mirror of
git://source.winehq.org/git/wine.git
synced 2024-10-01 22:12:04 +00:00
advapi32/tests: Enable compilation with long types.
Signed-off-by: Eric Pouech <eric.pouech@gmail.com> Signed-off-by: Alexandre Julliard <julliard@winehq.org>
This commit is contained in:
parent
63bcb0f609
commit
339f4a3a70
|
@ -1,4 +1,3 @@
|
||||||
EXTRADEFS = -DWINE_NO_LONG_TYPES
|
|
||||||
TESTDLL = advapi32.dll
|
TESTDLL = advapi32.dll
|
||||||
IMPORTS = ole32 advapi32
|
IMPORTS = ole32 advapi32
|
||||||
|
|
||||||
|
|
|
@ -51,19 +51,19 @@ static void test_CredReadA(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredReadA(TEST_TARGET_NAME, -1, 0, &cred);
|
ret = pCredReadA(TEST_TARGET_NAME, -1, 0, &cred);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef, &cred);
|
ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef, &cred);
|
||||||
ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER ),
|
ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER ),
|
||||||
"CredReadA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredReadA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredReadA(NULL, CRED_TYPE_GENERIC, 0, &cred);
|
ret = pCredReadA(NULL, CRED_TYPE_GENERIC, 0, &cred);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredReadA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -75,7 +75,7 @@ static void test_CredWriteA(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(NULL, 0);
|
ret = pCredWriteA(NULL, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
new_cred.Flags = 0;
|
new_cred.Flags = 0;
|
||||||
|
@ -93,7 +93,7 @@ static void test_CredWriteA(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredWriteA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
new_cred.TargetName = (char *)TEST_TARGET_NAME;
|
new_cred.TargetName = (char *)TEST_TARGET_NAME;
|
||||||
|
@ -105,63 +105,63 @@ static void test_CredWriteA(void)
|
||||||
{
|
{
|
||||||
ok(GetLastError() == ERROR_SUCCESS ||
|
ok(GetLastError() == ERROR_SUCCESS ||
|
||||||
GetLastError() == ERROR_IO_PENDING, /* Vista */
|
GetLastError() == ERROR_IO_PENDING, /* Vista */
|
||||||
"Expected ERROR_IO_PENDING, got %d\n", GetLastError());
|
"Expected ERROR_IO_PENDING, got %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
ok(GetLastError() == ERROR_BAD_USERNAME ||
|
ok(GetLastError() == ERROR_BAD_USERNAME ||
|
||||||
GetLastError() == ERROR_NO_SUCH_LOGON_SESSION, /* Vista */
|
GetLastError() == ERROR_NO_SUCH_LOGON_SESSION, /* Vista */
|
||||||
"CredWrite with username without domain should return ERROR_BAD_USERNAME"
|
"CredWrite with username without domain should return ERROR_BAD_USERNAME"
|
||||||
"or ERROR_NO_SUCH_LOGON_SESSION not %d\n", GetLastError());
|
"or ERROR_NO_SUCH_LOGON_SESSION not %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
new_cred.UserName = NULL;
|
new_cred.UserName = NULL;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_BAD_USERNAME,
|
ok(!ret && GetLastError() == ERROR_BAD_USERNAME,
|
||||||
"CredWriteA with NULL username should have failed with ERROR_BAD_USERNAME instead of %d\n",
|
"CredWriteA with NULL username should have failed with ERROR_BAD_USERNAME instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
new_cred.UserName = (char *)"winetest";
|
new_cred.UserName = (char *)"winetest";
|
||||||
new_cred.Persist = CRED_PERSIST_LOCAL_MACHINE;
|
new_cred.Persist = CRED_PERSIST_LOCAL_MACHINE;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(ret || broken(!ret), "CredWriteA failed with error %u\n", GetLastError());
|
ok(ret || broken(!ret), "CredWriteA failed with error %lu\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
{
|
{
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_DOMAIN_PASSWORD, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_DOMAIN_PASSWORD, 0);
|
||||||
ok(ret, "CredDeleteA failed with error %u\n", GetLastError());
|
ok(ret, "CredDeleteA failed with error %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
new_cred.Type = CRED_TYPE_GENERIC;
|
new_cred.Type = CRED_TYPE_GENERIC;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(ret || broken(!ret), "CredWriteA failed with error %u\n", GetLastError());
|
ok(ret || broken(!ret), "CredWriteA failed with error %lu\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
{
|
{
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
|
||||||
ok(ret, "CredDeleteA failed with error %u\n", GetLastError());
|
ok(ret, "CredDeleteA failed with error %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
new_cred.Persist = CRED_PERSIST_SESSION;
|
new_cred.Persist = CRED_PERSIST_SESSION;
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(ret, "CredWriteA failed with error %u\n", GetLastError());
|
ok(ret, "CredWriteA failed with error %lu\n", GetLastError());
|
||||||
|
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
|
||||||
ok(ret, "CredDeleteA failed with error %u\n", GetLastError());
|
ok(ret, "CredDeleteA failed with error %lu\n", GetLastError());
|
||||||
|
|
||||||
new_cred.Type = CRED_TYPE_DOMAIN_PASSWORD;
|
new_cred.Type = CRED_TYPE_DOMAIN_PASSWORD;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(ret || broken(!ret), "CredWriteA failed with error %u\n", GetLastError());
|
ok(ret || broken(!ret), "CredWriteA failed with error %lu\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
{
|
{
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_DOMAIN_PASSWORD, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_DOMAIN_PASSWORD, 0);
|
||||||
ok(ret, "CredDeleteA failed with error %u\n", GetLastError());
|
ok(ret, "CredDeleteA failed with error %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
new_cred.UserName = NULL;
|
new_cred.UserName = NULL;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(!ret, "CredWriteA succeeded\n");
|
ok(!ret, "CredWriteA succeeded\n");
|
||||||
ok(GetLastError() == ERROR_BAD_USERNAME, "got %u\n", GetLastError());
|
ok(GetLastError() == ERROR_BAD_USERNAME, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_CredDeleteA(void)
|
static void test_CredDeleteA(void)
|
||||||
|
@ -171,13 +171,13 @@ static void test_CredDeleteA(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, -1, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, -1, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"CredDeleteA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredDeleteA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef);
|
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0xdeadbeef);
|
||||||
ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ ),
|
ok(!ret && ( GetLastError() == ERROR_INVALID_FLAGS || GetLastError() == ERROR_INVALID_PARAMETER /* Vista */ ),
|
||||||
"CredDeleteA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredDeleteA should have failed with ERROR_INVALID_FLAGS or ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -208,7 +208,7 @@ if(0)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCredReadDomainCredentialsA(NULL, 0, &count, &creds);
|
ret = pCredReadDomainCredentialsA(NULL, 0, &count, &creds);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"CredReadDomainCredentialsA should have failed with ERROR_INVALID_PARAMETER instead of %d\n",
|
"CredReadDomainCredentialsA should have failed with ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
|
@ -216,7 +216,7 @@ if(0)
|
||||||
count = 2;
|
count = 2;
|
||||||
ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
|
ret = pCredReadDomainCredentialsA(&info, 0, &count, &creds);
|
||||||
ok(!ret && GetLastError() == ERROR_NOT_FOUND,
|
ok(!ret && GetLastError() == ERROR_NOT_FOUND,
|
||||||
"CredReadDomainCredentialsA should have failed with ERROR_NOT_FOUND instead of %d\n",
|
"CredReadDomainCredentialsA should have failed with ERROR_NOT_FOUND instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
ok(count ==0 && creds == NULL, "CredReadDomainCredentialsA must not return any result\n");
|
ok(count ==0 && creds == NULL, "CredReadDomainCredentialsA must not return any result\n");
|
||||||
|
|
||||||
|
@ -227,7 +227,7 @@ if(0)
|
||||||
ok(!ret, "CredReadDomainCredentialsA should have failed\n");
|
ok(!ret, "CredReadDomainCredentialsA should have failed\n");
|
||||||
ok(GetLastError() == ERROR_NOT_FOUND ||
|
ok(GetLastError() == ERROR_NOT_FOUND ||
|
||||||
GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
|
GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
|
||||||
"Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n",
|
"Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
info.DnsServerName = NULL;
|
info.DnsServerName = NULL;
|
||||||
|
@ -237,7 +237,7 @@ if(0)
|
||||||
ok(!ret, "CredReadDomainCredentialsA should have failed\n");
|
ok(!ret, "CredReadDomainCredentialsA should have failed\n");
|
||||||
ok(GetLastError() == ERROR_NOT_FOUND ||
|
ok(GetLastError() == ERROR_NOT_FOUND ||
|
||||||
GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
|
GetLastError() == ERROR_INVALID_PARAMETER, /* Vista, W2K8 */
|
||||||
"Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %d\n",
|
"Expected ERROR_NOT_FOUND or ERROR_INVALID_PARAMETER instead of %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -246,14 +246,14 @@ static void check_blob(int line, DWORD cred_type, PCREDENTIALA cred)
|
||||||
if (cred_type == CRED_TYPE_DOMAIN_PASSWORD)
|
if (cred_type == CRED_TYPE_DOMAIN_PASSWORD)
|
||||||
{
|
{
|
||||||
todo_wine
|
todo_wine
|
||||||
ok_(__FILE__, line)(cred->CredentialBlobSize == 0, "expected CredentialBlobSize of 0 but got %d\n", cred->CredentialBlobSize);
|
ok_(__FILE__, line)(cred->CredentialBlobSize == 0, "expected CredentialBlobSize of 0 but got %ld\n", cred->CredentialBlobSize);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok_(__FILE__, line)(!cred->CredentialBlob, "expected NULL credentials but got %p\n", cred->CredentialBlob);
|
ok_(__FILE__, line)(!cred->CredentialBlob, "expected NULL credentials but got %p\n", cred->CredentialBlob);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
DWORD size=sizeof(TEST_PASSWORD);
|
DWORD size=sizeof(TEST_PASSWORD);
|
||||||
ok_(__FILE__, line)(cred->CredentialBlobSize == size, "expected CredentialBlobSize of %u but got %u\n", size, cred->CredentialBlobSize);
|
ok_(__FILE__, line)(cred->CredentialBlobSize == size, "expected CredentialBlobSize of %lu but got %lu\n", size, cred->CredentialBlobSize);
|
||||||
ok_(__FILE__, line)(cred->CredentialBlob != NULL, "CredentialBlob should be present\n");
|
ok_(__FILE__, line)(cred->CredentialBlob != NULL, "CredentialBlob should be present\n");
|
||||||
if (cred->CredentialBlob)
|
if (cred->CredentialBlob)
|
||||||
ok_(__FILE__, line)(!memcmp(cred->CredentialBlob, TEST_PASSWORD, size), "wrong CredentialBlob\n");
|
ok_(__FILE__, line)(!memcmp(cred->CredentialBlob, TEST_PASSWORD, size), "wrong CredentialBlob\n");
|
||||||
|
@ -283,7 +283,7 @@ static void test_generic(void)
|
||||||
|
|
||||||
ret = pCredWriteA(&new_cred, 0);
|
ret = pCredWriteA(&new_cred, 0);
|
||||||
ok(ret || broken(GetLastError() == ERROR_NO_SUCH_LOGON_SESSION),
|
ok(ret || broken(GetLastError() == ERROR_NO_SUCH_LOGON_SESSION),
|
||||||
"CredWriteA failed with error %d\n", GetLastError());
|
"CredWriteA failed with error %ld\n", GetLastError());
|
||||||
if (!ret)
|
if (!ret)
|
||||||
{
|
{
|
||||||
skip("couldn't write generic credentials, skipping tests\n");
|
skip("couldn't write generic credentials, skipping tests\n");
|
||||||
|
@ -291,7 +291,7 @@ static void test_generic(void)
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = pCredEnumerateA(NULL, 0, &count, &creds);
|
ret = pCredEnumerateA(NULL, 0, &count, &creds);
|
||||||
ok(ret, "CredEnumerateA failed with error %d\n", GetLastError());
|
ok(ret, "CredEnumerateA failed with error %ld\n", GetLastError());
|
||||||
|
|
||||||
for (i = 0; i < count; i++)
|
for (i = 0; i < count; i++)
|
||||||
{
|
{
|
||||||
|
@ -299,12 +299,12 @@ static void test_generic(void)
|
||||||
{
|
{
|
||||||
ok(creds[i]->Type == CRED_TYPE_GENERIC ||
|
ok(creds[i]->Type == CRED_TYPE_GENERIC ||
|
||||||
creds[i]->Type == CRED_TYPE_DOMAIN_PASSWORD, /* Vista */
|
creds[i]->Type == CRED_TYPE_DOMAIN_PASSWORD, /* Vista */
|
||||||
"expected creds[%d]->Type CRED_TYPE_GENERIC or CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type);
|
"expected creds[%ld]->Type CRED_TYPE_GENERIC or CRED_TYPE_DOMAIN_PASSWORD but got %ld\n", i, creds[i]->Type);
|
||||||
ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags);
|
ok(!creds[i]->Flags, "expected creds[%ld]->Flags 0 but got 0x%lx\n", i, creds[i]->Flags);
|
||||||
ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
|
ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%ld]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
|
||||||
check_blob(__LINE__, creds[i]->Type, creds[i]);
|
check_blob(__LINE__, creds[i]->Type, creds[i]);
|
||||||
ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist);
|
ok(creds[i]->Persist, "expected creds[%ld]->Persist CRED_PERSIST_ENTERPRISE but got %ld\n", i, creds[i]->Persist);
|
||||||
ok(!strcmp(creds[i]->UserName, "winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
|
ok(!strcmp(creds[i]->UserName, "winetest"), "expected creds[%ld]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
|
||||||
found = TRUE;
|
found = TRUE;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -312,11 +312,11 @@ static void test_generic(void)
|
||||||
ok(found, "credentials not found\n");
|
ok(found, "credentials not found\n");
|
||||||
|
|
||||||
ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0, &cred);
|
ret = pCredReadA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0, &cred);
|
||||||
ok(ret, "CredReadA failed with error %d\n", GetLastError());
|
ok(ret, "CredReadA failed with error %ld\n", GetLastError());
|
||||||
pCredFree(cred);
|
pCredFree(cred);
|
||||||
|
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, CRED_TYPE_GENERIC, 0);
|
||||||
ok(ret, "CredDeleteA failed with error %d\n", GetLastError());
|
ok(ret, "CredDeleteA failed with error %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_domain_password(DWORD cred_type)
|
static void test_domain_password(DWORD cred_type)
|
||||||
|
@ -346,21 +346,21 @@ static void test_domain_password(DWORD cred_type)
|
||||||
"or are disabled. Skipping\n");
|
"or are disabled. Skipping\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ok(ret, "CredWriteA failed with error %d\n", GetLastError());
|
ok(ret, "CredWriteA failed with error %ld\n", GetLastError());
|
||||||
|
|
||||||
ret = pCredEnumerateA(NULL, 0, &count, &creds);
|
ret = pCredEnumerateA(NULL, 0, &count, &creds);
|
||||||
ok(ret, "CredEnumerateA failed with error %d\n", GetLastError());
|
ok(ret, "CredEnumerateA failed with error %ld\n", GetLastError());
|
||||||
|
|
||||||
for (i = 0; i < count; i++)
|
for (i = 0; i < count; i++)
|
||||||
{
|
{
|
||||||
if (creds[i]->TargetName && !strcmp(creds[i]->TargetName, TEST_TARGET_NAME))
|
if (creds[i]->TargetName && !strcmp(creds[i]->TargetName, TEST_TARGET_NAME))
|
||||||
{
|
{
|
||||||
ok(creds[i]->Type == cred_type, "expected creds[%d]->Type CRED_TYPE_DOMAIN_PASSWORD but got %d\n", i, creds[i]->Type);
|
ok(creds[i]->Type == cred_type, "expected creds[%ld]->Type CRED_TYPE_DOMAIN_PASSWORD but got %ld\n", i, creds[i]->Type);
|
||||||
ok(!creds[i]->Flags, "expected creds[%d]->Flags 0 but got 0x%x\n", i, creds[i]->Flags);
|
ok(!creds[i]->Flags, "expected creds[%ld]->Flags 0 but got 0x%lx\n", i, creds[i]->Flags);
|
||||||
ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%d]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
|
ok(!strcmp(creds[i]->Comment, "Comment"), "expected creds[%ld]->Comment \"Comment\" but got \"%s\"\n", i, creds[i]->Comment);
|
||||||
check_blob(__LINE__, cred_type, creds[i]);
|
check_blob(__LINE__, cred_type, creds[i]);
|
||||||
ok(creds[i]->Persist, "expected creds[%d]->Persist CRED_PERSIST_ENTERPRISE but got %d\n", i, creds[i]->Persist);
|
ok(creds[i]->Persist, "expected creds[%ld]->Persist CRED_PERSIST_ENTERPRISE but got %ld\n", i, creds[i]->Persist);
|
||||||
ok(!strcmp(creds[i]->UserName, "test\\winetest"), "expected creds[%d]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
|
ok(!strcmp(creds[i]->UserName, "test\\winetest"), "expected creds[%ld]->UserName \"winetest\" but got \"%s\"\n", i, creds[i]->UserName);
|
||||||
found = TRUE;
|
found = TRUE;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -368,7 +368,7 @@ static void test_domain_password(DWORD cred_type)
|
||||||
ok(found, "credentials not found\n");
|
ok(found, "credentials not found\n");
|
||||||
|
|
||||||
ret = pCredReadA(TEST_TARGET_NAME, cred_type, 0, &cred);
|
ret = pCredReadA(TEST_TARGET_NAME, cred_type, 0, &cred);
|
||||||
ok(ret, "CredReadA failed with error %d\n", GetLastError());
|
ok(ret, "CredReadA failed with error %ld\n", GetLastError());
|
||||||
if (ret) /* don't check the values of cred, if CredReadA failed. */
|
if (ret) /* don't check the values of cred, if CredReadA failed. */
|
||||||
{
|
{
|
||||||
check_blob(__LINE__, cred_type, cred);
|
check_blob(__LINE__, cred_type, cred);
|
||||||
|
@ -376,7 +376,7 @@ static void test_domain_password(DWORD cred_type)
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = pCredDeleteA(TEST_TARGET_NAME, cred_type, 0);
|
ret = pCredDeleteA(TEST_TARGET_NAME, cred_type, 0);
|
||||||
ok(ret, "CredDeleteA failed with error %d\n", GetLastError());
|
ok(ret, "CredDeleteA failed with error %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_CredMarshalCredentialA(void)
|
static void test_CredMarshalCredentialA(void)
|
||||||
|
@ -397,7 +397,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
ret = pCredMarshalCredentialA( 0, NULL, NULL );
|
ret = pCredMarshalCredentialA( 0, NULL, NULL );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
memset( cert.rgbHashOfCert, 0, sizeof(cert.rgbHashOfCert) );
|
memset( cert.rgbHashOfCert, 0, sizeof(cert.rgbHashOfCert) );
|
||||||
cert.cbSize = sizeof(cert);
|
cert.cbSize = sizeof(cert);
|
||||||
|
@ -405,28 +405,28 @@ static void test_CredMarshalCredentialA(void)
|
||||||
ret = pCredMarshalCredentialA( 0, &cert, NULL );
|
ret = pCredMarshalCredentialA( 0, &cert, NULL );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
str = (char *)0xdeadbeef;
|
str = (char *)0xdeadbeef;
|
||||||
SetLastError( 0xdeadbeef );
|
SetLastError( 0xdeadbeef );
|
||||||
ret = pCredMarshalCredentialA( 0, &cert, &str );
|
ret = pCredMarshalCredentialA( 0, &cert, &str );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
||||||
|
|
||||||
SetLastError( 0xdeadbeef );
|
SetLastError( 0xdeadbeef );
|
||||||
ret = pCredMarshalCredentialA( CertCredential, NULL, NULL );
|
ret = pCredMarshalCredentialA( CertCredential, NULL, NULL );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
if (0) { /* crash */
|
if (0) { /* crash */
|
||||||
SetLastError( 0xdeadbeef );
|
SetLastError( 0xdeadbeef );
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, NULL );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, NULL );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
}
|
}
|
||||||
|
|
||||||
