Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

960 lines
26 KiB

/*++
Copyright (C) 1997-2001 Microsoft Corporation
Module Name:
GENUTILS.CPP
Abstract:
Defines various utilities.
History:
a-davj 21-June-97 Created.
--*/
#include "precomp.h"
#include "corepol.h"
#include "arena.h"
#include <wbemidl.h>
#include <arrtempl.h>
#include "reg.h"
#include "genutils.h"
#include "wbemutil.h"
#include "var.h"
#include <helper.h>
#include <sddl.h>
#define IsSlash(x) (x == L'\\' || x== L'/')
#ifndef EOAC_STATIC_CLOAKING
#define EOAC_STATIC_CLOAKING 0x20
#define EOAC_DYNAMIC_CLOAKING 0x40
#endif
//***************************************************************************
//
// BOOL IsNT
//
// DESCRIPTION:
//
// Returns true if running windows NT.
//
// RETURN VALUE:
//
// see description.
//
//***************************************************************************
POLARITY BOOL IsNT(void)
{
OSVERSIONINFO os;
os.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
if(!GetVersionEx(&os))
return FALSE; // should never happen
return os.dwPlatformId == VER_PLATFORM_WIN32_NT;
}
POLARITY BOOL IsW2KOrMore(void)
{
OSVERSIONINFO os;
os.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
if(!GetVersionEx(&os))
return FALSE; // should never happen
return ( os.dwPlatformId == VER_PLATFORM_WIN32_NT ) && ( os.dwMajorVersion >= 5 ) ;
}
//***************************************************************************
//
// void RegisterDLL
//
// DESCRIPTION:
//
// Adds the current dll to the registry as an inproc server.
//
// PARAMETERS:
//
// guid GUILD that this supports
// pDesc Text description for this object.
//
//***************************************************************************
POLARITY void RegisterDLL(IN HMODULE hModule, IN GUID guid, IN TCHAR * pDesc, TCHAR * pModel,
TCHAR * pProgID)
{
TCHAR wcID[128];
TCHAR szCLSID[128];
TCHAR szModule[MAX_PATH+1];
HKEY hKey1 = NULL, hKey2 = NULL;
// Create the path.
wchar_t strCLSID[128];
if(0 ==StringFromGUID2(guid, strCLSID, 128))
return;
StringCchCopy(wcID, 128, strCLSID);
StringCchCopy(szCLSID, 128, __TEXT("SOFTWARE\\CLASSES\\CLSID\\"));
StringCchCat(szCLSID, 128, wcID);
// Create entries under CLSID
if(ERROR_SUCCESS != RegCreateKey(HKEY_LOCAL_MACHINE, szCLSID, &hKey1)) return;
OnDelete<HKEY,LONG(*)(HKEY),RegCloseKey> cm1(hKey1);
RegSetValueEx(hKey1, NULL, 0, REG_SZ, (BYTE *)pDesc, 2*(lstrlen(pDesc)+1));
if(ERROR_SUCCESS != RegCreateKey(hKey1,__TEXT("InprocServer32"),&hKey2)) return;
OnDelete<HKEY,LONG(*)(HKEY),RegCloseKey> cm2(hKey2);
szModule[MAX_PATH] = L'0';
if(0 == GetModuleFileName(hModule, szModule, MAX_PATH)) return;
RegSetValueEx(hKey2, NULL, 0, REG_SZ, (BYTE *)szModule, 2*(lstrlen(szModule)+1));
RegSetValueEx(hKey2, TEXT("ThreadingModel"), 0, REG_SZ, (BYTE *)pModel, 2*(lstrlen(pModel)+1));
// If there is a progid, then add it too
if(pProgID)
{
StringCchPrintf(wcID, 128, __TEXT("SOFTWARE\\CLASSES\\%s"), pProgID);
HKEY hKey3;
if(ERROR_SUCCESS != RegCreateKey(HKEY_LOCAL_MACHINE, wcID, &hKey3)) return;
OnDelete<HKEY,LONG(*)(HKEY),RegCloseKey> cm3(hKey3);
RegSetValueEx(hKey3, NULL, 0, REG_SZ, (BYTE *)pDesc , 2*(lstrlen(pDesc)+1));
HKEY hKey4;
if(ERROR_SUCCESS != RegCreateKey(hKey3,__TEXT("CLSID"),&hKey4)) return;
OnDelete<HKEY,LONG(*)(HKEY),RegCloseKey> cm4(hKey4);
RegSetValueEx(hKey4, NULL, 0, REG_SZ, (BYTE *)strCLSID, 2*(lstrlen(strCLSID)+1));
}
return;
}
//***************************************************************************
//
// void UnRegisterDLL
//
// DESCRIPTION:
//
// Removes an in proc guid from the clsid section
//
// PARAMETERS:
//
// guid guild to be removed.
