Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

475 lines
15 KiB

  1. /******************************************************************************
  2. * PROCUTIL.C
  3. *
  4. * This is a scaled down version of procutil.c from utils\citrix\utilsub
  5. * that is included here.
  6. *
  7. * We can not use utilsub.lib unless we modify every user of perflib.lib
  8. * to also include this library. Also since utilsub.lib includes 'C' runtimes
  9. * such as malloc() and free(), we would have to also include 'C' runtimes
  10. * with every user of this library. (Currently advapi32.dll and winlogon.exe)
  11. *
  12. *
  13. * Copyright Citrix Systems Inc. 1994
  14. * Copyright (C) 1997-1999 Microsoft Corp.
  15. *
  16. * Author: John Richardson
  17. *******************************************************************************/
  18. #include "precomp.h"
  19. #pragma hdrstop
  20. #define MAX_USER_NAME_LENGTH (MAX_PATH*sizeof(WCHAR))
  21. #define MAX_WINSTATION_NAME_LENGTH (MAX_PATH*sizeof(WCHAR))
  22. #define ALLOCMEM(heap, flags, size) HeapAlloc (heap, flags, size)
  23. #define REALLOCMEM(heap, flags, pointer, newsize) \
  24. HeapReAlloc (heap, flags, pointer, newsize)
  25. #define FREEMEM(heap, flags, pointer) HeapFree (heap, flags, pointer)
  26. /*
  27. * Set MAX_DOMAIN_LENGTH to MAX_USER_NAME_LENGTH
  28. */
  29. #define MAX_DOMAIN_LENGTH MAX_USER_NAME_LENGTH
  30. /*
  31. * Local function prototypes.
  32. */
  33. VOID LookupSidUser( PSID pSid, PWCHAR pUserName, PULONG pcbUserName );
  34. VOID RefreshUserSidCrcCache( void );
  35. /*******************************************************************************
  36. *
  37. * CalculateCrc16
  38. *
  39. * Calculates a 16-bit CRC of the specified buffer.
  40. *
  41. * ENTRY:
  42. * pBuffer (input)
  43. * Points to buffer to calculate CRC for.
  44. * length (input)
  45. * Length in bytes of the buffer.
  46. *
  47. * EXIT:
  48. * (USHORT)
  49. * The 16-bit CRC of the buffer.
  50. *
  51. ******************************************************************************/
  52. /*
  53. * updcrc macro derived from article Copyright (C) 1986 Stephen Satchell.
  54. * NOTE: First argument must be in range 0 to 255.
  55. * Second argument is referenced twice.
  56. *
  57. * Programmers may incorporate any or all code into their programs,
  58. * giving proper credit within the source. Publication of the
  59. * source routines is permitted so long as proper credit is given
  60. * to Stephen Satchell, Satchell Evaluations and Chuck Forsberg,
  61. * Omen Technology.
  62. */
  63. #define updcrc(cp, crc) ( crctab[((crc >> 8) & 255)] ^ (crc << 8) ^ cp)
  64. /* crctab calculated by Mark G. Mendel, Network Systems Corporation */
