ReactOS  0.4.15-dev-3287-gfec35dc
setypes.h
Go to the documentation of this file.
1 /******************************************************************************
2  * Security Manager Types *
3  ******************************************************************************/
5 
6 /* Simple types */
9 typedef $ULONG ACCESS_MASK, *PACCESS_MASK;
10 
12 typedef PVOID PSID;
13 
14 #define DELETE 0x00010000L
15 #define READ_CONTROL 0x00020000L
16 #define WRITE_DAC 0x00040000L
17 #define WRITE_OWNER 0x00080000L
18 #define SYNCHRONIZE 0x00100000L
19 #define STANDARD_RIGHTS_REQUIRED 0x000F0000L
20 #define STANDARD_RIGHTS_READ READ_CONTROL
21 #define STANDARD_RIGHTS_WRITE READ_CONTROL
22 #define STANDARD_RIGHTS_EXECUTE READ_CONTROL
23 #define STANDARD_RIGHTS_ALL 0x001F0000L
24 #define SPECIFIC_RIGHTS_ALL 0x0000FFFFL
25 #define ACCESS_SYSTEM_SECURITY 0x01000000L
26 #define MAXIMUM_ALLOWED 0x02000000L
27 #define GENERIC_READ 0x80000000L
28 #define GENERIC_WRITE 0x40000000L
29 #define GENERIC_EXECUTE 0x20000000L
30 #define GENERIC_ALL 0x10000000L
31 
32 typedef struct _GENERIC_MAPPING {
38 
39 #define ACL_REVISION 2
40 #define ACL_REVISION_DS 4
41 
42 #define ACL_REVISION1 1
43 #define ACL_REVISION2 2
44 #define ACL_REVISION3 3
45 #define ACL_REVISION4 4
46 #define MIN_ACL_REVISION ACL_REVISION2
47 #define MAX_ACL_REVISION ACL_REVISION4
48 
49 typedef struct _ACL {
50  $UCHAR AclRevision;
51  $UCHAR Sbz1;
52  $USHORT AclSize;
53  $USHORT AceCount;
54  $USHORT Sbz2;
55 } ACL, *PACL;
56 
57 /* Current security descriptor revision value */
58 #define SECURITY_DESCRIPTOR_REVISION (1)
59 #define SECURITY_DESCRIPTOR_REVISION1 (1)
60 
61 /* Privilege attributes */
62 #define SE_PRIVILEGE_ENABLED_BY_DEFAULT (0x00000001L)
63 #define SE_PRIVILEGE_ENABLED (0x00000002L)
64 #define SE_PRIVILEGE_REMOVED (0x00000004L)
65 #define SE_PRIVILEGE_USED_FOR_ACCESS (0x80000000L)
66 
67 #define SE_PRIVILEGE_VALID_ATTRIBUTES (SE_PRIVILEGE_ENABLED_BY_DEFAULT | \
68  SE_PRIVILEGE_ENABLED | \
69  SE_PRIVILEGE_REMOVED | \
70  SE_PRIVILEGE_USED_FOR_ACCESS)
71 
72 #include <pshpack4.h>
73 typedef struct _LUID_AND_ATTRIBUTES {
75  $ULONG Attributes;
77 #include <poppack.h>
78 
81 
82 /* Privilege sets */
83 #define PRIVILEGE_SET_ALL_NECESSARY (1)
84 
85 typedef struct _PRIVILEGE_SET {
87  $ULONG Control;
90 
97 
98 #define SECURITY_MAX_IMPERSONATION_LEVEL SecurityDelegation
99 #define SECURITY_MIN_IMPERSONATION_LEVEL SecurityAnonymous
100 #define DEFAULT_IMPERSONATION_LEVEL SecurityImpersonation
101 #define VALID_IMPERSONATION_LEVEL(Level) (((Level) >= SECURITY_MIN_IMPERSONATION_LEVEL) && ((Level) <= SECURITY_MAX_IMPERSONATION_LEVEL))
102 
103 #define SECURITY_DYNAMIC_TRACKING (TRUE)
104 #define SECURITY_STATIC_TRACKING (FALSE)
105 
107 
108 typedef struct _SECURITY_QUALITY_OF_SERVICE {
109  $ULONG Length;
114 
115 typedef struct _SE_IMPERSONATION_STATE {
121 
122 
123 #define OWNER_SECURITY_INFORMATION (0x00000001L)
124 #define GROUP_SECURITY_INFORMATION (0x00000002L)
125 #define DACL_SECURITY_INFORMATION (0x00000004L)
126 #define SACL_SECURITY_INFORMATION (0x00000008L)
127 #define LABEL_SECURITY_INFORMATION (0x00000010L)
128 
129 #define PROTECTED_DACL_SECURITY_INFORMATION (0x80000000L)
130 #define PROTECTED_SACL_SECURITY_INFORMATION (0x40000000L)
131 #define UNPROTECTED_DACL_SECURITY_INFORMATION (0x20000000L)
132 #define UNPROTECTED_SACL_SECURITY_INFORMATION (0x10000000L)
133 
134 /* Auto inherit ACE flags */
135 #define SEF_DACL_AUTO_INHERIT 0x01
136 #define SEF_SACL_AUTO_INHERIT 0x02
137 #define SEF_DEFAULT_DESCRIPTOR_FOR_OBJECT 0x04
138 #define SEF_AVOID_PRIVILEGE_CHECK 0x08
139 #define SEF_AVOID_OWNER_CHECK 0x10
140 #define SEF_DEFAULT_OWNER_FROM_PARENT 0x20
141 #define SEF_DEFAULT_GROUP_FROM_PARENT 0x40
142 #define SEF_MACL_NO_WRITE_UP 0x100
143 #define SEF_MACL_NO_READ_UP 0x200
144 #define SEF_MACL_NO_EXECUTE_UP 0x400
145 #define SEF_AI_USE_EXTRA_PARAMS 0x800
146 #define SEF_AVOID_OWNER_RESTRICTION 0x1000
147 #define SEF_MACL_VALID_FLAGS (SEF_MACL_NO_WRITE_UP | SEF_MACL_NO_READ_UP | SEF_MACL_NO_EXECUTE_UP)
148 
150 $if (_WDMDDK_)
151 
152 typedef enum _SECURITY_OPERATION_CODE {
153  SetSecurityDescriptor,
154  QuerySecurityDescriptor,
155  DeleteSecurityDescriptor,
156  AssignSecurityDescriptor
158 
159 #define INITIAL_PRIVILEGE_COUNT 3
160 
161 typedef struct _INITIAL_PRIVILEGE_SET {
166 
167 #define SE_MIN_WELL_KNOWN_PRIVILEGE 2
168 #define SE_CREATE_TOKEN_PRIVILEGE 2
169 #define SE_ASSIGNPRIMARYTOKEN_PRIVILEGE 3
170 #define SE_LOCK_MEMORY_PRIVILEGE 4
171 #define SE_INCREASE_QUOTA_PRIVILEGE 5
172 #define SE_MACHINE_ACCOUNT_PRIVILEGE 6
173 #define SE_TCB_PRIVILEGE 7
174 #define SE_SECURITY_PRIVILEGE 8
175 #define SE_TAKE_OWNERSHIP_PRIVILEGE 9
176 #define SE_LOAD_DRIVER_PRIVILEGE 10
177 #define SE_SYSTEM_PROFILE_PRIVILEGE 11
178 #define SE_SYSTEMTIME_PRIVILEGE 12
179 #define SE_PROF_SINGLE_PROCESS_PRIVILEGE 13
180 #define SE_INC_BASE_PRIORITY_PRIVILEGE 14
181 #define SE_CREATE_PAGEFILE_PRIVILEGE 15
182 #define SE_CREATE_PERMANENT_PRIVILEGE 16
183 #define SE_BACKUP_PRIVILEGE 17
184 #define SE_RESTORE_PRIVILEGE 18
185 #define SE_SHUTDOWN_PRIVILEGE 19
186 #define SE_DEBUG_PRIVILEGE 20
187 #define SE_AUDIT_PRIVILEGE 21
188 #define SE_SYSTEM_ENVIRONMENT_PRIVILEGE 22
189 #define SE_CHANGE_NOTIFY_PRIVILEGE 23
190 #define SE_REMOTE_SHUTDOWN_PRIVILEGE 24
191 #define SE_UNDOCK_PRIVILEGE 25
192 #define SE_SYNC_AGENT_PRIVILEGE 26
193 #define SE_ENABLE_DELEGATION_PRIVILEGE 27
194 #define SE_MANAGE_VOLUME_PRIVILEGE 28
195 #define SE_IMPERSONATE_PRIVILEGE 29
196 #define SE_CREATE_GLOBAL_PRIVILEGE 30
197 #define SE_TRUSTED_CREDMAN_ACCESS_PRIVILEGE 31
198 #define SE_RELABEL_PRIVILEGE 32
199 #define SE_INC_WORKING_SET_PRIVILEGE 33
200 #define SE_TIME_ZONE_PRIVILEGE 34
201 #define SE_CREATE_SYMBOLIC_LINK_PRIVILEGE 35
202 #define SE_MAX_WELL_KNOWN_PRIVILEGE SE_CREATE_SYMBOLIC_LINK_PRIVILEGE
203 
210 
211 typedef struct _ACCESS_STATE {
224  union {
227  } Privileges;
232 
233 typedef VOID
235  _In_ PVOID Vcb,
237 
238 #ifndef _NTLSA_IFS_
239 
240 #ifndef _NTLSA_AUDIT_
241 #define _NTLSA_AUDIT_
242 
243 #define SE_MAX_AUDIT_PARAMETERS 32
244 #define SE_MAX_GENERIC_AUDIT_PARAMETERS 28
245 
246 #define SE_ADT_OBJECT_ONLY 0x1
247 
248 #define SE_ADT_PARAMETERS_SELF_RELATIVE 0x00000001
249 #define SE_ADT_PARAMETERS_SEND_TO_LSA 0x00000002
250 #define SE_ADT_PARAMETER_EXTENSIBLE_AUDIT 0x00000004
251 #define SE_ADT_PARAMETER_GENERIC_AUDIT 0x00000008
252 #define SE_ADT_PARAMETER_WRITE_SYNCHRONOUS 0x00000010
253 
254 #define LSAP_SE_ADT_PARAMETER_ARRAY_TRUE_SIZE(Parameters) \
