advapi32/tests: Use win_skip() to skip over unimplemented functionality.
[wine] / dlls / advapi32 / tests / cred.c
1 /*
2  * Credential Function Tests
3  *
4  * Copyright 2007 Robert Shearman
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  */
20
21 #include <stdarg.h>
22 #include <stdio.h>
23
24 #include "windef.h"
25 #include "winbase.h"
26 #include "wincred.h"
27
28 #include "wine/test.h"
29
30 static BOOL (WINAPI *pCredDeleteA)(LPCSTR,DWORD,DWORD);
31 static BOOL (WINAPI *pCredEnumerateA)(LPCSTR,DWORD,DWORD *,PCREDENTIALA **);
32 static VOID (WINAPI *pCredFree)(PVOID);
33 static BOOL (WINAPI *pCredGetSessionTypes)(DWORD,LPDWORD);
34 static BOOL (WINAPI *pCredReadA)(LPCSTR,DWORD,DWORD,PCREDENTIALA *);
35 static BOOL (WINAPI *pCredRenameA)(LPCSTR,LPCSTR,DWORD,DWORD);
36 static BOOL (WINAPI *pCredWriteA)(PCREDENTIALA,DWORD);
37 static BOOL (WINAPI *pCredReadDomainCredentialsA)(PCREDENTIAL_TARGET_INFORMATIONA,DWORD,DWORD*,PCREDENTIALA**);
38
39
40 #define TEST_TARGET_NAME  "credtest.winehq.org"
41 #define TEST_TARGET_NAME2 "credtest2.winehq.org"
42 static const WCHAR TEST_PASSWORD[] = {'p','4','$','$','w','0','r','d','!',0};
43
44 static void test_CredReadA(void)
45 {
46     BOOL ret;
47     PCREDENTIALA cred;
48
49     SetLastError(0xdeadbeef);
50     ret = pCredReadA(TEST_TARGET_NAME, -1, 0, &cred);
51     ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
52         "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
53         GetLastError());
54
55     SetLastError(0xdeadbeef);
56     ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef, &cred);
57     ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER ),
58         "CredReadA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n",
59         GetLastError());
60
61     SetLastError(0xdeadbeef);
62     ret = pCredReadA(NULL, CRED_TYPE_GENERIC, 0, &cred);
63     ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
64         "CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
65         GetLastError());
66 }
67
68 static void test_CredWriteA(void)
69 {
70     CREDENTIALA new_cred;
71     BOOL ret;
72
73     SetLastError(0xdeadbeef);
74     ret = pCredWriteA(NULL, 0);
75     ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
76         "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
77         GetLastError());
78
79     new_cred.Flags = 0;
80     new_cred.Type = CRED_TYPE_GENERIC;
81     new_cred.TargetName = NULL;
82     new_cred.Comment = (char *)"Comment";
83     new_cred.CredentialBlobSize = 0;
84     new_cred.CredentialBlob = NULL;
85     new_cred.Persist = CRED_PERSIST_ENTERPRISE;
86     new_cred.AttributeCount = 0;
87     new_cred.Attributes = NULL;
88     new_cred.TargetAlias = NULL;
89     new_cred.UserName = (char *)"winetest";
90
91     SetLastError(0xdeadbeef);
92     ret = pCredWriteA(&new_cred, 0);
93     ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
94         "CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
95         GetLastError());
96
97     new_cred.TargetName = (char *)TEST_TARGET_NAME;
98     new_cred.Type = CRED_TYPE_DOMAIN_PASSWORD;
99
100     SetLastError(0xdeadbeef);
101     ret = pCredWriteA(&new_cred, 0);
102     if (ret)
103     {
104         /* Vista */
105         ok(GetLastError() == ERROR_IO_PENDING,
106            "Expected ERROR_IO_PENDING, got %d\n", GetLastError());
107     }
108     else
109     {
110         ok(GetLastError() == ERROR_BAD_USERNAME ||
111            GetLastError() == ERROR_NO_SUCH_LOGON_SESSION, /* Vista */
112            "CredWrite with username without domain should return ERROR_BAD_USERNAME"
113            "or ERROR_NO_SUCH_LOGON_SESSION not %d\n", GetLastError());
114     }
115
116     new_cred.UserName = NULL;
117     SetLastError(0xdeadbeef);
118     ret = pCredWriteA(&new_cred, 0);
119     ok(!ret && GetLastError() == ERROR_BAD_USERNAME,
