962 lines
37 KiB
C
962 lines
37 KiB
C
/* Unit test suite for wintrust asn functions
|
|
*
|
|
* Copyright 2007 Juan Lang
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*
|
|
*/
|
|
#include <stdarg.h>
|
|
#include "windef.h"
|
|
#include "winbase.h"
|
|
#include "winerror.h"
|
|
#include "wincrypt.h"
|
|
#include "wintrust.h"
|
|
|
|
#include "wine/test.h"
|
|
|
|
static BOOL (WINAPI *pCryptDecodeObjectEx)(DWORD,LPCSTR,const BYTE*,DWORD,DWORD,PCRYPT_DECODE_PARA,void*,DWORD*);
|
|
static BOOL (WINAPI *pCryptEncodeObjectEx)(DWORD,LPCSTR,const void*,DWORD,PCRYPT_ENCODE_PARA,void*,DWORD*);
|
|
|
|
static const BYTE falseCriteria[] = { 0x30,0x06,0x01,0x01,0x00,0x01,0x01,0x00 };
|
|
static const BYTE trueCriteria[] = { 0x30,0x06,0x01,0x01,0xff,0x01,0x01,0xff };
|
|
|
|
static void test_encodeSPCFinancialCriteria(void)
|
|
{
|
|
BOOL ret;
|
|
DWORD size = 0;
|
|
LPBYTE buf;
|
|
SPC_FINANCIAL_CRITERIA criteria = { FALSE, FALSE };
|
|
|
|
if (!pCryptEncodeObjectEx)
|
|
{
|
|
skip("CryptEncodeObjectEx() is not available. Skipping the encodeFinancialCriteria tests\n");
|
|
return;
|
|
}
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_FINANCIAL_CRITERIA_STRUCT,
|
|
&criteria, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(falseCriteria), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, falseCriteria, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
criteria.fFinancialInfoAvailable = criteria.fMeetsCriteria = TRUE;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_FINANCIAL_CRITERIA_STRUCT,
|
|
&criteria, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(trueCriteria), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, trueCriteria, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static void test_decodeSPCFinancialCriteria(void)
|
|
{
|
|
BOOL ret;
|
|
SPC_FINANCIAL_CRITERIA criteria;
|
|
DWORD size = sizeof(criteria);
|
|
|
|
if (!pCryptDecodeObjectEx)
|
|
{
|
|
skip("CryptDecodeObjectEx() is not available. Skipping the decodeSPCFinancialCriteria tests\n");
|
|
return;
|
|
}
|
|
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_FINANCIAL_CRITERIA_STRUCT,
|
|
falseCriteria, sizeof(falseCriteria), 0, NULL, &criteria, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(!criteria.fFinancialInfoAvailable, "expected FALSE\n");
|
|
ok(!criteria.fMeetsCriteria, "expected FALSE\n");
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_FINANCIAL_CRITERIA_STRUCT,
|
|
trueCriteria, sizeof(trueCriteria), 0, NULL, &criteria, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(criteria.fFinancialInfoAvailable, "expected TRUE\n");
|
|
ok(criteria.fMeetsCriteria, "expected TRUE\n");
|
|
}
|
|
}
|
|
|
|
static WCHAR url[] = { 'h','t','t','p',':','/','/','w','i','n','e','h','q','.',
|
|
'o','r','g',0 };
|
|
static const WCHAR nihongoURL[] = { 'h','t','t','p',':','/','/',0x226f,
|
|
0x575b, 0 };
|
|
static const BYTE emptyURLSPCLink[] = { 0x80,0x00 };
|
|
static const BYTE urlSPCLink[] = {
|
|
0x80,0x11,0x68,0x74,0x74,0x70,0x3a,0x2f,0x2f,0x77,0x69,0x6e,0x65,0x68,0x71,
|
|
0x2e,0x6f,0x72,0x67};
|
|
static const BYTE fileSPCLink[] = {
|
|
0xa2,0x14,0x80,0x12,0x00,0x68,0x00,0x74,0x00,0x74,0x00,0x70,0x00,0x3a,0x00,
|
|
0x2f,0x00,0x2f,0x22,0x6f,0x57,0x5b };
|
|
static const BYTE emptyMonikerSPCLink[] = {
|
|
0xa1,0x14,0x04,0x10,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
|
0x00,0x00,0x00,0x00,0x00,0x04,0x00 };
|
|
static BYTE data[] = { 0xba, 0xad, 0xf0, 0x0d };
|
|
static const BYTE monikerSPCLink[] = {
|
|
0xa1,0x18,0x04,0x10,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,
|
|
0xea,0xea,0xea,0xea,0xea,0x04,0x04,0xba,0xad,0xf0,0x0d };
|
|
|
|
static void test_encodeSPCLink(void)
|
|
{
|
|
BOOL ret;
|
|
DWORD size = 0;
|
|
LPBYTE buf;