//
//***************************************************************************
POLARITY void UnRegisterDLL(GUID guid, TCHAR * pProgID)
{
TCHAR wcID[128];
TCHAR szCLSID[128];
HKEY hKey;
// Create the path using the CLSID
wchar_t strCLSID[128];
if(0 ==StringFromGUID2(guid, strCLSID, 128))
return;
#ifdef UNICODE
StringCchCopy(wcID, 128, strCLSID);
#else
wcstombs(wcID, strCLSID, 128);
#endif
StringCchCopy(szCLSID, 128, __TEXT("SOFTWARE\\CLASSES\\CLSID\\"));
StringCchCat(szCLSID, 128, wcID);
// First delete the InProcServer subkey.
DWORD dwRet = RegOpenKey(HKEY_LOCAL_MACHINE, szCLSID, &hKey);
if(dwRet == NO_ERROR)
{
RegDeleteKey(hKey, __TEXT("InProcServer32"));
RegCloseKey(hKey);
}
dwRet = RegOpenKey(HKEY_LOCAL_MACHINE, __TEXT("SOFTWARE\\CLASSES\\CLSID"), &hKey);
if(dwRet == NO_ERROR)
{
RegDeleteKey(hKey,wcID);
RegCloseKey(hKey);
}
if(pProgID)
{
HKEY hKey2;
DWORD dwRet2 = RegOpenKey(HKEY_LOCAL_MACHINE, pProgID, &hKey2);
if(dwRet2 == NO_ERROR)
{
RegDeleteKey(hKey2, __TEXT("CLSID"));
RegCloseKey(hKey2);
}
RegDeleteKey(HKEY_LOCAL_MACHINE, pProgID);
}
}
//
//
// HKLM\Software\Classes\Appid\{} @ = ""
// DllSurrogate =
// LaunchPermission =
// AccessPermission =
// HKLM\Software\Classes\Clsid\{} @ = ""
// AppId = {}
// HKLM\Software\Classes\Clsid\{}\InprocServer32 @ = "path"
// ThreadingModel = ""
////////////////////////////////////
HRESULT RegisterDllAppid(HMODULE hModule,
CLSID Clsid,
WCHAR * pDescription,
WCHAR * ThreadingModel,
WCHAR * pLaunchPermission,
WCHAR * pAccessPermission)
{
WCHAR ClsidStr[sizeof("Software\\Classes\\Clsid\\{0010890e-8789-413c-adbc-48f5b511b3af}\\InProcServer32")];
StringCchCopy(ClsidStr,LENGTH_OF(ClsidStr),L"Software\\Classes\\Clsid\\");
WCHAR * strCLSID = &ClsidStr[0] + LENGTH_OF(L"Software\\Classes\\Clsid");
if(0 ==StringFromGUID2(Clsid, strCLSID, 128)) return HR_LAST_ERR;
WCHAR szModule[MAX_PATH+1];
szModule[MAX_PATH] = L'0';
if(0 == GetModuleFileName(hModule, szModule, MAX_PATH)) return HR_LAST_ERR;
HKEY hKey;
if(ERROR_SUCCESS != RegCreateKey(HKEY_LOCAL_MACHINE, ClsidStr, &hKey)) return HR_LAST_ERR;
CRegCloseMe RegClose(hKey);
size_t StrLen = wcslen(pDescription);
if (ERROR_SUCCESS != RegSetValueEx(hKey,NULL,0,REG_SZ,(BYTE *)pDescription,StrLen*sizeof(WCHAR))) return HR_LAST_ERR;
StringCchCatW(ClsidStr,LENGTH_OF(ClsidStr),L"\\InProcServer32");
HKEY hKey2;
if(ERROR_SUCCESS != RegCreateKey(HKEY_LOCAL_MACHINE, ClsidStr, &hKey2)) return HR_LAST_ERR;
CRegCloseMe RegClose2(hKey2);
StrLen = wcslen(szModule);
if (ERROR_SUCCESS != RegSetValueEx(hKey2,NULL,0,REG_SZ,(BYTE *)szModule,StrLen*sizeof(WCHAR))) return HR_LAST_ERR;
