ReactOS  0.4.15-dev-3745-g356babc
setypes.h
Go to the documentation of this file.
1 /******************************************************************************
2  * Security Manager Types *
3  ******************************************************************************/
5 
6 /* Simple types */
9 typedef $ULONG ACCESS_MASK, *PACCESS_MASK;
10 
12 typedef PVOID PSID;
13 
14 #define DELETE 0x00010000L
15 #define READ_CONTROL 0x00020000L
16 #define WRITE_DAC 0x00040000L
17 #define WRITE_OWNER 0x00080000L
18 #define SYNCHRONIZE 0x00100000L
19 #define STANDARD_RIGHTS_REQUIRED 0x000F0000L
20 #define STANDARD_RIGHTS_READ READ_CONTROL
21 #define STANDARD_RIGHTS_WRITE READ_CONTROL
22 #define STANDARD_RIGHTS_EXECUTE READ_CONTROL
23 #define STANDARD_RIGHTS_ALL 0x001F0000L
24 #define SPECIFIC_RIGHTS_ALL 0x0000FFFFL
25 #define ACCESS_SYSTEM_SECURITY 0x01000000L
26 #define MAXIMUM_ALLOWED 0x02000000L
27 #define GENERIC_READ 0x80000000L
28 #define GENERIC_WRITE 0x40000000L
29 #define GENERIC_EXECUTE 0x20000000L
30 #define GENERIC_ALL 0x10000000L
31 
32 typedef struct _GENERIC_MAPPING {
38 
39 #define ACL_REVISION 2
40 #define ACL_REVISION_DS 4
41 
42 #define ACL_REVISION1 1
43 #define ACL_REVISION2 2
44 #define ACL_REVISION3 3
45 #define ACL_REVISION4 4
46 #define MIN_ACL_REVISION ACL_REVISION2
47 #define MAX_ACL_REVISION ACL_REVISION4
48 
49 typedef struct _ACL {
50  $UCHAR AclRevision;
51  $UCHAR Sbz1;
52  $USHORT AclSize;
53  $USHORT AceCount;
54  $USHORT Sbz2;
55 } ACL, *PACL;
56 
57 /* Current security descriptor revision value */
58 #define SECURITY_DESCRIPTOR_REVISION (1)
59 #define SECURITY_DESCRIPTOR_REVISION1 (1)
60 
61 /* Privilege attributes */
62 #define SE_PRIVILEGE_ENABLED_BY_DEFAULT (0x00000001L)
63 #define SE_PRIVILEGE_ENABLED (0x00000002L)
64 #define SE_PRIVILEGE_REMOVED (0x00000004L)
65 #define SE_PRIVILEGE_USED_FOR_ACCESS (0x80000000L)
66 
67 #define SE_PRIVILEGE_VALID_ATTRIBUTES (SE_PRIVILEGE_ENABLED_BY_DEFAULT | \
68  SE_PRIVILEGE_ENABLED | \
69  SE_PRIVILEGE_REMOVED | \
70  SE_PRIVILEGE_USED_FOR_ACCESS)
71 
72 #include <pshpack4.h>
73 typedef struct _LUID_AND_ATTRIBUTES {
75  $ULONG Attributes;
77 #include <poppack.h>
78 
81 
82 /* Privilege sets */
83 #define PRIVILEGE_SET_ALL_NECESSARY (1)
84 
85 typedef struct _PRIVILEGE_SET {
87  $ULONG Control;
90 
97 
98 #define SECURITY_MAX_IMPERSONATION_LEVEL SecurityDelegation
99 #define SECURITY_MIN_IMPERSONATION_LEVEL SecurityAnonymous
100 #define DEFAULT_IMPERSONATION_LEVEL SecurityImpersonation
101 #define VALID_IMPERSONATION_LEVEL(Level) (((Level) >= SECURITY_MIN_IMPERSONATION_LEVEL) && ((Level) <= SECURITY_MAX_IMPERSONATION_LEVEL))
102 
103 #define SECURITY_DYNAMIC_TRACKING (TRUE)
104 #define SECURITY_STATIC_TRACKING (FALSE)
105 
107 
108 typedef struct _SECURITY_QUALITY_OF_SERVICE {
109  $ULONG Length;
114 
115 typedef struct _SE_IMPERSONATION_STATE {
121 
122 
123 #define OWNER_SECURITY_INFORMATION (0x00000001L)
124 #define GROUP_SECURITY_INFORMATION (0x00000002L)
125 #define DACL_SECURITY_INFORMATION (0x00000004L)
126 #define SACL_SECURITY_INFORMATION (0x00000008L)
127 #define LABEL_SECURITY_INFORMATION (0x00000010L)
128 
129 #define PROTECTED_DACL_SECURITY_INFORMATION (0x80000000L)
130 #define PROTECTED_SACL_SECURITY_INFORMATION (0x40000000L)
131 #define UNPROTECTED_DACL_SECURITY_INFORMATION (0x20000000L)
132 #define UNPROTECTED_SACL_SECURITY_INFORMATION (0x10000000L)
133 
134 /* Auto inherit ACE flags */
135 #define SEF_DACL_AUTO_INHERIT 0x01
136 #define SEF_SACL_AUTO_INHERIT 0x02
137 #define SEF_DEFAULT_DESCRIPTOR_FOR_OBJECT 0x04
138 #define SEF_AVOID_PRIVILEGE_CHECK 0x08
139 #define SEF_AVOID_OWNER_CHECK 0x10
140 #define SEF_DEFAULT_OWNER_FROM_PARENT 0x20
141 #define SEF_DEFAULT_GROUP_FROM_PARENT 0x40
142 #define SEF_MACL_NO_WRITE_UP 0x100
143 #define SEF_MACL_NO_READ_UP 0x200
144 #define SEF_MACL_NO_EXECUTE_UP 0x400
145 #define SEF_AI_USE_EXTRA_PARAMS 0x800
146 #define SEF_AVOID_OWNER_RESTRICTION 0x1000
147 #define SEF_MACL_VALID_FLAGS (SEF_MACL_NO_WRITE_UP | SEF_MACL_NO_READ_UP | SEF_MACL_NO_EXECUTE_UP)
148 
150 
151 $if (_WINNT_)
152 
153 /* Privilege token filtering flags */
154 #define DISABLE_MAX_PRIVILEGE 0x1
155 #define SANDBOX_INERT 0x2
156 #if (NTDDI_VERSION >= NTDDI_LONGHORN)
157 #define LUA_TOKEN 0x4
158 #define WRITE_RESTRICTED 0x8
159 #endif
160 
161 $endif (_WINNT_)
162 
163 $if (_WDMDDK_)
164 
165 typedef enum _SECURITY_OPERATION_CODE {
166  SetSecurityDescriptor,
167  QuerySecurityDescriptor,
168  DeleteSecurityDescriptor,
169  AssignSecurityDescriptor
171 
172 #define INITIAL_PRIVILEGE_COUNT 3
173 
174 typedef struct _INITIAL_PRIVILEGE_SET {
179 
180 #define SE_MIN_WELL_KNOWN_PRIVILEGE 2
181 #define SE_CREATE_TOKEN_PRIVILEGE 2
182 #define SE_ASSIGNPRIMARYTOKEN_PRIVILEGE 3
183 #define SE_LOCK_MEMORY_PRIVILEGE 4
184 #define SE_INCREASE_QUOTA_PRIVILEGE 5
185 #define SE_MACHINE_ACCOUNT_PRIVILEGE 6
186 #define SE_TCB_PRIVILEGE 7
187 #define SE_SECURITY_PRIVILEGE 8
188 #define SE_TAKE_OWNERSHIP_PRIVILEGE 9
189 #define SE_LOAD_DRIVER_PRIVILEGE 10
190 #define SE_SYSTEM_PROFILE_PRIVILEGE 11
191 #define SE_SYSTEMTIME_PRIVILEGE 12
192 #define SE_PROF_SINGLE_PROCESS_PRIVILEGE 13
193 #define SE_INC_BASE_PRIORITY_PRIVILEGE 14
194 #define SE_CREATE_PAGEFILE_PRIVILEGE 15
195 #define SE_CREATE_PERMANENT_PRIVILEGE 16
196 #define SE_BACKUP_PRIVILEGE 17
197 #define SE_RESTORE_PRIVILEGE 18
198 #define SE_SHUTDOWN_PRIVILEGE 19
199 #define SE_DEBUG_PRIVILEGE 20
200 #define SE_AUDIT_PRIVILEGE 21
201 #define SE_SYSTEM_ENVIRONMENT_PRIVILEGE 22
202 #define SE_CHANGE_NOTIFY_PRIVILEGE 23
203 #define SE_REMOTE_SHUTDOWN_PRIVILEGE 24
204 #define SE_UNDOCK_PRIVILEGE 25
205 #define SE_SYNC_AGENT_PRIVILEGE 26
206 #define SE_ENABLE_DELEGATION_PRIVILEGE 27
207 #define SE_MANAGE_VOLUME_PRIVILEGE 28
208 #define SE_IMPERSONATE_PRIVILEGE 29
209 #define SE_CREATE_GLOBAL_PRIVILEGE 30
210 #define SE_TRUSTED_CREDMAN_ACCESS_PRIVILEGE 31
211 #define SE_RELABEL_PRIVILEGE 32
212 #define SE_INC_WORKING_SET_PRIVILEGE 33
213 #define SE_TIME_ZONE_PRIVILEGE 34
214 #define SE_CREATE_SYMBOLIC_LINK_PRIVILEGE 35
215 #define SE_MAX_WELL_KNOWN_PRIVILEGE SE_CREATE_SYMBOLIC_LINK_PRIVILEGE
216 
223 
224 typedef struct _ACCESS_STATE {
237  union {
240  } Privileges;
245 
246 typedef VOID
248  _In_ PVOID Vcb,
250 
251 #ifndef _NTLSA_IFS_
252 
253 #ifndef _NTLSA_AUDIT_
254 #define _NTLSA_AUDIT_
255 
256 #define SE_MAX_AUDIT_PARAMETERS 32
257 #define SE_MAX_GENERIC_AUDIT_PARAMETERS 28
258 
259 #define SE_ADT_OBJECT_ONLY 0x1
260 
261 #define SE_ADT_PARAMETERS_SELF_RELATIVE 0x00000001
262 #define SE_ADT_PARAMETERS_SEND_TO_LSA 0x00000002
263 #define SE_ADT_PARAMETER_EXTENSIBLE_AUDIT 0x00000004
