mirror of
https://github.com/reactos/reactos.git
synced 2024-11-09 16:20:37 +00:00
259 lines
9.6 KiB
C
259 lines
9.6 KiB
C
|
/*
|
||
|
* Miscellaneous secur32 tests
|
||
|
*
|
||
|
* Copyright 2005, 2006 Kai Blin
|
||
|
*
|
||
|
* This library is free software; you can redistribute it and/or
|
||
|
* modify it under the terms of the GNU Lesser General Public
|
||
|
* License as published by the Free Software Foundation; either
|
||
|
* version 2.1 of the License, or (at your option) any later version.
|
||
|
*
|
||
|
* This library is distributed in the hope that it will be useful,
|
||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||
|
* Lesser General Public License for more details.
|
||
|
*
|
||
|
* You should have received a copy of the GNU Lesser General Public
|
||
|
* License along with this library; if not, write to the Free Software
|
||
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
||
|
*/
|
||
|
|
||
|
#define SECURITY_WIN32
|
||
|
|
||
|
#include <stdarg.h>
|
||
|
#include <stdio.h>
|
||
|
#include <assert.h>
|
||
|
#include <windef.h>
|
||
|
#include <winbase.h>
|
||
|
#include <sspi.h>
|
||
|
|
||
|
#include "wine/test.h"
|
||
|
|
||
|
static HMODULE secdll;
|
||
|
static PSecurityFunctionTableA (SEC_ENTRY * pInitSecurityInterfaceA)(void);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pEnumerateSecurityPackagesA)(PULONG, PSecPkgInfoA*);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pFreeContextBuffer)(PVOID pv);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pQuerySecurityPackageInfoA)(SEC_CHAR*, PSecPkgInfoA*);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pAcquireCredentialsHandleA)(SEC_CHAR*, SEC_CHAR*,
|
||
|
ULONG, PLUID, PVOID, SEC_GET_KEY_FN, PVOID, PCredHandle, PTimeStamp);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pInitializeSecurityContextA)(PCredHandle, PCtxtHandle,
|
||
|
SEC_CHAR*, ULONG, ULONG, ULONG, PSecBufferDesc, ULONG,
|
||
|
PCtxtHandle, PSecBufferDesc, PULONG, PTimeStamp);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pCompleteAuthToken)(PCtxtHandle, PSecBufferDesc);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pAcceptSecurityContext)(PCredHandle, PCtxtHandle,
|
||
|
PSecBufferDesc, ULONG, ULONG, PCtxtHandle, PSecBufferDesc,
|
||
|
PULONG, PTimeStamp);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pFreeCredentialsHandle)(PCredHandle);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pDeleteSecurityContext)(PCtxtHandle);
|
||
|
static SECURITY_STATUS (SEC_ENTRY * pQueryContextAttributesA)(PCtxtHandle, ULONG, PVOID);
|
||
|
|
||
|
static void InitFunctionPtrs(void)
|
||
|
{
|
||
|
secdll = LoadLibraryA("secur32.dll");
|
||
|
if(!secdll)
|
||
|
secdll = LoadLibraryA("security.dll");
|
||
|
if(secdll)
|
||
|
{
|
||
|
pInitSecurityInterfaceA = (PVOID)GetProcAddress(secdll, "InitSecurityInterfaceA");
|
||
|
pEnumerateSecurityPackagesA = (PVOID)GetProcAddress(secdll, "EnumerateSecurityPackagesA");
|
||
|
pFreeContextBuffer = (PVOID)GetProcAddress(secdll, "FreeContextBuffer");
|
||
|
pQuerySecurityPackageInfoA = (PVOID)GetProcAddress(secdll, "QuerySecurityPackageInfoA");
|
||
|
pAcquireCredentialsHandleA = (PVOID)GetProcAddress(secdll, "AcquireCredentialsHandleA");
|
||
|
pInitializeSecurityContextA = (PVOID)GetProcAddress(secdll, "InitializeSecurityContextA");
|
||
|
pCompleteAuthToken = (PVOID)GetProcAddress(secdll, "CompleteAuthToken");
|
||
|
pAcceptSecurityContext = (PVOID)GetProcAddress(secdll, "AcceptSecurityContext");
