1 /*
2  * Unit test suite for rpc functions
3  *
4  * Copyright 2002 Greg Turner
5  * Copyright 2008-2009 Robert Shearman
6  *
7  * This library is free software; you can redistribute it and/or
8  * modify it under the terms of the GNU Lesser General Public
9  * License as published by the Free Software Foundation; either
10  * version 2.1 of the License, or (at your option) any later version.
11  *
12  * This library is distributed in the hope that it will be useful,
13  * but WITHOUT ANY WARRANTY; without even the implied warranty of
14  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
15  * Lesser General Public License for more details.
16  *
17  * You should have received a copy of the GNU Lesser General Public
18  * License along with this library; if not, write to the Free Software
19  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20  */
21 
22 #include <stdarg.h>
23 #include <stdio.h>
24 
25 #define COBJMACROS
26 #include <ntstatus.h>
27 #define WIN32_NO_STATUS
28 #include "wine/test.h"
29 #include <windef.h>
30 #include <winbase.h>
31 #include <winnt.h>
32 #include <winerror.h>
33 #include <ole2.h>
34 #include <oleauto.h>
35 #include <ntsecapi.h>
36 #include <initguid.h>
37 #include <netfw.h>
38 
39 #include "rpc.h"
40 #include "rpcdce.h"
41 #include "secext.h"
42 
43 typedef unsigned int unsigned32;
44 typedef struct twr_t
45     {
46     unsigned32 tower_length;
47     /* [size_is] */ byte tower_octet_string[ 1 ];
48     } 	twr_t;
49 
50 RPC_STATUS WINAPI TowerExplode(const twr_t *tower, RPC_SYNTAX_IDENTIFIER *object, RPC_SYNTAX_IDENTIFIER *syntax, char **protseq, char **endpoint, char **address);
51 RPC_STATUS WINAPI TowerConstruct(const RPC_SYNTAX_IDENTIFIER *object, const RPC_SYNTAX_IDENTIFIER *syntax, const char *protseq, const char *endpoint, const char *address, twr_t **tower);
52 
53 static UUID Uuid_Table[10] = {
54   { 0x00000000, 0x0000, 0x0000, {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00} }, /* 0 (null) */
55   { 0xdeadbeef, 0xdead, 0xbeef, {0x10, 0x21, 0x35, 0x56, 0x89, 0xa0, 0xf4, 0x8a} }, /* 1 */
56   { 0xabadfeed, 0x49ff, 0xbead, {0x8a, 0xf4, 0xa0, 0x89, 0x56, 0x35, 0x21, 0x10} }, /* 2 */
57   { 0x93da375c, 0x1324, 0x1355, {0x87, 0xff, 0x49, 0x44, 0x34, 0x44, 0x22, 0x19} }, /* 3 */
58   { 0xdeadbeef, 0xdead, 0xbeef, {0x10, 0x21, 0x35, 0x56, 0x89, 0xa0, 0xf4, 0x8b} }, /* 4 (~1) */
59   { 0x9badfeed, 0x49ff, 0xbead, {0x8a, 0xf4, 0xa0, 0x89, 0x56, 0x35, 0x21, 0x10} }, /* 5 (~2) */
60   { 0x00000000, 0x0001, 0x0000, {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00} }, /* 6 (~0) */
61   { 0x00000000, 0x0000, 0x0000, {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01} }, /* 7 (~0) */
62   { 0x12312312, 0x1231, 0x1231, {0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff} }, /* 8 */
63   { 0x11111111, 0x1111, 0x1111, {0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11} }  /* 9 */
64 };
65 
66 /* index of "10" means "NULL" */
67 static BOOL Uuid_Comparison_Grid[11][11] = {
68   { TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, TRUE  },
69   { FALSE, TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE },
70   { FALSE, FALSE, TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE },
71   { FALSE, FALSE, FALSE, TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE },
72   { FALSE, FALSE, FALSE, FALSE, TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE, FALSE },
73   { FALSE, FALSE, FALSE, FALSE, FALSE, TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE },
74   { FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, TRUE,  FALSE, FALSE, FALSE, FALSE },
75   { FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, TRUE,  FALSE, FALSE, FALSE },
76   { FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, TRUE,  FALSE, FALSE },
77   { FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, TRUE,  FALSE },
78   { TRUE,  FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, FALSE, TRUE  }
79 };
80 
81 static void UuidConversionAndComparison(void) {
82     CHAR strx[100], x;
83     LPSTR str = strx;
84     WCHAR wstrx[100], wx;
85     LPWSTR wstr = wstrx;
86 
87     UUID Uuid1, Uuid2, *PUuid1, *PUuid2;
88     RPC_STATUS rslt;
89 
90     int i1,i2;
91 
92     /* Uuid Equality */
93     for (i1 = 0; i1 < 11; i1++)
94         for (i2 = 0; i2 < 11; i2++) {
95 	    if (i1 < 10) {
96 	        Uuid1 = Uuid_Table[i1];
97 		PUuid1 = &Uuid1;
98             } else {
99 	        PUuid1 = NULL;
100 	    }
101 	    if (i2 < 10) {
102 	        Uuid2 = Uuid_Table[i2];
103 		PUuid2 = &Uuid2;
104             } else {
105 	        PUuid2 = NULL;
106 	    }
107 	    ok( (UuidEqual(PUuid1, PUuid2, &rslt) == Uuid_Comparison_Grid[i1][i2]), "UUID Equality\n" );
108         }
109 
110     /* Uuid to String to Uuid (char) */
111     for (i1 = 0; i1 < 10; i1++) {
112         Uuid1 = Uuid_Table[i1];
113 	ok( (UuidToStringA(&Uuid1, (unsigned char**)&str) == RPC_S_OK), "Simple UUID->String copy\n" );
114 	ok( (UuidFromStringA((unsigned char*)str, &Uuid2) == RPC_S_OK), "Simple String->UUID copy from generated UUID String\n" );
115 	ok( UuidEqual(&Uuid1, &Uuid2, &rslt), "Uuid -> String -> Uuid transform\n" );
116 	/* invalid uuid tests  -- size of valid UUID string=36 */
117 	for (i2 = 0; i2 < 36; i2++) {
118 	    x = str[i2];
119 	    str[i2] = 'g'; /* whatever, but "g" is a good boundary condition */
120 	    ok( (UuidFromStringA((unsigned char*)str, &Uuid1) == RPC_S_INVALID_STRING_UUID), "Invalid UUID String\n" );
121 	    str[i2] = x; /* change it back so remaining tests are interesting. */
122 	}
123 	RpcStringFreeA((unsigned char **)&str);
124     }
125 
126     /* Uuid to String to Uuid (wchar) */
127     for (i1 = 0; i1 < 10; i1++) {
128         Uuid1 = Uuid_Table[i1];
129         rslt=UuidToStringW(&Uuid1, &wstr);
130         ok( (rslt == RPC_S_OK), "Simple UUID->WString copy\n" );
131         ok( (UuidFromStringW(wstr, &Uuid2) == RPC_S_OK), "Simple WString->UUID copy from generated UUID String\n" );
132         ok( UuidEqual(&Uuid1, &Uuid2, &rslt), "Uuid -> WString -> Uuid transform\n" );
133 	/* invalid uuid tests  -- size of valid UUID string=36 */
134 	for (i2 = 0; i2 < 36; i2++) {
135 	    wx = wstr[i2];
136 	    wstr[i2] = 'g'; /* whatever, but "g" is a good boundary condition */
137 	    ok( (UuidFromStringW(wstr, &Uuid1) == RPC_S_INVALID_STRING_UUID), "Invalid UUID WString\n" );
138 	    wstr[i2] = wx; /* change it back so remaining tests are interesting. */
139 	}
140 	RpcStringFreeW(&wstr);
141     }
142 }
143 
144 static void TestDceErrorInqText (void)
145 {
146     char bufferInvalid [1024];
147     char buffer [1024]; /* The required size is not documented but would
148                          * appear to be 256.
