Make advapi32_test.exe loadable on NT 3.51.
[wine/wine64.git] / dlls / advapi32 / tests / crypt.c
blob3a49388d217d9c5ca77914dc65abf68d466a90f2
1 /*
2 * Unit tests for crypt functions
4 * Copyright (c) 2004 Michael Jung
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 #include <stdarg.h>
23 #include "windef.h"
24 #include "winbase.h"
25 #include "wincrypt.h"
26 #include "winerror.h"
27 #include "winreg.h"
29 #include "wine/test.h"
31 static const char szRsaBaseProv[] = MS_DEF_PROV_A;
32 static const char szNonExistentProv[] = "Wine Nonexistent Cryptographic Provider v11.2";
33 static const char szKeySet[] = "wine_test_keyset";
34 static const char szBadKeySet[] = "wine_test_bad_keyset";
35 #define NON_DEF_PROV_TYPE 999
37 static HMODULE hadvapi32;
38 static BOOL (WINAPI *pCryptAcquireContextA)(HCRYPTPROV*,LPCSTR,LPCSTR,DWORD,DWORD);
39 static BOOL (WINAPI *pCryptEnumProviderTypesA)(DWORD, DWORD*, DWORD, DWORD*, LPSTR, DWORD*);
40 static BOOL (WINAPI *pCryptEnumProvidersA)(DWORD, DWORD*, DWORD, DWORD*, LPSTR, DWORD*);
41 static BOOL (WINAPI *pCryptGetDefaultProviderA)(DWORD, DWORD*, DWORD, LPSTR, DWORD*);
42 static BOOL (WINAPI *pCryptReleaseContext)(HCRYPTPROV, DWORD);
43 static BOOL (WINAPI *pCryptSetProviderExA)(LPCSTR, DWORD, DWORD*, DWORD);
45 static void init_function_pointers(void)
47 hadvapi32 = GetModuleHandleA("advapi32.dll");
49 if(hadvapi32)
51 pCryptAcquireContextA = (void*)GetProcAddress(hadvapi32, "CryptAcquireContextA");
52 pCryptEnumProviderTypesA = (void*)GetProcAddress(hadvapi32, "CryptEnumProviderTypesA");
53 pCryptEnumProvidersA = (void*)GetProcAddress(hadvapi32, "CryptEnumProvidersA");
54 pCryptGetDefaultProviderA = (void*)GetProcAddress(hadvapi32, "CryptGetDefaultProviderA");
55 pCryptReleaseContext = (void*)GetProcAddress(hadvapi32, "CryptReleaseContext");
56 pCryptSetProviderExA = (void*)GetProcAddress(hadvapi32, "CryptSetProviderExA");
61 static void init_environment(void)
63 HCRYPTPROV hProv;
65 /* Ensure that container "wine_test_keyset" does exist */
66 if (!pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
68 pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET);
70 pCryptReleaseContext(hProv, 0);
72 /* Ensure that container "wine_test_keyset" does exist in default PROV_RSA_FULL type provider */
73 if (!pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
75 pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET);
77 pCryptReleaseContext(hProv, 0);
79 /* Ensure that container "wine_test_bad_keyset" does not exist. */
80 if (pCryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
82 pCryptReleaseContext(hProv, 0);
83 pCryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
87 static void clean_up_environment(void)
89 HCRYPTPROV hProv;
91 /* Remove container "wine_test_keyset" */
92 if (pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
94 pCryptReleaseContext(hProv, 0);
95 pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
98 /* Remove container "wine_test_keyset" from default PROV_RSA_FULL type provider */
99 if (pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
101 pCryptReleaseContext(hProv, 0);
102 pCryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
106 static void test_acquire_context(void)
108 BOOL result;
109 HCRYPTPROV hProv;
111 /* Provoke all kinds of error conditions (which are easy to provoke).
