2542 lines
103 KiB
C
2542 lines
103 KiB
C
/*
|
|
* WinHTTP - tests
|
|
*
|
|
* Copyright 2008 Google (Zac Brown)
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#define COBJMACROS
|
|
#include <stdarg.h>
|
|
#include <stdlib.h>
|
|
#include <windef.h>
|
|
#include <winbase.h>
|
|
#include <winhttp.h>
|
|
#include <wincrypt.h>
|
|
#include <winreg.h>
|
|
#include <winsock.h>
|
|
#include "initguid.h"
|
|
#include <httprequest.h>
|
|
|
|
#include "wine/test.h"
|
|
|
|
static const WCHAR test_useragent[] =
|
|
{'W','i','n','e',' ','R','e','g','r','e','s','s','i','o','n',' ','T','e','s','t',0};
|
|
static const WCHAR test_server[] = {'w','i','n','e','h','q','.','o','r','g',0};
|
|
static const WCHAR localhostW[] = {'l','o','c','a','l','h','o','s','t',0};
|
|
|
|
static BOOL proxy_active(void)
|
|
{
|
|
WINHTTP_PROXY_INFO proxy_info;
|
|
BOOL active = FALSE;
|
|
|
|
if (WinHttpGetDefaultProxyConfiguration(&proxy_info))
|
|
{
|
|
active = (proxy_info.lpszProxy != NULL);
|
|
if (active)
|
|
GlobalFree((HGLOBAL) proxy_info.lpszProxy);
|
|
if (proxy_info.lpszProxyBypass != NULL)
|
|
GlobalFree((HGLOBAL) proxy_info.lpszProxyBypass);
|
|
}
|
|
else
|
|
active = FALSE;
|
|
|
|
return active;
|
|
}
|
|
|
|
static void test_QueryOption(void)
|
|
{
|
|
BOOL ret;
|
|
HINTERNET session, request, connection;
|
|
DWORD feature, size;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
session = WinHttpOpen(test_useragent, 0, 0, 0, 0);
|
|
ok(session != NULL, "WinHttpOpen failed to open session, error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(session, WINHTTP_OPTION_REDIRECT_POLICY, NULL, NULL);
|
|
ok(!ret, "should fail to set redirect policy %u\n", GetLastError());
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
size = 0xdeadbeef;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(session, WINHTTP_OPTION_REDIRECT_POLICY, NULL, &size);
|
|
ok(!ret, "should fail to query option\n");
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
ok(size == 4, "expected 4, got %u\n", size);
|
|
|
|
feature = 0xdeadbeef;
|
|
size = sizeof(feature) - 1;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(session, WINHTTP_OPTION_REDIRECT_POLICY, &feature, &size);
|
|
ok(!ret, "should fail to query option\n");
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
ok(size == 4, "expected 4, got %u\n", size);
|
|
|
|
feature = 0xdeadbeef;
|
|
size = sizeof(feature) + 1;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(session, WINHTTP_OPTION_REDIRECT_POLICY, &feature, &size);
|
|
ok(ret, "failed to query option %u\n", GetLastError());
|
|
ok(size == sizeof(feature), "WinHttpQueryOption should set the size: %u\n", size);
|
|
ok(feature == WINHTTP_OPTION_REDIRECT_POLICY_DISALLOW_HTTPS_TO_HTTP,
|
|
"expected WINHTTP_OPTION_REDIRECT_POLICY_DISALLOW_HTTPS_TO_HTTP, got %#x\n", feature);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(session, WINHTTP_OPTION_REDIRECT_POLICY, NULL, sizeof(feature));
|
|
ok(!ret, "should fail to set redirect policy %u\n", GetLastError());
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
feature = WINHTTP_OPTION_REDIRECT_POLICY_ALWAYS;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(session, WINHTTP_OPTION_REDIRECT_POLICY, &feature, sizeof(feature) - 1);
|
|
ok(!ret, "should fail to set redirect policy %u\n", GetLastError());
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
|
|
feature = WINHTTP_OPTION_REDIRECT_POLICY_ALWAYS;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(session, WINHTTP_OPTION_REDIRECT_POLICY, &feature, sizeof(feature) + 1);
|
|
ok(!ret, "should fail to set redirect policy %u\n", GetLastError());
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
|
|
feature = WINHTTP_OPTION_REDIRECT_POLICY_ALWAYS;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(session, WINHTTP_OPTION_REDIRECT_POLICY, &feature, sizeof(feature));
|
|
ok(ret, "failed to set redirect policy %u\n", GetLastError());
|
|
|
|
feature = 0xdeadbeef;
|
|
size = sizeof(feature);
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(session, WINHTTP_OPTION_REDIRECT_POLICY, &feature, &size);
|
|
ok(ret, "failed to query option %u\n", GetLastError());
|
|
ok(feature == WINHTTP_OPTION_REDIRECT_POLICY_ALWAYS,
|
|
"expected WINHTTP_OPTION_REDIRECT_POLICY_ALWAYS, got %#x\n", feature);
|
|
|
|
feature = WINHTTP_DISABLE_COOKIES;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(session, WINHTTP_OPTION_DISABLE_FEATURE, &feature, sizeof(feature));
|
|
ok(!ret, "should fail to set disable feature for a session\n");
|
|
ok(GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INCORRECT_HANDLE_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
connection = WinHttpConnect(session, test_server, INTERNET_DEFAULT_HTTP_PORT, 0);
|
|
ok(connection != NULL, "WinHttpConnect failed to open a connection, error: %u\n", GetLastError());
|
|
|
|
feature = WINHTTP_DISABLE_COOKIES;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(connection, WINHTTP_OPTION_DISABLE_FEATURE, &feature, sizeof(feature));
|
|
ok(!ret, "should fail to set disable feature for a connection\n");
|
|
ok(GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INCORRECT_HANDLE_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
request = WinHttpOpenRequest(connection, NULL, NULL, NULL, WINHTTP_NO_REFERER,
|
|
WINHTTP_DEFAULT_ACCEPT_TYPES, 0);
|
|
if (request == NULL && GetLastError() == ERROR_WINHTTP_NAME_NOT_RESOLVED)
|
|
{
|
|
skip("Network unreachable, skipping the test\n");
|
|
goto done;
|
|
}
|
|
|
|
feature = 0xdeadbeef;
|
|
size = sizeof(feature);
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(request, WINHTTP_OPTION_DISABLE_FEATURE, &feature, &size);
|
|
ok(!ret, "should fail to query disable feature for a request\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
feature = 0;
|
|
size = sizeof(feature);
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(request, WINHTTP_OPTION_DISABLE_FEATURE, &feature, sizeof(feature));
|
|
ok(ret, "failed to set feature %u\n", GetLastError());
|
|
|
|
feature = 0xffffffff;
|
|
size = sizeof(feature);
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(request, WINHTTP_OPTION_DISABLE_FEATURE, &feature, sizeof(feature));
|
|
ok(ret, "failed to set feature %u\n", GetLastError());
|
|
|
|
feature = WINHTTP_DISABLE_COOKIES;
|
|
size = sizeof(feature);
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetOption(request, WINHTTP_OPTION_DISABLE_FEATURE, &feature, sizeof(feature));
|
|
ok(ret, "failed to set feature %u\n", GetLastError());
|
|
|
|
size = 0;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryOption(request, WINHTTP_OPTION_DISABLE_FEATURE, NULL, &size);
|
|
ok(!ret, "should fail to query disable feature for a request\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpCloseHandle(request);
|
|
ok(ret, "WinHttpCloseHandle failed on closing request: %u\n", GetLastError());
|
|
|
|
done:
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpCloseHandle(connection);
|
|
ok(ret, "WinHttpCloseHandle failed on closing connection: %u\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpCloseHandle(session);
|
|
ok(ret, "WinHttpCloseHandle failed on closing session: %u\n", GetLastError());
|
|
}
|
|
|
|
static void test_OpenRequest (void)
|
|
{
|
|
BOOL ret;
|
|
HINTERNET session, request, connection;
|
|
|
|
session = WinHttpOpen(test_useragent, WINHTTP_ACCESS_TYPE_DEFAULT_PROXY,
|
|
WINHTTP_NO_PROXY_NAME, WINHTTP_NO_PROXY_BYPASS, 0);
|
|
ok(session != NULL, "WinHttpOpen failed to open session.\n");
|
|
|
|
/* Test with a bad server name */
|
|
SetLastError(0xdeadbeef);
|
|
connection = WinHttpConnect(session, NULL, INTERNET_DEFAULT_HTTP_PORT, 0);
|
|
ok (connection == NULL, "WinHttpConnect succeeded in opening connection to NULL server argument.\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER, got %u.\n", GetLastError());
|
|
|
|
/* Test with a valid server name */
|
|
connection = WinHttpConnect (session, test_server, INTERNET_DEFAULT_HTTP_PORT, 0);
|
|
ok(connection != NULL, "WinHttpConnect failed to open a connection, error: %u.\n", GetLastError());
|
|
|
|
request = WinHttpOpenRequest(connection, NULL, NULL, NULL, WINHTTP_NO_REFERER,
|
|
WINHTTP_DEFAULT_ACCEPT_TYPES, 0);
|
|
if (request == NULL && GetLastError() == ERROR_WINHTTP_NAME_NOT_RESOLVED)
|
|
{
|
|
skip("Network unreachable, skipping.\n");
|
|
goto done;
|
|
}
|
|
ok(request != NULL, "WinHttpOpenrequest failed to open a request, error: %u.\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(request, WINHTTP_NO_ADDITIONAL_HEADERS, 0, NULL, 0, 0, 0);
|
|
if (!ret && GetLastError() == ERROR_WINHTTP_CANNOT_CONNECT)
|
|
{
|
|
skip("Connection failed, skipping.\n");
|
|
goto done;
|
|
}
|
|
ok(ret == TRUE, "WinHttpSendRequest failed: %u\n", GetLastError());
|
|
ret = WinHttpCloseHandle(request);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing request, got %d.\n", ret);
|
|
|
|
done:
|
|
