Create a branch for network fixes.
[reactos.git] / include / ndk / setypes.h
1 /*++ NDK Version: 0098
2
3 Copyright (c) Alex Ionescu. All rights reserved.
4
5 Header Name:
6
7 setypes.h
8
9 Abstract:
10
11 Type definitions for the security manager.
12
13 Author:
14
15 Alex Ionescu (alexi@tinykrnl.org) - Updated - 27-Feb-2006
16
17 --*/
18
19 #ifndef _SETYPES_H
20 #define _SETYPES_H
21
22 //
23 // Dependencies
24 //
25 #include <umtypes.h>
26
27 //
28 // Well Known SIDs
29 //
30 #define SECURITY_INTERNETSITE_AUTHORITY {0,0,0,0,0,7}
31
32 #ifdef NTOS_MODE_USER
33 //
34 // Privilege constants
35 //
36 #define SE_MIN_WELL_KNOWN_PRIVILEGE (2L)
37 #define SE_CREATE_TOKEN_PRIVILEGE (2L)
38 #define SE_ASSIGNPRIMARYTOKEN_PRIVILEGE (3L)
39 #define SE_LOCK_MEMORY_PRIVILEGE (4L)
40 #define SE_INCREASE_QUOTA_PRIVILEGE (5L)
41 #define SE_UNSOLICITED_INPUT_PRIVILEGE (6L)
42 #define SE_MACHINE_ACCOUNT_PRIVILEGE (6L)
43 #define SE_TCB_PRIVILEGE (7L)
44 #define SE_SECURITY_PRIVILEGE (8L)
45 #define SE_TAKE_OWNERSHIP_PRIVILEGE (9L)
46 #define SE_LOAD_DRIVER_PRIVILEGE (10L)
47 #define SE_SYSTEM_PROFILE_PRIVILEGE (11L)
48 #define SE_SYSTEMTIME_PRIVILEGE (12L)
49 #define SE_PROF_SINGLE_PROCESS_PRIVILEGE (13L)
50 #define SE_INC_BASE_PRIORITY_PRIVILEGE (14L)
51 #define SE_CREATE_PAGEFILE_PRIVILEGE (15L)
52 #define SE_CREATE_PERMANENT_PRIVILEGE (16L)
53 #define SE_BACKUP_PRIVILEGE (17L)
54 #define SE_RESTORE_PRIVILEGE (18L)
55 #define SE_SHUTDOWN_PRIVILEGE (19L)
56 #define SE_DEBUG_PRIVILEGE (20L)
57 #define SE_AUDIT_PRIVILEGE (21L)
58 #define SE_SYSTEM_ENVIRONMENT_PRIVILEGE (22L)
59 #define SE_CHANGE_NOTIFY_PRIVILEGE (23L)
60 #define SE_REMOTE_SHUTDOWN_PRIVILEGE (24L)
61 #define SE_MAX_WELL_KNOWN_PRIVILEGE (SE_REMOTE_SHUTDOWN_PRIVILEGE)
62
63 #else
64
65 //
66 // User and Group-related SID Attributes
67 //
68 #define SE_GROUP_MANDATORY 0x00000001
69 #define SE_GROUP_ENABLED_BY_DEFAULT 0x00000002
70 #define SE_GROUP_ENABLED 0x00000004
71 #define SE_GROUP_OWNER 0x00000008
72 #define SE_GROUP_USE_FOR_DENY_ONLY 0x00000010
73 #define SE_GROUP_INTEGRITY 0x00000020
74 #define SE_GROUP_INTEGRITY_ENABLED 0x00000040
75 #define SE_GROUP_RESOURCE 0x20000000
76 #define SE_GROUP_LOGON_ID 0xC0000000
77
78 #define SE_GROUP_VALID_ATTRIBUTES \
79 (SE_GROUP_MANDATORY | \
80 SE_GROUP_ENABLED_BY_DEFAULT | \
81 SE_GROUP_ENABLED | \
82 SE_GROUP_OWNER | \
83 SE_GROUP_USE_FOR_DENY_ONLY | \
84 SE_GROUP_LOGON_ID | \
85 SE_GROUP_RESOURCE | \
86 SE_GROUP_INTEGRITY | \
87 SE_GROUP_INTEGRITY_ENABLED)
88
89 //
90 // Audit and Policy Structures