cert.cbSize = 0;
|
cert.cbSize = 0;
|
||||||
|
@ -435,13 +435,13 @@ static void test_CredMarshalCredentialA(void)
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
||||||
|
|
||||||
cert.cbSize = sizeof(cert) + 4;
|
cert.cbSize = sizeof(cert) + 4;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -450,7 +450,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
cert.rgbHashOfCert[0] = 2;
|
cert.rgbHashOfCert[0] = 2;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@BCAAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@BCAAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -458,7 +458,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
cert.rgbHashOfCert[0] = 255;
|
cert.rgbHashOfCert[0] = 255;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@B-DAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@B-DAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -467,7 +467,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
cert.rgbHashOfCert[1] = 1;
|
cert.rgbHashOfCert[1] = 1;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@BBEAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@BBEAAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -477,7 +477,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
cert.rgbHashOfCert[2] = 1;
|
cert.rgbHashOfCert[2] = 1;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@BBEQAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@BBEQAAAAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -489,7 +489,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
cert.rgbHashOfCert[3] = 'e';
|
cert.rgbHashOfCert[3] = 'e';
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@BXlmblBAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@BXlmblBAAAAAAAAAAAAAAAAAAAAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -497,7 +497,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
memset( cert.rgbHashOfCert, 0xff, sizeof(cert.rgbHashOfCert) );
|
memset( cert.rgbHashOfCert, 0xff, sizeof(cert.rgbHashOfCert) );
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
ret = pCredMarshalCredentialA( CertCredential, &cert, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@B--------------------------P" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@B--------------------------P" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -508,7 +508,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
||||||
|
|
||||||
username.UserName = emptyW;
|
username.UserName = emptyW;
|
||||||
|
@ -517,13 +517,13 @@ static void test_CredMarshalCredentialA(void)
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
ok( str == (char *)0xdeadbeef, "got %p\n", str );
|
||||||
|
|
||||||
username.UserName = tW;
|
username.UserName = tW;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@CCAAAAA0BA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@CCAAAAA0BA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -531,7 +531,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
username.UserName = teW;
|
username.UserName = teW;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@CEAAAAA0BQZAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@CEAAAAA0BQZAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -539,7 +539,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
username.UserName = tesW;
|
username.UserName = tesW;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@CGAAAAA0BQZAMHA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@CGAAAAA0BQZAMHA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -547,7 +547,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
username.UserName = testW;
|
username.UserName = testW;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@CIAAAAA0BQZAMHA0BA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@CIAAAAA0BQZAMHA0BA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -555,7 +555,7 @@ static void test_CredMarshalCredentialA(void)
|
||||||
username.UserName = test1W;
|
username.UserName = test1W;
|
||||||
str = NULL;
|
str = NULL;
|
||||||
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
ret = pCredMarshalCredentialA( UsernameTargetCredential, &username, &str );
|
||||||
ok( ret, "unexpected failure %u\n", GetLastError() );
|
ok( ret, "unexpected failure %lu\n", GetLastError() );
|
||||||
ok( str != NULL, "str not set\n" );
|
ok( str != NULL, "str not set\n" );
|
||||||
ok( !lstrcmpA( str, "@@CKAAAAA0BQZAMHA0BQMAA" ), "got %s\n", str );
|
ok( !lstrcmpA( str, "@@CKAAAAA0BQZAMHA0BQMAA" ), "got %s\n", str );
|
||||||
pCredFree( str );
|
pCredFree( str );
|
||||||
|
@ -627,14 +627,14 @@ static void test_CredUnmarshalCredentialA(void)
|
||||||
ret = pCredUnmarshalCredentialA( NULL, NULL, NULL );
|
ret = pCredUnmarshalCredentialA( NULL, NULL, NULL );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
cert = NULL;
|
cert = NULL;
|
||||||
SetLastError( 0xdeadbeef );
|
SetLastError( 0xdeadbeef );
|
||||||
ret = pCredUnmarshalCredentialA( NULL, NULL, (void **)&cert );
|
ret = pCredUnmarshalCredentialA( NULL, NULL, (void **)&cert );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
type = 0;
|
type = 0;
|
||||||
cert = NULL;
|
cert = NULL;
|
||||||
|
@ -642,20 +642,20 @@ static void test_CredUnmarshalCredentialA(void)
|
||||||
ret = pCredUnmarshalCredentialA( NULL, &type, (void **)&cert );
|
ret = pCredUnmarshalCredentialA( NULL, &type, (void **)&cert );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
if (0) { /* crash */
|
if (0) { /* crash */
|
||||||
SetLastError( 0xdeadbeef );
|
SetLastError( 0xdeadbeef );
|
||||||
ret = pCredUnmarshalCredentialA( "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA", &type, NULL );
|
ret = pCredUnmarshalCredentialA( "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA", &type, NULL );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
|
|
||||||
SetLastError( 0xdeadbeef );
|
SetLastError( 0xdeadbeef );
|
||||||
ret = pCredUnmarshalCredentialA( "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA", NULL, (void **)&cert );
|
ret = pCredUnmarshalCredentialA( "@@BAAAAAAAAAAAAAAAAAAAAAAAAAAA", NULL, (void **)&cert );
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
ok( !ret, "unexpected success\n" );
|
ok( !ret, "unexpected success\n" );
|
||||||
ok( error == ERROR_INVALID_PARAMETER, "got %u\n", error );
|
ok( error == ERROR_INVALID_PARAMETER, "got %lu\n", error );
|
||||||
}
|
}
|
||||||
|
|
||||||
for (i = 0; i < ARRAY_SIZE(tests); i++)
|
for (i = 0; i < ARRAY_SIZE(tests); i++)
|
||||||
|
@ -667,7 +667,7 @@ static void test_CredUnmarshalCredentialA(void)
|
||||||
error = GetLastError();
|
error = GetLastError();
|
||||||
if (tests[i].unmarshaled)
|
if (tests[i].unmarshaled)
|
||||||
{
|
{
|
||||||
ok(ret, "[%u] unexpected failure %u\n", i, error);
|
ok(ret, "[%u] unexpected failure %lu\n", i, error);
|
||||||
ok(type == tests[i].type, "[%u] got %u\n", i, type);
|
ok(type == tests[i].type, "[%u] got %u\n", i, type);
|
||||||
ok(p != NULL, "[%u] returned pointer is NULL\n", i);
|
ok(p != NULL, "[%u] returned pointer is NULL\n", i);
|
||||||
if (tests[i].type == CertCredential)
|
if (tests[i].type == CertCredential)
|
||||||
|
@ -675,7 +675,7 @@ static void test_CredUnmarshalCredentialA(void)
|
||||||
cert = p;
|
cert = p;
|
||||||
hash = tests[i].unmarshaled;
|
hash = tests[i].unmarshaled;
|
||||||
ok(cert->cbSize == sizeof(*cert),
|
ok(cert->cbSize == sizeof(*cert),
|
||||||
"[%u] wrong size %u\n", i, cert->cbSize);
|
"[%u] wrong size %lu\n", i, cert->cbSize);
|
||||||
for (j = 0; j < sizeof(cert->rgbHashOfCert); j++)
|
for (j = 0; j < sizeof(cert->rgbHashOfCert); j++)
|
||||||
ok(cert->rgbHashOfCert[j] == hash[j], "[%u] wrong data\n", i);
|
ok(cert->rgbHashOfCert[j] == hash[j], "[%u] wrong data\n", i);
|
||||||
}
|
}
|
||||||
|
@ -690,7 +690,7 @@ static void test_CredUnmarshalCredentialA(void)
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
ok(!ret, "[%u] unexpected success\n", i);
|
ok(!ret, "[%u] unexpected success\n", i);
|
||||||
ok(error == ERROR_INVALID_PARAMETER, "[%u] got %u\n", i, error);
|
ok(error == ERROR_INVALID_PARAMETER, "[%u] got %lu\n", i, error);
|
||||||
ok(type == tests[i].type, "[%u] got %u\n", i, type);
|
ok(type == tests[i].type, "[%u] got %u\n", i, type);
|
||||||
ok(p == NULL, "[%u] returned pointer is not NULL\n", i);
|
ok(p == NULL, "[%u] returned pointer is not NULL\n", i);
|
||||||
}
|
}
|
||||||
|
@ -752,11 +752,11 @@ static void test_CredIsMarshaledCredentialA(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
res = pCredIsMarshaledCredentialA(ptr[i]);
|
res = pCredIsMarshaledCredentialA(ptr[i]);
|
||||||
if (expected)
|
if (expected)
|
||||||
ok(res != FALSE, "%d: got %d and %u for %s (expected TRUE)\n", i, res, GetLastError(), ptr[i]);
|
ok(res != FALSE, "%d: got %d and %lu for %s (expected TRUE)\n", i, res, GetLastError(), ptr[i]);
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
/* Windows returns ERROR_INVALID_PARAMETER here, but that's not documented */
|
/* Windows returns ERROR_INVALID_PARAMETER here, but that's not documented */
|
||||||
ok(!res, "%d: got %d and %u for %s (expected FALSE)\n", i, res, GetLastError(), ptr[i]);
|
ok(!res, "%d: got %d and %lu for %s (expected FALSE)\n", i, res, GetLastError(), ptr[i]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -789,10 +789,10 @@ START_TEST(cred)
|
||||||
BOOL ret;
|
BOOL ret;
|
||||||
DWORD i;
|
DWORD i;
|
||||||
ret = pCredGetSessionTypes(CRED_TYPE_MAXIMUM, persists);
|
ret = pCredGetSessionTypes(CRED_TYPE_MAXIMUM, persists);
|
||||||
ok(ret, "CredGetSessionTypes failed with error %d\n", GetLastError());
|
ok(ret, "CredGetSessionTypes failed with error %ld\n", GetLastError());
|
||||||
ok(persists[0] == CRED_PERSIST_NONE, "persists[0] = %u instead of CRED_PERSIST_NONE\n", persists[0]);
|
ok(persists[0] == CRED_PERSIST_NONE, "persists[0] = %lu instead of CRED_PERSIST_NONE\n", persists[0]);
|
||||||
for (i=0; i < CRED_TYPE_MAXIMUM; i++)
|
for (i=0; i < CRED_TYPE_MAXIMUM; i++)
|
||||||
ok(persists[i] <= CRED_PERSIST_ENTERPRISE, "bad value for persists[%u]: %u\n", i, persists[i]);
|
ok(persists[i] <= CRED_PERSIST_ENTERPRISE, "bad value for persists[%lu]: %lu\n", i, persists[i]);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
memset(persists, CRED_PERSIST_ENTERPRISE, sizeof(persists));
|
memset(persists, CRED_PERSIST_ENTERPRISE, sizeof(persists));
|
||||||
|
|
|
@ -72,7 +72,7 @@ static void init_environment(void)
|
||||||
CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
||||||
}
|
}
|
||||||
ret = CryptReleaseContext(hProv, 0);
|
ret = CryptReleaseContext(hProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
/* Ensure that container "wine_test_keyset" does exist in default PROV_RSA_FULL type provider */
|
/* Ensure that container "wine_test_keyset" does exist in default PROV_RSA_FULL type provider */
|
||||||
if (!CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
|
if (!CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
|
||||||
|
@ -80,13 +80,13 @@ static void init_environment(void)
|
||||||
CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
||||||
}
|
}
|
||||||
ret = CryptReleaseContext(hProv, 0);
|
ret = CryptReleaseContext(hProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
/* Ensure that container "wine_test_bad_keyset" does not exist. */
|
/* Ensure that container "wine_test_bad_keyset" does not exist. */
|
||||||
if (CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
|
if (CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
|
||||||
{
|
{
|
||||||
ret = CryptReleaseContext(hProv, 0);
|
ret = CryptReleaseContext(hProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
||||||
}
|
}
|
||||||
|
@ -101,7 +101,7 @@ static void clean_up_environment(void)
|
||||||
if (CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
|
if (CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
|
||||||
{
|
{
|
||||||
ret = CryptReleaseContext(hProv, 0);
|
ret = CryptReleaseContext(hProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
||||||
}
|
}
|
||||||
|
@ -110,7 +110,7 @@ static void clean_up_environment(void)
|
||||||
if (CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
|
if (CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, 0))
|
||||||
{
|
{
|
||||||
ret = CryptReleaseContext(hProv, 0);
|
ret = CryptReleaseContext(hProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
CryptAcquireContextA(&hProv, szKeySet, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
||||||
}
|
}
|
||||||
|
@ -119,7 +119,7 @@ static void clean_up_environment(void)
|
||||||
if (CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
|
if (CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, 0))
|
||||||
{
|
{
|
||||||
ret = CryptReleaseContext(hProv, 0);
|
ret = CryptReleaseContext(hProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv, PROV_RSA_FULL, CRYPT_DELETEKEYSET);
|
||||||
}
|
}
|
||||||
|
@ -137,47 +137,47 @@ static void test_CryptReleaseContext(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptReleaseContext(0, 0);
|
ret = CryptReleaseContext(0, 0);
|
||||||
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptReleaseContext(0, ~0);
|
ret = CryptReleaseContext(0, ~0);
|
||||||
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
/* Additional refcount */
|
/* Additional refcount */
|
||||||
|
|
||||||
ret = CryptAcquireContextA(&prov, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
|
ret = CryptAcquireContextA(&prov, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
ret = CryptContextAddRef(prov, NULL, 0);
|
ret = CryptContextAddRef(prov, NULL, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
ret = CryptContextAddRef(0, NULL, 0);
|
ret = CryptContextAddRef(0, NULL, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError());
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError());
|
||||||
ret = CryptContextAddRef(0xdeadbeef, NULL, 0);
|
ret = CryptContextAddRef(0xdeadbeef, NULL, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError());
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
ret = CryptReleaseContext(prov, 0);
|
ret = CryptReleaseContext(prov, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
/* Nonzero flags, which allow release nonetheless */
|
/* Nonzero flags, which allow release nonetheless */
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptReleaseContext(prov, ~0);
|
ret = CryptReleaseContext(prov, ~0);
|
||||||
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
||||||
ok(GetLastError() == NTE_BAD_FLAGS, "got %u\n", GetLastError());
|
ok(GetLastError() == NTE_BAD_FLAGS, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
/* Obsolete provider */
|
/* Obsolete provider */
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptReleaseContext(prov, 0);
|
ret = CryptReleaseContext(prov, 0);
|
||||||
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptReleaseContext(prov, ~0);
|
ret = CryptReleaseContext(prov, ~0);
|
||||||
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
ok(!ret, "CryptReleaseContext succeeded unexpectedly\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %u\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_acquire_context(void)
|
static void test_acquire_context(void)
|
||||||
|
@ -191,19 +191,19 @@ static void test_acquire_context(void)
|
||||||
* but since this is likely to change between CSP versions, we don't check
|
* but since this is likely to change between CSP versions, we don't check
|
||||||
* this. Please don't change the order of tests. */
|
* this. Please don't change the order of tests. */
|
||||||
result = CryptAcquireContextA(&hProv, NULL, NULL, 0, 0);
|
result = CryptAcquireContextA(&hProv, NULL, NULL, 0, 0);
|
||||||
ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%d\n", GetLastError());
|
ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptAcquireContextA(&hProv, NULL, NULL, 1000, 0);
|
result = CryptAcquireContextA(&hProv, NULL, NULL, 1000, 0);
|
||||||
ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%d\n", GetLastError());
|
ok(!result && GetLastError()==NTE_BAD_PROV_TYPE, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptAcquireContextA(&hProv, NULL, NULL, NON_DEF_PROV_TYPE, 0);
|
result = CryptAcquireContextA(&hProv, NULL, NULL, NON_DEF_PROV_TYPE, 0);
|
||||||
ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%d\n", GetLastError());
|
ok(!result && GetLastError()==NTE_PROV_TYPE_NOT_DEF, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptAcquireContextA(&hProv, szKeySet, szNonExistentProv, PROV_RSA_FULL, 0);
|
result = CryptAcquireContextA(&hProv, szKeySet, szNonExistentProv, PROV_RSA_FULL, 0);
|
||||||
ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%d\n", GetLastError());
|
ok(!result && GetLastError()==NTE_KEYSET_NOT_DEF, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, NON_DEF_PROV_TYPE, 0);
|
result = CryptAcquireContextA(&hProv, szKeySet, szRsaBaseProv, NON_DEF_PROV_TYPE, 0);
|
||||||
ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%d\n", GetLastError());
|
ok(!result && GetLastError()==NTE_PROV_TYPE_NO_MATCH, "%ld\n", GetLastError());
|
||||||
|
|
||||||
|
|
||||||
if (0)
|
if (0)
|
||||||
|
@ -212,7 +212,7 @@ if (0)
|
||||||
result = TRUE, GetLastError() == ERROR_INVALID_PARAMETER */
|
result = TRUE, GetLastError() == ERROR_INVALID_PARAMETER */
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
result = CryptAcquireContextA(NULL, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
|
result = CryptAcquireContextA(NULL, szKeySet, szRsaBaseProv, PROV_RSA_FULL, 0);
|
||||||
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%d\n", result, GetLastError());
|
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d/%ld\n", result, GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Last not least, try to really acquire a context. */
|
/* Last not least, try to really acquire a context. */
|
||||||
|
@ -224,12 +224,12 @@ if (0)
|
||||||
GLE == ERROR_SUCCESS ||
|
GLE == ERROR_SUCCESS ||
|
||||||
GLE == ERROR_RING2_STACK_IN_USE ||
|
GLE == ERROR_RING2_STACK_IN_USE ||
|
||||||
GLE == NTE_FAIL ||
|
GLE == NTE_FAIL ||
|
||||||
GLE == ERROR_NOT_LOGGED_ON), "%d/%d\n", result, GLE);
|
GLE == ERROR_NOT_LOGGED_ON), "%d/%ld\n", result, GLE);
|
||||||
|
|
||||||
if (hProv)
|
if (hProv)
|
||||||
{
|
{
|
||||||
result = CryptReleaseContext(hProv, 0);
|
result = CryptReleaseContext(hProv, 0);
|
||||||
ok(result, "got %u\n", GetLastError());
|
ok(result, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Try again, witch an empty ("\0") szProvider parameter */
|
/* Try again, witch an empty ("\0") szProvider parameter */
|
||||||
|
@ -241,12 +241,12 @@ if (0)
|
||||||
GLE == ERROR_SUCCESS ||
|
GLE == ERROR_SUCCESS ||
|
||||||
GLE == ERROR_RING2_STACK_IN_USE ||
|
GLE == ERROR_RING2_STACK_IN_USE ||
|
||||||
GLE == NTE_FAIL ||
|
GLE == NTE_FAIL ||
|
||||||
GLE == ERROR_NOT_LOGGED_ON), "%d/%d\n", result, GetLastError());
|
GLE == ERROR_NOT_LOGGED_ON), "%d/%ld\n", result, GetLastError());
|
||||||
|
|
||||||
if (hProv)
|
if (hProv)
|
||||||
{
|
{
|
||||||
result = CryptReleaseContext(hProv, 0);
|