ret = WinHttpCloseHandle(connection);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing connection, got %d.\n", ret);
|
|
ret = WinHttpCloseHandle(session);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing session, got %d.\n", ret);
|
|
|
|
}
|
|
|
|
static void test_empty_headers_param(void)
|
|
{
|
|
static const WCHAR winehq[] = {'w','i','n','e','h','q','.','o','r','g',0};
|
|
static const WCHAR empty[] = {0};
|
|
HINTERNET ses, con, req;
|
|
BOOL ret;
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, winehq, 80, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, empty, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_SendRequest (void)
|
|
{
|
|
HINTERNET session, request, connection;
|
|
DWORD header_len, optional_len, total_len, bytes_rw, size;
|
|
DWORD_PTR context;
|
|
BOOL ret;
|
|
CHAR buffer[256];
|
|
int i;
|
|
|
|
static const WCHAR test_site[] = {'c','r','o','s','s','o','v','e','r','.',
|
|
'c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',0};
|
|
static const WCHAR content_type[] =
|
|
{'C','o','n','t','e','n','t','-','T','y','p','e',':',' ','a','p','p','l','i','c','a','t','i','o','n',
|
|
'/','x','-','w','w','w','-','f','o','r','m','-','u','r','l','e','n','c','o','d','e','d',0};
|
|
static const WCHAR test_file[] = {'/','p','o','s','t','t','e','s','t','.','p','h','p',0};
|
|
static const WCHAR test_verb[] = {'P','O','S','T',0};
|
|
static CHAR post_data[] = "mode=Test";
|
|
static CHAR test_post[] = "mode => Test\\0\n";
|
|
|
|
header_len = -1L;
|
|
total_len = optional_len = sizeof(post_data);
|
|
memset(buffer, 0xff, sizeof(buffer));
|
|
|
|
session = WinHttpOpen(test_useragent, WINHTTP_ACCESS_TYPE_DEFAULT_PROXY,
|
|
WINHTTP_NO_PROXY_NAME, WINHTTP_NO_PROXY_BYPASS, 0);
|
|
ok(session != NULL, "WinHttpOpen failed to open session.\n");
|
|
|
|
connection = WinHttpConnect (session, test_site, INTERNET_DEFAULT_HTTP_PORT, 0);
|
|
ok(connection != NULL, "WinHttpConnect failed to open a connection, error: %u.\n", GetLastError());
|
|
|
|
request = WinHttpOpenRequest(connection, test_verb, test_file, NULL, WINHTTP_NO_REFERER,
|
|
WINHTTP_DEFAULT_ACCEPT_TYPES, WINHTTP_FLAG_BYPASS_PROXY_CACHE);
|
|
if (request == NULL && GetLastError() == ERROR_WINHTTP_NAME_NOT_RESOLVED)
|
|
{
|
|
skip("Network unreachable, skipping.\n");
|
|
goto done;
|
|
}
|
|
ok(request != NULL, "WinHttpOpenrequest failed to open a request, error: %u.\n", GetLastError());
|
|
if (!request) goto done;
|
|
|
|
context = 0xdeadbeef;
|
|
ret = WinHttpSetOption(request, WINHTTP_OPTION_CONTEXT_VALUE, &context, sizeof(context));
|
|
ok(ret, "WinHttpSetOption failed: %u\n", GetLastError());
|
|
|
|
context++;
|
|
ret = WinHttpSendRequest(request, content_type, header_len, post_data, optional_len, total_len, context);
|
|
ok(ret == TRUE, "WinHttpSendRequest failed: %u\n", GetLastError());
|
|
|
|
context = 0;
|
|
size = sizeof(context);
|
|
ret = WinHttpQueryOption(request, WINHTTP_OPTION_CONTEXT_VALUE, &context, &size);
|
|
ok(ret, "WinHttpQueryOption failed: %u\n", GetLastError());
|
|
ok(context == 0xdeadbef0, "expected 0xdeadbef0, got %lx\n", context);
|
|
|
|
for (i = 3; post_data[i]; i++)
|
|
{
|
|
bytes_rw = -1;
|
|
ret = WinHttpWriteData(request, &post_data[i], 1, &bytes_rw);
|
|
if (ret)
|
|
ok(bytes_rw == 1, "WinHttpWriteData failed, wrote %u bytes instead of 1 byte.\n", bytes_rw);
|
|
else /* Since we already passed all optional data in WinHttpSendRequest Win7 fails our WinHttpWriteData call */
|
|
{
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "Expected ERROR_INVALID_PARAMETER got %u.\n", GetLastError());
|
|
ok(bytes_rw == -1, "Expected bytes_rw to remain unchanged.\n");
|
|
}
|
|
}
|
|
|
|
ret = WinHttpReceiveResponse(request, NULL);
|
|
ok(ret == TRUE, "WinHttpReceiveResponse failed: %u.\n", GetLastError());
|
|
|
|
bytes_rw = -1;
|
|
ret = WinHttpReadData(request, buffer, sizeof(buffer) - 1, &bytes_rw);
|
|
ok(ret == TRUE, "WinHttpReadData failed: %u.\n", GetLastError());
|
|
|
|
ok(bytes_rw == strlen(test_post), "Read %u bytes instead of %d.\n", bytes_rw, lstrlen(test_post));
|
|
ok(strncmp(buffer, test_post, bytes_rw) == 0, "Data read did not match, got '%s'.\n", buffer);
|
|
|
|
ret = WinHttpCloseHandle(request);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing request, got %d.\n", ret);
|
|
done:
|
|
ret = WinHttpCloseHandle(connection);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing connection, got %d.\n", ret);
|
|
ret = WinHttpCloseHandle(session);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing session, got %d.\n", ret);
|
|
}
|
|
|
|
static void test_WinHttpTimeFromSystemTime(void)
|
|
{
|
|
BOOL ret;
|
|
static const SYSTEMTIME time = {2008, 7, 1, 28, 10, 5, 52, 0};
|
|
static const WCHAR expected_string[] =
|
|
{'M','o','n',',',' ','2','8',' ','J','u','l',' ','2','0','0','8',' ',
|
|
'1','0',':','0','5',':','5','2',' ','G','M','T',0};
|
|
WCHAR time_string[WINHTTP_TIME_FORMAT_BUFSIZE+1];
|
|
|
|
ret = WinHttpTimeFromSystemTime(&time, time_string);
|
|
ok(ret == TRUE, "WinHttpTimeFromSystemTime failed: %u\n", GetLastError());
|
|
ok(memcmp(time_string, expected_string, sizeof(expected_string)) == 0,
|
|
"Time string returned did not match expected time string.\n");
|
|
}
|
|
|
|
static void test_WinHttpTimeToSystemTime(void)
|
|
{
|
|
BOOL ret;
|
|
SYSTEMTIME time;
|
|
static const SYSTEMTIME expected_time = {2008, 7, 1, 28, 10, 5, 52, 0};
|
|
static const WCHAR time_string1[] =
|
|
{'M','o','n',',',' ','2','8',' ','J','u','l',' ','2','0','0','8',' ',
|
|
+ '1','0',':','0','5',':','5','2',' ','G','M','T','\n',0};
|
|
static const WCHAR time_string2[] =
|
|
{' ','m','o','n',' ','2','8',' ','j','u','l',' ','2','0','0','8',' ',
|
|
'1','0',' ','0','5',' ','5','2','\n',0};
|
|
|
|
ret = WinHttpTimeToSystemTime(time_string1, &time);
|
|
ok(ret == TRUE, "WinHttpTimeToSystemTime failed: %u\n", GetLastError());
|
|
ok(memcmp(&time, &expected_time, sizeof(SYSTEMTIME)) == 0,
|
|
"Returned SYSTEMTIME structure did not match expected SYSTEMTIME structure.\n");
|
|
|
|
ret = WinHttpTimeToSystemTime(time_string2, &time);
|
|
ok(ret == TRUE, "WinHttpTimeToSystemTime failed: %u\n", GetLastError());
|
|
ok(memcmp(&time, &expected_time, sizeof(SYSTEMTIME)) == 0,
|
|
"Returned SYSTEMTIME structure did not match expected SYSTEMTIME structure.\n");
|
|
}
|
|
|
|
static void test_WinHttpAddHeaders(void)
|
|
{
|
|
HINTERNET session, request, connection;
|
|
BOOL ret, reverse;
|
|
WCHAR buffer[MAX_PATH];
|
|
WCHAR check_buffer[MAX_PATH];
|
|
DWORD index, len, oldlen;
|
|
|
|
static const WCHAR test_site[] = {'c','r','o','s','s','o','v','e','r','.',
|
|
'c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',0};
|
|
static const WCHAR test_file[] = {'/','p','o','s','t','t','e','s','t','.','p','h','p',0};
|
|
static const WCHAR test_verb[] = {'P','O','S','T',0};
|
|
|
|
static const WCHAR test_header_begin[] =
|
|
{'P','O','S','T',' ','/','p','o','s','t','t','e','s','t','.','p','h','p',' ','H','T','T','P','/','1'};
|
|
static const WCHAR full_path_test_header_begin[] =
|
|
{'P','O','S','T',' ','h','t','t','p',':','/','/','c','r','o','s','s','o','v','e','r','.','c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',':','8','0','/','p','o','s','t','t','e','s','t','.','p','h','p',' ','H','T','T','P','/','1'};
|
|
static const WCHAR test_header_end[] = {'\r','\n','\r','\n',0};
|
|
static const WCHAR test_header_name[] = {'W','a','r','n','i','n','g',0};
|
|
|
|
static const WCHAR test_flag_coalesce[] = {'t','e','s','t','2',',',' ','t','e','s','t','4',0};
|
|
static const WCHAR test_flag_coalesce_reverse[] = {'t','e','s','t','3',',',' ','t','e','s','t','4',0};
|
|
static const WCHAR test_flag_coalesce_comma[] =
|
|
{'t','e','s','t','2',',',' ','t','e','s','t','4',',',' ','t','e','s','t','5',0};
|
|
static const WCHAR test_flag_coalesce_comma_reverse[] =
|
|
{'t','e','s','t','3',',',' ','t','e','s','t','4',',',' ','t','e','s','t','5',0};
|
|
static const WCHAR test_flag_coalesce_semicolon[] =
|
|
{'t','e','s','t','2',',',' ','t','e','s','t','4',',',' ','t','e','s','t','5',';',' ','t','e','s','t','6',0};
|
|
static const WCHAR test_flag_coalesce_semicolon_reverse[] =
|
|
{'t','e','s','t','3',',',' ','t','e','s','t','4',',',' ','t','e','s','t','5',';',' ','t','e','s','t','6',0};
|
|
|
|
static const WCHAR field[] = {'f','i','e','l','d',0};
|
|
static const WCHAR value[] = {'v','a','l','u','e',' ',0};
|
|
static const WCHAR value_nospace[] = {'v','a','l','u','e',0};
|
|
|
|
static const WCHAR test_headers[][14] =
|
|
{
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','1',0},
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','2',0},
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','3',0},
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','4',0},
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','5',0},
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','6',0},
|
|
