2003-07-24 02:07:00 +02:00
/*
* Tokens
*
* Copyright ( C ) 1998 Alexandre Julliard
* Copyright ( C ) 2003 Mike McCormack
2005-04-22 23:17:15 +02:00
* Copyright ( C ) 2005 Robert Shearman
2003-07-24 02:07:00 +02:00
*
* This library is free software ; you can redistribute it and / or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation ; either
* version 2.1 of the License , or ( at your option ) any later version .
*
* This library is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
* Lesser General Public License for more details .
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library ; if not , write to the Free Software
2006-05-18 14:49:52 +02:00
* Foundation , Inc . , 51 Franklin St , Fifth Floor , Boston , MA 02110 - 1301 , USA
2003-07-24 02:07:00 +02:00
*/
# include "config.h"
# include <assert.h>
# include <stdio.h>
# include <stdlib.h>
2005-11-28 17:32:54 +01:00
# include <stdarg.h>
2007-10-03 14:09:33 +02:00
# include <unistd.h>
2003-07-24 02:07:00 +02:00
2005-11-28 17:32:54 +01:00
# include "ntstatus.h"
# define WIN32_NO_STATUS
2003-07-24 02:07:00 +02:00
# include "windef.h"
2005-11-28 17:32:54 +01:00
# include "winternl.h"
2003-07-24 02:07:00 +02:00
# include "handle.h"
# include "thread.h"
# include "process.h"
# include "request.h"
2005-04-22 23:17:15 +02:00
# include "security.h"
2005-07-18 15:22:55 +02:00
# include "wine/unicode.h"
2005-05-16 19:52:46 +02:00
# define MAX_SUBAUTH_COUNT 1
2005-04-22 23:17:15 +02:00
const LUID SeIncreaseQuotaPrivilege = { 5 , 0 } ;
const LUID SeSecurityPrivilege = { 8 , 0 } ;
const LUID SeTakeOwnershipPrivilege = { 9 , 0 } ;
const LUID SeLoadDriverPrivilege = { 10 , 0 } ;
const LUID SeSystemProfilePrivilege = { 11 , 0 } ;
const LUID SeSystemtimePrivilege = { 12 , 0 } ;
const LUID SeProfileSingleProcessPrivilege = { 13 , 0 } ;
const LUID SeIncreaseBasePriorityPrivilege = { 14 , 0 } ;
const LUID SeCreatePagefilePrivilege = { 15 , 0 } ;
const LUID SeBackupPrivilege = { 17 , 0 } ;
const LUID SeRestorePrivilege = { 18 , 0 } ;
const LUID SeShutdownPrivilege = { 19 , 0 } ;
const LUID SeDebugPrivilege = { 20 , 0 } ;
const LUID SeSystemEnvironmentPrivilege = { 22 , 0 } ;
const LUID SeChangeNotifyPrivilege = { 23 , 0 } ;
const LUID SeRemoteShutdownPrivilege = { 24 , 0 } ;
const LUID SeUndockPrivilege = { 25 , 0 } ;
const LUID SeManageVolumePrivilege = { 28 , 0 } ;
const LUID SeImpersonatePrivilege = { 29 , 0 } ;
const LUID SeCreateGlobalPrivilege = { 30 , 0 } ;
2003-07-24 02:07:00 +02:00
2005-06-09 11:47:28 +02:00
static const SID world_sid = { SID_REVISION , 1 , { SECURITY_WORLD_SID_AUTHORITY } , { SECURITY_WORLD_RID } } ;
static const SID local_sid = { SID_REVISION , 1 , { SECURITY_LOCAL_SID_AUTHORITY } , { SECURITY_LOCAL_RID } } ;
static const SID interactive_sid = { SID_REVISION , 1 , { SECURITY_NT_AUTHORITY } , { SECURITY_INTERACTIVE_RID } } ;
2007-10-03 14:09:33 +02:00
static const SID anonymous_logon_sid = { SID_REVISION , 1 , { SECURITY_NT_AUTHORITY } , { SECURITY_ANONYMOUS_LOGON_RID } } ;
2005-06-09 11:47:28 +02:00
static const SID authenticated_user_sid = { SID_REVISION , 1 , { SECURITY_NT_AUTHORITY } , { SECURITY_AUTHENTICATED_USER_RID } } ;
static const SID local_system_sid = { SID_REVISION , 1 , { SECURITY_NT_AUTHORITY } , { SECURITY_LOCAL_SYSTEM_RID } } ;
2007-10-03 21:19:05 +02:00
const PSID security_world_sid = ( PSID ) & world_sid ;
2005-07-18 15:22:55 +02:00
static const PSID security_local_sid = ( PSID ) & local_sid ;
const PSID security_interactive_sid = ( PSID ) & interactive_sid ;
static const PSID security_authenticated_user_sid = ( PSID ) & authenticated_user_sid ;
2007-10-03 21:19:05 +02:00
const PSID security_local_system_sid = ( PSID ) & local_system_sid ;
2005-06-09 11:47:28 +02:00
2007-03-07 12:43:12 +01:00
static luid_t prev_luid_value = { 1000 , 0 } ;
2007-02-16 00:20:48 +01:00
2003-07-24 02:07:00 +02:00
struct token
{
struct object obj ; /* object header */
2007-03-07 12:43:12 +01:00
luid_t token_id ; /* system-unique id of token */
luid_t modified_id ; /* new id allocated every time token is modified */
2005-02-11 12:52:06 +01:00
struct list privileges ; /* privileges available to the token */
2005-05-24 14:32:18 +02:00
struct list groups ; /* groups that the user of this token belongs to (sid_and_attributes) */
2005-05-16 19:52:46 +02:00
SID * user ; /* SID of user this token represents */
2007-02-09 17:24:53 +01:00
SID * primary_group ; /* SID of user's primary group */
2005-06-14 20:10:04 +02:00
unsigned primary ; /* is this a primary or impersonation token? */
2005-07-13 21:31:27 +02:00
ACL * default_dacl ; /* the default DACL to assign to objects created by this user */
2006-03-29 19:37:39 +02:00
TOKEN_SOURCE source ; /* source of the token */
2007-02-16 00:21:40 +01:00
SECURITY_IMPERSONATION_LEVEL impersonation_level ; /* impersonation level this token is capable of if non-primary token */
2005-02-11 12:52:06 +01:00
} ;
struct privilege
{
struct list entry ;
LUID luid ;
2005-05-09 11:26:28 +02:00
unsigned enabled : 1 ; /* is the privilege currently enabled? */
unsigned def : 1 ; /* is the privilege enabled by default? */
2003-07-24 02:07:00 +02:00
} ;
2006-05-13 17:58:19 +02:00
struct group
2005-05-24 14:32:18 +02:00
{
struct list entry ;
2005-06-09 11:47:28 +02:00
unsigned enabled : 1 ; /* is the sid currently enabled? */
