2 * Copyright 2002 Andriy Palamarchuk
4 * Conformance test of the access functions.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
30 #include "wine/test.h"
32 static WCHAR user_name
[UNLEN
+ 1];
33 static WCHAR computer_name
[MAX_COMPUTERNAME_LENGTH
+ 1];
35 static const WCHAR sNonexistentUser
[] = {'N','o','n','e','x','i','s','t','e','n','t',' ',
37 static WCHAR sTooLongName
[] = {'T','h','i','s',' ','i','s',' ','a',' ','b','a','d',
38 ' ','u','s','e','r','n','a','m','e',0};
39 static WCHAR sTooLongPassword
[] = {'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
40 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
41 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
42 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
43 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
44 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
45 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
46 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
47 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
48 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
49 'a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h','a','b','c','d','e','f','g','h',
52 static WCHAR sTestUserName
[] = {'t', 'e', 's', 't', 'u', 's', 'e', 'r', 0};
53 static WCHAR sTestUserOldPass
[] = {'O', 'l', 'd', 'P', 'a', 's', 's', 'W', '0', 'r', 'd', 'S', 'e', 't', '!', '~', 0};
54 static const WCHAR sBadNetPath
[] = {'\\','\\','B','a',' ',' ','p','a','t','h',0};
55 static const WCHAR sInvalidName
[] = {'\\',0};
56 static const WCHAR sInvalidName2
[] = {'\\','\\',0};
57 static const WCHAR sEmptyStr
[] = { 0 };
59 static NET_API_STATUS (WINAPI
*pNetApiBufferFree
)(LPVOID
)=NULL
;
60 static NET_API_STATUS (WINAPI
*pNetApiBufferSize
)(LPVOID
,LPDWORD
)=NULL
;
61 static NET_API_STATUS (WINAPI
*pNetQueryDisplayInformation
)(LPWSTR
,DWORD
,DWORD
,DWORD
,DWORD
,LPDWORD
,PVOID
*)=NULL
;
62 static NET_API_STATUS (WINAPI
*pNetUserGetInfo
)(LPCWSTR
,LPCWSTR
,DWORD
,LPBYTE
*)=NULL
;
63 static NET_API_STATUS (WINAPI
*pNetUserModalsGet
)(LPCWSTR
,DWORD
,LPBYTE
*)=NULL
;
64 static NET_API_STATUS (WINAPI
*pNetUserAdd
)(LPCWSTR
,DWORD
,LPBYTE
,LPDWORD
)=NULL
;
65 static NET_API_STATUS (WINAPI
*pNetUserDel
)(LPCWSTR
,LPCWSTR
)=NULL
;
66 static NET_API_STATUS (WINAPI
*pNetLocalGroupGetInfo
)(LPCWSTR
,LPCWSTR
,DWORD
,LPBYTE
*)=NULL
;
67 static NET_API_STATUS (WINAPI
*pNetLocalGroupGetMembers
)(LPCWSTR
,LPCWSTR
,DWORD
,LPBYTE
*,DWORD
,LPDWORD
,LPDWORD
,PDWORD_PTR
)=NULL
;
69 static int init_access_tests(void)
75 dwSize
= sizeof(user_name
)/sizeof(WCHAR
);
76 rc
=GetUserNameW(user_name
, &dwSize
);
77 if (rc
==FALSE
&& GetLastError()==ERROR_CALL_NOT_IMPLEMENTED
)
79 win_skip("GetUserNameW is not available.\n");
82 ok(rc
, "User Name Retrieved\n");
85 dwSize
= sizeof(computer_name
)/sizeof(WCHAR
);
86 ok(GetComputerNameW(computer_name
, &dwSize
), "Computer Name Retrieved\n");
90 static NET_API_STATUS
create_test_user(void)
94 usri
.usri1_name
= sTestUserName
;
95 usri
.usri1_password
= sTestUserOldPass
;
96 usri
.usri1_priv
= USER_PRIV_USER
;
97 usri
.usri1_home_dir
