2 * Copyright 2002 Andriy Palamarchuk
4 * Conformance test of the access functions.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
30 #include "wine/test.h"
32 WCHAR user_name[UNLEN + 1];
33 WCHAR computer_name[MAX_COMPUTERNAME_LENGTH + 1];
35 static const WCHAR sNonexistentUser[] = {'N','o','n','e','x','i','s','t','e','n','t',' ',
37 static WCHAR sTooLongName[] = {'T','h','i','s',' ','i','s',' ','a',' ','b','a','d',
38 ' ','u','s','e','r','n','a','m','e',0};
39 static WCHAR sTooLongPassword[] = {'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
40 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
41 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
42 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
43 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
44 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
45 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
46 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
47 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
48 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
49 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
52 static WCHAR sTestUserName[] = {'t', 'e', 's', 't', 'u', 's', 'e', 'r', 0};
53 static WCHAR sTestUserOldPass[] = {'o', 'l', 'd', 'p', 'a', 's', 's', 0};
54 static WCHAR sTestUserNewPass[] = {'n', 'e', 'w', 'p', 'a', 's', 's', 0};
55 static const WCHAR sBadNetPath[] = {'\\','\\','B','a',' ',' ','p','a','t','h',0};
56 static const WCHAR sInvalidName[] = {'\\',0};
57 static const WCHAR sInvalidName2[] = {'\\','\\',0};
58 static const WCHAR sEmptyStr[] = { 0 };
60 static NET_API_STATUS (WINAPI *pNetApiBufferFree)(LPVOID)=NULL;
61 static NET_API_STATUS (WINAPI *pNetApiBufferSize)(LPVOID,LPDWORD)=NULL;
62 static NET_API_STATUS (WINAPI *pNetQueryDisplayInformation)(LPWSTR,DWORD,DWORD,DWORD,DWORD,LPDWORD,PVOID*)=NULL;
63 static NET_API_STATUS (WINAPI *pNetUserGetInfo)(LPCWSTR,LPCWSTR,DWORD,LPBYTE*)=NULL;
64 static NET_API_STATUS (WINAPI *pNetUserModalsGet)(LPCWSTR,DWORD,LPBYTE*)=NULL;
65 static NET_API_STATUS (WINAPI *pNetUserAdd)(LPCWSTR,DWORD,LPBYTE,LPDWORD)=NULL;
66 static NET_API_STATUS (WINAPI *pNetUserChangePassword)(LPCWSTR,LPCWSTR,LPCWSTR,LPCWSTR)=NULL;
67 static NET_API_STATUS (WINAPI *pNetUserDel)(LPCWSTR,LPCWSTR)=NULL;
69 static int init_access_tests(void)
75 dwSize = sizeof(user_name);
76 rc=GetUserNameW(user_name, &dwSize);
77 if (rc==FALSE && GetLastError()==ERROR_CALL_NOT_IMPLEMENTED)
79 skip("GetUserNameW is not available.\n");
82 ok(rc, "User Name Retrieved\n");
85 dwSize = sizeof(computer_name);
86 ok(GetComputerNameW(computer_name, &dwSize), "Computer Name Retrieved\n");
90 static NET_API_STATUS create_test_user(void)
94 usri.usri1_name = sTestUserName;
95 usri.usri1_password = sTestUserOldPass;
96 usri.usri1_priv = USER_PRIV_USER;
97 usri.usri1_home_dir = NULL;
98 usri.usri1_comment = NULL;
99 usri.usri1_flags = UF_SCRIPT;
100 usri.usri1_script_path = NULL;
102 return pNetUserAdd(NULL, 1, (LPBYTE)&usri, NULL);
105 static NET_API_STATUS delete_test_user(void)
107 return pNetUserDel(NULL, sTestUserName);
110 static void run_usergetinfo_tests(void)
113 PUSER_INFO_0 ui0 = NULL;
114 PUSER_INFO_10 ui10 = NULL;
117 if((rc = create_test_user()) != NERR_Success )
119 skip("Skipping usergetinfo_tests, create_test_user failed: 0x%08x\n", rc);
124 rc=pNetUserGetInfo(NULL, sTestUserName, 0, (LPBYTE *)&ui0);
125 ok(rc == NERR_Success, "NetUserGetInfo level 0 failed: 0x%08x.\n", rc);
126 ok(!lstrcmpW(sTestUserName, ui0->usri0_name),"Username mismatch for level 0.\n");
127 pNetApiBufferSize(ui0, &dwSize);