112 * The order of the error tests seems to match Windows XP's rsaenh.dll CSP,
113 * but since this is likely to change between CSP versions, we don't check
114 * this. Please don't change the order of tests. */
115 result = pCryptAcquireContextA(&hProv, NULL, NULL, 0, 0);
116 ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
118 result = pCryptAcquireContextA(&hProv, NULL, NULL, 1000, 0);
119 ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
121 result = pCryptAcquireContextA(&hProv, NULL, NULL, NON_DEF_PROV_TYPE, 0);
122 ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%ld\n", GetLastError());
124 result = pCryptAcquireContextA(&hProv, szKeySet, szNonExistentProv, PROV_RSA_FULL, 0);
125 ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%ld\n", GetLastError());
127 result = pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, NON_DEF_PROV_TYPE, 0);
128 ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%ld\n", GetLastError());
130 /* This test fails under Win2k SP4:
131 result = TRUE, GetLastError() == ERROR_INVALID_PARAMETER
132 SetLastError(0xdeadbeef);
133 result = pCryptAcquireContextA(NULL, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
134 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%ld\n", result, GetLastError());
137 /* Last not least, try to really acquire a context. */
138 hProv = 0;
139 SetLastError(0xdeadbeef);
140 result = pCryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
141 ok(result && (GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_RING2_STACK_IN_USE), "%d/%ld\n", result, GetLastError());
143 if (hProv)
144 pCryptReleaseContext(hProv, 0);
146 /* Try again, witch an empty ("\0") szProvider parameter */
147 hProv = 0;
148 SetLastError(0xdeadbeef);
149 result = pCryptAcquireContextA(&hProv, szKeySet, "", PROV_RSA_FULL, 0);
150 ok(result && (GetLastError() == ERROR_SUCCESS || GetLastError() == ERROR_RING2_STACK_IN_USE), "%d/%ld\n", result, GetLastError());
152 if (hProv)
153 pCryptReleaseContext(hProv, 0);
156 static BOOL FindProvRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszProvName,
157 DWORD *pcbProvName, DWORD *pdwProvCount)
159 HKEY hKey;
160 HKEY subkey;
161 DWORD size = sizeof(DWORD);
163 if (RegOpenKey(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\Defaults\\Provider", &hKey))
164 return FALSE;
166 RegQueryInfoKey(hKey, NULL, NULL, NULL, pdwProvCount, pcbProvName,
167 NULL, NULL, NULL, NULL, NULL, NULL);
168 (*pcbProvName)++;
170 if (!(*pszProvName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbProvName))))
171 return FALSE;
173 RegEnumKeyEx(hKey, dwIndex, *pszProvName, pcbProvName, NULL, NULL, NULL, NULL);
174 (*pcbProvName)++;
176 RegOpenKey(hKey, *pszProvName, &subkey);
177 RegQueryValueEx(subkey, "Type", NULL, NULL, (BYTE*)pdwProvType, &size);
179 RegCloseKey(subkey);
180 RegCloseKey(hKey);
182 return TRUE;
185 static void test_enum_providers(void)
187 /* expected results */
188 CHAR *pszProvName = NULL;
189 DWORD cbName;
190 DWORD dwType;
191 DWORD provCount;
192 DWORD dwIndex = 0;
194 /* actual results */
195 CHAR *provider = NULL;
196 DWORD providerLen;
197 DWORD type;
198 DWORD count;
199 BOOL result;
200 DWORD notNull = 5;
201 DWORD notZeroFlags = 5;
203 if(!pCryptEnumProvidersA)
205 trace("skipping CryptEnumProviders tests\n");
206 return;
209 if (!FindProvRegVals(dwIndex, &dwType, &pszProvName, &cbName, &provCount))
210 return;
212 /* check pdwReserved flag for NULL */
213 result = pCryptEnumProvidersA(dwIndex, &notNull, 0, &type, NULL, &providerLen);
214 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
216 /* check dwFlags == 0 */
217 result = pCryptEnumProvidersA(dwIndex, NULL, notZeroFlags, &type, NULL, &providerLen);
218 ok(!result && GetLastError()==NTE_BAD_FLAGS, "%ld\n", GetLastError());
220 /* alloc provider to half the size required
221 * cbName holds the size required */
222 providerLen = cbName / 2;