264 #define SE_ADT_PARAMETER_GENERIC_AUDIT 0x00000008
265 #define SE_ADT_PARAMETER_WRITE_SYNCHRONOUS 0x00000010
266 
267 #define LSAP_SE_ADT_PARAMETER_ARRAY_TRUE_SIZE(Parameters) \
268  ( sizeof(SE_ADT_PARAMETER_ARRAY) - sizeof(SE_ADT_PARAMETER_ARRAY_ENTRY) * \
269  (SE_MAX_AUDIT_PARAMETERS - Parameters->ParameterCount) )
270 
303 
304 typedef struct _SE_ADT_OBJECT_TYPE {
310 
317 
318 typedef struct _SE_ADT_ACCESS_REASON {
325 
326 typedef struct _SE_ADT_PARAMETER_ARRAY {
336 
337 #endif /* !_NTLSA_AUDIT_ */
338 #endif /* !_NTLSA_IFS_ */
340 $if (_NTDDK_)
341 #define SE_UNSOLICITED_INPUT_PRIVILEGE 6
342 
343 $endif (_NTDDK_)
344 $if (_NTDDK_ || _WINNT_)
345 
346 typedef enum _WELL_KNOWN_SID_TYPE {
347  WinNullSid = 0,
348  WinWorldSid = 1,
349  WinLocalSid = 2,
350  WinCreatorOwnerSid = 3,
351  WinCreatorGroupSid = 4,
352  WinCreatorOwnerServerSid = 5,
353  WinCreatorGroupServerSid = 6,
354  WinNtAuthoritySid = 7,
355  WinDialupSid = 8,
356  WinNetworkSid = 9,
357  WinBatchSid = 10,
358  WinInteractiveSid = 11,
359  WinServiceSid = 12,
360  WinAnonymousSid = 13,
361  WinProxySid = 14,
362  WinEnterpriseControllersSid = 15,
363  WinSelfSid = 16,
364  WinAuthenticatedUserSid = 17,
365  WinRestrictedCodeSid = 18,
366  WinTerminalServerSid = 19,
367  WinRemoteLogonIdSid = 20,
368  WinLogonIdsSid = 21,
369  WinLocalSystemSid = 22,
370  WinLocalServiceSid = 23,
371  WinNetworkServiceSid = 24,
372  WinBuiltinDomainSid = 25,
373  WinBuiltinAdministratorsSid = 26,
374  WinBuiltinUsersSid = 27,
375  WinBuiltinGuestsSid = 28,
376  WinBuiltinPowerUsersSid = 29,
377  WinBuiltinAccountOperatorsSid = 30,
378  WinBuiltinSystemOperatorsSid = 31,
379  WinBuiltinPrintOperatorsSid = 32,
380  WinBuiltinBackupOperatorsSid = 33,
381  WinBuiltinReplicatorSid = 34,
382  WinBuiltinPreWindows2000CompatibleAccessSid = 35,
383  WinBuiltinRemoteDesktopUsersSid = 36,
384  WinBuiltinNetworkConfigurationOperatorsSid = 37,
385  WinAccountAdministratorSid = 38,
386  WinAccountGuestSid = 39,
387  WinAccountKrbtgtSid = 40,
388  WinAccountDomainAdminsSid = 41,
389  WinAccountDomainUsersSid = 42,
390  WinAccountDomainGuestsSid = 43,
391  WinAccountComputersSid = 44,
392  WinAccountControllersSid = 45,
393  WinAccountCertAdminsSid = 46,
394  WinAccountSchemaAdminsSid = 47,
395  WinAccountEnterpriseAdminsSid = 48,
396  WinAccountPolicyAdminsSid = 49,
397  WinAccountRasAndIasServersSid = 50,
398  WinNTLMAuthenticationSid = 51,
399  WinDigestAuthenticationSid = 52,
400  WinSChannelAuthenticationSid = 53,
401  WinThisOrganizationSid = 54,
402  WinOtherOrganizationSid = 55,
403  WinBuiltinIncomingForestTrustBuildersSid = 56,
404  WinBuiltinPerfMonitoringUsersSid = 57,
405  WinBuiltinPerfLoggingUsersSid = 58,
406  WinBuiltinAuthorizationAccessSid = 59,
407  WinBuiltinTerminalServerLicenseServersSid = 60,
408  WinBuiltinDCOMUsersSid = 61,
409  WinBuiltinIUsersSid = 62,
410  WinIUserSid = 63,
411  WinBuiltinCryptoOperatorsSid = 64,
412  WinUntrustedLabelSid = 65,
413  WinLowLabelSid = 66,
414  WinMediumLabelSid = 67,
415  WinHighLabelSid = 68,
416  WinSystemLabelSid = 69,
417  WinWriteRestrictedCodeSid = 70,
418  WinCreatorOwnerRightsSid = 71,
419  WinCacheablePrincipalsGroupSid = 72,
420  WinNonCacheablePrincipalsGroupSid = 73,
421  WinEnterpriseReadonlyControllersSid = 74,
422  WinAccountReadonlyControllersSid = 75,
423  WinBuiltinEventLogReadersGroup = 76,
424  WinNewEnterpriseReadonlyControllersSid = 77,
425  WinBuiltinCertSvcDComAccessGroup = 78,
426  WinMediumPlusLabelSid = 79,
427  WinLocalLogonSid = 80,
428  WinConsoleLogonSid = 81,
429  WinThisOrganizationCertificateSid = 82,
430  WinApplicationPackageAuthoritySid = 83,
431  WinBuiltinAnyPackageSid = 84,
432  WinCapabilityInternetClientSid = 85,
433  WinCapabilityInternetClientServerSid = 86,
434  WinCapabilityPrivateNetworkClientServerSid = 87,
435  WinCapabilityPicturesLibrarySid = 88,
436  WinCapabilityVideosLibrarySid = 89,
437  WinCapabilityMusicLibrarySid = 90,
438  WinCapabilityDocumentsLibrarySid = 91,
439  WinCapabilitySharedUserCertificatesSid = 92,
440  WinCapabilityEnterpriseAuthenticationSid = 93,
441  WinCapabilityRemovableStorageSid = 94,
442  WinBuiltinRDSRemoteAccessServersSid = 95,
443  WinBuiltinRDSEndpointServersSid = 96,
444  WinBuiltinRDSManagementServersSid = 97,
445  WinUserModeDriversSid = 98,
446  WinBuiltinHyperVAdminsSid = 99,
447  WinAccountCloneableControllersSid = 100,
448  WinBuiltinAccessControlAssistanceOperatorsSid = 101,
449  WinBuiltinRemoteManagementUsersSid = 102,
450  WinAuthenticationAuthorityAssertedSid = 103,
451  WinAuthenticationServiceAssertedSid = 104,
452  WinLocalAccountSid = 105,
453  WinLocalAccountAndAdministratorSid = 106,
454  WinAccountProtectedUsersSid = 107,
456 
458 $if (_NTIFS_ || _WINNT_)
459 
460 #ifndef SID_IDENTIFIER_AUTHORITY_DEFINED
461 #define SID_IDENTIFIER_AUTHORITY_DEFINED
462 typedef struct _SID_IDENTIFIER_AUTHORITY {
463  $UCHAR Value[6];
465 #endif
466 
467 #ifndef SID_DEFINED
468 #define SID_DEFINED
469 typedef struct _SID {
470  $UCHAR Revision;
473 #ifdef MIDL_PASS
474  [size_is(SubAuthorityCount)] $ULONG SubAuthority[*];
475 #else
477 #endif
478 } SID, *PISID;
479 #endif
480 
481 #define SID_REVISION 1
482 #define SID_MAX_SUB_AUTHORITIES 15
483 #define SID_RECOMMENDED_SUB_AUTHORITIES 1
484 
485 #ifndef MIDL_PASS
486 #define SECURITY_MAX_SID_SIZE (sizeof(SID) - sizeof($ULONG) + (SID_MAX_SUB_AUTHORITIES * sizeof($ULONG)))
487 #endif
488 
489 typedef enum _SID_NAME_USE {
501 
502 typedef struct _SID_AND_ATTRIBUTES {
503 #ifdef MIDL_PASS
504  PISID Sid;
505 #else
507 #endif
508  $ULONG Attributes;
512 
513 #define SID_HASH_SIZE 32
515 
516 typedef struct _SID_AND_ATTRIBUTES_HASH {
517  $ULONG SidCount;
521 
522 /* Universal well-known SIDs */
523 
524 #define SECURITY_NULL_SID_AUTHORITY {0,0,0,0,0,0}
525 
526 /* S-1-1 */
527 #define SECURITY_WORLD_SID_AUTHORITY {0,0,0,0,0,1}
528 
529 /* S-1-2 */
530 #define SECURITY_LOCAL_SID_AUTHORITY {0,0,0,0,0,2}
531 
532 /* S-1-3 */
533 #define SECURITY_CREATOR_SID_AUTHORITY {0,0,0,0,0,3}
534 
535 /* S-1-4 */
536 #define SECURITY_NON_UNIQUE_AUTHORITY {0,0,0,0,0,4}
537 
538 #define SECURITY_RESOURCE_MANAGER_AUTHORITY {0,0,0,0,0,9}
539 
540 #define SECURITY_NULL_RID (0x00000000L)
541 #define SECURITY_WORLD_RID (0x00000000L)
542 #define SECURITY_LOCAL_RID (0x00000000L)
543 #define SECURITY_LOCAL_LOGON_RID (0x00000001L)
544 
545 #define SECURITY_CREATOR_OWNER_RID (0x00000000L)
546 #define SECURITY_CREATOR_GROUP_RID (0x00000001L)
547 #define SECURITY_CREATOR_OWNER_SERVER_RID (0x00000002L)
548 #define SECURITY_CREATOR_GROUP_SERVER_RID (0x00000003L)
549 #define SECURITY_CREATOR_OWNER_RIGHTS_RID (0x00000004L)
