s3:ntlm_auth: make logs more consistent with length check
[Samba.git] / libcli / security / display_sec.c
blobbe89a33f1761cb892e2538a6caa416421ae8a215
1 /*
2 Unix SMB/CIFS implementation.
3 Samba utility functions
4 Copyright (C) Andrew Tridgell 1992-1999
5 Copyright (C) Luke Kenneth Casson Leighton 1996 - 1999
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "replace.h"
22 #include "libcli/security/security.h"
23 #include "librpc/ndr/libndr.h"
24 #include "libcli/security/display_sec.h"
26 /****************************************************************************
27 convert a security permissions into a string
28 ****************************************************************************/
30 char *get_sec_mask_str(TALLOC_CTX *ctx, uint32_t type)
32 char *typestr = talloc_strdup(ctx, "");
34 if (type & SEC_GENERIC_ALL) {
35 talloc_asprintf_addbuf(&typestr, "Generic all access ");
37 if (type & SEC_GENERIC_EXECUTE) {
38 talloc_asprintf_addbuf(&typestr, "Generic execute access");
40 if (type & SEC_GENERIC_WRITE) {
41 talloc_asprintf_addbuf(&typestr, "Generic write access ");
43 if (type & SEC_GENERIC_READ) {
44 talloc_asprintf_addbuf(&typestr, "Generic read access ");
46 if (type & SEC_FLAG_MAXIMUM_ALLOWED) {
47 talloc_asprintf_addbuf(&typestr, "MAXIMUM_ALLOWED_ACCESS ");
49 if (type & SEC_FLAG_SYSTEM_SECURITY) {
50 talloc_asprintf_addbuf(&typestr, "SYSTEM_SECURITY_ACCESS ");
52 if (type & SEC_STD_SYNCHRONIZE) {
53 talloc_asprintf_addbuf(&typestr, "SYNCHRONIZE_ACCESS ");
55 if (type & SEC_STD_WRITE_OWNER) {
56 talloc_asprintf_addbuf(&typestr, "WRITE_OWNER_ACCESS ");
58 if (type & SEC_STD_WRITE_DAC) {
59 talloc_asprintf_addbuf(&typestr, "WRITE_DAC_ACCESS ");
61 if (type & SEC_STD_READ_CONTROL) {
62 talloc_asprintf_addbuf(&typestr, "READ_CONTROL_ACCESS ");
64 if (type & SEC_STD_DELETE) {
65 talloc_asprintf_addbuf(&typestr, "DELETE_ACCESS ");
68 printf("\t\tSpecific bits: 0x%lx\n", (unsigned long)type&SEC_MASK_SPECIFIC);
70 return typestr;
73 /****************************************************************************
74 display sec_access structure
75 ****************************************************************************/
76 void display_sec_access(uint32_t *info)
78 char *mask_str = get_sec_mask_str(NULL, *info);
79 printf("\t\tPermissions: 0x%x: %s\n", *info, mask_str ? mask_str : "");
80 talloc_free(mask_str);
83 /****************************************************************************
84 display sec_ace flags
85 ****************************************************************************/
86 void display_sec_ace_flags(uint8_t flags)
88 if (flags & SEC_ACE_FLAG_OBJECT_INHERIT)
89 printf("SEC_ACE_FLAG_OBJECT_INHERIT ");
90 if (flags & SEC_ACE_FLAG_CONTAINER_INHERIT)
91 printf(" SEC_ACE_FLAG_CONTAINER_INHERIT ");
92 if (flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT)
93 printf("SEC_ACE_FLAG_NO_PROPAGATE_INHERIT ");
94 if (flags & SEC_ACE_FLAG_INHERIT_ONLY)
95 printf("SEC_ACE_FLAG_INHERIT_ONLY ");
