| Index: sandbox/win/src/policy_low_level_unittest.cc
|
| diff --git a/sandbox/win/src/policy_low_level_unittest.cc b/sandbox/win/src/policy_low_level_unittest.cc
|
| index 2b5d0f7a6ec952ca837d7f2378c1a31735e09156..c9424c6cf4fbde9d1a920caacd73f7fd4f7301ae 100644
|
| --- a/sandbox/win/src/policy_low_level_unittest.cc
|
| +++ b/sandbox/win/src/policy_low_level_unittest.cc
|
| @@ -62,7 +62,7 @@ TEST(PolicyEngineTest, SimpleStrMatch) {
|
| EXPECT_TRUE(policyGen.AddRule(kFakeService, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = L"Z:\\Directory\\domo.txt";
|
| + const wchar_t* filename = L"Z:\\Directory\\domo.txt";
|
|
|
| POLPARAMS_BEGIN(eval_params)
|
| POLPARAM(filename) // Argument 0
|
| @@ -95,7 +95,7 @@ TEST(PolicyEngineTest, SimpleIfNotStrMatch) {
|
| EXPECT_TRUE(policyGen.AddRule(kFakeService, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = NULL;
|
| + const wchar_t* filename = NULL;
|
| POLPARAMS_BEGIN(eval_params)
|
| POLPARAM(filename) // Argument 0
|
| POLPARAMS_END;
|
| @@ -133,7 +133,7 @@ TEST(PolicyEngineTest, SimpleIfNotStrMatchWild1) {
|
| EXPECT_TRUE(policyGen.AddRule(kFakeService, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = NULL;
|
| + const wchar_t* filename = NULL;
|
| POLPARAMS_BEGIN(eval_params)
|
| POLPARAM(filename) // Argument 0
|
| POLPARAMS_END;
|
| @@ -166,7 +166,7 @@ TEST(PolicyEngineTest, SimpleIfNotStrMatchWild2) {
|
| EXPECT_TRUE(policyGen.AddRule(kFakeService, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = NULL;
|
| + const wchar_t* filename = NULL;
|
| POLPARAMS_BEGIN(eval_params)
|
| POLPARAM(filename) // Argument 0
|
| POLPARAMS_END;
|
| @@ -205,7 +205,7 @@ TEST(PolicyEngineTest, IfNotStrMatchTwoRulesWild1) {
|
| EXPECT_TRUE(policyGen.AddRule(kFakeService, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = NULL;
|
| + const wchar_t* filename = NULL;
|
| unsigned long access = 0;
|
| POLPARAMS_BEGIN(eval_params)
|
| POLPARAM(filename) // Argument 0
|
| @@ -254,7 +254,7 @@ TEST(PolicyEngineTest, IfNotStrMatchTwoRulesWild2) {
|
| EXPECT_TRUE(policyGen.AddRule(kFakeService, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = NULL;
|
| + const wchar_t* filename = NULL;
|
| unsigned long access = 0;
|
| unsigned long sharing = 66;
|
|
|
| @@ -328,7 +328,7 @@ TEST(PolicyEngineTest, OneRuleTest) {
|
| EXPECT_TRUE(policyGen.AddRule(kNtFakeCreateFile, &pr));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* filename = L"c:\\Documents and Settings\\Microsoft\\BLAH.txt";
|
| + const wchar_t* filename = L"c:\\Documents and Settings\\Microsoft\\BLAH.txt";
|
| unsigned long creation_mode = OPEN_EXISTING;
|
| unsigned long flags = FILE_ATTRIBUTE_NORMAL;
|
| void* security_descriptor = NULL;
|
| @@ -484,7 +484,7 @@ TEST(PolicyEngineTest, ThreeRulesTest) {
|
|
|
| // Test the policy evaluation.
|
|
|
| - wchar_t* filename = L"";
|
| + const wchar_t* filename = L"";
|
| unsigned long creation_mode = OPEN_EXISTING;
|
| unsigned long flags = FILE_ATTRIBUTE_NORMAL;
|
| void* security_descriptor = NULL;
|
| @@ -588,7 +588,7 @@ TEST(PolicyEngineTest, PolicyRuleCopyConstructorTwoStrings) {
|
| EXPECT_TRUE(policyGen.AddRule(2, &pr_copy));
|
| EXPECT_TRUE(policyGen.Done());
|
|
|
| - wchar_t* name = NULL;
|
| + const wchar_t* name = NULL;
|
| POLPARAMS_BEGIN(eval_params)
|
| POLPARAM(name)
|
| POLPARAMS_END;
|
|
|