| /* |
| * Subject Interface Package tests |
| * |
| * Copyright 2006 Paul Vriens |
| * Copyright 2008 Juan Lang |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA |
| */ |
| |
| #include <stdio.h> |
| #include <stdarg.h> |
| #include <windef.h> |
| #include <winbase.h> |
| #include <winerror.h> |
| #include <winnls.h> |
| #include <wincrypt.h> |
| #include <mssip.h> |
| |
| #include "wine/test.h" |
| |
| static BOOL (WINAPI * funcCryptSIPGetSignedDataMsg)(SIP_SUBJECTINFO *,DWORD *,DWORD,DWORD *,BYTE *); |
| static BOOL (WINAPI * funcCryptSIPPutSignedDataMsg)(SIP_SUBJECTINFO *,DWORD,DWORD *,DWORD,BYTE *); |
| static BOOL (WINAPI * funcCryptSIPCreateIndirectData)(SIP_SUBJECTINFO *,DWORD *,SIP_INDIRECT_DATA *); |
| static BOOL (WINAPI * funcCryptSIPVerifyIndirectData)(SIP_SUBJECTINFO *,SIP_INDIRECT_DATA *); |
| static BOOL (WINAPI * funcCryptSIPRemoveSignedDataMsg)(SIP_SUBJECTINFO *,DWORD); |
| |
| static void test_AddRemoveProvider(void) |
| { |
| BOOL ret; |
| SIP_ADD_NEWPROVIDER newprov; |
| GUID actionid = { 0xdeadbe, 0xefde, 0xadbe, { 0xef,0xde,0xad,0xbe,0xef,0xde,0xad,0xbe }}; |
| static WCHAR dummydll[] = {'d','e','a','d','b','e','e','f','.','d','l','l',0 }; |
| static WCHAR dummyfunction[] = {'d','u','m','m','y','f','u','n','c','t','i','o','n',0 }; |
| |
| /* NULL check */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPRemoveProvider(NULL); |
| ok (!ret, "Expected CryptSIPRemoveProvider to fail.\n"); |
| ok (GetLastError() == ERROR_INVALID_PARAMETER, |
| "Expected ERROR_INVALID_PARAMETER, got %d.\n", GetLastError()); |
| |
| /* nonexistent provider should result in a registry error */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPRemoveProvider(&actionid); |
| if (!ret && GetLastError() == ERROR_ACCESS_DENIED) |
| { |
| /* Apparently the needed rights are checked before the existence of the provider */ |
| skip("Need admin rights\n"); |
| } |
| else |
| { |
| /* On some Win98 systems, CryptSIPRemoveProvider always succeeds if |
| * the arguments are correct, whether or not the registry key is |
| * present, so don't test ret, just check the last error if it does |
| * return FALSE. |
| */ |
| if (!ret) |
| ok (GetLastError() == ERROR_FILE_NOT_FOUND, |
| "Expected ERROR_FILE_NOT_FOUND, got %d.\n", GetLastError()); |
| } |
| |
| /* Everything OK, pwszIsFunctionName and pwszIsFunctionNameFmt2 are left NULL |
| * as allowed */ |
| |
| memset(&newprov, 0, sizeof(SIP_ADD_NEWPROVIDER)); |
| newprov.cbStruct = sizeof(SIP_ADD_NEWPROVIDER); |
| newprov.pgSubject = &actionid; |
| newprov.pwszDLLFileName = dummydll; |
| newprov.pwszGetFuncName = dummyfunction; |
| newprov.pwszPutFuncName = dummyfunction; |
| newprov.pwszCreateFuncName = dummyfunction; |
| newprov.pwszVerifyFuncName = dummyfunction; |
| newprov.pwszRemoveFuncName = dummyfunction; |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPAddProvider(&newprov); |
| if (!ret && GetLastError() == ERROR_ACCESS_DENIED) |
| { |
| skip("Need admin rights\n"); |
| return; |
| } |
| ok ( ret, "CryptSIPAddProvider should have succeeded, last error %d\n", GetLastError()); |
| |
| /* Dummy provider will be deleted, but the function still fails because |
| * pwszIsFunctionName and pwszIsFunctionNameFmt2 are not present in the |
| * registry. |
