2003-07-24 02:07:00 +02:00
/*
* Tokens
*
* Copyright ( C ) 1998 Alexandre Julliard
* Copyright ( C ) 2003 Mike McCormack
2005-04-22 23:17:15 +02:00
* Copyright ( C ) 2005 Robert Shearman
2003-07-24 02:07:00 +02:00
*
* This library is free software ; you can redistribute it and / or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation ; either
* version 2.1 of the License , or ( at your option ) any later version .
*
* This library is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
* Lesser General Public License for more details .
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library ; if not , write to the Free Software
2006-05-18 14:49:52 +02:00
* Foundation , Inc . , 51 Franklin St , Fifth Floor , Boston , MA 02110 - 1301 , USA
2003-07-24 02:07:00 +02:00
*/
# include "config.h"
# include <assert.h>
# include <stdio.h>
# include <stdlib.h>
2005-11-28 17:32:54 +01:00
# include <stdarg.h>
2021-10-11 11:43:27 +02:00
# include <sys/types.h>
2007-10-03 14:09:33 +02:00
# include <unistd.h>
2003-07-24 02:07:00 +02:00
2005-11-28 17:32:54 +01:00
# include "ntstatus.h"
# define WIN32_NO_STATUS
2003-07-24 02:07:00 +02:00
# include "windef.h"
2005-11-28 17:32:54 +01:00
# include "winternl.h"
2003-07-24 02:07:00 +02:00
# include "handle.h"
# include "thread.h"
# include "process.h"
# include "request.h"
2005-04-22 23:17:15 +02:00
# include "security.h"
2005-05-16 19:52:46 +02:00
# define MAX_SUBAUTH_COUNT 1
2022-01-25 11:55:40 +01:00
const struct luid SeIncreaseQuotaPrivilege = { 5 , 0 } ;
const struct luid SeTcbPrivilege = { 7 , 0 } ;
const struct luid SeSecurityPrivilege = { 8 , 0 } ;
const struct luid SeTakeOwnershipPrivilege = { 9 , 0 } ;
const struct luid SeLoadDriverPrivilege = { 10 , 0 } ;
const struct luid SeSystemProfilePrivilege = { 11 , 0 } ;
const struct luid SeSystemtimePrivilege = { 12 , 0 } ;
const struct luid SeProfileSingleProcessPrivilege = { 13 , 0 } ;
const struct luid SeIncreaseBasePriorityPrivilege = { 14 , 0 } ;
const struct luid SeCreatePagefilePrivilege = { 15 , 0 } ;
const struct luid SeBackupPrivilege = { 17 , 0 } ;
const struct luid SeRestorePrivilege = { 18 , 0 } ;
const struct luid SeShutdownPrivilege = { 19 , 0 } ;
const struct luid SeDebugPrivilege = { 20 , 0 } ;
const struct luid SeSystemEnvironmentPrivilege = { 22 , 0 } ;
const struct luid SeChangeNotifyPrivilege = { 23 , 0 } ;
const struct luid SeRemoteShutdownPrivilege = { 24 , 0 } ;
const struct luid SeUndockPrivilege = { 25 , 0 } ;
const struct luid SeManageVolumePrivilege = { 28 , 0 } ;
const struct luid SeImpersonatePrivilege = { 29 , 0 } ;
const struct luid SeCreateGlobalPrivilege = { 30 , 0 } ;
2003-07-24 02:07:00 +02:00
2022-01-25 12:03:14 +01:00
struct sid_attrs
{
2022-01-25 12:27:28 +01:00
const struct sid * sid ;
unsigned int attrs ;
2022-01-25 12:03:14 +01:00
} ;
2022-01-25 12:27:28 +01:00
const struct sid world_sid = { SID_REVISION , 1 , SECURITY_WORLD_SID_AUTHORITY , { SECURITY_WORLD_RID } } ;
const struct sid local_system_sid = { SID_REVISION , 1 , SECURITY_NT_AUTHORITY , { SECURITY_LOCAL_SYSTEM_RID } } ;
const struct sid high_label_sid = { SID_REVISION , 1 , SECURITY_MANDATORY_LABEL_AUTHORITY , { SECURITY_MANDATORY_HIGH_RID } } ;
const struct sid local_user_sid = { SID_REVISION , 5 , SECURITY_NT_AUTHORITY , { SECURITY_NT_NON_UNIQUE , 0 , 0 , 0 , 1000 } } ;
const struct sid builtin_admins_sid = { SID_REVISION , 2 , SECURITY_NT_AUTHORITY , { SECURITY_BUILTIN_DOMAIN_RID , DOMAIN_ALIAS_RID_ADMINS } } ;
const struct sid builtin_users_sid = { SID_REVISION , 2 , SECURITY_NT_AUTHORITY , { SECURITY_BUILTIN_DOMAIN_RID , DOMAIN_ALIAS_RID_USERS } } ;
const struct sid domain_users_sid = { SID_REVISION , 5 , SECURITY_NT_AUTHORITY , { SECURITY_NT_NON_UNIQUE , 0 , 0 , 0 , DOMAIN_GROUP_RID_USERS } } ;
2018-02-07 10:25:07 +01:00
2022-01-25 12:27:28 +01:00
static const struct sid local_sid = { SID_REVISION , 1 , SECURITY_LOCAL_SID_AUTHORITY , { SECURITY_LOCAL_RID } } ;
static const struct sid interactive_sid = { SID_REVISION , 1 , SECURITY_NT_AUTHORITY , { SECURITY_INTERACTIVE_RID } } ;
static const struct sid anonymous_logon_sid = { SID_REVISION , 1 , SECURITY_NT_AUTHORITY , { SECURITY_ANONYMOUS_LOGON_RID } } ;
static const struct sid authenticated_user_sid = { SID_REVISION , 1 , SECURITY_NT_AUTHORITY , { SECURITY_AUTHENTICATED_USER_RID } } ;
2005-06-09 11:47:28 +02:00
2022-01-25 11:55:40 +01:00
static struct luid prev_luid_value = { 1000 , 0 } ;
2007-02-16 00:20:48 +01:00
2021-02-04 13:44:18 +01:00
static const WCHAR token_name [ ] = { ' T ' , ' o ' , ' k ' , ' e ' , ' n ' } ;
struct type_descr token_type =
{
{ token_name , sizeof ( token_name ) } , /* name */
2021-02-05 12:08:42 +01:00
TOKEN_ALL_ACCESS | SYNCHRONIZE , /* valid_access */
{ /* mapping */
STANDARD_RIGHTS_READ | TOKEN_QUERY_SOURCE | TOKEN_QUERY | TOKEN_DUPLICATE ,
STANDARD_RIGHTS_WRITE | TOKEN_ADJUST_SESSIONID | TOKEN_ADJUST_DEFAULT | TOKEN_ADJUST_GROUPS
| TOKEN_ADJUST_PRIVILEGES ,
STANDARD_RIGHTS_EXECUTE | TOKEN_IMPERSONATE | TOKEN_ASSIGN_PRIMARY ,
TOKEN_ALL_ACCESS
} ,
2021-02-04 13:44:18 +01:00
} ;
2003-07-24 02:07:00 +02:00
struct token
{
struct object obj ; /* object header */
2022-01-25 11:55:40 +01:00
struct luid token_id ; /* system-unique id of token */
struct luid modified_id ; /* new id allocated every time token is modified */
2005-02-11 12:52:06 +01:00
struct list privileges ; /* privileges available to the token */
2005-05-24 14:32:18 +02:00
struct list groups ; /* groups that the user of this token belongs to (sid_and_attributes) */
2022-01-25 12:27:28 +01:00
struct sid * user ; /* SID of user this token represents */
struct sid * owner ; /* SID of owner (points to user or one of groups) */
struct sid * primary_group ; /* SID of user's primary group (points to one of groups) */
2021-07-01 16:20:08 +02:00
unsigned int primary ; /* is this a primary or impersonation token? */
unsigned int session_id ; /* token session id */
2022-01-25 12:10:40 +01:00
struct acl * default_dacl ; /* the default DACL to assign to objects created by this user */
2008-03-26 14:38:49 +01:00
int impersonation_level ; /* impersonation level this token is capable of if non-primary token */
2021-02-17 06:31:11 +01:00
int elevation ; /* elevation type */
2005-02-11 12:52:06 +01:00
} ;
struct privilege
{
struct list entry ;
2022-01-25 11:55:40 +01:00
struct luid luid ;
2005-05-09 11:26:28 +02:00
unsigned enabled : 1 ; /* is the privilege currently enabled? */
unsigned def : 1 ; /* is the privilege enabled by default? */
2003-07-24 02:07:00 +02:00
} ;
2006-05-13 17:58:19 +02:00
struct group
2005-05-24 14:32:18 +02:00
