4b6fb81d7550c0f3eb470160311159727fbdbcf2
[obnox/samba/samba-obnox.git] / source3 / lib / util_sid.c
1 /* 
2    Unix SMB/CIFS implementation.
3    Samba utility functions
4    Copyright (C) Andrew Tridgell                1992-1998
5    Copyright (C) Luke Kenneth Caseson Leighton  1998-1999
6    Copyright (C) Jeremy Allison                 1999
7    Copyright (C) Stefan (metze) Metzmacher      2002
8    Copyright (C) Simo Sorce                     2002
9    Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2005
10
11    This program is free software; you can redistribute it and/or modify
12    it under the terms of the GNU General Public License as published by
13    the Free Software Foundation; either version 3 of the License, or
14    (at your option) any later version.
15
16    This program is distributed in the hope that it will be useful,
17    but WITHOUT ANY WARRANTY; without even the implied warranty of
18    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
19    GNU General Public License for more details.
20
21    You should have received a copy of the GNU General Public License
22    along with this program.  If not, see <http://www.gnu.org/licenses/>.
23 */
24
25 #include "includes.h"
26 #include "../librpc/gen_ndr/ndr_security.h"
27 #include "../librpc/gen_ndr/netlogon.h"
28 #include "../libcli/security/security.h"
29
30
31 /*****************************************************************
32  Convert a SID to an ascii string.
33 *****************************************************************/
34
35 char *sid_to_fstring(fstring sidstr_out, const struct dom_sid *sid)
36 {
37         dom_sid_string_buf(sid, sidstr_out, sizeof(fstring));
38         return sidstr_out;
39 }
40
41 /*****************************************************************
42  Essentially a renamed dom_sid_string from
43  ../libcli/security/dom_sid.c with a panic if it didn't work.
44 *****************************************************************/
45
46 char *sid_string_talloc(TALLOC_CTX *mem_ctx, const struct dom_sid *sid)
47 {
48         char *result = dom_sid_string(mem_ctx, sid);
49         SMB_ASSERT(result != NULL);
50         return result;
51 }
52
53 /*****************************************************************
54  Useful function for debug lines.
55 *****************************************************************/
56
57 char *sid_string_dbg(const struct dom_sid *sid)
58 {
59         return sid_string_talloc(talloc_tos(), sid);
60 }
61
62 /*****************************************************************
63  Use with care!
64 *****************************************************************/
65
66 char *sid_string_tos(const struct dom_sid *sid)
67 {
68         return sid_string_talloc(talloc_tos(), sid);
69 }
70
71 /*****************************************************************
72  Write a sid out into on-the-wire format.
73 *****************************************************************/  
74
75 bool sid_linearize(uint8_t *outbuf, size_t len, const struct dom_sid *sid)
76 {
77         size_t i;
78
79         if (len < ndr_size_dom_sid(sid, 0))
80                 return False;
81
82         SCVAL(outbuf,0,sid->sid_rev_num);
83         SCVAL(outbuf,1,sid->num_auths);
84         memcpy(&outbuf[2], sid->id_auth, 6);
85         for(i = 0; i < sid->num_auths; i++)
86                 SIVAL(outbuf, 8 + (i*4), sid->sub_auths[i]);
87
88         return True;
89 }
90
91 /*****************************************************************
92  Returns true if SID is internal (and non-mappable).
93 *****************************************************************/
94
95 bool non_mappable_sid(struct dom_sid *sid)
96 {
97         struct dom_sid dom;
98
99         sid_copy(&dom, sid);
100         sid_split_rid(&dom, NULL);
101
102         if (dom_sid_equal(&dom, &global_sid_Builtin))
103                 return True;
104
105         if (dom_sid_equal(&dom, &global_sid_NT_Authority))
106                 return True;
107
108         return False;
109 }
110
111 /*****************************************************************
112  Return the binary string representation of a struct dom_sid.
113  Caller must free.
114 *****************************************************************/
115
116 char *sid_binstring_hex_talloc(TALLOC_CTX *mem_ctx, const struct dom_sid *sid)
117 {
118         int len = ndr_size_dom_sid(sid, 0);
119         uint8_t buf[len];
120         sid_linearize(buf, len, sid);
121         return hex_encode_talloc(mem_ctx, buf, len);
122 }
123
124 NTSTATUS sid_array_from_info3(TALLOC_CTX *mem_ctx,
125                               const struct netr_SamInfo3 *info3,
126                               struct dom_sid **user_sids,
127                               uint32_t *num_user_sids,
128                               bool include_user_group_rid)
129 {
130         NTSTATUS status;
131         struct dom_sid sid;
132         struct dom_sid *sid_array = NULL;
133         uint32_t num_sids = 0;
134         int i;
135
136         if (include_user_group_rid) {
137                 if (!sid_compose(&sid, info3->base.domain_sid, info3->base.rid)) {
138                         DEBUG(3, ("could not compose user SID from rid 0x%x\n",
139                                   info3->base.rid));
140                         return NT_STATUS_INVALID_PARAMETER;
141                 }
142                 status = add_sid_to_array(mem_ctx, &sid, &sid_array, &num_sids);
143                 if (!NT_STATUS_IS_OK(status)) {
144                         DEBUG(3, ("could not append user SID from rid 0x%x\n",
145                                   info3->base.rid));
146                         return status;
147                 }
148         }
149
150         if (!sid_compose(&sid, info3->base.domain_sid, info3->base.primary_gid)) {
151                 DEBUG(3, ("could not compose group SID from rid 0x%x\n",
152                           info3->base.primary_gid));
153                 return NT_STATUS_INVALID_PARAMETER;
154         }
155         status = add_sid_to_array(mem_ctx, &sid, &sid_array, &num_sids);
156         if (!NT_STATUS_IS_OK(status)) {
157                 DEBUG(3, ("could not append group SID from rid 0x%x\n",
158                           info3->base.rid));
159                 return status;
160         }
161
162         for (i = 0; i < info3->base.groups.count; i++) {
163                 /* Don't add the primary group sid twice. */
164                 if (info3->base.primary_gid == info3->base.groups.rids[i].rid) {
165                         continue;
166                 }
167                 if (!sid_compose(&sid, info3->base.domain_sid,
168                                  info3->base.groups.rids[i].rid)) {
169                         DEBUG(3, ("could not compose SID from additional group "
170                                   "rid 0x%x\n", info3->base.groups.rids[i].rid));
171                         return NT_STATUS_INVALID_PARAMETER;
172                 }
173                 status = add_sid_to_array(mem_ctx, &sid, &sid_array, &num_sids);
174                 if (!NT_STATUS_IS_OK(status)) {
175                         DEBUG(3, ("could not append SID from additional group "
176                                   "rid 0x%x\n", info3->base.groups.rids[i].rid));
177                         return status;
178                 }
179         }
180
181         /* Copy 'other' sids.  We need to do sid filtering here to
182            prevent possible elevation of privileges.  See:
183
184            http://www.microsoft.com/windows2000/techinfo/administration/security/sidfilter.asp
185          */
186
187         for (i = 0; i < info3->sidcount; i++) {
188                 status = add_sid_to_array(mem_ctx, info3->sids[i].sid,
189                                       &sid_array, &num_sids);
190                 if (!NT_STATUS_IS_OK(status)) {
191                         DEBUG(3, ("could not add SID to array: %s\n",
192                                   sid_string_dbg(info3->sids[i].sid)));
193                         return status;
194                 }
195         }
196
197         *user_sids = sid_array;
198         *num_user_sids = num_sids;
199
200         return NT_STATUS_OK;
201 }