result = CryptReleaseContext(hProv, 0);
|
||||||
ok(result, "got %u\n", GetLastError());
|
ok(result, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -271,203 +271,203 @@ static void test_incorrect_api_usage(void)
|
||||||
|
|
||||||
result = CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv,
|
result = CryptAcquireContextA(&hProv, szBadKeySet, szRsaBaseProv,
|
||||||
PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
||||||
ok (result, "%08x\n", GetLastError());
|
ok (result, "%08lx\n", GetLastError());
|
||||||
if (!result) return;
|
if (!result) return;
|
||||||
|
|
||||||
/* Looks like native handles are just pointers. */
|
/* Looks like native handles are just pointers. */
|
||||||
ok(!!*(void **)hProv, "Got zero *(void **)hProv.\n");
|
ok(!!*(void **)hProv, "Got zero *(void **)hProv.\n");
|
||||||
|
|
||||||
result = CryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash);
|
result = CryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
if (!result) return;
|
if (!result) return;
|
||||||
|
|
||||||
result = CryptDeriveKey(0, CALG_RC4, hHash, 0, &hKey2);
|
result = CryptDeriveKey(0, CALG_RC4, hHash, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDeriveKey(hProv, CALG_RC4, 0, 0, &hKey2);
|
result = CryptDeriveKey(hProv, CALG_RC4, 0, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptHashData(0, &temp, 1, 0);
|
result = CryptHashData(0, &temp, 1, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptGenKey(hProv, CALG_RC4, 0, &hKey);
|
result = CryptGenKey(hProv, CALG_RC4, 0, &hKey);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
if (!result) return;
|
if (!result) return;
|
||||||
|
|
||||||
result = pCryptHashSessionKey(hHash, 0, 0);
|
result = pCryptHashSessionKey(hHash, 0, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = pCryptHashSessionKey(0, hKey, 0);
|
result = pCryptHashSessionKey(0, hKey, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDestroyHash(hHash);
|
result = CryptDestroyHash(hHash);
|
||||||
ok (result, "%08x\n", GetLastError());
|
ok (result, "%08lx\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDestroyHash(0);
|
result = CryptDestroyHash(0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptCreateHash(0xdeadbeef, CALG_SHA, 0, 0, &hHash);
|
result = CryptCreateHash(0xdeadbeef, CALG_SHA, 0, 0, &hHash);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptCreateHash(0, CALG_SHA, 0, 0, &hHash);
|
result = CryptCreateHash(0, CALG_SHA, 0, 0, &hHash);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptGenKey(0, CALG_RC4, 0, &hKey);
|
result = CryptGenKey(0, CALG_RC4, 0, &hKey);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptDecrypt(hKey, 0, TRUE, 0, &temp, &dwLen);
|
result = CryptDecrypt(hKey, 0, TRUE, 0, &temp, &dwLen);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
result = CryptDecrypt(hKey, 0xdeadbeef, TRUE, 0, &temp, &dwLen);
|
result = CryptDecrypt(hKey, 0xdeadbeef, TRUE, 0, &temp, &dwLen);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
result = CryptDecrypt(0, 0, TRUE, 0, &temp, &dwLen);
|
result = CryptDecrypt(0, 0, TRUE, 0, &temp, &dwLen);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
result = CryptDecrypt(0xdeadbeef, 0, TRUE, 0, &temp, &dwLen);
|
result = CryptDecrypt(0xdeadbeef, 0, TRUE, 0, &temp, &dwLen);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptEncrypt(hKey, 0, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
result = CryptEncrypt(hKey, 0, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
result = CryptEncrypt(hKey, 0xdeadbeef, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
result = CryptEncrypt(hKey, 0xdeadbeef, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
result = CryptEncrypt(0, 0, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
result = CryptEncrypt(0, 0, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
result = CryptEncrypt(0xdeadbeef, 0, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
result = CryptEncrypt(0xdeadbeef, 0, TRUE, 0, &temp, &dwLen, sizeof(temp));
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptExportKey(hKey, 0xdeadbeef, 0, 0, &temp, &dwLen);
|
result = CryptExportKey(hKey, 0xdeadbeef, 0, 0, &temp, &dwLen);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDestroyKey(hKey);
|
result = CryptDestroyKey(hKey);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptGenKey(hProv, CALG_RC4, 0, &hKey2);
|
result = CryptGenKey(hProv, CALG_RC4, 0, &hKey2);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
if (!result) return;
|
if (!result) return;
|
||||||
|
|
||||||
result = CryptDestroyKey(hKey2);
|
result = CryptDestroyKey(hKey2);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDestroyKey(0);
|
result = CryptDestroyKey(0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwTemp = CRYPT_MODE_ECB;
|
dwTemp = CRYPT_MODE_ECB;
|
||||||
result = CryptSetKeyParam(hKey2, KP_MODE, (BYTE*)&dwTemp, sizeof(DWORD));
|
result = CryptSetKeyParam(hKey2, KP_MODE, (BYTE*)&dwTemp, sizeof(DWORD));
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
hProv2 = 0xdeadbeef;
|
hProv2 = 0xdeadbeef;
|
||||||
result = CryptAcquireContextA(&hProv2, szBadKeySet, NULL, PROV_RSA_FULL,
|
result = CryptAcquireContextA(&hProv2, szBadKeySet, NULL, PROV_RSA_FULL,
|
||||||
CRYPT_DELETEKEYSET);
|
CRYPT_DELETEKEYSET);
|
||||||
ok (result, "%d\n", GetLastError());
|
ok (result, "%ld\n", GetLastError());
|
||||||
ok (hProv2 == 0, "%ld\n", hProv2);
|
ok (hProv2 == 0, "%Id\n", hProv2);
|
||||||
if (!result) return;
|
if (!result) return;
|
||||||
|
|
||||||
result = CryptReleaseContext(hProv, 0);
|
result = CryptReleaseContext(hProv, 0);
|
||||||
ok(result, "got %u\n", GetLastError());
|
ok(result, "got %lu\n", GetLastError());
|
||||||
if (!result) return;
|
if (!result) return;
|
||||||
|
|
||||||
result = pCryptGenRandom(0, 1, &temp);
|
result = pCryptGenRandom(0, 1, &temp);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = pCryptGenRandom(hProv, 1, &temp);
|
result = pCryptGenRandom(hProv, 1, &temp);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptContextAddRef(hProv, NULL, 0);
|
result = CryptContextAddRef(hProv, NULL, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash2);
|
result = CryptCreateHash(hProv, CALG_SHA, 0, 0, &hHash2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptDecrypt(hKey, 0, TRUE, 0, &temp, &dwLen);
|
result = CryptDecrypt(hKey, 0, TRUE, 0, &temp, &dwLen);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptEncrypt(hKey, 0, TRUE, 0, &temp, &dwLen, 1);
|
result = CryptEncrypt(hKey, 0, TRUE, 0, &temp, &dwLen, 1);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDeriveKey(hProv, CALG_RC4, hHash, 0, &hKey2);
|
result = CryptDeriveKey(hProv, CALG_RC4, hHash, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = pCryptDuplicateHash(hHash, NULL, 0, &hHash2);
|
result = pCryptDuplicateHash(hHash, NULL, 0, &hHash2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDuplicateKey(hKey, NULL, 0, &hKey2);
|
result = CryptDuplicateKey(hKey, NULL, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptExportKey(hKey, 0, 0, 0, &temp, &dwLen);
|
result = CryptExportKey(hKey, 0, 0, 0, &temp, &dwLen);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptGenKey(hProv, CALG_RC4, 0, &hKey2);
|
result = CryptGenKey(hProv, CALG_RC4, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptGetHashParam(hHash, 0, &temp, &dwLen, 0);
|
result = CryptGetHashParam(hHash, 0, &temp, &dwLen, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptGetKeyParam(hKey, 0, &temp, &dwLen, 0);
|
result = CryptGetKeyParam(hKey, 0, &temp, &dwLen, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = CryptGetProvParam(hProv, 0, &temp, &dwLen, 0);
|
result = CryptGetProvParam(hProv, 0, &temp, &dwLen, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptGetUserKey(0, 0, &hKey2);
|
result = CryptGetUserKey(0, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptGetUserKey(hProv, 0, &hKey2);
|
result = CryptGetUserKey(hProv, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptHashData(hHash, &temp, 1, 0);
|
result = CryptHashData(hHash, &temp, 1, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = pCryptHashSessionKey(hHash, hKey, 0);
|
result = pCryptHashSessionKey(hHash, hKey, 0);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptImportKey(hProv, &temp, 1, 0, 0, &hKey2);
|
result = CryptImportKey(hProv, &temp, 1, 0, 0, &hKey2);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
if (pCryptSignHashW)
|
if (pCryptSignHashW)
|
||||||
{
|
{
|
||||||
dwLen = 1;
|
dwLen = 1;
|
||||||
result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen);
|
result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen);
|
||||||
ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
|
ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
|
||||||
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError());
|
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError());
|
||||||
result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen);
|
result = pCryptSignHashW(hHash, 0, NULL, 0, &temp, &dwLen);
|
||||||
ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
|
ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
|
||||||
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError());
|
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
win_skip("CryptSignHashW is not available\n");
|
win_skip("CryptSignHashW is not available\n");
|
||||||
|
|
||||||
result = CryptSetKeyParam(hKey, 0, &temp, 1);
|
result = CryptSetKeyParam(hKey, 0, &temp, 1);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptSetHashParam(hHash, 0, &temp, 1);
|
result = CryptSetHashParam(hHash, 0, &temp, 1);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptSetProvParam(0, 0, &temp, 1);
|
result = CryptSetProvParam(0, 0, &temp, 1);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptSetProvParam(hProv, 0, &temp, 1);
|
result = CryptSetProvParam(hProv, 0, &temp, 1);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
if (pCryptVerifySignatureW)
|
if (pCryptVerifySignatureW)
|
||||||
{
|
{
|
||||||
result = pCryptVerifySignatureW(hHash, &temp, 1, hKey, NULL, 0);
|
result = pCryptVerifySignatureW(hHash, &temp, 1, hKey, NULL, 0);
|
||||||
ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
|
ok (!result && (GetLastError() == ERROR_INVALID_PARAMETER ||
|
||||||
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError());
|
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
win_skip("CryptVerifySignatureW is not available\n");
|
win_skip("CryptVerifySignatureW is not available\n");
|
||||||
|
|
||||||
result = CryptDestroyHash(hHash);
|
result = CryptDestroyHash(hHash);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
result = CryptDestroyKey(hKey);
|
result = CryptDestroyKey(hKey);
|
||||||
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static const BYTE privKey[] = {
|
static const BYTE privKey[] = {
|
||||||
|
@ -518,51 +518,51 @@ static void test_verify_sig(void)
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError());
|
"Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError());
|
||||||
ret = CryptAcquireContextA(&prov, szKeySet, NULL, PROV_RSA_FULL,
|
ret = CryptAcquireContextA(&prov, szKeySet, NULL, PROV_RSA_FULL,
|
||||||
CRYPT_NEWKEYSET);
|
CRYPT_NEWKEYSET);
|
||||||
if (!ret && GetLastError() == NTE_EXISTS)
|
if (!ret && GetLastError() == NTE_EXISTS)
|
||||||
ret = CryptAcquireContextA(&prov, szKeySet, NULL, PROV_RSA_FULL, 0);
|
ret = CryptAcquireContextA(&prov, szKeySet, NULL, PROV_RSA_FULL, 0);
|
||||||
ok(ret, "CryptAcquireContextA failed: %08x\n", GetLastError());
|
ok(ret, "CryptAcquireContextA failed: %08lx\n", GetLastError());
|
||||||
ret = CryptImportKey(prov, (LPBYTE)privKey, sizeof(privKey), 0, 0, &key);
|
ret = CryptImportKey(prov, (LPBYTE)privKey, sizeof(privKey), 0, 0, &key);
|
||||||
ok(ret, "CryptImportKey failed: %08x\n", GetLastError());
|
ok(ret, "CryptImportKey failed: %08lx\n", GetLastError());
|
||||||
ret = CryptCreateHash(prov, CALG_MD5, 0, 0, &hash);
|
ret = CryptCreateHash(prov, CALG_MD5, 0, 0, &hash);
|
||||||
ok(ret, "CryptCreateHash failed: %08x\n", GetLastError());
|
ok(ret, "CryptCreateHash failed: %08lx\n", GetLastError());
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCryptVerifySignatureW(hash, NULL, 0, 0, NULL, 0);
|
ret = pCryptVerifySignatureW(hash, NULL, 0, 0, NULL, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError());
|
"Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError());
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCryptVerifySignatureW(0, NULL, 0, key, NULL, 0);
|
ret = pCryptVerifySignatureW(0, NULL, 0, key, NULL, 0);
|
||||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||||
"Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError());
|
"Expected ERROR_INVALID_PARAMETER, got %08lx\n", GetLastError());
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCryptVerifySignatureW(hash, NULL, 0, key, NULL, 0);
|
ret = pCryptVerifySignatureW(hash, NULL, 0, key, NULL, 0);
|
||||||
ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE ||
|
ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE ||
|
||||||
GetLastError() == ERROR_INVALID_PARAMETER),
|
GetLastError() == ERROR_INVALID_PARAMETER),
|
||||||
"Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08x\n",
|
"Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08lx\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCryptVerifySignatureW(hash, NULL, sizeof(bogus), key, NULL, 0);
|
ret = pCryptVerifySignatureW(hash, NULL, sizeof(bogus), key, NULL, 0);
|
||||||
ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE ||
|
ok(!ret && (GetLastError() == NTE_BAD_SIGNATURE ||
|
||||||
GetLastError() == ERROR_INVALID_PARAMETER),
|
GetLastError() == ERROR_INVALID_PARAMETER),
|
||||||
"Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08x\n",
|
"Expected NTE_BAD_SIGNATURE or ERROR_INVALID_PARAMETER, got %08lx\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCryptVerifySignatureW(hash, bogus, 0, key, NULL, 0);
|
ret = pCryptVerifySignatureW(hash, bogus, 0, key, NULL, 0);
|
||||||
ok(!ret && GetLastError() == NTE_BAD_SIGNATURE,
|
ok(!ret && GetLastError() == NTE_BAD_SIGNATURE,
|
||||||
"Expected NTE_BAD_SIGNATURE, got %08x\n", GetLastError());
|
"Expected NTE_BAD_SIGNATURE, got %08lx\n", GetLastError());
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pCryptVerifySignatureW(hash, bogus, sizeof(bogus), key, NULL, 0);
|
ret = pCryptVerifySignatureW(hash, bogus, sizeof(bogus), key, NULL, 0);
|
||||||
ok(!ret &&
|
ok(!ret &&
|
||||||
(GetLastError() == NTE_BAD_SIGNATURE ||
|
(GetLastError() == NTE_BAD_SIGNATURE ||
|
||||||
broken(GetLastError() == NTE_BAD_HASH_STATE /* older NT4 */)),
|
broken(GetLastError() == NTE_BAD_HASH_STATE /* older NT4 */)),
|
||||||
"Expected NTE_BAD_SIGNATURE, got %08x\n", GetLastError());
|
"Expected NTE_BAD_SIGNATURE, got %08lx\n", GetLastError());
|
||||||
CryptDestroyKey(key);
|
CryptDestroyKey(key);
|
||||||
CryptDestroyHash(hash);
|
CryptDestroyHash(hash);
|
||||||
|
|
||||||
ret = CryptReleaseContext(prov, 0);
|
ret = CryptReleaseContext(prov, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static BOOL FindProvRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszProvName,
|
static BOOL FindProvRegVals(DWORD dwIndex, DWORD *pdwProvType, LPSTR *pszProvName,
|
||||||
|
@ -626,11 +626,11 @@ static void test_enum_providers(void)
|
||||||
|
|
||||||
/* check pdwReserved flag for NULL */
|
/* check pdwReserved flag for NULL */
|
||||||
result = pCryptEnumProvidersA(dwIndex, ¬Null, 0, &type, NULL, &providerLen);
|
result = pCryptEnumProvidersA(dwIndex, ¬Null, 0, &type, NULL, &providerLen);
|
||||||
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
|
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "%ld\n", GetLastError());
|
||||||
|
|
||||||
/* check dwFlags == 0 */
|
/* check dwFlags == 0 */
|
||||||
result = pCryptEnumProvidersA(dwIndex, NULL, notZeroFlags, &type, NULL, &providerLen);
|
result = pCryptEnumProvidersA(dwIndex, NULL, notZeroFlags, &type, NULL, &providerLen);
|
||||||
ok(!result && GetLastError()==NTE_BAD_FLAGS, "%d\n", GetLastError());
|
ok(!result && GetLastError()==NTE_BAD_FLAGS, "%ld\n", GetLastError());
|
||||||
|
|
||||||
/* alloc provider to half the size required
|
/* alloc provider to half the size required
|
||||||
* cbName holds the size required */
|
* cbName holds the size required */
|
||||||
|
@ -639,7 +639,7 @@ static void test_enum_providers(void)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
|
result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
|
||||||
ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %d\n",
|
ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
|
||||||
ERROR_MORE_DATA, GetLastError());
|
ERROR_MORE_DATA, GetLastError());
|
||||||
|
|
||||||
LocalFree(provider);
|
LocalFree(provider);
|
||||||
|
@ -657,7 +657,7 @@ static void test_enum_providers(void)
|
||||||
* ERROR_NO_MORE_ITEMS */
|
* ERROR_NO_MORE_ITEMS */
|
||||||
for (count = 0; count < provCount + 1; count++)
|
for (count = 0; count < provCount + 1; count++)
|
||||||
result = pCryptEnumProvidersA(count, NULL, 0, &type, NULL, &providerLen);
|
result = pCryptEnumProvidersA(count, NULL, 0, &type, NULL, &providerLen);
|
||||||
ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %d\n",
|
ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected %i, got %ld\n",
|
||||||
ERROR_NO_MORE_ITEMS, GetLastError());
|
ERROR_NO_MORE_ITEMS, GetLastError());
|
||||||
|
|
||||||
/* check expected versus actual values returned */
|
/* check expected versus actual values returned */
|
||||||
|
@ -668,20 +668,20 @@ static void test_enum_providers(void)
|
||||||
|
|
||||||
providerLen = -1;
|
providerLen = -1;
|
||||||
result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
|
result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
|
||||||
ok(result, "expected TRUE, got %d\n", result);
|
ok(result, "expected TRUE, got %ld\n", result);
|
||||||
ok(type==dwType, "expected %d, got %d\n", dwType, type);
|
ok(type==dwType, "expected %ld, got %ld\n", dwType, type);
|
||||||
if (pszProvName)
|
if (pszProvName)
|
||||||
ok(!strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
|
ok(!strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
|
||||||
ok(cbName==providerLen, "expected %d, got %d\n", cbName, providerLen);
|
ok(cbName==providerLen, "expected %ld, got %ld\n", cbName, providerLen);
|
||||||
|
|
||||||
providerLen = -1000;
|
providerLen = -1000;
|
||||||
provider[0] = 0;
|
provider[0] = 0;
|
||||||
result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
|
result = pCryptEnumProvidersA(dwIndex, NULL, 0, &type, provider, &providerLen);
|
||||||
ok(result, "expected TRUE, got %d\n", result);
|
ok(result, "expected TRUE, got %ld\n", result);
|
||||||
ok(type==dwType, "expected %d, got %d\n", dwType, type);
|
ok(type==dwType, "expected %ld, got %ld\n", dwType, type);
|
||||||
if (pszProvName)
|
if (pszProvName)
|
||||||
ok(!strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
|