149                          */
150     DWORD dwCount;
151 
152     dwCount = FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL,
153             RPC_S_NOT_RPC_ERROR, 0, bufferInvalid, ARRAY_SIZE(bufferInvalid), NULL);
154 
155     /* A random sample of DceErrorInqText */
156     /* 0 is success */
157     ok ((DceErrorInqTextA (0, (unsigned char*)buffer) == RPC_S_OK),
158             "DceErrorInqTextA(0...)\n");
159     /* A real RPC_S error */
160     ok ((DceErrorInqTextA (RPC_S_INVALID_STRING_UUID, (unsigned char*)buffer) == RPC_S_OK),
161             "DceErrorInqTextA(valid...)\n");
162 
163     if (dwCount)
164     {
165         /* A message for which FormatMessage should fail
166          * which should return RPC_S_OK and the
167          * fixed "not valid" message
168          */
169         ok ((DceErrorInqTextA (35, (unsigned char*)buffer) == RPC_S_OK &&
170                     strcmp (buffer, bufferInvalid) == 0),
171                 "DceErrorInqTextA(unformattable...)\n");
172         /* One for which FormatMessage should succeed but
173          * DceErrorInqText should "fail"
174          * 3814 is generally quite a long message
175          */
176         ok ((DceErrorInqTextA (3814, (unsigned char*)buffer) == RPC_S_OK &&
177                     strcmp (buffer, bufferInvalid) == 0),
178                 "DceErrorInqTextA(deviation...)\n");
179     }
180     else
181         ok (0, "Cannot set up for DceErrorInqText\n");
182 }
183 
184 static RPC_DISPATCH_FUNCTION IFoo_table[] =
185 {
186     0
187 };
188 
189 static RPC_DISPATCH_TABLE IFoo_v0_0_DispatchTable =
190 {
191     0,
192     IFoo_table
193 };
194 
195 static const RPC_SERVER_INTERFACE IFoo___RpcServerInterface =
196 {
197     sizeof(RPC_SERVER_INTERFACE),
198     {{0x00000000,0x0000,0x0000,{0x00,0x00,0x00,0x00,0x00,0x00,0x12,0x34}},{0,0}},
199     {{0x8a885d04,0x1ceb,0x11c9,{0x9f,0xe8,0x08,0x00,0x2b,0x10,0x48,0x60}},{2,0}},
200     &IFoo_v0_0_DispatchTable,
201     0,
202     0,
203     0,
204     0,
205     0,
206 };
207 
208 static RPC_IF_HANDLE IFoo_v0_0_s_ifspec = (RPC_IF_HANDLE)& IFoo___RpcServerInterface;
209 
210 static void test_rpc_ncacn_ip_tcp(void)
211 {
212     RPC_STATUS status;
213     unsigned char *binding, *principal;
214     handle_t IFoo_IfHandle;
215     ULONG level, authnsvc, authzsvc;
216     RPC_AUTH_IDENTITY_HANDLE identity;
217     static unsigned char foo[] = "foo";
218     static unsigned char ncacn_ip_tcp[] = "ncacn_ip_tcp";
219     static unsigned char address[] = "127.0.0.1";
220     static unsigned char endpoint[] = "4114";
221     static unsigned char spn[] = "principal";
222 
223     status = RpcNetworkIsProtseqValidA(foo);
224     ok(status == RPC_S_INVALID_RPC_PROTSEQ, "return wrong\n");
225 
226     status = RpcNetworkIsProtseqValidA(ncacn_ip_tcp);
227     ok(status == RPC_S_OK, "return wrong\n");
228 
229     status = RpcMgmtStopServerListening(NULL);
230     ok(status == RPC_S_NOT_LISTENING,
231        "wrong RpcMgmtStopServerListening error (%u)\n", status);
232 
233     status = RpcMgmtWaitServerListen();
234     ok(status == RPC_S_NOT_LISTENING,
235        "wrong RpcMgmtWaitServerListen error status (%u)\n", status);
236 
237     status = RpcServerListen(1, 20, FALSE);
238     ok(status == RPC_S_NO_PROTSEQS_REGISTERED,
239        "wrong RpcServerListen error (%u)\n", status);
240 
241     status = RpcServerUseProtseqEpA(ncacn_ip_tcp, 20, endpoint, NULL);
242     ok(status == RPC_S_OK, "RpcServerUseProtseqEp failed (%u)\n", status);
243 
244     status = RpcServerRegisterIf(IFoo_v0_0_s_ifspec, NULL, NULL);
245     ok(status == RPC_S_OK, "RpcServerRegisterIf failed (%u)\n", status);
246 
247     status = RpcServerListen(1, 20, TRUE);
248     ok(status == RPC_S_OK, "RpcServerListen failed (%u)\n", status);
249 
250     status = RpcServerListen(1, 20, TRUE);
251     ok(status == RPC_S_ALREADY_LISTENING,
252        "wrong RpcServerListen error (%u)\n", status);
253 
254     status = RpcStringBindingComposeA(NULL, ncacn_ip_tcp, address,
255                                      endpoint, NULL, &binding);
256     ok(status == RPC_S_OK, "RpcStringBindingCompose failed (%u)\n", status);
257 
258     status = RpcBindingFromStringBindingA(binding, &IFoo_IfHandle);
259     ok(status == RPC_S_OK, "RpcBindingFromStringBinding failed (%u)\n",
260        status);
261 
262     status = RpcBindingSetAuthInfoA(IFoo_IfHandle, NULL, RPC_C_AUTHN_LEVEL_NONE,
263                                    RPC_C_AUTHN_WINNT, NULL, RPC_C_AUTHZ_NAME);
264     ok(status == RPC_S_OK, "RpcBindingSetAuthInfo failed (%u)\n", status);
265 
266     status = RpcBindingInqAuthInfoA(IFoo_IfHandle, NULL, NULL, NULL, NULL, NULL);
267     ok(status == RPC_S_BINDING_HAS_NO_AUTH, "RpcBindingInqAuthInfo failed (%u)\n",
268        status);
269 
270     status = RpcBindingSetAuthInfoA(IFoo_IfHandle, spn, RPC_C_AUTHN_LEVEL_PKT_PRIVACY,
271                                    RPC_C_AUTHN_WINNT, NULL, RPC_C_AUTHZ_NAME);
272     ok(status == RPC_S_OK, "RpcBindingSetAuthInfo failed (%u)\n", status);
273 
274     level = authnsvc = authzsvc = 0;
275     principal = (unsigned char *)0xdeadbeef;
276     identity = (RPC_AUTH_IDENTITY_HANDLE *)0xdeadbeef;
277     status = RpcBindingInqAuthInfoA(IFoo_IfHandle, &principal, &level, &authnsvc,
278                                    &identity, &authzsvc);
279 
280     ok(status == RPC_S_OK, "RpcBindingInqAuthInfo failed (%u)\n", status);
281     ok(identity == NULL, "expected NULL identity, got %p\n", identity);
282     ok(principal != (unsigned char *)0xdeadbeef, "expected valid principal, got %p\n", principal);
283     ok(level == RPC_C_AUTHN_LEVEL_PKT_PRIVACY, "expected RPC_C_AUTHN_LEVEL_PKT_PRIVACY, got %d\n", level);
284     ok(authnsvc == RPC_C_AUTHN_WINNT, "expected RPC_C_AUTHN_WINNT, got %d\n", authnsvc);
285     todo_wine ok(authzsvc == RPC_C_AUTHZ_NAME, "expected RPC_C_AUTHZ_NAME, got %d\n", authzsvc);
286     if (status == RPC_S_OK) RpcStringFreeA(&principal);
287 
288     status = RpcMgmtStopServerListening(NULL);
289     ok(status == RPC_S_OK, "RpcMgmtStopServerListening failed (%u)\n",
290        status);
291 
292     status = RpcMgmtStopServerListening(NULL);
293     ok(status == RPC_S_OK, "RpcMgmtStopServerListening failed (%u)\n",
294        status);
295 
296     status = RpcServerUnregisterIf(NULL, NULL, FALSE);
297     ok(status == RPC_S_OK, "RpcServerUnregisterIf failed (%u)\n", status);
298 
299     status = RpcMgmtWaitServerListen();
300     ok(status == RPC_S_OK, "RpcMgmtWaitServerListen failed (%u)\n", status);
301 
302     status = RpcStringFreeA(&binding);
303     ok(status == RPC_S_OK, "RpcStringFree failed (%u)\n", status);
304 
305     status = RpcBindingFree(&IFoo_IfHandle);
306     ok(status == RPC_S_OK, "RpcBindingFree failed (%u)\n", status);
307 }
308 
309 /* this is what's generated with MS/RPC - it includes an extra 2
310  * bytes in the protocol floor */
311 static const unsigned char tower_data_tcp_ip1[] =
312 {
313     0x05,0x00,0x13,0x00,0x0d,0x00,0xdb,0xf1,
314     0xa4,0x47,0xca,0x67,0x10,0xb3,0x1f,0x00,
315     0xdd,0x01,0x06,0x62,0xda,0x00,0x00,0x02,
316     0x00,0x00,0x00,0x13,0x00,0x0d,0x04,0x5d,
317     0x88,0x8a,0xeb,0x1c,0xc9,0x11,0x9f,0xe8,
318     0x08,0x00,0x2b,0x10,0x48,0x60,0x02,0x00,
