| 1 | /* $Id: sec.cpp,v 1.3 1999-07-06 15:48:45 phaller Exp $ */
|
|---|
| 2 |
|
|---|
| 3 | /*
|
|---|
| 4 | * Project Odin Software License can be found in LICENSE.TXT
|
|---|
| 5 | * Win32 NT Runtime / NTDLL for OS/2
|
|---|
| 6 | *
|
|---|
| 7 | * Copyright 1998 original WINE Author
|
|---|
| 8 | * Copyright 1998, 1999 Patrick Haller (phaller@gmx.net)
|
|---|
| 9 | *
|
|---|
| 10 | * Security functions
|
|---|
| 11 | *
|
|---|
| 12 | * Copyright 1996-1998 Marcus Meissner
|
|---|
| 13 | */
|
|---|
| 14 |
|
|---|
| 15 | #include <stdlib.h>
|
|---|
| 16 | #include <string.h>
|
|---|
| 17 | #include <time.h>
|
|---|
| 18 | #include <ctype.h>
|
|---|
| 19 | #include <math.h>
|
|---|
| 20 |
|
|---|
| 21 | #include <os2win.h>
|
|---|
| 22 | #include "ntdll.h"
|
|---|
| 23 |
|
|---|
| 24 | /*
|
|---|
| 25 | #include "windef.h"
|
|---|
| 26 | #include "winbase.h"
|
|---|
| 27 | #include "winuser.h"
|
|---|
| 28 | #include "wine/winestring.h"
|
|---|
| 29 | #include "heap.h"
|
|---|
| 30 | #include "winnls.h"
|
|---|
| 31 | #include "winuser.h"
|
|---|
| 32 | #include "winerror.h"
|
|---|
| 33 | #include "stackframe.h"
|
|---|
| 34 |
|
|---|
| 35 | #include "winreg.h"
|
|---|
| 36 | */
|
|---|
| 37 |
|
|---|
| 38 | /*
|
|---|
| 39 | * SID FUNCTIONS
|
|---|
| 40 | */
|
|---|
| 41 |
|
|---|
| 42 | /******************************************************************************
|
|---|
| 43 | * RtlAllocateAndInitializeSid [NTDLL.265]
|
|---|
| 44 | *
|
|---|
| 45 | */
|
|---|
| 46 | BOOLEAN WINAPI RtlAllocateAndInitializeSid (PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
|
|---|
| 47 | DWORD nSubAuthorityCount,
|
|---|
| 48 | DWORD x3,
|
|---|
| 49 | DWORD x4,
|
|---|
| 50 | DWORD x5,
|
|---|
| 51 | DWORD x6,
|
|---|
| 52 | DWORD x7,
|
|---|
| 53 | DWORD x8,
|
|---|
| 54 | DWORD x9,
|
|---|
| 55 | DWORD x10,
|
|---|
| 56 | PSID pSid)
|
|---|
| 57 | {
|
|---|
| 58 | dprintf(("NTDLL: RtlAllocateAndInitializeSid(%08xh,%08xh,%08xh,"
|
|---|
| 59 | "%08xh,%08xh,%08xh,%08xh,%08xh,%08xh,%08xh,%08xh) not implemented.\n",
|
|---|
| 60 | pIdentifierAuthority,
|
|---|
| 61 | nSubAuthorityCount,
|
|---|
| 62 | x3,
|
|---|
| 63 | x4,
|
|---|
| 64 | x5,
|
|---|
| 65 | x6,
|
|---|
| 66 | x7,
|
|---|
| 67 | x8,
|
|---|
| 68 | x9,
|
|---|
| 69 | x10,
|
|---|
| 70 | pSid));
|
|---|
| 71 |
|
|---|
| 72 | return 0;
|
|---|
| 73 | }
|
|---|
| 74 |
|
|---|
| 75 |
|
|---|
| 76 | /******************************************************************************
|
|---|
| 77 | * RtlEqualSid [NTDLL.352]
|
|---|
| 78 | *
|
|---|
| 79 | */
|
|---|
| 80 | DWORD WINAPI RtlEqualSid(DWORD x1,
|
|---|
| 81 | DWORD x2)
|
|---|
| 82 | {
|
|---|
| 83 | dprintf(("NTDLL: RtlEqualSid(%08x, %08x) not implemented.\n",
|
|---|
| 84 | x1,
|
|---|
| 85 | x2));
|
|---|
| 86 |
|
|---|
| 87 | return TRUE;
|
|---|
| 88 | }
|
|---|
| 89 |
|
|---|
| 90 |
|
|---|
| 91 | /******************************************************************************
|
|---|
| 92 | * RtlFreeSid [NTDLL.376]
|
|---|
| 93 | */
|
|---|
| 94 | DWORD WINAPI RtlFreeSid(DWORD x1)
|
|---|
| 95 | {
|
|---|
| 96 | dprintf(("NTDLL: RtlFreeSid(%08xh) not implemented.\n",
|
|---|
| 97 | x1));
|
|---|
| 98 |
|
|---|
| 99 | return TRUE;
|
|---|
