2010-09-18 06:55:31 +04:00
/*
Unix SMB / CIFS implementation .
Samba utility functions
Copyright ( C ) Andrew Tridgell 1992 - 1998
Copyright ( C ) Luke Kenneth Caseson Leighton 1998 - 1999
Copyright ( C ) Jeremy Allison 1999
Copyright ( C ) Stefan ( metze ) Metzmacher 2002
Copyright ( C ) Simo Sorce 2002
Copyright ( C ) Jim McDonough < jmcd @ us . ibm . com > 2005
Copyright ( C ) Andrew Bartlett 2010
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
2023-03-03 20:41:33 +03:00
# include "replace.h"
# include "lib/util/samba_util.h"
2010-09-18 06:55:31 +04:00
# include "../librpc/gen_ndr/ndr_security.h"
# include "../librpc/gen_ndr/netlogon.h"
# include "../libcli/security/security.h"
2022-09-27 05:12:52 +03:00
# include "auth/auth.h"
2010-09-18 06:55:31 +04:00
2020-08-07 23:27:39 +03:00
# undef strcasecmp
# undef strncasecmp
2010-09-18 06:55:31 +04:00
/*
* Some useful sids , more well known sids can be found at
* http : //support.microsoft.com/kb/243330/EN-US/
*/
2018-03-06 18:38:30 +03:00
/* S-1-1 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_World_Domain = /* Everyone domain */
{ 1 , 0 , { 0 , 0 , 0 , 0 , 0 , 1 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2018-03-06 18:38:30 +03:00
/* S-1-1-0 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_World = /* Everyone */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 1 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-2 */
2011-09-01 18:09:01 +04:00
const struct dom_sid global_sid_Local_Authority = /* Local Authority */
{ 1 , 0 , { 0 , 0 , 0 , 0 , 0 , 2 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-3 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Creator_Owner_Domain = /* Creator Owner domain */
{ 1 , 0 , { 0 , 0 , 0 , 0 , 0 , 3 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_NT_Authority = /* NT Authority */
{ 1 , 0 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-18 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_System = /* System */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 18 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2018-03-06 18:38:30 +03:00
/* S-1-0-0 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_NULL = /* NULL sid */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 0 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-11 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Authenticated_Users = /* All authenticated rids */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 11 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
#if 0
2016-09-27 05:12:07 +03:00
/* for documentation S-1-5-12 */
2023-04-27 16:56:42 +03:00
const struct dom_sid global_sid_Restriced = /* Restricted Code */
2010-09-18 06:55:31 +04:00
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 12 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
# endif
2016-01-15 16:46:07 +03:00
2016-09-27 05:12:07 +03:00
/* S-1-18 */
2016-01-15 16:46:07 +03:00
const struct dom_sid global_sid_Asserted_Identity = /* Asserted Identity */
{ 1 , 0 , { 0 , 0 , 0 , 0 , 0 , 18 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-18-1 */
2016-01-15 16:46:07 +03:00
const struct dom_sid global_sid_Asserted_Identity_Service = /* Asserted Identity Service */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 18 } , { 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-18-2 */
2016-01-15 16:46:07 +03:00
const struct dom_sid global_sid_Asserted_Identity_Authentication_Authority = /* Asserted Identity Authentication Authority */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 18 } , { 2 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-2 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Network = /* Network rids */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 2 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-3 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Creator_Owner = /* Creator Owner */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 3 } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-3-1 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Creator_Group = /* Creator Group */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 3 } , { 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-3-4 */
2012-03-14 03:47:17 +04:00
