0ce93c678d8a073516f510ae3d8134a52cc92420
[reactos.git] / modules / rostests / winetests / advapi32 / lsa.c
1 /*
2 * Unit tests for lsa functions
3 *
4 * Copyright (c) 2006 Robert Reif
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19 */
20
21 #include "precomp.h"
22
23 #include <winnls.h>
24 #include <objbase.h>
25 #include <initguid.h>
26
27 DEFINE_GUID(GUID_NULL,0,0,0,0,0,0,0,0,0,0,0);
28
29 static HMODULE hadvapi32;
30 static NTSTATUS (WINAPI *pLsaClose)(LSA_HANDLE);
31 static NTSTATUS (WINAPI *pLsaEnumerateAccountRights)(LSA_HANDLE,PSID,PLSA_UNICODE_STRING*,PULONG);
32 static NTSTATUS (WINAPI *pLsaFreeMemory)(PVOID);
33 static NTSTATUS (WINAPI *pLsaOpenPolicy)(PLSA_UNICODE_STRING,PLSA_OBJECT_ATTRIBUTES,ACCESS_MASK,PLSA_HANDLE);
34 static NTSTATUS (WINAPI *pLsaQueryInformationPolicy)(LSA_HANDLE,POLICY_INFORMATION_CLASS,PVOID*);
35 static BOOL (WINAPI *pConvertSidToStringSidA)(PSID,LPSTR*);
36 static BOOL (WINAPI *pConvertStringSidToSidA)(LPCSTR,PSID*);
37 static NTSTATUS (WINAPI *pLsaLookupNames2)(LSA_HANDLE,ULONG,ULONG,PLSA_UNICODE_STRING,PLSA_REFERENCED_DOMAIN_LIST*,PLSA_TRANSLATED_SID2*);
38 static NTSTATUS (WINAPI *pLsaLookupSids)(LSA_HANDLE,ULONG,PSID*,LSA_REFERENCED_DOMAIN_LIST**,LSA_TRANSLATED_NAME**);
39 static PVOID (WINAPI *pFreeSid)(PSID);
40
41 static BOOL init(void)
42 {
43 hadvapi32 = GetModuleHandleA("advapi32.dll");
44
45 pLsaClose = (void*)GetProcAddress(hadvapi32, "LsaClose");
46 pLsaEnumerateAccountRights = (void*)GetProcAddress(hadvapi32, "LsaEnumerateAccountRights");
47 pLsaFreeMemory = (void*)GetProcAddress(hadvapi32, "LsaFreeMemory");
48 pLsaOpenPolicy = (void*)GetProcAddress(hadvapi32, "LsaOpenPolicy");
49 pLsaQueryInformationPolicy = (void*)GetProcAddress(hadvapi32, "LsaQueryInformationPolicy");
50 pConvertSidToStringSidA = (void*)GetProcAddress(hadvapi32, "ConvertSidToStringSidA");
51 pConvertStringSidToSidA = (void*)GetProcAddress(hadvapi32, "ConvertStringSidToSidA");
52 pLsaLookupNames2 = (void*)GetProcAddress(hadvapi32, "LsaLookupNames2");
53 pLsaLookupSids = (void*)GetProcAddress(hadvapi32, "LsaLookupSids");
54 pFreeSid = (void*)GetProcAddress(hadvapi32, "FreeSid");
55
56 if (pLsaClose && pLsaEnumerateAccountRights && pLsaFreeMemory && pLsaOpenPolicy && pLsaQueryInformationPolicy && pConvertSidToStringSidA && pConvertStringSidToSidA && pFreeSid)
57 return TRUE;
58
59 return FALSE;
60 }
61
62 static void test_lsa(void)
63 {
64 static WCHAR machineW[] = {'W','i','n','e','N','o','M','a','c','h','i','n','e',0};
65 LSA_UNICODE_STRING machine;
66 NTSTATUS status;
67 LSA_HANDLE handle;
68 LSA_OBJECT_ATTRIBUTES object_attributes;
69
70 ZeroMemory(&object_attributes, sizeof(object_attributes));
71 object_attributes.Length = sizeof(object_attributes);
72
73 machine.Buffer = machineW;
74 machine.Length = sizeof(machineW) - 2;
75 machine.MaximumLength = sizeof(machineW);
76
77 status = pLsaOpenPolicy( &machine, &object_attributes, POLICY_LOOKUP_NAMES, &handle);
78 ok(status == RPC_NT_SERVER_UNAVAILABLE,
79 "LsaOpenPolicy(POLICY_LOOKUP_NAMES) for invalid machine returned 0x%08x\n", status);