|
|
SPC_LINK link = { 0 };
|
|
|
|
if (!pCryptEncodeObjectEx)
|
|
{
|
|
skip("CryptEncodeObjectEx() is not available. Skipping the encodeSPCLink tests\n");
|
|
return;
|
|
}
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(!ret && GetLastError() == E_INVALIDARG,
|
|
"Expected E_INVALIDARG, got %08x\n", GetLastError());
|
|
link.dwLinkChoice = SPC_URL_LINK_CHOICE;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptyURLSPCLink), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptyURLSPCLink, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
/* With an invalid char: */
|
|
U(link).pwszUrl = (LPWSTR)nihongoURL;
|
|
size = 1;
|
|
SetLastError(0xdeadbeef);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(!ret &&
|
|
(GetLastError() == CRYPT_E_INVALID_IA5_STRING ||
|
|
GetLastError() == OSS_BAD_PTR /* Win9x */),
|
|
"Expected CRYPT_E_INVALID_IA5_STRING, got %08x\n", GetLastError());
|
|
/* Unlike the crypt32 string encoding routines, size is not set to the
|
|
* index of the first invalid character.
|
|
*/
|
|
ok(size == 0, "Expected size 0, got %d\n", size);
|
|
U(link).pwszUrl = url;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(urlSPCLink), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, urlSPCLink, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
link.dwLinkChoice = SPC_FILE_LINK_CHOICE;
|
|
U(link).pwszFile = (LPWSTR)nihongoURL;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(fileSPCLink), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, fileSPCLink, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
link.dwLinkChoice = SPC_MONIKER_LINK_CHOICE;
|
|
memset(&U(link).Moniker, 0, sizeof(U(link).Moniker));
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptyMonikerSPCLink), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptyMonikerSPCLink, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
memset(&U(link).Moniker.ClassId, 0xea, sizeof(U(link).Moniker.ClassId));
|
|
U(link).Moniker.SerializedData.pbData = data;
|
|
U(link).Moniker.SerializedData.cbData = sizeof(data);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT, &link,
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(monikerSPCLink), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, monikerSPCLink, size), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static const BYTE badMonikerSPCLink[] = {
|
|
0xa1,0x19,0x04,0x11,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,0xea,
|
|
0xea,0xea,0xea,0xea,0xea,0xea,0x04,0x04,0xba,0xad,0xf0,0x0d };
|
|
|
|
static void test_decodeSPCLink(void)
|
|
{
|
|
BOOL ret;
|
|
LPBYTE buf = NULL;
|
|
DWORD size = 0;
|
|
SPC_LINK *link;
|
|
|
|
if (!pCryptDecodeObjectEx)
|
|
{
|
|
skip("CryptDecodeObjectEx() is not available. Skipping the decodeSPCLink tests\n");
|
|
return;
|
|
}
|
|
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT,
|
|
emptyURLSPCLink, sizeof(emptyURLSPCLink), CRYPT_DECODE_ALLOC_FLAG, NULL,
|
|
(BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
link = (SPC_LINK *)buf;
|
|
ok(link->dwLinkChoice == SPC_URL_LINK_CHOICE,
|
|
"Expected SPC_URL_LINK_CHOICE, got %d\n", link->dwLinkChoice);
|
|
ok(lstrlenW(U(*link).pwszUrl) == 0, "Expected empty string\n");
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT,
|
|
urlSPCLink, sizeof(urlSPCLink), CRYPT_DECODE_ALLOC_FLAG, NULL,
|
|
(BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
link = (SPC_LINK *)buf;
|
|
ok(link->dwLinkChoice == SPC_URL_LINK_CHOICE,
|
|
"Expected SPC_URL_LINK_CHOICE, got %d\n", link->dwLinkChoice);
|
|
ok(!lstrcmpW(U(*link).pwszUrl, url), "Unexpected URL\n");
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT,
|
|
fileSPCLink, sizeof(fileSPCLink), CRYPT_DECODE_ALLOC_FLAG, NULL,
|
|
(BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
link = (SPC_LINK *)buf;
|
|
ok(link->dwLinkChoice == SPC_FILE_LINK_CHOICE,
|
|
"Expected SPC_FILE_LINK_CHOICE, got %d\n", link->dwLinkChoice);
|
|
ok(!lstrcmpW(U(*link).pwszFile, nihongoURL), "Unexpected file\n");
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT,
|
|
emptyMonikerSPCLink, sizeof(emptyMonikerSPCLink), CRYPT_DECODE_ALLOC_FLAG,
|
|
NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
SPC_SERIALIZED_OBJECT emptyMoniker = { { 0 } };
|
|
|
|
link = (SPC_LINK *)buf;
|
|
ok(link->dwLinkChoice == SPC_MONIKER_LINK_CHOICE,
|
|
"Expected SPC_MONIKER_LINK_CHOICE, got %d\n", link->dwLinkChoice);
|
|
ok(!memcmp(&U(*link).Moniker.ClassId, &emptyMoniker.ClassId,
|
|
sizeof(emptyMoniker.ClassId)), "Unexpected value\n");
|
|
ok(U(*link).Moniker.SerializedData.cbData == 0,
|
|
"Expected no serialized data\n");
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT,
|
|
monikerSPCLink, sizeof(monikerSPCLink), CRYPT_DECODE_ALLOC_FLAG, NULL,
|
|
(BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
SPC_UUID id;
|
|
|
|
link = (SPC_LINK *)buf;
|
|
ok(link->dwLinkChoice == SPC_MONIKER_LINK_CHOICE,
|
|
"Expected SPC_MONIKER_LINK_CHOICE, got %d\n", link->dwLinkChoice);
|
|
memset(&id, 0xea, sizeof(id));
|
|
ok(!memcmp(&U(*link).Moniker.ClassId, &id, sizeof(id)),
|
|
"Unexpected value\n");
|
|
ok(U(*link).Moniker.SerializedData.cbData == sizeof(data),
|
|
"Unexpected data size %d\n", U(*link).Moniker.SerializedData.cbData);
|
|
ok(!memcmp(U(*link).Moniker.SerializedData.pbData, data, sizeof(data)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
SetLastError(0xdeadbeef);
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_LINK_STRUCT,
|
|
badMonikerSPCLink, sizeof(badMonikerSPCLink), CRYPT_DECODE_ALLOC_FLAG,
|
|
NULL, (BYTE *)&buf, &size);
|
|
ok(!ret &&
|
|
(GetLastError() == CRYPT_E_BAD_ENCODE ||
|
|
GetLastError() == OSS_DATA_ERROR /* Win9x */),
|
|
"Expected CRYPT_E_BAD_ENCODE, got %08x\n", GetLastError());
|
|
}
|
|
|
|
static const BYTE emptySequence[] = { 0x30,0x00 };
|
|
static BYTE flags[] = { 1 };
|
|
static const BYTE onlyFlagsPEImage[] = { 0x30,0x04,0x03,0x02,0x00,0x01 };
|
|
static const BYTE moreFlagsPEImage[] = {
|
|
0x30,0x06,0x03,0x04,0x04,0xff,0x80,0x10 };
|
|
static const BYTE onlyEmptyFilePEImage[] = {
|
|
0x30,0x06,0xa0,0x04,0xa2,0x02,0x80,0x00 };
|
|
static const BYTE flagsAndEmptyFilePEImage[] = {
|
|
0x30,0x0a,0x03,0x02,0x00,0x01,0xa0,0x04,0xa2,0x02,0x80,0x00 };
|
|
static const BYTE flagsAndFilePEImage[] = {
|
|
0x30,0x1c,0x03,0x02,0x00,0x01,0xa0,0x16,0xa2,0x14,0x80,0x12,0x00,0x68,0x00,
|
|
0x74,0x00,0x74,0x00,0x70,0x00,0x3a,0x00,0x2f,0x00,0x2f,0x22,0x6f,0x57,0x5b };
|
|
|
|
static void test_encodeSPCPEImage(void)
|
|
{
|
|
BOOL ret;
|
|
DWORD size = 0;
|
|
LPBYTE buf;
|
|
SPC_PE_IMAGE_DATA imageData = { { 0 } };
|
|
SPC_LINK link = { 0 };
|
|
|
|
if (!pCryptEncodeObjectEx)
|
|
{
|
|
skip("CryptEncodeObjectEx() is not available. Skipping the encodeSPCPEImage tests\n");
|
|
return;
|
|
}
|
|
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptySequence), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptySequence, sizeof(emptySequence)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
/* With an invalid link: */
|
|
imageData.pFile = &link;
|
|
SetLastError(0xdeadbeef);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(!ret && GetLastError () == E_INVALIDARG,
|
|
"Expected E_INVALIDARG, got %08x\n", GetLastError());
|
|
/* With just unused bits field set: */
|
|
imageData.pFile = NULL;
|
|
imageData.Flags.cUnusedBits = 1;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptySequence), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptySequence, sizeof(emptySequence)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
