Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1336 lines
36 KiB

/*++
Copyright (c) 1989 Microsoft Corporation
Module Name:
Tokenset.c
Abstract:
This module implements the SET function for the executive
token object.
Author:
Jim Kelly (JimK) 15-June-1990
Revision History:
--*/
#include "pch.h"
#pragma hdrstop
#ifdef ALLOC_PRAGMA
#pragma alloc_text(PAGE,NtSetInformationToken)
#pragma alloc_text(PAGE,SepExpandDynamic)
#pragma alloc_text(PAGE,SepFreePrimaryGroup)
#pragma alloc_text(PAGE,SepFreeDefaultDacl)
#pragma alloc_text(PAGE,SepAppendPrimaryGroup)
#pragma alloc_text(PAGE,SepAppendDefaultDacl)
#pragma alloc_text(PAGE,SeSetSessionIdToken)
#pragma alloc_text(PAGE,SepModifyTokenPolicyCounter)
#endif
NTSTATUS
NtSetInformationToken (
IN HANDLE TokenHandle,
IN TOKEN_INFORMATION_CLASS TokenInformationClass,
IN PVOID TokenInformation,
IN ULONG TokenInformationLength
)
/*++
Routine Description:
Modify information in a specified token.
Arguments:
TokenHandle - Provides a handle to the token to operate on.
TokenInformationClass - The token information class being set.
TokenInformation - The buffer containing the new values for the
specified class of information. The buffer must be aligned
on at least a longword boundary. The actual structures
provided are dependent upon the information class specified,
as defined in the TokenInformationClass parameter
description.
TokenInformation Format By Information Class:
TokenUser => This value is not a valid value for this API.
The User ID may not be replaced.
TokenGroups => This value is not a valid value for this
API. The Group IDs may not be replaced. However, groups
may be enabled and disabled using NtAdjustGroupsToken().
TokenPrivileges => This value is not a valid value for
this API. Privilege information may not be replaced.
However, privileges may be explicitly enabled and disabled
using the NtAdjustPrivilegesToken API.
TokenOwner => TOKEN_OWNER data structure.
TOKEN_ADJUST_DEFAULT access is needed to replace this
information in a token. The owner values that may be
specified are restricted to the user and group IDs with an
attribute indicating they may be assigned as the owner of
objects.
TokenPrimaryGroup => TOKEN_PRIMARY_GROUP data structure.
TOKEN_ADJUST_DEFAULT access is needed to replace this
information in a token. The primary group values that may
be specified are restricted to be one of the group IDs
already in the token.
TokenDefaultDacl => TOKEN_DEFAULT_DACL data structure.
TOKEN_ADJUST_DEFAULT access is needed to replace this
information in a token. The ACL provided as a new default
discretionary ACL is not validated for structural
correctness or consistency.
TokenSource => This value is not a valid value for this
API. The source name and context handle may not be
replaced.
TokenStatistics => This value is not a valid value for this
API. The statistics of a token are read-only.
TokenSessionId => ULONG to set the token session. Must have
TOKEN_ADJUST_SESSIONID and TCB privilege.
TokenSessionReference => ULONG. Must be zero. Must have
TCB privilege to dereference the logon session. This info class
will remove a reference for the logon session, and mark the token
as not referencing the session.
TokenAuditPolicy => TOKEN_AUDIT_POLICY structure. This sets the per
user policy for the token, and all tokens derived from it. Requires
TCB privilege.
TokenParent => TOKEN_PARENT structure. The parent id can be set
by a caller with TCB privilege. The token id cannot.
TokenInformationLength - Indicates the length, in bytes, of the
TokenInformation buffer. This is only the length of the primary
buffer. All extensions of the primary buffer are self describing.
Return Value:
STATUS_SUCCESS - The operation was successful.
STATUS_INVALID_OWNER - The ID specified to be an owner (or
default owner) is not one the caller may assign as the owner
of an object.
