| // Copyright 2016 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome_elf/nt_registry/nt_registry.h" |
| |
| #include <windows.h> |
| #include <rpc.h> |
| #include <stddef.h> |
| |
| #include "base/callback_helpers.h" |
| #include "base/test/test_reg_util_win.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| |
| namespace { |
| |
| //------------------------------------------------------------------------------ |
| // WOW64 redirection tests |
| // |
| // - Only HKCU will be tested on the auto (try) bots. |
| // HKLM will be kept separate (and manual) for local testing only. |
| // |
| // NOTE: Currently no real WOW64 context testing, as building x86 projects |
| // during x64 builds is not currently supported for performance reasons. |
| // https://cs.chromium.org/chromium/src/build/toolchain/win/BUILD.gn?sq%3Dpackage:chromium&l=314 |
| //------------------------------------------------------------------------------ |
| |
| // Utility function for the WOW64 redirection test suites. |
| // Note: Testing redirection through ADVAPI32 here as well, to get notice if |
| // expected behaviour changes! |
| // If |redirected_path| == nullptr, no redirection is expected in any case. |
| void DoRedirectTest(nt::ROOT_KEY nt_root_key, |
| const wchar_t* path, |
| const wchar_t* redirected_path OPTIONAL) { |
| HANDLE handle = INVALID_HANDLE_VALUE; |
| HKEY key_handle = nullptr; |
| constexpr ACCESS_MASK kAccess = KEY_WRITE | DELETE; |
| const HKEY root_key = |
| (nt_root_key == nt::HKCU) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE; |
| |
| // Make sure clean before starting. |
| nt::DeleteRegKey(nt_root_key, nt::NONE, path); |
| if (redirected_path) |
| nt::DeleteRegKey(nt_root_key, nt::NONE, redirected_path); |
| |
| //---------------------------------------------------------------------------- |
| // No redirection through ADVAPI32 on straight x86 or x64. |
| ASSERT_EQ(ERROR_SUCCESS, |
| RegCreateKeyExW(root_key, path, 0, nullptr, REG_OPTION_NON_VOLATILE, |
| kAccess, nullptr, &key_handle, nullptr)); |
| ASSERT_EQ(ERROR_SUCCESS, RegCloseKey(key_handle)); |
| ASSERT_TRUE(nt::OpenRegKey(nt_root_key, path, kAccess, &handle, nullptr)); |
| ASSERT_TRUE(nt::DeleteRegKey(handle)); |
| nt::CloseRegKey(handle); |
| |
| #ifdef _WIN64 |
| //---------------------------------------------------------------------------- |
| // Try forcing WOW64 redirection on x64 through ADVAPI32. |
| ASSERT_EQ(ERROR_SUCCESS, |
| RegCreateKeyExW(root_key, path, 0, nullptr, REG_OPTION_NON_VOLATILE, |
| kAccess | KEY_WOW64_32KEY, nullptr, &key_handle, |
| nullptr)); |
| ASSERT_EQ(ERROR_SUCCESS, RegCloseKey(key_handle)); |
| // Check path: |
| if (nt::OpenRegKey(nt_root_key, path, kAccess, &handle, nullptr)) { |
| if (redirected_path) |
| ADD_FAILURE(); |
| ASSERT_TRUE(nt::DeleteRegKey(handle)); |
| nt::CloseRegKey(handle); |
| } else if (!redirected_path) { |
| // Should have succeeded. |
| ADD_FAILURE(); |
| } |
| if (redirected_path) { |
| // Check redirected path: |
| if (nt::OpenRegKey(nt_root_key, redirected_path, kAccess, &handle, |
| nullptr)) { |
| if (!redirected_path) |
| ADD_FAILURE(); |
| ASSERT_TRUE(nt::DeleteRegKey(handle)); |
| nt::CloseRegKey(handle); |
| } else { |
| // Should have succeeded. |
| ADD_FAILURE(); |
| } |
| } |
| |
| //---------------------------------------------------------------------------- |
| // Try forcing WOW64 redirection on x64 through NTDLL. |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt_root_key, path, kAccess | KEY_WOW64_32KEY, nullptr)); |
| // Check path: |
| if (nt::OpenRegKey(nt_root_key, path, kAccess, &handle, nullptr)) { |