unsigned def : 1 ; /* is the sid enabled by default? */
unsigned logon : 1 ; /* is this a logon sid? */
unsigned mandatory : 1 ; /* is this sid always enabled? */
unsigned owner : 1 ; /* can this sid be an owner of an object? */
unsigned resource : 1 ; /* is this a domain-local group? */
unsigned deny_only : 1 ; /* is this a sid that should be use for denying only? */
2005-05-24 14:32:18 +02:00
SID sid ;
} ;
2003-07-24 02:07:00 +02:00
static void token_dump ( struct object * obj , int verbose ) ;
2005-12-12 15:01:08 +01:00
static unsigned int token_map_access ( struct object * obj , unsigned int access ) ;
2005-02-11 12:52:06 +01:00
static void token_destroy ( struct object * obj ) ;
2003-07-24 02:07:00 +02:00
static const struct object_ops token_ops =
{
sizeof ( struct token ) , /* size */
token_dump , /* dump */
no_add_queue , /* add_queue */
NULL , /* remove_queue */
NULL , /* signaled */
2005-04-24 19:35:52 +02:00
NULL , /* satisfied */
no_signal , /* signal */
2003-07-24 02:07:00 +02:00
no_get_fd , /* get_fd */
2005-12-12 15:01:08 +01:00
token_map_access , /* map_access */
2007-10-03 14:10:37 +02:00
default_get_sd , /* get_sd */
default_set_sd , /* set_sd */
2005-11-22 15:55:42 +01:00
no_lookup_name , /* lookup_name */
2007-03-22 11:44:29 +01:00
no_open_file , /* open_file */
2005-06-09 17:39:52 +02:00
no_close_handle , /* close_handle */
2005-02-11 12:52:06 +01:00
token_destroy /* destroy */
2003-07-24 02:07:00 +02:00
} ;
static void token_dump ( struct object * obj , int verbose )
{
fprintf ( stderr , " Security token \n " ) ;
2005-05-24 14:32:18 +02:00
/* FIXME: dump token members */
2003-07-24 02:07:00 +02:00
}
2005-12-12 15:01:08 +01:00
static unsigned int token_map_access ( struct object * obj , unsigned int access )
{
if ( access & GENERIC_READ ) access | = TOKEN_READ ;
if ( access & GENERIC_WRITE ) access | = TOKEN_WRITE ;
if ( access & GENERIC_EXECUTE ) access | = STANDARD_RIGHTS_EXECUTE ;
if ( access & GENERIC_ALL ) access | = TOKEN_ALL_ACCESS ;
return access & ~ ( GENERIC_READ | GENERIC_WRITE | GENERIC_EXECUTE | GENERIC_ALL ) ;
}
2005-05-16 19:52:46 +02:00
static SID * security_sid_alloc ( const SID_IDENTIFIER_AUTHORITY * idauthority , int subauthcount , const unsigned int subauth [ ] )
{
int i ;
SID * sid = mem_alloc ( FIELD_OFFSET ( SID , SubAuthority [ subauthcount ] ) ) ;
if ( ! sid ) return NULL ;
2005-06-09 11:47:28 +02:00
sid - > Revision = SID_REVISION ;
2005-05-16 19:52:46 +02:00
sid - > SubAuthorityCount = subauthcount ;
sid - > IdentifierAuthority = * idauthority ;
for ( i = 0 ; i < subauthcount ; i + + )
sid - > SubAuthority [ i ] = subauth [ i ] ;
return sid ;
}
2005-06-20 15:18:38 +02:00
void security_set_thread_token ( struct thread * thread , obj_handle_t handle )
{
if ( ! handle )
{
if ( thread - > token )
release_object ( thread - > token ) ;
thread - > token = NULL ;
}
else
{
struct token * token = ( struct token * ) get_handle_obj ( current - > process ,
handle ,
TOKEN_IMPERSONATE ,
& token_ops ) ;
if ( token )
{
if ( thread - > token )
release_object ( thread - > token ) ;
thread - > token = token ;
}
}
}
2007-10-03 14:09:33 +02:00
const SID * security_unix_uid_to_sid ( uid_t uid )
{
/* very simple mapping: either the current user or not the current user */
if ( uid = = getuid ( ) )
return & interactive_sid ;
else
return & anonymous_logon_sid ;
}
2006-07-26 10:43:25 +02:00
static int acl_is_valid ( const ACL * acl , data_size_t size )
2005-05-24 14:32:18 +02:00
{
ULONG i ;
const ACE_HEADER * ace ;
if ( size < sizeof ( ACL ) )
return FALSE ;
size = min ( size , MAX_ACL_LEN ) ;
size - = sizeof ( ACL ) ;
ace = ( const ACE_HEADER * ) ( acl + 1 ) ;
for ( i = 0 ; i < acl - > AceCount ; i + + )
{
const SID * sid ;
2006-07-26 10:43:25 +02:00
data_size_t sid_size ;
2005-05-24 14:32:18 +02:00
if ( size < sizeof ( ACE_HEADER ) )
return FALSE ;
if ( size < ace - > AceSize )
return FALSE ;
size - = ace - > AceSize ;
switch ( ace - > AceType )
{
case ACCESS_DENIED_ACE_TYPE :
sid = ( const SID * ) & ( ( const ACCESS_DENIED_ACE * ) ace ) - > SidStart ;
2005-06-14 21:15:58 +02:00
sid_size = ace - > AceSize - FIELD_OFFSET ( ACCESS_DENIED_ACE , SidStart ) ;
2005-05-24 14:32:18 +02:00
break ;
case ACCESS_ALLOWED_ACE_TYPE :
sid = ( const SID * ) & ( ( const ACCESS_ALLOWED_ACE * ) ace ) - > SidStart ;
2005-06-14 21:15:58 +02:00
sid_size = ace - > AceSize - FIELD_OFFSET ( ACCESS_ALLOWED_ACE , SidStart ) ;
2005-05-24 14:32:18 +02:00
break ;
case SYSTEM_AUDIT_ACE_TYPE :
sid = ( const SID * ) & ( ( const SYSTEM_AUDIT_ACE * ) ace ) - > SidStart ;
2005-06-14 21:15:58 +02:00
sid_size = ace - > AceSize - FIELD_OFFSET ( SYSTEM_AUDIT_ACE , SidStart ) ;
2005-05-24 14:32:18 +02:00
break ;
case SYSTEM_ALARM_ACE_TYPE :
sid = ( const SID * ) & ( ( const SYSTEM_ALARM_ACE * ) ace ) - > SidStart ;
2005-06-14 21:15:58 +02:00
sid_size = ace - > AceSize - FIELD_OFFSET ( SYSTEM_ALARM_ACE , SidStart ) ;
2005-05-24 14:32:18 +02:00
break ;
default :
return FALSE ;
}
2005-06-14 21:15:58 +02:00
if ( sid_size < FIELD_OFFSET ( SID , SubAuthority [ 0 ] ) | |
sid_size < FIELD_OFFSET ( SID , SubAuthority [ sid - > SubAuthorityCount ] ) )
2005-05-24 14:32:18 +02:00
return FALSE ;
ace = ace_next ( ace ) ;
}
return TRUE ;
}
/* checks whether all members of a security descriptor fit inside the size
* of memory specified */
2007-10-02 16:54:51 +02:00
