2 * ntoskrnl.exe testing framework
4 * Copyright 2015 Sebastian Lackner
5 * Copyright 2015 Michael Müller
6 * Copyright 2015 Christian Costa
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
25 #define WIN32_NO_STATUS
39 #include "wine/test.h"
40 #include "wine/heap.h"
41 #include "wine/mssign.h"
45 static const GUID GUID_NULL
;
49 static BOOL (WINAPI
*pRtlDosPathNameToNtPathName_U
)(const WCHAR
*, UNICODE_STRING
*, WCHAR
**, CURDIR
*);
50 static BOOL (WINAPI
*pRtlFreeUnicodeString
)(UNICODE_STRING
*);
51 static BOOL (WINAPI
*pCancelIoEx
)(HANDLE
, OVERLAPPED
*);
52 static BOOL (WINAPI
*pIsWow64Process
)(HANDLE
, BOOL
*);
53 static BOOL (WINAPI
*pSetFileCompletionNotificationModes
)(HANDLE
, UCHAR
);
54 static HRESULT (WINAPI
*pSignerSign
)(SIGNER_SUBJECT_INFO
*subject
, SIGNER_CERT
*cert
,
55 SIGNER_SIGNATURE_INFO
*signature
, SIGNER_PROVIDER_INFO
*provider
,
56 const WCHAR
*timestamp
, CRYPT_ATTRIBUTES
*attr
, void *sip_data
);
58 static void load_resource(const WCHAR
*name
, WCHAR
*filename
)
60 static WCHAR path
[MAX_PATH
];
66 GetTempPathW(ARRAY_SIZE(path
), path
);
67 GetTempFileNameW(path
, name
, 0, filename
);
69 file
= CreateFileW(filename
, GENERIC_READ
|GENERIC_WRITE
, 0, NULL
, CREATE_ALWAYS
, 0, 0);
70 ok(file
!= INVALID_HANDLE_VALUE
, "failed to create %s, error %u\n", debugstr_w(filename
), GetLastError());
72 res
= FindResourceW(NULL
, name
, L
"TESTDLL");
73 ok( res
!= 0, "couldn't find resource\n" );
74 ptr
= LockResource( LoadResource( GetModuleHandleA(NULL
), res
));
75 WriteFile( file
, ptr
, SizeofResource( GetModuleHandleA(NULL
), res
), &written
, NULL
);
76 ok( written
== SizeofResource( GetModuleHandleA(NULL
), res
), "couldn't write resource\n" );
80 struct testsign_context
83 const CERT_CONTEXT
*cert
, *root_cert
, *publisher_cert
;
84 HCERTSTORE root_store
, publisher_store
;
87 static BOOL
testsign_create_cert(struct testsign_context
*ctx
)
89 BYTE encoded_name
[100], encoded_key_id
[200], public_key_info_buffer
[1000];
90 WCHAR container_name
[26];
91 BYTE hash_buffer
[16], cert_buffer
[1000], provider_nameA
[100], serial
[16];
92 CERT_PUBLIC_KEY_INFO
*public_key_info
= (CERT_PUBLIC_KEY_INFO
*)public_key_info_buffer
;
93 CRYPT_KEY_PROV_INFO provider_info
= {0};
94 CRYPT_ALGORITHM_IDENTIFIER algid
= {0};
95 CERT_AUTHORITY_KEY_ID_INFO key_info
;
96 CERT_INFO cert_info
= {0};
97 WCHAR provider_nameW
[100];
98 CERT_EXTENSION extension
;
103 memset(ctx
, 0, sizeof(*ctx
));
106 swprintf(container_name
, ARRAY_SIZE(container_name
), L
"wine_testsign%u", rand());
108 ret
= CryptAcquireContextW(&ctx
->provider
, container_name
, NULL
, PROV_RSA_FULL
, CRYPT_NEWKEYSET
);
109 ok(ret
, "Failed to create container, error %#x\n", GetLastError());
111 ret
= CryptGenKey(ctx
->provider
, AT_SIGNATURE
, CRYPT_EXPORTABLE
, &key
);
112 ok(ret
, "Failed to create key, error %#x\n", GetLastError());
113 ret
= CryptDestroyKey(key
);
114 ok(ret
, "Failed to destroy key, error %#x\n", GetLastError());
115 ret
= CryptGetUserKey(ctx
->provider
, AT_SIGNATURE
, &key
);
116 ok(ret
, "Failed to get user key, error %#x\n", GetLastError());
117 ret
= CryptDestroyKey(key
);
118 ok(ret
, "Failed to destroy key, error %#x\n", GetLastError());
120 size
= sizeof(encoded_name
);
121 ret
= CertStrToNameA(X509_ASN_ENCODING
, "CN=winetest_cert", CERT_X500_NAME_STR
, NULL
, encoded_name
, &size
, NULL
);
122 ok(ret
, "Failed to convert name, error %#x\n", GetLastError());
123 key_info
.CertIssuer
.cbData
= size
;
124 key_info
.CertIssuer
.pbData
= encoded_name
;
126 size
= sizeof(public_key_info_buffer
);
127 ret
= CryptExportPublicKeyInfo(ctx
->provider
, AT_SIGNATURE
, X509_ASN_ENCODING
, public_key_info
, &size
);
128 ok(ret
, "Failed to export public key, error %#x\n", GetLastError());
129 cert_info
.SubjectPublicKeyInfo
= *public_key_info
;
131 size
= sizeof(hash_buffer
);
132 ret
= CryptHashPublicKeyInfo(ctx
->provider
, CALG_MD5
, 0, X509_ASN_ENCODING
, public_key_info
, hash_buffer
, &size
);
133 ok(ret
, "Failed to hash public key, error %#x\n", GetLastError());
135 key_info
.KeyId
.cbData
= size
;
136 key_info
.KeyId
.pbData
= hash_buffer
;
138 RtlGenRandom(serial
, sizeof(serial
));
139 key_info
.CertSerialNumber
.cbData
= sizeof(serial
);
140 key_info
.CertSerialNumber
.pbData
= serial
;
142 size
= sizeof(encoded_key_id
);
143 ret
= CryptEncodeObject(X509_ASN_ENCODING
, X509_AUTHORITY_KEY_ID
, &key_info
, encoded_key_id
, &size
);
144 ok(ret
, "Failed to convert name, error %#x\n", GetLastError());
146 extension
.pszObjId
= (char *)szOID_AUTHORITY_KEY_IDENTIFIER
;
147 extension
.fCritical
= TRUE
;
148 extension
.Value
.cbData
= size
;
149 extension
.Value
.pbData
= encoded_key_id
;
151 cert_info
.dwVersion
= CERT_V3
;
152 cert_info
.SerialNumber
= key_info
.CertSerialNumber
;
153 cert_info
.SignatureAlgorithm
.pszObjId
= (char *)szOID_RSA_SHA1RSA
;
154 cert_info
.Issuer
= key_info
.CertIssuer
;
155 GetSystemTimeAsFileTime(&cert_info
.NotBefore
);
156 GetSystemTimeAsFileTime(&cert_info
.NotAfter
);
157 cert_info
.NotAfter
.dwHighDateTime
+= 1;
158 cert_info
.Subject
= key_info
.CertIssuer
;
159 cert_info
.cExtension
= 1;
160 cert_info
.rgExtension
= &extension
;
161 algid
.pszObjId
= (char *)szOID_RSA_SHA1RSA
;
162 size
= sizeof(cert_buffer
);
163 ret
= CryptSignAndEncodeCertificate(ctx
->provider
, AT_SIGNATURE
, X509_ASN_ENCODING
,
164 X509_CERT_TO_BE_SIGNED
, &cert_info
, &algid
, NULL
, cert_buffer
, &size
);
165 ok(ret
, "Failed to create certificate, error %#x\n", GetLastError());
167 ctx
->cert
= CertCreateCertificateContext(X509_ASN_ENCODING
, cert_buffer
, size
);
168 ok(!!ctx
->cert
, "Failed to create context, error %#x\n", GetLastError());
170 size
= sizeof(provider_nameA
);
171 ret
= CryptGetProvParam(ctx
->provider
, PP_NAME
, provider_nameA
, &size
, 0);
172 ok(ret
, "Failed to get prov param, error %#x\n", GetLastError());
173 MultiByteToWideChar(CP_ACP
, 0, (char *)provider_nameA
, -1, provider_nameW
, ARRAY_SIZE(provider_nameW
));
175 provider_info
.pwszContainerName
= (WCHAR
*)container_name
;
176 provider_info
.pwszProvName
= provider_nameW
;
177 provider_info
.dwProvType
= PROV_RSA_FULL
;
178 provider_info
.dwKeySpec
= AT_SIGNATURE
;
179 ret
