2005-04-22 23:17:15 +02:00
|
|
|
/*
|
|
|
|
* Security Management
|
|
|
|
*
|
|
|
|
* Copyright (C) 2005 Robert Shearman
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
2006-05-18 14:49:52 +02:00
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
2005-04-22 23:17:15 +02:00
|
|
|
*/
|
|
|
|
|
2015-03-18 23:30:59 +01:00
|
|
|
#ifndef __WINE_SERVER_SECURITY_H
|
|
|
|
#define __WINE_SERVER_SECURITY_H
|
|
|
|
|
2005-04-22 23:17:15 +02:00
|
|
|
extern const LUID SeIncreaseQuotaPrivilege;
|
|
|
|
extern const LUID SeSecurityPrivilege;
|
|
|
|
extern const LUID SeTakeOwnershipPrivilege;
|
|
|
|
extern const LUID SeLoadDriverPrivilege;
|
|
|
|
extern const LUID SeSystemProfilePrivilege;
|
|
|
|
extern const LUID SeSystemtimePrivilege;
|
|
|
|
extern const LUID SeProfileSingleProcessPrivilege;
|
|
|
|
extern const LUID SeIncreaseBasePriorityPrivilege;
|
|
|
|
extern const LUID SeCreatePagefilePrivilege;
|
|
|
|
extern const LUID SeBackupPrivilege;
|
|
|
|
extern const LUID SeRestorePrivilege;
|
|
|
|
extern const LUID SeShutdownPrivilege;
|
|
|
|
extern const LUID SeDebugPrivilege;
|
|
|
|
extern const LUID SeSystemEnvironmentPrivilege;
|
|
|
|
extern const LUID SeChangeNotifyPrivilege;
|
|
|
|
extern const LUID SeRemoteShutdownPrivilege;
|
|
|
|
extern const LUID SeUndockPrivilege;
|
|
|
|
extern const LUID SeManageVolumePrivilege;
|
|
|
|
extern const LUID SeImpersonatePrivilege;
|
|
|
|
extern const LUID SeCreateGlobalPrivilege;
|
|
|
|
|
2007-10-03 21:19:05 +02:00
|
|
|
extern const PSID security_world_sid;
|
2011-03-02 10:46:12 +01:00
|
|
|
extern const PSID security_local_user_sid;
|
2007-10-03 21:19:05 +02:00
|
|
|
extern const PSID security_local_system_sid;
|
2013-04-20 01:25:43 +02:00
|
|
|
extern const PSID security_builtin_users_sid;
|
2013-03-05 17:52:38 +01:00
|
|
|
extern const PSID security_builtin_admins_sid;
|
2019-04-22 23:45:29 +02:00
|
|
|
extern const PSID security_domain_users_sid;
|
2017-06-16 20:41:36 +02:00
|
|
|
extern const PSID security_high_label_sid;
|
2005-07-18 15:22:55 +02:00
|
|
|
|
2007-10-02 16:54:51 +02:00
|
|
|
|
|
|
|
/* token functions */
|
|
|
|
|
2020-09-24 06:44:55 +02:00
|
|
|
extern struct token *get_token_obj( struct process *process, obj_handle_t handle, unsigned int access );
|
2005-04-22 23:17:15 +02:00
|
|
|
extern struct token *token_create_admin(void);
|
2017-06-16 20:41:36 +02:00
|
|
|
extern int token_assign_label( struct token *token, PSID label );
|
2007-05-28 19:39:33 +02:00
|
|
|
extern struct token *token_duplicate( struct token *src_token, unsigned primary,
|
2020-09-23 00:31:15 +02:00
|
|
|
int impersonation_level, const struct security_descriptor *sd,
|
|
|
|
const LUID_AND_ATTRIBUTES *remove_privs, unsigned int remove_priv_count,
|
|
|
|
const SID *remove_groups, unsigned int remove_group_count );
|
2005-04-22 23:17:15 +02:00
|
|
|
extern int token_check_privileges( struct token *token, int all_required,
|
|
|
|
const LUID_AND_ATTRIBUTES *reqprivs,
|
|
|
|
unsigned int count, LUID_AND_ATTRIBUTES *usedprivs);
|
2005-07-13 21:31:27 +02:00
|
|
|
extern const ACL *token_get_default_dacl( struct token *token );
|
2007-10-02 16:54:51 +02:00
|
|
|
extern const SID *token_get_user( struct token *token );
|
|
|
|
extern const SID *token_get_primary_group( struct token *token );
|
2009-12-09 16:31:53 +01:00
|
|
|
extern int token_sid_present( struct token *token, const SID *sid, int deny);
|
2007-10-02 16:54:51 +02:00
|
|
|
|
2007-10-03 21:19:05 +02:00
|
|
|
