OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/win/registry.h" | 5 #include "base/win/registry.h" |
6 | 6 |
7 #include <cstring> | 7 #include <cstring> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
11 #include "base/stl_util.h" | 11 #include "base/stl_util.h" |
| 12 #include "base/win/windows_version.h" |
12 #include "testing/gtest/include/gtest/gtest.h" | 13 #include "testing/gtest/include/gtest/gtest.h" |
13 | 14 |
14 namespace base { | 15 namespace base { |
15 namespace win { | 16 namespace win { |
16 | 17 |
17 namespace { | 18 namespace { |
18 | 19 |
19 const wchar_t kRootKey[] = L"Base_Registry_Unittest"; | 20 class RegistryTest : public testing::Test { |
| 21 protected: |
| 22 static const REGSAM kNativeViewMask; |
| 23 static const REGSAM kRedirectedViewMask; |
20 | 24 |
21 class RegistryTest : public testing::Test { | |
22 public: | |
23 RegistryTest() {} | 25 RegistryTest() {} |
24 | |
25 protected: | |
26 virtual void SetUp() OVERRIDE { | 26 virtual void SetUp() OVERRIDE { |
27 // Create a temporary key. | 27 // Create a temporary key. |
28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); | 28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); |
29 key.DeleteKey(kRootKey); | 29 key.DeleteKey(kRootKey); |
30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | 30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
31 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | 31 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
| 32 foo_software_key_ = L"Software\\"; |
| 33 foo_software_key_ += kRootKey; |
| 34 foo_software_key_ += L"\\Foo"; |
| 35 foo_software_wow64_key_ = L"Software\\Wow6432Node\\"; |
| 36 foo_software_wow64_key_ += kRootKey; |
| 37 foo_software_wow64_key_ += L"\\Foo"; |
32 } | 38 } |
33 | 39 |
34 virtual void TearDown() OVERRIDE { | 40 virtual void TearDown() OVERRIDE { |
35 // Clean up the temporary key. | 41 // Clean up the temporary key. |
36 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); | 42 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); |
37 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | 43 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 44 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
38 } | 45 } |
39 | 46 |
| 47 static bool IsRedirectorPresent() { |
| 48 #if defined(_WIN64) |
| 49 return true; |
| 50 #else |
| 51 return OSInfo::GetInstance()->wow64_status() == OSInfo::WOW64_ENABLED; |
| 52 #endif |
| 53 } |
| 54 |
| 55 const wchar_t* const kRootKey = L"Base_Registry_Unittest"; |
| 56 std::wstring foo_software_key_; |
| 57 std::wstring foo_software_wow64_key_; |
| 58 |
40 private: | 59 private: |
41 DISALLOW_COPY_AND_ASSIGN(RegistryTest); | 60 DISALLOW_COPY_AND_ASSIGN(RegistryTest); |
42 }; | 61 }; |
43 | 62 |
| 63 // static |
| 64 #if defined(_WIN64) |
| 65 const REGSAM RegistryTest::kNativeViewMask = KEY_WOW64_64KEY; |
| 66 const REGSAM RegistryTest::kRedirectedViewMask = KEY_WOW64_32KEY; |
| 67 #else |
| 68 const REGSAM RegistryTest::kNativeViewMask = KEY_WOW64_32KEY; |
| 69 const REGSAM RegistryTest::kRedirectedViewMask = KEY_WOW64_64KEY; |
| 70 #endif // _WIN64 |
| 71 |
44 TEST_F(RegistryTest, ValueTest) { | 72 TEST_F(RegistryTest, ValueTest) { |
45 RegKey key; | 73 RegKey key; |
46 | 74 |
47 std::wstring foo_key(kRootKey); | 75 std::wstring foo_key(kRootKey); |
48 foo_key += L"\\Foo"; | 76 foo_key += L"\\Foo"; |
49 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | 77 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), |
50 KEY_READ)); | 78 KEY_READ)); |
51 | 79 |
52 { | 80 { |
53 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), | 81 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), |
(...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
151 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); | 179 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); |
152 // Value() is NUL terminated. | 180 // Value() is NUL terminated. |
153 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); | 181 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); |