91 //
92 typedef struct _SEP_AUDIT_POLICY_CATEGORIES
93 {
94 UCHAR System:4;
95 UCHAR Logon:4;
96 UCHAR ObjectAccess:4;
97 UCHAR PrivilegeUse:4;
98 UCHAR DetailedTracking:4;
99 UCHAR PolicyChange:4;
100 UCHAR AccountManagement:4;
101 UCHAR DirectoryServiceAccess:4;
102 UCHAR AccountLogon:4;
103 } SEP_AUDIT_POLICY_CATEGORIES, *PSEP_AUDIT_POLICY_CATEGORIES;
104
105 typedef struct _SEP_AUDIT_POLICY_OVERLAY
106 {
107 ULONGLONG PolicyBits:36;
108 UCHAR SetBit:1;
109 } SEP_AUDIT_POLICY_OVERLAY, *PSEP_AUDIT_POLICY_OVERLAY;
110
111 typedef struct _SEP_AUDIT_POLICY
112 {
113 union
114 {
115 SEP_AUDIT_POLICY_CATEGORIES PolicyElements;
116 SEP_AUDIT_POLICY_OVERLAY PolicyOverlay;
117 ULONGLONG Overlay;
118 };
119 } SEP_AUDIT_POLICY, *PSEP_AUDIT_POLICY;
120
121 typedef struct _SE_AUDIT_PROCESS_CREATION_INFO
122 {
123 POBJECT_NAME_INFORMATION ImageFileName;
124 } SE_AUDIT_PROCESS_CREATION_INFO, *PSE_AUDIT_PROCESS_CREATION_INFO;
125
126 //
127 // Token and auxiliary data
128 //
129 typedef struct _TOKEN
130 {
131 TOKEN_SOURCE TokenSource; /* 0x00 */
132 LUID TokenId; /* 0x10 */
133 LUID AuthenticationId; /* 0x18 */
134 LUID ParentTokenId; /* 0x20 */
135 LARGE_INTEGER ExpirationTime; /* 0x28 */
136 struct _ERESOURCE *TokenLock; /* 0x30 */
137 SEP_AUDIT_POLICY AuditPolicy; /* 0x38 */
138 LUID ModifiedId; /* 0x40 */
139 ULONG SessionId; /* 0x48 */
140 ULONG UserAndGroupCount; /* 0x4C */
141 ULONG RestrictedSidCount; /* 0x50 */
142 ULONG PrivilegeCount; /* 0x54 */
143 ULONG VariableLength; /* 0x58 */
144 ULONG DynamicCharged; /* 0x5C */
145 ULONG DynamicAvailable; /* 0x60 */
146 ULONG DefaultOwnerIndex; /* 0x64 */
147 PSID_AND_ATTRIBUTES UserAndGroups; /* 0x68 */
148 PSID_AND_ATTRIBUTES RestrictedSids; /* 0x6C */
149 PSID PrimaryGroup; /* 0x70 */
150 PLUID_AND_ATTRIBUTES Privileges; /* 0x74 */
151 PULONG DynamicPart; /* 0x78 */
152 PACL DefaultDacl; /* 0x7C */
153 TOKEN_TYPE TokenType; /* 0x80 */
154 SECURITY_IMPERSONATION_LEVEL ImpersonationLevel; /* 0x84 */
155 ULONG TokenFlags; /* 0x88 */
156 BOOLEAN TokenInUse; /* 0x8C */
157 PVOID ProxyData; /* 0x90 */
158 PVOID AuditData; /* 0x94 */
159 LUID OriginatingLogonSession; /* 0x98 */
160 ULONG VariablePart; /* 0xA0 */
161 } TOKEN, *PTOKEN;
162
163 typedef struct _AUX_ACCESS_DATA
164 {
165 PPRIVILEGE_SET PrivilegeSet;
166 GENERIC_MAPPING GenericMapping;
167 ULONG Reserved;
168 } AUX_ACCESS_DATA, *PAUX_ACCESS_DATA;
169
170 //
171 // External SRM Data
172 //
173 extern PACL SePublicDefaultDacl;
174 extern PACL SeSystemDefaultDacl;
175
176 #endif
177 #endif