| */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPRemoveProvider(&actionid); |
| /* On some Win98 systems, CryptSIPRemoveProvider always succeeds if |
| * the arguments are correct, whether or not the registry key is |
| * present, so don't test ret, just check the last error if it does |
| * return FALSE. |
| */ |
| if (!ret) |
| ok (GetLastError() == ERROR_FILE_NOT_FOUND, |
| "Expected ERROR_FILE_NOT_FOUND, got %d.\n", GetLastError()); |
| |
| /* Everything OK */ |
| memset(&newprov, 0, sizeof(SIP_ADD_NEWPROVIDER)); |
| newprov.cbStruct = sizeof(SIP_ADD_NEWPROVIDER); |
| newprov.pgSubject = &actionid; |
| newprov.pwszDLLFileName = dummydll; |
| newprov.pwszGetFuncName = dummyfunction; |
| newprov.pwszPutFuncName = dummyfunction; |
| newprov.pwszCreateFuncName = dummyfunction; |
| newprov.pwszVerifyFuncName = dummyfunction; |
| newprov.pwszRemoveFuncName = dummyfunction; |
| newprov.pwszIsFunctionNameFmt2 = dummyfunction; |
| newprov.pwszIsFunctionName = dummyfunction; |
| /* If GetCapFuncName set to NULL, then CryptSIPRemoveProvider fails on win 8 */ |
| newprov.pwszGetCapFuncName = dummyfunction; |
| |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPAddProvider(&newprov); |
| ok ( ret, "CryptSIPAddProvider should have succeeded, last error %d\n", GetLastError()); |
| |
| /* Dummy provider should be deleted */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPRemoveProvider(&actionid); |
| ok ( ret, "CryptSIPRemoveProvider should have succeeded, last error %d\n", GetLastError()); |
| } |
| |
| static const BYTE cabFileData[] = { |
| 0x4d,0x53,0x43,0x46,0x00,0x00,0x00,0x00,0x50,0x00,0x00,0x00,0x00,0x00,0x00,0x00, |
| 0x2c,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x03,0x01,0x01,0x00,0x01,0x00,0x00,0x00, |
| 0xef,0xbe,0xff,0xff,0x42,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x06,0x00,0x00,0x00, |
| 0x00,0x00,0x00,0x00,0x00,0x00,0xf7,0x38,0x4b,0xac,0x00,0x00,0x61,0x2e,0x74,0x78, |
| 0x74,0x00,0x6d,0x5a,0x72,0x78,0x06,0x00,0x06,0x00,0x61,0x2e,0x74,0x78,0x74,0x0a, |
| }; |
| |
| static void test_SIPRetrieveSubjectGUID(void) |
| { |
| BOOL ret; |
| GUID subject; |
| HANDLE file; |
| static const CHAR windir[] = "windir"; |
| static const CHAR regeditExe[] = "regedit.exe"; |
| static const GUID nullSubject = { 0x0, 0x0, 0x0, { 0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0 }}; |
| static const WCHAR deadbeef[] = { 'c',':','\\','d','e','a','d','b','e','e','f','.','d','b','f',0 }; |
| /* Couldn't find a name for this GUID, it's the one used for 95% of the files */ |
| static const GUID unknownGUID = { 0xC689AAB8, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }}; |
| static const GUID cabGUID = { 0xc689aaba, 0x8e78, 0x11d0, {0x8c,0x47,0x00,0xc0,0x4f,0xc2,0x95,0xee }}; |
| static CHAR regeditPath[MAX_PATH]; |
| static WCHAR regeditPathW[MAX_PATH]; |
| static CHAR path[MAX_PATH]; |
| static CHAR tempfile[MAX_PATH]; |
| static WCHAR tempfileW[MAX_PATH]; |
| DWORD written; |
| |
| /* NULL check */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPRetrieveSubjectGuid(NULL, NULL, NULL); |
| ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n"); |
| ok (GetLastError() == ERROR_INVALID_PARAMETER, |
| "Expected ERROR_INVALID_PARAMETER, got %d.\n", GetLastError()); |
| |
| /* Test with a nonexistent file (hopefully) */ |