const struct dom_sid global_sid_Owner_Rights = /* Owner Rights */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 3 } , { 4 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-7 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Anonymous = /* Anonymous login */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 7 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-9 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Enterprise_DCs = /* Enterprise DCs */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 9 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin = /* Local well-known domain */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-544 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Administrators = /* Builtin administrators */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 544 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-545 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Users = /* Builtin users */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 545 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-546 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Guests = /* Builtin guest users */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 546 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-547 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Power_Users = /* Builtin power users */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 547 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-548 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Account_Operators = /* Builtin account operators */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 548 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-549 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Server_Operators = /* Builtin server operators */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 549 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-550 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Print_Operators = /* Builtin print operators */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 550 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-551 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Backup_Operators = /* Builtin backup operators */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 551 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-552 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_Replicator = /* Builtin replicator */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 552 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-32-554 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Builtin_PreWin2kAccess = /* Builtin pre win2k access */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 32 , 554 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-22-1 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Unix_Users = /* Unmapped Unix users */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 22 } , { 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-22-2 */
2010-09-18 06:55:31 +04:00
const struct dom_sid global_sid_Unix_Groups = /* Unmapped Unix groups */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 22 } , { 2 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2014-09-09 01:18:35 +04:00
/*
* http : //technet.microsoft.com/en-us/library/hh509017(v=ws.10).aspx
*/
2016-09-27 05:12:07 +03:00
/* S-1-5-88 */
2014-09-09 01:18:35 +04:00
const struct dom_sid global_sid_Unix_NFS = /* MS NFS and Apple style */
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 88 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-88-1 */
2014-09-09 01:18:35 +04:00
const struct dom_sid global_sid_Unix_NFS_Users = /* Unix uid, MS NFS and Apple style */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 88 , 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-88-2 */
2014-09-09 01:18:35 +04:00
const struct dom_sid global_sid_Unix_NFS_Groups = /* Unix gid, MS NFS and Apple style */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 88 , 2 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
2016-09-27 05:12:07 +03:00
/* S-1-5-88-3 */
2014-09-09 01:18:35 +04:00
const struct dom_sid global_sid_Unix_NFS_Mode = /* Unix mode */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 88 , 3 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
/* Unused, left here for documentary purposes */
#if 0
const struct dom_sid global_sid_Unix_NFS_Other = /* Unix other, MS NFS and Apple style */
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 88 , 4 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } ;
# endif
2021-10-08 12:34:23 +03:00
/* Information passing via security token */