StrLen = wcslen(ThreadingModel);
if (ERROR_SUCCESS != RegSetValueEx(hKey2,L"ThreadingModel",0,REG_SZ,(BYTE *)ThreadingModel,StrLen*sizeof(WCHAR))) return HR_LAST_ERR;
strCLSID[sizeof("{0010890e-8789-413c-adbc-48f5b511b3af}")-1] = 0;
StrLen = wcslen(strCLSID);
if (ERROR_SUCCESS != RegSetValueEx(hKey,L"AppID",0,REG_SZ,(BYTE *)strCLSID,StrLen*sizeof(WCHAR))) return HR_LAST_ERR;
WCHAR * StrAppId = strCLSID - 6; // get to the 'Cls' to replace it
StrAppId[0] = L'A';
StrAppId[1] = L'p';
StrAppId[2] = L'p';
HKEY hKey3;
if(ERROR_SUCCESS != RegCreateKey(HKEY_LOCAL_MACHINE, ClsidStr, &hKey3)) return HR_LAST_ERR;
CRegCloseMe RegClose3(hKey3);
if (ERROR_SUCCESS != RegSetValueEx(hKey3,L"DllSurrogate",0,REG_SZ,(BYTE *)L"",2)) return HR_LAST_ERR;
if (pLaunchPermission)
{
PSECURITY_DESCRIPTOR pSD = NULL;
ULONG SizeSd;
if (FALSE == ConvertStringSecurityDescriptorToSecurityDescriptor(pLaunchPermission,
SDDL_REVISION_1,
&pSD,
&SizeSd)) return HR_LAST_ERR;
OnDelete<HLOCAL,HLOCAL(*)(HLOCAL),LocalFree> dm1(pSD);
if (ERROR_SUCCESS != RegSetValueEx(hKey3,L"LaunchPermission",0,REG_BINARY,(BYTE *)pSD,SizeSd)) return HR_LAST_ERR;
}
if (pAccessPermission)
{
PSECURITY_DESCRIPTOR pSD = NULL;
ULONG SizeSd;
if (FALSE == ConvertStringSecurityDescriptorToSecurityDescriptor(pAccessPermission,
SDDL_REVISION_1,
&pSD,
&SizeSd)) return HR_LAST_ERR;
OnDelete<HLOCAL,HLOCAL(*)(HLOCAL),LocalFree> dm1(pSD);
if (ERROR_SUCCESS != RegSetValueEx(hKey3,L"AccessPermission",0,REG_BINARY,(BYTE *)pSD,SizeSd)) return HR_LAST_ERR;
}
return S_OK;
}
HRESULT UnregisterDllAppid(CLSID Clsid)
{
WCHAR ClsidStr[sizeof("Software\\Classes\\Clsid\\{0010890e-8789-413c-adbc-48f5b511b3af}\\InProcServer32")];
StringCchCopy(ClsidStr,LENGTH_OF(ClsidStr),L"Software\\Classes\\Clsid\\");
WCHAR * strCLSID = &ClsidStr[0] + LENGTH_OF(L"Software\\Classes\\Clsid");
if(0 ==StringFromGUID2(Clsid, strCLSID, 128)) return HR_LAST_ERR;
if(ERROR_SUCCESS != RegDeleteKey(HKEY_LOCAL_MACHINE, ClsidStr)) return HR_LAST_ERR;
WCHAR * StrAppId = strCLSID - 6; // get to the 'Cls' to replace it
StrAppId[0] = L'A';
StrAppId[1] = L'p';
StrAppId[2] = L'p';
if(ERROR_SUCCESS != RegDeleteKey(HKEY_LOCAL_MACHINE, ClsidStr)) return HR_LAST_ERR;
return S_OK;
}
//***************************************************************************
//
// HRESULT WbemVariantChangeType
//
// DESCRIPTION:
//
// Just like VariantChangeType, but deals with arrays as well.
//
// PARAMETERS:
//
// VARIANT pvDest Destination variant
// VARIANT pvSrc Source variant (can be the same as pvDest)
// VARTYPE vtNew The type to coerce to.