  65. unsigned short crctab[256] = {
  66. 0x0000, 0x1021, 0x2042, 0x3063, 0x4084, 0x50a5, 0x60c6, 0x70e7,
  67. 0x8108, 0x9129, 0xa14a, 0xb16b, 0xc18c, 0xd1ad, 0xe1ce, 0xf1ef,
  68. 0x1231, 0x0210, 0x3273, 0x2252, 0x52b5, 0x4294, 0x72f7, 0x62d6,
  69. 0x9339, 0x8318, 0xb37b, 0xa35a, 0xd3bd, 0xc39c, 0xf3ff, 0xe3de,
  70. 0x2462, 0x3443, 0x0420, 0x1401, 0x64e6, 0x74c7, 0x44a4, 0x5485,
  71. 0xa56a, 0xb54b, 0x8528, 0x9509, 0xe5ee, 0xf5cf, 0xc5ac, 0xd58d,
  72. 0x3653, 0x2672, 0x1611, 0x0630, 0x76d7, 0x66f6, 0x5695, 0x46b4,
  73. 0xb75b, 0xa77a, 0x9719, 0x8738, 0xf7df, 0xe7fe, 0xd79d, 0xc7bc,
  74. 0x48c4, 0x58e5, 0x6886, 0x78a7, 0x0840, 0x1861, 0x2802, 0x3823,
  75. 0xc9cc, 0xd9ed, 0xe98e, 0xf9af, 0x8948, 0x9969, 0xa90a, 0xb92b,
  76. 0x5af5, 0x4ad4, 0x7ab7, 0x6a96, 0x1a71, 0x0a50, 0x3a33, 0x2a12,
  77. 0xdbfd, 0xcbdc, 0xfbbf, 0xeb9e, 0x9b79, 0x8b58, 0xbb3b, 0xab1a,
  78. 0x6ca6, 0x7c87, 0x4ce4, 0x5cc5, 0x2c22, 0x3c03, 0x0c60, 0x1c41,
  79. 0xedae, 0xfd8f, 0xcdec, 0xddcd, 0xad2a, 0xbd0b, 0x8d68, 0x9d49,
  80. 0x7e97, 0x6eb6, 0x5ed5, 0x4ef4, 0x3e13, 0x2e32, 0x1e51, 0x0e70,
  81. 0xff9f, 0xefbe, 0xdfdd, 0xcffc, 0xbf1b, 0xaf3a, 0x9f59, 0x8f78,
  82. 0x9188, 0x81a9, 0xb1ca, 0xa1eb, 0xd10c, 0xc12d, 0xf14e, 0xe16f,
  83. 0x1080, 0x00a1, 0x30c2, 0x20e3, 0x5004, 0x4025, 0x7046, 0x6067,
  84. 0x83b9, 0x9398, 0xa3fb, 0xb3da, 0xc33d, 0xd31c, 0xe37f, 0xf35e,
  85. 0x02b1, 0x1290, 0x22f3, 0x32d2, 0x4235, 0x5214, 0x6277, 0x7256,
  86. 0xb5ea, 0xa5cb, 0x95a8, 0x8589, 0xf56e, 0xe54f, 0xd52c, 0xc50d,
  87. 0x34e2, 0x24c3, 0x14a0, 0x0481, 0x7466, 0x6447, 0x5424, 0x4405,
  88. 0xa7db, 0xb7fa, 0x8799, 0x97b8, 0xe75f, 0xf77e, 0xc71d, 0xd73c,
  89. 0x26d3, 0x36f2, 0x0691, 0x16b0, 0x6657, 0x7676, 0x4615, 0x5634,
  90. 0xd94c, 0xc96d, 0xf90e, 0xe92f, 0x99c8, 0x89e9, 0xb98a, 0xa9ab,
  91. 0x5844, 0x4865, 0x7806, 0x6827, 0x18c0, 0x08e1, 0x3882, 0x28a3,
  92. 0xcb7d, 0xdb5c, 0xeb3f, 0xfb1e, 0x8bf9, 0x9bd8, 0xabbb, 0xbb9a,
  93. 0x4a75, 0x5a54, 0x6a37, 0x7a16, 0x0af1, 0x1ad0, 0x2ab3, 0x3a92,
  94. 0xfd2e, 0xed0f, 0xdd6c, 0xcd4d, 0xbdaa, 0xad8b, 0x9de8, 0x8dc9,
  95. 0x7c26, 0x6c07, 0x5c64, 0x4c45, 0x3ca2, 0x2c83, 0x1ce0, 0x0cc1,
  96. 0xef1f, 0xff3e, 0xcf5d, 0xdf7c, 0xaf9b, 0xbfba, 0x8fd9, 0x9ff8,
  97. 0x6e17, 0x7e36, 0x4e55, 0x5e74, 0x2e93, 0x3eb2, 0x0ed1, 0x1ef0
  98. };
  99. USHORT
  100. CalculateCrc16( PBYTE pBuffer,
  101. USHORT length )
  102. {
  103. USHORT Crc = 0;
  104. USHORT Data;
  105. while ( length-- ) {
  106. Data = (USHORT) *pBuffer++;
  107. Crc = updcrc( Data, Crc );
  108. }
  109. return(Crc);
  110. } /* CalculateCrc16() */
  111. /*
  112. * RefreshCitrixObjectCaches()
  113. *
  114. * Refresh (invalidate) any caches that may be used by Citrix object
  115. * utilities.