255  ( sizeof(SE_ADT_PARAMETER_ARRAY) - sizeof(SE_ADT_PARAMETER_ARRAY_ENTRY) * \
256  (SE_MAX_AUDIT_PARAMETERS - Parameters->ParameterCount) )
257 
290 
291 typedef struct _SE_ADT_OBJECT_TYPE {
297 
304 
305 typedef struct _SE_ADT_ACCESS_REASON {
312 
313 typedef struct _SE_ADT_PARAMETER_ARRAY {
323 
324 #endif /* !_NTLSA_AUDIT_ */
325 #endif /* !_NTLSA_IFS_ */
327 $if (_NTDDK_)
328 #define SE_UNSOLICITED_INPUT_PRIVILEGE 6
329 
330 $endif (_NTDDK_)
331 $if (_NTDDK_ || _WINNT_)
332 
333 typedef enum _WELL_KNOWN_SID_TYPE {
334  WinNullSid = 0,
335  WinWorldSid = 1,
336  WinLocalSid = 2,
337  WinCreatorOwnerSid = 3,
338  WinCreatorGroupSid = 4,
339  WinCreatorOwnerServerSid = 5,
340  WinCreatorGroupServerSid = 6,
341  WinNtAuthoritySid = 7,
342  WinDialupSid = 8,
343  WinNetworkSid = 9,
344  WinBatchSid = 10,
345  WinInteractiveSid = 11,
346  WinServiceSid = 12,
347  WinAnonymousSid = 13,
348  WinProxySid = 14,
349  WinEnterpriseControllersSid = 15,
350  WinSelfSid = 16,
351  WinAuthenticatedUserSid = 17,
352  WinRestrictedCodeSid = 18,
353  WinTerminalServerSid = 19,
354  WinRemoteLogonIdSid = 20,
355  WinLogonIdsSid = 21,
356  WinLocalSystemSid = 22,
357  WinLocalServiceSid = 23,
358  WinNetworkServiceSid = 24,
359  WinBuiltinDomainSid = 25,
360  WinBuiltinAdministratorsSid = 26,
361  WinBuiltinUsersSid = 27,
362  WinBuiltinGuestsSid = 28,
363  WinBuiltinPowerUsersSid = 29,
364  WinBuiltinAccountOperatorsSid = 30,
365  WinBuiltinSystemOperatorsSid = 31,
366  WinBuiltinPrintOperatorsSid = 32,
367  WinBuiltinBackupOperatorsSid = 33,
368  WinBuiltinReplicatorSid = 34,
369  WinBuiltinPreWindows2000CompatibleAccessSid = 35,
370  WinBuiltinRemoteDesktopUsersSid = 36,
371  WinBuiltinNetworkConfigurationOperatorsSid = 37,
372  WinAccountAdministratorSid = 38,
373  WinAccountGuestSid = 39,
374  WinAccountKrbtgtSid = 40,
375  WinAccountDomainAdminsSid = 41,
376  WinAccountDomainUsersSid = 42,
377  WinAccountDomainGuestsSid = 43,
378  WinAccountComputersSid = 44,
379  WinAccountControllersSid = 45,
380  WinAccountCertAdminsSid = 46,
381  WinAccountSchemaAdminsSid = 47,
382  WinAccountEnterpriseAdminsSid = 48,
383  WinAccountPolicyAdminsSid = 49,
384  WinAccountRasAndIasServersSid = 50,
385  WinNTLMAuthenticationSid = 51,
386  WinDigestAuthenticationSid = 52,
387  WinSChannelAuthenticationSid = 53,
388  WinThisOrganizationSid = 54,
389  WinOtherOrganizationSid = 55,
390  WinBuiltinIncomingForestTrustBuildersSid = 56,
391  WinBuiltinPerfMonitoringUsersSid = 57,
392  WinBuiltinPerfLoggingUsersSid = 58,
393  WinBuiltinAuthorizationAccessSid = 59,
394  WinBuiltinTerminalServerLicenseServersSid = 60,
395  WinBuiltinDCOMUsersSid = 61,
396  WinBuiltinIUsersSid = 62,
397  WinIUserSid = 63,
398  WinBuiltinCryptoOperatorsSid = 64,
399  WinUntrustedLabelSid = 65,
400  WinLowLabelSid = 66,
401  WinMediumLabelSid = 67,
402  WinHighLabelSid = 68,
403  WinSystemLabelSid = 69,
404  WinWriteRestrictedCodeSid = 70,
405  WinCreatorOwnerRightsSid = 71,
406  WinCacheablePrincipalsGroupSid = 72,
407  WinNonCacheablePrincipalsGroupSid = 73,
408  WinEnterpriseReadonlyControllersSid = 74,
409  WinAccountReadonlyControllersSid = 75,
410  WinBuiltinEventLogReadersGroup = 76,
411  WinNewEnterpriseReadonlyControllersSid = 77,
412  WinBuiltinCertSvcDComAccessGroup = 78,
413  WinMediumPlusLabelSid = 79,
414  WinLocalLogonSid = 80,
415  WinConsoleLogonSid = 81,
416  WinThisOrganizationCertificateSid = 82,
417  WinApplicationPackageAuthoritySid = 83,
418  WinBuiltinAnyPackageSid = 84,
419  WinCapabilityInternetClientSid = 85,
420  WinCapabilityInternetClientServerSid = 86,
421  WinCapabilityPrivateNetworkClientServerSid = 87,
422  WinCapabilityPicturesLibrarySid = 88,
423  WinCapabilityVideosLibrarySid = 89,
424  WinCapabilityMusicLibrarySid = 90,
425  WinCapabilityDocumentsLibrarySid = 91,
426  WinCapabilitySharedUserCertificatesSid = 92,
427  WinCapabilityEnterpriseAuthenticationSid = 93,
428  WinCapabilityRemovableStorageSid = 94,
429  WinBuiltinRDSRemoteAccessServersSid = 95,
430  WinBuiltinRDSEndpointServersSid = 96,
431  WinBuiltinRDSManagementServersSid = 97,
432  WinUserModeDriversSid = 98,
433  WinBuiltinHyperVAdminsSid = 99,
434  WinAccountCloneableControllersSid = 100,
435  WinBuiltinAccessControlAssistanceOperatorsSid = 101,
436  WinBuiltinRemoteManagementUsersSid = 102,
437  WinAuthenticationAuthorityAssertedSid = 103,
438  WinAuthenticationServiceAssertedSid = 104,
439  WinLocalAccountSid = 105,
440  WinLocalAccountAndAdministratorSid = 106,
441  WinAccountProtectedUsersSid = 107,
443 
445 $if (_NTIFS_ || _WINNT_)
446 
447 #ifndef SID_IDENTIFIER_AUTHORITY_DEFINED
448 #define SID_IDENTIFIER_AUTHORITY_DEFINED
449 typedef struct _SID_IDENTIFIER_AUTHORITY {
450  $UCHAR Value[6];
452 #endif
453 
454 #ifndef SID_DEFINED
455 #define SID_DEFINED
456 typedef struct _SID {
457  $UCHAR Revision;
460 #ifdef MIDL_PASS
461  [size_is(SubAuthorityCount)] $ULONG SubAuthority[*];
462 #else
464 #endif
465 } SID, *PISID;
466 #endif
467 
468 #define SID_REVISION 1
469 #define SID_MAX_SUB_AUTHORITIES 15
470 #define SID_RECOMMENDED_SUB_AUTHORITIES 1
471 
472 #ifndef MIDL_PASS
473 #define SECURITY_MAX_SID_SIZE (sizeof(SID) - sizeof($ULONG) + (SID_MAX_SUB_AUTHORITIES * sizeof($ULONG)))
474 #endif
475 
476 typedef enum _SID_NAME_USE {
488 
489 typedef struct _SID_AND_ATTRIBUTES {
490 #ifdef MIDL_PASS
491  PISID Sid;
492 #else
494 #endif
495  $ULONG Attributes;
499 
500 #define SID_HASH_SIZE 32
502 
503 typedef struct _SID_AND_ATTRIBUTES_HASH {
504  $ULONG SidCount;
508 
509 /* Universal well-known SIDs */
510 
511 #define SECURITY_NULL_SID_AUTHORITY {0,0,0,0,0,0}
512 
513 /* S-1-1 */
514 #define SECURITY_WORLD_SID_AUTHORITY {0,0,0,0,0,1}
515 
516 /* S-1-2 */
517 #define SECURITY_LOCAL_SID_AUTHORITY {0,0,0,0,0,2}
518 
519 /* S-1-3 */
520 #define SECURITY_CREATOR_SID_AUTHORITY {0,0,0,0,0,3}
521 
522 /* S-1-4 */
523 #define SECURITY_NON_UNIQUE_AUTHORITY {0,0,0,0,0,4}
524 
525 #define SECURITY_RESOURCE_MANAGER_AUTHORITY {0,0,0,0,0,9}
526 
527 #define SECURITY_NULL_RID (0x00000000L)
528 #define SECURITY_WORLD_RID (0x00000000L)
529 #define SECURITY_LOCAL_RID (0x00000000L)
530 #define SECURITY_LOCAL_LOGON_RID (0x00000001L)
531 
532 #define SECURITY_CREATOR_OWNER_RID (0x00000000L)
533 #define SECURITY_CREATOR_GROUP_RID (0x00000001L)
534 #define SECURITY_CREATOR_OWNER_SERVER_RID (0x00000002L)
535 #define SECURITY_CREATOR_GROUP_SERVER_RID (0x00000003L)
536 #define SECURITY_CREATOR_OWNER_RIGHTS_RID (0x00000004L)
537 
538 /* NT well-known SIDs */
539 
540 /* S-1-5 */
541 #define SECURITY_NT_AUTHORITY {0,0,0,0,0,5}