319     0x02,0x00,0x00,0x00,0x01,0x00,0x0b,0x02,
320     0x00,0x00,0x00,0x01,0x00,0x07,0x02,0x00,
321     0x00,0x87,0x01,0x00,0x09,0x04,0x00,0x0a,
322     0x00,0x00,0x01,
323 };
324 /* this is the optimal data that i think should be generated */
325 static const unsigned char tower_data_tcp_ip2[] =
326 {
327     0x05,0x00,0x13,0x00,0x0d,0x00,0xdb,0xf1,
328     0xa4,0x47,0xca,0x67,0x10,0xb3,0x1f,0x00,
329     0xdd,0x01,0x06,0x62,0xda,0x00,0x00,0x02,
330     0x00,0x00,0x00,0x13,0x00,0x0d,0x04,0x5d,
331     0x88,0x8a,0xeb,0x1c,0xc9,0x11,0x9f,0xe8,
332     0x08,0x00,0x2b,0x10,0x48,0x60,0x02,0x00,
333     0x02,0x00,0x00,0x00,0x01,0x00,0x0b,0x00,
334     0x00,0x01,0x00,0x07,0x02,0x00,0x00,0x87,
335     0x01,0x00,0x09,0x04,0x00,0x0a,0x00,0x00,
336     0x01,
337 };
338 
339 static void test_towers(void)
340 {
341     RPC_STATUS ret;
342     twr_t *tower;
343     static const RPC_SYNTAX_IDENTIFIER mapi_if_id = { { 0xa4f1db00, 0xca47, 0x1067, { 0xb3, 0x1f, 0x00, 0xdd, 0x01, 0x06, 0x62, 0xda } }, { 0, 0 } };
344     static const RPC_SYNTAX_IDENTIFIER ndr_syntax = { { 0x8a885d04, 0x1ceb, 0x11c9, { 0x9f, 0xe8, 0x08, 0x00, 0x2b, 0x10, 0x48, 0x60 } }, { 2, 0 } };
345     RPC_SYNTAX_IDENTIFIER object, syntax;
346     char *protseq, *endpoint, *address;
347     BOOL same;
348 
349     ret = TowerConstruct(&mapi_if_id, &ndr_syntax, "ncacn_ip_tcp", "135", "10.0.0.1", &tower);
350     ok(ret == RPC_S_OK ||
351        broken(ret == RPC_S_INVALID_RPC_PROTSEQ), /* Vista */
352        "TowerConstruct failed with error %d\n", ret);
353     if (ret == RPC_S_INVALID_RPC_PROTSEQ)
354     {
355         /* Windows Vista fails with this error and crashes if we continue */
356         win_skip("TowerConstruct failed, we are most likely on Windows Vista\n");
357         return;
358     }
359 
360     /* first check we have the right amount of data */
361     ok(tower->tower_length == sizeof(tower_data_tcp_ip1) ||
362        tower->tower_length == sizeof(tower_data_tcp_ip2),
363         "Wrong size of tower %d\n", tower->tower_length);
364 
365     /* then do a byte-by-byte comparison */
366     same = ((tower->tower_length == sizeof(tower_data_tcp_ip1)) &&
367             !memcmp(&tower->tower_octet_string, tower_data_tcp_ip1, sizeof(tower_data_tcp_ip1))) ||
368            ((tower->tower_length == sizeof(tower_data_tcp_ip2)) &&
369             !memcmp(&tower->tower_octet_string, tower_data_tcp_ip2, sizeof(tower_data_tcp_ip2)));
370 
371     ok(same, "Tower data differs\n");
372     if (!same)
373     {
374         unsigned32 i;
375         for (i = 0; i < tower->tower_length; i++)
376         {
377             if (i % 8 == 0) printf("    ");
378             printf("0x%02x,", tower->tower_octet_string[i]);
379             if (i % 8 == 7) printf("\n");
380         }
381         printf("\n");
382     }
383 
384     ret = TowerExplode(tower, &object, &syntax, &protseq, &endpoint, &address);
385     ok(ret == RPC_S_OK, "TowerExplode failed with error %d\n", ret);
386     ok(!memcmp(&object, &mapi_if_id, sizeof(mapi_if_id)), "object id didn't match\n");
387     ok(!memcmp(&syntax, &ndr_syntax, sizeof(syntax)), "syntax id didn't match\n");
388     ok(!strcmp(protseq, "ncacn_ip_tcp"), "protseq was \"%s\" instead of \"ncacn_ip_tcp\"\n", protseq);
389     ok(!strcmp(endpoint, "135"), "endpoint was \"%s\" instead of \"135\"\n", endpoint);
390     ok(!strcmp(address, "10.0.0.1"), "address was \"%s\" instead of \"10.0.0.1\"\n", address);
391 
392     I_RpcFree(protseq);
393     I_RpcFree(endpoint);
394     I_RpcFree(address);
395 
396     ret = TowerExplode(tower, NULL, NULL, NULL, NULL, NULL);
397     ok(ret == RPC_S_OK, "TowerExplode failed with error %d\n", ret);
398 
399     I_RpcFree(tower);
400 
401     /* test the behaviour for ip_tcp with name instead of dotted IP notation */
402     ret = TowerConstruct(&mapi_if_id, &ndr_syntax, "ncacn_ip_tcp", "135", "localhost", &tower);
403     ok(ret == RPC_S_OK, "TowerConstruct failed with error %d\n", ret);
404     ret = TowerExplode(tower, NULL, NULL, NULL, NULL, &address);
405     ok(ret == RPC_S_OK, "TowerExplode failed with error %d\n", ret);
406     ok(!strcmp(address, "0.0.0.0") ||
407        broken(!strcmp(address, "255.255.255.255")),
408        "address was \"%s\" instead of \"0.0.0.0\"\n", address);
409 
410     I_RpcFree(address);
411     I_RpcFree(tower);
412 
413     /* test the behaviour for np with no address */
414     ret = TowerConstruct(&mapi_if_id, &ndr_syntax, "ncacn_np", "\\pipe\\test", NULL, &tower);
415     ok(ret == RPC_S_OK, "TowerConstruct failed with error %d\n", ret);
416     ret = TowerExplode(tower, NULL, NULL, NULL, NULL, &address);
417     ok(ret == RPC_S_OK ||
418        broken(ret != RPC_S_OK), /* win2k, indeterminate */
419        "TowerExplode failed with error %d\n", ret);
420     /* Windows XP SP3 sets address to NULL */
421     ok(!address || !strcmp(address, ""), "address was \"%s\" instead of \"\" or NULL (XP SP3)\n", address);
422 
423     I_RpcFree(address);
424     I_RpcFree(tower);
425 }
426 
427 static void test_I_RpcMapWin32Status(void)
428 {
429     LONG win32status;
430     RPC_STATUS rpc_status;
431     BOOL w2k3_up = FALSE;
432 
433     /* Windows 2003 and above return STATUS_UNSUCCESSFUL if given an unknown status */
434     win32status = I_RpcMapWin32Status(9999);
435     if (win32status == STATUS_UNSUCCESSFUL)
436         w2k3_up = TRUE;
437 
438     /* On Windows XP-SP1 and below some statuses are not mapped and return
439      * the given status
440      */
441     for (rpc_status = 0; rpc_status < 10000; rpc_status++)
442     {
443         LONG expected_win32status;
444         BOOL missing = FALSE;
445 
446         win32status = I_RpcMapWin32Status(rpc_status);
447         switch (rpc_status)
448         {
449         case ERROR_SUCCESS: expected_win32status = ERROR_SUCCESS; break;
450         case ERROR_ACCESS_DENIED: expected_win32status = STATUS_ACCESS_DENIED; break;
451         case ERROR_INVALID_HANDLE: expected_win32status = RPC_NT_SS_CONTEXT_MISMATCH; break;
452         case ERROR_OUTOFMEMORY: expected_win32status = STATUS_NO_MEMORY; break;
453         case ERROR_INVALID_PARAMETER: expected_win32status = STATUS_INVALID_PARAMETER; break;
454         case ERROR_INSUFFICIENT_BUFFER: expected_win32status = STATUS_BUFFER_TOO_SMALL; break;
455         case ERROR_MAX_THRDS_REACHED: expected_win32status = STATUS_NO_MEMORY; break;
456         case ERROR_NOACCESS: expected_win32status = STATUS_ACCESS_VIOLATION; break;
457         case ERROR_NOT_ENOUGH_SERVER_MEMORY: expected_win32status = STATUS_INSUFF_SERVER_RESOURCES; break;
458         case ERROR_WRONG_PASSWORD:  expected_win32status = STATUS_WRONG_PASSWORD; missing = TRUE; break;
459         case ERROR_INVALID_LOGON_HOURS: expected_win32status = STATUS_INVALID_LOGON_HOURS; missing = TRUE; break;
460         case ERROR_PASSWORD_EXPIRED: expected_win32status = STATUS_PASSWORD_EXPIRED; missing = TRUE; break;
461         case ERROR_ACCOUNT_DISABLED: expected_win32status = STATUS_ACCOUNT_DISABLED; missing = TRUE; break;
462         case ERROR_INVALID_SECURITY_DESCR: expected_win32status = STATUS_INVALID_SECURITY_DESCR; break;
463         case RPC_S_INVALID_STRING_BINDING: expected_win32status = RPC_NT_INVALID_STRING_BINDING; break;
