| OLD | NEW |
| 1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <shlobj.h> | 5 #include <shlobj.h> |
| 6 | 6 |
| 7 #include "testing/gtest/include/gtest/gtest.h" | 7 #include "testing/gtest/include/gtest/gtest.h" |
| 8 #include "sandbox/src/registry_policy.h" | 8 #include "sandbox/win/src/registry_policy.h" |
| 9 #include "sandbox/src/sandbox.h" | 9 #include "sandbox/win/src/sandbox.h" |
| 10 #include "sandbox/src/sandbox_policy.h" | 10 #include "sandbox/win/src/sandbox_policy.h" |
| 11 #include "sandbox/src/sandbox_factory.h" | 11 #include "sandbox/win/src/sandbox_factory.h" |
| 12 #include "sandbox/src/nt_internals.h" | 12 #include "sandbox/win/src/nt_internals.h" |
| 13 #include "sandbox/src/win_utils.h" | 13 #include "sandbox/win/src/win_utils.h" |
| 14 #include "sandbox/tests/common/controller.h" | 14 #include "sandbox/win/tests/common/controller.h" |
| 15 | 15 |
| 16 namespace { | 16 namespace { |
| 17 | 17 |
| 18 static const DWORD kAllowedRegFlags = KEY_QUERY_VALUE | KEY_ENUMERATE_SUB_KEYS | | 18 static const DWORD kAllowedRegFlags = KEY_QUERY_VALUE | KEY_ENUMERATE_SUB_KEYS | |
| 19 KEY_NOTIFY | KEY_READ | GENERIC_READ | | 19 KEY_NOTIFY | KEY_READ | GENERIC_READ | |
| 20 GENERIC_EXECUTE | READ_CONTROL; | 20 GENERIC_EXECUTE | READ_CONTROL; |
| 21 | 21 |
| 22 #define BINDNTDLL(name) \ | 22 #define BINDNTDLL(name) \ |
| 23 name ## Function name = reinterpret_cast<name ## Function>( \ | 23 name ## Function name = reinterpret_cast<name ## Function>( \ |
| 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) | 24 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) |
| (...skipping 255 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 280 | 280 |
| 281 // Tests maximum allowed access where we only have read-only access. | 281 // Tests maximum allowed access where we only have read-only access. |
| 282 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( | 282 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( |
| 283 L"Reg_OpenKey create maximum_allowed HKEY_CURRENT_USER software")); | 283 L"Reg_OpenKey create maximum_allowed HKEY_CURRENT_USER software")); |
| 284 | 284 |
| 285 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( | 285 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest( |
| 286 L"Reg_OpenKey open maximum_allowed HKEY_CURRENT_USER software")); | 286 L"Reg_OpenKey open maximum_allowed HKEY_CURRENT_USER software")); |
| 287 } | 287 } |
| 288 | 288 |
| 289 } // namespace sandbox | 289 } // namespace sandbox |
| OLD | NEW |