223 if (!(provider = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, providerLen))))
224 return;
226 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
227 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
228 ERROR_MORE_DATA, GetLastError());
230 LocalFree(provider);
232 /* loop through the providers to get the number of providers
233 * after loop ends, count should be provCount + 1 so subtract 1
234 * to get actual number of providers */
235 count = 0;
236 while(pCryptEnumProvidersA(count++, NULL, 0, &type, NULL, &providerLen))
238 count--;
239 ok(count==provCount, "expected %i, got %i\n", (int)provCount, (int)count);
241 /* loop past the actual number of providers to get the error
242 * ERROR_NO_MORE_ITEMS */
243 for (count = 0; count < provCount + 1; count++)
244 result = pCryptEnumProvidersA(count, NULL, 0, &type, NULL, &providerLen);
245 ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
246 ERROR_NO_MORE_ITEMS, GetLastError());
248 /* check expected versus actual values returned */
249 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, NULL, &providerLen);
250 ok(result && providerLen==cbName, "expected %i, got %i\n", (int)cbName, (int)providerLen);
251 if (!(provider = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, providerLen))))
252 return;
254 result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
255 ok(result && type==dwType, "expected %ld, got %ld\n",
256 dwType, type);
257 ok(result && !strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
258 ok(result && cbName==providerLen, "expected %ld, got %ld\n",
259 cbName, providerLen);
261 LocalFree(provider);
264 static BOOL FindProvTypesRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszTypeName,
265 DWORD *pcbTypeName, DWORD *pdwTypeCount)
267 HKEY hKey;
268 HKEY hSubKey;
269 PSTR ch;
271 if (RegOpenKey(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\Defaults\\Provider Types", &hKey))
272 return FALSE;
274 if (RegQueryInfoKey(hKey, NULL, NULL, NULL, pdwTypeCount, pcbTypeName, NULL,
275 NULL, NULL, NULL, NULL, NULL))
276 return FALSE;
277 (*pcbTypeName)++;
279 if (!(*pszTypeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbTypeName))))
280 return FALSE;
282 if (RegEnumKeyEx(hKey, dwIndex, *pszTypeName, pcbTypeName, NULL, NULL, NULL, NULL))
283 return FALSE;
284 (*pcbTypeName)++;
285 ch = *pszTypeName + strlen(*pszTypeName);
286 /* Convert "Type 000" to 0, etc/ */
287 *pdwProvType = *(--ch) - '0';
288 *pdwProvType += (*(--ch) - '0') * 10;
289 *pdwProvType += (*(--ch) - '0') * 100;
291 if (RegOpenKey(hKey, *pszTypeName, &hSubKey))
292 return FALSE;
294 if (RegQueryValueEx(hSubKey, "TypeName", NULL, NULL, NULL, pcbTypeName))
295 return FALSE;
297 if (!(*pszTypeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, *pcbTypeName))))
298 return FALSE;
300 if (RegQueryValueEx(hSubKey, "TypeName", NULL, NULL, *pszTypeName, pcbTypeName))
301 return FALSE;
303 RegCloseKey(hSubKey);
304 RegCloseKey(hKey);
306 return TRUE;
309 static void test_enum_provider_types()
311 /* expected values */
312 DWORD dwProvType;
313 LPSTR pszTypeName = NULL;
314 DWORD cbTypeName;
315 DWORD dwTypeCount;
317 /* actual values */
318 DWORD index = 0;
319 DWORD provType;
320 LPSTR typeName = NULL;
321 DWORD typeNameSize;
322 DWORD typeCount;
323 DWORD result;
324 DWORD notNull = 5;
325 DWORD notZeroFlags = 5;
327 if(!pCryptEnumProviderTypesA)
329 trace("skipping CryptEnumProviderTypes tests\n");
330 return;
333 if (!FindProvTypesRegVals(index, &dwProvType, &pszTypeName, &cbTypeName, &dwTypeCount))
335 trace("could not find provider types in registry, skipping the test\n");
336 return;
339 /* check pdwReserved for NULL */
340 result = pCryptEnumProviderTypesA(index, &notNull, 0, &provType, typeName, &typeNameSize);
341 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
342 ERROR_INVALID_PARAMETER, GetLastError());
