2005-06-02 10:34:03 +00:00
|
|
|
/*
|
2005-06-08 18:31:21 +00:00
|
|
|
* Unit test suite for crypt32.dll's CryptEncodeObjectEx/CryptDecodeObjectEx
|
2005-06-02 10:34:03 +00:00
|
|
|
*
|
|
|
|
* Copyright 2005 Juan Lang
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <windef.h>
|
|
|
|
#include <winbase.h>
|
|
|
|
#include <winerror.h>
|
|
|
|
#include <wincrypt.h>
|
|
|
|
|
|
|
|
#include "wine/test.h"
|
|
|
|
|
|
|
|
struct encodedInt
|
|
|
|
{
|
|
|
|
int val;
|
|
|
|
BYTE encoded[6];
|
|
|
|
};
|
|
|
|
|
2005-06-04 09:49:33 +00:00
|
|
|
static const struct encodedInt ints[] = {
|
|
|
|
{ 1, { 2, 1, 1 } },
|
|
|
|
{ 127, { 2, 1, 0x7f } },
|
|
|
|
{ 128, { 2, 2, 0x00, 0x80 } },
|
|
|
|
{ 256, { 2, 2, 0x01, 0x00 } },
|
|
|
|
{ -128, { 2, 1, 0x80 } },
|
|
|
|
{ -129, { 2, 2, 0xff, 0x7f } },
|
|
|
|
{ 0xbaddf00d, { 2, 4, 0xba, 0xdd, 0xf0, 0x0d } },
|
|
|
|
};
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
static void test_encodeint(DWORD dwEncoding)
|
2005-06-02 10:34:03 +00:00
|
|
|
{
|
|
|
|
DWORD bufSize = 0;
|
|
|
|
int i;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
/* CryptEncodeObjectEx with NULL bufSize crashes..
|
|
|
|
ret = CryptEncodeObjectEx(3, X509_INTEGER, &ints[0].val, 0, NULL, NULL,
|
|
|
|
NULL);
|
|
|
|
*/
|
|
|
|
/* check bogus encoding */
|
|
|
|
ret = CryptEncodeObjectEx(0, X509_INTEGER, &ints[0].val, 0, NULL, NULL,
|
|
|
|
&bufSize);
|
|
|
|
ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
|
|
|
"Expected ERROR_FILE_NOT_FOUND, got %ld\n", GetLastError());
|
|
|
|
/* check with NULL integer buffer. Windows XP incorrectly returns an
|
|
|
|
* NTSTATUS.
|
|
|
|
*/
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_INTEGER, NULL, 0, NULL, NULL,
|
|
|
|
&bufSize);
|
|
|
|
ok(!ret && GetLastError() == STATUS_ACCESS_VIOLATION,
|
|
|
|
"Expected STATUS_ACCESS_VIOLATION, got %08lx\n", GetLastError());
|
2005-06-02 10:34:03 +00:00
|
|
|
for (i = 0; i < sizeof(ints) / sizeof(ints[0]); i++)
|
|
|
|
{
|
|
|
|
BYTE *buf = NULL;
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_INTEGER, &ints[i].val, 0,
|
|
|
|
NULL, NULL, &bufSize);
|
2005-06-10 19:28:58 +00:00
|
|
|
ok(ret, "Expected success, got %ld\n", GetLastError());
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_INTEGER, &ints[i].val,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &bufSize);
|
2005-06-02 10:34:03 +00:00
|
|
|
ok(ret, "CryptEncodeObjectEx failed: %ld\n", GetLastError());
|
2005-06-13 11:39:35 +00:00
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(buf[0] == 2, "Got unexpected type %d for integer (expected 2)\n",
|
|
|
|
buf[0]);
|
|
|
|
ok(!memcmp(buf + 1, ints[i].encoded + 1, ints[i].encoded[1] + 1),
|
|
|
|
"Encoded value of 0x%08x didn't match expected\n", ints[i].val);
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
2005-06-02 10:34:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
static void test_decodeint(DWORD dwEncoding)
|
2005-06-04 09:49:33 +00:00
|
|
|
{
|
|
|
|
static const char bigInt[] = { 2, 5, 0xff, 0xfe, 0xff, 0xfe, 0xff };
|
2005-06-13 11:39:35 +00:00
|
|
|
static const char testStr[] = { 0x16, 4, 't', 'e', 's', 't' };
|
2005-06-04 09:49:33 +00:00
|
|
|
BYTE *buf = NULL;
|
|
|
|
DWORD bufSize = 0;
|
|
|
|
int i;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
/* CryptDecodeObjectEx with NULL bufSize crashes..