int sd_is_valid ( const struct security_descriptor * sd , data_size_t size )
2005-05-24 14:32:18 +02:00
{
size_t offset = sizeof ( struct security_descriptor ) ;
const SID * group ;
const SID * owner ;
const ACL * sacl ;
const ACL * dacl ;
int dummy ;
if ( size < offset )
return FALSE ;
if ( ( sd - > owner_len > = FIELD_OFFSET ( SID , SubAuthority [ 255 ] ) ) | |
( offset + sd - > owner_len > size ) )
return FALSE ;
owner = sd_get_owner ( sd ) ;
if ( owner )
{
size_t needed_size = FIELD_OFFSET ( SID , SubAuthority [ owner - > SubAuthorityCount ] ) ;
if ( ( sd - > owner_len < sizeof ( SID ) ) | | ( needed_size > sd - > owner_len ) )
return FALSE ;
}
offset + = sd - > owner_len ;
if ( ( sd - > group_len > = FIELD_OFFSET ( SID , SubAuthority [ 255 ] ) ) | |
( offset + sd - > group_len > size ) )
return FALSE ;
group = sd_get_group ( sd ) ;
if ( group )
{
size_t needed_size = FIELD_OFFSET ( SID , SubAuthority [ group - > SubAuthorityCount ] ) ;
2007-02-08 05:11:18 +01:00
if ( ( sd - > group_len < sizeof ( SID ) ) | | ( needed_size > sd - > group_len ) )
2005-05-24 14:32:18 +02:00
return FALSE ;
}
offset + = sd - > group_len ;
if ( ( sd - > sacl_len > = MAX_ACL_LEN ) | | ( offset + sd - > sacl_len > size ) )
return FALSE ;
sacl = sd_get_sacl ( sd , & dummy ) ;
if ( sacl & & ! acl_is_valid ( sacl , sd - > sacl_len ) )
return FALSE ;
offset + = sd - > sacl_len ;
if ( ( sd - > dacl_len > = MAX_ACL_LEN ) | | ( offset + sd - > dacl_len > size ) )
return FALSE ;
dacl = sd_get_dacl ( sd , & dummy ) ;
if ( dacl & & ! acl_is_valid ( dacl , sd - > dacl_len ) )
return FALSE ;
offset + = sd - > dacl_len ;
return TRUE ;
}
2007-10-24 17:04:42 +02:00
/* determines whether an object_attributes struct is valid in a buffer
* and calls set_error appropriately */
int objattr_is_valid ( const struct object_attributes * objattr , data_size_t size )
{
if ( ( size < sizeof ( * objattr ) ) | | ( size - sizeof ( * objattr ) < objattr - > sd_len ) )
{
set_error ( STATUS_ACCESS_VIOLATION ) ;
return FALSE ;
}
if ( objattr - > sd_len )
{
const struct security_descriptor * sd = ( const struct security_descriptor * ) ( objattr + 1 ) ;
if ( ! sd_is_valid ( sd , objattr - > sd_len ) )
{
set_error ( STATUS_INVALID_SECURITY_DESCR ) ;
return FALSE ;
}
}
return TRUE ;
}
2005-05-24 14:32:18 +02:00
/* maps from generic rights to specific rights as given by a mapping */
static inline void map_generic_mask ( unsigned int * mask , const GENERIC_MAPPING * mapping )
{
if ( * mask & GENERIC_READ ) * mask | = mapping - > GenericRead ;
if ( * mask & GENERIC_WRITE ) * mask | = mapping - > GenericWrite ;
if ( * mask & GENERIC_EXECUTE ) * mask | = mapping - > GenericExecute ;
if ( * mask & GENERIC_ALL ) * mask | = mapping - > GenericAll ;
* mask & = 0x0FFFFFFF ;
}
2005-02-11 12:52:06 +01:00
static inline int is_equal_luid ( const LUID * luid1 , const LUID * luid2 )
{
return ( luid1 - > LowPart = = luid2 - > LowPart & & luid1 - > HighPart = = luid2 - > HighPart ) ;
}
2007-03-07 12:43:12 +01:00
static inline void allocate_luid ( luid_t * luid )
2007-02-16 00:20:48 +01:00
{
2007-03-07 12:43:12 +01:00
prev_luid_value . low_part + + ;
2007-02-16 00:20:48 +01:00
* luid = prev_luid_value ;
}
2007-03-07 01:33:26 +01:00
DECL_HANDLER ( allocate_locally_unique_id )
{
2007-03-07 12:43:12 +01:00
allocate_luid ( & reply - > luid ) ;
2007-03-07 01:33:26 +01:00
}
2005-02-11 12:52:06 +01:00
static inline void luid_and_attr_from_privilege ( LUID_AND_ATTRIBUTES * out , const struct privilege * in )
{
out - > Luid = in - > luid ;
out - > Attributes =
( in - > enabled ? SE_PRIVILEGE_ENABLED : 0 ) |
( in - > def ? SE_PRIVILEGE_ENABLED_BY_DEFAULT : 0 ) ;
}
static struct privilege * privilege_add ( struct token * token , const LUID * luid , int enabled )
{
struct privilege * privilege = mem_alloc ( sizeof ( * privilege ) ) ;
if ( privilege )
{
privilege - > luid = * luid ;
privilege - > def = privilege - > enabled = ( enabled ! = 0 ) ;
list_add_tail ( & token - > privileges , & privilege - > entry ) ;
}
return privilege ;
}
2005-05-16 19:52:46 +02:00
static inline void privilege_remove ( struct privilege * privilege )
2005-02-11 12:52:06 +01:00
{
list_remove ( & privilege - > entry ) ;
free ( privilege ) ;
}
static void token_destroy ( struct object * obj )
{
struct token * token ;
struct list * cursor , * cursor_next ;
assert ( obj - > ops = = & token_ops ) ;
token = ( struct token * ) obj ;
2005-05-16 19:52:46 +02:00
free ( token - > user ) ;
2005-02-11 12:52:06 +01:00
LIST_FOR_EACH_SAFE ( cursor , cursor_next , & token - > privileges )
{
struct privilege * privilege = LIST_ENTRY ( cursor , struct privilege , entry ) ;
privilege_remove ( privilege ) ;
}
2005-05-24 14:32:18 +02:00
LIST_FOR_EACH_SAFE ( cursor , cursor_next , & token - > groups )
{
2006-05-13 17:58:19 +02:00
struct group * group = LIST_ENTRY ( cursor , struct group , entry ) ;
2005-05-24 14:32:18 +02:00
list_remove ( & group - > entry ) ;
free ( group ) ;
}
2005-07-13 21:31:27 +02:00
free ( token - > default_dacl ) ;
2005-02-11 12:52:06 +01:00
}
2005-07-13 21:31:27 +02:00
/* creates a new token.
* groups may be NULL if group_count is 0.
* privs may be NULL if priv_count is 0.
* default_dacl may be NULL , indicating that all objects created by the user
* are unsecured .
2007-02-16 00:20:48 +01:00
* modified_id may be NULL , indicating that a new modified_id luid should be
* allocated .
