OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/win/registry.h" | 5 #include "base/win/registry.h" |
6 | 6 |
7 #include <cstring> | 7 #include <cstring> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
11 #include "base/stl_util.h" | 11 #include "base/stl_util.h" |
12 #include "base/win/windows_version.h" | |
12 #include "testing/gtest/include/gtest/gtest.h" | 13 #include "testing/gtest/include/gtest/gtest.h" |
13 | 14 |
14 namespace base { | 15 namespace base { |
15 namespace win { | 16 namespace win { |
16 | 17 |
17 namespace { | 18 namespace { |
18 | 19 |
19 const wchar_t kRootKey[] = L"Base_Registry_Unittest"; | 20 class RegistryTest : public testing::Test { |
21 protected: | |
22 #if defined(_WIN64) | |
23 static const REGSAM kNativeViewMask = KEY_WOW64_64KEY; | |
24 static const REGSAM kRedirectedViewMask = KEY_WOW64_32KEY; | |
25 #else | |
26 static const REGSAM kNativeViewMask = KEY_WOW64_32KEY; | |
27 static const REGSAM kRedirectedViewMask = KEY_WOW64_64KEY; | |
28 #endif // _WIN64 | |
20 | 29 |
21 class RegistryTest : public testing::Test { | |
22 public: | |
23 RegistryTest() {} | 30 RegistryTest() {} |
24 | |
25 protected: | |
26 virtual void SetUp() OVERRIDE { | 31 virtual void SetUp() OVERRIDE { |
27 // Create a temporary key. | 32 // Create a temporary key. |
28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); | 33 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); |
29 key.DeleteKey(kRootKey); | 34 key.DeleteKey(kRootKey); |
30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | 35 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
31 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | 36 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
37 foo_software_key_ = L"Software\\"; | |
38 foo_software_key_ += kRootKey; | |
39 foo_software_key_ += L"\\Foo"; | |
40 foo_software_wow64_key_ = L"Software\\Wow6432Node\\"; | |
41 foo_software_wow64_key_ += kRootKey; | |
42 foo_software_wow64_key_ += L"\\Foo"; | |
32 } | 43 } |
33 | 44 |
34 virtual void TearDown() OVERRIDE { | 45 virtual void TearDown() OVERRIDE { |
35 // Clean up the temporary key. | 46 // Clean up the temporary key. |
36 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); | 47 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); |
37 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | 48 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
49 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
38 } | 50 } |
39 | 51 |
52 static bool IsRedirectorPresent() { | |
53 #if defined(_WIN64) | |
54 return true; | |
55 #else | |
56 return OSInfo::GetInstance()->wow64_status() == OSInfo::WOW64_ENABLED; | |
57 #endif | |
58 } | |
59 | |
60 const wchar_t* const kRootKey = L"Base_Registry_Unittest"; | |
61 std::wstring foo_software_key_; | |
62 std::wstring foo_software_wow64_key_; | |
63 | |
40 private: | 64 private: |
41 DISALLOW_COPY_AND_ASSIGN(RegistryTest); | 65 DISALLOW_COPY_AND_ASSIGN(RegistryTest); |
42 }; | 66 }; |
43 | 67 |
68 // static | |
69 const REGSAM RegistryTest::kNativeViewMask; | |
70 const REGSAM RegistryTest::kRedirectedViewMask; | |
71 | |
44 TEST_F(RegistryTest, ValueTest) { | 72 TEST_F(RegistryTest, ValueTest) { |
45 RegKey key; | 73 RegKey key; |
46 | 74 |
47 std::wstring foo_key(kRootKey); | 75 std::wstring foo_key(kRootKey); |
48 foo_key += L"\\Foo"; | 76 foo_key += L"\\Foo"; |
49 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | 77 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), |
50 KEY_READ)); | 78 KEY_READ)); |
51 | 79 |
52 { | 80 { |
53 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), | 81 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), |
(...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
151 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); | 179 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); |
152 // Value() is NUL terminated. | 180 // Value() is NUL terminated. |