STATUS_INVALID_INFO_CLASS - The specified information class is
not one that may be specified in this API.
STATUS_ALLOTTED_SPACE_EXCEEDED - The space allotted for storage
of the default discretionary access control and the primary
group ID is not large enough to accept the new value of one
of these fields.
--*/
{
KPROCESSOR_MODE PreviousMode;
NTSTATUS Status;
PTOKEN Token;
ULONG Index;
BOOLEAN Found;
BOOLEAN TokenModified = FALSE;
ULONG NewLength;
ULONG CurrentLength;
PSID CapturedOwner;
PSID CapturedPrimaryGroup;
PACL CapturedDefaultDacl;
ACCESS_MASK DesiredAccess;
PAGED_CODE();
//
// Get previous processor mode and probe input buffer if necessary.
//
PreviousMode = KeGetPreviousMode();
if (PreviousMode != KernelMode) {
try {
//
// This just probes the main part of the information buffer.
// Any information class-specific data hung off the primary
// buffer are self describing and must be probed separately
// below.
//
ProbeForRead(
TokenInformation,
TokenInformationLength,
sizeof(ULONG)
);
} except(EXCEPTION_EXECUTE_HANDLER) {
return GetExceptionCode();
}
}
//
// Return error if not legal class
//
if ( (TokenInformationClass != TokenOwner) &&
(TokenInformationClass != TokenPrimaryGroup) &&
(TokenInformationClass != TokenSessionId) &&
(TokenInformationClass != TokenDefaultDacl) &&
(TokenInformationClass != TokenSessionReference) &&
(TokenInformationClass != TokenAuditPolicy) &&
(TokenInformationClass != TokenOrigin) ) {
return STATUS_INVALID_INFO_CLASS;
}
//
// Check access rights and reference token
//
DesiredAccess = TOKEN_ADJUST_DEFAULT;
if (TokenInformationClass == TokenSessionId) {
DesiredAccess |= TOKEN_ADJUST_SESSIONID;
}
Status = ObReferenceObjectByHandle(
TokenHandle, // Handle
DesiredAccess, // DesiredAccess
SeTokenObjectType, // ObjectType
PreviousMode, // AccessMode
(PVOID *)&Token, // Object
NULL // GrantedAccess
);
if ( !NT_SUCCESS(Status) ) {
return Status;
}
//
// Case on information class.
//
switch ( TokenInformationClass ) {
case TokenOwner:
//
// Make sure the buffer is large enough to hold the
// necessary information class data structure.
//
if (TokenInformationLength < (ULONG)sizeof(TOKEN_OWNER)) {
ObDereferenceObject( Token );
return STATUS_INFO_LENGTH_MISMATCH;
}
//
// Capture and copy
try {
//
// Capture Owner SID
//
CapturedOwner = ((PTOKEN_OWNER)TokenInformation)->Owner;
Status = SeCaptureSid(
CapturedOwner,
PreviousMode,
NULL, 0,
PagedPool,
TRUE,
&CapturedOwner
);
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
return GetExceptionCode();
}
if (!NT_SUCCESS(Status)) {
ObDereferenceObject( Token );
return Status;
}
Index = 0;
//
// Gain write access to the token.
//
SepAcquireTokenWriteLock( Token );
//
// Walk through the list of user and group IDs looking
// for a match to the specified SID. If one is found,
// make sure it may be assigned as an owner. If it can,
// then set the index in the token's OwnerIndex field.
// Otherwise, return invalid owner error.