= NULL
;
98 usri
.usri1_comment
= NULL
;
99 usri
.usri1_flags
= UF_SCRIPT
;
100 usri
.usri1_script_path
= NULL
;
102 return pNetUserAdd(NULL
, 1, (LPBYTE
)&usri
, NULL
);
105 static NET_API_STATUS
delete_test_user(void)
107 return pNetUserDel(NULL
, sTestUserName
);
110 static void run_usergetinfo_tests(void)
113 PUSER_INFO_0 ui0
= NULL
;
114 PUSER_INFO_10 ui10
= NULL
;
117 if((rc
= create_test_user()) != NERR_Success
)
119 skip("Skipping usergetinfo_tests, create_test_user failed: 0x%08x\n", rc
);
124 rc
=pNetUserGetInfo(NULL
, sTestUserName
, 0, (LPBYTE
*)&ui0
);
125 ok(rc
== NERR_Success
, "NetUserGetInfo level 0 failed: 0x%08x.\n", rc
);
126 ok(!lstrcmpW(sTestUserName
, ui0
->usri0_name
),"Username mismatch for level 0.\n");
127 pNetApiBufferSize(ui0
, &dwSize
);
128 ok(dwSize
>= (sizeof(USER_INFO_0
) +
129 (lstrlenW(ui0
->usri0_name
) + 1) * sizeof(WCHAR
)),
130 "Is allocated with NetApiBufferAllocate\n");
133 rc
=pNetUserGetInfo(NULL
, sTestUserName
, 10, (LPBYTE
*)&ui10
);
134 ok(rc
== NERR_Success
, "NetUserGetInfo level 10 failed: 0x%08x.\n", rc
);
135 ok(!lstrcmpW(sTestUserName
, ui10
->usri10_name
), "Username mismatch for level 10.\n");
136 pNetApiBufferSize(ui10
, &dwSize
);
137 ok(dwSize
>= (sizeof(USER_INFO_10
) +
138 (lstrlenW(ui10
->usri10_name
) + 1 +
139 lstrlenW(ui10
->usri10_comment
) + 1 +
140 lstrlenW(ui10
->usri10_usr_comment
) + 1 +
141 lstrlenW(ui10
->usri10_full_name
) + 1) * sizeof(WCHAR
)),
142 "Is allocated with NetApiBufferAllocate\n");
144 pNetApiBufferFree(ui0
);
145 pNetApiBufferFree(ui10
);
147 /* NetUserGetInfo should always work for the current user. */
148 rc
=pNetUserGetInfo(NULL
, user_name
, 0, (LPBYTE
*)&ui0
);
149 ok(rc
== NERR_Success
, "NetUsetGetInfo for current user failed: 0x%08x.\n", rc
);
150 pNetApiBufferFree(ui0
);
152 /* errors handling */
153 rc
=pNetUserGetInfo(NULL
, sTestUserName
, 10000, (LPBYTE
*)&ui0
);
154 ok(rc
== ERROR_INVALID_LEVEL
,"Invalid Level: rc=%d\n",rc
);
155 rc
=pNetUserGetInfo(NULL
, sNonexistentUser
, 0, (LPBYTE
*)&ui0
);
156 ok(rc
== NERR_UserNotFound
,"Invalid User Name: rc=%d\n",rc
);
158 /* FIXME - Currently Wine can't verify whether the network path is good or bad */
159 rc
=pNetUserGetInfo(sBadNetPath
, sTestUserName
, 0, (LPBYTE
*)&ui0
);
160 ok(rc
== ERROR_BAD_NETPATH
||
161 rc
== ERROR_NETWORK_UNREACHABLE
||
162 rc
== RPC_S_SERVER_UNAVAILABLE
||
163 rc
== NERR_WkstaNotStarted
|| /* workstation service not running */
164 rc
== RPC_S_INVALID_NET_ADDR
, /* Some Win7 */
165 "Bad Network Path: rc=%d\n",rc
);
167 rc
=pNetUserGetInfo(sEmptyStr
, sTestUserName
, 0, (LPBYTE
*)&ui0
);
168 ok(rc
== ERROR_BAD_NETPATH
|| rc
== NERR_Success
,
169 "Bad Network Path: rc=%d\n",rc
);
170 rc
=pNetUserGetInfo(sInvalidName
, sTestUserName
, 0, (LPBYTE
*)&ui0
);
171 ok(rc
== ERROR_INVALID_NAME
|| rc
== ERROR_INVALID_HANDLE
,"Invalid Server Name: rc=%d\n",rc
);
172 rc
=pNetUserGetInfo(sInvalidName2
, sTestUserName
, 0, (LPBYTE
*)&ui0
);
173 ok(rc
== ERROR_INVALID_NAME
|| rc
== ERROR_INVALID_HANDLE
,"Invalid Server Name: rc=%d\n",rc
);
175 if(delete_test_user() != NERR_Success
)
