scrrun: Add IFileSystem3 support.
[wine] / dlls / crypt32 / tests / ctl.c
1 /*
2  * crypt32 CTL functions tests
3  *
4  * Copyright 2008 Juan Lang
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  */
20
21 #include <stdio.h>
22 #include <stdarg.h>
23
24 #include <windef.h>
25 #include <winbase.h>
26 #include <winerror.h>
27 #include <wincrypt.h>
28
29 #include "wine/test.h"
30
31 static const BYTE emptyCTL[] = {
32 0x30,0x17,0x30,0x00,0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,
33 0x30,0x30,0x30,0x30,0x30,0x5a,0x30,0x02,0x06,0x00 };
34 static const BYTE ctlWithOneEntry[] = {
35 0x30,0x2a,0x30,0x00,0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,
36 0x30,0x30,0x30,0x30,0x30,0x5a,0x30,0x02,0x06,0x00,0x30,0x11,0x30,0x0f,0x04,
37 0x01,0x01,0x31,0x0a,0x30,0x08,0x06,0x02,0x2a,0x03,0x31,0x02,0x30,0x00 };
38 static const BYTE signedCTL[] = {
39 0x30,0x81,0xc7,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,0xa0,
40 0x81,0xb9,0x30,0x81,0xb6,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,0x08,0x2a,
41 0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x28,0x06,0x09,0x2a,0x86,
42 0x48,0x86,0xf7,0x0d,0x01,0x07,0x01,0xa0,0x1b,0x04,0x19,0x30,0x17,0x30,0x00,
43 0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,
44 0x30,0x5a,0x30,0x02,0x06,0x00,0x31,0x77,0x30,0x75,0x02,0x01,0x01,0x30,0x1a,
45 0x30,0x15,0x31,0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x03,0x13,0x0a,0x4a,0x75,
46 0x61,0x6e,0x20,0x4c,0x61,0x6e,0x67,0x00,0x02,0x01,0x01,0x30,0x0c,0x06,0x08,
47 0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x04,0x06,0x00,0x05,
48 0x00,0x04,0x40,0xca,0xd8,0x32,0xd1,0xbd,0x97,0x61,0x54,0xd6,0x80,0xcf,0x0d,
49 0xbd,0xa2,0x42,0xc7,0xca,0x37,0x91,0x7d,0x9d,0xac,0x8c,0xdf,0x05,0x8a,0x39,
50 0xc6,0x07,0xc1,0x37,0xe6,0xb9,0xd1,0x0d,0x26,0xec,0xa5,0xb0,0x8a,0x51,0x26,
51 0x2b,0x4f,0x73,0x44,0x86,0x83,0x5e,0x2b,0x6e,0xcc,0xf8,0x1b,0x85,0x53,0xe9,
52 0x7a,0x80,0x8f,0x6b,0x42,0x19,0x93 };
53 static const BYTE signedCTLWithSubjectAlgorithm[] = {
54 0x30,0x81,0xd1,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,0xa0,
55 0x81,0xc3,0x30,0x81,0xc0,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,0x08,0x2a,
56 0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x32,0x06,0x09,0x2a,0x86,
57 0x48,0x86,0xf7,0x0d,0x01,0x07,0x01,0xa0,0x25,0x04,0x23,0x30,0x21,0x30,0x00,
58 0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,
59 0x30,0x5a,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,
60 0x00,0x31,0x77,0x30,0x75,0x02,0x01,0x01,0x30,0x1a,0x30,0x15,0x31,0x13,0x30,
61 0x11,0x06,0x03,0x55,0x04,0x03,0x13,0x0a,0x4a,0x75,0x61,0x6e,0x20,0x4c,0x61,
62 0x6e,0x67,0x00,0x02,0x01,0x01,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,
63 0x0d,0x02,0x05,0x05,0x00,0x30,0x04,0x06,0x00,0x05,0x00,0x04,0x40,0xca,0x7a,
64 0xfa,0xbf,0x44,0x36,0xfd,0xb2,0x84,0x70,0x0f,0xf5,0x66,0xcb,0x68,0xdb,0x45,
65 0x74,0xa1,0xed,0xe3,0x30,0x4a,0x11,0xd2,0x7b,0xf5,0xa9,0x68,0x8d,0x36,0xe8,
