diff options
Diffstat (limited to 'librpc/gen_ndr/security.h')
-rw-r--r-- | librpc/gen_ndr/security.h | 87 |
1 files changed, 50 insertions, 37 deletions
diff --git a/librpc/gen_ndr/security.h b/librpc/gen_ndr/security.h index d1dcbe552a..05df02ae8f 100644 --- a/librpc/gen_ndr/security.h +++ b/librpc/gen_ndr/security.h @@ -76,6 +76,11 @@ #define STANDARD_RIGHTS_READ_ACCESS ( SEC_STD_READ_CONTROL ) #define STANDARD_RIGHTS_WRITE_ACCESS ( (SEC_STD_WRITE_OWNER|SEC_STD_WRITE_DAC|SEC_STD_DELETE) ) #define STANDARD_RIGHTS_REQUIRED_ACCESS ( (SEC_STD_DELETE|SEC_STD_READ_CONTROL|SEC_STD_WRITE_DAC|SEC_STD_WRITE_OWNER) ) +#define SEC_ADS_GENERIC_ALL_DS ( (SEC_STD_DELETE|SEC_STD_WRITE_DAC|SEC_STD_WRITE_OWNER|SEC_ADS_CREATE_CHILD|SEC_ADS_DELETE_CHILD|SEC_ADS_DELETE_TREE|SEC_ADS_CONTROL_ACCESS) ) +#define SEC_ADS_GENERIC_EXECUTE ( SEC_STD_READ_CONTROL|SEC_ADS_LIST ) +#define SEC_ADS_GENERIC_WRITE ( (SEC_STD_READ_CONTROL|SEC_ADS_SELF_WRITE|SEC_ADS_WRITE_PROP) ) +#define SEC_ADS_GENERIC_READ ( (SEC_STD_READ_CONTROL|SEC_ADS_LIST|SEC_ADS_READ_PROP|SEC_ADS_LIST_OBJECT) ) +#define SEC_ADS_GENERIC_ALL ( (SEC_ADS_GENERIC_EXECUTE|SEC_ADS_GENERIC_WRITE|SEC_ADS_GENERIC_READ|SEC_ADS_GENERIC_ALL_DS) ) #define SID_NULL ( "S-1-0-0" ) #define NAME_WORLD ( "WORLD" ) #define SID_WORLD_DOMAIN ( "S-1-1" ) @@ -148,31 +153,31 @@ struct dom_sid { enum sec_privilege #ifndef USE_UINT_ENUMS { - SEC_PRIV_SECURITY=1, - SEC_PRIV_BACKUP=2, - SEC_PRIV_RESTORE=3, - SEC_PRIV_SYSTEMTIME=4, - SEC_PRIV_SHUTDOWN=5, - SEC_PRIV_REMOTE_SHUTDOWN=6, - SEC_PRIV_TAKE_OWNERSHIP=7, - SEC_PRIV_DEBUG=8, - SEC_PRIV_SYSTEM_ENVIRONMENT=9, - SEC_PRIV_SYSTEM_PROFILE=10, - SEC_PRIV_PROFILE_SINGLE_PROCESS=11, - SEC_PRIV_INCREASE_BASE_PRIORITY=12, - SEC_PRIV_LOAD_DRIVER=13, - SEC_PRIV_CREATE_PAGEFILE=14, - SEC_PRIV_INCREASE_QUOTA=15, - SEC_PRIV_CHANGE_NOTIFY=16, - SEC_PRIV_UNDOCK=17, - SEC_PRIV_MANAGE_VOLUME=18, - SEC_PRIV_IMPERSONATE=19, - SEC_PRIV_CREATE_GLOBAL=20, - SEC_PRIV_ENABLE_DELEGATION=21, - SEC_PRIV_INTERACTIVE_LOGON=22, - SEC_PRIV_NETWORK_LOGON=23, - SEC_PRIV_REMOTE_INTERACTIVE_LOGON=24, - SEC_PRIV_MACHINE_ACCOUNT=25 + SEC_PRIV_SECURITY=(int)(1), + SEC_PRIV_BACKUP=(int)(2), + SEC_PRIV_RESTORE=(int)(3), + SEC_PRIV_SYSTEMTIME=(int)(4), + SEC_PRIV_SHUTDOWN=(int)(5), + SEC_PRIV_REMOTE_SHUTDOWN=(int)(6), + SEC_PRIV_TAKE_OWNERSHIP=(int)(7), + SEC_PRIV_DEBUG=(int)(8), + SEC_PRIV_SYSTEM_ENVIRONMENT=(int)(9), + SEC_PRIV_SYSTEM_PROFILE=(int)(10), + SEC_PRIV_PROFILE_SINGLE_PROCESS=(int)(11), + SEC_PRIV_INCREASE_BASE_PRIORITY=(int)(12), + SEC_PRIV_LOAD_DRIVER=(int)(13), + SEC_PRIV_CREATE_PAGEFILE=(int)(14), + SEC_PRIV_INCREASE_QUOTA=(int)(15), + SEC_PRIV_CHANGE_NOTIFY=(int)(16), + SEC_PRIV_UNDOCK=(int)(17), + SEC_PRIV_MANAGE_VOLUME=(int)(18), + SEC_PRIV_IMPERSONATE=(int)(19), + SEC_PRIV_CREATE_GLOBAL=(int)(20), + SEC_PRIV_ENABLE_DELEGATION=(int)(21), + SEC_PRIV_INTERACTIVE_LOGON=(int)(22), + SEC_PRIV_NETWORK_LOGON=(int)(23), + SEC_PRIV_REMOTE_INTERACTIVE_LOGON=(int)(24), + SEC_PRIV_MACHINE_ACCOUNT=(int)(25) } #else { __donnot_use_enum_sec_privilege=0x7FFFFFFF} @@ -217,15 +222,15 @@ enum sec_privilege enum security_ace_type #ifndef USE_UINT_ENUMS { - SEC_ACE_TYPE_ACCESS_ALLOWED=0, - SEC_ACE_TYPE_ACCESS_DENIED=1, - SEC_ACE_TYPE_SYSTEM_AUDIT=2, - SEC_ACE_TYPE_SYSTEM_ALARM=3, - SEC_ACE_TYPE_ALLOWED_COMPOUND=4, - SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT=5, - SEC_ACE_TYPE_ACCESS_DENIED_OBJECT=6, - SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT=7, - SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT=8 + SEC_ACE_TYPE_ACCESS_ALLOWED=(int)(0), + SEC_ACE_TYPE_ACCESS_DENIED=(int)(1), + SEC_ACE_TYPE_SYSTEM_AUDIT=(int)(2), + SEC_ACE_TYPE_SYSTEM_ALARM=(int)(3), + SEC_ACE_TYPE_ALLOWED_COMPOUND=(int)(4), + SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT=(int)(5), + SEC_ACE_TYPE_ACCESS_DENIED_OBJECT=(int)(6), + SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT=(int)(7), + SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT=(int)(8) } #else { __donnot_use_enum_security_ace_type=0x7FFFFFFF} @@ -275,8 +280,8 @@ struct security_ace { enum security_acl_revision #ifndef USE_UINT_ENUMS { - SECURITY_ACL_REVISION_NT4=2, - SECURITY_ACL_REVISION_ADS=4 + SECURITY_ACL_REVISION_NT4=(int)(2), + SECURITY_ACL_REVISION_ADS=(int)(4) } #else { __donnot_use_enum_security_acl_revision=0x7FFFFFFF} @@ -295,7 +300,7 @@ struct security_acl { enum security_descriptor_revision #ifndef USE_UINT_ENUMS { - SECURITY_DESCRIPTOR_REVISION_1=1 + SECURITY_DESCRIPTOR_REVISION_1=(int)(1) } #else { __donnot_use_enum_security_descriptor_revision=0x7FFFFFFF} @@ -341,6 +346,7 @@ struct security_token { uint32_t num_sids; struct dom_sid **sids;/* [unique,size_is(num_sids)] */ uint64_t privilege_mask; + struct security_acl *default_dacl;/* [unique] */ }/* [public] */; /* bitmap security_secinfo */ @@ -360,4 +366,11 @@ struct security_token { #define KERB_ENCTYPE_AES128_CTS_HMAC_SHA1_96 ( 0x00000008 ) #define KERB_ENCTYPE_AES256_CTS_HMAC_SHA1_96 ( 0x00000010 ) +/* bitmap security_autoinherit */ +#define SEC_DACL_AUTO_INHERIT ( 0x00000001 ) +#define SEC_SACL_AUTO_INHERIT ( 0x00000002 ) +#define SEC_DEFAULT_DESCRIPTOR ( 0x00000004 ) +#define SEC_OWNER_FROM_PARENT ( 0x00000008 ) +#define SEC_GROUP_FROM_PARENT ( 0x00000010 ) + #endif /* _HEADER_security */ |