464         case RPC_S_WRONG_KIND_OF_BINDING: expected_win32status = RPC_NT_WRONG_KIND_OF_BINDING; break;
465         case RPC_S_INVALID_BINDING: expected_win32status = RPC_NT_INVALID_BINDING; break;
466         case RPC_S_PROTSEQ_NOT_SUPPORTED: expected_win32status = RPC_NT_PROTSEQ_NOT_SUPPORTED; break;
467         case RPC_S_INVALID_RPC_PROTSEQ: expected_win32status = RPC_NT_INVALID_RPC_PROTSEQ; break;
468         case RPC_S_INVALID_STRING_UUID: expected_win32status = RPC_NT_INVALID_STRING_UUID; break;
469         case RPC_S_INVALID_ENDPOINT_FORMAT: expected_win32status = RPC_NT_INVALID_ENDPOINT_FORMAT; break;
470         case RPC_S_INVALID_NET_ADDR: expected_win32status = RPC_NT_INVALID_NET_ADDR; break;
471         case RPC_S_NO_ENDPOINT_FOUND: expected_win32status = RPC_NT_NO_ENDPOINT_FOUND; break;
472         case RPC_S_INVALID_TIMEOUT: expected_win32status = RPC_NT_INVALID_TIMEOUT; break;
473         case RPC_S_OBJECT_NOT_FOUND: expected_win32status = RPC_NT_OBJECT_NOT_FOUND; break;
474         case RPC_S_ALREADY_REGISTERED: expected_win32status = RPC_NT_ALREADY_REGISTERED; break;
475         case RPC_S_TYPE_ALREADY_REGISTERED: expected_win32status = RPC_NT_TYPE_ALREADY_REGISTERED; break;
476         case RPC_S_ALREADY_LISTENING: expected_win32status = RPC_NT_ALREADY_LISTENING; break;
477         case RPC_S_NO_PROTSEQS_REGISTERED: expected_win32status = RPC_NT_NO_PROTSEQS_REGISTERED; break;
478         case RPC_S_NOT_LISTENING: expected_win32status = RPC_NT_NOT_LISTENING; break;
479         case RPC_S_UNKNOWN_MGR_TYPE: expected_win32status = RPC_NT_UNKNOWN_MGR_TYPE; break;
480         case RPC_S_UNKNOWN_IF: expected_win32status = RPC_NT_UNKNOWN_IF; break;
481         case RPC_S_NO_BINDINGS: expected_win32status = RPC_NT_NO_BINDINGS; break;
482         case RPC_S_NO_PROTSEQS: expected_win32status = RPC_NT_NO_PROTSEQS; break;
483         case RPC_S_CANT_CREATE_ENDPOINT: expected_win32status = RPC_NT_CANT_CREATE_ENDPOINT; break;
484         case RPC_S_OUT_OF_RESOURCES: expected_win32status = RPC_NT_OUT_OF_RESOURCES; break;
485         case RPC_S_SERVER_UNAVAILABLE: expected_win32status = RPC_NT_SERVER_UNAVAILABLE; break;
486         case RPC_S_SERVER_TOO_BUSY: expected_win32status = RPC_NT_SERVER_TOO_BUSY; break;
487         case RPC_S_INVALID_NETWORK_OPTIONS: expected_win32status = RPC_NT_INVALID_NETWORK_OPTIONS; break;
488         case RPC_S_NO_CALL_ACTIVE: expected_win32status = RPC_NT_NO_CALL_ACTIVE; break;
489         case RPC_S_CALL_FAILED: expected_win32status = RPC_NT_CALL_FAILED; break;
490         case RPC_S_CALL_FAILED_DNE: expected_win32status = RPC_NT_CALL_FAILED_DNE; break;
491         case RPC_S_PROTOCOL_ERROR: expected_win32status = RPC_NT_PROTOCOL_ERROR; break;
492         case RPC_S_UNSUPPORTED_TRANS_SYN: expected_win32status = RPC_NT_UNSUPPORTED_TRANS_SYN; break;
493         case RPC_S_UNSUPPORTED_TYPE: expected_win32status = RPC_NT_UNSUPPORTED_TYPE; break;
494         case RPC_S_INVALID_TAG: expected_win32status = RPC_NT_INVALID_TAG; break;
495         case RPC_S_INVALID_BOUND: expected_win32status = RPC_NT_INVALID_BOUND; break;
496         case RPC_S_NO_ENTRY_NAME: expected_win32status = RPC_NT_NO_ENTRY_NAME; break;
497         case RPC_S_INVALID_NAME_SYNTAX: expected_win32status = RPC_NT_INVALID_NAME_SYNTAX; break;
498         case RPC_S_UNSUPPORTED_NAME_SYNTAX: expected_win32status = RPC_NT_UNSUPPORTED_NAME_SYNTAX; break;
499         case RPC_S_UUID_NO_ADDRESS: expected_win32status = RPC_NT_UUID_NO_ADDRESS; break;
500         case RPC_S_DUPLICATE_ENDPOINT: expected_win32status = RPC_NT_DUPLICATE_ENDPOINT; break;
501         case RPC_S_UNKNOWN_AUTHN_TYPE: expected_win32status = RPC_NT_UNKNOWN_AUTHN_TYPE; break;
502         case RPC_S_MAX_CALLS_TOO_SMALL: expected_win32status = RPC_NT_MAX_CALLS_TOO_SMALL; break;
503         case RPC_S_STRING_TOO_LONG: expected_win32status = RPC_NT_STRING_TOO_LONG; break;
504         case RPC_S_PROTSEQ_NOT_FOUND: expected_win32status = RPC_NT_PROTSEQ_NOT_FOUND; break;
505         case RPC_S_PROCNUM_OUT_OF_RANGE: expected_win32status = RPC_NT_PROCNUM_OUT_OF_RANGE; break;
506         case RPC_S_BINDING_HAS_NO_AUTH: expected_win32status = RPC_NT_BINDING_HAS_NO_AUTH; break;
507         case RPC_S_UNKNOWN_AUTHN_SERVICE: expected_win32status = RPC_NT_UNKNOWN_AUTHN_SERVICE; break;
508         case RPC_S_UNKNOWN_AUTHN_LEVEL: expected_win32status = RPC_NT_UNKNOWN_AUTHN_LEVEL; break;
509         case RPC_S_INVALID_AUTH_IDENTITY: expected_win32status = RPC_NT_INVALID_AUTH_IDENTITY; break;
510         case RPC_S_UNKNOWN_AUTHZ_SERVICE: expected_win32status = RPC_NT_UNKNOWN_AUTHZ_SERVICE; break;
511         case EPT_S_INVALID_ENTRY: expected_win32status = EPT_NT_INVALID_ENTRY; break;
512         case EPT_S_CANT_PERFORM_OP: expected_win32status = EPT_NT_CANT_PERFORM_OP; break;
513         case EPT_S_NOT_REGISTERED: expected_win32status = EPT_NT_NOT_REGISTERED; break;
514         case EPT_S_CANT_CREATE: expected_win32status = EPT_NT_CANT_CREATE; break;
515         case RPC_S_NOTHING_TO_EXPORT: expected_win32status = RPC_NT_NOTHING_TO_EXPORT; break;
516         case RPC_S_INCOMPLETE_NAME: expected_win32status = RPC_NT_INCOMPLETE_NAME; break;
517         case RPC_S_INVALID_VERS_OPTION: expected_win32status = RPC_NT_INVALID_VERS_OPTION; break;
518         case RPC_S_NO_MORE_MEMBERS: expected_win32status = RPC_NT_NO_MORE_MEMBERS; break;
519         case RPC_S_NOT_ALL_OBJS_UNEXPORTED: expected_win32status = RPC_NT_NOT_ALL_OBJS_UNEXPORTED; break;
520         case RPC_S_INTERFACE_NOT_FOUND: expected_win32status = RPC_NT_INTERFACE_NOT_FOUND; break;
521         case RPC_S_ENTRY_ALREADY_EXISTS: expected_win32status = RPC_NT_ENTRY_ALREADY_EXISTS; break;
522         case RPC_S_ENTRY_NOT_FOUND: expected_win32status = RPC_NT_ENTRY_NOT_FOUND; break;
523         case RPC_S_NAME_SERVICE_UNAVAILABLE: expected_win32status = RPC_NT_NAME_SERVICE_UNAVAILABLE; break;
524         case RPC_S_INVALID_NAF_ID: expected_win32status = RPC_NT_INVALID_NAF_ID; break;
525         case RPC_S_CANNOT_SUPPORT: expected_win32status = RPC_NT_CANNOT_SUPPORT; break;
526         case RPC_S_NO_CONTEXT_AVAILABLE: expected_win32status = RPC_NT_NO_CONTEXT_AVAILABLE; break;
527         case RPC_S_INTERNAL_ERROR: expected_win32status = RPC_NT_INTERNAL_ERROR; break;
528         case RPC_S_ZERO_DIVIDE: expected_win32status = RPC_NT_ZERO_DIVIDE; break;
529         case RPC_S_ADDRESS_ERROR: expected_win32status = RPC_NT_ADDRESS_ERROR; break;
530         case RPC_S_FP_DIV_ZERO: expected_win32status = RPC_NT_FP_DIV_ZERO; break;
531         case RPC_S_FP_UNDERFLOW: expected_win32status = RPC_NT_FP_UNDERFLOW; break;
532         case RPC_S_FP_OVERFLOW: expected_win32status = RPC_NT_FP_OVERFLOW; break;
533         case RPC_S_CALL_IN_PROGRESS: expected_win32status = RPC_NT_CALL_IN_PROGRESS; break;
534         case RPC_S_NO_MORE_BINDINGS: expected_win32status = RPC_NT_NO_MORE_BINDINGS; break;
535         case RPC_S_CALL_CANCELLED: expected_win32status = RPC_NT_CALL_CANCELLED; missing = TRUE; break;
536         case RPC_S_INVALID_OBJECT: expected_win32status = RPC_NT_INVALID_OBJECT; break;
537         case RPC_S_INVALID_ASYNC_HANDLE: expected_win32status = RPC_NT_INVALID_ASYNC_HANDLE; missing = TRUE; break;
538         case RPC_S_INVALID_ASYNC_CALL: expected_win32status = RPC_NT_INVALID_ASYNC_CALL; missing = TRUE; break;
