source: vendor/current/libcli/security/security_token.c@ 740

Last change on this file since 740 was 740, checked in by Silvan Scherrer, 12 years ago

Samba Server: update vendor to 3.6.0

File size: 3.9 KB
Line 
1/*
2 Unix SMB/CIFS implementation.
3
4 security descriptor utility functions
5
6 Copyright (C) Andrew Tridgell 2004
7 Copyright (C) Andrew Bartlett 2010
8 Copyright (C) Stefan Metzmacher 2005
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
22*/
23
24#include "includes.h"
25#include "libcli/security/security_token.h"
26#include "libcli/security/dom_sid.h"
27#include "libcli/security/privileges.h"
28
29/*
30 return a blank security token
31*/
32struct security_token *security_token_initialise(TALLOC_CTX *mem_ctx)
33{
34 struct security_token *st;
35
36 st = talloc_zero(mem_ctx, struct security_token);
37 if (!st) {
38 return NULL;
39 }
40
41 return st;
42}
43
44/****************************************************************************
45 prints a struct security_token to debug output.
46****************************************************************************/
47void security_token_debug(int dbg_class, int dbg_lev, const struct security_token *token)
48{
49 TALLOC_CTX *mem_ctx;
50 uint32_t i;
51
52 if (!token) {
53 DEBUGC(dbg_class, dbg_lev, ("Security token: (NULL)\n"));
54 return;
55 }
56
57 mem_ctx = talloc_init("security_token_debug()");
58 if (!mem_ctx) {
59 return;
60 }
61
62 DEBUGC(dbg_class, dbg_lev, ("Security token SIDs (%lu):\n",
63 (unsigned long)token->num_sids));
64 for (i = 0; i < token->num_sids; i++) {
65 DEBUGADDC(dbg_class, dbg_lev, (" SID[%3lu]: %s\n", (unsigned long)i,
66 dom_sid_string(mem_ctx, &token->sids[i])));
67 }
68
69 security_token_debug_privileges(dbg_class, dbg_lev, token);
70
71 talloc_free(mem_ctx);
72}
73
74/* These really should be cheaper... */
75
76bool security_token_is_sid(const struct security_token *token, const struct dom_sid *sid)
77{
78 if (token->sids && dom_sid_equal(&token->sids[PRIMARY_USER_SID_INDEX], sid)) {
79 return true;
80 }
81 return false;
82}
83
84bool security_token_is_sid_string(const struct security_token *token, const char *sid_string)
85{
86 bool ret;
87 struct dom_sid *sid = dom_sid_parse_talloc(NULL, sid_string);
88 if (!sid) return false;
89
90 ret = security_token_is_sid(token, sid);
91
92 talloc_free(sid);
93 return ret;
94}
95
96bool security_token_is_system(const struct security_token *token)
97{
98 return security_token_is_sid(token, &global_sid_System);
99}
100
101bool security_token_is_anonymous(const struct security_token *token)
102{
103 return security_token_is_sid(token, &global_sid_Anonymous);
104}
105
106bool security_token_has_sid(const struct security_token *token, const struct dom_sid *sid)
107{
108 uint32_t i;
109 for (i = 0; i < token->num_sids; i++) {
110 if (dom_sid_equal(&token->sids[i], sid)) {
111 return true;
112 }
113 }
114 return false;
115}
116
117bool security_token_has_sid_string(const struct security_token *token, const char *sid_string)
118{
119 bool ret;
120 struct dom_sid *sid = dom_sid_parse_talloc(NULL, sid_string);
121 if (!sid) return false;
122
123 ret = security_token_has_sid(token, sid);
124
125 talloc_free(sid);
126 return ret;
127}
128
129bool security_token_has_builtin_administrators(const struct security_token *token)
130{
131 return security_token_has_sid(token, &global_sid_Builtin_Administrators);
132}
133
134bool security_token_has_nt_authenticated_users(const struct security_token *token)
135{
136 return security_token_has_sid(token, &global_sid_Authenticated_Users);
137}
138
139bool security_token_has_enterprise_dcs(const struct security_token *token)
140{
141 return security_token_has_sid(token, &global_sid_Enterprise_DCs);
142}
Note: See TracBrowser for help on using the repository browser.