| Index: chrome_elf/nt_registry/nt_registry_unittest.cc
|
| diff --git a/chrome_elf/nt_registry/nt_registry_unittest.cc b/chrome_elf/nt_registry/nt_registry_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..d2020429fadbc20d9da8ee412c54612e3bc15766
|
| --- /dev/null
|
| +++ b/chrome_elf/nt_registry/nt_registry_unittest.cc
|
| @@ -0,0 +1,465 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome_elf/nt_registry/nt_registry.h"
|
| +
|
| +#include <windows.h>
|
| +#include <rpc.h>
|
| +#include <stddef.h>
|
| +
|
| +#include "base/test/test_reg_util_win.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace {
|
| +
|
| +//------------------------------------------------------------------------------
|
| +// WOW64 redirection tests
|
| +//
|
| +// - Only HKCU will be tested on the auto (try) bots.
|
| +// HKLM will be kept separate (and manual) for local testing only.
|
| +//
|
| +// NOTE: Currently no real WOW64 context testing, as building x86 projects
|
| +// during x64 builds is not currently supported for performance reasons.
|
| +// https://cs.chromium.org/chromium/src/build/toolchain/win/BUILD.gn?sq%3Dpackage:chromium&l=314
|
| +//------------------------------------------------------------------------------
|
| +
|
| +// Utility function for the WOW64 redirection test suites.
|
| +// Note: Testing redirection through ADVAPI32 here as well, to get notice if
|
| +// expected behaviour changes!
|
| +// If |redirected_path| == nullptr, no redirection is expected in any case.
|
| +void DoRedirectTest(nt::ROOT_KEY nt_root_key,
|
| + const wchar_t* path,
|
| + const wchar_t* redirected_path OPTIONAL) {
|
| + HANDLE handle = INVALID_HANDLE_VALUE;
|
| + HKEY key_handle = nullptr;
|
| + constexpr ACCESS_MASK kAccess = KEY_WRITE | DELETE;
|
| + const HKEY root_key =
|
| + (nt_root_key == nt::HKCU) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE;
|
| +
|
| + // Make sure clean before starting.
|
| + nt::DeleteRegKey(nt_root_key, nt::NONE, path);
|
| + if (redirected_path)
|
| + nt::DeleteRegKey(nt_root_key, nt::NONE, redirected_path);
|
| +
|
| + //----------------------------------------------------------------------------
|
| + // No redirection through ADVAPI32 on straight x86 or x64.
|
| + ASSERT_EQ(ERROR_SUCCESS,
|
| + RegCreateKeyExW(root_key, path, 0, nullptr, REG_OPTION_NON_VOLATILE,
|
| + kAccess, nullptr, &key_handle, nullptr));
|
| + ASSERT_EQ(ERROR_SUCCESS, RegCloseKey(key_handle));
|
| + ASSERT_TRUE(nt::OpenRegKey(nt_root_key, path, kAccess, &handle, nullptr));
|
| + ASSERT_TRUE(nt::DeleteRegKey(handle));
|
| + nt::CloseRegKey(handle);
|
| +
|
| +#ifdef _WIN64
|
| + //----------------------------------------------------------------------------
|
| + // Try forcing WOW64 redirection on x64 through ADVAPI32.
|
| + ASSERT_EQ(ERROR_SUCCESS,
|
| + RegCreateKeyExW(root_key, path, 0, nullptr, REG_OPTION_NON_VOLATILE,
|
| + kAccess | KEY_WOW64_32KEY, nullptr, &key_handle,
|
| + nullptr));
|
| + ASSERT_EQ(ERROR_SUCCESS, RegCloseKey(key_handle));
|
| + // Check path:
|
| + if (nt::OpenRegKey(nt_root_key, path, kAccess, &handle, nullptr)) {
|
| + if (redirected_path)
|
| + ADD_FAILURE();
|
| + ASSERT_TRUE(nt::DeleteRegKey(handle));
|
| + nt::CloseRegKey(handle);
|
| + } else if (!redirected_path) {
|
| + // Should have succeeded.
