545 lines
22 KiB
C
545 lines
22 KiB
C
/* Unit test suite for SHLWAPI ordinal functions
|
|
*
|
|
* Copyright 2004 Jon Griffiths
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "wine/test.h"
|
|
#include "winbase.h"
|
|
#include "winerror.h"
|
|
#include "winuser.h"
|
|
#include "ole2.h"
|
|
#include "oaidl.h"
|
|
|
|
/* Function ptrs for ordinal calls */
|
|
static HMODULE hShlwapi;
|
|
static int (WINAPI *pSHSearchMapInt)(const int*,const int*,int,int);
|
|
static HRESULT (WINAPI *pGetAcceptLanguagesA)(LPSTR,LPDWORD);
|
|
|
|
static HANDLE (WINAPI *pSHAllocShared)(LPCVOID,DWORD,DWORD);
|
|
static LPVOID (WINAPI *pSHLockShared)(HANDLE,DWORD);
|
|
static BOOL (WINAPI *pSHUnlockShared)(LPVOID);
|
|
static BOOL (WINAPI *pSHFreeShared)(HANDLE,DWORD);
|
|
static HRESULT(WINAPIV *pSHPackDispParams)(DISPPARAMS*,VARIANTARG*,UINT,...);
|
|
|
|
static void test_GetAcceptLanguagesA(void)
|
|
{ HRESULT retval;
|
|
DWORD buffersize, buffersize2, exactsize;
|
|
char buffer[100];
|
|
|
|
if (!pGetAcceptLanguagesA) {
|
|
win_skip("GetAcceptLanguagesA is not available\n");
|
|
return;
|
|
}
|
|
|
|
buffersize = sizeof(buffer);
|
|
memset(buffer, 0, sizeof(buffer));
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( buffer, &buffersize);
|
|
if (!retval && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED) {
|
|
win_skip("GetAcceptLanguagesA is not implemented\n");
|
|
return;
|
|
}
|
|
trace("GetAcceptLanguagesA: retval %08x, size %08x, buffer (%s),"
|
|
" last error %u\n", retval, buffersize, buffer, GetLastError());
|
|
if(retval != S_OK) {
|
|
trace("GetAcceptLanguagesA: skipping tests\n");
|
|
return;
|
|
}
|
|
ok( (ERROR_NO_IMPERSONATION_TOKEN == GetLastError()) ||
|
|
(ERROR_CLASS_DOES_NOT_EXIST == GetLastError()) ||
|
|
(ERROR_PROC_NOT_FOUND == GetLastError()) ||
|
|
(ERROR_SUCCESS == GetLastError()), "last error set to %u\n", GetLastError());
|
|
exactsize = strlen(buffer);
|
|
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( NULL, NULL);
|
|
ok(retval == E_FAIL ||
|
|
retval == E_INVALIDARG, /* w2k8 */
|
|
"function result wrong: got %08x; expected E_FAIL\n", retval);
|
|
ok(ERROR_SUCCESS == GetLastError(), "last error set to %u\n", GetLastError());
|
|
|
|
buffersize = sizeof(buffer);
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( NULL, &buffersize);
|
|
ok(retval == E_FAIL ||
|
|
retval == E_INVALIDARG, /* w2k8 */
|
|
"function result wrong: got %08x; expected E_FAIL\n", retval);
|
|
ok(buffersize == sizeof(buffer) ||
|
|
buffersize == 0, /* w2k8*/
|
|
"buffersize was changed and is not 0; size (%d))\n", buffersize);
|
|
ok(ERROR_SUCCESS == GetLastError(), "last error set to %u\n", GetLastError());
|
|