ok(!strcmp(pszProvName, provider), "expected %s, got %s\n", pszProvName, provider);
|
||||||
ok(cbName==providerLen, "expected %d, got %d\n", cbName, providerLen);
|
ok(cbName==providerLen, "expected %ld, got %ld\n", cbName, providerLen);
|
||||||
|
|
||||||
LocalFree(pszProvName);
|
LocalFree(pszProvName);
|
||||||
LocalFree(provider);
|
LocalFree(provider);
|
||||||
|
@ -779,12 +779,12 @@ static void test_enum_provider_types(void)
|
||||||
|
|
||||||
/* check pdwReserved for NULL */
|
/* check pdwReserved for NULL */
|
||||||
result = pCryptEnumProviderTypesA(index, ¬Null, 0, &provType, typeName, &typeNameSize);
|
result = pCryptEnumProviderTypesA(index, ¬Null, 0, &provType, typeName, &typeNameSize);
|
||||||
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n",
|
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
/* check dwFlags == zero */
|
/* check dwFlags == zero */
|
||||||
result = pCryptEnumProviderTypesA(index, NULL, notZeroFlags, &provType, typeName, &typeNameSize);
|
result = pCryptEnumProviderTypesA(index, NULL, notZeroFlags, &provType, typeName, &typeNameSize);
|
||||||
ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected ERROR_INVALID_PARAMETER, got %d\n",
|
ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected ERROR_INVALID_PARAMETER, got %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
/* This test fails under Win2k SP4:
|
/* This test fails under Win2k SP4:
|
||||||
|
@ -799,7 +799,7 @@ static void test_enum_provider_types(void)
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
|
result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
|
||||||
ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %d/%d\n",
|
ok(!result && GetLastError()==ERROR_MORE_DATA, "expected 0/ERROR_MORE_DATA, got %ld/%ld\n",
|
||||||
result, GetLastError());
|
result, GetLastError());
|
||||||
|
|
||||||
LocalFree(typeName);
|
LocalFree(typeName);
|
||||||
|
@ -812,28 +812,28 @@ static void test_enum_provider_types(void)
|
||||||
while(pCryptEnumProviderTypesA(typeCount++, NULL, 0, &provType, NULL, &typeNameSize))
|
while(pCryptEnumProviderTypesA(typeCount++, NULL, 0, &provType, NULL, &typeNameSize))
|
||||||
;
|
;
|
||||||
typeCount--;
|
typeCount--;
|
||||||
ok(typeCount==dwTypeCount, "expected %d, got %d\n", dwTypeCount, typeCount);
|
ok(typeCount==dwTypeCount, "expected %ld, got %ld\n", dwTypeCount, typeCount);
|
||||||
|
|
||||||
/* loop past the actual number of provider types to get the error
|
/* loop past the actual number of provider types to get the error
|
||||||
* ERROR_NO_MORE_ITEMS */
|
* ERROR_NO_MORE_ITEMS */
|
||||||
for (typeCount = 0; typeCount < dwTypeCount + 1; typeCount++)
|
for (typeCount = 0; typeCount < dwTypeCount + 1; typeCount++)
|
||||||
result = pCryptEnumProviderTypesA(typeCount, NULL, 0, &provType, NULL, &typeNameSize);
|
result = pCryptEnumProviderTypesA(typeCount, NULL, 0, &provType, NULL, &typeNameSize);
|
||||||
ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %d\n",
|
ok(!result && GetLastError()==ERROR_NO_MORE_ITEMS, "expected ERROR_NO_MORE_ITEMS, got %ld\n",
|
||||||
GetLastError());
|
GetLastError());
|
||||||
|
|
||||||
/* check expected versus actual values returned */
|
/* check expected versus actual values returned */
|
||||||
result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, NULL, &typeNameSize);
|
result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, NULL, &typeNameSize);
|
||||||
ok(result && typeNameSize==cbTypeName, "expected %d, got %d\n", cbTypeName, typeNameSize);
|
ok(result && typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
|
||||||
if (!(typeName = LocalAlloc(LMEM_ZEROINIT, typeNameSize)))
|
if (!(typeName = LocalAlloc(LMEM_ZEROINIT, typeNameSize)))
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
||||||
typeNameSize = 0xdeadbeef;
|
typeNameSize = 0xdeadbeef;
|
||||||
result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
|
result = pCryptEnumProviderTypesA(index, NULL, 0, &provType, typeName, &typeNameSize);
|
||||||
ok(result, "expected TRUE, got %d\n", result);
|
ok(result, "expected TRUE, got %ld\n", result);
|
||||||
ok(provType==dwProvType, "expected %d, got %d\n", dwProvType, provType);
|
ok(provType==dwProvType, "expected %ld, got %ld\n", dwProvType, provType);
|
||||||
if (pszTypeName)
|
if (pszTypeName)
|
||||||
ok(!strcmp(pszTypeName, typeName), "expected %s, got %s\n", pszTypeName, typeName);
|
ok(!strcmp(pszTypeName, typeName), "expected %s, got %s\n", pszTypeName, typeName);
|
||||||
ok(typeNameSize==cbTypeName, "expected %d, got %d\n", cbTypeName, typeNameSize);
|
ok(typeNameSize==cbTypeName, "expected %ld, got %ld\n", cbTypeName, typeNameSize);
|
||||||
|
|
||||||
LocalFree(typeName);
|
LocalFree(typeName);
|
||||||
cleanup:
|
cleanup:
|
||||||
|
@ -920,13 +920,13 @@ static void test_get_default_provider(void)
|
||||||
|
|
||||||
/* check pdwReserved for NULL */
|
/* check pdwReserved for NULL */
|
||||||
result = pCryptGetDefaultProviderA(provType, ¬Null, flags, provName, &provNameSize);
|
result = pCryptGetDefaultProviderA(provType, ¬Null, flags, provName, &provNameSize);
|
||||||
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %d\n",
|
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
|
||||||
ERROR_INVALID_PARAMETER, GetLastError());
|
ERROR_INVALID_PARAMETER, GetLastError());
|
||||||
|
|
||||||
/* check for invalid flag */
|
/* check for invalid flag */
|
||||||
flags = 0xdeadbeef;
|
flags = 0xdeadbeef;
|
||||||
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
||||||
ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %d, got %d\n",
|
ok(!result && GetLastError()==NTE_BAD_FLAGS, "expected %ld, got %ld\n",
|
||||||
NTE_BAD_FLAGS, GetLastError());
|
NTE_BAD_FLAGS, GetLastError());
|
||||||
flags = CRYPT_MACHINE_DEFAULT;
|
flags = CRYPT_MACHINE_DEFAULT;
|
||||||
|
|
||||||
|
@ -935,7 +935,7 @@ static void test_get_default_provider(void)
|
||||||
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
||||||
ok(!result && (GetLastError() == NTE_BAD_PROV_TYPE ||
|
ok(!result && (GetLastError() == NTE_BAD_PROV_TYPE ||
|
||||||
GetLastError() == ERROR_INVALID_PARAMETER),
|
GetLastError() == ERROR_INVALID_PARAMETER),
|
||||||
"expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %d/%d\n",
|
"expected NTE_BAD_PROV_TYPE or ERROR_INVALID_PARAMETER, got %ld/%ld\n",
|
||||||
result, GetLastError());
|
result, GetLastError());
|
||||||
provType = PROV_RSA_FULL;
|
provType = PROV_RSA_FULL;
|
||||||
|
|
||||||
|
@ -948,14 +948,14 @@ static void test_get_default_provider(void)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
||||||
ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %d\n",
|
ok(!result && GetLastError()==ERROR_MORE_DATA, "expected %i, got %ld\n",
|
||||||
ERROR_MORE_DATA, GetLastError());
|
ERROR_MORE_DATA, GetLastError());
|
||||||
|
|
||||||
LocalFree(provName);
|
LocalFree(provName);
|
||||||
|
|
||||||
/* check expected versus actual values returned */
|
/* check expected versus actual values returned */
|
||||||
result = pCryptGetDefaultProviderA(provType, NULL, flags, NULL, &provNameSize);
|
result = pCryptGetDefaultProviderA(provType, NULL, flags, NULL, &provNameSize);
|
||||||
ok(result && provNameSize==cbProvName, "expected %d, got %d\n", cbProvName, provNameSize);
|
ok(result && provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
|
||||||
provNameSize = cbProvName;
|
provNameSize = cbProvName;
|
||||||
|
|
||||||
if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
|
if (!(provName = LocalAlloc(LMEM_ZEROINIT, provNameSize)))
|
||||||
|
@ -963,10 +963,10 @@ static void test_get_default_provider(void)
|
||||||
|
|
||||||
provNameSize = 0xdeadbeef;
|
provNameSize = 0xdeadbeef;
|
||||||
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
result = pCryptGetDefaultProviderA(provType, NULL, flags, provName, &provNameSize);
|
||||||
ok(result, "expected TRUE, got %d\n", result);
|
ok(result, "expected TRUE, got %ld\n", result);
|
||||||
if(pszProvName)
|
if(pszProvName)
|
||||||
ok(!strcmp(pszProvName, provName), "expected %s, got %s\n", pszProvName, provName);
|
ok(!strcmp(pszProvName, provName), "expected %s, got %s\n", pszProvName, provName);
|
||||||
ok(provNameSize==cbProvName, "expected %d, got %d\n", cbProvName, provNameSize);
|
ok(provNameSize==cbProvName, "expected %ld, got %ld\n", cbProvName, provNameSize);
|
||||||
|
|
||||||
LocalFree(pszProvName);
|
LocalFree(pszProvName);
|
||||||
LocalFree(provName);
|
LocalFree(provName);
|
||||||
|
@ -994,11 +994,11 @@ static void test_set_provider_ex(void)
|
||||||
if (!(curProvName = LocalAlloc(LMEM_ZEROINIT, curlen)))
|
if (!(curProvName = LocalAlloc(LMEM_ZEROINIT, curlen)))
|
||||||
return;
|
return;
|
||||||
result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, curProvName, &curlen);
|
result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, curProvName, &curlen);
|
||||||
ok(result, "%d\n", GetLastError());
|
ok(result, "%ld\n", GetLastError());
|
||||||
|
|
||||||
/* check pdwReserved for NULL */
|
/* check pdwReserved for NULL */
|
||||||
result = pCryptSetProviderExA(MS_DEF_PROV_A, PROV_RSA_FULL, ¬Null, CRYPT_MACHINE_DEFAULT);
|
result = pCryptSetProviderExA(MS_DEF_PROV_A, PROV_RSA_FULL, ¬Null, CRYPT_MACHINE_DEFAULT);
|
||||||
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %d\n",
|
ok(!result && GetLastError()==ERROR_INVALID_PARAMETER, "expected %i, got %ld\n",
|
||||||
ERROR_INVALID_PARAMETER, GetLastError());
|
ERROR_INVALID_PARAMETER, GetLastError());
|
||||||
|
|
||||||
/* remove the default provider and then set it to MS_DEF_PROV/PROV_RSA_FULL */
|
/* remove the default provider and then set it to MS_DEF_PROV/PROV_RSA_FULL */
|
||||||
|
@ -1007,31 +1007,31 @@ static void test_set_provider_ex(void)
|
||||||
if (!result)
|
if (!result)
|
||||||
{
|
{
|
||||||
ok( GetLastError() == ERROR_ACCESS_DENIED || broken(GetLastError() == ERROR_INVALID_PARAMETER),
|
ok( GetLastError() == ERROR_ACCESS_DENIED || broken(GetLastError() == ERROR_INVALID_PARAMETER),
|
||||||
"wrong error %u\n", GetLastError() );
|
"wrong error %lu\n", GetLastError() );
|
||||||
skip("Not enough rights to remove the default provider\n");
|
skip("Not enough rights to remove the default provider\n");
|
||||||
LocalFree(curProvName);
|
LocalFree(curProvName);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
result = pCryptSetProviderExA(MS_DEF_PROV_A, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
|
result = pCryptSetProviderExA(MS_DEF_PROV_A, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
|
||||||
ok(result, "%d\n", GetLastError());
|
ok(result, "%ld\n", GetLastError());
|
||||||
|
|
||||||
/* call CryptGetDefaultProvider to see if they match */
|
/* call CryptGetDefaultProvider to see if they match */
|
||||||
result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, NULL, &cbProvName);
|
result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, NULL, &cbProvName);
|
||||||
ok(result, "%d\n", GetLastError());
|
ok(result, "%ld\n", GetLastError());
|
||||||
if (!(pszProvName = LocalAlloc(LMEM_ZEROINIT, cbProvName)))
|
if (!(pszProvName = LocalAlloc(LMEM_ZEROINIT, cbProvName)))
|
||||||
goto reset;
|
goto reset;
|
||||||
|
|
||||||
result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, pszProvName, &cbProvName);
|
result = pCryptGetDefaultProviderA(PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT, pszProvName, &cbProvName);
|
||||||
ok(result && !strcmp(MS_DEF_PROV_A, pszProvName), "expected %s, got %s\n", MS_DEF_PROV_A, pszProvName);
|
ok(result && !strcmp(MS_DEF_PROV_A, pszProvName), "expected %s, got %s\n", MS_DEF_PROV_A, pszProvName);
|
||||||
ok(result && cbProvName==(strlen(MS_DEF_PROV_A) + 1), "expected %i, got %d\n", (lstrlenA(MS_DEF_PROV_A) + 1), cbProvName);
|
ok(result && cbProvName==(strlen(MS_DEF_PROV_A) + 1), "expected %i, got %ld\n", (lstrlenA(MS_DEF_PROV_A) + 1), cbProvName);
|
||||||
|
|
||||||
LocalFree(pszProvName);
|
LocalFree(pszProvName);
|
||||||
|
|
||||||
reset:
|
reset:
|
||||||
/* Set the provider back to its original */
|
/* Set the provider back to its original */
|
||||||
result = pCryptSetProviderExA(curProvName, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
|
result = pCryptSetProviderExA(curProvName, PROV_RSA_FULL, NULL, CRYPT_MACHINE_DEFAULT);
|
||||||
ok(result, "%d\n", GetLastError());
|
ok(result, "%ld\n", GetLastError());
|
||||||
LocalFree(curProvName);
|
LocalFree(curProvName);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1059,7 +1059,7 @@ static void test_machine_guid(void)
|
||||||
{
|
{
|
||||||
restoreGuid = TRUE;
|
restoreGuid = TRUE;
|
||||||
r = RegDeleteValueA(key, "MachineGuid");
|
r = RegDeleteValueA(key, "MachineGuid");
|
||||||
ok(!r || broken(r == ERROR_ACCESS_DENIED) /*win8*/, "RegDeleteValueA failed: %d\n", r);
|
ok(!r || broken(r == ERROR_ACCESS_DENIED) /*win8*/, "RegDeleteValueA failed: %ld\n", r);
|
||||||
if (r == ERROR_ACCESS_DENIED)
|
if (r == ERROR_ACCESS_DENIED)
|
||||||
{
|
{
|
||||||
skip("broken virtualization on HKLM\\Software\\Microsoft\\Cryptography\n");
|
skip("broken virtualization on HKLM\\Software\\Microsoft\\Cryptography\n");
|
||||||
|
@ -1068,14 +1068,14 @@ static void test_machine_guid(void)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
ok(r == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %d\n",
|
ok(r == ERROR_FILE_NOT_FOUND, "expected ERROR_FILE_NOT_FOUND, got %ld\n",
|
||||||
r);
|
r);
|
||||||
/* Create and release a provider */
|
/* Create and release a provider */
|
||||||
ret = CryptAcquireContextA(&hCryptProv, szKeySet, NULL, PROV_RSA_FULL, 0);
|
ret = CryptAcquireContextA(&hCryptProv, szKeySet, NULL, PROV_RSA_FULL, 0);
|
||||||
ok(ret || broken(!ret && GetLastError() == NTE_KEYSET_ENTRY_BAD /* NT4 */),
|
ok(ret || broken(!ret && GetLastError() == NTE_KEYSET_ENTRY_BAD /* NT4 */),
|
||||||
"CryptAcquireContextA failed: %08x\n", GetLastError());
|
"CryptAcquireContextA failed: %08lx\n", GetLastError());
|
||||||
ret = CryptReleaseContext(hCryptProv, 0);
|
ret = CryptReleaseContext(hCryptProv, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
if (restoreGuid)
|
if (restoreGuid)
|
||||||
RegSetValueExA(key, "MachineGuid", 0, REG_SZ, (const BYTE *)originalGuid,
|
RegSetValueExA(key, "MachineGuid", 0, REG_SZ, (const BYTE *)originalGuid,
|
||||||
|
@ -1105,7 +1105,7 @@ static void test_rc2_keylen(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptAcquireContextA(&provider, NULL, NULL,
|
ret = CryptAcquireContextA(&provider, NULL, NULL,
|
||||||
PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
|
PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
|
||||||
ok(ret, "CryptAcquireContext error %u\n", GetLastError());
|
ok(ret, "CryptAcquireContext error %lu\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
{
|
{
|
||||||
key_blob.header.bType = PLAINTEXTKEYBLOB;
|
key_blob.header.bType = PLAINTEXTKEYBLOB;
|
||||||
|
@ -1122,18 +1122,18 @@ static void test_rc2_keylen(void)
|
||||||
/* CRYPT_IPSEC_HMAC_KEY is not supported on W2K and lower */
|
/* CRYPT_IPSEC_HMAC_KEY is not supported on W2K and lower */
|
||||||
ok(ret ||
|
ok(ret ||
|
||||||
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
||||||
"CryptImportKey error %08x\n", GetLastError());
|
"CryptImportKey error %08lx\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
CryptDestroyKey(hkey);
|
CryptDestroyKey(hkey);
|
||||||
|
|
||||||
ret = CryptReleaseContext(provider, 0);
|
ret = CryptReleaseContext(provider, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptAcquireContextA(&provider, NULL, MS_DEF_PROV_A,
|
ret = CryptAcquireContextA(&provider, NULL, MS_DEF_PROV_A,
|
||||||
PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
|
PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
|
||||||
ok(ret, "CryptAcquireContext error %08x\n", GetLastError());
|
ok(ret, "CryptAcquireContext error %08lx\n", GetLastError());
|
||||||
|
|
||||||
if (ret)
|
if (ret)
|
||||||
{
|
{
|
||||||
|
@ -1145,7 +1145,7 @@ static void test_rc2_keylen(void)
|
||||||
GetLastError() == NTE_BAD_LEN || /* Win7 */
|
GetLastError() == NTE_BAD_LEN || /* Win7 */
|
||||||
GetLastError() == NTE_BAD_TYPE || /* W2K */
|
GetLastError() == NTE_BAD_TYPE || /* W2K */
|
||||||
GetLastError() == NTE_PERM), /* Win9x, WinMe and NT4 */
|
GetLastError() == NTE_PERM), /* Win9x, WinMe and NT4 */
|
||||||
"unexpected error %08x\n", GetLastError());
|
"unexpected error %08lx\n", GetLastError());
|
||||||
/* but importing an 56-bit (7-byte) key does.. */
|
/* but importing an 56-bit (7-byte) key does.. */
|
||||||
key_blob.key_size = 7;
|
key_blob.key_size = 7;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
|
@ -1154,7 +1154,7 @@ static void test_rc2_keylen(void)
|
||||||
ok(ret ||
|
ok(ret ||
|
||||||
broken(!ret && GetLastError() == NTE_BAD_TYPE) || /* W2K */
|
broken(!ret && GetLastError() == NTE_BAD_TYPE) || /* W2K */
|
||||||
broken(!ret && GetLastError() == NTE_PERM), /* Win9x, WinMe and NT4 */
|
broken(!ret && GetLastError() == NTE_PERM), /* Win9x, WinMe and NT4 */
|
||||||
"CryptAcquireContext error %08x\n", GetLastError());
|
"CryptAcquireContext error %08lx\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
CryptDestroyKey(hkey);
|
CryptDestroyKey(hkey);
|
||||||
/* as does importing a 16-byte key with the base provider when
|
/* as does importing a 16-byte key with the base provider when
|
||||||
|
@ -1167,18 +1167,18 @@ static void test_rc2_keylen(void)
|
||||||
/* CRYPT_IPSEC_HMAC_KEY is not supported on W2K and lower */
|
/* CRYPT_IPSEC_HMAC_KEY is not supported on W2K and lower */
|
||||||
ok(ret ||
|
ok(ret ||
|
||||||
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
||||||
"CryptImportKey error %08x\n", GetLastError());
|
"CryptImportKey error %08lx\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
CryptDestroyKey(hkey);
|
CryptDestroyKey(hkey);
|
||||||
|
|
||||||
ret = CryptReleaseContext(provider, 0);
|
ret = CryptReleaseContext(provider, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
key_blob.key_size = sizeof(key);
|
key_blob.key_size = sizeof(key);
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptAcquireContextA(&provider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
|
ret = CryptAcquireContextA(&provider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
|
||||||
ok(ret, "CryptAcquireContext error %08x\n", GetLastError());
|
ok(ret, "CryptAcquireContext error %08lx\n", GetLastError());
|
||||||
|
|
||||||
if (ret)
|
if (ret)
|
||||||
{
|
{
|
||||||
|
@ -1190,7 +1190,7 @@ static void test_rc2_keylen(void)
|
||||||
0, CRYPT_IPSEC_HMAC_KEY, &hkey);
|
0, CRYPT_IPSEC_HMAC_KEY, &hkey);
|
||||||
ok(ret ||
|
ok(ret ||
|
||||||
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
||||||
"CryptImportKey error %08x\n", GetLastError());
|
"CryptImportKey error %08lx\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
CryptDestroyKey(hkey);
|
CryptDestroyKey(hkey);
|
||||||
|
|
||||||
|
@ -1203,12 +1203,12 @@ static void test_rc2_keylen(void)
|
||||||
0, CRYPT_IPSEC_HMAC_KEY, &hkey);
|
