se_access_check_empty.c

来自「samba-3.0.22.tar.gz 编译smb服务器的源码」· C语言 代码 · 共 110 行

C
110
字号
/*    Unix SMB/Netbios implementation.   Version 1.9.   Security context tests   Copyright (C) Tim Potter 2000      This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 2 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program; if not, write to the Free Software   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/#include "includes.h"#include "se_access_check_utils.h"/* Globals */BOOL failed;SEC_DESC *sd;struct ace_entry acl_empty[] = {	{ 0, 0, 0, NULL}};/* Check that access is always allowed for a NULL security descriptor */BOOL emptysd_check(struct passwd *pw, int ngroups, gid_t *groups){	uint32 acc_granted, status;	BOOL result;	/* For no DACL, access is allowed and the desired access mask is	   returned */	result = se_access_check(sd, pw->pw_uid, pw->pw_gid,				 ngroups, groups, 				 SEC_RIGHTS_MAXIMUM_ALLOWED,				 &acc_granted, &status);		if (!result || !(acc_granted == SEC_RIGHTS_MAXIMUM_ALLOWED)) {		printf("FAIL: no dacl for %s (%d/%d)\n", pw->pw_name,		       pw->pw_uid, pw->pw_gid);		failed = True;	}	result = se_access_check(sd, pw->pw_uid, pw->pw_gid,				 ngroups, groups, 0x1234,				 &acc_granted, &status);		if (!result || !(acc_granted == 0x1234)) {		printf("FAIL: no dacl2 for %s (%d/%d)\n", pw->pw_name,		       pw->pw_uid, pw->pw_gid);		failed = True;	}	/* If desired access mask is empty then no access is allowed */	result = se_access_check(sd, pw->pw_uid, pw->pw_gid,				 ngroups, groups, 0,				 &acc_granted, &status);		if (result) {		printf("FAIL: zero desired access for %s (%d/%d)\n",		       pw->pw_name, pw->pw_uid, pw->pw_gid);		failed = True;	}		return True;}/* Main function */int main(int argc, char **argv){	/* Initialisation */	generate_wellknown_sids();	/* Create security descriptor */	sd = build_sec_desc(acl_empty, NULL, NULL_SID, NULL_SID);	if (!sd) {		printf("FAIL: could not build security descriptor\n");		return 1;	}	/* Run test */	visit_pwdb(emptysd_check);	/* Return */        if (!failed) {		printf("PASS\n");		return 0;	} 	return 1;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?