| 100 | }
|
|---|
| 101 |
|
|---|
| 102 |
|
|---|
| 103 | /**************************************************************************
|
|---|
| 104 | * RtlLengthRequiredSid [NTDLL.427]
|
|---|
| 105 | */
|
|---|
| 106 | DWORD WINAPI RtlLengthRequiredSid(DWORD nrofsubauths)
|
|---|
| 107 | {
|
|---|
| 108 | dprintf (("NTDLL: RtlLengthRequiredSid(%08xh)\n",
|
|---|
| 109 | nrofsubauths));
|
|---|
| 110 |
|
|---|
| 111 | return sizeof(DWORD)*nrofsubauths+sizeof(SID);
|
|---|
| 112 | }
|
|---|
| 113 |
|
|---|
| 114 |
|
|---|
| 115 | /**************************************************************************
|
|---|
| 116 | * RtlLengthSid [NTDLL.429]
|
|---|
| 117 | */
|
|---|
| 118 | DWORD WINAPI RtlLengthSid(PSID sid)
|
|---|
| 119 | {
|
|---|
| 120 | dprintf(("NTDLL: RtlLengthSid(%08xh)\n",
|
|---|
| 121 | sid));
|
|---|
| 122 |
|
|---|
| 123 | if (!sid)
|
|---|
| 124 | return FALSE;
|
|---|
| 125 |
|
|---|
| 126 | return sizeof(DWORD)*sid->SubAuthorityCount+sizeof(SID);
|
|---|
| 127 | }
|
|---|
| 128 |
|
|---|
| 129 |
|
|---|
| 130 | /**************************************************************************
|
|---|
| 131 | * RtlInitializeSid [NTDLL.410]
|
|---|
| 132 | */
|
|---|
| 133 | DWORD WINAPI RtlInitializeSid(PSID psid,
|
|---|
| 134 | PSID_IDENTIFIER_AUTHORITY psidauth,
|
|---|
| 135 | DWORD c)
|
|---|
| 136 | {
|
|---|
| 137 | BYTE a = c & 0xff;
|
|---|
| 138 |
|
|---|
| 139 | dprintf(("NTDLL: RtlInitializeSid(%08xh,%08xh,%08xh)\n",
|
|---|
| 140 | psid,
|
|---|
| 141 | psidauth,
|
|---|
| 142 | c));
|
|---|
| 143 |
|
|---|
| 144 | if (a>=SID_MAX_SUB_AUTHORITIES)
|
|---|
| 145 | return a;
|
|---|
| 146 |
|
|---|
| 147 | psid->SubAuthorityCount = a;
|
|---|
| 148 | psid->Revision = SID_REVISION;
|
|---|
| 149 | memcpy(&(psid->IdentifierAuthority),
|
|---|
| 150 | psidauth,
|
|---|
| 151 | sizeof(SID_IDENTIFIER_AUTHORITY));
|
|---|
| 152 |
|
|---|
| 153 | return STATUS_SUCCESS;
|
|---|
| 154 | }
|
|---|
| 155 |
|
|---|
| 156 |
|
|---|
| 157 | /**************************************************************************
|
|---|
| 158 | * RtlSubAuthoritySid [NTDLL.497]
|
|---|
| 159 | */
|
|---|
| 160 | LPDWORD WINAPI RtlSubAuthoritySid(PSID psid,
|
|---|
| 161 | DWORD nr)
|
|---|
| 162 | {
|
|---|
| 163 | dprintf(("NTDLL: RtlSubAuthoritySid(%08xh,%08xh)\n",
|
|---|
| 164 | psid,
|
|---|
| 165 | nr));
|
|---|
| 166 |
|
|---|
| 167 | return &(psid->SubAuthority[nr]);
|
|---|
| 168 | }
|
|---|
| 169 |
|
|---|
| 170 |
|
|---|
| 171 | /**************************************************************************
|
|---|
| 172 | * RtlSubAuthorityCountSid [NTDLL.496]
|
|---|
| 173 | */
|
|---|
| 174 |
|
|---|
| 175 | LPBYTE WINAPI RtlSubAuthorityCountSid(PSID psid)
|
|---|
| 176 | {
|
|---|
| 177 | dprintf(("NTDLL: RtlSubAUthorityCountSid(%08xh)\n",
|
|---|
| 178 | psid));
|
|---|
| 179 |
|
|---|
| 180 | return ((LPBYTE)psid)+1;
|
|---|
| 181 | }
|
|---|
| 182 |
|
|---|
| 183 |
|
|---|
| 184 | /**************************************************************************
|
|---|
| 185 | * RtlCopySid [NTDLL.302]
|
|---|
| 186 | */
|
|---|
| 187 | DWORD WINAPI RtlCopySid(DWORD len,
|
|---|
| 188 | PSID to,
|
|---|
| 189 | PSID from)
|
|---|
| 190 | {
|
|---|