542 
543 #define SECURITY_DIALUP_RID (0x00000001L)
544 #define SECURITY_NETWORK_RID (0x00000002L)
545 #define SECURITY_BATCH_RID (0x00000003L)
546 #define SECURITY_INTERACTIVE_RID (0x00000004L)
547 #define SECURITY_LOGON_IDS_RID (0x00000005L)
548 #define SECURITY_LOGON_IDS_RID_COUNT (3L)
549 #define SECURITY_SERVICE_RID (0x00000006L)
550 #define SECURITY_ANONYMOUS_LOGON_RID (0x00000007L)
551 #define SECURITY_PROXY_RID (0x00000008L)
552 #define SECURITY_ENTERPRISE_CONTROLLERS_RID (0x00000009L)
553 #define SECURITY_SERVER_LOGON_RID SECURITY_ENTERPRISE_CONTROLLERS_RID
554 #define SECURITY_PRINCIPAL_SELF_RID (0x0000000AL)
555 #define SECURITY_AUTHENTICATED_USER_RID (0x0000000BL)
556 #define SECURITY_RESTRICTED_CODE_RID (0x0000000CL)
557 #define SECURITY_TERMINAL_SERVER_RID (0x0000000DL)
558 #define SECURITY_REMOTE_LOGON_RID (0x0000000EL)
559 #define SECURITY_THIS_ORGANIZATION_RID (0x0000000FL)
560 #define SECURITY_IUSER_RID (0x00000011L)
561 #define SECURITY_LOCAL_SYSTEM_RID (0x00000012L)
562 #define SECURITY_LOCAL_SERVICE_RID (0x00000013L)
563 #define SECURITY_NETWORK_SERVICE_RID (0x00000014L)
564 #define SECURITY_NT_NON_UNIQUE (0x00000015L)
565 #define SECURITY_NT_NON_UNIQUE_SUB_AUTH_COUNT (3L)
566 #define SECURITY_ENTERPRISE_READONLY_CONTROLLERS_RID (0x00000016L)
567 
568 #define SECURITY_BUILTIN_DOMAIN_RID (0x00000020L)
569 #define SECURITY_WRITE_RESTRICTED_CODE_RID (0x00000021L)
570 
571 
572 #define SECURITY_PACKAGE_BASE_RID (0x00000040L)
573 #define SECURITY_PACKAGE_RID_COUNT (2L)
574 #define SECURITY_PACKAGE_NTLM_RID (0x0000000AL)
575 #define SECURITY_PACKAGE_SCHANNEL_RID (0x0000000EL)
576 #define SECURITY_PACKAGE_DIGEST_RID (0x00000015L)
577 
578 #define SECURITY_CRED_TYPE_BASE_RID (0x00000041L)
579 #define SECURITY_CRED_TYPE_RID_COUNT (2L)
580 #define SECURITY_CRED_TYPE_THIS_ORG_CERT_RID (0x00000001L)
581 
582 #define SECURITY_MIN_BASE_RID (0x00000050L)
583 #define SECURITY_SERVICE_ID_BASE_RID (0x00000050L)
584 #define SECURITY_SERVICE_ID_RID_COUNT (6L)
585 #define SECURITY_RESERVED_ID_BASE_RID (0x00000051L)
586 #define SECURITY_APPPOOL_ID_BASE_RID (0x00000052L)
587 #define SECURITY_APPPOOL_ID_RID_COUNT (6L)
588 #define SECURITY_VIRTUALSERVER_ID_BASE_RID (0x00000053L)
589 #define SECURITY_VIRTUALSERVER_ID_RID_COUNT (6L)
590 #define SECURITY_USERMODEDRIVERHOST_ID_BASE_RID (0x00000054L)
591 #define SECURITY_USERMODEDRIVERHOST_ID_RID_COUNT (6L)
592 #define SECURITY_CLOUD_INFRASTRUCTURE_SERVICES_ID_BASE_RID (0x00000055L)
593 #define SECURITY_CLOUD_INFRASTRUCTURE_SERVICES_ID_RID_COUNT (6L)
594 #define SECURITY_WMIHOST_ID_BASE_RID (0x00000056L)
595 #define SECURITY_WMIHOST_ID_RID_COUNT (6L)
596 #define SECURITY_TASK_ID_BASE_RID (0x00000057L)
597 #define SECURITY_NFS_ID_BASE_RID (0x00000058L)
598 #define SECURITY_COM_ID_BASE_RID (0x00000059L)
599 #define SECURITY_VIRTUALACCOUNT_ID_RID_COUNT (6L)
600 
601 #define SECURITY_MAX_BASE_RID (0x0000006FL)
602 
603 #define SECURITY_MAX_ALWAYS_FILTERED (0x000003E7L)
604 #define SECURITY_MIN_NEVER_FILTERED (0x000003E8L)
605 
606 #define SECURITY_OTHER_ORGANIZATION_RID (0x000003E8L)
607 
608 #define SECURITY_WINDOWSMOBILE_ID_BASE_RID (0x00000070L)
609 
610 /* Well-known domain relative sub-authority values (RIDs) */
611 
612 #define DOMAIN_GROUP_RID_ENTERPRISE_READONLY_DOMAIN_CONTROLLERS (0x000001F2L)
613 
614 #define FOREST_USER_RID_MAX (0x000001F3L)
615 
616 /* Well-known users */
617 
618 #define DOMAIN_USER_RID_ADMIN (0x000001F4L)
619 #define DOMAIN_USER_RID_GUEST (0x000001F5L)
620 #define DOMAIN_USER_RID_KRBTGT (0x000001F6L)
621 
622 #define DOMAIN_USER_RID_MAX (0x000003E7L)
623 
624 /* Well-known groups */
625 
626 #define DOMAIN_GROUP_RID_ADMINS (0x00000200L)
627 #define DOMAIN_GROUP_RID_USERS (0x00000201L)
628 #define DOMAIN_GROUP_RID_GUESTS (0x00000202L)
629 #define DOMAIN_GROUP_RID_COMPUTERS (0x00000203L)
630 #define DOMAIN_GROUP_RID_CONTROLLERS (0x00000204L)
631 #define DOMAIN_GROUP_RID_CERT_ADMINS (0x00000205L)
632 #define DOMAIN_GROUP_RID_SCHEMA_ADMINS (0x00000206L)
633 #define DOMAIN_GROUP_RID_ENTERPRISE_ADMINS (0x00000207L)
634 #define DOMAIN_GROUP_RID_POLICY_ADMINS (0x00000208L)
635 #define DOMAIN_GROUP_RID_READONLY_CONTROLLERS (0x00000209L)
636 
637 /* Well-known aliases */
638 
639 #define DOMAIN_ALIAS_RID_ADMINS (0x00000220L)
640 #define DOMAIN_ALIAS_RID_USERS (0x00000221L)
641 #define DOMAIN_ALIAS_RID_GUESTS (0x00000222L)
642 #define DOMAIN_ALIAS_RID_POWER_USERS (0x00000223L)
643 
644 #define DOMAIN_ALIAS_RID_ACCOUNT_OPS (0x00000224L)
645 #define DOMAIN_ALIAS_RID_SYSTEM_OPS (0x00000225L)
646 #define DOMAIN_ALIAS_RID_PRINT_OPS (0x00000226L)
647 #define DOMAIN_ALIAS_RID_BACKUP_OPS (0x00000227L)
648 
649 #define DOMAIN_ALIAS_RID_REPLICATOR (0x00000228L)
650 #define DOMAIN_ALIAS_RID_RAS_SERVERS (0x00000229L)
651 #define DOMAIN_ALIAS_RID_PREW2KCOMPACCESS (0x0000022AL)
652 #define DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS (0x0000022BL)
653 #define DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS (0x0000022CL)
654 #define DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS (0x0000022DL)
655 
656 #define DOMAIN_ALIAS_RID_MONITORING_USERS (0x0000022EL)
657 #define DOMAIN_ALIAS_RID_LOGGING_USERS (0x0000022FL)
658 #define DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS (0x00000230L)
659 #define DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS (0x00000231L)
660 #define DOMAIN_ALIAS_RID_DCOM_USERS (0x00000232L)
661 
662 #define DOMAIN_ALIAS_RID_IUSERS (0x00000238L)
663 #define DOMAIN_ALIAS_RID_CRYPTO_OPERATORS (0x00000239L)
664 #define DOMAIN_ALIAS_RID_CACHEABLE_PRINCIPALS_GROUP (0x0000023BL)
665 #define DOMAIN_ALIAS_RID_NON_CACHEABLE_PRINCIPALS_GROUP (0x0000023CL)
666 #define DOMAIN_ALIAS_RID_EVENT_LOG_READERS_GROUP (0x0000023DL)
667 #define DOMAIN_ALIAS_RID_CERTSVC_DCOM_ACCESS_GROUP (0x0000023EL)
668 
669 #define SECURITY_MANDATORY_LABEL_AUTHORITY {0,0,0,0,0,16}
670 #define SECURITY_MANDATORY_UNTRUSTED_RID (0x00000000L)
671 #define SECURITY_MANDATORY_LOW_RID (0x00001000L)
672 #define SECURITY_MANDATORY_MEDIUM_RID (0x00002000L)
673 #define SECURITY_MANDATORY_HIGH_RID (0x00003000L)
674 #define SECURITY_MANDATORY_SYSTEM_RID (0x00004000L)
675 #define SECURITY_MANDATORY_PROTECTED_PROCESS_RID (0x00005000L)
676 
677 /* SECURITY_MANDATORY_MAXIMUM_USER_RID is the highest RID that
678  can be set by a usermode caller.*/
679 
680 #define SECURITY_MANDATORY_MAXIMUM_USER_RID SECURITY_MANDATORY_SYSTEM_RID
681 
682 #define MANDATORY_LEVEL_TO_MANDATORY_RID(IL) (IL * 0x1000)
683 
684 /* Allocate the System Luid. The first 1000 LUIDs are reserved.
