1 /* 2 * Miscellaneous crypt32 tests 3 * 4 * Copyright 2005 Juan Lang 5 * 6 * This library is free software; you can redistribute it and/or 7 * modify it under the terms of the GNU Lesser General Public 8 * License as published by the Free Software Foundation; either 9 * version 2.1 of the License, or (at your option) any later version. 10 * 11 * This library is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 14 * Lesser General Public License for more details. 15 * 16 * You should have received a copy of the GNU Lesser General Public 17 * License along with this library; if not, write to the Free Software 18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA 19 */ 20 21 #include <stdio.h> 22 #include <stdarg.h> 23 #include <windef.h> 24 #include <winbase.h> 25 #include <winerror.h> 26 #include <wincrypt.h> 27 #include <winreg.h> 28 29 #include "wine/test.h" 30 31 static HMODULE hCrypt; 32 33 static void test_findAttribute(void) 34 { 35 PCRYPT_ATTRIBUTE ret; 36 BYTE blobbin[] = {0x02,0x01,0x01}; 37 static CHAR oid[] = "1.2.3"; 38 CRYPT_ATTR_BLOB blobs[] = { { sizeof blobbin, blobbin }, }; 39 CRYPT_ATTRIBUTE attr = { oid, ARRAY_SIZE(blobs), blobs }; 40 41 /* returns NULL, last error not set */ 42 SetLastError(0xdeadbeef); 43 ret = CertFindAttribute(NULL, 0, NULL); 44 ok(ret == NULL, "Expected failure\n"); 45 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 46 GetLastError()); 47 if (0) 48 { 49 /* crashes */ 50 CertFindAttribute(NULL, 1, NULL); 51 /* returns NULL, last error is ERROR_INVALID_PARAMETER 52 * crashes on Vista 53 */ 54 SetLastError(0xdeadbeef); 55 ret = CertFindAttribute(NULL, 1, &attr); 56 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, 57 "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(), 58 GetLastError()); 59 } 60 /* returns NULL, last error not set */ 61 SetLastError(0xdeadbeef); 62 ret = CertFindAttribute("bogus", 1, &attr); 63 ok(ret == NULL, "Expected failure\n"); 64 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 65 GetLastError()); 66 /* returns NULL, last error not set */ 67 SetLastError(0xdeadbeef); 68 ret = CertFindAttribute("1.2.4", 1, &attr); 69 ok(ret == NULL, "Expected failure\n"); 70 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 71 GetLastError()); 72 /* succeeds, last error not set */ 73 SetLastError(0xdeadbeef); 74 ret = CertFindAttribute("1.2.3", 1, &attr); 75 ok(ret != NULL, "CertFindAttribute failed: %08x\n", GetLastError()); 76 } 77 78 static void test_findExtension(void) 79 { 80 PCERT_EXTENSION ret; 81 static CHAR oid[] = "1.2.3"; 82 BYTE blobbin[] = {0x02,0x01,0x01}; 83 CERT_EXTENSION ext = { oid, TRUE, { sizeof blobbin, blobbin } }; 84 85 /* returns NULL, last error not set */ 86 SetLastError(0xdeadbeef); 87 ret = CertFindExtension(NULL, 0, NULL); 88 ok(ret == NULL, "Expected failure\n"); 89 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 90 GetLastError()); 91 if (0) 92 { 93 /* crashes */ 94 SetLastError(0xdeadbeef); 95 CertFindExtension(NULL, 1, NULL); 96 /* returns NULL, last error is ERROR_INVALID_PARAMETER 97 * crashes on Vista 98 */ 99 SetLastError(0xdeadbeef); 100 