1/*
2   Unix SMB/Netbios implementation.
3   Version 1.9.
4   Security context tests
5   Copyright (C) Tim Potter 2000
6
7   This program is free software; you can redistribute it and/or modify
8   it under the terms of the GNU General Public License as published by
9   the Free Software Foundation; either version 2 of the License, or
10   (at your option) any later version.
11
12   This program is distributed in the hope that it will be useful,
13   but WITHOUT ANY WARRANTY; without even the implied warranty of
14   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15   GNU General Public License for more details.
16
17   You should have received a copy of the GNU General Public License
18   along with this program; if not, write to the Free Software
19   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
20*/
21
22#include "includes.h"
23#include "se_access_check_utils.h"
24
25/* Globals */
26
27BOOL failed;
28SEC_DESC *sd;
29
30struct ace_entry acl_empty[] = {
31	{ 0, 0, 0, NULL}
32};
33
34/* Check that access is always allowed for a NULL security descriptor */
35
36BOOL emptysd_check(struct passwd *pw, int ngroups, gid_t *groups)
37{
38	uint32 acc_granted, status;
39	BOOL result;
40
41	/* For no DACL, access is allowed and the desired access mask is
42	   returned */
43
44	result = se_access_check(sd, pw->pw_uid, pw->pw_gid,
45				 ngroups, groups,
46				 SEC_RIGHTS_MAXIMUM_ALLOWED,
47				 &acc_granted, &status);
48
49	if (!result || !(acc_granted == SEC_RIGHTS_MAXIMUM_ALLOWED)) {
50		printf("FAIL: no dacl for %s (%d/%d)\n", pw->pw_name,
51		       pw->pw_uid, pw->pw_gid);
52		failed = True;
53	}
54
55	result = se_access_check(sd, pw->pw_uid, pw->pw_gid,
56				 ngroups, groups, 0x1234,
57				 &acc_granted, &status);
58
59	if (!result || !(acc_granted == 0x1234)) {
60		printf("FAIL: no dacl2 for %s (%d/%d)\n", pw->pw_name,
61		       pw->pw_uid, pw->pw_gid);
62		failed = True;
63	}
64
65	/* If desired access mask is empty then no access is allowed */
66
67	result = se_access_check(sd, pw->pw_uid, pw->pw_gid,
68				 ngroups, groups, 0,
69				 &acc_granted, &status);
70
71	if (result) {
72		printf("FAIL: zero desired access for %s (%d/%d)\n",
73		       pw->pw_name, pw->pw_uid, pw->pw_gid);
74		failed = True;
75	}
76
77	return True;
78}
79
80/* Main function */
81
82int main(int argc, char **argv)
83{
84	/* Initialisation */
85
86	generate_wellknown_sids();
87
88	/* Create security descriptor */
89
90	sd = build_sec_desc(acl_empty, NULL, NULL_SID, NULL_SID);
91
92	if (!sd) {
93		printf("FAIL: could not build security descriptor\n");
94		return 1;
95	}
96
97	/* Run test */
98
99	visit_pwdb(emptysd_check);
100
101	/* Return */
102
103        if (!failed) {
104		printf("PASS\n");
105		return 0;
106	}
107
108	return 1;
109}
110