0, CRYPT_IPSEC_HMAC_KEY, &hkey);
|
||||||
ok(ret ||
|
ok(ret ||
|
||||||
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
broken(!ret && GetLastError() == NTE_BAD_FLAGS),
|
||||||
"CryptImportKey error %08x\n", GetLastError());
|
"CryptImportKey error %08lx\n", GetLastError());
|
||||||
if (ret)
|
if (ret)
|
||||||
CryptDestroyKey(hkey);
|
CryptDestroyKey(hkey);
|
||||||
|
|
||||||
ret = CryptReleaseContext(provider, 0);
|
ret = CryptReleaseContext(provider, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1231,7 +1231,7 @@ static void test_SystemFunction036(void)
|
||||||
{
|
{
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pSystemFunction036(NULL, 5);
|
ret = pSystemFunction036(NULL, 5);
|
||||||
trace("ret = %d, GetLastError() = %d\n", ret, GetLastError());
|
trace("ret = %d, GetLastError() = %ld\n", ret, GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = pSystemFunction036(&test, 0);
|
ret = pSystemFunction036(&test, 0);
|
||||||
|
@ -1250,29 +1250,29 @@ static void test_container_sd(void)
|
||||||
|
|
||||||
ret = CryptAcquireContextA(&prov, "winetest", "Microsoft Enhanced Cryptographic Provider v1.0",
|
ret = CryptAcquireContextA(&prov, "winetest", "Microsoft Enhanced Cryptographic Provider v1.0",
|
||||||
PROV_RSA_FULL, CRYPT_MACHINE_KEYSET|CRYPT_NEWKEYSET);
|
PROV_RSA_FULL, CRYPT_MACHINE_KEYSET|CRYPT_NEWKEYSET);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
len = 0;
|
len = 0;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CryptGetProvParam(prov, PP_KEYSET_SEC_DESCR, NULL, &len, OWNER_SECURITY_INFORMATION);
|
ret = CryptGetProvParam(prov, PP_KEYSET_SEC_DESCR, NULL, &len, OWNER_SECURITY_INFORMATION);
|
||||||
err = GetLastError();
|
err = GetLastError();
|
||||||
ok(ret, "got %u\n", err);
|
ok(ret, "got %lu\n", err);
|
||||||
ok(err == ERROR_INSUFFICIENT_BUFFER || broken(err == ERROR_INVALID_PARAMETER), "got %u\n", err);
|
ok(err == ERROR_INSUFFICIENT_BUFFER || broken(err == ERROR_INVALID_PARAMETER), "got %lu\n", err);
|
||||||
ok(len, "expected len > 0\n");
|
ok(len, "expected len > 0\n");
|
||||||
|
|
||||||
sd = HeapAlloc(GetProcessHeap(), 0, len);
|
sd = HeapAlloc(GetProcessHeap(), 0, len);
|
||||||
ret = CryptGetProvParam(prov, PP_KEYSET_SEC_DESCR, (BYTE *)sd, &len, OWNER_SECURITY_INFORMATION);
|
ret = CryptGetProvParam(prov, PP_KEYSET_SEC_DESCR, (BYTE *)sd, &len, OWNER_SECURITY_INFORMATION);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
HeapFree(GetProcessHeap(), 0, sd);
|
HeapFree(GetProcessHeap(), 0, sd);
|
||||||
|
|
||||||
ret = CryptReleaseContext(prov, 0);
|
ret = CryptReleaseContext(prov, 0);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
|
|
||||||
prov = 0xdeadbeef;
|
prov = 0xdeadbeef;
|
||||||
ret = CryptAcquireContextA(&prov, "winetest", "Microsoft Enhanced Cryptographic Provider v1.0",
|
ret = CryptAcquireContextA(&prov, "winetest", "Microsoft Enhanced Cryptographic Provider v1.0",
|
||||||
PROV_RSA_FULL, CRYPT_MACHINE_KEYSET|CRYPT_DELETEKEYSET);
|
PROV_RSA_FULL, CRYPT_MACHINE_KEYSET|CRYPT_DELETEKEYSET);
|
||||||
ok(ret, "got %u\n", GetLastError());
|
ok(ret, "got %lu\n", GetLastError());
|
||||||
ok(prov == 0, "got %ld\n", prov);
|
ok(prov == 0, "got %Id\n", prov);
|
||||||
}
|
}
|
||||||
|
|
||||||
START_TEST(crypt)
|
START_TEST(crypt)
|
||||||
|
|
|
@ -70,7 +70,7 @@ static BOOL create_backup(const char *filename)
|
||||||
win_skip( "Can't open event log\n" );
|
win_skip( "Can't open event log\n" );
|
||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError());
|
ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError());
|
||||||
|
|
||||||
DeleteFileA(filename);
|
DeleteFileA(filename);
|
||||||
rc = BackupEventLogA(handle, filename);
|
rc = BackupEventLogA(handle, filename);
|
||||||
|
@ -80,12 +80,12 @@ static BOOL create_backup(const char *filename)
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
ok(rc, "BackupEventLogA failed, le=%u\n", GetLastError());
|
ok(rc, "BackupEventLogA failed, le=%lu\n", GetLastError());
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
|
||||||
attribs = GetFileAttributesA(filename);
|
attribs = GetFileAttributesA(filename);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(attribs != INVALID_FILE_ATTRIBUTES, "Expected a backup file attribs=%#x le=%u\n", attribs, GetLastError());
|
ok(attribs != INVALID_FILE_ATTRIBUTES, "Expected a backup file attribs=%#lx le=%lu\n", attribs, GetLastError());
|
||||||
return TRUE;
|
return TRUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -99,46 +99,46 @@ static void test_open_close(void)
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE ||
|
ok(GetLastError() == ERROR_INVALID_HANDLE ||
|
||||||
GetLastError() == ERROR_NOACCESS, /* W2K */
|
GetLastError() == ERROR_NOACCESS, /* W2K */
|
||||||
"Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
"Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenEventLogA(NULL, NULL);
|
handle = OpenEventLogA(NULL, NULL);
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenEventLogA("IDontExist", NULL);
|
handle = OpenEventLogA("IDontExist", NULL);
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenEventLogA("IDontExist", "deadbeef");
|
handle = OpenEventLogA("IDontExist", "deadbeef");
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
||||||
GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */
|
GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */
|
||||||
"Expected RPC_S_SERVER_UNAVAILABLE, got %d\n", GetLastError());
|
"Expected RPC_S_SERVER_UNAVAILABLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* This one opens the Application log */
|
/* This one opens the Application log */
|
||||||
handle = OpenEventLogA(NULL, "deadbeef");
|
handle = OpenEventLogA(NULL, "deadbeef");
|
||||||
ok(handle != NULL, "Expected a handle : %d\n", GetLastError());
|
ok(handle != NULL, "Expected a handle : %ld\n", GetLastError());
|
||||||
ret = CloseEventLog(handle);
|
ret = CloseEventLog(handle);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
/* Close a second time */
|
/* Close a second time */
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = CloseEventLog(handle);
|
ret = CloseEventLog(handle);
|
||||||
todo_wine
|
todo_wine
|
||||||
{
|
{
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Empty servername should be read as local server */
|
/* Empty servername should be read as local server */
|
||||||
handle = OpenEventLogA("", "Application");
|
handle = OpenEventLogA("", "Application");
|
||||||
ok(handle != NULL, "Expected a handle : %d\n", GetLastError());
|
ok(handle != NULL, "Expected a handle : %ld\n", GetLastError());
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
|
||||||
handle = OpenEventLogA(NULL, "Application");
|
handle = OpenEventLogA(NULL, "Application");
|
||||||
ok(handle != NULL, "Expected a handle : %d\n", GetLastError());
|
ok(handle != NULL, "Expected a handle : %ld\n", GetLastError());
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -159,47 +159,47 @@ static void test_info(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pGetEventLogInformation(NULL, 1, NULL, 0, NULL);
|
ret = pGetEventLogInformation(NULL, 1, NULL, 0, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_LEVEL, "Expected ERROR_INVALID_LEVEL, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_LEVEL, "Expected ERROR_INVALID_LEVEL, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pGetEventLogInformation(NULL, EVENTLOG_FULL_INFO, NULL, 0, NULL);
|
ret = pGetEventLogInformation(NULL, EVENTLOG_FULL_INFO, NULL, 0, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
handle = OpenEventLogA(NULL, "Application");
|
handle = OpenEventLogA(NULL, "Application");
|
||||||
ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError());
|
ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, NULL, 0, NULL);
|
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, NULL, 0, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %d\n", GetLastError());
|
ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, NULL, 0, &needed);
|
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, NULL, 0, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %d\n", GetLastError());
|
ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, 0, NULL);
|
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, 0, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %d\n", GetLastError());
|
ok(GetLastError() == RPC_X_NULL_REF_POINTER, "Expected RPC_X_NULL_REF_POINTER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
needed = 0xdeadbeef;
|
needed = 0xdeadbeef;
|
||||||
efi->dwFull = 0xdeadbeef;
|
efi->dwFull = 0xdeadbeef;
|
||||||
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, 0, &needed);
|
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, 0, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError());
|
||||||
ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %d\n", needed);
|
ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %ld\n", needed);
|
||||||
ok(efi->dwFull == 0xdeadbeef, "Expected no change to the dwFull member\n");
|
ok(efi->dwFull == 0xdeadbeef, "Expected no change to the dwFull member\n");
|
||||||
|
|
||||||
/* Not that we care, but on success last error is set to ERROR_IO_PENDING */
|
/* Not that we care, but on success last error is set to ERROR_IO_PENDING */
|
||||||
efi->dwFull = 0xdeadbeef;
|
efi->dwFull = 0xdeadbeef;
|
||||||
needed = sizeof(buffer);
|
needed = sizeof(buffer);
|
||||||
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, needed, &needed);
|
ret = pGetEventLogInformation(handle, EVENTLOG_FULL_INFO, efi, needed, &needed);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %d\n", needed);
|
ok(needed == sizeof(EVENTLOG_FULL_INFORMATION), "Expected sizeof(EVENTLOG_FULL_INFORMATION), got %ld\n", needed);
|
||||||
ok(efi->dwFull == 0 || efi->dwFull == 1, "Expected 0 (not full) or 1 (full), got %d\n", efi->dwFull);
|
ok(efi->dwFull == 0 || efi->dwFull == 1, "Expected 0 (not full) or 1 (full), got %ld\n", efi->dwFull);
|
||||||
|
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
}
|
}
|
||||||
|
@ -214,26 +214,26 @@ static void test_count(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = GetNumberOfEventLogRecords(NULL, NULL);
|
ret = GetNumberOfEventLogRecords(NULL, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
count = 0xdeadbeef;
|
count = 0xdeadbeef;
|
||||||
ret = GetNumberOfEventLogRecords(NULL, &count);
|
ret = GetNumberOfEventLogRecords(NULL, &count);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
ok(count == 0xdeadbeef, "Expected count to stay unchanged\n");
|
ok(count == 0xdeadbeef, "Expected count to stay unchanged\n");
|
||||||
|
|
||||||
handle = OpenEventLogA(NULL, "Application");
|
handle = OpenEventLogA(NULL, "Application");
|
||||||
ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError());
|
ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = GetNumberOfEventLogRecords(handle, NULL);
|
ret = GetNumberOfEventLogRecords(handle, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
count = 0xdeadbeef;
|
count = 0xdeadbeef;
|
||||||
ret = GetNumberOfEventLogRecords(handle, &count);
|
ret = GetNumberOfEventLogRecords(handle, &count);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(count != 0xdeadbeef, "Expected the number of records\n");
|
ok(count != 0xdeadbeef, "Expected the number of records\n");
|
||||||
|
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
@ -243,14 +243,14 @@ static void test_count(void)
|
||||||
{
|
{
|
||||||
handle = OpenBackupEventLogA(NULL, backup);
|
handle = OpenBackupEventLogA(NULL, backup);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(handle != NULL, "Expected a handle, le=%d\n", GetLastError());
|
ok(handle != NULL, "Expected a handle, le=%ld\n", GetLastError());
|
||||||
|
|
||||||
/* Does GetNumberOfEventLogRecords work with backup eventlogs? */
|
/* Does GetNumberOfEventLogRecords work with backup eventlogs? */
|
||||||
count = 0xdeadbeef;
|
count = 0xdeadbeef;
|
||||||
ret = GetNumberOfEventLogRecords(handle, &count);
|
ret = GetNumberOfEventLogRecords(handle, &count);
|
||||||
todo_wine
|
todo_wine
|
||||||
{
|
{
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(count != 0xdeadbeef, "Expected the number of records\n");
|
ok(count != 0xdeadbeef, "Expected the number of records\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -269,13 +269,13 @@ static void test_oldest(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = GetOldestEventLogRecord(NULL, NULL);
|
ret = GetOldestEventLogRecord(NULL, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
oldest = 0xdeadbeef;
|
oldest = 0xdeadbeef;
|
||||||
ret = GetOldestEventLogRecord(NULL, &oldest);
|
ret = GetOldestEventLogRecord(NULL, &oldest);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
ok(oldest == 0xdeadbeef, "Expected oldest to stay unchanged\n");
|
ok(oldest == 0xdeadbeef, "Expected oldest to stay unchanged\n");
|
||||||
|
|
||||||
handle = OpenEventLogA(NULL, "Application");
|
handle = OpenEventLogA(NULL, "Application");
|
||||||
|
@ -284,16 +284,16 @@ static void test_oldest(void)
|
||||||
win_skip( "Can't open event log\n" );
|
win_skip( "Can't open event log\n" );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError());
|
ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = GetOldestEventLogRecord(handle, NULL);
|
ret = GetOldestEventLogRecord(handle, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
oldest = 0xdeadbeef;
|
oldest = 0xdeadbeef;
|
||||||
ret = GetOldestEventLogRecord(handle, &oldest);
|
ret = GetOldestEventLogRecord(handle, &oldest);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(oldest != 0xdeadbeef, "Expected the number of the oldest record\n");
|
ok(oldest != 0xdeadbeef, "Expected the number of the oldest record\n");
|
||||||
|
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
@ -310,7 +310,7 @@ static void test_oldest(void)
|
||||||
ret = GetOldestEventLogRecord(handle, &oldest);
|
ret = GetOldestEventLogRecord(handle, &oldest);
|
||||||
todo_wine
|
todo_wine
|
||||||
{
|
{
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(oldest != 0xdeadbeef, "Expected the number of the oldest record\n");
|
ok(oldest != 0xdeadbeef, "Expected the number of the oldest record\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -329,7 +329,7 @@ static void test_backup(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = BackupEventLogA(NULL, NULL);
|
ret = BackupEventLogA(NULL, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = BackupEventLogA(NULL, backup);
|
ret = BackupEventLogA(NULL, backup);
|
||||||
|
@ -342,12 +342,12 @@ static void test_backup(void)
|
||||||
win_skip( "Can't open event log\n" );
|
win_skip( "Can't open event log\n" );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError());
|
ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = BackupEventLogA(handle, NULL);
|
ret = BackupEventLogA(handle, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
ret = BackupEventLogA(handle, backup);
|
ret = BackupEventLogA(handle, backup);
|
||||||
if (!ret && GetLastError() == ERROR_PRIVILEGE_NOT_HELD)
|
if (!ret && GetLastError() == ERROR_PRIVILEGE_NOT_HELD)
|
||||||
|
@ -356,7 +356,7 @@ static void test_backup(void)
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetFileAttributesA(backup) != INVALID_FILE_ATTRIBUTES, "Expected a backup file\n");
|
ok(GetFileAttributesA(backup) != INVALID_FILE_ATTRIBUTES, "Expected a backup file\n");
|
||||||
|
|
||||||
|
@ -366,7 +366,7 @@ static void test_backup(void)
|
||||||
todo_wine
|
todo_wine
|
||||||
{
|
{
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_ALREADY_EXISTS, "Expected ERROR_ALREADY_EXISTS, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_ALREADY_EXISTS, "Expected ERROR_ALREADY_EXISTS, got %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
@ -379,7 +379,7 @@ static void test_backup(void)
|
||||||
ret = BackupEventLogA(handle, backup2);
|
ret = BackupEventLogA(handle, backup2);
|
||||||
todo_wine
|
todo_wine
|
||||||
{
|
{
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(GetFileAttributesA(backup2) != INVALID_FILE_ATTRIBUTES, "Expected a backup file\n");
|
ok(GetFileAttributesA(backup2) != INVALID_FILE_ATTRIBUTES, "Expected a backup file\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -399,7 +399,7 @@ static void test_read(void)
|
||||||
ret = ReadEventLogA(NULL, 0, 0, NULL, 0, NULL, NULL);
|
ret = ReadEventLogA(NULL, 0, 0, NULL, 0, NULL, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
read = 0xdeadbeef;
|
read = 0xdeadbeef;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
|
@ -407,7 +407,7 @@ static void test_read(void)
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(read == 0xdeadbeef, "Expected 'read' parameter to remain unchanged\n");
|
ok(read == 0xdeadbeef, "Expected 'read' parameter to remain unchanged\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
needed = 0xdeadbeef;
|
needed = 0xdeadbeef;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
|
@ -415,26 +415,26 @@ static void test_read(void)
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(needed == 0xdeadbeef, "Expected 'needed' parameter to remain unchanged\n");
|
ok(needed == 0xdeadbeef, "Expected 'needed' parameter to remain unchanged\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* 'read' and 'needed' are only filled when the needed buffer size is passed back or when the call succeeds */
|
/* 'read' and 'needed' are only filled when the needed buffer size is passed back or when the call succeeds */
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(NULL, 0, 0, NULL, 0, &read, &needed);
|
ret = ReadEventLogA(NULL, 0, 0, NULL, 0, &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(NULL, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, NULL, 0, NULL, NULL);
|
ret = ReadEventLogA(NULL, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, NULL, 0, NULL, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(NULL, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, NULL, 0, &read, &needed);
|
ret = ReadEventLogA(NULL, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, NULL, 0, &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
buf = NULL;
|
buf = NULL;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
|
@ -442,7 +442,7 @@ static void test_read(void)
|
||||||
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD));
|
buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD));
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
|
@ -450,7 +450,7 @@ static void test_read(void)
|
||||||
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
HeapFree(GetProcessHeap(), 0, buf);
|
HeapFree(GetProcessHeap(), 0, buf);
|
||||||
|
|
||||||
handle = OpenEventLogA(NULL, "Application");
|
handle = OpenEventLogA(NULL, "Application");
|
||||||
|
@ -459,7 +459,7 @@ static void test_read(void)
|
||||||
win_skip( "Can't open event log\n" );
|
win_skip( "Can't open event log\n" );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ok(handle != NULL, "OpenEventLogA(Application) failed : %d\n", GetLastError());
