4 * Copyright (C) 2005 Robert Shearman
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 extern const LUID SeIncreaseQuotaPrivilege
;
22 extern const LUID SeSecurityPrivilege
;
23 extern const LUID SeTakeOwnershipPrivilege
;
24 extern const LUID SeLoadDriverPrivilege
;
25 extern const LUID SeSystemProfilePrivilege
;
26 extern const LUID SeSystemtimePrivilege
;
27 extern const LUID SeProfileSingleProcessPrivilege
;
28 extern const LUID SeIncreaseBasePriorityPrivilege
;
29 extern const LUID SeCreatePagefilePrivilege
;
30 extern const LUID SeBackupPrivilege
;
31 extern const LUID SeRestorePrivilege
;
32 extern const LUID SeShutdownPrivilege
;
33 extern const LUID SeDebugPrivilege
;
34 extern const LUID SeSystemEnvironmentPrivilege
;
35 extern const LUID SeChangeNotifyPrivilege
;
36 extern const LUID SeRemoteShutdownPrivilege
;
37 extern const LUID SeUndockPrivilege
;
38 extern const LUID SeManageVolumePrivilege
;
39 extern const LUID SeImpersonatePrivilege
;
40 extern const LUID SeCreateGlobalPrivilege
;
42 extern const PSID security_world_sid
;
43 extern const PSID security_local_user_sid
;
44 extern const PSID security_local_system_sid
;
45 extern const PSID security_builtin_users_sid
;
46 extern const PSID security_builtin_admins_sid
;
51 extern struct token
*token_create_admin(void);
52 extern struct token
*token_duplicate( struct token
*src_token
, unsigned primary
,
53 int impersonation_level
);
54 extern int token_check_privileges( struct token
*token
, int all_required
,
55 const LUID_AND_ATTRIBUTES
*reqprivs
,
56 unsigned int count
, LUID_AND_ATTRIBUTES
*usedprivs
);
57 extern const ACL
*token_get_default_dacl( struct token
*token
);
58 extern const SID
*token_get_user( struct token
*token
);
59 extern const SID
*token_get_primary_group( struct token
*token
);
60 extern int token_sid_present( struct token
*token
, const SID
*sid
, int deny
);
62 static inline const ACE_HEADER
*ace_next( const ACE_HEADER
*ace
)
64 return (const ACE_HEADER
*)((const char *)ace
+ ace
->AceSize
);
67 static inline size_t security_sid_len( const SID
*sid
)
69 return offsetof( SID
, SubAuthority
[sid
->SubAuthorityCount
] );
72 static inline int security_equal_sid( const SID
*sid1
, const SID
*sid2
)
74 return ((sid1
->SubAuthorityCount
== sid2
->SubAuthorityCount
) &&
75 !memcmp( sid1
, sid2
, security_sid_len( sid1
)));
78 extern void security_set_thread_token( struct thread
*thread
, obj_handle_t handle
);
79 extern const SID
*security_unix_uid_to_sid( uid_t uid
);
80 extern int check_object_access( struct object
*obj
, unsigned int *access
);
82 static inline int thread_single_check_privilege( struct thread
*thread
, const LUID
*priv
)
84 struct token
*token
= thread_get_impersonation_token( thread
);
85 const LUID_AND_ATTRIBUTES privs
= { *priv
, 0 };
87 if (!token
) return FALSE
;
89 return token_check_privileges( token
, TRUE
, &privs
, 1, NULL
);
93 /* security descriptor helper functions */
95 extern int sd_is_valid( const struct security_descriptor
*sd
, data_size_t size
);
97 /* gets the discretionary access control list from a security descriptor */
98 static inline const ACL
*sd_get_dacl( const struct security_descriptor
*sd
, int *present
)
100 *present
= (sd
->control
& SE_DACL_PRESENT
) != 0;
103 return (const ACL
*)((const char *)(sd
+ 1) +
104 sd
->owner_len
+ sd
->group_len
+ sd
->sacl_len
);
109 /* gets the system access control list from a security descriptor */
110 static inline const ACL
*sd_get_sacl( const struct security_descriptor
*sd
, int *present
)
112 *present
= (sd
->control
& SE_SACL_PRESENT
) != 0;
115 return (const ACL
*)((const char *)(sd
+ 1) +
116 sd
->owner_len
+ sd
->group_len
);
121 /* gets the owner from a security descriptor */
122 static inline const SID
*sd_get_owner( const struct security_descriptor
*sd
)
125 return (const SID
*)(sd
+ 1);
130 /* gets the primary group from a security descriptor */
131 static inline const SID
*sd_get_group( const struct security_descriptor
*sd
)
134 return (const SID
*)((const char *)(sd
+ 1) + sd
->owner_len
);
139 /* determines whether an object_attributes struct is valid in a buffer
140 * and calls set_error appropriately */
141 extern int objattr_is_valid( const struct object_attributes
*objattr
, data_size_t size
);
142 static inline void objattr_get_name( const struct object_attributes
*objattr
, struct unicode_str
*name
)
144 name
->len
= ((objattr
->name_len
) / sizeof(WCHAR
)) * sizeof(WCHAR
);
145 name
->str
= (const WCHAR
*)objattr
+ (sizeof(*objattr
) + objattr
->sd_len
) / sizeof(WCHAR
);