2007-06-14 15:29:35 +04:00
/*
Unix SMB / CIFS implementation .
Privileges handling functions
Copyright ( C ) Jean François Micouleau 1998 - 2001
Copyright ( C ) Simo Sorce 2002 - 2003
Copyright ( C ) Gerald ( Jerry ) Carter 2005
Copyright ( C ) Michael Adam 2007
2010-08-26 12:38:16 +04:00
Copyright ( C ) Andrew Bartlett 2010
2010-08-27 03:35:55 +04:00
Copyright ( C ) Andrew Tridgell 2004
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2007-06-14 15:29:35 +04:00
( at your option ) any later version .
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2007-06-14 15:29:35 +04:00
*/
/*
2009-05-16 03:21:08 +04:00
* Basic privileges functions ( mask - operations and conversion
2007-06-14 15:29:35 +04:00
* functions between the different formats ( se_priv , privset , luid )
* moved here * from lib / privileges . c to minimize linker deps .
*
* generally SID - and LUID - related code is left in lib / privileges . c
*
* some extra functions to hide privs array from lib / privileges . c
*/
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
# include "includes.h"
2010-08-27 03:35:55 +04:00
# include "libcli/security/privileges.h"
# include "librpc/gen_ndr/security.h"
/* The use of strcasecmp here is safe, all the comparison strings are ASCII */
# undef strcasecmp
2007-06-14 15:29:35 +04:00
2010-08-26 08:37:00 +04:00
const uint64_t se_priv_all = SE_ALL_PRIVS ;
2007-06-14 15:29:35 +04:00
/* Define variables for all privileges so we can use the
2010-08-26 08:37:00 +04:00
uint64_t * in the various se_priv_XXX ( ) functions */
2007-06-14 15:29:35 +04:00
2010-08-26 08:37:00 +04:00
const uint64_t se_priv_none = SE_NONE ;
const uint64_t se_machine_account = SE_MACHINE_ACCOUNT ;
const uint64_t se_print_operator = SE_PRINT_OPERATOR ;
const uint64_t se_add_users = SE_ADD_USERS ;
const uint64_t se_disk_operators = SE_DISK_OPERATOR ;
const uint64_t se_remote_shutdown = SE_REMOTE_SHUTDOWN ;
const uint64_t se_restore = SE_RESTORE ;
const uint64_t se_take_ownership = SE_TAKE_OWNERSHIP ;
2007-06-14 15:29:35 +04:00
2010-08-27 05:52:51 +04:00
# define NUM_SHORT_LIST_PRIVS 8
2010-08-27 06:19:09 +04:00
static const struct {
enum sec_privilege luid ;
uint64_t privilege_mask ;
const char * name ;
const char * description ;
} privs [ ] = {
2010-08-27 05:56:37 +04:00
2010-08-27 04:21:13 +04:00
{ SEC_PRIV_MACHINE_ACCOUNT , SE_MACHINE_ACCOUNT , " SeMachineAccountPrivilege " , " Add machines to domain " } ,
{ SEC_PRIV_TAKE_OWNERSHIP , SE_TAKE_OWNERSHIP , " SeTakeOwnershipPrivilege " , " Take ownership of files or other objects " } ,
{ SEC_PRIV_BACKUP , SE_BACKUP , " SeBackupPrivilege " , " Back up files and directories " } ,
{ SEC_PRIV_RESTORE , SE_RESTORE , " SeRestorePrivilege " , " Restore files and directories " } ,
{ SEC_PRIV_REMOTE_SHUTDOWN , SE_REMOTE_SHUTDOWN , " SeRemoteShutdownPrivilege " , " Force shutdown from a remote system " } ,
2010-08-26 10:02:12 +04:00
2010-08-27 04:21:13 +04:00
{ SEC_PRIV_PRINT_OPERATOR , SE_PRINT_OPERATOR , " SePrintOperatorPrivilege " , " Manage printers " } ,
{ SEC_PRIV_ADD_USERS , SE_ADD_USERS , " SeAddUsersPrivilege " , " Add users and groups to the domain " } ,
{ SEC_PRIV_DISK_OPERATOR , SE_DISK_OPERATOR , " SeDiskOperatorPrivilege " , " Manage disk shares " } ,
2007-06-14 15:29:35 +04:00
2010-08-27 05:56:37 +04:00
/* The list from here on was not displayed in the code from
* source3 / with the comment that usrmgr will display these
* next 2 twice if you include them . The source4 / code has
* always included them , but they do not appear in Windows
* 2008 R2 .
