/* * dlls/advapi32/security.c * FIXME: for all functions thunking down to Rtl* functions: implement SetLastError() */ #include #include "windef.h" #include "winreg.h" #include "winerror.h" #include "heap.h" #include "ntddk.h" #include "debug.h" #define CallWin32ToNt(func) \ { NTSTATUS ret; \ ret = (func); \ if (ret !=STATUS_SUCCESS) \ { SetLastError (RtlNtStatusToDosError(ret)); return FALSE; } \ return TRUE; \ } /* FIXME: move it to a header */ BOOL WINAPI IsValidSid (PSID pSid); BOOL WINAPI EqualSid (PSID pSid1, PSID pSid2); BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2); DWORD WINAPI GetSidLengthRequired (BYTE nSubAuthorityCount); BOOL WINAPI AllocateAndInitializeSid(PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority, BYTE nSubAuthorityCount, DWORD nSubAuthority0, DWORD nSubAuthority1, DWORD nSubAuthority2, DWORD nSubAuthority3, DWORD nSubAuthority4, DWORD nSubAuthority5, DWORD nSubAuthority6, DWORD nSubAuthority7, PSID *pSid); VOID* WINAPI FreeSid(PSID pSid); BOOL WINAPI InitializeSid (PSID pSid, PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority, BYTE nSubAuthorityCount); PSID_IDENTIFIER_AUTHORITY WINAPI GetSidIdentifierAuthority(PSID pSid); DWORD* WINAPI GetSidSubAuthority(PSID pSid, DWORD nSubAuthority); BYTE* WINAPI GetSidSubAuthorityCount(PSID pSid); DWORD WINAPI GetLengthSid(PSID pSid); BOOL WINAPI CopySid(DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid); /* ############################## ###### TOKEN FUNCTIONS ###### ############################## */ /****************************************************************************** * OpenProcessToken [ADVAPI32.109] * Opens the access token associated with a process * * PARAMS * ProcessHandle [I] Handle to process * DesiredAccess [I] Desired access to process * TokenHandle [O] Pointer to handle of open access token * * RETURNS STD */ BOOL WINAPI OpenProcessToken( HANDLE ProcessHandle, DWORD DesiredAccess, HANDLE *TokenHandle ) { CallWin32ToNt(NtOpenProcessToken( ProcessHandle, DesiredAccess, TokenHandle )); } /****************************************************************************** * OpenThreadToken [ADVAPI32.114] * * PARAMS * thread [] * desiredaccess [] * openasself [] * thandle [] */ BOOL WINAPI OpenThreadToken( HANDLE ThreadHandle, DWORD DesiredAccess, BOOL OpenAsSelf, HANDLE *TokenHandle) { CallWin32ToNt (NtOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle)); } /****************************************************************************** * AdjustTokenPrivileges [ADVAPI32.10] * * PARAMS * TokenHandle [] * DisableAllPrivileges [] * NewState [] * BufferLength [] * PreviousState [] * ReturnLength [] */ BOOL WINAPI AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges, LPVOID NewState, DWORD BufferLength, LPVOID PreviousState, LPDWORD ReturnLength ) { CallWin32ToNt(NtAdjustPrivilegesToken(TokenHandle, DisableAllPrivileges, NewState, BufferLength, PreviousState, ReturnLength)); } /****************************************************************************** * GetTokenInformation [ADVAPI32.66] * * PARAMS * token [] * tokeninfoclass [] * tokeninfo [] * tokeninfolength [] * retlen [] * */ BOOL WINAPI GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass, LPVOID tokeninfo, DWORD tokeninfolength, LPDWORD retlen ) { CallWin32ToNt (NtQueryInformationToken( token, tokeninfoclass, tokeninfo, tokeninfolength, retlen)); } /* ############################## ###### SID FUNCTIONS ###### ############################## */ /****************************************************************************** * AllocateAndInitializeSid [ADVAPI32.11] * * PARAMS * pIdentifierAuthority [] * nSubAuthorityCount [] * nSubAuthority0 [] * nSubAuthority1 [] * nSubAuthority2 [] * nSubAuthority3 [] * nSubAuthority4 [] * nSubAuthority5 [] * nSubAuthority6 [] * nSubAuthority7 [] * pSid [] */ BOOL WINAPI AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority, BYTE nSubAuthorityCount, DWORD nSubAuthority0, DWORD nSubAuthority1, DWORD nSubAuthority2, DWORD nSubAuthority3, DWORD nSubAuthority4, DWORD nSubAuthority5, DWORD nSubAuthority6, DWORD nSubAuthority7, PSID *pSid ) { if (!(*pSid = HeapAlloc( GetProcessHeap(), 0, GetSidLengthRequired(nSubAuthorityCount)))) return FALSE; (*pSid)->Revision = SID_REVISION; if (pIdentifierAuthority) memcpy(&(*pSid)->IdentifierAuthority, pIdentifierAuthority, sizeof (SID_IDENTIFIER_AUTHORITY)); *GetSidSubAuthorityCount(*pSid) = nSubAuthorityCount; if (nSubAuthorityCount > 0) *GetSidSubAuthority(*pSid, 0) = nSubAuthority0; if (nSubAuthorityCount > 1) *GetSidSubAuthority(*pSid, 1) = nSubAuthority1; if (nSubAuthorityCount > 2) *GetSidSubAuthority(*pSid, 2) = nSubAuthority2; if (nSubAuthorityCount > 3) *GetSidSubAuthority(*pSid, 3) = nSubAuthority3; if (nSubAuthorityCount > 4) *GetSidSubAuthority(*pSid, 4) = nSubAuthority4; if (nSubAuthorityCount > 5) *GetSidSubAuthority(*pSid, 5) = nSubAuthority5; if (nSubAuthorityCount > 6) *GetSidSubAuthority(*pSid, 6) = nSubAuthority6; if (nSubAuthorityCount > 7) *GetSidSubAuthority(*pSid, 7) = nSubAuthority7; return TRUE; } /****************************************************************************** * FreeSid [ADVAPI32.42] * * PARAMS * pSid [] */ VOID* WINAPI FreeSid( PSID pSid ) { HeapFree( GetProcessHeap(), 0, pSid ); return NULL; } /****************************************************************************** * CopySid [ADVAPI32.24] * * PARAMS * nDestinationSidLength [] * pDestinationSid [] * pSourceSid [] */ BOOL WINAPI CopySid( DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid ) { if (!IsValidSid(pSourceSid)) return FALSE; if (nDestinationSidLength < GetLengthSid(pSourceSid)) return FALSE; memcpy(pDestinationSid, pSourceSid, GetLengthSid(pSourceSid)); return TRUE; } /****************************************************************************** * IsValidSid [ADVAPI32.80] * * PARAMS * pSid [] */ BOOL WINAPI IsValidSid( PSID pSid ) { if (!pSid || pSid->Revision != SID_REVISION) return FALSE; return TRUE; } /****************************************************************************** * EqualSid [ADVAPI32.40] * * PARAMS * pSid1 [] * pSid2 [] */ BOOL WINAPI EqualSid( PSID pSid1, PSID pSid2 ) { if (!IsValidSid(pSid1) || !IsValidSid(pSid2)) return FALSE; if (*GetSidSubAuthorityCount(pSid1) != *GetSidSubAuthorityCount(pSid2)) return FALSE; if (memcmp(pSid1, pSid2, GetLengthSid(pSid1)) != 0) return FALSE; return TRUE; } /****************************************************************************** * EqualPrefixSid [ADVAPI32.39] */ BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2) { if (!IsValidSid(pSid1) || !IsValidSid(pSid2)) return FALSE; if (*GetSidSubAuthorityCount(pSid1) != *GetSidSubAuthorityCount(pSid2)) return FALSE; if (memcmp(pSid1, pSid2, GetSidLengthRequired(pSid1->SubAuthorityCount - 1)) != 0) return FALSE; return TRUE; } /****************************************************************************** * GetSidLengthRequired [ADVAPI32.63] * * PARAMS * nSubAuthorityCount [] */ DWORD WINAPI GetSidLengthRequired( BYTE nSubAuthorityCount ) { return sizeof (SID) + (nSubAuthorityCount - 1) * sizeof (DWORD); } /****************************************************************************** * InitializeSid [ADVAPI32.74] * * PARAMS * pIdentifierAuthority [] */ BOOL WINAPI InitializeSid (PSID pSid, PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority, BYTE nSubAuthorityCount) { int i; pSid->Revision = SID_REVISION; if (pIdentifierAuthority) memcpy(&pSid->IdentifierAuthority, pIdentifierAuthority, sizeof (SID_IDENTIFIER_AUTHORITY)); *GetSidSubAuthorityCount(pSid) = nSubAuthorityCount; for (i = 0; i < nSubAuthorityCount; i++) *GetSidSubAuthority(pSid, i) = 0; return TRUE; } /****************************************************************************** * GetSidIdentifierAuthority [ADVAPI32.62] * * PARAMS * pSid [] */ PSID_IDENTIFIER_AUTHORITY WINAPI GetSidIdentifierAuthority( PSID pSid ) { return &pSid->IdentifierAuthority; } /****************************************************************************** * GetSidSubAuthority [ADVAPI32.64] * * PARAMS * pSid [] * nSubAuthority [] */ DWORD * WINAPI GetSidSubAuthority( PSID pSid, DWORD nSubAuthority ) { return &pSid->SubAuthority[nSubAuthority]; } /****************************************************************************** * GetSidSubAuthorityCount [ADVAPI32.65] * * PARAMS * pSid [] */ BYTE * WINAPI GetSidSubAuthorityCount (PSID pSid) { return &pSid->SubAuthorityCount; } /****************************************************************************** * GetLengthSid [ADVAPI32.48] * * PARAMS * pSid [] */ DWORD WINAPI GetLengthSid (PSID pSid) { return GetSidLengthRequired( * GetSidSubAuthorityCount(pSid) ); } /* ############################################## ###### SECURITY DESCRIPTOR FUNCTIONS ###### ############################################## */ /****************************************************************************** * InitializeSecurityDescriptor [ADVAPI32.73] * * PARAMS * pDescr [] * revision [] */ BOOL WINAPI InitializeSecurityDescriptor( SECURITY_DESCRIPTOR *pDescr, DWORD revision ) { CallWin32ToNt (RtlCreateSecurityDescriptor(pDescr, revision )); } /****************************************************************************** * GetSecurityDescriptorLength [ADVAPI32.55] */ DWORD WINAPI GetSecurityDescriptorLength( SECURITY_DESCRIPTOR *pDescr) { return (RtlLengthSecurityDescriptor(pDescr)); } /****************************************************************************** * GetSecurityDescriptorOwner [ADVAPI32.56] * * PARAMS * pOwner [] * lpbOwnerDefaulted [] */ BOOL WINAPI GetSecurityDescriptorOwner( SECURITY_DESCRIPTOR *pDescr, PSID *pOwner, LPBOOL lpbOwnerDefaulted ) { CallWin32ToNt (RtlGetOwnerSecurityDescriptor( pDescr, pOwner, (PBOOLEAN)lpbOwnerDefaulted )); } /****************************************************************************** * SetSecurityDescriptorOwner [ADVAPI32] * * PARAMS */ BOOL SetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pSecurityDescriptor, PSID pOwner, BOOL bOwnerDefaulted) { CallWin32ToNt (RtlSetOwnerSecurityDescriptor(pSecurityDescriptor, pOwner, bOwnerDefaulted)); } /****************************************************************************** * GetSecurityDescriptorGroup [ADVAPI32.54] */ BOOL WINAPI GetSecurityDescriptorGroup( PSECURITY_DESCRIPTOR SecurityDescriptor, PSID *Group, LPBOOL GroupDefaulted) { CallWin32ToNt (RtlGetGroupSecurityDescriptor(SecurityDescriptor, Group, (PBOOLEAN)GroupDefaulted)); } /****************************************************************************** * SetSecurityDescriptorGroup */ BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Group, BOOL GroupDefaulted) { CallWin32ToNt (RtlSetGroupSecurityDescriptor( SecurityDescriptor, Group, GroupDefaulted)); } /****************************************************************************** * IsValidSecurityDescriptor [ADVAPI32.79] * * PARAMS * lpsecdesc [] */ BOOL WINAPI IsValidSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor ) { CallWin32ToNt (RtlValidSecurityDescriptor(SecurityDescriptor)); } /****************************************************************************** * GetSecurityDescriptorDacl [ADVAPI.91] */ BOOL WINAPI GetSecurityDescriptorDacl( IN PSECURITY_DESCRIPTOR pSecurityDescriptor, OUT LPBOOL lpbDaclPresent, OUT PACL *pDacl, OUT LPBOOL lpbDaclDefaulted) { CallWin32ToNt (RtlGetDaclSecurityDescriptor(pSecurityDescriptor, (PBOOLEAN)lpbDaclPresent, pDacl, (PBOOLEAN)lpbDaclDefaulted)); } /****************************************************************************** * SetSecurityDescriptorDacl [ADVAPI.224] */ BOOL WINAPI SetSecurityDescriptorDacl ( PSECURITY_DESCRIPTOR lpsd, BOOL daclpresent, PACL dacl, BOOL dacldefaulted ) { CallWin32ToNt (RtlSetDaclSecurityDescriptor (lpsd, daclpresent, dacl, dacldefaulted )); } /****************************************************************************** * GetSecurityDescriptorSacl [ADVAPI.] */ BOOL WINAPI GetSecurityDescriptorSacl( IN PSECURITY_DESCRIPTOR lpsd, OUT LPBOOL lpbSaclPresent, OUT PACL *pSacl, OUT LPBOOL lpbSaclDefaulted) { CallWin32ToNt (RtlGetSaclSecurityDescriptor(lpsd, (PBOOLEAN)lpbSaclPresent, pSacl, (PBOOLEAN)lpbSaclDefaulted)); } /************************************************************************** * SetSecurityDescriptorSacl [NTDLL.488] */ BOOL WINAPI SetSecurityDescriptorSacl ( PSECURITY_DESCRIPTOR lpsd, BOOL saclpresent, PACL lpsacl, BOOL sacldefaulted) { CallWin32ToNt (RtlSetSaclSecurityDescriptor(lpsd, saclpresent, lpsacl, sacldefaulted)); } /****************************************************************************** * MakeSelfRelativeSD [ADVAPI32.95] * * PARAMS * lpabssecdesc [] * lpselfsecdesc [] * lpbuflen [] */ BOOL WINAPI MakeSelfRelativeSD( PSECURITY_DESCRIPTOR lpabssecdesc, PSECURITY_DESCRIPTOR lpselfsecdesc, LPDWORD lpbuflen ) { FIXME(advapi,"(%p,%p,%p),stub!\n",lpabssecdesc,lpselfsecdesc,lpbuflen); return TRUE; } /****************************************************************************** * GetSecurityDescriptorControl32 [ADVAPI32] */ BOOL GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR pSecurityDescriptor, /* fixme: PSECURITY_DESCRIPTOR_CONTROL*/ LPVOID pControl, LPDWORD lpdwRevision) { FIXME(advapi,"(%p,%p,%p),stub!