blob: 8a6504a6f1e067f6b623afb6298d8e24b9ed76f4 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
|
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2009 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#ifndef _SMB_PRIVILEGE_H
#define _SMB_PRIVILEGE_H
#ifdef __cplusplus
extern "C" {
#endif
/*
* Privileges
*
* Privileges apply to all objects and over-ride the access controls
* in an object's security descriptor in a manner specific to each
* privilege. Privileges are still not full defined. Privileges are
* defined in a set structure (LUID = Locally Unique Identifier).
*
* The default LUID, name and display names defined on NT 4.0 are:
* LUID Privilege Name Display Name
* ---- -------------- ------------
* 0:2 SeCreateTokenPrivilege Create a token object
* 0:3 SeAssignPrimaryTokenPrivilege Replace a process level token
* 0:4 SeLockMemoryPrivilege Lock pages in memory
* 0:5 SeIncreaseQuotaPrivilege Increase quotas
* 0:6 SeMachineAccountPrivilege Add workstations to domain
* 0:7 SeTcbPrivilege Act as part of the operating system
* 0:8 SeSecurityPrivilege Manage auditing and security log
* 0:9 SeTakeOwnershipPrivilege Take ownership of files or other objects
* 0:10 SeLoadDriverPrivilege Load and unload device drivers
* 0:11 SeSystemProfilePrivilege Profile system performance
* 0:12 SeSystemtimePrivilege Change the system time
* 0:13 SeProfileSingleProcessPrivilege Profile single process
* 0:14 SeIncreaseBasePriorityPrivilege Increase scheduling priority
* 0:15 SeCreatePagefilePrivilege Create a pagefile
* 0:16 SeCreatePermanentPrivilege Create permanent shared objects
* 0:17 SeBackupPrivilege Back up files and directories
* 0:18 SeRestorePrivilege Restore files and directories
* 0:19 SeShutdownPrivilege Shut down the system
* 0:20 SeDebugPrivilege Debug programs
* 0:21 SeAuditPrivilege Generate security audits
* 0:22 SeSystemEnvironmentPrivilege Modify firmware environment values
* 0:23 SeChangeNotifyPrivilege Bypass traverse checking
* 0:24 SeRemoteShutdownPrivilege Force shutdown from a remote system
*/
/*
* Privilege names
*/
#define SE_CREATE_TOKEN_NAME "SeCreateTokenPrivilege"
#define SE_ASSIGNPRIMARYTOKEN_NAME "SeAssignPrimaryTokenPrivilege"
#define SE_LOCK_MEMORY_NAME "SeLockMemoryPrivilege"
#define SE_INCREASE_QUOTA_NAME "SeIncreaseQuotaPrivilege"
#define SE_UNSOLICITED_INPUT_NAME "SeUnsolicitedInputPrivilege"
#define SE_MACHINE_ACCOUNT_NAME "SeMachineAccountPrivilege"
#define SE_TCB_NAME "SeTcbPrivilege"
#define SE_SECURITY_NAME "SeSecurityPrivilege"
#define SE_TAKE_OWNERSHIP_NAME "SeTakeOwnershipPrivilege"
#define SE_LOAD_DRIVER_NAME "SeLoadDriverPrivilege"
#define SE_SYSTEM_PROFILE_NAME "SeSystemProfilePrivilege"
#define SE_SYSTEMTIME_NAME "SeSystemtimePrivilege"
#define SE_PROF_SINGLE_PROCESS_NAME "SeProfileSingleProcessPrivilege"
#define SE_INC_BASE_PRIORITY_NAME "SeIncreaseBasePriorityPrivilege"
#define SE_CREATE_PAGEFILE_NAME "SeCreatePagefilePrivilege"