Finally , the parameter ' short_list ' determines if the short
or full list ( including many other privileges ) is used */
{ SEC_PRIV_SECURITY ,
SE_SECURITY ,
" SeSecurityPrivilege " ,
" System security " } ,
{ SEC_PRIV_SYSTEMTIME ,
SE_SYSTEMTIME ,
" SeSystemtimePrivilege " ,
" Set the system clock " } ,
{ SEC_PRIV_SHUTDOWN ,
SE_SHUTDOWN ,
" SeShutdownPrivilege " ,
" Shutdown the system " } ,
{ SEC_PRIV_DEBUG ,
SE_DEBUG ,
" SeDebugPrivilege " ,
" Debug processes " } ,
{ SEC_PRIV_SYSTEM_ENVIRONMENT ,
SE_SYSTEM_ENVIRONMENT ,
" SeSystemEnvironmentPrivilege " ,
" Modify system environment " } ,
{ SEC_PRIV_SYSTEM_PROFILE ,
SE_SYSTEM_PROFILE ,
" SeSystemProfilePrivilege " ,
" Profile the system " } ,
{ SEC_PRIV_PROFILE_SINGLE_PROCESS ,
SE_PROFILE_SINGLE_PROCESS ,
" SeProfileSingleProcessPrivilege " ,
" Profile one process " } ,
{ SEC_PRIV_INCREASE_BASE_PRIORITY ,
SE_INCREASE_BASE_PRIORITY ,
" SeIncreaseBasePriorityPrivilege " ,
" Increase base priority " } ,
{ SEC_PRIV_LOAD_DRIVER ,
SE_LOAD_DRIVER ,
" SeLoadDriverPrivilege " ,
" Load drivers " } ,
{ SEC_PRIV_CREATE_PAGEFILE ,
SE_CREATE_PAGEFILE ,
" SeCreatePagefilePrivilege " ,
" Create page files " } ,
{ SEC_PRIV_INCREASE_QUOTA ,
SE_INCREASE_QUOTA ,
" SeIncreaseQuotaPrivilege " ,
" Increase quota " } ,
{ SEC_PRIV_CHANGE_NOTIFY ,
SE_CHANGE_NOTIFY ,
" SeChangeNotifyPrivilege " ,
" Register for change notify " } ,
{ SEC_PRIV_UNDOCK ,
SE_UNDOCK ,
" SeUndockPrivilege " ,
" Undock devices " } ,
{ SEC_PRIV_MANAGE_VOLUME ,
SE_MANAGE_VOLUME ,
" SeManageVolumePrivilege " ,
" Manage system volumes " } ,
{ SEC_PRIV_IMPERSONATE ,
SE_IMPERSONATE ,
" SeImpersonatePrivilege " ,
" Impersonate users " } ,
{ SEC_PRIV_CREATE_GLOBAL ,
SE_CREATE_GLOBAL ,
" SeCreateGlobalPrivilege " ,
" Create global " } ,
{ SEC_PRIV_ENABLE_DELEGATION ,
SE_ENABLE_DELEGATION ,
" SeEnableDelegationPrivilege " ,
" Enable Delegation " } ,
{ SEC_PRIV_INTERACTIVE_LOGON ,
SE_INTERACTIVE_LOGON ,
" SeInteractiveLogonRight " ,
" Interactive logon " } ,
{ SEC_PRIV_NETWORK_LOGON ,
SE_NETWORK_LOGON ,
" SeNetworkLogonRight " ,
" Network logon " } ,
{ SEC_PRIV_REMOTE_INTERACTIVE_LOGON ,
SE_REMOTE_INTERACTIVE_LOGON ,
" SeRemoteInteractiveLogonRight " ,
" Remote Interactive logon " }
2007-06-14 15:29:35 +04:00
} ;
/***************************************************************************
2010-08-27 04:30:18 +04:00
copy an uint64_t privilege bitmap
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 08:37:00 +04:00
bool se_priv_copy ( uint64_t * dst , const uint64_t * src )
2007-06-14 15:29:35 +04:00
{
if ( ! dst | | ! src )
2010-08-27 03:41:32 +04:00
return false ;
2009-05-16 03:21:08 +04:00
2010-08-27 05:26:20 +04:00
* dst = * src ;
2009-05-16 03:21:08 +04:00
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
/***************************************************************************
2010-08-27 04:30:18 +04:00
put all valid privileges into a mask
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
bool se_priv_put_all_privileges ( uint64_t * privilege_mask )
2007-06-14 15:29:35 +04:00
{
int i ;
2010-08-27 04:52:38 +04:00
uint32_t num_privs = ARRAY_SIZE ( privs ) ;
2007-06-14 15:29:35 +04:00
2010-08-26 16:30:26 +04:00
if ( ! se_priv_copy ( privilege_mask , & se_priv_none ) ) {
2010-08-27 03:41:32 +04:00
return false ;
2007-06-14 15:29:35 +04:00
}
for ( i = 0 ; i < num_privs ; i + + ) {
2010-08-26 16:49:27 +04:00
se_priv_add ( privilege_mask , & privs [ i ] . privilege_mask ) ;
2007-06-14 15:29:35 +04:00
}
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
/***************************************************************************
2010-08-27 04:30:18 +04:00
combine 2 uint64_t privilege bitmaps and store the resulting set in new_mask
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
void se_priv_add ( uint64_t * privilege_mask , const uint64_t * addpriv )