//
while (Index < Token->UserAndGroupCount) {
try {
Found = RtlEqualSid(
CapturedOwner,
Token->UserAndGroups[Index].Sid
);
if ( Found ) {
if ( SepIdAssignableAsOwner(Token,Index) ){
Token->DefaultOwnerIndex = Index;
TokenModified = TRUE;
Status = STATUS_SUCCESS;
} else {
Status = STATUS_INVALID_OWNER;
} //endif assignable
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
SeReleaseSid( CapturedOwner, PreviousMode, TRUE);
return Status;
} //endif Found
} except(EXCEPTION_EXECUTE_HANDLER) {
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
SeReleaseSid( CapturedOwner, PreviousMode, TRUE);
return GetExceptionCode();
} //endtry
Index += 1;
} //endwhile
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
SeReleaseSid( CapturedOwner, PreviousMode, TRUE);
return STATUS_INVALID_OWNER;
case TokenPrimaryGroup:
//
// Assuming everything works out, the strategy is to move everything
// in the Dynamic part of the token (exept the primary group) to
// the beginning of the dynamic part, freeing up the entire end of
// the dynamic part for the new primary group.
//
//
// Make sure the buffer is large enough to hold the
// necessary information class data structure.
//
if (TokenInformationLength < (ULONG)sizeof(TOKEN_PRIMARY_GROUP)) {
ObDereferenceObject( Token );
return STATUS_INFO_LENGTH_MISMATCH;
}
//
// Capture And Validate TOKEN_PRIMARY_GROUP and corresponding SID.
//
try {
CapturedPrimaryGroup =
((PTOKEN_PRIMARY_GROUP)TokenInformation)->PrimaryGroup;
Status = SeCaptureSid(
CapturedPrimaryGroup,
PreviousMode,
NULL, 0,
PagedPool,
TRUE,
&CapturedPrimaryGroup
);
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
return GetExceptionCode();
}
if (!NT_SUCCESS(Status)) {
ObDereferenceObject( Token );
return Status;
}
if (!SepIdAssignableAsGroup( Token, CapturedPrimaryGroup )) {
ObDereferenceObject( Token );
SeReleaseSid( CapturedPrimaryGroup, PreviousMode, TRUE);
return STATUS_INVALID_PRIMARY_GROUP;
}
NewLength = SeLengthSid( CapturedPrimaryGroup );
//
// Gain write access to the token.
//
SepAcquireTokenWriteLock( Token );
//
// See if there is enough room in the dynamic part of the token
// to replace the current Primary Group with the one specified.
//
if (Token->DefaultDacl) {
NewLength += Token->DefaultDacl->AclSize;
}
if (NewLength > Token->DynamicCharged) {
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
SeReleaseSid( CapturedPrimaryGroup, PreviousMode, TRUE);
return STATUS_ALLOTTED_SPACE_EXCEEDED;
}
//
// Expand the tokens dynamic buffer if we have to
//
Status = SepExpandDynamic( Token, NewLength );
if (!NT_SUCCESS (Status)) {
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
SeReleaseSid( CapturedPrimaryGroup, PreviousMode, TRUE);
return Status;
}
//
// Free up the existing primary group
//
SepFreePrimaryGroup( Token );
//
// And put the new SID in its place
//
SepAppendPrimaryGroup( Token, CapturedPrimaryGroup );
TokenModified = TRUE;
//
// All done.
//
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
SeReleaseSid( CapturedPrimaryGroup, PreviousMode, TRUE);
return STATUS_SUCCESS;
case TokenDefaultDacl:
//
// Assuming everything works out, the strategy is to move everything
// in the Dynamic part of the token (exept the default Dacl) to
// the beginning of the dynamic part, freeing up the entire end of
// the dynamic part for the new default Dacl.
//
//
// Make sure the buffer is large enough to hold the
// necessary information class data structure.
//
if (TokenInformationLength < (ULONG)sizeof(TOKEN_DEFAULT_DACL)) {
ObDereferenceObject( Token );
return STATUS_INFO_LENGTH_MISMATCH;
}
//
// Capture And Validate TOKEN_DEFAULT_DACL and corresponding ACL.