/* With flags set: */
|
|
imageData.Flags.cUnusedBits = 0;
|
|
imageData.Flags.pbData = flags;
|
|
imageData.Flags.cbData = sizeof(flags);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
if (!ret && GetLastError() == OSS_TOO_LONG)
|
|
{
|
|
skip("SPC_PE_IMAGE_DATA_STRUCT not supported\n");
|
|
return;
|
|
}
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(onlyFlagsPEImage), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, onlyFlagsPEImage, sizeof(onlyFlagsPEImage)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
/* With just an empty file: */
|
|
imageData.Flags.cbData = 0;
|
|
link.dwLinkChoice = SPC_FILE_LINK_CHOICE;
|
|
imageData.pFile = &link;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(onlyEmptyFilePEImage), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, onlyEmptyFilePEImage, sizeof(onlyEmptyFilePEImage)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
/* With flags and an empty file: */
|
|
imageData.Flags.pbData = flags;
|
|
imageData.Flags.cbData = sizeof(flags);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(flagsAndEmptyFilePEImage), "Unexpected size %d\n",
|
|
size);
|
|
ok(!memcmp(buf, flagsAndEmptyFilePEImage,
|
|
sizeof(flagsAndEmptyFilePEImage)), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
/* Finally, a non-empty file: */
|
|
U(link).pwszFile = (LPWSTR)nihongoURL;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
&imageData, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(flagsAndFilePEImage), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, flagsAndFilePEImage, sizeof(flagsAndFilePEImage)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static void test_decodeSPCPEImage(void)
|
|
{
|
|
static const WCHAR emptyString[] = { 0 };
|
|
BOOL ret;
|
|
LPBYTE buf = NULL;
|
|
DWORD size = 0;
|
|
SPC_PE_IMAGE_DATA *imageData;
|
|
|
|
if (!pCryptDecodeObjectEx)
|
|
{
|
|
skip("CryptDecodeObjectEx() is not available. Skipping the decodeSPCPEImage tests\n");
|
|
return;
|
|
}
|
|
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
emptySequence, sizeof(emptySequence),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
imageData = (SPC_PE_IMAGE_DATA *)buf;
|
|
ok(imageData->Flags.cbData == 0, "Expected empty flags, got %d\n",
|
|
imageData->Flags.cbData);
|
|
ok(imageData->pFile == NULL, "Expected no file\n");
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
onlyFlagsPEImage, sizeof(onlyFlagsPEImage),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
imageData = (SPC_PE_IMAGE_DATA *)buf;
|
|
ok(imageData->Flags.cbData == sizeof(flags),
|
|
"Unexpected flags size %d\n", imageData->Flags.cbData);
|
|
if (imageData->Flags.cbData)
|
|
ok(!memcmp(imageData->Flags.pbData, flags, sizeof(flags)),
|
|
"Unexpected flags\n");
|
|
ok(imageData->pFile == NULL, "Expected no file\n");
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
onlyEmptyFilePEImage, sizeof(onlyEmptyFilePEImage),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
imageData = (SPC_PE_IMAGE_DATA *)buf;
|
|
ok(imageData->Flags.cbData == 0, "Expected empty flags, got %d\n",
|
|
imageData->Flags.cbData);
|
|
ok(imageData->pFile != NULL, "Expected a file\n");
|
|
if (imageData->pFile)
|
|
{
|
|
ok(imageData->pFile->dwLinkChoice == SPC_FILE_LINK_CHOICE,
|
|
"Expected SPC_FILE_LINK_CHOICE, got %d\n",
|
|
imageData->pFile->dwLinkChoice);
|
|
ok(!lstrcmpW(U(*imageData->pFile).pwszFile, emptyString),
|
|
"Unexpected file\n");
|
|
}
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
flagsAndEmptyFilePEImage, sizeof(flagsAndEmptyFilePEImage),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
imageData = (SPC_PE_IMAGE_DATA *)buf;
|
|
ok(imageData->Flags.cbData == sizeof(flags),
|
|
