00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
00024
00025
00026
00027
00028
00029
#ifndef _TOKENP_
00030
#define _TOKENP_
00031
00032
00033
00034
#include "ntos.h"
00035
#include "sep.h"
00036
#include "seopaque.h"
00037
00038
00039
00041
00042
00043
00045
00046
00047
00048
#if DBG
00049
#define TOKEN_DIAGNOSTICS_ENABLED 1
00050
#endif // DBG
00051
00052
00053
00054
00055
00056
00057
#if TOKEN_DIAGNOSTICS_ENABLED
00058
00059
00060
00061
00062
00063
#define IF_TOKEN_GLOBAL( FlagName ) \
00064
if (TokenGlobalFlag & (TOKEN_DIAG_##FlagName))
00065
00066
00067
00068
00069
00070
#define TokenDiagPrint( FlagName, _Text_ ) \
00071
IF_TOKEN_GLOBAL( FlagName ) \
00072
DbgPrint _Text_
00073
00074
00075
00076
#else // !TOKEN_DIAGNOSTICS_ENABLED
00077
00078
00079
00080
00081
00082
00083
00084
00085
00086
00087 #define IF_TOKEN_GLOBAL( FlagName ) if (FALSE)
00088
00089
00090
00091
00092
00093 #define TokenDiagPrint( FlagName, _Text_ ) ;
00094
00095
#endif // TOKEN_DIAGNOSTICS_ENABLED
00096
00097
00098
00099
00100
00101
00102
00103
00104
00105
00106
00107
00108 #define TOKEN_DIAG_TOKEN_LOCKS ((ULONG) 0x00000001L)
00109
00110
00112
00113
00114
00116
00117
00118
00119
00120
00121
00122
00123
00124 #define TOKEN_DEFAULT_DYNAMIC_CHARGE 500
00125
00126
00127
00129
00130
00131
00133
00134
00135
00136
00137
00138
00139
00140
00141
00142
00143
00144
00145
00146
00147
00148
00149
00150
00151
00152
00153
00154
00155
00156
00157
00158
00159
00160
00161
00162
00163
00164
00165
00166
00167
00168
00169
00170
00171
00172
00173
00174
00175
00176
00177
00178
00179
00180
00181
00182
00183
00184
00185
00186
00187
00188
00189
00190
00191
00192
00193
00194
00195
00196
00197
00198
00199
00200
00201
00202
00203
00204
00205
00206
00207
00208
00209 typedef struct _TOKEN {
00210
00211
00212
00213
00214
00215
00216
00217
00218
00219
00220
00221
00222
00223
00224
00225
00226
00227
00228
00229
00230 TOKEN_SOURCE
TokenSource;
00231
00232 LUID
TokenId;
00233 LUID
AuthenticationId;
00234 LUID
ParentTokenId;
00235 LARGE_INTEGER
ExpirationTime;
00236
00237
00238
00239
00240
00241
00242
00243 LUID
ModifiedId;
00244
00245 ULONG
SessionId;
00246 ULONG
UserAndGroupCount;
00247 ULONG
RestrictedSidCount;
00248 ULONG
PrivilegeCount;
00249 ULONG
VariableLength;
00250 ULONG
DynamicCharged;
00251
00252 ULONG
DynamicAvailable;
00253 ULONG
DefaultOwnerIndex;
00254 PSID_AND_ATTRIBUTES
UserAndGroups;
00255 PSID_AND_ATTRIBUTES
RestrictedSids;
00256 PSID
PrimaryGroup;
00257 PLUID_AND_ATTRIBUTES
Privileges;
00258 PULONG
DynamicPart;
00259 PACL
DefaultDacl;
00260
00261
00262
00263 TOKEN_TYPE
TokenType;
00264 SECURITY_IMPERSONATION_LEVEL
ImpersonationLevel;
00265