const struct dom_sid global_sid_Samba_SMB3 =
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 22 } , { 1397571891 , } } ;
2023-04-18 13:09:45 +03:00
const struct dom_sid global_sid_Samba_NPA_Flags = { 1 ,
1 ,
{ 0 , 0 , 0 , 0 , 0 , 22 } ,
{
2041152804 ,
} } ;
2010-09-18 06:55:31 +04:00
/* Unused, left here for documentary purposes */
#if 0
# define SECURITY_NULL_SID_AUTHORITY 0
# define SECURITY_WORLD_SID_AUTHORITY 1
# define SECURITY_LOCAL_SID_AUTHORITY 2
# define SECURITY_CREATOR_SID_AUTHORITY 3
# define SECURITY_NT_AUTHORITY 5
# endif
static struct dom_sid system_sid_array [ 1 ] =
{ { 1 , 1 , { 0 , 0 , 0 , 0 , 0 , 5 } , { 18 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } } } ;
static const struct security_token system_token = {
. num_sids = ARRAY_SIZE ( system_sid_array ) ,
. sids = system_sid_array ,
. privilege_mask = SE_ALL_PRIVS
} ;
/****************************************************************************
Lookup string names for SID types .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static const struct {
enum lsa_SidType sid_type ;
const char * string ;
} sid_name_type [ ] = {
{ SID_NAME_USE_NONE , " None " } ,
{ SID_NAME_USER , " User " } ,
{ SID_NAME_DOM_GRP , " Domain Group " } ,
{ SID_NAME_DOMAIN , " Domain " } ,
{ SID_NAME_ALIAS , " Local Group " } ,
{ SID_NAME_WKN_GRP , " Well-known Group " } ,
{ SID_NAME_DELETED , " Deleted Account " } ,
{ SID_NAME_INVALID , " Invalid Account " } ,
{ SID_NAME_UNKNOWN , " UNKNOWN " } ,
2017-03-20 15:50:59 +03:00
{ SID_NAME_COMPUTER , " Computer " } ,
{ SID_NAME_LABEL , " Mandatory Label " }
2010-09-18 06:55:31 +04:00
} ;
const char * sid_type_lookup ( uint32_t sid_type )
{
2017-11-13 10:53:04 +03:00
size_t i ;
2010-09-18 06:55:31 +04:00
/* Look through list */
2011-01-10 13:57:18 +03:00
for ( i = 0 ; i < ARRAY_SIZE ( sid_name_type ) ; i + + ) {
if ( sid_name_type [ i ] . sid_type = = sid_type ) {
2010-09-18 06:55:31 +04:00
return sid_name_type [ i ] . string ;
2011-01-10 13:57:18 +03:00
}
2010-09-18 06:55:31 +04:00
}
/* Default return */
return " SID *TYPE* is INVALID " ;
}
/**************************************************************************
Create the SYSTEM token .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
const struct security_token * get_system_token ( void )
{
return & system_token ;
}
bool sid_compose ( struct dom_sid * dst , const struct dom_sid * domain_sid , uint32_t rid )
{
sid_copy ( dst , domain_sid ) ;
return sid_append_rid ( dst , rid ) ;
}
/*****************************************************************
Removes the last rid from the end of a sid
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
bool sid_split_rid ( struct dom_sid * sid , uint32_t * rid )
{
if ( sid - > num_auths > 0 ) {
sid - > num_auths - - ;
2011-03-10 18:19:17 +03:00
if ( rid ! = NULL ) {
* rid = sid - > sub_auths [ sid - > num_auths ] ;
}
2010-09-18 06:55:31 +04:00
return true ;
}
return false ;
}
/*****************************************************************
Return the last rid from the end of a sid
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
bool sid_peek_rid ( const struct dom_sid * sid , uint32_t * rid )
{
if ( ! sid | | ! rid )
return false ;
if ( sid - > num_auths > 0 ) {
* rid = sid - > sub_auths [ sid - > num_auths - 1 ] ;
return true ;
}
return false ;
}
/*****************************************************************
Return the last rid from the end of a sid
and check the sid against the exp_dom_sid
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
bool sid_peek_check_rid ( const struct dom_sid * exp_dom_sid , const struct dom_sid * sid , uint32_t * rid )
{
if ( ! exp_dom_sid | | ! sid | | ! rid )
return false ;
if ( sid - > num_auths ! = ( exp_dom_sid - > num_auths + 1 ) ) {
return false ;
}
if ( sid_compare_domain ( exp_dom_sid , sid ) ! = 0 ) {
* rid = ( - 1 ) ;
return false ;
}
return sid_peek_rid ( sid , rid ) ;
}
/*****************************************************************
Copies a sid
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
void sid_copy ( struct dom_sid * dst , const struct dom_sid * src )
{
int i ;
2014-05-27 01:01:38 +04:00
* dst = ( struct dom_sid ) {
. sid_rev_num = src - > sid_rev_num ,
. num_auths = src - > num_auths ,
} ;
2010-09-18 06:55:31 +04:00
memcpy ( & dst - > id_auth [ 0 ] , & src - > id_auth [ 0 ] , sizeof ( src - > id_auth ) ) ;
for ( i = 0 ; i < src - > num_auths ; i + + )
dst - > sub_auths [ i ] = src - > sub_auths [ i ] ;