685  Use #999 here (0x3e7 = 999) */
686 
687 #define SYSTEM_LUID {0x3e7, 0x0}
688 #define ANONYMOUS_LOGON_LUID {0x3e6, 0x0}
689 #define LOCALSERVICE_LUID {0x3e5, 0x0}
690 #define NETWORKSERVICE_LUID {0x3e4, 0x0}
691 #define IUSER_LUID {0x3e3, 0x0}
692 
693 /* Logon session reference flags */
694 
695 #define SEP_LOGON_SESSION_TERMINATION_NOTIFY 0x0001
696 
697 typedef struct _ACE_HEADER {
698  $UCHAR AceType;
699  $UCHAR AceFlags;
700  $USHORT AceSize;
702 
703 #define ACCESS_MIN_MS_ACE_TYPE (0x0)
704 #define ACCESS_ALLOWED_ACE_TYPE (0x0)
705 #define ACCESS_DENIED_ACE_TYPE (0x1)
706 #define SYSTEM_AUDIT_ACE_TYPE (0x2)
707 #define SYSTEM_ALARM_ACE_TYPE (0x3)
708 #define ACCESS_MAX_MS_V2_ACE_TYPE (0x3)
709 #define ACCESS_ALLOWED_COMPOUND_ACE_TYPE (0x4)
710 #define ACCESS_MAX_MS_V3_ACE_TYPE (0x4)
711 #define ACCESS_MIN_MS_OBJECT_ACE_TYPE (0x5)
712 #define ACCESS_ALLOWED_OBJECT_ACE_TYPE (0x5)
713 #define ACCESS_DENIED_OBJECT_ACE_TYPE (0x6)
714 #define SYSTEM_AUDIT_OBJECT_ACE_TYPE (0x7)
715 #define SYSTEM_ALARM_OBJECT_ACE_TYPE (0x8)
716 #define ACCESS_MAX_MS_OBJECT_ACE_TYPE (0x8)
717 #define ACCESS_MAX_MS_V4_ACE_TYPE (0x8)
718 #define ACCESS_MAX_MS_ACE_TYPE (0x8)
719 #define ACCESS_ALLOWED_CALLBACK_ACE_TYPE (0x9)
720 #define ACCESS_DENIED_CALLBACK_ACE_TYPE (0xA)
721 #define ACCESS_ALLOWED_CALLBACK_OBJECT_ACE_TYPE (0xB)
722 #define ACCESS_DENIED_CALLBACK_OBJECT_ACE_TYPE (0xC)
723 #define SYSTEM_AUDIT_CALLBACK_ACE_TYPE (0xD)
724 #define SYSTEM_ALARM_CALLBACK_ACE_TYPE (0xE)
725 #define SYSTEM_AUDIT_CALLBACK_OBJECT_ACE_TYPE (0xF)
726 #define SYSTEM_ALARM_CALLBACK_OBJECT_ACE_TYPE (0x10)
727 #define ACCESS_MAX_MS_V5_ACE_TYPE (0x11)
728 #define SYSTEM_MANDATORY_LABEL_ACE_TYPE (0x11)
729 
730 /* The following are the inherit flags that go into the AceFlags field
731  of an Ace header. */
732 
733 #define OBJECT_INHERIT_ACE (0x1)
734 #define CONTAINER_INHERIT_ACE (0x2)
735 #define NO_PROPAGATE_INHERIT_ACE (0x4)
736 #define INHERIT_ONLY_ACE (0x8)
737 #define INHERITED_ACE (0x10)
738 #define VALID_INHERIT_FLAGS (0x1F)
739 
740 #define SUCCESSFUL_ACCESS_ACE_FLAG (0x40)
741 #define FAILED_ACCESS_ACE_FLAG (0x80)
742 
743 typedef struct _ACCESS_ALLOWED_ACE {
746  $ULONG SidStart;
748 
749 typedef struct _ACCESS_DENIED_ACE {
752  $ULONG SidStart;
754 
755 typedef struct _SYSTEM_AUDIT_ACE {
758  $ULONG SidStart;
760 
761 typedef struct _SYSTEM_ALARM_ACE {
764  $ULONG SidStart;
766 
767 typedef struct _SYSTEM_MANDATORY_LABEL_ACE {
770  $ULONG SidStart;
772 
773 #define SYSTEM_MANDATORY_LABEL_NO_WRITE_UP 0x1
774 #define SYSTEM_MANDATORY_LABEL_NO_READ_UP 0x2
775 #define SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP 0x4
776 #define SYSTEM_MANDATORY_LABEL_VALID_MASK (SYSTEM_MANDATORY_LABEL_NO_WRITE_UP | \
777  SYSTEM_MANDATORY_LABEL_NO_READ_UP | \
778  SYSTEM_MANDATORY_LABEL_NO_EXECUTE_UP)
779 
780 #define SECURITY_DESCRIPTOR_MIN_LENGTH (sizeof(SECURITY_DESCRIPTOR))
781 
783 
784 #define SE_OWNER_DEFAULTED 0x0001
785 #define SE_GROUP_DEFAULTED 0x0002
786 #define SE_DACL_PRESENT 0x0004
787 #define SE_DACL_DEFAULTED 0x0008
788 #define SE_SACL_PRESENT 0x0010
789 #define SE_SACL_DEFAULTED 0x0020
790 #define SE_DACL_UNTRUSTED 0x0040
791 #define SE_SERVER_SECURITY 0x0080
792 #define SE_DACL_AUTO_INHERIT_REQ 0x0100
793 #define SE_SACL_AUTO_INHERIT_REQ 0x0200
794 #define SE_DACL_AUTO_INHERITED 0x0400
795 #define SE_SACL_AUTO_INHERITED 0x0800
796 #define SE_DACL_PROTECTED 0x1000
797 #define SE_SACL_PROTECTED 0x2000
798 #define SE_RM_CONTROL_VALID 0x4000
799 #define SE_SELF_RELATIVE 0x8000
800 
802  $UCHAR Revision;
803  $UCHAR Sbz1;
805  $ULONG Owner;
806  $ULONG Group;
807  $ULONG Sacl;
808  $ULONG Dacl;
810 
811 typedef struct _SECURITY_DESCRIPTOR {
812  $UCHAR Revision;
813  $UCHAR Sbz1;
820 
821 typedef struct _OBJECT_TYPE_LIST {
822  $USHORT Level;
823  $USHORT Sbz;
826 
827 #define ACCESS_OBJECT_GUID 0
828 #define ACCESS_PROPERTY_SET_GUID 1
829 #define ACCESS_PROPERTY_GUID 2
830 #define ACCESS_MAX_LEVEL 4
831 
832 typedef enum _AUDIT_EVENT_TYPE {
836 
837 #define AUDIT_ALLOW_NO_PRIVILEGE 0x1
838 
839 #define ACCESS_DS_SOURCE_A "DS"
840 #define ACCESS_DS_SOURCE_W L"DS"
841 #define ACCESS_DS_OBJECT_TYPE_NAME_A "Directory Service Object"
842 #define ACCESS_DS_OBJECT_TYPE_NAME_W L"Directory Service Object"
843 
844 #define ACCESS_REASON_TYPE_MASK 0xffff0000
845 #define ACCESS_REASON_DATA_MASK 0x0000ffff
846 
847 typedef enum _ACCESS_REASON_TYPE {
848  AccessReasonNone = 0x00000000,
850  AccessReasonDeniedAce = 0x00020000,
856  AccessReasonOwnership = 0x00400000,
857  AccessReasonNullDacl = 0x00500000,
858  AccessReasonEmptyDacl = 0x00600000,
859  AccessReasonNoSD = 0x00700000,
860  AccessReasonNoGrant = 0x00800000
862 
863 typedef $ULONG ACCESS_REASON;
864 
865 typedef struct _ACCESS_REASONS {
868 
869 #define SE_SECURITY_DESCRIPTOR_FLAG_NO_OWNER_ACE 0x00000001
870 #define SE_SECURITY_DESCRIPTOR_FLAG_NO_LABEL_ACE 0x00000002
871 #define SE_SECURITY_DESCRIPTOR_VALID_FLAGS 0x00000003
872 
873 typedef struct _SE_SECURITY_DESCRIPTOR {
874  $ULONG Size;
875  $ULONG Flags;
878 
879 typedef struct _SE_ACCESS_REQUEST {
880  $ULONG Size;
889 
890 #define TOKEN_ASSIGN_PRIMARY (0x0001)
891 #define TOKEN_DUPLICATE (0x0002)
892 #define TOKEN_IMPERSONATE (0x0004)
893 #define TOKEN_QUERY (0x0008)
894 #define TOKEN_QUERY_SOURCE (0x0010)
895 #define TOKEN_ADJUST_PRIVILEGES (0x0020)
896 #define TOKEN_ADJUST_GROUPS (0x0040)
897 #define TOKEN_ADJUST_DEFAULT (0x0080)
898 #define TOKEN_ADJUST_SESSIONID (0x0100)
899 
900 #define TOKEN_ALL_ACCESS_P (STANDARD_RIGHTS_REQUIRED |\
901  TOKEN_ASSIGN_PRIMARY |\
902  TOKEN_DUPLICATE |\
903  TOKEN_IMPERSONATE |\
904  TOKEN_QUERY |\
905  TOKEN_QUERY_SOURCE |\
906  TOKEN_ADJUST_PRIVILEGES |\
907  TOKEN_ADJUST_GROUPS |\
908  TOKEN_ADJUST_DEFAULT)
909 
910 #if ((defined(_WIN32_WINNT) && (_WIN32_WINNT > 0x0400)) || (!defined(_WIN32_WINNT)))