|
ok(handle != NULL, "OpenEventLogA(Application) failed : %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Show that we need the proper dwFlags with a (for the rest) proper call */
|
/* Show that we need the proper dwFlags with a (for the rest) proper call */
|
||||||
buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD));
|
buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD));
|
||||||
|
@ -468,40 +468,40 @@ static void test_read(void)
|
||||||
ret = ReadEventLogA(handle, 0, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
ret = ReadEventLogA(handle, 0, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ, 0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ | EVENTLOG_BACKWARDS_READ,
|
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ | EVENTLOG_BACKWARDS_READ,
|
||||||
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ | EVENTLOG_FORWARDS_READ | EVENTLOG_BACKWARDS_READ,
|
ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ | EVENTLOG_FORWARDS_READ | EVENTLOG_BACKWARDS_READ,
|
||||||
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ | EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ,
|
ret = ReadEventLogA(handle, EVENTLOG_SEEK_READ | EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ,
|
||||||
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
0, buf, sizeof(EVENTLOGRECORD), &read, &needed);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
HeapFree(GetProcessHeap(), 0, buf);
|
HeapFree(GetProcessHeap(), 0, buf);
|
||||||
|
|
||||||
|
@ -524,7 +524,7 @@ static void test_read(void)
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(read == 0, "Expected no bytes read\n");
|
ok(read == 0, "Expected no bytes read\n");
|
||||||
ok(needed > sizeof(EVENTLOGRECORD), "Expected the needed buffersize to be bigger than sizeof(EVENTLOGRECORD)\n");
|
ok(needed > sizeof(EVENTLOGRECORD), "Expected the needed buffersize to be bigger than sizeof(EVENTLOGRECORD)\n");
|
||||||
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Read the first record */
|
/* Read the first record */
|
||||||
toread = needed;
|
toread = needed;
|
||||||
|
@ -532,7 +532,7 @@ static void test_read(void)
|
||||||
read = needed = 0xdeadbeef;
|
read = needed = 0xdeadbeef;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, buf, toread, &read, &needed);
|
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ, 0, buf, toread, &read, &needed);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(read == toread ||
|
ok(read == toread ||
|
||||||
broken(read < toread), /* NT4 wants a buffer size way bigger than just 1 record */
|
broken(read < toread), /* NT4 wants a buffer size way bigger than just 1 record */
|
||||||
"Expected the requested size to be read\n");
|
"Expected the requested size to be read\n");
|
||||||
|
@ -552,7 +552,7 @@ static void test_openbackup(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenBackupEventLogA(NULL, NULL);
|
handle = OpenBackupEventLogA(NULL, NULL);
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenBackupEventLogA(NULL, "idontexist.evt");
|
handle = OpenBackupEventLogA(NULL, "idontexist.evt");
|
||||||
|
@ -560,19 +560,19 @@ static void test_openbackup(void)
|
||||||
ok(GetLastError() == ERROR_FILE_NOT_FOUND ||
|
ok(GetLastError() == ERROR_FILE_NOT_FOUND ||
|
||||||
GetLastError() == ERROR_ACCESS_DENIED ||
|
GetLastError() == ERROR_ACCESS_DENIED ||
|
||||||
GetLastError() == RPC_S_SERVER_UNAVAILABLE,
|
GetLastError() == RPC_S_SERVER_UNAVAILABLE,
|
||||||
"got %d\n", GetLastError());
|
"got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenBackupEventLogA("IDontExist", NULL);
|
handle = OpenBackupEventLogA("IDontExist", NULL);
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
handle = OpenBackupEventLogA("IDontExist", "idontexist.evt");
|
handle = OpenBackupEventLogA("IDontExist", "idontexist.evt");
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
||||||
GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */
|
GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */
|
||||||
"Expected RPC_S_SERVER_UNAVAILABLE, got %d\n", GetLastError());
|
"Expected RPC_S_SERVER_UNAVAILABLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Make a backup eventlog to work with */
|
/* Make a backup eventlog to work with */
|
||||||
if (create_backup(backup))
|
if (create_backup(backup))
|
||||||
|
@ -589,7 +589,7 @@ static void test_openbackup(void)
|
||||||
ok(handle == NULL, "Didn't expect a handle\n");
|
ok(handle == NULL, "Didn't expect a handle\n");
|
||||||
ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
ok(GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
||||||
GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */
|
GetLastError() == RPC_S_INVALID_NET_ADDR, /* Some Vista and Win7 */
|
||||||
"Expected RPC_S_SERVER_UNAVAILABLE, got %d\n", GetLastError());
|
"Expected RPC_S_SERVER_UNAVAILABLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Empty servername should be read as local server */
|
/* Empty servername should be read as local server */
|
||||||
handle = OpenBackupEventLogA("", backup);
|
handle = OpenBackupEventLogA("", backup);
|
||||||
|
@ -619,7 +619,7 @@ static void test_openbackup(void)
|
||||||
GetLastError() == ERROR_ACCESS_DENIED ||
|
GetLastError() == ERROR_ACCESS_DENIED ||
|
||||||
GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
GetLastError() == RPC_S_SERVER_UNAVAILABLE ||
|
||||||
GetLastError() == ERROR_EVENTLOG_FILE_CORRUPT, /* Vista and Win7 */
|
GetLastError() == ERROR_EVENTLOG_FILE_CORRUPT, /* Vista and Win7 */
|
||||||
"got %d\n", GetLastError());
|
"got %ld\n", GetLastError());
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
DeleteFileA(backup);
|
DeleteFileA(backup);
|
||||||
|
|
||||||
|
@ -632,7 +632,7 @@ static void test_openbackup(void)
|
||||||
ok(GetLastError() == ERROR_EVENTLOG_FILE_CORRUPT ||
|
ok(GetLastError() == ERROR_EVENTLOG_FILE_CORRUPT ||
|
||||||
GetLastError() == ERROR_ACCESS_DENIED ||
|
GetLastError() == ERROR_ACCESS_DENIED ||
|
||||||
GetLastError() == RPC_S_SERVER_UNAVAILABLE,
|
GetLastError() == RPC_S_SERVER_UNAVAILABLE,
|
||||||
"got %d\n", GetLastError());
|
"got %ld\n", GetLastError());
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
DeleteFileA(backup);
|
DeleteFileA(backup);
|
||||||
}
|
}
|
||||||
|
@ -647,7 +647,7 @@ static void test_clear(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ClearEventLogA(NULL, NULL);
|
ret = ClearEventLogA(NULL, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Make a backup eventlog to work with */
|
/* Make a backup eventlog to work with */
|
||||||
if (!create_backup(backup))
|
if (!create_backup(backup))
|
||||||
|
@ -656,7 +656,7 @@ static void test_clear(void)
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ClearEventLogA(NULL, backup);
|
ret = ClearEventLogA(NULL, backup);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
handle = OpenBackupEventLogA(NULL, backup);
|
handle = OpenBackupEventLogA(NULL, backup);
|
||||||
todo_wine
|
todo_wine
|
||||||
|
@ -671,19 +671,19 @@ static void test_clear(void)
|
||||||
*/
|
*/
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE ||
|
ok(GetLastError() == ERROR_INVALID_HANDLE ||
|
||||||
GetLastError() == ERROR_ACCESS_DENIED, /* Vista+ */
|
GetLastError() == ERROR_ACCESS_DENIED, /* Vista+ */
|
||||||
"Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
"Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Show that ClearEventLog only works for real eventlogs. */
|
/* Show that ClearEventLog only works for real eventlogs. */
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ClearEventLogA(handle, backup2);
|
ret = ClearEventLogA(handle, backup2);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
ok(GetFileAttributesA(backup2) == INVALID_FILE_ATTRIBUTES, "Expected no backup file\n");
|
ok(GetFileAttributesA(backup2) == INVALID_FILE_ATTRIBUTES, "Expected no backup file\n");
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ClearEventLogA(handle, NULL);
|
ret = ClearEventLogA(handle, NULL);
|
||||||
ok(!ret, "Expected failure\n");
|
ok(!ret, "Expected failure\n");
|
||||||
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %d\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_HANDLE, "Expected ERROR_INVALID_HANDLE, got %ld\n", GetLastError());
|
||||||
|
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
todo_wine
|
todo_wine
|
||||||
|
@ -832,7 +832,7 @@ static void test_readwrite(void)
|
||||||
{
|
{
|
||||||
win_skip("Win7 fails when using incorrect event types\n");
|
win_skip("Win7 fails when using incorrect event types\n");
|
||||||
ret = ReportEventA(handle, 0, 0, 0, NULL, 0, 0, NULL, NULL);
|
ret = ReportEventA(handle, 0, 0, 0, NULL, 0, 0, NULL, NULL);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
@ -840,7 +840,7 @@ static void test_readwrite(void)
|
||||||
DWORD read, needed = 0;
|
DWORD read, needed = 0;
|
||||||
EVENTLOGRECORD *record;
|
EVENTLOGRECORD *record;
|
||||||
|
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
|
|
||||||
/* Needed to catch earlier Vista (with no ServicePack for example) */
|
/* Needed to catch earlier Vista (with no ServicePack for example) */
|
||||||
buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD));
|
buf = HeapAlloc(GetProcessHeap(), 0, sizeof(EVENTLOGRECORD));
|
||||||
|
@ -891,22 +891,22 @@ static void test_readwrite(void)
|
||||||
ret = ReportEventA(handle, read_write[i].evt_type, read_write[i].evt_cat,
|
ret = ReportEventA(handle, read_write[i].evt_type, read_write[i].evt_cat,
|
||||||
read_write[i].evt_id, run_sidtests ? user : NULL,
|
read_write[i].evt_id, run_sidtests ? user : NULL,
|
||||||
read_write[i].evt_numstrings, 0, read_write[i].evt_strings, NULL);
|
read_write[i].evt_numstrings, 0, read_write[i].evt_strings, NULL);
|
||||||
ok(ret, "Expected ReportEvent success : %d\n", GetLastError());
|
ok(ret, "Expected ReportEvent success : %ld\n", GetLastError());
|
||||||
|
|
||||||
count = 0xdeadbeef;
|
count = 0xdeadbeef;
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = GetNumberOfEventLogRecords(handle, &count);
|
ret = GetNumberOfEventLogRecords(handle, &count);
|
||||||
ok(ret, "Expected GetNumberOfEventLogRecords success : %d\n", GetLastError());
|
ok(ret, "Expected GetNumberOfEventLogRecords success : %ld\n", GetLastError());
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(count == (i + 1), "Expected %d records, got %d\n", i + 1, count);
|
ok(count == (i + 1), "Expected %ld records, got %ld\n", i + 1, count);
|
||||||
|
|
||||||
oldest = 0xdeadbeef;
|
oldest = 0xdeadbeef;
|
||||||
ret = GetOldestEventLogRecord(handle, &oldest);
|
ret = GetOldestEventLogRecord(handle, &oldest);
|
||||||
ok(ret, "Expected GetOldestEventLogRecord success : %d\n", GetLastError());
|
ok(ret, "Expected GetOldestEventLogRecord success : %ld\n", GetLastError());
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(oldest == 1 ||
|
ok(oldest == 1 ||
|
||||||
(oldest > 1 && oldest != 0xdeadbeef), /* Vista SP1+, W2K8 and Win7 */
|
(oldest > 1 && oldest != 0xdeadbeef), /* Vista SP1+, W2K8 and Win7 */
|
||||||
"Expected oldest to be 1 or higher, got %d\n", oldest);
|
"Expected oldest to be 1 or higher, got %ld\n", oldest);
|
||||||
if (oldest > 1 && oldest != 0xdeadbeef)
|
if (oldest > 1 && oldest != 0xdeadbeef)
|
||||||
on_vista = TRUE;
|
on_vista = TRUE;
|
||||||
|
|
||||||
|
@ -915,15 +915,15 @@ static void test_readwrite(void)
|
||||||
ret = CloseEventLog(handle);
|
ret = CloseEventLog(handle);
|
||||||
else
|
else
|
||||||
ret = DeregisterEventSource(handle);
|
ret = DeregisterEventSource(handle);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
handle = OpenEventLogA(NULL, eventlogname);
|
handle = OpenEventLogA(NULL, eventlogname);
|
||||||
count = 0xdeadbeef;
|
count = 0xdeadbeef;
|
||||||
ret = GetNumberOfEventLogRecords(handle, &count);
|
ret = GetNumberOfEventLogRecords(handle, &count);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(count == i, "Expected %d records, got %d\n", i, count);
|
ok(count == i, "Expected %ld records, got %ld\n", i, count);
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
|
||||||
if (count == 0)
|
if (count == 0)
|
||||||
|
@ -954,7 +954,7 @@ static void test_readwrite(void)
|
||||||
|
|
||||||
/* Read all events from our created eventlog, one by one */
|
/* Read all events from our created eventlog, one by one */
|
||||||
handle = OpenEventLogA(NULL, eventlogname);
|
handle = OpenEventLogA(NULL, eventlogname);
|
||||||
ok(handle != NULL, "Failed to open Event Log, got %d\n", GetLastError());
|
ok(handle != NULL, "Failed to open Event Log, got %ld\n", GetLastError());
|
||||||
i = 0;
|
i = 0;
|
||||||
for (;;)
|
for (;;)
|
||||||
{
|
{
|
||||||
|
@ -974,26 +974,26 @@ static void test_readwrite(void)
|
||||||
if (!ret && GetLastError() != ERROR_INSUFFICIENT_BUFFER)
|
if (!ret && GetLastError() != ERROR_INSUFFICIENT_BUFFER)
|
||||||
{
|
{
|
||||||
HeapFree(GetProcessHeap(), 0, buf);
|
HeapFree(GetProcessHeap(), 0, buf);
|
||||||
ok(GetLastError() == ERROR_HANDLE_EOF, "record %d, got %d\n", i, GetLastError());
|
ok(GetLastError() == ERROR_HANDLE_EOF, "record %ld, got %ld\n", i, GetLastError());
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
buf = HeapReAlloc(GetProcessHeap(), 0, buf, needed);
|
buf = HeapReAlloc(GetProcessHeap(), 0, buf, needed);
|
||||||
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ,
|
ret = ReadEventLogA(handle, EVENTLOG_SEQUENTIAL_READ | EVENTLOG_FORWARDS_READ,
|
||||||
0, buf, needed, &read, &needed);
|
0, buf, needed, &read, &needed);
|
||||||
ok(ret, "Expected success: %d\n", GetLastError());
|
ok(ret, "Expected success: %ld\n", GetLastError());
|
||||||
|
|
||||||
record = (EVENTLOGRECORD *)buf;
|
record = (EVENTLOGRECORD *)buf;
|
||||||
|
|
||||||
ok(record->Length == read,
|
ok(record->Length == read,
|
||||||
"Expected %d, got %d\n", read, record->Length);
|
"Expected %ld, got %ld\n", read, record->Length);
|
||||||
ok(record->Reserved == 0x654c664c,
|
ok(record->Reserved == 0x654c664c,
|
||||||
"Expected 0x654c664c, got %d\n", record->Reserved);
|
"Expected 0x654c664c, got %ld\n", record->Reserved);
|
||||||
ok(record->RecordNumber == i + 1 ||
|
ok(record->RecordNumber == i + 1 ||
|
||||||
(on_vista && (record->RecordNumber > i + 1)),
|
(on_vista && (record->RecordNumber > i + 1)),
|
||||||
"Expected %d or higher, got %d\n", i + 1, record->RecordNumber);
|
"Expected %ld or higher, got %ld\n", i + 1, record->RecordNumber);
|
||||||
ok(record->EventID == read_write[i].evt_id,
|
ok(record->EventID == read_write[i].evt_id,
|
||||||
"Expected %d, got %d\n", read_write[i].evt_id, record->EventID);
|
"Expected %ld, got %ld\n", read_write[i].evt_id, record->EventID);
|
||||||
ok(record->EventType == read_write[i].evt_type,
|
ok(record->EventType == read_write[i].evt_type,
|
||||||
"Expected %d, got %d\n", read_write[i].evt_type, record->EventType);
|
"Expected %d, got %d\n", read_write[i].evt_type, record->EventType);
|
||||||
ok(record->NumStrings == read_write[i].evt_numstrings,
|
ok(record->NumStrings == read_write[i].evt_numstrings,
|
||||||
|
@ -1028,15 +1028,15 @@ static void test_readwrite(void)
|
||||||
|
|
||||||
if (run_sidtests)
|
if (run_sidtests)
|
||||||
{
|
{
|
||||||
ok(record->UserSidLength == sidsize, "Expected %d, got %d\n", sidsize, record->UserSidLength);
|
ok(record->UserSidLength == sidsize, "Expected %ld, got %ld\n", sidsize, record->UserSidLength);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
ok(record->StringOffset == record->UserSidOffset, "Expected offsets to be the same\n");
|
ok(record->StringOffset == record->UserSidOffset, "Expected offsets to be the same\n");
|
||||||
ok(record->UserSidLength == 0, "Expected 0, got %d\n", record->UserSidLength);
|
ok(record->UserSidLength == 0, "Expected 0, got %ld\n", record->UserSidLength);
|
||||||
}
|
}
|
||||||
|
|
||||||
ok(record->DataLength == 0, "Expected 0, got %d\n", record->DataLength);
|
ok(record->DataLength == 0, "Expected 0, got %ld\n", record->DataLength);
|
||||||
|
|
||||||
ptr = (char *)((BYTE *)buf + record->StringOffset);
|
ptr = (char *)((BYTE *)buf + record->StringOffset);
|
||||||
for (k = 0; k < record->NumStrings; k++)
|
for (k = 0; k < record->NumStrings; k++)
|
||||||
|
@ -1055,16 +1055,16 @@ static void test_readwrite(void)
|
||||||
|
|
||||||
/* Test clearing a real eventlog */
|
/* Test clearing a real eventlog */
|
||||||
handle = OpenEventLogA(NULL, eventlogname);
|
handle = OpenEventLogA(NULL, eventlogname);
|
||||||
ok(handle != NULL, "Failed to open Event Log, got %d\n", GetLastError());
|
ok(handle != NULL, "Failed to open Event Log, got %ld\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
ret = ClearEventLogA(handle, NULL);
|
ret = ClearEventLogA(handle, NULL);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
|
|
||||||
count = 0xdeadbeef;
|
count = 0xdeadbeef;
|
||||||
ret = GetNumberOfEventLogRecords(handle, &count);
|
ret = GetNumberOfEventLogRecords(handle, &count);
|
||||||
ok(ret, "Expected success : %d\n", GetLastError());
|
ok(ret, "Expected success : %ld\n", GetLastError());
|
||||||
ok(count == 0, "Expected an empty eventlog, got %d records\n", count);
|
ok(count == 0, "Expected an empty eventlog, got %ld records\n", count);
|
||||||
|
|
||||||
CloseEventLog(handle);
|
CloseEventLog(handle);
|
||||||
|
|
||||||
|
@ -1111,7 +1111,7 @@ static void test_autocreation(void)
|
||||||
{
|
{
|
||||||
char sources_verify[sizeof(eventsources)];
|
char sources_verify[sizeof(eventsources)];
|
||||||
|
|
||||||
ok(type == REG_MULTI_SZ, "Expected a REG_MULTI_SZ, got %d\n", type);
|
ok(type == REG_MULTI_SZ, "Expected a REG_MULTI_SZ, got %ld\n", type);
|
||||||
|
|
||||||
/* Build the expected string */
|
/* Build the expected string */
|
||||||
memset(sources_verify, 0, sizeof(sources_verify));
|
memset(sources_verify, 0, sizeof(sources_verify));
|
||||||
|
@ -1124,7 +1124,7 @@ static void test_autocreation(void)
|
||||||
lstrcpyA(p, eventlogname);
|
lstrcpyA(p, eventlogname);
|
||||||
|
|
||||||
ok(!memcmp(sources, sources_verify, size),
|
ok(!memcmp(sources, sources_verify, size),
|
||||||
"Expected a correct 'Sources' value (size : %d)\n", size);
|
"Expected a correct 'Sources' value (size : %ld)\n", size);
|
||||||
}
|
}
|
||||||
|
|
||||||
RegCloseKey(eventkey);
|
RegCloseKey(eventkey);
|
||||||
|
@ -1179,13 +1179,13 @@ static void cleanup_eventlog(void)
|
||||||
RegDeleteValueA(key, "Sources");
|
RegDeleteValueA(key, "Sources");
|
||||||
RegCloseKey(key);
|
RegCloseKey(key);
|
||||||
lret = RegDeleteKeyA(HKEY_LOCAL_MACHINE, winesvc);
|
lret = RegDeleteKeyA(HKEY_LOCAL_MACHINE, winesvc);
|
||||||
ok(lret == ERROR_SUCCESS, "Could not delete the registry tree : %d\n", lret);
|
ok(lret == ERROR_SUCCESS, "Could not delete the registry tree : %ld\n", lret);
|
||||||
|
|
||||||
/* A handle to the eventlog is locked by services.exe. We can only
|
/* A handle to the eventlog is locked by services.exe. We can only
|
||||||
* delete the eventlog file after reboot.
|
* delete the eventlog file after reboot.
