security.h 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. /*
  2. * Security Management
  3. *
  4. * Copyright (C) 2005 Robert Shearman
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
  19. */
  20. #ifndef __WINE_SERVER_SECURITY_H
  21. #define __WINE_SERVER_SECURITY_H
  22. extern const LUID SeIncreaseQuotaPrivilege;
  23. extern const LUID SeSecurityPrivilege;
  24. extern const LUID SeTakeOwnershipPrivilege;
  25. extern const LUID SeLoadDriverPrivilege;
  26. extern const LUID SeSystemProfilePrivilege;
  27. extern const LUID SeSystemtimePrivilege;
  28. extern const LUID SeProfileSingleProcessPrivilege;
  29. extern const LUID SeIncreaseBasePriorityPrivilege;
  30. extern const LUID SeCreatePagefilePrivilege;
  31. extern const LUID SeBackupPrivilege;
  32. extern const LUID SeRestorePrivilege;
  33. extern const LUID SeShutdownPrivilege;
  34. extern const LUID SeDebugPrivilege;
  35. extern const LUID SeSystemEnvironmentPrivilege;
  36. extern const LUID SeChangeNotifyPrivilege;
  37. extern const LUID SeRemoteShutdownPrivilege;
  38. extern const LUID SeUndockPrivilege;
  39. extern const LUID SeManageVolumePrivilege;
  40. extern const LUID SeImpersonatePrivilege;
  41. extern const LUID SeCreateGlobalPrivilege;
  42. extern const PSID security_world_sid;
  43. extern const PSID security_local_user_sid;
  44. extern const PSID security_local_system_sid;
  45. extern const PSID security_builtin_users_sid;
  46. extern const PSID security_builtin_admins_sid;
  47. extern const PSID security_domain_users_sid;
  48. extern const PSID security_high_label_sid;
  49. extern const PSID security_medium_label_sid;
  50. /* token functions */
  51. extern struct token *token_create_admin(void);
  52. extern int token_assign_label( struct token *token, PSID label );
  53. extern struct token *token_duplicate( struct token *src_token, unsigned primary,
  54. int impersonation_level, const struct security_descriptor *sd,
  55. const LUID_AND_ATTRIBUTES *filter_privileges, unsigned int priv_count,
  56. const SID *filter_groups, unsigned int group_count, struct token *impersonation );
  57. extern int token_check_privileges( struct token *token, int all_required,
  58. const LUID_AND_ATTRIBUTES *reqprivs,
  59. unsigned int count, LUID_AND_ATTRIBUTES *usedprivs);
  60. extern const ACL *token_get_default_dacl( struct token *token );
  61. extern const SID *token_get_user( struct token *token );
  62. extern const SID *token_get_primary_group( struct token *token );
  63. extern int token_sid_present( struct token *token, const SID *sid, int deny);
  64. extern struct token *get_token_from_handle( obj_handle_t handle, unsigned int access );
  65. extern int token_is_primary( struct token *token );
  66. static inline const ACE_HEADER *ace_next( const ACE_HEADER *ace )
  67. {
  68. return (const ACE_HEADER *)((const char *)ace + ace->AceSize);
  69. }
  70. static inline size_t security_sid_len( const SID *sid )
  71. {
  72. return offsetof( SID, SubAuthority[sid->SubAuthorityCount] );
  73. }
  74. static inline int security_equal_sid( const SID *sid1, const SID *sid2 )
  75. {
  76. return ((sid1->SubAuthorityCount == sid2->SubAuthorityCount) &&
  77. !memcmp( sid1, sid2, security_sid_len( sid1 )));
  78. }
  79. extern void security_set_thread_token( struct thread *thread, obj_handle_t handle );
  80. extern const SID *security_unix_uid_to_sid( uid_t uid );
  81. extern int check_object_access( struct object *obj, unsigned int *access );
  82. static inline int thread_single_check_privilege( struct thread *thread, const LUID *priv)
  83. {
  84. struct token *token = thread_get_impersonation_token( thread );
  85. const LUID_AND_ATTRIBUTES privs = { *priv, 0 };
  86. if (!token) return FALSE;
  87. return token_check_privileges( token, TRUE, &privs, 1, NULL );
  88. }
  89. /* security descriptor helper functions */
  90. extern int sd_is_valid( const struct security_descriptor *sd, data_size_t size );
  91. extern ACL *extract_security_labels( const ACL *sacl );
  92. extern ACL *replace_security_labels( const ACL *old_sacl, const ACL *new_sacl );
  93. /* gets the discretionary access control list from a security descriptor */
  94. static inline const ACL *sd_get_dacl( const struct security_descriptor *sd, int *present )
  95. {
  96. *present = (sd->control & SE_DACL_PRESENT) != 0;
  97. if (sd->dacl_len)
  98. return (const ACL *)((const char *)(sd + 1) +
  99. sd->owner_len + sd->group_len + sd->sacl_len);
  100. else
  101. return NULL;
  102. }
  103. /* gets the system access control list from a security descriptor */
  104. static inline const ACL *sd_get_sacl( const struct security_descriptor *sd, int *present )
  105. {
  106. *present = (sd->control & SE_SACL_PRESENT) != 0;
  107. if (sd->sacl_len)
  108. return (const ACL *)((const char *)(sd + 1) +
  109. sd->owner_len + sd->group_len);
  110. else
  111. return NULL;
  112. }
  113. /* gets the owner from a security descriptor */
  114. static inline const SID *sd_get_owner( const struct security_descriptor *sd )
  115. {
  116. if (sd->owner_len)
  117. return (const SID *)(sd + 1);
  118. else
  119. return NULL;
  120. }
  121. /* gets the primary group from a security descriptor */
  122. static inline const SID *sd_get_group( const struct security_descriptor *sd )
  123. {
  124. if (sd->group_len)
  125. return (const SID *)((const char *)(sd + 1) + sd->owner_len);
  126. else
  127. return NULL;
  128. }
  129. #endif /* __WINE_SERVER_SECURITY_H */