//
try {
CapturedDefaultDacl =
((PTOKEN_DEFAULT_DACL)TokenInformation)->DefaultDacl;
if (ARGUMENT_PRESENT(CapturedDefaultDacl)) {
Status = SeCaptureAcl(
CapturedDefaultDacl,
PreviousMode,
NULL, 0,
PagedPool,
TRUE,
&CapturedDefaultDacl,
&NewLength
);
} else {
NewLength = 0;
Status = STATUS_SUCCESS;
}
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
return GetExceptionCode();
}
if (!NT_SUCCESS(Status)) {
ObDereferenceObject( Token );
return Status;
}
//
// Gain write access to the token.
//
SepAcquireTokenWriteLock( Token );
//
// See if there is enough room in the dynamic part of the token
// to replace the current Default Dacl with the one specified.
//
NewLength += SeLengthSid( Token->PrimaryGroup );
if (NewLength > Token->DynamicCharged) {
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
if (ARGUMENT_PRESENT(CapturedDefaultDacl)) {
SeReleaseAcl( CapturedDefaultDacl, PreviousMode, TRUE);
}
return STATUS_ALLOTTED_SPACE_EXCEEDED;
}
//
// Expand the tokens dynamic buffer if we have to
//
Status = SepExpandDynamic( Token, NewLength );
if (!NT_SUCCESS (Status)) {
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
if (ARGUMENT_PRESENT(CapturedDefaultDacl)) {
SeReleaseAcl( CapturedDefaultDacl, PreviousMode, TRUE);
}
return Status;
}
//
// Free up the existing Default Dacl
//
SepFreeDefaultDacl( Token );
//
// And put the new ACL in its place
//
if (ARGUMENT_PRESENT(CapturedDefaultDacl)) {
SepAppendDefaultDacl( Token, CapturedDefaultDacl );
}
TokenModified = TRUE;
//
// All done.
//
SepReleaseTokenWriteLock( Token, TokenModified );
ObDereferenceObject( Token );
if (ARGUMENT_PRESENT(CapturedDefaultDacl)) {
SeReleaseAcl( CapturedDefaultDacl, PreviousMode, TRUE);
}
return STATUS_SUCCESS;
case TokenSessionId:
{
ULONG SessionId;
if ( TokenInformationLength != sizeof(ULONG) ) {
ObDereferenceObject( Token );
return( STATUS_INFO_LENGTH_MISMATCH );
}
try {
SessionId = *(PULONG)TokenInformation;
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
return GetExceptionCode();
}
//
// We only allow TCB to set SessionId's
//
if ( !SeSinglePrivilegeCheck(SeTcbPrivilege,PreviousMode) ) {
ObDereferenceObject( Token );
return( STATUS_PRIVILEGE_NOT_HELD );
}
//
// Set SessionId for the token
//
SeSetSessionIdToken( (PACCESS_TOKEN)Token,
SessionId );
ObDereferenceObject( Token );
return( STATUS_SUCCESS );
}
case TokenSessionReference:
{
ULONG SessionReferenced;
BOOLEAN DereferenceSession = FALSE;
if ( TokenInformationLength != sizeof(ULONG) ) {
ObDereferenceObject( Token );
return( STATUS_INFO_LENGTH_MISMATCH );
}
try {
SessionReferenced = *(PULONG)TokenInformation;
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
return GetExceptionCode();
}
//
// We only allow TCB to set Session referenced.
//
if ( !SeSinglePrivilegeCheck(SeTcbPrivilege,PreviousMode) ) {
ObDereferenceObject( Token );
return( STATUS_PRIVILEGE_NOT_HELD );
}
//
// We don't yet have use for this so don't implement it.