| if (redirected_path) |
| ADD_FAILURE(); |
| ASSERT_TRUE(nt::DeleteRegKey(handle)); |
| nt::CloseRegKey(handle); |
| } else if (!redirected_path) { |
| // Should have succeeded. |
| ADD_FAILURE(); |
| } |
| if (redirected_path) { |
| // Check redirected path: |
| if (nt::OpenRegKey(nt_root_key, redirected_path, kAccess, &handle, |
| nullptr)) { |
| if (!redirected_path) |
| ADD_FAILURE(); |
| ASSERT_TRUE(nt::DeleteRegKey(handle)); |
| nt::CloseRegKey(handle); |
| } else { |
| // Should have succeeded. |
| ADD_FAILURE(); |
| } |
| } |
| #endif // _WIN64 |
| } |
| |
| // These test reg paths match |kClassesSubtree| in nt_registry.cc. |
| constexpr const wchar_t* kClassesRedirects[] = { |
| L"SOFTWARE\\Classes\\CLSID\\chrome_testing", |
| L"SOFTWARE\\Classes\\WOW6432Node\\CLSID\\chrome_testing", |
| L"SOFTWARE\\Classes\\DirectShow\\chrome_testing", |
| L"SOFTWARE\\Classes\\WOW6432Node\\DirectShow\\chrome_testing", |
| L"SOFTWARE\\Classes\\Interface\\chrome_testing", |
| L"SOFTWARE\\Classes\\WOW6432Node\\Interface\\chrome_testing", |
| L"SOFTWARE\\Classes\\Media Type\\chrome_testing", |
| L"SOFTWARE\\Classes\\WOW6432Node\\Media Type\\chrome_testing", |
| L"SOFTWARE\\Classes\\MediaFoundation\\chrome_testing", |
| L"SOFTWARE\\Classes\\WOW6432Node\\MediaFoundation\\chrome_testing"}; |
| |
| static_assert((_countof(kClassesRedirects) & 0x01) == 0, |
| "Must have an even number of kClassesRedirects."); |
| |
| // This test does NOT use NtRegistryTest class. It requires Windows WOW64 |
| // redirection to take place, which would not happen with a testing redirection |
| // layer. |
| TEST(NtRegistryTestRedirection, Wow64RedirectionHKCU) { |
| // Using two elements for each loop. |
| for (size_t index = 0; index < _countof(kClassesRedirects); index += 2) { |
| DoRedirectTest(nt::HKCU, kClassesRedirects[index], |
| kClassesRedirects[index + 1]); |
| } |
| } |
| |
| // These test reg paths match |kHklmSoftwareSubtree| in nt_registry.cc. |
| constexpr const wchar_t* kHKLMNoRedirects[] = { |
| L"SOFTWARE\\Classes\\chrome_testing", L"SOFTWARE\\Clients\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\COM3\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Cryptography\\Calais\\Current\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Cryptography\\Calais\\Readers\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Cryptography\\Services\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\CTF\\SystemShared\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\CTF\\TIP\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\DFS\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Driver Signing\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\EnterpriseCertificates\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\EventSystem\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\MSMQ\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Non-Driver Signing\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Notepad\\DefaultFonts\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\OLE\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\RAS\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\RPC\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\SOFTWARE\\Microsoft\\Shared " |
| L"Tools\\MSInfo\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\SystemCertificates\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\TermServLicensing\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Transaction Server\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App " |
| L"Paths\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Control " |