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( buffer, NULL);
|
|
ok(retval == E_FAIL ||
|
|
retval == E_INVALIDARG, /* w2k8 */
|
|
"function result wrong: got %08x; expected E_FAIL\n", retval);
|
|
ok(ERROR_SUCCESS == GetLastError(), "last error set to %u\n", GetLastError());
|
|
|
|
buffersize = 0;
|
|
memset(buffer, 0, sizeof(buffer));
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( buffer, &buffersize);
|
|
ok(retval == E_FAIL ||
|
|
retval == E_INVALIDARG, /* w2k8 */
|
|
"function result wrong: got %08x; expected E_FAIL\n", retval);
|
|
ok(buffersize == 0,
|
|
"buffersize wrong(changed) got %08x; expected 0 (2nd parameter; not on Win2k)\n", buffersize);
|
|
ok(ERROR_SUCCESS == GetLastError(), "last error set to %u\n", GetLastError());
|
|
|
|
buffersize = buffersize2 = 1;
|
|
memset(buffer, 0, sizeof(buffer));
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( buffer, &buffersize);
|
|
switch(retval) {
|
|
case 0L:
|
|
if(buffersize == exactsize) {
|
|
ok( (ERROR_SUCCESS == GetLastError()) ||
|
|
(ERROR_PROC_NOT_FOUND == GetLastError()) || (ERROR_NO_IMPERSONATION_TOKEN == GetLastError()),
|
|
"last error wrong: got %u; expected ERROR_SUCCESS(NT4)/"
|
|
"ERROR_PROC_NOT_FOUND(NT4)/ERROR_NO_IMPERSONATION_TOKEN(XP)\n", GetLastError());
|
|
ok(exactsize == strlen(buffer),
|
|
"buffer content (length) wrong: got %08x, expected %08x\n", lstrlenA(buffer), exactsize);
|
|
} else if((buffersize +1) == buffersize2) {
|
|
ok(ERROR_SUCCESS == GetLastError(),
|
|
"last error wrong: got %u; expected ERROR_SUCCESS\n", GetLastError());
|
|
ok(buffersize == strlen(buffer),
|
|
"buffer content (length) wrong: got %08x, expected %08x\n", lstrlenA(buffer), buffersize);
|
|
} else
|
|
ok( 0, "retval %08x, size %08x, buffer (%s), last error %u\n",
|
|
retval, buffersize, buffer, GetLastError());
|
|
break;
|
|
case E_INVALIDARG:
|
|
ok(buffersize == 0,
|
|
"buffersize wrong: got %08x, expected 0 (2nd parameter;Win2k)\n", buffersize);
|
|
ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(),
|
|
"last error wrong: got %u; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError());
|
|
ok(buffersize2 == strlen(buffer),
|
|
"buffer content (length) wrong: got %08x, expected %08x\n", lstrlenA(buffer), buffersize2);
|
|
break;
|
|
case __HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER): /* Win7 */
|
|
ok(buffersize == 0,
|
|
"buffersize wrong: got %08x, expected 0 (2nd parameter;Win2k)\n", buffersize);
|
|
ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(),
|
|
"last error wrong: got %u; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError());
|
|
break;
|
|
default:
|
|
ok( 0, "retval %08x, size %08x, buffer (%s), last error %u\n",