|
||
|
pFreeCredentialsHandle = (PVOID)GetProcAddress(secdll, "FreeCredentialsHandle");
|
||
|
pDeleteSecurityContext = (PVOID)GetProcAddress(secdll, "DeleteSecurityContext");
|
||
|
pQueryContextAttributesA = (PVOID)GetProcAddress(secdll, "QueryContextAttributesA");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/*---------------------------------------------------------*/
|
||
|
/* General helper functions */
|
||
|
|
||
|
static const char* getSecError(SECURITY_STATUS status)
|
||
|
{
|
||
|
static char buf[20];
|
||
|
|
||
|
#define _SEC_ERR(x) case (x): return #x;
|
||
|
switch(status)
|
||
|
{
|
||
|
_SEC_ERR(SEC_E_OK);
|
||
|
_SEC_ERR(SEC_E_INSUFFICIENT_MEMORY);
|
||
|
_SEC_ERR(SEC_E_INVALID_HANDLE);
|
||
|
_SEC_ERR(SEC_E_UNSUPPORTED_FUNCTION);
|
||
|
_SEC_ERR(SEC_E_TARGET_UNKNOWN);
|
||
|
_SEC_ERR(SEC_E_INTERNAL_ERROR);
|
||
|
_SEC_ERR(SEC_E_SECPKG_NOT_FOUND);
|
||
|
_SEC_ERR(SEC_E_NOT_OWNER);
|
||
|
_SEC_ERR(SEC_E_CANNOT_INSTALL);
|
||
|
_SEC_ERR(SEC_E_INVALID_TOKEN);
|
||
|
_SEC_ERR(SEC_E_CANNOT_PACK);
|
||
|
_SEC_ERR(SEC_E_QOP_NOT_SUPPORTED);
|
||
|
_SEC_ERR(SEC_E_NO_IMPERSONATION);
|
||
|
_SEC_ERR(SEC_I_CONTINUE_NEEDED);
|
||
|
_SEC_ERR(SEC_E_BUFFER_TOO_SMALL);
|
||
|
_SEC_ERR(SEC_E_ILLEGAL_MESSAGE);
|
||
|
_SEC_ERR(SEC_E_LOGON_DENIED);
|
||
|
_SEC_ERR(SEC_E_NO_CREDENTIALS);
|
||
|
_SEC_ERR(SEC_E_OUT_OF_SEQUENCE);
|
||
|
default:
|
||
|
sprintf(buf, "%08x\n", status);
|
||
|
return buf;
|
||
|
}
|
||
|
#undef _SEC_ERR
|
||
|
}
|
||
|
|
||
|
/*---------------------------------------------------------*/
|
||
|
/* Helper for testQuerySecurityPagageInfo */
|
||
|
|
||
|
static SECURITY_STATUS setupPackageA(SEC_CHAR *p_package_name,
|
||
|
PSecPkgInfo *p_pkg_info)
|
||
|
{
|
||
|
SECURITY_STATUS ret;
|
||
|
|
||
|
ret = pQuerySecurityPackageInfoA( p_package_name, p_pkg_info);
|
||
|
return ret;
|
||
|
}
|
||
|
|
||
|
/*--------------------------------------------------------- */
|
||
|
/* The test functions */
|
||
|
|
||
|
static void testInitSecurityInterface(void)
|
||
|
{
|
||
|
PSecurityFunctionTable sec_fun_table = NULL;
|
||
|
|
||
|
sec_fun_table = pInitSecurityInterfaceA();
|
||
|
ok(sec_fun_table != NULL, "InitSecurityInterface() returned NULL.\n");
|
||
|
|
||
|
}
|
||
|
|
||
|
static void testEnumerateSecurityPackages(void)
|
||
|
{
|
||
|
|
||
|
SECURITY_STATUS sec_status;
|
||
|
ULONG num_packages, i;
|
||
|
PSecPkgInfo pkg_info = NULL;
|
||
|
|
||
|
trace("Running testEnumerateSecurityPackages\n");
|
||
|
|
||
|
sec_status = pEnumerateSecurityPackagesA(&num_packages, &pkg_info);
|
||
|
|
||
|
ok(sec_status == SEC_E_OK,
|
||
|
"EnumerateSecurityPackages() should return %d, not %08x\n",
|
||
|
SEC_E_OK, sec_status);
|
||
|
|
||
|
if (num_packages == 0)
|
||
|
{
|
||
|
todo_wine
|
||
|
ok(num_packages > 0, "Number of sec packages should be > 0 ,but is %d\n",
|
||
|
num_packages);
|
||
|
skip("no sec packages to check\n");
|
||
|
return;
|
||
|
}
|
||
|
else
|
||
|
ok(num_packages > 0, "Number of sec packages should be > 0 ,but is %d\n",
|
||
|
num_packages);
|
||
|
|
||
|
ok(pkg_info != NULL,
|
||
|
"pkg_info should not be NULL after EnumerateSecurityPackages\n");
|
||
|
|
||
|
trace("Number of packages: %d\n", num_packages);
|
||
|
for(i = 0; i < num_packages; ++i){
|
||
|
trace("%d: Package \"%s\"\n", i, pkg_info[i].Name);
|
||
|
trace("Supported flags:\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_INTEGRITY)
|
||
|
trace("\tSECPKG_FLAG_INTEGRITY\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_PRIVACY)