\n",pSecurityDescriptor,pControl,lpdwRevision); return 1; } /* ############################## ###### MISC FUNCTIONS ###### ############################## */ /****************************************************************************** * LookupPrivilegeValue32W [ADVAPI32.93] * Retrieves LUID used on a system to represent the privilege name. * * NOTES * lpLuid should be PLUID * * PARAMS * lpSystemName [I] Address of string specifying the system * lpName [I] Address of string specifying the privilege * lpLuid [I] Address of locally unique identifier * * RETURNS STD */ BOOL WINAPI LookupPrivilegeValueW( LPCWSTR lpSystemName, LPCWSTR lpName, LPVOID lpLuid ) { FIXME(advapi,"(%s,%s,%p): stub\n",debugstr_w(lpSystemName), debugstr_w(lpName), lpLuid); return TRUE; } /****************************************************************************** * LookupPrivilegeValue32A [ADVAPI32.92] */ BOOL WINAPI LookupPrivilegeValueA( LPCSTR lpSystemName, LPCSTR lpName, LPVOID lpLuid ) { LPWSTR lpSystemNameW = HEAP_strdupAtoW(GetProcessHeap(), 0, lpSystemName); LPWSTR lpNameW = HEAP_strdupAtoW(GetProcessHeap(), 0, lpName); BOOL ret = LookupPrivilegeValueW( lpSystemNameW, lpNameW, lpLuid); HeapFree(GetProcessHeap(), 0, lpNameW); HeapFree(GetProcessHeap(), 0, lpSystemNameW); return ret; } /****************************************************************************** * GetFileSecurity32A [ADVAPI32.45] * * Obtains Specified information about the security of a file or directory * The information obtained is constrained by the callers access rights and * privileges */ BOOL WINAPI GetFileSecurityA( LPCSTR lpFileName, SECURITY_INFORMATION RequestedInformation, PSECURITY_DESCRIPTOR pSecurityDescriptor, DWORD nLength, LPDWORD lpnLengthNeeded ) { FIXME(advapi, "(%s) : stub\n", debugstr_a(lpFileName)); return TRUE; } /****************************************************************************** * GetFileSecurity32W [ADVAPI32.46] * * Obtains Specified information about the security of a file or directory * The information obtained is constrained by the callers access rights and * privileges * * PARAMS * lpFileName [] * RequestedInformation [] * pSecurityDescriptor [] * nLength [] * lpnLengthNeeded [] */ BOOL WINAPI GetFileSecurityW( LPCWSTR lpFileName, SECURITY_INFORMATION RequestedInformation, PSECURITY_DESCRIPTOR pSecurityDescriptor, DWORD nLength, LPDWORD lpnLengthNeeded ) { FIXME(advapi, "(%s) : stub\n", debugstr_w(lpFileName) ); return TRUE; } /****************************************************************************** * LookupAccountSid32A [ADVAPI32.86] */ BOOL WINAPI LookupAccountSidA( LPCSTR system, PSID sid, LPCSTR account, LPDWORD accountSize, LPCSTR domain, LPDWORD domainSize, PSID_NAME_USE name_use ) { FIXME(security,"(%s,%p,%p,%p,%p,%p,%p): stub\n", system,sid,account,accountSize,domain,domainSize,name_use); SetLastError(ERROR_CALL_NOT_IMPLEMENTED); return FALSE; } /****************************************************************************** * LookupAccountSid32W [ADVAPI32.87] * * PARAMS * system [] * sid [] * account [] * accountSize [] * domain [] * domainSize [] * name_use [] */ BOOL WINAPI LookupAccountSidW( LPCWSTR system, PSID sid, LPCWSTR account, LPDWORD accountSize, LPCWSTR domain, LPDWORD