2007-06-14 15:29:35 +04:00
{
2010-08-26 16:30:26 +04:00
* privilege_mask | = * addpriv ;
2007-06-14 15:29:35 +04:00
}
/***************************************************************************
2010-08-27 04:30:18 +04:00
remove one uint64_t privileges bitmap from another and store the resulting set
in privilege_mask
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
void se_priv_remove ( uint64_t * privilege_mask , const uint64_t * removepriv )
2009-05-16 03:21:08 +04:00
{
2010-08-26 16:30:26 +04:00
* privilege_mask & = ~ * removepriv ;
2007-06-14 15:29:35 +04:00
}
/***************************************************************************
2010-08-26 08:37:00 +04:00
invert a given uint64_t and store the set in new_mask
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
static void se_priv_invert ( uint64_t * new_mask , const uint64_t * privilege_mask )
2009-05-16 03:21:08 +04:00
{
2010-08-26 08:37:00 +04:00
uint64_t allprivs ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
se_priv_copy ( & allprivs , & se_priv_all ) ;
2010-08-26 16:30:26 +04:00
se_priv_remove ( & allprivs , privilege_mask ) ;
2007-06-14 15:29:35 +04:00
se_priv_copy ( new_mask , & allprivs ) ;
}
/***************************************************************************
2010-08-27 04:30:18 +04:00
check if 2 privilege bitmaps ( as uint64_t ) are equal
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
bool se_priv_equal ( const uint64_t * privilege_mask1 , const uint64_t * privilege_mask2 )
2009-05-16 03:21:08 +04:00
{
2010-08-26 16:30:26 +04:00
return * privilege_mask1 = = * privilege_mask2 ;
2007-06-14 15:29:35 +04:00
}
/***************************************************************************
2010-08-26 08:37:00 +04:00
check if a uint64_t has any assigned privileges
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
static bool se_priv_empty ( const uint64_t * privilege_mask )
2007-06-14 15:29:35 +04:00
{
2010-08-26 08:37:00 +04:00
uint64_t p1 ;
2009-05-16 03:21:08 +04:00
2010-08-26 16:30:26 +04:00
se_priv_copy ( & p1 , privilege_mask ) ;
2007-06-14 15:29:35 +04:00
2010-08-24 08:47:26 +04:00
p1 & = se_priv_all ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
return se_priv_equal ( & p1 , & se_priv_none ) ;
}
/*********************************************************************
2010-08-27 04:30:18 +04:00
Lookup the uint64_t bitmask value for a privilege name
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
bool se_priv_from_name ( const char * name , uint64_t * privilege_mask )
2007-06-14 15:29:35 +04:00
{
int i ;
2010-08-27 04:52:38 +04:00
uint32_t num_privs = ARRAY_SIZE ( privs ) ;
for ( i = 0 ; i < num_privs ; i + + ) {
2007-06-14 15:29:35 +04:00
if ( strequal ( privs [ i ] . name , name ) ) {
2010-08-26 16:49:27 +04:00
se_priv_copy ( privilege_mask , & privs [ i ] . privilege_mask ) ;
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
}
2010-08-27 03:41:32 +04:00
return false ;
2007-06-14 15:29:35 +04:00
}
/****************************************************************************
2010-08-27 04:30:18 +04:00
check if the privilege ( by bitmask ) is in the privilege list
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 08:37:00 +04:00
bool is_privilege_assigned ( const uint64_t * privileges ,
const uint64_t * check )
2007-06-14 15:29:35 +04:00
{
2010-08-26 08:37:00 +04:00
uint64_t p1 , p2 ;
2007-06-14 15:29:35 +04:00
if ( ! privileges | | ! check )
2010-08-27 03:41:32 +04:00
return false ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
/* everyone has privileges if you aren't checking for any */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
if ( se_priv_empty ( check ) ) {
DEBUG ( 1 , ( " is_privilege_assigned: no privileges in check_mask! \n " ) ) ;