"Unexpected flags size %d\n", imageData->Flags.cbData);
|
|
if (imageData->Flags.cbData)
|
|
ok(!memcmp(imageData->Flags.pbData, flags, sizeof(flags)),
|
|
"Unexpected flags\n");
|
|
ok(imageData->pFile != NULL, "Expected a file\n");
|
|
if (imageData->pFile)
|
|
{
|
|
ok(imageData->pFile->dwLinkChoice == SPC_FILE_LINK_CHOICE,
|
|
"Expected SPC_FILE_LINK_CHOICE, got %d\n",
|
|
imageData->pFile->dwLinkChoice);
|
|
ok(!lstrcmpW(U(*imageData->pFile).pwszFile, emptyString),
|
|
"Unexpected file\n");
|
|
}
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_PE_IMAGE_DATA_STRUCT,
|
|
flagsAndFilePEImage, sizeof(flagsAndFilePEImage),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
imageData = (SPC_PE_IMAGE_DATA *)buf;
|
|
ok(imageData->Flags.cbData == sizeof(flags),
|
|
"Unexpected flags size %d\n", imageData->Flags.cbData);
|
|
if (imageData->Flags.cbData)
|
|
ok(!memcmp(imageData->Flags.pbData, flags, sizeof(flags)),
|
|
"Unexpected flags\n");
|
|
ok(imageData->pFile != NULL, "Expected a file\n");
|
|
if (imageData->pFile)
|
|
{
|
|
ok(imageData->pFile->dwLinkChoice == SPC_FILE_LINK_CHOICE,
|
|
"Expected SPC_FILE_LINK_CHOICE, got %d\n",
|
|
imageData->pFile->dwLinkChoice);
|
|
ok(!lstrcmpW(U(*imageData->pFile).pwszFile, nihongoURL),
|
|
"Unexpected file\n");
|
|
}
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static WCHAR foo[] = { 'f','o','o',0 };
|
|
static WCHAR guidStr[] = { '{','8','b','c','9','6','b','0','0','-',
|
|
'8','d','a','1','-','1','1','c','f','-','8','7','3','6','-','0','0',
|
|
'a','a','0','0','a','4','8','5','e','b','}',0 };
|
|
|
|
static const BYTE emptyCatMemberInfo[] = { 0x30,0x05,0x1e,0x00,0x02,0x01,0x00 };
|
|
static const BYTE catMemberInfoWithSillyGuid[] = {
|
|
0x30,0x0b,0x1e,0x06,0x00,0x66,0x00,0x6f,0x00,0x6f,0x02,0x01,0x00 };
|
|
static const BYTE catMemberInfoWithGuid[] = {
|
|
0x30,0x51,0x1e,0x4c,0x00,0x7b,0x00,0x38,0x00,0x62,0x00,0x63,0x00,0x39,0x00,0x36,
|
|
0x00,0x62,0x00,0x30,0x00,0x30,0x00,0x2d,0x00,0x38,0x00,0x64,0x00,0x61,0x00,0x31,
|
|
0x00,0x2d,0x00,0x31,0x00,0x31,0x00,0x63,0x00,0x66,0x00,0x2d,0x00,0x38,0x00,0x37,
|
|
0x00,0x33,0x00,0x36,0x00,0x2d,0x00,0x30,0x00,0x30,0x00,0x61,0x00,0x61,0x00,0x30,
|
|
0x00,0x30,0x00,0x61,0x00,0x34,0x00,0x38,0x00,0x35,0x00,0x65,0x00,0x62,0x00,0x7d,
|
|
0x02,0x01,0x00 };
|
|
|
|
static void test_encodeCatMemberInfo(void)
|
|
{
|
|
CAT_MEMBERINFO info;
|
|
BOOL ret;
|
|
DWORD size = 0;
|
|
LPBYTE buf;
|
|
|
|
memset(&info, 0, sizeof(info));
|
|
|
|
if (!pCryptEncodeObjectEx)
|
|
{
|
|
skip("CryptEncodeObjectEx() is not available. Skipping the encodeCatMemberInfo tests\n");
|
|
return;
|
|
}
|
|
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_MEMBERINFO_STRUCT,
|
|
&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptyCatMemberInfo), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptyCatMemberInfo, sizeof(emptyCatMemberInfo)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
info.pwszSubjGuid = foo;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_MEMBERINFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(catMemberInfoWithSillyGuid), "Unexpected size %d\n",
|
|
size);
|
|
ok(!memcmp(buf, catMemberInfoWithSillyGuid,
|
|
sizeof(catMemberInfoWithSillyGuid)), "Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
info.pwszSubjGuid = guidStr;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_MEMBERINFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(catMemberInfoWithGuid), "Unexpected size %d\n",
|
|
size);
|
|
ok(!memcmp(buf, catMemberInfoWithGuid, sizeof(catMemberInfoWithGuid)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static void test_decodeCatMemberInfo(void)
|
|
{
|
|
BOOL ret;
|
|
LPBYTE buf;
|
|
DWORD size;
|
|
CAT_MEMBERINFO *info;
|
|
|
|
if (!pCryptDecodeObjectEx)
