Code:
/ Net / Net / 3.5.50727.3053 / DEVDIV / depot / DevDiv / releases / whidbey / netfxsp / ndp / clr / src / BCL / System / Security / AccessControl / Win32.cs / 1 / Win32.cs
using Microsoft.Win32; using Microsoft.Win32.SafeHandles; using System; using System.Collections; using System.Runtime.CompilerServices; using System.Runtime.InteropServices; using System.Runtime.Versioning; using System.Security; using System.Security.Permissions; using System.Security.Principal; namespace System.Security.AccessControl { internal static class Win32 { internal const System.Int32 TRUE = 1; private static bool _isConversionSupported; static Win32() { // // SDDL-to-binary conversion only supported on W2K, XP and above // Win32Native.OSVERSIONINFO osvi = new Win32Native.OSVERSIONINFO(); if ( !Win32Native.GetVersionEx( osvi )) { BCLDebug.Assert( false, "OSVersion native call failed" ); throw new SystemException( Environment.GetResourceString( "InvalidOperation_GetVersion" )); } if ( osvi.PlatformId == Win32Native.VER_PLATFORM_WIN32_NT && osvi.MajorVersion >= 5 ) { _isConversionSupported = true; } else { _isConversionSupported = false; } } internal static bool IsSddlConversionSupported() { return _isConversionSupported; } internal static bool IsLsaPolicySupported() { return _isConversionSupported; } // // Wrapper around advapi32.ConvertSecurityDescriptorToStringSecurityDescriptorW // [SecurityPermission( SecurityAction.Assert, UnmanagedCode=true )] internal static int ConvertSdToSddl( byte[] binaryForm, int requestedRevision, SecurityInfos si, out string resultSddl ) { int errorCode; IntPtr ByteArray; uint ByteArraySize = 0; if ( !IsSddlConversionSupported()) { throw new PlatformNotSupportedException( Environment.GetResourceString( "PlatformNotSupported_Win9x" )); } if ( TRUE != Win32Native.ConvertSdToStringSd( binaryForm, ( uint )requestedRevision, ( uint )si, out ByteArray, ref ByteArraySize )) { errorCode = Marshal.GetLastWin32Error(); goto Error; } // // Extract data from the returned pointer // resultSddl = Marshal.PtrToStringUni( ByteArray ); // // Now is a good time to get rid of the returned pointer // Win32Native.LocalFree( ByteArray ); return 0; Error: resultSddl = null; if ( errorCode == Win32Native.ERROR_NOT_ENOUGH_MEMORY ) { throw new OutOfMemoryException(); } return errorCode; } // // Wrapper around advapi32.GetSecurityInfo // internal static int GetSecurityInfo( ResourceType resourceType, string name, SafeHandle handle, AccessControlSections accessControlSections, out RawSecurityDescriptor resultSd ) { resultSd = null; if (!IsLsaPolicySupported()) { throw new PlatformNotSupportedException( Environment.GetResourceString( "PlatformNotSupported_RequiresNT" )); } // // Demand unmanaged code permission // The integrator layer is free to assert this permission // and, in turn, demand another permission of its caller // new SecurityPermission( SecurityPermissionFlag.UnmanagedCode ).Demand(); int errorCode; IntPtr SidOwner, SidGroup, Dacl, Sacl, ByteArray; SecurityInfos SecurityInfos = 0; Privilege privilege = null; if (( accessControlSections & AccessControlSections.Owner ) != 0 ) { SecurityInfos |= SecurityInfos.Owner; } if (( accessControlSections & AccessControlSections.Group ) != 0 ) { SecurityInfos |= SecurityInfos.Group; } if (( accessControlSections & AccessControlSections.Access ) != 0 ) { SecurityInfos |= SecurityInfos.DiscretionaryAcl; } if (( accessControlSections & AccessControlSections.Audit ) != 0 ) { SecurityInfos |= SecurityInfos.SystemAcl; privilege = new Privilege( Privilege.Security ); } // Ensure that the finally block will execute RuntimeHelpers.PrepareConstrainedRegions(); try { if ( privilege != null ) { try { privilege.Enable(); } catch (PrivilegeNotHeldException) { // we will ignore this exception and press on just in case this is a remote resource } } if ( name != null ) { errorCode = ( int )Win32Native.GetSecurityInfoByName( name, ( uint )resourceType, ( uint )SecurityInfos, out SidOwner, out SidGroup, out Dacl, out Sacl, out ByteArray ); } else if (handle != null) { if (handle.IsInvalid) { throw new ArgumentException( Environment.GetResourceString( "Argument_InvalidSafeHandle" ), "handle" ); } else { errorCode = ( int )Win32Native.GetSecurityInfoByHandle( handle, ( uint )resourceType, ( uint )SecurityInfos, out SidOwner, out SidGroup, out Dacl, out Sacl, out ByteArray ); } } else { // both are null, shouldn't happen throw new SystemException(); } if ( errorCode == Win32Native.ERROR_SUCCESS && IntPtr.Zero.Equals(ByteArray) ) { // // This means that the object doesn't have a security descriptor. And thus we throw // a specific exception for the caller to catch and handle properly. // throw new InvalidOperationException(Environment.GetResourceString( "InvalidOperation_NoSecurityDescriptor" )); } else if (errorCode == Win32Native.ERROR_NOT_ALL_ASSIGNED || errorCode == Win32Native.ERROR_PRIVILEGE_NOT_HELD) { throw new PrivilegeNotHeldException( Privilege.Security ); } else if ( errorCode == Win32Native.ERROR_ACCESS_DENIED || errorCode == Win32Native.ERROR_CANT_OPEN_ANONYMOUS ) { throw new UnauthorizedAccessException(); } if ( errorCode != Win32Native.ERROR_SUCCESS ) { goto Error; } } catch { // protection against exception filter-based luring attacks if ( privilege != null ) { privilege.Revert(); } throw; } finally { if ( privilege != null ) { privilege.Revert(); } } // // Extract data from the returned pointer // uint Length = Win32Native.GetSecurityDescriptorLength( ByteArray ); byte[] BinaryForm = new byte[Length]; Marshal.Copy( ByteArray, BinaryForm, 0, ( int )Length ); Win32Native.LocalFree( ByteArray ); resultSd = new RawSecurityDescriptor( BinaryForm, 0 ); return Win32Native.ERROR_SUCCESS; Error: if ( errorCode == Win32Native.ERROR_NOT_ENOUGH_MEMORY ) { throw new OutOfMemoryException(); } return errorCode; } // // Wrapper around advapi32.SetNamedSecurityInfoW and advapi32.SetSecurityInfo // [ResourceExposure(ResourceScope.Machine)] [ResourceConsumption(ResourceScope.Machine)] internal static int SetSecurityInfo( ResourceType type, string name, SafeHandle handle, SecurityInfos securityInformation, SecurityIdentifier owner, SecurityIdentifier group, GenericAcl sacl, GenericAcl dacl ) { if (!IsLsaPolicySupported()) { throw new PlatformNotSupportedException( Environment.GetResourceString( "PlatformNotSupported_RequiresNT" )); } int errorCode; int Length; byte[] OwnerBinary = null, GroupBinary = null, SaclBinary = null, DaclBinary = null; Privilege securityPrivilege = null; // // Demand unmanaged code permission // The integrator layer is free to assert this permission // and, in turn, demand another permission of its caller // new SecurityPermission( SecurityPermissionFlag.UnmanagedCode ).Demand(); if ( owner != null ) { Length = owner.BinaryLength; OwnerBinary = new byte[Length]; owner.GetBinaryForm( OwnerBinary, 0 ); } if ( group != null ) { Length = group.BinaryLength; GroupBinary = new byte[Length]; group.GetBinaryForm( GroupBinary, 0 ); } if ( dacl != null ) { Length = dacl.BinaryLength; DaclBinary = new byte[Length]; dacl.GetBinaryForm( DaclBinary, 0 ); } if ( sacl != null ) { Length = sacl.BinaryLength; SaclBinary = new byte[Length]; sacl.GetBinaryForm( SaclBinary, 0 ); } if ( ( securityInformation & SecurityInfos.SystemAcl ) != 0 ) { // // Enable security privilege if trying to set a SACL. // Note: even setting it by handle needs this privilege enabled! // securityPrivilege = new Privilege( Privilege.Security ); } // Ensure that the finally block will execute RuntimeHelpers.PrepareConstrainedRegions(); try { if ( securityPrivilege != null ) { try { securityPrivilege.Enable(); } catch (PrivilegeNotHeldException) { // we will ignore this exception and press on just in case this is a remote resource } } if ( name != null ) { errorCode = ( int )Win32Native.SetSecurityInfoByName( name, ( uint )type, ( uint )securityInformation, OwnerBinary, GroupBinary, DaclBinary, SaclBinary ); } else if (handle != null) { if (handle.IsInvalid) { throw new ArgumentException( Environment.GetResourceString( "Argument_InvalidSafeHandle" ), "handle" ); } else { errorCode = ( int )Win32Native.SetSecurityInfoByHandle( handle, ( uint )type, ( uint )securityInformation, OwnerBinary, GroupBinary, DaclBinary, SaclBinary ); } } else { // both are null, shouldn't happen BCLDebug.Assert( false, "Internal error: both name and handle are null" ); throw new InvalidProgramException(); } if (errorCode == Win32Native.ERROR_NOT_ALL_ASSIGNED || errorCode == Win32Native.ERROR_PRIVILEGE_NOT_HELD) { throw new PrivilegeNotHeldException( Privilege.Security ); } else if ( errorCode == Win32Native.ERROR_ACCESS_DENIED || errorCode == Win32Native.ERROR_CANT_OPEN_ANONYMOUS ) { throw new UnauthorizedAccessException(); } else if ( errorCode != Win32Native.ERROR_SUCCESS ) { goto Error; } } catch { // protection against exception filter-based luring attacks if ( securityPrivilege != null ) { securityPrivilege.Revert(); } throw; } finally { if ( securityPrivilege != null ) { securityPrivilege.Revert(); } } return 0; Error: if ( errorCode == Win32Native.ERROR_NOT_ENOUGH_MEMORY ) { throw new OutOfMemoryException(); } return errorCode; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved. using Microsoft.Win32; using Microsoft.Win32.SafeHandles; using System; using System.Collections; using System.Runtime.CompilerServices; using System.Runtime.InteropServices; using System.Runtime.Versioning; using System.Security; using System.Security.Permissions; using System.Security.Principal; namespace System.Security.AccessControl { internal static class Win32 { internal const System.Int32 TRUE = 1; private static bool _isConversionSupported; static Win32() { // // SDDL-to-binary conversion only supported on W2K, XP and above // Win32Native.OSVERSIONINFO osvi = new Win32Native.OSVERSIONINFO(); if ( !Win32Native.GetVersionEx( osvi )) { BCLDebug.Assert( false, "OSVersion native call failed" ); throw new SystemException( Environment.GetResourceString( "InvalidOperation_GetVersion" )); } if ( osvi.PlatformId == Win32Native.VER_PLATFORM_WIN32_NT && osvi.MajorVersion >= 5 ) { _isConversionSupported = true; } else { _isConversionSupported = false; } } internal static bool IsSddlConversionSupported() { return _isConversionSupported; } internal static bool IsLsaPolicySupported() { return _isConversionSupported; } // // Wrapper around advapi32.ConvertSecurityDescriptorToStringSecurityDescriptorW // [SecurityPermission( SecurityAction.Assert, UnmanagedCode=true )] internal static int ConvertSdToSddl( byte[] binaryForm, int requestedRevision, SecurityInfos si, out string resultSddl ) { int errorCode; IntPtr ByteArray; uint ByteArraySize = 0; if ( !IsSddlConversionSupported()) { throw new PlatformNotSupportedException( Environment.GetResourceString( "PlatformNotSupported_Win9x" )); } if ( TRUE != Win32Native.ConvertSdToStringSd( binaryForm, ( uint )requestedRevision, ( uint )si, out ByteArray, ref ByteArraySize )) { errorCode = Marshal.GetLastWin32Error(); goto Error; } // // Extract data from the returned pointer // resultSddl = Marshal.PtrToStringUni( ByteArray ); // // Now is a good time to get rid of the returned pointer // Win32Native.LocalFree( ByteArray ); return 0; Error: resultSddl = null; if ( errorCode == Win32Native.ERROR_NOT_ENOUGH_MEMORY ) { throw new OutOfMemoryException(); } return errorCode; } // // Wrapper around advapi32.GetSecurityInfo // internal static int GetSecurityInfo( ResourceType resourceType, string name, SafeHandle handle, AccessControlSections accessControlSections, out RawSecurityDescriptor resultSd ) { resultSd = null; if (!IsLsaPolicySupported()) { throw new PlatformNotSupportedException( Environment.GetResourceString( "PlatformNotSupported_RequiresNT" )); } // // Demand unmanaged code permission // The integrator layer is free to assert this permission // and, in turn, demand another permission of its caller // new SecurityPermission( SecurityPermissionFlag.UnmanagedCode ).Demand(); int errorCode; IntPtr SidOwner, SidGroup, Dacl, Sacl, ByteArray; SecurityInfos SecurityInfos = 0; Privilege privilege = null; if (( accessControlSections & AccessControlSections.Owner ) != 0 ) { SecurityInfos |= SecurityInfos.Owner; } if (( accessControlSections & AccessControlSections.Group ) != 0 ) { SecurityInfos |= SecurityInfos.Group; } if (( accessControlSections & AccessControlSections.Access ) != 0 ) { SecurityInfos |= SecurityInfos.DiscretionaryAcl; } if (( accessControlSections & AccessControlSections.Audit ) != 0 ) { SecurityInfos |= SecurityInfos.SystemAcl; privilege = new Privilege( Privilege.Security ); } // Ensure that the finally block will execute RuntimeHelpers.PrepareConstrainedRegions(); try { if ( privilege != null ) { try { privilege.Enable(); } catch (PrivilegeNotHeldException) { // we will ignore this exception and press on just in case this is a remote resource } } if ( name != null ) { errorCode = ( int )Win32Native.GetSecurityInfoByName( name, ( uint )resourceType, ( uint )SecurityInfos, out SidOwner, out SidGroup, out Dacl, out Sacl, out ByteArray ); } else if (handle != null) { if (handle.IsInvalid) { throw new ArgumentException( Environment.GetResourceString( "Argument_InvalidSafeHandle" ), "handle" ); } else { errorCode = ( int )Win32Native.GetSecurityInfoByHandle( handle, ( uint )resourceType, ( uint )SecurityInfos, out SidOwner, out SidGroup, out Dacl, out Sacl, out ByteArray ); } } else { // both are null, shouldn't happen throw new SystemException(); } if ( errorCode == Win32Native.ERROR_SUCCESS && IntPtr.Zero.Equals(ByteArray) ) { // // This means that the object doesn't have a security descriptor. And thus we throw // a specific exception for the caller to catch and handle properly. // throw new