| 191 | dprintf(("NTDLL: RtlCopySid(%08xh,%08xh,%08xh)\n",
|
|---|
| 192 | len,
|
|---|
| 193 | to,
|
|---|
| 194 | from));
|
|---|
| 195 |
|
|---|
| 196 | if (!from)
|
|---|
| 197 | return 0;
|
|---|
| 198 |
|
|---|
| 199 | if (len<(from->SubAuthorityCount*4+8))
|
|---|
| 200 | return STATUS_BUFFER_TOO_SMALL;
|
|---|
| 201 |
|
|---|
| 202 | memmove(to,
|
|---|
| 203 | from,
|
|---|
| 204 | from->SubAuthorityCount*4+8);
|
|---|
| 205 |
|
|---|
| 206 | return STATUS_SUCCESS;
|
|---|
| 207 | }
|
|---|
| 208 |
|
|---|
| 209 |
|
|---|
| 210 | /*
|
|---|
| 211 | * security descriptor functions
|
|---|
| 212 | */
|
|---|
| 213 |
|
|---|
| 214 | /**************************************************************************
|
|---|
| 215 | * RtlCreateSecurityDescriptor [NTDLL.313]
|
|---|
| 216 | *
|
|---|
| 217 | * RETURNS:
|
|---|
| 218 | * 0 success,
|
|---|
| 219 | * STATUS_INVALID_OWNER, STATUS_PRIVILEGE_NOT_HELD, STATUS_NO_INHERITANCE,
|
|---|
| 220 | * STATUS_NO_MEMORY
|
|---|
| 221 | */
|
|---|
| 222 | NTSTATUS WINAPI RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR lpsd,
|
|---|
| 223 | DWORD rev)
|
|---|
| 224 | {
|
|---|
| 225 | dprintf(("NTDLL: RtlCreateSecurityDescriptor(%08xh,%08xh)\n",
|
|---|
| 226 | lpsd,
|
|---|
| 227 | rev));
|
|---|
| 228 |
|
|---|
| 229 | if (rev!=SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 230 | return STATUS_UNKNOWN_REVISION;
|
|---|
| 231 |
|
|---|
| 232 | memset(lpsd,
|
|---|
| 233 | '\0',
|
|---|
| 234 | sizeof(*lpsd));
|
|---|
| 235 |
|
|---|
| 236 | lpsd->Revision = SECURITY_DESCRIPTOR_REVISION;
|
|---|
| 237 |
|
|---|
| 238 | return STATUS_SUCCESS;
|
|---|
| 239 | }
|
|---|
| 240 |
|
|---|
| 241 |
|
|---|
| 242 | /**************************************************************************
|
|---|
| 243 | * RtlValidSecurityDescriptor [NTDLL.313]
|
|---|
| 244 | *
|
|---|
| 245 | */
|
|---|
| 246 | NTSTATUS WINAPI RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
|---|
| 247 | {
|
|---|
| 248 | dprintf(("NTDLL: RtlValidSecurityDescriptor(%08xh)\n",
|
|---|
| 249 | SecurityDescriptor));
|
|---|
| 250 |
|
|---|
| 251 | if ( ! SecurityDescriptor )
|
|---|
| 252 | return STATUS_INVALID_SECURITY_DESCR;
|
|---|
| 253 |
|
|---|
| 254 | if ( SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION )
|
|---|
| 255 | return STATUS_UNKNOWN_REVISION;
|
|---|
| 256 |
|
|---|
| 257 | return STATUS_SUCCESS;
|
|---|
| 258 | }
|
|---|
| 259 |
|
|---|
| 260 |
|
|---|
| 261 | /**************************************************************************
|
|---|
| 262 | * RtlLengthSecurityDescriptor [NTDLL]
|
|---|
| 263 | */
|
|---|
| 264 | ULONG WINAPI RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
|---|
| 265 | {
|
|---|
| 266 | ULONG Size;
|
|---|
| 267 |
|
|---|
| 268 | dprintf(("NTDLL: RtlLengthSecurityDescriptor(%08xh)\n",
|
|---|
| 269 | SecurityDescriptor));
|
|---|
| 270 |
|
|---|
| 271 | Size = SECURITY_DESCRIPTOR_MIN_LENGTH;
|
|---|
| 272 | if ( SecurityDescriptor == NULL )
|
|---|
| 273 | return 0;
|
|---|
| 274 |
|
|---|
| 275 | if ( SecurityDescriptor->Owner != NULL )
|
|---|
| 276 | Size += SecurityDescriptor->Owner->SubAuthorityCount;
|
|---|
| 277 | if ( SecurityDescriptor->Group != NULL )
|
|---|