domainSize, PSID_NAME_USE name_use ) { FIXME(security,"(%p,%p,%p,%p,%p,%p,%p): stub\n", system,sid,account,accountSize,domain,domainSize,name_use); SetLastError(ERROR_CALL_NOT_IMPLEMENTED); return FALSE; } /****************************************************************************** * SetFileSecurity32A [ADVAPI32.182] * Sets the security of a file or directory */ BOOL WINAPI SetFileSecurityA( LPCSTR lpFileName, SECURITY_INFORMATION RequestedInformation, PSECURITY_DESCRIPTOR pSecurityDescriptor) { FIXME(advapi, "(%s) : stub\n", debugstr_a(lpFileName)); return TRUE; } /****************************************************************************** * SetFileSecurity32W [ADVAPI32.183] * Sets the security of a file or directory * * PARAMS * lpFileName [] * RequestedInformation [] * pSecurityDescriptor [] */ BOOL WINAPI SetFileSecurityW( LPCWSTR lpFileName, SECURITY_INFORMATION RequestedInformation, PSECURITY_DESCRIPTOR pSecurityDescriptor ) { FIXME(advapi, "(%s) : stub\n", debugstr_w(lpFileName) ); return TRUE; } /****************************************************************************** * QueryWindows31FilesMigration [ADVAPI32.266] * * PARAMS * x1 [] */ BOOL WINAPI QueryWindows31FilesMigration( DWORD x1 ) { FIXME(advapi,"(%ld):stub\n",x1); return TRUE; } /****************************************************************************** * SynchronizeWindows31FilesAndWindowsNTRegistry [ADVAPI32.265] * * PARAMS * x1 [] * x2 [] * x3 [] * x4 [] */ BOOL WINAPI SynchronizeWindows31FilesAndWindowsNTRegistry( DWORD x1, DWORD x2, DWORD x3, DWORD x4 ) { FIXME(advapi,"(0x%08lx,0x%08lx,0x%08lx,0x%08lx):stub\n",x1,x2,x3,x4); return TRUE; } /****************************************************************************** * LsaOpenPolicy [ADVAPI32.200] * * PARAMS * x1 [] * x2 [] * x3 [] * x4 [] */ BOOL WINAPI LsaOpenPolicy( DWORD x1, DWORD x2, DWORD x3, DWORD x4 ) { FIXME(advapi,"(0x%08lx,0x%08lx,0x%08lx,0x%08lx):stub\n",x1,x2,x3,x4); return 0xc0000000; /* generic error */ } /****************************************************************************** * NotifyBootConfigStatus [ADVAPI32.97] * * PARAMS * x1 [] */ BOOL WINAPI NotifyBootConfigStatus( DWORD x1 ) { FIXME(advapi,"(0x%08lx):stub\n",x1); return 1; } /****************************************************************************** * RevertToSelf [ADVAPI32.180] * * PARAMS * void [] */ BOOL WINAPI RevertToSelf( void ) { FIXME(advapi,"(), stub\n"); return TRUE; } /****************************************************************************** * ImpersonateSelf [ADVAPI32.71] */ BOOL WINAPI ImpersonateSelf(DWORD/*SECURITY_IMPERSONATION_LEVEL*/ ImpersonationLevel) { FIXME(advapi, "(%08lx), stub\n", ImpersonationLevel); return TRUE; } /****************************************************************************** * AccessCheck32 [ADVAPI32.71] */ BOOL WINAPI AccessCheck(PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess, LPVOID/*LPGENERIC_MAPPING*/ GenericMapping, LPVOID/*LPPRIVILEGE_SET*/ PrivilegeSet, LPDWORD PrivilegeSetLength, LPDWORD GrantedAccess, LPBOOL AccessStatus) { FIXME(advapi, "(%p, %04x, %08lx, %p, %p, %p, %p, %p), stub\n", pSecurityDescriptor, ClientToken, DesiredAccess, GenericMapping, PrivilegeSet, PrivilegeSetLength, GrantedAccess, AccessStatus); *AccessStatus = TRUE; return TRUE; }