Assorted spelling fixes.
[wine/wine64.git] / dlls / advapi32 / tests / crypt.c
blobbdc8a60f7da3dcfe80fdb707b6277fef156f6287
1 /*
2 * Unit tests for crypt functions
4 * Copyright (c) 2004 Michael Jung
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 #include <stdarg.h>
23 #include "windef.h"
24 #include "winbase.h"
25 #include "wincrypt.h"
26 #include "winerror.h"
27 #include "winreg.h"
29 #include "wine/test.h"
31 static const char szRsaBaseProv[] = MS_DEF_PROV_A;
32 static const char szNonExistentProv[] = "Wine Nonexistent Cryptographic Provider v11.2";
33 static const char szKeySet[] = "wine_test_keyset";
34 static const char szBadKeySet[] = "wine_test_bad_keyset";
35 #define NON_DEF_PROV_TYPE 999
37 static HMODULE hadvapi32;
38 static BOOL (WINAPI *pCryptEnumProviderTypesA)(DWORD, DWORD*, DWORD, DWORD*, LPSTR, DWORD*);
39 static BOOL (WINAPI *pCryptEnumProvidersA)(DWORD, DWORD*, DWORD, DWORD*, LPSTR, DWORD*);
40 static BOOL (WINAPI *pCryptGetDefaultProviderA)(DWORD, DWORD*, DWORD, LPSTR, DWORD*);
41 static BOOL (WINAPI *pCryptSetProviderExA)(LPCSTR, DWORD, DWORD*, DWORD);
43 static void init_function_pointers(void)
45 hadvapi32 = GetModuleHandleA("advapi32.dll");
47 if(hadvapi32)
49 pCryptEnumProviderTypesA = (void*)GetProcAddress(hadvapi32, "CryptEnumProviderTypesA");
50 pCryptEnumProvidersA = (void*)GetProcAddress(hadvapi32, "CryptEnumProvidersA");
51 pCryptGetDefaultProviderA = (void*)GetProcAddress(hadvapi32, "CryptGetDefaultProviderA");
52 pCryptSetProviderExA = (void*)GetProcAddress(hadvapi32, "CryptSetProviderExA");
57 static void init_environment(void)
59 HCRYPTPROV hProv;
61 /* Ensure that container "wine_test_keyset" does exist */
62 if (!CryptAcquireContext(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
64 CryptAcquireContext(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET);
66 CryptReleaseContext(hProv, 0);
68 /* Ensure that container "wine_test_keyset" does exist in default PROV_RSA_FULL type provider */
69 if (!CryptAcquireContext(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
71 CryptAcquireContext(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET);
73 CryptReleaseContext(hProv, 0);
75 /* Ensure that container "wine_test_bad_keyset" does not exist. */
76 if (CryptAcquireContext(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
78 CryptReleaseContext(hProv, 0);
79 CryptAcquireContext(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
83 static void clean_up_environment(void)
85 HCRYPTPROV hProv;
87 /* Remove container "wine_test_keyset" */
88 if (CryptAcquireContext(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
90 CryptReleaseContext(hProv, 0);
91 CryptAcquireContext(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
94 /* Remove container "wine_test_keyset" from default PROV_RSA_FULL type provider */
95 if (CryptAcquireContext(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
97 CryptReleaseContext(hProv, 0);
98 CryptAcquireContext(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
102 static void test_acquire_context(void)
104 BOOL result;
105 HCRYPTPROV hProv;
107 /* Provoke all kinds of error conditions (which are easy to provoke).