|
|
retval, buffersize, buffer, GetLastError());
|
|
break;
|
|
}
|
|
|
|
buffersize = buffersize2 = exactsize;
|
|
memset(buffer, 0, sizeof(buffer));
|
|
SetLastError(ERROR_SUCCESS);
|
|
retval = pGetAcceptLanguagesA( buffer, &buffersize);
|
|
switch(retval) {
|
|
case 0L:
|
|
ok(ERROR_SUCCESS == GetLastError(),
|
|
"last error wrong: got %u; expected ERROR_SUCCESS\n", GetLastError());
|
|
if((buffersize == exactsize) /* XP */ ||
|
|
((buffersize +1)== exactsize) /* 98 */)
|
|
ok(buffersize == strlen(buffer),
|
|
"buffer content (length) wrong: got %08x, expected %08x\n", lstrlenA(buffer), buffersize);
|
|
else
|
|
ok( 0, "retval %08x, size %08x, buffer (%s), last error %u\n",
|
|
retval, buffersize, buffer, GetLastError());
|
|
break;
|
|
case E_INVALIDARG:
|
|
ok(buffersize == 0,
|
|
"buffersize wrong: got %08x, expected 0 (2nd parameter;Win2k)\n", buffersize);
|
|
ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(),
|
|
"last error wrong: got %u; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError());
|
|
ok(buffersize2 == strlen(buffer),
|
|
"buffer content (length) wrong: got %08x, expected %08x\n", lstrlenA(buffer), buffersize2);
|
|
break;
|
|
case __HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER): /* Win 7 */
|
|
ok(buffersize == 0,
|
|
"buffersize wrong: got %08x, expected 0 (2nd parameter;Win2k)\n", buffersize);
|
|
ok(ERROR_INSUFFICIENT_BUFFER == GetLastError(),
|
|
"last error wrong: got %u; expected ERROR_INSUFFICIENT_BUFFER\n", GetLastError());
|
|
break;
|
|
default:
|
|
ok( 0, "retval %08x, size %08x, buffer (%s), last error %u\n",
|
|
retval, buffersize, buffer, GetLastError());
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void test_SHSearchMapInt(void)
|
|
{
|
|
int keys[8], values[8];
|
|
int i = 0;
|
|
|
|
if (!pSHSearchMapInt)
|
|
return;
|
|
|
|
memset(keys, 0, sizeof(keys));
|
|
memset(values, 0, sizeof(values));
|
|
keys[0] = 99; values[0] = 101;
|
|
|
|
/* NULL key/value lists crash native, so skip testing them */
|
|
|
|
/* 1 element */
|
|
i = pSHSearchMapInt(keys, values, 1, keys[0]);
|
|
ok(i == values[0], "Len 1, expected %d, got %d\n", values[0], i);
|
|
|
|
/* Key doesn't exist */
|
|
i = pSHSearchMapInt(keys, values, 1, 100);
|
|
ok(i == -1, "Len 1 - bad key, expected -1, got %d\n", i);
|
|
|
|
/* Len = 0 => not found */
|
|
i = pSHSearchMapInt(keys, values, 0, keys[0]);
|
|
ok(i == -1, "Len 1 - passed len 0, expected -1, got %d\n", i);
|
|
|
|
/* 2 elements, len = 1 */
|
|
keys[1] = 98; values[1] = 102;
|
|
i = pSHSearchMapInt(keys, values, 1, keys[1]);
|
|
ok(i == -1, "Len 1 - array len 2, expected -1, got %d\n", i);
|
|
|
|
/* 2 elements, len = 2 */
|
|