120         "CredWriteA with NULL username should have failed with ERROR_BAD_USERNAME instead of %d\n",
121         GetLastError());
122 }
123
124 static void test_CredDeleteA(void)
125 {
126     BOOL ret;
127
128     SetLastError(0xdeadbeef);
129     ret = pCredDeleteA(TEST_TARGET_NAME, -1, 0);
130     ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
131         "CredDeleteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
132         GetLastError());
133
134     SetLastError(0xdeadbeef);
135     ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef);
136     ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ ),
137         "CredDeleteA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n",
138         GetLastError());
139 }
140
141 static void test_CredReadDomainCredentialsA(void)
142 {
143     BOOL ret;
144     char target_name[] = "no_such_target";
145     CREDENTIAL_TARGET_INFORMATIONA info = {target_name, NULL, target_name, NULL, NULL, NULL, NULL, 0, 0, NULL};
146     DWORD count;
147     PCREDENTIAL* creds;
148
149     if (!pCredReadDomainCredentialsA)
150     {
151         win_skip("CredReadDomainCredentialsA() is not implemented\n");
152         return;
153     }
154
155     /* these two tests would crash on both native and Wine. Implementations
156      * does not check for NULL output pointers and try to zero them out early */
157 #if 0
158     ok(!pCredReadDomainCredentialsA(&info, 0, NULL, &creds) &&
159             GetLastError() == ERROR_INVALID_PARAMETER, "!\n");
160     ok(!pCredReadDomainCredentialsA(&info, 0, &count, NULL) &&
161             GetLastError() == ERROR_INVALID_PARAMETER, "!\n");
162 #endif
163
164     SetLastError(0xdeadbeef);
165     ret = pCredReadDomainCredentialsA(NULL, 0, &count, &creds);
166     ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
167         "CredReadDomainCredentialsA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
168         GetLastError());
169
170     SetLastError(0xdeadbeef);
171     creds = (void*)0x12345;
172     count = 2;
173     ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
174     ok(!ret && GetLastError() == ERROR_NOT_FOUND,
175         "CredReadDomainCredentialsA should have failed with ERROR_NOT_FOUND instead of %d\n",
176         GetLastError());
177     ok(count ==0 && creds == NULL, "CredReadDomainCredentialsA must not return any result\n");
178
179     info.TargetName = NULL;
180
181     SetLastError(0xdeadbeef);
182     ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
183     ok(!ret, "CredReadDomainCredentialsA should have failed\n");
184     ok(GetLastError() == ERROR_NOT_FOUND ||
185         GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
186         "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n",
187         GetLastError());
188
189     info.DnsServerName = NULL;
190
191     SetLastError(0xdeadbeef);
192     ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
193     ok(!ret, "CredReadDomainCredentialsA should have failed\n");
194     ok(GetLastError() == ERROR_NOT_FOUND ||
195         GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
196         "Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n",
197         GetLastError());
198 }
199
200 static void check_blob(int line, DWORD cred_type, PCREDENTIALA cred)
201 {
202     if (cred_type == CRED_TYPE_DOMAIN_PASSWORD)
203     {
204         todo_wine
205         ok_(__FILE__, line)(cred->CredentialBlobSize == 0, "expected CredentialBlobSize of 0 but got %d\n", cred->CredentialBlobSize);
206         todo_wine
207         ok_(__FILE__, line)(!cred->CredentialBlob, "expected NULL credentials but got %p\n", cred->CredentialBlob);
208     }
209     else
210     {
211         DWORD size=sizeof(TEST_PASSWORD);
212         ok_(__FILE__, line)(cred->CredentialBlobSize == size, "expected CredentialBlobSize of %u but got %u\n", size, cred->CredentialBlobSize);
