summaryrefslogtreecommitdiff
path: root/librpc/gen_ndr/security.h
diff options
context:
space:
mode:
Diffstat (limited to 'librpc/gen_ndr/security.h')
-rw-r--r--librpc/gen_ndr/security.h87
1 files changed, 50 insertions, 37 deletions
diff --git a/librpc/gen_ndr/security.h b/librpc/gen_ndr/security.h
index d1dcbe552a..05df02ae8f 100644
--- a/librpc/gen_ndr/security.h
+++ b/librpc/gen_ndr/security.h
@@ -76,6 +76,11 @@
#define STANDARD_RIGHTS_READ_ACCESS ( SEC_STD_READ_CONTROL )
#define STANDARD_RIGHTS_WRITE_ACCESS ( (SEC_STD_WRITE_OWNER|SEC_STD_WRITE_DAC|SEC_STD_DELETE) )
#define STANDARD_RIGHTS_REQUIRED_ACCESS ( (SEC_STD_DELETE|SEC_STD_READ_CONTROL|SEC_STD_WRITE_DAC|SEC_STD_WRITE_OWNER) )
+#define SEC_ADS_GENERIC_ALL_DS ( (SEC_STD_DELETE|SEC_STD_WRITE_DAC|SEC_STD_WRITE_OWNER|SEC_ADS_CREATE_CHILD|SEC_ADS_DELETE_CHILD|SEC_ADS_DELETE_TREE|SEC_ADS_CONTROL_ACCESS) )
+#define SEC_ADS_GENERIC_EXECUTE ( SEC_STD_READ_CONTROL|SEC_ADS_LIST )
+#define SEC_ADS_GENERIC_WRITE ( (SEC_STD_READ_CONTROL|SEC_ADS_SELF_WRITE|SEC_ADS_WRITE_PROP) )
+#define SEC_ADS_GENERIC_READ ( (SEC_STD_READ_CONTROL|SEC_ADS_LIST|SEC_ADS_READ_PROP|SEC_ADS_LIST_OBJECT) )
+#define SEC_ADS_GENERIC_ALL ( (SEC_ADS_GENERIC_EXECUTE|SEC_ADS_GENERIC_WRITE|SEC_ADS_GENERIC_READ|SEC_ADS_GENERIC_ALL_DS) )
#define SID_NULL ( "S-1-0-0" )
#define NAME_WORLD ( "WORLD" )
#define SID_WORLD_DOMAIN ( "S-1-1" )
@@ -148,31 +153,31 @@ struct dom_sid {
enum sec_privilege
#ifndef USE_UINT_ENUMS
{
- SEC_PRIV_SECURITY=1,
- SEC_PRIV_BACKUP=2,
- SEC_PRIV_RESTORE=3,
- SEC_PRIV_SYSTEMTIME=4,
- SEC_PRIV_SHUTDOWN=5,
- SEC_PRIV_REMOTE_SHUTDOWN=6,
- SEC_PRIV_TAKE_OWNERSHIP=7,
- SEC_PRIV_DEBUG=8,
- SEC_PRIV_SYSTEM_ENVIRONMENT=9,
- SEC_PRIV_SYSTEM_PROFILE=10,
- SEC_PRIV_PROFILE_SINGLE_PROCESS=11,
- SEC_PRIV_INCREASE_BASE_PRIORITY=12,
- SEC_PRIV_LOAD_DRIVER=13,
- SEC_PRIV_CREATE_PAGEFILE=14,
- SEC_PRIV_INCREASE_QUOTA=15,
- SEC_PRIV_CHANGE_NOTIFY=16,
- SEC_PRIV_UNDOCK=17,
- SEC_PRIV_MANAGE_VOLUME=18,
- SEC_PRIV_IMPERSONATE=19,
- SEC_PRIV_CREATE_GLOBAL=20,
- SEC_PRIV_ENABLE_DELEGATION=21,
- SEC_PRIV_INTERACTIVE_LOGON=22,
- SEC_PRIV_NETWORK_LOGON=23,
- SEC_PRIV_REMOTE_INTERACTIVE_LOGON=24,
- SEC_PRIV_MACHINE_ACCOUNT=25
+ SEC_PRIV_SECURITY=(int)(1),
+ SEC_PRIV_BACKUP=(int)(2),
+ SEC_PRIV_RESTORE=(int)(3),
+ SEC_PRIV_SYSTEMTIME=(int)(4),
+ SEC_PRIV_SHUTDOWN=(int)(5),
+ SEC_PRIV_REMOTE_SHUTDOWN=(int)(6),
+ SEC_PRIV_TAKE_OWNERSHIP=(int)(7),
+ SEC_PRIV_DEBUG=(int)(8),
+ SEC_PRIV_SYSTEM_ENVIRONMENT=(int)(9),
+ SEC_PRIV_SYSTEM_PROFILE=(int)(10),
+ SEC_PRIV_PROFILE_SINGLE_PROCESS=(int)(11),
+ SEC_PRIV_INCREASE_BASE_PRIORITY=(int)(12),
+ SEC_PRIV_LOAD_DRIVER=(int)(13),
+ SEC_PRIV_CREATE_PAGEFILE=(int)(14),