|
| + ADD_FAILURE();
|
| + }
|
| + if (redirected_path) {
|
| + // Check redirected path:
|
| + if (nt::OpenRegKey(nt_root_key, redirected_path, kAccess, &handle,
|
| + nullptr)) {
|
| + if (!redirected_path)
|
| + ADD_FAILURE();
|
| + ASSERT_TRUE(nt::DeleteRegKey(handle));
|
| + nt::CloseRegKey(handle);
|
| + } else {
|
| + // Should have succeeded.
|
| + ADD_FAILURE();
|
| + }
|
| + }
|
| +
|
| + //----------------------------------------------------------------------------
|
| + // Try forcing WOW64 redirection on x64 through NTDLL.
|
| + ASSERT_TRUE(
|
| + nt::CreateRegKey(nt_root_key, path, kAccess | KEY_WOW64_32KEY, nullptr));
|
| + // Check path:
|
| + if (nt::OpenRegKey(nt_root_key, path, kAccess, &handle, nullptr)) {
|
| + if (redirected_path)
|
| + ADD_FAILURE();
|
| + ASSERT_TRUE(nt::DeleteRegKey(handle));
|
| + nt::CloseRegKey(handle);
|
| + } else if (!redirected_path) {
|
| + // Should have succeeded.
|
| + ADD_FAILURE();
|
| + }
|
| + if (redirected_path) {
|
| + // Check redirected path:
|
| + if (nt::OpenRegKey(nt_root_key, redirected_path, kAccess, &handle,
|
| + nullptr)) {
|
| + if (!redirected_path)
|
| + ADD_FAILURE();
|
| + ASSERT_TRUE(nt::DeleteRegKey(handle));
|
| + nt::CloseRegKey(handle);
|
| + } else {
|
| + // Should have succeeded.
|
| + ADD_FAILURE();
|
| + }
|
| + }
|
| +#endif // _WIN64
|
| +}
|
| +
|
| +// These test reg paths match |kClassesSubtree| in nt_registry.cc.
|
| +constexpr const wchar_t* kClassesRedirects[] = {
|
| + L"SOFTWARE\\Classes\\CLSID\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\WOW6432Node\\CLSID\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\DirectShow\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\WOW6432Node\\DirectShow\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\Interface\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\WOW6432Node\\Interface\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\Media Type\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\WOW6432Node\\Media Type\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\MediaFoundation\\chrome_testing",
|
| + L"SOFTWARE\\Classes\\WOW6432Node\\MediaFoundation\\chrome_testing"};
|
| +
|
| +static_assert((_countof(kClassesRedirects) & 0x01) == 0,
|
| + "Must have an even number of kClassesRedirects.");
|
| +
|
| +// This test does NOT use NtRegistryTest class. It requires Windows WOW64
|
| +// redirection to take place, which would not happen with a testing redirection
|
| +// layer.
|
| +TEST(NtRegistryTestRedirection, Wow64RedirectionHKCU) {
|
| + // Using two elements for each loop.
|
| + for (size_t index = 0; index < _countof(kClassesRedirects); index += 2) {
|
| + DoRedirectTest(nt::HKCU, kClassesRedirects[index],
|
| + kClassesRedirects[index + 1]);
|
| + }
|
| +}
|
| +
|
| +// These test reg paths match |kHklmSoftwareSubtree| in nt_registry.cc.
|
| +constexpr const wchar_t* kHKLMNoRedirects[] = {
|
| + L"SOFTWARE\\Classes\\chrome_testing", L"SOFTWARE\\Clients\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\COM3\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Cryptography\\Calais\\Current\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Cryptography\\Calais\\Readers\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Cryptography\\Services\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\CTF\\SystemShared\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\CTF\\TIP\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\DFS\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Driver Signing\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\EnterpriseCertificates\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\EventSystem\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\MSMQ\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Non-Driver Signing\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Notepad\\DefaultFonts\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\OLE\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\RAS\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\RPC\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\SOFTWARE\\Microsoft\\Shared "
|
| + L"Tools\\MSInfo\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\SystemCertificates\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\TermServLicensing\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Transaction Server\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App "
|
| + L"Paths\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Control "
|
| + L"Panel\\Cursors\\Schemes\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\AutoplayHandlers"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\DriveIcons"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\KindMap"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group "
|
| + L"Policy\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\PreviewHandlers"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Setup\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Telephony\\Locations"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\Console\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\FontDpi\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\FontLink\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\FontMapper\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Fonts\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\FontSubstitutes\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\Gre_initialize\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution "
|
| + L"Options\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\LanguagePack\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\NetworkCards"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows "
|
| + L"NT\\CurrentVersion\\Perflib\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Ports\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList"
|
| + L"\\chrome_testing",
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time "
|
| + L"Zones\\chrome_testing",
|
| + L"SOFTWARE\\Policies\\chrome_testing",
|
| + L"SOFTWARE\\RegisteredApplications\\chrome_testing"};
|
| +
|
| +// Run from administrator command prompt!