00266 UCHAR
TokenFlags;
00267 BOOLEAN
TokenInUse;
00268
00269 PSECURITY_TOKEN_PROXY_DATA
ProxyData;
00270 PSECURITY_TOKEN_AUDIT_DATA
AuditData;
00271
00272
00273
00274
00275
00276
00277 ULONG
VariablePart;
00278
00279 }
TOKEN, *
PTOKEN;
00280
00281
00282
00283
00284
00285
00286
00287
00288
00289
00290
00291
00292
00293
00294
00295
00296
00297
00298
00299
00300
00301
00302
00303
00304
00305
00306
00307
00308
00309
00310
00311
00312
00313
00314
00315
00316
00317
00318
00319
00320
00321
00322
00323
00324
00325
00326
00327
00328
00329
00330
00331
00332
00333
00334
00335
00336
00337
00338
00339
00340
00341
00342
00343
00344
00345
00346
00347
00348
00349
00350
00351
00352
00353
00354
00355
00356
00357
00358
00359
00360
00361
00362
00363
00364
00365
00366
00368
00369
00370
00372
00373 typedef struct _IOBJECT_TYPE_LIST {
00374 USHORT Level;
00375 USHORT Flags;
00376 #define OBJECT_SUCCESS_AUDIT 0x1
00377 #define OBJECT_FAILURE_AUDIT 0x2
00378 GUID
ObjectType;
00379 LONG
ParentIndex;
00380 ULONG
Remaining;
00381 ULONG
CurrentGranted;
00382 ULONG
CurrentDenied;
00383 }
IOBJECT_TYPE_LIST, *
PIOBJECT_TYPE_LIST;
00384
00385
NTSTATUS
00386
SeCaptureObjectTypeList (
00387 IN POBJECT_TYPE_LIST ObjectTypeList OPTIONAL,
00388 IN ULONG ObjectTypeListLength,
00389 IN KPROCESSOR_MODE RequestorMode,
00390 OUT PIOBJECT_TYPE_LIST *CapturedObjectTypeList
00391 );
00392
00393
VOID
00394
SeFreeCapturedObjectTypeList(
00395 IN PVOID ObjectTypeList
00396 );
00397
00398
00400
00401
00402
00404
00405
00406
00407
00408
00409
00410
00411
#ifndef TOKEN_DIAGNOSTICS_ENABLED
00412
00413 #define SepAcquireTokenReadLock(T) KeEnterCriticalRegion(); \
00414
ExAcquireResourceShared(&SepTokenLock, TRUE)
00415
00416 #define SepAcquireTokenWriteLock(T) KeEnterCriticalRegion(); \
00417
ExAcquireResourceExclusive(&SepTokenLock, TRUE)
00418
00419 #define SepReleaseTokenReadLock(T) ExReleaseResource(&SepTokenLock); \
00420
KeLeaveCriticalRegion()
00421
00422
#else // TOKEN_DIAGNOSTICS_ENABLED
00423
00424
#define SepAcquireTokenReadLock(T) if (TokenGlobalFlag & TOKEN_DIAG_TOKEN_LOCKS) { \
00425
DbgPrint("SE (Token): Acquiring Token READ Lock for access to token 0x%lx\n", (T)); \
00426
} \
00427
KeEnterCriticalRegion(); \
00428
ExAcquireResourceShared(&SepTokenLock, TRUE)
00429
00430
#define SepAcquireTokenWriteLock(T) if (TokenGlobalFlag & TOKEN_DIAG_TOKEN_LOCKS) { \
00431
DbgPrint("SE (Token): Acquiring Token WRITE Lock for access to token 0x%lx ********************* EXCLUSIVE *****\n", (T)); \
00432
} \
00433
KeEnterCriticalRegion(); \
00434
ExAcquireResourceExclusive(&SepTokenLock, TRUE)
00435
00436
#define SepReleaseTokenReadLock(T) if (TokenGlobalFlag & TOKEN_DIAG_TOKEN_LOCKS) { \