}
/*****************************************************************
2015-08-24 17:50:44 +03:00
Parse a on - the - wire SID to a struct dom_sid .
2010-09-18 06:55:31 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-03-11 19:11:06 +03:00
ssize_t sid_parse ( const uint8_t * inbuf , size_t len , struct dom_sid * sid )
2010-09-18 06:55:31 +04:00
{
2015-08-24 17:50:44 +03:00
DATA_BLOB in = data_blob_const ( inbuf , len ) ;
2010-09-18 06:55:31 +04:00
enum ndr_err_code ndr_err ;
2015-08-24 17:50:44 +03:00
ndr_err = ndr_pull_struct_blob_all (
& in , NULL , sid , ( ndr_pull_flags_fn_t ) ndr_pull_dom_sid ) ;
2010-09-18 06:55:31 +04:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2019-03-11 19:11:06 +03:00
return - 1 ;
2010-09-18 06:55:31 +04:00
}
2019-03-11 19:11:06 +03:00
return ndr_size_dom_sid ( sid , 0 ) ;
2010-09-18 06:55:31 +04:00
}
/*****************************************************************
See if 2 SIDs are in the same domain
this just compares the leading sub - auths
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int sid_compare_domain ( const struct dom_sid * sid1 , const struct dom_sid * sid2 )
{
int n , i ;
n = MIN ( sid1 - > num_auths , sid2 - > num_auths ) ;
for ( i = n - 1 ; i > = 0 ; - - i )
if ( sid1 - > sub_auths [ i ] ! = sid2 - > sub_auths [ i ] )
return sid1 - > sub_auths [ i ] - sid2 - > sub_auths [ i ] ;
return dom_sid_compare_auth ( sid1 , sid2 ) ;
}
/********************************************************************
2022-09-27 05:04:49 +03:00
Add SID to an array of SIDs
2010-09-18 06:55:31 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS add_sid_to_array ( TALLOC_CTX * mem_ctx , const struct dom_sid * sid ,
struct dom_sid * * sids , uint32_t * num )
{
2017-01-18 18:43:35 +03:00
struct dom_sid * tmp ;
2017-01-18 18:43:56 +03:00
if ( ( * num ) = = UINT32_MAX ) {
return NT_STATUS_INTEGER_OVERFLOW ;
}
2017-01-18 18:43:35 +03:00
tmp = talloc_realloc ( mem_ctx , * sids , struct dom_sid , ( * num ) + 1 ) ;
if ( tmp = = NULL ) {
2010-09-18 06:55:31 +04:00
* num = 0 ;
return NT_STATUS_NO_MEMORY ;
}
2017-01-18 18:43:35 +03:00
* sids = tmp ;
2010-09-18 06:55:31 +04:00
sid_copy ( & ( ( * sids ) [ * num ] ) , sid ) ;
* num + = 1 ;
return NT_STATUS_OK ;
}
/********************************************************************
2022-09-27 05:04:49 +03:00
Add SID to an array of SIDs ensuring that it is not already there
2010-09-18 06:55:31 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS add_sid_to_array_unique ( TALLOC_CTX * mem_ctx , const struct dom_sid * sid ,
struct dom_sid * * sids , uint32_t * num_sids )
{
2011-02-03 15:23:50 +03:00
uint32_t i ;
2010-09-18 06:55:31 +04:00
for ( i = 0 ; i < ( * num_sids ) ; i + + ) {
2015-08-14 12:40:51 +03:00
if ( dom_sid_equal ( sid , & ( * sids ) [ i ] ) ) {
2010-09-18 06:55:31 +04:00
return NT_STATUS_OK ;
2015-08-14 12:40:51 +03:00
}
2010-09-18 06:55:31 +04:00
}
return add_sid_to_array ( mem_ctx , sid , sids , num_sids ) ;
}
2022-09-27 05:12:52 +03:00
/**
* Appends a SID and attribute to an array of auth_SidAttr .
*
* @ param [ in ] mem_ctx Talloc memory context on which to allocate the array .
* @ param [ in ] sid The SID to append .
* @ param [ in ] attrs SE_GROUP_ * flags to go with the SID .
* @ param [ inout ] sids A pointer to the auth_SidAttr array .
* @ param [ inout ] num A pointer to the size of the auth_SidArray array .
* @ returns NT_STATUS_OK on success .
*/
NTSTATUS add_sid_to_array_attrs ( TALLOC_CTX * mem_ctx ,
const struct dom_sid * sid , uint32_t attrs ,
struct auth_SidAttr * * sids , uint32_t * num )
{
struct auth_SidAttr * tmp = NULL ;
if ( ( * num ) = = UINT32_MAX ) {
return NT_STATUS_INTEGER_OVERFLOW ;
}
tmp = talloc_realloc ( mem_ctx , * sids , struct auth_SidAttr , ( * num ) + 1 ) ;
if ( tmp = = NULL ) {
* num = 0 ;
return NT_STATUS_NO_MEMORY ;
}
* sids = tmp ;
sid_copy ( & ( ( * sids ) [ * num ] . sid ) , sid ) ;
( * sids ) [ * num ] . attrs = attrs ;
* num + = 1 ;
return NT_STATUS_OK ;
}
/**
* Appends a SID and attribute to an array of auth_SidAttr ,
* ensuring that it is not already there .
*
* @ param [ in ] mem_ctx Talloc memory context on which to allocate the array .
* @ param [ in ] sid The SID to append .
* @ param [ in ] attrs SE_GROUP_ * flags to go with the SID .
* @ param [ inout ] sids A pointer to the auth_SidAttr array .
* @ param [ inout ] num A pointer to the size of the auth_SidArray array .
* @ returns NT_STATUS_OK on success .