|
||||||
*/
|
*/
|
||||||
bret = MoveFileExA(eventlogfile, NULL, MOVEFILE_DELAY_UNTIL_REBOOT);
|
bret = MoveFileExA(eventlogfile, NULL, MOVEFILE_DELAY_UNTIL_REBOOT);
|
||||||
ok(bret, "Expected MoveFileEx to succeed: %d\n", GetLastError());
|
ok(bret, "Expected MoveFileEx to succeed: %ld\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_trace_event_params(void)
|
static void test_trace_event_params(void)
|
||||||
|
@ -1203,25 +1203,25 @@ static void test_trace_event_params(void)
|
||||||
}
|
}
|
||||||
|
|
||||||
uret = pEventRegister(NULL, NULL, NULL, ®_handle);
|
uret = pEventRegister(NULL, NULL, NULL, ®_handle);
|
||||||
todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#x\n", uret);
|
todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#lx\n", uret);
|
||||||
|
|
||||||
uret = pEventRegister(&test_guid, NULL, NULL, NULL);
|
uret = pEventRegister(&test_guid, NULL, NULL, NULL);
|
||||||
ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#x\n", uret);
|
ok(uret == ERROR_INVALID_PARAMETER, "EventRegister gave wrong error: %#lx\n", uret);
|
||||||
|
|
||||||
uret = pEventRegister(&test_guid, NULL, NULL, ®_handle);
|
uret = pEventRegister(&test_guid, NULL, NULL, ®_handle);
|
||||||
ok(uret == ERROR_SUCCESS, "EventRegister gave wrong error: %#x\n", uret);
|
ok(uret == ERROR_SUCCESS, "EventRegister gave wrong error: %#lx\n", uret);
|
||||||
|
|
||||||
uret = pEventWriteString(0, 0, 0, emptyW);
|
uret = pEventWriteString(0, 0, 0, emptyW);
|
||||||
todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventWriteString gave wrong error: %#x\n", uret);
|
todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventWriteString gave wrong error: %#lx\n", uret);
|
||||||
|
|
||||||
uret = pEventWriteString(reg_handle, 0, 0, NULL);
|
uret = pEventWriteString(reg_handle, 0, 0, NULL);
|
||||||
todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventWriteString gave wrong error: %#x\n", uret);
|
todo_wine ok(uret == ERROR_INVALID_PARAMETER, "EventWriteString gave wrong error: %#lx\n", uret);
|
||||||
|
|
||||||
uret = pEventUnregister(0);
|
uret = pEventUnregister(0);
|
||||||
todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventUnregister gave wrong error: %#x\n", uret);
|
todo_wine ok(uret == ERROR_INVALID_HANDLE, "EventUnregister gave wrong error: %#lx\n", uret);
|
||||||
|
|
||||||
uret = pEventUnregister(reg_handle);
|
uret = pEventUnregister(reg_handle);
|
||||||
ok(uret == ERROR_SUCCESS, "EventUnregister gave wrong error: %#x\n", uret);
|
ok(uret == ERROR_SUCCESS, "EventUnregister gave wrong error: %#lx\n", uret);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_start_trace(void)
|
static void test_start_trace(void)
|
||||||
|
@ -1248,37 +1248,37 @@ static void test_start_trace(void)
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_BAD_LENGTH ||
|
ok(ret == ERROR_BAD_LENGTH ||
|
||||||
ret == ERROR_INVALID_PARAMETER, /* XP and 2k3 */
|
ret == ERROR_INVALID_PARAMETER, /* XP and 2k3 */
|
||||||
"Expected ERROR_BAD_LENGTH, got %d\n", ret);
|
"Expected ERROR_BAD_LENGTH, got %ld\n", ret);
|
||||||
properties->Wnode.BufferSize = buffersize;
|
properties->Wnode.BufferSize = buffersize;
|
||||||
|
|
||||||
ret = StartTraceA(&handle, "this name is too long", properties);
|
ret = StartTraceA(&handle, "this name is too long", properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_BAD_LENGTH, "Expected ERROR_BAD_LENGTH, got %d\n", ret);
|
ok(ret == ERROR_BAD_LENGTH, "Expected ERROR_BAD_LENGTH, got %ld\n", ret);
|
||||||
|
|
||||||
ret = StartTraceA(&handle, sessionname, NULL);
|
ret = StartTraceA(&handle, sessionname, NULL);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret);
|
||||||
|
|
||||||
ret = StartTraceA(NULL, sessionname, properties);
|
ret = StartTraceA(NULL, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret);
|
||||||
|
|
||||||
properties->LogFileNameOffset = 1;
|
properties->LogFileNameOffset = 1;
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret);
|
||||||
properties->LogFileNameOffset = sizeof(EVENT_TRACE_PROPERTIES) + sizeof(sessionname);
|
properties->LogFileNameOffset = sizeof(EVENT_TRACE_PROPERTIES) + sizeof(sessionname);
|
||||||
|
|
||||||
properties->LoggerNameOffset = 1;
|
properties->LoggerNameOffset = 1;
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret);
|
||||||
properties->LoggerNameOffset = sizeof(EVENT_TRACE_PROPERTIES);
|
properties->LoggerNameOffset = sizeof(EVENT_TRACE_PROPERTIES);
|
||||||
|
|
||||||
properties->LogFileMode = EVENT_TRACE_FILE_MODE_SEQUENTIAL | EVENT_TRACE_FILE_MODE_CIRCULAR;
|
properties->LogFileMode = EVENT_TRACE_FILE_MODE_SEQUENTIAL | EVENT_TRACE_FILE_MODE_CIRCULAR;
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret);
|
||||||
properties->LogFileMode = EVENT_TRACE_FILE_MODE_NONE;
|
properties->LogFileMode = EVENT_TRACE_FILE_MODE_NONE;
|
||||||
/* XP creates a file we can't delete, so change the filepath to something else */
|
/* XP creates a file we can't delete, so change the filepath to something else */
|
||||||
strcpy((char *)properties + properties->LogFileNameOffset, filepath2);
|
strcpy((char *)properties + properties->LogFileNameOffset, filepath2);
|
||||||
|
@ -1286,13 +1286,13 @@ static void test_start_trace(void)
|
||||||
properties->Wnode.Guid = SystemTraceControlGuid;
|
properties->Wnode.Guid = SystemTraceControlGuid;
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %d\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %ld\n", ret);
|
||||||
memset(&properties->Wnode.Guid, 0, sizeof(properties->Wnode.Guid));
|
memset(&properties->Wnode.Guid, 0, sizeof(properties->Wnode.Guid));
|
||||||
|
|
||||||
properties->LogFileNameOffset = 0;
|
properties->LogFileNameOffset = 0;
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_BAD_PATHNAME, "Expected ERROR_BAD_PATHNAME, got %d\n", ret);
|
ok(ret == ERROR_BAD_PATHNAME, "Expected ERROR_BAD_PATHNAME, got %ld\n", ret);
|
||||||
properties->LogFileNameOffset = sizeof(EVENT_TRACE_PROPERTIES) + sizeof(sessionname);
|
properties->LogFileNameOffset = sizeof(EVENT_TRACE_PROPERTIES) + sizeof(sessionname);
|
||||||
|
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
|
@ -1301,13 +1301,13 @@ static void test_start_trace(void)
|
||||||
skip("need admin rights\n");
|
skip("need admin rights\n");
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
ok(ret == ERROR_SUCCESS, "Expected success, got %d\n", ret);
|
ok(ret == ERROR_SUCCESS, "Expected success, got %ld\n", ret);
|
||||||
|
|
||||||
ret = StartTraceA(&handle, sessionname, properties);
|
ret = StartTraceA(&handle, sessionname, properties);
|
||||||
todo_wine
|
todo_wine
|
||||||
ok(ret == ERROR_ALREADY_EXISTS ||
|
ok(ret == ERROR_ALREADY_EXISTS ||
|
||||||
ret == ERROR_SHARING_VIOLATION, /* 2k3 */
|
ret == ERROR_SHARING_VIOLATION, /* 2k3 */
|
||||||
"Expected ERROR_ALREADY_EXISTS, got %d\n", ret);
|
"Expected ERROR_ALREADY_EXISTS, got %ld\n", ret);
|
||||||
|
|
||||||
/* clean up */
|
/* clean up */
|
||||||
ControlTraceA(handle, sessionname, properties, EVENT_TRACE_CONTROL_STOP);
|
ControlTraceA(handle, sessionname, properties, EVENT_TRACE_CONTROL_STOP);
|
||||||
|
|
|
@ -52,13 +52,13 @@ static void test_lsa(void)
|
||||||
|
|
||||||
status = LsaOpenPolicy( NULL, &object_attributes, POLICY_ALL_ACCESS, &handle);
|
status = LsaOpenPolicy( NULL, &object_attributes, POLICY_ALL_ACCESS, &handle);
|
||||||
ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED,
|
ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED,
|
||||||
"LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status);
|
"LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08lx\n", status);
|
||||||
|
|
||||||
/* try a more restricted access mask if necessary */
|
/* try a more restricted access mask if necessary */
|
||||||
if (status == STATUS_ACCESS_DENIED) {
|
if (status == STATUS_ACCESS_DENIED) {
|
||||||
trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES\n");
|
trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES\n");
|
||||||
status = LsaOpenPolicy( NULL, &object_attributes, POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES, &handle);
|
status = LsaOpenPolicy( NULL, &object_attributes, POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES, &handle);
|
||||||
ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES) returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES) returned 0x%08lx\n", status);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (status == STATUS_SUCCESS) {
|
if (status == STATUS_SUCCESS) {
|
||||||
|
@ -73,12 +73,12 @@ static void test_lsa(void)
|
||||||
if (status == STATUS_ACCESS_DENIED)
|
if (status == STATUS_ACCESS_DENIED)
|
||||||
skip("Not enough rights to retrieve PolicyAuditEventsInformation\n");
|
skip("Not enough rights to retrieve PolicyAuditEventsInformation\n");
|
||||||
else
|
else
|
||||||
ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAuditEventsInformation) failed, returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAuditEventsInformation) failed, returned 0x%08lx\n", status);
|
||||||
if (status == STATUS_SUCCESS)
|
if (status == STATUS_SUCCESS)
|
||||||
LsaFreeMemory(audit_events_info);
|
LsaFreeMemory(audit_events_info);
|
||||||
|
|
||||||
status = LsaQueryInformationPolicy(handle, PolicyPrimaryDomainInformation, (void **)&primary_domain_info);
|
status = LsaQueryInformationPolicy(handle, PolicyPrimaryDomainInformation, (void **)&primary_domain_info);
|
||||||
ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyPrimaryDomainInformation) failed, returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyPrimaryDomainInformation) failed, returned 0x%08lx\n", status);
|
||||||
if (status == STATUS_SUCCESS) {
|
if (status == STATUS_SUCCESS) {
|
||||||
if (primary_domain_info->Sid) {
|
if (primary_domain_info->Sid) {
|
||||||
LPSTR strsid;
|
LPSTR strsid;
|
||||||
|
@ -105,14 +105,14 @@ static void test_lsa(void)
|
||||||
}
|
}
|
||||||
|
|
||||||
status = LsaQueryInformationPolicy(handle, PolicyAccountDomainInformation, (void **)&account_domain_info);
|
status = LsaQueryInformationPolicy(handle, PolicyAccountDomainInformation, (void **)&account_domain_info);
|
||||||
ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAccountDomainInformation) failed, returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAccountDomainInformation) failed, returned 0x%08lx\n", status);
|
||||||
if (status == STATUS_SUCCESS)
|
if (status == STATUS_SUCCESS)
|
||||||
LsaFreeMemory(account_domain_info);
|
LsaFreeMemory(account_domain_info);
|
||||||
|
|
||||||
/* This isn't supported in NT4 */
|
/* This isn't supported in NT4 */
|
||||||
status = LsaQueryInformationPolicy(handle, PolicyDnsDomainInformation, (void **)&dns_domain_info);
|
status = LsaQueryInformationPolicy(handle, PolicyDnsDomainInformation, (void **)&dns_domain_info);
|
||||||
ok(status == STATUS_SUCCESS || status == STATUS_INVALID_PARAMETER,
|
ok(status == STATUS_SUCCESS || status == STATUS_INVALID_PARAMETER,
|
||||||
"LsaQueryInformationPolicy(PolicyDnsDomainInformation) failed, returned 0x%08x\n", status);
|
"LsaQueryInformationPolicy(PolicyDnsDomainInformation) failed, returned 0x%08lx\n", status);
|
||||||
if (status == STATUS_SUCCESS) {
|
if (status == STATUS_SUCCESS) {
|
||||||
if (dns_domain_info->Sid || !IsEqualGUID(&dns_domain_info->DomainGuid, &GUID_NULL)) {
|
if (dns_domain_info->Sid || !IsEqualGUID(&dns_domain_info->DomainGuid, &GUID_NULL)) {
|
||||||
LPSTR strsid = NULL;
|
LPSTR strsid = NULL;
|
||||||
|
@ -159,15 +159,15 @@ static void test_lsa(void)
|
||||||
|
|
||||||
/* We need a valid SID to pass to LsaEnumerateAccountRights */
|
/* We need a valid SID to pass to LsaEnumerateAccountRights */
|
||||||
ret = OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &token );
|
ret = OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &token );
|
||||||
ok(ret, "Unable to obtain process token, error %u\n", GetLastError( ));
|
ok(ret, "Unable to obtain process token, error %lu\n", GetLastError( ));
|
||||||
if (ret) {
|
if (ret) {
|
||||||
char buffer[64];
|
char buffer[64];
|
||||||
DWORD len;
|
DWORD len;
|
||||||
TOKEN_USER *token_user = (TOKEN_USER *) buffer;
|
TOKEN_USER *token_user = (TOKEN_USER *) buffer;
|
||||||
ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, sizeof(buffer), &len );
|
ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, sizeof(buffer), &len );
|
||||||
ok(ret || GetLastError( ) == ERROR_INSUFFICIENT_BUFFER, "Unable to obtain token information, error %u\n", GetLastError( ));
|
ok(ret || GetLastError( ) == ERROR_INSUFFICIENT_BUFFER, "Unable to obtain token information, error %lu\n", GetLastError( ));
|
||||||
if (! ret && GetLastError( ) == ERROR_INSUFFICIENT_BUFFER) {
|
if (! ret && GetLastError( ) == ERROR_INSUFFICIENT_BUFFER) {
|
||||||
trace("Resizing buffer to %u.\n", len);
|
trace("Resizing buffer to %lu.\n", len);
|
||||||
token_user = LocalAlloc( 0, len );
|
token_user = LocalAlloc( 0, len );
|
||||||
if (token_user != NULL)
|
if (token_user != NULL)
|
||||||
ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, len, &len );
|
ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, len, &len );
|
||||||
|
@ -179,7 +179,7 @@ static void test_lsa(void)
|
||||||
rights = (PLSA_UNICODE_STRING) 0xdeadbeaf;
|
rights = (PLSA_UNICODE_STRING) 0xdeadbeaf;
|
||||||
rights_count = 0xcafecafe;
|
rights_count = 0xcafecafe;
|
||||||
status = LsaEnumerateAccountRights(handle, token_user->User.Sid, &rights, &rights_count);
|
status = LsaEnumerateAccountRights(handle, token_user->User.Sid, &rights, &rights_count);
|
||||||
ok(status == STATUS_SUCCESS || status == STATUS_OBJECT_NAME_NOT_FOUND, "Unexpected status 0x%x\n", status);
|
ok(status == STATUS_SUCCESS || status == STATUS_OBJECT_NAME_NOT_FOUND, "Unexpected status 0x%lx\n", status);
|
||||||
if (status == STATUS_SUCCESS)
|
if (status == STATUS_SUCCESS)
|
||||||
LsaFreeMemory( rights );
|
LsaFreeMemory( rights );
|
||||||
else
|
else
|
||||||
|
@ -191,7 +191,7 @@ static void test_lsa(void)
|
||||||
}
|
}
|
||||||
|
|
||||||
status = LsaClose(handle);
|
status = LsaClose(handle);
|
||||||
ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08lx\n", status);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -208,7 +208,7 @@ static void get_sid_info(PSID psid, LPSTR *user, LPSTR *dom)
|
||||||
user_size = dom_size = 257;
|
user_size = dom_size = 257;
|
||||||
account[0] = domain[0] = 0;
|
account[0] = domain[0] = 0;
|
||||||
ret = LookupAccountSidA(NULL, psid, account, &user_size, domain, &dom_size, &use);
|
ret = LookupAccountSidA(NULL, psid, account, &user_size, domain, &dom_size, &use);
|
||||||
ok(ret, "LookupAccountSidA failed %u\n", GetLastError());
|
ok(ret, "LookupAccountSidA failed %lu\n", GetLastError());
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_LsaLookupNames2(void)
|
static void test_LsaLookupNames2(void)
|
||||||
|
@ -236,14 +236,14 @@ static void test_LsaLookupNames2(void)
|
||||||
|
|
||||||
status = LsaOpenPolicy(NULL, &attrs, POLICY_ALL_ACCESS, &handle);
|
status = LsaOpenPolicy(NULL, &attrs, POLICY_ALL_ACCESS, &handle);
|
||||||
ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED,
|
ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED,
|
||||||
"LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status);
|
"LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08lx\n", status);
|
||||||
|
|
||||||
/* try a more restricted access mask if necessary */
|
/* try a more restricted access mask if necessary */
|
||||||
if (status == STATUS_ACCESS_DENIED)
|
if (status == STATUS_ACCESS_DENIED)
|
||||||
{
|
{
|
||||||
trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION\n");
|
trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION\n");
|
||||||
status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &handle);
|
status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &handle);
|
||||||
ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08lx\n", status);
|
||||||
}
|
}
|
||||||
if (status != STATUS_SUCCESS)
|
if (status != STATUS_SUCCESS)
|
||||||
{
|
{
|
||||||
|
@ -267,10 +267,10 @@ static void test_LsaLookupNames2(void)
|
||||||
sids = NULL;
|
sids = NULL;
|
||||||
domains = NULL;
|
domains = NULL;
|
||||||
status = LsaLookupNames2(handle, 0, 1, &name[0], &domains, &sids);
|
status = LsaLookupNames2(handle, 0, 1, &name[0], &domains, &sids);
|
||||||
ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %x)\n", status);
|
ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %lx)\n", status);
|
||||||
ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
|
ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
|
||||||
ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags);
|
ok(sids[0].Flags == 0, "expected 0, got 0x%08lx\n", sids[0].Flags);
|
||||||
ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries);
|
ok(domains->Entries == 1, "expected 1, got %lu\n", domains->Entries);
|
||||||
get_sid_info(sids[0].Sid, &account, &sid_dom);
|
get_sid_info(sids[0].Sid, &account, &sid_dom);
|
||||||
ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account);
|
ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account);
|
||||||
ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom);
|
ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom);
|
||||||
|
@ -281,10 +281,10 @@ static void test_LsaLookupNames2(void)
|
||||||
sids = NULL;
|
sids = NULL;
|
||||||
domains = NULL;
|
domains = NULL;
|
||||||
status = LsaLookupNames2(handle, 0, 1, &name[1], &domains, &sids);
|
status = LsaLookupNames2(handle, 0, 1, &name[1], &domains, &sids);
|
||||||
ok(status == STATUS_NONE_MAPPED, "expected STATUS_NONE_MAPPED, got %x)\n", status);
|
ok(status == STATUS_NONE_MAPPED, "expected STATUS_NONE_MAPPED, got %lx)\n", status);
|
||||||
ok(sids[0].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[0].Use);
|
ok(sids[0].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[0].Use);
|
||||||
ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags);
|
ok(sids[0].Flags == 0, "expected 0, got 0x%08lx\n", sids[0].Flags);
|
||||||
ok(domains->Entries == 0, "expected 0, got %u\n", domains->Entries);
|
ok(domains->Entries == 0, "expected 0, got %lu\n", domains->Entries);
|
||||||
LsaFreeMemory(sids);
|
LsaFreeMemory(sids);
|
||||||
LsaFreeMemory(domains);
|
LsaFreeMemory(domains);
|
||||||
|
|
||||||
|
@ -292,10 +292,10 @@ static void test_LsaLookupNames2(void)
|
||||||
sids = NULL;
|
sids = NULL;
|
||||||
domains = NULL;
|
domains = NULL;
|
||||||
status = LsaLookupNames2(handle, 0, 1, &name[2], &domains, &sids);
|
status = LsaLookupNames2(handle, 0, 1, &name[2], &domains, &sids);
|
||||||
ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %x)\n", status);
|
ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %lx)\n", status);
|
||||||
ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
|
ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
|
||||||
ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags);
|
ok(sids[0].Flags == 0, "expected 0, got 0x%08lx\n", sids[0].Flags);
|
||||||
ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries);
|
ok(domains->Entries == 1, "expected 1, got %lu\n", domains->Entries);
|
||||||
get_sid_info(sids[0].Sid, &account, &sid_dom);
|
get_sid_info(sids[0].Sid, &account, &sid_dom);
|
||||||
ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account);
|
ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account);
|
||||||
ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom);
|
ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom);
|
||||||
|
@ -306,12 +306,12 @@ static void test_LsaLookupNames2(void)
|
||||||
sids = NULL;
|
sids = NULL;
|
||||||
domains = NULL;
|
domains = NULL;
|
||||||
status = LsaLookupNames2(handle, 0, 3, name, &domains, &sids);
|
status = LsaLookupNames2(handle, 0, 3, name, &domains, &sids);
|
||||||
ok(status == STATUS_SOME_NOT_MAPPED, "expected STATUS_SOME_NOT_MAPPED, got %x)\n", status);
|
ok(status == STATUS_SOME_NOT_MAPPED, "expected STATUS_SOME_NOT_MAPPED, got %lx)\n", status);
|
||||||
ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
|
ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
|
||||||
ok(sids[1].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[1].Use);
|
ok(sids[1].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[1].Use);
|
||||||
ok(sids[2].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[2].Use);
|
ok(sids[2].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[2].Use);
|
||||||
ok(sids[0].DomainIndex == 0, "expected 0, got %u\n", sids[0].DomainIndex);
|
ok(sids[0].DomainIndex == 0, "expected 0, got %lu\n", sids[0].DomainIndex);
|
||||||
ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries);
|
ok(domains->Entries == 1, "expected 1, got %lu\n", domains->Entries);
|
||||||
LsaFreeMemory(sids);
|
LsaFreeMemory(sids);
|
||||||
LsaFreeMemory(domains);
|
LsaFreeMemory(domains);
|
||||||
|
|
||||||
|
@ -320,15 +320,15 @@ static void test_LsaLookupNames2(void)
|
||||||
HeapFree(GetProcessHeap(), 0, name[2].Buffer);
|
HeapFree(GetProcessHeap(), 0, name[2].Buffer);
|
||||||
|
|
||||||
status = LsaClose(handle);
|
status = LsaClose(handle);
|
||||||
ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08lx\n", status);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void check_unicode_string_(int line, const LSA_UNICODE_STRING *string, const WCHAR *expect)
|
static void check_unicode_string_(int line, const LSA_UNICODE_STRING *string, const WCHAR *expect)
|
||||||
{
|
{
|
||||||
ok_(__FILE__, line)(string->Length == wcslen(string->Buffer) * sizeof(WCHAR),
|
ok_(__FILE__, line)(string->Length == wcslen(string->Buffer) * sizeof(WCHAR),
|
||||||
