2000-07-06 11:12:13 +04:00
/*
Unix SMB / Netbios implementation .
Version 1.9 .
Security context tests
Copyright ( C ) Tim Potter 2000
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2000-07-06 11:12:13 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 04:57:11 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2000-07-06 11:12:13 +04:00
*/
# include "includes.h"
# include "se_access_check_utils.h"
/* Globals */
BOOL failed ;
SEC_DESC * sd ;
struct ace_entry acl_empty [ ] = {
{ 0 , 0 , 0 , NULL }
} ;
/* Check that access is always allowed for a NULL security descriptor */
BOOL emptysd_check ( struct passwd * pw , int ngroups , gid_t * groups )
{
uint32 acc_granted , status ;
BOOL result ;
/* For no DACL, access is allowed and the desired access mask is
returned */
result = se_access_check ( sd , pw - > pw_uid , pw - > pw_gid ,
ngroups , groups ,
SEC_RIGHTS_MAXIMUM_ALLOWED ,
& acc_granted , & status ) ;
if ( ! result | | ! ( acc_granted = = SEC_RIGHTS_MAXIMUM_ALLOWED ) ) {
printf ( " FAIL: no dacl for %s (%d/%d) \n " , pw - > pw_name ,
pw - > pw_uid , pw - > pw_gid ) ;
failed = True ;
}
result = se_access_check ( sd , pw - > pw_uid , pw - > pw_gid ,
ngroups , groups , 0x1234 ,
& acc_granted , & status ) ;
if ( ! result | | ! ( acc_granted = = 0x1234 ) ) {
printf ( " FAIL: no dacl2 for %s (%d/%d) \n " , pw - > pw_name ,
pw - > pw_uid , pw - > pw_gid ) ;
failed = True ;
}
/* If desired access mask is empty then no access is allowed */
result = se_access_check ( sd , pw - > pw_uid , pw - > pw_gid ,
ngroups , groups , 0 ,
& acc_granted , & status ) ;
if ( result ) {
printf ( " FAIL: zero desired access for %s (%d/%d) \n " ,
pw - > pw_name , pw - > pw_uid , pw - > pw_gid ) ;
failed = True ;
}
return True ;
}
/* Main function */
int main ( int argc , char * * argv )
{
/* Initialisation */
generate_wellknown_sids ( ) ;
/* Create security descriptor */
sd = build_sec_desc ( acl_empty , NULL , NULL_SID , NULL_SID ) ;
if ( ! sd ) {
printf ( " FAIL: could not build security descriptor \n " ) ;
return 1 ;
}
/* Run test */
visit_pwdb ( emptysd_check ) ;
/* Return */
if ( ! failed ) {
printf ( " PASS \n " ) ;
return 0 ;
}
return 1 ;
}