| OLD | NEW |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <stddef.h> |
| 6 #include <stdint.h> |
| 7 |
| 5 #include "sandbox/win/src/policy_engine_processor.h" | 8 #include "sandbox/win/src/policy_engine_processor.h" |
| 6 | 9 |
| 7 namespace sandbox { | 10 namespace sandbox { |
| 8 | 11 |
| 9 void PolicyProcessor::SetInternalState(size_t index, EvalResult result) { | 12 void PolicyProcessor::SetInternalState(size_t index, EvalResult result) { |
| 10 state_.current_index_ = index; | 13 state_.current_index_ = index; |
| 11 state_.current_result_ = result; | 14 state_.current_result_ = result; |
| 12 } | 15 } |
| 13 | 16 |
| 14 EvalResult PolicyProcessor::GetAction() const { | 17 EvalResult PolicyProcessor::GetAction() const { |
| 15 return state_.current_result_; | 18 return state_.current_result_; |
| 16 } | 19 } |
| 17 | 20 |
| 18 // Decides if an opcode can be skipped (not evaluated) or not. The function | 21 // Decides if an opcode can be skipped (not evaluated) or not. The function |
| 19 // takes as inputs the opcode and the current evaluation context and returns | 22 // takes as inputs the opcode and the current evaluation context and returns |
| 20 // true if the opcode should be skipped or not and also can set keep_skipping | 23 // true if the opcode should be skipped or not and also can set keep_skipping |
| 21 // to false to signal that the current instruction should be skipped but not | 24 // to false to signal that the current instruction should be skipped but not |
| 22 // the next after the current one. | 25 // the next after the current one. |
| 23 bool SkipOpcode(const PolicyOpcode& opcode, MatchContext* context, | 26 bool SkipOpcode(const PolicyOpcode& opcode, MatchContext* context, |
| 24 bool* keep_skipping) { | 27 bool* keep_skipping) { |
| 25 if (opcode.IsAction()) { | 28 if (opcode.IsAction()) { |
| 26 uint32 options = context->options; | 29 uint32_t options = context->options; |
| 27 context->Clear(); | 30 context->Clear(); |
| 28 *keep_skipping = false; | 31 *keep_skipping = false; |
| 29 return (kPolUseOREval != options); | 32 return (kPolUseOREval != options); |
| 30 } | 33 } |
| 31 *keep_skipping = true; | 34 *keep_skipping = true; |
| 32 return true; | 35 return true; |
| 33 } | 36 } |
| 34 | 37 |
| 35 PolicyResult PolicyProcessor::Evaluate(uint32 options, | 38 PolicyResult PolicyProcessor::Evaluate(uint32_t options, |
| 36 ParameterSet* parameters, | 39 ParameterSet* parameters, |
| 37 size_t param_count) { | 40 size_t param_count) { |
| 38 if (NULL == policy_) { | 41 if (NULL == policy_) { |
| 39 return NO_POLICY_MATCH; | 42 return NO_POLICY_MATCH; |
| 40 } | 43 } |
| 41 if (0 == policy_->opcode_count) { | 44 if (0 == policy_->opcode_count) { |
| 42 return NO_POLICY_MATCH; | 45 return NO_POLICY_MATCH; |
| 43 } | 46 } |
| 44 if (!(kShortEval & options)) { | 47 if (!(kShortEval & options)) { |
| 45 return POLICY_ERROR; | 48 return POLICY_ERROR; |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 98 if (evaluation) { | 101 if (evaluation) { |
| 99 // Reaching the end of the policy with a positive evaluation is probably | 102 // Reaching the end of the policy with a positive evaluation is probably |
| 100 // an error: we did not find a final action opcode? | 103 // an error: we did not find a final action opcode? |
| 101 return POLICY_ERROR; | 104 return POLICY_ERROR; |
| 102 } | 105 } |
| 103 return NO_POLICY_MATCH; | 106 return NO_POLICY_MATCH; |
| 104 } | 107 } |
| 105 | 108 |
| 106 | 109 |
| 107 } // namespace sandbox | 110 } // namespace sandbox |
| OLD | NEW |