{'W','a','r','n','i','n','g',':','t','e','s','t','7',0},
|
|
{0},
|
|
{':',0},
|
|
{'a',':',0},
|
|
{':','b',0},
|
|
{'c','d',0},
|
|
{' ','e',' ',':','f',0},
|
|
{'f','i','e','l','d',':',' ','v','a','l','u','e',' ',0}
|
|
};
|
|
static const WCHAR test_indices[][6] =
|
|
{
|
|
{'t','e','s','t','1',0},
|
|
{'t','e','s','t','2',0},
|
|
{'t','e','s','t','3',0},
|
|
{'t','e','s','t','4',0}
|
|
};
|
|
|
|
session = WinHttpOpen(test_useragent, WINHTTP_ACCESS_TYPE_DEFAULT_PROXY,
|
|
WINHTTP_NO_PROXY_NAME, WINHTTP_NO_PROXY_BYPASS, 0);
|
|
ok(session != NULL, "WinHttpOpen failed to open session.\n");
|
|
|
|
connection = WinHttpConnect (session, test_site, INTERNET_DEFAULT_HTTP_PORT, 0);
|
|
ok(connection != NULL, "WinHttpConnect failed to open a connection, error: %u.\n", GetLastError());
|
|
|
|
request = WinHttpOpenRequest(connection, test_verb, test_file, NULL, WINHTTP_NO_REFERER,
|
|
WINHTTP_DEFAULT_ACCEPT_TYPES, 0);
|
|
if (request == NULL && GetLastError() == ERROR_WINHTTP_NAME_NOT_RESOLVED)
|
|
{
|
|
skip("Network unreachable, skipping.\n");
|
|
goto done;
|
|
}
|
|
ok(request != NULL, "WinHttpOpenRequest failed to open a request, error: %u.\n", GetLastError());
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded, found 'Warning' header.\n");
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[0], -1L, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeader failed to add new header, got %d with error %u.\n", ret, GetLastError());
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed: header index not incremented\n");
|
|
ok(memcmp(buffer, test_indices[0], sizeof(test_indices[0])) == 0, "WinHttpQueryHeaders failed: incorrect string returned\n");
|
|
ok(len == 5*sizeof(WCHAR), "WinHttpQueryHeaders failed: invalid length returned, expected 5, got %d\n", len);
|
|
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded, second index should not exist.\n");
|
|
|
|
/* Try to fetch the header info with a buffer that's big enough to fit the
|
|
* string but not the NULL terminator.
|
|
*/
|
|
index = 0;
|
|
len = 5*sizeof(WCHAR);
|
|
memset(check_buffer, 0xab, sizeof(check_buffer));
|
|
memcpy(buffer, check_buffer, sizeof(buffer));
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded with a buffer that's too small.\n");
|
|
ok(memcmp(buffer, check_buffer, sizeof(buffer)) == 0,
|
|
"WinHttpQueryHeaders failed, modified the buffer when it should not have.\n");
|
|
ok(len == 6*sizeof(WCHAR), "WinHttpQueryHeaders returned invalid length, expected 12, got %d\n", len);
|
|
|
|
/* Try with a NULL buffer */
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_RAW_HEADERS_CRLF | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, NULL, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded.\n");
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER, "Expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
ok(len > 40, "WinHttpQueryHeaders returned invalid length: expected greater than 40, got %d\n", len);
|
|
ok(index == 0, "WinHttpQueryHeaders incorrectly incremented header index.\n");
|
|
|
|
/* Try with a NULL buffer and a length that's too small */
|
|
index = 0;
|
|
len = 10;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_RAW_HEADERS_CRLF | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, NULL, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded.\n");
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"WinHttpQueryHeaders set incorrect error: expected ERROR_INSUFFICENT_BUFFER, go %u\n", GetLastError());
|
|
ok(len > 40, "WinHttpQueryHeaders returned invalid length: expected greater than 40, got %d\n", len);
|
|
ok(index == 0, "WinHttpQueryHeaders incorrectly incremented header index.\n");
|
|
|
|
index = 0;
|
|
len = 0;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_RAW_HEADERS_CRLF | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, NULL, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded.\n");
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"WinHttpQueryHeaders set incorrect error: expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
ok(len > 40, "WinHttpQueryHeaders returned invalid length: expected greater than 40, got %d\n", len);
|
|
ok(index == 0, "WinHttpQueryHeaders failed: index was incremented.\n");
|
|
|
|
/* valid query */
|
|
oldlen = len;
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
memset(buffer, 0xff, sizeof(buffer));
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_RAW_HEADERS_CRLF | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: got %d\n", ret);
|
|
ok(len + sizeof(WCHAR) <= oldlen, "WinHttpQueryHeaders resulting length longer than advertized.\n");
|
|
ok((len < sizeof(buffer) - sizeof(WCHAR)) && buffer[len / sizeof(WCHAR)] == 0, "WinHttpQueryHeaders did not append NULL terminator\n");
|
|
ok(len == lstrlenW(buffer) * sizeof(WCHAR), "WinHttpQueryHeaders returned incorrect length.\n");
|
|
ok(memcmp(buffer, test_header_begin, sizeof(test_header_begin)) == 0 ||
|
|
memcmp(buffer, full_path_test_header_begin, sizeof(full_path_test_header_begin)) == 0,
|
|
"WinHttpQueryHeaders returned invalid beginning of header string.\n");
|
|
ok(memcmp(buffer + lstrlenW(buffer) - 4, test_header_end, sizeof(test_header_end)) == 0,
|
|
"WinHttpQueryHeaders returned invalid end of header string.\n");
|
|
ok(index == 0, "WinHttpQueryHeaders incremented header index.\n");
|
|
|
|
index = 0;
|
|
len = 0;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_RAW_HEADERS | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, NULL, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders unexpectedly succeeded.\n");
|
|
ok(GetLastError() == ERROR_INSUFFICIENT_BUFFER,
|
|
"WinHttpQueryHeaders set incorrect error: expected ERROR_INSUFFICIENT_BUFFER, got %u\n", GetLastError());
|
|
ok(len > 40, "WinHttpQueryHeaders returned invalid length: expected greater than 40, got %d\n", len);
|
|
ok(index == 0, "WinHttpQueryHeaders failed: index was incremented.\n");
|
|
|
|
oldlen = len;
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
memset(buffer, 0xff, sizeof(buffer));
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_RAW_HEADERS | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed %u\n", GetLastError());
|
|
ok(len + sizeof(WCHAR) <= oldlen, "resulting length longer than advertized\n");
|
|
ok((len < sizeof(buffer) - sizeof(WCHAR)) && !buffer[len / sizeof(WCHAR)] && !buffer[len / sizeof(WCHAR) - 1],
|
|
"no double NULL terminator\n");
|
|
ok(memcmp(buffer, test_header_begin, sizeof(test_header_begin)) == 0 ||
|
|
memcmp(buffer, full_path_test_header_begin, sizeof(full_path_test_header_begin)) == 0,
|
|
"invalid beginning of header string.\n");
|
|
ok(index == 0, "header index was incremented\n");
|
|
|
|
/* tests for more indices */
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[1], -1L, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeaders failed to add duplicate header: %d\n", ret);
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[0], sizeof(test_indices[0])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[1], sizeof(test_indices[1])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[2], -1L, WINHTTP_ADDREQ_FLAG_REPLACE);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeaders failed to add duplicate header.\n");
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
reverse = (memcmp(buffer, test_indices[1], sizeof(test_indices[1])) != 0); /* Win7 returns values in reverse order of adding */
|
|
ok(memcmp(buffer, test_indices[reverse ? 2 : 1], sizeof(test_indices[reverse ? 2 : 1])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 1 : 2], sizeof(test_indices[reverse ? 1 : 2])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
/* add if new flag */
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[3], -1L, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW);
|
|
ok(ret == FALSE, "WinHttpAddRequestHeaders incorrectly replaced existing header.\n");
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 2 : 1], sizeof(test_indices[reverse ? 2 : 1])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 1 : 2], sizeof(test_indices[reverse ? 1 : 2])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders succeeded unexpectedly, found third header.\n");
|
|
|
|
/* coalesce flag */
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[3], -1L, WINHTTP_ADDREQ_FLAG_COALESCE);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeaders failed with flag WINHTTP_ADDREQ_FLAG_COALESCE.\n");
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, reverse ? test_flag_coalesce_reverse : test_flag_coalesce, sizeof(reverse ? test_flag_coalesce_reverse : test_flag_coalesce)) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 1 : 2], sizeof(test_indices[reverse ? 1 : 2])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders succeeded unexpectedly, found third header.\n");
|
|
|
|
/* coalesce with comma flag */
