- Timestamp:
- Jan 5, 2000, 8:37:29 PM (26 years ago)
- Location:
- trunk/src/NTDLL
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/NTDLL/nt.cpp
r2128 r2327 1 /* $Id: nt.cpp,v 1. 4 1999-12-18 21:45:13sandervl Exp $ */1 /* $Id: nt.cpp,v 1.5 2000-01-05 19:37:29 sandervl Exp $ */ 2 2 3 3 … … 19 19 20 20 #include "ntdll.h" 21 #include <ntdllsec.h> 21 22 22 23 … … 288 289 TokenHandle)); 289 290 290 *TokenHandle = 0; 291 return ERROR_INVALID_HANDLE; 291 return HMOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle); 292 292 } 293 293 -
trunk/src/NTDLL/ntdll.cpp
r2128 r2327 1 /* $Id: ntdll.cpp,v 1. 5 1999-12-18 21:45:13sandervl Exp $ */1 /* $Id: ntdll.cpp,v 1.6 2000-01-05 19:37:29 sandervl Exp $ */ 2 2 3 3 /* … … 42 42 43 43 #include "ntdll.h" 44 44 #include <ntdllsec.h> 45 45 46 46 /***************************************************************************** … … 94 94 NTDLL_hHeap = HeapCreate(0, 0x10000, 0); 95 95 96 ProcSecInfo.dwType = SECTYPE_PROCESS ;96 ProcSecInfo.dwType = SECTYPE_PROCESS | SECTYPE_INITIALIZED; 97 97 RtlAllocateAndInitializeSid(&sidIdAuth, 1, 0, 0, 0, 0, 0, 0, 0, 0, &ProcSecInfo.SidUser.User.Sid); 98 98 ProcSecInfo.SidUser.User.Attributes = 0; //????????? -
trunk/src/NTDLL/ntdll.h
r2134 r2327 1 /* $Id: ntdll.h,v 1.1 0 1999-12-19 12:25:55sandervl Exp $ */1 /* $Id: ntdll.h,v 1.11 2000-01-05 19:37:29 sandervl Exp $ */ 2 2 3 3 /* … … 658 658 PSID_IDENTIFIER_AUTHORITY WINAPI GetSidIdentifierAuthority(PSID); 659 659 660 //SvL: Security data for win32 process (nothing fancy; just trying to fool apps661 // into thinking the security subsystem is in perfect shape.662 #define SECTYPE_THREAD 0663 #define SECTYPE_PROCESS 1664 665 typedef struct {666 DWORD dwType;667 TOKEN_USER SidUser;668 TOKEN_GROUPS *pTokenGroups;669 PRIVILEGE_SET *pPrivilegeSet;670 TOKEN_PRIVILEGES *pTokenPrivileges;671 TOKEN_OWNER TokenOwner;672 TOKEN_PRIMARY_GROUP PrimaryGroup;673 TOKEN_DEFAULT_DACL DefaultDACL;674 TOKEN_SOURCE TokenSource;675 TOKEN_TYPE TokenType;676 } PROCESSTHREAD_SECURITYINFO;677 678 //Per process info; Should probably be stored in process database structure679 extern PROCESSTHREAD_SECURITYINFO ProcSecInfo;680 681 660 #ifdef __cplusplus 682 661 }
Note:
See TracChangeset
for help on using the changeset viewer.