Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

871 lines
20 KiB

// Copyright (C) 1999 Microsoft Corporation
//
// Implementation of ICloneSecurityPrincipal
//
// sburns 5-10-99
#include "headers.hxx"
#include "resource.h"
#include "implmain.hpp"
#include "common.hpp"
const size_t NUMBER_OF_AUTOMATION_INTERFACES = 3;
CloneSecurityPrincipal::CloneSecurityPrincipal()
:
connection(0),
refcount(1), // implicit AddRef
m_pSID(NULL)
{
LOG_CTOR(CloneSecurityPrincipal);
m_ppTypeInfo = new ITypeInfo*[NUMBER_OF_AUTOMATION_INTERFACES];
for (int i = 0; i < NUMBER_OF_AUTOMATION_INTERFACES; i++)
{
m_ppTypeInfo[i] = NULL;
}
ITypeLib *ptl = 0;
HRESULT hr = LoadRegTypeLib(LIBID_CloneSecurityPrincipalLib, 1, 0, 0, &ptl);
if (SUCCEEDED(hr))
{
ptl->GetTypeInfoOfGuid(IID_ICloneSecurityPrincipal, &(m_ppTypeInfo[0]));
ptl->GetTypeInfoOfGuid(IID_IADsSID, &(m_ppTypeInfo[1]));
ptl->GetTypeInfoOfGuid(IID_IADsError, &(m_ppTypeInfo[2]));
ptl->Release();
}
}
CloneSecurityPrincipal::~CloneSecurityPrincipal()
{
LOG_DTOR(CloneSecurityPrincipal);
ASSERT(refcount == 0);
delete connection;
if ( m_pSID )
FreeADsMem( m_pSID );
for (int i = 0; i < NUMBER_OF_AUTOMATION_INTERFACES; i++)
{
m_ppTypeInfo[i]->Release();
}
delete[] m_ppTypeInfo;
}
HRESULT __stdcall
CloneSecurityPrincipal::QueryInterface(REFIID riid, void **ppv)
{
LOG_FUNCTION(CloneSecurityPrincipal::QueryInterface);
if (riid == IID_IUnknown)
{
LOG(L"IUnknown");
*ppv = (IUnknown*)(ICloneSecurityPrincipal*)(this);
}
else if (riid == IID_ICloneSecurityPrincipal)
{
LOG(L"ICloneSecurityPrincipal");
*ppv = static_cast<ICloneSecurityPrincipal*>(this);
}
else if (riid == IID_IADsSID)
{
LOG(L"IADsSID");
*ppv = static_cast<IADsSID*>(this);
}
else if (riid == IID_IADsError)
{
LOG(L"IADsError");
*ppv = static_cast<IADsError*>(this);
}
else if (riid == IID_IDispatch && m_ppTypeInfo[0])
{
LOG(L"IDispatch");
*ppv = (IDispatch*)(ICloneSecurityPrincipal*)(this);
}
else if (riid == IID_ISupportErrorInfo)
{
LOG(L"ISupportErrorInfo");
*ppv = (ISupportErrorInfo*)(this);
}
else
{
LOG(L"unknown");
return (*ppv = 0), E_NOINTERFACE;
}
reinterpret_cast<IUnknown*>(*ppv)->AddRef();
return S_OK;
}
ULONG __stdcall
CloneSecurityPrincipal::AddRef(void)
{
LOG_ADDREF(CloneSecurityPrincipal);
return Win::InterlockedIncrement(refcount);
}
ULONG __stdcall
CloneSecurityPrincipal::Release(void)
{
LOG_RELEASE(CloneSecurityPrincipal);
// need to copy the result of the decrement, because if we delete this,
// refcount will no longer be valid memory, and that might hose
// multithreaded callers. NTRAID#NTBUG9-566901-2002/03/06-sburns
long newref = Win::InterlockedDecrement(refcount);
if (newref == 0)
{
delete this;
return 0;
}
// we should not have decremented into negative values.