911 #define TOKEN_ALL_ACCESS (TOKEN_ALL_ACCESS_P | TOKEN_ADJUST_SESSIONID)
912 #else
913 #define TOKEN_ALL_ACCESS (TOKEN_ALL_ACCESS_P)
914 #endif
915 
916 #define TOKEN_READ (STANDARD_RIGHTS_READ | TOKEN_QUERY)
917 
918 #define TOKEN_WRITE (STANDARD_RIGHTS_WRITE |\
919  TOKEN_ADJUST_PRIVILEGES |\
920  TOKEN_ADJUST_GROUPS |\
921  TOKEN_ADJUST_DEFAULT)
922 
923 #define TOKEN_EXECUTE (STANDARD_RIGHTS_EXECUTE)
924 
925 typedef enum _TOKEN_TYPE {
929 
973 
974 typedef struct _TOKEN_USER {
977 
978 typedef struct _TOKEN_GROUPS {
979  $ULONG GroupCount;
980 #ifdef MIDL_PASS
981  [size_is(GroupCount)] SID_AND_ATTRIBUTES Groups[*];
982 #else
984 #endif
986 
987 typedef struct _TOKEN_PRIVILEGES {
991 
992 typedef struct _TOKEN_OWNER {
995 
996 typedef struct _TOKEN_PRIMARY_GROUP {
999 
1000 typedef struct _TOKEN_DEFAULT_DACL {
1003 
1005  $ULONG SidCount;
1006  $ULONG SidLength;
1016 
1017 typedef struct _TOKEN_LINKED_TOKEN {
1020 
1021 typedef struct _TOKEN_ELEVATION {
1024 
1025 typedef struct _TOKEN_MANDATORY_LABEL {
1028 
1029 #define TOKEN_MANDATORY_POLICY_OFF 0x0
1030 #define TOKEN_MANDATORY_POLICY_NO_WRITE_UP 0x1
1031 #define TOKEN_MANDATORY_POLICY_NEW_PROCESS_MIN 0x2
1032 
1033 #define TOKEN_MANDATORY_POLICY_VALID_MASK (TOKEN_MANDATORY_POLICY_NO_WRITE_UP | \
1034  TOKEN_MANDATORY_POLICY_NEW_PROCESS_MIN)
1035 
1036 #define POLICY_AUDIT_SUBCATEGORY_COUNT (56)
1037 
1038 typedef struct _TOKEN_AUDIT_POLICY {
1041 
1042 #define TOKEN_SOURCE_LENGTH 8
1043 
1044 typedef struct _TOKEN_SOURCE {
1048 
1049 #include <pshpack4.h>
1050 typedef struct _TOKEN_STATISTICS {
1058  $ULONG GroupCount;
1062 #include <poppack.h>
1063 
1064 typedef struct _TOKEN_CONTROL {
1065  LUID TokenId;
1067  LUID ModifiedId;
1070 
1071 typedef struct _TOKEN_ORIGIN {
1074 
1075 typedef enum _MANDATORY_LEVEL {
1084 
1086 $if(_NTIFS_)
1087 
1088 typedef struct _SE_ACCESS_REPLY {
1089  $ULONG Size;
1090  $ULONG ResultListCount;
1093  PACCESS_REASONS AccessReason;
1096 
1097 typedef enum _SE_AUDIT_OPERATION {
1112 
1113 typedef struct _SE_AUDIT_INFO {
1127 
1128 typedef struct _TOKEN_MANDATORY_POLICY {
1129  $ULONG Policy;
1131 
1140  $ULONG Flags;
1142 
1143 #define TOKEN_HAS_TRAVERSE_PRIVILEGE 0x0001
1144 #define TOKEN_HAS_BACKUP_PRIVILEGE 0x0002
1145 #define TOKEN_HAS_RESTORE_PRIVILEGE 0x0004
1146 #define TOKEN_WRITE_RESTRICTED 0x0008
1147 #define TOKEN_HAS_ADMIN_GROUP TOKEN_WRITE_RESTRICTED
1148 #define TOKEN_IS_RESTRICTED 0x0010
1149 #define TOKEN_SESSION_NOT_REFERENCED 0x0020
1150 #define TOKEN_SANDBOX_INERT 0x0040
1151 #define TOKEN_HAS_IMPERSONATE_PRIVILEGE 0x0080
1152 #define SE_BACKUP_PRIVILEGES_CHECKED 0x0100
1153 #define TOKEN_VIRTUALIZE_ALLOWED 0x0200
1154 #define TOKEN_VIRTUALIZE_ENABLED 0x0400
1155 #define TOKEN_IS_FILTERED 0x0800
1156 #define TOKEN_UIACCESS 0x1000
1157 #define TOKEN_NOT_LOW 0x2000
1158 
1159 typedef struct _SE_EXPORTS {
1226 
1227 typedef NTSTATUS
1229  IN PLUID LogonId);
1230 
1231 typedef struct _SECURITY_CLIENT_CONTEXT {
1239 
1240 $endif (_NTIFS_)
PSID SeAliasBackupOpsSid
Definition: setypes.h:1201
LUID AuthenticationId
Definition: setypes.h:1052
PSID SeAliasAdminsSid
Definition: setypes.h:1194
$ULONG * PSECURITY_INFORMATION
Definition: setypes.h:8
struct _SE_ADT_ACCESS_REASON SE_ADT_ACCESS_REASON
* PNTSTATUS
Definition: strlen.c:14
enum _SE_ADT_PARAMETER_TYPE SE_ADT_PARAMETER_TYPE
PSID SeSystemMandatorySid
Definition: setypes.h:1223
struct _SECURITY_DESCRIPTOR * PSECURITY_DESCRIPTOR
Definition: security.c:97
$ULONG SECURITY_INFORMATION
Definition: setypes.h:8
_SECURITY_IMPERSONATION_LEVEL
Definition: lsa.idl:54
UNICODE_STRING ObjectName
Definition: setypes.h:229
LUID SeEnableDelegationPrivilege
Definition: setypes.h:1207
ACE_HEADER Header
Definition: setypes.h:762
#define IN
Definition: typedefs.h:39
PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: setypes.h:222
struct _TOKEN_MANDATORY_LABEL TOKEN_MANDATORY_LABEL
struct _SYSTEM_MANDATORY_LABEL_ACE * PSYSTEM_MANDATORY_LABEL_ACE
struct _SE_IMPERSONATION_STATE SE_IMPERSONATION_STATE
LUID SeShutdownPrivilege
Definition: setypes.h:1177
LUID SeManageVolumePrivilege
Definition: setypes.h:1210
struct _SE_ACCESS_REQUEST * PSE_ACCESS_REQUEST
struct _OBJECT_TYPE_LIST OBJECT_TYPE_LIST
PSID_AND_ATTRIBUTES_HASH SidHash
Definition: setypes.h:1133
struct _SECURITY_SUBJECT_CONTEXT SECURITY_SUBJECT_CONTEXT
struct _TOKEN_AUDIT_POLICY * PTOKEN_AUDIT_POLICY
struct _PRIVILEGE_SET PRIVILEGE_SET
struct _LUID_AND_ATTRIBUTES * PLUID_AND_ATTRIBUTES
enum _SID_NAME_USE * PSID_NAME_USE
_Must_inspect_result_ _In_ WDFQUEUE _In_opt_ WDFREQUEST _In_opt_ WDFFILEOBJECT _Inout_opt_ PWDF_REQUEST_PARAMETERS Parameters
Definition: wdfio.h:863
struct _INITIAL_PRIVILEGE_SET * PINITIAL_PRIVILEGE_SET
#define SE_MAX_AUDIT_PARAMETERS
Definition: setypes.h:243
struct _TOKEN_PRIMARY_GROUP * PTOKEN_PRIMARY_GROUP
PSID SeIUserSid
Definition: setypes.h:1218
LUID SeTimeZonePrivilege
Definition: setypes.h:1216
#define ANYSIZE_ARRAY
Definition: typedefs.h:46
* PSID_IDENTIFIER_AUTHORITY
Definition: setypes.h:451
$USHORT AceCount
Definition: setypes.h:53
struct _TOKEN_AUDIT_POLICY TOKEN_AUDIT_POLICY
ACCESS_MASK GenericRead
Definition: nt_native.h:565
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET _In_ PGENERIC_MAPPING _In_ KPROCESSOR_MODE _Out_ PACCESS_MASK _Out_ PNTSTATUS AccessStatus
Definition: sefuncs.h:13
_In_ USHORT _In_ ULONG _In_ PSOCKADDR _In_ PSOCKADDR _Reserved_ ULONG _In_opt_ PVOID _In_opt_ const WSK_CLIENT_CONNECTION_DISPATCH _In_opt_ PEPROCESS _In_opt_ PETHREAD _In_opt_ PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: wsk.h:182
struct _TOKEN_ACCESS_INFORMATION * PTOKEN_ACCESS_INFORMATION
struct _ACCESS_STATE * PACCESS_STATE
#define _WINNT_
struct _TOKEN_DEFAULT_DACL TOKEN_DEFAULT_DACL
LUID SeDebugPrivilege
Definition: setypes.h:1178
BOOLEAN PrivilegesAllocated