| SetLastError(0xdeadbeef); |
| /* Set subject to something other than zeros */ |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(deadbeef, NULL, &subject); |
| ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n"); |
| ok (GetLastError() == ERROR_FILE_NOT_FOUND || |
| GetLastError() == ERROR_PATH_NOT_FOUND, |
| "Expected ERROR_FILE_NOT_FOUND or ERROR_PATH_NOT_FOUND, got %d.\n", |
| GetLastError()); |
| ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)), |
| "Expected a NULL GUID for c:\\deadbeef.dbf, not %s\n", wine_dbgstr_guid(&subject)); |
| |
| /* Now with an executable that should exist |
| * |
| * Use A-functions where possible as that should be available on all platforms |
| */ |
| ret = GetEnvironmentVariableA(windir, regeditPath, MAX_PATH); |
| ok (ret > 0, "expected GEVA(windir) to succeed, last error %d\n", GetLastError()); |
| strcat(regeditPath, "\\"); |
| strcat(regeditPath, regeditExe); |
| MultiByteToWideChar( CP_ACP, 0, regeditPath, |
| strlen(regeditPath)+1, regeditPathW, |
| sizeof(regeditPathW)/sizeof(regeditPathW[0]) ); |
| |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(regeditPathW, NULL, &subject); |
| ok ( ret, "Expected CryptSIPRetrieveSubjectGuid to succeed\n"); |
| ok ( !memcmp(&subject, &unknownGUID, sizeof(GUID)), |
| "Expected (%s), got (%s).\n", wine_dbgstr_guid(&unknownGUID), wine_dbgstr_guid(&subject)); |
| |
| /* The same thing but now with a handle instead of a filename */ |
| file = CreateFileA(regeditPath, GENERIC_READ, 0, NULL, OPEN_EXISTING, 0, NULL); |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(NULL, file, &subject); |
| ok ( ret, "Expected CryptSIPRetrieveSubjectGuid to succeed\n"); |
| ok ( !memcmp(&subject, &unknownGUID, sizeof(GUID)), |
| "Expected (%s), got (%s).\n", wine_dbgstr_guid(&unknownGUID), wine_dbgstr_guid(&subject)); |
| CloseHandle(file); |
| |
| /* And both */ |
| file = CreateFileA(regeditPath, GENERIC_READ, 0, NULL, OPEN_EXISTING, 0, NULL); |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(regeditPathW, file, &subject); |
| ok ( ret, "Expected CryptSIPRetrieveSubjectGuid to succeed\n"); |
| ok ( !memcmp(&subject, &unknownGUID, sizeof(GUID)), |
| "Expected (%s), got (%s).\n", wine_dbgstr_guid(&unknownGUID), wine_dbgstr_guid(&subject)); |
| CloseHandle(file); |
| |
| /* Now with an empty file */ |
| GetTempPathA(sizeof(path), path); |
| GetTempFileNameA(path, "sip", 0 , tempfile); |
| MultiByteToWideChar( CP_ACP, 0, tempfile, |
| strlen(tempfile)+1, tempfileW, |
| sizeof(tempfileW)/sizeof(tempfileW[0]) ); |
| |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject); |
| ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n"); |
| ok ( GetLastError() == ERROR_FILE_INVALID || |
| GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ || |
| GetLastError() == ERROR_SUCCESS /* most Win98 */ || |
| GetLastError() == TRUST_E_SUBJECT_FORM_UNKNOWN /* some Win98 */, |
| "Expected ERROR_FILE_INVALID, ERROR_INVALID_PARAMETER, ERROR_SUCCESS or TRUST_E_SUBJECT_FORM_UNKNOWN, got 0x%08x\n", GetLastError()); |
| ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)), |
| "Expected a NULL GUID for empty file %s, not %s\n", tempfile, wine_dbgstr_guid(&subject)); |
| |
| /* Use a file with a size of 3 (at least < 4) */ |
| file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL); |