| L"Panel\\Cursors\\Schemes\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\AutoplayHandlers" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\DriveIcons" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\KindMap" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group " |
| L"Policy\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\PreviewHandlers" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Setup\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Telephony\\Locations" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\Console\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\FontDpi\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\FontLink\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\FontMapper\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Fonts\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\FontSubstitutes\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\Gre_initialize\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution " |
| L"Options\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\LanguagePack\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\NetworkCards" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows " |
| L"NT\\CurrentVersion\\Perflib\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Ports\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList" |
| L"\\chrome_testing", |
| L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time " |
| L"Zones\\chrome_testing", |
| L"SOFTWARE\\Policies\\chrome_testing", |
| L"SOFTWARE\\RegisteredApplications\\chrome_testing"}; |
| |
| // Run from administrator command prompt! |
| // Note: Disabled for automated testing (HKLM protection). Local testing |
| // only. |
| // |
| // This test does NOT use NtRegistryTest class. It requires Windows WOW64 |
| // redirection to take place, which would not happen with a testing redirection |
| // layer. |
| TEST(NtRegistryTestRedirection, DISABLED_Wow64RedirectionHKLM) { |
| // 1) SOFTWARE is redirected. |
| DoRedirectTest(nt::HKLM, L"SOFTWARE\\chrome_testing", |
| L"SOFTWARE\\WOW6432Node\\chrome_testing"); |
| |
| // 2) Except some subkeys are not. |
| for (size_t index = 0; index < _countof(kHKLMNoRedirects); ++index) { |
| DoRedirectTest(nt::HKLM, kHKLMNoRedirects[index], nullptr); |
| } |
| |
| // 3) But then some Classes subkeys are redirected. |
| // Using two elements for each loop. |
| for (size_t index = 0; index < _countof(kClassesRedirects); index += 2) { |
| DoRedirectTest(nt::HKLM, kClassesRedirects[index], |
| kClassesRedirects[index + 1]); |
| } |
| |
| // 4) And just make sure other Classes subkeys are shared. |
| DoRedirectTest(nt::HKLM, L"SOFTWARE\\Classes\\chrome_testing", nullptr); |
| } |
| |
| TEST(NtRegistryTestMisc, SanitizeSubkeyPaths) { |
| std::wstring new_path = L""; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| std::wstring sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"", sani_path.c_str()); |
| |
| new_path = L"boo"; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"boo", sani_path.c_str()); |
| |
| new_path = L"\\boo"; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"boo", sani_path.c_str()); |
| |
| new_path = L"boo\\"; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"boo", sani_path.c_str()); |
| |
| new_path = L"\\\\\\"; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"", sani_path.c_str()); |
| |
| new_path = L"boo\\\\\\ya"; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"boo\\ya", sani_path.c_str()); |
| |
| new_path = L"\\\\\\boo\\ya\\\\"; |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"boo\\ya", sani_path.c_str()); |