*/
NTSTATUS add_sid_to_array_attrs_unique ( TALLOC_CTX * mem_ctx ,
const struct dom_sid * sid , uint32_t attrs ,
struct auth_SidAttr * * sids , uint32_t * num_sids )
{
uint32_t i ;
for ( i = 0 ; i < ( * num_sids ) ; i + + ) {
if ( attrs ! = ( * sids ) [ i ] . attrs ) {
continue ;
}
if ( ! dom_sid_equal ( sid , & ( * sids ) [ i ] . sid ) ) {
continue ;
}
return NT_STATUS_OK ;
}
return add_sid_to_array_attrs ( mem_ctx , sid , attrs , sids , num_sids ) ;
}
2010-09-18 06:55:31 +04:00
/********************************************************************
Remove SID from an array
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-02-03 15:22:36 +03:00
void del_sid_from_array ( const struct dom_sid * sid , struct dom_sid * * sids ,
uint32_t * num )
2010-09-18 06:55:31 +04:00
{
struct dom_sid * sid_list = * sids ;
2011-02-03 15:22:36 +03:00
uint32_t i ;
2010-09-18 06:55:31 +04:00
for ( i = 0 ; i < * num ; i + + ) {
/* if we find the SID, then decrement the count
and break out of the loop */
2011-08-17 14:18:14 +04:00
if ( dom_sid_equal ( sid , & sid_list [ i ] ) ) {
2010-09-18 06:55:31 +04:00
* num - = 1 ;
break ;
}
}
/* This loop will copy the remainder of the array
2011-08-17 16:09:10 +04:00
if i < num of sids in the array */
2010-09-18 06:55:31 +04:00
2011-08-17 16:10:15 +04:00
for ( ; i < * num ; i + + ) {
2010-09-18 06:55:31 +04:00
sid_copy ( & sid_list [ i ] , & sid_list [ i + 1 ] ) ;
2011-08-17 16:10:15 +04:00
}
2010-09-18 06:55:31 +04:00
return ;
}
bool add_rid_to_array_unique ( TALLOC_CTX * mem_ctx ,
uint32_t rid , uint32_t * * pp_rids , size_t * p_num )
{
size_t i ;
for ( i = 0 ; i < * p_num ; i + + ) {
if ( ( * pp_rids ) [ i ] = = rid )
return true ;
}
* pp_rids = talloc_realloc ( mem_ctx , * pp_rids , uint32_t , * p_num + 1 ) ;
if ( * pp_rids = = NULL ) {
* p_num = 0 ;
return false ;
}
( * pp_rids ) [ * p_num ] = rid ;
* p_num + = 1 ;
return true ;
}
bool is_null_sid ( const struct dom_sid * sid )
{
2022-09-27 05:05:16 +03:00
static const struct dom_sid null_sid = { 0 } ;
2011-08-17 14:18:14 +04:00
return dom_sid_equal ( sid , & null_sid ) ;
2010-09-18 06:55:31 +04:00
}
2017-03-20 14:55:44 +03:00
/*
* See [ MS - LSAT ] 3.1 .1 .1 .1 Predefined Translation Database and Corresponding View
*/
struct predefined_name_mapping {
const char * name ;
enum lsa_SidType type ;
struct dom_sid sid ;
} ;
struct predefined_domain_mapping {
const char * domain ;
struct dom_sid sid ;
size_t num_names ;
const struct predefined_name_mapping * names ;
} ;
/* S-1-${AUTHORITY} */
# define _SID0(authority) \
{ 1 , 0 , { 0 , 0 , 0 , 0 , 0 , authority } , { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } }
/* S-1-${AUTHORITY}-${SUB1} */
# define _SID1(authority,sub1) \
{ 1 , 1 , { 0 , 0 , 0 , 0 , 0 , authority } , { sub1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } }
/* S-1-${AUTHORITY}-${SUB1}-${SUB2} */
# define _SID2(authority,sub1,sub2) \
{ 1 , 2 , { 0 , 0 , 0 , 0 , 0 , authority } , { sub1 , sub2 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } }
/*
* S - 1 - 0
*/
static const struct predefined_name_mapping predefined_names_S_1_0 [ ] = {
{
. name = " NULL SID " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 0 , 0 ) , /* S-1-0-0 */
} ,
} ;
/*
* S - 1 - 1
*/
