{"id":215,"date":"2015-07-21T14:22:57","date_gmt":"2015-07-21T18:22:57","guid":{"rendered":"http:\/\/72.167.111.237\/wpecsdump\/?page_id=215"},"modified":"2020-12-06T23:57:56","modified_gmt":"2020-12-06T23:57:56","slug":"devhlp_security","status":"publish","type":"page","link":"https:\/\/www.ecsdump.net\/?page_id=215","title":{"rendered":"DevHlp_Security"},"content":{"rendered":"<h3>Description<\/h3>\n<p>This is the kernel support for the security enabling services.<\/p>\n<h3>Calling convention<\/h3>\n<p>Subfunction: DHSEC_SETIMPORT<br \/>\nThis function will load the ISS Security Event Service Routine Table into the kernel. Each service routine will be called upon a certain API event, such as opening a file, or starting a program. There are also service routines to capture each <a href=\"https:\/\/en.wikipedia.org\/wiki\/Disk_operating_system\" data-internallinksmanager029f6b8e52c=\"2\" title=\"DOS\" target=\"_blank\" rel=\"noopener\">DOS<\/a> API routine (if you are interested in this, and you are considered trustworthy by me, i.e. well-known in the OS\/2 hacker&#8217;s scene, I can give you code for these rather tricky routines &#8211; collectors and gatherers stay off!).<\/p>\n<ul>\n<li>EAX = 073ae3627h special function key<\/li>\n<li>ECX = FLAT (linear) address of table to be submitted<\/li>\n<li>DL = 044h<\/li>\n<\/ul>\n<p><em>Subfunction: DHSEC_GETEXPORT<\/em><br \/>\nThis function will return the table of security helper functions for file access. These helpers provide low level access to any file in the system which is not controlled by security services (unlike the normal DOS API).<\/p>\n<ul>\n<li>EAX = 048a78df8h special function key<\/li>\n<li>ECX = FLAT (linear) address of a buffer to receive the 40 byte table<\/li>\n<li>DL = 044h<\/li>\n<\/ul>\n<p><em>Subfunction: DHSEC_GETINFO<\/em><br \/>\nInternally used function, information withheld intentionally.<\/p>\n<p><em>Subfunction: DHSEC_AUDITHOOK<\/em><br \/>\nInternally used function, information withheld intentionally.<\/p>\n<p><em>Subfunction: DHSEC_TRUSTEDPATHNOTIFY<\/em><br \/>\nInternally used function, information withheld intentionally.<\/p>\n<p><em>Subfunction: DHSEC_IMPORT_PDF<\/em><br \/>\nSpecial purpose function for an IBM product, information withheld intentionally.<\/p>\n<p><em>Subfunction: DHSEC_IMPORT_AV<\/em><br \/>\nSpecial purpose function for an IBM product, information withheld intentionally.<\/p>\n<h3>Returns<\/h3>\n<ul>\n<li>CY=0, AX = 0, okay<\/li>\n<li>CY=1, AX = APIRET error code<\/li>\n<\/ul>\n<h3>Data structures<\/h3>\n<p>It is beyond the scope of this text to explain all details of SES. Consult the Red Book SG2446-68, also available via DevCon. IBM has decided, as of SG2446-68, appendix A, not to publish the SES KPI. You can ask, according to the Red Book for this documentation at:<\/p>\n<p>IBM Manager of OS\/2 Security<br \/>\nMail Stop 9171<br \/>\n11400 Burnet Rd.<br \/>\nAustin, Texas 78758<br \/>\n(is this address still valid?)<\/p>\n<h3>Restrictions<\/h3>\n<p>Valid at any time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description This is the kernel support for the security enabling services. Calling convention Subfunction: DHSEC_SETIMPORT This function will load the ISS Security Event Service Routine Table into the kernel. Each service routine will be called upon a certain API event, such as opening a file, or starting a program. There are also service routines to&hellip;<\/p>\n<p><a class=\"more-link\" href=\"https:\/\/www.ecsdump.net\/?page_id=215\" title=\"Continue reading &lsquo;DevHlp_Security&rsquo;\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":836,"menu_order":3,"comment_status":"open","ping_status":"open","template":"page-templates\/full-width.php","meta":{"footnotes":""},"categories":[13,10],"tags":[22,28],"wf_page_folders":[76],"class_list":["post-215","page","type-page","status-publish","hentry","category-devhelp","category-os2","tag-devhlp","tag-os2"],"jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=\/wp\/v2\/pages\/215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=215"}],"version-history":[{"count":0,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=\/wp\/v2\/pages\/215\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=\/wp\/v2\/pages\/836"}],"wp:attachment":[{"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=215"},{"taxonomy":"wf_page_folders","embeddable":true,"href":"https:\/\/www.ecsdump.net\/index.php?rest_route=%2Fwp%2Fv2%2Fwf_page_folders&post=215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}