OLD | NEW |
1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <shlobj.h> | 5 #include <shlobj.h> |
6 | 6 |
7 #include "testing/gtest/include/gtest/gtest.h" | 7 #include "testing/gtest/include/gtest/gtest.h" |
8 #include "sandbox/src/registry_policy.h" | 8 #include "sandbox/win/src/registry_policy.h" |
9 #include "sandbox/src/sandbox.h" | 9 #include "sandbox/win/src/sandbox.h" |
10 #include "sandbox/src/sandbox_policy.h" | 10 #include "sandbox/win/src/sandbox_policy.h" |
11 #include "sandbox/src/sandbox_factory.h" | 11 #include "sandbox/win/src/sandbox_factory.h" |
12 #include "sandbox/src/nt_internals.h" | 12 #include "sandbox/win/src/nt_internals.h" |
13 #include "sandbox/src/win_utils.h" | 13 #include "sandbox/win/src/win_utils.h" |
14 #include "sandbox/tests/common/controller.h" | 14 #include "sandbox/win/tests/common/controller.h" |
15 | 15 |
16 namespace { | 16 namespace { |
17 | 17 |
18 static const DWORD kAllowedRegFlags = KEY_QUERY_VALUE | KEY_ENUMERATE_SUB_KEYS | | 18 static const DWORD kAllowedRegFlags = KEY_QUERY_VALUE | KEY_ENUMERATE_SUB_KEYS | |
19 KEY_NOTIFY | KEY_READ | GENERIC_READ | | 19 KEY_NOTIFY | KEY_READ | GENERIC_READ | |
20 GENERIC_EXECUTE | READ_CONTROL; | 20 GENERIC_EXECUTE | READ_CONTROL; |
21 | 21 |
22 #define BINDNTDLL(name) \ | 22 #define BINDNTDLL(name) \ |
23 name ## Function name = reinterpret_cast<name ## Function>( \ | 23 name ## Function name = reinterpret_cast<name ## Function>( \ |
24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) | 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) |
(...skipping 255 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
280 | 280 |
281 // Tests maximum allowed access where we only have read-only access. | 281 // Tests maximum allowed access where we only have read-only access. |
282 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( | 282 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( |
283 L"Reg_OpenKey create maximum_allowed HKEY_CURRENT_USER software")); | 283 L"Reg_OpenKey create maximum_allowed HKEY_CURRENT_USER software")); |
284 | 284 |
285 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( | 285 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( |
286 L"Reg_OpenKey open maximum_allowed HKEY_CURRENT_USER software")); | 286 L"Reg_OpenKey open maximum_allowed HKEY_CURRENT_USER software")); |
287 } | 287 } |
288 | 288 |
289 } // namespace sandbox | 289 } // namespace sandbox |
OLD | NEW |