| |
| // Be sure to leave the environment clean. |
| new_path.clear(); |
| EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path)); |
| sani_path = nt::GetTestingOverride(nt::HKCU); |
| EXPECT_STREQ(L"", sani_path.c_str()); |
| } |
| |
| //------------------------------------------------------------------------------ |
| // NtRegistryTest class |
| // |
| // Only use this class for tests that need testing registry redirection. |
| //------------------------------------------------------------------------------ |
| |
| class NtRegistryTest : public testing::Test { |
| protected: |
| void SetUp() override { |
| base::string16 temp; |
| ASSERT_NO_FATAL_FAILURE( |
| override_manager_.OverrideRegistry(HKEY_CURRENT_USER, &temp)); |
| ASSERT_TRUE(nt::SetTestingOverride(nt::HKCU, temp)); |
| ASSERT_NO_FATAL_FAILURE( |
| override_manager_.OverrideRegistry(HKEY_LOCAL_MACHINE, &temp)); |
| ASSERT_TRUE(nt::SetTestingOverride(nt::HKLM, temp)); |
| } |
| |
| void TearDown() override { |
| base::string16 temp; |
| ASSERT_TRUE(nt::SetTestingOverride(nt::HKCU, temp)); |
| ASSERT_TRUE(nt::SetTestingOverride(nt::HKLM, temp)); |
| } |
| |
| private: |
| registry_util::RegistryOverrideManager override_manager_; |
| }; |
| |
| //------------------------------------------------------------------------------ |
| // NT registry API tests |
| //------------------------------------------------------------------------------ |
| |
| TEST_F(NtRegistryTest, ApiDword) { |
| HANDLE key_handle; |
| const wchar_t* dword_val_name = L"DwordTestValue"; |
| DWORD dword_val = 1234; |
| |
| // Create a subkey to play under. |
| ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, L"NTRegistry\\dword", KEY_ALL_ACCESS, |
| &key_handle)); |
| ASSERT_NE(key_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(key_handle, nullptr); |
| base::ScopedClosureRunner key_closer( |
| base::BindOnce(&nt::CloseRegKey, key_handle)); |
| |
| DWORD get_dword = 0; |
| EXPECT_FALSE(nt::QueryRegValueDWORD(key_handle, dword_val_name, &get_dword)); |
| |
| // Set |
| EXPECT_TRUE(nt::SetRegValueDWORD(key_handle, dword_val_name, dword_val)); |
| |
| // Get |
| EXPECT_TRUE(nt::QueryRegValueDWORD(key_handle, dword_val_name, &get_dword)); |
| EXPECT_EQ(get_dword, dword_val); |
| |
| // Clean up done by NtRegistryTest. |
| } |
| |
| TEST_F(NtRegistryTest, ApiSz) { |
| HANDLE key_handle; |
| const wchar_t* sz_val_name = L"SzTestValue"; |
| std::wstring sz_val = L"blah de blah de blahhhhh."; |
| const wchar_t* sz_val_name2 = L"SzTestValueEmpty"; |
| std::wstring sz_val2 = L""; |
| const wchar_t* sz_val_name3 = L"SzTestValueMalformed"; |
| const wchar_t* sz_val_name4 = L"SzTestValueMalformed2"; |
| std::wstring sz_val3 = L"malformed"; |
| BYTE* sz_val3_byte = reinterpret_cast<BYTE*>(&sz_val3[0]); |
| std::vector<BYTE> malform; |
| for (size_t i = 0; i < (sz_val3.size() * sizeof(wchar_t)); i++) |
| malform.push_back(sz_val3_byte[i]); |
| const wchar_t* sz_val_name5 = L"SzTestValueSize0"; |
| |
| // Create a subkey to play under. |
| // ------------------------------ |
| ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, L"NTRegistry\\sz", KEY_ALL_ACCESS, |
| &key_handle)); |
| ASSERT_NE(key_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(key_handle, nullptr); |
| base::ScopedClosureRunner key_closer( |
| base::BindOnce(&nt::CloseRegKey, key_handle)); |
| |
| std::wstring get_sz; |
| EXPECT_FALSE(nt::QueryRegValueSZ(key_handle, sz_val_name, &get_sz)); |
| |
| // Set |
| // ------------------------------ |
| EXPECT_TRUE(nt::SetRegValueSZ(key_handle, sz_val_name, sz_val)); |