//
if ( SessionReferenced ) {
ObDereferenceObject( Token );
return STATUS_INVALID_PARAMETER;
}
//
// Determine if we're changing the state and change it with the write lock held
//
SepAcquireTokenWriteLock( Token );
if ( (Token->TokenFlags & TOKEN_SESSION_NOT_REFERENCED) == 0 ) {
#if DBG || TOKEN_LEAK_MONITOR
SepRemoveTokenLogonSession( Token );
#endif
Token->TokenFlags |= TOKEN_SESSION_NOT_REFERENCED;
DereferenceSession = TRUE;
}
SepReleaseTokenWriteLock( Token, FALSE );
//
// Do the actual dereference without any locks held
//
if ( DereferenceSession ) {
SepDeReferenceLogonSessionDirect (Token->LogonSession);
}
ObDereferenceObject( Token );
return( STATUS_SUCCESS );
}
case TokenAuditPolicy:
{
PTOKEN_AUDIT_POLICY pAuditPolicy = (PTOKEN_AUDIT_POLICY)TokenInformation;
PTOKEN_AUDIT_POLICY pCapturedAuditPolicy = NULL;
PTOKEN_AUDIT_POLICY_ELEMENT pPolicyElement;
SEP_AUDIT_POLICY TokenPolicy;
SEP_AUDIT_POLICY OldTokenPolicy;
ULONG i;
if (pAuditPolicy == NULL) {
ObDereferenceObject( Token );
return STATUS_INVALID_PARAMETER;
}
//
// We require TCB privilege to set AuditPolicy
//
if ( !SeSinglePrivilegeCheck(SeTcbPrivilege,PreviousMode) ) {
ObDereferenceObject( Token );
return( STATUS_PRIVILEGE_NOT_HELD );
}
//
// If the policy was already set on this token then fail. We only
// allow setting a token's policy once.
//
SepAcquireTokenReadLock( Token );
OldTokenPolicy = Token->AuditPolicy;
SepReleaseTokenReadLock( Token );
if (OldTokenPolicy.PolicyOverlay.SetBit) {
ObDereferenceObject( Token );
return( STATUS_INVALID_PARAMETER );
}
//
// Capture And Validate TOKEN_AUDIT_POLICY.
//
try {
Status = SeCaptureAuditPolicy(
pAuditPolicy,
PreviousMode,
NULL,
0,
PagedPool,
TRUE,
&pCapturedAuditPolicy
);
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
SeReleaseAuditPolicy(
pCapturedAuditPolicy,
PreviousMode,
TRUE
);
return GetExceptionCode();
}
if (!NT_SUCCESS(Status)) {
ObDereferenceObject( Token );
return Status;
}
TokenPolicy.Overlay = 0;
TokenPolicy.PolicyOverlay.SetBit = 1;
if (pCapturedAuditPolicy->PolicyCount) {
for (i = 0; i < pCapturedAuditPolicy->PolicyCount; i++) {
pPolicyElement = &pCapturedAuditPolicy->Policy[i];
switch (pPolicyElement->Category) {
case AuditCategorySystem:
TokenPolicy.PolicyElements.System = pPolicyElement->PolicyMask;
break;
case AuditCategoryLogon:
TokenPolicy.PolicyElements.Logon = pPolicyElement->PolicyMask;
break;
case AuditCategoryObjectAccess:
TokenPolicy.PolicyElements.ObjectAccess = pPolicyElement->PolicyMask;
break;
case AuditCategoryPrivilegeUse:
TokenPolicy.PolicyElements.PrivilegeUse = pPolicyElement->PolicyMask;
break;
case AuditCategoryDetailedTracking:
TokenPolicy.PolicyElements.DetailedTracking = pPolicyElement->PolicyMask;
break;
case AuditCategoryPolicyChange:
TokenPolicy.PolicyElements.PolicyChange = pPolicyElement->PolicyMask;
break;
case AuditCategoryAccountManagement:
TokenPolicy.PolicyElements.AccountManagement = pPolicyElement->PolicyMask;
break;
case AuditCategoryDirectoryServiceAccess:
TokenPolicy.PolicyElements.DirectoryServiceAccess = pPolicyElement->PolicyMask;
break;
case AuditCategoryAccountLogon:
TokenPolicy.PolicyElements.AccountLogon = pPolicyElement->PolicyMask;
break;
default:
ASSERT(FALSE && "Illegal audit category");
break;
}
}
}
SepAcquireTokenWriteLock( Token );
OldTokenPolicy = Token->AuditPolicy;
Token->AuditPolicy = TokenPolicy;
SepReleaseTokenWriteLock( Token, TRUE );
ObDereferenceObject( Token );
if (TokenPolicy.Overlay) {
SepModifyTokenPolicyCounter(&TokenPolicy, TRUE);