154 EXPECT_NE(L'\0', iterator.Value()[end-1]); | 182 EXPECT_NE(L'\0', iterator.Value()[end-1]); |
155 EXPECT_EQ(L'\0', iterator.Value()[end]); | 183 EXPECT_EQ(L'\0', iterator.Value()[end]); |
156 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); | 184 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); |
157 ++iterator; | 185 ++iterator; |
158 EXPECT_FALSE(iterator.Valid()); | 186 EXPECT_FALSE(iterator.Valid()); |
159 } | 187 } |
160 | 188 |
| 189 TEST_F(RegistryTest, RecursiveDelete) { |
| 190 RegKey key; |
| 191 // Create kRootKey->Foo |
| 192 // \->Bar (TestValue) |
| 193 // \->Foo (TestValue) |
| 194 // \->Moo |
| 195 // \->Foo |
| 196 // and delete kRootKey->Foo |
| 197 std::wstring foo_key(kRootKey); |
| 198 foo_key += L"\\Foo"; |
| 199 ASSERT_EQ(ERROR_SUCCESS, |
| 200 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); |
| 201 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); |
| 202 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); |
| 203 ASSERT_EQ(ERROR_SUCCESS, |
| 204 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); |
| 205 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Moo", KEY_WRITE)); |
| 206 ASSERT_EQ(ERROR_SUCCESS, |
| 207 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); |
| 208 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); |
| 209 foo_key += L"\\Bar"; |
| 210 ASSERT_EQ(ERROR_SUCCESS, |
| 211 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); |
| 212 foo_key += L"\\Foo"; |
| 213 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); |
| 214 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); |
| 215 ASSERT_EQ(ERROR_SUCCESS, |
| 216 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); |
| 217 |
| 218 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); |
| 219 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Bar")); |
| 220 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo")); |
| 221 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar\\Foo")); |
| 222 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar")); |
| 223 ASSERT_EQ(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Foo")); |
| 224 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"Foo")); |
| 225 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Foo")); |
| 226 ASSERT_NE(ERROR_SUCCESS, |
| 227 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); |
| 228 } |
| 229 |
| 230 // This test requires running as an Administrator as it tests redirected |
| 231 // registry writes to HKLM\Software |
| 232 // http://msdn.microsoft.com/en-us/library/windows/desktop/aa384253.aspx |
| 233 TEST_F(RegistryTest, Wow64RedirectedFromNative) { |
| 234 if (!IsRedirectorPresent()) |
| 235 return; |
| 236 |
| 237 RegKey key; |
| 238 |
| 239 // Test redirected key access from non-redirected. |
| 240 ASSERT_EQ(ERROR_SUCCESS, |
| 241 key.Create(HKEY_LOCAL_MACHINE, |
| 242 foo_software_key_.c_str(), |
| 243 KEY_WRITE | kRedirectedViewMask)); |
| 244 ASSERT_NE(ERROR_SUCCESS, |
| 245 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); |
| 246 ASSERT_NE(ERROR_SUCCESS, |
| 247 key.Open(HKEY_LOCAL_MACHINE, |
| 248 foo_software_key_.c_str(), |
| 249 KEY_READ | kNativeViewMask)); |
| 250 |
| 251 // Open the non-redirected view of the parent and try to delete the test key. |
| 252 ASSERT_EQ(ERROR_SUCCESS, |
| 253 key.Open(HKEY_LOCAL_MACHINE, L"Software", KEY_SET_VALUE)); |
| 254 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 255 ASSERT_EQ(ERROR_SUCCESS, |
| 256 key.Open(HKEY_LOCAL_MACHINE, |
| 257 L"Software", |
| 258 KEY_SET_VALUE | kNativeViewMask)); |
| 259 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 260 |
| 261 // Open the redirected view and delete the key created above. |
| 262 ASSERT_EQ(ERROR_SUCCESS, |
| 263 key.Open(HKEY_LOCAL_MACHINE, |
| 264 L"Software", |
| 265 KEY_SET_VALUE | kRedirectedViewMask)); |
| 266 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 267 } |
| 268 |
| 269 TEST_F(RegistryTest, Wow64NativeFromRedirected) { |
