dpwsockx: Implementation of SPInit
[wine/gsoc_dplay.git] / dlls / advapi32 / tests / cred.c
blob8d66ed000dbd49a8133d4c2b2c102c7377a291ea
1 /*
2 * Credential Function Tests
4 * Copyright 2007 Robert Shearman
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #include <stdarg.h>
22 #include <stdio.h>
24 #include "windef.h"
25 #include "winbase.h"
26 #include "wincred.h"
28 #include "wine/test.h"
30 static BOOL (WINAPI *pCredDeleteA)(LPCSTR,DWORD,DWORD);
31 static BOOL (WINAPI *pCredEnumerateA)(LPCSTR,DWORD,DWORD *,PCREDENTIALA **);
32 static VOID (WINAPI *pCredFree)(PVOID);
33 static BOOL (WINAPI *pCredGetSessionTypes)(DWORD,LPDWORD);
34 static BOOL (WINAPI *pCredReadA)(LPCSTR,DWORD,DWORD,PCREDENTIALA *);
35 static BOOL (WINAPI *pCredRenameA)(LPCSTR,LPCSTR,DWORD,DWORD);
36 static BOOL (WINAPI *pCredWriteA)(PCREDENTIALA,DWORD);
37 static BOOL (WINAPI *pCredReadDomainCredentialsA)(PCREDENTIAL_TARGET_INFORMATIONA,DWORD,DWORD*,PCREDENTIALA**);
40 #define TEST_TARGET_NAME "credtest.winehq.org"
41 #define TEST_TARGET_NAME2 "credtest2.winehq.org"
42 static const WCHAR TEST_PASSWORD[] = {'p','4','$','$','w','0','r','d','!',0};
44 static void test_CredReadA(void)
46 BOOL ret;
47 PCREDENTIALA cred;
49 SetLastError(0xdeadbeef);
50 ret = pCredReadA(TEST_TARGET_NAME, -1, 0, &cred);
51 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
52 "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
53 GetLastError());
55 SetLastError(0xdeadbeef);
56 ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef, &cred);
57 ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER ),
58 "CredReadA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n",
59 GetLastError());
61 SetLastError(0xdeadbeef);
62 ret = pCredReadA(NULL, CRED_TYPE_GENERIC, 0, &cred);
63 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
64 "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
65 GetLastError());
68 static void test_CredWriteA(void)
70 CREDENTIALA new_cred;
71 BOOL ret;
73 SetLastError(0xdeadbeef);
74 ret = pCredWriteA(NULL, 0);
75 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
76 "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
77 GetLastError());
79 new_cred.Flags = 0;
80 new_cred.Type = CRED_TYPE_GENERIC;
81 new_cred.TargetName = NULL;
82 new_cred.Comment = (char *)"Comment";
83 new_cred.CredentialBlobSize = 0;
84 new_cred.CredentialBlob = NULL;
85 new_cred.Persist = CRED_PERSIST_ENTERPRISE;
86 new_cred.AttributeCount = 0;
87 new_cred.Attributes = NULL;
88 new_cred.TargetAlias = NULL;
89 new_cred.UserName = (char *)"winetest";
91 SetLastError(0xdeadbeef);
92 ret = pCredWriteA(&new_cred, 0);
93 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
94 "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
95 GetLastError());
97 new_cred.TargetName = (char *)TEST_TARGET_NAME;
98 new_cred.Type = CRED_TYPE_DOMAIN_PASSWORD;
100 SetLastError(0xdeadbeef);
101 ret = pCredWriteA(&new_cred, 0);
102 if (ret)
104 ok(GetLastError() == ERROR_SUCCESS ||
105 GetLastError() == ERROR_IO_PENDING, /* Vista */
106 "Expected ERROR_IO_PENDING, got %d\n", GetLastError());
108 else
110 ok(GetLastError() == ERROR_BAD_USERNAME ||
111 GetLastError() == ERROR_NO_SUCH_LOGON_SESSION, /* Vista */
112 "CredWrite with username without domain should return ERROR_BAD_USERNAME"
113 "or ERROR_NO_SUCH_LOGON_SESSION not %d\n", GetLastError());
116 new_cred.UserName = NULL;
