source: other-projects/gs2-export-cdrom-installer/trunk/gsPlatform.cpp@ 21021

Last change on this file since 21021 was 11664, checked in by mdewsnip, 18 years ago

Fixed the line endings... for real this time, I hope.

  • Property svn:keywords set to Author Date Id Revision
File size: 5.1 KB
Line 
1#include "gsPlatform.h"
2
3#define ACCESS_READ 0x01
4#define ACCESS_WRITE 0x02
5
6#include <stdio.h>
7
8gsPlatform::gsPlatform()
9{ this->platformInfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
10 if (!GetVersionEx(&this->platformInfo))
11 {
12 }
13}
14
15bool gsPlatform::isWindows9x()
16{
17 return (this->platformInfo.dwPlatformId == VER_PLATFORM_WIN32_WINDOWS);
18}
19
20bool gsPlatform::isWindowsNT()
21{
22 return (this->platformInfo.dwPlatformId == VER_PLATFORM_WIN32_NT);
23}
24
25bool gsPlatform::isWindows32s()
26{
27 return (this->platformInfo.dwPlatformId == VER_PLATFORM_WIN32s);
28}
29
30bool gsPlatform::isOldWindows32s()
31{
32 if (this->platformInfo.dwMajorVersion == 0 ||
33 this->platformInfo.dwMinorVersion < 30)
34 {
35 return true;
36 }
37 return false;
38}
39
40bool gsPlatform::isExplorerShell()
41{
42 if (this->isWindows9x() ||
43 (this->isWindowsNT() && this->platformInfo.dwMajorVersion >= 4))
44 {
45 return true;
46 }
47 return false;
48}
49
50bool gsPlatform::isUserAdministrator()
51{
52 if (this->isWindowsNT())
53 {
54 HANDLE token;
55 PSID adminId;
56 PACL aclData;
57 PSECURITY_DESCRIPTOR psdAdmin = NULL;
58 SID_IDENTIFIER_AUTHORITY systemSidAuthority = SECURITY_NT_AUTHORITY;
59 GENERIC_MAPPING genericMapping;
60 PRIVILEGE_SET privilegeSet;
61 DWORD aclSize, accessMask, status, structureSize;
62 BOOL result;
63
64 // Get an impersonation token
65 ImpersonateSelf(SecurityImpersonation);
66
67 if (!OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, FALSE, &token))
68 {
69 if (GetLastError() != ERROR_NO_TOKEN)
70 {
71 return false;
72 }
73
74 // if we didn't have an access token, take the process token instead
75 if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &token))
76 {
77 return false;
78 }
79 }
80
81 // By now we have a valid process/thread token; now get information on the
82 // admin group in this domain
83 if (!AllocateAndInitializeSid(&systemSidAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID,
84 DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0,
85 &adminId))
86 {
87 return false;
88 }
89
90 // allocate space for security descriptor
91 psdAdmin = (PSECURITY_DESCRIPTOR) LocalAlloc(LPTR, SECURITY_DESCRIPTOR_MIN_LENGTH);
92 if (psdAdmin == NULL)
93 {
94 return false;
95 }
96
97 // initialise descriptor
98 if (!InitializeSecurityDescriptor(psdAdmin, SECURITY_DESCRIPTOR_REVISION))
99 {
100 return false;
101 }
102
103 // get ACL size and allocate ACL block
104 aclSize = sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + GetLengthSid(adminId) - sizeof(DWORD);
105 aclData = (PACL) LocalAlloc(LPTR, aclSize);
106 if (aclData == NULL)
107 {
108 return false;
109 }
110
111 // initalise the acl block
112 if (!InitializeAcl(aclData, aclSize, ACL_REVISION2))
113 {
114 return false;
115 }
116
117 accessMask = ACCESS_READ | ACCESS_WRITE;
118
119 // try to add the given item to the Access Control Entry (ACE) list (ACL)
120 if (!AddAccessAllowedAce(aclData, ACL_REVISION2, accessMask, adminId))
121 {
122 return false;
123 }
124
125 // endeavour to add the acl to the discretionary acl (DACL)
126 if (!SetSecurityDescriptorDacl(psdAdmin, TRUE, aclData, FALSE))
127 {
128 return false;
129 }
130
131 // endeavour to set the owner/group identification
132 SetSecurityDescriptorGroup(psdAdmin, adminId, FALSE);
133 SetSecurityDescriptorOwner(psdAdmin, adminId, FALSE);
134
135 // right, we've now built up a discretionary acl on the current user,
136 // finally get the generic mapping ready
137 genericMapping.GenericRead = ACCESS_READ;
138 genericMapping.GenericWrite = ACCESS_WRITE;
139 genericMapping.GenericExecute = 0;
140 genericMapping.GenericAll = ACCESS_READ | ACCESS_WRITE;
141
142 structureSize = sizeof(PRIVILEGE_SET);
143
144 // do the actual access check
145 if (!AccessCheck (psdAdmin, token, ACCESS_READ, &genericMapping,
146 &privilegeSet, &structureSize, &status, &result))
147 {
148 return false;
149 }
150
151 // end impersonisation
152 RevertToSelf();
153
154 LocalFree(psdAdmin);
155 LocalFree(aclData);
156 FreeSid(adminId);
157 return (result != 0);
158 }
159 return true;
160}
161
162bool gsPlatform::reboot()
163{
164 // Check for appropriate privileges if this is NT
165 if (this->isWindowsNT())
166 {
167 HANDLE token;
168 TOKEN_PRIVILEGES tkp;
169
170 if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY,
171 &token))
172 {
173 return false;
174 }
175
176 LookupPrivilegeValue(NULL, SE_SHUTDOWN_NAME, &tkp.Privileges[0].Luid);
177
178 tkp.PrivilegeCount = 1; // set one privilege
179 tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
180
181 // Get the actual shutdown privilege
182 AdjustTokenPrivileges(token, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES) NULL, 0);
183
184 // as we can't test a return value on the previous call, use GetLastError
185 if (GetLastError() != ERROR_SUCCESS)
186 {
187 return false;
188 }
189 }
190 return (ExitWindowsEx(EWX_REBOOT | EWX_FORCE, 0) != 0);
191}
192
193string gsPlatform::platformString()
194{
195 if (this->isWindowsNT())
196 {
197 return gsPlatform_WINDOWSNT;
198 }
199 else if (this->isWindows9x())
200 {
201 return gsPlatform_WINDOWS9X;
202 }
203 else if (this->isWindows32s())
204 {
205 return gsPlatform_WINDOWS32S;
206 }
207 else
208 {
209 return gsPlatform_WINDOWS;
210 }
211}
Note: See TracBrowser for help on using the repository browser.