ret = CertFindExtension(NULL, 1, &ext); 101 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, 102 "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(), 103 GetLastError()); 104 } 105 /* returns NULL, last error not set */ 106 SetLastError(0xdeadbeef); 107 ret = CertFindExtension("bogus", 1, &ext); 108 ok(ret == NULL, "Expected failure\n"); 109 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 110 GetLastError()); 111 /* returns NULL, last error not set */ 112 SetLastError(0xdeadbeef); 113 ret = CertFindExtension("1.2.4", 1, &ext); 114 ok(ret == NULL, "Expected failure\n"); 115 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 116 GetLastError()); 117 /* succeeds, last error not set */ 118 SetLastError(0xdeadbeef); 119 ret = CertFindExtension("1.2.3", 1, &ext); 120 ok(ret != NULL, "CertFindExtension failed: %08x\n", GetLastError()); 121 } 122 123 static void test_findRDNAttr(void) 124 { 125 PCERT_RDN_ATTR ret; 126 static CHAR oid[] = "1.2.3"; 127 BYTE bin[] = { 0x16,0x09,'J','u','a','n',' ','L','a','n','g' }; 128 CERT_RDN_ATTR attrs[] = { 129 { oid, CERT_RDN_IA5_STRING, { sizeof bin, bin } }, 130 }; 131 CERT_RDN rdns[] = { { ARRAY_SIZE(attrs), attrs } }; 132 CERT_NAME_INFO nameInfo = { ARRAY_SIZE(rdns), rdns }; 133 134 if (0) 135 { 136 /* crashes */ 137 SetLastError(0xdeadbeef); 138 CertFindRDNAttr(NULL, NULL); 139 /* returns NULL, last error is ERROR_INVALID_PARAMETER 140 * crashes on Vista 141 */ 142 SetLastError(0xdeadbeef); 143 ret = CertFindRDNAttr(NULL, &nameInfo); 144 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, 145 "Expected ERROR_INVALID_PARAMETER, got %d (%08x)\n", GetLastError(), 146 GetLastError()); 147 } 148 /* returns NULL, last error not set */ 149 SetLastError(0xdeadbeef); 150 ret = CertFindRDNAttr("bogus", &nameInfo); 151 ok(ret == NULL, "Expected failure\n"); 152 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 153 GetLastError()); 154 /* returns NULL, last error not set */ 155 SetLastError(0xdeadbeef); 156 ret = CertFindRDNAttr("1.2.4", &nameInfo); 157 ok(ret == NULL, "Expected failure\n"); 158 ok(GetLastError() == 0xdeadbeef, "Last error was set to %08x\n", 159 GetLastError()); 160 /* succeeds, last error not set */ 161 SetLastError(0xdeadbeef); 162 ret = CertFindRDNAttr("1.2.3", &nameInfo); 163 ok(ret != NULL, "CertFindRDNAttr failed: %08x\n", GetLastError()); 164 } 165 166 static void test_verifyTimeValidity(void) 167 { 168 SYSTEMTIME sysTime; 169 FILETIME fileTime; 170 CERT_INFO info = { 0 }; 171 LONG ret; 172 173 GetSystemTime(&sysTime); 174 SystemTimeToFileTime(&sysTime, &fileTime); 175 /* crashes 176 ret = CertVerifyTimeValidity(NULL, NULL); 177 ret = CertVerifyTimeValidity(&fileTime, NULL); 178 */ 179 /* Check with 0 NotBefore and NotAfter */ 180 ret = CertVerifyTimeValidity(&fileTime, &info); 181 ok(ret == 1, "Expected 1, got %d\n", ret); 182 info.NotAfter = fileTime; 183 /* Check with NotAfter equal to comparison time */ 184 ret = CertVerifyTimeValidity(&fileTime, &info); 185 ok(ret == 0, "Expected 0, got %d\n", ret); 186 /* Check with NotBefore after comparison time */ 187 info.NotBefore = fileTime; 188 info.NotBefore.dwLowDateTime += 5000; 189 ret = CertVerifyTimeValidity(&fileTime, &info); 190 ok(ret == -1, "Expected -1, got %d\n", ret); 191 } 192 193 static void test_cryptAllocate(void) 194 { 195 LPVOID buf; 196 197 buf = CryptMemAlloc(0); 198 ok(buf != NULL, "CryptMemAlloc failed: %08x\n", GetLastError()); 199 CryptMemFree(buf); 200 /* CryptMemRealloc(NULL, 0) fails pre-Vista */ 201 buf = CryptMemAlloc(0); 202 buf = CryptMemRealloc(buf, 1); 203 ok(buf != NULL, "CryptMemRealloc failed: %08x\n", GetLastError()); 204 CryptMemFree(buf); 205 } 206 207 208 static void test_cryptTls(void) 209 { 210 DWORD (WINAPI *pI_CryptAllocTls)(void); 211 LPVOID (WINAPI *pI_CryptDetachTls)(DWORD dwTlsIndex); 212 LPVOID (WINAPI *pI_CryptGetTls)(DWORD dwTlsIndex); 213 BOOL (WINAPI *pI_CryptSetTls)(DWORD dwTlsIndex, LPVOID lpTlsValue); 214 BOOL (WINAPI *pI_CryptFreeTls)(DWORD dwTlsIndex, DWORD unknown); 215 DWORD index; 216 BOOL ret; 217 218 pI_CryptAllocTls = (void *)GetProcAddress(hCrypt, "I_CryptAllocTls"); 219 pI_CryptDetachTls = (void *)GetProcAddress(hCrypt, "I_CryptDetachTls"); 220 pI_CryptGetTls = (void *)GetProcAddress(hCrypt, "I_CryptGetTls"); 221 pI_CryptSetTls = (void *)GetProcAddress(hCrypt, "I_CryptSetTls"); 222 pI_CryptFreeTls = (void *)GetProcAddress(hCrypt, "I_CryptFreeTls"); 223 224 /* One normal pass */ 225 index = pI_CryptAllocTls(); 226 ok(index, "I_CryptAllocTls failed: %08x\n", GetLastError()); 227 if (index) 228 { 229 LPVOID ptr; 230 231 ptr = pI_CryptGetTls(index); 232 ok(!ptr, "Expected NULL\n"); 233 ret = pI_CryptSetTls(index, (LPVOID)0xdeadbeef); 234 ok(ret, "I_CryptSetTls failed: %08x\n", GetLastError()); 235 ptr = pI_CryptGetTls(index); 236 ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr); 237 /* This crashes 238 ret = pI_CryptFreeTls(index, 1); 239 */ 240 ret = pI_CryptFreeTls(index, 0); 241 ok(ret, "I_CryptFreeTls failed: %08x\n", GetLastError()); 242 ret = pI_CryptFreeTls(index, 0); 243 ok(!ret, "I_CryptFreeTls succeeded\n"); 244 ok(GetLastError() == E_INVALIDARG, 245 "Expected E_INVALIDARG, got %08x\n", GetLastError()); 246 } 247 /* Similar pass, check I_CryptDetachTls */ 248 index = pI_CryptAllocTls(); 249 ok(index, "I_CryptAllocTls failed: %08x\n", GetLastError()); 250 if (index) 251 { 252 LPVOID ptr; 253 254 ptr = pI_CryptGetTls(index); 255 ok(!ptr, "Expected NULL\n"); 256 ret = pI_CryptSetTls(index, (LPVOID)0xdeadbeef); 257 ok(ret, "I_CryptSetTls failed: %08x\n", GetLastError()); 258 ptr = pI_CryptGetTls(index); 259 ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr); 260 ptr = pI_CryptDetachTls(index); 261 ok(ptr == (LPVOID)0xdeadbeef, "Expected 0xdeadbeef, got %p\n", ptr); 262 ptr = pI_CryptGetTls(index); 263 ok(!ptr, "Expected NULL\n"); 264 } 265 } 266 267 static void test_readTrustedPublisherDWORD(void) 268 { 269 270 BOOL (WINAPI *pReadDWORD)(LPCWSTR, DWORD *); 271 272 pReadDWORD = (void *)GetProcAddress(hCrypt, "I_CryptReadTrustedPublisherDWORDValueFromRegistry"); 273 if (pReadDWORD) 274 { 275 static const WCHAR safer[] = { 276 'S','o','f','t','w','a','r','e','\\', 277 'P','o','l','i','c','i','e','s','\\', 278 