|
|
{
|
|
skip("CryptDecodeObjectEx() is not available. Skipping the decodeCatMemberInfo tests\n");
|
|
return;
|
|
}
|
|
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_MEMBERINFO_STRUCT,
|
|
emptyCatMemberInfo, sizeof(emptyCatMemberInfo),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
info = (CAT_MEMBERINFO *)buf;
|
|
ok(!info->pwszSubjGuid || !info->pwszSubjGuid[0],
|
|
"expected empty pwszSubjGuid\n");
|
|
ok(info->dwCertVersion == 0, "expected dwCertVersion == 0, got %d\n",
|
|
info->dwCertVersion);
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_MEMBERINFO_STRUCT,
|
|
catMemberInfoWithSillyGuid, sizeof(catMemberInfoWithSillyGuid),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
info = (CAT_MEMBERINFO *)buf;
|
|
ok(info->pwszSubjGuid && !lstrcmpW(info->pwszSubjGuid, foo),
|
|
"unexpected pwszSubjGuid\n");
|
|
ok(info->dwCertVersion == 0, "expected dwCertVersion == 0, got %d\n",
|
|
info->dwCertVersion);
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_MEMBERINFO_STRUCT,
|
|
catMemberInfoWithGuid, sizeof(catMemberInfoWithGuid),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
info = (CAT_MEMBERINFO *)buf;
|
|
ok(info->pwszSubjGuid && !lstrcmpW(info->pwszSubjGuid, guidStr),
|
|
"unexpected pwszSubjGuid\n");
|
|
ok(info->dwCertVersion == 0, "expected dwCertVersion == 0, got %d\n",
|
|
info->dwCertVersion);
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static const BYTE emptyCatNameValue[] = {
|
|
0x30,0x07,0x1e,0x00,0x02,0x01,0x00,0x04,0x00 };
|
|
static const BYTE catNameValueWithTag[] = {
|
|
0x30,0x0d,0x1e,0x06,0x00,0x66,0x00,0x6f,0x00,0x6f,0x02,0x01,0x00,0x04,0x00 };
|
|
static const BYTE catNameValueWithFlags[] = {
|
|
0x30,0x0a,0x1e,0x00,0x02,0x04,0xf0,0x0d,0xd0,0x0d,0x04,0x00 };
|
|
static const BYTE catNameValueWithValue[] = {
|
|
0x30,0x0b,0x1e,0x00,0x02,0x01,0x00,0x04,0x04,0x01,0x02,0x03,0x04 };
|
|
|
|
static BYTE aVal[] = { 1,2,3,4 };
|
|
|
|
static void test_encodeCatNameValue(void)
|
|
{
|
|
static WCHAR foo[] = { 'f','o','o',0 };
|
|
BOOL ret;
|
|
LPBYTE buf;
|
|
DWORD size;
|
|
CAT_NAMEVALUE value;
|
|
|
|
memset(&value, 0, sizeof(value));
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
(LPBYTE)&value, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptyCatNameValue), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptyCatNameValue, sizeof(emptyCatNameValue)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
value.pwszTag = foo;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
(LPBYTE)&value, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(catNameValueWithTag), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, catNameValueWithTag, sizeof(catNameValueWithTag)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
value.pwszTag = NULL;
|
|
value.fdwFlags = 0xf00dd00d;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
(LPBYTE)&value, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(catNameValueWithFlags), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, catNameValueWithFlags, sizeof(catNameValueWithFlags)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
value.fdwFlags = 0;
|
|
value.Value.cbData = sizeof(aVal);
|
|
value.Value.pbData = aVal;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
(LPBYTE)&value, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(catNameValueWithValue), "Unexpected size %d\n", size);
|
|
ok(!memcmp(buf, catNameValueWithValue, sizeof(catNameValueWithValue)),
|
|
"Unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static void test_decodeCatNameValue(void)
|
|
{
|
|
BOOL ret;
|
|
LPBYTE buf;
|
|
DWORD size;
|
|
CAT_NAMEVALUE *value;
|
|
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