117 SetLastError(0xdeadbeef);
118 ret = pCredWriteA(&new_cred, 0);
119 ok(!ret && GetLastError() == ERROR_BAD_USERNAME,
120 "CredWriteA with NULL username should have failed with ERROR_BAD_USERNAME instead of %d\n",
121 GetLastError());
124 static void test_CredDeleteA(void)
126 BOOL ret;
128 SetLastError(0xdeadbeef);
129 ret = pCredDeleteA(TEST_TARGET_NAME, -1, 0);
130 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
131 "CredDeleteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
132 GetLastError());
134 SetLastError(0xdeadbeef);
135 ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef);
136 ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ ),
137 "CredDeleteA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n",
138 GetLastError());
141 static void test_CredReadDomainCredentialsA(void)
143 BOOL ret;
144 char target_name[] = "no_such_target";
145 CREDENTIAL_TARGET_INFORMATIONA info = {target_name, NULL, target_name, NULL, NULL, NULL, NULL, 0, 0, NULL};
146 DWORD count;
147 PCREDENTIAL* creds;
149 if (!pCredReadDomainCredentialsA)
151 win_skip("CredReadDomainCredentialsA() is not implemented\n");
152 return;
155 /* these two tests would crash on both native and Wine. Implementations
156 * does not check for NULL output pointers and try to zero them out early */
157 #if 0
158 ok(!pCredReadDomainCredentialsA(&info, 0, NULL, &creds) &&
159 GetLastError() == ERROR_INVALID_PARAMETER, "!\n");
160 ok(!pCredReadDomainCredentialsA(&info, 0, &count, NULL) &&
161 GetLastError() == ERROR_INVALID_PARAMETER, "!\n");
162 #endif
164 SetLastError(0xdeadbeef);
165 ret = pCredReadDomainCredentialsA(NULL, 0, &count, &creds);
166 ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
167 "CredReadDomainCredentialsA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
168 GetLastError());
170 SetLastError(0xdeadbeef);
171 creds = (void*)0x12345;
172 count = 2;
173 ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
174 ok(!ret && GetLastError() == ERROR_NOT_FOUND,
175 "CredReadDomainCredentialsA should have failed with ERROR_NOT_FOUND instead of %d\n",
176 GetLastError());
177 ok(count ==0 && creds == NULL, "CredReadDomainCredentialsA must not return any result\n");
179 info.TargetName = NULL;
181 SetLastError(0xdeadbeef);
182 ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
183 ok(!ret, "CredReadDomainCredentialsA should have failed\n");
184 ok(GetLastError() == ERROR_NOT_FOUND ||
185 GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
186 "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n",
187 GetLastError());
189 info.DnsServerName = NULL;
191 SetLastError(0xdeadbeef);
192 ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
193 ok(!ret, "CredReadDomainCredentialsA should have failed\n");
194 ok(GetLastError() == ERROR_NOT_FOUND ||
195 GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
196 "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n",
197 GetLastError());
200 static void check_blob(int line, DWORD cred_type, PCREDENTIALA cred)
202 if (cred_type == CRED_TYPE_DOMAIN_PASSWORD)
204 todo_wine
205 ok_(__FILE__, line)(cred->CredentialBlobSize == 0, "expected CredentialBlobSize of 0 but got %d\n", cred->CredentialBlobSize);
206 todo_wine
207 ok_(__FILE__, line)(!cred->CredentialBlob, "expected NULL credentials but got %p\n", cred->CredentialBlob);
209 else
211 DWORD size=sizeof(TEST_PASSWORD);