static inline const ACE_HEADER *ace_next( const ACE_HEADER *ace )
|
|
|
|
{
|
|
|
|
return (const ACE_HEADER *)((const char *)ace + ace->AceSize);
|
|
|
|
}
|
|
|
|
|
2013-04-11 12:52:08 +02:00
|
|
|
static inline size_t security_sid_len( const SID *sid )
|
|
|
|
{
|
|
|
|
return offsetof( SID, SubAuthority[sid->SubAuthorityCount] );
|
|
|
|
}
|
|
|
|
|
2007-10-03 21:19:05 +02:00
|
|
|
static inline int security_equal_sid( const SID *sid1, const SID *sid2 )
|
|
|
|
{
|
|
|
|
return ((sid1->SubAuthorityCount == sid2->SubAuthorityCount) &&
|
2013-04-11 12:52:08 +02:00
|
|
|
!memcmp( sid1, sid2, security_sid_len( sid1 )));
|
2007-10-03 21:19:05 +02:00
|
|
|
}
|
|
|
|
|
2005-06-20 15:18:38 +02:00
|
|
|
extern void security_set_thread_token( struct thread *thread, obj_handle_t handle );
|
2007-10-03 14:09:33 +02:00
|
|
|
extern const SID *security_unix_uid_to_sid( uid_t uid );
|
2020-09-24 06:44:56 +02:00
|
|
|
extern int check_object_access( struct token *token, struct object *obj, unsigned int *access );
|
2005-04-22 23:17:15 +02:00
|
|
|
|
|
|
|
static inline int thread_single_check_privilege( struct thread *thread, const LUID *priv)
|
|
|
|
{
|
|
|
|
struct token *token = thread_get_impersonation_token( thread );
|
|
|
|
const LUID_AND_ATTRIBUTES privs = { *priv, 0 };
|
|
|
|
|
|
|
|
if (!token) return FALSE;
|
|
|
|
|
|
|
|
return token_check_privileges( token, TRUE, &privs, 1, NULL );
|
|
|
|
}
|
2007-10-02 16:54:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
/* security descriptor helper functions */
|
|
|
|
|
|
|
|
extern int sd_is_valid( const struct security_descriptor *sd, data_size_t size );
|
2017-06-14 20:20:40 +02:00
|
|
|
extern ACL *extract_security_labels( const ACL *sacl );
|
2017-06-14 20:20:41 +02:00
|
|
|
extern ACL *replace_security_labels( const ACL *old_sacl, const ACL *new_sacl );
|
2007-10-02 16:54:51 +02:00
|
|
|
|
|
|
|
/* gets the discretionary access control list from a security descriptor */
|
|
|
|
static inline const ACL *sd_get_dacl( const struct security_descriptor *sd, int *present )
|
|
|
|
{
|
2012-08-08 10:10:44 +02:00
|
|
|
*present = (sd->control & SE_DACL_PRESENT) != 0;
|
2007-10-02 16:54:51 +02:00
|
|
|
|
|
|
|
if (sd->dacl_len)
|
|
|
|
return (const ACL *)((const char *)(sd + 1) +
|
|
|
|
sd->owner_len + sd->group_len + sd->sacl_len);
|
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* gets the system access control list from a security descriptor */
|
|
|
|
static inline const ACL *sd_get_sacl( const struct security_descriptor *sd, int *present )
|
|
|
|
{
|
2012-08-08 10:10:44 +02:00
|
|
|
*present = (sd->control & SE_SACL_PRESENT) != 0;
|
2007-10-02 16:54:51 +02:00
|
|
|
|
|
|
|
if (sd->sacl_len)
|
|
|
|
return (const ACL *)((const char *)(sd + 1) +
|
|
|
|
sd->owner_len + sd->group_len);
|
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* gets the owner from a security descriptor */
|
|
|
|
static inline const SID *sd_get_owner( const struct security_descriptor *sd )
|
|
|
|
{
|
|
|
|
if (sd->owner_len)
|
|
|
|
return (const SID *)(sd + 1);
|
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* gets the primary group from a security descriptor */
|
|
|
|
static inline const SID *sd_get_group( const struct security_descriptor *sd )
|
|
|
|
{
|
|
|
|
if (sd->group_len)
|
|
|
|
return (const SID *)((const char *)(sd + 1) + sd->owner_len);
|
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
}
|
2007-10-24 17:04:42 +02:00
|
|
|
|
2015-03-18 23:30:59 +01:00
|
|
|
#endif /* __WINE_SERVER_SECURITY_H */
|