#define SE_CREATE_PERMANENT_NAME "SeCreatePermanentPrivilege"
#define SE_BACKUP_NAME "SeBackupPrivilege"
#define SE_RESTORE_NAME "SeRestorePrivilege"
#define SE_SHUTDOWN_NAME "SeShutdownPrivilege"
#define SE_DEBUG_NAME "SeDebugPrivilege"
#define SE_AUDIT_NAME "SeAuditPrivilege"
#define SE_SYSTEM_ENVIRONMENT_NAME "SeSystemEnvironmentPrivilege"
#define SE_CHANGE_NOTIFY_NAME "SeChangeNotifyPrivilege"
#define SE_REMOTE_SHUTDOWN_NAME "SeRemoteShutdownPrivilege"
#define SE_MIN_LUID 2
#define SE_CREATE_TOKEN_LUID 2
#define SE_ASSIGNPRIMARYTOKEN_LUID 3
#define SE_LOCK_MEMORY_LUID 4
#define SE_INCREASE_QUOTA_LUID 5
#define SE_MACHINE_ACCOUNT_LUID 6
#define SE_TCB_LUID 7
#define SE_SECURITY_LUID 8
#define SE_TAKE_OWNERSHIP_LUID 9
#define SE_LOAD_DRIVER_LUID 10
#define SE_SYSTEM_PROFILE_LUID 11
#define SE_SYSTEMTIME_LUID 12
#define SE_PROF_SINGLE_PROCESS_LUID 13
#define SE_INC_BASE_PRIORITY_LUID 14
#define SE_CREATE_PAGEFILE_LUID 15
#define SE_CREATE_PERMANENT_LUID 16
#define SE_BACKUP_LUID 17
#define SE_RESTORE_LUID 18
#define SE_SHUTDOWN_LUID 19
#define SE_DEBUG_LUID 20
#define SE_AUDIT_LUID 21
#define SE_SYSTEM_ENVIRONMENT_LUID 22
#define SE_CHANGE_NOTIFY_LUID 23
#define SE_REMOTE_SHUTDOWN_LUID 24
#define SE_MAX_LUID 24
/*
* Privilege attributes
*/
#define SE_PRIVILEGE_DISABLED 0x00000000
#define SE_PRIVILEGE_ENABLED_BY_DEFAULT 0x00000001
#define SE_PRIVILEGE_ENABLED 0x00000002
#define SE_PRIVILEGE_USED_FOR_ACCESS 0x80000000
/*
* Privilege Set Control flags
*/
#define PRIVILEGE_SET_ALL_NECESSARY 1
typedef struct smb_luid {
uint32_t lo_part;
uint32_t hi_part;
} smb_luid_t;
typedef struct smb_luid_attrs {
smb_luid_t luid;
uint32_t attrs;
} smb_luid_attrs_t;
typedef struct smb_privset {
uint32_t priv_cnt;
uint32_t control;
smb_luid_attrs_t priv[ANY_SIZE_ARRAY];
} smb_privset_t;
/*
* These are possible value for smb_privinfo_t.flags
*
* PF_PRESENTABLE Privilege is user visible
*/
#define PF_PRESENTABLE 0x1
/*
* Structure for passing privilege name and id information around within
* the system. Note that we are only storing the low uint32_t of the LUID;
* the high part is always zero here.
*/
typedef struct smb_privinfo {
uint32_t id;
char *name;
char *display_name;
uint16_t flags;
} smb_privinfo_t;
smb_privinfo_t *smb_priv_getbyvalue(uint32_t id);
smb_privinfo_t *smb_priv_getbyname(char *name);
int smb_priv_presentable_num(void);
int smb_priv_presentable_ids(uint32_t *ids, int num);
smb_privset_t *smb_privset_new();
int smb_privset_size();
void smb_privset_init(smb_privset_t *privset);
void smb_privset_free(smb_privset_t *privset);
void smb_privset_copy(smb_privset_t *dst, smb_privset_t *src);
void smb_privset_merge(smb_privset_t *dst, smb_privset_t *src);
void smb_privset_enable(smb_privset_t *privset, uint32_t id);
int smb_privset_query(smb_privset_t *privset, uint32_t id);
void smb_privset_log(smb_privset_t *privset);
#ifdef __cplusplus
}
#endif
#endif /* _SMB_PRIVILEGE_H */
|