= CertSetCertificateContextProperty(ctx
->cert
, CERT_KEY_PROV_INFO_PROP_ID
, 0, &provider_info
);
180 ok(ret
, "Failed to set provider info, error %#x\n", GetLastError());
182 ctx
->root_store
= CertOpenStore(CERT_STORE_PROV_SYSTEM_REGISTRY_A
, 0, 0, CERT_SYSTEM_STORE_LOCAL_MACHINE
, "root");
183 if (!ctx
->root_store
&& GetLastError() == ERROR_ACCESS_DENIED
)
185 skip("Failed to open root store.\n");
187 ret
= CertFreeCertificateContext(ctx
->cert
);
188 ok(ret
, "Failed to free certificate, error %u\n", GetLastError());
189 ret
= CryptReleaseContext(ctx
->provider
, 0);
190 ok(ret
, "failed to release context, error %u\n", GetLastError());
194 ok(!!ctx
->root_store
, "Failed to open store, error %u\n", GetLastError());
195 ret
= CertAddCertificateContextToStore(ctx
->root_store
, ctx
->cert
, CERT_STORE_ADD_ALWAYS
, &ctx
->root_cert
);
196 if (!ret
&& GetLastError() == ERROR_ACCESS_DENIED
)
198 skip("Failed to add self-signed certificate to store.\n");
200 ret
= CertFreeCertificateContext(ctx
->cert
);
201 ok(ret
, "Failed to free certificate, error %u\n", GetLastError());
202 ret
= CertCloseStore(ctx
->root_store
, CERT_CLOSE_STORE_CHECK_FLAG
);
203 ok(ret
, "Failed to close store, error %u\n", GetLastError());
204 ret
= CryptReleaseContext(ctx
->provider
, 0);
205 ok(ret
, "failed to release context, error %u\n", GetLastError());
209 ok(ret
, "Failed to add certificate, error %u\n", GetLastError());
211 ctx
->publisher_store
= CertOpenStore(CERT_STORE_PROV_SYSTEM_REGISTRY_A
, 0, 0,
212 CERT_SYSTEM_STORE_LOCAL_MACHINE
, "trustedpublisher");
213 ok(!!ctx
->publisher_store
, "Failed to open store, error %u\n", GetLastError());
214 ret
= CertAddCertificateContextToStore(ctx
->publisher_store
, ctx
->cert
,
215 CERT_STORE_ADD_ALWAYS
, &ctx
->publisher_cert
);
216 ok(ret
, "Failed to add certificate, error %u\n", GetLastError());
221 static void testsign_cleanup(struct testsign_context
*ctx
)
225 ret
= CertFreeCertificateContext(ctx
->cert
);
226 ok(ret
, "Failed to free certificate, error %u\n", GetLastError());
228 ret
= CertDeleteCertificateFromStore(ctx
->root_cert
);
229 ok(ret
, "Failed to remove certificate, error %u\n", GetLastError());
230 ret
= CertFreeCertificateContext(ctx
->root_cert
);
231 ok(ret
, "Failed to free certificate, error %u\n", GetLastError());
232 ret
= CertCloseStore(ctx
->root_store
, CERT_CLOSE_STORE_CHECK_FLAG
);
233 ok(ret
, "Failed to close store, error %u\n", GetLastError());
235 ret
= CertDeleteCertificateFromStore(ctx
->publisher_cert
);
236 ok(ret
, "Failed to remove certificate, error %u\n", GetLastError());
237 ret
= CertFreeCertificateContext(ctx
->publisher_cert
);
238 ok(ret
, "Failed to free certificate, error %u\n", GetLastError());
239 ret
= CertCloseStore(ctx
->publisher_store
, CERT_CLOSE_STORE_CHECK_FLAG
);
240 ok(ret
, "Failed to close store, error %u\n", GetLastError());
242 ret
= CryptReleaseContext(ctx
->provider
, 0);
243 ok(ret
, "failed to release context, error %u\n", GetLastError());
246 static void testsign_sign(struct testsign_context
*ctx
, const WCHAR
*filename
)
248 SIGNER_ATTR_AUTHCODE authcode
= {sizeof(authcode
)};
249 SIGNER_SIGNATURE_INFO signature
= {sizeof(signature
)};
250 SIGNER_SUBJECT_INFO subject
= {sizeof(subject
)};
251 SIGNER_CERT_STORE_INFO store
= {sizeof(store
)};
252 SIGNER_CERT cert_info
= {sizeof(cert_info
)};
253 SIGNER_FILE_INFO file
= {sizeof(file
)};
257 subject
.dwSubjectChoice
= 1;
258 subject
.pdwIndex
= &index
;
259 subject
.pSignerFileInfo
= &file
;
260 file
.pwszFileName
= (WCHAR
*)filename
;
261 cert_info
.dwCertChoice
= 2;
262 cert_info
.pCertStoreInfo
= &store
;
263 store
.pSigningCert
= ctx
->cert
;
264 store
.dwCertPolicy
= 0;
265 signature
.algidHash
= CALG_SHA_256
;
266 signature
.dwAttrChoice
= SIGNER_AUTHCODE_ATTR
;
267 signature
.pAttrAuthcode
= &authcode
;
268 authcode
.pwszName
= L
"";
269 authcode
.pwszInfo
= L
"";
270 hr
= pSignerSign(&subject
, &cert_info
, &signature
, NULL
, NULL
, NULL
, NULL
);
271 todo_wine
ok(hr
== S_OK
|| broken(hr
== NTE_BAD_ALGID
) /* < 7 */, "Failed to sign, hr %#x\n", hr
);
274 static void unload_driver(SC_HANDLE service
)
276 SERVICE_STATUS status
;
278 ControlService(service
, SERVICE_CONTROL_STOP
, &status
);
279 while (status
.dwCurrentState
== SERVICE_STOP_PENDING
)
283 ret
= QueryServiceStatus(service
, &status
);
284 ok(ret
, "QueryServiceStatus failed: %u\n", GetLastError());
286 ok(status
.dwCurrentState
== SERVICE_STOPPED
,
287 "expected SERVICE_STOPPED, got %d\n", status
.dwCurrentState
);
289 DeleteService(service
);
290 CloseServiceHandle(service
);
293 static SC_HANDLE
load_driver(struct testsign_context
*ctx
, WCHAR
*filename
,
294 const WCHAR
*resname
, const WCHAR
*driver_name
)
296 SC_HANDLE manager
, service
;
298 manager
= OpenSCManagerA(NULL
, NULL
, SC_MANAGER_ALL_ACCESS
);
299 if (!manager
&& GetLastError() == ERROR_ACCESS_DENIED
)
301 skip("Failed to open SC manager, not enough permissions\n");
304 ok(!!manager
, "OpenSCManager failed\n");
306 /* stop any old drivers running under this name */
307 service
= OpenServiceW(manager
, driver_name
, SERVICE_ALL_ACCESS
);
308 if (service
) unload_driver(service
);
310 load_resource(resname
, filename
);
311 testsign_sign(ctx
, filename
);
312 trace("Trying to load driver %s\n", debugstr_w(filename
));
314 service
= CreateServiceW(manager
, driver_name
, driver_name
,
315 SERVICE_ALL_ACCESS
, SERVICE_KERNEL_DRIVER
,
316 SERVICE_DEMAND_START
, SERVICE_ERROR_NORMAL
,
317 filename
, NULL
, NULL
, NULL
, NULL
, NULL
);
318 ok(!!service
, "CreateService failed: %u\n", GetLastError());
320 CloseServiceHandle(manager
);
324 static BOOL
start_driver(HANDLE service
, BOOL vista_plus
)
326 SERVICE_STATUS status
;
329 SetLastError(0xdeadbeef);
330 ret
= StartServiceA(service
, 0, NULL
);
331 if (!ret
&& (GetLastError() == ERROR_DRIVER_BLOCKED
|| GetLastError() == ERROR_INVALID_IMAGE_HASH
332 || (vista_plus
&& GetLastError() == ERROR_FILE_NOT_FOUND
)))
334 if (vista_plus
&& GetLastError() == ERROR_FILE_NOT_FOUND
)
336 skip("Windows Vista or newer is required to run this service.\n");
340 /* If Secure Boot is enabled or the machine is 64-bit, it will reject an unsigned driver. */