| WriteFile(file, "123", 3, &written, NULL); |
| CloseHandle(file); |
| |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject); |
| ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n"); |
| ok ( GetLastError() == ERROR_INVALID_PARAMETER || |
| GetLastError() == ERROR_SUCCESS /* most Win98 */ || |
| GetLastError() == TRUST_E_SUBJECT_FORM_UNKNOWN /* some Win98 */, |
| "Expected ERROR_INVALID_PARAMETER, ERROR_SUCCESS or TRUST_E_SUBJECT_FORM_UNKNOWN, got 0x%08x\n", GetLastError()); |
| ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)), |
| "Expected a NULL GUID for empty file %s, not %s\n", tempfile, wine_dbgstr_guid(&subject)); |
| |
| /* And now >= 4 */ |
| file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL); |
| WriteFile(file, "1234", 4, &written, NULL); |
| CloseHandle(file); |
| |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject); |
| ok ( !ret, "Expected CryptSIPRetrieveSubjectGuid to fail\n"); |
| ok ( GetLastError() == TRUST_E_SUBJECT_FORM_UNKNOWN || |
| GetLastError() == ERROR_SUCCESS /* Win98 */, |
| "Expected TRUST_E_SUBJECT_FORM_UNKNOWN or ERROR_SUCCESS, got 0x%08x\n", GetLastError()); |
| ok ( !memcmp(&subject, &nullSubject, sizeof(GUID)), |
| "Expected a NULL GUID for empty file %s, not %s\n", tempfile, wine_dbgstr_guid(&subject)); |
| |
| /* Clean up */ |
| DeleteFileA(tempfile); |
| |
| /* Create a file with just the .cab header 'MSCF' */ |
| SetLastError(0xdeadbeef); |
| file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, CREATE_NEW, 0, NULL); |
| ok(file != INVALID_HANDLE_VALUE, "failed with %u\n", GetLastError()); |
| WriteFile(file, cabFileData, 4, &written, NULL); |
| CloseHandle(file); |
| |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject); |
| ok( ret, "CryptSIPRetrieveSubjectGuid failed: %d (0x%08x)\n", |
| GetLastError(), GetLastError() ); |
| ok ( !memcmp(&subject, &cabGUID, sizeof(GUID)), |
| "Expected GUID %s for cabinet file, not %s\n", wine_dbgstr_guid(&cabGUID), wine_dbgstr_guid(&subject)); |
| |
| /* Clean up */ |
| DeleteFileA(tempfile); |
| |
| /* Create a .cab file */ |
| SetLastError(0xdeadbeef); |
| file = CreateFileA(tempfile, GENERIC_WRITE, 0, NULL, CREATE_NEW, 0, NULL); |
| ok(file != INVALID_HANDLE_VALUE, "failed with %u\n", GetLastError()); |
| WriteFile(file, cabFileData, sizeof(cabFileData), &written, NULL); |
| CloseHandle(file); |
| |
| SetLastError(0xdeadbeef); |
| memset(&subject, 1, sizeof(GUID)); |
| ret = CryptSIPRetrieveSubjectGuid(tempfileW, NULL, &subject); |
| ok( ret, "CryptSIPRetrieveSubjectGuid failed: %d (0x%08x)\n", |
| GetLastError(), GetLastError() ); |
| ok ( !memcmp(&subject, &cabGUID, sizeof(GUID)), |
| "Expected GUID %s for cabinet file, not %s\n", wine_dbgstr_guid(&cabGUID), wine_dbgstr_guid(&subject)); |
| |
| /* Clean up */ |
| DeleteFileA(tempfile); |
| } |
| |
| static void test_SIPLoad(void) |
| { |
| BOOL ret; |
| GUID subject; |
| static GUID dummySubject = { 0xdeadbeef, 0xdead, 0xbeef, { 0xde,0xad,0xbe,0xef,0xde,0xad,0xbe,0xef }}; |
| static GUID unknown = { 0xC689AABA, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }}; /* WINTRUST.DLL */ |
| static GUID unknown2 = { 0xDE351A43, 0x8E59, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }}; /* WINTRUST.DLL */ |
| /* The next SIP is available on Windows and on Wine */ |