|
|
|
|
ret = CryptDecodeObjectEx(3, X509_INTEGER, &ints[0].encoded,
|
|
|
|
ints[0].encoded[1] + 2, 0, NULL, NULL, NULL);
|
|
|
|
*/
|
|
|
|
/* check bogus encoding */
|
|
|
|
ret = CryptDecodeObjectEx(3, X509_INTEGER, (BYTE *)&ints[0].encoded,
|
|
|
|
ints[0].encoded[1] + 2, 0, NULL, NULL, &bufSize);
|
|
|
|
ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
|
|
|
"Expected ERROR_FILE_NOT_FOUND, got %ld\n", GetLastError());
|
2005-06-13 11:39:35 +00:00
|
|
|
/* check with NULL integer buffer */
|
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_INTEGER, NULL, 0, 0, NULL, NULL,
|
|
|
|
&bufSize);
|
|
|
|
ok(!ret && GetLastError() == CRYPT_E_ASN1_EOD,
|
|
|
|
"Expected CRYPT_E_ASN1_EOD, got %08lx\n", GetLastError());
|
2005-06-04 09:49:33 +00:00
|
|
|
/* check with a valid, but too large, integer */
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_INTEGER, bigInt, bigInt[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &bufSize);
|
2005-06-04 09:49:33 +00:00
|
|
|
ok(!ret && GetLastError() == CRYPT_E_ASN1_LARGE,
|
|
|
|
"Expected CRYPT_E_ASN1_LARGE, got %ld\n", GetLastError());
|
|
|
|
/* check with a DER-encoded string */
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_INTEGER, testStr, testStr[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &bufSize);
|
2005-06-04 09:49:33 +00:00
|
|
|
ok(!ret && GetLastError() == CRYPT_E_ASN1_BADTAG,
|
|
|
|
"Expected CRYPT_E_ASN1_BADTAG, got %ld\n", GetLastError());
|
|
|
|
for (i = 0; i < sizeof(ints) / sizeof(ints[0]); i++)
|
|
|
|
{
|
2005-06-10 19:28:58 +00:00
|
|
|
/* When the output buffer is NULL, this always succeeds */
|
|
|
|
SetLastError(0xdeadbeef);
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_INTEGER,
|
2005-06-04 09:49:33 +00:00
|
|
|
(BYTE *)&ints[i].encoded, ints[i].encoded[1] + 2, 0, NULL, NULL,
|
|
|
|
&bufSize);
|
2005-06-10 19:28:58 +00:00
|
|
|
ok(ret && GetLastError() == NOERROR,
|
|
|
|
"Expected success and NOERROR, got %ld\n", GetLastError());
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_INTEGER,
|
|
|
|
(BYTE *)&ints[i].encoded, ints[i].encoded[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &bufSize);
|
2005-06-04 09:49:33 +00:00
|
|
|
ok(ret, "CryptDecodeObjectEx failed: %ld\n", GetLastError());
|
|
|
|
ok(bufSize == sizeof(int), "Expected size %d, got %ld\n", sizeof(int),
|
|
|
|
bufSize);
|
|
|
|
ok(buf != NULL, "Expected allocated buffer\n");
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(!memcmp(buf, &ints[i].val, bufSize), "Expected %d, got %d\n",
|
|
|
|
ints[i].val, *(int *)buf);
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-08 18:31:21 +00:00
|
|
|
struct encodedFiletime
|
|
|
|
{
|
|
|
|
SYSTEMTIME sysTime;
|
|
|
|
BYTE *encodedTime;
|
|
|
|
};
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
static void testTimeEncoding(DWORD dwEncoding, LPCSTR structType,
|
2005-06-08 18:31:21 +00:00
|
|
|
const struct encodedFiletime *time)
|
|
|
|
{
|
|
|
|
FILETIME ft = { 0 };
|
|
|
|
BYTE *buf = NULL;
|
|
|
|
DWORD bufSize = 0;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
ret = SystemTimeToFileTime(&time->sysTime, &ft);
|
|
|
|
ok(ret, "SystemTimeToFileTime failed: %ld\n", GetLastError());
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, structType, &ft,
|
2005-06-08 18:31:21 +00:00
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &bufSize);
|
|
|
|
/* years other than 1950-2050 are not allowed for encodings other than
|
|
|
|
* X509_CHOICE_OF_TIME.