i = pSHSearchMapInt(keys, values, 2, keys[1]);
|
|
ok(i == values[1], "Len 2, expected %d, got %d\n", values[1], i);
|
|
|
|
/* Searches forward */
|
|
keys[2] = 99; values[2] = 103;
|
|
i = pSHSearchMapInt(keys, values, 3, keys[0]);
|
|
ok(i == values[0], "Len 3, expected %d, got %d\n", values[0], i);
|
|
}
|
|
|
|
static void test_alloc_shared(void)
|
|
{
|
|
DWORD procid;
|
|
HANDLE hmem;
|
|
int val;
|
|
int* p;
|
|
BOOL ret;
|
|
|
|
procid=GetCurrentProcessId();
|
|
hmem=pSHAllocShared(NULL,10,procid);
|
|
ok(hmem!=NULL,"SHAllocShared(NULL...) failed: %u\n", GetLastError());
|
|
ret = pSHFreeShared(hmem, procid);
|
|
ok( ret, "SHFreeShared failed: %u\n", GetLastError());
|
|
|
|
val=0x12345678;
|
|
hmem=pSHAllocShared(&val,4,procid);
|
|
ok(hmem!=NULL,"SHAllocShared(NULL...) failed: %u\n", GetLastError());
|
|
|
|
p=pSHLockShared(hmem,procid);
|
|
ok(p!=NULL,"SHLockShared failed: %u\n", GetLastError());
|
|
if (p!=NULL)
|
|
ok(*p==val,"Wrong value in shared memory: %d instead of %d\n",*p,val);
|
|
ret = pSHUnlockShared(p);
|
|
ok( ret, "SHUnlockShared failed: %u\n", GetLastError());
|
|
|
|
ret = pSHFreeShared(hmem, procid);
|
|
ok( ret, "SHFreeShared failed: %u\n", GetLastError());
|
|
}
|
|
|
|
static void test_fdsa(void)
|
|
{
|
|
typedef struct
|
|
{
|
|
DWORD num_items; /* Number of elements inserted */
|
|
void *mem; /* Ptr to array */
|
|
DWORD blocks_alloced; /* Number of elements allocated */
|
|
BYTE inc; /* Number of elements to grow by when we need to expand */
|
|
BYTE block_size; /* Size in bytes of an element */
|
|
BYTE flags; /* Flags */
|
|
} FDSA_info;
|
|
|
|
BOOL (WINAPI *pFDSA_Initialize)(DWORD block_size, DWORD inc, FDSA_info *info, void *mem,
|
|
DWORD init_blocks);
|
|
BOOL (WINAPI *pFDSA_Destroy)(FDSA_info *info);
|
|
DWORD (WINAPI *pFDSA_InsertItem)(FDSA_info *info, DWORD where, const void *block);
|
|
BOOL (WINAPI *pFDSA_DeleteItem)(FDSA_info *info, DWORD where);
|
|
|
|
FDSA_info info;
|
|
int block_size = 10, init_blocks = 4, inc = 2;
|
|
DWORD ret;
|
|
char *mem;
|
|
|
|
pFDSA_Initialize = (void *)GetProcAddress(hShlwapi, (LPSTR)208);
|
|
pFDSA_Destroy = (void *)GetProcAddress(hShlwapi, (LPSTR)209);
|
|
pFDSA_InsertItem = (void *)GetProcAddress(hShlwapi, (LPSTR)210);
|
|
pFDSA_DeleteItem = (void *)GetProcAddress(hShlwapi, (LPSTR)211);
|
|
|
|
mem = HeapAlloc(GetProcessHeap(), 0, block_size * init_blocks);
|
|
memset(&info, 0, sizeof(info));
|
|
|
|
ok(pFDSA_Initialize(block_size, inc, &info, mem, init_blocks), "FDSA_Initialize rets FALSE\n");
|
|
ok(info.num_items == 0, "num_items = %d\n", info.num_items);
|
|
ok(info.mem == mem, "mem = %p\n", info.mem);
|
|