//
//***************************************************************************
POLARITY HRESULT WbemVariantChangeType(VARIANT* pvDest, VARIANT* pvSrc,
VARTYPE vtNew)
{
HRESULT hres;
if(V_VT(pvSrc) == VT_NULL)
{
return VariantCopy(pvDest, pvSrc);
}
if(vtNew & VT_ARRAY)
{
// It's an array, we have to do our own conversion
// ===============================================
if((V_VT(pvSrc) & VT_ARRAY) == 0)
return DISP_E_TYPEMISMATCH;
SAFEARRAY* psaSrc = V_ARRAY(pvSrc);
SAFEARRAYBOUND aBounds[1];
long lLBound;
SafeArrayGetLBound(psaSrc, 1, &lLBound);
long lUBound;
SafeArrayGetUBound(psaSrc, 1, &lUBound);
aBounds[0].cElements = lUBound - lLBound + 1;
aBounds[0].lLbound = lLBound;
SAFEARRAY* psaDest = SafeArrayCreate(vtNew & ~VT_ARRAY, 1, aBounds);
if (NULL == psaDest) return WBEM_E_OUT_OF_MEMORY;
OnDeleteIf<SAFEARRAY*,HRESULT(*)(SAFEARRAY*),SafeArrayDestroy> Del_(psaDest);
// Stuff the individual data pieces
// ================================
for(long lIndex = lLBound; lIndex <= lUBound; lIndex++)
{
// Load the initial data element into a VARIANT
// ============================================
VARIANT vSrcEl;
hres = SafeArrayGetElement(psaSrc, &lIndex, &V_UI1(&vSrcEl));
if(FAILED(hres)) return hres;
// if success, set the type
V_VT(&vSrcEl) = V_VT(pvSrc) & ~VT_ARRAY;
OnDelete<VARIANT *,HRESULT(*)(VARIANT *),VariantClear> Clear(&vSrcEl);
// Cast it to the new type
hres = VariantChangeType(&vSrcEl, &vSrcEl, 0, vtNew & ~VT_ARRAY);
if(FAILED(hres)) return hres;
// Put it into the new array
// =========================
if(V_VT(&vSrcEl) == VT_BSTR)
{
hres = SafeArrayPutElement(psaDest, &lIndex, V_BSTR(&vSrcEl));
}
else
{
hres = SafeArrayPutElement(psaDest, &lIndex, &V_UI1(&vSrcEl));
}
if(FAILED(hres)) return hres;
}
if(pvDest == pvSrc)
{
VariantClear(pvSrc);
}
V_VT(pvDest) = vtNew;
V_ARRAY(pvDest) = psaDest;
Del_.dismiss();
return S_OK;
}
else
{
// Not an array. Can use OLE functions
// ===================================
return VariantChangeType(pvDest, pvSrc, VARIANT_NOVALUEPROP, vtNew);
}
}
//***************************************************************************
//
// BOOL ReadI64
//
// DESCRIPTION:
//
// Reads a signed 64-bit value from a string
//
// PARAMETERS:
//
// LPCWSTR wsz String to read from
// __int64& i64 Destination for the value
//
//***************************************************************************
POLARITY BOOL ReadI64(LPCWSTR wsz, UNALIGNED __int64& ri64)
{
__int64 i64 = 0;
const WCHAR* pwc = wsz;
// Check for a NULL pointer
if ( NULL == wsz )
{
return FALSE;
}
int nSign = 1;
if(*pwc == L'-')
{
nSign = -1;
pwc++;
}
while(i64 >= 0 && i64 < 0x7FFFFFFFFFFFFFFF / 8 &&
*pwc >= L'0' && *pwc <= L'9')
{
i64 = i64 * 10 + (*pwc - L'0');
pwc++;
}
if(*pwc)
return FALSE;
if(i64 < 0)
{
// Special case --- largest negative number
// ========================================
if(nSign == -1 && i64 == (__int64)0x8000000000000000)
{
ri64 = i64;
return TRUE;
}
return FALSE;
}
ri64 = i64 * nSign;
return TRUE;
}
//***************************************************************************
//
// BOOL ReadUI64
//
// DESCRIPTION:
//
// Reads an unsigned 64-bit value from a string
//
// PARAMETERS:
//
// LPCWSTR wsz String to read from
// unsigned __int64& i64 Destination for the value
//
//***************************************************************************
POLARITY BOOL ReadUI64(LPCWSTR wsz, UNALIGNED unsigned __int64& rui64)
{
unsigned __int64 ui64 = 0;
const WCHAR* pwc = wsz;
// Check for a NULL pointer
if ( NULL == wsz )
{
return FALSE;
}
while(ui64 < 0xFFFFFFFFFFFFFFFF / 8 && *pwc >= L'0' && *pwc <= L'9')
{
unsigned __int64 ui64old = ui64;
ui64 = ui64 * 10 + (*pwc - L'0');
if(ui64 < ui64old)
return FALSE;
pwc++;
}
if(*pwc)
{
return FALSE;
}
rui64 = ui64;
return TRUE;
}
POLARITY HRESULT ChangeVariantToCIMTYPE(VARIANT* pvDest, VARIANT* pvSource,
CIMTYPE ct)
{
if(ct == CIM_CHAR16)
{
//
// Special case --- use CVar's code
//
CVar v;
try
{
v.SetVariant(pvSource);
if(!v.ToSingleChar())
return WBEM_E_TYPE_MISMATCH;
v.FillVariant(pvDest);
return WBEM_S_NO_ERROR;
}
catch(...)