'M','i','c','r','o','s','o','f','t','\\','S','y','s','t','e','m', 279 'C','e','r','t','i','f','i','c','a','t','e','s','\\', 280 'T','r','u','s','t','e','d','P','u','b','l','i','s','h','e','r', 281 '\\','S','a','f','e','r',0 }; 282 static const WCHAR authenticodeFlags[] = { 'A','u','t','h','e','n', 283 't','i','c','o','d','e','F','l','a','g','s',0 }; 284 BOOL ret, exists = FALSE; 285 DWORD size, readFlags = 0, returnedFlags; 286 HKEY key; 287 LONG rc; 288 289 rc = RegOpenKeyW(HKEY_LOCAL_MACHINE, safer, &key); 290 if (rc == ERROR_SUCCESS) 291 { 292 size = sizeof(readFlags); 293 rc = RegQueryValueExW(key, authenticodeFlags, NULL, NULL, 294 (LPBYTE)&readFlags, &size); 295 if (rc == ERROR_SUCCESS) 296 exists = TRUE; 297 } 298 returnedFlags = 0xdeadbeef; 299 ret = pReadDWORD(authenticodeFlags, &returnedFlags); 300 ok(ret == exists, "Unexpected return value\n"); 301 ok(readFlags == returnedFlags, 302 "Expected flags %08x, got %08x\n", readFlags, returnedFlags); 303 } 304 } 305 306 static void test_getDefaultCryptProv(void) 307 { 308 #define ALG(id) id, #id 309 static const struct 310 { 311 ALG_ID algid; 312 const char *name; 313 BOOL optional; 314 } test_prov[] = 315 { 316 { ALG(CALG_MD2), TRUE }, 317 { ALG(CALG_MD4), TRUE }, 318 { ALG(CALG_MD5), TRUE }, 319 { ALG(CALG_SHA), TRUE }, 320 { ALG(CALG_RSA_SIGN) }, 321 { ALG(CALG_DSS_SIGN) }, 322 { ALG(CALG_NO_SIGN) }, 323 { ALG(CALG_ECDSA), TRUE }, 324 { ALG(CALG_ECDH), TRUE }, 325 { ALG(CALG_RSA_KEYX) }, 326 { ALG(CALG_RSA_KEYX) }, 327 }; 328 #undef ALG 329 HCRYPTPROV (WINAPI *pI_CryptGetDefaultCryptProv)(DWORD w); 330 HCRYPTPROV prov; 331 BOOL ret; 332 DWORD size, i; 333 LPSTR name; 334 335 pI_CryptGetDefaultCryptProv = (void *)GetProcAddress(hCrypt, "I_CryptGetDefaultCryptProv"); 336 if (!pI_CryptGetDefaultCryptProv) return; 337 338 prov = pI_CryptGetDefaultCryptProv(0xdeadbeef); 339 ok(prov == 0 && GetLastError() == E_INVALIDARG, 340 "Expected E_INVALIDARG, got %08x\n", GetLastError()); 341 prov = pI_CryptGetDefaultCryptProv(PROV_RSA_FULL); 342 ok(prov == 0 && GetLastError() == E_INVALIDARG, 343 "Expected E_INVALIDARG, got %08x\n", GetLastError()); 344 prov = pI_CryptGetDefaultCryptProv(1); 345 ok(prov == 0 && GetLastError() == E_INVALIDARG, 346 "Expected E_INVALIDARG, got %08x\n", GetLastError()); 347 prov = pI_CryptGetDefaultCryptProv(0); 348 ok(prov != 0, "I_CryptGetDefaultCryptProv failed: %08x\n", GetLastError()); 349 CryptReleaseContext(prov, 0); 350 351 for (i = 0; i < ARRAY_SIZE(test_prov); i++) 352 { 353 if (winetest_debug > 1) 354 trace("%u: algid %#x (%s): class %u, type %u, sid %u\n", i, test_prov[i].algid, test_prov[i].name, 355 GET_ALG_CLASS(test_prov[i].algid) >> 13, GET_ALG_TYPE(test_prov[i].algid) >> 9, GET_ALG_SID(test_prov[i].algid)); 356 357 prov = pI_CryptGetDefaultCryptProv(test_prov[i].algid); 358 if (!prov) 359 { 360 todo_wine_if(test_prov[i].algid == CALG_DSS_SIGN || test_prov[i].algid == CALG_NO_SIGN) 361 ok(test_prov[i].optional, "%u: I_CryptGetDefaultCryptProv(%#x) failed\n", i, test_prov[i].algid); 362 continue; 363 } 364 365 ret = CryptGetProvParam(prov, PP_NAME, NULL, &size, 0); 