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
se_priv_copy ( & p1 , check ) ;
2009-05-16 03:21:08 +04:00
2010-08-26 08:37:00 +04:00
/* invert the uint64_t we want to check for and remove that from the
original set . If we are left with the uint64_t we are checking
2010-08-27 03:41:32 +04:00
for then return true */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
se_priv_invert ( & p1 , check ) ;
se_priv_copy ( & p2 , privileges ) ;
se_priv_remove ( & p2 , & p1 ) ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
return se_priv_equal ( & p2 , check ) ;
}
/****************************************************************************
2010-08-27 04:30:18 +04:00
check if the any of the privileges ( by bitmask ) is in the privilege list
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 08:37:00 +04:00
static bool is_any_privilege_assigned ( uint64_t * privileges , const uint64_t * check )
2007-06-14 15:29:35 +04:00
{
2010-08-26 08:37:00 +04:00
uint64_t p1 , p2 ;
2007-06-14 15:29:35 +04:00
if ( ! privileges | | ! check )
2010-08-27 03:41:32 +04:00
return false ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
/* everyone has privileges if you aren't checking for any */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
if ( se_priv_empty ( check ) ) {
DEBUG ( 1 , ( " is_any_privilege_assigned: no privileges in check_mask! \n " ) ) ;
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
se_priv_copy ( & p1 , check ) ;
2009-05-16 03:21:08 +04:00
2010-08-26 08:37:00 +04:00
/* invert the uint64_t we want to check for and remove that from the
original set . If we are left with the uint64_t we are checking
2010-08-27 03:41:32 +04:00
for then return true */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
se_priv_invert ( & p1 , check ) ;
se_priv_copy ( & p2 , privileges ) ;
se_priv_remove ( & p2 , & p1 ) ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
/* see if we have any bits left */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
return ! se_priv_empty ( & p2 ) ;
}
/*********************************************************************
2010-06-05 04:39:11 +04:00
Generate the struct lsa_LUIDAttribute structure based on a bitmask
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
const char * get_privilege_dispname ( const char * name )
{
int i ;
2010-08-27 04:52:38 +04:00
uint32_t num_privs = ARRAY_SIZE ( privs ) ;
2008-02-11 13:57:29 +03:00
if ( ! name ) {
return NULL ;
}
2010-08-27 04:52:38 +04:00
for ( i = 0 ; i < num_privs ; i + + ) {
2007-06-14 15:29:35 +04:00
if ( strequal ( privs [ i ] . name , name ) ) {
return privs [ i ] . description ;
}
}
return NULL ;
}
/****************************************************************************
2009-05-16 03:21:08 +04:00
initialise a privilege list and set the talloc context
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
/****************************************************************************
Does the user have the specified privilege ? We only deal with one privilege
at a time here .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:35:35 +04:00
bool user_has_privileges ( const struct security_token * token , const uint64_t * privilege_bit )
2007-06-14 15:29:35 +04:00
{
if ( ! token )
2010-08-27 03:41:32 +04:00
return false ;
2007-06-14 15:29:35 +04:00
2010-08-26 16:35:35 +04:00
return is_privilege_assigned ( & token - > privilege_mask , privilege_bit ) ;
2007-06-14 15:29:35 +04:00
}
/****************************************************************************
Does the user have any of the specified privileges ? We only deal with one privilege
at a time here .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:35:35 +04:00
bool user_has_any_privilege ( struct security_token * token , const uint64_t * privilege_mask )
2007-06-14 15:29:35 +04:00
{
if ( ! token )
2010-08-27 03:41:32 +04:00
return false ;
2007-06-14 15:29:35 +04:00
2010-08-26 16:35:35 +04:00
return is_any_privilege_assigned ( & token - > privilege_mask , privilege_mask ) ;
2007-06-14 15:29:35 +04:00
}
/*******************************************************************
2010-08-27 06:19:09 +04:00
return the number of elements in the ' short ' privlege array ( traditional source3 behaviour )
2007-06-14 15:29:35 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-27 05:52:51 +04:00
int num_privileges_in_short_list ( void )
2007-06-14 15:29:35 +04:00
{
2010-08-27 05:52:51 +04:00
return NUM_SHORT_LIST_PRIVS ;
2007-06-14 15:29:35 +04:00
}
/****************************************************************************
add a privilege to a privilege array
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-06-05 04:39:11 +04:00
static bool privilege_set_add ( PRIVILEGE_SET * priv_set , struct lsa_LUIDAttribute set )
2007-06-14 15:29:35 +04:00
{
2010-06-05 04:39:11 +04:00
struct lsa_LUIDAttribute * new_set ;
2007-06-14 15:29:35 +04:00
/* we can allocate memory to add the new privilege */
2010-08-27 03:50:31 +04:00
new_set = talloc_realloc ( priv_set - > mem_ctx , priv_set - > set , struct lsa_LUIDAttribute , priv_set - > count + 1 ) ;
2007-06-14 15:29:35 +04:00
if ( ! new_set ) {
DEBUG ( 0 , ( " privilege_set_add: failed to allocate memory! \n " ) ) ;
2010-08-27 03:41:32 +04:00
return false ;
2009-05-16 03:21:08 +04:00
}
2007-06-14 15:29:35 +04:00
new_set [ priv_set - > count ] . luid . high = set . luid . high ;
new_set [ priv_set - > count ] . luid . low = set . luid . low ;
2010-06-05 04:39:11 +04:00
new_set [ priv_set - > count ] . attribute = set . attribute ;
2007-06-14 15:29:35 +04:00
priv_set - > count + + ;
priv_set - > set = new_set ;
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-30 06:50:49 +04:00
bool se_priv_to_privilege_set ( PRIVILEGE_SET * set , uint64_t privilege_mask )
2007-06-14 15:29:35 +04:00
{
int i ;
2010-08-27 04:52:38 +04:00
uint32_t num_privs = ARRAY_SIZE ( privs ) ;
2010-06-05 04:39:11 +04:00
struct lsa_LUIDAttribute luid ;
2009-05-16 03:21:08 +04:00
2010-06-05 04:39:11 +04:00
luid . attribute = 0 ;
2007-06-14 15:29:35 +04:00
luid . luid . high = 0 ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
for ( i = 0 ; i < num_privs ; i + + ) {
2010-08-30 06:50:49 +04:00
if ( ( privilege_mask & privs [ i ] . privilege_mask ) = = 0 )
2007-06-14 15:29:35 +04:00
continue ;
2009-05-16 03:21:08 +04:00
2010-08-26 13:20:32 +04:00
luid . luid . high = 0 ;
luid . luid . low = privs [ i ] . luid ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
if ( ! privilege_set_add ( set , luid ) )
2010-08-27 03:41:32 +04:00
return false ;
2007-06-14 15:29:35 +04:00
}
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
/*******************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-08-26 16:30:26 +04:00
bool privilege_set_to_se_priv ( uint64_t * privilege_mask , struct lsa_PrivilegeSet * privset )
2007-06-14 15:29:35 +04:00
{
int i ;
2009-05-16 03:21:08 +04:00
2010-08-26 16:30:26 +04:00
ZERO_STRUCTP ( privilege_mask ) ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
for ( i = 0 ; i < privset - > count ; i + + ) {
2010-08-26 08:37:00 +04:00
uint64_t r ;
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
/* sanity check for invalid privilege. we really
only care about the low 32 bits */
2009-05-16 03:21:08 +04:00
2007-06-14 15:29:35 +04:00
if ( privset - > set [ i ] . luid . high ! = 0 )
2010-08-27 03:41:32 +04:00
return false ;
2009-05-16 03:21:08 +04:00
2010-08-30 07:17:48 +04:00
r = sec_privilege_mask ( privset - > set [ i ] . luid . low ) ;
if ( r ) {
* privilege_mask | = r ;
}
2007-06-14 15:29:35 +04:00
}
2010-08-27 03:41:32 +04:00
return true ;
2007-06-14 15:29:35 +04:00
}