| 278 | Size += SecurityDescriptor->Group->SubAuthorityCount;
|
|---|
| 279 |
|
|---|
| 280 |
|
|---|
| 281 | if ( SecurityDescriptor->Sacl != NULL )
|
|---|
| 282 | Size += SecurityDescriptor->Sacl->AclSize;
|
|---|
| 283 | if ( SecurityDescriptor->Dacl != NULL )
|
|---|
| 284 | Size += SecurityDescriptor->Dacl->AclSize;
|
|---|
| 285 |
|
|---|
| 286 | return Size;
|
|---|
| 287 | }
|
|---|
| 288 |
|
|---|
| 289 | /******************************************************************************
|
|---|
| 290 | * RtlGetDaclSecurityDescriptor [NTDLL]
|
|---|
| 291 | *
|
|---|
| 292 | */
|
|---|
| 293 | NTSTATUS WINAPI RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR pSecurityDescriptor,
|
|---|
| 294 | PBOOLEAN lpbDaclPresent,
|
|---|
| 295 | PACL *pDacl,
|
|---|
| 296 | PBOOLEAN lpbDaclDefaulted)
|
|---|
| 297 | {
|
|---|
| 298 | dprintf(("NTDLL: RtlGetDaclSecurityDescriptor(%08xh,%08xh,%08xh,%08xh)\n",
|
|---|
| 299 | pSecurityDescriptor,
|
|---|
| 300 | lpbDaclPresent,
|
|---|
| 301 | pDacl,
|
|---|
| 302 | lpbDaclDefaulted));
|
|---|
| 303 |
|
|---|
| 304 | if (pSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 305 | return STATUS_UNKNOWN_REVISION ;
|
|---|
| 306 |
|
|---|
| 307 | *lpbDaclPresent = (SE_DACL_PRESENT & pSecurityDescriptor->Control);
|
|---|
| 308 | if (*lpbDaclPresent ? 1 : 0)
|
|---|
| 309 | {
|
|---|
| 310 | if ( SE_SELF_RELATIVE & pSecurityDescriptor->Control)
|
|---|
| 311 | {
|
|---|
| 312 | *pDacl = (PACL) ((LPBYTE)pSecurityDescriptor + (DWORD)pSecurityDescriptor->Dacl);
|
|---|
| 313 | }
|
|---|
| 314 | else
|
|---|
| 315 | {
|
|---|
| 316 | *pDacl = pSecurityDescriptor->Dacl;
|
|---|
| 317 | }
|
|---|
| 318 | }
|
|---|
| 319 |
|
|---|
| 320 | *lpbDaclDefaulted = (( SE_DACL_DEFAULTED & pSecurityDescriptor->Control ) ? 1 : 0);
|
|---|
| 321 |
|
|---|
| 322 | return STATUS_SUCCESS;
|
|---|
| 323 | }
|
|---|
| 324 |
|
|---|
| 325 |
|
|---|
| 326 | /**************************************************************************
|
|---|
| 327 | * RtlSetDaclSecurityDescriptor [NTDLL.483]
|
|---|
| 328 | */
|
|---|
| 329 | NTSTATUS WINAPI RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR lpsd,
|
|---|
| 330 | BOOLEAN daclpresent,
|
|---|
| 331 | PACL dacl,
|
|---|
| 332 | BOOLEAN dacldefaulted)
|
|---|
| 333 | {
|
|---|
| 334 | dprintf(("NTDLL: RtlSetDaclSecurityDescriptor(%08xh,%08xh,%08xh,%08xh)\n",
|
|---|
| 335 | lpsd,
|
|---|
| 336 | daclpresent,
|
|---|
| 337 | dacl,
|
|---|
| 338 | dacldefaulted));
|
|---|
| 339 |
|
|---|
| 340 | if (lpsd->Revision!=SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 341 | return STATUS_UNKNOWN_REVISION;
|
|---|
| 342 | if (lpsd->Control & SE_SELF_RELATIVE)
|
|---|
| 343 | return STATUS_INVALID_SECURITY_DESCR;
|
|---|
| 344 |
|
|---|
| 345 | if (!daclpresent)
|
|---|
| 346 | {
|
|---|
| 347 | lpsd->Control &= ~SE_DACL_PRESENT;
|
|---|
| 348 | return TRUE;
|
|---|
| 349 | }
|
|---|
| 350 |
|
|---|
| 351 | lpsd->Control |= SE_DACL_PRESENT;
|
|---|
| 352 | lpsd->Dacl = dacl;
|
|---|
| 353 |
|
|---|
| 354 | if (dacldefaulted)
|
|---|
| 355 | lpsd->Control |= SE_DACL_DEFAULTED;
|
|---|
| 356 | else
|
|---|
| 357 | lpsd->Control &= ~SE_DACL_DEFAULTED;
|
|---|
| 358 |
|
|---|
| 359 | return STATUS_SUCCESS;