539         case RPC_S_GROUP_MEMBER_NOT_FOUND: expected_win32status = RPC_NT_GROUP_MEMBER_NOT_FOUND; break;
540         case RPC_X_NO_MORE_ENTRIES: expected_win32status = RPC_NT_NO_MORE_ENTRIES; break;
541         case RPC_X_SS_CHAR_TRANS_OPEN_FAIL: expected_win32status = RPC_NT_SS_CHAR_TRANS_OPEN_FAIL; break;
542         case RPC_X_SS_CHAR_TRANS_SHORT_FILE: expected_win32status = RPC_NT_SS_CHAR_TRANS_SHORT_FILE; break;
543         case RPC_X_SS_IN_NULL_CONTEXT: expected_win32status = RPC_NT_SS_IN_NULL_CONTEXT; break;
544         case RPC_X_SS_CONTEXT_DAMAGED: expected_win32status = RPC_NT_SS_CONTEXT_DAMAGED; break;
545         case RPC_X_SS_HANDLES_MISMATCH: expected_win32status = RPC_NT_SS_HANDLES_MISMATCH; break;
546         case RPC_X_SS_CANNOT_GET_CALL_HANDLE: expected_win32status = RPC_NT_SS_CANNOT_GET_CALL_HANDLE; break;
547         case RPC_X_NULL_REF_POINTER: expected_win32status = RPC_NT_NULL_REF_POINTER; break;
548         case RPC_X_ENUM_VALUE_OUT_OF_RANGE: expected_win32status = RPC_NT_ENUM_VALUE_OUT_OF_RANGE; break;
549         case RPC_X_BYTE_COUNT_TOO_SMALL: expected_win32status = RPC_NT_BYTE_COUNT_TOO_SMALL; break;
550         case RPC_X_BAD_STUB_DATA: expected_win32status = RPC_NT_BAD_STUB_DATA; break;
551         case RPC_X_PIPE_CLOSED: expected_win32status = RPC_NT_PIPE_CLOSED; missing = TRUE; break;
552         case RPC_X_PIPE_DISCIPLINE_ERROR: expected_win32status = RPC_NT_PIPE_DISCIPLINE_ERROR; missing = TRUE; break;
553         case RPC_X_PIPE_EMPTY: expected_win32status = RPC_NT_PIPE_EMPTY; missing = TRUE; break;
554         case ERROR_PASSWORD_MUST_CHANGE: expected_win32status = STATUS_PASSWORD_MUST_CHANGE; missing = TRUE; break;
555         case ERROR_ACCOUNT_LOCKED_OUT: expected_win32status = STATUS_ACCOUNT_LOCKED_OUT; missing = TRUE; break;
556         default:
557             if (w2k3_up)
558                 expected_win32status = STATUS_UNSUCCESSFUL;
559             else
560                 expected_win32status = rpc_status;
561         }
562 
563         ok(win32status == expected_win32status ||
564             broken(missing && win32status == rpc_status),
565             "I_RpcMapWin32Status(%d) should have returned 0x%x instead of 0x%x%s\n",
566             rpc_status, expected_win32status, win32status,
567             broken(missing) ? " (or have returned with the given status)" : "");
568     }
569 }
570 
571 static void test_RpcStringBindingParseA(void)
572 {
573     static unsigned char valid_binding[] = "00000000-0000-0000-c000-000000000046@ncacn_np:.[endpoint=\\pipe\\test]";
574     static unsigned char valid_binding2[] = "00000000-0000-0000-c000-000000000046@ncacn_np:.[\\pipe\\test]";
575     static unsigned char invalid_uuid_binding[] = "{00000000-0000-0000-c000-000000000046}@ncacn_np:.[endpoint=\\pipe\\test]";
576     static unsigned char invalid_ep_binding[] = "00000000-0000-0000-c000-000000000046@ncacn_np:.[endpoint=test]";
577     static unsigned char invalid_binding[] = "00000000-0000-0000-c000-000000000046@ncacn_np";
578     RPC_STATUS status;
579     unsigned char *uuid;
580     unsigned char *protseq;
581     unsigned char *network_addr;
582     unsigned char *endpoint;
583     unsigned char *options;
584 
585     /* test all parameters */
586     status = RpcStringBindingParseA(valid_binding, &uuid, &protseq, &network_addr, &endpoint, &options);
587     ok(status == RPC_S_OK, "RpcStringBindingParseA failed with error %d\n", status);
588     ok(!strcmp((char *)uuid, "00000000-0000-0000-c000-000000000046"), "uuid should have been 00000000-0000-0000-C000-000000000046 instead of %s\n", uuid);
589     ok(!strcmp((char *)protseq, "ncacn_np"), "protseq should have been ncacn_np instead of %s\n", protseq);
590     ok(!strcmp((char *)network_addr, "."), "network_addr should have been . instead of %s\n", network_addr);
591     ok(!strcmp((char *)endpoint, "pipetest"), "endpoint should have been pipetest instead of %s\n", endpoint);
592     if (options)
593         ok(!strcmp((char *)options, ""), "options should have been \"\" of \"%s\"\n", options);
594     else
595         todo_wine ok(FALSE, "options is NULL\n");
596     RpcStringFreeA(&uuid);
597     RpcStringFreeA(&protseq);
598     RpcStringFreeA(&network_addr);
599     RpcStringFreeA(&endpoint);
600     RpcStringFreeA(&options);
601 
602     /* test all parameters with different type of string binding */
603     status = RpcStringBindingParseA(valid_binding2, &uuid, &protseq, &network_addr, &endpoint, &options);
604     ok(status == RPC_S_OK, "RpcStringBindingParseA failed with error %d\n", status);
605     ok(!strcmp((char *)uuid, "00000000-0000-0000-c000-000000000046"), "uuid should have been 00000000-0000-0000-C000-000000000046 instead of %s\n", uuid);
606     ok(!strcmp((char *)protseq, "ncacn_np"), "protseq should have been ncacn_np instead of %s\n", protseq);
607     ok(!strcmp((char *)network_addr, "."), "network_addr should have been . instead of %s\n", network_addr);
608     ok(!strcmp((char *)endpoint, "pipetest"), "endpoint should have been pipetest instead of %s\n", endpoint);
609     if (options)
610         ok(!strcmp((char *)options, ""), "options should have been \"\" of \"%s\"\n", options);
611     else
612         todo_wine ok(FALSE, "options is NULL\n");
613     RpcStringFreeA(&uuid);
614     RpcStringFreeA(&protseq);
615     RpcStringFreeA(&network_addr);
616     RpcStringFreeA(&endpoint);
617     RpcStringFreeA(&options);
618 
619     /* test with as many parameters NULL as possible */
620     status = RpcStringBindingParseA(valid_binding, NULL, &protseq, NULL, NULL, NULL);
621     ok(status == RPC_S_OK, "RpcStringBindingParseA failed with error %d\n", status);
622     ok(!strcmp((char *)protseq, "ncacn_np"), "protseq should have been ncacn_np instead of %s\n", protseq);
623     RpcStringFreeA(&protseq);
624 
625     /* test with invalid uuid */
626     status = RpcStringBindingParseA(invalid_uuid_binding, NULL, &protseq, NULL, NULL, NULL);
627     ok(status == RPC_S_INVALID_STRING_UUID, "RpcStringBindingParseA should have returned RPC_S_INVALID_STRING_UUID instead of %d\n", status);
628     ok(protseq == NULL, "protseq was %p instead of NULL\n", protseq);
629 
630     /* test with invalid endpoint */
631     status = RpcStringBindingParseA(invalid_ep_binding, NULL, &protseq, NULL, NULL, NULL);
632     ok(status == RPC_S_OK, "RpcStringBindingParseA failed with error %d\n", status);
633     RpcStringFreeA(&protseq);
634 
635     /* test with invalid binding */
636     status = RpcStringBindingParseA(invalid_binding, &uuid, &protseq, &network_addr, &endpoint, &options);
637     todo_wine
638     ok(status == RPC_S_INVALID_STRING_BINDING, "RpcStringBindingParseA should have returned RPC_S_INVALID_STRING_BINDING instead of %d\n", status);
639     todo_wine
640     ok(uuid == NULL, "uuid was %p instead of NULL\n", uuid);
641     if (uuid)
642         RpcStringFreeA(&uuid);
643     ok(protseq == NULL, "protseq was %p instead of NULL\n", protseq);
644     todo_wine
645     ok(network_addr == NULL, "network_addr was %p instead of NULL\n", network_addr);
646     if (network_addr)
647         RpcStringFreeA(&network_addr);
648     ok(endpoint == NULL, "endpoint was %p instead of NULL\n", endpoint);