341 skip("Failed to start service; probably your machine doesn't accept unsigned drivers.\n");
343 DeleteService(service
);
344 CloseServiceHandle(service
);
347 ok(ret
, "StartService failed: %u\n", GetLastError());
349 /* wait for the service to start up properly */
350 ret
= QueryServiceStatus(service
, &status
);
351 ok(ret
, "QueryServiceStatus failed: %u\n", GetLastError());
352 while (status
.dwCurrentState
== SERVICE_START_PENDING
)
355 ret
= QueryServiceStatus(service
, &status
);
356 ok(ret
, "QueryServiceStatus failed: %u\n", GetLastError());
358 ok(status
.dwCurrentState
== SERVICE_RUNNING
,
359 "expected SERVICE_RUNNING, got %d\n", status
.dwCurrentState
);
360 ok(status
.dwServiceType
== SERVICE_KERNEL_DRIVER
,
361 "expected SERVICE_KERNEL_DRIVER, got %#x\n", status
.dwServiceType
);
366 static ULONG64 modified_value
;
368 static void main_test(void)
370 struct test_input
*test_input
;
377 /* Create a temporary file that the driver will write ok/trace output to. */
379 okfile
= CreateFileA("C:\\windows\\winetest_ntoskrnl_okfile", GENERIC_READ
,
380 FILE_SHARE_READ
| FILE_SHARE_WRITE
, NULL
, CREATE_ALWAYS
, 0, NULL
);
381 ok(okfile
!= INVALID_HANDLE_VALUE
, "failed to create file, error %u\n", GetLastError());
383 test_input
= heap_alloc( sizeof(*test_input
) );
384 test_input
->running_under_wine
= !strcmp(winetest_platform
, "wine");
385 test_input
->winetest_report_success
= winetest_report_success
;
386 test_input
->winetest_debug
= winetest_debug
;
387 test_input
->process_id
= GetCurrentProcessId();
388 test_input
->teststr_offset
= (SIZE_T
)((BYTE
*)&teststr
- (BYTE
*)NtCurrentTeb()->Peb
->ImageBaseAddress
);
389 test_input
->modified_value
= &modified_value
;
392 res
= DeviceIoControl(device
, IOCTL_WINETEST_MAIN_TEST
, test_input
, sizeof(*test_input
),
393 &new_failures
, sizeof(new_failures
), &written
, NULL
);
394 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
395 ok(written
== sizeof(new_failures
), "got size %x\n", written
);
397 /* Print the ok/trace output and then add to our failure count. */
399 ReadFile(okfile
, buffer
, sizeof(buffer
), &read
, NULL
);
400 printf("%.*s", read
, buffer
);
401 } while (read
== sizeof(buffer
));
402 winetest_add_failures(new_failures
);
404 heap_free(test_input
);
406 DeleteFileA("C:\\windows\\winetest_ntoskrnl_okfile");
409 static void test_basic_ioctl(void)
411 char inbuf
[64], buf
[32];
415 res
= DeviceIoControl(device
, IOCTL_WINETEST_BASIC_IOCTL
, NULL
, 0, buf
,
416 sizeof(buf
), &written
, NULL
);
417 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
418 ok(written
== sizeof(teststr
), "got size %d\n", written
);
419 ok(!strcmp(buf
, teststr
), "got '%s'\n", buf
);
421 memset(buf
, 0, sizeof(buf
));
422 res
= DeviceIoControl(device
, IOCTL_WINETEST_BASIC_IOCTL
, inbuf
,
423 sizeof(inbuf
), buf
, 10, &written
, NULL
);
424 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
425 ok(written
== 10, "got size %d\n", written
);
426 ok(!strcmp(buf
, "Wine is no"), "got '%s'\n", buf
);
429 static void test_mismatched_status_ioctl(void)
435 res
= DeviceIoControl(device
, IOCTL_WINETEST_MISMATCHED_STATUS
, NULL
, 0, buf
,
436 sizeof(buf
), &written
, NULL
);
437 todo_wine
ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
438 todo_wine
ok(!strcmp(buf
, teststr
), "got '%s'\n", buf
);
441 static void test_overlapped(void)
443 OVERLAPPED overlapped
, overlapped2
, *o
;
444 DWORD cancel_cnt
, size
;
449 overlapped
.hEvent
= CreateEventW(NULL
, TRUE
, FALSE
, NULL
);
450 overlapped2
.hEvent
= CreateEventW(NULL
, TRUE
, FALSE
, NULL
);
452 file
= CreateFileA("\\\\.\\WineTestDriver", FILE_READ_ATTRIBUTES
| FILE_WRITE_ATTRIBUTES
,
453 0, NULL
, OPEN_EXISTING
, FILE_FLAG_OVERLAPPED
, NULL
);
454 ok(file
!= INVALID_HANDLE_VALUE
, "failed to open device: %u\n", GetLastError());
456 /* test cancelling all device requests */
457 res
= DeviceIoControl(file
, IOCTL_WINETEST_RESET_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped
);
458 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
460 res
= DeviceIoControl(file
, IOCTL_WINETEST_TEST_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped
);
461 ok(!res
&& GetLastError() == ERROR_IO_PENDING
, "DeviceIoControl failed: %u\n", GetLastError());
463 res
= DeviceIoControl(file
, IOCTL_WINETEST_TEST_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped2
);
464 ok(!res
&& GetLastError() == ERROR_IO_PENDING
, "DeviceIoControl failed: %u\n", GetLastError());
466 cancel_cnt
= 0xdeadbeef;
467 res
= DeviceIoControl(file
, IOCTL_WINETEST_GET_CANCEL_COUNT
, NULL
, 0, &cancel_cnt
, sizeof(cancel_cnt
), NULL
, &overlapped
);
468 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
469 ok(cancel_cnt
== 0, "cancel_cnt = %u\n", cancel_cnt
);
473 cancel_cnt
= 0xdeadbeef;
474 res
= DeviceIoControl(file
, IOCTL_WINETEST_GET_CANCEL_COUNT
, NULL
, 0, &cancel_cnt
, sizeof(cancel_cnt
), NULL
, &overlapped
);
475 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
476 ok(cancel_cnt
== 2, "cancel_cnt = %u\n", cancel_cnt
);
478 /* test cancelling selected overlapped event */
481 res
= DeviceIoControl(file
, IOCTL_WINETEST_RESET_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped
);
482 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
484 res
= DeviceIoControl(file
, IOCTL_WINETEST_TEST_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped
);
485 ok(!res
&& GetLastError() == ERROR_IO_PENDING
, "DeviceIoControl failed: %u\n", GetLastError());
487 res
= DeviceIoControl(file
, IOCTL_WINETEST_TEST_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped2
);
488 ok(!res
&& GetLastError() == ERROR_IO_PENDING
, "DeviceIoControl failed: %u\n", GetLastError());
490 pCancelIoEx(file
, &overlapped
);
492 cancel_cnt
= 0xdeadbeef;
493 res
= DeviceIoControl(file
, IOCTL_WINETEST_GET_CANCEL_COUNT
, NULL
, 0, &cancel_cnt
, sizeof(cancel_cnt
), NULL
, &overlapped
);
494 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
495 ok(cancel_cnt
== 1, "cancel_cnt = %u\n", cancel_cnt
);
497 pCancelIoEx(file
, &overlapped2
);
499 cancel_cnt
= 0xdeadbeef;
500 res
= DeviceIoControl(file
, IOCTL_WINETEST_GET_CANCEL_COUNT
, NULL
, 0, &cancel_cnt
, sizeof(cancel_cnt
), NULL
, &overlapped
);
501 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