| 270 if (!IsRedirectorPresent()) |
| 271 return; |
| 272 RegKey key; |
| 273 |
| 274 // Test non-redirected key access from redirected. |
| 275 ASSERT_EQ(ERROR_SUCCESS, |
| 276 key.Create(HKEY_LOCAL_MACHINE, |
| 277 foo_software_key_.c_str(), |
| 278 KEY_WRITE | kNativeViewMask)); |
| 279 ASSERT_EQ(ERROR_SUCCESS, |
| 280 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); |
| 281 ASSERT_NE(ERROR_SUCCESS, |
| 282 key.Open(HKEY_LOCAL_MACHINE, |
| 283 foo_software_key_.c_str(), |
| 284 KEY_READ | kRedirectedViewMask)); |
| 285 |
| 286 // Open the redirected view of the parent and try to delete the test key |
| 287 // from the non-redirected view. |
| 288 ASSERT_EQ(ERROR_SUCCESS, |
| 289 key.Open(HKEY_LOCAL_MACHINE, |
| 290 L"Software", |
| 291 KEY_SET_VALUE | kRedirectedViewMask)); |
| 292 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 293 |
| 294 ASSERT_EQ(ERROR_SUCCESS, |
| 295 key.Open(HKEY_LOCAL_MACHINE, |
| 296 L"Software", |
| 297 KEY_SET_VALUE | kNativeViewMask)); |
| 298 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 299 } |
| 300 |
| 301 TEST_F(RegistryTest, Wow6432NodeFromRedirected) { |
| 302 if (!IsRedirectorPresent()) |
| 303 return; |
| 304 |
| 305 RegKey key; |
| 306 // Test access to 32-bit values on 64-bit via the Wow6432Node key. |
| 307 ASSERT_EQ(ERROR_SUCCESS, |
| 308 key.Create(HKEY_LOCAL_MACHINE, |
| 309 foo_software_key_.c_str(), |
| 310 KEY_WRITE | KEY_WOW64_32KEY)); |
| 311 ASSERT_EQ(ERROR_SUCCESS, |
| 312 key.Open(HKEY_LOCAL_MACHINE, |
| 313 foo_software_wow64_key_.c_str(), |
| 314 KEY_READ)); |
| 315 ASSERT_EQ(ERROR_SUCCESS, |
| 316 key.Open(HKEY_LOCAL_MACHINE, |
| 317 foo_software_wow64_key_.c_str(), |
| 318 KEY_READ | KEY_WOW64_64KEY)); |
| 319 ASSERT_EQ(ERROR_SUCCESS, |
| 320 key.Open(HKEY_LOCAL_MACHINE, |
| 321 foo_software_wow64_key_.c_str(), |
| 322 KEY_READ | KEY_WOW64_32KEY)); |
| 323 ASSERT_EQ(ERROR_SUCCESS, |
| 324 key.Open(HKEY_LOCAL_MACHINE, |
| 325 L"Software", |
| 326 KEY_SET_VALUE | KEY_WOW64_32KEY)); |
| 327 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 328 } |
| 329 |
| 330 TEST_F(RegistryTest, Wow64ConflictingViews) { |
| 331 RegKey key; |
| 332 // Test that conflicting WOW64 access flags are always rejected. |
| 333 ASSERT_EQ(ERROR_SUCCESS, |
| 334 key.Create(HKEY_LOCAL_MACHINE, |
| 335 foo_software_key_.c_str(), |
| 336 KEY_WRITE | KEY_WOW64_32KEY)); |
| 337 ASSERT_NE(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_READ | KEY_WOW64_64KEY)); |
| 338 ASSERT_NE(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_READ)); |
| 339 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_READ | KEY_WOW64_32KEY)); |
| 340 ASSERT_EQ(ERROR_SUCCESS, |
| 341 key.Open(HKEY_LOCAL_MACHINE, |
| 342 L"Software", |
| 343 KEY_WRITE | KEY_WOW64_32KEY)); |
| 344 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"Foo", KEY_READ | KEY_WOW64_64KEY)); |
| 345 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"Foo", KEY_READ)); |
| 346 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 347 } |
| 348 |
| 349 TEST_F(RegistryTest, OpenSubKey) { |
| 350 RegKey key; |
| 351 ASSERT_EQ(ERROR_SUCCESS, |
| 352 key.Open(HKEY_CURRENT_USER, |
| 353 kRootKey, |
| 354 KEY_READ | KEY_CREATE_SUB_KEY)); |
| 355 |
| 356 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); |
| 357 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"foo", KEY_READ)); |
| 358 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
| 359 ASSERT_EQ(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); |
| 360 |
| 361 std::wstring foo_key(kRootKey); |
| 362 foo_key += L"\\Foo"; |
| 363 ASSERT_EQ(ERROR_SUCCESS, |
| 364 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); |
| 365 |
| 366 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); |
| 367 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"foo")); |
| 368 } |
| 369 |
161 } // namespace | 370 } // namespace |
162 | 371 |
163 } // namespace win | 372 } // namespace win |
164 } // namespace base | 373 } // namespace base |
OLD | NEW |