ok(info.blocks_alloced == init_blocks, "blocks_alloced = %d\n", info.blocks_alloced);
|
|
ok(info.inc == inc, "inc = %d\n", info.inc);
|
|
ok(info.block_size == block_size, "block_size = %d\n", info.block_size);
|
|
ok(info.flags == 0, "flags = %d\n", info.flags);
|
|
|
|
ret = pFDSA_InsertItem(&info, 1234, "1234567890");
|
|
ok(ret == 0, "ret = %d\n", ret);
|
|
ok(info.num_items == 1, "num_items = %d\n", info.num_items);
|
|
ok(info.mem == mem, "mem = %p\n", info.mem);
|
|
ok(info.blocks_alloced == init_blocks, "blocks_alloced = %d\n", info.blocks_alloced);
|
|
ok(info.inc == inc, "inc = %d\n", info.inc);
|
|
ok(info.block_size == block_size, "block_size = %d\n", info.block_size);
|
|
ok(info.flags == 0, "flags = %d\n", info.flags);
|
|
|
|
ret = pFDSA_InsertItem(&info, 1234, "abcdefghij");
|
|
ok(ret == 1, "ret = %d\n", ret);
|
|
|
|
ret = pFDSA_InsertItem(&info, 1, "klmnopqrst");
|
|
ok(ret == 1, "ret = %d\n", ret);
|
|
|
|
ret = pFDSA_InsertItem(&info, 0, "uvwxyzABCD");
|
|
ok(ret == 0, "ret = %d\n", ret);
|
|
ok(info.mem == mem, "mem = %p\n", info.mem);
|
|
ok(info.flags == 0, "flags = %d\n", info.flags);
|
|
|
|
/* This next InsertItem will cause shlwapi to allocate its own mem buffer */
|
|
ret = pFDSA_InsertItem(&info, 0, "EFGHIJKLMN");
|
|
ok(ret == 0, "ret = %d\n", ret);
|
|
ok(info.mem != mem, "mem = %p\n", info.mem);
|
|
ok(info.blocks_alloced == init_blocks + inc, "blocks_alloced = %d\n", info.blocks_alloced);
|
|
ok(info.flags == 0x1, "flags = %d\n", info.flags);
|
|
|
|
ok(!memcmp(info.mem, "EFGHIJKLMNuvwxyzABCD1234567890klmnopqrstabcdefghij", 50), "mem %s\n", (char*)info.mem);
|
|
|
|
ok(pFDSA_DeleteItem(&info, 2), "rets FALSE\n");
|
|
ok(info.mem != mem, "mem = %p\n", info.mem);
|
|
ok(info.blocks_alloced == init_blocks + inc, "blocks_alloced = %d\n", info.blocks_alloced);
|
|
ok(info.flags == 0x1, "flags = %d\n", info.flags);
|
|
|
|
ok(!memcmp(info.mem, "EFGHIJKLMNuvwxyzABCDklmnopqrstabcdefghij", 40), "mem %s\n", (char*)info.mem);
|
|
|
|
ok(pFDSA_DeleteItem(&info, 3), "rets FALSE\n");
|
|
ok(info.mem != mem, "mem = %p\n", info.mem);
|
|
ok(info.blocks_alloced == init_blocks + inc, "blocks_alloced = %d\n", info.blocks_alloced);
|
|
ok(info.flags == 0x1, "flags = %d\n", info.flags);
|
|
|
|
ok(!memcmp(info.mem, "EFGHIJKLMNuvwxyzABCDklmnopqrst", 30), "mem %s\n", (char*)info.mem);
|
|
|
|
ok(!pFDSA_DeleteItem(&info, 4), "does not ret FALSE\n");
|
|
|
|
/* As shlwapi has allocated memory internally, Destroy will ret FALSE */
|
|
ok(!pFDSA_Destroy(&info), "FDSA_Destroy does not ret FALSE\n");
|
|
|
|
|
|
/* When Initialize is called with inc = 0, set it to 1 */
|
|
ok(pFDSA_Initialize(block_size, 0, &info, mem, init_blocks), "FDSA_Initialize rets FALSE\n");
|
