unsigned i;
if (sid_active_in_token(sd->owner_sid, token)) {
- granted |= SEC_STD_WRITE_DAC | SEC_STD_READ_CONTROL | SEC_STD_DELETE;
+ granted |= SEC_STD_WRITE_DAC | SEC_STD_READ_CONTROL;
+ }
+ if (sec_privilege_check(token, SEC_PRIV_RESTORE)) {
+ granted |= SEC_STD_DELETE;
}
for (i = 0;i<sd->dacl->num_aces; i++) {
bits_remaining = access_desired & ~SEC_STD_DELETE;
}
-#if 0
- /* this is where we should check for the "system security" privilege, once we
- move to the full security_token and not just the nt_user_token */
if (access_desired & SEC_FLAG_SYSTEM_SECURITY) {
- if (privilege_in_token(SE_PRIVILEGE_SYSTEM_SECURITY, token)) {
+ if (sec_privilege_check(token, SEC_PRIV_SECURITY)) {
bits_remaining &= ~SEC_FLAG_SYSTEM_SECURITY;
} else {
return NT_STATUS_ACCESS_DENIED;
}
}
-#endif
/* dacl not present allows access */
if (!(sd->type & SEC_DESC_DACL_PRESENT)) {
sid_active_in_token(sd->owner_sid, token)) {
bits_remaining &= ~(SEC_STD_WRITE_DAC|SEC_STD_READ_CONTROL);
}
+ if ((bits_remaining & SEC_STD_DELETE) &&
+ sec_privilege_check(token, SEC_PRIV_RESTORE)) {
+ bits_remaining &= ~SEC_STD_DELETE;
+ }
/* check each ace in turn. */
for (i=0; bits_remaining && i < sd->dacl->num_aces; i++) {
}
return -1;
}
+
+
+/*
+ return True if a security_token has a particular privilege bit set
+*/
+BOOL sec_privilege_check(const struct security_token *token, unsigned int privilege)
+{
+ uint64_t mask = 1;
+ mask <<= (privilege-1);
+ if (token->privilege_mask & mask) {
+ return True;
+ }
+ return False;
+}
+
+/*
+ set a bit in the privilege mask
+*/
+void sec_privilege_set(struct security_token *token, unsigned int privilege)
+{
+ uint64_t mask = 1;
+ mask <<= (privilege-1);
+ token->privilege_mask |= mask;
+}