108 * The order of the error tests seems to match Windows XP's rsaenh.dll CSP,
109 * but since this is likely to change between CSP versions, we don't check
110 * this. Please don't change the order of tests. */
111 result = CryptAcquireContext(&hProv, NULL, NULL, 0, 0);
112 ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
114 result = CryptAcquireContext(&hProv, NULL, NULL, 1000, 0);
115 ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
117 result = CryptAcquireContext(&hProv, NULL, NULL, NON_DEF_PROV_TYPE, 0);
118 ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%ld\n", GetLastError());
120 result = CryptAcquireContext(&hProv, szKeySet, szNonExistentProv, PROV_RSA_FULL, 0);
121 ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%ld\n", GetLastError());
123 result = CryptAcquireContext(&hProv, szKeySet, szRsaBaseProv, NON_DEF_PROV_TYPE, 0);
124 ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%ld\n", GetLastError());
126 /* This test fails under Win2k SP4:
127 result = TRUE, GetLastError() == ERROR_INVALID_PARAMETER
128 SetLastError(0xdeadbeef);
129 result = CryptAcquireContext(NULL, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
130 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%ld\n", result, GetLastError());
133 /* Last not least, try to really acquire a context. */
134 hProv = 0;
135 SetLastError(0xdeadbeef);
136 result = CryptAcquireContext(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
137 ok(result && (GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_RING2_STACK_IN_USE), "%d/%ld\n", result, GetLastError());
139 if (hProv)
140 CryptReleaseContext(hProv, 0);
142 /* Try again, witch an empty ("\0") szProvider parameter */
143 hProv = 0;
144 SetLastError(0xdeadbeef);
145 result = CryptAcquireContext(&hProv, szKeySet, "", PROV_RSA_FULL, 0);
146 ok(result && (GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_RING2_STACK_IN_USE), "%d/%ld\n", result, GetLastError());
148 if (hProv)
149 CryptReleaseContext(hProv, 0);
152 static BOOL FindProvRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszProvName,
153 DWORD *pcbProvName, DWORD *pdwProvCount)
155 HKEY hKey;
156 HKEY subkey;
157 DWORD size = sizeof(DWORD);
159 if (RegOpenKey(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\Defaults\\Provider", &hKey))
160 return FALSE;
162 RegQueryInfoKey(hKey, NULL, NULL, NULL, pdwProvCount, pcbProvName,
163 NULL, NULL, NULL, NULL, NULL, NULL);
164 (*pcbProvName)++;
166 if (!(*pszProvName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbProvName))))
167 return FALSE;
169 RegEnumKeyEx(hKey, dwIndex, *pszProvName, pcbProvName, NULL, NULL, NULL, NULL);
170 (*pcbProvName)++;
172 RegOpenKey(hKey, *pszProvName, &subkey);
173 RegQueryValueEx(subkey, "Type", NULL, NULL, (BYTE*)pdwProvType, &size);
175 RegCloseKey(subkey);
176 RegCloseKey(hKey);
178 return TRUE;
181 static void test_enum_providers(void)
183 /* expected results */
184 CHAR *pszProvName = NULL;
185 DWORD cbName;
186 DWORD dwType;
187 DWORD provCount;
188 DWORD dwIndex = 0;
190 /* actual results */
191 CHAR *provider = NULL;
192 DWORD providerLen;
193 DWORD type;
194 DWORD count;
195 BOOL result;
196 DWORD notNull = 5;
197 DWORD notZeroFlags = 5;
199 if(!pCryptEnumProvidersA)
201 trace("skipping CryptEnumProviders tests\n");
202 return;
205 if (!FindProvRegVals(dwIndex, &dwType, &pszProvName, &cbName, &provCount))
206 return;
208 /* check pdwReserved flag for NULL */
209 result = pCryptEnumProvidersA(dwIndex, &notNull, 0, &type, NULL, &providerLen);
210 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
212 /* check dwFlags == 0 */
213 result = pCryptEnumProvidersA(dwIndex, NULL, notZeroFlags, &type, NULL, &providerLen);
214 ok(!result && GetLastError()==NTE_BAD_FLAGS, "%ld\n", GetLastError());
216 /* alloc provider to half the size required
217 * cbName holds the size required */