emptyCatNameValue, sizeof(emptyCatNameValue),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
value = (CAT_NAMEVALUE *)buf;
|
|
ok(!value->pwszTag || !value->pwszTag[0], "expected empty pwszTag\n");
|
|
ok(value->fdwFlags == 0, "expected fdwFlags == 0, got %08x\n",
|
|
value->fdwFlags);
|
|
ok(value->Value.cbData == 0, "expected 0-length value, got %d\n",
|
|
value->Value.cbData);
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
catNameValueWithTag, sizeof(catNameValueWithTag),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
value = (CAT_NAMEVALUE *)buf;
|
|
ok(value->pwszTag && !lstrcmpW(value->pwszTag, foo),
|
|
"unexpected pwszTag\n");
|
|
ok(value->fdwFlags == 0, "expected fdwFlags == 0, got %08x\n",
|
|
value->fdwFlags);
|
|
ok(value->Value.cbData == 0, "expected 0-length value, got %d\n",
|
|
value->Value.cbData);
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
catNameValueWithFlags, sizeof(catNameValueWithFlags),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
value = (CAT_NAMEVALUE *)buf;
|
|
ok(!value->pwszTag || !value->pwszTag[0], "expected empty pwszTag\n");
|
|
ok(value->fdwFlags == 0xf00dd00d,
|
|
"expected fdwFlags == 0xf00dd00d, got %08x\n", value->fdwFlags);
|
|
ok(value->Value.cbData == 0, "expected 0-length value, got %d\n",
|
|
value->Value.cbData);
|
|
LocalFree(buf);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, CAT_NAMEVALUE_STRUCT,
|
|
catNameValueWithValue, sizeof(catNameValueWithValue),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
value = (CAT_NAMEVALUE *)buf;
|
|
ok(!value->pwszTag || !value->pwszTag[0], "expected empty pwszTag\n");
|
|
ok(value->fdwFlags == 0, "expected fdwFlags == 0, got %08x\n",
|
|
value->fdwFlags);
|
|
ok(value->Value.cbData == sizeof(aVal), "unexpected size %d\n",
|
|
value->Value.cbData);
|
|
ok(!memcmp(value->Value.pbData, aVal, value->Value.cbData),
|
|
"unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static const WCHAR progName[] = { 'A',' ','p','r','o','g','r','a','m',0 };
|
|
static const BYTE spOpusInfoWithProgramName[] = {
|
|
0x30,0x16,0xa0,0x14,0x80,0x12,0x00,0x41,0x00,0x20,0x00,0x70,0x00,0x72,0x00,0x6f,
|
|
0x00,0x67,0x00,0x72,0x00,0x61,0x00,0x6d };
|
|
static WCHAR winehq[] = { 'h','t','t','p',':','/','/','w','i','n','e','h','q',
|
|
'.','o','r','g','/',0 };
|
|
static const BYTE spOpusInfoWithMoreInfo[] = {
|
|
0x30,0x16,0xa1,0x14,0x80,0x12,0x68,0x74,0x74,0x70,0x3a,0x2f,0x2f,0x77,0x69,0x6e,
|
|
0x65,0x68,0x71,0x2e,0x6f,0x72,0x67,0x2f };
|
|
static const BYTE spOpusInfoWithPublisherInfo[] = {
|
|
0x30,0x16,0xa2,0x14,0x80,0x12,0x68,0x74,0x74,0x70,0x3a,0x2f,0x2f,0x77,0x69,0x6e,
|
|
0x65,0x68,0x71,0x2e,0x6f,0x72,0x67,0x2f };
|
|
|
|
static void test_encodeSpOpusInfo(void)
|
|
{
|
|
BOOL ret;
|
|
LPBYTE buf;
|
|
DWORD size;
|
|
SPC_SP_OPUS_INFO info;
|
|
SPC_LINK moreInfo;
|
|
|
|
memset(&info, 0, sizeof(info));
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(emptySequence), "unexpected size %d\n", size);
|
|
ok(!memcmp(buf, emptySequence, size), "unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
info.pwszProgramName = progName;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(spOpusInfoWithProgramName), "unexpected size %d\n",
|
|
size);
|
|
ok(!memcmp(buf, spOpusInfoWithProgramName, size),
|
|
"unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
info.pwszProgramName = NULL;
|
|
memset(&moreInfo, 0, sizeof(moreInfo));
|
|
info.pMoreInfo = &moreInfo;
|
|
SetLastError(0xdeadbeef);
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(!ret && GetLastError() == E_INVALIDARG,
|
|
"expected E_INVALIDARG, got %08x\n", GetLastError());
|
|
moreInfo.dwLinkChoice = SPC_URL_LINK_CHOICE;
|
|
moreInfo.pwszUrl = winehq;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(spOpusInfoWithMoreInfo),