|
ok(info.inc == 1, "inc = %d\n", info.inc);
|
|
|
|
/* This time, because shlwapi hasn't had to allocate memory
|
|
internally, Destroy rets non-zero */
|
|
ok(pFDSA_Destroy(&info), "FDSA_Destroy rets FALSE\n");
|
|
|
|
|
|
HeapFree(GetProcessHeap(), 0, mem);
|
|
}
|
|
|
|
|
|
typedef struct SHELL_USER_SID {
|
|
SID_IDENTIFIER_AUTHORITY sidAuthority;
|
|
DWORD dwUserGroupID;
|
|
DWORD dwUserID;
|
|
} SHELL_USER_SID, *PSHELL_USER_SID;
|
|
typedef struct SHELL_USER_PERMISSION {
|
|
SHELL_USER_SID susID;
|
|
DWORD dwAccessType;
|
|
BOOL fInherit;
|
|
DWORD dwAccessMask;
|
|
DWORD dwInheritMask;
|
|
DWORD dwInheritAccessMask;
|
|
} SHELL_USER_PERMISSION, *PSHELL_USER_PERMISSION;
|
|
static void test_GetShellSecurityDescriptor(void)
|
|
{
|
|
SHELL_USER_PERMISSION supCurrentUserFull = {
|
|
{ {SECURITY_NULL_SID_AUTHORITY}, 0, 0 },
|
|
ACCESS_ALLOWED_ACE_TYPE, FALSE,
|
|
GENERIC_ALL, 0, 0 };
|
|
#define MY_INHERITANCE 0xBE /* invalid value to proof behavior */
|
|
SHELL_USER_PERMISSION supEveryoneDenied = {
|
|
{ {SECURITY_WORLD_SID_AUTHORITY}, SECURITY_WORLD_RID, 0 },
|
|
ACCESS_DENIED_ACE_TYPE, TRUE,
|
|
GENERIC_WRITE, MY_INHERITANCE | 0xDEADBA00, GENERIC_READ };
|
|
PSHELL_USER_PERMISSION rgsup[2] = {
|
|
&supCurrentUserFull, &supEveryoneDenied,
|
|
};
|
|
SECURITY_DESCRIPTOR* psd;
|
|
SECURITY_DESCRIPTOR* (WINAPI*pGetShellSecurityDescriptor)(PSHELL_USER_PERMISSION*,int);
|
|
|
|
pGetShellSecurityDescriptor=(void*)GetProcAddress(hShlwapi,(char*)475);
|
|
|
|
if(!pGetShellSecurityDescriptor)
|
|
{
|
|
win_skip("GetShellSecurityDescriptor not available\n");
|
|
return;
|
|
}
|
|
|
|
psd = pGetShellSecurityDescriptor(NULL, 2);
|
|
ok(psd==NULL ||
|
|
broken(psd==INVALID_HANDLE_VALUE), /* IE5 */
|
|
"GetShellSecurityDescriptor should fail\n");
|
|
psd = pGetShellSecurityDescriptor(rgsup, 0);
|
|
ok(psd==NULL, "GetShellSecurityDescriptor should fail\n");
|
|
|
|
SetLastError(0xdeadbeef);
|
|
psd = pGetShellSecurityDescriptor(rgsup, 2);
|
|
if (psd == NULL && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)
|
|
{
|
|
/* The previous calls to GetShellSecurityDescriptor don't set the last error */
|
|
win_skip("GetShellSecurityDescriptor is not implemented\n");
|
|
return;
|
|
}
|
|
if (psd==INVALID_HANDLE_VALUE)
|
|
{
|
|
win_skip("GetShellSecurityDescriptor is broken on IE5\n");
|
|
return;
|
|
}
|
|
ok(psd!=NULL, "GetShellSecurityDescriptor failed\n");
|
|
if (psd!=NULL)
|
|
{
|
|
BOOL bHasDacl = FALSE, bDefaulted;
|
|
PACL pAcl;
|
|
DWORD dwRev;
|
|
SECURITY_DESCRIPTOR_CONTROL control;
|
|
|
|
ok(IsValidSecurityDescriptor(psd), "returned value is not valid SD\n");
|
|
|
|
ok(GetSecurityDescriptorControl(psd, &control, &dwRev),
|
|