2005-07-13 21:31:27 +02:00
*/
2005-06-14 20:10:04 +02:00
static struct token * create_token ( unsigned primary , const SID * user ,
2005-06-09 11:47:28 +02:00
const SID_AND_ATTRIBUTES * groups , unsigned int group_count ,
2005-07-13 21:31:27 +02:00
const LUID_AND_ATTRIBUTES * privs , unsigned int priv_count ,
2007-02-16 00:20:48 +01:00
const ACL * default_dacl , TOKEN_SOURCE source ,
2007-03-07 12:43:12 +01:00
const luid_t * modified_id ,
2007-02-16 00:21:40 +01:00
SECURITY_IMPERSONATION_LEVEL impersonation_level )
2003-07-24 02:07:00 +02:00
{
struct token * token = alloc_object ( & token_ops ) ;
2005-02-11 12:52:06 +01:00
if ( token )
{
2006-07-25 10:30:04 +02:00
unsigned int i ;
2005-06-14 20:10:04 +02:00
2007-02-16 00:20:48 +01:00
allocate_luid ( & token - > token_id ) ;
if ( modified_id )
token - > modified_id = * modified_id ;
else
allocate_luid ( & token - > modified_id ) ;
2005-02-11 12:52:06 +01:00
list_init ( & token - > privileges ) ;
2005-05-24 14:32:18 +02:00
list_init ( & token - > groups ) ;
2005-06-14 20:10:04 +02:00
token - > primary = primary ;
2007-02-16 00:21:40 +01:00
/* primary tokens don't have impersonation levels */
if ( primary )
token - > impersonation_level = - 1 ;
else
token - > impersonation_level = impersonation_level ;
2007-01-25 07:43:30 +01:00
token - > default_dacl = NULL ;
2007-02-09 17:24:53 +01:00
token - > primary_group = NULL ;
2005-06-14 20:10:04 +02:00
2005-05-16 19:52:46 +02:00
/* copy user */
token - > user = memdup ( user , FIELD_OFFSET ( SID , SubAuthority [ user - > SubAuthorityCount ] ) ) ;
if ( ! token - > user )
{
release_object ( token ) ;
return NULL ;
}
2005-05-24 14:32:18 +02:00
2005-06-09 11:47:28 +02:00
/* copy groups */
for ( i = 0 ; i < group_count ; i + + )
{
2006-05-13 17:58:19 +02:00
size_t size = FIELD_OFFSET ( struct group , sid . SubAuthority [ ( ( const SID * ) groups [ i ] . Sid ) - > SubAuthorityCount ] ) ;
struct group * group = mem_alloc ( size ) ;
2006-04-07 12:16:28 +02:00
if ( ! group )
{
release_object ( token ) ;
return NULL ;
}
2005-06-09 11:47:28 +02:00
memcpy ( & group - > sid , groups [ i ] . Sid , FIELD_OFFSET ( SID , SubAuthority [ ( ( const SID * ) groups [ i ] . Sid ) - > SubAuthorityCount ] ) ) ;
group - > enabled = TRUE ;
group - > def = TRUE ;
group - > logon = FALSE ;
group - > mandatory = ( groups [ i ] . Attributes & SE_GROUP_MANDATORY ) ? TRUE : FALSE ;
2007-02-09 17:24:53 +01:00
group - > owner = groups [ i ] . Attributes & SE_GROUP_OWNER ? TRUE : FALSE ;
2005-06-09 11:47:28 +02:00
group - > resource = FALSE ;
group - > deny_only = FALSE ;
list_add_tail ( & token - > groups , & group - > entry ) ;
2007-02-09 17:24:53 +01:00
/* Use first owner capable group as an owner */
if ( ! token - > primary_group & & group - > owner )
token - > primary_group = & group - > sid ;
2005-06-09 11:47:28 +02:00
}
2005-05-24 14:32:18 +02:00
2005-05-16 19:52:46 +02:00
/* copy privileges */
2005-02-11 12:52:06 +01:00
for ( i = 0 ; i < priv_count ; i + + )
{
/* note: we don't check uniqueness: the caller must make sure
* privs doesn ' t contain any duplicate luids */
if ( ! privilege_add ( token , & privs [ i ] . Luid ,
privs [ i ] . Attributes & SE_PRIVILEGE_ENABLED ) )
{
release_object ( token ) ;
return NULL ;
}
}
2005-07-13 21:31:27 +02:00
if ( default_dacl )
{
token - > default_dacl = memdup ( default_dacl , default_dacl - > AclSize ) ;
if ( ! token - > default_dacl )
{
release_object ( token ) ;
return NULL ;
}
}
2006-03-29 19:37:39 +02:00
token - > source = source ;
2005-02-11 12:52:06 +01:00
}
2003-07-24 02:07:00 +02:00
return token ;
}
2007-05-28 19:39:33 +02:00
struct token * token_duplicate ( struct token * src_token , unsigned primary ,
SECURITY_IMPERSONATION_LEVEL impersonation_level )
{
const luid_t * modified_id =
primary | | ( impersonation_level = = src_token - > impersonation_level ) ?
& src_token - > modified_id : NULL ;
struct token * token = NULL ;
struct privilege * privilege ;
struct group * group ;
if ( ( impersonation_level < SecurityAnonymous ) | |
( impersonation_level > SecurityDelegation ) )
{
set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
return NULL ;
}
if ( primary | | ( impersonation_level < = src_token - > impersonation_level ) )
token = create_token ( primary , src_token - > user , NULL , 0 ,
NULL , 0 , src_token - > default_dacl ,
src_token - > source , modified_id ,
impersonation_level ) ;
else set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
if ( ! token ) return token ;
/* copy groups */
LIST_FOR_EACH_ENTRY ( group , & src_token - > groups , struct group , entry )
{
size_t size = FIELD_OFFSET ( struct group , sid . SubAuthority [ group - > sid . SubAuthorityCount ] ) ;
struct group * newgroup = mem_alloc ( size ) ;
if ( ! newgroup )
{
release_object ( token ) ;
return NULL ;
}
memcpy ( newgroup , group , size ) ;
list_add_tail ( & token - > groups , & newgroup - > entry ) ;
}
token - > primary_group = src_token - > primary_group ;
assert ( token - > primary_group ) ;
/* copy privileges */
LIST_FOR_EACH_ENTRY ( privilege , & src_token - > privileges , struct privilege , entry )
if ( ! privilege_add ( token , & privilege - > luid , privilege - > enabled ) )
{
release_object ( token ) ;
return NULL ;
}
return token ;
}
2005-07-13 21:31:27 +02:00
static ACL * create_default_dacl ( const SID * user )
{
ACCESS_ALLOWED_ACE * aaa ;
ACL * default_dacl ;
SID * sid ;
size_t default_dacl_size = sizeof ( ACL ) +
2 * ( sizeof ( ACCESS_ALLOWED_ACE ) - sizeof ( DWORD ) ) +
sizeof ( local_system_sid ) +
FIELD_OFFSET ( SID , SubAuthority [ user - > SubAuthorityCount ] ) ;
default_dacl = mem_alloc ( default_dacl_size ) ;
if ( ! default_dacl ) return NULL ;
2007-10-02 16:57:02 +02:00
default_dacl - > AclRevision = ACL_REVISION ;
2005-07-13 21:31:27 +02:00
default_dacl - > Sbz1 = 0 ;
default_dacl - > AclSize = default_dacl_size ;
default_dacl - > AceCount = 2 ;
default_dacl - > Sbz2 = 0 ;
/* GENERIC_ALL for Local System */
aaa = ( ACCESS_ALLOWED_ACE * ) ( default_dacl + 1 ) ;
aaa - > Header . AceType = ACCESS_ALLOWED_ACE_TYPE ;
aaa - > Header . AceFlags = 0 ;
aaa - > Header . AceSize = ( sizeof ( ACCESS_ALLOWED_ACE ) - sizeof ( DWORD ) ) +
sizeof ( local_system_sid ) ;
aaa - > Mask = GENERIC_ALL ;