649     ok(options == NULL, "options was %p instead of NULL\n", options);
650 }
651 
652 static void test_RpcExceptionFilter(const char *func_name)
653 {
654     ULONG exception;
655     int retval;
656     int (WINAPI *pRpcExceptionFilter)(ULONG) = (void *)GetProcAddress(GetModuleHandleA("rpcrt4.dll"), func_name);
657 
658     if (!pRpcExceptionFilter)
659     {
660         win_skip("%s not exported\n", func_name);
661         return;
662     }
663 
664     for (exception = 0; exception < STATUS_REG_NAT_CONSUMPTION; exception++)
665     {
666         /* skip over uninteresting bits of the number space */
667         if (exception == 2000) exception = 0x40000000;
668         if (exception == 0x40000005) exception = 0x80000000;
669         if (exception == 0x80000005) exception = 0xc0000000;
670 
671         retval = pRpcExceptionFilter(exception);
672         switch (exception)
673         {
674         case STATUS_DATATYPE_MISALIGNMENT:
675         case STATUS_BREAKPOINT:
676         case STATUS_ACCESS_VIOLATION:
677         case STATUS_ILLEGAL_INSTRUCTION:
678         case STATUS_PRIVILEGED_INSTRUCTION:
679         case STATUS_INSTRUCTION_MISALIGNMENT:
680         case STATUS_STACK_OVERFLOW:
681         case STATUS_POSSIBLE_DEADLOCK:
682             ok(retval == EXCEPTION_CONTINUE_SEARCH, "%s(0x%x) should have returned %d instead of %d\n",
683                func_name, exception, EXCEPTION_CONTINUE_SEARCH, retval);
684             break;
685         case STATUS_GUARD_PAGE_VIOLATION:
686         case STATUS_IN_PAGE_ERROR:
687         case STATUS_HANDLE_NOT_CLOSABLE:
688             trace("%s(0x%x) returned %d\n", func_name, exception, retval);
689             break;
690         default:
691             ok(retval == EXCEPTION_EXECUTE_HANDLER, "%s(0x%x) should have returned %d instead of %d\n",
692                func_name, exception, EXCEPTION_EXECUTE_HANDLER, retval);
693         }
694     }
695 }
696 
697 static void test_RpcStringBindingFromBinding(void)
698 {
699     static unsigned char ncacn_np[] = "ncacn_np";
700     static unsigned char address[] = ".";
701     static unsigned char endpoint[] = "\\pipe\\wine_rpc_test";
702     RPC_STATUS status;
703     handle_t handle;
704     RPC_CSTR binding;
705 
706     status = RpcStringBindingComposeA(NULL, ncacn_np, address,
707                                      endpoint, NULL, &binding);
708     ok(status == RPC_S_OK, "RpcStringBindingCompose failed (%u)\n", status);
709 
710     status = RpcBindingFromStringBindingA(binding, &handle);
711     ok(status == RPC_S_OK, "RpcBindingFromStringBinding failed (%u)\n", status);
712     RpcStringFreeA(&binding);
713 
714     status = RpcBindingToStringBindingA(handle, &binding);
715     ok(status == RPC_S_OK, "RpcStringBindingFromBinding failed with error %u\n", status);
716 
717     ok(!strcmp((const char *)binding, "ncacn_np:.[\\\\pipe\\\\wine_rpc_test]"),
718        "binding string didn't match what was expected: \"%s\"\n", binding);
719     RpcStringFreeA(&binding);
720 
721     status = RpcBindingFree(&handle);
722     ok(status == RPC_S_OK, "RpcBindingFree failed with error %u\n", status);
723 }
724 
725 static void test_UuidCreate(void)
726 {
727     UUID guid;
728     BYTE version;
729 
730     UuidCreate(&guid);
731     version = (guid.Data3 & 0xf000) >> 12;
732     ok(version == 4 || broken(version == 1), "unexpected version %d\n",
733        version);
734     if (version == 4)
735     {
736         static UUID v4and = { 0, 0, 0x4000, { 0x80,0,0,0,0,0,0,0 } };
737         static UUID v4or = { 0xffffffff, 0xffff, 0x4fff,
738            { 0xbf,0xff,0xff,0xff,0xff,0xff,0xff,0xff } };
739         UUID and, or;
740         RPC_STATUS rslt;
741         int i;
742 
743         and = guid;
744         or = guid;
745         /* Generate a bunch of UUIDs and mask them.  By the end, we expect
746          * every randomly generated bit to have been zero at least once,
747          * resulting in no bits set in the and mask except those which are not
748          * randomly generated:  the version number and the topmost bits of the
749          * Data4 field (treated as big-endian.)  Similarly, we expect only
750          * the bits which are not randomly set to be cleared in the or mask.
751          */
752         for (i = 0; i < 1000; i++)
753         {
754             LPBYTE src, dst;
755 
756             UuidCreate(&guid);
757             for (src = (LPBYTE)&guid, dst = (LPBYTE)&and;
758              src - (LPBYTE)&guid < sizeof(guid); src++, dst++)
759                 *dst &= *src;
760             for (src = (LPBYTE)&guid, dst = (LPBYTE)&or;
761              src - (LPBYTE)&guid < sizeof(guid); src++, dst++)
762                 *dst |= *src;
763         }
764         ok(UuidEqual(&and, &v4and, &rslt),
765            "unexpected bits set in V4 UUID: %s\n", wine_dbgstr_guid(&and));
766         ok(UuidEqual(&or, &v4or, &rslt),
767            "unexpected bits set in V4 UUID: %s\n", wine_dbgstr_guid(&or));
768     }
769     else
770     {
771         /* Older versions of Windows generate V1 UUIDs.  For these, there are
772          * many stable bits, including at least the MAC address if one is
773          * present.  Just check that Data4[0]'s most significant bits are
774          * set as expected.
775          */
776         ok((guid.Data4[0] & 0xc0) == 0x80,
777            "unexpected value in Data4[0]: %02x\n", guid.Data4[0] & 0xc0);
778     }
779 }
780 
781 static void test_UuidCreateSequential(void)
782 {
783     UUID guid1;
784     BYTE version;
785     RPC_STATUS (WINAPI *pUuidCreateSequential)(UUID *) = (void *)GetProcAddress(GetModuleHandleA("rpcrt4.dll"), "UuidCreateSequential");
786     RPC_STATUS (WINAPI *pI_UuidCreate)(UUID *) = (void*)GetProcAddress(GetModuleHandleA("rpcrt4.dll"), "I_UuidCreate");
787     RPC_STATUS ret;
788 
789     if (!pUuidCreateSequential)
790     {
791         win_skip("UuidCreateSequential not exported\n");
792         return;
793     }
794 
795     ok(pI_UuidCreate != pUuidCreateSequential, "got %p, %p\n", pI_UuidCreate, pUuidCreateSequential);
796 
797     ret = pUuidCreateSequential(&guid1);
798     ok(!ret || ret == RPC_S_UUID_LOCAL_ONLY,
799        "expected RPC_S_OK or RPC_S_UUID_LOCAL_ONLY, got %08x\n", ret);
800     version = (guid1.Data3 & 0xf000) >> 12;
801     ok(version == 1, "unexpected version %d\n", version);
802     if (version == 1)
803     {
804         UUID guid2;
805 
806         if (!ret)
807         {
808             /* If the call succeeded, there's a valid (non-multicast) MAC
809              * address in the uuid:
810              */
811             ok(!(guid1.Data4[2] & 0x01) || broken(guid1.Data4[2] & 0x01), /* Win 8.1 */
812                "GUID does not appear to contain a MAC address: %s\n",
813                wine_dbgstr_guid(&guid1));
814         }
815         else
816         {
817             /* Otherwise, there's a randomly generated multicast MAC address
818              * address in the uuid:
819              */
820             ok((guid1.Data4[2] & 0x01),
821                "GUID does not appear to contain a multicast MAC address: %s\n",
822                wine_dbgstr_guid(&guid1));
823         }
824         /* Generate another GUID, and make sure its MAC address matches the
825          * first.