"expected %u, got %u\n", wcslen(string->Buffer) * sizeof(WCHAR), string->Length);
|
"expected %Iu, got %u\n", wcslen(string->Buffer) * sizeof(WCHAR), string->Length);
|
||||||
ok_(__FILE__, line)(string->MaximumLength == string->Length + sizeof(WCHAR),
|
ok_(__FILE__, line)(string->MaximumLength == string->Length + sizeof(WCHAR),
|
||||||
"expected %u, got %u\n", string->Length + sizeof(WCHAR), string->MaximumLength);
|
"expected %Iu, got %u\n", string->Length + sizeof(WCHAR), string->MaximumLength);
|
||||||
ok_(__FILE__, line)(!wcsicmp(string->Buffer, expect), "expected %s, got %s\n",
|
ok_(__FILE__, line)(!wcsicmp(string->Buffer, expect), "expected %s, got %s\n",
|
||||||
debugstr_w(expect), debugstr_w(string->Buffer));
|
debugstr_w(expect), debugstr_w(string->Buffer));
|
||||||
}
|
}
|
||||||
|
@ -351,30 +351,30 @@ static void test_LsaLookupSids(void)
|
||||||
PSID sid;
|
PSID sid;
|
||||||
|
|
||||||
status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy);
|
status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy);
|
||||||
ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status);
|
||||||
|
|
||||||
ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token);
|
ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token);
|
||||||
ok(ret, "OpenProcessToken() failed, error %u\n", GetLastError());
|
ok(ret, "OpenProcessToken() failed, error %lu\n", GetLastError());
|
||||||
|
|
||||||
ret = GetTokenInformation(token, TokenUser, user, sizeof(user_buffer), &size);
|
ret = GetTokenInformation(token, TokenUser, user, sizeof(user_buffer), &size);
|
||||||
ok(ret, "GetTokenInformation() failed, error %u\n", GetLastError());
|
ok(ret, "GetTokenInformation() failed, error %lu\n", GetLastError());
|
||||||
|
|
||||||
size = ARRAY_SIZE(computer_name);
|
size = ARRAY_SIZE(computer_name);
|
||||||
ret = GetComputerNameW(computer_name, &size);
|
ret = GetComputerNameW(computer_name, &size);
|
||||||
ok(ret, "GetComputerName() failed, error %u\n", GetLastError());
|
ok(ret, "GetComputerName() failed, error %lu\n", GetLastError());
|
||||||
|
|
||||||
size = ARRAY_SIZE(user_name);
|
size = ARRAY_SIZE(user_name);
|
||||||
ret = GetUserNameW(user_name, &size);
|
ret = GetUserNameW(user_name, &size);
|
||||||
ok(ret, "GetUserName() failed, error %u\n", GetLastError());
|
ok(ret, "GetUserName() failed, error %lu\n", GetLastError());
|
||||||
|
|
||||||
status = LsaLookupSids(policy, 1, &user->User.Sid, &list, &names);
|
status = LsaLookupSids(policy, 1, &user->User.Sid, &list, &names);
|
||||||
ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status);
|
||||||
|
|
||||||
ok(list->Entries == 1, "got %d\n", list->Entries);
|
ok(list->Entries == 1, "got %ld\n", list->Entries);
|
||||||
check_unicode_string(&list->Domains[0].Name, computer_name);
|
check_unicode_string(&list->Domains[0].Name, computer_name);
|
||||||
|
|
||||||
ok(names[0].Use == SidTypeUser, "got type %u\n", names[0].Use);
|
ok(names[0].Use == SidTypeUser, "got type %u\n", names[0].Use);
|
||||||
ok(!names[0].DomainIndex, "got index %u\n", names[0].DomainIndex);
|
ok(!names[0].DomainIndex, "got index %lu\n", names[0].DomainIndex);
|
||||||
check_unicode_string(&names[0].Name, user_name);
|
check_unicode_string(&names[0].Name, user_name);
|
||||||
|
|
||||||
LsaFreeMemory(names);
|
LsaFreeMemory(names);
|
||||||
|
@ -382,16 +382,16 @@ static void test_LsaLookupSids(void)
|
||||||
CloseHandle(token);
|
CloseHandle(token);
|
||||||
|
|
||||||
ret = ConvertStringSidToSidA("S-1-1-0", &sid);
|
ret = ConvertStringSidToSidA("S-1-1-0", &sid);
|
||||||
ok(ret, "ConvertStringSidToSidA() failed, error %u\n", GetLastError());
|
ok(ret, "ConvertStringSidToSidA() failed, error %lu\n", GetLastError());
|
||||||
|
|
||||||
status = LsaLookupSids(policy, 1, &sid, &list, &names);
|
status = LsaLookupSids(policy, 1, &sid, &list, &names);
|
||||||
ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status);
|
||||||
|
|
||||||
ok(list->Entries == 1, "got %d\n", list->Entries);
|
ok(list->Entries == 1, "got %ld\n", list->Entries);
|
||||||
check_unicode_string(&list->Domains[0].Name, L"");
|
check_unicode_string(&list->Domains[0].Name, L"");
|
||||||
|
|
||||||
ok(names[0].Use == SidTypeWellKnownGroup, "got type %u\n", names[0].Use);
|
ok(names[0].Use == SidTypeWellKnownGroup, "got type %u\n", names[0].Use);
|
||||||
ok(!names[0].DomainIndex, "got index %u\n", names[0].DomainIndex);
|
ok(!names[0].DomainIndex, "got index %lu\n", names[0].DomainIndex);
|
||||||
|
|
||||||
/* The group name gets translated... but not in all locales */
|
/* The group name gets translated... but not in all locales */
|
||||||
size = ARRAY_SIZE(langW);
|
size = ARRAY_SIZE(langW);
|
||||||
|
@ -413,15 +413,15 @@ static void test_LsaLookupSids(void)
|
||||||
FreeSid(sid);
|
FreeSid(sid);
|
||||||
|
|
||||||
ret = ConvertStringSidToSidA("S-1-1234-5678-1234-5678", &sid);
|
ret = ConvertStringSidToSidA("S-1-1234-5678-1234-5678", &sid);
|
||||||
ok(ret, "ConvertStringSidToSidA() failed, error %u\n", GetLastError());
|
ok(ret, "ConvertStringSidToSidA() failed, error %lu\n", GetLastError());
|
||||||
|
|
||||||
status = LsaLookupSids(policy, 1, &sid, &list, &names);
|
status = LsaLookupSids(policy, 1, &sid, &list, &names);
|
||||||
ok(status == STATUS_NONE_MAPPED, "got 0x%08x\n", status);
|
ok(status == STATUS_NONE_MAPPED, "got 0x%08lx\n", status);
|
||||||
|
|
||||||
ok(!list->Entries, "got %d\n", list->Entries);
|
ok(!list->Entries, "got %ld\n", list->Entries);
|
||||||
|
|
||||||
ok(names[0].Use == SidTypeUnknown, "got type %u\n", names[0].Use);
|
ok(names[0].Use == SidTypeUnknown, "got type %u\n", names[0].Use);
|
||||||
ok(names[0].DomainIndex == -1, "got index %u\n", names[0].DomainIndex);
|
ok(names[0].DomainIndex == -1, "got index %lu\n", names[0].DomainIndex);
|
||||||
check_unicode_string(&names[0].Name, L"S-1-1234-5678-1234-5678");
|
check_unicode_string(&names[0].Name, L"S-1-1234-5678-1234-5678");
|
||||||
|
|
||||||
LsaFreeMemory(names);
|
LsaFreeMemory(names);
|
||||||
|
@ -429,7 +429,7 @@ static void test_LsaLookupSids(void)
|
||||||
FreeSid(sid);
|
FreeSid(sid);
|
||||||
|
|
||||||
status = LsaClose(policy);
|
status = LsaClose(policy);
|
||||||
ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
|
ok(status == STATUS_SUCCESS, "got 0x%08lx\n", status);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_LsaLookupPrivilegeName(void)
|
static void test_LsaLookupPrivilegeName(void)
|
||||||
|
@ -444,24 +444,24 @@ static void test_LsaLookupPrivilegeName(void)
|
||||||
attrs.Length = sizeof(attrs);
|
attrs.Length = sizeof(attrs);
|
||||||
|
|
||||||
status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy);
|
status = LsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy);
|
||||||
ok(status == STATUS_SUCCESS, "Failed to open policy, %#x.\n", status);
|
ok(status == STATUS_SUCCESS, "Failed to open policy, %#lx.\n", status);
|
||||||
|
|
||||||
name = (void *)0xdeadbeef;
|
name = (void *)0xdeadbeef;
|
||||||
status = LsaLookupPrivilegeName(policy, NULL, &name);
|
status = LsaLookupPrivilegeName(policy, NULL, &name);
|
||||||
ok(status != STATUS_SUCCESS, "Unexpected status %#x.\n", status);
|
ok(status != STATUS_SUCCESS, "Unexpected status %#lx.\n", status);
|
||||||
ok(name == (void *)0xdeadbeef, "Unexpected name pointer.\n");
|
ok(name == (void *)0xdeadbeef, "Unexpected name pointer.\n");
|
||||||
|
|
||||||
name = (void *)0xdeadbeef;
|
name = (void *)0xdeadbeef;
|
||||||
luid.HighPart = 1;
|
luid.HighPart = 1;
|
||||||
luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE;
|
luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE;
|
||||||
status = LsaLookupPrivilegeName(policy, &luid, &name);
|
status = LsaLookupPrivilegeName(policy, &luid, &name);
|
||||||
ok(status == STATUS_NO_SUCH_PRIVILEGE, "Unexpected status %#x.\n", status);
|
ok(status == STATUS_NO_SUCH_PRIVILEGE, "Unexpected status %#lx.\n", status);
|
||||||
ok(name == NULL, "Unexpected name pointer.\n");
|
ok(name == NULL, "Unexpected name pointer.\n");
|
||||||
|
|
||||||
luid.HighPart = 0;
|
luid.HighPart = 0;
|
||||||
luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE;
|
luid.LowPart = SE_CREATE_TOKEN_PRIVILEGE;
|
||||||
status = LsaLookupPrivilegeName(policy, &luid, &name);
|
status = LsaLookupPrivilegeName(policy, &luid, &name);
|
||||||
ok(status == 0, "got %#x.\n", status);
|
ok(status == 0, "got %#lx.\n", status);
|
||||||
LsaFreeMemory(name);
|
LsaFreeMemory(name);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -481,11 +481,11 @@ static void test_LsaGetUserName(void)
|
||||||
|
|
||||||
size = ARRAY_SIZE(user);
|
size = ARRAY_SIZE(user);
|
||||||
ret = GetUserNameW(user, &size);
|
ret = GetUserNameW(user, &size);
|
||||||
ok(ret, "GetUserName error %u\n", GetLastError());
|
ok(ret, "GetUserName error %lu\n", GetLastError());
|
||||||
|
|
||||||
size = ARRAY_SIZE(computer);
|
size = ARRAY_SIZE(computer);
|
||||||
ret = GetComputerNameW(computer, &size);
|
ret = GetComputerNameW(computer, &size);
|
||||||
ok(ret, "GetComputerName error %u\n", GetLastError());
|
ok(ret, "GetComputerName error %lu\n", GetLastError());
|
||||||
|
|
||||||
if (0) /* crashes under Windows */
|
if (0) /* crashes under Windows */
|
||||||
status = pLsaGetUserName(NULL, NULL);
|
status = pLsaGetUserName(NULL, NULL);
|
||||||
|
@ -494,12 +494,12 @@ static void test_LsaGetUserName(void)
|
||||||
status = pLsaGetUserName(NULL, &lsa_domain);
|
status = pLsaGetUserName(NULL, &lsa_domain);
|
||||||
|
|
||||||
status = pLsaGetUserName(&lsa_user, NULL);
|
status = pLsaGetUserName(&lsa_user, NULL);
|
||||||
ok(!status, "got %#x\n", status);
|
ok(!status, "got %#lx\n", status);
|
||||||
check_unicode_string(lsa_user, user);
|
check_unicode_string(lsa_user, user);
|
||||||
LsaFreeMemory(lsa_user);
|
LsaFreeMemory(lsa_user);
|
||||||
|
|
||||||
status = pLsaGetUserName(&lsa_user, &lsa_domain);
|
status = pLsaGetUserName(&lsa_user, &lsa_domain);
|
||||||
ok(!status, "got %#x\n", status);
|
ok(!status, "got %#lx\n", status);
|
||||||
ok(!lstrcmpW(user, lsa_user->Buffer), "%s != %s\n", wine_dbgstr_w(user), wine_dbgstr_wn(lsa_user->Buffer, lsa_user->Length/sizeof(WCHAR)));
|
ok(!lstrcmpW(user, lsa_user->Buffer), "%s != %s\n", wine_dbgstr_w(user), wine_dbgstr_wn(lsa_user->Buffer, lsa_user->Length/sizeof(WCHAR)));
|
||||||
check_unicode_string(lsa_user, user);
|
check_unicode_string(lsa_user, user);
|
||||||
check_unicode_string(lsa_domain, computer);
|
check_unicode_string(lsa_domain, computer);
|
||||||
|
|
|
@ -64,26 +64,26 @@ void test_provider_init(void)
|
||||||
|
|
||||||
prov = (HANDLE)0xdeadbeef;
|
prov = (HANDLE)0xdeadbeef;
|
||||||
ret = PerfStartProvider(NULL, test_provider_callback, &prov);
|
ret = PerfStartProvider(NULL, test_provider_callback, &prov);
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret);
|
||||||
ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov);
|
ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov);
|
||||||
|
|
||||||
prov = (HANDLE)0xdeadbeef;
|
prov = (HANDLE)0xdeadbeef;
|
||||||
ret = PerfStartProvider(&test_guid, test_provider_callback, NULL);
|
ret = PerfStartProvider(&test_guid, test_provider_callback, NULL);
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret);
|
||||||
ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov);
|
ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov);
|
||||||
|
|
||||||
prov = (HANDLE)0xdeadbeef;
|
prov = (HANDLE)0xdeadbeef;
|
||||||
ret = PerfStartProvider(&test_guid, test_provider_callback, &prov);
|
ret = PerfStartProvider(&test_guid, test_provider_callback, &prov);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
ok(prov != (HANDLE)0xdeadbeef, "Provider handle is not set.\n");
|
ok(prov != (HANDLE)0xdeadbeef, "Provider handle is not set.\n");
|
||||||
|
|
||||||
prov2 = prov;
|
prov2 = prov;
|
||||||
ret = PerfStartProvider(&test_guid, test_provider_callback, &prov2);
|
ret = PerfStartProvider(&test_guid, test_provider_callback, &prov2);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
ok(prov2 != prov, "Got the same provider handle.\n");
|
ok(prov2 != prov, "Got the same provider handle.\n");
|
||||||
|
|
||||||
ret = PerfStopProvider(prov2);
|
ret = PerfStopProvider(prov2);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
if (0)
|
if (0)
|
||||||
{
|
{
|
||||||
|
@ -93,7 +93,7 @@ void test_provider_init(void)
|
||||||
|
|
||||||
/* Provider handle is a pointer and not a kernel object handle. */
|
/* Provider handle is a pointer and not a kernel object handle. */
|
||||||
bret = DuplicateHandle(GetCurrentProcess(), prov, GetCurrentProcess(), &prov2, 0, FALSE, DUPLICATE_SAME_ACCESS);
|
bret = DuplicateHandle(GetCurrentProcess(), prov, GetCurrentProcess(), &prov2, 0, FALSE, DUPLICATE_SAME_ACCESS);
|
||||||
ok(!bret && GetLastError() == ERROR_INVALID_HANDLE, "Got unexpected bret %d, err %u.\n", bret, GetLastError());
|
ok(!bret && GetLastError() == ERROR_INVALID_HANDLE, "Got unexpected bret %d, err %lu.\n", bret, GetLastError());
|
||||||
bret = IsBadWritePtr(prov, 8);
|
bret = IsBadWritePtr(prov, 8);
|
||||||
ok(!bret, "Handle does not point to the data.\n");
|
ok(!bret, "Handle does not point to the data.\n");
|
||||||
|
|
||||||
|
@ -102,14 +102,14 @@ void test_provider_init(void)
|
||||||
pc_template.counterset.NumCounters = 0;
|
pc_template.counterset.NumCounters = 0;
|
||||||
pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE;
|
pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE;
|
||||||
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template.counterset));
|
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template.counterset));
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
pc_template.counterset.CounterSetGuid = test_set_guid;
|
pc_template.counterset.CounterSetGuid = test_set_guid;
|
||||||
pc_template.counterset.ProviderGuid = test_guid;
|
pc_template.counterset.ProviderGuid = test_guid;
|
||||||
pc_template.counterset.NumCounters = 2;
|
pc_template.counterset.NumCounters = 2;
|
||||||
pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE;
|
pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE;
|
||||||
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template));
|
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template));
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
pc_template.counterset.CounterSetGuid = test_set_guid2;
|
pc_template.counterset.CounterSetGuid = test_set_guid2;
|
||||||
/* Looks like ProviderGuid doesn't need to match provider. */
|
/* Looks like ProviderGuid doesn't need to match provider. */
|
||||||
|
@ -117,50 +117,50 @@ void test_provider_init(void)
|
||||||
pc_template.counterset.NumCounters = 1;
|
pc_template.counterset.NumCounters = 1;
|
||||||
pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE;
|
pc_template.counterset.InstanceType = PERF_COUNTERSET_SINGLE_INSTANCE;
|
||||||
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template));
|
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template));
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template));
|
ret = PerfSetCounterSetInfo(prov, &pc_template.counterset, sizeof(pc_template));
|
||||||
ok(ret == ERROR_ALREADY_EXISTS, "Got unexpected ret %u.\n", ret);
|
ok(ret == ERROR_ALREADY_EXISTS, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
instance = PerfCreateInstance(prov, NULL, L"1", 1);
|
instance = PerfCreateInstance(prov, NULL, L"1", 1);
|
||||||
ok(!instance, "Got unexpected instance %p.\n", instance);
|
ok(!instance, "Got unexpected instance %p.\n", instance);
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %u.\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %lu.\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
instance = PerfCreateInstance(prov, &test_guid, L"1", 1);
|
instance = PerfCreateInstance(prov, &test_guid, L"1", 1);
|
||||||
ok(!instance, "Got unexpected instance %p.\n", instance);
|
ok(!instance, "Got unexpected instance %p.\n", instance);
|
||||||
ok(GetLastError() == ERROR_NOT_FOUND, "Got unexpected error %u.\n", GetLastError());
|
ok(GetLastError() == ERROR_NOT_FOUND, "Got unexpected error %lu.\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
instance = PerfCreateInstance(prov, &test_guid, NULL, 1);
|
instance = PerfCreateInstance(prov, &test_guid, NULL, 1);
|
||||||
ok(!instance, "Got unexpected instance %p.\n", instance);
|
ok(!instance, "Got unexpected instance %p.\n", instance);
|
||||||
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %u.\n", GetLastError());
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Got unexpected error %lu.\n", GetLastError());
|
||||||
|
|
||||||
SetLastError(0xdeadbeef);
|
SetLastError(0xdeadbeef);
|
||||||
instance = PerfCreateInstance(prov, &test_set_guid, L"11", 1);
|
instance = PerfCreateInstance(prov, &test_set_guid, L"11", 1);
|
||||||
ok(!!instance, "Got NULL instance.\n");
|
ok(!!instance, "Got NULL instance.\n");
|
||||||
ok(GetLastError() == 0xdeadbeef, "Got unexpected error %u.\n", GetLastError());
|
ok(GetLastError() == 0xdeadbeef, "Got unexpected error %lu.\n", GetLastError());
|
||||||
ok(instance->InstanceId == 1, "Got unexpected InstanceId %u.\n", instance->InstanceId);
|
ok(instance->InstanceId == 1, "Got unexpected InstanceId %lu.\n", instance->InstanceId);
|
||||||
ok(instance->InstanceNameSize == 6, "Got unexpected InstanceNameSize %u.\n", instance->InstanceNameSize);
|
ok(instance->InstanceNameSize == 6, "Got unexpected InstanceNameSize %lu.\n", instance->InstanceNameSize);
|
||||||
ok(IsEqualGUID(&instance->CounterSetGuid, &test_set_guid), "Got unexpected guid %s.\n",
|
ok(IsEqualGUID(&instance->CounterSetGuid, &test_set_guid), "Got unexpected guid %s.\n",
|
||||||
debugstr_guid(&instance->CounterSetGuid));
|
debugstr_guid(&instance->CounterSetGuid));
|
||||||
|
|
||||||
ok(instance->InstanceNameOffset == sizeof(*instance) + sizeof(UINT64) * 2,
|
ok(instance->InstanceNameOffset == sizeof(*instance) + sizeof(UINT64) * 2,
|
||||||
"Got unexpected InstanceNameOffset %u.\n", instance->InstanceNameOffset);
|
"Got unexpected InstanceNameOffset %lu.\n", instance->InstanceNameOffset);
|
||||||
ok(!lstrcmpW((WCHAR *)((BYTE *)instance + instance->InstanceNameOffset), L"11"),
|
ok(!lstrcmpW((WCHAR *)((BYTE *)instance + instance->InstanceNameOffset), L"11"),
|
||||||
"Got unexpected instance name %s.\n",
|
"Got unexpected instance name %s.\n",
|
||||||
debugstr_w((WCHAR *)((BYTE *)instance + instance->InstanceNameOffset)));
|
debugstr_w((WCHAR *)((BYTE *)instance + instance->InstanceNameOffset)));
|
||||||
size = ((sizeof(*instance) + sizeof(UINT64) * 2 + instance->InstanceNameSize) + 7) & ~7;
|
size = ((sizeof(*instance) + sizeof(UINT64) * 2 + instance->InstanceNameSize) + 7) & ~7;
|
||||||
ok(size == instance->dwSize, "Got unexpected size %u, instance->dwSize %u.\n", size, instance->dwSize);
|
ok(size == instance->dwSize, "Got unexpected size %lu, instance->dwSize %lu.\n", size, instance->dwSize);
|
||||||
|
|
||||||
ret = PerfSetCounterRefValue(prov, instance, 1, &counter1);
|
ret = PerfSetCounterRefValue(prov, instance, 1, &counter1);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
ret = PerfSetCounterRefValue(prov, instance, 2, &counter2);
|
ret = PerfSetCounterRefValue(prov, instance, 2, &counter2);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
ret = PerfSetCounterRefValue(prov, instance, 0, &counter2);
|
ret = PerfSetCounterRefValue(prov, instance, 0, &counter2);
|
||||||
ok(ret == ERROR_NOT_FOUND, "Got unexpected ret %u.\n", ret);
|
ok(ret == ERROR_NOT_FOUND, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
ok(*(void **)(instance + 1) == &counter1, "Got unexpected counter value %p.\n",
|
ok(*(void **)(instance + 1) == &counter1, "Got unexpected counter value %p.\n",
|
||||||
*(void **)(instance + 1));
|
*(void **)(instance + 1));
|
||||||
|
@ -168,24 +168,24 @@ void test_provider_init(void)
|
||||||
"Got unexpected counter value %p.\n", *(void **)(instance + 1));
|
"Got unexpected counter value %p.\n", *(void **)(instance + 1));
|
||||||
|
|
||||||
ret = PerfDeleteInstance(prov, instance);
|
ret = PerfDeleteInstance(prov, instance);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
ret = PerfStopProvider(prov);
|
ret = PerfStopProvider(prov);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
|
|
||||||
memset( &prov_context, 0, sizeof(prov_context) );
|
memset( &prov_context, 0, sizeof(prov_context) );
|
||||||
prov = (HANDLE)0xdeadbeef;
|
prov = (HANDLE)0xdeadbeef;
|
||||||
ret = PerfStartProviderEx( &test_guid, &prov_context, &prov );
|
ret = PerfStartProviderEx( &test_guid, &prov_context, &prov );
|
||||||
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %u.\n", ret);
|
ok(ret == ERROR_INVALID_PARAMETER, "Got unexpected ret %lu.\n", ret);
|
||||||
ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov);
|
ok(prov == (HANDLE)0xdeadbeef, "Got unexpected prov %p.\n", prov);
|
||||||
|
|
||||||
prov_context.ContextSize = sizeof(prov_context) + 1;
|
prov_context.ContextSize = sizeof(prov_context) + 1;
|
||||||
ret = PerfStartProviderEx( &test_guid, &prov_context, &prov );
|
ret = PerfStartProviderEx( &test_guid, &prov_context, &prov );
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
ok(prov != (HANDLE)0xdeadbeef, "Provider handle is not set.\n");
|
ok(prov != (HANDLE)0xdeadbeef, "Provider handle is not set.\n");
|
||||||
|
|
||||||
ret = PerfStopProvider(prov);
|
ret = PerfStopProvider(prov);
|
||||||
ok(!ret, "Got unexpected ret %u.\n", ret);
|
ok(!ret, "Got unexpected ret %lu.\n", ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
START_TEST(perf)
|
START_TEST(perf)
|
||||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
Loading…
Reference in a new issue