218 providerLen = cbName / 2;
219 if (!(provider = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, providerLen))))
220 return;
222 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
223 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
224 ERROR_MORE_DATA, GetLastError());
226 LocalFree(provider);
228 /* loop through the providers to get the number of providers
229 * after loop ends, count should be provCount + 1 so subtract 1
230 * to get actual number of providers */
231 count = 0;
232 while(pCryptEnumProvidersA(count++, NULL, 0, &type, NULL, &providerLen))
234 count--;
235 ok(count==provCount, "expected %i, got %i\n", (int)provCount, (int)count);
237 /* loop past the actual number of providers to get the error
238 * ERROR_NO_MORE_ITEMS */
239 for (count = 0; count < provCount + 1; count++)
240 result = pCryptEnumProvidersA(count, NULL, 0, &type, NULL, &providerLen);
241 ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
242 ERROR_NO_MORE_ITEMS, GetLastError());
244 /* check expected versus actual values returned */
245 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, NULL, &providerLen);
246 ok(result && providerLen==cbName, "expected %i, got %i\n", (int)cbName, (int)providerLen);
247 if (!(provider = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, providerLen))))
248 return;
250 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
251 ok(result && type==dwType, "expected %ld, got %ld\n",
252 dwType, type);
253 ok(result && !strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
254 ok(result && cbName==providerLen, "expected %ld, got %ld\n",
255 cbName, providerLen);
257 LocalFree(provider);
260 static BOOL FindProvTypesRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszTypeName,
261 DWORD *pcbTypeName, DWORD *pdwTypeCount)
263 HKEY hKey;
264 HKEY hSubKey;
265 PSTR ch;
267 if (RegOpenKey(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\Defaults\\Provider Types", &hKey))
268 return FALSE;
270 if (RegQueryInfoKey(hKey, NULL, NULL, NULL, pdwTypeCount, pcbTypeName, NULL,
271 NULL, NULL, NULL, NULL, NULL))
272 return FALSE;
273 (*pcbTypeName)++;
275 if (!(*pszTypeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbTypeName))))
276 return FALSE;
278 if (RegEnumKeyEx(hKey, dwIndex, *pszTypeName, pcbTypeName, NULL, NULL, NULL, NULL))
279 return FALSE;
280 (*pcbTypeName)++;
281 ch = *pszTypeName + strlen(*pszTypeName);
282 /* Convert "Type 000" to 0, etc/ */
283 *pdwProvType = *(--ch) - '0';
284 *pdwProvType += (*(--ch) - '0') * 10;
285 *pdwProvType += (*(--ch) - '0') * 100;
287 if (RegOpenKey(hKey, *pszTypeName, &hSubKey))
288 return FALSE;
290 if (RegQueryValueEx(hSubKey, "TypeName", NULL, NULL, NULL, pcbTypeName))
291 return FALSE;
293 if (!(*pszTypeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbTypeName))))
294 return FALSE;
296 if (RegQueryValueEx(hSubKey, "TypeName", NULL, NULL, *pszTypeName, pcbTypeName))
297 return FALSE;
299 RegCloseKey(hSubKey);
300 RegCloseKey(hKey);
302 return TRUE;
305 static void test_enum_provider_types()
307 /* expected values */
308 DWORD dwProvType;
309 LPSTR pszTypeName = NULL;
310 DWORD cbTypeName;
311 DWORD dwTypeCount;
313 /* actual values */
314 DWORD index = 0;
315 DWORD provType;
316 LPSTR typeName = NULL;
317 DWORD typeNameSize;
318 DWORD typeCount;
319 DWORD result;
320 DWORD notNull = 5;
321 DWORD notZeroFlags = 5;
323 if(!pCryptEnumProviderTypesA)
325 trace("skipping CryptEnumProviderTypes tests\n");
326 return;
329 if (!FindProvTypesRegVals(index, &dwProvType, &pszTypeName, &cbTypeName, &dwTypeCount))
331 trace("could not find provider types in registry, skipping the test\n");
332 return;
335 /* check pdwReserved for NULL */
336 result = pCryptEnumProviderTypesA(index, &notNull, 0, &provType, typeName, &typeNameSize);
337 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