502 ok(cancel_cnt
== 2, "cancel_cnt = %u\n", cancel_cnt
);
505 port
= CreateIoCompletionPort(file
, NULL
, 0xdeadbeef, 0);
506 ok(port
!= NULL
, "CreateIoCompletionPort failed, error %u\n", GetLastError());
507 res
= GetQueuedCompletionStatus(port
, &size
, &key
, &o
, 0);
508 ok(!res
&& GetLastError() == WAIT_TIMEOUT
, "GetQueuedCompletionStatus returned %x(%u)\n", res
, GetLastError());
510 res
= DeviceIoControl(file
, IOCTL_WINETEST_RESET_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped
);
511 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
512 res
= GetQueuedCompletionStatus(port
, &size
, &key
, &o
, 0);
513 ok(res
, "GetQueuedCompletionStatus failed: %u\n", GetLastError());
514 ok(o
== &overlapped
, "o != overlapped\n");
516 if (pSetFileCompletionNotificationModes
)
518 res
= pSetFileCompletionNotificationModes(file
, FILE_SKIP_COMPLETION_PORT_ON_SUCCESS
);
519 ok(res
, "SetFileCompletionNotificationModes failed: %u\n", GetLastError());
521 res
= DeviceIoControl(file
, IOCTL_WINETEST_RESET_CANCEL
, NULL
, 0, NULL
, 0, NULL
, &overlapped
);
522 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
523 res
= GetQueuedCompletionStatus(port
, &size
, &key
, &o
, 0);
524 ok(!res
&& GetLastError() == WAIT_TIMEOUT
, "GetQueuedCompletionStatus returned %x(%u)\n", res
, GetLastError());
528 CloseHandle(overlapped
.hEvent
);
529 CloseHandle(overlapped2
.hEvent
);
533 static void test_load_driver(SC_HANDLE service
)
535 SERVICE_STATUS status
;
539 res
= QueryServiceStatus(service
, &status
);
540 ok(res
, "QueryServiceStatusEx failed: %u\n", GetLastError());
541 ok(status
.dwCurrentState
== SERVICE_STOPPED
, "got state %#x\n", status
.dwCurrentState
);
544 res
= DeviceIoControl(device
, IOCTL_WINETEST_LOAD_DRIVER
, &load
, sizeof(load
), NULL
, 0, &sz
, NULL
);
545 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
547 res
= QueryServiceStatus(service
, &status
);
548 ok(res
, "QueryServiceStatusEx failed: %u\n", GetLastError());
549 ok(status
.dwCurrentState
== SERVICE_RUNNING
, "got state %#x\n", status
.dwCurrentState
);
552 res
= DeviceIoControl(device
, IOCTL_WINETEST_LOAD_DRIVER
, &load
, sizeof(load
), NULL
, 0, &sz
, NULL
);
553 ok(res
, "DeviceIoControl failed: %u\n", GetLastError());
555 res
= QueryServiceStatus(service
, &status
);
556 ok(res
, "QueryServiceStatusEx failed: %u\n", GetLastError());
557 ok(status
.dwCurrentState
== SERVICE_STOPPED
, "got state %#x\n", status
.dwCurrentState
);
560 static void test_file_handles(void)
562 DWORD count
, ret_size
;
563 HANDLE file
, dup
, file2
;
566 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CREATE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
567 ok(ret
, "ioctl failed: %u\n", GetLastError());
568 ok(count
== 2, "got %u\n", count
);
570 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CLOSE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
571 ok(ret
, "ioctl failed: %u\n", GetLastError());
572 ok(count
== 1, "got %u\n", count
);
574 file
= CreateFileA("\\\\.\\WineTestDriver", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
575 ok(file
!= INVALID_HANDLE_VALUE
, "failed to open device: %u\n", GetLastError());
577 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CREATE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
578 ok(ret
, "ioctl failed: %u\n", GetLastError());
579 ok(count
== 3, "got %u\n", count
);
581 file2
= CreateFileA("\\\\.\\WineTestDriver", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
582 ok(file2
!= INVALID_HANDLE_VALUE
, "failed to open device: %u\n", GetLastError());
584 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CREATE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
585 ok(ret
, "ioctl failed: %u\n", GetLastError());
586 ok(count
== 4, "got %u\n", count
);
588 ret
= DuplicateHandle(GetCurrentProcess(), file
, GetCurrentProcess(), &dup
, 0, FALSE
, DUPLICATE_SAME_ACCESS
);
589 ok(ret
, "failed to duplicate handle: %u\n", GetLastError());
591 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CREATE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
592 ok(ret
, "ioctl failed: %u\n", GetLastError());
593 ok(count
== 4, "got %u\n", count
);
595 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_FSCONTEXT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
596 ok(ret
, "ioctl failed: %u\n", GetLastError());
597 ok(count
== 1, "got %u\n", count
);
599 ret
= DeviceIoControl(file
, IOCTL_WINETEST_GET_FSCONTEXT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
600 ok(ret
, "ioctl failed: %u\n", GetLastError());
601 ok(count
== 3, "got %u\n", count
);
603 ret
= DeviceIoControl(file2
, IOCTL_WINETEST_GET_FSCONTEXT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
604 ok(ret
, "ioctl failed: %u\n", GetLastError());
605 ok(count
== 4, "got %u\n", count
);
607 ret
= DeviceIoControl(dup
, IOCTL_WINETEST_GET_FSCONTEXT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
608 ok(ret
, "ioctl failed: %u\n", GetLastError());
609 ok(count
== 3, "got %u\n", count
);
613 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CLOSE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
614 ok(ret
, "ioctl failed: %u\n", GetLastError());
615 ok(count
== 1, "got %u\n", count
);
619 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CLOSE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
620 ok(ret
, "ioctl failed: %u\n", GetLastError());
621 ok(count
== 2, "got %u\n", count
);
625 ret
= DeviceIoControl(device
, IOCTL_WINETEST_GET_CLOSE_COUNT
, NULL
, 0, &count
, sizeof(count
), &ret_size
, NULL
);
626 ok(ret
, "ioctl failed: %u\n", GetLastError());
627 ok(count
== 3, "got %u\n", count
);
630 static void test_return_status(void)
637 strcpy(buffer
, "abcdef");
638 status
= STATUS_SUCCESS
;
639 SetLastError(0xdeadbeef);
640 ret
= DeviceIoControl(device
, IOCTL_WINETEST_RETURN_STATUS
, &status
,
641 sizeof(status
), buffer
, sizeof(buffer
), &ret_size
, NULL
);
642 ok(ret
, "ioctl failed\n");
643 ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError());
644 ok(!strcmp(buffer
, "ghidef"), "got buffer %s\n", buffer
);
645 ok(ret_size
== 3, "got size %u\n", ret_size
);
647 strcpy(buffer
, "abcdef");
648 status
= STATUS_TIMEOUT