{
2022-04-25 12:53:19 +02:00
struct list entry ;
unsigned int attrs ;
struct sid sid ;
2005-05-24 14:32:18 +02:00
} ;
2003-07-24 02:07:00 +02:00
static void token_dump ( struct object * obj , int verbose ) ;
2005-02-11 12:52:06 +01:00
static void token_destroy ( struct object * obj ) ;
2003-07-24 02:07:00 +02:00
static const struct object_ops token_ops =
{
sizeof ( struct token ) , /* size */
2021-02-04 13:44:18 +01:00
& token_type , /* type */
2003-07-24 02:07:00 +02:00
token_dump , /* dump */
no_add_queue , /* add_queue */
NULL , /* remove_queue */
NULL , /* signaled */
2005-04-24 19:35:52 +02:00
NULL , /* satisfied */
no_signal , /* signal */
2003-07-24 02:07:00 +02:00
no_get_fd , /* get_fd */
2021-02-05 12:10:44 +01:00
default_map_access , /* map_access */
2007-10-03 14:10:37 +02:00
default_get_sd , /* get_sd */
default_set_sd , /* set_sd */
2020-09-22 16:52:31 +02:00
no_get_full_name , /* get_full_name */
2005-11-22 15:55:42 +01:00
no_lookup_name , /* lookup_name */
2016-02-04 13:07:19 +01:00
no_link_name , /* link_name */
NULL , /* unlink_name */
2007-03-22 11:44:29 +01:00
no_open_file , /* open_file */
2019-03-25 14:37:09 +01:00
no_kernel_obj_list , /* get_kernel_obj_list */
2005-06-09 17:39:52 +02:00
no_close_handle , /* close_handle */
2005-02-11 12:52:06 +01:00
token_destroy /* destroy */
2003-07-24 02:07:00 +02:00
} ;
static void token_dump ( struct object * obj , int verbose )
{
2018-05-02 10:45:41 +02:00
struct token * token = ( struct token * ) obj ;
assert ( obj - > ops = = & token_ops ) ;
fprintf ( stderr , " Token id=%d.%u primary=%u impersonation level=%d \n " , token - > token_id . high_part ,
token - > token_id . low_part , token - > primary , token - > impersonation_level ) ;
2003-07-24 02:07:00 +02:00
}
2005-06-20 15:18:38 +02:00
void security_set_thread_token ( struct thread * thread , obj_handle_t handle )
{
if ( ! handle )
{
if ( thread - > token )
release_object ( thread - > token ) ;
thread - > token = NULL ;
}
else
{
struct token * token = ( struct token * ) get_handle_obj ( current - > process ,
handle ,
TOKEN_IMPERSONATE ,
& token_ops ) ;
if ( token )
{
if ( thread - > token )
release_object ( thread - > token ) ;
thread - > token = token ;
}
}
}
2022-01-25 12:27:28 +01:00
const struct sid * security_unix_uid_to_sid ( uid_t uid )
2007-10-03 14:09:33 +02:00
{
/* very simple mapping: either the current user or not the current user */
if ( uid = = getuid ( ) )
2022-01-25 12:27:28 +01:00
return & local_user_sid ;
2007-10-03 14:09:33 +02:00
else
return & anonymous_logon_sid ;
}
2022-01-25 12:10:40 +01:00
static int acl_is_valid ( const struct acl * acl , data_size_t size )
2005-05-24 14:32:18 +02:00
{
ULONG i ;
2022-01-25 12:21:14 +01:00
const struct ace * ace ;
2005-05-24 14:32:18 +02:00
2022-01-25 12:10:40 +01:00
if ( size < sizeof ( * acl ) ) return FALSE ;
2005-05-24 14:32:18 +02:00
size = min ( size , MAX_ACL_LEN ) ;
2022-01-25 12:10:40 +01:00
size - = sizeof ( * acl ) ;
2005-05-24 14:32:18 +02:00
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( acl ) ; i < acl - > count ; i + + , ace = ace_next ( ace ) )
2005-05-24 14:32:18 +02:00
{
2022-01-25 12:21:14 +01:00
if ( size < sizeof ( * ace ) | | size < ace - > size ) return FALSE ;
size - = ace - > size ;
switch ( ace - > type )
2005-05-24 14:32:18 +02:00
{
case ACCESS_DENIED_ACE_TYPE :
case ACCESS_ALLOWED_ACE_TYPE :
case SYSTEM_AUDIT_ACE_TYPE :
case SYSTEM_ALARM_ACE_TYPE :
2015-04-16 17:02:58 +02:00
case SYSTEM_MANDATORY_LABEL_ACE_TYPE :
break ;
2005-05-24 14:32:18 +02:00
default :
return FALSE ;
}
2022-01-25 12:27:28 +01:00
if ( ! sid_valid_size ( ( const struct sid * ) ( ace + 1 ) , ace - > size - sizeof ( * ace ) ) ) return FALSE ;
2005-05-24 14:32:18 +02:00
}
return TRUE ;
}
2022-01-25 12:27:28 +01:00
static unsigned int get_sid_count ( const struct sid * sid , data_size_t size )
2020-09-23 00:31:15 +02:00
{
unsigned int count ;
2022-01-25 12:27:28 +01:00
for ( count = 0 ; sid_valid_size ( sid , size ) ; count + + )
2020-09-23 00:31:15 +02:00
{
2022-01-25 12:27:28 +01:00
size - = sid_len ( sid ) ;
sid = ( const struct sid * ) ( ( char * ) sid + sid_len ( sid ) ) ;
2020-09-23 00:31:15 +02:00
}
return count ;
}
2005-05-24 14:32:18 +02:00
/* checks whether all members of a security descriptor fit inside the size
* of memory specified */
2007-10-02 16:54:51 +02:00
int sd_is_valid ( const struct security_descriptor * sd , data_size_t size )
2005-05-24 14:32:18 +02:00
{
size_t offset = sizeof ( struct security_descriptor ) ;
2022-01-25 12:27:28 +01:00
const struct sid * group ;
const struct sid * owner ;
2022-01-25 12:10:40 +01:00
const struct acl * sacl ;
const struct acl * dacl ;
2005-05-24 14:32:18 +02:00
int dummy ;
if ( size < offset )
return FALSE ;
2022-01-25 12:27:28 +01:00
if ( sd - > owner_len > = offsetof ( struct sid , sub_auth [ 255 ] ) | | offset + sd - > owner_len > size ) return FALSE ;
2005-05-24 14:32:18 +02:00
owner = sd_get_owner ( sd ) ;
offset + = sd - > owner_len ;
2022-01-25 12:27:28 +01:00
if ( owner & & ! sid_valid_size ( owner , sd - > owner_len ) ) return FALSE ;
2005-05-24 14:32:18 +02:00
2022-01-25 12:27:28 +01:00
if ( sd - > group_len > = offsetof ( struct sid , sub_auth [ 255 ] ) | | offset + sd - > group_len > size ) return FALSE ;
2005-05-24 14:32:18 +02:00
group = sd_get_group ( sd ) ;
offset + = sd - > group_len ;
2022-01-25 12:27:28 +01:00
if ( group & & ! sid_valid_size ( group , sd - > group_len ) ) return FALSE ;
2005-05-24 14:32:18 +02:00
if ( ( sd - > sacl_len > = MAX_ACL_LEN ) | | ( offset + sd - > sacl_len > size ) )
return FALSE ;
sacl = sd_get_sacl ( sd , & dummy ) ;
if ( sacl & & ! acl_is_valid ( sacl , sd - > sacl_len ) )
return FALSE ;
offset + = sd - > sacl_len ;
if ( ( sd - > dacl_len > = MAX_ACL_LEN ) | | ( offset + sd - > dacl_len > size ) )
return FALSE ;
dacl = sd_get_dacl ( sd , & dummy ) ;
if ( dacl & & ! acl_is_valid ( dacl , sd - > dacl_len ) )
return FALSE ;
offset + = sd - > dacl_len ;
return TRUE ;
}
2017-06-14 20:20:40 +02:00
/* extract security labels from SACL */
2022-01-25 12:10:40 +01:00
struct acl * extract_security_labels ( const struct acl * sacl )
2017-06-14 20:20:40 +02:00
{
2022-01-25 12:10:40 +01:00
size_t size = sizeof ( * sacl ) ;
2022-01-25 12:21:14 +01:00
const struct ace * ace ;
struct ace * label_ace ;
2017-06-14 20:20:40 +02:00
unsigned int i , count = 0 ;
2022-01-25 12:10:40 +01:00
struct acl * label_acl ;
2017-06-14 20:20:40 +02:00
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( sacl ) ; i < sacl - > count ; i + + , ace = ace_next ( ace ) )
2017-06-14 20:20:40 +02:00
{