153 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); | 181 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); |
154 EXPECT_NE(L'\0', iterator.Value()[end-1]); | 182 EXPECT_NE(L'\0', iterator.Value()[end-1]); |
155 EXPECT_EQ(L'\0', iterator.Value()[end]); | 183 EXPECT_EQ(L'\0', iterator.Value()[end]); |
156 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); | 184 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); |
157 ++iterator; | 185 ++iterator; |
158 EXPECT_FALSE(iterator.Valid()); | 186 EXPECT_FALSE(iterator.Valid()); |
159 } | 187 } |
160 | 188 |
189 TEST_F(RegistryTest, RecursiveDelete) { | |
190 RegKey key; | |
191 // Create kRootKey->Foo | |
192 // \->Bar (TestValue) | |
193 // \->Foo (TestValue) | |
194 // \->Bar | |
195 // \->Foo | |
196 // \->Moo | |
197 // \->Foo | |
198 // and delete kRootKey->Foo | |
199 std::wstring foo_key(kRootKey); | |
200 foo_key += L"\\Foo"; | |
201 ASSERT_EQ(ERROR_SUCCESS, | |
202 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
203 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); | |
204 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); | |
205 ASSERT_EQ(ERROR_SUCCESS, | |
206 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
207 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Moo", KEY_WRITE)); | |
208 ASSERT_EQ(ERROR_SUCCESS, | |
209 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
210 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
211 foo_key += L"\\Bar"; | |
212 ASSERT_EQ(ERROR_SUCCESS, | |
213 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
214 foo_key += L"\\Foo"; | |
215 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
216 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); | |
217 ASSERT_EQ(ERROR_SUCCESS, | |
218 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
219 | |
220 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
221 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Bar")); | |
222 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo")); | |
223 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar\\Foo")); | |
224 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar")); | |
225 ASSERT_EQ(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Foo")); | |
226 | |
227 ASSERT_EQ(ERROR_SUCCESS, | |
228 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
229 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); | |
230 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
231 ASSERT_EQ(ERROR_SUCCESS, | |
232 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
233 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"")); | |
234 ASSERT_NE(ERROR_SUCCESS, | |
235 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
236 | |
237 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
238 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"Foo")); | |
239 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Foo")); | |
240 ASSERT_NE(ERROR_SUCCESS, | |
241 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
242 } | |
243 | |
244 // This test requires running as an Administrator as it tests redirected | |
245 // registry writes to HKLM\Software | |
246 // http://msdn.microsoft.com/en-us/library/windows/desktop/aa384253.aspx | |
247 TEST_F(RegistryTest, Wow64RedirectedFromNative) { | |
248 if (!IsRedirectorPresent()) | |
249 return; | |
250 | |
251 RegKey key; | |
252 | |
253 // Test redirected key access from non-redirected. | |
254 ASSERT_EQ(ERROR_SUCCESS, | |
255 key.Create(HKEY_LOCAL_MACHINE, | |
256 foo_software_key_.c_str(), | |
257 KEY_WRITE | kRedirectedViewMask)); | |
258 ASSERT_NE(ERROR_SUCCESS, | |
259 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); | |
260 ASSERT_NE(ERROR_SUCCESS, | |
261 key.Open(HKEY_LOCAL_MACHINE, | |
262 foo_software_key_.c_str(), | |
263 KEY_READ | kNativeViewMask)); | |
264 | |
265 // Open the non-redirected view of the parent and try to delete the test key. | |