}
SeReleaseAuditPolicy(
pCapturedAuditPolicy,
PreviousMode,
TRUE
);
return STATUS_SUCCESS;
}
case TokenOrigin:
{
TOKEN_ORIGIN Origin ;
if ( TokenInformationLength != sizeof( TOKEN_ORIGIN ) ) {
ObDereferenceObject( Token );
return( STATUS_INFO_LENGTH_MISMATCH );
}
try {
RtlCopyMemory(
&Origin,
TokenInformation,
sizeof( TOKEN_ORIGIN ) );
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject( Token );
return GetExceptionCode();
}
//
// We only allow TCB to set Origin information.
//
if ( !SeSinglePrivilegeCheck(SeTcbPrivilege,PreviousMode) ) {
ObDereferenceObject( Token );
return( STATUS_PRIVILEGE_NOT_HELD );
}
SepAcquireTokenWriteLock( Token );
if ( RtlIsZeroLuid( &Token->OriginatingLogonSession ) )
{
Token->OriginatingLogonSession = Origin.OriginatingLogonSession ;
}
SepReleaseTokenWriteLock( Token, TRUE );
ObDereferenceObject( Token );
return( STATUS_SUCCESS );
}
} //endswitch
ASSERT( TRUE == FALSE ); // Should never reach here.
return( STATUS_INVALID_PARAMETER );
}
VOID
SepModifyTokenPolicyCounter(
PSEP_AUDIT_POLICY TokenPolicy,
BOOLEAN bIncrement
)
/**
Routine Description:
This modifies the global SepTokenPolicyCounter hint which records the number of
tokens in the system with per user auditing settings.
Arguments:
TokenPolicy - the policy which should be reflected in the hint.
bIncrement - boolean indicating if this policy is being added (TRUE) or
deleted (FALSE) from the counters.
Return Value:
None.
**/
{
LONG increment;
if (bIncrement) {
increment = 1;
} else {
increment = -1;
}
if (TokenPolicy->PolicyElements.System) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategorySystem], increment);
ASSERT(SepTokenPolicyCounter[AuditCategorySystem] >= 0);
}
if (TokenPolicy->PolicyElements.Logon) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryLogon], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryLogon] >= 0);
}
if (TokenPolicy->PolicyElements.ObjectAccess) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryObjectAccess], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryObjectAccess] >= 0);
}
if (TokenPolicy->PolicyElements.PrivilegeUse) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryPrivilegeUse], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryPrivilegeUse] >= 0);
}
if (TokenPolicy->PolicyElements.DetailedTracking) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryDetailedTracking], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryDetailedTracking] >= 0);
}
if (TokenPolicy->PolicyElements.PolicyChange) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryPolicyChange], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryPolicyChange] >= 0);
}
if (TokenPolicy->PolicyElements.AccountManagement) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryAccountManagement], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryAccountManagement] >= 0);
}
if (TokenPolicy->PolicyElements.DirectoryServiceAccess) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryDirectoryServiceAccess], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryDirectoryServiceAccess] >= 0);
}
if (TokenPolicy->PolicyElements.AccountLogon) {
InterlockedExchangeAdd(&SepTokenPolicyCounter[AuditCategoryAccountLogon], increment);
ASSERT(SepTokenPolicyCounter[AuditCategoryAccountLogon] >= 0);
}
}
NTSTATUS
SepExpandDynamic(
IN PTOKEN Token,
IN ULONG NewLength
)
/*++
Routine Description:
This routines checks if the existing token dynamic buffer is big enough for the new group/dacl.