;
649 SetLastError(0xdeadbeef);
650 ret
= DeviceIoControl(device
, IOCTL_WINETEST_RETURN_STATUS
, &status
,
651 sizeof(status
), buffer
, sizeof(buffer
), &ret_size
, NULL
);
652 todo_wine
ok(ret
, "ioctl failed\n");
653 todo_wine
ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError());
654 ok(!strcmp(buffer
, "ghidef"), "got buffer %s\n", buffer
);
655 ok(ret_size
== 3, "got size %u\n", ret_size
);
657 strcpy(buffer
, "abcdef");
659 SetLastError(0xdeadbeef);
660 ret
= DeviceIoControl(device
, IOCTL_WINETEST_RETURN_STATUS
, &status
,
661 sizeof(status
), buffer
, sizeof(buffer
), &ret_size
, NULL
);
662 todo_wine
ok(ret
, "ioctl failed\n");
663 todo_wine
ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError());
664 ok(!strcmp(buffer
, "ghidef"), "got buffer %s\n", buffer
);
665 ok(ret_size
== 3, "got size %u\n", ret_size
);
667 strcpy(buffer
, "abcdef");
669 SetLastError(0xdeadbeef);
670 ret
= DeviceIoControl(device
, IOCTL_WINETEST_RETURN_STATUS
, &status
,
671 sizeof(status
), buffer
, sizeof(buffer
), &ret_size
, NULL
);
672 todo_wine
ok(ret
, "ioctl failed\n");
673 todo_wine
ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError());
674 ok(!strcmp(buffer
, "ghidef"), "got buffer %s\n", buffer
);
675 ok(ret_size
== 3, "got size %u\n", ret_size
);
677 strcpy(buffer
, "abcdef");
679 SetLastError(0xdeadbeef);
680 ret
= DeviceIoControl(device
, IOCTL_WINETEST_RETURN_STATUS
, &status
,
681 sizeof(status
), buffer
, sizeof(buffer
), &ret_size
, NULL
);
682 ok(!ret
, "ioctl succeeded\n");
683 ok(GetLastError() == ERROR_MR_MID_NOT_FOUND
, "got error %u\n", GetLastError());
684 ok(!strcmp(buffer
, "ghidef"), "got buffer %s\n", buffer
);
685 ok(ret_size
== 3, "got size %u\n", ret_size
);
687 strcpy(buffer
, "abcdef");
689 SetLastError(0xdeadbeef);
690 ret
= DeviceIoControl(device
, IOCTL_WINETEST_RETURN_STATUS
, &status
,
691 sizeof(status
), buffer
, sizeof(buffer
), &ret_size
, NULL
);
692 ok(!ret
, "ioctl succeeded\n");
693 ok(GetLastError() == ERROR_MR_MID_NOT_FOUND
, "got error %u\n", GetLastError());
694 ok(!strcmp(buffer
, "abcdef"), "got buffer %s\n", buffer
);
695 ok(ret_size
== 3, "got size %u\n", ret_size
);
698 static BOOL
compare_unicode_string(const WCHAR
*buffer
, ULONG len
, const WCHAR
*expect
)
700 return len
== wcslen(expect
) * sizeof(WCHAR
) && !memcmp(buffer
, expect
, len
);
703 static void test_object_info(void)
706 OBJECT_NAME_INFORMATION
*name_info
= (OBJECT_NAME_INFORMATION
*)buffer
;
707 OBJECT_TYPE_INFORMATION
*type_info
= (OBJECT_TYPE_INFORMATION
*)buffer
;
708 FILE_FS_VOLUME_INFORMATION
*volume_info
= (FILE_FS_VOLUME_INFORMATION
*)buffer
;
709 FILE_NAME_INFORMATION
*file_info
= (FILE_NAME_INFORMATION
*)buffer
;
715 status
= NtQueryObject(device
, ObjectNameInformation
, buffer
, sizeof(buffer
), NULL
);
716 ok(!status
, "got %#x\n", status
);
717 ok(compare_unicode_string(name_info
->Name
.Buffer
, name_info
->Name
.Length
, L
"\\Device\\WineTestDriver"),
718 "wrong name %s\n", debugstr_w(name_info
->Name
.Buffer
));
720 status
= NtQueryObject(device
, ObjectTypeInformation
, buffer
, sizeof(buffer
), NULL
);
721 ok(!status
, "got %#x\n", status
);
722 ok(compare_unicode_string(type_info
->TypeName
.Buffer
, type_info
->TypeName
.Length
, L
"File"),
723 "wrong name %s\n", debugstr_wn(type_info
->TypeName
.Buffer
, type_info
->TypeName
.Length
/ sizeof(WCHAR
)));
725 status
= NtQueryInformationFile(device
, &io
, buffer
, sizeof(buffer
), FileNameInformation
);
726 todo_wine
ok(status
== STATUS_INVALID_DEVICE_REQUEST
, "got %#x\n", status
);
728 status
= NtQueryVolumeInformationFile(device
, &io
, buffer
, sizeof(buffer
), FileFsVolumeInformation
);
729 todo_wine
ok(status
== STATUS_INVALID_DEVICE_REQUEST
, "got %#x\n", status
);
731 file
= CreateFileA("\\\\.\\WineTestDriver\\subfile", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
732 todo_wine
ok(file
!= INVALID_HANDLE_VALUE
, "got error %u\n", GetLastError());
733 if (file
== INVALID_HANDLE_VALUE
) return;
735 memset(buffer
, 0xcc, sizeof(buffer
));
736 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, sizeof(buffer
), &size
);
737 ok(!status
, "got %#x\n", status
);
738 ok(size
== sizeof(*name_info
) + sizeof(L
"\\Device\\WineTestDriver\\subfile"), "wrong size %u\n", size
);
739 ok(compare_unicode_string(name_info
->Name
.Buffer
, name_info
->Name
.Length
, L
"\\Device\\WineTestDriver\\subfile"),
740 "wrong name %s\n", debugstr_w(name_info
->Name
.Buffer
));
742 memset(buffer
, 0xcc, sizeof(buffer
));
743 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, size
- 2, &size
);
744 ok(status
== STATUS_BUFFER_OVERFLOW
, "got %#x\n", status
);
745 ok(size
== sizeof(*name_info
) + sizeof(L
"\\Device\\WineTestDriver\\subfile"), "wrong size %u\n", size
);
746 ok(compare_unicode_string(name_info
->Name
.Buffer
, name_info
->Name
.Length
, L
"\\Device\\WineTestDriver\\subfil"),
747 "wrong name %s\n", debugstr_w(name_info
->Name
.Buffer
));
749 memset(buffer
, 0xcc, sizeof(buffer
));
750 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, sizeof(*name_info
), &size
);
751 ok(status
== STATUS_BUFFER_OVERFLOW
, "got %#x\n", status
);
752 ok(size
== sizeof(*name_info
) + sizeof(L
"\\Device\\WineTestDriver\\subfile"), "wrong size %u\n", size
);
754 status
= NtQueryObject(file
, ObjectTypeInformation
, buffer
, sizeof(buffer
), NULL
);
755 ok(!status
, "got %#x\n", status
);
756 ok(compare_unicode_string(type_info
->TypeName
.Buffer
, type_info
->TypeName
.Length
, L
"File"),
757 "wrong name %s\n", debugstr_wn(type_info
->TypeName
.Buffer
, type_info
->TypeName
.Length
/ sizeof(WCHAR
)));
759 status
= NtQueryInformationFile(file
, &io
, buffer
, sizeof(buffer
), FileNameInformation
);
760 ok(!status
, "got %#x\n", status
);
761 ok(compare_unicode_string(file_info
->FileName
, file_info
->FileNameLength
, L
"\\subfile"),
762 "wrong name %s\n", debugstr_wn(file_info
->FileName
, file_info
->FileNameLength
/ sizeof(WCHAR
)));
764 status
= NtQueryVolumeInformationFile(file
, &io
, buffer
, sizeof(buffer
), FileFsVolumeInformation
);
765 ok(!status
, "got %#x\n", status
);
766 ok(volume_info
->VolumeSerialNumber
== 0xdeadbeef,
767 "wrong serial number 0x%08x\n", volume_info
->VolumeSerialNumber