344 /* check dwFlags == zero */
345 result = pCryptEnumProviderTypesA(index, NULL, notZeroFlags, &provType, typeName, &typeNameSize);
346 ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %i, got %ld\n",
347 ERROR_INVALID_PARAMETER, GetLastError());
349 /* alloc provider type to half the size required
350 * cbTypeName holds the size required */
351 typeNameSize = cbTypeName / 2;
352 if (!(typeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, typeNameSize))))
353 return;
355 /* This test fails under Win2k SP4:
356 result = TRUE, GetLastError() == 0xdeadbeef
357 SetLastError(0xdeadbeef);
358 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
359 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %d/%08lx\n",
360 result, GetLastError());
363 LocalFree(typeName);
365 /* loop through the provider types to get the number of provider types
366 * after loop ends, count should be dwTypeCount + 1 so subtract 1
367 * to get actual number of provider types */
368 typeCount = 0;
369 while(pCryptEnumProviderTypesA(typeCount++, NULL, 0, &provType, NULL, &typeNameSize))
371 typeCount--;
372 ok(typeCount==dwTypeCount, "expected %ld, got %ld\n", dwTypeCount, typeCount);
374 /* loop past the actual number of provider types to get the error
375 * ERROR_NO_MORE_ITEMS */
376 for (typeCount = 0; typeCount < dwTypeCount + 1; typeCount++)
377 result = pCryptEnumProviderTypesA(typeCount, NULL, 0, &provType, NULL, &typeNameSize);
378 ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
379 ERROR_NO_MORE_ITEMS, GetLastError());
382 /* check expected versus actual values returned */
383 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, NULL, &typeNameSize);
384 ok(result && typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
385 if (!(typeName = ((LPSTR)LocalAlloc(LMEM_ZEROINIT, typeNameSize))))
386 return;
388 typeNameSize = 0xdeadbeef;
389 result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
390 ok(result, "expected TRUE, got %ld\n", result);
391 ok(provType==dwProvType, "expected %ld, got %ld\n", dwProvType, provType);
392 if (pszTypeName)
393 ok(!strcmp(pszTypeName, typeName), "expected %s, got %s\n", pszTypeName, typeName);
394 ok(typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
396 LocalFree(typeName);
399 static BOOL FindDfltProvRegVals(DWORD dwProvType, DWORD dwFlags, LPSTR *pszProvName, DWORD *pcbProvName)
401 HKEY hKey;
402 PSTR keyname;
403 PSTR ptr;
404 DWORD user = dwFlags & CRYPT_USER_DEFAULT;
406 LPSTR MACHINESTR = "Software\\Microsoft\\Cryptography\\Defaults\\Provider Types\\Type XXX";
407 LPSTR USERSTR = "Software\\Microsoft\\Cryptography\\Provider Type XXX";
409 keyname = LocalAlloc(LMEM_ZEROINIT, (user ? strlen(USERSTR) : strlen(MACHINESTR)) + 1);
410 if (keyname)
412 user ? strcpy(keyname, USERSTR) : strcpy(keyname, MACHINESTR);
413 ptr = keyname + strlen(keyname);
414 *(--ptr) = (dwProvType % 10) + '0';
415 *(--ptr) = ((dwProvType / 10) % 10) + '0';
416 *(--ptr) = (dwProvType / 100) + '0';
417 } else
418 return FALSE;
420 if (RegOpenKey((dwFlags & CRYPT_USER_DEFAULT) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE ,keyname, &hKey))
422 LocalFree(keyname);
423 return FALSE;
425 LocalFree(keyname);
427 if (RegQueryValueEx(hKey, "Name", NULL, NULL, *pszProvName, pcbProvName))
429 if (GetLastError() != ERROR_MORE_DATA)
430 SetLastError(NTE_PROV_TYPE_ENTRY_BAD);
431 return FALSE;
434 if (!(*pszProvName = LocalAlloc(LMEM_ZEROINIT, *pcbProvName)))
435 return FALSE;
437 if (RegQueryValueEx(hKey, "Name", NULL, NULL, *pszProvName, pcbProvName))
439 if (GetLastError() != ERROR_MORE_DATA)
440 SetLastError(NTE_PROV_TYPE_ENTRY_BAD);
441 return FALSE;
444 RegCloseKey(hKey);
446 return TRUE;
449 static void test_get_default_provider()
451 /* expected results */
452 DWORD dwProvType = PROV_RSA_FULL;
453 DWORD dwFlags = CRYPT_MACHINE_DEFAULT;
454 LPSTR pszProvName = NULL;
455 DWORD cbProvName;