66 0x79,0xff,0xa2,0xf2,0x4c,0x8a,0xa9,0x65,0x03,0xf8,0x77,0xa5,0x01,0xd3,0x46,
67 0x8a,0xcc,0x93,0x36,0x30,0xe1,0xa4,0x47,0x70,0x3d,0xb3,0x97,0xfc,0x6d,0x24,
68 0xe9,0xf9 };
69 static const BYTE signedCTLWithCTLInnerContent[] = {
70 0x30,0x82,0x01,0x0f,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,
71 0xa0,0x82,0x01,0x00,0x30,0x81,0xfd,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,
72 0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x30,0x06,0x09,
73 0x2b,0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0xa0,0x23,0x30,0x21,0x30,0x00,
74 0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,
75 0x30,0x5a,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,
76 0x00,0x31,0x81,0xb5,0x30,0x81,0xb2,0x02,0x01,0x01,0x30,0x1a,0x30,0x15,0x31,
77 0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x03,0x13,0x0a,0x4a,0x75,0x61,0x6e,0x20,
78 0x4c,0x61,0x6e,0x67,0x00,0x02,0x01,0x01,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,
79 0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0xa0,0x3b,0x30,0x18,0x06,0x09,0x2a,0x86,
80 0x48,0x86,0xf7,0x0d,0x01,0x09,0x03,0x31,0x0b,0x06,0x09,0x2b,0x06,0x01,0x04,
81 0x01,0x82,0x37,0x0a,0x01,0x30,0x1f,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,
82 0x01,0x09,0x04,0x31,0x12,0x04,0x10,0x54,0x71,0xbc,0xe1,0x56,0x31,0xa2,0xf9,
83 0x65,0x70,0x34,0xf8,0xe2,0xe9,0xb4,0xf4,0x30,0x04,0x06,0x00,0x05,0x00,0x04,
84 0x40,0x2f,0x1b,0x9f,0x5a,0x4a,0x15,0x73,0xfa,0xb1,0x93,0x3d,0x09,0x52,0xdf,
85 0x6b,0x98,0x4b,0x13,0x5e,0xe7,0xbf,0x65,0xf4,0x9c,0xc2,0xb1,0x77,0x09,0xb1,
86 0x66,0x4d,0x72,0x0d,0xb1,0x1a,0x50,0x20,0xe0,0x57,0xa2,0x39,0xc7,0xcd,0x7f,
87 0x8e,0xe7,0x5f,0x76,0x2b,0xd1,0x6a,0x82,0xb3,0x30,0x25,0x61,0xf6,0x25,0x23,
88 0x57,0x6c,0x0b,0x47,0xb8 };
89 static const BYTE signedCTLWithCTLInnerContentAndBadSig[] = {
90 0x30,0x82,0x01,0x0f,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,
91 0xa0,0x82,0x01,0x00,0x30,0x81,0xfd,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,
92 0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x30,0x06,0x09,
93 0x2b,0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0xa0,0x23,0x30,0x21,0x30,0x00,
94 0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,
95 0x30,0x5a,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,
96 0x00,0x31,0x81,0xb5,0x30,0x81,0xb2,0x02,0x01,0x01,0x30,0x1a,0x30,0x15,0x31,
97 0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x03,0x13,0x0a,0x4a,0x75,0x61,0x6e,0x20,
98 0x4c,0x61,0x6e,0x67,0x00,0x02,0x01,0x01,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,
99 0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0xa0,0x3b,0x30,0x18,0x06,0x09,0x2a,0x86,
100 0x48,0x86,0xf7,0x0d,0x01,0x09,0x03,0x31,0x0b,0x06,0x09,0x2b,0x06,0x01,0x04,
101 0x01,0x82,0x37,0x0a,0x01,0x30,0x1f,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,
102 0x01,0x09,0x04,0x31,0x12,0x04,0x10,0x54,0x71,0xbc,0xe1,0x56,0x31,0xa2,0xf9,
103 0x65,0x70,0x34,0xf8,0xe2,0xe9,0xb4,0xf4,0x30,0x04,0x06,0x00,0x05,0x00,0x04,