96 if (flags & SEC_ACE_FLAG_INHERITED_ACE)
97 printf("SEC_ACE_FLAG_INHERITED_ACE ");
98 /* if (flags & SEC_ACE_FLAG_VALID_INHERIT)
99 printf("SEC_ACE_FLAG_VALID_INHERIT "); */
100 if (flags & SEC_ACE_FLAG_SUCCESSFUL_ACCESS)
101 printf("SEC_ACE_FLAG_SUCCESSFUL_ACCESS ");
102 if (flags & SEC_ACE_FLAG_FAILED_ACCESS)
103 printf("SEC_ACE_FLAG_FAILED_ACCESS ");
105 printf("\n");
108 /****************************************************************************
109 display sec_ace object
110 ****************************************************************************/
111 static void disp_sec_ace_object(struct security_ace_object *object)
113 char *str;
114 if (object->flags & SEC_ACE_OBJECT_TYPE_PRESENT) {
115 str = GUID_string(NULL, &object->type.type);
116 if (str == NULL) return;
117 printf("Object type: SEC_ACE_OBJECT_TYPE_PRESENT\n");
118 printf("Object GUID: %s\n", str);
119 talloc_free(str);
121 if (object->flags & SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT) {
122 str = GUID_string(NULL, &object->inherited_type.inherited_type);
123 if (str == NULL) return;
124 printf("Object type: SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT\n");
125 printf("Object GUID: %s\n", str);
126 talloc_free(str);
130 /****************************************************************************
131 display sec_ace structure
132 ****************************************************************************/
133 void display_sec_ace(struct security_ace *ace)
135 struct dom_sid_buf sid_str;
137 printf("\tACE\n\t\ttype: ");
138 switch (ace->type) {
139 case SEC_ACE_TYPE_ACCESS_ALLOWED:
140 printf("ACCESS ALLOWED");
141 break;
142 case SEC_ACE_TYPE_ACCESS_DENIED:
143 printf("ACCESS DENIED");
144 break;
145 case SEC_ACE_TYPE_SYSTEM_AUDIT:
146 printf("SYSTEM AUDIT");
147 break;
148 case SEC_ACE_TYPE_SYSTEM_ALARM:
149 printf("SYSTEM ALARM");
150 break;
151 #define ACE_CASE(x) case x: printf(#x); break
152 ACE_CASE(SEC_ACE_TYPE_ALLOWED_COMPOUND);
153 ACE_CASE(SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT);
154 ACE_CASE(SEC_ACE_TYPE_ACCESS_DENIED_OBJECT);
155 ACE_CASE(SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT);
156 ACE_CASE(SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT);
157 ACE_CASE(SEC_ACE_TYPE_ACCESS_ALLOWED_CALLBACK);
158 ACE_CASE(SEC_ACE_TYPE_ACCESS_DENIED_CALLBACK);
159 ACE_CASE(SEC_ACE_TYPE_ACCESS_ALLOWED_CALLBACK_OBJECT);
160 ACE_CASE(SEC_ACE_TYPE_ACCESS_DENIED_CALLBACK_OBJECT);
161 ACE_CASE(SEC_ACE_TYPE_SYSTEM_AUDIT_CALLBACK);
162 ACE_CASE(SEC_ACE_TYPE_SYSTEM_ALARM_CALLBACK);
163 ACE_CASE(SEC_ACE_TYPE_SYSTEM_AUDIT_CALLBACK_OBJECT);
164 ACE_CASE(SEC_ACE_TYPE_SYSTEM_ALARM_CALLBACK_OBJECT);
165 #undef ACE_CASE
166 default:
167 printf("????");
168 break;
171 printf(" (%d) flags: 0x%02x ", ace->type, ace->flags);
172 display_sec_ace_flags(ace->flags);
173 display_sec_access(&ace->access_mask);
174 printf("\t\tSID: %s\n\n", dom_sid_str_buf(&ace->trustee, &sid_str));
176 if (sec_ace_object(ace->type)) {