80
81 status = pLsaOpenPolicy( NULL, &object_attributes, POLICY_ALL_ACCESS, &handle);
82 ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED,
83 "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status);
84
85 /* try a more restricted access mask if necessary */
86 if (status == STATUS_ACCESS_DENIED) {
87 trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES\n");
88 status = pLsaOpenPolicy( NULL, &object_attributes, POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES, &handle);
89 ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION|POLICY_LOOKUP_NAMES) returned 0x%08x\n", status);
90 }
91
92 if (status == STATUS_SUCCESS) {
93 PPOLICY_AUDIT_EVENTS_INFO audit_events_info;
94 PPOLICY_PRIMARY_DOMAIN_INFO primary_domain_info;
95 PPOLICY_ACCOUNT_DOMAIN_INFO account_domain_info;
96 PPOLICY_DNS_DOMAIN_INFO dns_domain_info;
97 HANDLE token;
98 BOOL ret;
99
100 status = pLsaQueryInformationPolicy(handle, PolicyAuditEventsInformation, (PVOID*)&audit_events_info);
101 if (status == STATUS_ACCESS_DENIED)
102 skip("Not enough rights to retrieve PolicyAuditEventsInformation\n");
103 else
104 ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAuditEventsInformation) failed, returned 0x%08x\n", status);
105 if (status == STATUS_SUCCESS) {
106 pLsaFreeMemory((LPVOID)audit_events_info);
107 }
108
109 status = pLsaQueryInformationPolicy(handle, PolicyPrimaryDomainInformation, (PVOID*)&primary_domain_info);
110 ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyPrimaryDomainInformation) failed, returned 0x%08x\n", status);
111 if (status == STATUS_SUCCESS) {
112 if (primary_domain_info->Sid) {
113 LPSTR strsid;
114 if (pConvertSidToStringSidA(primary_domain_info->Sid, &strsid))
115 {
116 if (primary_domain_info->Name.Buffer) {
117 LPSTR name = NULL;
118 UINT len;
119 len = WideCharToMultiByte( CP_ACP, 0, primary_domain_info->Name.Buffer, -1, NULL, 0, NULL, NULL );
120 name = LocalAlloc( 0, len );
121 WideCharToMultiByte( CP_ACP, 0, primary_domain_info->Name.Buffer, -1, name, len, NULL, NULL );
122 trace(" name: %s sid: %s\n", name, strsid);
123 LocalFree( name );
124 } else
125 trace(" name: NULL sid: %s\n", strsid);
126 LocalFree( strsid );
127 }
128 else
129 trace("invalid sid\n");
130 }
131 else
132 trace("Running on a standalone system.\n");
133 pLsaFreeMemory((LPVOID)primary_domain_info);
134 }
135
136 status = pLsaQueryInformationPolicy(handle, PolicyAccountDomainInformation, (PVOID*)&account_domain_info);
137 ok(status == STATUS_SUCCESS, "LsaQueryInformationPolicy(PolicyAccountDomainInformation) failed, returned 0x%08x\n", status);
138 if (status == STATUS_SUCCESS) {
139 pLsaFreeMemory((LPVOID)account_domain_info);
140 }
141
142 /* This isn't supported in NT4 */
143 status = pLsaQueryInformationPolicy(handle, PolicyDnsDomainInformation, (PVOID*)&dns_domain_info);
144 ok(status == STATUS_SUCCESS || status == STATUS_INVALID_PARAMETER,
145 "LsaQueryInformationPolicy(PolicyDnsDomainInformation) failed, returned 0x%08x\n", status);
146 if (status == STATUS_SUCCESS) {
147 if (dns_domain_info->Sid || !IsEqualGUID(&dns_domain_info->DomainGuid, &GUID_NULL)) {
148 LPSTR strsid = NULL;
149 LPSTR name = NULL;
150 LPSTR domain = NULL;
151 LPSTR forest = NULL;
152 LPSTR guidstr = NULL;
153 WCHAR guidstrW[64];
154 UINT len;
155 guidstrW[0] = '\0';
156 pConvertSidToStringSidA(dns_domain_info->Sid, &strsid);
157 StringFromGUID2(&dns_domain_info->DomainGuid, guidstrW, sizeof(guidstrW)/sizeof(WCHAR));
158 len = WideCharToMultiByte( CP_ACP, 0, guidstrW, -1, NULL, 0, NULL, NULL );
159 guidstr = LocalAlloc( 0, len );
160 WideCharToMultiByte( CP_ACP, 0, guidstrW, -1, guidstr, len, NULL, NULL );
161 if (dns_domain_info->Name.Buffer) {
162 len = WideCharToMultiByte( CP_ACP, 0, dns_domain_info->Name.Buffer, -1, NULL, 0, NULL, NULL );
163 name = LocalAlloc( 0, len );
164 WideCharToMultiByte( CP_ACP, 0, dns_domain_info->Name.Buffer, -1, name, len, NULL, NULL );
165 }
166 if (dns_domain_info->DnsDomainName.Buffer) {
167 len = WideCharToMultiByte( CP_ACP, 0, dns_domain_info->DnsDomainName.Buffer, -1, NULL, 0, NULL, NULL );
168 domain = LocalAlloc( 0, len );
169 WideCharToMultiByte( CP_ACP, 0, dns_domain_info->DnsDomainName.Buffer, -1, domain, len, NULL, NULL );
170 }
171 if (dns_domain_info->DnsForestName.Buffer) {
172 len = WideCharToMultiByte( CP_ACP, 0, dns_domain_info->DnsForestName.Buffer, -1, NULL, 0, NULL, NULL );
173 forest = LocalAlloc( 0, len );
174 WideCharToMultiByte( CP_ACP, 0, dns_domain_info->DnsForestName.Buffer, -1, forest, len, NULL, NULL );
175 }
176 trace(" name: %s domain: %s forest: %s guid: %s sid: %s\n",
177 name ? name : "NULL", domain ? domain : "NULL",
178 forest ? forest : "NULL", guidstr, strsid ? strsid : "NULL");
179 LocalFree( name );
180 LocalFree( forest );
181 LocalFree( domain );
182 LocalFree( guidstr );
183 LocalFree( strsid );
184 }
185 else
186 trace("Running on a standalone system.\n");
187 pLsaFreeMemory((LPVOID)dns_domain_info);
188 }
189
190 /* We need a valid SID to pass to LsaEnumerateAccountRights */
191 ret = OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &token );
192 ok(ret, "Unable to obtain process token, error %u\n", GetLastError( ));
193 if (ret) {
194 char buffer[64];
195 DWORD len;
196 TOKEN_USER *token_user = (TOKEN_USER *) buffer;
197 ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, sizeof(buffer), &len );
198 ok(ret || GetLastError( ) == ERROR_INSUFFICIENT_BUFFER, "Unable to obtain token information, error %u\n", GetLastError( ));
199 if (! ret && GetLastError( ) == ERROR_INSUFFICIENT_BUFFER) {
200 trace("Resizing buffer to %u.\n", len);
201 token_user = LocalAlloc( 0, len );
202 if (token_user != NULL)
203 ret = GetTokenInformation( token, TokenUser, (LPVOID) token_user, len, &len );
204 }
205
206 if (ret) {
207 PLSA_UNICODE_STRING rights;
208 ULONG rights_count;
209 rights = (PLSA_UNICODE_STRING) 0xdeadbeaf;
210 rights_count = 0xcafecafe;
211 status = pLsaEnumerateAccountRights(handle, token_user->User.Sid, &rights, &rights_count);
212 ok(status == STATUS_SUCCESS || status == STATUS_OBJECT_NAME_NOT_FOUND, "Unexpected status 0x%x\n", status);