104 0x40,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
105 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
106 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
107 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
108 0xff,0xff,0xff,0xff,0xff };
109
110 static void testCreateCTL(void)
111 {
112     PCCTL_CONTEXT ctl;
113
114     SetLastError(0xdeadbeef);
115     ctl = CertCreateCTLContext(0, NULL, 0);
116     ok(!ctl && GetLastError() == E_INVALIDARG,
117      "expected E_INVALIDARG, got %08x\n", GetLastError());
118     SetLastError(0xdeadbeef);
119     ctl = CertCreateCTLContext(X509_ASN_ENCODING, NULL, 0);
120     ok(!ctl &&
121      (GetLastError() == ERROR_INVALID_DATA ||
122       GetLastError() == OSS_MORE_INPUT), /* win9x */
123      "expected ERROR_INVALID_DATA, got %d (0x%08x)\n", GetLastError(),
124      GetLastError());
125     /* An empty CTL can't be created.. */
126     SetLastError(0xdeadbeef);
127     ctl = CertCreateCTLContext(X509_ASN_ENCODING, emptyCTL, sizeof(emptyCTL));
128     ok(!ctl &&
129      (GetLastError() == ERROR_INVALID_DATA ||
130       GetLastError() == OSS_DATA_ERROR), /* win9x */
131      "expected ERROR_INVALID_DATA, got %d (0x%08x)\n", GetLastError(),
132      GetLastError());
133     /* Nor can any of these "signed" CTLs whose inner content OID isn't
134      * szOID_CTL.
135      */
136     SetLastError(0xdeadbeef);
137     ctl = CertCreateCTLContext(X509_ASN_ENCODING, signedCTL, sizeof(signedCTL));
138     ok(!ctl &&
139      (GetLastError() == ERROR_INVALID_DATA ||
140       GetLastError() == CRYPT_E_UNEXPECTED_MSG_TYPE /* win9x */ ||
141       GetLastError() == ERROR_SUCCESS /* some win98 */),
142      "expected ERROR_INVALID_DATA, CRYPT_E_UNEXPECTED_MSG_TYPE, or ERROR_SUCCESS, got %d (0x%08x)\n", GetLastError(),
143      GetLastError());
144     SetLastError(0xdeadbeef);
145     ctl = CertCreateCTLContext(X509_ASN_ENCODING, ctlWithOneEntry,
146      sizeof(ctlWithOneEntry));
147     ok(!ctl &&
148      (GetLastError() == ERROR_INVALID_DATA ||
149       GetLastError() == CRYPT_E_UNEXPECTED_MSG_TYPE /* win9x */ ||
150       GetLastError() == OSS_DATA_ERROR /* some win98 */ ||
151       GetLastError() == ERROR_SUCCESS /* some win98 */),
152      "expected ERROR_INVALID_DATA, CRYPT_E_UNEXPECTED_MSG_TYPE, OSS_DATA_ERROR, or ERROR_SUCCESS, got %d (0x%08x)\n", GetLastError(),
153      GetLastError());
154     SetLastError(0xdeadbeef);
155     ctl = CertCreateCTLContext(X509_ASN_ENCODING,
156      signedCTLWithSubjectAlgorithm, sizeof(signedCTLWithSubjectAlgorithm));
157     ok(!ctl &&
158      (GetLastError() == ERROR_INVALID_DATA ||
159       GetLastError() == CRYPT_E_UNEXPECTED_MSG_TYPE /* win9x */ ||
160       GetLastError() == ERROR_SUCCESS /* some win98 */),
161      "expected ERROR_INVALID_DATA, got %d (0x%08x)\n", GetLastError(),
162      GetLastError());
163     /* This signed CTL with the appropriate inner content type can be decoded.