| static GUID unknown3 = { 0x000C10F1, 0x0000, 0x0000, { 0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46 }}; /* MSISIP.DLL */ |
| SIP_DISPATCH_INFO sdi; |
| HMODULE hCrypt; |
| |
| /* All NULL */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPLoad(NULL, 0, NULL); |
| ok ( !ret, "Expected CryptSIPLoad to fail\n"); |
| ok ( GetLastError() == ERROR_INVALID_PARAMETER, |
| "Expected ERROR_INVALID_PARAMETER, got 0x%08x\n", GetLastError()); |
| |
| /* Only pSipDispatch NULL */ |
| SetLastError(0xdeadbeef); |
| ret = CryptSIPLoad(&subject, 0, NULL); |
| ok ( !ret, "Expected CryptSIPLoad to fail\n"); |
| ok ( GetLastError() == ERROR_INVALID_PARAMETER, |
| "Expected ERROR_INVALID_PARAMETER, got 0x%08x\n", GetLastError()); |
| |
| /* No NULLs, but nonexistent pgSubject */ |
| SetLastError(0xdeadbeef); |
| memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO)); |
| sdi.cbSize = sizeof(SIP_DISPATCH_INFO); |
| sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef; |
| ret = CryptSIPLoad(&dummySubject, 0, &sdi); |
| ok ( !ret, "Expected CryptSIPLoad to fail\n"); |
| ok ( GetLastError() == TRUST_E_SUBJECT_FORM_UNKNOWN, |
| "Expected TRUST_E_SUBJECT_FORM_UNKNOWN, got 0x%08x\n", GetLastError()); |
| ok( sdi.pfGet == (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected no change to the function pointer\n"); |
| |
| hCrypt = GetModuleHandleA("crypt32.dll"); |
| funcCryptSIPGetSignedDataMsg = (void*)GetProcAddress(hCrypt, "CryptSIPGetSignedDataMsg"); |
| funcCryptSIPPutSignedDataMsg = (void*)GetProcAddress(hCrypt, "CryptSIPPutSignedDataMsg"); |
| funcCryptSIPCreateIndirectData = (void*)GetProcAddress(hCrypt, "CryptSIPCreateIndirectData"); |
| funcCryptSIPVerifyIndirectData = (void*)GetProcAddress(hCrypt, "CryptSIPVerifyIndirectData"); |
| funcCryptSIPRemoveSignedDataMsg = (void*)GetProcAddress(hCrypt, "CryptSIPRemoveSignedDataMsg"); |
| |
| /* All OK */ |
| SetLastError(0xdeadbeef); |
| memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO)); |
| sdi.cbSize = sizeof(SIP_DISPATCH_INFO); |
| sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef; |
| ret = CryptSIPLoad(&unknown, 0, &sdi); |
| ok ( ret, "Expected CryptSIPLoad to succeed\n"); |
| /* On native the last error will always be ERROR_PROC_NOT_FOUND as native searches for the function DllCanUnloadNow |
| * in WINTRUST.DLL (in this case). This function is not available in WINTRUST.DLL. |
| * For now there's no need to implement this is Wine as I doubt any program will rely on |
| * this last error when the call succeeded. |
| */ |
| ok( sdi.pfGet != (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected a function pointer to be loaded.\n"); |
| |
| /* The function addresses returned by CryptSIPLoad are actually the addresses of |
| * crypt32's own functions. A function calling these addresses will end up first |
| * calling crypt32 functions which in its turn call the equivalent in the SIP |
| * as dictated by the given GUID. |
| */ |
| if (funcCryptSIPGetSignedDataMsg && funcCryptSIPPutSignedDataMsg && funcCryptSIPCreateIndirectData && |
| funcCryptSIPVerifyIndirectData && funcCryptSIPRemoveSignedDataMsg) |
| ok (sdi.pfGet == funcCryptSIPGetSignedDataMsg && |
| sdi.pfPut == funcCryptSIPPutSignedDataMsg && |
| sdi.pfCreate == funcCryptSIPCreateIndirectData && |