If it isn't then its reallocated.
Arguments:
Token - Pointer to the token to expand. Locked for write access.
Return Value:
NTSTATUS - Status of operation
--*/
{
ULONG CurrentSize;
PVOID NewDynamic, OldDynamic;
//
// Work out how big it is now
//
CurrentSize = SeLengthSid( Token->PrimaryGroup ) + Token->DynamicAvailable;
if (Token->DefaultDacl) {
CurrentSize += Token->DefaultDacl->AclSize;
}
if (NewLength <= CurrentSize) {
return STATUS_SUCCESS;
}
NewDynamic = ExAllocatePoolWithTag (PagedPool,
NewLength,
'dTeS');
if (NewDynamic == NULL) {
return STATUS_INSUFFICIENT_RESOURCES;
}
OldDynamic = Token->DynamicPart;
RtlCopyMemory (NewDynamic, OldDynamic, CurrentSize);
Token->DynamicPart = NewDynamic;
Token->DynamicAvailable += NewLength - CurrentSize;
//
//Relocate the pointers within the new buffer
//
if (Token->DefaultDacl) {
Token->DefaultDacl = (PACL) ((PUCHAR) NewDynamic + ((PUCHAR) Token->DefaultDacl - (PUCHAR) OldDynamic));
}
Token->PrimaryGroup = (PSID) ((PUCHAR) NewDynamic + ((PUCHAR) Token->PrimaryGroup - (PUCHAR) OldDynamic));
ExFreePool (OldDynamic);
return STATUS_SUCCESS;
}
VOID
SepFreePrimaryGroup(
IN PTOKEN Token
)
/*++
Routine Description:
Free up the space in the dynamic part of the token take up by the primary
group.
The token is assumed to be locked for write access before calling
this routine.
Arguments:
Token - Pointer to the token.
Return Value:
None.
--*/
{
PAGED_CODE();
//
// Add the size of the primary group to the DynamicAvailable field.
//
Token->DynamicAvailable += SeLengthSid( Token->PrimaryGroup );
//
// If there is a default discretionary ACL, and it is not already at the
// beginning of the dynamic part, move it there (remember to update the
// pointer to it).
//
if (ARGUMENT_PRESENT(Token->DefaultDacl)) {
if (Token->DynamicPart != (PULONG)(Token->DefaultDacl)) {
RtlMoveMemory(
(PVOID)(Token->DynamicPart),
(PVOID)(Token->DefaultDacl),
Token->DefaultDacl->AclSize
);
Token->DefaultDacl = (PACL)(Token->DynamicPart);
}
}
return;
}
VOID
SepFreeDefaultDacl(
IN PTOKEN Token
)
/*++
Routine Description:
Free up the space in the dynamic part of the token take up by the default
discretionary access control list.
The token is assumed to be locked for write access before calling
this routine.
Arguments:
Token - Pointer to the token.
Return Value:
None.
--*/
{
ULONG PrimaryGroupSize;
PAGED_CODE();
//
// Add the size of the Default Dacl (if there is one) to the
// DynamicAvailable field.
//
if (ARGUMENT_PRESENT(Token->DefaultDacl)) {
Token->DynamicAvailable += Token->DefaultDacl->AclSize;
Token->DefaultDacl = NULL;
}
//
// If it is not already at the beginning of the dynamic part, move
// the primary group there (remember to update the pointer to it).