+ SEC_PRIV_INCREASE_QUOTA=(int)(15),
+ SEC_PRIV_CHANGE_NOTIFY=(int)(16),
+ SEC_PRIV_UNDOCK=(int)(17),
+ SEC_PRIV_MANAGE_VOLUME=(int)(18),
+ SEC_PRIV_IMPERSONATE=(int)(19),
+ SEC_PRIV_CREATE_GLOBAL=(int)(20),
+ SEC_PRIV_ENABLE_DELEGATION=(int)(21),
+ SEC_PRIV_INTERACTIVE_LOGON=(int)(22),
+ SEC_PRIV_NETWORK_LOGON=(int)(23),
+ SEC_PRIV_REMOTE_INTERACTIVE_LOGON=(int)(24),
+ SEC_PRIV_MACHINE_ACCOUNT=(int)(25)
}
#else
{ __donnot_use_enum_sec_privilege=0x7FFFFFFF}
@@ -217,15 +222,15 @@ enum sec_privilege
enum security_ace_type
#ifndef USE_UINT_ENUMS
{
- SEC_ACE_TYPE_ACCESS_ALLOWED=0,
- SEC_ACE_TYPE_ACCESS_DENIED=1,
- SEC_ACE_TYPE_SYSTEM_AUDIT=2,
- SEC_ACE_TYPE_SYSTEM_ALARM=3,
- SEC_ACE_TYPE_ALLOWED_COMPOUND=4,
- SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT=5,
- SEC_ACE_TYPE_ACCESS_DENIED_OBJECT=6,
- SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT=7,
- SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT=8
+ SEC_ACE_TYPE_ACCESS_ALLOWED=(int)(0),
+ SEC_ACE_TYPE_ACCESS_DENIED=(int)(1),
+ SEC_ACE_TYPE_SYSTEM_AUDIT=(int)(2),
+ SEC_ACE_TYPE_SYSTEM_ALARM=(int)(3),
+ SEC_ACE_TYPE_ALLOWED_COMPOUND=(int)(4),
+ SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT=(int)(5),
+ SEC_ACE_TYPE_ACCESS_DENIED_OBJECT=(int)(6),
+ SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT=(int)(7),
+ SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT=(int)(8)
}
#else
{ __donnot_use_enum_security_ace_type=0x7FFFFFFF}
@@ -275,8 +280,8 @@ struct security_ace {
enum security_acl_revision
#ifndef USE_UINT_ENUMS
{
- SECURITY_ACL_REVISION_NT4=2,
- SECURITY_ACL_REVISION_ADS=4
+ SECURITY_ACL_REVISION_NT4=(int)(2),
+ SECURITY_ACL_REVISION_ADS=(int)(4)
}
#else
{ __donnot_use_enum_security_acl_revision=0x7FFFFFFF}
@@ -295,7 +300,7 @@ struct security_acl {
enum security_descriptor_revision
#ifndef USE_UINT_ENUMS
{
- SECURITY_DESCRIPTOR_REVISION_1=1
+ SECURITY_DESCRIPTOR_REVISION_1=(int)(1)
}
#else
{ __donnot_use_enum_security_descriptor_revision=0x7FFFFFFF}
@@ -341,6 +346,7 @@ struct security_token {
uint32_t num_sids;
struct dom_sid **sids;/* [unique,size_is(num_sids)] */
uint64_t privilege_mask;
+ struct security_acl *default_dacl;/* [unique] */
}/* [public] */;
/* bitmap security_secinfo */
@@ -360,4 +366,11 @@ struct security_token {
#define KERB_ENCTYPE_AES128_CTS_HMAC_SHA1_96 ( 0x00000008 )
#define KERB_ENCTYPE_AES256_CTS_HMAC_SHA1_96 ( 0x00000010 )
+/* bitmap security_autoinherit */
+#define SEC_DACL_AUTO_INHERIT ( 0x00000001 )
+#define SEC_SACL_AUTO_INHERIT ( 0x00000002 )
+#define SEC_DEFAULT_DESCRIPTOR ( 0x00000004 )
+#define SEC_OWNER_FROM_PARENT ( 0x00000008 )
+#define SEC_GROUP_FROM_PARENT ( 0x00000010 )
+
#endif /* _HEADER_security */