);
768 ok(compare_unicode_string(volume_info
->VolumeLabel
, volume_info
->VolumeLabelLength
, L
"WineTestDriver"),
769 "wrong name %s\n", debugstr_wn(volume_info
->VolumeLabel
, volume_info
->VolumeLabelLength
/ sizeof(WCHAR
)));
773 file
= CreateFileA("\\\\.\\WineTestDriver\\notimpl", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
774 ok(file
!= INVALID_HANDLE_VALUE
, "got error %u\n", GetLastError());
776 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, sizeof(buffer
), NULL
);
777 ok(!status
, "got %#x\n", status
);
778 ok(compare_unicode_string(name_info
->Name
.Buffer
, name_info
->Name
.Length
, L
"\\Device\\WineTestDriver"),
779 "wrong name %s\n", debugstr_w(name_info
->Name
.Buffer
));
781 status
= NtQueryInformationFile(file
, &io
, buffer
, sizeof(buffer
), FileNameInformation
);
782 ok(status
== STATUS_NOT_IMPLEMENTED
, "got %#x\n", status
);
786 file
= CreateFileA("\\\\.\\WineTestDriver\\badparam", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
787 ok(file
!= INVALID_HANDLE_VALUE
, "got error %u\n", GetLastError());
789 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, sizeof(buffer
), NULL
);
790 ok(!status
, "got %#x\n", status
);
791 ok(compare_unicode_string(name_info
->Name
.Buffer
, name_info
->Name
.Length
, L
"\\Device\\WineTestDriver"),
792 "wrong name %s\n", debugstr_w(name_info
->Name
.Buffer
));
794 status
= NtQueryInformationFile(file
, &io
, buffer
, sizeof(buffer
), FileNameInformation
);
795 ok(status
== STATUS_INVALID_PARAMETER
, "got %#x\n", status
);
799 file
= CreateFileA("\\\\.\\WineTestDriver\\genfail", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
800 ok(file
!= INVALID_HANDLE_VALUE
, "got error %u\n", GetLastError());
802 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, sizeof(buffer
), NULL
);
803 ok(status
== STATUS_UNSUCCESSFUL
, "got %#x\n", status
);
805 status
= NtQueryInformationFile(file
, &io
, buffer
, sizeof(buffer
), FileNameInformation
);
806 ok(status
== STATUS_UNSUCCESSFUL
, "got %#x\n", status
);
810 file
= CreateFileA("\\\\.\\WineTestDriver\\badtype", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
811 ok(file
!= INVALID_HANDLE_VALUE
, "got error %u\n", GetLastError());
813 status
= NtQueryObject(file
, ObjectNameInformation
, buffer
, sizeof(buffer
), NULL
);
814 ok(status
== STATUS_OBJECT_TYPE_MISMATCH
, "got %#x\n", status
);
816 status
= NtQueryInformationFile(file
, &io
, buffer
, sizeof(buffer
), FileNameInformation
);
817 ok(status
== STATUS_OBJECT_TYPE_MISMATCH
, "got %#x\n", status
);
822 static void test_driver3(struct testsign_context
*ctx
)
824 WCHAR filename
[MAX_PATH
];
828 service
= load_driver(ctx
, filename
, L
"driver3.dll", L
"WineTestDriver3");
829 ok(service
!= NULL
, "driver3 failed to load\n");
831 ret
= StartServiceA(service
, 0, NULL
);
832 ok(!ret
, "driver3 should fail to start\n");
833 ok(GetLastError() == ERROR_CALL_NOT_IMPLEMENTED
||
834 GetLastError() == ERROR_INVALID_FUNCTION
||
835 GetLastError() == ERROR_PROC_NOT_FOUND
/* XP */ ||
836 GetLastError() == ERROR_FILE_NOT_FOUND
/* Win7 */, "got %u\n", GetLastError());
838 DeleteService(service
);
839 CloseServiceHandle(service
);
840 DeleteFileW(filename
);
843 static DWORD WINAPI
wsk_test_thread(void *parameter
)
845 static const char test_send_string
[] = "Client test string 1.";
846 static const WORD version
= MAKEWORD(2, 2);
847 SOCKET s_listen
, s_accept
, s_connect
;
848 struct sockaddr_in addr
;
854 ret
= WSAStartup(version
, &data
);
855 ok(!ret
, "WSAStartup() failed, ret %u.\n", ret
);
857 s_connect
= socket(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
);
858 ok(s_connect
!= INVALID_SOCKET
, "Error creating socket, WSAGetLastError() %u.\n", WSAGetLastError());
860 s_listen
= socket(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
);
861 ok(s_listen
!= INVALID_SOCKET
, "Error creating socket, WSAGetLastError() %u.\n", WSAGetLastError());
864 setsockopt(s_listen
, SOL_SOCKET
, SO_REUSEADDR
, (const char *)&opt_val
, sizeof(opt_val
));
866 memset(&addr
, 0, sizeof(addr
));
867 addr
.sin_family
= AF_INET
;
868 addr
.sin_port
= htons(CLIENT_LISTEN_PORT
);
869 addr
.sin_addr
.s_addr
= htonl(0x7f000001);
870 ret
= bind(s_listen
, (struct sockaddr
*)&addr
, sizeof(addr
));
871 ok(!ret
, "Got unexpected ret %d, WSAGetLastError() %u.\n", ret
, WSAGetLastError());
873 ret
= listen(s_listen
, SOMAXCONN
);
874 ok(!ret
, "Got unexpected ret %d, WSAGetLastError() %u.\n", ret
, WSAGetLastError());
876 addr
.sin_port
= htons(SERVER_LISTEN_PORT
);
878 ret
= connect(s_connect
, (struct sockaddr
*)&addr
, sizeof(addr
));
879 while (ret
&& ((err
= WSAGetLastError()) == WSAECONNREFUSED
|| err
== WSAECONNABORTED
))
882 ret
= connect(s_connect
, (struct sockaddr
*)&addr
, sizeof(addr
));
884 ok(!ret
, "Error connecting, WSAGetLastError() %u.\n", WSAGetLastError());
886 ret
= send(s_connect
, test_send_string
, sizeof(test_send_string
), 0);
887 ok(ret
== sizeof(test_send_string
), "Got unexpected ret %d.\n", ret
);
889 ret
= recv(s_connect
, buffer
, sizeof(buffer
), 0);
890 ok(ret
== sizeof(buffer
), "Got unexpected ret %d.\n", ret
);
891 ok(!strcmp(buffer
, "Server test string 1."), "Received unexpected data.\n");
893 s_accept
= accept(s_listen
, NULL
, NULL
);
894 ok(s_accept
!= INVALID_SOCKET
, "Error creating socket, WSAGetLastError() %u.\n", WSAGetLastError());
896 closesocket(s_accept
);
897 closesocket(s_connect
);
898 closesocket(s_listen
);
902 static void test_driver4(struct testsign_context
*ctx
)
904 WCHAR filename
[MAX_PATH
];
910 if (!(service
= load_driver(ctx
, filename
, L
"driver4.dll", L
"WineTestDriver4")))
913 if (!start_driver(service
, TRUE
))
915 DeleteFileW(filename
);
919 device
= CreateFileA("\\\\.\\WineTestDriver4", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
920 ok(device
!= INVALID_HANDLE_VALUE
, "failed to open device: %u\n", GetLastError());
922 hthread
= CreateThread(NULL
, 0, wsk_test_thread
, NULL
, 0, NULL
);
924 WaitForSingleObject(hthread
, INFINITE
);
926 ret
= DeviceIoControl(device
, IOCTL_WINETEST_DETACH
, NULL
, 0, NULL
, 0, &written
, NULL
);
927 ok(ret
, "DeviceIoControl failed: %u\n", GetLastError());
931 unload_driver(service
);
932 ret
= DeleteFileW(filename