ASSERT(newref > 0);
return newref;
}
HRESULT __stdcall
CloneSecurityPrincipal::GetTypeInfoCount(UINT *pcti)
{
LOG_FUNCTION(CloneSecurityPrincipal::GetTypeInfoCount);
if (pcti == 0)
{
return E_POINTER;
}
*pcti = 1;
return S_OK;
}
HRESULT __stdcall
CloneSecurityPrincipal::GetTypeInfo(UINT cti, LCID, ITypeInfo **ppti)
{
LOG_FUNCTION(CloneSecurityPrincipal::GetTypeInfo);
if (ppti == 0)
{
return E_POINTER;
}
if (cti != 0)
{
*ppti = 0;
return DISP_E_BADINDEX;
}
(*ppti = m_ppTypeInfo[0])->AddRef();
return S_OK;
}
HRESULT __stdcall
CloneSecurityPrincipal::GetIDsOfNames(
REFIID riid,
OLECHAR **prgpsz,
UINT cNames,
LCID lcid,
DISPID *prgids)
{
LOG_FUNCTION(CloneSecurityPrincipal::GetIDsOfNames);
HRESULT hr = S_OK;
for (int i = 0; i < NUMBER_OF_AUTOMATION_INTERFACES; i++)
{
hr = (m_ppTypeInfo[i])->GetIDsOfNames(prgpsz, cNames, prgids);
if (SUCCEEDED(hr) || DISP_E_UNKNOWNNAME != hr)
break;
}
return hr;
}
HRESULT __stdcall
CloneSecurityPrincipal::Invoke(
DISPID id,
REFIID riid,
LCID lcid,
WORD wFlags,
DISPPARAMS *params,
VARIANT *pVarResult,
EXCEPINFO *pei,
UINT *puArgErr)
{
LOG_FUNCTION(CloneSecurityPrincipal::Invoke);
HRESULT hr = S_OK;
IDispatch *pDispatch[NUMBER_OF_AUTOMATION_INTERFACES] =
{
(IDispatch*)(ICloneSecurityPrincipal *)(this),
(IDispatch*)(IADsSID *)(this),
(IDispatch*)(IADsError *)(this)
};
for (int i = 0; i < NUMBER_OF_AUTOMATION_INTERFACES; i++)
{
hr = (m_ppTypeInfo[i])->Invoke(
pDispatch[i],
id,
wFlags,
params,
pVarResult,
pei,
puArgErr);
if (DISP_E_MEMBERNOTFOUND != hr)
break;
}
return hr;
}
HRESULT __stdcall
CloneSecurityPrincipal::InterfaceSupportsErrorInfo(const IID& iid)
{
LOG_FUNCTION(CloneSecurityPrincipal::InterfaceSupportsErrorInfo);
if (iid == IID_ICloneSecurityPrincipal ||
iid == IID_IADsSID ||
iid == IID_IADsError)
{
return S_OK;
}
return S_FALSE;
}
HRESULT __stdcall
CloneSecurityPrincipal::Connect(
BSTR srcDC,
BSTR srcDomain,
BSTR dstDC,
BSTR dstDomain)
{
LOG_FUNCTION(CloneSecurityPrincipal::Connect);
delete connection;
connection = new Connection();
// Even though a null parameter is technically illegal (the types are
// BSTR), we thoughtfully accomodate the inattentive C++ user which may
// prefer to pass null pointers instead of empty BSTRs
return connection->Connect(
srcDC ? srcDC : L"",
srcDomain ? srcDomain : L"",
dstDC ? dstDC : L"",
dstDomain ? dstDomain : L"");
}
HRESULT __stdcall
CloneSecurityPrincipal::AddSidHistory(
BSTR srcPrincipalSamName,
BSTR dstPrincipalSamName,
long flags)
{
LOG_FUNCTION(CloneSecurityPrincipal::AddSidHistory);
// Even though a null parameter is technically illegal (the types are
// BSTR), we thoughtfully accomodate the inattentive C++ user which may
// prefer to pass null pointers instead of empty BSTRs
return
DoAddSidHistory(
srcPrincipalSamName ? srcPrincipalSamName : L"",
dstPrincipalSamName ? dstPrincipalSamName : L"",
flags);
}
HRESULT __stdcall
CloneSecurityPrincipal::CopyDownlevelUserProperties(
BSTR srcSamName,
BSTR dstSamName,
long flags)
{
LOG_FUNCTION(CloneSecurityPrincipal::CopyDownlevelUserProperties);
// Even though a null parameter is technically illegal (the types are
// BSTR), we thoughtfully accomodate the inattentive C++ user which may
// prefer to pass null pointers instead of empty BSTRs
return
DoCopyDownlevelUserProperties(
srcSamName ? srcSamName : L"",
dstSamName ? dstSamName : L"",
flags);
}
//+-----------------------------------------------------------------------
//
// Function: CloneSecurityPrincipal::GetMembersSIDs
//
// Synopsis: retrieve the <sid=XXXX> of all members of dstGroupDN.