static const struct predefined_name_mapping predefined_names_S_1_1 [ ] = {
{
. name = " Everyone " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 1 , 0 ) , /* S-1-1-0 */
} ,
} ;
/*
* S - 1 - 2
*/
static const struct predefined_name_mapping predefined_names_S_1_2 [ ] = {
{
. name = " LOCAL " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 2 , 0 ) , /* S-1-2-0 */
} ,
} ;
/*
* S - 1 - 3
*/
static const struct predefined_name_mapping predefined_names_S_1_3 [ ] = {
{
. name = " CREATOR OWNER " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 3 , 0 ) , /* S-1-3-0 */
} ,
{
. name = " CREATOR GROUP " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 3 , 1 ) , /* S-1-3-1 */
} ,
{
. name = " CREATOR OWNER SERVER " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 3 , 0 ) , /* S-1-3-2 */
} ,
{
. name = " CREATOR GROUP SERVER " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 3 , 1 ) , /* S-1-3-3 */
} ,
{
. name = " OWNER RIGHTS " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 3 , 4 ) , /* S-1-3-4 */
} ,
} ;
/*
* S - 1 - 5 only ' NT Pseudo Domain '
*/
static const struct predefined_name_mapping predefined_names_S_1_5p [ ] = {
{
. name = " NT Pseudo Domain " ,
. type = SID_NAME_DOMAIN ,
. sid = _SID0 ( 5 ) , /* S-1-5 */
} ,
} ;
/*
* S - 1 - 5 ' NT AUTHORITY '
*/
static const struct predefined_name_mapping predefined_names_S_1_5a [ ] = {
{
. name = " DIALUP " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 1 ) , /* S-1-5-1 */
} ,
{
. name = " NETWORK " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 2 ) , /* S-1-5-2 */
} ,
{
. name = " BATCH " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 3 ) , /* S-1-5-3 */
} ,
{
. name = " INTERACTIVE " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 4 ) , /* S-1-5-4 */
} ,
{
. name = " SERVICE " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 6 ) , /* S-1-5-6 */
} ,
{
. name = " ANONYMOUS LOGON " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 7 ) , /* S-1-5-7 */
} ,
{
. name = " PROXY " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 8 ) , /* S-1-5-8 */
} ,
{
. name = " ENTERPRISE DOMAIN CONTROLLERS " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 9 ) , /* S-1-5-9 */
} ,
{
. name = " SELF " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 10 ) , /* S-1-5-10 */
} ,
{
. name = " Authenticated Users " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 11 ) , /* S-1-5-11 */
} ,
{
. name = " RESTRICTED " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 12 ) , /* S-1-5-12 */
} ,
{
. name = " TERMINAL SERVER USER " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 13 ) , /* S-1-5-13 */
} ,
{
. name = " REMOTE INTERACTIVE LOGON " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 14 ) , /* S-1-5-14 */
} ,
{
. name = " This Organization " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 15 ) , /* S-1-5-15 */
} ,
{
. name = " IUSR " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 17 ) , /* S-1-5-17 */
} ,
{
. name = " SYSTEM " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 18 ) , /* S-1-5-18 */
} ,
{
. name = " LOCAL SERVICE " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 19 ) , /* S-1-5-19 */
} ,
{
. name = " NETWORK SERVICE " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 20 ) , /* S-1-5-20 */