366 if (ret) /* some provders don't support PP_NAME */ 367 { 368 name = CryptMemAlloc(size); 369 ret = CryptGetProvParam(prov, PP_NAME, (BYTE *)name, &size, 0); 370 ok(ret, "%u: CryptGetProvParam failed %#x\n", i, GetLastError()); 371 if (winetest_debug > 1) 372 trace("%u: algid %#x, name %s\n", i, test_prov[i].algid, name); 373 CryptMemFree(name); 374 } 375 376 CryptReleaseContext(prov, 0); 377 } 378 } 379 380 static void test_CryptInstallOssGlobal(void) 381 { 382 int (WINAPI *pI_CryptInstallOssGlobal)(DWORD,DWORD,DWORD); 383 int ret,i; 384 385 pI_CryptInstallOssGlobal = (void *)GetProcAddress(hCrypt,"I_CryptInstallOssGlobal"); 386 /* passing in some random values to I_CryptInstallOssGlobal, it always returns 9 the first time, then 10, 11 etc.*/ 387 for(i=0;i<30;i++) 388 { 389 ret = pI_CryptInstallOssGlobal(rand(),rand(),rand()); 390 ok((9+i) == ret || 391 ret == 0, /* Vista */ 392 "Expected %d or 0, got %d\n",(9+i),ret); 393 } 394 } 395 396 static const BYTE encodedInt[] = { 0x02,0x01,0x01 }; 397 static const WCHAR encodedIntStr[] = { '0','2',' ','0','1',' ','0','1',0 }; 398 static const BYTE encodedBigInt[] = { 0x02,0x1f,0x01,0x02,0x03,0x04,0x05,0x06, 399 0x07,0x08,0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,0x10,0x11,0x12,0x13,0x14,0x15, 400 0x16,0x17,0x18,0x19,0x1a,0x1b,0x1c,0x1d,0x1e,0x1f }; 401 static const WCHAR encodedBigIntStr[] = { '0','2',' ','1','f',' ','0','1',' ', 402 '0','2',' ','0','3',' ','0','4',' ','0','5',' ','0','6',' ','0','7',' ','0', 403 '8',' ','0','9',' ','0','a',' ','0','b',' ','0','c',' ','0','d',' ','0','e', 404 ' ','0','f',' ','1','0',' ','1','1',' ','1','2',' ','1','3',' ','1','4',' ', 405 '1','5',' ','1','6',' ','1','7',' ','1','8',' ','1','9',' ','1','a',' ','1', 406 'b',' ','1','c',' ','1','d',' ','1','e',' ','1','f',0 }; 407 408 static void test_format_object(void) 409 { 410 BOOL (WINAPI *pCryptFormatObject)(DWORD dwEncoding, DWORD dwFormatType, 411 DWORD dwFormatStrType, void *pFormatStruct, LPCSTR lpszStructType, 412 const BYTE *pbEncoded, DWORD dwEncoded, void *pbFormat, 413 DWORD *pcbFormat); 414 BOOL ret; 415 DWORD size; 416 LPWSTR str; 417 418 pCryptFormatObject = (void *)GetProcAddress(hCrypt, "CryptFormatObject"); 419 if (!pCryptFormatObject) 420 { 421 skip("No CryptFormatObject\n"); 422 return; 423 } 424 /* Crash */ 425 if (0) 426 { 427 pCryptFormatObject(0, 0, 0, NULL, NULL, NULL, 0, NULL, NULL); 428 } 429 /* When called with any but the default encoding, it fails to find a 430 * formatting function. 431 */ 432 SetLastError(0xdeadbeef); 433 ret = pCryptFormatObject(0, 0, 0, NULL, NULL, NULL, 0, NULL, &size); 434 ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND, 435 "expected ERROR_FILE_NOT_FOUND, got %d\n", GetLastError()); 436 /* When called with the default encoding type for any undefined struct type 437 * (including none), it succeeds: the default encoding is a hex string 438 * encoding. 