sid = ( SID * ) & aaa - > SidStart ;
memcpy ( sid , & local_system_sid , sizeof ( local_system_sid ) ) ;
/* GENERIC_ALL for specified user */
2006-12-16 18:43:17 +01:00
aaa = ( ACCESS_ALLOWED_ACE * ) ( ( char * ) aaa + aaa - > Header . AceSize ) ;
2005-07-13 21:31:27 +02:00
aaa - > Header . AceType = ACCESS_ALLOWED_ACE_TYPE ;
aaa - > Header . AceFlags = 0 ;
aaa - > Header . AceSize = ( sizeof ( ACCESS_ALLOWED_ACE ) - sizeof ( DWORD ) ) +
FIELD_OFFSET ( SID , SubAuthority [ user - > SubAuthorityCount ] ) ;
aaa - > Mask = GENERIC_ALL ;
sid = ( SID * ) & aaa - > SidStart ;
memcpy ( sid , user , FIELD_OFFSET ( SID , SubAuthority [ user - > SubAuthorityCount ] ) ) ;
return default_dacl ;
}
2005-05-16 19:52:46 +02:00
struct sid_data
{
SID_IDENTIFIER_AUTHORITY idauth ;
int count ;
unsigned int subauth [ MAX_SUBAUTH_COUNT ] ;
} ;
2005-04-22 23:17:15 +02:00
struct token * token_create_admin ( void )
2005-02-11 12:52:06 +01:00
{
2005-06-09 11:47:28 +02:00
struct token * token = NULL ;
static const SID_IDENTIFIER_AUTHORITY nt_authority = { SECURITY_NT_AUTHORITY } ;
static const unsigned int alias_admins_subauth [ ] = { SECURITY_BUILTIN_DOMAIN_RID , DOMAIN_ALIAS_RID_ADMINS } ;
static const unsigned int alias_users_subauth [ ] = { SECURITY_BUILTIN_DOMAIN_RID , DOMAIN_ALIAS_RID_USERS } ;
2007-05-18 11:51:50 +02:00
/* on Windows, this value changes every time the user logs on */
static const unsigned int logon_subauth [ ] = { SECURITY_LOGON_IDS_RID , 0 , 1 /* FIXME: should be randomly generated when tokens are inherited by new processes */ } ;
2005-06-09 11:47:28 +02:00
PSID alias_admins_sid ;
PSID alias_users_sid ;
2007-05-18 11:51:50 +02:00
PSID logon_sid ;
2007-01-19 20:28:59 +01:00
/* note: should be the owner specified in the token */
ACL * default_dacl = create_default_dacl ( & interactive_sid ) ;
2005-06-09 11:47:28 +02:00
alias_admins_sid = security_sid_alloc ( & nt_authority , sizeof ( alias_admins_subauth ) / sizeof ( alias_admins_subauth [ 0 ] ) ,
alias_admins_subauth ) ;
alias_users_sid = security_sid_alloc ( & nt_authority , sizeof ( alias_users_subauth ) / sizeof ( alias_users_subauth [ 0 ] ) ,
alias_users_subauth ) ;
2007-05-18 11:51:50 +02:00
logon_sid = security_sid_alloc ( & nt_authority , sizeof ( logon_subauth ) / sizeof ( logon_subauth [ 0 ] ) ,
logon_subauth ) ;
2005-06-09 11:47:28 +02:00
2007-05-18 11:51:50 +02:00
if ( alias_admins_sid & & alias_users_sid & & logon_sid & & default_dacl )
2005-05-16 19:52:46 +02:00
{
2005-06-09 11:47:28 +02:00
const LUID_AND_ATTRIBUTES admin_privs [ ] =
{
{ SeChangeNotifyPrivilege , SE_PRIVILEGE_ENABLED } ,
{ SeSecurityPrivilege , 0 } ,
{ SeBackupPrivilege , 0 } ,
{ SeRestorePrivilege , 0 } ,
{ SeSystemtimePrivilege , 0 } ,
{ SeShutdownPrivilege , 0 } ,
{ SeRemoteShutdownPrivilege , 0 } ,
{ SeTakeOwnershipPrivilege , 0 } ,
{ SeDebugPrivilege , 0 } ,
{ SeSystemEnvironmentPrivilege , 0 } ,
{ SeSystemProfilePrivilege , 0 } ,
{ SeProfileSingleProcessPrivilege , 0 } ,
{ SeIncreaseBasePriorityPrivilege , 0 } ,
2007-07-27 02:05:04 +02:00
{ SeLoadDriverPrivilege , SE_PRIVILEGE_ENABLED } ,
2005-06-09 11:47:28 +02:00
{ SeCreatePagefilePrivilege , 0 } ,
{ SeIncreaseQuotaPrivilege , 0 } ,
{ SeUndockPrivilege , 0 } ,
{ SeManageVolumePrivilege , 0 } ,
{ SeImpersonatePrivilege , SE_PRIVILEGE_ENABLED } ,
{ SeCreateGlobalPrivilege , SE_PRIVILEGE_ENABLED } ,
} ;
/* note: we don't include non-builtin groups here for the user -
* telling us these is the job of a client - side program */
const SID_AND_ATTRIBUTES admin_groups [ ] =
{
{ security_world_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ security_local_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ security_interactive_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
{ security_authenticated_user_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
2007-02-09 17:24:53 +01:00
{ alias_admins_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY | SE_GROUP_OWNER } ,
2005-06-09 11:47:28 +02:00
{ alias_users_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY } ,
2007-05-18 11:51:50 +02:00
{ logon_sid , SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY | SE_GROUP_LOGON_ID } ,
2005-06-09 11:47:28 +02:00
} ;
2006-03-29 19:37:39 +02:00
static const TOKEN_SOURCE admin_source = { " SeMgr " , { 0 , 0 } } ;
2007-10-03 14:09:33 +02:00
token = create_token ( TRUE , security_unix_uid_to_sid ( getuid ( ) ) ,
2005-06-09 11:47:28 +02:00
admin_groups , sizeof ( admin_groups ) / sizeof ( admin_groups [ 0 ] ) ,
2005-07-13 21:31:27 +02:00
admin_privs , sizeof ( admin_privs ) / sizeof ( admin_privs [ 0 ] ) ,
2007-02-16 00:21:40 +01:00
default_dacl , admin_source , NULL , - 1 ) ;
2007-02-09 17:24:53 +01:00
/* we really need a primary group */
assert ( token - > primary_group ) ;
2005-06-09 11:47:28 +02:00
}
2007-05-18 11:51:50 +02:00
free ( logon_sid ) ;
2006-10-09 23:34:36 +02:00
free ( alias_admins_sid ) ;
free ( alias_users_sid ) ;
free ( default_dacl ) ;
2005-06-09 11:47:28 +02:00
2005-05-16 19:52:46 +02:00
return token ;
2005-02-11 12:52:06 +01:00
}
2005-07-13 21:31:27 +02:00
static struct privilege * token_find_privilege ( struct token * token , const LUID * luid , int enabled_only )
2005-02-11 12:52:06 +01:00
{
struct privilege * privilege ;
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
{
if ( is_equal_luid ( luid , & privilege - > luid ) )
{
if ( enabled_only & & ! privilege - > enabled )
return NULL ;
return privilege ;
}
}
return NULL ;
}
static unsigned int token_adjust_privileges ( struct token * token , const LUID_AND_ATTRIBUTES * privs ,
unsigned int count , LUID_AND_ATTRIBUTES * mod_privs ,
2005-07-13 21:31:27 +02:00
unsigned int mod_privs_count )
2005-02-11 12:52:06 +01:00
{
2006-07-25 10:30:04 +02:00
unsigned int i , modified_count = 0 ;
2005-02-11 12:52:06 +01:00
2007-02-16 00:20:48 +01:00
/* mark as modified */
allocate_luid ( & token - > modified_id ) ;
2005-02-11 12:52:06 +01:00
for ( i = 0 ; i < count ; i + + )
{
struct privilege * privilege =
token_find_privilege ( token , & privs [ i ] . Luid , FALSE ) ;
if ( ! privilege )
{
set_error ( STATUS_NOT_ALL_ASSIGNED ) ;
continue ;
}
if ( privs [ i ] . Attributes & SE_PRIVILEGE_REMOVE )
privilege_remove ( privilege ) ;
else
{