| EXPECT_TRUE(nt::SetRegValueSZ(key_handle, sz_val_name2, sz_val2)); |
| // No null terminator. |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, sz_val_name3, REG_SZ, |
| malform.data(), |
| static_cast<DWORD>(malform.size()))); |
| malform.push_back(0); |
| // Single trailing 0 byte. |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, sz_val_name4, REG_SZ, |
| malform.data(), |
| static_cast<DWORD>(malform.size()))); |
| // Size 0 value. |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, sz_val_name5, REG_SZ, nullptr, 0)); |
| |
| // Get |
| // ------------------------------ |
| EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name, &get_sz)); |
| EXPECT_EQ(get_sz, sz_val); |
| EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name2, &get_sz)); |
| EXPECT_EQ(get_sz, sz_val2); |
| EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name3, &get_sz)); |
| // Should be adjusted under the hood to equal sz_val3. |
| EXPECT_EQ(get_sz, sz_val3); |
| EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name4, &get_sz)); |
| // Should be adjusted under the hood to equal sz_val3. |
| EXPECT_EQ(get_sz, sz_val3); |
| EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name5, &get_sz)); |
| // Should be adjusted under the hood to an empty string. |
| EXPECT_EQ(get_sz, sz_val2); |
| |
| // Clean up done by NtRegistryTest. |
| } |
| |
| TEST_F(NtRegistryTest, ApiMultiSz) { |
| HANDLE key_handle; |
| std::vector<std::wstring> multisz_val_set; |
| std::vector<std::wstring> multisz_val_get; |
| |
| // Create a subkey to play under. |
| // ------------------------------ |
| ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, L"NTRegistry\\multisz", KEY_ALL_ACCESS, |
| &key_handle)); |
| ASSERT_NE(key_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(key_handle, nullptr); |
| base::ScopedClosureRunner key_closer( |
| base::BindOnce(&nt::CloseRegKey, key_handle)); |
| |
| // Test 1 - Success |
| // ------------------------------ |
| const wchar_t* multisz_val_name = L"SzmultiTestValue"; |
| std::wstring multi1 = L"one"; |
| std::wstring multi2 = L"two"; |
| std::wstring multi3 = L"three"; |
| |
| multisz_val_set.push_back(multi1); |
| multisz_val_set.push_back(multi2); |
| multisz_val_set.push_back(multi3); |
| EXPECT_TRUE( |
| nt::SetRegValueMULTISZ(key_handle, multisz_val_name, multisz_val_set)); |
| |
| EXPECT_TRUE( |
| nt::QueryRegValueMULTISZ(key_handle, multisz_val_name, &multisz_val_get)); |
| EXPECT_EQ(multisz_val_get, multisz_val_set); |
| multisz_val_set.clear(); |
| multisz_val_get.clear(); |
| |
| // Test 2 - Bad value |
| // ------------------------------ |
| const wchar_t* multisz_val_name2 = L"SzmultiTestValueBad"; |
| std::wstring multi_empty = L""; |
| |
| multisz_val_set.push_back(multi_empty); |
| EXPECT_TRUE( |
| nt::SetRegValueMULTISZ(key_handle, multisz_val_name2, multisz_val_set)); |
| |
| EXPECT_TRUE(nt::QueryRegValueMULTISZ(key_handle, multisz_val_name2, |
| &multisz_val_get)); |
| EXPECT_EQ(multisz_val_get.size(), static_cast<DWORD>(0)); |
| multisz_val_set.clear(); |
| multisz_val_get.clear(); |
| |
| // Test 3 - Malformed |
| // ------------------------------ |
| std::wstring multisz_val3 = L"malformed"; |
| multisz_val_set.push_back(multisz_val3); |
| BYTE* multisz_val3_byte = reinterpret_cast<BYTE*>(&multisz_val3[0]); |
| std::vector<BYTE> malform; |
| for (size_t i = 0; i < (multisz_val3.size() * sizeof(wchar_t)); i++) |
| malform.push_back(multisz_val3_byte[i]); |
| |
| // 3.1: No null terminator. |
| // ------------------------------ |