164      */
165     ctl = CertCreateCTLContext(X509_ASN_ENCODING,
166      signedCTLWithCTLInnerContent, sizeof(signedCTLWithCTLInnerContent));
167     ok(ctl != NULL, "CertCreateCTLContext failed: %08x\n", GetLastError());
168     if (ctl)
169     {
170         /* Even though the CTL was decoded with X509_ASN_ENCODING, the
171          * message encoding type is included in the CTL's encoding type.
172          */
173         ok(ctl->dwMsgAndCertEncodingType ==
174          (X509_ASN_ENCODING | PKCS_7_ASN_ENCODING),
175          "expected X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, got %08x\n",
176          ctl->dwMsgAndCertEncodingType);
177         CertFreeCTLContext(ctl);
178     }
179     /* This CTL with a bad signature can also be decoded, so the sig isn't
180      * checked when loading the CTL.
181      */
182     ctl = CertCreateCTLContext(X509_ASN_ENCODING,
183      signedCTLWithCTLInnerContentAndBadSig,
184      sizeof(signedCTLWithCTLInnerContentAndBadSig));
185     ok(ctl != NULL, "CertCreateCTLContext failed: %08x\n", GetLastError());
186     if (ctl)
187         CertFreeCTLContext(ctl);
188 }
189
190 static void testDupCTL(void)
191 {
192     PCCTL_CONTEXT context, dupContext;
193
194     context = CertDuplicateCTLContext(NULL);
195     ok(context == NULL, "expected NULL\n");
196     context = CertCreateCTLContext(X509_ASN_ENCODING,
197      signedCTLWithCTLInnerContent, sizeof(signedCTLWithCTLInnerContent));
198     dupContext = CertDuplicateCTLContext(context);
199     ok(dupContext != NULL, "expected a context\n");
200     ok(dupContext == context, "expected identical context addresses\n");
201     CertFreeCTLContext(dupContext);
202     CertFreeCTLContext(context);
203 }
204
205 static void checkHash(const BYTE *data, DWORD dataLen, ALG_ID algID,
206  PCCTL_CONTEXT context, DWORD propID)
207 {
208     BYTE hash[20] = { 0 }, hashProperty[20];
209     BOOL ret;
210     DWORD size;
211
212     memset(hash, 0, sizeof(hash));
213     memset(hashProperty, 0, sizeof(hashProperty));
214     size = sizeof(hash);
215     ret = CryptHashCertificate(0, algID, 0, data, dataLen, hash, &size);
216     ok(ret, "CryptHashCertificate failed: %08x\n", GetLastError());
217     ret = CertGetCTLContextProperty(context, propID, hashProperty, &size);
218     ok(ret, "CertGetCTLContextProperty failed: %08x\n", GetLastError());
219     if (ret)
220         ok(!memcmp(hash, hashProperty, size),
221          "Unexpected hash for property %d\n", propID);
222 }
223
224 static void testCTLProperties(void)
225 {
226     PCCTL_CONTEXT ctl;
227     BOOL ret;
228     DWORD propID, numProps, access, size;
229
230     ctl = CertCreateCTLContext(X509_ASN_ENCODING,
231      signedCTLWithCTLInnerContent, sizeof(signedCTLWithCTLInnerContent));
232     if (!ctl)
233     {
234         skip("CertCreateCTLContext failed: %08x\n", GetLastError());
235         return;
236     }
237
238     /* No properties as yet */
239     propID = 0;
240     numProps = 0;
241     do {
242         propID = CertEnumCTLContextProperties(ctl, propID);
243         if (propID)
244             numProps++;
245     } while (propID != 0);
246     ok(numProps == 0, "Expected 0 properties, got %d\n", numProps);
247
248     /* An implicit property */
249     ret = CertGetCTLContextProperty(ctl, CERT_ACCESS_STATE_PROP_ID, NULL,
250      &size);
251     ok(ret || broken(GetLastError() == CRYPT_E_NOT_FOUND /* some win98 */),
252      "CertGetCTLContextProperty failed: %08x\n", GetLastError());
253     ret = CertGetCTLContextProperty(ctl, CERT_ACCESS_STATE_PROP_ID, &access,
254      &size);
255     ok(ret || broken(GetLastError() == CRYPT_E_NOT_FOUND /* some win98 */),
256      "CertGetCTLContextProperty failed: %08x\n", GetLastError());
257     if (ret)
258         ok(!(access & CERT_ACCESS_STATE_WRITE_PERSIST_FLAG),
259          "Didn't expect a persisted cert\n");
260
261     checkHash(signedCTLWithCTLInnerContent,
262      sizeof(signedCTLWithCTLInnerContent), CALG_SHA1, ctl, CERT_HASH_PROP_ID);
263
264     /* Now that the hash property is set, we should get one property when
265      * enumerating.