|
|
|
|
*/
|
2005-06-13 11:39:35 +00:00
|
|
|
if (structType == X509_CHOICE_OF_TIME ||
|
2005-06-08 18:31:21 +00:00
|
|
|
(time->sysTime.wYear >= 1950 && time->sysTime.wYear <= 2050))
|
|
|
|
{
|
|
|
|
ok(ret, "CryptEncodeObjectEx failed: %ld (0x%08lx)\n", GetLastError(),
|
|
|
|
GetLastError());
|
|
|
|
ok(buf != NULL, "Expected an allocated buffer\n");
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(buf[0] == time->encodedTime[0],
|
|
|
|
"Expected type 0x%02x, got 0x%02x\n", time->encodedTime[0],
|
|
|
|
buf[0]);
|
|
|
|
ok(buf[1] == time->encodedTime[1], "Expected %d bytes, got %ld\n",
|
|
|
|
time->encodedTime[1], bufSize);
|
|
|
|
ok(!memcmp(time->encodedTime + 2, buf + 2, time->encodedTime[1]),
|
|
|
|
"Got unexpected value for time encoding\n");
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ok(!ret && GetLastError() == CRYPT_E_BAD_ENCODE,
|
|
|
|
"Expected CRYPT_E_BAD_ENCODE, got 0x%08lx\n", GetLastError());
|
|
|
|
}
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
static void testTimeDecoding(DWORD dwEncoding, LPCSTR structType,
|
2005-06-08 18:31:21 +00:00
|
|
|
const struct encodedFiletime *time)
|
|
|
|
{
|
|
|
|
FILETIME ft1 = { 0 }, ft2 = { 0 };
|
|
|
|
DWORD size = sizeof(ft2);
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
ret = SystemTimeToFileTime(&time->sysTime, &ft1);
|
|
|
|
ok(ret, "SystemTimeToFileTime failed: %ld\n", GetLastError());
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, structType, time->encodedTime,
|
2005-06-08 18:31:21 +00:00
|
|
|
time->encodedTime[1] + 2, 0, NULL, &ft2, &size);
|
|
|
|
/* years other than 1950-2050 are not allowed for encodings other than
|
|
|
|
* X509_CHOICE_OF_TIME.
|
|
|
|
*/
|
2005-06-13 11:39:35 +00:00
|
|
|
if (structType == X509_CHOICE_OF_TIME ||
|
2005-06-08 18:31:21 +00:00
|
|
|
(time->sysTime.wYear >= 1950 && time->sysTime.wYear <= 2050))
|
|
|
|
{
|
|
|
|
ok(ret, "CryptDecodeObjectEx failed: %ld (0x%08lx)\n", GetLastError(),
|
|
|
|
GetLastError());
|
|
|
|
ok(!memcmp(&ft1, &ft2, sizeof(ft1)),
|
|
|
|
"Got unexpected value for time decoding\n");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ok(!ret && GetLastError() == CRYPT_E_ASN1_BADTAG,
|
|
|
|
"Expected CRYPT_E_ASN1_BADTAG, got 0x%08lx\n", GetLastError());
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct encodedFiletime times[] = {
|
|
|
|
{ { 2005, 6, 1, 6, 16, 10, 0, 0 }, "\x17" "\x0d" "050606161000Z" },
|
|
|
|
{ { 1945, 6, 1, 6, 16, 10, 0, 0 }, "\x18" "\x0f" "19450606161000Z" },
|
|
|
|
{ { 2145, 6, 1, 6, 16, 10, 0, 0 }, "\x18" "\x0f" "21450606161000Z" },
|
|
|
|
};
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
static void test_encodeFiletime(DWORD dwEncoding)
|
2005-06-08 18:31:21 +00:00
|
|
|
{
|
|
|
|
DWORD i;
|
|
|
|
|
|
|
|
for (i = 0; i < sizeof(times) / sizeof(times[0]); i++)
|
|
|
|
{
|
2005-06-13 11:39:35 +00:00
|
|
|
testTimeEncoding(dwEncoding, X509_CHOICE_OF_TIME, ×[i]);
|
|
|
|
testTimeEncoding(dwEncoding, PKCS_UTC_TIME, ×[i]);
|
|
|
|
testTimeEncoding(dwEncoding, szOID_RSA_signingTime, ×[i]);
|
2005-06-08 18:31:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
static void test_decodeFiletime(DWORD dwEncoding)
|
2005-06-08 18:31:21 +00:00
|
|
|
{
|
|
|
|
static const struct encodedFiletime otherTimes[] = {
|
|
|
|
{ { 1945, 6, 1, 6, 16, 10, 0, 0 }, "\x18" "\x13" "19450606161000.000Z" },
|
|
|
|
{ { 1945, 6, 1, 6, 16, 10, 0, 999 }, "\x18" "\x13" "19450606161000.999Z" },
|
|
|
|
{ { 1945, 6, 1, 6, 17, 10, 0, 0 }, "\x18" "\x13" "19450606161000+0100" },
|
|
|
|
{ { 1945, 6, 1, 6, 15, 10, 0, 0 }, "\x18" "\x13" "19450606161000-0100" },
|
|
|
|
{ { 1945, 6, 1, 6, 14, 55, 0, 0 }, "\x18" "\x13" "19450606161000-0115" },
|
|
|
|
{ { 2145, 6, 1, 6, 16, 0, 0, 0 }, "\x18" "\x0a" "2145060616" },
|
|
|
|
{ { 2045, 6, 1, 6, 16, 10, 0, 0 }, "\x17" "\x0a" "4506061610" },
|
2005-06-13 11:39:35 +00:00
|
|
|
{ { 2045, 6, 1, 6, 16, 10, 0, 0 }, "\x17" "\x0b" "4506061610Z" },
|
|
|
|
{ { 2045, 6, 1, 6, 17, 10, 0, 0 }, "\x17" "\x0d" "4506061610+01" },