338 ERROR_INVALID_PARAMETER, GetLastError());
340 /* check dwFlags == zero */
341 result = pCryptEnumProviderTypesA(index, NULL, notZeroFlags, &provType, typeName, &typeNameSize);
342 ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %i, got %ld\n",
343 ERROR_INVALID_PARAMETER, GetLastError());
345 /* alloc provider type to half the size required
346 * cbTypeName holds the size required */
347 typeNameSize = cbTypeName / 2;
348 if (!(typeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, typeNameSize))))
349 return;
351 /* This test fails under Win2k SP4:
352 result = TRUE, GetLastError() == 0xdeadbeef
353 SetLastError(0xdeadbeef);
354 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
355 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %d/%08lx\n",
356 result, GetLastError());
359 LocalFree(typeName);
361 /* loop through the provider types to get the number of provider types
362 * after loop ends, count should be dwTypeCount + 1 so subtract 1
363 * to get actual number of provider types */
364 typeCount = 0;
365 while(pCryptEnumProviderTypesA(typeCount++, NULL, 0, &provType, NULL, &typeNameSize))
367 typeCount--;
368 ok(typeCount==dwTypeCount, "expected %ld, got %ld\n", dwTypeCount, typeCount);
370 /* loop past the actual number of provider types to get the error
371 * ERROR_NO_MORE_ITEMS */
372 for (typeCount = 0; typeCount < dwTypeCount + 1; typeCount++)
373 result = pCryptEnumProviderTypesA(typeCount, NULL, 0, &provType, NULL, &typeNameSize);
374 ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
375 ERROR_NO_MORE_ITEMS, GetLastError());
378 /* check expected versus actual values returned */
379 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, NULL, &typeNameSize);
380 ok(result && typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
381 if (!(typeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, typeNameSize))))
382 return;
384 typeNameSize = 0xdeadbeef;
385 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
386 ok(result, "expected TRUE, got %ld\n", result);
387 ok(provType==dwProvType, "expected %ld, got %ld\n", dwProvType, provType);
388 if (pszTypeName)
389 ok(!strcmp(pszTypeName, typeName), "expected %s, got %s\n", pszTypeName, typeName);
390 ok(typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
392 LocalFree(typeName);
395 static BOOL FindDfltProvRegVals(DWORD dwProvType, DWORD dwFlags, LPSTR *pszProvName, DWORD *pcbProvName)
397 HKEY hKey;
398 PSTR keyname;
399 PSTR ptr;
400 DWORD user = dwFlags & CRYPT_USER_DEFAULT;
402 LPSTR MACHINESTR = "Software\\Microsoft\\Cryptography\\Defaults\\Provider Types\\Type XXX";
403 LPSTR USERSTR = "Software\\Microsoft\\Cryptography\\Provider Type XXX";
405 keyname = LocalAlloc(LMEM_ZEROINIT, (user ? strlen(USERSTR) : strlen(MACHINESTR)) + 1);
406 if (keyname)
408 user ? strcpy(keyname, USERSTR) : strcpy(keyname, MACHINESTR);
409 ptr = keyname + strlen(keyname);
410 *(--ptr) = (dwProvType % 10) + '0';
411 *(--ptr) = ((dwProvType / 10) % 10) + '0';
412 *(--ptr) = (dwProvType / 100) + '0';
413 } else
414 return FALSE;
416 if (RegOpenKey((dwFlags & CRYPT_USER_DEFAULT) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE ,keyname, &hKey))
418 LocalFree(keyname);
419 return FALSE;
421 LocalFree(keyname);
423 if (RegQueryValueEx(hKey, "Name", NULL, NULL, *pszProvName, pcbProvName))
425 if (GetLastError() != ERROR_MORE_DATA)
426 SetLastError(NTE_PROV_TYPE_ENTRY_BAD);
427 return FALSE;
430 if (!(*pszProvName = LocalAlloc(LMEM_ZEROINIT, *pcbProvName)))
431 return FALSE;
433 if (RegQueryValueEx(hKey, "Name", NULL, NULL, *pszProvName, pcbProvName))
435 if (GetLastError() != ERROR_MORE_DATA)
436 SetLastError(NTE_PROV_TYPE_ENTRY_BAD);
437 return FALSE;
440 RegCloseKey(hKey);
442 return TRUE;
445 static void test_get_default_provider()
447 /* expected results */
448 DWORD dwProvType = PROV_RSA_FULL;
449 DWORD dwFlags = CRYPT_MACHINE_DEFAULT;