/* save previous state for caller */
if ( mod_privs_count )
{
luid_and_attr_from_privilege ( mod_privs , privilege ) ;
mod_privs + + ;
mod_privs_count - - ;
modified_count + + ;
}
if ( privs [ i ] . Attributes & SE_PRIVILEGE_ENABLED )
privilege - > enabled = TRUE ;
else
privilege - > enabled = FALSE ;
}
}
return modified_count ;
}
static void token_disable_privileges ( struct token * token )
{
struct privilege * privilege ;
2007-02-16 00:20:48 +01:00
/* mark as modified */
allocate_luid ( & token - > modified_id ) ;
2005-02-11 12:52:06 +01:00
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
privilege - > enabled = FALSE ;
}
2005-04-22 23:17:15 +02:00
int token_check_privileges ( struct token * token , int all_required ,
const LUID_AND_ATTRIBUTES * reqprivs ,
unsigned int count , LUID_AND_ATTRIBUTES * usedprivs )
{
2006-07-25 10:30:04 +02:00
unsigned int i , enabled_count = 0 ;
2005-04-22 23:17:15 +02:00
for ( i = 0 ; i < count ; i + + )
{
struct privilege * privilege =
token_find_privilege ( token , & reqprivs [ i ] . Luid , TRUE ) ;
if ( usedprivs )
usedprivs [ i ] = reqprivs [ i ] ;
if ( privilege & & privilege - > enabled )
{
enabled_count + + ;
if ( usedprivs )
usedprivs [ i ] . Attributes | = SE_PRIVILEGE_USED_FOR_ACCESS ;
}
}
if ( all_required )
return ( enabled_count = = count ) ;
else
return ( enabled_count > 0 ) ;
}
2005-05-24 14:32:18 +02:00
static int token_sid_present ( struct token * token , const SID * sid , int deny )
{
2006-05-13 17:58:19 +02:00
struct group * group ;
2005-05-24 14:32:18 +02:00
if ( security_equal_sid ( token - > user , sid ) ) return TRUE ;
2006-05-13 17:58:19 +02:00
LIST_FOR_EACH_ENTRY ( group , & token - > groups , struct group , entry )
2005-05-24 14:32:18 +02:00
{
if ( ! group - > enabled ) continue ;
if ( group - > deny_only & & ! deny ) continue ;
if ( security_equal_sid ( & group - > sid , sid ) ) return TRUE ;
}
return FALSE ;
}
2007-01-25 07:42:15 +01:00
/* Checks access to a security descriptor. 'sd' must have been validated by
* caller . It returns STATUS_SUCCESS if call succeeded or an error indicating
* the reason . ' status ' parameter will indicate if access is granted or denied .
*
* If both returned value and ' status ' are STATUS_SUCCESS then access is granted .
*/
2005-05-24 14:32:18 +02:00
static unsigned int token_access_check ( struct token * token ,
const struct security_descriptor * sd ,
unsigned int desired_access ,
LUID_AND_ATTRIBUTES * privs ,
unsigned int * priv_count ,
const GENERIC_MAPPING * mapping ,
unsigned int * granted_access ,
unsigned int * status )
{
unsigned int current_access = 0 ;
unsigned int denied_access = 0 ;
ULONG i ;
const ACL * dacl ;
int dacl_present ;
const ACE_HEADER * ace ;
const SID * owner ;
2007-01-25 07:42:15 +01:00
/* assume no access rights */
2005-05-24 14:32:18 +02:00
* granted_access = 0 ;
/* fail if desired_access contains generic rights */
if ( desired_access & ( GENERIC_READ | GENERIC_WRITE | GENERIC_EXECUTE | GENERIC_ALL ) )
{
* priv_count = 0 ;
2007-01-25 07:42:15 +01:00
return STATUS_GENERIC_NOT_MAPPED ;
2005-05-24 14:32:18 +02:00
}
dacl = sd_get_dacl ( sd , & dacl_present ) ;
owner = sd_get_owner ( sd ) ;
if ( ! owner | | ! sd_get_group ( sd ) )
{
* priv_count = 0 ;
2007-01-25 07:42:15 +01:00
return STATUS_INVALID_SECURITY_DESCR ;
2005-05-24 14:32:18 +02:00
}
/* 1: Grant desired access if the object is unprotected */
2007-10-16 10:50:50 +02:00
if ( ! dacl_present | | ! dacl )
2005-05-24 14:32:18 +02:00
{
* priv_count = 0 ;
* granted_access = desired_access ;
2007-01-25 07:42:15 +01:00
return * status = STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
/* 2: Check if caller wants access to system security part. Note: access
* is only granted if specifically asked for */
if ( desired_access & ACCESS_SYSTEM_SECURITY )
{
const LUID_AND_ATTRIBUTES security_priv = { SeSecurityPrivilege , 0 } ;
LUID_AND_ATTRIBUTES retpriv = security_priv ;
if ( token_check_privileges ( token , TRUE , & security_priv , 1 , & retpriv ) )
{
if ( priv_count )
{
/* assumes that there will only be one privilege to return */
if ( * priv_count > = 1 )
{
* priv_count = 1 ;
* privs = retpriv ;
}
else
{
* priv_count = 1 ;
return STATUS_BUFFER_TOO_SMALL ;
}
}
current_access | = ACCESS_SYSTEM_SECURITY ;
if ( desired_access = = current_access )
{
* granted_access = current_access ;
2007-01-25 07:42:15 +01:00
return * status = STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
}
else
{
* priv_count = 0 ;
2007-01-25 07:42:15 +01:00
* status = STATUS_PRIVILEGE_NOT_HELD ;
return STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
}
else if ( priv_count ) * priv_count = 0 ;
/* 3: Check whether the token is the owner */
/* NOTE: SeTakeOwnershipPrivilege is not checked for here - it is instead
* checked when a " set owner " call is made , overriding the access rights
* determined here . */
if ( token_sid_present ( token , owner , FALSE ) )
{
current_access | = ( READ_CONTROL | WRITE_DAC ) ;
if ( desired_access = = current_access )
{
* granted_access = current_access ;
2007-01-25 07:42:15 +01:00
return * status = STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
}
/* 4: Grant rights according to the DACL */
ace = ( const ACE_HEADER * ) ( dacl + 1 ) ;
2007-10-25 17:19:54 +02:00
for ( i = 0 ; i < dacl - > AceCount ; i + + , ace = ace_next ( ace ) )
2005-05-24 14:32:18 +02:00
{
const ACCESS_ALLOWED_ACE * aa_ace ;
const ACCESS_DENIED_ACE * ad_ace ;
const SID * sid ;
2007-10-25 17:19:54 +02:00
if ( ace - > AceFlags & INHERIT_ONLY_ACE )
continue ;
2005-05-24 14:32:18 +02:00
switch ( ace - > AceType )
{
case ACCESS_DENIED_ACE_TYPE :
ad_ace = ( const ACCESS_DENIED_ACE * ) ace ;
sid = ( const SID * ) & ad_ace - > SidStart ;
if ( token_sid_present ( token , sid , TRUE ) )
{
unsigned int access = ad_ace - > Mask ;
map_generic_mask ( & access , mapping ) ;
if ( desired_access & MAXIMUM_ALLOWED )
denied_access | = access ;
else
{
denied_access | = ( access & ~ current_access ) ;
2007-01-25 07:42:15 +01:00
if ( desired_access & access ) goto done ;
2005-05-24 14:32:18 +02:00
}
}
break ;
case ACCESS_ALLOWED_ACE_TYPE :
aa_ace = ( const ACCESS_ALLOWED_ACE * ) ace ;
sid = ( const SID * ) & aa_ace - > SidStart ;