|
|---|
| 360 | }
|
|---|
| 361 |
|
|---|
| 362 |
|
|---|
| 363 | /******************************************************************************
|
|---|
| 364 | * RtlGetSaclSecurityDescriptor [NTDLL]
|
|---|
| 365 | *
|
|---|
| 366 | */
|
|---|
| 367 | NTSTATUS WINAPI RtlGetSaclSecurityDescriptor(PSECURITY_DESCRIPTOR pSecurityDescriptor,
|
|---|
| 368 | PBOOLEAN lpbSaclPresent,
|
|---|
| 369 | PACL *pSacl,
|
|---|
| 370 | PBOOLEAN lpbSaclDefaulted)
|
|---|
| 371 | {
|
|---|
| 372 | dprintf(("NTDLL: RtlGetSaclSecurityDescriptor(%08xh,%08xh,%08xh,%08xh)\n",
|
|---|
| 373 | pSecurityDescriptor,
|
|---|
| 374 | lpbSaclPresent,
|
|---|
| 375 | pSacl,
|
|---|
| 376 | lpbSaclDefaulted));
|
|---|
| 377 |
|
|---|
| 378 | if (pSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 379 | return STATUS_UNKNOWN_REVISION ;
|
|---|
| 380 |
|
|---|
| 381 | *lpbSaclPresent = (SE_SACL_PRESENT & pSecurityDescriptor->Control);
|
|---|
| 382 | if (*lpbSaclPresent ? 1 : 0)
|
|---|
| 383 | {
|
|---|
| 384 | if ( SE_SELF_RELATIVE & pSecurityDescriptor->Control)
|
|---|
| 385 | {
|
|---|
| 386 | *pSacl = (PACL) ((LPBYTE)pSecurityDescriptor + (DWORD)pSecurityDescriptor->Sacl);
|
|---|
| 387 | }
|
|---|
| 388 | else
|
|---|
| 389 | {
|
|---|
| 390 | *pSacl = pSecurityDescriptor->Sacl;
|
|---|
| 391 | }
|
|---|
| 392 | }
|
|---|
| 393 |
|
|---|
| 394 | *lpbSaclDefaulted = (( SE_SACL_DEFAULTED & pSecurityDescriptor->Control ) ? 1 : 0);
|
|---|
| 395 |
|
|---|
| 396 | return STATUS_SUCCESS;
|
|---|
| 397 | }
|
|---|
| 398 |
|
|---|
| 399 |
|
|---|
| 400 | /**************************************************************************
|
|---|
| 401 | * RtlSetSaclSecurityDescriptor [NTDLL.488]
|
|---|
| 402 | */
|
|---|
| 403 | NTSTATUS WINAPI RtlSetSaclSecurityDescriptor (PSECURITY_DESCRIPTOR lpsd,
|
|---|
| 404 | BOOLEAN saclpresent,
|
|---|
| 405 | PACL sacl,
|
|---|
| 406 | BOOLEAN sacldefaulted)
|
|---|
| 407 | {
|
|---|
| 408 | dprintf(("NTDLL: RtlSetSaclSecurityDescriptor(%08xh,%08xh,%08xh,%08xh)\n",
|
|---|
| 409 | lpsd,
|
|---|
| 410 | saclpresent,
|
|---|
| 411 | sacl,
|
|---|
| 412 | sacldefaulted));
|
|---|
| 413 |
|
|---|
| 414 | if (lpsd->Revision!=SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 415 | return STATUS_UNKNOWN_REVISION;
|
|---|
| 416 |
|
|---|
| 417 | if (lpsd->Control & SE_SELF_RELATIVE)
|
|---|
| 418 | return STATUS_INVALID_SECURITY_DESCR;
|
|---|
| 419 |
|
|---|
| 420 | if (!saclpresent)
|
|---|
| 421 | {
|
|---|
| 422 | lpsd->Control &= ~SE_SACL_PRESENT;
|
|---|
| 423 | return 0;
|
|---|
| 424 | }
|
|---|
| 425 |
|
|---|
| 426 | lpsd->Control |= SE_SACL_PRESENT;
|
|---|
| 427 | lpsd->Sacl = sacl;
|
|---|
| 428 |
|
|---|
| 429 | if (sacldefaulted)
|
|---|
| 430 | lpsd->Control |= SE_SACL_DEFAULTED;
|
|---|
| 431 | else
|
|---|
| 432 | lpsd->Control &= ~SE_SACL_DEFAULTED;
|
|---|
| 433 |
|
|---|
| 434 | return STATUS_SUCCESS;
|
|---|
| 435 | }
|
|---|
| 436 |
|
|---|
| 437 |
|
|---|
| 438 | /**************************************************************************
|
|---|
| 439 | * RtlGetOwnerSecurityDescriptor [NTDLL.488]
|
|---|
| 440 | */
|
|---|
| 441 | NTSTATUS WINAPI RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|---|
| 442 | PSID *Owner,