|
|
|
|
{ { 2045, 6, 1, 6, 15, 10, 0, 0 }, "\x17" "\x0d" "4506061610-01" },
|
|
|
|
{ { 2045, 6, 1, 6, 17, 10, 0, 0 }, "\x17" "\x0f" "4506061610+0100" },
|
|
|
|
{ { 2045, 6, 1, 6, 15, 10, 0, 0 }, "\x17" "\x0f" "4506061610-0100" },
|
2005-06-08 18:31:21 +00:00
|
|
|
};
|
|
|
|
/* An oddball case that succeeds in Windows, but doesn't seem correct
|
|
|
|
{ { 2145, 6, 1, 2, 11, 31, 0, 0 }, "\x18" "\x13" "21450606161000-9999" },
|
|
|
|
*/
|
|
|
|
static const char *bogusTimes[] = {
|
|
|
|
/* oddly, this succeeds on Windows, with year 2765
|
|
|
|
"\x18" "\x0f" "21r50606161000Z",
|
|
|
|
*/
|
|
|
|
"\x17" "\x08" "45060616",
|
|
|
|
"\x18" "\x0f" "aaaaaaaaaaaaaaZ",
|
|
|
|
"\x18" "\x04" "2145",
|
|
|
|
"\x18" "\x08" "21450606",
|
|
|
|
};
|
2005-06-10 19:28:58 +00:00
|
|
|
DWORD i, size;
|
|
|
|
FILETIME ft1 = { 0 }, ft2 = { 0 };
|
|
|
|
BOOL ret;
|
2005-06-08 18:31:21 +00:00
|
|
|
|
2005-06-10 19:28:58 +00:00
|
|
|
/* Check bogus length with non-NULL buffer */
|
|
|
|
ret = SystemTimeToFileTime(×[0].sysTime, &ft1);
|
|
|
|
ok(ret, "SystemTimeToFileTime failed: %ld\n", GetLastError());
|
|
|
|
size = 1;
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_CHOICE_OF_TIME,
|
2005-06-10 19:28:58 +00:00
|
|
|
times[0].encodedTime, times[0].encodedTime[1] + 2, 0, NULL, &ft2, &size);
|
|
|
|
ok(!ret && GetLastError() == ERROR_MORE_DATA,
|
|
|
|
"Expected ERROR_MORE_DATA, got %ld\n", GetLastError());
|
|
|
|
/* Normal tests */
|
2005-06-08 18:31:21 +00:00
|
|
|
for (i = 0; i < sizeof(times) / sizeof(times[0]); i++)
|
|
|
|
{
|
2005-06-13 11:39:35 +00:00
|
|
|
testTimeDecoding(dwEncoding, X509_CHOICE_OF_TIME, ×[i]);
|
|
|
|
testTimeDecoding(dwEncoding, PKCS_UTC_TIME, ×[i]);
|
|
|
|
testTimeDecoding(dwEncoding, szOID_RSA_signingTime, ×[i]);
|
2005-06-08 18:31:21 +00:00
|
|
|
}
|
|
|
|
for (i = 0; i < sizeof(otherTimes) / sizeof(otherTimes[0]); i++)
|
|
|
|
{
|
2005-06-13 11:39:35 +00:00
|
|
|
testTimeDecoding(dwEncoding, X509_CHOICE_OF_TIME, &otherTimes[i]);
|
|
|
|
testTimeDecoding(dwEncoding, PKCS_UTC_TIME, &otherTimes[i]);
|
|
|
|
testTimeDecoding(dwEncoding, szOID_RSA_signingTime, &otherTimes[i]);
|
2005-06-08 18:31:21 +00:00
|
|
|
}
|
|
|
|
for (i = 0; i < sizeof(bogusTimes) / sizeof(bogusTimes[0]); i++)
|
|
|
|
{
|
2005-06-10 19:28:58 +00:00
|
|
|
size = sizeof(ft1);
|
2005-06-13 11:39:35 +00:00
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_CHOICE_OF_TIME,
|
2005-06-10 19:28:58 +00:00
|
|
|
bogusTimes[i], bogusTimes[i][1] + 2, 0, NULL, &ft1, &size);
|
2005-06-08 18:31:21 +00:00
|
|
|
ok(!ret && GetLastError() == CRYPT_E_ASN1_CORRUPT,
|
|
|
|
"Expected CRYPT_E_ASN1_CORRUPT, got %08lx\n", GetLastError());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-13 11:39:35 +00:00
|
|
|
struct EncodedName
|
|
|
|
{
|
|
|
|
CERT_RDN_ATTR attr;
|
|
|
|
BYTE *encoded;
|
|
|
|
};
|
|
|
|
|
|
|
|
static const char commonName[] = "Juan Lang";
|
|
|
|
static const char surName[] = "Lang";
|
|
|
|
static const char bogusIA5[] = "\x80";
|
|
|
|
static const char bogusPrintable[] = "~";
|
|
|
|
static const char bogusNumeric[] = "A";
|
|
|
|
static const struct EncodedName names[] = {
|
|
|
|
{ { szOID_COMMON_NAME, CERT_RDN_PRINTABLE_STRING,
|
|
|
|
{ sizeof(commonName), (BYTE *)commonName } },
|
|
|
|
"\x30\x15\x31\x13\x30\x11\x06\x03\x55\x04\x03\x13\x0aJuan Lang" },
|
|
|
|
{ { szOID_COMMON_NAME, CERT_RDN_IA5_STRING,
|
|
|
|
{ sizeof(commonName), (BYTE *)commonName } },
|
|
|
|
"\x30\x15\x31\x13\x30\x11\x06\x03\x55\x04\x03\x16\x0aJuan Lang" },
|
|
|
|
{ { szOID_SUR_NAME, CERT_RDN_IA5_STRING,
|
|
|
|
{ sizeof(surName), (BYTE *)surName } },
|
|
|
|
"\x30\x10\x31\x0e\x30\x0c\x06\x03\x55\x04\x04\x16\x05Lang" },
|
|
|
|
{ { NULL, CERT_RDN_PRINTABLE_STRING,
|
|
|
|
{ sizeof(commonName), (BYTE *)commonName } },
|
|
|
|
"\x30\x12\x31\x10\x30\x0e\x06\x00\x13\x0aJuan Lang" },
|
|
|
|
/* The following test isn't a very good one, because it doesn't encode any
|
|
|
|
* Japanese characters. I'm leaving it out for now.