| sdi.pfVerify == funcCryptSIPVerifyIndirectData && |
| sdi.pfRemove == funcCryptSIPRemoveSignedDataMsg, |
| "Expected function addresses to be from crypt32\n"); |
| else |
| trace("Couldn't load function pointers\n"); |
| |
| /* All OK, but different GUID (same SIP though) */ |
| SetLastError(0xdeadbeef); |
| memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO)); |
| sdi.cbSize = sizeof(SIP_DISPATCH_INFO); |
| sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef; |
| ret = CryptSIPLoad(&unknown2, 0, &sdi); |
| ok ( ret, "Expected CryptSIPLoad to succeed\n"); |
| /* This call on its own would have resulted in an ERROR_PROC_NOT_FOUND, but the previous |
| * call to CryptSIPLoad already loaded wintrust.dll. As this information is cached, |
| * CryptSIPLoad will not try to search for the already mentioned DllCanUnloadNow. |
| */ |
| ok( sdi.pfGet != (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected a function pointer to be loaded.\n"); |
| |
| /* All OK, but other SIP */ |
| SetLastError(0xdeadbeef); |
| memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO)); |
| sdi.cbSize = sizeof(SIP_DISPATCH_INFO); |
| sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef; |
| ret = CryptSIPLoad(&unknown3, 0, &sdi); |
| if (ret) |
| { |
| /* The SIP is known so we can safely assume that the next tests can be done */ |
| |
| /* As msisip.dll is not checked yet by any of the previous calls, the |
| * function DllCanUnloadNow will be checked again in msisip.dll (it's not present) |
| */ |
| ok( sdi.pfGet != (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected a function pointer to be loaded.\n"); |
| |
| /* This is another SIP but this test proves the function addresses are the same as |
| * in the previous test. |
| */ |
| if (funcCryptSIPGetSignedDataMsg && funcCryptSIPPutSignedDataMsg && funcCryptSIPCreateIndirectData && |
| funcCryptSIPVerifyIndirectData && funcCryptSIPRemoveSignedDataMsg) |
| ok (sdi.pfGet == funcCryptSIPGetSignedDataMsg && |
| sdi.pfPut == funcCryptSIPPutSignedDataMsg && |
| sdi.pfCreate == funcCryptSIPCreateIndirectData && |
| sdi.pfVerify == funcCryptSIPVerifyIndirectData && |
| sdi.pfRemove == funcCryptSIPRemoveSignedDataMsg, |
| "Expected function addresses to be from crypt32\n"); |
| else |
| trace("Couldn't load function pointers\n"); |
| } |
| |
| /* Reserved parameter not 0 */ |
| SetLastError(0xdeadbeef); |
| memset(&sdi, 0, sizeof(SIP_DISPATCH_INFO)); |
| sdi.cbSize = sizeof(SIP_DISPATCH_INFO); |
| sdi.pfGet = (pCryptSIPGetSignedDataMsg)0xdeadbeef; |
| ret = CryptSIPLoad(&unknown, 1, &sdi); |
| ok ( !ret, "Expected CryptSIPLoad to fail\n"); |
| ok ( GetLastError() == ERROR_INVALID_PARAMETER, |
| "Expected ERROR_INVALID_PARAMETER, got 0x%08x\n", GetLastError()); |
| ok( sdi.pfGet == (pCryptSIPGetSignedDataMsg)0xdeadbeef, "Expected no change to the function pointer\n"); |
| } |
| |
| START_TEST(sip) |
| { |
| test_AddRemoveProvider(); |
| /* It seems that the caching for loaded dlls is shared between CryptSIPRetrieveSubjectGUID |
| * and CryptSIPLoad. The tests have to be in this order to succeed. This is because in the last |
| * test for CryptSIPRetrieveSubjectGUID, several SIPs will be loaded (on Windows). |
| */ |
| test_SIPLoad(); |
| test_SIPRetrieveSubjectGUID(); |
| } |