} ,
{
. name = " WRITE RESTRICTED " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 33 ) , /* S-1-5-33 */
} ,
{
. name = " Other Organization " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID1 ( 5 , 1000 ) , /* S-1-5-1000 */
} ,
} ;
/*
* S - 1 - 5 - 32
*/
static const struct predefined_name_mapping predefined_names_S_1_5_32 [ ] = {
{
. name = " BUILTIN " ,
. type = SID_NAME_DOMAIN ,
. sid = _SID1 ( 5 , 32 ) , /* S-1-5-32 */
} ,
} ;
/*
* S - 1 - 5 - 64
*/
static const struct predefined_name_mapping predefined_names_S_1_5_64 [ ] = {
{
. name = " NTLM Authentication " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID2 ( 5 , 64 , 10 ) , /* S-1-5-64-10 */
} ,
{
. name = " SChannel Authentication " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID2 ( 5 , 64 , 14 ) , /* S-1-5-64-14 */
} ,
{
. name = " Digest Authentication " ,
. type = SID_NAME_WKN_GRP ,
. sid = _SID2 ( 5 , 64 , 21 ) , /* S-1-5-64-21 */
} ,
} ;
/*
* S - 1 - 7
*/
static const struct predefined_name_mapping predefined_names_S_1_7 [ ] = {
{
. name = " Internet$ " ,
. type = SID_NAME_DOMAIN ,
. sid = _SID0 ( 7 ) , /* S-1-7 */
} ,
} ;
/*
* S - 1 - 16
*/
static const struct predefined_name_mapping predefined_names_S_1_16 [ ] = {
{
. name = " Mandatory Label " ,
. type = SID_NAME_DOMAIN ,
. sid = _SID0 ( 16 ) , /* S-1-16 */
} ,
{
. name = " Untrusted Mandatory Level " ,
. type = SID_NAME_LABEL ,
. sid = _SID1 ( 16 , 0 ) , /* S-1-16-0 */
} ,
{
. name = " Low Mandatory Level " ,
. type = SID_NAME_LABEL ,
. sid = _SID1 ( 16 , 4096 ) , /* S-1-16-4096 */
} ,
{
. name = " Medium Mandatory Level " ,
. type = SID_NAME_LABEL ,
. sid = _SID1 ( 16 , 8192 ) , /* S-1-16-8192 */
} ,
{
. name = " High Mandatory Level " ,
. type = SID_NAME_LABEL ,
. sid = _SID1 ( 16 , 12288 ) , /* S-1-16-12288 */
} ,
{
. name = " System Mandatory Level " ,
. type = SID_NAME_LABEL ,
. sid = _SID1 ( 16 , 16384 ) , /* S-1-16-16384 */
} ,
{
. name = " Protected Process Mandatory Level " ,
. type = SID_NAME_LABEL ,
. sid = _SID1 ( 16 , 20480 ) , /* S-1-16-20480 */
} ,
} ;
static const struct predefined_domain_mapping predefined_domains [ ] = {
{
. domain = " " ,
. sid = _SID0 ( 0 ) , /* S-1-0 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_0 ) ,
. names = predefined_names_S_1_0 ,
} ,
{
. domain = " " ,
. sid = _SID0 ( 1 ) , /* S-1-1 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_1 ) ,
. names = predefined_names_S_1_1 ,
} ,
{
. domain = " " ,
. sid = _SID0 ( 2 ) , /* S-1-2 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_2 ) ,
. names = predefined_names_S_1_2 ,
} ,
{
. domain = " " ,
. sid = _SID0 ( 3 ) , /* S-1-3 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_3 ) ,
. names = predefined_names_S_1_3 ,
} ,
{
. domain = " " ,
. sid = _SID0 ( 3 ) , /* S-1-3 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_3 ) ,
. names = predefined_names_S_1_3 ,
} ,
/*
* S - 1 - 5 is split here
*
* ' NT Pseudo Domain ' has precedence before ' NT AUTHORITY ' .
*
* In a LookupSids with multiple sids e . g . S - 1 - 5 and S - 1 - 5 - 7
* the domain section ( struct lsa_DomainInfo ) gets
* ' NT Pseudo Domain ' with S - 1 - 5. If asked in reversed order
* S - 1 - 5 - 7 and then S - 1 - 5 , you get struct lsa_DomainInfo
* with ' NT AUTHORITY ' and S - 1 - 5.