177 disp_sec_ace_object(&ace->object.object);
182 /****************************************************************************
183 display sec_acl structure
184 ****************************************************************************/
185 void display_sec_acl(struct security_acl *sec_acl)
187 uint32_t i;
189 printf("\tACL\tNum ACEs:\t%u\trevision:\t%x\n",
190 sec_acl->num_aces, sec_acl->revision);
191 printf("\t---\n");
193 if (sec_acl->size != 0 && sec_acl->num_aces != 0) {
194 for (i = 0; i < sec_acl->num_aces; i++) {
195 display_sec_ace(&sec_acl->aces[i]);
200 void display_acl_type(uint16_t type)
202 printf("type: 0x%04x: ", type);
204 if (type & SEC_DESC_OWNER_DEFAULTED) /* 0x0001 */
205 printf("SEC_DESC_OWNER_DEFAULTED ");
206 if (type & SEC_DESC_GROUP_DEFAULTED) /* 0x0002 */
207 printf("SEC_DESC_GROUP_DEFAULTED ");
208 if (type & SEC_DESC_DACL_PRESENT) /* 0x0004 */
209 printf("SEC_DESC_DACL_PRESENT ");
210 if (type & SEC_DESC_DACL_DEFAULTED) /* 0x0008 */
211 printf("SEC_DESC_DACL_DEFAULTED ");
212 if (type & SEC_DESC_SACL_PRESENT) /* 0x0010 */
213 printf("SEC_DESC_SACL_PRESENT ");
214 if (type & SEC_DESC_SACL_DEFAULTED) /* 0x0020 */
215 printf("SEC_DESC_SACL_DEFAULTED ");
216 if (type & SEC_DESC_DACL_TRUSTED) /* 0x0040 */
217 printf("SEC_DESC_DACL_TRUSTED ");
218 if (type & SEC_DESC_SERVER_SECURITY) /* 0x0080 */
219 printf("SEC_DESC_SERVER_SECURITY ");
220 if (type & SEC_DESC_DACL_AUTO_INHERIT_REQ) /* 0x0100 */
221 printf("SEC_DESC_DACL_AUTO_INHERIT_REQ ");
222 if (type & SEC_DESC_SACL_AUTO_INHERIT_REQ) /* 0x0200 */
223 printf("SEC_DESC_SACL_AUTO_INHERIT_REQ ");
224 if (type & SEC_DESC_DACL_AUTO_INHERITED) /* 0x0400 */
225 printf("SEC_DESC_DACL_AUTO_INHERITED ");
226 if (type & SEC_DESC_SACL_AUTO_INHERITED) /* 0x0800 */
227 printf("SEC_DESC_SACL_AUTO_INHERITED ");
228 if (type & SEC_DESC_DACL_PROTECTED) /* 0x1000 */
229 printf("SEC_DESC_DACL_PROTECTED ");
230 if (type & SEC_DESC_SACL_PROTECTED) /* 0x2000 */
231 printf("SEC_DESC_SACL_PROTECTED ");
232 if (type & SEC_DESC_RM_CONTROL_VALID) /* 0x4000 */
233 printf("SEC_DESC_RM_CONTROL_VALID ");
234 if (type & SEC_DESC_SELF_RELATIVE) /* 0x8000 */
235 printf("SEC_DESC_SELF_RELATIVE ");
237 printf("\n");
240 /****************************************************************************
241 display sec_desc structure
242 ****************************************************************************/
243 void display_sec_desc(struct security_descriptor *sec)
245 struct dom_sid_buf sid_str;
247 if (!sec) {
248 printf("NULL\n");
249 return;
252 printf("revision: %d\n", sec->revision);
253 display_acl_type(sec->type);
255 if (sec->sacl) {
256 printf("SACL\n");
257 display_sec_acl(sec->sacl);
260 if (sec->dacl) {
261 printf("DACL\n");
262 display_sec_acl(sec->dacl);
265 if (sec->owner_sid) {
266 printf("\tOwner SID:\t%s\n",
267 dom_sid_str_buf(sec->owner_sid, &sid_str));
270 if (sec->group_sid) {
271 printf("\tGroup SID:\t%s\n",
272 dom_sid_str_buf(sec->group_sid, &sid_str));