//
//------------------------------------------------------------------------
#define ATTRIBUTE_MEMBER L"member"
HRESULT __stdcall
CloneSecurityPrincipal::GetMembersSIDs(
BSTR dstGroupDN,
VARIANT* pVal)
{
// init the OUT parameter to hold an array of variants
VariantInit(pVal);
pVal->vt = VT_ARRAY | VT_VARIANT ;
HRESULT hr = S_OK;
std::vector<BSTR> values;
PLDAPMessage pMsg = 0;
LPTSTR lpszAttrs[] = {ATTRIBUTE_MEMBER, 0};
LDAPControl serverControls = {LDAP_SERVER_EXTENDED_DN_OID_W, {0, (PCHAR)NULL}, TRUE};
PLDAPControl aServerControls[] = {&serverControls, NULL};
PLDAP pldap = connection->m_pldap;
do
{
// the ldap connection to dstDC should have already been established
if (!pldap)
{
hr = E_UNEXPECTED;
LOG(L"pldap is null!");
SetComError(IDS_OBJECT_STATE_BAD);
break;
}
hr =
Win32ToHresult(
ldap_search_ext_s(
pldap,
dstGroupDN,
LDAP_SCOPE_BASE, // scope
_T("(objectClass=group)"), // filter
lpszAttrs, // attrs[]
0, // atrssonly
(PLDAPControl*) aServerControls, // ServerControls
NULL, // ClientControls
0, // no time limit
0, // no SizeLimit
&pMsg));
BREAK_ON_FAILED_HRESULT(hr);
BSTR bstr = NULL;
PTSTR pStart = NULL;
PTSTR pEnd = NULL;
PTSTR* ppValues = ldap_get_values(pldap, pMsg, ATTRIBUTE_MEMBER);
if (!ppValues)
{
break;
}
PTSTR *p = ppValues;
while(*p)
{
// *p is a string in the following format:
// "<GUID=42e87199a88c854998dad04be4b8d29f>;<SID=0105000000
// 00000515000000a23ca6557d03c651772c315d00040000>;CN=S-1-
// 5-21-1436957858-1371931517-1563503735-1024,CN=Foreign
// SecurityPrincipals,DC=linan,DC=nttest,DC=microsoft,DC=com"
if ( (pStart = _tcsstr(*p, _T("<SID="))) &&
(pEnd = _tcschr(pStart, _T('>'))) )
{
// retrieve <sid=XXXXX>, and add it to the vector
if ( !(bstr = SysAllocStringLen(pStart, static_cast<UINT>(pEnd - pStart + 1))) )
{
hr = E_OUTOFMEMORY;
SetComError(IDS_OUT_OF_MEMORY);
break;
}
values.push_back(bstr);
}
p++;
}
ldap_value_free(ppValues);
// SysAllocString may have failed and terminated the preceeding loop
BREAK_ON_FAILED_HRESULT(hr);
// populate the OUT parameter: the array of variants
if (values.size() > 0)
{
SAFEARRAYBOUND bounds = {values.size(), 0};
SAFEARRAY* psa = SafeArrayCreate(VT_VARIANT, 1, &bounds);
VARIANT* varArray;
SafeArrayAccessData(psa, (void**)&varArray);
int i = 0;
for (
std::vector<BSTR>::iterator it = values.begin();
it != values.end();
++it, ++i)
{
VariantInit(&(varArray[i]));
varArray[i].vt = VT_BSTR;
varArray[i].bstrVal = *it;
}
SafeArrayUnaccessData(psa);
pVal->parray = psa;
}
}
while (0);
if (pMsg)
{
ldap_msgfree(pMsg);
}
if (FAILED(hr))
{
for (
std::vector<BSTR>::iterator it = values.begin();
it != values.end();
++it)
{
// REVIEWED-2002/03/25-sburns hiding BSTRs in an STL container
// confuses prefast: *it really does refer to a BSTR -- see the
// push_back call that populates the container.
