quartz: Free two assert calls from having side effects.
[wine/testsucceed.git] / dlls / secur32 / tests / main.c
blob7612b1c89588d9a24133db8ef58781ebbf669f18
1 /*
2 * Miscellaneous secur32 tests
4 * Copyright 2005, 2006 Kai Blin
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #define SECURITY_WIN32
23 #include <stdarg.h>
24 #include <stdio.h>
26 #include <windef.h>
27 #include <winbase.h>
28 #include <sspi.h>
30 #include "wine/test.h"
32 static HMODULE secdll;
33 static PSecurityFunctionTableA (SEC_ENTRY * pInitSecurityInterfaceA)(void);
34 static SECURITY_STATUS (SEC_ENTRY * pEnumerateSecurityPackagesA)(PULONG, PSecPkgInfoA*);
35 static SECURITY_STATUS (SEC_ENTRY * pFreeContextBuffer)(PVOID pv);
36 static SECURITY_STATUS (SEC_ENTRY * pQuerySecurityPackageInfoA)(SEC_CHAR*, PSecPkgInfoA*);
37 static SECURITY_STATUS (SEC_ENTRY * pAcquireCredentialsHandleA)(SEC_CHAR*, SEC_CHAR*,
38 ULONG, PLUID, PVOID, SEC_GET_KEY_FN, PVOID, PCredHandle, PTimeStamp);
39 static SECURITY_STATUS (SEC_ENTRY * pInitializeSecurityContextA)(PCredHandle, PCtxtHandle,
40 SEC_CHAR*, ULONG, ULONG, ULONG, PSecBufferDesc, ULONG,
41 PCtxtHandle, PSecBufferDesc, PULONG, PTimeStamp);
42 static SECURITY_STATUS (SEC_ENTRY * pCompleteAuthToken)(PCtxtHandle, PSecBufferDesc);
43 static SECURITY_STATUS (SEC_ENTRY * pAcceptSecurityContext)(PCredHandle, PCtxtHandle,
44 PSecBufferDesc, ULONG, ULONG, PCtxtHandle, PSecBufferDesc,
45 PULONG, PTimeStamp);
46 static SECURITY_STATUS (SEC_ENTRY * pFreeCredentialsHandle)(PCredHandle);
47 static SECURITY_STATUS (SEC_ENTRY * pDeleteSecurityContext)(PCtxtHandle);
48 static SECURITY_STATUS (SEC_ENTRY * pQueryContextAttributesA)(PCtxtHandle, ULONG, PVOID);
50 static void InitFunctionPtrs(void)
52 secdll = LoadLibraryA("secur32.dll");
53 if(!secdll)
54 secdll = LoadLibraryA("security.dll");
55 if(secdll)
57 pInitSecurityInterfaceA = (PVOID)GetProcAddress(secdll, "InitSecurityInterfaceA");
58 pEnumerateSecurityPackagesA = (PVOID)GetProcAddress(secdll, "EnumerateSecurityPackagesA");
59 pFreeContextBuffer = (PVOID)GetProcAddress(secdll, "FreeContextBuffer");
60 pQuerySecurityPackageInfoA = (PVOID)GetProcAddress(secdll, "QuerySecurityPackageInfoA");
61 pAcquireCredentialsHandleA = (PVOID)GetProcAddress(secdll, "AcquireCredentialsHandleA");
62 pInitializeSecurityContextA = (PVOID)GetProcAddress(secdll, "InitializeSecurityContextA");
63 pCompleteAuthToken = (PVOID)GetProcAddress(secdll, "CompleteAuthToken");
64 pAcceptSecurityContext = (PVOID)GetProcAddress(secdll, "AcceptSecurityContext");
65 pFreeCredentialsHandle = (PVOID)GetProcAddress(secdll, "FreeCredentialsHandle");
66 pDeleteSecurityContext = (PVOID)GetProcAddress(secdll, "DeleteSecurityContext");
67 pQueryContextAttributesA = (PVOID)GetProcAddress(secdll, "QueryContextAttributesA");
71 /*---------------------------------------------------------*/