2022-01-25 12:21:14 +01:00
if ( ace - > type = = SYSTEM_MANDATORY_LABEL_ACE_TYPE )
2017-06-14 20:20:40 +02:00
{
2022-01-25 12:21:14 +01:00
size + = ace - > size ;
2017-06-14 20:20:40 +02:00
count + + ;
}
}
label_acl = mem_alloc ( size ) ;
if ( ! label_acl ) return NULL ;
2022-01-25 12:10:40 +01:00
label_acl - > revision = sacl - > revision ;
label_acl - > pad1 = 0 ;
label_acl - > size = size ;
label_acl - > count = count ;
label_acl - > pad2 = 0 ;
2017-06-14 20:20:40 +02:00
2022-01-25 12:21:14 +01:00
label_ace = ace_first ( label_acl ) ;
for ( i = 0 , ace = ace_first ( sacl ) ; i < sacl - > count ; i + + , ace = ace_next ( ace ) )
2017-06-14 20:20:40 +02:00
{
2022-01-25 12:21:14 +01:00
if ( ace - > type = = SYSTEM_MANDATORY_LABEL_ACE_TYPE )
2017-06-14 20:20:40 +02:00
{
2022-01-25 12:21:14 +01:00
memcpy ( label_ace , ace , ace - > size ) ;
label_ace = ace_next ( label_ace ) ;
2017-06-14 20:20:40 +02:00
}
}
return label_acl ;
}
2017-06-14 20:20:41 +02:00
/* replace security labels in an existing SACL */
2022-01-25 12:10:40 +01:00
struct acl * replace_security_labels ( const struct acl * old_sacl , const struct acl * new_sacl )
2017-06-14 20:20:41 +02:00
{
2022-01-25 12:21:14 +01:00
const struct ace * ace ;
struct ace * replaced_ace ;
2017-06-14 20:20:41 +02:00
unsigned int i , count = 0 ;
2022-01-25 12:21:14 +01:00
unsigned char revision = ACL_REVISION ;
2022-01-25 12:10:40 +01:00
struct acl * replaced_acl ;
2022-01-25 12:21:14 +01:00
data_size_t size = sizeof ( * replaced_acl ) ;
2017-06-14 20:20:41 +02:00
if ( old_sacl )
{
2022-01-25 12:10:40 +01:00
revision = max ( revision , old_sacl - > revision ) ;
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( old_sacl ) ; i < old_sacl - > count ; i + + , ace = ace_next ( ace ) )
2017-06-14 20:20:41 +02:00
{
2022-01-25 12:21:14 +01:00
if ( ace - > type = = SYSTEM_MANDATORY_LABEL_ACE_TYPE ) continue ;
size + = ace - > size ;
2017-06-14 20:20:41 +02:00
count + + ;
}
}
if ( new_sacl )
{
2022-01-25 12:10:40 +01:00
revision = max ( revision , new_sacl - > revision ) ;
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( new_sacl ) ; i < new_sacl - > count ; i + + , ace = ace_next ( ace ) )
2017-06-14 20:20:41 +02:00
{
2022-01-25 12:21:14 +01:00
if ( ace - > type ! = SYSTEM_MANDATORY_LABEL_ACE_TYPE ) continue ;
size + = ace - > size ;
2017-06-14 20:20:41 +02:00
count + + ;
}
}
2022-01-25 12:21:14 +01:00
if ( size > MAX_ACL_LEN )
{
set_error ( STATUS_INVALID_ACL ) ;
return NULL ;
}
2017-06-14 20:20:41 +02:00
replaced_acl = mem_alloc ( size ) ;
if ( ! replaced_acl ) return NULL ;
2022-01-25 12:10:40 +01:00
replaced_acl - > revision = revision ;
replaced_acl - > pad1 = 0 ;
replaced_acl - > size = size ;
replaced_acl - > count = count ;
replaced_acl - > pad2 = 0 ;
2017-06-14 20:20:41 +02:00
2022-01-25 12:21:14 +01:00
replaced_ace = ( struct ace * ) ( replaced_acl + 1 ) ;
2017-06-14 20:20:41 +02:00
if ( old_sacl )
{
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( old_sacl ) ; i < old_sacl - > count ; i + + , ace = ace_next ( ace ) )
2017-06-14 20:20:41 +02:00
{
2022-01-25 12:21:14 +01:00
if ( ace - > type = = SYSTEM_MANDATORY_LABEL_ACE_TYPE ) continue ;
memcpy ( replaced_ace , ace , ace - > size ) ;
replaced_ace = ace_next ( replaced_ace ) ;
2017-06-14 20:20:41 +02:00
}
}
if ( new_sacl )
{
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( new_sacl ) ; i < new_sacl - > count ; i + + , ace = ace_next ( ace ) )
2017-06-14 20:20:41 +02:00
{
2022-01-25 12:21:14 +01:00
if ( ace - > type ! = SYSTEM_MANDATORY_LABEL_ACE_TYPE ) continue ;
memcpy ( replaced_ace , ace , ace - > size ) ;
replaced_ace = ace_next ( replaced_ace ) ;
2017-06-14 20:20:41 +02:00
}
}
return replaced_acl ;
}
2022-01-25 11:55:40 +01:00
static inline int is_equal_luid ( struct luid luid1 , struct luid luid2 )
2005-02-11 12:52:06 +01:00
{
2022-01-25 11:55:40 +01:00
return ( luid1 . low_part = = luid2 . low_part & & luid1 . high_part = = luid2 . high_part ) ;
2005-02-11 12:52:06 +01:00
}
2022-01-25 11:55:40 +01:00
static inline void allocate_luid ( struct luid * luid )
2007-02-16 00:20:48 +01:00
{
2007-03-07 12:43:12 +01:00
prev_luid_value . low_part + + ;
2007-02-16 00:20:48 +01:00
* luid = prev_luid_value ;
}
2007-03-07 01:33:26 +01:00
DECL_HANDLER ( allocate_locally_unique_id )
{
2007-03-07 12:43:12 +01:00
allocate_luid ( & reply - > luid ) ;
2007-03-07 01:33:26 +01:00
}
2022-01-25 11:55:40 +01:00
static inline struct luid_attr luid_and_attr_from_privilege ( const struct privilege * in )
2005-02-11 12:52:06 +01:00
{
2022-01-25 11:55:40 +01:00
struct luid_attr ret = { in - > luid } ;
ret . attrs = ( in - > enabled ? SE_PRIVILEGE_ENABLED : 0 ) |
( in - > def ? SE_PRIVILEGE_ENABLED_BY_DEFAULT : 0 ) ;
return ret ;
2005-02-11 12:52:06 +01:00
}
2022-01-25 11:55:40 +01:00
static struct privilege * privilege_add ( struct token * token , struct luid luid , int enabled )
2005-02-11 12:52:06 +01:00
{
struct privilege * privilege = mem_alloc ( sizeof ( * privilege ) ) ;
if ( privilege )
{
2022-01-25 11:55:40 +01:00
privilege - > luid = luid ;
2005-02-11 12:52:06 +01:00
privilege - > def = privilege - > enabled = ( enabled ! = 0 ) ;
list_add_tail ( & token - > privileges , & privilege - > entry ) ;
}
return privilege ;
}
2005-05-16 19:52:46 +02:00
static inline void privilege_remove ( struct privilege * privilege )
2005-02-11 12:52:06 +01:00
{
list_remove ( & privilege - > entry ) ;
free ( privilege ) ;
}
static void token_destroy ( struct object * obj )
{
struct token * token ;
struct list * cursor , * cursor_next ;
assert ( obj - > ops = = & token_ops ) ;
token = ( struct token * ) obj ;
2005-05-16 19:52:46 +02:00
free ( token - > user ) ;
2005-02-11 12:52:06 +01:00
LIST_FOR_EACH_SAFE ( cursor , cursor_next , & token - > privileges )
{
struct privilege * privilege = LIST_ENTRY ( cursor , struct privilege , entry ) ;
privilege_remove ( privilege ) ;
}
2005-05-24 14:32:18 +02:00
LIST_FOR_EACH_SAFE ( cursor , cursor_next , & token - > groups )
{
2006-05-13 17:58:19 +02:00
struct group * group = LIST_ENTRY ( cursor , struct group , entry ) ;
2005-05-24 14:32:18 +02:00
list_remove ( & group - > entry ) ;
free ( group ) ;
}
2005-07-13 21:31:27 +02:00
free ( token - > default_dacl ) ;
2005-02-11 12:52:06 +01:00
}
2005-07-13 21:31:27 +02:00
/* creates a new token.
* groups may be NULL if group_count is 0.
* privs may be NULL if priv_count is 0.
* default_dacl may be NULL , indicating that all objects created by the user
* are unsecured .
2007-02-16 00:20:48 +01:00
* modified_id may be NULL , indicating that a new modified_id luid should be
* allocated .