212 ok_(__FILE__, line)(cred->CredentialBlobSize == size, "expected CredentialBlobSize of %u but got %u\n", size, cred->CredentialBlobSize);
213 ok_(__FILE__, line)(cred->CredentialBlob != NULL, "CredentialBlob should be present\n");
214 if (cred->CredentialBlob)
215 ok_(__FILE__, line)(!memcmp(cred->CredentialBlob, TEST_PASSWORD, size), "wrong CredentialBlob\n");
219 static void test_generic(void)
221 BOOL ret;
222 DWORD count, i;
223 PCREDENTIALA *creds;
224 CREDENTIALA new_cred;
225 PCREDENTIALA cred;
226 BOOL found = FALSE;
228 new_cred.Flags = 0;
229 new_cred.Type = CRED_TYPE_GENERIC;
230 new_cred.TargetName = (char *)TEST_TARGET_NAME;
231 new_cred.Comment = (char *)"Comment";
232 new_cred.CredentialBlobSize = sizeof(TEST_PASSWORD);
233 new_cred.CredentialBlob = (LPBYTE)TEST_PASSWORD;
234 new_cred.Persist = CRED_PERSIST_ENTERPRISE;
235 new_cred.AttributeCount = 0;
236 new_cred.Attributes = NULL;
237 new_cred.TargetAlias = NULL;
238 new_cred.UserName = (char *)"winetest";
240 ret = pCredWriteA(&new_cred, 0);
241 ok(ret || broken(GetLastError() == ERROR_NO_SUCH_LOGON_SESSION),
242 "CredWriteA failed with error %d\n", GetLastError());
243 if (!ret)
245 skip("couldn't write generic credentials, skipping tests\n");
246 return;
249 ret = pCredEnumerateA(NULL, 0, &count, &creds);
250 ok(ret, "CredEnumerateA failed with error %d\n", GetLastError());
252 for (i = 0; i < count; i++)
254 if (!strcmp(creds[i]->TargetName, TEST_TARGET_NAME))
256 ok(creds[i]->Type == CRED_TYPE_GENERIC ||
257 creds[i]->Type == CRED_TYPE_DOMAIN_PASSWORD, /* Vista */
258 "expected creds[%d]->Type CRED_TYPE_GENERIC or CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type);
259 ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags);
260 ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
261 check_blob(__LINE__, creds[i]->Type, creds[i]);
262 ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist);
263 ok(!strcmp(creds[i]->UserName, "winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
264 found = TRUE;
267 pCredFree(creds);
268 ok(found, "credentials not found\n");
270 ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0, &cred);
271 ok(ret, "CredReadA failed with error %d\n", GetLastError());
272 pCredFree(cred);
274 ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
275 ok(ret, "CredDeleteA failed with error %d\n", GetLastError());
278 static void test_domain_password(DWORD cred_type)
280 BOOL ret;
281 DWORD count, i;
282 PCREDENTIALA *creds;
283 CREDENTIALA new_cred;
284 PCREDENTIALA cred;
285 BOOL found = FALSE;
287 new_cred.Flags = 0;
288 new_cred.Type = cred_type;
289 new_cred.TargetName = (char *)TEST_TARGET_NAME;
290 new_cred.Comment = (char *)"Comment";
291 new_cred.CredentialBlobSize = sizeof(TEST_PASSWORD);
292 new_cred.CredentialBlob = (LPBYTE)TEST_PASSWORD;
293 new_cred.Persist = CRED_PERSIST_ENTERPRISE;
294 new_cred.AttributeCount = 0;
295 new_cred.Attributes = NULL;
296 new_cred.TargetAlias = NULL;
297 new_cred.UserName = (char *)"test\\winetest";
298 ret = pCredWriteA(&new_cred, 0);
299 if (!ret && GetLastError() == ERROR_NO_SUCH_LOGON_SESSION)
301 skip("CRED_TYPE_DOMAIN_PASSWORD credentials are not supported "
302 "or are disabled. Skipping\n");
303 return;
305 ok(ret, "CredWriteA failed with error %d\n", GetLastError());
307 ret = pCredEnumerateA(NULL, 0, &count, &creds);
