| /* |
| * Security Management |
| * |
| * Copyright (C) 2005 Robert Shearman |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA |
| */ |
| |
| #ifndef __WINE_SERVER_SECURITY_H |
| #define __WINE_SERVER_SECURITY_H |
| |
| extern const LUID SeIncreaseQuotaPrivilege; |
| extern const LUID SeSecurityPrivilege; |
| extern const LUID SeTakeOwnershipPrivilege; |
| extern const LUID SeLoadDriverPrivilege; |
| extern const LUID SeSystemProfilePrivilege; |
| extern const LUID SeSystemtimePrivilege; |
| extern const LUID SeProfileSingleProcessPrivilege; |
| extern const LUID SeIncreaseBasePriorityPrivilege; |
| extern const LUID SeCreatePagefilePrivilege; |
| extern const LUID SeBackupPrivilege; |
| extern const LUID SeRestorePrivilege; |
| extern const LUID SeShutdownPrivilege; |
| extern const LUID SeDebugPrivilege; |
| extern const LUID SeSystemEnvironmentPrivilege; |
| extern const LUID SeChangeNotifyPrivilege; |
| extern const LUID SeRemoteShutdownPrivilege; |
| extern const LUID SeUndockPrivilege; |
| extern const LUID SeManageVolumePrivilege; |
| extern const LUID SeImpersonatePrivilege; |
| extern const LUID SeCreateGlobalPrivilege; |
| |
| extern const PSID security_world_sid; |
| extern const PSID security_local_user_sid; |
| extern const PSID security_local_system_sid; |
| extern const PSID security_builtin_users_sid; |
| extern const PSID security_builtin_admins_sid; |
| extern const PSID security_high_label_sid; |
| |
| |
| /* token functions */ |
| |
| extern struct token *token_create_admin(void); |
| extern int token_assign_label( struct token *token, PSID label ); |
| extern struct token *token_duplicate( struct token *src_token, unsigned primary, |
| int impersonation_level, const struct security_descriptor *sd ); |
| extern int token_check_privileges( struct token *token, int all_required, |
| const LUID_AND_ATTRIBUTES *reqprivs, |
| unsigned int count, LUID_AND_ATTRIBUTES *usedprivs); |
| extern const ACL *token_get_default_dacl( struct token *token ); |
| extern const SID *token_get_user( struct token *token ); |
| extern const SID *token_get_primary_group( struct token *token ); |
| extern int token_sid_present( struct token *token, const SID *sid, int deny); |
| |
| static inline const ACE_HEADER *ace_next( const ACE_HEADER *ace ) |
| { |
| return (const ACE_HEADER *)((const char *)ace + ace->AceSize); |
| } |
| |
| static inline size_t security_sid_len( const SID *sid ) |
| { |
| return offsetof( SID, SubAuthority[sid->SubAuthorityCount] ); |
| } |
| |
| static inline int security_equal_sid( const SID *sid1, const SID *sid2 ) |
| { |
| return ((sid1->SubAuthorityCount == sid2->SubAuthorityCount) && |
| !memcmp( sid1, sid2, security_sid_len( sid1 ))); |
| } |
| |
| extern void security_set_thread_token( struct thread *thread, obj_handle_t handle ); |
| extern const SID *security_unix_uid_to_sid( uid_t uid ); |
| extern int check_object_access( struct object *obj, unsigned int *access ); |
| |
| static inline int thread_single_check_privilege( struct thread *thread, const LUID *priv) |
| { |
| struct token *token = thread_get_impersonation_token( thread ); |
| const LUID_AND_ATTRIBUTES privs = { *priv, 0 }; |
| |
| if (!token) return FALSE; |
| |
| return token_check_privileges( token, TRUE, &privs, 1, NULL ); |
| } |
| |
| |
| /* security descriptor helper functions */ |
| |
| extern int sd_is_valid( const struct security_descriptor *sd, data_size_t size ); |
| extern ACL *extract_security_labels( const ACL *sacl ); |
| extern ACL *replace_security_labels( const ACL *old_sacl, const ACL *new_sacl ); |
| |
| /* gets the discretionary access control list from a security descriptor */ |
| static inline const ACL *sd_get_dacl( const struct security_descriptor *sd, int *present ) |
| { |
| *present = (sd->control & SE_DACL_PRESENT) != 0; |
| |
| if (sd->dacl_len) |
| return (const ACL *)((const char *)(sd + 1) + |
| sd->owner_len + sd->group_len + sd->sacl_len); |
| else |
| return NULL; |
| } |
| |
| /* gets the system access control list from a security descriptor */ |
| static inline const ACL *sd_get_sacl( const struct security_descriptor *sd, int *present ) |
| { |
| *present = (sd->control & SE_SACL_PRESENT) != 0; |
| |
| if (sd->sacl_len) |
| return (const ACL *)((const char *)(sd + 1) + |
| sd->owner_len + sd->group_len); |
| else |
| return NULL; |
| } |
| |
| /* gets the owner from a security descriptor */ |
| static inline const SID *sd_get_owner( const struct security_descriptor *sd ) |
| { |
| if (sd->owner_len) |
| return (const SID *)(sd + 1); |
| else |
| return NULL; |
| } |
| |
| /* gets the primary group from a security descriptor */ |
| static inline const SID *sd_get_group( const struct security_descriptor *sd ) |
| { |
| if (sd->group_len) |
| return (const SID *)((const char *)(sd + 1) + sd->owner_len); |
| else |
| return NULL; |
| } |
| |
| #endif /* __WINE_SERVER_SECURITY_H */ |