550 
551 /* NT well-known SIDs */
552 
553 /* S-1-5 */
554 #define SECURITY_NT_AUTHORITY {0,0,0,0,0,5}
555 
556 #define SECURITY_DIALUP_RID (0x00000001L)
557 #define SECURITY_NETWORK_RID (0x00000002L)
558 #define SECURITY_BATCH_RID (0x00000003L)
559 #define SECURITY_INTERACTIVE_RID (0x00000004L)
560 #define SECURITY_LOGON_IDS_RID (0x00000005L)
561 #define SECURITY_LOGON_IDS_RID_COUNT (3L)
562 #define SECURITY_SERVICE_RID (0x00000006L)
563 #define SECURITY_ANONYMOUS_LOGON_RID (0x00000007L)
564 #define SECURITY_PROXY_RID (0x00000008L)
565 #define SECURITY_ENTERPRISE_CONTROLLERS_RID (0x00000009L)
566 #define SECURITY_SERVER_LOGON_RID SECURITY_ENTERPRISE_CONTROLLERS_RID
567 #define SECURITY_PRINCIPAL_SELF_RID (0x0000000AL)
568 #define SECURITY_AUTHENTICATED_USER_RID (0x0000000BL)
569 #define SECURITY_RESTRICTED_CODE_RID (0x0000000CL)
570 #define SECURITY_TERMINAL_SERVER_RID (0x0000000DL)
571 #define SECURITY_REMOTE_LOGON_RID (0x0000000EL)
572 #define SECURITY_THIS_ORGANIZATION_RID (0x0000000FL)
573 #define SECURITY_IUSER_RID (0x00000011L)
574 #define SECURITY_LOCAL_SYSTEM_RID (0x00000012L)
575 #define SECURITY_LOCAL_SERVICE_RID (0x00000013L)
576 #define SECURITY_NETWORK_SERVICE_RID (0x00000014L)
577 #define SECURITY_NT_NON_UNIQUE (0x00000015L)
578 #define SECURITY_NT_NON_UNIQUE_SUB_AUTH_COUNT (3L)
579 #define SECURITY_ENTERPRISE_READONLY_CONTROLLERS_RID (0x00000016L)
580 
581 #define SECURITY_BUILTIN_DOMAIN_RID (0x00000020L)
582 #define SECURITY_WRITE_RESTRICTED_CODE_RID (0x00000021L)
583 
584 
585 #define SECURITY_PACKAGE_BASE_RID (0x00000040L)
586 #define SECURITY_PACKAGE_RID_COUNT (2L)
587 #define SECURITY_PACKAGE_NTLM_RID (0x0000000AL)
588 #define SECURITY_PACKAGE_SCHANNEL_RID (0x0000000EL)
589 #define SECURITY_PACKAGE_DIGEST_RID (0x00000015L)
590 
591 #define SECURITY_CRED_TYPE_BASE_RID (0x00000041L)
592 #define SECURITY_CRED_TYPE_RID_COUNT (2L)
593 #define SECURITY_CRED_TYPE_THIS_ORG_CERT_RID (0x00000001L)
594 
595 #define SECURITY_MIN_BASE_RID (0x00000050L)
596 #define SECURITY_SERVICE_ID_BASE_RID (0x00000050L)
597 #define SECURITY_SERVICE_ID_RID_COUNT (6L)
598 #define SECURITY_RESERVED_ID_BASE_RID (0x00000051L)
599 #define SECURITY_APPPOOL_ID_BASE_RID (0x00000052L)
600 #define SECURITY_APPPOOL_ID_RID_COUNT (6L)
601 #define SECURITY_VIRTUALSERVER_ID_BASE_RID (0x00000053L)
602 #define SECURITY_VIRTUALSERVER_ID_RID_COUNT (6L)
603 #define SECURITY_USERMODEDRIVERHOST_ID_BASE_RID (0x00000054L)
604 #define SECURITY_USERMODEDRIVERHOST_ID_RID_COUNT (6L)
605 #define SECURITY_CLOUD_INFRASTRUCTURE_SERVICES_ID_BASE_RID (0x00000055L)
606 #define SECURITY_CLOUD_INFRASTRUCTURE_SERVICES_ID_RID_COUNT (6L)
607 #define SECURITY_WMIHOST_ID_BASE_RID (0x00000056L)
608 #define SECURITY_WMIHOST_ID_RID_COUNT (6L)
609 #define SECURITY_TASK_ID_BASE_RID (0x00000057L)
610 #define SECURITY_NFS_ID_BASE_RID (0x00000058L)
611 #define SECURITY_COM_ID_BASE_RID (0x00000059L)
612 #define SECURITY_VIRTUALACCOUNT_ID_RID_COUNT (6L)
613 
614 #define SECURITY_MAX_BASE_RID (0x0000006FL)
615 
616 #define SECURITY_MAX_ALWAYS_FILTERED (0x000003E7L)
617 #define SECURITY_MIN_NEVER_FILTERED (0x000003E8L)
618 
619 #define SECURITY_OTHER_ORGANIZATION_RID (0x000003E8L)
620 
621 #define SECURITY_WINDOWSMOBILE_ID_BASE_RID (0x00000070L)
622 
623 /* Well-known domain relative sub-authority values (RIDs) */
624 
625 #define DOMAIN_GROUP_RID_ENTERPRISE_READONLY_DOMAIN_CONTROLLERS (0x000001F2L)
626 
627 #define FOREST_USER_RID_MAX (0x000001F3L)
628 
629 /* Well-known users */
630 
631 #define DOMAIN_USER_RID_ADMIN (0x000001F4L)
632 #define DOMAIN_USER_RID_GUEST (0x000001F5L)
633 #define DOMAIN_USER_RID_KRBTGT (0x000001F6L)
634 
635 #define DOMAIN_USER_RID_MAX (0x000003E7L)
636 
637 /* Well-known groups */
638 
639 #define DOMAIN_GROUP_RID_ADMINS (0x00000200L)
640 #define DOMAIN_GROUP_RID_USERS (0x00000201L)
641 #define DOMAIN_GROUP_RID_GUESTS (0x00000202L)
642 #define DOMAIN_GROUP_RID_COMPUTERS (0x00000203L)
643 #define DOMAIN_GROUP_RID_CONTROLLERS (0x00000204L)
644 #define DOMAIN_GROUP_RID_CERT_ADMINS (0x00000205L)
645 #define DOMAIN_GROUP_RID_SCHEMA_ADMINS (0x00000206L)
646 #define DOMAIN_GROUP_RID_ENTERPRISE_ADMINS (0x00000207L)
647 #define DOMAIN_GROUP_RID_POLICY_ADMINS (0x00000208L)
648 #define DOMAIN_GROUP_RID_READONLY_CONTROLLERS (0x00000209L)
649 
650 /* Well-known aliases */
651 
652 #define DOMAIN_ALIAS_RID_ADMINS (0x00000220L)
653 #define DOMAIN_ALIAS_RID_USERS (0x00000221L)
654 #define DOMAIN_ALIAS_RID_GUESTS (0x00000222L)
655 #define DOMAIN_ALIAS_RID_POWER_USERS (0x00000223L)
656 
657 #define DOMAIN_ALIAS_RID_ACCOUNT_OPS (0x00000224L)
658 #define DOMAIN_ALIAS_RID_SYSTEM_OPS (0x00000225L)
659 #define DOMAIN_ALIAS_RID_PRINT_OPS (0x00000226L)
660 #define DOMAIN_ALIAS_RID_BACKUP_OPS (0x00000227L)
661 
662 #define DOMAIN_ALIAS_RID_REPLICATOR (0x00000228L)
663 #define DOMAIN_ALIAS_RID_RAS_SERVERS (0x00000229L)
664 #define DOMAIN_ALIAS_RID_PREW2KCOMPACCESS (0x0000022AL)
665 #define DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS (0x0000022BL)
666 #define DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS (0x0000022CL)
667 #define DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS (0x0000022DL)
668 
669 #define DOMAIN_ALIAS_RID_MONITORING_USERS (0x0000022EL)
670 #define DOMAIN_ALIAS_RID_LOGGING_USERS (0x0000022FL)
671 #define DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS (0x00000230L)
672 #define DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS (0x00000231L)
673 #define DOMAIN_ALIAS_RID_DCOM_USERS (0x00000232L)
674 
675 #define DOMAIN_ALIAS_RID_IUSERS (0x00000238L)
676 #define DOMAIN_ALIAS_RID_CRYPTO_OPERATORS (0x00000239L)
677 #define DOMAIN_ALIAS_RID_CACHEABLE_PRINCIPALS_GROUP (0x0000023BL)
678 #define DOMAIN_ALIAS_RID_NON_CACHEABLE_PRINCIPALS_GROUP (0x0000023CL)
679 #define DOMAIN_ALIAS_RID_EVENT_LOG_READERS_GROUP (0x0000023DL)
680 #define DOMAIN_ALIAS_RID_CERTSVC_DCOM_ACCESS_GROUP (0x0000023EL)
681 
682 #define SECURITY_MANDATORY_LABEL_AUTHORITY {0,0,0,0,0,16}
683 #define SECURITY_MANDATORY_UNTRUSTED_RID (0x00000000L)
684 #define SECURITY_MANDATORY_LOW_RID (0x00001000L)
685 #define SECURITY_MANDATORY_MEDIUM_RID (0x00002000L)
686 #define SECURITY_MANDATORY_HIGH_RID (0x00003000L)
687 #define SECURITY_MANDATORY_SYSTEM_RID (0x00004000L)
688 #define SECURITY_MANDATORY_PROTECTED_PROCESS_RID (0x00005000L)
689 
690 /* SECURITY_MANDATORY_MAXIMUM_USER_RID is the highest RID that
691  can be set by a usermode caller.*/
692 
693 #define SECURITY_MANDATORY_MAXIMUM_USER_RID SECURITY_MANDATORY_SYSTEM_RID
694 
695 #define MANDATORY_LEVEL_TO_MANDATORY_RID(IL) (IL * 0x1000)
696 
697 /* Allocate the System Luid. The first 1000 LUIDs are reserved.