266      */
267     propID = 0;
268     numProps = 0;
269     do {
270         propID = CertEnumCTLContextProperties(ctl, propID);
271         if (propID)
272             numProps++;
273     } while (propID != 0);
274     ok(numProps == 1, "Expected 1 properties, got %d\n", numProps);
275
276     checkHash(signedCTLWithCTLInnerContent,
277      sizeof(signedCTLWithCTLInnerContent), CALG_MD5, ctl,
278      CERT_MD5_HASH_PROP_ID);
279
280     CertFreeCTLContext(ctl);
281 }
282
283 static const BYTE signedCTLWithUsage[] = {
284 0x30,0x82,0x01,0x0f,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,
285 0xa0,0x82,0x01,0x00,0x30,0x81,0xfd,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,
286 0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x30,0x06,0x09,
287 0x2b,0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0xa0,0x23,0x30,0x21,0x30,0x0a,
288 0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x18,0x0f,0x31,0x36,0x30,
289 0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,0x30,0x5a,0x30,0x02,0x06,
290 0x00,0x31,0x81,0xb5,0x30,0x81,0xb2,0x02,0x01,0x01,0x30,0x1a,0x30,0x15,0x31,
291 0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x03,0x13,0x0a,0x4a,0x75,0x61,0x6e,0x20,
292 0x4c,0x61,0x6e,0x67,0x00,0x02,0x01,0x01,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,
293 0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0xa0,0x3b,0x30,0x18,0x06,0x09,0x2a,0x86,
294 0x48,0x86,0xf7,0x0d,0x01,0x09,0x03,0x31,0x0b,0x06,0x09,0x2b,0x06,0x01,0x04,
295 0x01,0x82,0x37,0x0a,0x01,0x30,0x1f,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,
296 0x01,0x09,0x04,0x31,0x12,0x04,0x10,0xc4,0x3e,0x7e,0xc8,0xf9,0x85,0xf3,0x27,
297 0x7d,0xc0,0x38,0xb2,0x7f,0xc7,0x76,0x85,0x30,0x04,0x06,0x00,0x05,0x00,0x04,
298 0x40,0x90,0x33,0x1b,0xb4,0x88,0x35,0xe6,0xf7,0x7f,0x93,0x05,0xc9,0x1a,0x0e,
299 0x8f,0x21,0xc0,0xaa,0xb3,0xab,0x3e,0x4a,0xa6,0x63,0x74,0xfd,0xef,0x11,0xbd,
300 0x67,0x3a,0x1b,0x07,0x4b,0x88,0x59,0x31,0xd5,0x08,0xf9,0x09,0x2f,0x0b,0x85,
301 0x62,0x5a,0x67,0x3b,0x62,0x7e,0x81,0x31,0xea,0xa4,0x36,0x5f,0x9a,0x92,0xb6,
302 0x66,0xa5,0x00,0x60,0x96 };
303 static const BYTE signedCTLWithListID1[] = {
304 0x30,0x82,0x01,0x07,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,
305 0xa0,0x81,0xf9,0x30,0x81,0xf6,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,0x08,
306 0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x29,0x06,0x09,0x2b,
307 0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0xa0,0x1c,0x30,0x1a,0x30,0x00,0x04,
308 0x01,0x01,0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,
309 0x30,0x30,0x30,0x5a,0x30,0x02,0x06,0x00,0x31,0x81,0xb5,0x30,0x81,0xb2,0x02,
310 0x01,0x01,0x30,0x1a,0x30,0x15,0x31,0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x03,
311 0x13,0x0a,0x4a,0x75,0x61,0x6e,0x20,0x4c,0x61,0x6e,0x67,0x00,0x02,0x01,0x01,
312 0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0xa0,
313 0x3b,0x30,0x18,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x09,0x03,0x31,
314 0x0b,0x06,0x09,0x2b,0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0x30,0x1f,0x06,
315 0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x09,0x04,0x31,0x12,0x04,0x10,0xbc,
316 0x13,0xde,0x17,0xc7,0x7c,0x67,0x5b,0xf9,0xa9,0x7c,0xb0,0xd9,0xf2,0x84,0xd5,
317 0x30,0x04,0x06,0x00,0x05,0x00,0x04,0x40,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
