gdi32/tests: Mark tests failing randomly on Windows as flaky.
[wine.git] / dlls / wbemprox / security.c
blobdf8c55c48fc2a2f1628768ebbb05808accd2e82c
1 /*
2 * __SystemSecurity implementation
4 * Copyright 2014 Vincent Povirk for CodeWeavers
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #define COBJMACROS
23 #include <stdarg.h>
25 #include "windef.h"
26 #include "winbase.h"
27 #include "wbemcli.h"
28 #include "iads.h"
30 #include "wine/debug.h"
31 #include "wbemprox_private.h"
33 WINE_DEFAULT_DEBUG_CHANNEL(wbemprox);
35 static HRESULT to_byte_array( void *data, DWORD size, VARIANT *var )
37 SAFEARRAY *sa;
38 void *sadata;
39 HRESULT hr;
41 if (!(sa = SafeArrayCreateVector( VT_UI1, 0, size ))) return E_OUTOFMEMORY;
43 hr = SafeArrayAccessData( sa, &sadata );
45 if (SUCCEEDED(hr))
47 memcpy( sadata, data, size );
49 SafeArrayUnaccessData( sa );
51 else
53 SafeArrayDestroy( sa );
54 return hr;
57 set_variant( VT_UI1|VT_ARRAY, 0, sa, var );
58 return S_OK;
61 static HRESULT get_sd( SECURITY_DESCRIPTOR **sd, DWORD *size )
63 BYTE sid_admin_buffer[SECURITY_MAX_SID_SIZE];
64 SID *sid_admin = (SID*)sid_admin_buffer;
65 BYTE sid_network_buffer[SECURITY_MAX_SID_SIZE];
66 SID *sid_network = (SID*)sid_network_buffer;
67 BYTE sid_local_buffer[SECURITY_MAX_SID_SIZE];
68 SID *sid_local = (SID*)sid_local_buffer;
69 BYTE sid_users_buffer[SECURITY_MAX_SID_SIZE];
70 SID *sid_users = (SID*)sid_users_buffer;
71 BYTE acl_buffer[sizeof(ACL) + 4 * (sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) + SECURITY_MAX_SID_SIZE)];
72 ACL *acl = (ACL*)acl_buffer;
73 DWORD sid_size;
74 SECURITY_DESCRIPTOR absolute_sd;
75 HRESULT hr = S_OK;
77 sid_size = sizeof(sid_admin_buffer);
78 CreateWellKnownSid( WinBuiltinAdministratorsSid, NULL, sid_admin, &sid_size );
80 sid_size = sizeof(sid_network_buffer);
81 CreateWellKnownSid( WinNetworkServiceSid, NULL, sid_network, &sid_size );
83 sid_size = sizeof(sid_local_buffer);
84 CreateWellKnownSid( WinLocalServiceSid, NULL, sid_local, &sid_size );
86 sid_size = sizeof(sid_users_buffer);
87 CreateWellKnownSid( WinAuthenticatedUserSid, NULL, sid_users, &sid_size );
89 InitializeAcl( acl, sizeof(acl_buffer), ACL_REVISION );
91 AddAccessAllowedAceEx( acl, ACL_REVISION, CONTAINER_INHERIT_ACE|INHERITED_ACE,
92 ADS_RIGHT_DS_CREATE_CHILD|ADS_RIGHT_DS_DELETE_CHILD|ADS_RIGHT_ACTRL_DS_LIST|ADS_RIGHT_DS_SELF|
93 ADS_RIGHT_DS_READ_PROP|ADS_RIGHT_DS_WRITE_PROP|READ_CONTROL|WRITE_DAC,
94 sid_admin );
96 AddAccessAllowedAceEx( acl, ACL_REVISION, CONTAINER_INHERIT_ACE|INHERITED_ACE,
97 ADS_RIGHT_DS_CREATE_CHILD|ADS_RIGHT_DS_DELETE_CHILD|ADS_RIGHT_DS_READ_PROP,
98 sid_network );
100 AddAccessAllowedAceEx( acl, ACL_REVISION, CONTAINER_INHERIT_ACE|INHERITED_ACE,