|
||
|
trace("\tSECPKG_FLAG_PRIVACY\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_TOKEN_ONLY)
|
||
|
trace("\tSECPKG_FLAG_TOKEN_ONLY\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_DATAGRAM)
|
||
|
trace("\tSECPKG_FLAG_DATAGRAM\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_CONNECTION)
|
||
|
trace("\tSECPKG_FLAG_CONNECTION\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_MULTI_REQUIRED)
|
||
|
trace("\tSECPKG_FLAG_MULTI_REQUIRED\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_CLIENT_ONLY)
|
||
|
trace("\tSECPKG_FLAG_CLIENT_ONLY\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_EXTENDED_ERROR)
|
||
|
trace("\tSECPKG_FLAG_EXTENDED_ERROR\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_IMPERSONATION)
|
||
|
trace("\tSECPKG_FLAG_IMPERSONATION\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_ACCEPT_WIN32_NAME)
|
||
|
trace("\tSECPKG_FLAG_ACCEPT_WIN32_NAME\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_STREAM)
|
||
|
trace("\tSECPKG_FLAG_STREAM\n");
|
||
|
if(pkg_info[i].fCapabilities & SECPKG_FLAG_READONLY_WITH_CHECKSUM)
|
||
|
trace("\tSECPKG_FLAG_READONLY_WITH_CHECKSUM\n");
|
||
|
trace("Comment: %s\n", pkg_info[i].Comment);
|
||
|
trace("\n");
|
||
|
}
|
||
|
|
||
|
pFreeContextBuffer(pkg_info);
|
||
|
}
|
||
|
|
||
|
|
||
|
static void testQuerySecurityPackageInfo(void)
|
||
|
{
|
||
|
SECURITY_STATUS sec_status;
|
||
|
PSecPkgInfo pkg_info;
|
||
|
static SEC_CHAR ntlm[] = "NTLM",
|
||
|
winetest[] = "Winetest";
|
||
|
|
||
|
trace("Running testQuerySecurityPackageInfo\n");
|
||
|
|
||
|
/* Test with an existing package. Test should pass */
|
||
|
|
||
|
pkg_info = (void *)0xdeadbeef;
|
||
|
sec_status = setupPackageA(ntlm, &pkg_info);
|
||
|
|
||
|
ok((sec_status == SEC_E_OK) || (sec_status == SEC_E_SECPKG_NOT_FOUND) ||
|
||
|
broken(sec_status == SEC_E_UNSUPPORTED_FUNCTION), /* win95 */
|
||
|
"Return value of QuerySecurityPackageInfo() shouldn't be %s\n",
|
||
|
getSecError(sec_status) );
|
||
|
|
||
|
if (sec_status == SEC_E_OK)
|
||
|
{
|
||
|
ok(pkg_info != (void *)0xdeadbeef, "wrong pkg_info address %p\n", pkg_info);
|
||
|
ok(pkg_info->wVersion == 1, "wVersion always should be 1, but is %d\n", pkg_info->wVersion);
|
||
|
/* there is no point in testing pkg_info->cbMaxToken since it varies
|
||
|
* between implementations.
|
||
|
*/
|
||
|
|
||
|
sec_status = pFreeContextBuffer(pkg_info);
|
||
|
ok( sec_status == SEC_E_OK,
|
||
|
"Return value of FreeContextBuffer() shouldn't be %s\n",
|
||
|
getSecError(sec_status) );
|
||
|
}
|
||
|
|
||
|
/* Test with a nonexistent package, test should fail */
|
||
|
|
||
|
pkg_info = (void *)0xdeadbeef;
|
||
|
sec_status = pQuerySecurityPackageInfoA(winetest, &pkg_info);
|
||
|
|
||
|
ok( sec_status == SEC_E_SECPKG_NOT_FOUND,
|
||
|
"Return value of QuerySecurityPackageInfo() should be %s for a nonexistent package\n",
|
||
|
getSecError(SEC_E_SECPKG_NOT_FOUND));
|
||
|
|
||
|
ok(pkg_info == (void *)0xdeadbeef, "wrong pkg_info address %p\n", pkg_info);
|
||
|
}
|
||
|
|
||
|
START_TEST(main)
|
||
|
{
|
||
|
InitFunctionPtrs();
|
||
|
if(pInitSecurityInterfaceA)
|
||
|
testInitSecurityInterface();
|
||
|
if(pFreeContextBuffer)
|
||
|
{
|
||
|
if(pEnumerateSecurityPackagesA)
|
||
|
testEnumerateSecurityPackages();
|
||
|
if(pQuerySecurityPackageInfoA)
|
||
|
{
|
||
|
testQuerySecurityPackageInfo();
|
||
|
}
|
||
|
}
|
||
|
if(secdll)
|
||
|
FreeLibrary(secdll);
|
||
|
}
|