if ( token_sid_present ( token , sid , FALSE ) )
{
unsigned int access = aa_ace - > Mask ;
map_generic_mask ( & access , mapping ) ;
if ( desired_access & MAXIMUM_ALLOWED )
current_access | = access ;
else
current_access | = ( access & ~ denied_access ) ;
}
break ;
}
/* don't bother carrying on checking if we've already got all of
* rights we need */
if ( desired_access = = * granted_access )
break ;
}
2007-01-25 07:42:15 +01:00
done :
2005-05-24 14:32:18 +02:00
if ( desired_access & MAXIMUM_ALLOWED )
* granted_access = current_access & ~ denied_access ;
else
if ( ( current_access & desired_access ) = = desired_access )
* granted_access = current_access & desired_access ;
else
2007-01-25 07:42:15 +01:00
* granted_access = 0 ;
* status = * granted_access ? STATUS_SUCCESS : STATUS_ACCESS_DENIED ;
return STATUS_SUCCESS ;
2005-05-24 14:32:18 +02:00
}
2005-07-13 21:31:27 +02:00
const ACL * token_get_default_dacl ( struct token * token )
{
return token - > default_dacl ;
}
2007-10-02 16:54:51 +02:00
const SID * token_get_user ( struct token * token )
2007-02-08 05:43:11 +01:00
{
2007-10-02 16:54:51 +02:00
return token - > user ;
}
2007-02-08 05:43:11 +01:00
2007-10-02 16:54:51 +02:00
const SID * token_get_primary_group ( struct token * token )
{
return token - > primary_group ;
2007-02-08 05:43:11 +01:00
}
2007-02-21 14:59:59 +01:00
int check_object_access ( struct object * obj , unsigned int * access )
{
GENERIC_MAPPING mapping ;
struct token * token = current - > token ? current - > token : current - > process - > token ;
LUID_AND_ATTRIBUTES priv ;
unsigned int status , priv_count = 1 ;
int res ;
mapping . GenericAll = obj - > ops - > map_access ( obj , GENERIC_ALL ) ;
if ( ! obj - > sd )
{
if ( * access & MAXIMUM_ALLOWED )
* access = mapping . GenericAll ;
return TRUE ;
}
mapping . GenericRead = obj - > ops - > map_access ( obj , GENERIC_READ ) ;
mapping . GenericWrite = obj - > ops - > map_access ( obj , GENERIC_WRITE ) ;
mapping . GenericExecute = obj - > ops - > map_access ( obj , GENERIC_EXECUTE ) ;
res = token_access_check ( token , obj - > sd , * access , & priv , & priv_count ,
& mapping , access , & status ) = = STATUS_SUCCESS & &
status = = STATUS_SUCCESS ;
if ( ! res ) set_error ( STATUS_ACCESS_DENIED ) ;
return res ;
}
2003-07-24 02:07:00 +02:00
/* open a security token */
DECL_HANDLER ( open_token )
{
2005-06-10 21:54:46 +02:00
if ( req - > flags & OPEN_TOKEN_THREAD )
2003-07-24 02:07:00 +02:00
{
struct thread * thread = get_thread_from_handle ( req - > handle , 0 ) ;
if ( thread )
{
if ( thread - > token )
2007-02-16 00:21:40 +01:00
{
if ( thread - > token - > impersonation_level < = SecurityAnonymous )
set_error ( STATUS_CANT_OPEN_ANONYMOUS ) ;
else
reply - > token = alloc_handle ( current - > process , thread - > token ,
req - > access , req - > attributes ) ;
}
2005-02-11 12:52:06 +01:00
else
2007-02-16 00:21:40 +01:00
set_error ( STATUS_NO_TOKEN ) ;
2003-07-24 02:07:00 +02:00
release_object ( thread ) ;
}
}
else
{
struct process * process = get_process_from_handle ( req - > handle , 0 ) ;
if ( process )
{
if ( process - > token )
2005-12-09 12:17:19 +01:00
reply - > token = alloc_handle ( current - > process , process - > token , req - > access ,
2005-12-09 13:58:25 +01:00
req - > attributes ) ;
2005-02-11 12:52:06 +01:00
else
2007-02-16 00:21:40 +01:00
set_error ( STATUS_NO_TOKEN ) ;
2003-07-24 02:07:00 +02:00
release_object ( process ) ;
}
}
}
2005-02-11 12:52:06 +01:00
/* adjust the privileges held by a token */
DECL_HANDLER ( adjust_token_privileges )
{
struct token * token ;
unsigned int access = TOKEN_ADJUST_PRIVILEGES ;
if ( req - > get_modified_state ) access | = TOKEN_QUERY ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
access , & token_ops ) ) )
{
const LUID_AND_ATTRIBUTES * privs = get_req_data ( ) ;
LUID_AND_ATTRIBUTES * modified_privs = NULL ;
unsigned int priv_count = get_req_data_size ( ) / sizeof ( LUID_AND_ATTRIBUTES ) ;
unsigned int modified_priv_count = 0 ;
if ( req - > get_modified_state & & ! req - > disable_all )
{
2006-07-25 10:30:04 +02:00
unsigned int i ;
2005-02-11 12:52:06 +01:00
/* count modified privs */
for ( i = 0 ; i < priv_count ; i + + )
{
struct privilege * privilege =
token_find_privilege ( token , & privs [ i ] . Luid , FALSE ) ;
if ( privilege & & req - > get_modified_state )
modified_priv_count + + ;
}
reply - > len = modified_priv_count ;
modified_priv_count = min ( modified_priv_count , get_reply_max_size ( ) / sizeof ( * modified_privs ) ) ;
if ( modified_priv_count )
modified_privs = set_reply_data_size ( modified_priv_count * sizeof ( * modified_privs ) ) ;
}
reply - > len = modified_priv_count * sizeof ( * modified_privs ) ;
if ( req - > disable_all )
token_disable_privileges ( token ) ;
else
modified_priv_count = token_adjust_privileges ( token , privs ,
priv_count , modified_privs , modified_priv_count ) ;
release_object ( token ) ;
}
}
/* retrieves the list of privileges that may be held be the token */
DECL_HANDLER ( get_token_privileges )
{
struct token * token ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
int priv_count = 0 ;
LUID_AND_ATTRIBUTES * privs ;
struct privilege * privilege ;
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
priv_count + + ;
reply - > len = priv_count * sizeof ( * privs ) ;
if ( reply - > len < = get_reply_max_size ( ) )
{
privs = set_reply_data_size ( priv_count * sizeof ( * privs ) ) ;
if ( privs )
{
int i = 0 ;
LIST_FOR_EACH_ENTRY ( privilege , & token - > privileges , struct privilege , entry )
{
luid_and_attr_from_privilege ( & privs [ i ] , privilege ) ;
i + + ;
}
}
}
else
set_error ( STATUS_BUFFER_TOO_SMALL ) ;
release_object ( token ) ;
}
}
/* creates a duplicate of the token */
DECL_HANDLER ( duplicate_token )
{
struct token * src_token ;
2007-02-16 00:21:40 +01:00
2005-02-11 12:52:06 +01:00
if ( ( src_token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_DUPLICATE ,
& token_ops ) ) )
{
2007-05-28 19:39:33 +02:00
struct token * token = token_duplicate ( src_token , req - > primary , req - > impersonation_level ) ;
2005-02-11 12:52:06 +01:00
if ( token )
{
2007-05-28 19:39:33 +02:00
reply - > new_handle = alloc_handle ( current - > process , token , req - > access , req - > attributes ) ;