|
|
"unexpected size %d\n", size);
|
|
ok(!memcmp(buf, spOpusInfoWithMoreInfo, size),
|
|
"unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
info.pMoreInfo = NULL;
|
|
info.pPublisherInfo = &moreInfo;
|
|
ret = pCryptEncodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
(LPBYTE)&info, CRYPT_ENCODE_ALLOC_FLAG, NULL, &buf, &size);
|
|
ok(ret, "CryptEncodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(size == sizeof(spOpusInfoWithPublisherInfo),
|
|
"unexpected size %d\n", size);
|
|
ok(!memcmp(buf, spOpusInfoWithPublisherInfo, size),
|
|
"unexpected value\n");
|
|
LocalFree(buf);
|
|
}
|
|
}
|
|
|
|
static void test_decodeSpOpusInfo(void)
|
|
{
|
|
BOOL ret;
|
|
DWORD size;
|
|
SPC_SP_OPUS_INFO *info;
|
|
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
emptySequence, sizeof(emptySequence), CRYPT_DECODE_ALLOC_FLAG, NULL,
|
|
&info, &size);
|
|
todo_wine
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(!info->pwszProgramName, "expected NULL\n");
|
|
ok(!info->pMoreInfo, "expected NULL\n");
|
|
ok(!info->pPublisherInfo, "expected NULL\n");
|
|
LocalFree(info);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
spOpusInfoWithProgramName, sizeof(spOpusInfoWithProgramName),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, &info, &size);
|
|
todo_wine
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(info->pwszProgramName && !lstrcmpW(info->pwszProgramName,
|
|
progName), "unexpected program name\n");
|
|
ok(!info->pMoreInfo, "expected NULL\n");
|
|
ok(!info->pPublisherInfo, "expected NULL\n");
|
|
LocalFree(info);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
spOpusInfoWithMoreInfo, sizeof(spOpusInfoWithMoreInfo),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, &info, &size);
|
|
todo_wine
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(!info->pwszProgramName, "expected NULL\n");
|
|
ok(info->pMoreInfo != NULL, "expected a value for pMoreInfo\n");
|
|
if (info->pMoreInfo)
|
|
{
|
|
ok(info->pMoreInfo->dwLinkChoice == SPC_URL_LINK_CHOICE,
|
|
"unexpected link choice %d\n", info->pMoreInfo->dwLinkChoice);
|
|
ok(!lstrcmpW(info->pMoreInfo->pwszUrl, winehq),
|
|
"unexpected link value\n");
|
|
}
|
|
ok(!info->pPublisherInfo, "expected NULL\n");
|
|
LocalFree(info);
|
|
}
|
|
ret = pCryptDecodeObjectEx(X509_ASN_ENCODING, SPC_SP_OPUS_INFO_STRUCT,
|
|
spOpusInfoWithPublisherInfo, sizeof(spOpusInfoWithPublisherInfo),
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, &info, &size);
|
|
todo_wine
|
|
ok(ret, "CryptDecodeObjectEx failed: %08x\n", GetLastError());
|
|
if (ret)
|
|
{
|
|
ok(!info->pwszProgramName, "expected NULL\n");
|
|
ok(!info->pMoreInfo, "expected NULL\n");
|
|
ok(info->pPublisherInfo != NULL,
|
|
"expected a value for pPublisherInfo\n");
|
|
if (info->pPublisherInfo)
|
|
{
|
|
ok(info->pPublisherInfo->dwLinkChoice == SPC_URL_LINK_CHOICE,
|
|
"unexpected link choice %d\n",
|
|
info->pPublisherInfo->dwLinkChoice);
|
|
ok(!lstrcmpW(info->pPublisherInfo->pwszUrl, winehq),
|
|
"unexpected link value\n");
|
|
}
|
|
LocalFree(info);
|
|
}
|
|
}
|
|
|
|
START_TEST(asn)
|
|
{
|
|
HMODULE hCrypt32 = LoadLibraryA("crypt32.dll");
|
|
pCryptDecodeObjectEx = (void*)GetProcAddress(hCrypt32, "CryptDecodeObjectEx");
|
|
pCryptEncodeObjectEx = (void*)GetProcAddress(hCrypt32, "CryptEncodeObjectEx");
|
|
|
|
test_encodeSPCFinancialCriteria();
|
|
test_decodeSPCFinancialCriteria();
|
|
test_encodeSPCLink();
|
|
test_decodeSPCLink();
|
|
test_encodeSPCPEImage();
|
|
test_decodeSPCPEImage();
|
|
test_encodeCatMemberInfo();
|
|
test_decodeCatMemberInfo();
|
|
test_encodeCatNameValue();
|
|
test_decodeCatNameValue();
|
|
test_encodeSpOpusInfo();
|
|
test_decodeSpOpusInfo();
|
|
|
|
FreeLibrary(hCrypt32);
|
|
}
|