318 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
319 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
320 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
321 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff };
322 static const BYTE signedCTLWithListID2[] = {
323 0x30,0x82,0x01,0x07,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x07,0x02,
324 0xa0,0x81,0xf9,0x30,0x81,0xf6,0x02,0x01,0x01,0x31,0x0e,0x30,0x0c,0x06,0x08,
325 0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x30,0x29,0x06,0x09,0x2b,
326 0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0xa0,0x1c,0x30,0x1a,0x30,0x00,0x04,
327 0x01,0x02,0x18,0x0f,0x31,0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,
328 0x30,0x30,0x30,0x5a,0x30,0x02,0x06,0x00,0x31,0x81,0xb5,0x30,0x81,0xb2,0x02,
329 0x01,0x01,0x30,0x1a,0x30,0x15,0x31,0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x03,
330 0x13,0x0a,0x4a,0x75,0x61,0x6e,0x20,0x4c,0x61,0x6e,0x67,0x00,0x02,0x01,0x01,
331 0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0xa0,
332 0x3b,0x30,0x18,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x09,0x03,0x31,
333 0x0b,0x06,0x09,0x2b,0x06,0x01,0x04,0x01,0x82,0x37,0x0a,0x01,0x30,0x1f,0x06,
334 0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x09,0x04,0x31,0x12,0x04,0x10,0x60,
335 0x6b,0x10,0xb6,0xb8,0x74,0xb8,0xf3,0x79,0xd5,0x42,0x15,0x4a,0x60,0x93,0x1f,
336 0x30,0x04,0x06,0x00,0x05,0x00,0x04,0x40,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
337 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
338 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
339 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
340 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff };
341
342 static void testAddCTLToStore(void)
343 {
344     HCERTSTORE store;
345     BOOL ret;
346     DWORD numCTLs, expectedCTLs;
347     PCCTL_CONTEXT ctl;
348
349     store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
350      CERT_STORE_CREATE_NEW_FLAG, NULL);
351     /* Add two CTLs */
352     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
353      signedCTLWithCTLInnerContent, sizeof(signedCTLWithCTLInnerContent),
354      CERT_STORE_ADD_ALWAYS, NULL);
355     ok(ret, "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
356     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
357      signedCTLWithCTLInnerContentAndBadSig,
358      sizeof(signedCTLWithCTLInnerContentAndBadSig), CERT_STORE_ADD_ALWAYS,
359      NULL);
360     ok(ret, "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
361     /* Check that two exist */
362     numCTLs = 0;
363     ctl = NULL;
364     do {
365         ctl = CertEnumCTLsInStore(store, ctl);
366         if (ctl)
367             numCTLs++;
368     } while (ctl);
369     ok(numCTLs == 2, "expected 2 CTLs, got %d\n", numCTLs);
370     CertCloseStore(store, 0);
371
372     store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
373      CERT_STORE_CREATE_NEW_FLAG, NULL);
374     /* Add the two CTLs again.  They're identical except for the signature.. */
375     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
376      signedCTLWithCTLInnerContent, sizeof(signedCTLWithCTLInnerContent),
377      CERT_STORE_ADD_NEW, NULL);
378     ok(ret, "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