|
|---|
| 443 | PBOOLEAN OwnerDefaulted)
|
|---|
| 444 | {
|
|---|
| 445 | dprintf(("NTDLL: RtlGetOwnerSecurityDescriptor(%08xh,%08xh,%08xh)\n",
|
|---|
| 446 | SecurityDescriptor,
|
|---|
| 447 | Owner,
|
|---|
| 448 | OwnerDefaulted));
|
|---|
| 449 |
|
|---|
| 450 | if ( !SecurityDescriptor || !Owner || !OwnerDefaulted )
|
|---|
| 451 | return STATUS_INVALID_PARAMETER;
|
|---|
| 452 |
|
|---|
| 453 | *Owner = SecurityDescriptor->Owner;
|
|---|
| 454 | if ( *Owner != NULL )
|
|---|
| 455 | {
|
|---|
| 456 | if ( SecurityDescriptor->Control & SE_OWNER_DEFAULTED )
|
|---|
| 457 | *OwnerDefaulted = TRUE;
|
|---|
| 458 | else
|
|---|
| 459 | *OwnerDefaulted = FALSE;
|
|---|
| 460 | }
|
|---|
| 461 |
|
|---|
| 462 | return STATUS_SUCCESS;
|
|---|
| 463 | }
|
|---|
| 464 |
|
|---|
| 465 |
|
|---|
| 466 | /**************************************************************************
|
|---|
| 467 | * RtlSetOwnerSecurityDescriptor [NTDLL.487]
|
|---|
| 468 | */
|
|---|
| 469 | NTSTATUS WINAPI RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR lpsd,
|
|---|
| 470 | PSID owner,
|
|---|
| 471 | BOOLEAN ownerdefaulted)
|
|---|
| 472 | {
|
|---|
| 473 | dprintf(("NTDLL: RtlSetOwnerSecurityDescriptor(%08x,%08xh,%08xh)\n",
|
|---|
| 474 | lpsd,
|
|---|
| 475 | owner,
|
|---|
| 476 | ownerdefaulted));
|
|---|
| 477 |
|
|---|
| 478 | if (lpsd->Revision!=SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 479 | return STATUS_UNKNOWN_REVISION;
|
|---|
| 480 | if (lpsd->Control & SE_SELF_RELATIVE)
|
|---|
| 481 | return STATUS_INVALID_SECURITY_DESCR;
|
|---|
| 482 |
|
|---|
| 483 | lpsd->Owner = owner;
|
|---|
| 484 | if (ownerdefaulted)
|
|---|
| 485 | lpsd->Control |= SE_OWNER_DEFAULTED;
|
|---|
| 486 | else
|
|---|
| 487 | lpsd->Control &= ~SE_OWNER_DEFAULTED;
|
|---|
| 488 |
|
|---|
| 489 | return STATUS_SUCCESS;
|
|---|
| 490 | }
|
|---|
| 491 |
|
|---|
| 492 |
|
|---|
| 493 | /**************************************************************************
|
|---|
| 494 | * RtlSetGroupSecurityDescriptor [NTDLL.485]
|
|---|
| 495 | */
|
|---|
| 496 | NTSTATUS WINAPI RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR lpsd,
|
|---|
| 497 | PSID group,
|
|---|
| 498 | BOOLEAN groupdefaulted)
|
|---|
| 499 | {
|
|---|
| 500 | dprintf(("NTDLL: RtlSetGroupSecurityDescriptor(%08xh,%08xh,%08xh)\n",
|
|---|
| 501 | lpsd,
|
|---|
| 502 | group,
|
|---|
| 503 | groupdefaulted));
|
|---|
| 504 |
|
|---|
| 505 | if (lpsd->Revision!=SECURITY_DESCRIPTOR_REVISION)
|
|---|
| 506 | return STATUS_UNKNOWN_REVISION;
|
|---|
| 507 | if (lpsd->Control & SE_SELF_RELATIVE)
|
|---|
| 508 | return STATUS_INVALID_SECURITY_DESCR;
|
|---|
| 509 |
|
|---|
| 510 | lpsd->Group = group;
|
|---|
| 511 | if (groupdefaulted)
|
|---|
| 512 | lpsd->Control |= SE_GROUP_DEFAULTED;
|
|---|
| 513 | else
|
|---|
| 514 | lpsd->Control &= ~SE_GROUP_DEFAULTED;
|
|---|
| 515 |
|
|---|
| 516 | return STATUS_SUCCESS;
|
|---|
| 517 | }
|
|---|
| 518 |
|
|---|
| 519 |
|
|---|
| 520 | /**************************************************************************
|
|---|
| 521 | * RtlGetGroupSecurityDescriptor [NTDLL]
|
|---|
| 522 | */
|
|---|
| 523 | NTSTATUS WINAPI RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|---|