|
|
|
|
{ { szOID_COMMON_NAME, CERT_RDN_T61_STRING,
|
|
|
|
{ sizeof(commonName), (BYTE *)commonName } },
|
|
|
|
"\x30\x15\x31\x13\x30\x11\x06\x03\x55\x04\x03\x14\x0aJuan Lang" },
|
|
|
|
*/
|
|
|
|
/* The following tests succeed under Windows, but really should fail,
|
|
|
|
* they contain characters that are illegal for the encoding. I'm
|
|
|
|
* including them to justify my lazy encoding.
|
|
|
|
*/
|
|
|
|
{ { szOID_COMMON_NAME, CERT_RDN_IA5_STRING,
|
|
|
|
{ sizeof(bogusIA5), (BYTE *)bogusIA5 } },
|
|
|
|
"\x30\x0d\x31\x0b\x30\x09\x06\x03\x55\x04\x03\x16\x02\x80" },
|
|
|
|
{ { szOID_COMMON_NAME, CERT_RDN_PRINTABLE_STRING,
|
|
|
|
{ sizeof(bogusPrintable), (BYTE *)bogusPrintable } },
|
|
|
|
"\x30\x0d\x31\x0b\x30\x09\x06\x03\x55\x04\x03\x13\x02\x7e" },
|
|
|
|
{ { szOID_COMMON_NAME, CERT_RDN_NUMERIC_STRING,
|
|
|
|
{ sizeof(bogusNumeric), (BYTE *)bogusNumeric } },
|
|
|
|
"\x30\x0d\x31\x0b\x30\x09\x06\x03\x55\x04\x03\x12\x02\x41" },
|
|
|
|
};
|
|
|
|
|
|
|
|
static const BYTE emptyName[] = { 0x30, 0 };
|
|
|
|
static const BYTE emptyRDNs[] = { 0x30, 0x02, 0x31, 0 };
|
|
|
|
static const BYTE twoRDNs[] = "\x30\x23\x31\x21\x30\x0c\x06\x03\x55\x04\x04"
|
|
|
|
"\x13\x05\x4c\x61\x6e\x67\x00\x30\x11\x06\x03\x55\x04\x03"
|
|
|
|
"\x13\x0a\x4a\x75\x61\x6e\x20\x4c\x61\x6e\x67";
|
|
|
|
|
|
|
|
static void test_encodeName(DWORD dwEncoding)
|
|
|
|
{
|
|
|
|
CERT_RDN_ATTR attrs[2];
|
|
|
|
CERT_RDN rdn;
|
|
|
|
CERT_NAME_INFO info;
|
|
|
|
BYTE *buf = NULL;
|
|
|
|
DWORD size = 0, i;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
/* Test with NULL pvStructInfo */
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, NULL,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(!ret && GetLastError() == STATUS_ACCESS_VIOLATION,
|
|
|
|
"Expected STATUS_ACCESS_VIOLATION, got %08lx\n", GetLastError());
|
|
|
|
/* Test with empty CERT_NAME_INFO */
|
|
|
|
info.cRDN = 0;
|
|
|
|
info.rgRDN = NULL;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(ret, "CryptEncodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(!memcmp(buf, emptyName, sizeof(emptyName)),
|
|
|
|
"Got unexpected encoding for empty name\n");
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
/* Test with bogus CERT_RDN */
|
|
|
|
info.cRDN = 1;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(!ret && GetLastError() == STATUS_ACCESS_VIOLATION,
|
|
|
|
"Expected STATUS_ACCESS_VIOLATION, got %08lx\n", GetLastError());
|
|
|
|
/* Test with empty CERT_RDN */
|
|
|
|
rdn.cRDNAttr = 0;
|
|
|
|
rdn.rgRDNAttr = NULL;
|
|
|
|
info.cRDN = 1;
|
|
|
|
info.rgRDN = &rdn;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(ret, "CryptEncodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(!memcmp(buf, emptyRDNs, sizeof(emptyRDNs)),
|
|
|
|
"Got unexpected encoding for empty RDN array\n");
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
/* Test with bogus attr array */
|
|
|
|
rdn.cRDNAttr = 1;
|
|
|
|
rdn.rgRDNAttr = NULL;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(!ret && GetLastError() == STATUS_ACCESS_VIOLATION,
|
|
|
|
"Expected STATUS_ACCESS_VIOLATION, got %08lx\n", GetLastError());
|
|
|
|
/* oddly, a bogus OID is accepted by Windows XP; not testing.