|
| +// Note: Disabled for automated testing (HKLM protection). Local testing
|
| +// only.
|
| +//
|
| +// This test does NOT use NtRegistryTest class. It requires Windows WOW64
|
| +// redirection to take place, which would not happen with a testing redirection
|
| +// layer.
|
| +TEST(NtRegistryTestRedirection, DISABLED_Wow64RedirectionHKLM) {
|
| + // 1) SOFTWARE is redirected.
|
| + DoRedirectTest(nt::HKLM, L"SOFTWARE\\chrome_testing",
|
| + L"SOFTWARE\\WOW6432Node\\chrome_testing");
|
| +
|
| + // 2) Except some subkeys are not.
|
| + for (size_t index = 0; index < _countof(kHKLMNoRedirects); ++index) {
|
| + DoRedirectTest(nt::HKLM, kHKLMNoRedirects[index], nullptr);
|
| + }
|
| +
|
| + // 3) But then some Classes subkeys are redirected.
|
| + // Using two elements for each loop.
|
| + for (size_t index = 0; index < _countof(kClassesRedirects); index += 2) {
|
| + DoRedirectTest(nt::HKLM, kClassesRedirects[index],
|
| + kClassesRedirects[index + 1]);
|
| + }
|
| +
|
| + // 4) And just make sure other Classes subkeys are shared.
|
| + DoRedirectTest(nt::HKLM, L"SOFTWARE\\Classes\\chrome_testing", nullptr);
|
| +}
|
| +
|
| +TEST(NtRegistryTestMisc, SanitizeSubkeyPaths) {
|
| + std::wstring new_path = L"";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + std::wstring sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"", sani_path.c_str());
|
| +
|
| + new_path = L"boo";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"boo", sani_path.c_str());
|
| +
|
| + new_path = L"\\boo";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"boo", sani_path.c_str());
|
| +
|
| + new_path = L"boo\\";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"boo", sani_path.c_str());
|
| +
|
| + new_path = L"\\\\\\";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"", sani_path.c_str());
|
| +
|
| + new_path = L"boo\\\\\\ya";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"boo\\ya", sani_path.c_str());
|
| +
|
| + new_path = L"\\\\\\boo\\ya\\\\";
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"boo\\ya", sani_path.c_str());
|
| +
|
| + // Be sure to leave the environment clean.
|
| + new_path.clear();
|
| + EXPECT_TRUE(nt::SetTestingOverride(nt::HKCU, new_path));
|
| + sani_path = nt::GetTestingOverride(nt::HKCU);
|
| + EXPECT_STREQ(L"", sani_path.c_str());
|
| +}
|
| +
|
| +//------------------------------------------------------------------------------
|
| +// NtRegistryTest class
|
| +//
|
| +// Only use this class for tests that need testing registry redirection.
|
| +//------------------------------------------------------------------------------
|
| +
|
| +class NtRegistryTest : public testing::Test {
|
| + protected:
|
| + void SetUp() override {
|
| + base::string16 temp;
|
| + override_manager_.OverrideRegistry(HKEY_CURRENT_USER, &temp);
|
| + ASSERT_TRUE(nt::SetTestingOverride(nt::HKCU, temp));
|
| + override_manager_.OverrideRegistry(HKEY_LOCAL_MACHINE, &temp);
|
| + ASSERT_TRUE(nt::SetTestingOverride(nt::HKLM, temp));
|
| + }
|
| +
|
| + void TearDown() override {
|
| + base::string16 temp;
|
| + ASSERT_TRUE(nt::SetTestingOverride(nt::HKCU, temp));
|
| + ASSERT_TRUE(nt::SetTestingOverride(nt::HKLM, temp));
|
| + }
|
| +
|
| + private:
|
| + registry_util::RegistryOverrideManager override_manager_;
|
| +};
|
| +
|
| +//------------------------------------------------------------------------------
|
| +// NT registry API tests
|
| +//------------------------------------------------------------------------------
|
| +
|
| +TEST_F(NtRegistryTest, API_DWORD) {
|
| + HANDLE key_handle;
|
| + const wchar_t* dword_val_name = L"DwordTestValue";
|
| + DWORD dword_val = 1234;
|
| +
|
| + // Create a subkey to play under.