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[4], -1L, WINHTTP_ADDREQ_FLAG_COALESCE_WITH_COMMA);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeaders failed with flag WINHTTP_ADDREQ_FLAG_COALESCE_WITH_COMMA.\n");
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, reverse ? test_flag_coalesce_comma_reverse : test_flag_coalesce_comma, sizeof(reverse ? test_flag_coalesce_comma_reverse : test_flag_coalesce_comma)) == 0,
|
|
"WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 1 : 2], sizeof(test_indices[reverse ? 1 : 2])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders succeeded unexpectedly, found third header.\n");
|
|
|
|
|
|
/* coalesce with semicolon flag */
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[5], -1L, WINHTTP_ADDREQ_FLAG_COALESCE_WITH_SEMICOLON);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeaders failed with flag WINHTTP_ADDREQ_FLAG_COALESCE_WITH_SEMICOLON.\n");
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, reverse ? test_flag_coalesce_semicolon_reverse : test_flag_coalesce_semicolon, sizeof(reverse ? test_flag_coalesce_semicolon_reverse : test_flag_coalesce_semicolon)) == 0,
|
|
"WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 1 : 2], sizeof(test_indices[reverse ? 1 : 2])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders succeeded unexpectedly, found third header.\n");
|
|
|
|
/* add and replace flags */
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[3], -1L, WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE);
|
|
ok(ret == TRUE, "WinHttpAddRequestHeaders failed with flag WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE.\n");
|
|
|
|
index = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 1, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 3 : 2], sizeof(test_indices[reverse ? 3 : 2])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == TRUE, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(index == 2, "WinHttpQueryHeaders failed to increment index.\n");
|
|
ok(memcmp(buffer, test_indices[reverse ? 1 : 3], sizeof(test_indices[reverse ? 1 : 3])) == 0, "WinHttpQueryHeaders returned incorrect string.\n");
|
|
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
test_header_name, buffer, &len, &index);
|
|
ok(ret == FALSE, "WinHttpQueryHeaders succeeded unexpectedly, found third header.\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[8], ~0u, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(!ret, "WinHttpAddRequestHeaders failed\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[9], ~0u, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(ret, "WinHttpAddRequestHeaders failed\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[10], ~0u, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(!ret, "WinHttpAddRequestHeaders failed\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[11], ~0u, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(!ret, "WinHttpAddRequestHeaders failed\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[12], ~0u, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(!ret, "WinHttpAddRequestHeaders failed\n");
|
|
|
|
ret = WinHttpAddRequestHeaders(request, test_headers[13], ~0u, WINHTTP_ADDREQ_FLAG_ADD);
|
|
ok(ret, "WinHttpAddRequestHeaders failed\n");
|
|
|
|
index = 0;
|
|
buffer[0] = 0;
|
|
len = sizeof(buffer);
|
|
ret = WinHttpQueryHeaders(request, WINHTTP_QUERY_CUSTOM | WINHTTP_QUERY_FLAG_REQUEST_HEADERS,
|
|
field, buffer, &len, &index);
|
|
ok(ret, "WinHttpQueryHeaders failed: %u\n", GetLastError());
|
|
ok(!memcmp(buffer, value, sizeof(value)) || ! memcmp(buffer, value_nospace, sizeof(value_nospace)), "unexpected result\n");
|
|
|
|
ret = WinHttpCloseHandle(request);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing request, got %d.\n", ret);
|
|
done:
|
|
ret = WinHttpCloseHandle(connection);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing connection, got %d.\n", ret);
|
|
ret = WinHttpCloseHandle(session);
|
|
ok(ret == TRUE, "WinHttpCloseHandle failed on closing session, got %d.\n", ret);
|
|
|
|
}
|
|
|
|
static void test_secure_connection(void)
|
|
{
|
|
static const WCHAR google[] = {'w','w','w','.','g','o','o','g','l','e','.','c','o','m',0};
|
|
|
|
HINTERNET ses, con, req;
|
|
DWORD size, status, policy, bitness;
|
|
BOOL ret;
|
|
CERT_CONTEXT *cert;
|
|
WINHTTP_CERTIFICATE_INFO info;
|
|
char buffer[32];
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
policy = WINHTTP_OPTION_REDIRECT_POLICY_ALWAYS;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_REDIRECT_POLICY, &policy, sizeof(policy));
|
|
ok(ret, "failed to set redirect policy %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, google, 443, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
/* try without setting WINHTTP_FLAG_SECURE */
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
if (!ret && GetLastError() == ERROR_WINHTTP_CANNOT_CONNECT)
|
|
{
|
|
skip("Connection failed, skipping.\n");
|
|
goto cleanup;
|
|
}
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(!ret || proxy_active(), "succeeded unexpectedly\n");
|
|
|
|
size = 0;
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_RAW_HEADERS_CRLF, NULL, NULL, &size, NULL);
|
|
ok(!ret, "succeeded unexpectedly\n");
|
|
|
|
WinHttpCloseHandle(req);
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, WINHTTP_FLAG_SECURE);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
if (!ret)
|
|
{
|
|
skip("secure connection failed, skipping remaining secure tests\n");
|
|
goto cleanup;
|
|
}
|
|
|
|
size = sizeof(cert);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SERVER_CERT_CONTEXT, &cert, &size );
|
|
ok(ret, "failed to retrieve certificate context %u\n", GetLastError());
|
|
if (ret)
|
|
CertFreeCertificateContext(cert);
|
|
|
|
size = sizeof(bitness);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SECURITY_KEY_BITNESS, &bitness, &size );
|
|
ok(ret, "failed to retrieve key bitness %u\n", GetLastError());
|
|
|
|
size = sizeof(info);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SECURITY_CERTIFICATE_STRUCT, &info, &size );
|
|
ok(ret, "failed to retrieve certificate info %u\n", GetLastError());
|
|
|
|
trace("lpszSubjectInfo %s\n", wine_dbgstr_w(info.lpszSubjectInfo));
|
|
trace("lpszIssuerInfo %s\n", wine_dbgstr_w(info.lpszIssuerInfo));
|
|
trace("lpszProtocolName %s\n", wine_dbgstr_w(info.lpszProtocolName));
|
|
trace("lpszSignatureAlgName %s\n", wine_dbgstr_w(info.lpszSignatureAlgName));
|
|
trace("lpszEncryptionAlgName %s\n", wine_dbgstr_w(info.lpszEncryptionAlgName));
|
|
trace("dwKeySize %u\n", info.dwKeySize);
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(ret, "failed to receive response %u\n", GetLastError());
|
|
|
|
size = sizeof(status);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER, NULL, &status, &size, NULL);
|
|
ok(ret, "failed unexpectedly %u\n", GetLastError());
|
|
ok(status == 200, "request failed unexpectedly %u\n", status);
|
|
|
|
size = 0;
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_RAW_HEADERS_CRLF, NULL, NULL, &size, NULL);
|
|
ok(!ret, "succeeded unexpectedly\n");
|
|
|
|
for (;;)
|
|
{
|
|
size = 0;
|
|
ret = WinHttpReadData(req, buffer, sizeof(buffer), &size);
|
|
ok(ret == TRUE, "WinHttpReadData failed: %u.\n", GetLastError());
|
|
if (!size) break;
|
|
}
|
|
|
|
cleanup:
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_request_parameter_defaults(void)
|
|
{
|
|
static const WCHAR empty[] = {0};
|
|
static const WCHAR codeweavers[] = {'c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',0};
|
|
|
|
HINTERNET ses, con, req;
|
|
DWORD size, status, error;
|
|
WCHAR *version;
|
|
BOOL ret;
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, codeweavers, 0, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(ret, "failed to receive response %u\n", GetLastError());
|
|
|
|
size = sizeof(status);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER, NULL, &status, &size, NULL);
|
|
ok(ret, "failed unexpectedly %u\n", GetLastError());
|
|
ok(status == 200, "request failed unexpectedly %u\n", status);
|
|
|
|
WinHttpCloseHandle(req);
|
|
|
|
req = WinHttpOpenRequest(con, empty, empty, empty, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(ret, "failed to receive response %u\n", GetLastError());
|
|
|
|
size = 0;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_VERSION, NULL, NULL, &size, NULL);
|
|
error = GetLastError();
|
|
ok(!ret, "succeeded unexpectedly\n");
|
|
ok(error == ERROR_INSUFFICIENT_BUFFER, "expected ERROR_INSUFFICIENT_BUFFER, got %u\n", error);
|
|
|
|
version = HeapAlloc(GetProcessHeap(), 0, size);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_VERSION, NULL, version, &size, NULL);
|
|
ok(ret, "failed unexpectedly %u\n", GetLastError());
|
|
ok(lstrlenW(version) == size / sizeof(WCHAR), "unexpected size %u\n", size);
|
|
HeapFree(GetProcessHeap(), 0, version);
|
|
|
|
size = sizeof(status);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER, NULL, &status, &size, NULL);
