4 * Copyright (C) 2005 Robert Shearman
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #ifndef __WINE_SERVER_SECURITY_H
22 #define __WINE_SERVER_SECURITY_H
24 extern const LUID SeIncreaseQuotaPrivilege
;
25 extern const LUID SeSecurityPrivilege
;
26 extern const LUID SeTakeOwnershipPrivilege
;
27 extern const LUID SeLoadDriverPrivilege
;
28 extern const LUID SeSystemProfilePrivilege
;
29 extern const LUID SeSystemtimePrivilege
;
30 extern const LUID SeProfileSingleProcessPrivilege
;
31 extern const LUID SeIncreaseBasePriorityPrivilege
;
32 extern const LUID SeCreatePagefilePrivilege
;
33 extern const LUID SeBackupPrivilege
;
34 extern const LUID SeRestorePrivilege
;
35 extern const LUID SeShutdownPrivilege
;
36 extern const LUID SeDebugPrivilege
;
37 extern const LUID SeSystemEnvironmentPrivilege
;
38 extern const LUID SeChangeNotifyPrivilege
;
39 extern const LUID SeRemoteShutdownPrivilege
;
40 extern const LUID SeUndockPrivilege
;
41 extern const LUID SeManageVolumePrivilege
;
42 extern const LUID SeImpersonatePrivilege
;
43 extern const LUID SeCreateGlobalPrivilege
;
45 extern const PSID security_world_sid
;
46 extern const PSID security_local_user_sid
;
47 extern const PSID security_local_system_sid
;
48 extern const PSID security_builtin_users_sid
;
49 extern const PSID security_builtin_admins_sid
;
54 extern struct token
*token_create_admin(void);
55 extern struct token
*token_duplicate( struct token
*src_token
, unsigned primary
,
56 int impersonation_level
);
57 extern int token_check_privileges( struct token
*token
, int all_required
,
58 const LUID_AND_ATTRIBUTES
*reqprivs
,
59 unsigned int count
, LUID_AND_ATTRIBUTES
*usedprivs
);
60 extern const ACL
*token_get_default_dacl( struct token
*token
);
61 extern const SID
*token_get_user( struct token
*token
);
62 extern const SID
*token_get_primary_group( struct token
*token
);
63 extern int token_sid_present( struct token
*token
, const SID
*sid
, int deny
);
65 static inline const ACE_HEADER
*ace_next( const ACE_HEADER
*ace
)
67 return (const ACE_HEADER
*)((const char *)ace
+ ace
->AceSize
);
70 static inline size_t security_sid_len( const SID
*sid
)
72 return offsetof( SID
, SubAuthority
[sid
->SubAuthorityCount
] );
75 static inline int security_equal_sid( const SID
*sid1
, const SID
*sid2
)
77 return ((sid1
->SubAuthorityCount
== sid2
->SubAuthorityCount
) &&
78 !memcmp( sid1
, sid2
, security_sid_len( sid1
)));
81 extern void security_set_thread_token( struct thread
*thread
, obj_handle_t handle
);
82 extern const SID
*security_unix_uid_to_sid( uid_t uid
);
83 extern int check_object_access( struct object
*obj
, unsigned int *access
);
85 static inline int thread_single_check_privilege( struct thread
*thread
, const LUID
*priv
)
87 struct token
*token
= thread_get_impersonation_token( thread
);
88 const LUID_AND_ATTRIBUTES privs
= { *priv
, 0 };
90 if (!token
) return FALSE
;
92 return token_check_privileges( token
, TRUE
, &privs
, 1, NULL
);
96 /* security descriptor helper functions */
98 extern int sd_is_valid( const struct security_descriptor
*sd
, data_size_t size
);
100 /* gets the discretionary access control list from a security descriptor */
101 static inline const ACL
*sd_get_dacl( const struct security_descriptor
*sd
, int *present
)
103 *present
= (sd
->control
& SE_DACL_PRESENT
) != 0;
106 return (const ACL
*)((const char *)(sd
+ 1) +
107 sd
->owner_len
+ sd
->group_len
+ sd
->sacl_len
);
112 /* gets the system access control list from a security descriptor */
113 static inline const ACL
*sd_get_sacl( const struct security_descriptor
*sd
, int *present
)
115 *present
= (sd
->control
& SE_SACL_PRESENT
) != 0;
118 return (const ACL
*)((const char *)(sd
+ 1) +
119 sd
->owner_len
+ sd
->group_len
);
124 /* gets the owner from a security descriptor */
125 static inline const SID
*sd_get_owner( const struct security_descriptor
*sd
)
128 return (const SID
*)(sd
+ 1);
133 /* gets the primary group from a security descriptor */
134 static inline const SID
*sd_get_group( const struct security_descriptor
*sd
)
137 return (const SID
*)((const char *)(sd
+ 1) + sd
->owner_len
);
142 /* determines whether an object_attributes struct is valid in a buffer
143 * and calls set_error appropriately */
144 extern int objattr_is_valid( const struct object_attributes
*objattr
, data_size_t size
);
145 static inline void objattr_get_name( const struct object_attributes
*objattr
, struct unicode_str
*name
)
147 name
->len
= ((objattr
->name_len
) / sizeof(WCHAR
)) * sizeof(WCHAR
);
148 name
->str
= (const WCHAR
*)objattr
+ (sizeof(*objattr
) + objattr
->sd_len
) / sizeof(WCHAR
);
151 #endif /* __WINE_SERVER_SECURITY_H */