|
| + ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, L"NTRegistry\\dword", KEY_ALL_ACCESS,
|
| + &key_handle));
|
| + ASSERT_NE(key_handle, INVALID_HANDLE_VALUE);
|
| + ASSERT_NE(key_handle, nullptr);
|
| +
|
| + DWORD get_dword = 0;
|
| + EXPECT_FALSE(nt::QueryRegValueDWORD(key_handle, dword_val_name, &get_dword));
|
| +
|
| + // Set
|
| + EXPECT_TRUE(nt::SetRegValueDWORD(key_handle, dword_val_name, dword_val));
|
| +
|
| + // Get
|
| + EXPECT_TRUE(nt::QueryRegValueDWORD(key_handle, dword_val_name, &get_dword));
|
| + EXPECT_TRUE(get_dword == dword_val);
|
| +
|
| + // Clean up
|
| + EXPECT_TRUE(nt::DeleteRegKey(key_handle));
|
| + nt::CloseRegKey(key_handle);
|
| +}
|
| +
|
| +TEST_F(NtRegistryTest, API_SZ) {
|
| + HANDLE key_handle;
|
| + const wchar_t* sz_val_name = L"SzTestValue";
|
| + std::wstring sz_val = L"blah de blah de blahhhhh.";
|
| + const wchar_t* sz_val_name2 = L"SzTestValueEmpty";
|
| + std::wstring sz_val2 = L"";
|
| +
|
| + // Create a subkey to play under.
|
| + ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, L"NTRegistry\\sz", KEY_ALL_ACCESS,
|
| + &key_handle));
|
| + ASSERT_NE(key_handle, INVALID_HANDLE_VALUE);
|
| + ASSERT_NE(key_handle, nullptr);
|
| +
|
| + std::wstring get_sz;
|
| + EXPECT_FALSE(nt::QueryRegValueSZ(key_handle, sz_val_name, &get_sz));
|
| +
|
| + // Set
|
| + EXPECT_TRUE(nt::SetRegValueSZ(key_handle, sz_val_name, sz_val));
|
| + EXPECT_TRUE(nt::SetRegValueSZ(key_handle, sz_val_name2, sz_val2));
|
| +
|
| + // Get
|
| + EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name, &get_sz));
|
| + EXPECT_TRUE(get_sz.compare(sz_val) == 0);
|
| + EXPECT_TRUE(nt::QueryRegValueSZ(key_handle, sz_val_name2, &get_sz));
|
| + EXPECT_TRUE(get_sz.compare(sz_val2) == 0);
|
| +
|
| + // Clean up
|
| + EXPECT_TRUE(nt::DeleteRegKey(key_handle));
|
| + nt::CloseRegKey(key_handle);
|
| +}
|
| +
|
| +TEST_F(NtRegistryTest, API_MULTISZ) {
|
| + HANDLE key_handle;
|
| + const wchar_t* multisz_val_name = L"SzmultiTestValue";
|
| + std::vector<std::wstring> multisz_val;
|
| + std::wstring multi1 = L"one";
|
| + std::wstring multi2 = L"two";
|
| + std::wstring multi3 = L"three";
|
| + const wchar_t* multisz_val_name2 = L"SzmultiTestValueBad";
|
| + std::wstring multi_empty = L"";
|
| +
|
| + // Create a subkey to play under.