//
if (Token->DynamicPart != (PULONG)(Token->PrimaryGroup)) {
PrimaryGroupSize = SeLengthSid( Token->PrimaryGroup );
RtlMoveMemory(
(PVOID)(Token->DynamicPart),
(PVOID)(Token->PrimaryGroup),
PrimaryGroupSize
);
Token->PrimaryGroup = (PSID)(Token->DynamicPart);
}
return;
}
VOID
SepAppendPrimaryGroup(
IN PTOKEN Token,
IN PSID PSid
)
/*++
Routine Description:
Add a primary group SID to the available space at the end of the dynamic
part of the token. It is the caller's responsibility to ensure that the
primary group SID fits within the available space of the dynamic part of
the token.
The token is assumed to be locked for write access before calling
this routine.
Arguments:
Token - Pointer to the token.
PSid - Pointer to the SID to add.
Return Value:
None.
--*/
{
ULONG_PTR NextFree;
ULONG SidSize;
PAGED_CODE();
//
// Add the size of the Default Dacl (if there is one) to the
// address of the Dynamic Part of the token to establish
// where the primary group should be placed.
//
if (ARGUMENT_PRESENT(Token->DefaultDacl)) {
// ASSERT( (ULONG)(Token->DefaultDacl->AclSize) ==
// (ULONG)LongAlignSize(Token->DefaultDacl->AclSize) );
NextFree = (ULONG_PTR)(Token->DynamicPart) + Token->DefaultDacl->AclSize;
} else {
NextFree = (ULONG_PTR)(Token->DynamicPart);
}
//
// Now copy the primary group SID.
//
SidSize = SeLengthSid( PSid );
RtlCopyMemory(
(PVOID)NextFree,
(PVOID)PSid,
SidSize
);
Token->PrimaryGroup = (PSID)NextFree;
//
// And decrement the amount of the dynamic part that is available.
//
ASSERT( SidSize <= (Token->DynamicAvailable) );
Token->DynamicAvailable -= SidSize;
return;
}
VOID
SepAppendDefaultDacl(
IN PTOKEN Token,
IN PACL PAcl
)
/*++
Routine Description:
Add a default discretionary ACL to the available space at the end of the
dynamic part of the token. It is the caller's responsibility to ensure
that the default Dacl fits within the available space of the dynamic
part of the token.
The token is assumed to be locked for write access before calling
this routine.
Arguments:
Token - Pointer to the token.
PAcl - Pointer to the ACL to add.
Return Value:
None.
--*/
{
ULONG_PTR NextFree;
ULONG AclSize;
PAGED_CODE();
//
// Add the size of the primary group to the
// address of the Dynamic Part of the token to establish
// where the primary group should be placed.
//
ASSERT(ARGUMENT_PRESENT(Token->PrimaryGroup));
NextFree = (ULONG_PTR)(Token->DynamicPart) + SeLengthSid(Token->PrimaryGroup);
//
// Now copy the default Dacl
//
AclSize = (ULONG)(PAcl->AclSize);
// ASSERT(AclSize == (ULONG)LongAlignSize(AclSize));
RtlCopyMemory(
(PVOID)NextFree,
(PVOID)PAcl,
AclSize
);
Token->DefaultDacl = (PACL)NextFree;
//
// And decrement the amount of the dynamic part that is available.
//
ASSERT( AclSize <= (Token->DynamicAvailable) );
Token->DynamicAvailable -= AclSize;
return;
}
NTSTATUS
SeSetSessionIdToken(
PACCESS_TOKEN Token,
ULONG SessionId
)
/*++
Routine Description:
Sets the SessionId for the specified token object.
Arguments:
pOpaqueToken (input)
Opaque kernel Token access pointer
SessionId (input)
SessionId to store in token
Return Value:
STATUS_SUCCESS - no error
--*/
{
PAGED_CODE();
//
// Gain write access to the token.
//
SepAcquireTokenWriteLock( ((PTOKEN)Token) );
((PTOKEN)Token)->SessionId = SessionId;
SepReleaseTokenWriteLock( ((PTOKEN)Token), FALSE );
return( STATUS_SUCCESS );
}