826          */
827         ret = pUuidCreateSequential(&guid2);
828         ok(!ret || ret == RPC_S_UUID_LOCAL_ONLY,
829            "expected RPC_S_OK or RPC_S_UUID_LOCAL_ONLY, got %08x\n", ret);
830         version = (guid2.Data3 & 0xf000) >> 12;
831         ok(version == 1, "unexpected version %d\n", version);
832         ok(!memcmp(guid1.Data4, guid2.Data4, sizeof(guid2.Data4)),
833            "unexpected value in MAC address: %s\n",
834            wine_dbgstr_guid(&guid2));
835 
836         /* I_UuidCreate does exactly the same */
837         pI_UuidCreate(&guid2);
838         version = (guid2.Data3 & 0xf000) >> 12;
839         ok(version == 1, "unexpected version %d\n", version);
840         ok(!memcmp(guid1.Data4, guid2.Data4, sizeof(guid2.Data4)),
841            "unexpected value in MAC address: %s\n",
842            wine_dbgstr_guid(&guid2));
843     }
844 }
845 
846 static void test_RpcBindingFree(void)
847 {
848     RPC_BINDING_HANDLE binding = NULL;
849     RPC_STATUS status;
850 
851     status = RpcBindingFree(&binding);
852     ok(status == RPC_S_INVALID_BINDING,
853        "RpcBindingFree should have returned RPC_S_INVALID_BINDING instead of %d\n",
854        status);
855 }
856 
857 static void test_RpcServerInqDefaultPrincName(void)
858 {
859     RPC_STATUS ret;
860     RPC_CSTR principal, saved_principal;
861     char *username;
862     ULONG len = 0;
863 
864     GetUserNameExA( NameSamCompatible, NULL, &len );
865     username = HeapAlloc( GetProcessHeap(), 0, len );
866     GetUserNameExA( NameSamCompatible, username, &len );
867 
868     ret = RpcServerInqDefaultPrincNameA( 0, NULL );
869     ok( ret == RPC_S_UNKNOWN_AUTHN_SERVICE, "got %u\n", ret );
870 
871     ret = RpcServerInqDefaultPrincNameA( RPC_C_AUTHN_DEFAULT, NULL );
872     ok( ret == RPC_S_UNKNOWN_AUTHN_SERVICE, "got %u\n", ret );
873 
874     principal = (RPC_CSTR)0xdeadbeef;
875     ret = RpcServerInqDefaultPrincNameA( RPC_C_AUTHN_DEFAULT, &principal );
876     ok( ret == RPC_S_UNKNOWN_AUTHN_SERVICE, "got %u\n", ret );
877     ok( principal == (RPC_CSTR)0xdeadbeef, "got unexpected principal\n" );
878 
879     saved_principal = (RPC_CSTR)0xdeadbeef;
880     ret = RpcServerInqDefaultPrincNameA( RPC_C_AUTHN_WINNT, &saved_principal );
881     ok( ret == RPC_S_OK, "got %u\n", ret );
882     ok( saved_principal != (RPC_CSTR)0xdeadbeef, "expected valid principal\n" );
883     ok( !strcmp( (const char *)saved_principal, username ), "got \'%s\'\n", saved_principal );
884     trace("%s\n", saved_principal);
885 
886     ret = RpcServerRegisterAuthInfoA( (RPC_CSTR)"wine\\test", RPC_C_AUTHN_WINNT, NULL, NULL );
887     ok( ret == RPC_S_OK, "got %u\n", ret );
888 
889     principal = (RPC_CSTR)0xdeadbeef;
890     ret = RpcServerInqDefaultPrincNameA( RPC_C_AUTHN_WINNT, &principal );
891     ok( ret == RPC_S_OK, "got %u\n", ret );
892     ok( principal != (RPC_CSTR)0xdeadbeef, "expected valid principal\n" );
893     ok( !strcmp( (const char *)principal, username ), "got \'%s\'\n", principal );
894     RpcStringFreeA( &principal );
895 
896     ret = RpcServerRegisterAuthInfoA( saved_principal, RPC_C_AUTHN_WINNT, NULL, NULL );
897     ok( ret == RPC_S_OK, "got %u\n", ret );
898 
899     RpcStringFreeA( &saved_principal );
900     HeapFree( GetProcessHeap(), 0, username );
901 }
902 
903 static void test_RpcServerRegisterAuthInfo(void)
904 {
905     RPC_STATUS status;
906 
907     status = RpcServerRegisterAuthInfoW(NULL, 600, NULL, NULL);
908     ok(status == RPC_S_UNKNOWN_AUTHN_SERVICE, "status = %x\n", status);
909 }
910 
911 static void test_RpcServerUseProtseq(void)
912 {
913     RPC_STATUS status;
914     RPC_BINDING_VECTOR *bindings;
915     ULONG i;
916     ULONG binding_count_before;
917     ULONG binding_count_after1;
918     ULONG binding_count_after2;
919     ULONG endpoints_registered = 0;
920     static unsigned char iptcp[] = "ncacn_ip_tcp";
921     static unsigned char np[] = "ncacn_np";
922     static unsigned char ncalrpc[] = "ncalrpc";
923     BOOL iptcp_registered = FALSE, np_registered = FALSE, ncalrpc_registered = FALSE;
924 
925     status = RpcServerInqBindings(&bindings);
926     if (status == RPC_S_NO_BINDINGS)
927         binding_count_before = 0;
928     else
929     {
930         binding_count_before = bindings->Count;
931         ok(status == RPC_S_OK, "RpcServerInqBindings failed with status %d\n", status);
932         for (i = 0; i < bindings->Count; i++)
933         {
934             RPC_CSTR str_bind;
935             status = RpcBindingToStringBindingA(bindings->BindingH[i], &str_bind);
936             ok(status == RPC_S_OK, "RpcBindingToStringBinding failed with status %d\n", status);
937             if (lstrlenA((const char *)str_bind) > 12 && !memcmp(str_bind, "ncacn_ip_tcp", 12))
938                 iptcp_registered = TRUE;
939             if (lstrlenA((const char *)str_bind) > 8 && !memcmp(str_bind, "ncacn_np", 8))
940                 np_registered = TRUE;
941             if (lstrlenA((const char *)str_bind) > 7 && !memcmp(str_bind, "ncalrpc", 7))
942                 ncalrpc_registered = TRUE;
943             RpcStringFreeA(&str_bind);
944         }
945         RpcBindingVectorFree(&bindings);
946     }
947 
948     /* show that RpcServerUseProtseqEp(..., NULL, ...) is the same as
949      * RpcServerUseProtseq(...) */
950     status = RpcServerUseProtseqEpA(ncalrpc, 0, NULL, NULL);
951     ok(status == RPC_S_OK || broken(status == RPC_S_INVALID_ENDPOINT_FORMAT),
952        "RpcServerUseProtseqEp with NULL endpoint failed with status %d\n",
953        status);
954 
955     /* register protocol sequences without explicit endpoints */
956     status = RpcServerUseProtseqA(np, 0, NULL);
957     if (status == RPC_S_PROTSEQ_NOT_SUPPORTED)
958         win_skip("ncacn_np not supported\n");
959     else
960         ok(status == RPC_S_OK, "RpcServerUseProtseq(ncacn_np) failed with status %d\n", status);
961     if (status == RPC_S_OK && !np_registered) endpoints_registered++;
962 
963     status = RpcServerUseProtseqA(iptcp, 0, NULL);
964     ok(status == RPC_S_OK, "RpcServerUseProtseq(ncacn_ip_tcp) failed with status %d\n", status);
965     if (status == RPC_S_OK && !iptcp_registered) endpoints_registered++;
966 
967     status = RpcServerUseProtseqA(ncalrpc, 0, NULL);
968     ok(status == RPC_S_OK, "RpcServerUseProtseqEp(ncalrpc) failed with status %d\n", status);
969     if (status == RPC_S_OK && !ncalrpc_registered) endpoints_registered++;
970 
971     status = RpcServerInqBindings(&bindings);
972     ok(status == RPC_S_OK, "RpcServerInqBindings failed with status %d\n", status);
973     binding_count_after1 = bindings->Count;
974     ok(binding_count_after1 == binding_count_before + endpoints_registered,
975        "wrong binding count - before: %u, after %u, endpoints registered %u\n",
976        binding_count_before, binding_count_after1, endpoints_registered);
977     for (i = 0; i < bindings->Count; i++)
978     {
979         RPC_CSTR str_bind;
980         status = RpcBindingToStringBindingA(bindings->BindingH[i], &str_bind);
981         ok(status == RPC_S_OK, "RpcBindingToStringBinding failed with status %d\n", status);
982         trace("string binding: %s\n", str_bind);
983         RpcStringFreeA(&str_bind);
984     }
985     RpcBindingVectorFree(&bindings);
986 
987     /* re-register - endpoints should be reused */
988     status = RpcServerUseProtseqA(np, 0, NULL);
989     if (status == RPC_S_PROTSEQ_NOT_SUPPORTED)
990         win_skip("ncacn_np not supported\n");
991     else
992         ok(status == RPC_S_OK, "RpcServerUseProtseq(ncacn_np) failed with status %d\n", status);
993 
994     status = RpcServerUseProtseqA(iptcp, 0, NULL);
995     ok(status == RPC_S_OK, "RpcServerUseProtseq(ncacn_ip_tcp) failed with status %d\n", status);
996 
997     status = RpcServerUseProtseqA(ncalrpc, 0, NULL);
998     ok(status == RPC_S_OK, "RpcServerUseProtseqEp(ncalrpc) failed with status %d\n", status);
999 
1000     status = RpcServerInqBindings(&bindings);
1001     ok(status == RPC_S_OK, "RpcServerInqBindings failed with status %d\n", status);
1002     binding_count_after2 = bindings->Count;
1003     ok(binding_count_after2 == binding_count_after1,
1004        "bindings should have been re-used - after1: %u after2: %u\n",
1005        binding_count_after1, binding_count_after2);
1006     RpcBindingVectorFree(&bindings);
1007 }
1008 
1009 static void test_endpoint_mapper(RPC_CSTR protseq, RPC_CSTR address)
1010 {
