 |
HP OpenVMS DCL Dictionary
F$SETPRV
Enables or disables specified user privileges. The F$SETPRV function
returns a list of keywords indicating user privileges; this list shows
the status of the specified privileges before F$SETPRV was executed.
Your process must be authorized to set the specified
privilege.
For detailed information on privilege restrictions, see the description
of the $SETPRV system service in the HP OpenVMS System Services Reference Manual.
Format
F$SETPRV (priv-states)
Return Value
A character string containing keywords for the current process
privileges before they were changed by the F$SETPRV function.
Argument
priv-states
Specifies a character string defining a privilege, or a list of
privileges separated by commas (,).
For a list of process privileges, see the OpenVMS User's Manual.
Description
The lexical function F$SETPRV invokes the $SETPRV system service to
enable or disable specified user privileges. The F$SETPRV function
returns a list of keywords indicating user privileges; this list shows
the status of the specified privileges before F$SETPRV was executed.
The F$SETPRV function returns keywords for your current privileges,
whether or not you are authorized to change the privileges listed in
the priv-states argument; however, the F$SETPRV
function enables or disables only the privileges you are authorized to
change.
When you run programs or execute procedures that include the F$SETPRV
function, be sure that F$SETPRV restores your process to its proper
privileged state. For additional information, see the examples that
follow.
Examples
#1 |
$ OLDPRIV = F$SETPRV("OPER,NOTMPMBX")
$ SHOW SYMBOL OLDPRIV
OLDPRIV = "NOOPER,TMPMBX"
|
In this example, the process is authorized to change the OPER
(operator) and TMPMBX (temporary mailbox) privileges. The F$SETPRV
function enables the OPER privilege and disables the TMPMBX privilege.
In addition, the F$SETPRV function returns the keywords NOOPER and
TMPMBX, showing the state of these privileges before they were changed.
You must place quotation marks (" ") around the list of
privilege keywords because it is a string literal.
#2 |
$ SHOW PROCESS/PRIVILEGE
05-JUN-2001 15:55:09.60 RTA1: User: HELRIEGEL
Process privileges:
Process rights identifiers:
INTERACTIVE
LOCAL
$ NEWPRIVS = F$SETPRV("ALL, NOOPER")
$ SHOW SYMBOL NEWPRIVS
NEWPRIVS = "NOCMKRNL,NOCMEXEC,NOSYSNAM,NOGRPNAM,NOALLSPOOL,
NOIMPERSONATE,NODIAGNOSE,NOLOG_IO,NOGROUP,NOACNT,NOPRMCEB,
NOPRMMBX,NOPSWAPM,NOALTPRI,NOSETPRV,NOTMPMBX,NOWORLD,NOMOUNT,
NOOPER,NOEXQUOTA,NONETMBX,NOVOLPRO,NOPHY_IO,NOBUGCHK,NOPRMGBL,
NOSYSGBL,NOPFNMAP,NOSHMEM,NOSYSPRV,NOBYPASS,NOSYSLCK,NOSHARE,
NOUPGRADE,NODOWNGRADE,NOGRPPRV,NOREADALL,NOSECURITY,OPER"
$ SHOW PROCESS/PRIVILEGE
05-JUN-2001 10:21:18.32 User: INAZU Process ID: 00000F24
Node: TOKNOW Process name: "_FTA23:"
Authorized privileges:
NETMBX SETPRV SYSPRV TMPMBX
Process privileges:
ACNT may suppress accounting messages
ALLSPOOL may allocate spooled device
ALTPRI may set any priority value
AUDIT may direct audit to system security audit log
BUGCHK may make bug check log entries
BYPASS may bypass all object access controls
CMEXEC may change mode to exec
CMKRNL may change mode to kernel
DIAGNOSE may diagnose devices
DOWNGRADE may downgrade object secrecy
EXQUOTA may exceed disk quota
GROUP may affect other processes in same group
GRPNAM may insert in group logical name table
GRPPRV may access group objects via system protection
IMPERSONATE may impersonate another user
IMPORT may set classification for unlabeled object
LOG_IO may do logical i/o
MOUNT may execute mount acp function
NETMBX may create network device
OPER may perform operator functions
PFNMAP may map to specific physical pages
PHY_IO may do physical i/o
PRMCEB may create permanent common event clusters
PRMGBL may create permanent global sections
PRMMBX may create permanent mailbox
PSWAPM may change process swap mode
READALL may read anything as the owner
SECURITY may perform security administration functions
SETPRV may set any privilege bit
SHARE may assign channels to non-shared devices
SHMEM may create/delete objects in shared memory
SYSGBL may create system wide global sections
SYSLCK may lock system wide resources
SYSNAM may insert in system logical name table
SYSPRV may access objects via system protection
TMPMBX may create temporary mailbox
UPGRADE may upgrade object integrity
VOLPRO may override volume protection
WORLD may affect other processes in the world
Process rights:
INTERACTIVE
LOCAL
System rights:
SYS$NODE_TOKNOW
$ NEWPRIVS = F$SETPRV(NEWPRIVS)
$ SHOW PROCESS/PRIVILEGE
05-JUN-2001 16:05:07.23 RTA1: User: JERROM
Process privileges:
OPER operator privilege
Process rights identifiers:
INTERACTIVE
LOCAL
|
In this example, the DCL command SHOW PROCESS/PRIVILEGE is used to
determine the current process privileges. Note that the process has no
privileges enabled.
The F$SETPRV function is then used to process the ALL keyword and
enable all privileges recording the previous state of each privilege in
the symbol NEWPRIVS. Next, F$SETPRV processes the NOOPER keyword and
disables the OPER (operator) privilege, recording the previous state of
OPER in NEWPRIVS. Note that the OPER privilege appears in the returned
string twice: first as NOOPER and then as OPER.
Entering the command SHOW PROCESS/PRIVILEGE now shows that the current
process has all privileges enabled except OPER.
If the returned string is used as the parameter to F$SETPRV, the
process has the OPER privilege enabled. This occurs because the OPER
command was present twice in the symbol NEWPRIVS. As a result, F$SETPRV
looked at the first keyword NOOPER and disabled the privilege. Finally,
after processing several other keywords in the NEWPRIVS string, the
OPER keyword is presented, allowing F$SETPRV to enable the OPER
privilege.
If you are using the ALL or NOALL keywords to save your current
privilege environment, HP recommends that you perform the following
procedure to modify the process for a command procedure:
$ CURRENT_PRIVS = F$SETPRV("ALL")
$ TEMP = F$SETPRV("NOOPER")
|
If you use this procedure, you can then specify the following command
statement at the end of your command procedure so that the original
privilege environment is restored:
$ TEMP = F$SETPRV(CURRENT_PRIVS)
|
#3 |
$ SAVPRIV = F$SETPRV("NOGROUP")
$ SHOW SYMBOL SAVPRIV
SAVPRIV = "GROUP"
$ TEST = F$PRIVILEGE("GROUP")
$ SHOW SYMBOL TEST
TEST = "TRUE"
|
In this example, the process is not authorized to change the GROUP
privilege; however, the F$SETPRV function still returns the current
setting for the GROUP privilege.
The F$PRIVILEGE function is used to see whether the process has GROUP
privilege. The return string, TRUE, indicates that the process has
GROUP privilege, even though the F$SETPRV function attempted to disable
the privilege.
|