SysFreeString(*it);
}
}
return hr;
}
/////////////////////////////////////////////////////////////////////////////
// IADsSID methods
HRESULT VariantToSID(VARIANT *pVar , PSID *ppSID );
HRESULT ByteToHexString(LPBYTE pByte, DWORD dwLength, LPTSTR *ppRet);
// only support ADS_SID_ACTIVE_DIRECTORY_PATH and ADS_SID_WINNT_PATH and ADS_SID_SDDL
STDMETHODIMP CloneSecurityPrincipal::SetAs(long lFormat, VARIANT var)
{
LOG_FUNCTION(CloneSecurityPrincipal::SetAs);
PSID pNew = NULL ;
HRESULT hr = S_OK;
//
// performing the necessary indirection if the source is VT_BYREF
//
VARIANT varData;
VariantInit(&varData);
hr = VariantCopyInd(&varData, (LPVARIANT)&var);
if (FAILED(hr))
return hr;
switch( lFormat )
{
case ADS_SID_ACTIVE_DIRECTORY_PATH:
{
if ( V_VT(&varData) != VT_BSTR )
return E_INVALIDARG;
IDirectoryObject *pDir;
hr = ADsGetObject( V_BSTR(&varData), IID_IDirectoryObject, (void**) &pDir );
if ( FAILED(hr) )
return hr;
ADS_ATTR_INFO *pAttrInfo=NULL;
DWORD dwReturn;
LPWSTR pAttrNames[]={L"objectSID" };
DWORD dwNumAttr=sizeof(pAttrNames)/sizeof(LPWSTR);
hr = pDir->GetObjectAttributes( pAttrNames,
dwNumAttr,
&pAttrInfo,
&dwReturn );
if ( SUCCEEDED(hr) )
{
pNew = (PSID) AllocADsMem( pAttrInfo->pADsValues->OctetString.dwLength );
if (!pNew)
hr = E_OUTOFMEMORY;
else
// REVIEWED-2002/03/06-sburns correct byte count passed.
CopyMemory( pNew, pAttrInfo->pADsValues->OctetString.lpValue,
pAttrInfo->pADsValues->OctetString.dwLength );
FreeADsMem( pAttrInfo );
}
pDir->Release();
}
break;
case ADS_SID_WINNT_PATH:
{
if ( V_VT(&varData) != VT_BSTR )
return E_INVALIDARG;
IADs *pADs;
hr = ADsGetObject( V_BSTR(&varData), IID_IADs, (void**) &pADs );
if ( FAILED(hr) )
return hr;
VARIANT var1;
VariantInit(&var1);
hr = pADs->Get(AutoBstr(L"objectSID"), &var1 );
if ( SUCCEEDED(hr) )
hr = VariantToSID( &var1, &pNew );
pADs->Release();
}
break;
case ADS_SID_SDDL:
{
if ( V_VT(&varData) != VT_BSTR )
return E_INVALIDARG;
LPCTSTR pszSID = V_BSTR(&varData);
PSID pSID = NULL;
if ( !ConvertStringSidToSid( pszSID, &pSID ) )
{
hr = HRESULT_FROM_WIN32(GetLastError());
} else
{
DWORD dwLength = GetLengthSid(pSID);
pNew = (PSID)AllocADsMem(dwLength);
if (!pNew)
hr = E_OUTOFMEMORY;
else
// REVIEWED-2002/03/06-sburns correct byte count passed.
CopyMemory(pNew, pSID, dwLength);
LocalFree(pSID);
}
}
break;
case ADS_SID_RAW:
{
// raw, meaning a variant (VT_ARRAY | VT_U1) containing the sid in the
// same format as returned by the ObjectSid property.
LOG(L"ADS_SID_RAW");
if (V_VT(&varData) != (VT_ARRAY| VT_UI1))
{
return E_INVALIDARG;
}
hr = VariantToSID(&varData, &pNew);
LOG_HRESULT(hr);
break;
}
default:
return E_INVALIDARG; // unrecognized flag.
}
if ( FAILED(hr) )
return hr;
if ( !pNew )
return E_FAIL;
if (!IsValidSid( pNew ) )
{
FreeADsMem( pNew );
return E_FAIL;
}
if ( m_pSID )
FreeADsMem( m_pSID );
m_pSID = pNew;
return hr;
}
// only support ADS_SID_SDDL and ADS_SID_HEXSTRING
STDMETHODIMP CloneSecurityPrincipal::GetAs(long lFormat, VARIANT *pVar)
{
if ( !m_pSID )
return E_INVALIDARG;
HRESULT hr = S_OK;
VariantClear(pVar);
switch( lFormat )
{
case ADS_SID_HEXSTRING:
{
LPTSTR pStr;
hr = ByteToHexString( (LPBYTE) m_pSID, GetLengthSid( m_pSID), &pStr );
if ( SUCCEEDED(hr) )
{
V_VT( pVar ) = VT_BSTR;
V_BSTR( pVar ) = SysAllocString(pStr);
FreeADsMem( pStr );
}
}
break;
case ADS_SID_SDDL:
{
LPTSTR pszSID;
if ( ConvertSidToStringSid( m_pSID, &pszSID ))
{
V_VT( pVar ) = VT_BSTR;
V_BSTR( pVar ) = SysAllocString(pszSID);
LocalFree( pszSID );
} else
hr = HRESULT_FROM_WIN32(GetLastError());
}
break;
default:
hr = E_INVALIDARG; // unrecognized flag.
