summaryrefslogtreecommitdiff
path: root/source4/libcli/security/privilege.c
blob: 93599598dbee061194a6fd145b0c25855206c1e2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
/*
   Unix SMB/CIFS implementation.

   manipulate privileges

   Copyright (C) Andrew Tridgell 2004

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 2 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to the Free Software
   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/

#include "includes.h"
#include "librpc/gen_ndr/ndr_security.h"


static const struct {
	enum sec_privilege privilege;
	const char *name;
} privilege_names[] = {
	{SEC_PRIV_SECURITY,                   "SeSecurityPrivilege"},
	{SEC_PRIV_BACKUP,                     "SeBackupPrivilege"},
	{SEC_PRIV_RESTORE,                    "SeRestorePrivilege"},
	{SEC_PRIV_SYSTEMTIME,                 "SeSystemtimePrivilege"},
	{SEC_PRIV_SHUTDOWN,                   "SeShutdownPrivilege"},
	{SEC_PRIV_REMOTE_SHUTDOWN,            "SeRemoteShutdownPrivilege"},
	{SEC_PRIV_TAKE_OWNERSHIP,             "SeTakeOwnershipPrivilege"},
	{SEC_PRIV_DEBUG,                      "SeDebugPrivilege"},
	{SEC_PRIV_SYSTEM_ENVIRONMENT,         "SeSystemEnvironmentPrivilege"},
	{SEC_PRIV_SYSTEM_PROFILE,             "SeSystemProfilePrivilege"},
	{SEC_PRIV_PROFILE_SINGLE_PROCESS,     "SeProfileSingleProcessPrivilege"},
	{SEC_PRIV_INCREASE_BASE_PRIORITY,     "SeIncreaseBasePriorityPrivilege"},
	{SEC_PRIV_LOAD_DRIVER,                "SeLoadDriverPrivilege"},
	{SEC_PRIV_CREATE_PAGEFILE,            "SeCreatePagefilePrivilege"},
	{SEC_PRIV_INCREASE_QUOTA,             "SeIncreaseQuotaPrivilege"},
	{SEC_PRIV_CHANGE_NOTIFY,              "SeChangeNotifyPrivilege"},
	{SEC_PRIV_UNDOCK,                     "SeUndockPrivilege"},
	{SEC_PRIV_MANAGE_VOLUME,              "SeManageVolumePrivilege"},
	{SEC_PRIV_IMPERSONATE,                "SeImpersonatePrivilege"},
	{SEC_PRIV_CREATE_GLOBAL,              "SeCreateGlobalPrivilege"},
	{SEC_PRIV_ENABLE_DELEGATION,          "SeEnableDelegationPrivilege"},
	{SEC_PRIV_INTERACTIVE_LOGON,          "SeInteractiveLogonRight"},
	{SEC_PRIV_NETWORK_LOGON,              "SeNetworkLogonRight"},
	{SEC_PRIV_REMOTE_INTERACTIVE_LOGON,   "SeRemoteInteractiveLogonRight"}
};


/*
  map a privilege id to the wire string constant
*/
const char *sec_privilege_name(unsigned int privilege)
{
	int i;
	for (i=0;i<ARRAY_SIZE(privilege_names);i++) {
		if (privilege_names[i].privilege == privilege) {
			return privilege_names[i].name;
		}
	}
	return NULL;
}

/*
  map a privilege name to a privilege id. Return -1 if not found
*/
int sec_privilege_id(const char *name)
{
	int i;
	for (i=0;i<ARRAY_SIZE(privilege_names);i++) {
		if (strcasecmp(privilege_names[i].name, name) == 0) {
			return (int)privilege_names[i].privilege;
		}
	}
	return -1;
}


/*
  return a privilege mask given a privilege id
*/
uint64_t sec_privilege_mask(unsigned int privilege)
{
	uint64_t mask = 1;
	mask <<= (privilege-1);
	return mask;
}


/*
  return True if a security_token has a particular privilege bit set
*/
BOOL sec_privilege_check(const struct security_token *token, unsigned int privilege)
{
	uint64_t mask = sec_privilege_mask(privilege);
	if (token->privilege_mask & mask) {
		return True;
	}
	return False;
}

/*
  set a bit in the privilege mask
*/
void sec_privilege_set(struct security_token *token, unsigned int privilege)
{
	token->privilege_mask |= sec_privilege_mask(privilege);
}