This source file includes following definitions.
- DllMain
- __declspec
- __declspec
#include <windows.h>
#include <string>
#define TEST_INJECTION_DLL
#include "chrome/test/security_tests/ipc_security_tests.h"
#include "content/public/common/injection_test_win.h"
#include "sandbox/win/tests/common/controller.h"
#include "sandbox/win/tests/validation_tests/commands.h"
using sandbox::TestOpenKey;
using sandbox::TestOpenReadFile;
using sandbox::TestOpenWriteFile;
#define SECURITY_CHECK(x) (*test_count)++; \
if (sandbox::SBOX_TEST_DENIED != x) { \
return FALSE; \
};
BOOL APIENTRY DllMain(HMODULE module, DWORD ul_reason_for_call,
LPVOID lpReserved) {
return TRUE;
}
BOOL __declspec(dllexport) __cdecl RunRendererTests(int *test_count) {
*test_count = 0;
SECURITY_CHECK(TestOpenReadFile(L"%SystemDrive%"));
SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%"));
SECURITY_CHECK(TestOpenReadFile(L"%ProgramFiles%"));
SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%\\System32"));
SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%\\explorer.exe"));
SECURITY_CHECK(TestOpenReadFile(L"%SystemRoot%\\Cursors\\arrow_i.cur"));
SECURITY_CHECK(TestOpenReadFile(L"%AllUsersProfile%"));
SECURITY_CHECK(TestOpenReadFile(L"%Temp%"));
SECURITY_CHECK(TestOpenReadFile(L"%AppData%"));
SECURITY_CHECK(TestOpenKey(HKEY_LOCAL_MACHINE, L""));
SECURITY_CHECK(TestOpenKey(HKEY_CURRENT_USER, L""));
SECURITY_CHECK(TestOpenKey(HKEY_USERS, L""));
SECURITY_CHECK(TestOpenKey(HKEY_LOCAL_MACHINE,
L"Software\\Microsoft\\Windows NT\\CurrentVersion\\WinLogon"));
PipeImpersonationAttack();
return TRUE;
}
BOOL __declspec(dllexport) __cdecl RunPluginTests(int *test_count) {
*test_count = 0;
SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%"));
SECURITY_CHECK(TestOpenWriteFile(L"%ProgramFiles%"));
SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%\\System32"));
SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%\\explorer.exe"));
SECURITY_CHECK(TestOpenWriteFile(L"%SystemRoot%\\Cursors\\arrow_i.cur"));
return TRUE;
}