698  Use #999 here (0x3e7 = 999) */
699 
700 #define SYSTEM_LUID {0x3e7, 0x0}
701 #define ANONYMOUS_LOGON_LUID {0x3e6, 0x0}
702 #define LOCALSERVICE_LUID {0x3e5, 0x0}
703 #define NETWORKSERVICE_LUID {0x3e4, 0x0}
704 #define IUSER_LUID {0x3e3, 0x0}
705 
706 /* Logon session reference flags */
707 
708 #define SEP_LOGON_SESSION_TERMINATION_NOTIFY 0x0001
709 
710 typedef struct _ACE_HEADER {
711  $UCHAR AceType;
712  $UCHAR AceFlags;
713  $USHORT AceSize;
715 
716 #define ACCESS_MIN_MS_ACE_TYPE (0x0)
717 #define ACCESS_ALLOWED_ACE_TYPE (0x0)
718 #define ACCESS_DENIED_ACE_TYPE (0x1)
719 #define SYSTEM_AUDIT_ACE_TYPE (0x2)
720 #define SYSTEM_ALARM_ACE_TYPE (0x3)
721 #define ACCESS_MAX_MS_V2_ACE_TYPE (0x3)
722 #define ACCESS_ALLOWED_COMPOUND_ACE_TYPE (0x4)
723 #define ACCESS_MAX_MS_V3_ACE_TYPE (0x4)
724 #define ACCESS_MIN_MS_OBJECT_ACE_TYPE (0x5)
725 #define ACCESS_ALLOWED_OBJECT_ACE_TYPE (0x5)
726 #define ACCESS_DENIED_OBJECT_ACE_TYPE (0x6)
727 #define SYSTEM_AUDIT_OBJECT_ACE_TYPE (0x7)
728 #define SYSTEM_ALARM_OBJECT_ACE_TYPE (0x8)
729 #define ACCESS_MAX_MS_OBJECT_ACE_TYPE (0x8)
730 #define ACCESS_MAX_MS_V4_ACE_TYPE (0x8)
731 #define ACCESS_MAX_MS_ACE_TYPE (0x8)
732 #define ACCESS_ALLOWED_CALLBACK_ACE_TYPE (0x9)
733 #define ACCESS_DENIED_CALLBACK_ACE_TYPE (0xA)
734 #define ACCESS_ALLOWED_CALLBACK_OBJECT_ACE_TYPE (0xB)
735 #define ACCESS_DENIED_CALLBACK_OBJECT_ACE_TYPE (0xC)
736 #define SYSTEM_AUDIT_CALLBACK_ACE_TYPE (0xD)
737 #define SYSTEM_ALARM_CALLBACK_ACE_TYPE (0xE)
738 #define SYSTEM_AUDIT_CALLBACK_OBJECT_ACE_TYPE (0xF)
739 #define SYSTEM_ALARM_CALLBACK_OBJECT_ACE_TYPE (0x10)
740 #define ACCESS_MAX_MS_V5_ACE_TYPE (0x11)
741 #define SYSTEM_MANDATORY_LABEL_ACE_TYPE (0x11)
742 
743 /* The following are the inherit flags that go into the AceFlags field
744  of an Ace header. */
745 
746 #define OBJECT_INHERIT_ACE (0x1)
747 #define CONTAINER_INHERIT_ACE (0x2)
748 #define NO_PROPAGATE_INHERIT_ACE (0x4)
749 #define INHERIT_ONLY_ACE (0x8)
750 #define INHERITED_ACE (0x10)
751 #define VALID_INHERIT_FLAGS (0x1F)
752 
753 #define SUCCESSFUL_ACCESS_ACE_FLAG (0x40)
754 #define FAILED_ACCESS_ACE_FLAG (0x80)
755 
756 typedef struct _ACCESS_ALLOWED_ACE {
759  $ULONG SidStart;
761 
762 typedef struct _ACCESS_DENIED_ACE {
765  $ULONG SidStart;
767 
768 typedef struct _SYSTEM_AUDIT_ACE {
771  $ULONG SidStart;
773 
774 typedef struct _SYSTEM_ALARM_ACE {
777  $ULONG SidStart;
779 
780 typedef struct _SYSTEM_MANDATORY_LABEL_ACE {
783  $ULONG SidStart;
785 
786 #define SYSTEM_MANDATORY_LABEL_NO_WRITE_UP 0x1
787 #define SYSTEM_MANDATORY_LABEL_NO_READ_UP 0x2
788 #define SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP 0x4
789 #define SYSTEM_MANDATORY_LABEL_VALID_MASK (SYSTEM_MANDATORY_LABEL_NO_WRITE_UP | \
790  SYSTEM_MANDATORY_LABEL_NO_READ_UP | \
791  SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP)
792 
793 #define SECURITY_DESCRIPTOR_MIN_LENGTH (sizeof(SECURITY_DESCRIPTOR))
794 
796 
797 #define SE_OWNER_DEFAULTED 0x0001
798 #define SE_GROUP_DEFAULTED 0x0002
799 #define SE_DACL_PRESENT 0x0004
800 #define SE_DACL_DEFAULTED 0x0008
801 #define SE_SACL_PRESENT 0x0010
802 #define SE_SACL_DEFAULTED 0x0020
803 #define SE_DACL_UNTRUSTED 0x0040
804 #define SE_SERVER_SECURITY 0x0080
805 #define SE_DACL_AUTO_INHERIT_REQ 0x0100
806 #define SE_SACL_AUTO_INHERIT_REQ 0x0200
807 #define SE_DACL_AUTO_INHERITED 0x0400
808 #define SE_SACL_AUTO_INHERITED 0x0800
809 #define SE_DACL_PROTECTED 0x1000
810 #define SE_SACL_PROTECTED 0x2000
811 #define SE_RM_CONTROL_VALID 0x4000
812 #define SE_SELF_RELATIVE 0x8000
813 
815  $UCHAR Revision;
816  $UCHAR Sbz1;
818  $ULONG Owner;
819  $ULONG Group;
820  $ULONG Sacl;
821  $ULONG Dacl;
823 
824 typedef struct _SECURITY_DESCRIPTOR {
825  $UCHAR Revision;
826  $UCHAR Sbz1;
833 
834 typedef struct _OBJECT_TYPE_LIST {
835  $USHORT Level;
836  $USHORT Sbz;
839 
840 #define ACCESS_OBJECT_GUID 0
841 #define ACCESS_PROPERTY_SET_GUID 1
842 #define ACCESS_PROPERTY_GUID 2
843 #define ACCESS_MAX_LEVEL 4
844 
845 typedef enum _AUDIT_EVENT_TYPE {
849 
850 #define AUDIT_ALLOW_NO_PRIVILEGE 0x1
851 
852 #define ACCESS_DS_SOURCE_A "DS"
853 #define ACCESS_DS_SOURCE_W L"DS"
854 #define ACCESS_DS_OBJECT_TYPE_NAME_A "Directory Service Object"
855 #define ACCESS_DS_OBJECT_TYPE_NAME_W L"Directory Service Object"
856 
857 #define ACCESS_REASON_TYPE_MASK 0xffff0000
858 #define ACCESS_REASON_DATA_MASK 0x0000ffff
859 
860 typedef enum _ACCESS_REASON_TYPE {
861  AccessReasonNone = 0x00000000,
863  AccessReasonDeniedAce = 0x00020000,
869  AccessReasonOwnership = 0x00400000,
870  AccessReasonNullDacl = 0x00500000,
871  AccessReasonEmptyDacl = 0x00600000,
872  AccessReasonNoSD = 0x00700000,
873  AccessReasonNoGrant = 0x00800000
875 
876 typedef $ULONG ACCESS_REASON;
877 
878 typedef struct _ACCESS_REASONS {
881 
882 #define SE_SECURITY_DESCRIPTOR_FLAG_NO_OWNER_ACE 0x00000001
883 #define SE_SECURITY_DESCRIPTOR_FLAG_NO_LABEL_ACE 0x00000002
884 #define SE_SECURITY_DESCRIPTOR_VALID_FLAGS 0x00000003
885 
886 typedef struct _SE_SECURITY_DESCRIPTOR {
887  $ULONG Size;
888  $ULONG Flags;
891 
892 typedef struct _SE_ACCESS_REQUEST {
893  $ULONG Size;
902 
903 #define TOKEN_ASSIGN_PRIMARY (0x0001)
904 #define TOKEN_DUPLICATE (0x0002)
905 #define TOKEN_IMPERSONATE (0x0004)
906 #define TOKEN_QUERY (0x0008)
907 #define TOKEN_QUERY_SOURCE (0x0010)
908 #define TOKEN_ADJUST_PRIVILEGES (0x0020)
909 #define TOKEN_ADJUST_GROUPS (0x0040)
910 #define TOKEN_ADJUST_DEFAULT (0x0080)
911 #define TOKEN_ADJUST_SESSIONID (0x0100)
912 
913 #define TOKEN_ALL_ACCESS_P (STANDARD_RIGHTS_REQUIRED |\
914  TOKEN_ASSIGN_PRIMARY |\
915  TOKEN_DUPLICATE |\
916  TOKEN_IMPERSONATE |\
917  TOKEN_QUERY |\
918  TOKEN_QUERY_SOURCE |\
919  TOKEN_ADJUST_PRIVILEGES |\
920  TOKEN_ADJUST_GROUPS |\
921  TOKEN_ADJUST_DEFAULT)
922 
923 #if ((defined(_WIN32_WINNT) && (_WIN32_WINNT > 0x0400)) || (!defined(_WIN32_WINNT)))