213 if (status == STATUS_SUCCESS)
214 pLsaFreeMemory( rights );
215 else
216 ok(rights == NULL && rights_count == 0, "Expected rights and rights_count to be set to 0 on failure\n");
217 }
218 if (token_user != NULL && token_user != (TOKEN_USER *) buffer)
219 LocalFree( token_user );
220 CloseHandle( token );
221 }
222
223 status = pLsaClose(handle);
224 ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status);
225 }
226 }
227
228 static void get_sid_info(PSID psid, LPSTR *user, LPSTR *dom)
229 {
230 static char account[257], domain[257];
231 DWORD user_size, dom_size;
232 SID_NAME_USE use;
233 BOOL ret;
234
235 *user = account;
236 *dom = domain;
237
238 user_size = dom_size = 257;
239 account[0] = domain[0] = 0;
240 ret = LookupAccountSidA(NULL, psid, account, &user_size, domain, &dom_size, &use);
241 ok(ret, "LookupAccountSidA failed %u\n", GetLastError());
242 }
243
244 static void test_LsaLookupNames2(void)
245 {
246 static const WCHAR n1[] = {'L','O','C','A','L',' ','S','E','R','V','I','C','E'};
247 static const WCHAR n2[] = {'N','T',' ','A','U','T','H','O','R','I','T','Y','\\','L','o','c','a','l','S','e','r','v','i','c','e'};
248
249 NTSTATUS status;
250 LSA_HANDLE handle;
251 LSA_OBJECT_ATTRIBUTES attrs;
252 PLSA_REFERENCED_DOMAIN_LIST domains;
253 PLSA_TRANSLATED_SID2 sids;
254 LSA_UNICODE_STRING name[3];
255 LPSTR account, sid_dom;
256
257 if (!pLsaLookupNames2)
258 {
259 win_skip("LsaLookupNames2 not available\n");
260 return;
261 }
262
263 if ((PRIMARYLANGID(LANGIDFROMLCID(GetSystemDefaultLCID())) != LANG_ENGLISH) ||
264 (PRIMARYLANGID(LANGIDFROMLCID(GetThreadLocale())) != LANG_ENGLISH))
265 {
266 skip("Non-English locale (skipping LsaLookupNames2 tests)\n");
267 return;
268 }
269
270 memset(&attrs, 0, sizeof(attrs));
271 attrs.Length = sizeof(attrs);
272
273 status = pLsaOpenPolicy(NULL, &attrs, POLICY_ALL_ACCESS, &handle);
274 ok(status == STATUS_SUCCESS || status == STATUS_ACCESS_DENIED,
275 "LsaOpenPolicy(POLICY_ALL_ACCESS) returned 0x%08x\n", status);
276
277 /* try a more restricted access mask if necessary */
278 if (status == STATUS_ACCESS_DENIED)
279 {
280 trace("LsaOpenPolicy(POLICY_ALL_ACCESS) failed, trying POLICY_VIEW_LOCAL_INFORMATION\n");
281 status = pLsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &handle);
282 ok(status == STATUS_SUCCESS, "LsaOpenPolicy(POLICY_VIEW_LOCAL_INFORMATION) returned 0x%08x\n", status);
283 }
284 if (status != STATUS_SUCCESS)
285 {
286 skip("Cannot acquire policy handle\n");
287 return;
288 }
289
290 name[0].Buffer = HeapAlloc(GetProcessHeap(), 0, sizeof(n1));
291 name[0].Length = name[0].MaximumLength = sizeof(n1);
292 memcpy(name[0].Buffer, n1, sizeof(n1));
293
294 name[1].Buffer = HeapAlloc(GetProcessHeap(), 0, sizeof(n1));
295 name[1].Length = name[1].MaximumLength = sizeof(n1) - sizeof(WCHAR);
296 memcpy(name[1].Buffer, n1, sizeof(n1) - sizeof(WCHAR));
297
298 name[2].Buffer = HeapAlloc(GetProcessHeap(), 0, sizeof(n2));
299 name[2].Length = name[2].MaximumLength = sizeof(n2);
300 memcpy(name[2].Buffer, n2, sizeof(n2));