|
|
ok(ret, "failed unexpectedly %u\n", GetLastError());
|
|
ok(status == 200, "request failed unexpectedly %u\n", status);
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static const WCHAR Connections[] = {
|
|
'S','o','f','t','w','a','r','e','\\',
|
|
'M','i','c','r','o','s','o','f','t','\\',
|
|
'W','i','n','d','o','w','s','\\',
|
|
'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
|
|
'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
|
|
'C','o','n','n','e','c','t','i','o','n','s',0 };
|
|
static const WCHAR WinHttpSettings[] = {
|
|
'W','i','n','H','t','t','p','S','e','t','t','i','n','g','s',0 };
|
|
|
|
static DWORD get_default_proxy_reg_value( BYTE *buf, DWORD len, DWORD *type )
|
|
{
|
|
LONG l;
|
|
HKEY key;
|
|
DWORD ret = 0;
|
|
|
|
l = RegOpenKeyExW( HKEY_LOCAL_MACHINE, Connections, 0, KEY_READ, &key );
|
|
if (!l)
|
|
{
|
|
DWORD size = 0;
|
|
|
|
l = RegQueryValueExW( key, WinHttpSettings, NULL, type, NULL, &size );
|
|
if (!l)
|
|
{
|
|
if (size <= len)
|
|
l = RegQueryValueExW( key, WinHttpSettings, NULL, type, buf,
|
|
&size );
|
|
if (!l)
|
|
ret = size;
|
|
}
|
|
RegCloseKey( key );
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static void set_default_proxy_reg_value( BYTE *buf, DWORD len, DWORD type )
|
|
{
|
|
LONG l;
|
|
HKEY key;
|
|
|
|
l = RegCreateKeyExW( HKEY_LOCAL_MACHINE, Connections, 0, NULL, 0,
|
|
KEY_WRITE, NULL, &key, NULL );
|
|
if (!l)
|
|
{
|
|
if (len)
|
|
RegSetValueExW( key, WinHttpSettings, 0, type, buf, len );
|
|
else
|
|
RegDeleteValueW( key, WinHttpSettings );
|
|
RegCloseKey( key );
|
|
}
|
|
}
|
|
|
|
static void test_set_default_proxy_config(void)
|
|
{
|
|
static const WCHAR wideString[] = { 0x226f, 0x575b, 0 };
|
|
static const WCHAR normalString[] = { 'f','o','o',0 };
|
|
DWORD type, len;
|
|
BYTE *saved_proxy_settings = NULL;
|
|
WINHTTP_PROXY_INFO info;
|
|
BOOL ret;
|
|
|
|
/* FIXME: it would be simpler to read the current settings using
|
|
* WinHttpGetDefaultProxyConfiguration and save them using
|
|
* WinHttpSetDefaultProxyConfiguration, but they appear to have a bug.
|
|
*
|
|
* If a proxy is configured in the registry, e.g. via 'proxcfg -p "foo"',
|
|
* the access type reported by WinHttpGetDefaultProxyConfiguration is 1,
|
|
* WINHTTP_ACCESS_TYPE_NO_PROXY, whereas it should be
|
|
* WINHTTP_ACCESS_TYPE_NAMED_PROXY.
|
|
* If WinHttpSetDefaultProxyConfiguration is called with dwAccessType = 1,
|
|
* the lpszProxy and lpszProxyBypass values are ignored.
|
|
* Thus, if a proxy is set with proxycfg, then calling
|
|
* WinHttpGetDefaultProxyConfiguration followed by
|
|
* WinHttpSetDefaultProxyConfiguration results in the proxy settings
|
|
* getting deleted from the registry.
|
|
*
|
|
* Instead I read the current registry value and restore it directly.
|
|
*/
|
|
len = get_default_proxy_reg_value( NULL, 0, &type );
|
|
if (len)
|
|
{
|
|
saved_proxy_settings = HeapAlloc( GetProcessHeap(), 0, len );
|
|
len = get_default_proxy_reg_value( saved_proxy_settings, len, &type );
|
|
}
|
|
|
|
if (0)
|
|
{
|
|
/* Crashes on Vista and higher */
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetDefaultProxyConfiguration(NULL);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
}
|
|
|
|
/* test with invalid access type */
|
|
info.dwAccessType = 0xdeadbeef;
|
|
info.lpszProxy = info.lpszProxyBypass = NULL;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetDefaultProxyConfiguration(&info);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
|
|
/* at a minimum, the proxy server must be set */
|
|
info.dwAccessType = WINHTTP_ACCESS_TYPE_NAMED_PROXY;
|
|
info.lpszProxy = info.lpszProxyBypass = NULL;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetDefaultProxyConfiguration(&info);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
info.lpszProxyBypass = normalString;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetDefaultProxyConfiguration(&info);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
|
|
/* the proxy server can't have wide characters */
|
|
info.lpszProxy = wideString;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetDefaultProxyConfiguration(&info);
|
|
ok((!ret && GetLastError() == ERROR_INVALID_PARAMETER) ||
|
|
broken(ret), /* Earlier winhttp versions on W2K/XP */
|
|
"expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
|
|
info.lpszProxy = normalString;
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetDefaultProxyConfiguration(&info);
|
|
if (ret)
|
|
{
|
|
ok(ret, "always true\n");
|
|
set_default_proxy_reg_value( saved_proxy_settings, len, type );
|
|
}
|
|
else if (GetLastError() == ERROR_ACCESS_DENIED)
|
|
skip("couldn't set default proxy configuration: access denied\n");
|
|
else
|
|
ok(ret, "WinHttpSetDefaultProxyConfiguration failed: %d\n",
|
|
GetLastError());
|
|
}
|
|
|
|
static void test_Timeouts (void)
|
|
{
|
|
BOOL ret;
|
|
DWORD value, size;
|
|
HINTERNET ses, req, con;
|
|
static const WCHAR codeweavers[] = {'c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',0};
|
|
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, -2, 0, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, 0, -2, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, 0, 0, -2, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, 0, 0, 0, -2);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, -1, -1, -1, -1);
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, 0, 0, 0, 0);
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(ses, 0x0123, 0x4567, 0x89ab, 0xcdef);
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0x0123, "Expected 0x0123, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0x4567, "Expected 0x4567, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0x89ab, "Expected 0x89ab, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xcdef, "Expected 0xcdef, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
con = WinHttpConnect(ses, codeweavers, 0, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
/* Timeout values should match the last one set for session */
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(con, -2, 0, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(con, 0, -2, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(con, 0, 0, -2, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(con, 0, 0, 0, -2);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(con, -1, -1, -1, -1);
|
|
ok(!ret && GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INVALID_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(con, 0, 0, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INVALID_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(con, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(!ret && GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INVALID_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(con, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(!ret && GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INVALID_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(con, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(!ret && GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INVALID_TYPE, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(con, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(!ret && GetLastError() == ERROR_WINHTTP_INCORRECT_HANDLE_TYPE,
|
|
"expected ERROR_WINHTTP_INVALID_TYPE, got %u\n", GetLastError());
|
|
|
|
/* Changing timeout values for session should affect the values for connection */
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdead;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(con, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
/* Timeout values should match the last one set for session */
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, -2, 0, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, 0, -2, 0, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, 0, 0, -2, 0);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, 0, 0, 0, -2);
|
|
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"expected ERROR_INVALID_PARAMETER, got %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, -1, -1, -1, -1);
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, 0, 0, 0, 0);
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetTimeouts(req, 0xcdef, 0x89ab, 0x4567, 0x0123);
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xcdef, "Expected 0xcdef, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0x89ab, "Expected 0x89ab, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0x4567, "Expected 0x4567, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0x0123, "Expected 0x0123, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0, "Expected 0, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
/* Changing timeout values for session should not affect the values for a request,
|
|
* neither should the other way around.