2005-07-13 21:31:27 +02:00
*/
2022-01-25 12:27:28 +01:00
static struct token * create_token ( unsigned int primary , unsigned int session_id , const struct sid * user ,
2022-01-25 12:03:14 +01:00
const struct sid_attrs * groups , unsigned int group_count ,
2022-01-25 11:55:40 +01:00
const struct luid_attr * privs , unsigned int priv_count ,
2022-01-25 12:27:28 +01:00
const struct acl * default_dacl , const struct luid * modified_id ,
2021-02-17 06:31:11 +01:00
int impersonation_level , int elevation )
2003-07-24 02:07:00 +02:00
{
struct token * token = alloc_object ( & token_ops ) ;
2005-02-11 12:52:06 +01:00
if ( token )
{
2006-07-25 10:30:04 +02:00
unsigned int i ;
2005-06-14 20:10:04 +02:00
2007-02-16 00:20:48 +01:00
allocate_luid ( & token - > token_id ) ;
if ( modified_id )
token - > modified_id = * modified_id ;
else
allocate_luid ( & token - > modified_id ) ;
2005-02-11 12:52:06 +01:00
list_init ( & token - > privileges ) ;
2005-05-24 14:32:18 +02:00
list_init ( & token - > groups ) ;
2005-06-14 20:10:04 +02:00
token - > primary = primary ;
2021-07-01 16:20:08 +02:00
token - > session_id = session_id ;
2007-02-16 00:21:40 +01:00
/* primary tokens don't have impersonation levels */
if ( primary )
token - > impersonation_level = - 1 ;
else
token - > impersonation_level = impersonation_level ;
2007-01-25 07:43:30 +01:00
token - > default_dacl = NULL ;
2007-02-09 17:24:53 +01:00
token - > primary_group = NULL ;
2021-02-17 06:31:11 +01:00
token - > elevation = elevation ;
2005-06-14 20:10:04 +02:00
2005-05-16 19:52:46 +02:00
/* copy user */
2022-01-25 12:27:28 +01:00
token - > user = memdup ( user , sid_len ( user ) ) ;
2005-05-16 19:52:46 +02:00
if ( ! token - > user )
{
release_object ( token ) ;
return NULL ;
}
2005-05-24 14:32:18 +02:00
2005-06-09 11:47:28 +02:00
/* copy groups */
for ( i = 0 ; i < group_count ; i + + )
{
2022-01-25 12:27:28 +01:00
size_t size = offsetof ( struct group , sid . sub_auth [ groups [ i ] . sid - > sub_count ] ) ;
2006-05-13 17:58:19 +02:00
struct group * group = mem_alloc ( size ) ;
2006-04-07 12:16:28 +02:00
if ( ! group )
{
release_object ( token ) ;
return NULL ;
}
2022-04-25 12:53:19 +02:00
group - > attrs = groups [ i ] . attrs ;
2022-01-25 12:27:28 +01:00
copy_sid ( & group - > sid , groups [ i ] . sid ) ;
2005-06-09 11:47:28 +02:00
list_add_tail ( & token - > groups , & group - > entry ) ;
2018-05-02 10:45:42 +02:00
/* Use first owner capable group as owner and primary group */
2022-04-25 12:53:19 +02:00
if ( ! token - > primary_group & & ( group - > attrs & SE_GROUP_OWNER ) )
2018-05-02 10:45:42 +02:00
{
token - > owner = & group - > sid ;
2007-02-09 17:24:53 +01:00
token - > primary_group = & group - > sid ;
2018-05-02 10:45:42 +02:00
}
2005-06-09 11:47:28 +02:00
}
2005-05-24 14:32:18 +02:00
2005-05-16 19:52:46 +02:00
/* copy privileges */
2005-02-11 12:52:06 +01:00
for ( i = 0 ; i < priv_count ; i + + )
{
/* note: we don't check uniqueness: the caller must make sure
* privs doesn ' t contain any duplicate luids */
2022-01-25 11:55:40 +01:00
if ( ! privilege_add ( token , privs [ i ] . luid , privs [ i ] . attrs & SE_PRIVILEGE_ENABLED ) )
2005-02-11 12:52:06 +01:00
{
release_object ( token ) ;
return NULL ;
}
}
2005-07-13 21:31:27 +02:00
if ( default_dacl )
{
2022-01-25 12:10:40 +01:00
token - > default_dacl = memdup ( default_dacl , default_dacl - > size ) ;
2005-07-13 21:31:27 +02:00
if ( ! token - > default_dacl )
{
release_object ( token ) ;
return NULL ;
}
}
2005-02-11 12:52:06 +01:00
}
2003-07-24 02:07:00 +02:00
return token ;
}
2022-01-25 12:27:28 +01:00
static int filter_group ( struct group * group , const struct sid * filter , unsigned int count )
2020-09-23 00:31:15 +02:00
{
unsigned int i ;
for ( i = 0 ; i < count ; i + + )
{
2022-01-25 12:27:28 +01:00
if ( equal_sid ( & group - > sid , filter ) ) return 1 ;
filter = ( const struct sid * ) ( ( char * ) filter + sid_len ( filter ) ) ;
2020-09-23 00:31:15 +02:00
}
return 0 ;
}
2022-01-25 11:55:40 +01:00
static int filter_privilege ( struct privilege * privilege , const struct luid_attr * filter , unsigned int count )
2020-09-23 00:31:15 +02:00
{
unsigned int i ;
for ( i = 0 ; i < count ; i + + )
2022-01-25 11:55:40 +01:00
if ( is_equal_luid ( privilege - > luid , filter [ i ] . luid ) ) return 1 ;
2020-09-23 00:31:15 +02:00
return 0 ;
}
2007-05-28 19:39:33 +02:00
struct token * token_duplicate ( struct token * src_token , unsigned primary ,
2020-09-23 00:31:15 +02:00
int impersonation_level , const struct security_descriptor * sd ,
2022-01-25 11:55:40 +01:00
const struct luid_attr * remove_privs , unsigned int remove_priv_count ,
2022-01-25 12:27:28 +01:00
const struct sid * remove_groups , unsigned int remove_group_count )
2007-05-28 19:39:33 +02:00
{
2022-01-25 11:55:40 +01:00
const struct luid * modified_id =
2007-05-28 19:39:33 +02:00
primary | | ( impersonation_level = = src_token - > impersonation_level ) ?
& src_token - > modified_id : NULL ;
struct token * token = NULL ;
struct privilege * privilege ;
struct group * group ;
2008-03-26 14:38:49 +01:00
if ( ! primary & &
( impersonation_level < SecurityAnonymous | |
impersonation_level > SecurityDelegation | |
( ! src_token - > primary & & ( impersonation_level > src_token - > impersonation_level ) ) ) )
2007-05-28 19:39:33 +02:00
{
set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
return NULL ;
}
2021-07-01 16:20:08 +02:00
token = create_token ( primary , src_token - > session_id , src_token - > user , NULL , 0 ,
2022-01-25 12:27:28 +01:00
NULL , 0 , src_token - > default_dacl , modified_id ,
2021-02-17 06:31:11 +01:00
impersonation_level , src_token - > elevation ) ;
2007-05-28 19:39:33 +02:00
if ( ! token ) return token ;
/* copy groups */
2015-12-21 05:32:35 +01:00
token - > primary_group = NULL ;
2007-05-28 19:39:33 +02:00
LIST_FOR_EACH_ENTRY ( group , & src_token - > groups , struct group , entry )
{
2022-01-25 12:27:28 +01:00
size_t size = offsetof ( struct group , sid . sub_auth [ group - > sid . sub_count ] ) ;
2007-05-28 19:39:33 +02:00
struct group * newgroup = mem_alloc ( size ) ;
if ( ! newgroup )
{
release_object ( token ) ;
return NULL ;
}
memcpy ( newgroup , group , size ) ;
2020-09-23 00:31:15 +02:00
if ( filter_group ( group , remove_groups , remove_group_count ) )
{
2022-04-25 12:53:19 +02:00
newgroup - > attrs & = ~ ( SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT ) ;
newgroup - > attrs | = SE_GROUP_USE_FOR_DENY_ONLY ;
2020-09-23 00:31:15 +02:00
}
2007-05-28 19:39:33 +02:00
list_add_tail ( & token - > groups , & newgroup - > entry ) ;
2015-12-21 05:32:35 +01:00
if ( src_token - > primary_group = = & group - > sid )
2018-05-02 10:45:42 +02:00
{
token - > owner = & newgroup - > sid ;
2015-12-21 05:32:35 +01:00
token - > primary_group = & newgroup - > sid ;
2018-05-02 10:45:42 +02:00
}
2007-05-28 19:39:33 +02:00
}
assert ( token - > primary_group ) ;
/* copy privileges */
LIST_FOR_EACH_ENTRY ( privilege , & src_token - > privileges , struct privilege , entry )
2020-09-23 00:31:15 +02:00
{
if ( filter_privilege ( privilege , remove_privs , remove_priv_count ) ) continue ;
2022-01-25 11:55:40 +01:00
if ( ! privilege_add ( token , privilege - > luid , privilege - > enabled ) )
2007-05-28 19:39:33 +02:00
{
release_object ( token ) ;
return NULL ;
}
2020-09-23 00:31:15 +02:00
}
2007-05-28 19:39:33 +02:00
2017-06-14 20:20:43 +02:00
if ( sd ) default_set_sd ( & token - > obj , sd , OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION |
DACL_SECURITY_INFORMATION | SACL_SECURITY_INFORMATION ) ;
2007-05-28 19:39:33 +02:00
return token ;
}
2022-01-25 12:27:28 +01:00
static struct acl * create_default_dacl ( const struct sid * user )
2005-07-13 21:31:27 +02:00
{
2022-01-25 12:21:14 +01:00
struct ace * ace ;
2022-01-25 12:10:40 +01:00
struct acl * default_dacl ;
2022-01-25 12:21:14 +01:00
size_t default_dacl_size = sizeof ( * default_dacl ) + 2 * sizeof ( * ace ) +
2022-01-25 12:27:28 +01:00
sid_len ( & local_system_sid ) + sid_len ( user ) ;
2005-07-13 21:31:27 +02:00
default_dacl = mem_alloc ( default_dacl_size ) ;
if ( ! default_dacl ) return NULL ;
2022-01-25 12:10:40 +01:00
default_dacl - > revision = ACL_REVISION ;
default_dacl - > pad1 = 0 ;
default_dacl - > size = default_dacl_size ;
default_dacl - > count = 2 ;
default_dacl - > pad2 = 0 ;
2005-07-13 21:31:27 +02:00
/* GENERIC_ALL for Local System */
2022-01-25 12:21:14 +01:00
ace = set_ace ( ace_first ( default_dacl ) , & local_system_sid , ACCESS_ALLOWED_ACE_TYPE , 0 , GENERIC_ALL ) ;
2005-07-13 21:31:27 +02:00
/* GENERIC_ALL for specified user */
2022-01-25 12:21:14 +01:00
set_ace ( ace_next ( ace ) , user , ACCESS_ALLOWED_ACE_TYPE , 0 , GENERIC_ALL ) ;
2005-07-13 21:31:27 +02:00
return default_dacl ;
}
2005-05-16 19:52:46 +02:00
struct sid_data
{
SID_IDENTIFIER_AUTHORITY idauth ;
int count ;
unsigned int subauth [ MAX_SUBAUTH_COUNT ] ;