72 /* General helper functions */
74 static const char* getSecError(SECURITY_STATUS status)
76 static char buf[20];
78 #define _SEC_ERR(x) case (x): return #x;
79 switch(status)
81 _SEC_ERR(SEC_E_OK);
82 _SEC_ERR(SEC_E_INSUFFICIENT_MEMORY);
83 _SEC_ERR(SEC_E_INVALID_HANDLE);
84 _SEC_ERR(SEC_E_UNSUPPORTED_FUNCTION);
85 _SEC_ERR(SEC_E_TARGET_UNKNOWN);
86 _SEC_ERR(SEC_E_INTERNAL_ERROR);
87 _SEC_ERR(SEC_E_SECPKG_NOT_FOUND);
88 _SEC_ERR(SEC_E_NOT_OWNER);
89 _SEC_ERR(SEC_E_CANNOT_INSTALL);
90 _SEC_ERR(SEC_E_INVALID_TOKEN);
91 _SEC_ERR(SEC_E_CANNOT_PACK);
92 _SEC_ERR(SEC_E_QOP_NOT_SUPPORTED);
93 _SEC_ERR(SEC_E_NO_IMPERSONATION);
94 _SEC_ERR(SEC_I_CONTINUE_NEEDED);
95 _SEC_ERR(SEC_E_BUFFER_TOO_SMALL);
96 _SEC_ERR(SEC_E_ILLEGAL_MESSAGE);
97 _SEC_ERR(SEC_E_LOGON_DENIED);
98 _SEC_ERR(SEC_E_NO_CREDENTIALS);
99 _SEC_ERR(SEC_E_OUT_OF_SEQUENCE);
100 default:
101 sprintf(buf, "%08x\n", status);
102 return buf;
104 #undef _SEC_ERR
107 /*---------------------------------------------------------*/
108 /* Helper for testQuerySecurityPagageInfo */
110 static SECURITY_STATUS setupPackageA(SEC_CHAR *p_package_name,
111 PSecPkgInfo *p_pkg_info)
113 SECURITY_STATUS ret;
115 ret = pQuerySecurityPackageInfoA( p_package_name, p_pkg_info);
116 return ret;
119 /*--------------------------------------------------------- */
120 /* The test functions */
122 static void testInitSecurityInterface(void)
124 PSecurityFunctionTable sec_fun_table = NULL;
126 sec_fun_table = pInitSecurityInterfaceA();
127 ok(sec_fun_table != NULL, "InitSecurityInterface() returned NULL.\n");
131 static void testEnumerateSecurityPackages(void)
134 SECURITY_STATUS sec_status;
135 ULONG num_packages, i;
136 PSecPkgInfo pkg_info = NULL;
138 trace("Running testEnumerateSecurityPackages\n");
140 sec_status = pEnumerateSecurityPackagesA(&num_packages, &pkg_info);
142 ok(sec_status == SEC_E_OK,
143 "EnumerateSecurityPackages() should return %d, not %08x\n",
144 SEC_E_OK, sec_status);
146 if (num_packages == 0)
148 todo_wine
149 ok(num_packages > 0, "Number of sec packages should be > 0 ,but is %d\n",
150 num_packages);
151 skip("no sec packages to check\n");
152 return;
154 else
155 ok(num_packages > 0, "Number of sec packages should be > 0 ,but is %d\n",
156 num_packages);
158 ok(pkg_info != NULL,
159 "pkg_info should not be NULL after EnumerateSecurityPackages\n");
161 trace("Number of packages: %d\n", num_packages);
162 for(i = 0; i < num_packages; ++i){
163 trace("%d: Package \"%s\"\n", i, pkg_info[i].Name);
164 trace("Supported flags:\n");
165 if(pkg_info[i].fCapabilities & SECPKG_FLAG_INTEGRITY)
166 trace("\tSECPKG_FLAG_INTEGRITY\n");
167 if(pkg_info[i].fCapabilities & SECPKG_FLAG_PRIVACY)
168 trace("\tSECPKG_FLAG_PRIVACY\n");
169 if(pkg_info[i].fCapabilities & SECPKG_FLAG_TOKEN_ONLY)
170 trace("\tSECPKG_FLAG_TOKEN_ONLY\n");
171 if(pkg_info[i].fCapabilities & SECPKG_FLAG_DATAGRAM)
