s3:libsmb/cliconnect: make use of ntlmssp_is_anonymous()
[Samba/gebeck_regimport.git] / source3 / lib / util_nttoken.c
blobffa858d77946e717a4c93fff399be6fe55cc25ef
1 /*
2 * Unix SMB/CIFS implementation.
3 * Authentication utility functions
4 * Copyright (C) Andrew Tridgell 1992-1998
5 * Copyright (C) Andrew Bartlett 2001
6 * Copyright (C) Jeremy Allison 2000-2001
7 * Copyright (C) Rafal Szczesniak 2002
8 * Copyright (C) Volker Lendecke 2006
9 * Copyright (C) Michael Adam 2007
10 * Copyright (C) Guenther Deschner 2007
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 3 of the License, or
15 * (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, see <http://www.gnu.org/licenses/>.
26 /* function(s) moved from auth/auth_util.c to minimize linker deps */
28 #include "includes.h"
29 #include "../libcli/security/security.h"
31 /****************************************************************************
32 Duplicate a SID token.
33 ****************************************************************************/
35 struct security_token *dup_nt_token(TALLOC_CTX *mem_ctx, const struct security_token *ptoken)
37 struct security_token *token;
39 if (!ptoken)
40 return NULL;
42 token = talloc_zero(mem_ctx, struct security_token);
43 if (token == NULL) {
44 DEBUG(0, ("talloc failed\n"));
45 return NULL;
48 if (ptoken->sids && ptoken->num_sids) {
49 token->sids = (struct dom_sid *)talloc_memdup(
50 token, ptoken->sids, sizeof(struct dom_sid) * ptoken->num_sids );
52 if (token->sids == NULL) {
53 DEBUG(0, ("talloc_memdup failed\n"));
54 TALLOC_FREE(token);
55 return NULL;
57 token->num_sids = ptoken->num_sids;
60 token->privilege_mask = ptoken->privilege_mask;
61 token->rights_mask = ptoken->rights_mask;
63 return token;
66 /****************************************************************************
67 merge NT tokens
68 ****************************************************************************/
70 NTSTATUS merge_nt_token(TALLOC_CTX *mem_ctx,
71 const struct security_token *token_1,
72 const struct security_token *token_2,
73 struct security_token **token_out)
75 struct security_token *token = NULL;
76 NTSTATUS status;
77 int i;
79 if (!token_1 || !token_2 || !token_out) {
80 return NT_STATUS_INVALID_PARAMETER;
83 token = talloc_zero(mem_ctx, struct security_token);
84 NT_STATUS_HAVE_NO_MEMORY(token);
86 for (i=0; i < token_1->num_sids; i++) {
87 status = add_sid_to_array_unique(mem_ctx,
88 &token_1->sids[i],
89 &token->sids,
90 &token->num_sids);
91 if (!NT_STATUS_IS_OK(status)) {
92 TALLOC_FREE(token);
93 return status;
97 for (i=0; i < token_2->num_sids; i++) {
98 status = add_sid_to_array_unique(mem_ctx,
99 &token_2->sids[i],
100 &token->sids,
101 &token->num_sids);
102 if (!NT_STATUS_IS_OK(status)) {
103 TALLOC_FREE(token);
104 return status;
108 token->privilege_mask |= token_1->privilege_mask;
109 token->privilege_mask |= token_2->privilege_mask;
111 token->rights_mask |= token_1->rights_mask;
112 token->rights_mask |= token_2->rights_mask;
114 *token_out = token;
116 return NT_STATUS_OK;
119 /*******************************************************************
120 Check if this struct security_ace has a SID in common with the token.
121 ********************************************************************/
123 bool token_sid_in_ace(const struct security_token *token, const struct security_ace *ace)
125 size_t i;
127 for (i = 0; i < token->num_sids; i++) {
128 if (dom_sid_equal(&ace->trustee, &token->sids[i]))
129 return true;
132 return false;