457 /* actual results */
458 DWORD provType = PROV_RSA_FULL;
459 DWORD flags = CRYPT_MACHINE_DEFAULT;
460 LPSTR provName = NULL;
461 DWORD provNameSize;
462 DWORD result;
463 DWORD notNull = 5;
465 if(!pCryptGetDefaultProviderA)
467 trace("skipping CryptGetDefaultProvider tests\n");
468 return;
471 FindDfltProvRegVals(dwProvType, dwFlags, &pszProvName, &cbProvName);
473 /* check pdwReserved for NULL */
474 result = pCryptGetDefaultProviderA(provType, &notNull, flags, provName, &provNameSize);
475 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
476 ERROR_INVALID_PARAMETER, GetLastError());
478 /* check for invalid flag */
479 flags = 0xdeadbeef;
480 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
481 ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %ld, got %ld\n",
482 NTE_BAD_FLAGS, GetLastError());
483 flags = CRYPT_MACHINE_DEFAULT;
485 /* check for invalid prov type */
486 provType = 0xdeadbeef;
487 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
488 ok(!result && (GetLastError() == NTE_BAD_PROV_TYPE ||
489 GetLastError() == ERROR_INVALID_PARAMETER),
490 "expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %ld/%ld\n",
491 result, GetLastError());
492 provType = PROV_RSA_FULL;
494 SetLastError(0);
496 /* alloc provName to half the size required
497 * cbProvName holds the size required */
498 provNameSize = cbProvName / 2;
499 if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
500 return;
502 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
503 ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
504 ERROR_MORE_DATA, GetLastError());
506 LocalFree(provName);
508 /* check expected versus actual values returned */
509 result = pCryptGetDefaultProviderA(provType, NULL, flags, NULL, &provNameSize);
510 ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
511 provNameSize = cbProvName;
513 if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
514 return;
516 result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
517 ok(result && !strcmp(pszProvName, provName), "expected %s, got %s\n", pszProvName, provName);
518 ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
520 LocalFree(provName);
523 static void test_set_provider_ex()
525 DWORD result;
526 DWORD notNull = 5;
528 /* results */
529 LPSTR pszProvName = NULL;
530 DWORD cbProvName;
532 if(!pCryptGetDefaultProviderA || !pCryptSetProviderExA)
534 trace("skipping CryptSetProviderEx tests\n");
535 return;
538 /* check pdwReserved for NULL */
539 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, &notNull, CRYPT_MACHINE_DEFAULT);
540 ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
541 ERROR_INVALID_PARAMETER, GetLastError());
543 /* remove the default provider and then set it to MS_DEF_PROV/PROV_RSA_FULL */
544 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT | CRYPT_DELETE_DEFAULT);
545 ok(result, "%ld\n", GetLastError());
547 result = pCryptSetProviderExA(MS_DEF_PROV, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
548 ok(result, "%ld\n", GetLastError());
550 /* call CryptGetDefaultProvider to see if they match */
551 result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, NULL, &cbProvName);
552 if (!(pszProvName = LocalAlloc(LMEM_ZEROINIT, cbProvName)))
553 return;
555 result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, pszProvName, &cbProvName);
556 ok(result && !strcmp(MS_DEF_PROV, pszProvName), "expected %s, got %s\n", MS_DEF_PROV, pszProvName);
557 ok(result && cbProvName==(strlen(MS_DEF_PROV) + 1), "expected %i, got %ld\n", (strlen(MS_DEF_PROV) + 1), cbProvName);
559 LocalFree(pszProvName);
562 START_TEST(crypt)
564 init_function_pointers();
565 if(pCryptAcquireContextA && pCryptReleaseContext) {
566 init_environment();
567 test_acquire_context();
568 clean_up_environment();
571 test_enum_providers();
572 test_enum_provider_types();
573 test_get_default_provider();
574 test_set_provider_ex();