924 #define TOKEN_ALL_ACCESS (TOKEN_ALL_ACCESS_P | TOKEN_ADJUST_SESSIONID)
925 #else
926 #define TOKEN_ALL_ACCESS (TOKEN_ALL_ACCESS_P)
927 #endif
928 
929 #define TOKEN_READ (STANDARD_RIGHTS_READ | TOKEN_QUERY)
930 
931 #define TOKEN_WRITE (STANDARD_RIGHTS_WRITE |\
932  TOKEN_ADJUST_PRIVILEGES |\
933  TOKEN_ADJUST_GROUPS |\
934  TOKEN_ADJUST_DEFAULT)
935 
936 #define TOKEN_EXECUTE (STANDARD_RIGHTS_EXECUTE)
937 
938 typedef enum _TOKEN_TYPE {
942 
986 
987 typedef struct _TOKEN_USER {
990 
991 typedef struct _TOKEN_GROUPS {
992  $ULONG GroupCount;
993 #ifdef MIDL_PASS
994  [size_is(GroupCount)] SID_AND_ATTRIBUTES Groups[*];
995 #else
997 #endif
999 
1000 typedef struct _TOKEN_PRIVILEGES {
1004 
1005 typedef struct _TOKEN_OWNER {
1008 
1009 typedef struct _TOKEN_PRIMARY_GROUP {
1012 
1013 typedef struct _TOKEN_DEFAULT_DACL {
1016 
1018  $ULONG SidCount;
1019  $ULONG SidLength;
1029 
1030 typedef struct _TOKEN_LINKED_TOKEN {
1033 
1034 typedef struct _TOKEN_ELEVATION {
1037 
1038 typedef struct _TOKEN_MANDATORY_LABEL {
1041 
1042 #define TOKEN_MANDATORY_POLICY_OFF 0x0
1043 #define TOKEN_MANDATORY_POLICY_NO_WRITE_UP 0x1
1044 #define TOKEN_MANDATORY_POLICY_NEW_PROCESS_MIN 0x2
1045 
1046 #define TOKEN_MANDATORY_POLICY_VALID_MASK (TOKEN_MANDATORY_POLICY_NO_WRITE_UP | \
1047  TOKEN_MANDATORY_POLICY_NEW_PROCESS_MIN)
1048 
1049 #define POLICY_AUDIT_SUBCATEGORY_COUNT (56)
1050 
1051 typedef struct _TOKEN_AUDIT_POLICY {
1054 
1055 #define TOKEN_SOURCE_LENGTH 8
1056 
1057 typedef struct _TOKEN_SOURCE {
1061 
1062 #include <pshpack4.h>
1063 typedef struct _TOKEN_STATISTICS {
1071  $ULONG GroupCount;
1075 #include <poppack.h>
1076 
1077 typedef struct _TOKEN_CONTROL {
1078  LUID TokenId;
1080  LUID ModifiedId;
1083 
1084 typedef struct _TOKEN_ORIGIN {
1087 
1088 typedef enum _MANDATORY_LEVEL {
1097 
1099 $if(_NTIFS_)
1100 
1101 typedef struct _SE_ACCESS_REPLY {
1102  $ULONG Size;
1103  $ULONG ResultListCount;
1106  PACCESS_REASONS AccessReason;
1109 
1110 typedef enum _SE_AUDIT_OPERATION {
1125 
1126 typedef struct _SE_AUDIT_INFO {
1140 
1141 typedef struct _TOKEN_MANDATORY_POLICY {
1142  $ULONG Policy;
1144 
1153  $ULONG Flags;
1155 
1156 #define TOKEN_HAS_TRAVERSE_PRIVILEGE 0x0001
1157 #define TOKEN_HAS_BACKUP_PRIVILEGE 0x0002
1158 #define TOKEN_HAS_RESTORE_PRIVILEGE 0x0004
1159 #define TOKEN_WRITE_RESTRICTED 0x0008
1160 #define TOKEN_HAS_ADMIN_GROUP TOKEN_WRITE_RESTRICTED
1161 #define TOKEN_IS_RESTRICTED 0x0010
1162 #define TOKEN_SESSION_NOT_REFERENCED 0x0020
1163 #define TOKEN_SANDBOX_INERT 0x0040
1164 #define TOKEN_HAS_IMPERSONATE_PRIVILEGE 0x0080
1165 #define SE_BACKUP_PRIVILEGES_CHECKED 0x0100
1166 #define TOKEN_VIRTUALIZE_ALLOWED 0x0200
1167 #define TOKEN_VIRTUALIZE_ENABLED 0x0400
1168 #define TOKEN_IS_FILTERED 0x0800
1169 #define TOKEN_UIACCESS 0x1000
1170 #define TOKEN_NOT_LOW 0x2000
1171 
1172 typedef struct _SE_EXPORTS {
1239 
1240 typedef NTSTATUS
1242  IN PLUID LogonId);
1243 
1244 typedef struct _SECURITY_CLIENT_CONTEXT {
1252 
1253 $endif (_NTIFS_)
PSID SeAliasBackupOpsSid
Definition: setypes.h:1214
LUID AuthenticationId
Definition: setypes.h:1065
PSID SeAliasAdminsSid
Definition: setypes.h:1207
$ULONG * PSECURITY_INFORMATION
Definition: setypes.h:8
struct _SE_ADT_ACCESS_REASON SE_ADT_ACCESS_REASON
* PNTSTATUS
Definition: strlen.c:14
enum _SE_ADT_PARAMETER_TYPE SE_ADT_PARAMETER_TYPE
PSID SeSystemMandatorySid
Definition: setypes.h:1236
struct _SECURITY_DESCRIPTOR * PSECURITY_DESCRIPTOR
Definition: security.c:97
$ULONG SECURITY_INFORMATION
Definition: setypes.h:8
_SECURITY_IMPERSONATION_LEVEL
Definition: lsa.idl:54
UNICODE_STRING ObjectName
Definition: setypes.h:242
LUID SeEnableDelegationPrivilege
Definition: setypes.h:1220
ACE_HEADER Header
Definition: setypes.h:775
#define IN
Definition: typedefs.h:39
PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: setypes.h:235
struct _TOKEN_MANDATORY_LABEL TOKEN_MANDATORY_LABEL
struct _SYSTEM_MANDATORY_LABEL_ACE * PSYSTEM_MANDATORY_LABEL_ACE
struct _SE_IMPERSONATION_STATE SE_IMPERSONATION_STATE
LUID SeShutdownPrivilege
Definition: setypes.h:1190
LUID SeManageVolumePrivilege
Definition: setypes.h:1223
struct _SE_ACCESS_REQUEST * PSE_ACCESS_REQUEST
struct _OBJECT_TYPE_LIST OBJECT_TYPE_LIST
PSID_AND_ATTRIBUTES_HASH SidHash
Definition: setypes.h:1146
struct _SECURITY_SUBJECT_CONTEXT SECURITY_SUBJECT_CONTEXT
struct _TOKEN_AUDIT_POLICY * PTOKEN_AUDIT_POLICY
union _ACCESS_STATE::@3926 Privileges
struct _PRIVILEGE_SET PRIVILEGE_SET
struct _LUID_AND_ATTRIBUTES * PLUID_AND_ATTRIBUTES
enum _SID_NAME_USE * PSID_NAME_USE
_Must_inspect_result_ _In_ WDFQUEUE _In_opt_ WDFREQUEST _In_opt_ WDFFILEOBJECT _Inout_opt_ PWDF_REQUEST_PARAMETERS Parameters
Definition: wdfio.h:863
struct _INITIAL_PRIVILEGE_SET * PINITIAL_PRIVILEGE_SET
#define SE_MAX_AUDIT_PARAMETERS
Definition: setypes.h:256
struct _TOKEN_PRIMARY_GROUP * PTOKEN_PRIMARY_GROUP
PSID SeIUserSid
Definition: setypes.h:1231
LUID SeTimeZonePrivilege
Definition: setypes.h:1229
#define ANYSIZE_ARRAY
Definition: typedefs.h:46
* PSID_IDENTIFIER_AUTHORITY
Definition: setypes.h:464
$USHORT AceCount
Definition: setypes.h:53
struct _TOKEN_AUDIT_POLICY TOKEN_AUDIT_POLICY
ACCESS_MASK GenericRead
Definition: nt_native.h:565
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET _In_ PGENERIC_MAPPING _In_ KPROCESSOR_MODE _Out_ PACCESS_MASK _Out_ PNTSTATUS AccessStatus
Definition: sefuncs.h:13
_In_ USHORT _In_ ULONG _In_ PSOCKADDR _In_ PSOCKADDR _Reserved_ ULONG _In_opt_ PVOID _In_opt_ const WSK_CLIENT_CONNECTION_DISPATCH _In_opt_ PEPROCESS _In_opt_ PETHREAD _In_opt_ PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: wsk.h:182
struct _TOKEN_ACCESS_INFORMATION * PTOKEN_ACCESS_INFORMATION
struct _ACCESS_STATE * PACCESS_STATE
#define _WINNT_
struct _TOKEN_DEFAULT_DACL TOKEN_DEFAULT_DACL
LUID SeDebugPrivilege
Definition: setypes.h:1191