439 */ 440 SetLastError(0xdeadbeef); 441 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0, 442 NULL, &size); 443 ok(ret, "CryptFormatObject failed: %d\n", GetLastError()); 444 if (ret) 445 { 446 if (size == 0 && GetLastError() == ERROR_FILE_NOT_FOUND) 447 { 448 win_skip("CryptFormatObject has no default implementation\n"); 449 return; 450 } 451 ok(size == sizeof(WCHAR), "unexpected size %d\n", size); 452 str = HeapAlloc(GetProcessHeap(), 0, size); 453 SetLastError(0xdeadbeef); 454 size = 0; 455 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0, 456 str, &size); 457 ok(!ret && GetLastError() == ERROR_MORE_DATA, 458 "expected ERROR_MORE_DATA, got %d\n", GetLastError()); 459 size = sizeof(WCHAR); 460 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, NULL, 0, 461 str, &size); 462 ok(ret, "CryptFormatObject failed: %d\n", GetLastError()); 463 ok(!str[0], "expected empty string\n"); 464 HeapFree(GetProcessHeap(), 0, str); 465 } 466 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, encodedInt, 467 sizeof(encodedInt), NULL, &size); 468 ok(ret, "CryptFormatObject failed: %d\n", GetLastError()); 469 if (ret) 470 { 471 str = HeapAlloc(GetProcessHeap(), 0, size); 472 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, 473 encodedInt, sizeof(encodedInt), str, &size); 474 ok(ret, "CryptFormatObject failed: %d\n", GetLastError()); 475 ok(!lstrcmpW(str, encodedIntStr), "unexpected format string\n"); 476 HeapFree(GetProcessHeap(), 0, str); 477 } 478 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, 479 encodedBigInt, sizeof(encodedBigInt), NULL, &size); 480 ok(ret, "CryptFormatObject failed: %d\n", GetLastError()); 481 if (ret) 482 { 483 str = HeapAlloc(GetProcessHeap(), 0, size); 484 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, NULL, 485 encodedBigInt, sizeof(encodedBigInt), str, &size); 486 ok(ret, "CryptFormatObject failed: %d\n", GetLastError()); 487 ok(!lstrcmpiW(str, encodedBigIntStr), "unexpected format string\n"); 488 HeapFree(GetProcessHeap(), 0, str); 489 } 490 /* When called with the default encoding type for any undefined struct 491 * type but CRYPT_FORMAT_STR_NO_HEX specified, it fails to find a 492 * formatting function. 493 */ 494 SetLastError(0xdeadbeef); 495 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, CRYPT_FORMAT_STR_NO_HEX, 496 NULL, NULL, NULL, 0, NULL, &size); 497 ok(!ret, "CryptFormatObject succeeded\n"); 498 ok(GetLastError() == ERROR_FILE_NOT_FOUND || 499 GetLastError() == 0xdeadbeef, /* Vista, W2K8 */ 500 "expected ERROR_FILE_NOT_FOUND or no change, got %d\n", GetLastError()); 501 /* When called to format an AUTHORITY_KEY_ID2_INFO, it fails when no 502 * data are given. 503 */ 504 SetLastError(0xdeadbeef); 505 ret = pCryptFormatObject(X509_ASN_ENCODING, 0, 0, NULL, 506 szOID_AUTHORITY_KEY_IDENTIFIER2, NULL, 0, NULL, &size); 507 ok(!ret && GetLastError() == E_INVALIDARG, 508 "expected E_INVALIDARG, got %d\n", GetLastError()); 509 } 510 511 START_TEST(main) 512 { 513 hCrypt = GetModuleHandleA("crypt32.dll"); 514 515 test_findAttribute(); 516 test_findExtension(); 517 test_findRDNAttr(); 518 test_verifyTimeValidity(); 519 test_cryptAllocate(); 520 test_cryptTls(); 521 test_readTrustedPublisherDWORD(); 522 test_getDefaultCryptProv(); 523 test_CryptInstallOssGlobal(); 524 test_format_object(); 525 } 526