} ;
2022-01-25 12:27:28 +01:00
static struct security_descriptor * create_security_label_sd ( struct token * token , const struct sid * label_sid )
2017-06-16 20:41:36 +02:00
{
2022-01-25 12:27:28 +01:00
size_t sid_size = sid_len ( label_sid ) , sacl_size , sd_size ;
2017-06-16 20:41:36 +02:00
struct security_descriptor * sd ;
2022-01-25 12:10:40 +01:00
struct acl * sacl ;
2017-06-16 20:41:36 +02:00
2022-01-25 12:27:28 +01:00
sacl_size = sizeof ( * sacl ) + sizeof ( struct ace ) + sid_size ;
2017-06-16 20:41:36 +02:00
sd_size = sizeof ( struct security_descriptor ) + sacl_size ;
if ( ! ( sd = mem_alloc ( sd_size ) ) )
return NULL ;
sd - > control = SE_SACL_PRESENT ;
sd - > owner_len = 0 ;
sd - > group_len = 0 ;
sd - > sacl_len = sacl_size ;
sd - > dacl_len = 0 ;
2022-01-25 12:10:40 +01:00
sacl = ( struct acl * ) ( sd + 1 ) ;
sacl - > revision = ACL_REVISION ;
sacl - > pad1 = 0 ;
sacl - > size = sacl_size ;
sacl - > count = 1 ;
sacl - > pad2 = 0 ;
2017-06-16 20:41:36 +02:00
2022-01-25 12:21:14 +01:00
set_ace ( ace_first ( sacl ) , label_sid , SYSTEM_MANDATORY_LABEL_ACE_TYPE , 0 ,
SYSTEM_MANDATORY_LABEL_NO_WRITE_UP ) ;
2017-06-16 20:41:36 +02:00
assert ( sd_is_valid ( sd , sd_size ) ) ;
return sd ;
}
2022-01-25 12:27:28 +01:00
int token_assign_label ( struct token * token , const struct sid * label )
2017-06-16 20:41:36 +02:00
{
struct security_descriptor * sd ;
int ret = 0 ;
if ( ( sd = create_security_label_sd ( token , label ) ) )
{
ret = set_sd_defaults_from_token ( & token - > obj , sd , LABEL_SECURITY_INFORMATION , token ) ;
free ( sd ) ;
}
return ret ;
}
2020-09-24 06:44:55 +02:00
struct token * get_token_obj ( struct process * process , obj_handle_t handle , unsigned int access )
{
return ( struct token * ) get_handle_obj ( process , handle , access , & token_ops ) ;
}
2021-07-01 16:20:08 +02:00
struct token * token_create_admin ( unsigned primary , int impersonation_level , int elevation , unsigned int session_id )
2005-02-11 12:52:06 +01:00
{
2005-06-09 11:47:28 +02:00
struct token * token = NULL ;
2022-01-25 12:27:28 +01:00
struct sid alias_admins_sid = { SID_REVISION , 2 , SECURITY_NT_AUTHORITY , { SECURITY_BUILTIN_DOMAIN_RID , DOMAIN_ALIAS_RID_ADMINS } } ;
struct sid alias_users_sid = { SID_REVISION , 2 , SECURITY_NT_AUTHORITY , { SECURITY_BUILTIN_DOMAIN_RID , DOMAIN_ALIAS_RID_USERS } } ;
2007-05-18 11:51:50 +02:00
/* on Windows, this value changes every time the user logs on */
2022-04-25 13:23:28 +02:00
struct sid logon_sid = { SID_REVISION , 3 , SECURITY_NT_AUTHORITY , { SECURITY_LOGON_IDS_RID , 0 , 0 /* FIXME: should be randomly generated when tokens are inherited by new processes */ } } ;
2022-01-25 12:27:28 +01:00
const struct sid * user_sid = security_unix_uid_to_sid ( getuid ( ) ) ;
2022-01-25 12:10:40 +01:00
struct acl * default_dacl = create_default_dacl ( user_sid ) ;
2022-01-25 12:27:28 +01:00
const struct luid_attr admin_privs [ ] =
2005-05-16 19:52:46 +02:00
{
2022-01-25 12:27:28 +01:00
{ SeChangeNotifyPrivilege , SE_PRIVILEGE_ENABLED } ,
{ SeTcbPrivilege , 0 } ,
{ SeSecurityPrivilege , 0 } ,
{ SeBackupPrivilege , 0 } ,
{ SeRestorePrivilege , 0 } ,
{ SeSystemtimePrivilege , 0 } ,
{ SeShutdownPrivilege , 0 } ,
{ SeRemoteShutdownPrivilege , 0 } ,
{ SeTakeOwnershipPrivilege , 0 } ,
{ SeDebugPrivilege , 0 } ,
{ SeSystemEnvironmentPrivilege , 0 } ,
{ SeSystemProfilePrivilege , 0 } ,
{ SeProfileSingleProcessPrivilege , 0 } ,
{ SeIncreaseBasePriorityPrivilege , 0 } ,
{ SeLoadDriverPrivilege , SE_PRIVILEGE_ENABLED } ,
{ SeCreatePagefilePrivilege , 0 } ,
{ SeIncreaseQuotaPrivilege , 0 } ,
{ SeUndockPrivilege , 0 } ,
{ SeManageVolumePrivilege , 0 } ,
{ SeImpersonatePrivilege , SE_PRIVILEGE_ENABLED } ,
{ SeCreateGlobalPrivilege , SE_PRIVILEGE_ENABLED } ,
} ;
/* note: we don't include non-builtin groups here for the user -
* telling us these is the job of a client - side program */
const struct sid_attrs admin_groups [ ] =
{
{ & world_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ & local_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ & interactive_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ & authenticated_user_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ & domain_users_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY | SE_GROUP_OWNER } ,
{ & alias_admins_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY | SE_GROUP_OWNER } ,
{ & alias_users_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ & logon_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY | SE_GROUP_LOGON_ID } ,
} ;
token = create_token ( primary , session_id , user_sid , admin_groups , ARRAY_SIZE ( admin_groups ) ,
admin_privs , ARRAY_SIZE ( admin_privs ) , default_dacl ,
NULL , impersonation_level , elevation ) ;
/* we really need a primary group */
assert ( token - > primary_group ) ;
2005-06-09 11:47:28 +02:00
2006-10-09 23:34:36 +02:00
free ( default_dacl ) ;
2005-05-16 19:52:46 +02:00
return token ;
2005-02-11 12:52:06 +01:00
}
2022-01-25 11:55:40 +01:00
static struct privilege * token_find_privilege ( struct token * token , struct luid luid , int enabled_only )
2005-02-11 12:52:06 +01:00
{
struct privilege * privilege ;
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
{
2022-01-25 11:55:40 +01:00
if ( is_equal_luid ( luid , privilege - > luid ) )
2005-02-11 12:52:06 +01:00
{
if ( enabled_only & & ! privilege - > enabled )
return NULL ;
return privilege ;
}
}
return NULL ;
}
2022-01-25 11:55:40 +01:00
static unsigned int token_adjust_privileges ( struct token * token , const struct luid_attr * privs ,
unsigned int count , struct luid_attr * mod_privs ,
2005-07-13 21:31:27 +02:00
unsigned int mod_privs_count )
2005-02-11 12:52:06 +01:00
{
2006-07-25 10:30:04 +02:00
unsigned int i , modified_count = 0 ;
2005-02-11 12:52:06 +01:00
2007-02-16 00:20:48 +01:00
/* mark as modified */
allocate_luid ( & token - > modified_id ) ;
2005-02-11 12:52:06 +01:00
for ( i = 0 ; i < count ; i + + )
{
2022-01-25 11:55:40 +01:00
struct privilege * privilege = token_find_privilege ( token , privs [ i ] . luid , FALSE ) ;
2005-02-11 12:52:06 +01:00
if ( ! privilege )
{
set_error ( STATUS_NOT_ALL_ASSIGNED ) ;
continue ;
}
2022-01-25 11:55:40 +01:00
if ( privs [ i ] . attrs & SE_PRIVILEGE_REMOVED ) privilege_remove ( privilege ) ;
2005-02-11 12:52:06 +01:00
else
{
/* save previous state for caller */
if ( mod_privs_count )
{
2022-01-25 11:55:40 +01:00
* mod_privs + + = luid_and_attr_from_privilege ( privilege ) ;
2005-02-11 12:52:06 +01:00
mod_privs_count - - ;
modified_count + + ;
}
2022-01-25 11:55:40 +01:00
privilege - > enabled = ! ! ( privs [ i ] . attrs & SE_PRIVILEGE_ENABLED ) ;
2005-02-11 12:52:06 +01:00
}
}
return modified_count ;
}
static void token_disable_privileges ( struct token * token )
{
struct privilege * privilege ;
2007-02-16 00:20:48 +01:00
/* mark as modified */
allocate_luid ( & token - > modified_id ) ;
2005-02-11 12:52:06 +01:00
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
privilege - > enabled = FALSE ;
}
2022-01-25 11:55:40 +01:00
int token_check_privileges ( struct token * token , int all_required , const struct luid_attr * reqprivs ,
unsigned int count , struct luid_attr * usedprivs )
2005-04-22 23:17:15 +02:00
{
2006-07-25 10:30:04 +02:00
unsigned int i , enabled_count = 0 ;
2005-04-22 23:17:15 +02:00
for ( i = 0 ; i < count ; i + + )
{
2022-01-25 11:55:40 +01:00
struct privilege * privilege = token_find_privilege ( token , reqprivs [ i ] . luid , TRUE ) ;
2005-04-22 23:17:15 +02:00
if ( usedprivs )
usedprivs [ i ] = reqprivs [ i ] ;
if ( privilege & & privilege - > enabled )
{
enabled_count + + ;
2022-01-25 11:55:40 +01:00
if ( usedprivs ) usedprivs [ i ] . attrs | = SE_PRIVILEGE_USED_FOR_ACCESS ;
2005-04-22 23:17:15 +02:00
}
}
if ( all_required )
return ( enabled_count = = count ) ;
else
return ( enabled_count > 0 ) ;
}
2022-01-25 12:27:28 +01:00
int token_sid_present ( struct token * token , const struct sid * sid , int deny )
2005-05-24 14:32:18 +02:00
{
2006-05-13 17:58:19 +02:00
struct group * group ;
2005-05-24 14:32:18 +02:00
2022-01-25 12:27:28 +01:00
if ( equal_sid ( token - > user , sid ) ) return TRUE ;
2005-05-24 14:32:18 +02:00
2006-05-13 17:58:19 +02:00
LIST_FOR_EACH_ENTRY ( group , & token - > groups , struct group , entry )
2005-05-24 14:32:18 +02:00
{
2022-04-25 12:53:19 +02:00
if ( ! ( group - > attrs & SE_GROUP_ENABLED ) ) continue ;
if ( ! deny & & ( group - > attrs & SE_GROUP_USE_FOR_DENY_ONLY ) ) continue ;
2022-01-25 12:27:28 +01:00
if ( equal_sid ( & group - > sid , sid ) ) return TRUE ;
2005-05-24 14:32:18 +02:00
}
return FALSE ;
}
2007-01-25 07:42:15 +01:00
/* Checks access to a security descriptor. 'sd' must have been validated by
* caller . It returns STATUS_SUCCESS if call succeeded or an error indicating
* the reason . ' status ' parameter will indicate if access is granted or denied .