BOOLEAN PrivilegesAllocated
Definition: setypes.h:229
PSID SeAuthenticatedUsersSid
Definition: setypes.h:1215
enum _TOKEN_TYPE * PTOKEN_TYPE
LUID_AND_ATTRIBUTES_ARRAY * PLUID_AND_ATTRIBUTES_ARRAY
Definition: setypes.h:80
$ULONG GroupCount
Definition: setypes.h:1071
SE_ACCESS_REPLY
Definition: setypes.h:1108
LUID SeChangeNotifyPrivilege
Definition: setypes.h:1194
LUID SeLockMemoryPrivilege
Definition: setypes.h:1175
_SE_AUDIT_OPERATION
Definition: setypes.h:1110
#define SID_HASH_SIZE
Definition: setypes.h:513
$ULONG DynamicCharged
Definition: setypes.h:1069
char CHAR
Definition: xmlstorage.h:175
PVOID AuxData
Definition: setypes.h:236
ULONG Length
Definition: setypes.h:313
PLUID_AND_ATTRIBUTES Privileges
Definition: setypes.h:1026
struct _SYSTEM_ALARM_ACE SYSTEM_ALARM_ACE
_TOKEN_TYPE
Definition: imports.h:272
BYTE SECURITY_CONTEXT_TRACKING_MODE
Definition: lsa.idl:61
enum _SECURITY_IMPERSONATION_LEVEL * PSECURITY_IMPERSONATION_LEVEL
struct _SECURITY_CLIENT_CONTEXT SECURITY_CLIENT_CONTEXT
$ULONG SidStart
Definition: setypes.h:771
struct _LUID_AND_ATTRIBUTES LUID_AND_ATTRIBUTES
#define _NTIFS_
Definition: ifssupp.h:20
enum _TOKEN_INFORMATION_CLASS * PTOKEN_INFORMATION_CLASS
PSID SeAnonymousLogonSid
Definition: setypes.h:1217
PSID_AND_ATTRIBUTES_HASH RestrictedSidHash
Definition: setypes.h:1147
$if(_WDMDDK_||_WINNT_) typedef PVOID PSECURITY_DESCRIPTOR
Definition: extypes.h:1
struct _SE_ACCESS_REQUEST SE_ACCESS_REQUEST
struct _ACCESS_DENIED_ACE * PACCESS_DENIED_ACE
$USHORT Level
Definition: setypes.h:835
struct _SE_EXPORTS * PSE_EXPORTS
LUID AuthenticationId
Definition: imports.h:284
$ULONG PrivilegeCount
Definition: setypes.h:1001
IN PVOID IN PVOID IN USHORT IN USHORT Size
Definition: pci.h:361
PVOID PACCESS_TOKEN
Definition: setypes.h:11
#define _WDMDDK_
Definition: wdm.template.h:26
* LPSID_IDENTIFIER_AUTHORITY
Definition: setypes.h:464
_SE_ADT_PARAMETER_TYPE
Definition: setypes.h:271
PVOID HandleId
Definition: setypes.h:1134
struct _ACE_HEADER * PACE_HEADER
PSID SeAliasGuestsSid
Definition: setypes.h:1209
struct _TOKEN_LINKED_TOKEN * PTOKEN_LINKED_TOKEN
BOOLEAN GenerateAudit
Definition: setypes.h:227
$UCHAR SubAuthorityCount
Definition: setypes.h:471
struct _TOKEN_GROUPS * LPTOKEN_GROUPS
$ULONG Control
Definition: setypes.h:87
struct _ACE_HEADER ACE_HEADER
ULONG_PTR SID_HASH_ENTRY
Definition: setypes.h:514
struct _TOKEN_CONTROL TOKEN_CONTROL
VOID(NTAPI * PNTFS_DEREF_EXPORTED_SECURITY_DESCRIPTOR)(_In_ PVOID Vcb, _In_ PSECURITY_DESCRIPTOR SecurityDescriptor)
Definition: setypes.h:247
ACE_HEADER Header
Definition: ms-dtyp.idl:216
struct _SE_ADT_PARAMETER_ARRAY * PSE_ADT_PARAMETER_ARRAY
struct _TOKEN_USER TOKEN_USER
LUID SeCreateSymbolicLinkPrivilege
Definition: setypes.h:1230
enum _AUDIT_EVENT_TYPE * PAUDIT_EVENT_TYPE
LUID SeUnsolicitedInputPrivilege
Definition: setypes.h:1177
struct _TOKEN_LINKED_TOKEN TOKEN_LINKED_TOKEN
SECURITY_CONTEXT_TRACKING_MODE ContextTrackingMode
Definition: lsa.idl:66
* PSE_ACCESS_REPLY
Definition: setypes.h:1108
PSID SeAliasSystemOpsSid
Definition: setypes.h:1212
LUID SeSecurityPrivilege
Definition: setypes.h:1179
GUID * ObjectType
Definition: setypes.h:837
struct _ACCESS_STATE ACCESS_STATE
LUID OperationID
Definition: setypes.h:225
uint32_t ULONG_PTR
Definition: typedefs.h:65
$USHORT SECURITY_DESCRIPTOR_CONTROL
Definition: setypes.h:795
enum _SID_NAME_USE SID_NAME_USE
PSID_AND_ATTRIBUTES SidAttr
Definition: setypes.h:518
PSID SeBatchSid
Definition: setypes.h:1204
struct _TOKEN_GROUPS_AND_PRIVILEGES TOKEN_GROUPS_AND_PRIVILEGES
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: setypes.h:1151
LUID SourceIdentifier
Definition: imports.h:279
struct _ACCESS_REASONS * PACCESS_REASONS
$UCHAR Sbz1
Definition: setypes.h:51
enum _AUDIT_EVENT_TYPE AUDIT_EVENT_TYPE
struct _TOKEN_DEFAULT_DACL * PTOKEN_DEFAULT_DACL
NTSTATUS(* NTAPI)(IN PFILE_FULL_EA_INFORMATION EaBuffer, IN ULONG EaLength, OUT PULONG ErrorOffset)
Definition: IoEaTest.cpp:117
PSID SeNullSid
Definition: setypes.h:1196
struct _ACL * PACL
struct _SE_ADT_PARAMETER_ARRAY SE_ADT_PARAMETER_ARRAY
WORD SECURITY_DESCRIPTOR_CONTROL
Definition: lsa.idl:37
struct _SID_AND_ATTRIBUTES_HASH SID_AND_ATTRIBUTES_HASH
struct _TOKEN_ACCESS_INFORMATION TOKEN_ACCESS_INFORMATION
enum _SECURITY_IMPERSONATION_LEVEL SECURITY_IMPERSONATION_LEVEL
ACCESS_MASK GenericExecute
Definition: nt_native.h:567
ACCESS_MASK DesiredAccess
Definition: setypes.h:895
LUID SeLoadDriverPrivilege
Definition: setypes.h:1181
struct _SID * PISID
_ACCESS_REASON_TYPE
Definition: setypes.h:860
LUID SeUndockPrivilege
Definition: setypes.h:1218
struct _TOKEN_GROUPS_AND_PRIVILEGES * PTOKEN_GROUPS_AND_PRIVILEGES
_SID_NAME_USE
Definition: lsa.idl:117
struct _TOKEN_ORIGIN * PTOKEN_ORIGIN
SID_AND_ATTRIBUTES Label
Definition: setypes.h:1039
ACCESS_MASK GenericWrite
Definition: nt_native.h:566
PTOKEN_PRIVILEGES Privileges
Definition: setypes.h:1148
struct _SECURITY_DESCRIPTOR_RELATIVE * PISECURITY_DESCRIPTOR_RELATIVE
struct _TOKEN_ELEVATION * PTOKEN_ELEVATION
LUID * OperationId
Definition: setypes.h:1136
_TOKEN_INFORMATION_CLASS
Definition: setypes.h:943
enum _MANDATORY_LEVEL * PMANDATORY_LEVEL
unsigned char BOOLEAN
PSID SeNetworkServiceSid
Definition: setypes.h:1222
struct _TOKEN_PRIVILEGES TOKEN_PRIVILEGES
struct _TOKEN_MANDATORY_POLICY TOKEN_MANDATORY_POLICY
PSID SeHighMandatorySid
Definition: setypes.h:1235
$UCHAR AclRevision
Definition: setypes.h:50
#define _In_
Definition: ms_sal.h:308
PSID Owner
Definition: setypes.h:1006
PSID SeAliasPowerUsersSid
Definition: setypes.h:1210
LUID SeSystemEnvironmentPrivilege
Definition: setypes.h:1193
PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: setypes.h:889
LUID SeProfileSingleProcessPrivilege
Definition: setypes.h:1186
struct _SYSTEM_AUDIT_ACE * PSYSTEM_AUDIT_ACE
PSID SeDialupSid
Definition: setypes.h:1202
UNICODE_STRING ObjectTypeName
