, NULL, NULL);
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
2016-02-18 03:17:36 +01:00
|
|
|
"Expected ERROR_INVALID_PARAMETER, got ret=%d le=%u\n", ret, GetLastError());
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(NULL, 0, 0, NULL, &bufLen, NULL, NULL);
|
2006-05-31 09:31:10 +02:00
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
2016-02-18 03:17:36 +01:00
|
|
|
"Expected ERROR_INVALID_PARAMETER, got ret=%d le=%u\n", ret, GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
/* Bogus format */
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(tests[0].base64, 0, 0, NULL, &bufLen, NULL,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL);
|
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_DATA,
|
2016-02-18 03:17:36 +01:00
|
|
|
"Expected ERROR_INVALID_DATA, got ret=%d le=%u\n", ret, GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
/* Decoding doesn't expect the NOCR flag to be specified */
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(tests[0].base64, 1,
|
2006-05-31 09:31:10 +02:00
|
|
|
CRYPT_STRING_BASE64 | CRYPT_STRING_NOCR, NULL, &bufLen, NULL, NULL);
|
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_DATA,
|
2016-02-18 03:17:36 +01:00
|
|
|
"Expected ERROR_INVALID_DATA, got ret=%d le=%u\n", ret, GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
/* Bad strings */
|
2018-06-22 19:50:40 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(badStrings); i++)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
|
|
|
bufLen = 0;
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(badStrings[i].str, 0, badStrings[i].format,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL, &bufLen, NULL, NULL);
|
|
|
|
ok(!ret && GetLastError() == ERROR_INVALID_DATA,
|
2016-08-26 16:03:00 +02:00
|
|
|
"%d: Expected ERROR_INVALID_DATA, got ret=%d le=%u\n", i, ret, GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
}
|
2017-02-14 15:59:32 +01:00
|
|
|
/* Weird base64 strings (invalid padding, extra white-space etc.) */
|
|
|
|
decodeBase64WithLen("V=", 0, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithLen("VV=", 0, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithLen("V==", 0, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithLen("V=", 2, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithLen("VV=", 3, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithLen("V==", 3, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithLenBroken("V", 0, "T", 0);
|
|
|
|
decodeBase64WithLenBroken("VV", 0, "U", 0);
|
|
|
|
decodeBase64WithLenBroken("VVV", 0, "UU", 0);
|
|
|
|
decodeBase64WithLen("V", 1, "T", 0);
|
|
|
|
decodeBase64WithLen("VV", 2, "U", 0);
|
|
|
|
decodeBase64WithLen("VVV", 3, "UU", 0);
|
|
|
|
decodeBase64WithLen("V===", 0, "T", 0);
|
|
|
|
decodeBase64WithLen("V========", 0, "T", 0);
|
|
|
|
decodeBase64WithLen("V===", 4, "T", 0);
|
|
|
|
decodeBase64WithLen("V\nVVV", 0, "UUU", 0);
|
|
|
|
decodeBase64WithLen("VV\nVV", 0, "UUU", 0);
|
|
|
|
decodeBase64WithLen("VVV\nV", 0, "UUU", 0);
|
|
|
|
decodeBase64WithLen("V\nVVV", 5, "UUU", 0);
|
|
|
|
decodeBase64WithLen("VV\nVV", 5, "UUU", 0);
|
|
|
|
decodeBase64WithLen("VVV\nV", 5, "UUU", 0);
|
|
|
|
decodeBase64WithLen("VV VV", 0, "UUU", 0);
|
|
|
|
decodeBase64WithLen("V===VVVV", 0, "T", 0);
|
|
|
|
decodeBase64WithLen("VV==VVVV", 0, "U", 0);
|
|
|
|
decodeBase64WithLen("VVV=VVVV", 0, "UU", 0);
|
|
|
|
decodeBase64WithLen("VVVV=VVVV", 0, "UUU", 0);
|
|
|
|
decodeBase64WithLen("V===VVVV", 8, "T", 0);
|
|
|
|
decodeBase64WithLen("VV==VVVV", 8, "U", 0);
|
|
|
|
decodeBase64WithLen("VVV=VVVV", 8, "UU", 0);
|
|
|
|
decodeBase64WithLen("VVVV=VVVV", 8, "UUU", 0);
|
|
|
|
|
|
|
|