*
* If both returned value and ' status ' are STATUS_SUCCESS then access is granted .
*/
2005-05-24 14:32:18 +02:00
static unsigned int token_access_check ( struct token * token ,
const struct security_descriptor * sd ,
unsigned int desired_access ,
2022-01-25 11:55:40 +01:00
struct luid_attr * privs ,
2005-05-24 14:32:18 +02:00
unsigned int * priv_count ,
2021-02-04 13:21:49 +01:00
const generic_map_t * mapping ,
2005-05-24 14:32:18 +02:00
unsigned int * granted_access ,
unsigned int * status )
{
unsigned int current_access = 0 ;
unsigned int denied_access = 0 ;
ULONG i ;
2022-01-25 12:10:40 +01:00
const struct acl * dacl ;
2005-05-24 14:32:18 +02:00
int dacl_present ;
2022-01-25 12:21:14 +01:00
const struct ace * ace ;
2022-01-25 12:27:28 +01:00
const struct sid * owner ;
2005-05-24 14:32:18 +02:00
2007-01-25 07:42:15 +01:00
/* assume no access rights */
2005-05-24 14:32:18 +02:00
* granted_access = 0 ;
/* fail if desired_access contains generic rights */
if ( desired_access & ( GENERIC_READ | GENERIC_WRITE | GENERIC_EXECUTE | GENERIC_ALL ) )
{
2015-07-17 12:37:24 +02:00
if ( priv_count ) * priv_count = 0 ;
2007-01-25 07:42:15 +01:00
return STATUS_GENERIC_NOT_MAPPED ;
2005-05-24 14:32:18 +02:00
}
dacl = sd_get_dacl ( sd , & dacl_present ) ;
owner = sd_get_owner ( sd ) ;
if ( ! owner | | ! sd_get_group ( sd ) )
{
2015-07-17 12:37:24 +02:00
if ( priv_count ) * priv_count = 0 ;
2007-01-25 07:42:15 +01:00
return STATUS_INVALID_SECURITY_DESCR ;
2005-05-24 14:32:18 +02:00
}
/* 1: Grant desired access if the object is unprotected */
2007-10-16 10:50:50 +02:00
if ( ! dacl_present | | ! dacl )
2005-05-24 14:32:18 +02:00
{
2015-07-17 12:37:24 +02:00
if ( priv_count ) * priv_count = 0 ;
2017-02-03 09:57:10 +01:00
if ( desired_access & MAXIMUM_ALLOWED )
2021-02-04 13:21:49 +01:00
* granted_access = mapping - > all ;
2017-02-03 09:57:10 +01:00
else
* granted_access = desired_access ;
2007-01-25 07:42:15 +01:00
return * status = STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
/* 2: Check if caller wants access to system security part. Note: access
* is only granted if specifically asked for */
if ( desired_access & ACCESS_SYSTEM_SECURITY )
{
2022-01-25 11:55:40 +01:00
const struct luid_attr security_priv = { SeSecurityPrivilege , 0 } ;
struct luid_attr retpriv = security_priv ;
2005-05-24 14:32:18 +02:00
if ( token_check_privileges ( token , TRUE , & security_priv , 1 , & retpriv ) )
{
if ( priv_count )
{
/* assumes that there will only be one privilege to return */
if ( * priv_count > = 1 )
{
* priv_count = 1 ;
* privs = retpriv ;
}
else
{
* priv_count = 1 ;
return STATUS_BUFFER_TOO_SMALL ;
}
}
current_access | = ACCESS_SYSTEM_SECURITY ;
if ( desired_access = = current_access )
{
* granted_access = current_access ;
2007-01-25 07:42:15 +01:00
return * status = STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
}
else
{
2015-07-17 12:37:24 +02:00
if ( priv_count ) * priv_count = 0 ;
2007-01-25 07:42:15 +01:00
* status = STATUS_PRIVILEGE_NOT_HELD ;
return STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
}
else if ( priv_count ) * priv_count = 0 ;
/* 3: Check whether the token is the owner */
/* NOTE: SeTakeOwnershipPrivilege is not checked for here - it is instead
* checked when a " set owner " call is made , overriding the access rights
* determined here . */
if ( token_sid_present ( token , owner , FALSE ) )
{
2021-06-06 03:59:38 +02:00
current_access | = ( STANDARD_RIGHTS_REQUIRED | SYNCHRONIZE ) ;
2005-05-24 14:32:18 +02:00
if ( desired_access = = current_access )
{
* granted_access = current_access ;
2007-01-25 07:42:15 +01:00
return * status = STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
}
/* 4: Grant rights according to the DACL */
2022-01-25 12:21:14 +01:00
for ( i = 0 , ace = ace_first ( dacl ) ; i < dacl - > count ; i + + , ace = ace_next ( ace ) )
2005-05-24 14:32:18 +02:00
{
2022-01-25 12:27:28 +01:00
const struct sid * sid = ( const struct sid * ) ( ace + 1 ) ;
2007-10-25 17:19:54 +02:00
2022-01-25 12:21:14 +01:00
if ( ace - > flags & INHERIT_ONLY_ACE ) continue ;
2007-10-25 17:19:54 +02:00
2022-01-25 12:21:14 +01:00
switch ( ace - > type )
2005-05-24 14:32:18 +02:00
{
case ACCESS_DENIED_ACE_TYPE :
if ( token_sid_present ( token , sid , TRUE ) )
{
2022-01-25 12:21:14 +01:00
unsigned int access = map_access ( ace - > mask , mapping ) ;
2005-05-24 14:32:18 +02:00
if ( desired_access & MAXIMUM_ALLOWED )
denied_access | = access ;
else
{
denied_access | = ( access & ~ current_access ) ;
2007-01-25 07:42:15 +01:00
if ( desired_access & access ) goto done ;
2005-05-24 14:32:18 +02:00
}
}
break ;
case ACCESS_ALLOWED_ACE_TYPE :
if ( token_sid_present ( token , sid , FALSE ) )
{
2022-01-25 12:21:14 +01:00
unsigned int access = map_access ( ace - > mask , mapping ) ;
2005-05-24 14:32:18 +02:00
if ( desired_access & MAXIMUM_ALLOWED )
current_access | = access ;
else
current_access | = ( access & ~ denied_access ) ;
}
break ;
}
/* don't bother carrying on checking if we've already got all of
* rights we need */
if ( desired_access = = * granted_access )
break ;
}
2007-01-25 07:42:15 +01:00
done :
2005-05-24 14:32:18 +02:00
if ( desired_access & MAXIMUM_ALLOWED )
* granted_access = current_access & ~ denied_access ;
else
if ( ( current_access & desired_access ) = = desired_access )
* granted_access = current_access & desired_access ;
else
2007-01-25 07:42:15 +01:00
* granted_access = 0 ;
* status = * granted_access ? STATUS_SUCCESS : STATUS_ACCESS_DENIED ;
return STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
2022-01-25 12:10:40 +01:00
const struct acl * token_get_default_dacl ( struct token * token )
2005-07-13 21:31:27 +02:00
{
return token - > default_dacl ;
}
2022-01-25 12:27:28 +01:00
const struct sid * token_get_user ( struct token * token )
2007-02-08 05:43:11 +01:00
{
2007-10-02 16:54:51 +02:00
return token - > user ;
}
2007-02-08 05:43:11 +01:00
2022-01-25 12:27:28 +01:00
const struct sid * token_get_primary_group ( struct token * token )
2007-10-02 16:54:51 +02:00
{
return token - > primary_group ;
2007-02-08 05:43:11 +01:00
}
2021-07-01 16:20:08 +02:00
unsigned int token_get_session_id ( struct token * token )
{
return token - > session_id ;
}
2020-09-24 06:44:56 +02:00
int check_object_access ( struct token * token , struct object * obj , unsigned int * access )
2007-02-21 14:59:59 +01:00
{
2021-02-04 13:21:49 +01:00
generic_map_t mapping ;
2015-07-17 12:37:24 +02:00
unsigned int status ;
2007-02-21 14:59:59 +01:00
int res ;
2020-09-24 06:44:56 +02:00
if ( ! token )
token = current - > token ? current - > token : current - > process - > token ;
2021-02-04 13:21:49 +01:00
mapping . all = obj - > ops - > map_access ( obj , GENERIC_ALL ) ;
2007-02-21 14:59:59 +01:00
if ( ! obj - > sd )
{
2021-02-04 13:21:49 +01:00
if ( * access & MAXIMUM_ALLOWED ) * access = mapping . all ;
2007-02-21 14:59:59 +01:00
return TRUE ;
}
2021-02-04 13:21:49 +01:00
mapping . read = obj - > ops - > map_access ( obj , GENERIC_READ ) ;
mapping . write = obj - > ops - > map_access ( obj , GENERIC_WRITE ) ;
mapping . exec = obj - > ops - > map_access ( obj , GENERIC_EXECUTE ) ;
2007-02-21 14:59:59 +01:00
2015-07-17 12:37:24 +02:00
res = token_access_check ( token , obj - > sd , * access , NULL , NULL ,
2007-02-21 14:59:59 +01:00
& mapping , access , & status ) = = STATUS_SUCCESS & &
status = = STATUS_SUCCESS ;