379     /* so adding the second CTL fails. */
380     SetLastError(0xdeadbeef);
381     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
382      signedCTLWithCTLInnerContentAndBadSig,
383      sizeof(signedCTLWithCTLInnerContentAndBadSig), CERT_STORE_ADD_NEW,
384      NULL);
385     if (ret)
386     {
387         /* win9x */
388         ok(GetLastError() == CRYPT_E_NOT_FOUND ||
389            GetLastError() == OSS_DATA_ERROR /* some win98 */,
390            "Expected CRYPT_E_NOT_FOUND, got %08x\n", GetLastError());
391     }
392     else
393     {
394         ok(!ret && (GetLastError() == CRYPT_E_EXISTS ||
395            GetLastError() == OSS_DATA_ERROR),
396            "expected CRYPT_E_EXISTS or OSS_DATA_ERROR, got %d %08x\n", ret,
397            GetLastError());
398     }
399     CertCloseStore(store, 0);
400
401     store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
402      CERT_STORE_CREATE_NEW_FLAG, NULL);
403     /* Add two CTLs.  These two have different usages, so they're considered
404      * different.
405      */
406     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
407      signedCTLWithCTLInnerContent, sizeof(signedCTLWithCTLInnerContent),
408      CERT_STORE_ADD_NEW, NULL);
409     ok(ret, "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
410     expectedCTLs = 1;
411     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
412      signedCTLWithUsage, sizeof(signedCTLWithUsage), CERT_STORE_ADD_NEW,
413      NULL);
414     ok(ret || broken(GetLastError() == OSS_DATA_ERROR /* some win98 */),
415        "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
416     if (ret)
417         expectedCTLs++;
418     /* Check that two exist */
419     numCTLs = 0;
420     ctl = NULL;
421     do {
422         ctl = CertEnumCTLsInStore(store, ctl);
423         if (ctl)
424             numCTLs++;
425     } while (ctl);
426     ok(numCTLs == expectedCTLs, "expected %d CTLs, got %d\n", expectedCTLs,
427        numCTLs);
428     CertCloseStore(store, 0);
429
430     store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
431      CERT_STORE_CREATE_NEW_FLAG, NULL);
432     /* Add two CTLs.  Now they have the same (empty) usages and different list
433      * IDs, so they're different.
434      */
435     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
436      signedCTLWithListID1, sizeof(signedCTLWithListID1), CERT_STORE_ADD_NEW,
437      NULL);
438     if (!ret)
439     {
440         skip("adding a CTL with an empty usage not supported\n");
441         return;
442     }
443     ok(ret, "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
444     ret = CertAddEncodedCTLToStore(store, X509_ASN_ENCODING,
445      signedCTLWithListID2, sizeof(signedCTLWithListID2), CERT_STORE_ADD_NEW,
446      NULL);
447     ok(ret, "CertAddEncodedCTLToStore failed: %08x\n", GetLastError());
448     /* Check that two exist */
449     numCTLs = 0;
450     ctl = NULL;
451     do {
452         ctl = CertEnumCTLsInStore(store, ctl);
453         if (ctl)
454             numCTLs++;
455     } while (ctl);
456     ok(numCTLs == 2, "expected 2 CTLs, got %d\n", numCTLs);
457     CertCloseStore(store, 0);
458 }
459
460 START_TEST(ctl)
461 {
462     testCreateCTL();
463     testDupCTL();
464     testCTLProperties();
465     testAddCTLToStore();
466 }