172 trace("\tSECPKG_FLAG_DATAGRAM\n");
173 if(pkg_info[i].fCapabilities & SECPKG_FLAG_CONNECTION)
174 trace("\tSECPKG_FLAG_CONNECTION\n");
175 if(pkg_info[i].fCapabilities & SECPKG_FLAG_MULTI_REQUIRED)
176 trace("\tSECPKG_FLAG_MULTI_REQUIRED\n");
177 if(pkg_info[i].fCapabilities & SECPKG_FLAG_CLIENT_ONLY)
178 trace("\tSECPKG_FLAG_CLIENT_ONLY\n");
179 if(pkg_info[i].fCapabilities & SECPKG_FLAG_EXTENDED_ERROR)
180 trace("\tSECPKG_FLAG_EXTENDED_ERROR\n");
181 if(pkg_info[i].fCapabilities & SECPKG_FLAG_IMPERSONATION)
182 trace("\tSECPKG_FLAG_IMPERSONATION\n");
183 if(pkg_info[i].fCapabilities & SECPKG_FLAG_ACCEPT_WIN32_NAME)
184 trace("\tSECPKG_FLAG_ACCEPT_WIN32_NAME\n");
185 if(pkg_info[i].fCapabilities & SECPKG_FLAG_STREAM)
186 trace("\tSECPKG_FLAG_STREAM\n");
187 if(pkg_info[i].fCapabilities & SECPKG_FLAG_READONLY_WITH_CHECKSUM)
188 trace("\tSECPKG_FLAG_READONLY_WITH_CHECKSUM\n");
189 trace("Comment: %s\n", pkg_info[i].Comment);
190 trace("\n");
193 pFreeContextBuffer(pkg_info);
197 static void testQuerySecurityPackageInfo(void)
199 SECURITY_STATUS sec_status;
200 PSecPkgInfo pkg_info;
201 static SEC_CHAR ntlm[] = "NTLM",
202 winetest[] = "Winetest";
204 trace("Running testQuerySecurityPackageInfo\n");
206 /* Test with an existing package. Test should pass */
208 pkg_info = (void *)0xdeadbeef;
209 sec_status = setupPackageA(ntlm, &pkg_info);
211 ok((sec_status == SEC_E_OK) || (sec_status == SEC_E_SECPKG_NOT_FOUND) ||
212 broken(sec_status == SEC_E_UNSUPPORTED_FUNCTION), /* win95 */
213 "Return value of QuerySecurityPackageInfo() shouldn't be %s\n",
214 getSecError(sec_status) );
216 if (sec_status == SEC_E_OK)
218 ok(pkg_info != (void *)0xdeadbeef, "wrong pkg_info address %p\n", pkg_info);
219 ok(pkg_info->wVersion == 1, "wVersion always should be 1, but is %d\n", pkg_info->wVersion);
220 /* there is no point in testing pkg_info->cbMaxToken since it varies
221 * between implementations.
224 sec_status = pFreeContextBuffer(pkg_info);
225 ok( sec_status == SEC_E_OK,
226 "Return value of FreeContextBuffer() shouldn't be %s\n",
227 getSecError(sec_status) );
230 /* Test with a nonexistent package, test should fail */
232 pkg_info = (void *)0xdeadbeef;
233 sec_status = pQuerySecurityPackageInfoA(winetest, &pkg_info);
235 ok( sec_status == SEC_E_SECPKG_NOT_FOUND,
236 "Return value of QuerySecurityPackageInfo() should be %s for a nonexistent package\n",
237 getSecError(SEC_E_SECPKG_NOT_FOUND));
239 ok(pkg_info == (void *)0xdeadbeef, "wrong pkg_info address %p\n", pkg_info);
242 START_TEST(main)
244 InitFunctionPtrs();
245 if(pInitSecurityInterfaceA)
246 testInitSecurityInterface();
247 if(pFreeContextBuffer)
249 if(pEnumerateSecurityPackagesA)
250 testEnumerateSecurityPackages();
251 if(pQuerySecurityPackageInfoA)
253 testQuerySecurityPackageInfo();
256 if(secdll)
257 FreeLibrary(secdll);