if ( ! res ) set_error ( STATUS_ACCESS_DENIED ) ;
return res ;
}
2003-07-24 02:07:00 +02:00
/* open a security token */
DECL_HANDLER ( open_token )
{
2005-06-10 21:54:46 +02:00
if ( req - > flags & OPEN_TOKEN_THREAD )
2003-07-24 02:07:00 +02:00
{
struct thread * thread = get_thread_from_handle ( req - > handle , 0 ) ;
if ( thread )
{
if ( thread - > token )
2007-02-16 00:21:40 +01:00
{
2008-03-26 14:38:49 +01:00
if ( ! thread - > token - > primary & & thread - > token - > impersonation_level < = SecurityAnonymous )
2007-02-16 00:21:40 +01:00
set_error ( STATUS_CANT_OPEN_ANONYMOUS ) ;
else
reply - > token = alloc_handle ( current - > process , thread - > token ,
req - > access , req - > attributes ) ;
}
2005-02-11 12:52:06 +01:00
else
2007-02-16 00:21:40 +01:00
set_error ( STATUS_NO_TOKEN ) ;
2003-07-24 02:07:00 +02:00
release_object ( thread ) ;
}
}
else
{
struct process * process = get_process_from_handle ( req - > handle , 0 ) ;
if ( process )
{
if ( process - > token )
2005-12-09 12:17:19 +01:00
reply - > token = alloc_handle ( current - > process , process - > token , req - > access ,
2005-12-09 13:58:25 +01:00
req - > attributes ) ;
2005-02-11 12:52:06 +01:00
else
2007-02-16 00:21:40 +01:00
set_error ( STATUS_NO_TOKEN ) ;
2003-07-24 02:07:00 +02:00
release_object ( process ) ;
}
}
}
2005-02-11 12:52:06 +01:00
/* adjust the privileges held by a token */
DECL_HANDLER ( adjust_token_privileges )
{
struct token * token ;
unsigned int access = TOKEN_ADJUST_PRIVILEGES ;
if ( req - > get_modified_state ) access | = TOKEN_QUERY ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
access , & token_ops ) ) )
{
2022-01-25 11:55:40 +01:00
const struct luid_attr * privs = get_req_data ( ) ;
struct luid_attr * modified_privs = NULL ;
unsigned int priv_count = get_req_data_size ( ) / sizeof ( * privs ) ;
2005-02-11 12:52:06 +01:00
unsigned int modified_priv_count = 0 ;
if ( req - > get_modified_state & & ! req - > disable_all )
{
2006-07-25 10:30:04 +02:00
unsigned int i ;
2005-02-11 12:52:06 +01:00
/* count modified privs */
for ( i = 0 ; i < priv_count ; i + + )
{
2022-01-25 11:55:40 +01:00
struct privilege * privilege = token_find_privilege ( token , privs [ i ] . luid , FALSE ) ;
2005-02-11 12:52:06 +01:00
if ( privilege & & req - > get_modified_state )
modified_priv_count + + ;
}
reply - > len = modified_priv_count ;
modified_priv_count = min ( modified_priv_count , get_reply_max_size ( ) / sizeof ( * modified_privs ) ) ;
if ( modified_priv_count )
modified_privs = set_reply_data_size ( modified_priv_count * sizeof ( * modified_privs ) ) ;
}
reply - > len = modified_priv_count * sizeof ( * modified_privs ) ;
if ( req - > disable_all )
token_disable_privileges ( token ) ;
else
2017-01-30 23:11:07 +01:00
token_adjust_privileges ( token , privs , priv_count , modified_privs , modified_priv_count ) ;
2005-02-11 12:52:06 +01:00
release_object ( token ) ;
}
}
/* retrieves the list of privileges that may be held be the token */
DECL_HANDLER ( get_token_privileges )
{
struct token * token ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
int priv_count = 0 ;
2022-01-25 11:55:40 +01:00
struct luid_attr * privs ;
2005-02-11 12:52:06 +01:00
struct privilege * privilege ;
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
priv_count + + ;
reply - > len = priv_count * sizeof ( * privs ) ;
if ( reply - > len < = get_reply_max_size ( ) )
{
privs = set_reply_data_size ( priv_count * sizeof ( * privs ) ) ;
if ( privs )
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
2022-01-25 11:55:40 +01:00
* privs + + = luid_and_attr_from_privilege ( privilege ) ;
2005-02-11 12:52:06 +01:00
}
else
set_error ( STATUS_BUFFER_TOO_SMALL ) ;
release_object ( token ) ;
}
}
/* creates a duplicate of the token */
DECL_HANDLER ( duplicate_token )
{
struct token * src_token ;
2017-06-14 20:20:43 +02:00
struct unicode_str name ;
const struct security_descriptor * sd ;
const struct object_attributes * objattr = get_req_object_attributes ( & sd , & name , NULL ) ;
if ( ! objattr ) return ;
2007-02-16 00:21:40 +01:00
2005-02-11 12:52:06 +01:00
if ( ( src_token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_DUPLICATE ,
& token_ops ) ) )
{
2020-09-23 00:31:15 +02:00
struct token * token = token_duplicate ( src_token , req - > primary , req - > impersonation_level , sd , NULL , 0 , NULL , 0 ) ;
2005-02-11 12:52:06 +01:00
if ( token )
{
2021-02-07 01:26:59 +01:00
unsigned int access = req - > access ? req - > access : get_handle_access ( current - > process , req - > handle ) ;
reply - > new_handle = alloc_handle_no_access_check ( current - > process , token , access , objattr - > attributes ) ;
2005-02-11 12:52:06 +01:00
release_object ( token ) ;
}
release_object ( src_token ) ;
}
}
2005-04-22 23:17:15 +02:00
2020-09-23 00:31:15 +02:00
/* creates a restricted version of a token */
DECL_HANDLER ( filter_token )
{
struct token * src_token ;
if ( ( src_token = ( struct token * ) get_handle_obj ( current - > process , req - > handle , TOKEN_DUPLICATE , & token_ops ) ) )
{
2022-01-25 11:55:40 +01:00
const struct luid_attr * filter_privileges = get_req_data ( ) ;
2020-09-23 00:31:15 +02:00
unsigned int priv_count , group_count ;
2022-01-25 12:27:28 +01:00
const struct sid * filter_groups ;
2020-09-23 00:31:15 +02:00
struct token * token ;
2022-01-25 11:55:40 +01:00
priv_count = min ( req - > privileges_size , get_req_data_size ( ) ) / sizeof ( struct luid_attr ) ;
2022-01-25 12:27:28 +01:00
filter_groups = ( const struct sid * ) ( ( char * ) filter_privileges + priv_count * sizeof ( struct luid_attr ) ) ;
2022-01-25 11:55:40 +01:00
group_count = get_sid_count ( filter_groups , get_req_data_size ( ) - priv_count * sizeof ( struct luid_attr ) ) ;
2020-09-23 00:31:15 +02:00
token = token_duplicate ( src_token , src_token - > primary , src_token - > impersonation_level , NULL ,
filter_privileges , priv_count , filter_groups , group_count ) ;
if ( token )
{
unsigned int access = get_handle_access ( current - > process , req - > handle ) ;
reply - > new_handle = alloc_handle_no_access_check ( current - > process , token , access , 0 ) ;
release_object ( token ) ;
}
release_object ( src_token ) ;
}
}
2005-04-22 23:17:15 +02:00
/* checks the specified privileges are held by the token */
DECL_HANDLER ( check_token_privileges )
{
struct token * token ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
2022-01-25 11:55:40 +01:00
unsigned int count = get_req_data_size ( ) / sizeof ( struct luid_attr ) ;
2007-02-16 00:21:40 +01:00
if ( ! token - > primary & & token - > impersonation_level < = SecurityAnonymous )
set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
2022-01-25 11:55:40 +01:00
else if ( get_reply_max_size ( ) > = count * sizeof ( struct luid_attr ) )
2005-04-22 23:17:15 +02:00
{
2022-01-25 11:55:40 +01:00
struct luid_attr * usedprivs = set_reply_data_size ( count * sizeof ( * usedprivs ) ) ;
2005-04-22 23:17:15 +02:00
reply - > has_privileges = token_check_privileges ( token , req - > all_required , get_req_data ( ) , count , usedprivs ) ;
}
else
set_error ( STATUS_BUFFER_OVERFLOW ) ;
release_object ( token ) ;
}
}
2005-05-24 14:32:18 +02:00
/* checks that a user represented by a token is allowed to access an object
* represented by a security descriptor */
DECL_HANDLER ( access_check )
{
2006-07-26 10:43:25 +02:00
data_size_t sd_size = get_req_data_size ( ) ;