InvalidOperationException(Environment.GetResourceString( "InvalidOperation_NoSecurityDescriptor" )); } else if (errorCode == Win32Native.ERROR_NOT_ALL_ASSIGNED || errorCode == Win32Native.ERROR_PRIVILEGE_NOT_HELD) { throw new PrivilegeNotHeldException( Privilege.Security ); } else if ( errorCode == Win32Native.ERROR_ACCESS_DENIED || errorCode == Win32Native.ERROR_CANT_OPEN_ANONYMOUS ) { throw new UnauthorizedAccessException(); } if ( errorCode != Win32Native.ERROR_SUCCESS ) { goto Error; } } catch { // protection against exception filter-based luring attacks if ( privilege != null ) { privilege.Revert(); } throw; } finally { if ( privilege != null ) { privilege.Revert(); } } // // Extract data from the returned pointer // uint Length = Win32Native.GetSecurityDescriptorLength( ByteArray ); byte[] BinaryForm = new byte[Length]; Marshal.Copy( ByteArray, BinaryForm, 0, ( int )Length ); Win32Native.LocalFree( ByteArray ); resultSd = new RawSecurityDescriptor( BinaryForm, 0 ); return Win32Native.ERROR_SUCCESS; Error: if ( errorCode == Win32Native.ERROR_NOT_ENOUGH_MEMORY ) { throw new OutOfMemoryException(); } return errorCode; } // // Wrapper around advapi32.SetNamedSecurityInfoW and advapi32.SetSecurityInfo // [ResourceExposure(ResourceScope.Machine)] [ResourceConsumption(ResourceScope.Machine)] internal static int SetSecurityInfo( ResourceType type, string name, SafeHandle handle, SecurityInfos securityInformation, SecurityIdentifier owner, SecurityIdentifier group, GenericAcl sacl, GenericAcl dacl ) { if (!IsLsaPolicySupported()) { throw new PlatformNotSupportedException( Environment.GetResourceString( "PlatformNotSupported_RequiresNT" )); } int errorCode; int Length; byte[] OwnerBinary = null, GroupBinary = null, SaclBinary = null, DaclBinary = null; Privilege securityPrivilege = null; // // Demand unmanaged code permission // The integrator layer is free to assert this permission // and, in turn, demand another permission of its caller // new SecurityPermission( SecurityPermissionFlag.UnmanagedCode ).Demand(); if ( owner != null ) { Length = owner.BinaryLength; OwnerBinary = new byte[Length]; owner.GetBinaryForm( OwnerBinary, 0 ); } if ( group != null ) { Length = group.BinaryLength; GroupBinary = new byte[Length]; group.GetBinaryForm( GroupBinary, 0 ); } if ( dacl != null ) { Length = dacl.BinaryLength; DaclBinary = new byte[Length]; dacl.GetBinaryForm( DaclBinary, 0 ); } if ( sacl != null ) { Length = sacl.BinaryLength; SaclBinary = new byte[Length]; sacl.GetBinaryForm( SaclBinary, 0 ); } if ( ( securityInformation & SecurityInfos.SystemAcl ) != 0 ) { // // Enable security privilege if trying to set a SACL. // Note: even setting it by handle needs this privilege enabled! // securityPrivilege = new Privilege( Privilege.Security ); } // Ensure that the finally block will execute RuntimeHelpers.PrepareConstrainedRegions(); try { if ( securityPrivilege != null ) { try { securityPrivilege.Enable(); } catch (PrivilegeNotHeldException) { // we will ignore this exception and press on just in case this is a remote resource } } if ( name != null ) { errorCode = ( int )Win32Native.SetSecurityInfoByName( name, ( uint )type, ( uint )securityInformation, OwnerBinary, GroupBinary, DaclBinary, SaclBinary ); } else if (handle != null) { if (handle.IsInvalid) { throw new ArgumentException( Environment.GetResourceString( "Argument_InvalidSafeHandle" ), "handle" ); } else { errorCode = ( int )Win32Native.SetSecurityInfoByHandle( handle, ( uint )type, ( uint )securityInformation, OwnerBinary, GroupBinary, DaclBinary, SaclBinary ); } } else { // both are null, shouldn't happen BCLDebug.Assert( false, "Internal error: both name and handle are null" ); throw new InvalidProgramException(); } if (errorCode == Win32Native.ERROR_NOT_ALL_ASSIGNED || errorCode == Win32Native.ERROR_PRIVILEGE_NOT_HELD) { throw new PrivilegeNotHeldException( Privilege.Security ); } else if ( errorCode == Win32Native.ERROR_ACCESS_DENIED || errorCode == Win32Native.ERROR_CANT_OPEN_ANONYMOUS ) { throw new UnauthorizedAccessException(); } else if ( errorCode != Win32Native.ERROR_SUCCESS ) { goto Error; } } catch { // protection against exception filter-based luring attacks if ( securityPrivilege != null ) { securityPrivilege.Revert(); } throw; } finally { if ( securityPrivilege != null ) { securityPrivilege.Revert(); } } return 0; Error: if ( errorCode == Win32Native.ERROR_NOT_ENOUGH_MEMORY ) { throw new OutOfMemoryException(); } return errorCode; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- MembershipValidatePasswordEventArgs.cs
- EasingKeyFrames.cs
- CharAnimationUsingKeyFrames.cs
- InputBindingCollection.cs
- DesignRelation.cs
- WindowClosedEventArgs.cs
- TemplateContentLoader.cs
- CorePropertiesFilter.cs
- XmlQualifiedName.cs
- assemblycache.cs
- DataObjectPastingEventArgs.cs
- TextServicesPropertyRanges.cs
- XmlSchemaDocumentation.cs
- BindableTemplateBuilder.cs
- WorkflowRuntimeSection.cs
- XmlSchemaSimpleContent.cs
- XmlQualifiedName.cs
- IPGlobalProperties.cs
- CacheEntry.cs
- iisPickupDirectory.cs
- AesManaged.cs
- WebBrowserPermission.cs
- NodeFunctions.cs
- AccessedThroughPropertyAttribute.cs
- OrderedHashRepartitionEnumerator.cs
- ForeignKeyConstraint.cs
- CreateUserWizardDesigner.cs
- HtmlEncodedRawTextWriter.cs
- HitTestResult.cs
- cookie.cs
- TakeOrSkipQueryOperator.cs
- FrugalList.cs
- CancelEventArgs.cs
- ResponseStream.cs
- Header.cs
- OleDbDataAdapter.cs
- SHA256Managed.cs
- Transform.cs
- CacheRequest.cs
- LocalizableResourceBuilder.cs
- Base64Encoder.cs
- CodeGroup.cs
- DataViewSetting.cs
- XmlSchemaSubstitutionGroup.cs
- MailAddressCollection.cs
- XmlSerializerAssemblyAttribute.cs
- IndexedString.cs
- DashStyle.cs
- ToolStripMenuItem.cs
- NamespaceQuery.cs
- IItemProperties.cs
- RectangleGeometry.cs
- AccessDataSourceView.cs
- TreeNodeCollection.cs
- RsaSecurityKey.cs
- ClassHandlersStore.cs
- ArgumentNullException.cs
- LingerOption.cs
- TdsParserStateObject.cs
- ArraySubsetEnumerator.cs
- SecurityPolicySection.cs
- DeobfuscatingStream.cs
- UIAgentCrashedException.cs
- CachedCompositeFamily.cs
- CqlErrorHelper.cs
- BindingNavigatorDesigner.cs
- ButtonBaseAutomationPeer.cs
- SharedUtils.cs
- RangeExpression.cs
- EntityType.cs
- GeneralTransform3DGroup.cs
- Vector3dCollection.cs
- XmlChildEnumerator.cs
- VectorCollectionConverter.cs
- HttpHandlerActionCollection.cs
- DataSourceXmlSubItemAttribute.cs
- BinaryUtilClasses.cs
- WebBrowserPermission.cs
- EdmTypeAttribute.cs
- PrintPreviewGraphics.cs
- UntypedNullExpression.cs
- BindingMAnagerBase.cs
- NegatedCellConstant.cs
- MetadataStore.cs
- HttpServerUtilityWrapper.cs
- ButtonBase.cs
- SerializationObjectManager.cs
- ContentFileHelper.cs
- GPPOINT.cs
- TileModeValidation.cs
- WindowsStartMenu.cs
- ZipIOLocalFileBlock.cs
- COM2FontConverter.cs
- HexParser.cs
- EditCommandColumn.cs
- ProviderCommandInfoUtils.cs
- Decimal.cs
- UnmanagedMarshal.cs
- Pen.cs
- PathSegment.cs