|
|
|
|
attrs[0].pszObjId = "bogus";
|
|
|
|
attrs[0].dwValueType = CERT_RDN_PRINTABLE_STRING;
|
|
|
|
attrs[0].Value.cbData = sizeof(commonName);
|
|
|
|
attrs[0].Value.pbData = (BYTE *)commonName;
|
|
|
|
rdn.cRDNAttr = 1;
|
|
|
|
rdn.rgRDNAttr = attrs;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(!ret, "Expected failure, got success\n");
|
|
|
|
*/
|
|
|
|
/* Check with two CERT_RDN_ATTRs. Note DER encoding forces the order of
|
|
|
|
* the encoded attributes to be swapped.
|
|
|
|
*/
|
|
|
|
attrs[0].pszObjId = szOID_COMMON_NAME;
|
|
|
|
attrs[0].dwValueType = CERT_RDN_PRINTABLE_STRING;
|
|
|
|
attrs[0].Value.cbData = sizeof(commonName);
|
|
|
|
attrs[0].Value.pbData = (BYTE *)commonName;
|
|
|
|
attrs[1].pszObjId = szOID_SUR_NAME;
|
|
|
|
attrs[1].dwValueType = CERT_RDN_PRINTABLE_STRING;
|
|
|
|
attrs[1].Value.cbData = sizeof(surName);
|
|
|
|
attrs[1].Value.pbData = (BYTE *)surName;
|
|
|
|
rdn.cRDNAttr = 2;
|
|
|
|
rdn.rgRDNAttr = attrs;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(ret, "CryptEncodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(!memcmp(buf, twoRDNs, sizeof(twoRDNs)),
|
|
|
|
"Got unexpected encoding for two RDN array\n");
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
/* CERT_RDN_ANY_TYPE is too vague for X509_NAMEs, check the return */
|
|
|
|
rdn.cRDNAttr = 1;
|
|
|
|
attrs[0].dwValueType = CERT_RDN_ANY_TYPE;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(!ret && GetLastError() == HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER),
|
|
|
|
"Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError());
|
|
|
|
for (i = 0; i < sizeof(names) / sizeof(names[0]); i++)
|
|
|
|
{
|
|
|
|
rdn.cRDNAttr = 1;
|
|
|
|
rdn.rgRDNAttr = (CERT_RDN_ATTR *)&names[i].attr;
|
|
|
|
ret = CryptEncodeObjectEx(dwEncoding, X509_NAME, &info,
|
|
|
|
CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &size);
|
|
|
|
ok(ret, "CryptEncodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(size == names[i].encoded[1] + 2, "Expected size %d, got %ld\n",
|
|
|
|
names[i].encoded[1] + 2, size);
|
|
|
|
ok(!memcmp(buf, names[i].encoded, names[i].encoded[1] + 2),
|
|
|
|
"Got unexpected encoding\n");
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void compareNames(const CERT_NAME_INFO *expected,
|
|
|
|
const CERT_NAME_INFO *got)
|
|
|
|
{
|
|
|
|
ok(got->cRDN == expected->cRDN, "Expected %ld RDNs, got %ld\n",
|
|
|
|
expected->cRDN, got->cRDN);
|
|
|
|
if (expected->cRDN)
|
|
|
|
{
|
|
|
|
ok(got->rgRDN[0].cRDNAttr == expected->rgRDN[0].cRDNAttr,
|
|
|
|
"Expected %ld RDN attrs, got %ld\n", expected->rgRDN[0].cRDNAttr,
|
|
|
|
got->rgRDN[0].cRDNAttr);
|
|
|
|
if (expected->rgRDN[0].cRDNAttr)
|
|
|
|
{
|
|
|
|
if (expected->rgRDN[0].rgRDNAttr[0].pszObjId &&
|
|
|
|
strlen(expected->rgRDN[0].rgRDNAttr[0].pszObjId))
|
|
|
|
{
|
|
|
|
ok(got->rgRDN[0].rgRDNAttr[0].pszObjId != NULL,
|
|
|
|
"Expected OID %s, got NULL\n",
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].pszObjId);
|
|
|
|
if (got->rgRDN[0].rgRDNAttr[0].pszObjId)
|
|
|
|
ok(!strcmp(got->rgRDN[0].rgRDNAttr[0].pszObjId,
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].pszObjId),
|
|
|
|
"Got unexpected OID %s, expected %s\n",
|
|
|
|
got->rgRDN[0].rgRDNAttr[0].pszObjId,
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].pszObjId);
|
|
|
|
}
|
|
|
|
ok(got->rgRDN[0].rgRDNAttr[0].Value.cbData ==
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].Value.cbData,
|
|
|
|
"Unexpected data size, got %ld, expected %ld\n",
|
|
|
|
got->rgRDN[0].rgRDNAttr[0].Value.cbData,
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].Value.cbData);
|
|
|
|
if (expected->rgRDN[0].rgRDNAttr[0].Value.pbData)
|
|
|
|
ok(!memcmp(got->rgRDN[0].rgRDNAttr[0].Value.pbData,
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].Value.pbData,
|
|
|
|
expected->rgRDN[0].rgRDNAttr[0].Value.cbData),
|
|
|
|