176 trace("Deleting the test user failed. You might have to manually delete it.\n");
179 /* Checks Level 1 of NetQueryDisplayInformation */
180 static void run_querydisplayinformation1_tests(void)
182 PNET_DISPLAY_USER Buffer
, rec
;
183 DWORD Result
, EntryCount
;
185 BOOL hasAdmin
= FALSE
;
186 BOOL hasGuest
= FALSE
;
190 Result
= pNetQueryDisplayInformation(
191 NULL
, 1, i
, 1000, MAX_PREFERRED_LENGTH
, &EntryCount
,
194 ok((Result
== ERROR_SUCCESS
) || (Result
== ERROR_MORE_DATA
),
195 "Information Retrieved\n");
197 for(; EntryCount
> 0; EntryCount
--)
199 if (rec
->usri1_user_id
== DOMAIN_USER_RID_ADMIN
)
201 ok(!hasAdmin
, "One admin user\n");
202 ok(rec
->usri1_flags
& UF_SCRIPT
, "UF_SCRIPT flag is set\n");
203 ok(rec
->usri1_flags
& UF_NORMAL_ACCOUNT
, "UF_NORMAL_ACCOUNT flag is set\n");
206 else if (rec
->usri1_user_id
== DOMAIN_USER_RID_GUEST
)
208 ok(!hasGuest
, "One guest record\n");
209 ok(rec
->usri1_flags
& UF_SCRIPT
, "UF_SCRIPT flag is set\n");
210 ok(rec
->usri1_flags
& UF_NORMAL_ACCOUNT
, "UF_NORMAL_ACCOUNT flag is set\n");
214 i
= rec
->usri1_next_index
;
218 pNetApiBufferFree(Buffer
);
219 } while (Result
== ERROR_MORE_DATA
);
221 ok(hasAdmin
, "Doesn't have 'Administrator' account\n");
224 static void run_usermodalsget_tests(void)
227 USER_MODALS_INFO_2
* umi2
= NULL
;
229 rc
= pNetUserModalsGet(NULL
, 2, (LPBYTE
*)&umi2
);
230 ok(rc
== ERROR_SUCCESS
, "NetUserModalsGet failed, rc = %d\n", rc
);
233 pNetApiBufferFree(umi2
);
236 static void run_userhandling_tests(void)
241 usri
.usri1_priv
= USER_PRIV_USER
;
242 usri
.usri1_home_dir
= NULL
;
243 usri
.usri1_comment
= NULL
;
244 usri
.usri1_flags
= UF_SCRIPT
;
245 usri
.usri1_script_path
= NULL
;
247 usri
.usri1_name
= sTooLongName
;
248 usri
.usri1_password
= sTestUserOldPass
;
250 ret
= pNetUserAdd(NULL
, 1, (LPBYTE
)&usri
, NULL
);
251 if (ret
== NERR_Success
|| ret
== NERR_UserExists
)
253 /* Windows NT4 does create the user. Delete the user and also if it already existed
254 * due to a previous test run on NT4.
256 trace("We are on NT4, we have to delete the user with the too long username\n");
257 ret
= pNetUserDel(NULL
, sTooLongName
);
258 ok(ret
== NERR_Success
, "Deleting the user failed : %d\n", ret
);
260 else if (ret
== ERROR_ACCESS_DENIED
)
262 skip("not enough permissions to add a user\n");
266 ok(ret
== NERR_BadUsername
||
267 broken(ret
== NERR_PasswordTooShort
), /* NT4 */
268 "Adding user with too long username returned 0x%08x\n", ret
);
270 usri
.usri1_name
= sTestUserName
;
271 usri
.usri1_password
= sTooLongPassword
;
273 ret
= pNetUserAdd(NULL
, 1, (LPBYTE
)&usri
, NULL
);
274 ok(ret
== NERR_PasswordTooShort
|| ret
== ERROR_ACCESS_DENIED
/* Win2003 */,
275 "Adding user with too long password returned 0x%08x\n", ret
);
277 usri
.usri1_name
= sTooLongName
;
278 usri
.usri1_password
= sTooLongPassword
;
280 ret
= pNetUserAdd(NULL
, 1, (LPBYTE
)&usri
, NULL
);
281 /* NT4 doesn't have a problem with the username so it will report the too long password
282 * as the error. NERR_PasswordTooShort is reported for all kind of password related errors.