| 524 | PSID *Group,
|
|---|
| 525 | PBOOLEAN GroupDefaulted)
|
|---|
| 526 | {
|
|---|
| 527 | dprintf(("NTDLL: RtlGetGroupSecurityDescriptor(%08xh,%08xh,%08xh)\n",
|
|---|
| 528 | SecurityDescriptor,
|
|---|
| 529 | Group,
|
|---|
| 530 | GroupDefaulted));
|
|---|
| 531 |
|
|---|
| 532 | if ( !SecurityDescriptor || !Group || !GroupDefaulted )
|
|---|
| 533 | return STATUS_INVALID_PARAMETER;
|
|---|
| 534 |
|
|---|
| 535 | *Group = SecurityDescriptor->Group;
|
|---|
| 536 | if ( *Group != NULL )
|
|---|
| 537 | {
|
|---|
| 538 | if ( SecurityDescriptor->Control & SE_GROUP_DEFAULTED )
|
|---|
| 539 | *GroupDefaulted = TRUE;
|
|---|
| 540 | else
|
|---|
| 541 | *GroupDefaulted = FALSE;
|
|---|
| 542 | }
|
|---|
| 543 |
|
|---|
| 544 | return STATUS_SUCCESS;
|
|---|
| 545 | }
|
|---|
| 546 |
|
|---|
| 547 |
|
|---|
| 548 | /*
|
|---|
| 549 | * access control list's
|
|---|
| 550 | */
|
|---|
| 551 |
|
|---|
| 552 | /**************************************************************************
|
|---|
| 553 | * RtlCreateAcl [NTDLL.306]
|
|---|
| 554 | *
|
|---|
| 555 | * NOTES
|
|---|
| 556 | * This should return NTSTATUS
|
|---|
| 557 | */
|
|---|
| 558 | DWORD WINAPI RtlCreateAcl(PACL acl,
|
|---|
| 559 | DWORD size,
|
|---|
| 560 | DWORD rev)
|
|---|
| 561 | {
|
|---|
| 562 | dprintf(("NTDLL: RtlCreateAcl(%08xh,%08xh,%08xh)\n",
|
|---|
| 563 | acl,
|
|---|
| 564 | size,
|
|---|
| 565 | rev));
|
|---|
| 566 |
|
|---|
| 567 | if (rev!=ACL_REVISION)
|
|---|
| 568 | return STATUS_INVALID_PARAMETER;
|
|---|
| 569 | if (size<sizeof(ACL))
|
|---|
| 570 | return STATUS_BUFFER_TOO_SMALL;
|
|---|
| 571 | if (size>0xFFFF)
|
|---|
| 572 | return STATUS_INVALID_PARAMETER;
|
|---|
| 573 |
|
|---|
| 574 | memset(acl,'\0',sizeof(ACL));
|
|---|
| 575 | acl->AclRevision = rev;
|
|---|
| 576 | acl->AclSize = size;
|
|---|
| 577 | acl->AceCount = 0;
|
|---|
| 578 |
|
|---|
| 579 | return 0;
|
|---|
| 580 | }
|
|---|
| 581 |
|
|---|
| 582 |
|
|---|
| 583 | /**************************************************************************
|
|---|
| 584 | * RtlFirstFreeAce [NTDLL.370]
|
|---|
| 585 | * looks for the AceCount+1 ACE, and if it is still within the alloced
|
|---|
| 586 | * ACL, return a pointer to it
|
|---|
| 587 | */
|
|---|
| 588 | BOOLEAN WINAPI RtlFirstFreeAce(PACL acl,
|
|---|
| 589 | PACE_HEADER *x)
|
|---|
| 590 | {
|
|---|
| 591 | PACE_HEADER ace;
|
|---|
| 592 | int i;
|
|---|
| 593 |
|
|---|
| 594 | dprintf(("NTDLL: RtlFirstFreeAct(%08xh,%08xh)\n",
|
|---|
| 595 | acl,
|
|---|
| 596 | x));
|
|---|
| 597 |
|
|---|
| 598 | *x = 0;
|
|---|
| 599 | ace = (PACE_HEADER)(acl+1);
|
|---|
| 600 | for (i=0;
|
|---|
| 601 | i<acl->AceCount;
|
|---|
| 602 | i++)
|
|---|
| 603 | {
|
|---|
| 604 | if ((DWORD)ace>=(((DWORD)acl)+acl->AclSize))
|
|---|
| 605 | return 0;
|
|---|
| 606 |
|
|---|
| 607 | ace = (PACE_HEADER)(((BYTE*)ace)+ace->AceSize);
|
|---|
| 608 | }
|
|---|
| 609 |
|
|---|
| 610 | if ((DWORD)ace>=(((DWORD)acl)+acl->AclSize))
|
|---|
| 611 | return 0;
|
|---|
| 612 |
|
|---|
| 613 | *x = ace;
|
|---|
| 614 | return 1;
|
|---|
| 615 | }
|
|---|
| 616 |
|
|---|
| 617 |
|
|---|
| 618 | /**************************************************************************
|