2005-02-11 12:52:06 +01:00
release_object ( token ) ;
}
release_object ( src_token ) ;
}
}
2005-04-22 23:17:15 +02:00
/* checks the specified privileges are held by the token */
DECL_HANDLER ( check_token_privileges )
{
struct token * token ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
unsigned int count = get_req_data_size ( ) / sizeof ( LUID_AND_ATTRIBUTES ) ;
2007-02-16 00:21:40 +01:00
if ( ! token - > primary & & token - > impersonation_level < = SecurityAnonymous )
set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
else if ( get_reply_max_size ( ) > = count * sizeof ( LUID_AND_ATTRIBUTES ) )
2005-04-22 23:17:15 +02:00
{
LUID_AND_ATTRIBUTES * usedprivs = set_reply_data_size ( count * sizeof ( * usedprivs ) ) ;
reply - > has_privileges = token_check_privileges ( token , req - > all_required , get_req_data ( ) , count , usedprivs ) ;
}
else
set_error ( STATUS_BUFFER_OVERFLOW ) ;
release_object ( token ) ;
}
}
2005-05-24 14:32:18 +02:00
/* checks that a user represented by a token is allowed to access an object
* represented by a security descriptor */
DECL_HANDLER ( access_check )
{
2006-07-26 10:43:25 +02:00
data_size_t sd_size = get_req_data_size ( ) ;
2005-05-24 14:32:18 +02:00
const struct security_descriptor * sd = get_req_data ( ) ;
struct token * token ;
if ( ! sd_is_valid ( sd , sd_size ) )
{
set_error ( STATUS_ACCESS_VIOLATION ) ;
return ;
}
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
GENERIC_MAPPING mapping ;
unsigned int status ;
LUID_AND_ATTRIBUTES priv ;
unsigned int priv_count = 1 ;
memset ( & priv , 0 , sizeof ( priv ) ) ;
2005-06-20 15:18:38 +02:00
/* only impersonation tokens may be used with this function */
if ( token - > primary )
{
set_error ( STATUS_NO_IMPERSONATION_TOKEN ) ;
release_object ( token ) ;
return ;
}
2007-02-16 00:21:40 +01:00
/* anonymous impersonation tokens can't be used */
if ( token - > impersonation_level < = SecurityAnonymous )
{
set_error ( STATUS_BAD_IMPERSONATION_LEVEL ) ;
release_object ( token ) ;
return ;
}
2005-05-24 14:32:18 +02:00
mapping . GenericRead = req - > mapping_read ;
mapping . GenericWrite = req - > mapping_write ;
mapping . GenericExecute = req - > mapping_execute ;
mapping . GenericAll = req - > mapping_all ;
2007-01-25 07:42:15 +01:00
status = token_access_check (
2005-05-24 14:32:18 +02:00
token , sd , req - > desired_access , & priv , & priv_count , & mapping ,
2007-01-25 07:42:15 +01:00
& reply - > access_granted , & reply - > access_status ) ;
2005-05-24 14:32:18 +02:00
reply - > privileges_len = priv_count * sizeof ( LUID_AND_ATTRIBUTES ) ;
if ( ( priv_count > 0 ) & & ( reply - > privileges_len < = get_reply_max_size ( ) ) )
{
LUID_AND_ATTRIBUTES * privs = set_reply_data_size ( priv_count * sizeof ( * privs ) ) ;
memcpy ( privs , & priv , sizeof ( priv ) ) ;
}
2007-01-25 07:42:15 +01:00
set_error ( status ) ;
2005-05-24 14:32:18 +02:00
release_object ( token ) ;
}
}
2005-07-18 15:22:55 +02:00
2006-06-15 17:38:04 +02:00
/* retrieves the SID of the user that the token represents */
2005-07-18 15:22:55 +02:00
DECL_HANDLER ( get_token_user )
{
struct token * token ;
reply - > user_len = 0 ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
const SID * user = token - > user ;
reply - > user_len = FIELD_OFFSET ( SID , SubAuthority [ user - > SubAuthorityCount ] ) ;
if ( reply - > user_len < = get_reply_max_size ( ) )
{
SID * user_reply = set_reply_data_size ( reply - > user_len ) ;
if ( user_reply )
memcpy ( user_reply , user , reply - > user_len ) ;
}
else set_error ( STATUS_BUFFER_TOO_SMALL ) ;
release_object ( token ) ;
}
}
2006-05-13 17:58:19 +02:00
/* retrieves the groups that the user represented by the token belongs to */
DECL_HANDLER ( get_token_groups )
{
struct token * token ;
reply - > user_len = 0 ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
size_t size_needed = sizeof ( struct token_groups ) ;
unsigned int group_count = 0 ;
const struct group * group ;
LIST_FOR_EACH_ENTRY ( group , & token - > groups , const struct group , entry )
{
group_count + + ;
size_needed + = FIELD_OFFSET ( SID , SubAuthority [ group - > sid . SubAuthorityCount ] ) ;
}
size_needed + = sizeof ( unsigned int ) * group_count ;
reply - > user_len = size_needed ;
if ( size_needed < = get_reply_max_size ( ) )
{
struct token_groups * tg = set_reply_data_size ( size_needed ) ;
if ( tg )
{
unsigned int * attr_ptr = ( unsigned int * ) ( tg + 1 ) ;
SID * sid_ptr = ( SID * ) ( attr_ptr + group_count ) ;
tg - > count = group_count ;
LIST_FOR_EACH_ENTRY ( group , & token - > groups , const struct group , entry )
{
* attr_ptr = 0 ;
if ( group - > mandatory ) * attr_ptr | = SE_GROUP_MANDATORY ;
if ( group - > def ) * attr_ptr | = SE_GROUP_ENABLED_BY_DEFAULT ;
if ( group - > enabled ) * attr_ptr | = SE_GROUP_ENABLED ;
if ( group - > owner ) * attr_ptr | = SE_GROUP_OWNER ;
if ( group - > deny_only ) * attr_ptr | = SE_GROUP_USE_FOR_DENY_ONLY ;
if ( group - > resource ) * attr_ptr | = SE_GROUP_RESOURCE ;
memcpy ( sid_ptr , & group - > sid , FIELD_OFFSET ( SID , SubAuthority [ group - > sid . SubAuthorityCount ] ) ) ;
sid_ptr = ( SID * ) ( ( char * ) sid_ptr + FIELD_OFFSET ( SID , SubAuthority [ group - > sid . SubAuthorityCount ] ) ) ;
attr_ptr + + ;
}
}
}
else set_error ( STATUS_BUFFER_TOO_SMALL ) ;
release_object ( token ) ;
}
}
2007-02-08 05:43:11 +01:00
2007-02-21 18:10:45 +01:00
DECL_HANDLER ( get_token_impersonation_level )
{
struct token * token ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
if ( token - > primary )
set_error ( STATUS_INVALID_PARAMETER ) ;
else
reply - > impersonation_level = token - > impersonation_level ;
release_object ( token ) ;
}
}
2007-09-13 17:47:56 +02:00
DECL_HANDLER ( get_token_statistics )
{
struct token * token ;
if ( ( token = ( struct token * ) get_handle_obj ( current - > process , req - > handle ,
TOKEN_QUERY ,
& token_ops ) ) )
{
reply - > token_id = token - > token_id ;
reply - > modified_id = token - > modified_id ;
reply - > primary = token - > primary ;
reply - > impersonation_level = token - > impersonation_level ;
reply - > group_count = list_count ( & token - > groups ) ;
reply - > privilege_count = list_count ( & token - > privileges ) ;
release_object ( token ) ;
}
}