|
| + ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, L"NTRegistry\\multisz", KEY_ALL_ACCESS,
|
| + &key_handle));
|
| + ASSERT_NE(key_handle, INVALID_HANDLE_VALUE);
|
| + ASSERT_NE(key_handle, nullptr);
|
| +
|
| + multisz_val.push_back(multi1);
|
| + multisz_val.push_back(multi2);
|
| + multisz_val.push_back(multi3);
|
| + // Set
|
| + EXPECT_TRUE(
|
| + nt::SetRegValueMULTISZ(key_handle, multisz_val_name, multisz_val));
|
| + multisz_val.clear();
|
| + multisz_val.push_back(multi_empty);
|
| + // Set
|
| + EXPECT_TRUE(
|
| + nt::SetRegValueMULTISZ(key_handle, multisz_val_name2, multisz_val));
|
| + multisz_val.clear();
|
| +
|
| + // Get
|
| + EXPECT_TRUE(
|
| + nt::QueryRegValueMULTISZ(key_handle, multisz_val_name, &multisz_val));
|
| + if (multisz_val.size() == 3) {
|
| + EXPECT_TRUE(multi1.compare(multisz_val.at(0)) == 0);
|
| + EXPECT_TRUE(multi2.compare(multisz_val.at(1)) == 0);
|
| + EXPECT_TRUE(multi3.compare(multisz_val.at(2)) == 0);
|
| + } else {
|
| + EXPECT_TRUE(false);
|
| + }
|
| + multisz_val.clear();
|
| +
|
| + // Get
|
| + EXPECT_TRUE(
|
| + nt::QueryRegValueMULTISZ(key_handle, multisz_val_name2, &multisz_val));
|
| + if (multisz_val.size() == 1) {
|
| + EXPECT_TRUE(multi_empty.compare(multisz_val.at(0)) == 0);
|
| + } else {
|
| + EXPECT_TRUE(false);
|
| + }
|
| + multisz_val.clear();
|
| +
|
| + // Clean up
|
| + EXPECT_TRUE(nt::DeleteRegKey(key_handle));
|
| + nt::CloseRegKey(key_handle);
|
| +}
|
| +
|
| +TEST_F(NtRegistryTest, CreateRegKeyRecursion) {
|
| + HANDLE key_handle;
|
| + const wchar_t* sz_new_key_1 = L"test1\\new\\subkey";
|
| + const wchar_t* sz_new_key_2 = L"test2\\new\\subkey\\blah\\";
|
| + const wchar_t* sz_new_key_3 = L"\\test3\\new\\subkey\\\\blah2";
|
| +
|
| + // Tests for CreateRegKey recursion.
|
| + ASSERT_TRUE(
|
| + nt::CreateRegKey(nt::HKCU, sz_new_key_1, KEY_ALL_ACCESS, nullptr));
|
| + EXPECT_TRUE(nt::OpenRegKey(nt::HKCU, sz_new_key_1, KEY_ALL_ACCESS,
|
| + &key_handle, nullptr));
|
| + EXPECT_TRUE(nt::DeleteRegKey(key_handle));
|
| + nt::CloseRegKey(key_handle);
|
| +
|
| + ASSERT_TRUE(
|
| + nt::CreateRegKey(nt::HKCU, sz_new_key_2, KEY_ALL_ACCESS, nullptr));
|
| + EXPECT_TRUE(nt::OpenRegKey(nt::HKCU, sz_new_key_2, KEY_ALL_ACCESS,
|
| + &key_handle, nullptr));
|
| + EXPECT_TRUE(nt::DeleteRegKey(key_handle));
|
| + nt::CloseRegKey(key_handle);
|
| +
|
| + ASSERT_TRUE(
|
| + nt::CreateRegKey(nt::HKCU, sz_new_key_3, KEY_ALL_ACCESS, nullptr));
|
| + EXPECT_TRUE(nt::OpenRegKey(nt::HKCU, L"test3\\new\\subkey\\blah2",
|
| + KEY_ALL_ACCESS, &key_handle, nullptr));
|
| + EXPECT_TRUE(nt::DeleteRegKey(key_handle));
|
| + nt::CloseRegKey(key_handle);
|
| +
|
| + // Subkey path can be null.
|
| + ASSERT_TRUE(nt::CreateRegKey(nt::HKCU, nullptr, KEY_ALL_ACCESS, &key_handle));
|
| + ASSERT_NE(key_handle, INVALID_HANDLE_VALUE);
|
| + ASSERT_NE(key_handle, nullptr);
|
| + nt::CloseRegKey(key_handle);
|
| +}
|
| +
|
| +} // namespace
|
|
|