308 ok(ret, "CredEnumerateA failed with error %d\n", GetLastError());
310 for (i = 0; i < count; i++)
312 if (!strcmp(creds[i]->TargetName, TEST_TARGET_NAME))
314 ok(creds[i]->Type == cred_type, "expected creds[%d]->Type CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type);
315 ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags);
316 ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
317 check_blob(__LINE__, cred_type, creds[i]);
318 ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist);
319 ok(!strcmp(creds[i]->UserName, "test\\winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
320 found = TRUE;
323 pCredFree(creds);
324 ok(found, "credentials not found\n");
326 ret = pCredReadA(TEST_TARGET_NAME, cred_type, 0, &cred);
327 ok(ret, "CredReadA failed with error %d\n", GetLastError());
328 if (ret) /* don't check the values of cred, if CredReadA failed. */
330 check_blob(__LINE__, cred_type, cred);
331 pCredFree(cred);
334 ret = pCredDeleteA(TEST_TARGET_NAME, cred_type, 0);
335 ok(ret, "CredDeleteA failed with error %d\n", GetLastError());
338 START_TEST(cred)
340 DWORD persists[CRED_TYPE_MAXIMUM];
342 pCredEnumerateA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredEnumerateA");
343 pCredFree = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredFree");
344 pCredGetSessionTypes = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredGetSessionTypes");
345 pCredWriteA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredWriteA");
346 pCredDeleteA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredDeleteA");
347 pCredReadA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredReadA");
348 pCredRenameA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredRenameA");
349 pCredReadDomainCredentialsA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredReadDomainCredentialsA");
351 if (!pCredEnumerateA || !pCredFree || !pCredWriteA || !pCredDeleteA ||
352 !pCredReadA)
354 win_skip("credentials functions not present in advapi32.dll\n");
355 return;
358 if (pCredGetSessionTypes)
360 BOOL ret;
361 DWORD i;
362 ret = pCredGetSessionTypes(CRED_TYPE_MAXIMUM, persists);
363 ok(ret, "CredGetSessionTypes failed with error %d\n", GetLastError());
364 ok(persists[0] == CRED_PERSIST_NONE, "persists[0] = %u instead of CRED_PERSIST_NONE\n", persists[0]);
365 for (i=0; i < CRED_TYPE_MAXIMUM; i++)
366 ok(persists[i] <= CRED_PERSIST_ENTERPRISE, "bad value for persists[%u]: %u\n", i, persists[i]);
368 else
369 memset(persists, CRED_PERSIST_ENTERPRISE, sizeof(persists));
371 test_CredReadA();
372 test_CredWriteA();
373 test_CredDeleteA();
375 test_CredReadDomainCredentialsA();
377 trace("generic:\n");
378 if (persists[CRED_TYPE_GENERIC] == CRED_PERSIST_NONE)
379 skip("CRED_TYPE_GENERIC credentials are not supported or are disabled. Skipping\n");
380 else
381 test_generic();
383 trace("domain password:\n");
384 if (persists[CRED_TYPE_DOMAIN_PASSWORD] == CRED_PERSIST_NONE)
385 skip("CRED_TYPE_DOMAIN_PASSWORD credentials are not supported or are disabled. Skipping\n");
386 else
387 test_domain_password(CRED_TYPE_DOMAIN_PASSWORD);
389 trace("domain visible password:\n");
390 if (persists[CRED_TYPE_DOMAIN_VISIBLE_PASSWORD] == CRED_PERSIST_NONE)
391 skip("CRED_TYPE_DOMAIN_VISIBLE_PASSWORD credentials are not supported or are disabled. Skipping\n");
392 else
393 test_domain_password(CRED_TYPE_DOMAIN_VISIBLE_PASSWORD);