security/sandbox/win/src/sync_policy_test.cc

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 #include "sandbox/win/src/sync_policy_test.h"
     7 #include "base/win/scoped_handle.h"
     8 #include "sandbox/win/src/sandbox.h"
     9 #include "sandbox/win/src/sandbox_policy.h"
    10 #include "sandbox/win/src/sandbox_factory.h"
    11 #include "sandbox/win/src/nt_internals.h"
    12 #include "testing/gtest/include/gtest/gtest.h"
    14 namespace sandbox {
    16 SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t **argv) {
    17   if (argc != 2)
    18     return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
    20   DWORD desired_access = SYNCHRONIZE;
    21   if (L'f' == argv[0][0])
    22     desired_access = EVENT_ALL_ACCESS;
    24   base::win::ScopedHandle event_open(::OpenEvent(
    25       desired_access, FALSE, argv[1]));
    26   DWORD error_open = ::GetLastError();
    28   if (event_open.Get())
    29     return SBOX_TEST_SUCCEEDED;
    31   if (ERROR_ACCESS_DENIED == error_open ||
    32       ERROR_BAD_PATHNAME == error_open)
    33     return SBOX_TEST_DENIED;
    35   return SBOX_TEST_FAILED;
    36 }
    38 SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t **argv) {
    39   if (argc < 2 || argc > 3)
    40     return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
    42   wchar_t *event_name = NULL;
    43   if (3 == argc)
    44     event_name = argv[2];
    46   BOOL manual_reset = FALSE;
    47   BOOL initial_state = FALSE;
    48   if (L't' == argv[0][0])
    49     manual_reset = TRUE;
    50   if (L't' == argv[1][0])
    51     initial_state = TRUE;
    53   base::win::ScopedHandle event_create(::CreateEvent(
    54       NULL, manual_reset, initial_state, event_name));
    55   DWORD error_create = ::GetLastError();
    56   base::win::ScopedHandle event_open;
    57   if (event_name)
    58     event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, FALSE, event_name));
    60   if (event_create.Get()) {
    61     DWORD wait = ::WaitForSingleObject(event_create.Get(), 0);
    62     if (initial_state && WAIT_OBJECT_0 != wait)
    63       return SBOX_TEST_FAILED;
    65     if (!initial_state && WAIT_TIMEOUT != wait)
    66       return SBOX_TEST_FAILED;
    67   }
    69   if (event_name) {
    70     // Both event_open and event_create have to be valid.
    71     if (event_open.Get() && event_create)
    72       return SBOX_TEST_SUCCEEDED;
    74     if (event_open.Get() && !event_create || !event_open.Get() && event_create)
    75       return SBOX_TEST_FAILED;
    76   } else {
    77     // Only event_create has to be valid.
    78     if (event_create.Get())
    79       return SBOX_TEST_SUCCEEDED;
    80   }
    82   if (ERROR_ACCESS_DENIED == error_create ||
    83       ERROR_BAD_PATHNAME == error_create)
    84     return SBOX_TEST_DENIED;
    86   return SBOX_TEST_FAILED;
    87 }
    89 // Tests the creation of events using all the possible combinations.
    90 TEST(SyncPolicyTest, TestEvent) {
    91   TestRunner runner;
    92   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
    93                              TargetPolicy::EVENTS_ALLOW_ANY,
    94                              L"test1"));
    95   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
    96                              TargetPolicy::EVENTS_ALLOW_ANY,
    97                              L"test2"));
    99   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f"));
   100   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f"));
   101   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t"));
   102   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t"));
   103   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1"));
   104   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2"));
   105   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1"));
   106   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2"));
   107   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3"));
   108   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4"));
   109   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3"));
   110   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4"));
   111 }
   113 // Tests opening events with read only access.
   114 TEST(SyncPolicyTest, TestEventReadOnly) {
   115   TestRunner runner;
   116   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
   117                              TargetPolicy::EVENTS_ALLOW_READONLY,
   118                              L"test1"));
   119   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
   120                              TargetPolicy::EVENTS_ALLOW_READONLY,
   121                              L"test2"));
   122   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
   123                              TargetPolicy::EVENTS_ALLOW_READONLY,
   124                              L"test5"));
   125   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
   126                              TargetPolicy::EVENTS_ALLOW_READONLY,
   127                              L"test6"));
   129   base::win::ScopedHandle handle1(::CreateEvent(NULL, FALSE, FALSE, L"test1"));
   130   base::win::ScopedHandle handle2(::CreateEvent(NULL, FALSE, FALSE, L"test2"));
   131   base::win::ScopedHandle handle3(::CreateEvent(NULL, FALSE, FALSE, L"test3"));
   132   base::win::ScopedHandle handle4(::CreateEvent(NULL, FALSE, FALSE, L"test4"));
   134   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f"));
   135   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f"));
   136   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1"));
   137   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2"));
   138   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3"));
   139   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4"));
   140   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5"));
   141   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6"));
   142   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5"));
   143   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6"));
   144 }
   146 }  // namespace sandbox

mercurial