128 ok(dwSize >= (sizeof(USER_INFO_0) +
129 (lstrlenW(ui0->usri0_name) + 1) * sizeof(WCHAR)),
130 "Is allocated with NetApiBufferAllocate\n");
133 rc=pNetUserGetInfo(NULL, sTestUserName, 10, (LPBYTE *)&ui10);
134 ok(rc == NERR_Success, "NetUserGetInfo level 10 failed: 0x%08x.\n", rc);
135 ok(!lstrcmpW(sTestUserName, ui10->usri10_name), "Username mismatch for level 10.\n");
136 pNetApiBufferSize(ui10, &dwSize);
137 ok(dwSize >= (sizeof(USER_INFO_10) +
138 (lstrlenW(ui10->usri10_name) + 1 +
139 lstrlenW(ui10->usri10_comment) + 1 +
140 lstrlenW(ui10->usri10_usr_comment) + 1 +
141 lstrlenW(ui10->usri10_full_name) + 1) * sizeof(WCHAR)),
142 "Is allocated with NetApiBufferAllocate\n");
144 pNetApiBufferFree(ui0);
145 pNetApiBufferFree(ui10);
147 /* errors handling */
148 rc=pNetUserGetInfo(NULL, sTestUserName, 10000, (LPBYTE *)&ui0);
149 ok(rc == ERROR_INVALID_LEVEL,"Invalid Level: rc=%d\n",rc);
150 rc=pNetUserGetInfo(NULL, sNonexistentUser, 0, (LPBYTE *)&ui0);
151 ok(rc == NERR_UserNotFound,"Invalid User Name: rc=%d\n",rc);
153 /* FIXME - Currently Wine can't verify whether the network path is good or bad */
154 rc=pNetUserGetInfo(sBadNetPath, sTestUserName, 0, (LPBYTE *)&ui0);
155 ok(rc == ERROR_BAD_NETPATH || rc == ERROR_NETWORK_UNREACHABLE,
156 "Bad Network Path: rc=%d\n",rc);
158 rc=pNetUserGetInfo(sEmptyStr, sTestUserName, 0, (LPBYTE *)&ui0);
159 ok(rc == ERROR_BAD_NETPATH || rc == NERR_Success,
160 "Bad Network Path: rc=%d\n",rc);
161 rc=pNetUserGetInfo(sInvalidName, sTestUserName, 0, (LPBYTE *)&ui0);
162 ok(rc == ERROR_INVALID_NAME,"Invalid Server Name: rc=%d\n",rc);
163 rc=pNetUserGetInfo(sInvalidName2, sTestUserName, 0, (LPBYTE *)&ui0);
164 ok(rc == ERROR_INVALID_NAME,"Invalid Server Name: rc=%d\n",rc);
166 if(delete_test_user() != NERR_Success)
167 trace("Deleting the test user failed. You might have to manually delete it.\n");
170 /* checks Level 1 of NetQueryDisplayInformation
171 * FIXME: Needs to be rewritten to not depend on the spelling of the users,
172 * ideally based on the admin and guest user SIDs/RIDs.*/
173 static void run_querydisplayinformation1_tests(void)
175 PNET_DISPLAY_USER Buffer, rec;
176 DWORD Result, EntryCount;
178 BOOL hasAdmin = FALSE;
179 BOOL hasGuest = FALSE;
180 static const WCHAR sAdminUserName[] = {'A','d','m','i','n','i','s','t','r','a',
182 static const WCHAR sGuestUserName[] = {'G','u','e','s','t',0};
186 Result = pNetQueryDisplayInformation(
187 NULL, 1, i, 1000, MAX_PREFERRED_LENGTH, &EntryCount,
190 ok((Result == ERROR_SUCCESS) || (Result == ERROR_MORE_DATA),
191 "Information Retrieved\n");
193 for(; EntryCount > 0; EntryCount--)
195 if (!lstrcmpW(rec->usri1_name, sAdminUserName))
197 ok(!hasAdmin, "One admin user\n");
198 ok(rec->usri1_flags & UF_SCRIPT, "UF_SCRIPT flag is set\n");
199 ok(rec->usri1_flags & UF_NORMAL_ACCOUNT, "UF_NORMAL_ACCOUNT flag is set\n");
202 else if (!lstrcmpW(rec->usri1_name, sGuestUserName))
204 ok(!hasGuest, "One guest record\n");
205 ok(rec->usri1_flags & UF_SCRIPT, "UF_SCRIPT flag is set\n");
206 ok(rec->usri1_flags & UF_NORMAL_ACCOUNT, "UF_NORMAL_ACCOUNT flag is set\n");
210 i = rec->usri1_next_index;
214 pNetApiBufferFree(Buffer);
215 } while (Result == ERROR_MORE_DATA);
217 ok(hasAdmin, "Has Administrator account\n");
220 static void run_usermodalsget_tests(void)
223 USER_MODALS_INFO_2 * umi2 = NULL;
225 rc = pNetUserModalsGet(NULL, 2, (LPBYTE *)&umi2);
226 ok(rc == ERROR_SUCCESS, "NetUserModalsGet failed, rc = %d\n", rc);
229 pNetApiBufferFree(umi2);
232 static void run_userhandling_tests(void)
237 usri.usri1_priv = USER_PRIV_USER;
238 usri.usri1_home_dir = NULL;