"Unexpected value\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_decodeName(DWORD dwEncoding)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
BYTE *buf = NULL;
|
|
|
|
DWORD bufSize = 0;
|
|
|
|
BOOL ret;
|
|
|
|
CERT_RDN rdn;
|
|
|
|
CERT_NAME_INFO info = { 1, &rdn };
|
|
|
|
|
|
|
|
for (i = 0; i < sizeof(names) / sizeof(names[0]); i++)
|
|
|
|
{
|
|
|
|
/* When the output buffer is NULL, this always succeeds */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_NAME, names[i].encoded,
|
|
|
|
names[i].encoded[1] + 2, 0, NULL, NULL, &bufSize);
|
|
|
|
ok(ret && GetLastError() == NOERROR,
|
|
|
|
"Expected success and NOERROR, got %08lx\n", GetLastError());
|
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_NAME, names[i].encoded,
|
|
|
|
names[i].encoded[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG | CRYPT_DECODE_SHARE_OID_STRING_FLAG, NULL,
|
|
|
|
(BYTE *)&buf, &bufSize);
|
|
|
|
ok(ret, "CryptDecodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
rdn.cRDNAttr = 1;
|
|
|
|
rdn.rgRDNAttr = (CERT_RDN_ATTR *)&names[i].attr;
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
compareNames((CERT_NAME_INFO *)buf, &info);
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* test empty name */
|
|
|
|
bufSize = 0;
|
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_NAME, emptyName,
|
|
|
|
emptyName[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG | CRYPT_DECODE_SHARE_OID_STRING_FLAG, NULL,
|
|
|
|
(BYTE *)&buf, &bufSize);
|
|
|
|
ok(ret, "CryptDecodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
/* Interestingly, in Windows, if cRDN is 0, rgRGN may not be NULL. My
|
|
|
|
* decoder works the same way, so only test the count.
|
|
|
|
*/
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
ok(bufSize == sizeof(CERT_NAME_INFO),
|
|
|
|
"Expected bufSize %d, got %ld\n", sizeof(CERT_NAME_INFO), bufSize);
|
|
|
|
ok(((CERT_NAME_INFO *)buf)->cRDN == 0,
|
|
|
|
"Expected 0 RDNs in empty info, got %ld\n",
|
|
|
|
((CERT_NAME_INFO *)buf)->cRDN);
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
/* test empty RDN */
|
|
|
|
bufSize = 0;
|
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_NAME, emptyRDNs,
|
|
|
|
emptyRDNs[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG | CRYPT_DECODE_SHARE_OID_STRING_FLAG, NULL,
|
|
|
|
(BYTE *)&buf, &bufSize);
|
|
|
|
ok(ret, "CryptDecodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
CERT_NAME_INFO *info = (CERT_NAME_INFO *)buf;
|
|
|
|
|
|
|
|
ok(bufSize == sizeof(CERT_NAME_INFO) + sizeof(CERT_RDN) &&
|
|
|
|
info->cRDN == 1 && info->rgRDN && info->rgRDN[0].cRDNAttr == 0,
|
|
|
|
"Got unexpected value for empty RDN\n");
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
/* test two RDN attrs */
|
|
|
|
bufSize = 0;
|
|
|
|
ret = CryptDecodeObjectEx(dwEncoding, X509_NAME, twoRDNs,
|
|
|
|
twoRDNs[1] + 2,
|
|
|
|
CRYPT_DECODE_ALLOC_FLAG | CRYPT_DECODE_SHARE_OID_STRING_FLAG, NULL,
|
|
|
|
(BYTE *)&buf, &bufSize);
|
|
|
|
ok(ret, "CryptDecodeObjectEx failed: %08lx\n", GetLastError());
|
|
|
|
if (buf)
|
|
|
|
{
|
|
|
|
CERT_RDN_ATTR attrs[] = {
|
|
|
|
{ szOID_SUR_NAME, CERT_RDN_PRINTABLE_STRING, { sizeof(surName),
|
|
|
|
(BYTE *)surName } },
|
|
|
|
{ szOID_COMMON_NAME, CERT_RDN_PRINTABLE_STRING, { sizeof(commonName),
|
|
|
|
(BYTE *)commonName } },
|
|
|
|
};
|
|
|
|
|
|
|
|
rdn.cRDNAttr = sizeof(attrs) / sizeof(attrs[0]);
|
|
|
|
rdn.rgRDNAttr = attrs;
|
|
|
|
compareNames((CERT_NAME_INFO *)buf, &info);
|
|
|
|
LocalFree(buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-02 10:34:03 +00:00
|
|
|
static void test_registerOIDFunction(void)
|
|
|
|
{
|
|
|
|
static const WCHAR bogusDll[] = { 'b','o','g','u','s','.','d','l','l',0 };
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
/* oddly, this succeeds under WinXP; the function name key is merely
|
|
|
|
* omitted. This may be a side effect of the registry code, I don't know.