"GetSecurityDescriptorControl failed with error %u\n", GetLastError());
|
|
ok(0 == (control & SE_SELF_RELATIVE), "SD should be absolute\n");
|
|
|
|
ok(GetSecurityDescriptorDacl(psd, &bHasDacl, &pAcl, &bDefaulted),
|
|
"GetSecurityDescriptorDacl failed with error %u\n", GetLastError());
|
|
|
|
ok(bHasDacl, "SD has no DACL\n");
|
|
if (bHasDacl)
|
|
{
|
|
ok(!bDefaulted, "DACL should not be defaulted\n");
|
|
|
|
ok(pAcl != NULL, "NULL DACL!\n");
|
|
if (pAcl != NULL)
|
|
{
|
|
ACL_SIZE_INFORMATION asiSize;
|
|
|
|
ok(IsValidAcl(pAcl), "DACL is not valid\n");
|
|
|
|
ok(GetAclInformation(pAcl, &asiSize, sizeof(asiSize), AclSizeInformation),
|
|
"GetAclInformation failed with error %u\n", GetLastError());
|
|
|
|
ok(asiSize.AceCount == 3, "Incorrect number of ACEs: %d entries\n", asiSize.AceCount);
|
|
if (asiSize.AceCount == 3)
|
|
{
|
|
ACCESS_ALLOWED_ACE *paaa; /* will use for DENIED too */
|
|
|
|
ok(GetAce(pAcl, 0, (LPVOID*)&paaa), "GetAce failed with error %u\n", GetLastError());
|
|
ok(paaa->Header.AceType == ACCESS_ALLOWED_ACE_TYPE,
|
|
"Invalid ACE type %d\n", paaa->Header.AceType);
|
|
ok(paaa->Header.AceFlags == 0, "Invalid ACE flags %x\n", paaa->Header.AceFlags);
|
|
ok(paaa->Mask == GENERIC_ALL, "Invalid ACE mask %x\n", paaa->Mask);
|
|
|
|
ok(GetAce(pAcl, 1, (LPVOID*)&paaa), "GetAce failed with error %u\n", GetLastError());
|
|
ok(paaa->Header.AceType == ACCESS_DENIED_ACE_TYPE,
|
|
"Invalid ACE type %d\n", paaa->Header.AceType);
|
|
/* first one of two ACEs generated from inheritable entry - without inheritance */
|
|
ok(paaa->Header.AceFlags == 0, "Invalid ACE flags %x\n", paaa->Header.AceFlags);
|
|
ok(paaa->Mask == GENERIC_WRITE, "Invalid ACE mask %x\n", paaa->Mask);
|
|
|
|
ok(GetAce(pAcl, 2, (LPVOID*)&paaa), "GetAce failed with error %u\n", GetLastError());
|
|
ok(paaa->Header.AceType == ACCESS_DENIED_ACE_TYPE,
|
|
"Invalid ACE type %d\n", paaa->Header.AceType);
|
|
/* second ACE - with inheritance */
|
|
ok(paaa->Header.AceFlags == MY_INHERITANCE,
|
|
"Invalid ACE flags %x\n", paaa->Header.AceFlags);
|
|
ok(paaa->Mask == GENERIC_READ, "Invalid ACE mask %x\n", paaa->Mask);
|
|
}
|
|
}
|
|
}
|
|
|
|
LocalFree(psd);
|
|
}
|
|
}
|
|
|
|
static void test_SHPackDispParams(void)
|
|
{
|
|
DISPPARAMS params;
|
|
VARIANT vars[10];
|
|
HRESULT hres;
|
|
|
|
if(!pSHPackDispParams)
|
|
win_skip("SHPackSidpParams not available\n");
|
|
|
|
memset(¶ms, 0xc0, sizeof(params));
|
|
memset(vars, 0xc0, sizeof(vars));
|
|
hres = pSHPackDispParams(¶ms, vars, 1, VT_I4, 0xdeadbeef);
|
|
ok(hres == S_OK, "SHPackDispParams failed: %08x\n", hres);
|
|
ok(params.cArgs == 1, "params.cArgs = %d\n", params.cArgs);
|
|