00437
DbgPrint("SE (Token): Releasing Token Lock for access to token 0x%lx\n", (T)); \
00438
} \
00439
ExReleaseResource(&SepTokenLock); \
00440
KeLeaveCriticalRegion()
00441
00442
#endif // TOKEN_DIAGNOSTICS_ENABLED
00443
00444 #define SepReleaseTokenWriteLock(T,M) \
00445
{ \
00446
if ((M)) { \
00447
ExAllocateLocallyUniqueId( &((PTOKEN)(T))->ModifiedId ); \
00448
} \
00449
SepReleaseTokenReadLock( T ); \
00450
}
00451
00452
00453
00454
00455
00456
00457
00458
00459
00460 #define SepArrayPrivilegeAttributes(P,I) ( (P)[I].Attributes )
00461
00462
00463
00464
00465
00466
00467
00468
00469
00470 #define SepTokenPrivilegeAttributes(T,I) ( (T)->Privileges[I].Attributes )
00471
00472
00473
00474
00475
00476
00477
00478
00479 #define SepArrayGroupAttributes(G,I) ( (G)[I].Attributes )
00480
00481
00482
00483
00484
00485
00486
00487
00488
00489 #define SepTokenGroupAttributes(T,I) ( (T)->UserAndGroups[I].Attributes )
00490
00491
00492
00493
00495
00496
00497
00499
00500
NTSTATUS
00501
SepAdjustGroups(
00502 IN PTOKEN Token,
00503 IN BOOLEAN MakeChanges,
00504 IN BOOLEAN ResetToDefault,
00505 IN ULONG GroupCount OPTIONAL,
00506 IN PSID_AND_ATTRIBUTES NewState OPTIONAL,
00507 OUT PTOKEN_GROUPS PreviousState OPTIONAL,
00508 OUT PSID SidBuffer OPTIONAL,
00509 OUT PULONG ReturnLength,
00510 OUT PULONG ChangeCount,
00511 OUT PBOOLEAN ChangesMade
00512 );
00513
00514
NTSTATUS
00515
SepAdjustPrivileges(
00516 IN PTOKEN Token,
00517 IN BOOLEAN MakeChanges,
00518 IN BOOLEAN DisableAllPrivileges,
00519 IN ULONG PrivilegeCount OPTIONAL,
00520 IN PLUID_AND_ATTRIBUTES NewState OPTIONAL,
00521 OUT PTOKEN_PRIVILEGES PreviousState OPTIONAL,
00522 OUT PULONG ReturnLength,
00523 OUT PULONG ChangeCount,
00524 OUT PBOOLEAN ChangesMade
00525 );
00526
00527
VOID
00528
SepAppendDefaultDacl(
00529 IN PTOKEN Token,
00530 IN PACL PAcl
00531 );
00532
00533
VOID
00534
SepAppendPrimaryGroup(
00535 IN PTOKEN Token,
00536 IN PSID PSid
00537 );
00538
00539
NTSTATUS
00540
SepDuplicateToken(
00541 IN PTOKEN ExistingToken,
00542 IN POBJECT_ATTRIBUTES ObjectAttributes,
00543 IN BOOLEAN EffectiveOnly,
00544 IN TOKEN_TYPE TokenType,
00545 IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel OPTIONAL,
00546 IN KPROCESSOR_MODE RequestorMode,
00547 OUT PTOKEN *DuplicateToken
00548 );
00549
00550
NTSTATUS
00551
SepFilterToken(
00552 IN PTOKEN ExistingToken,
00553 IN KPROCESSOR_MODE RequestorMode,
00554 IN ULONG Flags,
00555 IN ULONG GroupCount,
00556 IN PSID_AND_ATTRIBUTES GroupsToDisable OPTIONAL,
00557 IN ULONG PrivilegeCount,
00558 IN PLUID_AND_ATTRIBUTES PrivilegesToDelete OPTIONAL,
00559 IN ULONG SidCount,