Definition: setypes.h:216
PSID SeAuthenticatedUsersSid
Definition: setypes.h:1202
enum _TOKEN_TYPE * PTOKEN_TYPE
LUID_AND_ATTRIBUTES_ARRAY * PLUID_AND_ATTRIBUTES_ARRAY
Definition: setypes.h:80
$ULONG GroupCount
Definition: setypes.h:1058
SE_ACCESS_REPLY
Definition: setypes.h:1095
LUID SeChangeNotifyPrivilege
Definition: setypes.h:1181
LUID SeLockMemoryPrivilege
Definition: setypes.h:1162
_SE_AUDIT_OPERATION
Definition: setypes.h:1097
#define SID_HASH_SIZE
Definition: setypes.h:500
$ULONG DynamicCharged
Definition: setypes.h:1056
char CHAR
Definition: xmlstorage.h:175
PVOID AuxData
Definition: setypes.h:223
ULONG Length
Definition: setypes.h:300
PLUID_AND_ATTRIBUTES Privileges
Definition: setypes.h:1013
struct _SYSTEM_ALARM_ACE SYSTEM_ALARM_ACE
_TOKEN_TYPE
Definition: imports.h:272
union _ACCESS_STATE::@3929 Privileges
BYTE SECURITY_CONTEXT_TRACKING_MODE
Definition: lsa.idl:61
enum _SECURITY_IMPERSONATION_LEVEL * PSECURITY_IMPERSONATION_LEVEL
struct _SECURITY_CLIENT_CONTEXT SECURITY_CLIENT_CONTEXT
$ULONG SidStart
Definition: setypes.h:758
struct _LUID_AND_ATTRIBUTES LUID_AND_ATTRIBUTES
#define _NTIFS_
Definition: ifssupp.h:20
enum _TOKEN_INFORMATION_CLASS * PTOKEN_INFORMATION_CLASS
PSID SeAnonymousLogonSid
Definition: setypes.h:1204
PSID_AND_ATTRIBUTES_HASH RestrictedSidHash
Definition: setypes.h:1134
$if(_WDMDDK_||_WINNT_) typedef PVOID PSECURITY_DESCRIPTOR
Definition: extypes.h:1
struct _SE_ACCESS_REQUEST SE_ACCESS_REQUEST
struct _ACCESS_DENIED_ACE * PACCESS_DENIED_ACE
$USHORT Level
Definition: setypes.h:822
struct _SE_EXPORTS * PSE_EXPORTS
LUID AuthenticationId
Definition: imports.h:284
$ULONG PrivilegeCount
Definition: setypes.h:988
IN PVOID IN PVOID IN USHORT IN USHORT Size
Definition: pci.h:361
PVOID PACCESS_TOKEN
Definition: setypes.h:11
#define _WDMDDK_
Definition: wdm.template.h:26
* LPSID_IDENTIFIER_AUTHORITY
Definition: setypes.h:451
_SE_ADT_PARAMETER_TYPE
Definition: setypes.h:258
PVOID HandleId
Definition: setypes.h:1121
struct _ACE_HEADER * PACE_HEADER
PSID SeAliasGuestsSid
Definition: setypes.h:1196
struct _TOKEN_LINKED_TOKEN * PTOKEN_LINKED_TOKEN
$endif(_WDMDDK_||_WINNT_) $if(_WDMDDK_) typedef enum _SECURITY_OPERATION_CODE
Definition: setypes.h:149
BOOLEAN GenerateAudit
Definition: setypes.h:214
$UCHAR SubAuthorityCount
Definition: setypes.h:458
struct _TOKEN_GROUPS * LPTOKEN_GROUPS
$ULONG Control
Definition: setypes.h:87
struct _ACE_HEADER ACE_HEADER
ULONG_PTR SID_HASH_ENTRY
Definition: setypes.h:501
struct _TOKEN_CONTROL TOKEN_CONTROL
VOID(NTAPI * PNTFS_DEREF_EXPORTED_SECURITY_DESCRIPTOR)(_In_ PVOID Vcb, _In_ PSECURITY_DESCRIPTOR SecurityDescriptor)
Definition: setypes.h:234
ACE_HEADER Header
Definition: ms-dtyp.idl:216
struct _SE_ADT_PARAMETER_ARRAY * PSE_ADT_PARAMETER_ARRAY
struct _TOKEN_USER TOKEN_USER
LUID SeCreateSymbolicLinkPrivilege
Definition: setypes.h:1217
enum _AUDIT_EVENT_TYPE * PAUDIT_EVENT_TYPE
LUID SeUnsolicitedInputPrivilege
Definition: setypes.h:1164
struct _TOKEN_LINKED_TOKEN TOKEN_LINKED_TOKEN
SECURITY_CONTEXT_TRACKING_MODE ContextTrackingMode
Definition: lsa.idl:66
* PSE_ACCESS_REPLY
Definition: setypes.h:1095
PSID SeAliasSystemOpsSid
Definition: setypes.h:1199
LUID SeSecurityPrivilege
Definition: setypes.h:1166
GUID * ObjectType
Definition: setypes.h:824
struct _ACCESS_STATE ACCESS_STATE
LUID OperationID
Definition: setypes.h:212
uint32_t ULONG_PTR
Definition: typedefs.h:65
$USHORT SECURITY_DESCRIPTOR_CONTROL
Definition: setypes.h:782
enum _SID_NAME_USE SID_NAME_USE
PSID_AND_ATTRIBUTES SidAttr
Definition: setypes.h:505
PSID SeBatchSid
Definition: setypes.h:1191
struct _TOKEN_GROUPS_AND_PRIVILEGES TOKEN_GROUPS_AND_PRIVILEGES
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: setypes.h:1138
LUID SourceIdentifier
Definition: imports.h:279
struct _ACCESS_REASONS * PACCESS_REASONS
$UCHAR Sbz1
Definition: setypes.h:51
enum _AUDIT_EVENT_TYPE AUDIT_EVENT_TYPE
struct _TOKEN_DEFAULT_DACL * PTOKEN_DEFAULT_DACL
NTSTATUS(* NTAPI)(IN PFILE_FULL_EA_INFORMATION EaBuffer, IN ULONG EaLength, OUT PULONG ErrorOffset)
Definition: IoEaTest.cpp:117
PSID SeNullSid
Definition: setypes.h:1183
struct _ACL * PACL
struct _SE_ADT_PARAMETER_ARRAY SE_ADT_PARAMETER_ARRAY
WORD SECURITY_DESCRIPTOR_CONTROL
Definition: lsa.idl:37
struct _SID_AND_ATTRIBUTES_HASH SID_AND_ATTRIBUTES_HASH
struct _TOKEN_ACCESS_INFORMATION TOKEN_ACCESS_INFORMATION
enum _SECURITY_IMPERSONATION_LEVEL SECURITY_IMPERSONATION_LEVEL
ACCESS_MASK GenericExecute
Definition: nt_native.h:567
ACCESS_MASK DesiredAccess
Definition: setypes.h:882
LUID SeLoadDriverPrivilege
Definition: setypes.h:1168
struct _SID * PISID
_ACCESS_REASON_TYPE
Definition: setypes.h:847
LUID SeUndockPrivilege
Definition: setypes.h:1205
struct _TOKEN_GROUPS_AND_PRIVILEGES * PTOKEN_GROUPS_AND_PRIVILEGES
_SID_NAME_USE
Definition: lsa.idl:117
struct _TOKEN_ORIGIN * PTOKEN_ORIGIN
SID_AND_ATTRIBUTES Label
Definition: setypes.h:1026
ACCESS_MASK GenericWrite
Definition: nt_native.h:566
PTOKEN_PRIVILEGES Privileges
Definition: setypes.h:1135
struct _SECURITY_DESCRIPTOR_RELATIVE * PISECURITY_DESCRIPTOR_RELATIVE
struct _TOKEN_ELEVATION * PTOKEN_ELEVATION
LUID * OperationId
Definition: setypes.h:1123
_TOKEN_INFORMATION_CLASS
Definition: setypes.h:930
enum _MANDATORY_LEVEL * PMANDATORY_LEVEL
unsigned char BOOLEAN
PSID SeNetworkServiceSid
Definition: setypes.h:1209
struct _TOKEN_PRIVILEGES TOKEN_PRIVILEGES
struct _TOKEN_MANDATORY_POLICY TOKEN_MANDATORY_POLICY
PSID SeHighMandatorySid
Definition: setypes.h:1222
$UCHAR AclRevision
Definition: setypes.h:50
#define _In_
Definition: ms_sal.h:308
PSID Owner
Definition: setypes.h:993
PSID SeAliasPowerUsersSid
Definition: setypes.h:1197
LUID SeSystemEnvironmentPrivilege
Definition: setypes.h:1180
PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: setypes.h:876
LUID SeProfileSingleProcessPrivilege
Definition: setypes.h:1173