450 LPSTR pszProvName = NULL;
451 DWORD cbProvName;
453 /* actual results */
454 DWORD provType = PROV_RSA_FULL;
455 DWORD flags = CRYPT_MACHINE_DEFAULT;
456 LPSTR provName = NULL;
457 DWORD provNameSize;
458 DWORD result;
459 DWORD notNull = 5;
461 if(!pCryptGetDefaultProviderA)
463 trace("skipping CryptGetDefaultProvider tests\n");
464 return;
467 FindDfltProvRegVals(dwProvType, dwFlags, &pszProvName, &cbProvName);
469 /* check pdwReserved for NULL */
470 result = pCryptGetDefaultProviderA(provType, &notNull, flags, provName, &provNameSize);
471 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
472 ERROR_INVALID_PARAMETER, GetLastError());
474 /* check for invalid flag */
475 flags = 0xdeadbeef;
476 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
477 ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %ld, got %ld\n",
478 NTE_BAD_FLAGS, GetLastError());
479 flags = CRYPT_MACHINE_DEFAULT;
481 /* check for invalid prov type */
482 provType = 0xdeadbeef;
483 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
484 ok(!result && (GetLastError() == NTE_BAD_PROV_TYPE ||
485 GetLastError() == ERROR_INVALID_PARAMETER),
486 "expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %ld/%ld\n",
487 result, GetLastError());
488 provType = PROV_RSA_FULL;
490 SetLastError(0);
492 /* alloc provName to half the size required
493 * cbProvName holds the size required */
494 provNameSize = cbProvName / 2;
495 if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
496 return;
498 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
499 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
500 ERROR_MORE_DATA, GetLastError());
502 LocalFree(provName);
504 /* check expected versus actual values returned */
505 result = pCryptGetDefaultProviderA(provType, NULL, flags, NULL, &provNameSize);
506 ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
507 provNameSize = cbProvName;
509 if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
510 return;
512 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
513 ok(result && !strcmp(pszProvName, provName), "expected %s, got %s\n", pszProvName, provName);
514 ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
516 LocalFree(provName);
519 static void test_set_provider_ex()
521 DWORD result;
522 DWORD notNull = 5;
524 /* results */
525 LPSTR pszProvName = NULL;
526 DWORD cbProvName;
528 if(!pCryptGetDefaultProviderA || !pCryptSetProviderExA)
530 trace("skipping CryptSetProviderEx tests\n");
531 return;
534 /* check pdwReserved for NULL */
535 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, &notNull, CRYPT_MACHINE_DEFAULT);
536 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
537 ERROR_INVALID_PARAMETER, GetLastError());
539 /* remove the default provider and then set it to MS_DEF_PROV/PROV_RSA_FULL */
540 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT | CRYPT_DELETE_DEFAULT);
541 ok(result, "%ld\n", GetLastError());
543 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
544 ok(result, "%ld\n", GetLastError());
546 /* call CryptGetDefaultProvider to see if they match */
547 result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, NULL, &cbProvName);
548 if (!(pszProvName = LocalAlloc(LMEM_ZEROINIT, cbProvName)))
549 return;
551 result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, pszProvName, &cbProvName);
552 ok(result && !strcmp(MS_DEF_PROV, pszProvName), "expected %s, got %s\n", MS_DEF_PROV, pszProvName);
553 ok(result && cbProvName==(strlen(MS_DEF_PROV) + 1), "expected %i, got %ld\n", (strlen(MS_DEF_PROV) + 1), cbProvName);
555 LocalFree(pszProvName);
558 START_TEST(crypt)
560 init_function_pointers();
561 init_environment();
562 test_acquire_context();
563 clean_up_environment();
565 test_enum_providers();
566 test_enum_provider_types();
567 test_get_default_provider();
568 test_set_provider_ex();