decodeBase64WithFmt("-----BEGIN-----VVVV-----END-----", CRYPT_STRING_BASE64HEADER, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithFmt("-----BEGIN-----VVVV-----END -----", CRYPT_STRING_BASE64HEADER, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----VVVV-----END-----", CRYPT_STRING_BASE64HEADER, 0, ERROR_INVALID_DATA);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----VVVV-----END -----", CRYPT_STRING_BASE64HEADER, "UUU", 0);
|
|
|
|
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----V-----END -----", CRYPT_STRING_BASE64HEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN foo-----V-----END -----", CRYPT_STRING_BASE64HEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN foo-----V-----END foo-----", CRYPT_STRING_BASE64HEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----V-----END foo-----", CRYPT_STRING_BASE64HEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----V-----END -----", CRYPT_STRING_BASE64X509CRLHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN foo-----V-----END -----", CRYPT_STRING_BASE64X509CRLHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN foo-----V-----END foo-----", CRYPT_STRING_BASE64X509CRLHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----V-----END foo-----", CRYPT_STRING_BASE64X509CRLHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----V-----END -----", CRYPT_STRING_BASE64REQUESTHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN foo-----V-----END -----", CRYPT_STRING_BASE64REQUESTHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN foo-----V-----END foo-----", CRYPT_STRING_BASE64REQUESTHEADER, "T", 0);
|
|
|
|
decodeBase64WithFmt("-----BEGIN -----V-----END foo-----", CRYPT_STRING_BASE64REQUESTHEADER, "T", 0);
|
|
|
|
|
|
|
|
/* Too small buffer */
|
|
|
|
buf[0] = 0;
|
|
|
|
bufLen = 4;
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA("VVVVVVVV", 8, CRYPT_STRING_BASE64, (BYTE*)buf, &bufLen, NULL, NULL);
|
2017-02-14 15:59:32 +01:00
|
|
|
ok(!ret && bufLen == 4 && buf[0] == 0,
|
|
|
|
"Expected ret 0, bufLen 4, buf[0] '\\0', got ret %d, bufLen %d, buf[0] '%c'\n",
|
|
|
|
ret, bufLen, buf[0]);
|
|
|
|
|
2006-05-31 09:31:10 +02:00
|
|
|
/* Good strings */
|
2018-06-22 19:50:40 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(tests); i++)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
|
|
|
bufLen = 0;
|
|
|
|
/* Bogus length--oddly enough, that succeeds, even though it's not
|
|
|
|
* properly padded.
|
|
|
|
*/
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(tests[i].base64, 1, CRYPT_STRING_BASE64,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL, &bufLen, NULL, NULL);
|
2017-02-14 15:59:34 +01:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
/* Check with the precise format */
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, NULL, NULL,
|
|
|
|
CRYPT_STRING_BASE64, CRYPT_STRING_BASE64, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, CERT_HEADER, CERT_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64HEADER, CRYPT_STRING_BASE64HEADER,
|
|
|
|
tests[i].toEncode, tests[i].toEncodeLen);
|
2011-04-23 17:18:40 +02:00
|
|
|
decodeAndCompareBase64_A(tests[i].base64, ALT_CERT_HEADER, ALT_CERT_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64HEADER, CRYPT_STRING_BASE64HEADER,
|
|
|
|
tests[i].toEncode, tests[i].toEncodeLen);
|
2006-05-31 09:31:10 +02:00
|
|
|
decodeAndCompareBase64_A(tests[i].base64, CERT_REQUEST_HEADER,
|
|
|
|
CERT_REQUEST_TRAILER, CRYPT_STRING_BASE64REQUESTHEADER,
|
|
|
|
CRYPT_STRING_BASE64REQUESTHEADER, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, X509_HEADER, X509_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64X509CRLHEADER, CRYPT_STRING_BASE64X509CRLHEADER,
|
|
|
|
tests[i].toEncode, tests[i].toEncodeLen);
|
|
|
|
/* And check with the "any" formats */
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, NULL, NULL,
|
|
|
|
CRYPT_STRING_BASE64_ANY, CRYPT_STRING_BASE64, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
/* Don't check with no header and the string_any format, that'll
|
|
|
|
* always succeed.