struct _SYSTEM_AUDIT_ACE * PSYSTEM_AUDIT_ACE
PSID SeDialupSid
Definition: setypes.h:1189
UNICODE_STRING ObjectTypeName
Definition: setypes.h:1119
SE_ADT_PARAMETER_TYPE Type
Definition: setypes.h:299
TOKEN_TYPE TokenType
Definition: setypes.h:1054
struct _TOKEN_SOURCE * PTOKEN_SOURCE
LUID ModifiedId
Definition: imports.h:285
struct _TOKEN_GROUPS * PTOKEN_GROUPS
#define TOKEN_SOURCE_LENGTH
Definition: setypes.h:1042
struct _SE_EXPORTS SE_EXPORTS
PRIVILEGE_SET PrivilegeSet
Definition: setypes.h:226
$ULONG PrivilegeCount
Definition: setypes.h:86
struct _SE_IMPERSONATION_STATE * PSE_IMPERSONATION_STATE
BOOLEAN DirectAccessEffectiveOnly
Definition: imports.h:293
LUID OriginatingLogonSession
Definition: setypes.h:1072
_Must_inspect_result_ _In_ WDFKEY _In_ PCUNICODE_STRING _Out_opt_ PUSHORT _Inout_opt_ PUNICODE_STRING Value
Definition: wdfregistry.h:406
PSID SeNetworkSid
Definition: setypes.h:1190
SE_AUDIT_OPERATION AuditOperation
Definition: setypes.h:1116
struct _TOKEN_MANDATORY_POLICY * PTOKEN_MANDATORY_POLICY
GUID * TransactionId
Definition: setypes.h:1122
struct _SID_AND_ATTRIBUTES * PSID_AND_ATTRIBUTES
Definition: security.c:129
PSID SeAliasAccountOpsSid
Definition: setypes.h:1198
LARGE_INTEGER ExpirationTime
Definition: setypes.h:1053
LUID SeTcbPrivilege
Definition: setypes.h:1165
SID_AND_ATTRIBUTES_ARRAY * PSID_AND_ATTRIBUTES_ARRAY
Definition: setypes.h:498
PACCESS_TOKEN PrimaryToken
Definition: setypes.h:207
struct _TOKEN_MANDATORY_LABEL * PTOKEN_MANDATORY_LABEL
ACCESS_MASK RemainingDesiredAccess
Definition: setypes.h:218
enum _TOKEN_TYPE TOKEN_TYPE
BOOLEAN AuditPrivileges
Definition: setypes.h:228
struct _SE_ADT_ACCESS_REASON * PSE_ADT_ACCESS_REASON
LUID SeImpersonatePrivilege
Definition: setypes.h:1211
LUID SeTrustedCredManAccessPrivilege
Definition: setypes.h:1213
PGENERIC_MAPPING GenericMapping
Definition: setypes.h:885
struct _SYSTEM_MANDATORY_LABEL_ACE SYSTEM_MANDATORY_LABEL_ACE
PSID SeMediumMandatorySid
Definition: setypes.h:1221
ACCESS_MASK PreviouslyGrantedAccess
Definition: setypes.h:219
LUID SeRemoteShutdownPrivilege
Definition: setypes.h:1182
INITIAL_PRIVILEGE_SET InitialPrivilegeSet
Definition: setypes.h:225
struct _GENERIC_MAPPING * PGENERIC_MAPPING
struct _TOKEN_OWNER TOKEN_OWNER
PSE_SECURITY_DESCRIPTOR SeSecurityDescriptor
Definition: setypes.h:881
struct _SECURITY_QUALITY_OF_SERVICE SECURITY_QUALITY_OF_SERVICE
struct _SID_AND_ATTRIBUTES SID_AND_ATTRIBUTES
NTSTATUS(NTAPI * PSE_LOGON_SESSION_TERMINATED_ROUTINE)(IN PLUID LogonId)
Definition: setypes.h:1228
struct _SID_AND_ATTRIBUTES_HASH * PSID_AND_ATTRIBUTES_HASH
#define Vcb
Definition: cdprocs.h:1415
* PSECURITY_OPERATION_CODE
Definition: setypes.h:157
BOOLEAN GenerateOnClose
Definition: setypes.h:215
LUID SeCreatePermanentPrivilege
Definition: setypes.h:1174
Definition: setypes.h:298
struct _ACCESS_REASONS ACCESS_REASONS
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: setypes.h:1055
SECURITY_QUALITY_OF_SERVICE SecurityQos
Definition: imports.h:290
UNICODE_STRING SubsystemName
Definition: setypes.h:1118
UNICODE_STRING ObjectTypeName
Definition: setypes.h:230
enum _TOKEN_INFORMATION_CLASS TOKEN_INFORMATION_CLASS
ACCESS_MASK Mask
Definition: ms-dtyp.idl:232
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET * Privileges
Definition: sefuncs.h:13
struct _SECURITY_DESCRIPTOR SECURITY_DESCRIPTOR
struct _ACCESS_ALLOWED_ACE ACCESS_ALLOWED_ACE
SID_IDENTIFIER_AUTHORITY
Definition: setypes.h:451
LUID SeRelabelPrivilege
Definition: setypes.h:1214
struct _SID SID
BOOLEAN GenerateOnClose
Definition: setypes.h:1125
$USHORT Sbz2
Definition: setypes.h:54
$USHORT AclSize
Definition: setypes.h:52
_AUDIT_EVENT_TYPE
Definition: setypes.h:832
struct _TOKEN_OWNER * PTOKEN_OWNER
struct _TOKEN_PRIVILEGES * PTOKEN_PRIVILEGES
PSID PrincipalSelfSid
Definition: setypes.h:884
struct _SE_SECURITY_DESCRIPTOR * PSE_SECURITY_DESCRIPTOR
struct _TOKEN_STATISTICS * PTOKEN_STATISTICS
struct _ACL ACL
struct _SE_ADT_PARAMETER_ARRAY_ENTRY * PSE_ADT_PARAMETER_ARRAY_ENTRY
$ULONG ObjectTypeListCount
Definition: setypes.h:886
PSID SeLocalServiceSid
Definition: setypes.h:1208
#define NTSTATUS
Definition: precomp.h:20
#define VOID
Definition: acefi.h:82
struct _INITIAL_PRIVILEGE_SET INITIAL_PRIVILEGE_SET
ACCESS_MASK OriginalDesiredAccess
Definition: setypes.h:220
SECURITY_SUBJECT_CONTEXT SubjectSecurityContext
Definition: setypes.h:221
SECURITY_DESCRIPTOR_CONTROL Control
Definition: setypes.h:814
struct _OBJECT_TYPE_LIST * POBJECT_TYPE_LIST
POBJECT_TYPE_LIST ObjectTypeList
Definition: setypes.h:887
TOKEN_MANDATORY_POLICY MandatoryPolicy
Definition: setypes.h:1139
struct _SECURITY_DESCRIPTOR_RELATIVE SECURITY_DESCRIPTOR_RELATIVE
$ULONG SidStart
Definition: setypes.h:764
PSECURITY_DESCRIPTOR SecurityDescriptor
Definition: setypes.h:310
struct _TOKEN_CONTROL * PTOKEN_CONTROL
DWORD SubAuthority[*]
Definition: ms-dtyp.idl:202
struct _SE_ADT_PARAMETER_ARRAY_ENTRY SE_ADT_PARAMETER_ARRAY_ENTRY
ACCESS_MASK AccessMask
Definition: setypes.h:306
$ULONG ACCESS_REASON
Definition: setypes.h:863
enum _TOKEN_TYPE TOKEN_TYPE
struct _ACCESS_ALLOWED_ACE * PACCESS_ALLOWED_ACE
struct _TOKEN_GROUPS TOKEN_GROUPS
CCHAR SourceName[TOKEN_SOURCE_LENGTH]
Definition: imports.h:278
enum _SE_ADT_PARAMETER_TYPE * PSE_ADT_PARAMETER_TYPE
SID_HASH_ENTRY Hash[SID_HASH_SIZE]
Definition: setypes.h:506
BOOLEAN SECURITY_CONTEXT_TRACKING_MODE
Definition: setypes.h:106
enum _SECURITY_IMPERSONATION_LEVEL SECURITY_IMPERSONATION_LEVEL
AUDIT_EVENT_TYPE AuditType
Definition: setypes.h:1115
LUID SeCreateGlobalPrivilege
Definition: setypes.h:1212
LUID_AND_ATTRIBUTES Privilege[INITIAL_PRIVILEGE_COUNT]
Definition: setypes.h:164
LUID SeBackupPrivilege
Definition: setypes.h:1175
PSID SeOwnerRightsSid
Definition: setypes.h:1224
LUID SeIncreaseBasePriorityPrivilege
Definition: setypes.h:1170
PSID SeAliasUsersSid
Definition: setypes.h:1195