1011     static unsigned char annotation[] = "Test annotation string.";
1012     RPC_STATUS status;
1013     RPC_BINDING_VECTOR *binding_vector;
1014     handle_t handle;
1015     unsigned char *binding;
1016 
1017     status = RpcServerRegisterIf(IFoo_v0_0_s_ifspec, NULL, NULL);
1018     ok(status == RPC_S_OK, "%s: RpcServerRegisterIf failed (%u)\n", protseq, status);
1019 
1020     status = RpcServerInqBindings(&binding_vector);
1021     ok(status == RPC_S_OK, "%s: RpcServerInqBindings failed with error %u\n", protseq, status);
1022 
1023     /* register endpoints created in test_RpcServerUseProtseq */
1024     status = RpcEpRegisterA(IFoo_v0_0_s_ifspec, binding_vector, NULL, annotation);
1025     ok(status == RPC_S_OK, "%s: RpcEpRegisterA failed with error %u\n", protseq, status);
1026     /* reregister the same endpoint with no annotation */
1027     status = RpcEpRegisterA(IFoo_v0_0_s_ifspec, binding_vector, NULL, NULL);
1028     ok(status == RPC_S_OK, "%s: RpcEpRegisterA failed with error %u\n", protseq, status);
1029 
1030     status = RpcStringBindingComposeA(NULL, protseq, address,
1031                                      NULL, NULL, &binding);
1032     ok(status == RPC_S_OK, "%s: RpcStringBindingCompose failed (%u)\n", protseq, status);
1033 
1034     status = RpcBindingFromStringBindingA(binding, &handle);
1035     ok(status == RPC_S_OK, "%s: RpcBindingFromStringBinding failed (%u)\n", protseq, status);
1036 
1037     RpcStringFreeA(&binding);
1038 
1039     status = RpcBindingReset(handle);
1040     ok(status == RPC_S_OK, "%s: RpcBindingReset failed with error %u\n", protseq, status);
1041 
1042     status = RpcEpResolveBinding(handle, IFoo_v0_0_s_ifspec);
1043     ok(status == RPC_S_OK || broken(status == RPC_S_SERVER_UNAVAILABLE), /* win9x */
1044        "%s: RpcEpResolveBinding failed with error %u\n", protseq, status);
1045 
1046     status = RpcBindingReset(handle);
1047     ok(status == RPC_S_OK, "%s: RpcBindingReset failed with error %u\n", protseq, status);
1048 
1049     status = RpcBindingFree(&handle);
1050     ok(status == RPC_S_OK, "%s: RpcBindingFree failed with error %u\n", protseq, status);
1051 
1052     status = RpcServerUnregisterIf(NULL, NULL, FALSE);
1053     ok(status == RPC_S_OK, "%s: RpcServerUnregisterIf failed (%u)\n", protseq, status);
1054 
1055     status = RpcEpUnregister(IFoo_v0_0_s_ifspec, binding_vector, NULL);
1056     ok(status == RPC_S_OK, "%s: RpcEpUnregisterA failed with error %u\n", protseq, status);
1057 
1058     status = RpcBindingVectorFree(&binding_vector);
1059     ok(status == RPC_S_OK, "%s: RpcBindingVectorFree failed with error %u\n", protseq, status);
1060 }
1061 
1062 static BOOL is_process_elevated(void)
1063 {
1064     HANDLE token;
1065     if (OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &token ))
1066     {
1067         TOKEN_ELEVATION_TYPE type;
1068         DWORD size;
1069         BOOL ret;
1070 
1071         ret = GetTokenInformation( token, TokenElevationType, &type, sizeof(type), &size );
1072         CloseHandle( token );
1073         return (ret && type == TokenElevationTypeFull);
1074     }
1075     return FALSE;
1076 }
1077 
1078 static BOOL is_firewall_enabled(void)
1079 {
1080     HRESULT hr, init;
1081     INetFwMgr *mgr = NULL;
1082     INetFwPolicy *policy = NULL;
1083     INetFwProfile *profile = NULL;
1084     VARIANT_BOOL enabled = VARIANT_FALSE;
1085 
1086     init = CoInitializeEx( 0, COINIT_APARTMENTTHREADED );
1087 
1088     hr = CoCreateInstance( &CLSID_NetFwMgr, NULL, CLSCTX_INPROC_SERVER, &IID_INetFwMgr,
1089                            (void **)&mgr );
1090     ok( hr == S_OK, "got %08x\n", hr );
1091     if (hr != S_OK) goto done;
1092 
1093     hr = INetFwMgr_get_LocalPolicy( mgr, &policy );
1094     ok( hr == S_OK, "got %08x\n", hr );
1095     if (hr != S_OK) goto done;
1096 
1097     hr = INetFwPolicy_get_CurrentProfile( policy, &profile );
1098     if (hr != S_OK) goto done;
1099 
1100     hr = INetFwProfile_get_FirewallEnabled( profile, &enabled );
1101     ok( hr == S_OK, "got %08x\n", hr );
1102 
1103 done:
1104     if (policy) INetFwPolicy_Release( policy );
1105     if (profile) INetFwProfile_Release( profile );
1106     if (mgr) INetFwMgr_Release( mgr );
1107     if (SUCCEEDED( init )) CoUninitialize();
1108     return (enabled == VARIANT_TRUE);
1109 }
1110 
1111 enum firewall_op
1112 {
1113     APP_ADD,
1114     APP_REMOVE
1115 };
1116 
1117 static HRESULT set_firewall( enum firewall_op op )
1118 {
1119     static const WCHAR testW[] = {'r','p','c','r','t','4','_','t','e','s','t',0};
1120     HRESULT hr, init;
1121     INetFwMgr *mgr = NULL;
1122     INetFwPolicy *policy = NULL;
1123     INetFwProfile *profile = NULL;
1124     INetFwAuthorizedApplication *app = NULL;
1125     INetFwAuthorizedApplications *apps = NULL;
1126     BSTR name, image = SysAllocStringLen( NULL, MAX_PATH );
1127 
1128     if (!GetModuleFileNameW( NULL, image, MAX_PATH ))
1129     {
1130         SysFreeString( image );
1131         return E_FAIL;
1132     }
1133     init = CoInitializeEx( 0, COINIT_APARTMENTTHREADED );
1134 
1135     hr = CoCreateInstance( &CLSID_NetFwMgr, NULL, CLSCTX_INPROC_SERVER, &IID_INetFwMgr,
1136                            (void **)&mgr );
1137     ok( hr == S_OK, "got %08x\n", hr );
1138     if (hr != S_OK) goto done;
1139 
1140     hr = INetFwMgr_get_LocalPolicy( mgr, &policy );
1141     ok( hr == S_OK, "got %08x\n", hr );
1142     if (hr != S_OK) goto done;
1143 
1144     hr = INetFwPolicy_get_CurrentProfile( policy, &profile );
1145     if (hr != S_OK) goto done;
1146 
1147     hr = INetFwProfile_get_AuthorizedApplications( profile, &apps );
1148     ok( hr == S_OK, "got %08x\n", hr );
1149     if (hr != S_OK) goto done;
1150 
1151     hr = CoCreateInstance( &CLSID_NetFwAuthorizedApplication, NULL, CLSCTX_INPROC_SERVER,
1152                            &IID_INetFwAuthorizedApplication, (void **)&app );
1153     ok( hr == S_OK, "got %08x\n", hr );
1154     if (hr != S_OK) goto done;
1155 
1156     hr = INetFwAuthorizedApplication_put_ProcessImageFileName( app, image );
1157     if (hr != S_OK) goto done;
1158 
1159     name = SysAllocString( testW );
1160     hr = INetFwAuthorizedApplication_put_Name( app, name );
1161     SysFreeString( name );
1162     ok( hr == S_OK, "got %08x\n", hr );
1163     if (hr != S_OK) goto done;
1164 
1165     if (op == APP_ADD)
1166         hr = INetFwAuthorizedApplications_Add( apps, app );
1167     else if (op == APP_REMOVE)
1168         hr = INetFwAuthorizedApplications_Remove( apps, image );
1169     else
1170         hr = E_INVALIDARG;
1171 
1172 done:
1173     if (app) INetFwAuthorizedApplication_Release( app );
1174     if (apps) INetFwAuthorizedApplications_Release( apps );
1175     if (policy) INetFwPolicy_Release( policy );
1176     if (profile) INetFwProfile_Release( profile );
1177     if (mgr) INetFwMgr_Release( mgr );
1178     if (SUCCEEDED( init )) CoUninitialize();
1179     SysFreeString( image );
1180     return hr;
1181 }
1182 
1183 START_TEST( rpc )
1184 {
1185     static unsigned char ncacn_np[] = "ncacn_np";
1186     static unsigned char ncalrpc[] = "ncalrpc";
1187     static unsigned char np_address[] = ".";
1188     BOOL firewall_enabled = is_firewall_enabled();
1189 
1190     if (firewall_enabled && !is_process_elevated())
1191     {
1192         skip("no privileges, skipping tests to avoid firewall dialog\n");
1193         return;
1194     }
1195 
1196     UuidConversionAndComparison();
1197     TestDceErrorInqText();
1198     test_towers();
1199     test_I_RpcMapWin32Status();
1200     test_RpcStringBindingParseA();
1201     test_RpcExceptionFilter("I_RpcExceptionFilter");
1202     test_RpcExceptionFilter("RpcExceptionFilter");
1203     test_RpcStringBindingFromBinding();
1204     test_UuidCreate();
1205     test_UuidCreateSequential();
1206     test_RpcBindingFree();
1207     test_RpcServerInqDefaultPrincName();
1208     test_RpcServerRegisterAuthInfo();
1209 
1210     if (firewall_enabled)
1211     {
1212         HRESULT hr = set_firewall(APP_ADD);
1213         if (hr != S_OK)
1214         {
1215             skip("can't authorize app in firewall %08x\n", hr);
1216             return;
1217         }
1218     }
1219 
1220     test_rpc_ncacn_ip_tcp();
1221     test_RpcServerUseProtseq();
1222     test_endpoint_mapper(ncacn_np, np_address);
1223     test_endpoint_mapper(ncalrpc, NULL);
1224 
1225     if (firewall_enabled) set_firewall(APP_REMOVE);
1226 }
1227