  116. *
  117. */
  118. VOID
  119. RefreshCitrixObjectCaches()
  120. {
  121. RefreshUserSidCrcCache();
  122. }
  123. /*
  124. * This is the cache maintained by the GetUserNameFromSid function
  125. *
  126. * It is thread safe through the use of ULock.
  127. */
  128. typedef struct TAGUSERSIDLIST {
  129. struct TAGUSERSIDLIST *Next;
  130. USHORT SidCrc;
  131. WCHAR UserName[MAX_USER_NAME_LENGTH];
  132. } USERSIDLIST, *PUSERSIDLIST;
  133. static PUSERSIDLIST pUList = NULL;
  134. static RTL_CRITICAL_SECTION ULock;
  135. static BOOLEAN ULockInited = FALSE;
  136. /***************************************************************************
  137. *
  138. * InitULock
  139. *
  140. * Since we do not require the user to call an initialize function,
  141. * we must initialize our critical section in a thread safe manner.
  142. *
  143. * The problem is, a critical section is needed to guard against multiple
  144. * threads trying to init the critical section at the same time.
  145. *
  146. * The solution that Nt uses, in which RtlInitializeCriticalSection itself
  147. * uses, is to wait on a kernel supported process wide Mutant before proceding.
  148. * This Mutant almost works by itself, but RtlInitializeCriticalSection does
  149. * not wait on it until after trashing the semaphore count. So we wait on
  150. * it ourselves, since it can be acquired recursively.
  151. *
  152. ***************************************************************************/
  153. NTSTATUS InitULock()
  154. {
  155. NTSTATUS Status = STATUS_SUCCESS;
  156. RtlEnterCriticalSection((PRTL_CRITICAL_SECTION)NtCurrentPeb()->LoaderLock);
  157. /*
  158. * Make sure another thread did not beat us here
  159. */
  160. if( ULockInited == FALSE ){
  161. Status = RtlInitializeCriticalSection( &ULock );
  162. if (NT_SUCCESS(Status)) {
  163. ULockInited = TRUE;
  164. }
  165. }
  166. RtlLeaveCriticalSection((PRTL_CRITICAL_SECTION)NtCurrentPeb()->LoaderLock);
  167. return Status;
  168. }
  169. /***************************************************************************
  170. *
  171. * RefreshUserSidCrcCache
  172. *
  173. * Invalidate the User/SidCrc cache so that the newest information
  174. * will be fetched from the system.
  175. *
  176. ***************************************************************************/
  177. VOID
  178. RefreshUserSidCrcCache( void )
  179. {
  180. PUSERSIDLIST pEntry, pNext;
  181. NTSTATUS Status;
  182. if( pUList == NULL ) return;
  183. /*
  184. * Make sure critical section has been inited
  185. */
  186. if( !ULockInited ) {
  187. Status = InitULock();
  188. if (!NT_SUCCESS(Status)) {
  189. return;
  190. }
  191. }
  192. RtlEnterCriticalSection( &ULock );
  193. pEntry = pUList;
  194. while( pEntry ) {
  195. pNext = pEntry->Next;
  196. FREEMEM( RtlProcessHeap(), 0, pEntry );
  197. pEntry = pNext;
  198. }
  199. pUList = NULL;
  200. RtlLeaveCriticalSection( &ULock );
  201. }
  202. /******************************************************************************
  203. *
  204. * GetUserNameFromSid
  205. *
  206. * Attempts to retrieve the user (login) name of the process by first looking
  207. * in our User/SidCrc cache table, then (if no match) looking up the SID in
  208. * the SAM database and adding the new entry to the User/SidCrc table.