|
|
|
|
*/
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, CERT_HEADER, CERT_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64_ANY, CRYPT_STRING_BASE64HEADER, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, CERT_HEADER, CERT_TRAILER,
|
|
|
|
CRYPT_STRING_ANY, CRYPT_STRING_BASE64HEADER, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
/* oddly, these seem to decode using the wrong format
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, CERT_REQUEST_HEADER,
|
|
|
|
CERT_REQUEST_TRAILER, CRYPT_STRING_BASE64_ANY,
|
|
|
|
CRYPT_STRING_BASE64REQUESTHEADER, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, CERT_REQUEST_HEADER,
|
|
|
|
CERT_REQUEST_TRAILER, CRYPT_STRING_ANY,
|
|
|
|
CRYPT_STRING_BASE64REQUESTHEADER, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, X509_HEADER, X509_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64_ANY, CRYPT_STRING_BASE64X509CRLHEADER,
|
|
|
|
tests[i].toEncode, tests[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(tests[i].base64, X509_HEADER, X509_TRAILER,
|
|
|
|
CRYPT_STRING_ANY, CRYPT_STRING_BASE64X509CRLHEADER, tests[i].toEncode,
|
|
|
|
tests[i].toEncodeLen);
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
/* And again, with no CR--decoding handles this automatically */
|
2018-06-22 19:50:40 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(testsNoCR); i++)
|
2006-05-31 09:31:10 +02:00
|
|
|
{
|
|
|
|
bufLen = 0;
|
|
|
|
/* Bogus length--oddly enough, that succeeds, even though it's not
|
|
|
|
* properly padded.
|
|
|
|
*/
|
2018-02-27 05:21:24 +01:00
|
|
|
ret = CryptStringToBinaryA(testsNoCR[i].base64, 1, CRYPT_STRING_BASE64,
|
2006-05-31 09:31:10 +02:00
|
|
|
NULL, &bufLen, NULL, NULL);
|
2017-02-14 15:59:34 +01:00
|
|
|
ok(ret, "CryptStringToBinaryA failed: %d\n", GetLastError());
|
2006-05-31 09:31:10 +02:00
|
|
|
/* Check with the precise format */
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, NULL, NULL,
|
|
|
|
CRYPT_STRING_BASE64, CRYPT_STRING_BASE64, testsNoCR[i].toEncode,
|
|
|
|
testsNoCR[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, CERT_HEADER, CERT_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64HEADER, CRYPT_STRING_BASE64HEADER,
|
|
|
|
testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, CERT_REQUEST_HEADER,
|
|
|
|
CERT_REQUEST_TRAILER, CRYPT_STRING_BASE64REQUESTHEADER,
|
|
|
|
CRYPT_STRING_BASE64REQUESTHEADER, testsNoCR[i].toEncode,
|
|
|
|
testsNoCR[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, X509_HEADER, X509_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64X509CRLHEADER, CRYPT_STRING_BASE64X509CRLHEADER,
|
|
|
|
testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen);
|
|
|
|
/* And check with the "any" formats */
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, NULL, NULL,
|
|
|
|
CRYPT_STRING_BASE64_ANY, CRYPT_STRING_BASE64, testsNoCR[i].toEncode,
|
|
|
|
testsNoCR[i].toEncodeLen);
|
|
|
|
/* Don't check with no header and the string_any format, that'll
|
|
|
|
* always succeed.
|
|
|
|
*/
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, CERT_HEADER, CERT_TRAILER,
|
|
|
|
CRYPT_STRING_BASE64_ANY, CRYPT_STRING_BASE64HEADER,
|
|
|
|
testsNoCR[i].toEncode, testsNoCR[i].toEncodeLen);
|
|
|
|
decodeAndCompareBase64_A(testsNoCR[i].base64, CERT_HEADER, CERT_TRAILER,
|
|
|
|
CRYPT_STRING_ANY, CRYPT_STRING_BASE64HEADER, testsNoCR[i].toEncode,
|
|
|
|
testsNoCR[i].toEncodeLen);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
START_TEST(base64)
|
|
|
|
{
|
2018-09-25 15:55:36 +02:00
|
|
|
test_CryptBinaryToString();
|
2018-02-27 05:21:24 +01:00
|
|
|
testStringToBinaryA();
|
2006-05-31 09:31:10 +02:00
|
|
|
}
|