|
|
|
|
* I don't check it because I doubt anyone would depend on it.
|
|
|
|
ret = CryptRegisterOIDFunction(X509_ASN_ENCODING, NULL,
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", bogusDll, NULL);
|
|
|
|
*/
|
|
|
|
/* On windows XP, GetLastError is incorrectly being set with an HRESULT,
|
|
|
|
* HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER)
|
|
|
|
*/
|
|
|
|
ret = CryptRegisterOIDFunction(X509_ASN_ENCODING, "foo", NULL, bogusDll,
|
|
|
|
NULL);
|
|
|
|
ok(!ret && (GetLastError() == ERROR_INVALID_PARAMETER || GetLastError() ==
|
|
|
|
HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER)),
|
|
|
|
"Expected ERROR_INVALID_PARAMETER: %ld\n", GetLastError());
|
|
|
|
/* This has no effect, but "succeeds" on XP */
|
|
|
|
ret = CryptRegisterOIDFunction(X509_ASN_ENCODING, "foo",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", NULL, NULL);
|
|
|
|
ok(ret, "Expected pseudo-success, got %ld\n", GetLastError());
|
|
|
|
ret = CryptRegisterOIDFunction(X509_ASN_ENCODING, "CryptDllEncodeObject",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", bogusDll, NULL);
|
|
|
|
ok(ret, "CryptRegisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
ret = CryptUnregisterOIDFunction(X509_ASN_ENCODING, "CryptDllEncodeObject",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10");
|
|
|
|
ok(ret, "CryptUnregisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
ret = CryptRegisterOIDFunction(X509_ASN_ENCODING, "bogus",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", bogusDll, NULL);
|
|
|
|
ok(ret, "CryptRegisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
ret = CryptUnregisterOIDFunction(X509_ASN_ENCODING, "bogus",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10");
|
|
|
|
ok(ret, "CryptUnregisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
/* This has no effect */
|
|
|
|
ret = CryptRegisterOIDFunction(PKCS_7_ASN_ENCODING, "CryptDllEncodeObject",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", bogusDll, NULL);
|
|
|
|
ok(ret, "CryptRegisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
/* Check with bogus encoding type: */
|
|
|
|
ret = CryptRegisterOIDFunction(0, "CryptDllEncodeObject",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", bogusDll, NULL);
|
|
|
|
ok(ret, "CryptRegisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
/* This is written with value 3 verbatim. Thus, the encoding type isn't
|
|
|
|
* (for now) treated as a mask.
|
|
|
|
*/
|
|
|
|
ret = CryptRegisterOIDFunction(3, "CryptDllEncodeObject",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10", bogusDll, NULL);
|
|
|
|
ok(ret, "CryptRegisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
ret = CryptUnregisterOIDFunction(3, "CryptDllEncodeObject",
|
|
|
|
"1.2.3.4.5.6.7.8.9.10");
|
|
|
|
ok(ret, "CryptUnregisterOIDFunction failed: %ld\n", GetLastError());
|
|
|
|
}
|
|
|
|
|
|
|
|
START_TEST(encode)
|
|
|
|
{
|
2005-06-13 11:39:35 +00:00
|
|
|
static const DWORD encodings[] = { X509_ASN_ENCODING, PKCS_7_ASN_ENCODING,
|
|
|
|
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING };
|
|
|
|
DWORD i;
|
|
|
|
|
|
|
|
for (i = 0; i < sizeof(encodings) / sizeof(encodings[0]); i++)
|
|
|
|
{
|
|
|
|
test_encodeint(encodings[i]);
|
|
|
|
test_decodeint(encodings[i]);
|
|
|
|
test_encodeFiletime(encodings[i]);
|
|
|
|
test_decodeFiletime(encodings[i]);
|
|
|
|
test_encodeName(encodings[i]);
|
|
|
|
test_decodeName(encodings[i]);
|
|
|
|
}
|
2005-06-02 10:34:03 +00:00
|
|
|
test_registerOIDFunction();
|
|
|
|
}
|