|
|
*/
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeefdead;
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xdead, "Expected 0xdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeef;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RESOLVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeef;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_CONNECT_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeef;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_SEND_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_SEND_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xbeef;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, sizeof(value));
|
|
ok(ret, "%u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
value = 0xdeadbeef;
|
|
size = sizeof(DWORD);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_RECEIVE_TIMEOUT, &value, &size);
|
|
ok(ret, "%u\n", GetLastError());
|
|
ok(value == 0xbeefdead, "Expected 0xbeefdead, got %u\n", value);
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_resolve_timeout(void)
|
|
{
|
|
static const WCHAR codeweavers[] =
|
|
{'c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',0};
|
|
static const WCHAR nxdomain[] =
|
|
{'n','x','d','o','m','a','i','n','.','c','o','d','e','w','e','a','v','e','r','s','.','c','o','m',0};
|
|
|
|
HINTERNET ses, con, req;
|
|
DWORD timeout;
|
|
BOOL ret;
|
|
|
|
if (! proxy_active())
|
|
{
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
timeout = 10000;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &timeout, sizeof(timeout));
|
|
ok(ret, "failed to set resolve timeout %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, nxdomain, 0, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(!ret, "sent request\n");
|
|
ok(GetLastError() == ERROR_WINHTTP_NAME_NOT_RESOLVED,
|
|
"expected ERROR_WINHTTP_NAME_NOT_RESOLVED got %u\n", GetLastError());
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
else
|
|
skip("Skipping host resolution tests, host resolution preformed by proxy\n");
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
timeout = 10000;
|
|
ret = WinHttpSetOption(ses, WINHTTP_OPTION_RESOLVE_TIMEOUT, &timeout, sizeof(timeout));
|
|
ok(ret, "failed to set resolve timeout %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, codeweavers, 0, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request\n");
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static const char page1[] =
|
|
"<HTML>\r\n"
|
|
"<HEAD><TITLE>winhttp test page</TITLE></HEAD>\r\n"
|
|
"<BODY>The quick brown fox jumped over the lazy dog<P></BODY>\r\n"
|
|
"</HTML>\r\n\r\n";
|
|
|
|
static const char okmsg[] =
|
|
"HTTP/1.1 200 OK\r\n"
|
|
"Server: winetest\r\n"
|
|
"\r\n";
|
|
|
|
static const char notokmsg[] =
|
|
"HTTP/1.1 400 Bad Request\r\n"
|
|
"Server: winetest\r\n"
|
|
"\r\n";
|
|
|
|
static const char noauthmsg[] =
|
|
"HTTP/1.1 401 Unauthorized\r\n"
|
|
"Server: winetest\r\n"
|
|
"Connection: close\r\n"
|
|
"WWW-Authenticate: Basic realm=\"placebo\"\r\n"
|
|
"\r\n";
|
|
|
|
static const char proxymsg[] =
|
|
"HTTP/1.1 407 Proxy Authentication Required\r\n"
|
|
"Server: winetest\r\n"
|
|
"Proxy-Connection: close\r\n"
|
|
"Proxy-Authenticate: Basic realm=\"placebo\"\r\n"
|
|
"\r\n";
|
|
|
|
struct server_info
|
|
{
|
|
HANDLE event;
|
|
int port;
|
|
};
|
|
|
|
static DWORD CALLBACK server_thread(LPVOID param)
|
|
{
|
|
struct server_info *si = param;
|
|
int r, c, i, on;
|
|
SOCKET s;
|
|
struct sockaddr_in sa;
|
|
char buffer[0x100];
|
|
WSADATA wsaData;
|
|
int last_request = 0;
|
|
|
|
WSAStartup(MAKEWORD(1,1), &wsaData);
|
|
|
|
s = socket(AF_INET, SOCK_STREAM, 0);
|
|
if (s == INVALID_SOCKET)
|
|
return 1;
|
|
|
|
on = 1;
|
|
setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char*)&on, sizeof on);
|
|
|
|
memset(&sa, 0, sizeof sa);
|
|
sa.sin_family = AF_INET;
|
|
sa.sin_port = htons(si->port);
|
|
sa.sin_addr.S_un.S_addr = inet_addr("127.0.0.1");
|
|
|
|
r = bind(s, (struct sockaddr *)&sa, sizeof(sa));
|
|
if (r < 0)
|
|
return 1;
|
|
|
|
listen(s, 0);
|
|
SetEvent(si->event);
|
|
do
|
|
{
|
|
c = accept(s, NULL, NULL);
|
|
|
|
memset(buffer, 0, sizeof buffer);
|
|
for(i = 0; i < sizeof buffer - 1; i++)
|
|
{
|
|
r = recv(c, &buffer[i], 1, 0);
|
|
if (r != 1)
|
|
break;
|
|
if (i < 4) continue;
|
|
if (buffer[i - 2] == '\n' && buffer[i] == '\n' &&
|
|
buffer[i - 3] == '\r' && buffer[i - 1] == '\r')
|
|
break;
|
|
}
|
|
if (strstr(buffer, "GET /basic"))
|
|
{
|
|
send(c, okmsg, sizeof okmsg - 1, 0);
|
|
send(c, page1, sizeof page1 - 1, 0);
|
|
}
|
|
if (strstr(buffer, "/auth"))
|
|
{
|
|
if (strstr(buffer, "Authorization: Basic dXNlcjpwd2Q="))
|
|
send(c, okmsg, sizeof okmsg - 1, 0);
|
|
else
|
|
send(c, noauthmsg, sizeof noauthmsg - 1, 0);
|
|
}
|
|
if (strstr(buffer, "/no_headers"))
|
|
{
|
|
send(c, page1, sizeof page1 - 1, 0);
|
|
}
|
|
if (strstr(buffer, "GET /quit"))
|
|
{
|
|
send(c, okmsg, sizeof okmsg - 1, 0);
|
|
send(c, page1, sizeof page1 - 1, 0);
|
|
last_request = 1;
|
|
}
|
|
shutdown(c, 2);
|
|
closesocket(c);
|
|
|
|
} while (!last_request);
|
|
|
|
closesocket(s);
|
|
return 0;
|
|
}
|
|
|
|
static void test_basic_request(int port, const WCHAR *verb, const WCHAR *path)
|
|
{
|
|
HINTERNET ses, con, req;
|
|
char buffer[0x100];
|
|
DWORD count, status, size;
|
|
BOOL ret;
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, localhostW, port, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, verb, path, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(ret, "failed to receive response %u\n", GetLastError());
|
|
|
|
size = sizeof(status);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_STATUS_CODE|WINHTTP_QUERY_FLAG_NUMBER, NULL, &status, &size, NULL);
|
|
ok(ret, "failed to query status code %u\n", GetLastError());
|
|
ok(status == 200, "request failed unexpectedly %u\n", status);
|
|
|
|
count = 0;
|
|
memset(buffer, 0, sizeof(buffer));
|
|
ret = WinHttpReadData(req, buffer, sizeof buffer, &count);
|
|
ok(ret, "failed to read data %u\n", GetLastError());
|
|
ok(count == sizeof page1 - 1, "count was wrong\n");
|
|
ok(!memcmp(buffer, page1, sizeof page1), "http data wrong\n");
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_basic_authentication(int port)
|
|
{
|
|
static const WCHAR authW[] = {'/','a','u','t','h',0};
|
|
static const WCHAR userW[] = {'u','s','e','r',0};
|
|
static const WCHAR passW[] = {'p','w','d',0};
|
|
HINTERNET ses, con, req;
|
|
DWORD status, size, error;
|
|
BOOL ret;
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, localhostW, port, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, authW, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(ret, "failed to receive response %u\n", GetLastError());
|
|
|
|
size = sizeof(status);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_STATUS_CODE|WINHTTP_QUERY_FLAG_NUMBER, NULL, &status, &size, NULL);
|
|
ok(ret, "failed to query status code %u\n", GetLastError());
|
|
ok(status == 401, "request failed unexpectedly %u\n", status);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetCredentials(req, WINHTTP_AUTH_TARGET_SERVER, WINHTTP_AUTH_SCHEME_BASIC, userW, NULL, NULL);
|
|
error = GetLastError();
|
|
ok(!ret, "expected failure\n");
|
|
ok(error == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %u\n", error);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetCredentials(req, WINHTTP_AUTH_TARGET_SERVER, WINHTTP_AUTH_SCHEME_BASIC, NULL, passW, NULL);
|
|
error = GetLastError();
|
|
ok(!ret, "expected failure\n");
|
|
ok(error == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %u\n", error);
|
|
|
|
ret = WinHttpSetCredentials(req, WINHTTP_AUTH_TARGET_SERVER, WINHTTP_AUTH_SCHEME_BASIC, userW, passW, NULL);
|
|
ok(ret, "failed to set credentials %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
ok(ret, "failed to receive response %u\n", GetLastError());
|
|
|
|
size = sizeof(status);
|
|
ret = WinHttpQueryHeaders(req, WINHTTP_QUERY_STATUS_CODE|WINHTTP_QUERY_FLAG_NUMBER, NULL, &status, &size, NULL);
|
|
ok(ret, "failed to query status code %u\n", GetLastError());
|
|
ok(status == 200, "request failed unexpectedly %u\n", status);
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_no_headers(int port)
|
|
{
|
|
static const WCHAR no_headersW[] = {'/','n','o','_','h','e','a','d','e','r','s',0};
|
|
HINTERNET ses, con, req;
|
|
DWORD error;
|
|
BOOL ret;
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, NULL, NULL, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, localhostW, port, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, no_headersW, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
ret = WinHttpSendRequest(req, NULL, 0, NULL, 0, 0, 0);
|
|
ok(ret, "failed to send request %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpReceiveResponse(req, NULL);
|
|
error = GetLastError();
|
|
ok(!ret, "expected failure\n");
|
|
ok(error == ERROR_WINHTTP_INVALID_SERVER_RESPONSE, "got %u\n", error);
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_credentials(void)
|
|
{
|
|
static WCHAR userW[] = {'u','s','e','r',0};
|
|
static WCHAR passW[] = {'p','a','s','s',0};
|
|
static WCHAR proxy_userW[] = {'p','r','o','x','y','u','s','e','r',0};
|
|
static WCHAR proxy_passW[] = {'p','r','o','x','y','p','a','s','s',0};
|
|
HINTERNET ses, con, req;
|
|
DWORD size, error;