00560 IN PSID_AND_ATTRIBUTES RestrictedSids OPTIONAL,
00561 IN ULONG SidLength,
00562 OUT PTOKEN * FilteredToken
00563 );
00564
00565 BOOLEAN
00566
SepSidInSidAndAttributes (
00567 IN PSID_AND_ATTRIBUTES SidAndAttributes,
00568 IN ULONG SidCount,
00569 IN PSID PrincipalSelfSid,
00570 IN PSID Sid
00571 );
00572
00573
VOID
00574
SepRemoveDisabledGroupsAndPrivileges(
00575 IN PTOKEN Token,
00576 IN ULONG Flags,
00577 IN ULONG GroupCount,
00578 IN PSID_AND_ATTRIBUTES GroupsToDisable,
00579 IN ULONG PrivilegeCount,
00580 IN PLUID_AND_ATTRIBUTES PrivilegesToDelete
00581 );
00582
00583
00584
VOID
00585
SepFreeDefaultDacl(
00586 IN PTOKEN Token
00587 );
00588
00589
VOID
00590
SepFreePrimaryGroup(
00591 IN PTOKEN Token
00592 );
00593
00594
00595 BOOLEAN
00596
SepIdAssignableAsOwner(
00597 IN PTOKEN Token,
00598 IN ULONG Index
00599 );
00600
00601
VOID
00602
SepMakeTokenEffectiveOnly(
00603 IN PTOKEN Token
00604 );
00605
00606 BOOLEAN
00607
SepTokenInitialization( VOID );
00608
00609
00610
VOID
00611
SepTokenDeleteMethod (
00612 IN PVOID Token
00613 );
00614
00615
00616
00617
00618
00619
00620 BOOLEAN
00621
SepPrivilegeCheck(
00622 IN PTOKEN Token,
00623 IN OUT PLUID_AND_ATTRIBUTES RequiredPrivileges,
00624 IN ULONG RequiredPrivilegeCount,
00625 IN ULONG PrivilegeSetControl,
00626 IN KPROCESSOR_MODE PreviousMode
00627 );
00628
00629
VOID
00630
SepAccessCheck (
00631 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
00632 IN PSID PrincipalSelfSid,
00633 IN PTOKEN PrimaryToken,
00634 IN PTOKEN ClientToken OPTIONAL,
00635 IN ACCESS_MASK DesiredAccess,
00636 IN PIOBJECT_TYPE_LIST ObjectTypeList OPTIONAL,
00637 IN ULONG ObjectTypeListLength,
00638 IN PGENERIC_MAPPING GenericMapping,
00639 IN ACCESS_MASK PreviouslyGrantedAccess,
00640 IN KPROCESSOR_MODE PreviousMode,
00641 OUT PACCESS_MASK GrantedAccess,
00642 OUT PPRIVILEGE_SET *Privileges OPTIONAL,
00643 OUT PNTSTATUS AccessStatus,
00644 IN BOOLEAN ReturnResultList,
00645 OUT PBOOLEAN ReturnSomeAccessGranted,
00646 OUT PBOOLEAN ReturnSomeAccessDenied
00647 );
00648
00649 BOOLEAN
00650
SepObjectInTypeList (
00651 IN GUID *ObjectType,
00652 IN PIOBJECT_TYPE_LIST ObjectTypeList,
00653 IN ULONG ObjectTypeListLength,
00654 OUT PULONG ReturnedIndex
00655 );
00656
00657
#ifdef TOKEN_DEBUG
00658
VOID
00659 SepDumpToken(
00660 IN PTOKEN T
00661 );
00662
#endif //TOKEN_DEBUG
00663
00665
00666
00667
00669
00670
00671 extern GENERIC_MAPPING
SepTokenMapping;
00672 extern POBJECT_TYPE SepTokenObjectType;
00673
00674 extern ERESOURCE SepTokenLock;
00675
00676
00677
#ifdef TOKEN_DIAGNOSTICS_ENABLED
00678
extern ULONG TokenGlobalFlag;
00679
#endif // TOKEN_DIAGNOSTICS_ENABLED
00680
00681
00682
#endif // _TOKENP_