Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
89483716
Commit
89483716
authored
Jun 16, 2017
by
Matteo Bruni
Committed by
Alexandre Julliard
Jun 19, 2017
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
advapi32/tests: Add a token mandatory label test.
Signed-off-by:
Matteo Bruni
<
mbruni@codeweavers.com
>
Signed-off-by:
Alexandre Julliard
<
julliard@winehq.org
>
parent
a78d4194
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
81 additions
and
0 deletions
+81
-0
security.c
dlls/advapi32/tests/security.c
+81
-0
No files found.
dlls/advapi32/tests/security.c
View file @
89483716
...
...
@@ -6716,6 +6716,86 @@ static void test_maximum_allowed(void)
CloseHandle
(
handle
);
}
static
void
test_token_label
(
void
)
{
static
SID
medium_sid
=
{
SID_REVISION
,
1
,
{
SECURITY_MANDATORY_LABEL_AUTHORITY
},
{
SECURITY_MANDATORY_MEDIUM_RID
}};
static
SID
high_sid
=
{
SID_REVISION
,
1
,
{
SECURITY_MANDATORY_LABEL_AUTHORITY
},
{
SECURITY_MANDATORY_HIGH_RID
}};
SECURITY_DESCRIPTOR_CONTROL
control
;
SYSTEM_MANDATORY_LABEL_ACE
*
ace
;
BOOL
ret
,
present
,
defaulted
;
SECURITY_DESCRIPTOR
*
sd
;
ACL
*
sacl
=
NULL
,
*
dacl
;
DWORD
size
,
revision
;
HANDLE
token
;
char
*
str
;
SID
*
sid
;
ret
=
OpenProcessToken
(
GetCurrentProcess
(),
READ_CONTROL
|
WRITE_OWNER
,
&
token
);
ok
(
ret
,
"OpenProcessToken failed with error %u
\n
"
,
GetLastError
());
ret
=
GetKernelObjectSecurity
(
token
,
LABEL_SECURITY_INFORMATION
,
NULL
,
0
,
&
size
);
ok
(
!
ret
&&
GetLastError
()
==
ERROR_INSUFFICIENT_BUFFER
,
"Unexpected GetKernelObjectSecurity return value %d, error %u
\n
"
,
ret
,
GetLastError
());
sd
=
HeapAlloc
(
GetProcessHeap
(),
0
,
size
);
ret
=
GetKernelObjectSecurity
(
token
,
LABEL_SECURITY_INFORMATION
,
sd
,
size
,
&
size
);
ok
(
ret
,
"GetKernelObjectSecurity failed with error %u
\n
"
,
GetLastError
());
ret
=
GetSecurityDescriptorControl
(
sd
,
&
control
,
&
revision
);
ok
(
ret
,
"GetSecurityDescriptorControl failed with error %u
\n
"
,
GetLastError
());
todo_wine
ok
(
control
==
(
SE_SELF_RELATIVE
|
SE_SACL_AUTO_INHERITED
|
SE_SACL_PRESENT
)
||
broken
(
control
==
SE_SELF_RELATIVE
)
/* WinXP, Win2003 */
,
"Unexpected security descriptor control %#x
\n
"
,
control
);
ok
(
revision
==
1
,
"Unexpected security descriptor revision %u
\n
"
,
revision
);
sid
=
(
void
*
)
0xdeadbeef
;
defaulted
=
TRUE
;
ret
=
GetSecurityDescriptorOwner
(
sd
,
(
void
**
)
&
sid
,
&
defaulted
);
ok
(
ret
,
"GetSecurityDescriptorOwner failed with error %u
\n
"
,
GetLastError
());
ok
(
!
sid
,
"Owner present
\n
"
);
ok
(
!
defaulted
,
"Owner defaulted
\n
"
);
sid
=
(
void
*
)
0xdeadbeef
;
defaulted
=
TRUE
;
ret
=
GetSecurityDescriptorGroup
(
sd
,
(
void
**
)
&
sid
,
&
defaulted
);
ok
(
ret
,
"GetSecurityDescriptorGroup failed with error %u
\n
"
,
GetLastError
());
ok
(
!
sid
,
"Group present
\n
"
);
ok
(
!
defaulted
,
"Group defaulted
\n
"
);
ret
=
GetSecurityDescriptorSacl
(
sd
,
&
present
,
&
sacl
,
&
defaulted
);
ok
(
ret
,
"GetSecurityDescriptorSacl failed with error %u
\n
"
,
GetLastError
());
ok
(
present
||
broken
(
!
present
)
/* WinXP, Win2003 */
,
"No SACL in the security descriptor
\n
"
);
ok
(
sacl
||
broken
(
!
sacl
)
/* WinXP, Win2003 */
,
"NULL SACL in the security descriptor
\n
"
);
if
(
present
)
{
ok
(
!
defaulted
,
"SACL defaulted
\n
"
);
ok
(
sacl
->
AceCount
==
1
,
"SACL contains an unexpected ACE count %u
\n
"
,
sacl
->
AceCount
);
ret
=
pGetAce
(
sacl
,
0
,
(
void
**
)
&
ace
);
ok
(
ret
,
"GetAce failed with error %u
\n
"
,
GetLastError
());
ok
(
ace
->
Header
.
AceType
==
SYSTEM_MANDATORY_LABEL_ACE_TYPE
,
"Unexpected ACE type %#x
\n
"
,
ace
->
Header
.
AceType
);
ok
(
!
ace
->
Header
.
AceFlags
,
"Unexpected ACE flags %#x
\n
"
,
ace
->
Header
.
AceFlags
);
ok
(
ace
->
Header
.
AceSize
,
"Unexpected ACE size %u
\n
"
,
ace
->
Header
.
AceSize
);
ok
(
ace
->
Mask
==
SYSTEM_MANDATORY_LABEL_NO_WRITE_UP
,
"Unexpected ACE mask %#x
\n
"
,
ace
->
Mask
);
sid
=
(
SID
*
)
&
ace
->
SidStart
;
pConvertSidToStringSidA
(
sid
,
&
str
);
ok
(
EqualSid
(
sid
,
&
medium_sid
)
||
EqualSid
(
sid
,
&
high_sid
),
"Got unexpected SID %s
\n
"
,
str
);
}
ret
=
GetSecurityDescriptorDacl
(
sd
,
&
present
,
&
dacl
,
&
defaulted
);
ok
(
ret
,
"GetSecurityDescriptorDacl failed with error %u
\n
"
,
GetLastError
());
todo_wine
ok
(
!
present
,
"DACL present
\n
"
);
HeapFree
(
GetProcessHeap
(),
0
,
sd
);
CloseHandle
(
token
);
}
static
void
test_token_security_descriptor
(
void
)
{
static
SID
low_level
=
{
SID_REVISION
,
1
,
{
SECURITY_MANDATORY_LABEL_AUTHORITY
},
...
...
@@ -7048,6 +7128,7 @@ START_TEST(security)
test_GetSidIdentifierAuthority
();
test_pseudo_tokens
();
test_maximum_allowed
();
test_token_label
();
/* Must be the last test, modifies process token */
test_token_security_descriptor
();
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment