2 * Unix SMB/CIFS implementation.
3 * Authentication utility functions
4 * Copyright (C) Andrew Tridgell 1992-1998
5 * Copyright (C) Andrew Bartlett 2001
6 * Copyright (C) Jeremy Allison 2000-2001
7 * Copyright (C) Rafal Szczesniak 2002
8 * Copyright (C) Volker Lendecke 2006
9 * Copyright (C) Michael Adam 2007
10 * Copyright (C) Guenther Deschner 2007
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 3 of the License, or
15 * (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, see <http://www.gnu.org/licenses/>.
26 /* function(s) moved from auth/auth_util.c to minimize linker deps */
29 #include "../libcli/security/security.h"
31 /****************************************************************************
32 Duplicate a SID token.
33 ****************************************************************************/
35 struct security_token
*dup_nt_token(TALLOC_CTX
*mem_ctx
, const struct security_token
*ptoken
)
37 struct security_token
*token
;
42 token
= talloc_zero(mem_ctx
, struct security_token
);
44 DEBUG(0, ("talloc failed\n"));
48 if (ptoken
->sids
&& ptoken
->num_sids
) {
49 token
->sids
= (struct dom_sid
*)talloc_memdup(
50 token
, ptoken
->sids
, sizeof(struct dom_sid
) * ptoken
->num_sids
);
52 if (token
->sids
== NULL
) {
53 DEBUG(0, ("talloc_memdup failed\n"));
57 token
->num_sids
= ptoken
->num_sids
;
60 token
->privilege_mask
= ptoken
->privilege_mask
;
61 token
->rights_mask
= ptoken
->rights_mask
;
66 /****************************************************************************
68 ****************************************************************************/
70 NTSTATUS
merge_nt_token(TALLOC_CTX
*mem_ctx
,
71 const struct security_token
*token_1
,
72 const struct security_token
*token_2
,
73 struct security_token
**token_out
)
75 struct security_token
*token
= NULL
;
79 if (!token_1
|| !token_2
|| !token_out
) {
80 return NT_STATUS_INVALID_PARAMETER
;
83 token
= talloc_zero(mem_ctx
, struct security_token
);
84 NT_STATUS_HAVE_NO_MEMORY(token
);
86 for (i
=0; i
< token_1
->num_sids
; i
++) {
87 status
= add_sid_to_array_unique(mem_ctx
,
91 if (!NT_STATUS_IS_OK(status
)) {
97 for (i
=0; i
< token_2
->num_sids
; i
++) {
98 status
= add_sid_to_array_unique(mem_ctx
,
102 if (!NT_STATUS_IS_OK(status
)) {
108 token
->privilege_mask
|= token_1
->privilege_mask
;
109 token
->privilege_mask
|= token_2
->privilege_mask
;
111 token
->rights_mask
|= token_1
->rights_mask
;
112 token
->rights_mask
|= token_2
->rights_mask
;
119 /*******************************************************************
120 Check if this struct security_ace has a SID in common with the token.
121 ********************************************************************/
123 bool token_sid_in_ace(const struct security_token
*token
, const struct security_ace
*ace
)
127 for (i
= 0; i
< token
->num_sids
; i
++) {
128 if (dom_sid_equal(&ace
->trustee
, &token
->sids
[i
]))