*/
{
. domain = " NT Pseudo Domain " ,
. sid = _SID0 ( 5 ) , /* S-1-5 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_5p ) ,
. names = predefined_names_S_1_5p ,
} ,
{
. domain = " NT AUTHORITY " ,
. sid = _SID0 ( 5 ) , /* S-1-5 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_5a ) ,
. names = predefined_names_S_1_5a ,
} ,
{
. domain = " BUILTIN " ,
. sid = _SID1 ( 5 , 32 ) , /* S-1-5-32 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_5_32 ) ,
. names = predefined_names_S_1_5_32 ,
} ,
/*
* ' NT AUTHORITY ' again with S - 1 - 5 - 64 this time
*/
{
. domain = " NT AUTHORITY " ,
. sid = _SID1 ( 5 , 64 ) , /* S-1-5-64 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_5_64 ) ,
. names = predefined_names_S_1_5_64 ,
} ,
{
. domain = " Internet$ " ,
. sid = _SID0 ( 7 ) , /* S-1-7 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_7 ) ,
. names = predefined_names_S_1_7 ,
} ,
{
. domain = " Mandatory Label " ,
. sid = _SID0 ( 16 ) , /* S-1-16 */
. num_names = ARRAY_SIZE ( predefined_names_S_1_16 ) ,
. names = predefined_names_S_1_16 ,
} ,
} ;
NTSTATUS dom_sid_lookup_predefined_name ( const char * name ,
const struct dom_sid * * sid ,
enum lsa_SidType * type ,
const struct dom_sid * * authority_sid ,
const char * * authority_name )
{
size_t di ;
const char * domain = " " ;
size_t domain_len = 0 ;
const char * p ;
bool match ;
* sid = NULL ;
* type = SID_NAME_UNKNOWN ;
* authority_sid = NULL ;
* authority_name = NULL ;
if ( name = = NULL ) {
name = " " ;
}
p = strchr ( name , ' \\ ' ) ;
if ( p ! = NULL ) {
domain = name ;
domain_len = PTR_DIFF ( p , domain ) ;
name = p + 1 ;
}
match = strequal ( name , " " ) ;
if ( match ) {
/*
* Strange , but that ' s what W2012R2 does .
*/
name = " BUILTIN " ;
}
for ( di = 0 ; di < ARRAY_SIZE ( predefined_domains ) ; di + + ) {
const struct predefined_domain_mapping * d =
& predefined_domains [ di ] ;
size_t ni ;
if ( domain_len ! = 0 ) {
int cmp ;
cmp = strncasecmp ( d - > domain , domain , domain_len ) ;
if ( cmp ! = 0 ) {
continue ;
}
}
for ( ni = 0 ; ni < d - > num_names ; ni + + ) {
const struct predefined_name_mapping * n =
& d - > names [ ni ] ;
match = strequal ( n - > name , name ) ;
if ( ! match ) {
continue ;
}
* sid = & n - > sid ;
* type = n - > type ;
* authority_sid = & d - > sid ;
* authority_name = d - > domain ;
return NT_STATUS_OK ;
}
}
return NT_STATUS_NONE_MAPPED ;
}
2018-11-28 19:19:39 +03:00
bool dom_sid_lookup_is_predefined_domain ( const char * domain )
{
size_t di ;
bool match ;
if ( domain = = NULL ) {
domain = " " ;
}
match = strequal ( domain , " " ) ;
if ( match ) {
/*
* Strange , but that ' s what W2012R2 does .
*/
domain = " BUILTIN " ;
}
for ( di = 0 ; di < ARRAY_SIZE ( predefined_domains ) ; di + + ) {
const struct predefined_domain_mapping * d =
& predefined_domains [ di ] ;
int cmp ;
cmp = strcasecmp ( d - > domain , domain ) ;
if ( cmp ! = 0 ) {
continue ;
}
return true ;
}
return false ;
}
2017-03-20 14:55:44 +03:00
NTSTATUS dom_sid_lookup_predefined_sid ( const struct dom_sid * sid ,
const char * * name ,
enum lsa_SidType * type ,
const struct dom_sid * * authority_sid ,
const char * * authority_name )
{
size_t di ;
bool match_domain = false ;
* name = NULL ;
* type = SID_NAME_UNKNOWN ;
* authority_sid = NULL ;
* authority_name = NULL ;
if ( sid = = NULL ) {
return NT_STATUS_INVALID_SID ;
}
for ( di = 0 ; di < ARRAY_SIZE ( predefined_domains ) ; di + + ) {
const struct predefined_domain_mapping * d =
& predefined_domains [ di ] ;
size_t ni ;
int cmp ;
cmp = dom_sid_compare_auth ( & d - > sid , sid ) ;
if ( cmp ! = 0 ) {
continue ;
}
match_domain = true ;
for ( ni = 0 ; ni < d - > num_names ; ni + + ) {
const struct predefined_name_mapping * n =
& d - > names [ ni ] ;
cmp = dom_sid_compare ( & n - > sid , sid ) ;
if ( cmp ! = 0 ) {
continue ;
}
* name = n - > name ;
* type = n - > type ;
* authority_sid = & d - > sid ;
* authority_name = d - > domain ;
return NT_STATUS_OK ;
}
}
if ( ! match_domain ) {
return NT_STATUS_INVALID_SID ;
}
return NT_STATUS_NONE_MAPPED ;
}