|
|
WCHAR buffer[32];
|
|
BOOL ret;
|
|
|
|
ses = WinHttpOpen(test_useragent, 0, proxy_userW, proxy_passW, 0);
|
|
ok(ses != NULL, "failed to open session %u\n", GetLastError());
|
|
|
|
con = WinHttpConnect(ses, localhostW, 0, 0);
|
|
ok(con != NULL, "failed to open a connection %u\n", GetLastError());
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PROXY_USERNAME, &buffer, &size);
|
|
ok(ret, "failed to query proxy username %u\n", GetLastError());
|
|
ok(!buffer[0], "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(!size, "expected 0, got %u\n", size);
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PROXY_PASSWORD, &buffer, &size);
|
|
ok(ret, "failed to query proxy password %u\n", GetLastError());
|
|
ok(!buffer[0], "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(!size, "expected 0, got %u\n", size);
|
|
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_PROXY_USERNAME, proxy_userW, lstrlenW(proxy_userW));
|
|
ok(ret, "failed to set username %u\n", GetLastError());
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PROXY_USERNAME, &buffer, &size);
|
|
ok(ret, "failed to query proxy username %u\n", GetLastError());
|
|
ok(!winetest_strcmpW(buffer, proxy_userW), "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(size == lstrlenW(proxy_userW) * sizeof(WCHAR), "unexpected result %u\n", size);
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_USERNAME, &buffer, &size);
|
|
ok(ret, "failed to query username %u\n", GetLastError());
|
|
ok(!buffer[0], "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(!size, "expected 0, got %u\n", size);
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PASSWORD, &buffer, &size);
|
|
ok(ret, "failed to query password %u\n", GetLastError());
|
|
ok(!buffer[0], "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(!size, "expected 0, got %u\n", size);
|
|
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_PROXY_PASSWORD, proxy_passW, lstrlenW(proxy_passW));
|
|
ok(ret, "failed to set proxy password %u\n", GetLastError());
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PROXY_PASSWORD, &buffer, &size);
|
|
ok(ret, "failed to query proxy password %u\n", GetLastError());
|
|
ok(!winetest_strcmpW(buffer, proxy_passW), "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(size == lstrlenW(proxy_passW) * sizeof(WCHAR), "unexpected result %u\n", size);
|
|
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_USERNAME, userW, lstrlenW(userW));
|
|
ok(ret, "failed to set username %u\n", GetLastError());
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_USERNAME, &buffer, &size);
|
|
ok(ret, "failed to query username %u\n", GetLastError());
|
|
ok(!winetest_strcmpW(buffer, userW), "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(size == lstrlenW(userW) * sizeof(WCHAR), "unexpected result %u\n", size);
|
|
|
|
ret = WinHttpSetOption(req, WINHTTP_OPTION_PASSWORD, passW, lstrlenW(passW));
|
|
ok(ret, "failed to set password %u\n", GetLastError());
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PASSWORD, &buffer, &size);
|
|
ok(ret, "failed to query password %u\n", GetLastError());
|
|
ok(!winetest_strcmpW(buffer, passW), "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(size == lstrlenW(passW) * sizeof(WCHAR), "unexpected result %u\n", size);
|
|
|
|
WinHttpCloseHandle(req);
|
|
|
|
req = WinHttpOpenRequest(con, NULL, NULL, NULL, NULL, NULL, 0);
|
|
ok(req != NULL, "failed to open a request %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetCredentials(req, WINHTTP_AUTH_TARGET_SERVER, WINHTTP_AUTH_SCHEME_BASIC, userW, NULL, NULL);
|
|
error = GetLastError();
|
|
ok(!ret, "expected failure\n");
|
|
ok(error == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %u\n", error);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = WinHttpSetCredentials(req, WINHTTP_AUTH_TARGET_SERVER, WINHTTP_AUTH_SCHEME_BASIC, NULL, passW, NULL);
|
|
error = GetLastError();
|
|
ok(!ret, "expected failure\n");
|
|
ok(error == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %u\n", error);
|
|
|
|
ret = WinHttpSetCredentials(req, WINHTTP_AUTH_TARGET_SERVER, WINHTTP_AUTH_SCHEME_BASIC, userW, passW, NULL);
|
|
ok(ret, "failed to set credentials %u\n", GetLastError());
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_USERNAME, &buffer, &size);
|
|
ok(ret, "failed to query username %u\n", GetLastError());
|
|
todo_wine {
|
|
ok(!buffer[0], "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(!size, "expected 0, got %u\n", size);
|
|
}
|
|
|
|
size = sizeof(buffer)/sizeof(WCHAR);
|
|
ret = WinHttpQueryOption(req, WINHTTP_OPTION_PASSWORD, &buffer, &size);
|
|
ok(ret, "failed to query password %u\n", GetLastError());
|
|
todo_wine {
|
|
ok(!buffer[0], "unexpected result %s\n", wine_dbgstr_w(buffer));
|
|
ok(!size, "expected 0, got %u\n", size);
|
|
}
|
|
|
|
WinHttpCloseHandle(req);
|
|
WinHttpCloseHandle(con);
|
|
WinHttpCloseHandle(ses);
|
|
}
|
|
|
|
static void test_IWinHttpRequest(void)
|
|
{
|
|
static const WCHAR usernameW[] = {'u','s','e','r','n','a','m','e',0};
|
|
static const WCHAR passwordW[] = {'p','a','s','s','w','o','r','d',0};
|
|
static const WCHAR url1W[] = {'h','t','t','p',':','/','/','w','i','n','e','h','q','.','o','r','g',0};
|
|
static const WCHAR url2W[] = {'w','i','n','e','h','q','.','o','r','g',0};
|
|
static const WCHAR method1W[] = {'G','E','T',0};
|
|
static const WCHAR method2W[] = {'I','N','V','A','L','I','D',0};
|
|
static const WCHAR proxy_serverW[] = {'p','r','o','x','y','s','e','r','v','e','r',0};
|
|
static const WCHAR bypas_listW[] = {'b','y','p','a','s','s','l','i','s','t',0};
|
|
static const WCHAR connectionW[] = {'C','o','n','n','e','c','t','i','o','n',0};
|
|
static const WCHAR dateW[] = {'D','a','t','e',0};
|
|
HRESULT hr;
|
|
IWinHttpRequest *req;
|
|
BSTR method, url, username, password, response = NULL, status_text = NULL, headers = NULL;
|
|
BSTR date, today, connection, value = NULL;
|
|
VARIANT async, empty, timeout, body, proxy_server, bypass_list;
|
|
VARIANT_BOOL succeeded;
|
|
LONG status;
|
|
WCHAR todayW[WINHTTP_TIME_FORMAT_BUFSIZE];
|
|
SYSTEMTIME st;
|
|
|
|
GetSystemTime( &st );
|
|
WinHttpTimeFromSystemTime( &st, todayW );
|
|
|
|
CoInitialize( NULL );
|
|
hr = CoCreateInstance( &CLSID_WinHttpRequest, NULL, CLSCTX_INPROC_SERVER, &IID_IWinHttpRequest, (void **)&req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
VariantInit( &empty );
|
|
V_VT( &empty ) = VT_ERROR;
|
|
|
|
V_VT( &async ) = VT_BOOL;
|
|
V_BOOL( &async ) = VARIANT_FALSE;
|
|
|
|
hr = IWinHttpRequest_Open( req, NULL, NULL, empty );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
method = SysAllocString( method1W );
|
|
hr = IWinHttpRequest_Open( req, method, NULL, empty );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Open( req, method, NULL, async );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
url = SysAllocString( url1W );
|
|
hr = IWinHttpRequest_Open( req, NULL, url, empty );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Abort( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Open( req, method, url, empty );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Abort( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Release( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = CoCreateInstance( &CLSID_WinHttpRequest, NULL, CLSCTX_INPROC_SERVER, &IID_IWinHttpRequest, (void **)&req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
SysFreeString( url );
|
|
url = SysAllocString( url2W );
|
|
hr = IWinHttpRequest_Open( req, method, url, async );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_UNRECOGNIZED_SCHEME ), "got %08x\n", hr );
|
|
|
|
SysFreeString( method );
|
|
method = SysAllocString( method2W );
|
|
hr = IWinHttpRequest_Open( req, method, url, async );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_UNRECOGNIZED_SCHEME ), "got %08x\n", hr );
|
|
|
|
SysFreeString( method );
|
|
method = SysAllocString( method1W );
|
|
SysFreeString( url );
|
|
url = SysAllocString( url1W );
|
|
hr = IWinHttpRequest_Open( req, method, url, async );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Abort( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Send( req, empty );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Abort( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Release( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = CoCreateInstance( &CLSID_WinHttpRequest, NULL, CLSCTX_INPROC_SERVER, &IID_IWinHttpRequest, (void **)&req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, &response );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_Status( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_Status( req, &status );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_StatusText( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_StatusText( req, &status_text );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseBody( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetTimeouts( req, 10000, 10000, 10000, 10000 );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, NULL, NULL, 0xdeadbeef );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN ), "got %08x\n", hr );
|
|
|
|
VariantInit( &proxy_server );
|
|
V_VT( &proxy_server ) = VT_ERROR;
|
|
VariantInit( &bypass_list );
|
|
V_VT( &bypass_list ) = VT_ERROR;