Definition: setypes.h:1132
SE_ADT_PARAMETER_TYPE Type
Definition: setypes.h:312
TOKEN_TYPE TokenType
Definition: setypes.h:1067
struct _TOKEN_SOURCE * PTOKEN_SOURCE
LUID ModifiedId
Definition: imports.h:285
struct _TOKEN_GROUPS * PTOKEN_GROUPS
#define TOKEN_SOURCE_LENGTH
Definition: setypes.h:1055
struct _SE_EXPORTS SE_EXPORTS
PRIVILEGE_SET PrivilegeSet
Definition: setypes.h:239
$ULONG PrivilegeCount
Definition: setypes.h:86
struct _SE_IMPERSONATION_STATE * PSE_IMPERSONATION_STATE
BOOLEAN DirectAccessEffectiveOnly
Definition: imports.h:293
LUID OriginatingLogonSession
Definition: setypes.h:1085
_Must_inspect_result_ _In_ WDFKEY _In_ PCUNICODE_STRING _Out_opt_ PUSHORT _Inout_opt_ PUNICODE_STRING Value
Definition: wdfregistry.h:406
PSID SeNetworkSid
Definition: setypes.h:1203
SE_AUDIT_OPERATION AuditOperation
Definition: setypes.h:1129
struct _TOKEN_MANDATORY_POLICY * PTOKEN_MANDATORY_POLICY
GUID * TransactionId
Definition: setypes.h:1135
struct _SID_AND_ATTRIBUTES * PSID_AND_ATTRIBUTES
Definition: security.c:129
PSID SeAliasAccountOpsSid
Definition: setypes.h:1211
LARGE_INTEGER ExpirationTime
Definition: setypes.h:1066
LUID SeTcbPrivilege
Definition: setypes.h:1178
SID_AND_ATTRIBUTES_ARRAY * PSID_AND_ATTRIBUTES_ARRAY
Definition: setypes.h:511
PACCESS_TOKEN PrimaryToken
Definition: setypes.h:220
struct _TOKEN_MANDATORY_LABEL * PTOKEN_MANDATORY_LABEL
ACCESS_MASK RemainingDesiredAccess
Definition: setypes.h:231
enum _TOKEN_TYPE TOKEN_TYPE
BOOLEAN AuditPrivileges
Definition: setypes.h:241
struct _SE_ADT_ACCESS_REASON * PSE_ADT_ACCESS_REASON
LUID SeImpersonatePrivilege
Definition: setypes.h:1224
LUID SeTrustedCredManAccessPrivilege
Definition: setypes.h:1226
PGENERIC_MAPPING GenericMapping
Definition: setypes.h:898
struct _SYSTEM_MANDATORY_LABEL_ACE SYSTEM_MANDATORY_LABEL_ACE
PSID SeMediumMandatorySid
Definition: setypes.h:1234
ACCESS_MASK PreviouslyGrantedAccess
Definition: setypes.h:232
LUID SeRemoteShutdownPrivilege
Definition: setypes.h:1195
INITIAL_PRIVILEGE_SET InitialPrivilegeSet
Definition: setypes.h:238
struct _GENERIC_MAPPING * PGENERIC_MAPPING
struct _TOKEN_OWNER TOKEN_OWNER
PSE_SECURITY_DESCRIPTOR SeSecurityDescriptor
Definition: setypes.h:894
struct _SECURITY_QUALITY_OF_SERVICE SECURITY_QUALITY_OF_SERVICE
struct _SID_AND_ATTRIBUTES SID_AND_ATTRIBUTES
NTSTATUS(NTAPI * PSE_LOGON_SESSION_TERMINATED_ROUTINE)(IN PLUID LogonId)
Definition: setypes.h:1241
struct _SID_AND_ATTRIBUTES_HASH * PSID_AND_ATTRIBUTES_HASH
#define Vcb
Definition: cdprocs.h:1415
* PSECURITY_OPERATION_CODE
Definition: setypes.h:170
BOOLEAN GenerateOnClose
Definition: setypes.h:228
LUID SeCreatePermanentPrivilege
Definition: setypes.h:1187
Definition: setypes.h:311
struct _ACCESS_REASONS ACCESS_REASONS
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: setypes.h:1068
SECURITY_QUALITY_OF_SERVICE SecurityQos
Definition: imports.h:290
UNICODE_STRING SubsystemName
Definition: setypes.h:1131
UNICODE_STRING ObjectTypeName
Definition: setypes.h:243
enum _TOKEN_INFORMATION_CLASS TOKEN_INFORMATION_CLASS
ACCESS_MASK Mask
Definition: ms-dtyp.idl:232
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET * Privileges
Definition: sefuncs.h:13
struct _SECURITY_DESCRIPTOR SECURITY_DESCRIPTOR
struct _ACCESS_ALLOWED_ACE ACCESS_ALLOWED_ACE
SID_IDENTIFIER_AUTHORITY
Definition: setypes.h:464
LUID SeRelabelPrivilege
Definition: setypes.h:1227
struct _SID SID
BOOLEAN GenerateOnClose
Definition: setypes.h:1138
$USHORT Sbz2
Definition: setypes.h:54
$USHORT AclSize
Definition: setypes.h:52
_AUDIT_EVENT_TYPE
Definition: setypes.h:845
struct _TOKEN_OWNER * PTOKEN_OWNER
struct _TOKEN_PRIVILEGES * PTOKEN_PRIVILEGES
PSID PrincipalSelfSid
Definition: setypes.h:897
struct _SE_SECURITY_DESCRIPTOR * PSE_SECURITY_DESCRIPTOR
struct _TOKEN_STATISTICS * PTOKEN_STATISTICS
struct _ACL ACL
struct _SE_ADT_PARAMETER_ARRAY_ENTRY * PSE_ADT_PARAMETER_ARRAY_ENTRY
$ULONG ObjectTypeListCount
Definition: setypes.h:899
PSID SeLocalServiceSid
Definition: setypes.h:1221
#define NTSTATUS
Definition: precomp.h:20
#define VOID
Definition: acefi.h:82
struct _INITIAL_PRIVILEGE_SET INITIAL_PRIVILEGE_SET
ACCESS_MASK OriginalDesiredAccess
Definition: setypes.h:233
SECURITY_SUBJECT_CONTEXT SubjectSecurityContext
Definition: setypes.h:234
SECURITY_DESCRIPTOR_CONTROL Control
Definition: setypes.h:827
struct _OBJECT_TYPE_LIST * POBJECT_TYPE_LIST
POBJECT_TYPE_LIST ObjectTypeList
Definition: setypes.h:900
TOKEN_MANDATORY_POLICY MandatoryPolicy
Definition: setypes.h:1152
struct _SECURITY_DESCRIPTOR_RELATIVE SECURITY_DESCRIPTOR_RELATIVE
$ULONG SidStart
Definition: setypes.h:777
PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: setypes.h:323
struct _TOKEN_CONTROL * PTOKEN_CONTROL
DWORD SubAuthority[*]
Definition: ms-dtyp.idl:202
struct _SE_ADT_PARAMETER_ARRAY_ENTRY SE_ADT_PARAMETER_ARRAY_ENTRY
ACCESS_MASK AccessMask
Definition: setypes.h:319
$ULONG ACCESS_REASON
Definition: setypes.h:876
enum _TOKEN_TYPE TOKEN_TYPE
struct _ACCESS_ALLOWED_ACE * PACCESS_ALLOWED_ACE
struct _TOKEN_GROUPS TOKEN_GROUPS
CCHAR SourceName[TOKEN_SOURCE_LENGTH]
Definition: imports.h:278
enum _SE_ADT_PARAMETER_TYPE * PSE_ADT_PARAMETER_TYPE
SID_HASH_ENTRY Hash[SID_HASH_SIZE]
Definition: setypes.h:519
BOOLEAN SECURITY_CONTEXT_TRACKING_MODE
Definition: setypes.h:106
enum _SECURITY_IMPERSONATION_LEVEL SECURITY_IMPERSONATION_LEVEL
AUDIT_EVENT_TYPE AuditType
Definition: setypes.h:1128
LUID SeCreateGlobalPrivilege
Definition: setypes.h:1225
LUID_AND_ATTRIBUTES Privilege[INITIAL_PRIVILEGE_COUNT]
Definition: setypes.h:177
LUID SeBackupPrivilege
Definition: setypes.h:1188
PSID SeOwnerRightsSid
Definition: setypes.h:1237
LUID SeIncreaseBasePriorityPrivilege
Definition: setypes.h:1183
PSID SeAliasUsersSid
Definition: setypes.h:1208
$endif(_WDMDDK_||_WINNT_) $if(_WINNT_) $endif(_WINNT_) $if(_WDMDDK_) typedef enum _SECURITY_OPERATION_CODE
Definition: setypes.h:149