  209. *
  210. * Input
  211. *
  212. * IN pUserSid Sid pointer
  213. *
  214. * OUT ppName pointer to PWCHAR
  215. *
  216. * Will always return a user name, which will be "(unknown)" if the SID is
  217. * invalid or can't determine the user/SID relationship for any other reason.
  218. *
  219. *****************************************************************************/
  220. NTSTATUS
  221. GetUserNameFromSid( PSID pUserSid, PWCHAR *ppName )
  222. {
  223. USHORT SidCrc = 0;
  224. PUSERSIDLIST pEntry;
  225. WCHAR pNameBuf[MAX_USER_NAME_LENGTH];
  226. ULONG NameLength;
  227. NTSTATUS Status;
  228. /*
  229. * Make sure critical section has been inited
  230. */
  231. if( !ULockInited ) {
  232. Status = InitULock();
  233. if (!NT_SUCCESS(Status)) {
  234. return Status;
  235. }
  236. }
  237. /*
  238. * Determine SID length in bytes and calculate a 16-bit CRC for it,
  239. * to facilitate quick matching.
  240. */
  241. if ( pUserSid ) {
  242. SidCrc = CalculateCrc16( (PBYTE)pUserSid,
  243. (USHORT)GetLengthSid(pUserSid) );
  244. }
  245. else {
  246. // A NULL SID has a CRC of 0
  247. SidCrc = 0;
  248. }
  249. /*
  250. * First: Before performing the expensive LookupAccountSid() function,
  251. * see if we've encountered this SID already, and match the user name
  252. * if so.
  253. */
  254. if ( pUList ) {
  255. RtlEnterCriticalSection( &ULock );
  256. pEntry = pUList;
  257. while( pEntry ) {
  258. if ( SidCrc == pEntry->SidCrc ) {
  259. // We got a hit, return the name
  260. *ppName = pEntry->UserName;
  261. RtlLeaveCriticalSection( &ULock );
  262. return(STATUS_SUCCESS);
  263. }
  264. pEntry = pEntry->Next;
  265. }
  266. RtlLeaveCriticalSection( &ULock );
  267. }
  268. /*
  269. * Last resort: Determine the user name associated with the SID using
  270. * the LookupAccountSid() API, embedded in our local function
  271. * LookupSidUser().
  272. */
  273. NameLength = MAX_USER_NAME_LENGTH;
  274. if( pUserSid ) {
  275. LookupSidUser( pUserSid, pNameBuf, &NameLength );
  276. }
  277. else {
  278. // NULL SID maps the the "Idle" user name string
  279. wcscpy( pNameBuf, L"Idle" );
  280. }
  281. /*
  282. * Add this new User/Sid relationship in our User/Sid cache list.
  283. */
  284. RtlEnterCriticalSection( &ULock );
  285. if ( (pEntry = (PUSERSIDLIST)ALLOCMEM(RtlProcessHeap(), 0, sizeof(USERSIDLIST))) ) {
  286. pEntry->SidCrc = SidCrc;
  287. wcsncpy( pEntry->UserName, pNameBuf, MAX_USER_NAME_LENGTH - 1 );
  288. pEntry->UserName[MAX_USER_NAME_LENGTH-1] = 0;
  289. pEntry->Next = pUList;
  290. pUList = pEntry;
  291. // Return the name
  292. *ppName = pEntry->UserName;
  293. }
  294. RtlLeaveCriticalSection( &ULock );
  295. return(STATUS_SUCCESS);
  296. }
  297. /******************************************************************************
  298. * LookupSidUser
  299. *
  300. * Fetch the user name associated with the specified SID.
  301. *
  302. * ENTRY:
  303. * pSid (input)
  304. * Points to SID to match to user name.
  305. * pUserName (output)
  306. * Points to buffer to place the user name into.
  307. * pcbUserName (input/output)
  308. * Specifies the size in bytes of the user name buffer. The returned
  309. * user name will be truncated to fit this buffer (including NUL
  310. * terminator) if necessary and this variable set to the number of
  311. * characters copied to pUserName.
  312. *
  313. * EXIT:
  314. *
  315. * LookupSidUser() will always return a user name. If the specified
  316. * SID fails to match to a user name, then the user name "(unknown)" will
  317. * be returned.
