security/sandbox/win/src/acl.cc

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 #include "sandbox/win/src/acl.h"
     7 #include <aclapi.h>
     8 #include <sddl.h>
    10 #include "base/logging.h"
    12 namespace sandbox {
    14 bool GetDefaultDacl(HANDLE token,
    15                     scoped_ptr_malloc<TOKEN_DEFAULT_DACL>* default_dacl) {
    16   if (token == NULL)
    17     return false;
    19   DCHECK(default_dacl != NULL);
    21   unsigned long length = 0;
    22   ::GetTokenInformation(token, TokenDefaultDacl, NULL, 0, &length);
    23   if (length == 0) {
    24     NOTREACHED();
    25     return false;
    26   }
    28   TOKEN_DEFAULT_DACL* acl =
    29       reinterpret_cast<TOKEN_DEFAULT_DACL*>(malloc(length));
    30   default_dacl->reset(acl);
    32   if (!::GetTokenInformation(token, TokenDefaultDacl, default_dacl->get(),
    33                              length, &length))
    34       return false;
    36   return true;
    37 }
    39 bool AddSidToDacl(const Sid& sid, ACL* old_dacl, ACCESS_MASK access,
    40                   ACL** new_dacl) {
    41   EXPLICIT_ACCESS new_access = {0};
    42   new_access.grfAccessMode = GRANT_ACCESS;
    43   new_access.grfAccessPermissions = access;
    44   new_access.grfInheritance = NO_INHERITANCE;
    46   new_access.Trustee.pMultipleTrustee = NULL;
    47   new_access.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
    48   new_access.Trustee.TrusteeForm = TRUSTEE_IS_SID;
    49   new_access.Trustee.ptstrName = reinterpret_cast<LPWSTR>(
    50                                     const_cast<SID*>(sid.GetPSID()));
    52   if (ERROR_SUCCESS != ::SetEntriesInAcl(1, &new_access, old_dacl, new_dacl))
    53     return false;
    55   return true;
    56 }
    58 bool AddSidToDefaultDacl(HANDLE token, const Sid& sid, ACCESS_MASK access) {
    59   if (token == NULL)
    60     return false;
    62   scoped_ptr_malloc<TOKEN_DEFAULT_DACL> default_dacl;
    63   if (!GetDefaultDacl(token, &default_dacl))
    64     return false;
    66   ACL* new_dacl = NULL;
    67   if (!AddSidToDacl(sid, default_dacl->DefaultDacl, access, &new_dacl))
    68     return false;
    70   TOKEN_DEFAULT_DACL new_token_dacl = {0};
    71   new_token_dacl.DefaultDacl = new_dacl;
    73   BOOL ret = ::SetTokenInformation(token, TokenDefaultDacl, &new_token_dacl,
    74                                    sizeof(new_token_dacl));
    75   ::LocalFree(new_dacl);
    76   return (TRUE == ret);
    77 }
    79 bool AddUserSidToDefaultDacl(HANDLE token, ACCESS_MASK access) {
    80   DWORD size = sizeof(TOKEN_USER) + SECURITY_MAX_SID_SIZE;
    81   TOKEN_USER* token_user = reinterpret_cast<TOKEN_USER*>(malloc(size));
    83   scoped_ptr_malloc<TOKEN_USER> token_user_ptr(token_user);
    85   if (!::GetTokenInformation(token, TokenUser, token_user, size, &size))
    86     return false;
    88   return AddSidToDefaultDacl(token,
    89                              reinterpret_cast<SID*>(token_user->User.Sid),
    90                              access);
    91 }
    93 bool AddKnownSidToKernelObject(HANDLE object, const Sid& sid,
    94                                ACCESS_MASK access) {
    95   PSECURITY_DESCRIPTOR descriptor = NULL;
    96   PACL old_dacl = NULL;
    97   PACL new_dacl = NULL;
    99   if (ERROR_SUCCESS != ::GetSecurityInfo(object, SE_KERNEL_OBJECT,
   100                                          DACL_SECURITY_INFORMATION, NULL, NULL,
   101                                          &old_dacl, NULL, &descriptor))
   102     return false;
   104   if (!AddSidToDacl(sid.GetPSID(), old_dacl, access, &new_dacl)) {
   105     ::LocalFree(descriptor);
   106     return false;
   107   }
   109   DWORD result = ::SetSecurityInfo(object, SE_KERNEL_OBJECT,
   110                                    DACL_SECURITY_INFORMATION, NULL, NULL,
   111                                    new_dacl, NULL);
   113   ::LocalFree(new_dacl);
   114   ::LocalFree(descriptor);
   116   if (ERROR_SUCCESS != result)
   117     return false;
   119   return true;
   120 }
   122 }  // namespace sandbox

mercurial