mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
09c787c34a
This avoids messing up the debug logs when multiple processes are writing into the same file. Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
229 lines
5.8 KiB
C
229 lines
5.8 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
security descriptor utility functions
|
|
|
|
Copyright (C) Andrew Tridgell 2004
|
|
Copyright (C) Andrew Bartlett 2010
|
|
Copyright (C) Stefan Metzmacher 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "replace.h"
|
|
#include <talloc.h>
|
|
#include "lib/util/talloc_stack.h"
|
|
#include "lib/util/debug.h"
|
|
#include "lib/util/fault.h"
|
|
#include "libcli/security/security_token.h"
|
|
#include "libcli/security/dom_sid.h"
|
|
#include "libcli/security/privileges.h"
|
|
#include "librpc/gen_ndr/ndr_security.h"
|
|
#include "lib/util/talloc_stack.h"
|
|
|
|
/*
|
|
return a blank security token
|
|
*/
|
|
struct security_token *security_token_initialise(TALLOC_CTX *mem_ctx,
|
|
enum claims_evaluation_control evaluate_claims)
|
|
{
|
|
struct security_token *st = talloc_zero(
|
|
mem_ctx, struct security_token);
|
|
st->evaluate_claims = evaluate_claims;
|
|
|
|
return st;
|
|
}
|
|
|
|
/****************************************************************************
|
|
Duplicate a SID token.
|
|
****************************************************************************/
|
|
|
|
struct security_token *security_token_duplicate(TALLOC_CTX *mem_ctx, const struct security_token *src)
|
|
{
|
|
TALLOC_CTX *frame = NULL;
|
|
struct security_token *dst = NULL;
|
|
DATA_BLOB blob;
|
|
enum ndr_err_code ndr_err;
|
|
|
|
if (src == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
frame = talloc_stackframe();
|
|
|
|
ndr_err = ndr_push_struct_blob(
|
|
&blob,
|
|
frame,
|
|
src,
|
|
(ndr_push_flags_fn_t)ndr_push_security_token);
|
|
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
|
DBG_ERR("Failed to duplicate security_token ndr_push_security_token failed: %s\n",
|
|
ndr_errstr(ndr_err));
|
|
TALLOC_FREE(frame);
|
|
return NULL;
|
|
}
|
|
|
|
dst = talloc_zero(mem_ctx, struct security_token);
|
|
if (dst == NULL) {
|
|
DBG_ERR("talloc failed\n");
|
|
TALLOC_FREE(frame);
|
|
return NULL;
|
|
}
|
|
|
|
ndr_err = ndr_pull_struct_blob(
|
|
&blob,
|
|
dst,
|
|
dst,
|
|
(ndr_pull_flags_fn_t)ndr_pull_security_token);
|
|
|
|
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
|
DBG_ERR("Failed to duplicate security_token ndr_pull_security_token "
|
|
"failed: %s\n",
|
|
ndr_errstr(ndr_err));
|
|
TALLOC_FREE(dst);
|
|
TALLOC_FREE(frame);
|
|
return NULL;
|
|
}
|
|
|
|
TALLOC_FREE(frame);
|
|
return dst;
|
|
}
|
|
|
|
/****************************************************************************
|
|
prints a struct security_token to debug output.
|
|
****************************************************************************/
|
|
void security_token_debug(int dbg_class, int dbg_lev, const struct security_token *token)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
char *sids = NULL;
|
|
char *privs = NULL;
|
|
uint32_t i;
|
|
|
|
if (!token) {
|
|
DEBUGC(dbg_class, dbg_lev, ("Security token: (NULL)\n"));
|
|
TALLOC_FREE(frame);
|
|
return;
|
|
}
|
|
|
|
sids = talloc_asprintf(frame,
|
|
"Security token SIDs (%" PRIu32 "):\n",
|
|
token->num_sids);
|
|
for (i = 0; i < token->num_sids; i++) {
|
|
struct dom_sid_buf sidbuf;
|
|
talloc_asprintf_addbuf(
|
|
&sids,
|
|
" SID[%3" PRIu32 "]: %s\n",
|
|
i,
|
|
dom_sid_str_buf(&token->sids[i], &sidbuf));
|
|
}
|
|
|
|
privs = security_token_debug_privileges(frame, token);
|
|
|
|
DEBUGC(dbg_class,
|
|
dbg_lev,
|
|
("%s%s", sids ? sids : "(NULL)", privs ? privs : "(NULL)"));
|
|
|
|
TALLOC_FREE(frame);
|
|
}
|
|
|
|
/* These really should be cheaper... */
|
|
|
|
bool security_token_is_sid(const struct security_token *token, const struct dom_sid *sid)
|
|
{
|
|
bool ret;
|
|
|
|
if (token->sids == NULL) {
|
|
return false;
|
|
}
|
|
ret = dom_sid_equal(&token->sids[PRIMARY_USER_SID_INDEX], sid);
|
|
return ret;
|
|
}
|
|
|
|
bool security_token_is_system(const struct security_token *token)
|
|
{
|
|
return security_token_is_sid(token, &global_sid_System);
|
|
}
|
|
|
|
bool security_token_is_anonymous(const struct security_token *token)
|
|
{
|
|
return security_token_is_sid(token, &global_sid_Anonymous);
|
|
}
|
|
|
|
bool security_token_has_sid(const struct security_token *token, const struct dom_sid *sid)
|
|
{
|
|
uint32_t i;
|
|
for (i = 0; i < token->num_sids; i++) {
|
|
if (dom_sid_equal(&token->sids[i], sid)) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
size_t security_token_count_flag_sids(const struct security_token *token,
|
|
const struct dom_sid *prefix_sid,
|
|
size_t num_flags,
|
|
const struct dom_sid **_flag_sid)
|
|
{
|
|
const size_t num_auths_expected = prefix_sid->num_auths + num_flags;
|
|
const struct dom_sid *found = NULL;
|
|
size_t num = 0;
|
|
uint32_t i;
|
|
|
|
SMB_ASSERT(num_auths_expected <= ARRAY_SIZE(prefix_sid->sub_auths));
|
|
|
|
for (i = 0; i < token->num_sids; i++) {
|
|
const struct dom_sid *sid = &token->sids[i];
|
|
int cmp;
|
|
|
|
if (sid->num_auths != num_auths_expected) {
|
|
continue;
|
|
}
|
|
|
|
cmp = dom_sid_compare_domain(sid, prefix_sid);
|
|
if (cmp != 0) {
|
|
continue;
|
|
}
|
|
|
|
num += 1;
|
|
found = sid;
|
|
}
|
|
|
|
if ((num == 1) && (_flag_sid != NULL)) {
|
|
*_flag_sid = found;
|
|
}
|
|
|
|
return num;
|
|
}
|
|
|
|
bool security_token_has_builtin_guests(const struct security_token *token)
|
|
{
|
|
return security_token_has_sid(token, &global_sid_Builtin_Guests);
|
|
}
|
|
|
|
bool security_token_has_builtin_administrators(const struct security_token *token)
|
|
{
|
|
return security_token_has_sid(token, &global_sid_Builtin_Administrators);
|
|
}
|
|
|
|
bool security_token_has_nt_authenticated_users(const struct security_token *token)
|
|
{
|
|
return security_token_has_sid(token, &global_sid_Authenticated_Users);
|
|
}
|
|
|
|
bool security_token_has_enterprise_dcs(const struct security_token *token)
|
|
{
|
|
return security_token_has_sid(token, &global_sid_Enterprise_DCs);
|
|
}
|