| Index: chrome/test/security_tests/security_tests.cc
|
| diff --git a/chrome/test/security_tests/security_tests.cc b/chrome/test/security_tests/security_tests.cc
|
| deleted file mode 100644
|
| index b124f76813b3e615a0699c150d7dcccbd6a6be89..0000000000000000000000000000000000000000
|
| --- a/chrome/test/security_tests/security_tests.cc
|
| +++ /dev/null
|
| @@ -1,64 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include <windows.h>
|
| -#include <string>
|
| -
|
| -#define TEST_INJECTION_DLL
|
| -#include "chrome/test/security_tests/ipc_security_tests.h"
|
| -#include "content/public/common/injection_test_win.h"
|
| -#include "sandbox/win/tests/common/controller.h"
|
| -#include "sandbox/win/tests/validation_tests/commands.h"
|
| -
|
| -using sandbox::TestOpenKey;
|
| -using sandbox::TestOpenReadFile;
|
| -using sandbox::TestOpenWriteFile;
|
| -
|
| -#define SECURITY_CHECK(x) (*test_count)++; \
|
| - if (sandbox::SBOX_TEST_DENIED != x) { \
|
| - return FALSE; \
|
| - };
|
| -
|
| -BOOL APIENTRY DllMain(HMODULE module, DWORD ul_reason_for_call,
|
| - LPVOID lpReserved) {
|
| - return TRUE;
|
| -}
|
| -
|
| -// Runs the security tests of sandbox for the renderer process.
|
| -// If a test fails, the return value is FALSE and test_count contains the
|
| -// number of tests executed, including the failing test.
|
| -BOOL __declspec(dllexport) __cdecl RunRendererTests(int *test_count) {
|
| - *test_count = 0;
|
| - SECURITY_CHECK(TestOpenReadFile(L"%SystemDrive%"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%ProgramFiles%"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%\\System32"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%\\explorer.exe"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%\\Cursors\\arrow_i.cur"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%AllUsersProfile%"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%Temp%"));
|
| - SECURITY_CHECK(TestOpenReadFile(L"%AppData%"));
|
| - SECURITY_CHECK(TestOpenKey(HKEY_LOCAL_MACHINE, L""));
|
| - SECURITY_CHECK(TestOpenKey(HKEY_CURRENT_USER, L""));
|
| - SECURITY_CHECK(TestOpenKey(HKEY_USERS, L""));
|
| - SECURITY_CHECK(TestOpenKey(HKEY_LOCAL_MACHINE,
|
| - L"Software\\Microsoft\\Windows NT\\CurrentVersion\\WinLogon"));
|
| - // Test below run on a separate thread because they cannot block the
|
| - // renderer process. Therefore they do not return a meaningful value.
|
| - PipeImpersonationAttack();
|
| - return TRUE;
|
| -}
|
| -
|
| -// Runs the security tests of sandbox for the plugin process.
|
| -// If a test fails, the return value is FALSE and test_count contains the
|
| -// number of tests executed, including the failing test.
|
| -BOOL __declspec(dllexport) __cdecl RunPluginTests(int *test_count) {
|
| - *test_count = 0;
|
| - SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%"));
|
| - SECURITY_CHECK(TestOpenWriteFile(L"%ProgramFiles%"));
|
| - SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%\\System32"));
|
| - SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%\\explorer.exe"));
|
| - SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%\\Cursors\\arrow_i.cur"));
|
| - return TRUE;
|
| -}
|
|
|