| const wchar_t* multisz_val_name3 = L"SzmultiTestValueMalformed"; |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, multisz_val_name3, REG_MULTI_SZ, |
| malform.data(), |
| static_cast<DWORD>(malform.size()))); |
| EXPECT_TRUE(nt::QueryRegValueMULTISZ(key_handle, multisz_val_name3, |
| &multisz_val_get)); |
| // Should be adjusted under the hood to equal multisz_val3. |
| EXPECT_EQ(multisz_val_get, multisz_val_set); |
| multisz_val_get.clear(); |
| |
| // 3.2: Single trailing 0 byte. |
| // ------------------------------ |
| const wchar_t* multisz_val_name4 = L"SzmultiTestValueMalformed2"; |
| malform.push_back(0); |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, multisz_val_name4, REG_MULTI_SZ, |
| malform.data(), |
| static_cast<DWORD>(malform.size()))); |
| EXPECT_TRUE(nt::QueryRegValueMULTISZ(key_handle, multisz_val_name4, |
| &multisz_val_get)); |
| // Should be adjusted under the hood to equal multisz_val3. |
| EXPECT_EQ(multisz_val_get, multisz_val_set); |
| multisz_val_get.clear(); |
| |
| // 3.3: Two trailing 0 bytes. |
| // ------------------------------ |
| const wchar_t* multisz_val_name5 = L"SzmultiTestValueMalformed3"; |
| malform.push_back(0); |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, multisz_val_name5, REG_MULTI_SZ, |
| malform.data(), |
| static_cast<DWORD>(malform.size()))); |
| EXPECT_TRUE(nt::QueryRegValueMULTISZ(key_handle, multisz_val_name5, |
| &multisz_val_get)); |
| // Should be adjusted under the hood to equal multisz_val3. |
| EXPECT_EQ(multisz_val_get, multisz_val_set); |
| multisz_val_get.clear(); |
| |
| // 3.4: Three trailing 0 bytes. |
| // ------------------------------ |
| const wchar_t* multisz_val_name6 = L"SzmultiTestValueMalformed4"; |
| malform.push_back(0); |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, multisz_val_name6, REG_MULTI_SZ, |
| malform.data(), |
| static_cast<DWORD>(malform.size()))); |
| EXPECT_TRUE(nt::QueryRegValueMULTISZ(key_handle, multisz_val_name6, |
| &multisz_val_get)); |
| // Should be adjusted under the hood to equal multisz_val3. |
| EXPECT_EQ(multisz_val_get, multisz_val_set); |
| multisz_val_set.clear(); |
| multisz_val_get.clear(); |
| |
| // Test 4 - Size zero |
| // ------------------------------ |
| const wchar_t* multisz_val_name7 = L"SzmultiTestValueSize0"; |
| EXPECT_TRUE(nt::SetRegKeyValue(key_handle, multisz_val_name7, REG_MULTI_SZ, |
| nullptr, 0)); |
| EXPECT_TRUE(nt::QueryRegValueMULTISZ(key_handle, multisz_val_name7, |
| &multisz_val_get)); |
| // Should be empty. |
| EXPECT_EQ(multisz_val_get, multisz_val_set); |
| |
| // Clean up done by NtRegistryTest. |
| } |
| |
| TEST_F(NtRegistryTest, CreateRegKeyRecursion) { |
| HANDLE key_handle; |
| const wchar_t* sz_new_key_1 = L"test1\\new\\subkey"; |
| const wchar_t* sz_new_key_2 = L"test2\\new\\subkey\\blah\\"; |
| const wchar_t* sz_new_key_3 = L"\\test3\\new\\subkey\\\\blah2"; |
| |
| // Tests for CreateRegKey recursion. |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt::HKCU, sz_new_key_1, KEY_ALL_ACCESS, nullptr)); |
| EXPECT_TRUE(nt::OpenRegKey(nt::HKCU, sz_new_key_1, KEY_ALL_ACCESS, |
| &key_handle, nullptr)); |
| EXPECT_TRUE(nt::DeleteRegKey(key_handle)); |
| nt::CloseRegKey(key_handle); |
| |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt::HKCU, sz_new_key_2, KEY_ALL_ACCESS, nullptr)); |
| EXPECT_TRUE(nt::OpenRegKey(nt::HKCU, sz_new_key_2, KEY_ALL_ACCESS, |
| &key_handle, nullptr)); |
| EXPECT_TRUE(nt::DeleteRegKey(key_handle)); |
| nt::CloseRegKey(key_handle); |
| |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt::HKCU, sz_new_key_3, KEY_ALL_ACCESS, nullptr)); |
| EXPECT_TRUE(nt::OpenRegKey(nt::HKCU, L"test3\\new\\subkey\\blah2", |