213         ok_(__FILE__, line)(cred->CredentialBlob != NULL, "CredentialBlob should be present\n");
214         if (cred->CredentialBlob)
215             ok_(__FILE__, line)(!memcmp(cred->CredentialBlob, TEST_PASSWORD, size), "wrong CredentialBlob\n");
216     }
217 }
218
219 static void test_generic(void)
220 {
221     BOOL ret;
222     DWORD count, i;
223     PCREDENTIALA *creds;
224     CREDENTIALA new_cred;
225     PCREDENTIALA cred;
226     BOOL found = FALSE;
227
228     new_cred.Flags = 0;
229     new_cred.Type = CRED_TYPE_GENERIC;
230     new_cred.TargetName = (char *)TEST_TARGET_NAME;
231     new_cred.Comment = (char *)"Comment";
232     new_cred.CredentialBlobSize = sizeof(TEST_PASSWORD);
233     new_cred.CredentialBlob = (LPBYTE)TEST_PASSWORD;
234     new_cred.Persist = CRED_PERSIST_ENTERPRISE;
235     new_cred.AttributeCount = 0;
236     new_cred.Attributes = NULL;
237     new_cred.TargetAlias = NULL;
238     new_cred.UserName = (char *)"winetest";
239
240     ret = pCredWriteA(&new_cred, 0);
241     ok(ret || broken(GetLastError() == ERROR_NO_SUCH_LOGON_SESSION),
242        "CredWriteA failed with error %d\n", GetLastError());
243     if (!ret)
244     {
245         skip("couldn't write generic credentials, skipping tests\n");
246         return;
247     }
248
249     ret = pCredEnumerateA(NULL, 0, &count, &creds);
250     ok(ret, "CredEnumerateA failed with error %d\n", GetLastError());
251
252     for (i = 0; i < count; i++)
253     {
254         if (!strcmp(creds[i]->TargetName, TEST_TARGET_NAME))
255         {
256             ok(creds[i]->Type == CRED_TYPE_GENERIC ||
257                creds[i]->Type == CRED_TYPE_DOMAIN_PASSWORD, /* Vista */
258                "expected creds[%d]->Type CRED_TYPE_GENERIC or CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type);
259             ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags);
260             ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
261             check_blob(__LINE__, creds[i]->Type, creds[i]);
262             ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist);
263             ok(!strcmp(creds[i]->UserName, "winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
264             found = TRUE;
265         }
266     }
267     pCredFree(creds);
268     ok(found, "credentials not found\n");
269
270     ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0, &cred);
271     ok(ret, "CredReadA failed with error %d\n", GetLastError());
272     pCredFree(cred);
273
274     ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
275     ok(ret, "CredDeleteA failed with error %d\n", GetLastError());
276 }
277
278 static void test_domain_password(DWORD cred_type)
279 {
280     BOOL ret;
281     DWORD count, i;
282     PCREDENTIALA *creds;
283     CREDENTIALA new_cred;
284     PCREDENTIALA cred;
285     BOOL found = FALSE;
286
287     new_cred.Flags = 0;
288     new_cred.Type = cred_type;
289     new_cred.TargetName = (char *)TEST_TARGET_NAME;
290     new_cred.Comment = (char *)"Comment";
291     new_cred.CredentialBlobSize = sizeof(TEST_PASSWORD);
292     new_cred.CredentialBlob = (LPBYTE)TEST_PASSWORD;
293     new_cred.Persist = CRED_PERSIST_ENTERPRISE;
294     new_cred.AttributeCount = 0;
295     new_cred.Attributes = NULL;
296     new_cred.TargetAlias = NULL;
297     new_cred.UserName = (char *)"test\\winetest";
298     ret = pCredWriteA(&new_cred, 0);
299     if (!ret && GetLastError() == ERROR_NO_SUCH_LOGON_SESSION)
300     {
301         skip("CRED_TYPE_DOMAIN_PASSWORD credentials are not supported "
302              "or are disabled. Skipping\n");
303         return;
304     }
305     ok(ret, "CredWriteA failed with error %d\n", GetLastError());
306
307     ret = pCredEnumerateA(NULL, 0, &count, &creds);
308     ok(ret, "CredEnumerateA failed with error %d\n", GetLastError());
309