ok(params.cNamedArgs == 0, "params.cNamedArgs = %d\n", params.cArgs);
|
|
ok(params.rgdispidNamedArgs == NULL, "params.rgdispidNamedArgs = %p\n", params.rgdispidNamedArgs);
|
|
ok(params.rgvarg == vars, "params.rgvarg = %p\n", params.rgvarg);
|
|
ok(V_VT(vars) == VT_I4, "V_VT(var) = %d\n", V_VT(vars));
|
|
ok(V_I4(vars) == 0xdeadbeef, "failed %x\n", V_I4(vars));
|
|
|
|
memset(¶ms, 0xc0, sizeof(params));
|
|
hres = pSHPackDispParams(¶ms, NULL, 0, 0);
|
|
ok(hres == S_OK, "SHPackDispParams failed: %08x\n", hres);
|
|
ok(params.cArgs == 0, "params.cArgs = %d\n", params.cArgs);
|
|
ok(params.cNamedArgs == 0, "params.cNamedArgs = %d\n", params.cArgs);
|
|
ok(params.rgdispidNamedArgs == NULL, "params.rgdispidNamedArgs = %p\n", params.rgdispidNamedArgs);
|
|
ok(params.rgvarg == NULL, "params.rgvarg = %p\n", params.rgvarg);
|
|
|
|
memset(vars, 0xc0, sizeof(vars));
|
|
memset(¶ms, 0xc0, sizeof(params));
|
|
hres = pSHPackDispParams(¶ms, vars, 4, VT_BSTR, (void*)0xdeadbeef, VT_EMPTY, 10,
|
|
VT_I4, 100, VT_DISPATCH, (void*)0xdeadbeef);
|
|
ok(hres == S_OK, "SHPackDispParams failed: %08x\n", hres);
|
|
ok(params.cArgs == 4, "params.cArgs = %d\n", params.cArgs);
|
|
ok(params.cNamedArgs == 0, "params.cNamedArgs = %d\n", params.cArgs);
|
|
ok(params.rgdispidNamedArgs == NULL, "params.rgdispidNamedArgs = %p\n", params.rgdispidNamedArgs);
|
|
ok(params.rgvarg == vars, "params.rgvarg = %p\n", params.rgvarg);
|
|
ok(V_VT(vars) == VT_DISPATCH, "V_VT(vars[0]) = %x\n", V_VT(vars));
|
|
ok(V_I4(vars) == 0xdeadbeef, "V_I4(vars[0]) = %x\n", V_I4(vars));
|
|
ok(V_VT(vars+1) == VT_I4, "V_VT(vars[1]) = %d\n", V_VT(vars+1));
|
|
ok(V_I4(vars+1) == 100, "V_I4(vars[1]) = %x\n", V_I4(vars+1));
|
|
ok(V_VT(vars+2) == VT_I4, "V_VT(vars[2]) = %d\n", V_VT(vars+2));
|
|
ok(V_I4(vars+2) == 10, "V_I4(vars[2]) = %x\n", V_I4(vars+2));
|
|
ok(V_VT(vars+3) == VT_BSTR, "V_VT(vars[3]) = %d\n", V_VT(vars+3));
|
|
ok(V_BSTR(vars+3) == (void*)0xdeadbeef, "V_BSTR(vars[3]) = %p\n", V_BSTR(vars+3));
|
|
}
|
|
|
|
START_TEST(ordinal)
|
|
{
|
|
hShlwapi = GetModuleHandleA("shlwapi.dll");
|
|
|
|
pGetAcceptLanguagesA = (void*)GetProcAddress(hShlwapi, (LPSTR)14);
|
|
pSHSearchMapInt = (void*)GetProcAddress(hShlwapi, (LPSTR)198);
|
|
pSHAllocShared=(void*)GetProcAddress(hShlwapi,(char*)7);
|
|
pSHLockShared=(void*)GetProcAddress(hShlwapi,(char*)8);
|
|
pSHUnlockShared=(void*)GetProcAddress(hShlwapi,(char*)9);
|
|
pSHFreeShared=(void*)GetProcAddress(hShlwapi,(char*)10);
|
|
pSHPackDispParams=(void*)GetProcAddress(hShlwapi,(char*)282);
|
|
|
|
test_GetAcceptLanguagesA();
|
|
test_SHSearchMapInt();
|
|
test_alloc_shared();
|
|
test_fdsa();
|
|
test_GetShellSecurityDescriptor();
|
|
test_SHPackDispParams();
|
|
}
|