|---|
| 619 | * RtlAddAce [NTDLL.260]
|
|---|
| 620 | */
|
|---|
| 621 | NTSTATUS WINAPI RtlAddAce(PACL acl,
|
|---|
| 622 | DWORD rev,
|
|---|
| 623 | DWORD xnrofaces,
|
|---|
| 624 | PACE_HEADER acestart,
|
|---|
| 625 | DWORD acelen)
|
|---|
| 626 | {
|
|---|
| 627 | PACE_HEADER ace,targetace;
|
|---|
| 628 | int nrofaces;
|
|---|
| 629 |
|
|---|
| 630 | dprintf(("NTDLL: RtlAddAce(%08xh,%08xh,%08xh,%08xh,%08xh)\n",
|
|---|
| 631 | acl,
|
|---|
| 632 | rev,
|
|---|
| 633 | xnrofaces,
|
|---|
| 634 | acestart,
|
|---|
| 635 | acelen));
|
|---|
| 636 |
|
|---|
| 637 | if (acl->AclRevision != ACL_REVISION)
|
|---|
| 638 | return STATUS_INVALID_PARAMETER;
|
|---|
| 639 |
|
|---|
| 640 | if (!RtlFirstFreeAce(acl,&targetace))
|
|---|
| 641 | return STATUS_INVALID_PARAMETER;
|
|---|
| 642 |
|
|---|
| 643 | nrofaces=0;
|
|---|
| 644 | ace=acestart;
|
|---|
| 645 |
|
|---|
| 646 | while (((DWORD)ace-(DWORD)acestart)<acelen)
|
|---|
| 647 | {
|
|---|
| 648 | nrofaces++;
|
|---|
| 649 | ace = (PACE_HEADER)(((BYTE*)ace)+ace->AceSize);
|
|---|
| 650 | }
|
|---|
| 651 |
|
|---|
| 652 | if ((DWORD)targetace+acelen>(DWORD)acl+acl->AclSize) /* too much aces */
|
|---|
| 653 | return STATUS_INVALID_PARAMETER;
|
|---|
| 654 |
|
|---|
| 655 | memcpy((LPBYTE)targetace,acestart,acelen);
|
|---|
| 656 | acl->AceCount+=nrofaces;
|
|---|
| 657 |
|
|---|
| 658 | return STATUS_SUCCESS;
|
|---|
| 659 | }
|
|---|
| 660 |
|
|---|
| 661 |
|
|---|
| 662 | /******************************************************************************
|
|---|
| 663 | * RtlAddAccessAllowedAce [NTDLL]
|
|---|
| 664 | */
|
|---|
| 665 | DWORD WINAPI RtlAddAccessAllowedAce(DWORD x1,
|
|---|
| 666 | DWORD x2,
|
|---|
| 667 | DWORD x3,
|
|---|
| 668 | DWORD x4)
|
|---|
| 669 | {
|
|---|
| 670 | dprintf(("NTDLL: RtlAddAccessAllowedAce(%08xh,%08xh,%08xh,%08xh) not implemented.\n",
|
|---|
| 671 | x1,
|
|---|
| 672 | x2,
|
|---|
| 673 | x3,
|
|---|
| 674 | x4));
|
|---|
| 675 |
|
|---|
| 676 | return 0;
|
|---|
| 677 | }
|
|---|
| 678 |
|
|---|
| 679 |
|
|---|
| 680 | /******************************************************************************
|
|---|
| 681 | * RtlGetAce [NTDLL]
|
|---|
| 682 | */
|
|---|
| 683 | DWORD WINAPI RtlGetAce(PACL pAcl,
|
|---|
| 684 | DWORD dwAceIndex,
|
|---|
| 685 | LPVOID *pAce )
|
|---|
| 686 | {
|
|---|
| 687 | dprintf(("NTDLL: RtlGetAce(%08x,%08x,%08x) not implemented.\n",
|
|---|
| 688 | pAcl,
|
|---|
| 689 | dwAceIndex,
|
|---|
| 690 | pAce));
|
|---|
| 691 |
|
|---|
| 692 | return 0;
|
|---|
| 693 | }
|
|---|
| 694 |
|
|---|
| 695 |
|
|---|
| 696 | /*
|
|---|
| 697 | * misc
|
|---|
| 698 | */
|
|---|
| 699 |
|
|---|
| 700 | /******************************************************************************
|
|---|
| 701 | * RtlAdjustPrivilege [NTDLL]
|
|---|
| 702 | */
|
|---|
| 703 | DWORD WINAPI RtlAdjustPrivilege(DWORD x1,
|
|---|
| 704 | DWORD x2,
|
|---|
| 705 | DWORD x3,
|
|---|
| 706 | DWORD x4)
|
|---|
| 707 | {
|
|---|
| 708 | dprintf(("NTDLL: RtlAdjustPrivilege(%08xh,%08xh,%08xh,%08xh) not implemented.\n",
|
|---|
| 709 | x1,
|
|---|
| 710 | x2,
|
|---|
| 711 | x3,
|
|---|
| 712 | x4));
|
|---|
| 713 |
|
|---|
| 714 | return 0;
|
|---|
| 715 | }
|
|---|
| 716 |
|
|---|