2005-05-24 14:32:18 +02:00
const struct security_descriptor * sd = get_req_data ( ) ;
struct token * token ;
if ( ! sd_is_valid ( sd , sd_size ) )
{
set_error ( STATUS_ACCESS_VIOLATION ) ;
return ;
}
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
unsigned int status ;
2022-01-25 11:55:40 +01:00
struct luid_attr priv ;
2005-05-24 14:32:18 +02:00
unsigned int priv_count = 1 ;
memset ( & priv , 0 , sizeof ( priv ) ) ;
2005-06-20 15:18:38 +02:00
/* only impersonation tokens may be used with this function */
if ( token - > primary )
{
set_error ( STATUS_NO_IMPERSONATION_TOKEN ) ;
release_object ( token ) ;
return ;
}
2007-02-16 00:21:40 +01:00
/* anonymous impersonation tokens can't be used */
if ( token - > impersonation_level < = SecurityAnonymous )
{
set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
release_object ( token ) ;
return ;
}
2005-05-24 14:32:18 +02:00
2021-02-04 13:21:49 +01:00
status = token_access_check ( token , sd , req - > desired_access , & priv , & priv_count , & req - > mapping ,
& reply - > access_granted , & reply - > access_status ) ;
2005-05-24 14:32:18 +02:00
2022-01-25 11:55:40 +01:00
reply - > privileges_len = priv_count * sizeof ( struct luid_attr ) ;
2005-05-24 14:32:18 +02:00
if ( ( priv_count > 0 ) & & ( reply - > privileges_len < = get_reply_max_size ( ) ) )
{
2022-01-25 11:55:40 +01:00
struct luid_attr * privs = set_reply_data_size ( priv_count * sizeof ( * privs ) ) ;
2005-05-24 14:32:18 +02:00
memcpy ( privs , & priv , sizeof ( priv ) ) ;
}
2007-01-25 07:42:15 +01:00
set_error ( status ) ;
2005-05-24 14:32:18 +02:00
release_object ( token ) ;
}
}
2005-07-18 15:22:55 +02:00
2018-05-02 10:45:42 +02:00
/* retrieves an SID from the token */
2009-11-16 21:11:06 +01:00
DECL_HANDLER ( get_token_sid )
2005-07-18 15:22:55 +02:00
{
struct token * token ;
2009-11-16 21:11:06 +01:00
reply - > sid_len = 0 ;
2005-07-18 15:22:55 +02:00
2018-05-02 10:45:42 +02:00
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle , TOKEN_QUERY , & token_ops ) ) )
2005-07-18 15:22:55 +02:00
{
2022-01-25 12:27:28 +01:00
const struct sid * sid = NULL ;
2005-07-18 15:22:55 +02:00
2009-11-16 21:11:06 +01:00
switch ( req - > which_sid )
{
case TokenUser :
assert ( token - > user ) ;
sid = token - > user ;
break ;
case TokenPrimaryGroup :
sid = token - > primary_group ;
break ;
case TokenOwner :
2018-05-02 10:45:42 +02:00
sid = token - > owner ;
2009-11-16 21:11:06 +01:00
break ;
default :
set_error ( STATUS_INVALID_PARAMETER ) ;
break ;
2005-07-18 15:22:55 +02:00
}
2009-11-16 21:11:06 +01:00
if ( sid )
{
2022-01-25 12:27:28 +01:00
reply - > sid_len = sid_len ( sid ) ;
2009-11-16 21:11:06 +01:00
if ( reply - > sid_len < = get_reply_max_size ( ) ) set_reply_data ( sid , reply - > sid_len ) ;
else set_error ( STATUS_BUFFER_TOO_SMALL ) ;
}
2005-07-18 15:22:55 +02:00
release_object ( token ) ;
}
}
2006-05-13 17:58:19 +02:00
/* retrieves the groups that the user represented by the token belongs to */
DECL_HANDLER ( get_token_groups )
{
struct token * token ;
2022-01-25 12:35:48 +01:00
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle , TOKEN_QUERY , & token_ops ) ) )
2006-05-13 17:58:19 +02:00
{
unsigned int group_count = 0 ;
const struct group * group ;
LIST_FOR_EACH_ENTRY ( group , & token - > groups , const struct group , entry )
{
2022-04-25 13:23:28 +02:00
if ( req - > attr_mask & & ! ( group - > attrs & req - > attr_mask ) ) continue ;
2006-05-13 17:58:19 +02:00
group_count + + ;
2022-01-25 12:35:48 +01:00
reply - > sid_len + = sid_len ( & group - > sid ) ;
2006-05-13 17:58:19 +02:00
}
2022-01-25 12:35:48 +01:00
reply - > attr_len = sizeof ( unsigned int ) * group_count ;
2006-05-13 17:58:19 +02:00
2022-01-25 12:35:48 +01:00
if ( reply - > attr_len + reply - > sid_len < = get_reply_max_size ( ) )
2006-05-13 17:58:19 +02:00
{
2022-01-25 12:35:48 +01:00
unsigned int * attr_ptr = set_reply_data_size ( reply - > attr_len + reply - > sid_len ) ;
struct sid * sid = ( struct sid * ) ( attr_ptr + group_count ) ;
2006-05-13 17:58:19 +02:00
2022-01-25 12:35:48 +01:00
if ( attr_ptr )
{
2006-05-13 17:58:19 +02:00
LIST_FOR_EACH_ENTRY ( group , & token - > groups , const struct group , entry )
{
2022-04-25 13:23:28 +02:00
if ( req - > attr_mask & & ! ( group - > attrs & req - > attr_mask ) ) continue ;
2022-01-25 12:27:28 +01:00
sid = copy_sid ( sid , & group - > sid ) ;
2022-04-25 12:53:19 +02:00
* attr_ptr + + = group - > attrs ;
2006-05-13 17:58:19 +02:00
}
}
}
else set_error ( STATUS_BUFFER_TOO_SMALL ) ;
release_object ( token ) ;
}
}
2007-02-08 05:43:11 +01:00
2021-02-17 17:10:15 +01:00
DECL_HANDLER ( get_token_info )
2007-02-21 18:10:45 +01:00
{
struct token * token ;
2021-02-17 17:10:15 +01:00
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle , TOKEN_QUERY , & token_ops ) ) )
2007-09-13 17:47:56 +02:00
{
reply - > token_id = token - > token_id ;
reply - > modified_id = token - > modified_id ;
2021-07-01 16:22:26 +02:00
reply - > session_id = token - > session_id ;
2007-09-13 17:47:56 +02:00
reply - > primary = token - > primary ;
reply - > impersonation_level = token - > impersonation_level ;
2021-02-17 17:10:15 +01:00
reply - > elevation = token - > elevation ;
2007-09-13 17:47:56 +02:00
reply - > group_count = list_count ( & token - > groups ) ;
reply - > privilege_count = list_count ( & token - > privileges ) ;
release_object ( token ) ;
}
}
2009-04-21 09:53:16 +02:00
DECL_HANDLER ( get_token_default_dacl )
{
struct token * token ;
reply - > acl_len = 0 ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
if ( token - > default_dacl )
2022-01-25 12:10:40 +01:00
reply - > acl_len = token - > default_dacl - > size ;
2009-04-21 09:53:16 +02:00
if ( reply - > acl_len < = get_reply_max_size ( ) )
{
2022-01-25 12:10:40 +01:00
struct acl * acl_reply = set_reply_data_size ( reply - > acl_len ) ;
2009-04-21 09:53:16 +02:00
if ( acl_reply )
memcpy ( acl_reply , token - > default_dacl , reply - > acl_len ) ;
}
else set_error ( STATUS_BUFFER_TOO_SMALL ) ;
release_object ( token ) ;
}
}
DECL_HANDLER ( set_token_default_dacl )
{
struct token * token ;
2022-01-25 12:10:40 +01:00
const struct acl * acl = get_req_data ( ) ;
unsigned int acl_size = get_req_data_size ( ) ;
if ( acl_size & & ! acl_is_valid ( acl , acl_size ) )
{
set_error ( STATUS_INVALID_ACL ) ;
return ;
}
2009-04-21 09:53:16 +02:00
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_ADJUST_DEFAULT ,
& token_ops ) ) )
{
free ( token - > default_dacl ) ;
token - > default_dacl = NULL ;
if ( acl_size )
token - > default_dacl = memdup ( acl , acl_size ) ;
release_object ( token ) ;
}
}
2021-02-17 06:31:11 +01:00
2021-02-17 06:31:12 +01:00
DECL_HANDLER ( create_linked_token )
{
struct token * token , * linked ;
int elevation ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY , & token_ops ) ) )
{
switch ( token - > elevation )
{
case TokenElevationTypeFull :
elevation = TokenElevationTypeLimited ;
break ;
case TokenElevationTypeLimited :
elevation = TokenElevationTypeFull ;
break ;
default :
release_object ( token ) ;
return ;
}
2021-07-01 16:20:08 +02:00
if ( ( linked = token_create_admin ( FALSE , SecurityIdentification , elevation , token - > session_id ) ) )
2021-02-17 06:31:12 +01:00
{
reply - > linked = alloc_handle ( current - > process , linked , TOKEN_ALL_ACCESS , 0 ) ;
release_object ( linked ) ;
}
release_object ( token ) ;
}
}