enum _MANDATORY_LEVEL MANDATORY_LEVEL
LUID SeSystemtimePrivilege
Definition: setypes.h:1172
$ULONG PrivilegeCount
Definition: setypes.h:1059
struct _SE_ADT_OBJECT_TYPE * PSE_ADT_OBJECT_TYPE
WELL_KNOWN_SID_TYPE
Definition: setypes.h:442
ACCESS_MASK Mask
Definition: ms-dtyp.idl:217
$UCHAR PerUserPolicy[((POLICY_AUDIT_SUBCATEGORY_COUNT) >> 1)+1]
Definition: setypes.h:1039
SECURITY_DESCRIPTOR_CONTROL Control
Definition: setypes.h:804
unsigned short USHORT
Definition: pedump.c:61
PSID SeCreatorOwnerSid
Definition: setypes.h:1186
UNICODE_STRING ObjectName
Definition: setypes.h:1120
LUID SeSyncAgentPrivilege
Definition: setypes.h:1206
struct _PRIVILEGE_SET * PPRIVILEGE_SET
SID_AND_ATTRIBUTES Groups[ANYSIZE_ARRAY]
Definition: setypes.h:983
TOKEN_SOURCE TokenSource
Definition: imports.h:286
#define POLICY_AUDIT_SUBCATEGORY_COUNT
Definition: setypes.h:1036
struct _SECURITY_QUALITY_OF_SERVICE * PSECURITY_QUALITY_OF_SERVICE
struct _ACCESS_DENIED_ACE ACCESS_DENIED_ACE
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: lsa.idl:65
BYTE SubAuthorityCount
Definition: ms-dtyp.idl:200
ULONG AccessReasons[32]
Definition: setypes.h:307
$ULONG * PACCESS_MASK
Definition: setypes.h:9
enum _SE_AUDIT_OPERATION * PSE_AUDIT_OPERATION
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE _In_ ULONG _In_ ULONG _In_opt_ PTOKEN_GROUPS _In_ PTOKEN_SOURCE _Out_ PVOID _Out_ PULONG _Inout_ PLUID LogonId
#define INITIAL_PRIVILEGE_COUNT
Definition: setypes.h:159
ACCESS_MASK Mask
Definition: ms-dtyp.idl:268
ACE_HEADER Header
Definition: ms-dtyp.idl:267
ACCESS_MASK PreviouslyGrantedAccess
Definition: setypes.h:883
LUID_AND_ATTRIBUTES Privileges[ANYSIZE_ARRAY]
Definition: setypes.h:989
ACCESS_MASK Mask
Definition: setypes.h:763
PSID SeUntrustedMandatorySid
Definition: setypes.h:1219
$UCHAR AceType
Definition: setypes.h:698
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
Definition: setypes.h:206
_MANDATORY_LEVEL
Definition: setypes.h:1075
PSID SeNtAuthoritySid
Definition: setypes.h:1188
TOKEN_CONTROL ClientTokenControl
Definition: imports.h:295
LUID SeAuditPrivilege
Definition: setypes.h:1179
PVOID PSID
Definition: setypes.h:12
$ULONG GroupCount
Definition: setypes.h:979
PSID SeRestrictedSid
Definition: setypes.h:1203
LUID_AND_ATTRIBUTES Privilege[ANYSIZE_ARRAY]
Definition: setypes.h:88
ULONG Flags
Definition: setypes.h:217
enum _SE_AUDIT_OPERATION SE_AUDIT_OPERATION
struct _SYSTEM_ALARM_ACE * PSYSTEM_ALARM_ACE
BOOLEAN * PSECURITY_CONTEXT_TRACKING_MODE
Definition: setypes.h:106
$ULONG ACCESS_MASK
Definition: setypes.h:9
LUID SeIncreaseWorkingSetPrivilege
Definition: setypes.h:1215
unsigned int ULONG
Definition: retypes.h:1
ACCESS_MASK * PACCESS_MASK
Definition: nt_native.h:41
LUID TokenId
Definition: imports.h:283
struct _SE_AUDIT_INFO * PSE_AUDIT_INFO
PSID_AND_ATTRIBUTES Sids
Definition: setypes.h:1007
struct _TOKEN_USER * PTOKEN_USER
SID_AND_ATTRIBUTES User
Definition: setypes.h:975
ACCESS_MASK AccessMask
Definition: setypes.h:295
PSID SeLowMandatorySid
Definition: setypes.h:1220
struct _SYSTEM_AUDIT_ACE SYSTEM_AUDIT_ACE
LUID SeIncreaseQuotaPrivilege
Definition: setypes.h:1163
ULONG_PTR * PSID_HASH_ENTRY
Definition: setypes.h:501
SID_IDENTIFIER_AUTHORITY IdentifierAuthority
Definition: ms-dtyp.idl:201
LUID SeTakeOwnershipPrivilege
Definition: setypes.h:1167
LUID SeAssignPrimaryTokenPrivilege
Definition: setypes.h:1161
PSID SeWorldSid
Definition: setypes.h:1184
LUID SeRestorePrivilege
Definition: setypes.h:1176
PSID_AND_ATTRIBUTES RestrictedSids
Definition: setypes.h:1010
$USHORT AceSize
Definition: setypes.h:700
ACCESS_MASK GenericAll
Definition: nt_native.h:568
struct _SE_ADT_OBJECT_TYPE SE_ADT_OBJECT_TYPE
PSID SeLocalSid
Definition: setypes.h:1185
struct _TOKEN_ELEVATION TOKEN_ELEVATION
$ULONG DynamicAvailable
Definition: setypes.h:1057
$UCHAR Revision
Definition: setypes.h:457
BOOLEAN DirectlyAccessClientToken
Definition: imports.h:292
struct _TOKEN_STATISTICS TOKEN_STATISTICS
struct _SECURITY_SUBJECT_CONTEXT * PSECURITY_SUBJECT_CONTEXT
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET _In_ PGENERIC_MAPPING _In_ KPROCESSOR_MODE _Out_ PACCESS_MASK GrantedAccess
Definition: sefuncs.h:13
ACE_HEADER Header
Definition: ms-dtyp.idl:231
struct _TOKEN_SOURCE TOKEN_SOURCE
PVOID Address
Definition: setypes.h:302
struct _SE_AUDIT_INFO SE_AUDIT_INFO
PACCESS_TOKEN ClientToken
Definition: setypes.h:205
PSID SeCreatorGroupSid
Definition: setypes.h:1187
PACCESS_TOKEN Token
Definition: setypes.h:116
LUID SeSystemProfilePrivilege
Definition: setypes.h:1171
struct _SECURITY_CLIENT_CONTEXT * PSECURITY_CLIENT_CONTEXT
LUID SeCreatePagefilePrivilege
Definition: setypes.h:1169
SECURITY_OPERATION_CODE
Definition: setypes.h:157
ULONG ACCESS_MASK
Definition: nt_native.h:40
#define _NTDDK_
struct _TOKEN_PRIMARY_GROUP TOKEN_PRIMARY_GROUP
BOOLEAN SecurityEvaluated
Definition: setypes.h:213
SECURITY_IMPERSONATION_LEVEL Level
Definition: setypes.h:119
$ULONG TokenIsElevated
Definition: setypes.h:1022
PACCESS_TOKEN ClientToken
Definition: imports.h:291
struct _TOKEN_PRIVILEGES * LPTOKEN_PRIVILEGES
PSID SeAliasPrintOpsSid
Definition: setypes.h:1200
$UCHAR AceFlags
Definition: setypes.h:699
BOOLEAN ObjectCreation
Definition: setypes.h:1124
PSID SeLocalSystemSid
Definition: setypes.h:1193
struct _TOKEN_ORIGIN TOKEN_ORIGIN
struct _SECURITY_DESCRIPTOR * PISECURITY_DESCRIPTOR
LUID_AND_ATTRIBUTES LUID_AND_ATTRIBUTES_ARRAY[ANYSIZE_ARRAY]
Definition: setypes.h:79
struct _SE_SECURITY_DESCRIPTOR SE_SECURITY_DESCRIPTOR
enum _ACCESS_REASON_TYPE ACCESS_REASON_TYPE
$USHORT * PSECURITY_DESCRIPTOR_CONTROL
Definition: setypes.h:782
struct _GENERIC_MAPPING GENERIC_MAPPING
SID_AND_ATTRIBUTES SID_AND_ATTRIBUTES_ARRAY[ANYSIZE_ARRAY]
Definition: setypes.h:497
PSID SeInteractiveSid
Definition: setypes.h:1192
LUID SeCreateTokenPrivilege
Definition: setypes.h:1160
ULONG AuditFlags
Definition: setypes.h:1117