security.h 5.62 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
/*
 * Security Management
 *
 * Copyright (C) 2005 Robert Shearman
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
18
 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19 20
 */

21 22 23
#ifndef __WINE_SERVER_SECURITY_H
#define __WINE_SERVER_SECURITY_H

24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
extern const LUID SeIncreaseQuotaPrivilege;
extern const LUID SeSecurityPrivilege;
extern const LUID SeTakeOwnershipPrivilege;
extern const LUID SeLoadDriverPrivilege;
extern const LUID SeSystemProfilePrivilege;
extern const LUID SeSystemtimePrivilege;
extern const LUID SeProfileSingleProcessPrivilege;
extern const LUID SeIncreaseBasePriorityPrivilege;
extern const LUID SeCreatePagefilePrivilege;
extern const LUID SeBackupPrivilege;
extern const LUID SeRestorePrivilege;
extern const LUID SeShutdownPrivilege;
extern const LUID SeDebugPrivilege;
extern const LUID SeSystemEnvironmentPrivilege;
extern const LUID SeChangeNotifyPrivilege;
extern const LUID SeRemoteShutdownPrivilege;
extern const LUID SeUndockPrivilege;
extern const LUID SeManageVolumePrivilege;
extern const LUID SeImpersonatePrivilege;
extern const LUID SeCreateGlobalPrivilege;

45
extern const PSID security_world_sid;
46
extern const PSID security_local_user_sid;
47
extern const PSID security_local_system_sid;
48
extern const PSID security_builtin_users_sid;
49
extern const PSID security_builtin_admins_sid;
50
extern const PSID security_domain_users_sid;
51
extern const PSID security_high_label_sid;
52

53 54 55

/* token functions */

56
extern struct token *get_token_obj( struct process *process, obj_handle_t handle, unsigned int access );
57
extern struct token *token_create_admin( int elevation );
58
extern int token_assign_label( struct token *token, PSID label );
59
extern struct token *token_duplicate( struct token *src_token, unsigned primary,
60 61 62
                                      int impersonation_level, const struct security_descriptor *sd,
                                      const LUID_AND_ATTRIBUTES *remove_privs, unsigned int remove_priv_count,
                                      const SID *remove_groups, unsigned int remove_group_count );
63 64 65
extern int token_check_privileges( struct token *token, int all_required,
                                   const LUID_AND_ATTRIBUTES *reqprivs,
                                   unsigned int count, LUID_AND_ATTRIBUTES *usedprivs);
66
extern const ACL *token_get_default_dacl( struct token *token );
67 68
extern const SID *token_get_user( struct token *token );
extern const SID *token_get_primary_group( struct token *token );
69
extern int token_sid_present( struct token *token, const SID *sid, int deny);
70

71 72 73 74 75
static inline const ACE_HEADER *ace_next( const ACE_HEADER *ace )
{
    return (const ACE_HEADER *)((const char *)ace + ace->AceSize);
}

76 77 78 79 80
static inline size_t security_sid_len( const SID *sid )
{
    return offsetof( SID, SubAuthority[sid->SubAuthorityCount] );
}

81 82 83
static inline int security_equal_sid( const SID *sid1, const SID *sid2 )
{
    return ((sid1->SubAuthorityCount == sid2->SubAuthorityCount) &&
84
            !memcmp( sid1, sid2, security_sid_len( sid1 )));
85 86
}

87
extern void security_set_thread_token( struct thread *thread, obj_handle_t handle );
88
extern const SID *security_unix_uid_to_sid( uid_t uid );
89
extern int check_object_access( struct token *token, struct object *obj, unsigned int *access );
90 91 92 93 94 95 96 97 98 99

static inline int thread_single_check_privilege( struct thread *thread, const LUID *priv)
{
    struct token *token = thread_get_impersonation_token( thread );
    const LUID_AND_ATTRIBUTES privs = { *priv, 0 };

    if (!token) return FALSE;

    return token_check_privileges( token, TRUE, &privs, 1, NULL );
}
100 101 102 103 104


/* security descriptor helper functions */

extern int sd_is_valid( const struct security_descriptor *sd, data_size_t size );
105
extern ACL *extract_security_labels( const ACL *sacl );
106
extern ACL *replace_security_labels( const ACL *old_sacl, const ACL *new_sacl );
107 108 109 110

/* gets the discretionary access control list from a security descriptor */
static inline const ACL *sd_get_dacl( const struct security_descriptor *sd, int *present )
{
111
    *present = (sd->control & SE_DACL_PRESENT) != 0;
112 113 114 115 116 117 118 119 120 121 122

    if (sd->dacl_len)
        return (const ACL *)((const char *)(sd + 1) +
            sd->owner_len + sd->group_len + sd->sacl_len);
    else
        return NULL;
}

/* gets the system access control list from a security descriptor */
static inline const ACL *sd_get_sacl( const struct security_descriptor *sd, int *present )
{
123
    *present = (sd->control & SE_SACL_PRESENT) != 0;
124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148

    if (sd->sacl_len)
        return (const ACL *)((const char *)(sd + 1) +
            sd->owner_len + sd->group_len);
    else
        return NULL;
}

/* gets the owner from a security descriptor */
static inline const SID *sd_get_owner( const struct security_descriptor *sd )
{
    if (sd->owner_len)
        return (const SID *)(sd + 1);
    else
        return NULL;
}

/* gets the primary group from a security descriptor */
static inline const SID *sd_get_group( const struct security_descriptor *sd )
{
    if (sd->group_len)
        return (const SID *)((const char *)(sd + 1) + sd->owner_len);
    else
        return NULL;
}
149

150
#endif  /* __WINE_SERVER_SECURITY_H */