310     for (i = 0; i < count; i++)
311     {
312         if (!strcmp(creds[i]->TargetName, TEST_TARGET_NAME))
313         {
314             ok(creds[i]->Type == cred_type, "expected creds[%d]->Type CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type);
315             ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags);
316             ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
317             check_blob(__LINE__, cred_type, creds[i]);
318             ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist);
319             ok(!strcmp(creds[i]->UserName, "test\\winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
320             found = TRUE;
321         }
322     }
323     pCredFree(creds);
324     ok(found, "credentials not found\n");
325
326     ret = pCredReadA(TEST_TARGET_NAME, cred_type, 0, &cred);
327     ok(ret, "CredReadA failed with error %d\n", GetLastError());
328     if (ret)  /* don't check the values of cred, if CredReadA failed. */
329     {
330         check_blob(__LINE__, cred_type, cred);
331         pCredFree(cred);
332     }
333
334     ret = pCredDeleteA(TEST_TARGET_NAME, cred_type, 0);
335     ok(ret, "CredDeleteA failed with error %d\n", GetLastError());
336 }
337
338 START_TEST(cred)
339 {
340     DWORD persists[CRED_TYPE_MAXIMUM];
341
342     pCredEnumerateA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredEnumerateA");
343     pCredFree = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredFree");
344     pCredGetSessionTypes = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredGetSessionTypes");
345     pCredWriteA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredWriteA");
346     pCredDeleteA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredDeleteA");
347     pCredReadA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredReadA");
348     pCredRenameA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredRenameA");
349     pCredReadDomainCredentialsA = (void *)GetProcAddress(GetModuleHandle("advapi32.dll"), "CredReadDomainCredentialsA");
350
351     if (!pCredEnumerateA || !pCredFree || !pCredWriteA || !pCredDeleteA ||
352         !pCredReadA)
353     {
354         win_skip("credentials functions not present in advapi32.dll\n");
355         return;
356     }
357
358     if (pCredGetSessionTypes)
359     {
360         BOOL ret;
361         DWORD i;
362         ret = pCredGetSessionTypes(CRED_TYPE_MAXIMUM, persists);
363         ok(ret, "CredGetSessionTypes failed with error %d\n", GetLastError());
364         ok(persists[0] == CRED_PERSIST_NONE, "persists[0] = %u instead of CRED_PERSIST_NONE\n", persists[0]);
365         for (i=0; i < CRED_TYPE_MAXIMUM; i++)
366             ok(persists[i] <= CRED_PERSIST_ENTERPRISE, "bad value for persists[%u]: %u\n", i, persists[i]);
367     }
368     else
369         memset(persists, CRED_PERSIST_ENTERPRISE, sizeof(persists));
370
371     test_CredReadA();
372     test_CredWriteA();
373     test_CredDeleteA();
374
375     test_CredReadDomainCredentialsA();
376
377     trace("generic:\n");
378     if (persists[CRED_TYPE_GENERIC] == CRED_PERSIST_NONE)
379         skip("CRED_TYPE_GENERIC credentials are not supported or are disabled. Skipping\n");
380     else
381         test_generic();
382
383         trace("domain password:\n");
384     if (persists[CRED_TYPE_DOMAIN_PASSWORD] == CRED_PERSIST_NONE)
385         skip("CRED_TYPE_DOMAIN_PASSWORD credentials are not supported or are disabled. Skipping\n");
386     else
387         test_domain_password(CRED_TYPE_DOMAIN_PASSWORD);
388
389     trace("domain visible password:\n");
390     if (persists[CRED_TYPE_DOMAIN_VISIBLE_PASSWORD] == CRED_PERSIST_NONE)
391         skip("CRED_TYPE_DOMAIN_VISIBLE_PASSWORD credentials are not supported or are disabled. Skipping\n");
392     else
393         test_domain_password(CRED_TYPE_DOMAIN_VISIBLE_PASSWORD);
394 }