enum _MANDATORY_LEVEL MANDATORY_LEVEL
LUID SeSystemtimePrivilege
Definition: setypes.h:1185
$ULONG PrivilegeCount
Definition: setypes.h:1072
struct _SE_ADT_OBJECT_TYPE * PSE_ADT_OBJECT_TYPE
WELL_KNOWN_SID_TYPE
Definition: setypes.h:455
ACCESS_MASK Mask
Definition: ms-dtyp.idl:217
$UCHAR PerUserPolicy[((POLICY_AUDIT_SUBCATEGORY_COUNT) >> 1)+1]
Definition: setypes.h:1052
SECURITY_DESCRIPTOR_CONTROL Control
Definition: setypes.h:817
unsigned short USHORT
Definition: pedump.c:61
PSID SeCreatorOwnerSid
Definition: setypes.h:1199
UNICODE_STRING ObjectName
Definition: setypes.h:1133
LUID SeSyncAgentPrivilege
Definition: setypes.h:1219
struct _PRIVILEGE_SET * PPRIVILEGE_SET
SID_AND_ATTRIBUTES Groups[ANYSIZE_ARRAY]
Definition: setypes.h:996
TOKEN_SOURCE TokenSource
Definition: imports.h:286
#define POLICY_AUDIT_SUBCATEGORY_COUNT
Definition: setypes.h:1049
struct _SECURITY_QUALITY_OF_SERVICE * PSECURITY_QUALITY_OF_SERVICE
struct _ACCESS_DENIED_ACE ACCESS_DENIED_ACE
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: lsa.idl:65
BYTE SubAuthorityCount
Definition: ms-dtyp.idl:200
ULONG AccessReasons[32]
Definition: setypes.h:320
$ULONG * PACCESS_MASK
Definition: setypes.h:9
enum _SE_AUDIT_OPERATION * PSE_AUDIT_OPERATION
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE _In_ ULONG _In_ ULONG _In_opt_ PTOKEN_GROUPS _In_ PTOKEN_SOURCE _Out_ PVOID _Out_ PULONG _Inout_ PLUID LogonId
#define INITIAL_PRIVILEGE_COUNT
Definition: setypes.h:172
ACCESS_MASK Mask
Definition: ms-dtyp.idl:268
ACE_HEADER Header
Definition: ms-dtyp.idl:267
ACCESS_MASK PreviouslyGrantedAccess
Definition: setypes.h:896
LUID_AND_ATTRIBUTES Privileges[ANYSIZE_ARRAY]
Definition: setypes.h:1002
ACCESS_MASK Mask
Definition: setypes.h:776
PSID SeUntrustedMandatorySid
Definition: setypes.h:1232
$UCHAR AceType
Definition: setypes.h:711
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: setypes.h:219
_MANDATORY_LEVEL
Definition: setypes.h:1088
PSID SeNtAuthoritySid
Definition: setypes.h:1201
TOKEN_CONTROL ClientTokenControl
Definition: imports.h:295
LUID SeAuditPrivilege
Definition: setypes.h:1192
PVOID PSID
Definition: setypes.h:12
$ULONG GroupCount
Definition: setypes.h:992
PSID SeRestrictedSid
Definition: setypes.h:1216
LUID_AND_ATTRIBUTES Privilege[ANYSIZE_ARRAY]
Definition: setypes.h:88
ULONG Flags
Definition: setypes.h:230
enum _SE_AUDIT_OPERATION SE_AUDIT_OPERATION
struct _SYSTEM_ALARM_ACE * PSYSTEM_ALARM_ACE
BOOLEAN * PSECURITY_CONTEXT_TRACKING_MODE
Definition: setypes.h:106
$ULONG ACCESS_MASK
Definition: setypes.h:9
LUID SeIncreaseWorkingSetPrivilege
Definition: setypes.h:1228
unsigned int ULONG
Definition: retypes.h:1
ACCESS_MASK * PACCESS_MASK
Definition: nt_native.h:41
LUID TokenId
Definition: imports.h:283
struct _SE_AUDIT_INFO * PSE_AUDIT_INFO
PSID_AND_ATTRIBUTES Sids
Definition: setypes.h:1020
struct _TOKEN_USER * PTOKEN_USER
SID_AND_ATTRIBUTES User
Definition: setypes.h:988
ACCESS_MASK AccessMask
Definition: setypes.h:308
PSID SeLowMandatorySid
Definition: setypes.h:1233
struct _SYSTEM_AUDIT_ACE SYSTEM_AUDIT_ACE
LUID SeIncreaseQuotaPrivilege
Definition: setypes.h:1176
ULONG_PTR * PSID_HASH_ENTRY
Definition: setypes.h:514
SID_IDENTIFIER_AUTHORITY IdentifierAuthority
Definition: ms-dtyp.idl:201
LUID SeTakeOwnershipPrivilege
Definition: setypes.h:1180
LUID SeAssignPrimaryTokenPrivilege
Definition: setypes.h:1174
PSID SeWorldSid
Definition: setypes.h:1197
LUID SeRestorePrivilege
Definition: setypes.h:1189
PSID_AND_ATTRIBUTES RestrictedSids
Definition: setypes.h:1023
$USHORT AceSize
Definition: setypes.h:713
ACCESS_MASK GenericAll
Definition: nt_native.h:568
struct _SE_ADT_OBJECT_TYPE SE_ADT_OBJECT_TYPE
PSID SeLocalSid
Definition: setypes.h:1198
struct _TOKEN_ELEVATION TOKEN_ELEVATION
$ULONG DynamicAvailable
Definition: setypes.h:1070
$UCHAR Revision
Definition: setypes.h:470
BOOLEAN DirectlyAccessClientToken
Definition: imports.h:292
struct _TOKEN_STATISTICS TOKEN_STATISTICS
struct _SECURITY_SUBJECT_CONTEXT * PSECURITY_SUBJECT_CONTEXT
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET _In_ PGENERIC_MAPPING _In_ KPROCESSOR_MODE _Out_ PACCESS_MASK GrantedAccess
Definition: sefuncs.h:13
ACE_HEADER Header
Definition: ms-dtyp.idl:231
struct _TOKEN_SOURCE TOKEN_SOURCE
PVOID Address
Definition: setypes.h:315
struct _SE_AUDIT_INFO SE_AUDIT_INFO
PACCESS_TOKEN ClientToken
Definition: setypes.h:218
PSID SeCreatorGroupSid
Definition: setypes.h:1200
PACCESS_TOKEN Token
Definition: setypes.h:116
LUID SeSystemProfilePrivilege
Definition: setypes.h:1184
struct _SECURITY_CLIENT_CONTEXT * PSECURITY_CLIENT_CONTEXT
LUID SeCreatePagefilePrivilege
Definition: setypes.h:1182
SECURITY_OPERATION_CODE
Definition: setypes.h:170
ULONG ACCESS_MASK
Definition: nt_native.h:40
#define _NTDDK_
struct _TOKEN_PRIMARY_GROUP TOKEN_PRIMARY_GROUP
BOOLEAN SecurityEvaluated
Definition: setypes.h:226
SECURITY_IMPERSONATION_LEVEL Level
Definition: setypes.h:119
$ULONG TokenIsElevated
Definition: setypes.h:1035
PACCESS_TOKEN ClientToken
Definition: imports.h:291
struct _TOKEN_PRIVILEGES * LPTOKEN_PRIVILEGES
PSID SeAliasPrintOpsSid
Definition: setypes.h:1213
$UCHAR AceFlags
Definition: setypes.h:712
BOOLEAN ObjectCreation
Definition: setypes.h:1137
PSID SeLocalSystemSid
Definition: setypes.h:1206
struct _TOKEN_ORIGIN TOKEN_ORIGIN
struct _SECURITY_DESCRIPTOR * PISECURITY_DESCRIPTOR
LUID_AND_ATTRIBUTES LUID_AND_ATTRIBUTES_ARRAY[ANYSIZE_ARRAY]
Definition: setypes.h:79
struct _SE_SECURITY_DESCRIPTOR SE_SECURITY_DESCRIPTOR
enum _ACCESS_REASON_TYPE ACCESS_REASON_TYPE
$USHORT * PSECURITY_DESCRIPTOR_CONTROL
Definition: setypes.h:795
struct _GENERIC_MAPPING GENERIC_MAPPING
SID_AND_ATTRIBUTES SID_AND_ATTRIBUTES_ARRAY[ANYSIZE_ARRAY]
Definition: setypes.h:510
PSID SeInteractiveSid
Definition: setypes.h:1205
LUID SeCreateTokenPrivilege
Definition: setypes.h:1173
ULONG AuditFlags
Definition: setypes.h:1130