diff options
author | Tim Potter <tpot@samba.org> | 2000-07-06 07:12:13 +0000 |
---|---|---|
committer | Tim Potter <tpot@samba.org> | 2000-07-06 07:12:13 +0000 |
commit | 7e7d0598c61424210ad98d22aa575d285a5bc529 (patch) | |
tree | 0cac3451be89884a5bed84d5d31798f63a91e467 /testsuite/smbd/se_access_check_denyall.c | |
parent | 75dd5b5051f6e0f29ae51ecbc493d78e44ca5e21 (diff) | |
download | samba-7e7d0598c61424210ad98d22aa575d285a5bc529.tar.gz samba-7e7d0598c61424210ad98d22aa575d285a5bc529.tar.xz samba-7e7d0598c61424210ad98d22aa575d285a5bc529.zip |
se_access_check() tests.
(This used to be commit bba912cad8dfcef3dbc1db020304ab29fd71d5cb)
Diffstat (limited to 'testsuite/smbd/se_access_check_denyall.c')
-rw-r--r-- | testsuite/smbd/se_access_check_denyall.c | 86 |
1 files changed, 86 insertions, 0 deletions
diff --git a/testsuite/smbd/se_access_check_denyall.c b/testsuite/smbd/se_access_check_denyall.c new file mode 100644 index 00000000000..016e6f6d549 --- /dev/null +++ b/testsuite/smbd/se_access_check_denyall.c @@ -0,0 +1,86 @@ +/* + Unix SMB/Netbios implementation. + Version 1.9. + Security context tests + Copyright (C) Tim Potter 2000 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ + +#include "includes.h" +#include "se_access_check_utils.h" + +/* Globals */ + +BOOL failed; +SEC_DESC *sd; + +struct ace_entry acl_denyall[] = { + { SEC_ACE_TYPE_ACCESS_DENIED, SEC_ACE_FLAG_CONTAINER_INHERIT, + GENERIC_ALL_ACCESS, "S-1-1-0" }, + { 0, 0, 0, NULL} +}; + +/* Check that access is always allowed for a NULL security descriptor */ + +BOOL denyall_check(struct passwd *pw, int ngroups, gid_t *groups) +{ + uint32 acc_granted, status; + BOOL result; + + result = se_access_check(sd, pw->pw_uid, pw->pw_gid, + ngroups, groups, + SEC_RIGHTS_MAXIMUM_ALLOWED, + &acc_granted, &status); + + if (result || acc_granted != 0) { + printf("FAIL: denyall se_access_check %d/%d\n", + pw->pw_uid, pw->pw_gid); + failed = True; + } + + return True; +} + +/* Main function */ + +int main(int argc, char **argv) +{ + /* Initialisation */ + + generate_wellknown_sids(); + + /* Create security descriptor */ + + sd = build_sec_desc(acl_denyall, NULL, NULL_SID, NULL_SID); + + if (!sd) { + printf("FAIL: could not build security descriptor\n"); + return 1; + } + + /* Run test */ + + visit_pwdb(denyall_check); + + /* Return */ + + if (!failed) { + printf("PASS\n"); + return 0; + } + + return 1; +} |