);
933 ok(ret
, "DeleteFile failed: %u\n", GetLastError());
936 static void add_file_to_catalog(HANDLE catalog
, const WCHAR
*file
)
938 SIP_SUBJECTINFO subject_info
= {sizeof(SIP_SUBJECTINFO
)};
939 SIP_INDIRECT_DATA
*indirect_data
;
940 const WCHAR
*filepart
= file
;
941 CRYPTCATMEMBER
*member
;
942 WCHAR hash_buffer
[100];
948 ret
= CryptSIPRetrieveSubjectGuidForCatalogFile(file
, NULL
, &subject_guid
);
949 todo_wine
ok(ret
, "Failed to get subject guid, error %u\n", GetLastError());
952 subject_info
.pgSubjectType
= &subject_guid
;
953 subject_info
.pwsFileName
= file
;
954 subject_info
.DigestAlgorithm
.pszObjId
= (char *)szOID_OIWSEC_sha1
;
955 subject_info
.dwFlags
= SPC_INC_PE_RESOURCES_FLAG
| SPC_INC_PE_IMPORT_ADDR_TABLE_FLAG
| SPC_EXC_PE_PAGE_HASHES_FLAG
| 0x10000;
956 ret
= CryptSIPCreateIndirectData(&subject_info
, &size
, NULL
);
957 todo_wine
ok(ret
, "Failed to get indirect data size, error %u\n", GetLastError());
959 indirect_data
= malloc(size
);
960 ret
= CryptSIPCreateIndirectData(&subject_info
, &size
, indirect_data
);
961 todo_wine
ok(ret
, "Failed to get indirect data, error %u\n", GetLastError());
964 memset(hash_buffer
, 0, sizeof(hash_buffer
));
965 for (i
= 0; i
< indirect_data
->Digest
.cbData
; ++i
)
966 swprintf(&hash_buffer
[i
* 2], 2, L
"%02X", indirect_data
->Digest
.pbData
[i
]);
968 member
= CryptCATPutMemberInfo(catalog
, (WCHAR
*)file
,
969 hash_buffer
, &subject_guid
, 0, size
, (BYTE
*)indirect_data
);
970 ok(!!member
, "Failed to write member, error %u\n", GetLastError());
972 if (wcsrchr(file
, '\\'))
973 filepart
= wcsrchr(file
, '\\') + 1;
975 ret
= !!CryptCATPutAttrInfo(catalog
, member
, (WCHAR
*)L
"File",
976 CRYPTCAT_ATTR_NAMEASCII
| CRYPTCAT_ATTR_DATAASCII
| CRYPTCAT_ATTR_AUTHENTICATED
,
977 (wcslen(filepart
) + 1) * 2, (BYTE
*)filepart
);
978 ok(ret
, "Failed to write attr, error %u\n", GetLastError());
980 ret
= !!CryptCATPutAttrInfo(catalog
, member
, (WCHAR
*)L
"OSAttr",
981 CRYPTCAT_ATTR_NAMEASCII
| CRYPTCAT_ATTR_DATAASCII
| CRYPTCAT_ATTR_AUTHENTICATED
,
982 sizeof(L
"2:6.0"), (BYTE
*)L
"2:6.0");
983 ok(ret
, "Failed to write attr, error %u\n", GetLastError());
987 static void test_pnp_devices(void)
989 static const GUID control_class
= {0xdeadbeef, 0x29ef, 0x4538, {0xa5, 0xfd, 0xb6, 0x95, 0x73, 0xa3, 0x62, 0xc0}};
992 SP_DEVICE_INTERFACE_DETAIL_DATA_A
*iface_detail
= (void *)buffer
;
993 SP_DEVICE_INTERFACE_DATA iface
= {sizeof(iface
)};
994 SP_DEVINFO_DATA device
= {sizeof(device
)};
999 set
= SetupDiGetClassDevsA(&control_class
, NULL
, NULL
, DIGCF_PRESENT
| DIGCF_DEVICEINTERFACE
);
1000 ok(set
!= INVALID_HANDLE_VALUE
, "failed to get device list, error %#x\n", GetLastError());
1002 ret
= SetupDiEnumDeviceInfo(set
, 0, &device
);
1003 ok(ret
, "failed to get device, error %#x\n", GetLastError());
1004 ok(IsEqualGUID(&device
.ClassGuid
, &GUID_DEVCLASS_SYSTEM
), "wrong class %s\n", debugstr_guid(&device
.ClassGuid
));
1006 ret
= SetupDiGetDeviceInstanceIdA(set
, &device
, buffer
, sizeof(buffer
), NULL
);
1007 ok(ret
, "failed to get device ID, error %#x\n", GetLastError());
1008 ok(!strcasecmp(buffer
, "root\\winetest\\0"), "got ID %s\n", debugstr_a(buffer
));
1010 ret
= SetupDiEnumDeviceInterfaces(set
, NULL
, &control_class
, 0, &iface
);
1011 ok(ret
, "failed to get interface, error %#x\n", GetLastError());
1012 ok(IsEqualGUID(&iface
.InterfaceClassGuid
, &control_class
),
1013 "wrong class %s\n", debugstr_guid(&iface
.InterfaceClassGuid
));
1014 ok(iface
.Flags
== SPINT_ACTIVE
, "got flags %#x\n", iface
.Flags
);
1016 iface_detail
->cbSize
= sizeof(*iface_detail
);
1017 ret
= SetupDiGetDeviceInterfaceDetailA(set
, &iface
, iface_detail
, sizeof(buffer
), NULL
, NULL
);
1018 ok(ret
, "failed to get interface path, error %#x\n", GetLastError());
1019 ok(!strcasecmp(iface_detail
->DevicePath
, "\\\\?\\root#winetest#0#{deadbeef-29ef-4538-a5fd-b69573a362c0}"),
1020 "wrong path %s\n", debugstr_a(iface_detail
->DevicePath
));
1022 SetupDiDestroyDeviceInfoList(set
);
1024 bus
= CreateFileA(iface_detail
->DevicePath
, 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
1025 ok(bus
!= INVALID_HANDLE_VALUE
, "got error %u\n", GetLastError());
1030 static void test_pnp_driver(struct testsign_context
*ctx
)
1032 static const char hardware_id
[] = "test_hardware_id\0";
1033 char path
[MAX_PATH
], dest
[MAX_PATH
], *filepart
;
1034 SP_DEVINFO_DATA device
= {sizeof(device
)};
1035 char cwd
[MAX_PATH
], tempdir
[MAX_PATH
];
1036 WCHAR driver_filename
[MAX_PATH
];
1037 SC_HANDLE manager
, service
;
1038 BOOL ret
, need_reboot
;
1039 HANDLE catalog
, file
;
1045 #elif defined(__x86_64__)
1047 #elif defined(__arm__)
1049 #elif defined(__aarch64__)
1055 static const char inf_text
[] =
1057 "Signature=$Chicago$\n"
1058 "ClassGuid={4d36e97d-e325-11ce-bfc1-08002be10318}\n"
1059 "CatalogFile=winetest.cat\n"
1060 "DriverVer=09/21/2006,6.0.5736.1\n"
1063 "Wine=mfg_section,NT" EXT
"\n"
1065 "[mfg_section.NT" EXT
"]\n"
1066 "Wine test root driver=device_section,test_hardware_id\n"
1068 "[device_section.NT" EXT
"]\n"
1069 "CopyFiles=file_section\n"
1071 "[device_section.NT" EXT
".Services]\n"
1072 "AddService=winetest,0x2,svc_section\n"
1077 "[SourceDisksFiles]\n"
1080 "[SourceDisksNames]\n"
1083 "[DestinationDirs]\n"
1084 "DefaultDestDir=12\n"
1087 "ServiceBinary=%12%\\winetest.sys\n"
1091 "LoadOrderGroup=Extended Base\n"
1092 "DisplayName=\"winetest bus driver\"\n"
1093 "; they don't sleep anymore, on the beach\n";
1095 GetCurrentDirectoryA(ARRAY_SIZE(cwd
), cwd
);
1096 GetTempPathA(ARRAY_SIZE(tempdir
), tempdir
);
1097 SetCurrentDirectoryA(tempdir
);
1099 load_resource(L
"driver_pnp.dll", driver_filename
);
1100 ret
= MoveFileExW(driver_filename
, L
"winetest.sys", MOVEFILE_COPY_ALLOWED
| MOVEFILE_REPLACE_EXISTING
);
1101 ok(ret
, "failed to move file, error %u\n", GetLastError());
1103 f
= fopen("winetest.inf", "w");
1104 ok(!!f
, "failed to open winetest.inf: %s\n", strerror(errno
));
1108 /* Create the catalog file. */
1110 catalog
= CryptCATOpen((WCHAR
*)L
"winetest.cat", CRYPTCAT_OPEN_CREATENEW
, 0, CRYPTCAT_VERSION_1
, 0);
1111 ok(catalog
!= INVALID_HANDLE_VALUE
, "Failed to create catalog, error %#x\n", GetLastError());
1113 ret