101 ADS_RIGHT_DS_CREATE_CHILD|ADS_RIGHT_DS_DELETE_CHILD|ADS_RIGHT_DS_READ_PROP,
102 sid_local );
104 AddAccessAllowedAceEx( acl, ACL_REVISION, CONTAINER_INHERIT_ACE|INHERITED_ACE,
105 ADS_RIGHT_DS_CREATE_CHILD|ADS_RIGHT_DS_DELETE_CHILD|ADS_RIGHT_DS_READ_PROP,
106 sid_users );
108 InitializeSecurityDescriptor( &absolute_sd, SECURITY_DESCRIPTOR_REVISION );
110 SetSecurityDescriptorOwner( &absolute_sd, sid_admin, TRUE );
111 SetSecurityDescriptorGroup( &absolute_sd, sid_admin, TRUE );
112 SetSecurityDescriptorDacl( &absolute_sd, TRUE, acl, TRUE );
114 *size = GetSecurityDescriptorLength( &absolute_sd );
116 *sd = malloc( *size );
117 if (!*sd)
118 hr = E_OUTOFMEMORY;
120 if (SUCCEEDED(hr))
122 if (!MakeSelfRelativeSD(&absolute_sd, *sd, size))
124 free( *sd );
125 *sd = NULL;
126 hr = E_FAIL;
130 return hr;
133 HRESULT security_get_sd( IWbemClassObject *obj, IWbemContext *context, IWbemClassObject *in, IWbemClassObject **out )
135 VARIANT var_sd, retval;
136 IWbemClassObject *sig, *out_params = NULL;
137 HRESULT hr, ret;
138 SECURITY_DESCRIPTOR *sd;
139 DWORD sd_size;
141 TRACE("%p, %p, %p, %p\n", obj, context, in, out);
143 hr = create_signature( WBEMPROX_NAMESPACE_CIMV2, L"__SystemSecurity", L"GetSD", PARAM_OUT, &sig );
145 if (SUCCEEDED(hr))
147 hr = IWbemClassObject_SpawnInstance( sig, 0, &out_params );
149 IWbemClassObject_Release( sig );
152 if (SUCCEEDED(hr))
154 ret = get_sd( &sd, &sd_size );
156 if (SUCCEEDED(ret))
158 VariantInit( &var_sd );
160 hr = to_byte_array( sd, sd_size, &var_sd );
162 if (SUCCEEDED(hr))
163 hr = IWbemClassObject_Put( out_params, L"SD", 0, &var_sd, CIM_UINT8|CIM_FLAG_ARRAY );
165 free( sd );
166 VariantClear( &var_sd );
169 if (SUCCEEDED(hr))
171 set_variant( VT_UI4, ret, NULL, &retval );
172 hr = IWbemClassObject_Put( out_params, L"ReturnValue", 0, &retval, CIM_UINT32 );
175 if (SUCCEEDED(hr) && out)
177 *out = out_params;
178 IWbemClassObject_AddRef( out_params );
181 IWbemClassObject_Release( out_params );
184 return hr;
188 HRESULT security_set_sd( IWbemClassObject *obj, IWbemContext *context, IWbemClassObject *in, IWbemClassObject **out )
190 VARIANT retval;
191 IWbemClassObject *sig, *out_params = NULL;
192 HRESULT hr;
194 FIXME("stub\n");
196 hr = create_signature( WBEMPROX_NAMESPACE_CIMV2, L"__SystemSecurity", L"SetSD", PARAM_OUT, &sig );
198 if (SUCCEEDED(hr))
200 hr = IWbemClassObject_SpawnInstance( sig, 0, &out_params );
202 IWbemClassObject_Release( sig );
205 if (SUCCEEDED(hr))
207 set_variant( VT_UI4, S_OK, NULL, &retval );
208 hr = IWbemClassObject_Put( out_params, L"ReturnValue", 0, &retval, CIM_UINT32 );
210 if (SUCCEEDED(hr) && out)
212 *out = out_params;
213 IWbemClassObject_AddRef( out_params );
216 IWbemClassObject_Release( out_params );
219 return hr;