301
302 /* account name only */
303 sids = NULL;
304 domains = NULL;
305 status = pLsaLookupNames2(handle, 0, 1, &name[0], &domains, &sids);
306 ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %x)\n", status);
307 ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
308 ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags);
309 ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries);
310 get_sid_info(sids[0].Sid, &account, &sid_dom);
311 ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account);
312 ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom);
313 pLsaFreeMemory(sids);
314 pLsaFreeMemory(domains);
315
316 /* unknown account name */
317 sids = NULL;
318 domains = NULL;
319 status = pLsaLookupNames2(handle, 0, 1, &name[1], &domains, &sids);
320 ok(status == STATUS_NONE_MAPPED, "expected STATUS_NONE_MAPPED, got %x)\n", status);
321 ok(sids[0].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[0].Use);
322 ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags);
323 ok(domains->Entries == 0, "expected 0, got %u\n", domains->Entries);
324 pLsaFreeMemory(sids);
325 pLsaFreeMemory(domains);
326
327 /* account + domain */
328 sids = NULL;
329 domains = NULL;
330 status = pLsaLookupNames2(handle, 0, 1, &name[2], &domains, &sids);
331 ok(status == STATUS_SUCCESS, "expected STATUS_SUCCESS, got %x)\n", status);
332 ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
333 ok(sids[0].Flags == 0, "expected 0, got 0x%08x\n", sids[0].Flags);
334 ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries);
335 get_sid_info(sids[0].Sid, &account, &sid_dom);
336 ok(!strcmp(account, "LOCAL SERVICE"), "expected \"LOCAL SERVICE\", got \"%s\"\n", account);
337 ok(!strcmp(sid_dom, "NT AUTHORITY"), "expected \"NT AUTHORITY\", got \"%s\"\n", sid_dom);
338 pLsaFreeMemory(sids);
339 pLsaFreeMemory(domains);
340
341 /* all three */
342 sids = NULL;
343 domains = NULL;
344 status = pLsaLookupNames2(handle, 0, 3, name, &domains, &sids);
345 ok(status == STATUS_SOME_NOT_MAPPED, "expected STATUS_SOME_NOT_MAPPED, got %x)\n", status);
346 ok(sids[0].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[0].Use);
347 ok(sids[1].Use == SidTypeUnknown, "expected SidTypeUnknown, got %u\n", sids[1].Use);
348 ok(sids[2].Use == SidTypeWellKnownGroup, "expected SidTypeWellKnownGroup, got %u\n", sids[2].Use);
349 ok(sids[0].DomainIndex == 0, "expected 0, got %u\n", sids[0].DomainIndex);
350 ok(domains->Entries == 1, "expected 1, got %u\n", domains->Entries);
351 pLsaFreeMemory(sids);
352 pLsaFreeMemory(domains);
353
354 HeapFree(GetProcessHeap(), 0, name[0].Buffer);
355 HeapFree(GetProcessHeap(), 0, name[1].Buffer);
356 HeapFree(GetProcessHeap(), 0, name[2].Buffer);
357
358 status = pLsaClose(handle);
359 ok(status == STATUS_SUCCESS, "LsaClose() failed, returned 0x%08x\n", status);
360 }
361
362 static void test_LsaLookupSids(void)
363 {
364 LSA_REFERENCED_DOMAIN_LIST *list;
365 LSA_OBJECT_ATTRIBUTES attrs;
366 LSA_TRANSLATED_NAME *names;
367 LSA_HANDLE policy;
368 TOKEN_USER *user;
369 NTSTATUS status;
370 HANDLE token;