  318. *
  319. *****************************************************************************/
  320. VOID
  321. LookupSidUser( PSID pSid,
  322. PWCHAR pUserName,
  323. PULONG pcbUserName )
  324. {
  325. WCHAR DomainBuffer[MAX_DOMAIN_LENGTH], UserBuffer[MAX_USER_NAME_LENGTH];
  326. DWORD cDomainBuffer = sizeof(DomainBuffer) / sizeof(WCHAR);
  327. DWORD cUserBuffer = sizeof(UserBuffer) / sizeof(WCHAR);
  328. DWORD Error;
  329. PWCHAR pDomainBuffer = NULL, pUserBuffer = NULL;
  330. SID_NAME_USE SidNameUse;
  331. PWCHAR pUnknown = L"(Unknown)";
  332. /*
  333. * Fetch user name from SID: try user lookup with a reasonable Domain and
  334. * Sid buffer size first, before resorting to alloc.
  335. */
  336. if ( !LookupAccountSid( NULL, pSid,
  337. UserBuffer, &cUserBuffer,
  338. DomainBuffer, &cDomainBuffer, &SidNameUse ) ) {
  339. if ( ((Error = GetLastError()) == ERROR_INSUFFICIENT_BUFFER) ) {
  340. if ( cDomainBuffer > (sizeof(DomainBuffer) / sizeof(WCHAR)) ) {
  341. if ( !(pDomainBuffer =
  342. (PWCHAR)ALLOCMEM( RtlProcessHeap(), 0,
  343. cDomainBuffer * sizeof(WCHAR))) ) {
  344. Error = ERROR_NOT_ENOUGH_MEMORY;
  345. goto BadDomainAlloc;
  346. }
  347. }
  348. if ( cUserBuffer > (sizeof(UserBuffer) / sizeof(WCHAR)) ) {
  349. if ( !(pUserBuffer =
  350. (PWCHAR)ALLOCMEM( RtlProcessHeap(), 0,
  351. cUserBuffer * sizeof(WCHAR))) ) {
  352. Error = ERROR_NOT_ENOUGH_MEMORY;
  353. goto BadUserAlloc;
  354. }
  355. }
  356. if ( !LookupAccountSid( NULL, pSid,
  357. pUserBuffer ?
  358. pUserBuffer : UserBuffer,
  359. &cUserBuffer,
  360. pDomainBuffer ?
  361. pDomainBuffer : DomainBuffer,
  362. &cDomainBuffer,
  363. &SidNameUse ) ) {
  364. Error = GetLastError();
  365. goto BadLookup;
  366. }
  367. } else {
  368. goto BadLookup;
  369. }
  370. }
  371. /*
  372. * Copy the user name into the specified buffer, truncating if necessary.
  373. */
  374. wcsncpy( pUserName, pUserBuffer ? pUserBuffer : UserBuffer,
  375. ((*pcbUserName)-1) );
  376. pUserName[((*pcbUserName)-1)] = 0;
  377. *pcbUserName = wcslen(pUserName);
  378. /*
  379. * Free our allocs (if any) and return.
  380. */
  381. if ( pDomainBuffer )
  382. FREEMEM( RtlProcessHeap(), 0, pDomainBuffer);
  383. if ( pUserBuffer )
  384. FREEMEM( RtlProcessHeap(), 0, pUserBuffer);
  385. return;
  386. /*--------------------------------------
  387. * Error clean-up and return...
  388. */
  389. BadLookup:
  390. BadUserAlloc:
  391. BadDomainAlloc:
  392. if ( pDomainBuffer )
  393. FREEMEM( RtlProcessHeap(), 0, pDomainBuffer);
  394. if ( pUserBuffer )
  395. FREEMEM( RtlProcessHeap(), 0, pUserBuffer);
  396. wcsncpy( pUserName, pUnknown, ((*pcbUserName)-1) );
  397. pUserName[((*pcbUserName)-1)] = 0;
  398. *pcbUserName = wcslen(pUserName);
  399. return;
  400. }