| KEY_ALL_ACCESS, &key_handle, nullptr)); |
| EXPECT_TRUE(nt::DeleteRegKey(key_handle)); |
| nt::CloseRegKey(key_handle); |
| |
| // Subkey path can be null. |
| ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, nullptr, KEY_ALL_ACCESS, &key_handle)); |
| ASSERT_NE(key_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(key_handle, nullptr); |
| nt::CloseRegKey(key_handle); |
| |
| // Clean up done by NtRegistryTest. |
| } |
| |
| TEST_F(NtRegistryTest, ApiEnumeration) { |
| HANDLE key_handle; |
| HANDLE subkey_handle; |
| static constexpr wchar_t key[] = L"NTRegistry\\enum"; |
| static constexpr wchar_t subkey1[] = L"NTRegistry\\enum\\subkey1"; |
| static constexpr wchar_t subkey2[] = L"NTRegistry\\enum\\subkey2"; |
| static constexpr wchar_t subkey3[] = L"NTRegistry\\enum\\subkey3"; |
| static constexpr const wchar_t* check_names[] = { |
| L"subkey1", L"subkey2", L"subkey3", |
| }; |
| // Test out the "(Default)" value name in this suite. |
| static constexpr wchar_t subkey_val_name[] = L""; |
| DWORD subkey_val = 1234; |
| |
| // Create a subkey to play under. |
| // ------------------------------ |
| ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, key, KEY_ALL_ACCESS, &key_handle)); |
| ASSERT_NE(key_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(key_handle, nullptr); |
| base::ScopedClosureRunner key_closer( |
| base::BindOnce(&nt::CloseRegKey, key_handle)); |
| |
| // Set |
| // ------------------------------ |
| // Sub-subkey with a default value. |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt::HKCU, subkey1, KEY_ALL_ACCESS, &subkey_handle)); |
| ASSERT_NE(subkey_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(subkey_handle, nullptr); |
| EXPECT_TRUE(nt::SetRegValueDWORD(subkey_handle, subkey_val_name, subkey_val)); |
| nt::CloseRegKey(subkey_handle); |
| |
| // Sub-subkey with a default value. |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt::HKCU, subkey2, KEY_ALL_ACCESS, &subkey_handle)); |
| ASSERT_NE(subkey_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(subkey_handle, nullptr); |
| EXPECT_TRUE(nt::SetRegValueDWORD(subkey_handle, subkey_val_name, subkey_val)); |
| nt::CloseRegKey(subkey_handle); |
| |
| // Sub-subkey with a default value. |
| ASSERT_TRUE( |
| nt::CreateRegKey(nt::HKCU, subkey3, KEY_ALL_ACCESS, &subkey_handle)); |
| ASSERT_NE(subkey_handle, INVALID_HANDLE_VALUE); |
| ASSERT_NE(subkey_handle, nullptr); |
| EXPECT_TRUE(nt::SetRegValueDWORD(subkey_handle, subkey_val_name, subkey_val)); |
| nt::CloseRegKey(subkey_handle); |
| |
| // Get (via enumeration) |
| // ------------------------------ |
| ULONG subkey_count = 0; |
| EXPECT_TRUE(nt::QueryRegEnumerationInfo(key_handle, &subkey_count)); |
| ASSERT_EQ(subkey_count, ULONG{3}); |
| |
| std::wstring subkey_name; |
| for (ULONG i = 0; i < subkey_count; i++) { |
| ASSERT_TRUE(nt::QueryRegSubkey(key_handle, i, &subkey_name)); |
| |
| bool found = false; |
| for (size_t index = 0; index < arraysize(check_names); index++) { |
| if (0 == subkey_name.compare(check_names[index])) { |
| found = true; |
| break; |
| } |
| } |
| ASSERT_TRUE(found); |
| |
| // Grab the default DWORD value out of this subkey. |
| DWORD value = 0; |
| std::wstring temp(key); |
| temp.append(L"\\"); |
| temp.append(subkey_name); |
| EXPECT_TRUE(nt::QueryRegValueDWORD(nt::HKCU, nt::NONE, temp.c_str(), |
| subkey_val_name, &value)); |
| EXPECT_EQ(value, subkey_val); |
| } |
| // Also test a known bad index. |
| EXPECT_FALSE(nt::QueryRegSubkey(key_handle, subkey_count, &subkey_name)); |
| |
| // Clean up done by NtRegistryTest. |
| } |
| |
| } // namespace |