266 ASSERT_EQ(ERROR_SUCCESS, | |
267 key.Open(HKEY_LOCAL_MACHINE, L"Software", KEY_SET_VALUE)); | |
268 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
269 ASSERT_EQ(ERROR_SUCCESS, | |
270 key.Open(HKEY_LOCAL_MACHINE, | |
271 L"Software", | |
272 KEY_SET_VALUE | kNativeViewMask)); | |
273 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
274 | |
275 // Open the redirected view and delete the key created above. | |
276 ASSERT_EQ(ERROR_SUCCESS, | |
277 key.Open(HKEY_LOCAL_MACHINE, | |
278 L"Software", | |
279 KEY_SET_VALUE | kRedirectedViewMask)); | |
280 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
281 } | |
282 | |
283 TEST_F(RegistryTest, Wow64NativeFromRedirected) { | |
284 if (!IsRedirectorPresent()) | |
285 return; | |
286 RegKey key; | |
287 | |
288 // Test non-redirected key access from redirected. | |
289 ASSERT_EQ(ERROR_SUCCESS, | |
290 key.Create(HKEY_LOCAL_MACHINE, | |
291 foo_software_key_.c_str(), | |
292 KEY_WRITE | kNativeViewMask)); | |
293 ASSERT_EQ(ERROR_SUCCESS, | |
294 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); | |
295 ASSERT_NE(ERROR_SUCCESS, | |
296 key.Open(HKEY_LOCAL_MACHINE, | |
297 foo_software_key_.c_str(), | |
298 KEY_READ | kRedirectedViewMask)); | |
299 | |
300 // Open the redirected view of the parent and try to delete the test key | |
301 // from the non-redirected view. | |
302 ASSERT_EQ(ERROR_SUCCESS, | |
303 key.Open(HKEY_LOCAL_MACHINE, | |
304 L"Software", | |
305 KEY_SET_VALUE | kRedirectedViewMask)); | |
306 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
307 | |
308 ASSERT_EQ(ERROR_SUCCESS, | |
309 key.Open(HKEY_LOCAL_MACHINE, | |
310 L"Software", | |
311 KEY_SET_VALUE | kNativeViewMask)); | |
312 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
313 } | |
314 | |
315 TEST_F(RegistryTest, Wow6432NodeFromRedirected) { | |
316 if (!IsRedirectorPresent()) | |
317 return; | |
318 | |
319 RegKey key; | |
320 // Test access to 32-bit values on 64-bit via the Wow6432Node key. | |
321 ASSERT_EQ(ERROR_SUCCESS, | |
322 key.Create(HKEY_LOCAL_MACHINE, | |
323 foo_software_key_.c_str(), | |
324 KEY_WRITE | KEY_WOW64_32KEY)); | |
325 ASSERT_EQ(ERROR_SUCCESS, | |
326 key.Open(HKEY_LOCAL_MACHINE, | |
327 foo_software_wow64_key_.c_str(), | |
328 KEY_READ)); | |
329 ASSERT_EQ(ERROR_SUCCESS, | |
330 key.Open(HKEY_LOCAL_MACHINE, | |
331 foo_software_wow64_key_.c_str(), | |
332 KEY_READ | KEY_WOW64_64KEY)); | |
333 ASSERT_EQ(ERROR_SUCCESS, | |
334 key.Open(HKEY_LOCAL_MACHINE, | |
335 foo_software_wow64_key_.c_str(), | |
grt (UTC plus 2)
2014/05/21 13:52:19
This reinforces my previous comment that you're te
grt (UTC plus 2)
2014/05/21 13:53:17
Where by "this" I mean the fact that you had to ch
| |
336 KEY_READ | KEY_WOW64_32KEY)); | |
337 ASSERT_EQ(ERROR_SUCCESS, | |
338 key.Open(HKEY_LOCAL_MACHINE, | |
339 L"Software", | |
340 KEY_SET_VALUE | KEY_WOW64_32KEY)); | |
341 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
342 } | |
343 | |
344 TEST_F(RegistryTest, OpenSubKey) { | |
345 RegKey key; | |
346 ASSERT_EQ(ERROR_SUCCESS, | |
347 key.Open(HKEY_CURRENT_USER, | |
348 kRootKey, | |
349 KEY_READ | KEY_CREATE_SUB_KEY)); | |
350 | |
351 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); | |
352 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"foo", KEY_READ)); | |
353 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
354 ASSERT_EQ(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); | |
355 | |
356 std::wstring foo_key(kRootKey); | |
357 foo_key += L"\\Foo"; | |
358 ASSERT_EQ(ERROR_SUCCESS, | |
359 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
360 | |
361 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
362 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"foo")); | |
363 } | |
364 | |
161 } // namespace | 365 } // namespace |
162 | 366 |
163 } // namespace win | 367 } // namespace win |
164 } // namespace base | 368 } // namespace base |
OLD | NEW |