284 ok(ret
== NERR_BadUsername
|| ret
== NERR_PasswordTooShort
,
285 "Adding user with too long username/password returned 0x%08x\n", ret
);
287 usri
.usri1_name
= sTestUserName
;
288 usri
.usri1_password
= sTestUserOldPass
;
290 ret
= pNetUserAdd(NULL
, 5, (LPBYTE
)&usri
, NULL
);
291 ok(ret
== ERROR_INVALID_LEVEL
, "Adding user with level 5 returned 0x%08x\n", ret
);
293 ret
= pNetUserAdd(NULL
, 1, (LPBYTE
)&usri
, NULL
);
294 if(ret
== ERROR_ACCESS_DENIED
)
296 skip("Insufficient permissions to add users. Skipping test.\n");
299 if(ret
== NERR_UserExists
)
301 skip("User already exists, skipping test to not mess up the system\n");
305 ok(ret
== NERR_Success
||
306 broken(ret
== NERR_PasswordTooShort
), /* NT4 */
307 "Adding user failed with error 0x%08x\n", ret
);
308 if(ret
!= NERR_Success
)
311 /* On Windows XP (and newer), calling NetUserChangePassword with a NULL
312 * domainname parameter creates a user home directory, iff the machine is
313 * not member of a domain.
314 * Using \\127.0.0.1 as domain name does not work on standalone machines
315 * either, unless the ForceGuest option in the registry is turned off.
316 * So let's not test NetUserChangePassword for now.
319 ret
= pNetUserDel(NULL
, sTestUserName
);
320 ok(ret
== NERR_Success
, "Deleting the user failed.\n");
322 ret
= pNetUserDel(NULL
, sTestUserName
);
323 ok(ret
== NERR_UserNotFound
, "Deleting a nonexistent user returned 0x%08x\n",ret
);
326 static void run_localgroupgetinfo_tests(void)
328 NET_API_STATUS status
;
329 static const WCHAR admins
[] = {'A','d','m','i','n','i','s','t','r','a','t','o','r','s',0};
330 PLOCALGROUP_INFO_1 lgi
= NULL
;
331 PLOCALGROUP_MEMBERS_INFO_3 buffer
= NULL
;
332 DWORD entries_read
= 0, total_entries
=0;
335 status
= pNetLocalGroupGetInfo(NULL
, admins
, 1, (LPBYTE
*)&lgi
);
336 ok(status
== NERR_Success
|| broken(status
== NERR_GroupNotFound
),
337 "NetLocalGroupGetInfo unexpectedly returned %d\n", status
);
338 if (status
!= NERR_Success
) return;
340 trace("Local groupname:%s\n", wine_dbgstr_w( lgi
->lgrpi1_name
));
341 trace("Comment: %s\n", wine_dbgstr_w( lgi
->lgrpi1_comment
));
343 pNetApiBufferFree(lgi
);
345 status
= pNetLocalGroupGetMembers(NULL
, admins
, 3, (LPBYTE
*)&buffer
, MAX_PREFERRED_LENGTH
, &entries_read
, &total_entries
, NULL
);
346 ok(status
== NERR_Success
, "NetLocalGroupGetMembers unexpectedly returned %d\n", status
);
347 ok(entries_read
> 0 && total_entries
> 0, "Amount of entries is unexpectedly 0\n");
349 for(i
=0;i
<entries_read
;i
++)
350 trace("domain and name: %s\n", wine_dbgstr_w(buffer
[i
].lgrmi3_domainandname
));
355 HMODULE hnetapi32
=LoadLibraryA("netapi32.dll");
357 pNetApiBufferFree
=(void*)GetProcAddress(hnetapi32
,"NetApiBufferFree");
358 pNetApiBufferSize
=(void*)GetProcAddress(hnetapi32
,"NetApiBufferSize");
359 pNetQueryDisplayInformation
=(void*)GetProcAddress(hnetapi32
,"NetQueryDisplayInformation");
360 pNetUserGetInfo
=(void*)GetProcAddress(hnetapi32
,"NetUserGetInfo");
361 pNetUserModalsGet
=(void*)GetProcAddress(hnetapi32
,"NetUserModalsGet");
362 pNetUserAdd
=(void*)GetProcAddress(hnetapi32
, "NetUserAdd");
363 pNetUserDel
=(void*)GetProcAddress(hnetapi32
, "NetUserDel");
364 pNetLocalGroupGetInfo
=(void*)GetProcAddress(hnetapi32
, "NetLocalGroupGetInfo");
365 pNetLocalGroupGetMembers
=(void*)GetProcAddress(hnetapi32
, "NetLocalGroupGetMembers");
367 /* These functions were introduced with NT. It's safe to assume that
368 * if one is not available, none are.
370 if (!pNetApiBufferFree
) {
371 win_skip("Needed functions are not available\n");
372 FreeLibrary(hnetapi32
);
376 if (init_access_tests()) {
377 run_userhandling_tests();
378 run_usergetinfo_tests();
379 run_querydisplayinformation1_tests();
380 run_usermodalsget_tests();
381 run_localgroupgetinfo_tests();
384 FreeLibrary(hnetapi32
);