2010-08-27 03:35:55 +04:00
/*
map a privilege id to the wire string constant
*/
const char * sec_privilege_name ( enum sec_privilege privilege )
{
int i ;
2010-08-27 05:56:37 +04:00
for ( i = 0 ; i < ARRAY_SIZE ( privs ) ; i + + ) {
if ( privs [ i ] . luid = = privilege ) {
return privs [ i ] . name ;
2010-08-27 03:35:55 +04:00
}
}
return NULL ;
}
/*
map a privilege id to a privilege display name . Return NULL if not found
TODO : this should use language mappings
*/
const char * sec_privilege_display_name ( enum sec_privilege privilege , uint16_t * language )
{
int i ;
if ( privilege < 1 | | privilege > 64 ) {
return NULL ;
}
2010-08-27 05:56:37 +04:00
for ( i = 0 ; i < ARRAY_SIZE ( privs ) ; i + + ) {
if ( privs [ i ] . luid = = privilege ) {
return privs [ i ] . description ;
2010-08-27 03:35:55 +04:00
}
}
return NULL ;
}
/*
map a privilege name to a privilege id . Return - 1 if not found
*/
enum sec_privilege sec_privilege_id ( const char * name )
{
int i ;
2010-08-27 05:56:37 +04:00
for ( i = 0 ; i < ARRAY_SIZE ( privs ) ; i + + ) {
if ( strcasecmp ( privs [ i ] . name , name ) = = 0 ) {
return privs [ i ] . luid ;
2010-08-27 03:35:55 +04:00
}
}
return - 1 ;
}
/*
map a privilege name to a privilege id . Return - 1 if not found
*/
enum sec_privilege sec_privilege_from_mask ( uint64_t mask )
{
int i ;
2010-08-27 05:56:37 +04:00
for ( i = 0 ; i < ARRAY_SIZE ( privs ) ; i + + ) {
if ( privs [ i ] . privilege_mask = = mask ) {
return privs [ i ] . luid ;
2010-08-27 03:35:55 +04:00
}
}
return - 1 ;
}
/*
2010-08-27 06:19:09 +04:00
assist in walking the table of privileges - return the LUID ( low 32 bits ) by index
2010-08-27 03:35:55 +04:00
*/
enum sec_privilege sec_privilege_from_index ( int idx )
{
2010-08-27 05:56:37 +04:00
if ( idx > = 0 & & idx < ARRAY_SIZE ( privs ) ) {
return privs [ idx ] . luid ;
2010-08-27 03:35:55 +04:00
}
return - 1 ;
}
2010-08-27 06:19:09 +04:00
/*
assist in walking the table of privileges - return the string constant by index
*/
const char * sec_privilege_name_from_index ( int idx )
{
if ( idx > = 0 & & idx < ARRAY_SIZE ( privs ) ) {
return privs [ idx ] . name ;
}
return NULL ;
}
2010-08-27 03:35:55 +04:00
/*
return a privilege mask given a privilege id
*/
static uint64_t sec_privilege_mask ( enum sec_privilege privilege )
{
int i ;
2010-08-27 05:56:37 +04:00
for ( i = 0 ; i < ARRAY_SIZE ( privs ) ; i + + ) {
if ( privs [ i ] . luid = = privilege ) {
return privs [ i ] . privilege_mask ;
2010-08-27 03:35:55 +04:00
}
}
return 0 ;
}
/*
return true if a security_token has a particular privilege bit set
*/
bool security_token_has_privilege ( const struct security_token * token , enum sec_privilege privilege )
{
uint64_t mask ;
mask = sec_privilege_mask ( privilege ) ;
if ( mask = = 0 ) {
return false ;
}
if ( token - > privilege_mask & mask ) {
return true ;
}
return false ;
}
/*
set a bit in the privilege mask
*/
void security_token_set_privilege ( struct security_token * token , enum sec_privilege privilege )
{
/* Relies on the fact that an invalid privilage will return 0, so won't change this */
token - > privilege_mask | = sec_privilege_mask ( privilege ) ;
}
void security_token_debug_privileges ( int dbg_lev , const struct security_token * token )
{
DEBUGADD ( dbg_lev , ( " Privileges (0x%16llX): \n " ,
( unsigned long long ) token - > privilege_mask ) ) ;
if ( token - > privilege_mask ) {
2010-08-30 07:06:18 +04:00
int idx = 0 ;
2010-08-27 03:35:55 +04:00
int i = 0 ;
2010-08-30 07:06:18 +04:00
for ( idx = 0 ; idx < ARRAY_SIZE ( privs ) ; idx + + ) {
if ( token - > privilege_mask & privs [ idx ] . privilege_mask ) {
2010-08-27 03:35:55 +04:00
DEBUGADD ( dbg_lev , ( " Privilege[%3lu]: %s \n " , ( unsigned long ) i + + ,
2010-08-30 07:06:18 +04:00
privs [ idx ] . name ) ) ;
2010-08-27 03:35:55 +04:00
}
}
}
}