239 usri.usri1_comment = NULL;
240 usri.usri1_flags = UF_SCRIPT;
241 usri.usri1_script_path = NULL;
243 usri.usri1_name = sTooLongName;
244 usri.usri1_password = sTestUserOldPass;
246 ret = pNetUserAdd(NULL, 1, (LPBYTE)&usri, NULL);
247 ok(ret == NERR_BadUsername, "Adding user with too long username returned 0x%08x\n", ret);
249 usri.usri1_name = sTestUserName;
250 usri.usri1_password = sTooLongPassword;
252 ret = pNetUserAdd(NULL, 1, (LPBYTE)&usri, NULL);
253 ok(ret == NERR_PasswordTooShort, "Adding user with too long password returned 0x%08x\n", ret);
255 usri.usri1_name = sTooLongName;
256 usri.usri1_password = sTooLongPassword;
258 ret = pNetUserAdd(NULL, 1, (LPBYTE)&usri, NULL);
259 ok(ret == NERR_BadUsername,
260 "Adding user with too long username/password returned 0x%08x\n", ret);
262 usri.usri1_name = sTestUserName;
263 usri.usri1_password = sTestUserOldPass;
265 ret = pNetUserAdd(NULL, 5, (LPBYTE)&usri, NULL);
266 ok(ret == ERROR_INVALID_LEVEL, "Adding user with level 5 returned 0x%08x\n", ret);
268 ret = pNetUserAdd(NULL, 1, (LPBYTE)&usri, NULL);
269 if(ret == ERROR_ACCESS_DENIED)
271 skip("Insufficient permissions to add users. Skipping test.\n");
274 if(ret == NERR_UserExists)
276 skip("User already exists, skipping test to not mess up the system\n");
280 ok(ret == NERR_Success, "Adding user failed with error 0x%08x\n", ret);
281 if(ret != NERR_Success)
284 ret = pNetUserChangePassword(NULL, sNonexistentUser, sTestUserOldPass,
286 ok(ret == NERR_UserNotFound,
287 "Changing password for nonexistent user returned 0x%08x.\n", ret);
289 ret = pNetUserChangePassword(NULL, sTestUserName, sTestUserOldPass,
291 ok(ret == NERR_Success,
292 "Changing old password to old password returned 0x%08x.\n", ret);
294 ret = pNetUserChangePassword(NULL, sTestUserName, sTestUserNewPass,
296 ok(ret == ERROR_INVALID_PASSWORD,
297 "Trying to change password giving an invalid password returned 0x%08x.\n", ret);
299 ret = pNetUserChangePassword(NULL, sTestUserName, sTestUserOldPass,
301 ok(ret == ERROR_PASSWORD_RESTRICTION,
302 "Changing to a password that's too long returned 0x%08x.\n", ret);
304 ret = pNetUserChangePassword(NULL, sTestUserName, sTestUserOldPass,
306 ok(ret == NERR_Success, "Changing the password correctly returned 0x%08x.\n", ret);
308 ret = pNetUserDel(NULL, sTestUserName);
309 ok(ret == NERR_Success, "Deleting the user failed.\n");
311 ret = pNetUserDel(NULL, sTestUserName);
312 ok(ret == NERR_UserNotFound, "Deleting a nonexistent user returned 0x%08x\n",ret);
317 HMODULE hnetapi32=LoadLibraryA("netapi32.dll");
319 pNetApiBufferFree=(void*)GetProcAddress(hnetapi32,"NetApiBufferFree");
320 pNetApiBufferSize=(void*)GetProcAddress(hnetapi32,"NetApiBufferSize");
321 pNetQueryDisplayInformation=(void*)GetProcAddress(hnetapi32,"NetQueryDisplayInformation");
322 pNetUserGetInfo=(void*)GetProcAddress(hnetapi32,"NetUserGetInfo");
323 pNetUserModalsGet=(void*)GetProcAddress(hnetapi32,"NetUserModalsGet");
324 pNetUserAdd=(void*)GetProcAddress(hnetapi32, "NetUserAdd");
325 pNetUserChangePassword=(void*)GetProcAddress(hnetapi32, "NetUserChangePassword");
326 pNetUserDel=(void*)GetProcAddress(hnetapi32, "NetUserDel");
328 /* These functions were introduced with NT. It's safe to assume that
329 * if one is not available, none are.
331 if (!pNetApiBufferFree) {
332 skip("Needed functions are not available\n");
333 FreeLibrary(hnetapi32);
337 if (init_access_tests()) {
338 run_userhandling_tests();
339 run_usergetinfo_tests();
340 run_querydisplayinformation1_tests();
341 run_usermodalsget_tests();
344 FreeLibrary(hnetapi32);