= !!CryptCATPutCatAttrInfo(catalog
, (WCHAR
*)L
"HWID1",
1114 CRYPTCAT_ATTR_NAMEASCII
| CRYPTCAT_ATTR_DATAASCII
| CRYPTCAT_ATTR_AUTHENTICATED
,
1115 sizeof(L
"test_hardware_id"), (BYTE
*)L
"test_hardware_id");
1116 todo_wine
ok(ret
, "failed to add attribute, error %#x\n", GetLastError());
1118 ret
= !!CryptCATPutCatAttrInfo(catalog
, (WCHAR
*)L
"OS",
1119 CRYPTCAT_ATTR_NAMEASCII
| CRYPTCAT_ATTR_DATAASCII
| CRYPTCAT_ATTR_AUTHENTICATED
,
1120 sizeof(L
"VistaX64"), (BYTE
*)L
"VistaX64");
1121 todo_wine
ok(ret
, "failed to add attribute, error %#x\n", GetLastError());
1123 add_file_to_catalog(catalog
, L
"winetest.sys");
1124 add_file_to_catalog(catalog
, L
"winetest.inf");
1126 ret
= CryptCATPersistStore(catalog
);
1127 todo_wine
ok(ret
, "Failed to write catalog, error %u\n", GetLastError());
1129 ret
= CryptCATClose(catalog
);
1130 ok(ret
, "Failed to close catalog, error %u\n", GetLastError());
1132 testsign_sign(ctx
, L
"winetest.cat");
1134 /* Install the driver. */
1136 set
= SetupDiCreateDeviceInfoList(NULL
, NULL
);
1137 ok(set
!= INVALID_HANDLE_VALUE
, "failed to create device list, error %#x\n", GetLastError());
1139 ret
= SetupDiCreateDeviceInfoA(set
, "root\\winetest\\0", &GUID_NULL
, NULL
, NULL
, 0, &device
);
1140 ok(ret
, "failed to create device, error %#x\n", GetLastError());
1142 ret
= SetupDiSetDeviceRegistryPropertyA( set
, &device
, SPDRP_HARDWAREID
,
1143 (const BYTE
*)hardware_id
, sizeof(hardware_id
) );
1144 ok(ret
, "failed to create set hardware ID, error %#x\n", GetLastError());
1146 ret
= SetupDiCallClassInstaller(DIF_REGISTERDEVICE
, set
, &device
);
1147 ok(ret
, "failed to register device, error %#x\n", GetLastError());
1149 GetFullPathNameA("winetest.inf", sizeof(path
), path
, NULL
);
1150 ret
= UpdateDriverForPlugAndPlayDevicesA(NULL
, hardware_id
, path
, INSTALLFLAG_FORCE
, &need_reboot
);
1151 ok(ret
, "failed to install device, error %#x\n", GetLastError());
1152 ok(!need_reboot
, "expected no reboot necessary\n");
1160 ret
= SetupDiCallClassInstaller(DIF_REMOVE
, set
, &device
);
1161 ok(ret
, "failed to remove device, error %#x\n", GetLastError());
1163 file
= CreateFileA("\\\\?\\root#winetest#0#{deadbeef-29ef-4538-a5fd-b69573a362c0}", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
1164 ok(file
== INVALID_HANDLE_VALUE
, "expected failure\n");
1165 ok(GetLastError() == ERROR_FILE_NOT_FOUND
, "got error %u\n", GetLastError());
1167 ret
= SetupDiDestroyDeviceInfoList(set
);
1168 ok(ret
, "failed to destroy set, error %#x\n", GetLastError());
1170 /* Windows stops the service but does not delete it. */
1171 manager
= OpenSCManagerA(NULL
, NULL
, SC_MANAGER_CONNECT
);
1172 ok(!!manager
, "failed to open service manager, error %u\n", GetLastError());
1173 service
= OpenServiceA(manager
, "winetest", SERVICE_STOP
| DELETE
);
1174 ok(!!service
, "failed to open service, error %u\n", GetLastError());
1175 unload_driver(service
);
1176 CloseServiceHandle(manager
);
1178 GetFullPathNameA("winetest.inf", sizeof(path
), path
, NULL
);
1179 ret
= SetupCopyOEMInfA(path
, NULL
, 0, 0, dest
, sizeof(dest
), NULL
, &filepart
);
1180 ok(ret
, "Failed to copy INF, error %#x\n", GetLastError());
1181 ret
= SetupUninstallOEMInfA(filepart
, 0, NULL
);
1182 ok(ret
, "Failed to uninstall INF, error %u\n", GetLastError());
1184 ret
= DeleteFileA("winetest.cat");
1185 ok(ret
, "Failed to delete file, error %u\n", GetLastError());
1186 ret
= DeleteFileA("winetest.inf");
1187 ok(ret
, "Failed to delete file, error %u\n", GetLastError());
1188 ret
= DeleteFileA("winetest.sys");
1189 ok(ret
, "Failed to delete file, error %u\n", GetLastError());
1190 /* Windows 10 apparently deletes the image in SetupUninstallOEMInf(). */
1191 ret
= DeleteFileA("C:/windows/system32/drivers/winetest.sys");
1192 ok(ret
|| GetLastError() == ERROR_FILE_NOT_FOUND
, "Failed to delete file, error %u\n", GetLastError());
1194 SetCurrentDirectoryA(cwd
);
1197 START_TEST(ntoskrnl
)
1199 WCHAR filename
[MAX_PATH
], filename2
[MAX_PATH
];
1200 struct testsign_context ctx
;
1201 SC_HANDLE service
, service2
;
1205 pRtlDosPathNameToNtPathName_U
= (void *)GetProcAddress(GetModuleHandleA("ntdll"), "RtlDosPathNameToNtPathName_U");
1206 pRtlFreeUnicodeString
= (void *)GetProcAddress(GetModuleHandleA("ntdll"), "RtlFreeUnicodeString");
1207 pCancelIoEx
= (void *)GetProcAddress(GetModuleHandleA("kernel32.dll"), "CancelIoEx");
1208 pIsWow64Process
= (void *)GetProcAddress(GetModuleHandleA("kernel32.dll"), "IsWow64Process");
1209 pSetFileCompletionNotificationModes
= (void *)GetProcAddress(GetModuleHandleA("kernel32.dll"),
1210 "SetFileCompletionNotificationModes");
1211 pSignerSign
= (void *)GetProcAddress(LoadLibraryA("mssign32"), "SignerSign");
1213 if (IsWow64Process(GetCurrentProcess(), &is_wow64
) && is_wow64
)
1215 skip("Running in WoW64.\n");
1219 if (!testsign_create_cert(&ctx
))
1223 if (!(service
= load_driver(&ctx
, filename
, L
"driver.dll", L
"WineTestDriver")))
1225 testsign_cleanup(&ctx
);
1229 if (!start_driver(service
, FALSE
))
1231 DeleteFileW(filename
);
1232 testsign_cleanup(&ctx
);
1235 service2
= load_driver(&ctx
, filename2
, L
"driver2.dll", L
"WineTestDriver2");
1237 device
= CreateFileA("\\\\.\\WineTestDriver", 0, 0, NULL
, OPEN_EXISTING
, 0, NULL
);
1238 ok(device
!= INVALID_HANDLE_VALUE
, "failed to open device: %u\n", GetLastError());
1241 test_mismatched_status_ioctl();
1244 todo_wine
ok(modified_value
== 0xdeadbeeffeedcafe, "Got unexpected value %#I64x.\n", modified_value
);
1247 test_load_driver(service2
);
1248 test_file_handles();
1249 test_return_status();
1252 /* We need a separate ioctl to call IoDetachDevice(); calling it in the
1253 * driver unload routine causes a live-lock. */
1254 ret
= DeviceIoControl(device
, IOCTL_WINETEST_DETACH
, NULL
, 0, NULL
, 0, &written
, NULL
);
1255 ok(ret
, "DeviceIoControl failed: %u\n", GetLastError());
1257 CloseHandle(device
);
1259 unload_driver(service2
);
1260 unload_driver(service
);
1261 ret
= DeleteFileW(filename
);
1262 ok(ret
, "DeleteFile failed: %u\n", GetLastError());
1263 ret
= DeleteFileW(filename2
);
1264 ok(ret
, "DeleteFile failed: %u\n", GetLastError());
1270 test_pnp_driver(&ctx
);
1272 testsign_cleanup(&ctx
);