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_DIRECT, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_PROXY, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_DIRECT, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetAllResponseHeaders( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetAllResponseHeaders( req, &headers );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, NULL, NULL );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
connection = SysAllocString( connectionW );
|
|
hr = IWinHttpRequest_GetResponseHeader( req, connection, NULL );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, connection, &value );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetRequestHeader( req, NULL, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
date = SysAllocString( dateW );
|
|
hr = IWinHttpRequest_SetRequestHeader( req, date, NULL );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN ), "got %08x\n", hr );
|
|
|
|
today = SysAllocString( todayW );
|
|
hr = IWinHttpRequest_SetRequestHeader( req, date, today );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetAutoLogonPolicy( req, 0xdeadbeef );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetAutoLogonPolicy( req, AutoLogonPolicy_OnlyIfBypassProxy );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
SysFreeString( method );
|
|
method = SysAllocString( method1W );
|
|
SysFreeString( url );
|
|
url = SysAllocString( url1W );
|
|
hr = IWinHttpRequest_Open( req, method, url, async );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, &response );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_Status( req, &status );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_StatusText( req, &status_text );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseBody( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetTimeouts( req, 10000, 10000, 10000, 10000 );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, NULL, NULL, 0xdeadbeef );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
username = SysAllocString( usernameW );
|
|
hr = IWinHttpRequest_SetCredentials( req, username, NULL, 0xdeadbeef );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
password = SysAllocString( passwordW );
|
|
hr = IWinHttpRequest_SetCredentials( req, NULL, password, 0xdeadbeef );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, username, password, 0xdeadbeef );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, NULL, password, HTTPREQUEST_SETCREDENTIALS_FOR_SERVER );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, username, password, HTTPREQUEST_SETCREDENTIALS_FOR_SERVER );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
V_VT( &proxy_server ) = VT_BSTR;
|
|
V_BSTR( &proxy_server ) = SysAllocString( proxy_serverW );
|
|
V_VT( &bypass_list ) = VT_BSTR;
|
|
V_BSTR( &bypass_list ) = SysAllocString( bypas_listW );
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_PROXY, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, 0xdeadbeef, proxy_server, bypass_list );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_DIRECT, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetAllResponseHeaders( req, &headers );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, connection, &value );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetRequestHeader( req, date, today );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetRequestHeader( req, date, NULL );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetAutoLogonPolicy( req, AutoLogonPolicy_OnlyIfBypassProxy );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Send( req, empty );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Send( req, empty );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, &response );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( response );
|
|
|
|
hr = IWinHttpRequest_get_Status( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
status = 0;
|
|
hr = IWinHttpRequest_get_Status( req, &status );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
trace("%d\n", status);
|
|
|
|
hr = IWinHttpRequest_get_StatusText( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_StatusText( req, &status_text );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
trace("%s\n", wine_dbgstr_w(status_text));
|
|
SysFreeString( status_text );
|
|
|
|
hr = IWinHttpRequest_get_ResponseBody( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, username, password, HTTPREQUEST_SETCREDENTIALS_FOR_SERVER );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_PROXY, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_DIRECT, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetAllResponseHeaders( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetAllResponseHeaders( req, &headers );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( headers );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, NULL, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, connection, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, connection, &value );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( value );
|
|
|
|
hr = IWinHttpRequest_SetRequestHeader( req, date, today );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_AFTER_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetAutoLogonPolicy( req, AutoLogonPolicy_OnlyIfBypassProxy );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
VariantInit( &timeout );
|
|
V_VT( &timeout ) = VT_I4;
|
|
V_I4( &timeout ) = 10;
|
|
hr = IWinHttpRequest_WaitForResponse( req, timeout, &succeeded );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_Status( req, &status );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_StatusText( req, &status_text );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( status_text );
|
|
|
|
hr = IWinHttpRequest_SetCredentials( req, username, password, HTTPREQUEST_SETCREDENTIALS_FOR_SERVER );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_PROXY, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_DIRECT, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Send( req, empty );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_get_ResponseText( req, &response );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( response );
|
|
|
|
hr = IWinHttpRequest_get_ResponseBody( req, NULL );
|
|
ok( hr == E_INVALIDARG, "got %08x\n", hr );
|
|
|
|
VariantInit( &body );
|
|
V_VT( &body ) = VT_ERROR;
|
|
hr = IWinHttpRequest_get_ResponseBody( req, &body );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
ok( V_VT( &body ) == (VT_ARRAY|VT_UI1), "got %08x\n", V_VT( &body ) );
|
|
|
|
hr = VariantClear( &body );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_PROXY, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetProxy( req, HTTPREQUEST_PROXYSETTING_DIRECT, proxy_server, bypass_list );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_GetAllResponseHeaders( req, &headers );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( headers );
|
|
|
|
hr = IWinHttpRequest_GetResponseHeader( req, connection, &value );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
SysFreeString( value );
|
|
|
|
hr = IWinHttpRequest_SetRequestHeader( req, date, today );
|
|
ok( hr == HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_AFTER_SEND ), "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_SetAutoLogonPolicy( req, AutoLogonPolicy_OnlyIfBypassProxy );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Send( req, empty );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Abort( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Abort( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
hr = IWinHttpRequest_Release( req );
|
|
ok( hr == S_OK, "got %08x\n", hr );
|
|
|
|
SysFreeString( method );
|
|
SysFreeString( url );
|
|
SysFreeString( username );
|
|
SysFreeString( password );
|
|
SysFreeString( connection );
|
|
SysFreeString( date );
|
|
SysFreeString( today );
|
|
VariantClear( &proxy_server );
|
|
VariantClear( &bypass_list );
|
|
CoUninitialize();
|
|
}
|
|
|
|
START_TEST (winhttp)
|
|
{
|
|
static const WCHAR basicW[] = {'/','b','a','s','i','c',0};
|
|
static const WCHAR quitW[] = {'/','q','u','i','t',0};
|
|
struct server_info si;
|
|
HANDLE thread;
|
|
DWORD ret;
|
|
|
|
test_OpenRequest();
|
|
test_SendRequest();
|
|
test_WinHttpTimeFromSystemTime();
|
|
test_WinHttpTimeToSystemTime();
|
|
test_WinHttpAddHeaders();
|
|
test_secure_connection();
|
|
test_request_parameter_defaults();
|
|
test_QueryOption();
|
|
test_set_default_proxy_config();
|
|
test_empty_headers_param();
|
|
test_Timeouts();
|
|
test_resolve_timeout();
|
|
test_credentials();
|
|
test_IWinHttpRequest();
|
|
|
|
si.event = CreateEvent(NULL, 0, 0, NULL);
|
|
si.port = 7532;
|
|
|
|
thread = CreateThread(NULL, 0, server_thread, (LPVOID)&si, 0, NULL);
|
|
ok(thread != NULL, "failed to create thread %u\n", GetLastError());
|
|
|
|
ret = WaitForSingleObject(si.event, 10000);
|
|
ok(ret == WAIT_OBJECT_0, "failed to start winhttp test server %u\n", GetLastError());
|
|
if (ret != WAIT_OBJECT_0)
|
|
return;
|
|
|
|
test_basic_request(si.port, NULL, basicW);
|
|
test_no_headers(si.port);
|
|
test_basic_authentication(si.port);
|
|
|
|
/* send the basic request again to shutdown the server thread */
|
|
test_basic_request(si.port, NULL, quitW);
|
|
|
|
WaitForSingleObject(thread, 3000);
|
|
}
|