}
return hr;
}
HRESULT VariantToSID(VARIANT *pVar , PSID *ppSID )
{
HRESULT hr = S_OK;
SAFEARRAY *aList = NULL;
CHAR HUGEP *pArray = NULL;
DWORD dwLower, dwUpper, dwLength;
hr = SafeArrayGetLBound(V_ARRAY(pVar),
1,
(long FAR *) &dwLower );
hr = SafeArrayGetUBound(V_ARRAY(pVar),
1,
(long FAR *) &dwUpper );
dwLength = dwUpper - dwLower;
*ppSID = (PSID) AllocADsMem( dwLength + 1);
aList = V_ARRAY( pVar );
if ( aList == NULL )
return E_UNEXPECTED;
hr = SafeArrayAccessData( aList, (void HUGEP * FAR *) &pArray );
if ( !SUCCEEDED(hr) )
return hr;
// REVIEWED-2002/03/06-sburns correct byte count passed
CopyMemory( *ppSID, pArray, dwLength );
SafeArrayUnaccessData( aList );
if (!IsValidSid(*ppSID) )
return E_FAIL;
return hr;
}
HRESULT ByteToHexString( LPBYTE pByte, DWORD dwLength, LPTSTR *ppRet )
{
LPTSTR pDest=NULL;
LPTSTR pHead=NULL;
pDest = pHead = (LPTSTR) AllocADsMem( ((dwLength+1)*2) * sizeof(TCHAR));
if( pHead == NULL )
return E_OUTOFMEMORY;
//////////////////////////////////
// Convert into the Hex String
//////////////////////////////////
for (DWORD idx=0; idx < dwLength; idx++, pDest+=2, pByte++ )
{
// REVIEWED-2002/03/06-sburns should consider strsafe function, but
// pDest is correct length and null terminated.
wsprintf(pDest, _T("%02X"), *pByte );
}
*ppRet = pHead;
return S_OK;
}
/////////////////////////////////////////////////////////////////////////////
// IADsError methods
HRESULT
GetMessageHelper(
OUT BSTR *pbstr,
IN HRESULT hrErr,
IN DWORD dwFlags,
IN HINSTANCE hMsgDll = NULL
);
#define FACILITY_ADSI 0x00005000
String
GetErrorMessageADSIExtended(HRESULT hr)
{
LOG_FUNCTION2(GetErrorMessageADSIExtended, String::format("%1!08X!", hr));
if (!FAILED(hr))
{
// no messages for success!
return String();
}
String errmsg = GetErrorMessage(hr);
if ((hr & FACILITY_ADSI) || //adsi
HRESULT_FACILITY(hr) == FACILITY_WIN32 ) // and win32
{
WCHAR szBuffer[MAX_PATH];
WCHAR szName[MAX_PATH];
DWORD dwError;
HRESULT hrEx = ADsGetLastError( &dwError, szBuffer, (sizeof(szBuffer)/sizeof(WCHAR))-1,
szName, (sizeof(szName)/sizeof(WCHAR))-1 );
if ( SUCCEEDED(hrEx) && dwError != ERROR_INVALID_DATA && wcslen(szBuffer))
{
String errmsgextended;
errmsgextended = String::format(IDS_ADSI_EXTENDED_ERROR, errmsg.c_str(), szName, szBuffer);
return errmsgextended;
}
}
return errmsg;
}
HRESULT __stdcall
CloneSecurityPrincipal::GetErrorMsg(
long hrErr,
BSTR* pbstrMsg)
{
String s = GetErrorMessageADSIExtended(hrErr);
*pbstrMsg = SysAllocString(const_cast<String::value_type*>(s.c_str()));
if (!*pbstrMsg)
return E_OUTOFMEMORY;
return S_OK;
}
//
// S_OK: found and returned in pbstr
// S_FALSE: message not found
// hr: some error happened
//
HRESULT
GetMessageHelper(
OUT BSTR *pbstr,
IN HRESULT hrErr,
IN DWORD dwFlags,
IN HINSTANCE hMsgDll
)
{
*pbstr = NULL;
LPTSTR lpBuffer = NULL;
DWORD dwRet =
FormatMessage(
FORMAT_MESSAGE_ALLOCATE_BUFFER | dwFlags,
(LPCVOID) hMsgDll,
hrErr,
0,
(LPTSTR) &lpBuffer,
0,
NULL);
if ( !dwRet )
{
DWORD dwErr = GetLastError();
if (ERROR_MR_MID_NOT_FOUND == dwErr)
return S_FALSE;
else
return HRESULT_FROM_WIN32(dwErr);
}
*pbstr = SysAllocString(lpBuffer);
LocalFree(lpBuffer);
if (!*pbstr)
return E_OUTOFMEMORY;
return S_OK;
}