2 Unix SMB/CIFS implementation.
3 Samba utility functions
4 Copyright (C) Andrew Tridgell 1992-1999
5 Copyright (C) Luke Kenneth Casson Leighton 1996 - 1999
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/security.h"
23 #include "libcli/security/secace.h"
24 #include "libcli/security/dom_sid.h"
25 #include "librpc/ndr/libndr.h"
27 /****************************************************************************
28 convert a security permissions into a string
29 ****************************************************************************/
31 char *get_sec_mask_str(TALLOC_CTX
*ctx
, uint32_t type
)
33 char *typestr
= talloc_strdup(ctx
, "");
39 if (type
& SEC_GENERIC_ALL
) {
40 typestr
= talloc_asprintf_append(typestr
,
41 "Generic all access ");
46 if (type
& SEC_GENERIC_EXECUTE
) {
47 typestr
= talloc_asprintf_append(typestr
,
48 "Generic execute access");
53 if (type
& SEC_GENERIC_WRITE
) {
54 typestr
= talloc_asprintf_append(typestr
,
55 "Generic write access ");
60 if (type
& SEC_GENERIC_READ
) {
61 typestr
= talloc_asprintf_append(typestr
,
62 "Generic read access ");
67 if (type
& SEC_FLAG_MAXIMUM_ALLOWED
) {
68 typestr
= talloc_asprintf_append(typestr
,
69 "MAXIMUM_ALLOWED_ACCESS ");
74 if (type
& SEC_FLAG_SYSTEM_SECURITY
) {
75 typestr
= talloc_asprintf_append(typestr
,
76 "SYSTEM_SECURITY_ACCESS ");
81 if (type
& SEC_STD_SYNCHRONIZE
) {
82 typestr
= talloc_asprintf_append(typestr
,
83 "SYNCHRONIZE_ACCESS ");
88 if (type
& SEC_STD_WRITE_OWNER
) {
89 typestr
= talloc_asprintf_append(typestr
,
90 "WRITE_OWNER_ACCESS ");
95 if (type
& SEC_STD_WRITE_DAC
) {
96 typestr
= talloc_asprintf_append(typestr
,
102 if (type
& SEC_STD_READ_CONTROL
) {
103 typestr
= talloc_asprintf_append(typestr
,
104 "READ_CONTROL_ACCESS ");
109 if (type
& SEC_STD_DELETE
) {
110 typestr
= talloc_asprintf_append(typestr
,
117 printf("\t\tSpecific bits: 0x%lx\n", (unsigned long)type
&SEC_MASK_SPECIFIC
);
122 /****************************************************************************
123 display sec_access structure
124 ****************************************************************************/
125 void display_sec_access(uint32_t *info
)
127 char *mask_str
= get_sec_mask_str(NULL
, *info
);
128 printf("\t\tPermissions: 0x%x: %s\n", *info
, mask_str
? mask_str
: "");
129 talloc_free(mask_str
);
132 /****************************************************************************
133 display sec_ace flags
134 ****************************************************************************/
135 void display_sec_ace_flags(uint8_t flags
)
137 if (flags
& SEC_ACE_FLAG_OBJECT_INHERIT
)
138 printf("SEC_ACE_FLAG_OBJECT_INHERIT ");
139 if (flags
& SEC_ACE_FLAG_CONTAINER_INHERIT
)
140 printf(" SEC_ACE_FLAG_CONTAINER_INHERIT ");
141 if (flags
& SEC_ACE_FLAG_NO_PROPAGATE_INHERIT
)
142 printf("SEC_ACE_FLAG_NO_PROPAGATE_INHERIT ");
143 if (flags
& SEC_ACE_FLAG_INHERIT_ONLY
)
144 printf("SEC_ACE_FLAG_INHERIT_ONLY ");
145 if (flags
& SEC_ACE_FLAG_INHERITED_ACE
)
146 printf("SEC_ACE_FLAG_INHERITED_ACE ");
147 /* if (flags & SEC_ACE_FLAG_VALID_INHERIT)
148 printf("SEC_ACE_FLAG_VALID_INHERIT "); */
149 if (flags
& SEC_ACE_FLAG_SUCCESSFUL_ACCESS
)
150 printf("SEC_ACE_FLAG_SUCCESSFUL_ACCESS ");
151 if (flags
& SEC_ACE_FLAG_FAILED_ACCESS
)
152 printf("SEC_ACE_FLAG_FAILED_ACCESS ");
157 /****************************************************************************
158 display sec_ace object
159 ****************************************************************************/
160 static void disp_sec_ace_object(struct security_ace_object
*object
)
163 if (object
->flags
& SEC_ACE_OBJECT_TYPE_PRESENT
) {
164 str
= GUID_string(NULL
, &object
->type
.type
);
165 if (str
== NULL
) return;
166 printf("Object type: SEC_ACE_OBJECT_TYPE_PRESENT\n");
167 printf("Object GUID: %s\n", str
);
170 if (object
->flags
& SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT
) {
171 str
= GUID_string(NULL
, &object
->inherited_type
.inherited_type
);
172 if (str
== NULL
) return;
173 printf("Object type: SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT\n");
174 printf("Object GUID: %s\n", str
);
179 /****************************************************************************
180 display sec_ace structure
181 ****************************************************************************/
182 void display_sec_ace(struct security_ace
*ace
)
186 printf("\tACE\n\t\ttype: ");
188 case SEC_ACE_TYPE_ACCESS_ALLOWED
:
189 printf("ACCESS ALLOWED");
191 case SEC_ACE_TYPE_ACCESS_DENIED
:
192 printf("ACCESS DENIED");
194 case SEC_ACE_TYPE_SYSTEM_AUDIT
:
195 printf("SYSTEM AUDIT");
197 case SEC_ACE_TYPE_SYSTEM_ALARM
:
198 printf("SYSTEM ALARM");
200 case SEC_ACE_TYPE_ALLOWED_COMPOUND
:
201 printf("SEC_ACE_TYPE_ALLOWED_COMPOUND");
203 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT
:
204 printf("SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT");
206 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT
:
207 printf("SEC_ACE_TYPE_ACCESS_DENIED_OBJECT");
209 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT
:
210 printf("SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT");
212 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT
:
213 printf("SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT");
220 printf(" (%d) flags: 0x%02x ", ace
->type
, ace
->flags
);
221 display_sec_ace_flags(ace
->flags
);
222 display_sec_access(&ace
->access_mask
);
223 sid_str
= dom_sid_string(NULL
, &ace
->trustee
);
224 printf("\t\tSID: %s\n\n", sid_str
);
225 talloc_free(sid_str
);
227 if (sec_ace_object(ace
->type
)) {
228 disp_sec_ace_object(&ace
->object
.object
);
233 /****************************************************************************
234 display sec_acl structure
235 ****************************************************************************/
236 void display_sec_acl(struct security_acl
*sec_acl
)
240 printf("\tACL\tNum ACEs:\t%d\trevision:\t%x\n",
241 sec_acl
->num_aces
, sec_acl
->revision
);
244 if (sec_acl
->size
!= 0 && sec_acl
->num_aces
!= 0) {
245 for (i
= 0; i
< sec_acl
->num_aces
; i
++) {
246 display_sec_ace(&sec_acl
->aces
[i
]);
251 void display_acl_type(uint16_t type
)
253 printf("type: 0x%04x: ", type
);
255 if (type
& SEC_DESC_OWNER_DEFAULTED
) /* 0x0001 */
256 printf("SEC_DESC_OWNER_DEFAULTED ");
257 if (type
& SEC_DESC_GROUP_DEFAULTED
) /* 0x0002 */
258 printf("SEC_DESC_GROUP_DEFAULTED ");
259 if (type
& SEC_DESC_DACL_PRESENT
) /* 0x0004 */
260 printf("SEC_DESC_DACL_PRESENT ");
261 if (type
& SEC_DESC_DACL_DEFAULTED
) /* 0x0008 */
262 printf("SEC_DESC_DACL_DEFAULTED ");
263 if (type
& SEC_DESC_SACL_PRESENT
) /* 0x0010 */
264 printf("SEC_DESC_SACL_PRESENT ");
265 if (type
& SEC_DESC_SACL_DEFAULTED
) /* 0x0020 */
266 printf("SEC_DESC_SACL_DEFAULTED ");
267 if (type
& SEC_DESC_DACL_TRUSTED
) /* 0x0040 */
268 printf("SEC_DESC_DACL_TRUSTED ");
269 if (type
& SEC_DESC_SERVER_SECURITY
) /* 0x0080 */
270 printf("SEC_DESC_SERVER_SECURITY ");
271 if (type
& SEC_DESC_DACL_AUTO_INHERIT_REQ
) /* 0x0100 */
272 printf("SEC_DESC_DACL_AUTO_INHERIT_REQ ");
273 if (type
& SEC_DESC_SACL_AUTO_INHERIT_REQ
) /* 0x0200 */
274 printf("SEC_DESC_SACL_AUTO_INHERIT_REQ ");
275 if (type
& SEC_DESC_DACL_AUTO_INHERITED
) /* 0x0400 */
276 printf("SEC_DESC_DACL_AUTO_INHERITED ");
277 if (type
& SEC_DESC_SACL_AUTO_INHERITED
) /* 0x0800 */
278 printf("SEC_DESC_SACL_AUTO_INHERITED ");
279 if (type
& SEC_DESC_DACL_PROTECTED
) /* 0x1000 */
280 printf("SEC_DESC_DACL_PROTECTED ");
281 if (type
& SEC_DESC_SACL_PROTECTED
) /* 0x2000 */
282 printf("SEC_DESC_SACL_PROTECTED ");
283 if (type
& SEC_DESC_RM_CONTROL_VALID
) /* 0x4000 */
284 printf("SEC_DESC_RM_CONTROL_VALID ");
285 if (type
& SEC_DESC_SELF_RELATIVE
) /* 0x8000 */
286 printf("SEC_DESC_SELF_RELATIVE ");
291 /****************************************************************************
292 display sec_desc structure
293 ****************************************************************************/
294 void display_sec_desc(struct security_descriptor
*sec
)
303 printf("revision: %d\n", sec
->revision
);
304 display_acl_type(sec
->type
);
308 display_sec_acl(sec
->sacl
);
313 display_sec_acl(sec
->dacl
);
316 if (sec
->owner_sid
) {
317 sid_str
= dom_sid_string(NULL
, sec
->owner_sid
);
318 printf("\tOwner SID:\t%s\n", sid_str
);
319 talloc_free(sid_str
);
322 if (sec
->group_sid
) {
323 sid_str
= dom_sid_string(NULL
, sec
->group_sid
);
324 printf("\tGroup SID:\t%s\n", sid_str
);
325 talloc_free(sid_str
);