371 DWORD size;
372 BOOL ret;
373
374 memset(&attrs, 0, sizeof(attrs));
375 attrs.Length = sizeof(attrs);
376
377 status = pLsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy);
378 ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
379
380 ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &token);
381 ok(ret, "got %d\n", ret);
382
383 ret = GetTokenInformation(token, TokenUser, NULL, 0, &size);
384 ok(!ret, "got %d\n", ret);
385
386 user = HeapAlloc(GetProcessHeap(), 0, size);
387 ret = GetTokenInformation(token, TokenUser, user, size, &size);
388 ok(ret, "got %d\n", ret);
389
390 status = pLsaLookupSids(policy, 1, &user->User.Sid, &list, &names);
391 ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
392
393 ok(list->Entries > 0, "got %d\n", list->Entries);
394 if (list->Entries)
395 {
396 ok((char*)list->Domains - (char*)list > 0, "%p, %p\n", list, list->Domains);
397 ok((char*)list->Domains[0].Sid - (char*)list->Domains > 0, "%p, %p\n", list->Domains, list->Domains[0].Sid);
398 ok(list->Domains[0].Name.MaximumLength > list->Domains[0].Name.Length, "got %d, %d\n", list->Domains[0].Name.MaximumLength,
399 list->Domains[0].Name.Length);
400 }
401
402 pLsaFreeMemory(names);
403 pLsaFreeMemory(list);
404
405 HeapFree(GetProcessHeap(), 0, user);
406
407 CloseHandle(token);
408
409 status = pLsaClose(policy);
410 ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
411 }
412
413 static void test_LsaLookupSids_NullBuffers(void)
414 {
415 LSA_REFERENCED_DOMAIN_LIST *list;
416 LSA_OBJECT_ATTRIBUTES attrs;
417 LSA_TRANSLATED_NAME *names;
418 LSA_HANDLE policy;
419 NTSTATUS status;
420 BOOL ret;
421 PSID sid;
422
423 memset(&attrs, 0, sizeof(attrs));
424 attrs.Length = sizeof(attrs);
425
426 status = pLsaOpenPolicy(NULL, &attrs, POLICY_LOOKUP_NAMES, &policy);
427 ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
428
429 ret = pConvertStringSidToSidA("S-1-1-0", &sid);
430 ok(ret == TRUE, "pConvertStringSidToSidA returned false\n");
431
432 status = pLsaLookupSids(policy, 1, &sid, &list, &names);
433 ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
434
435 ok(list->Entries > 0, "got %d\n", list->Entries);
436
437 if (list->Entries)
438 {
439 ok((char*)list->Domains - (char*)list > 0, "%p, %p\n", list, list->Domains);
440 ok((char*)list->Domains[0].Sid - (char*)list->Domains > 0, "%p, %p\n", list->Domains, list->Domains[0].Sid);
441 ok(list->Domains[0].Name.MaximumLength > list->Domains[0].Name.Length, "got %d, %d\n", list->Domains[0].Name.MaximumLength,
442 list->Domains[0].Name.Length);
443 ok(list->Domains[0].Name.Buffer != NULL, "domain[0] name buffer is null\n");
444 }
445
446 pLsaFreeMemory(names);
447 pLsaFreeMemory(list);
448
449 pFreeSid(sid);
450
451 status = pLsaClose(policy);
452 ok(status == STATUS_SUCCESS, "got 0x%08x\n", status);
453 }
454
455 START_TEST(lsa)
456 {
457 if (!init()) {
458 win_skip("Needed functions are not available\n");
459 return;
460 }
461
462 test_lsa();
463 test_LsaLookupNames2();
464 test_LsaLookupSids();
465 test_LsaLookupSids_NullBuffers();
466 }