{
return WBEM_E_OUT_OF_MEMORY;
}
}
VARTYPE vt;
switch(ct)
{
case CIM_UINT8:
vt = VT_UI1;
break;
case CIM_SINT8:
case CIM_SINT16:
vt = VT_I2;
break;
case CIM_UINT16:
case CIM_SINT32:
vt = VT_I4;
break;
case CIM_UINT32:
case CIM_UINT64:
case CIM_SINT64:
case CIM_STRING:
case CIM_DATETIME:
case CIM_REFERENCE:
vt = VT_BSTR;
break;
case CIM_REAL32:
vt = VT_R4;
break;
case CIM_REAL64:
vt = VT_R8;
break;
case CIM_OBJECT:
vt = VT_UNKNOWN;
break;
case CIM_BOOLEAN:
vt = VT_BOOL;
break;
default:
return WBEM_E_TYPE_MISMATCH;
}
HRESULT hres = WbemVariantChangeType(pvDest, pvSource, vt);
if(FAILED(hres))
return hres;
if(ct == CIM_SINT8)
{
if(V_I2(pvDest) > 127 || V_I2(pvDest) < -128)
hres = WBEM_E_TYPE_MISMATCH;
}
else if(ct == CIM_UINT16)
{
if(V_I4(pvDest) > 65535 || V_I4(pvDest) < 0)
hres = WBEM_E_TYPE_MISMATCH;
}
else if(ct == CIM_UINT32)
{
__int64 i64;
if(!ReadI64(V_BSTR(pvDest), i64))
hres = WBEM_E_INVALID_QUERY;
else if(i64 < 0 || i64 >= (__int64)1 << 32)
hres = WBEM_E_TYPE_MISMATCH;
}
else if(ct == CIM_UINT64)
{
unsigned __int64 ui64;
if(!ReadUI64(V_BSTR(pvDest), ui64))
hres = WBEM_E_INVALID_QUERY;
}
else if(ct == CIM_SINT64)
{
__int64 i64;
if(!ReadI64(V_BSTR(pvDest), i64))
hres = WBEM_E_INVALID_QUERY;
}
if(FAILED(hres))
{
VariantClear(pvDest);
}
return hres;
}
//***************************************************************************
//
// WCHAR *ExtractMachineName
//
// DESCRIPTION:
//
// Takes a path of form "\\machine\xyz... and returns the
// "machine" portion in a newly allocated WCHAR. The return value should
// be freed via delete. NULL is returned if there is an error.
//
//
// PARAMETERS:
//
// pPath Path to be parsed.
//
// RETURN VALUE:
//
// see description.
//
//***************************************************************************
POLARITY WCHAR *ExtractMachineName ( IN BSTR a_Path )
{
WCHAR *t_MachineName = NULL;
//todo, according to the help file, the path can be null which is
// default to current machine, however Ray's mail indicated that may
// not be so.
if ( a_Path == NULL )
{
t_MachineName = new WCHAR [ 2 ] ;
if ( t_MachineName )
{
StringCchCopyW ( t_MachineName , 2, L"." ) ;
}
return t_MachineName ;
}
// First make sure there is a path and determine how long it is.
if ( ! IsSlash ( a_Path [ 0 ] ) || ! IsSlash ( a_Path [ 1 ] ) || wcslen ( a_Path ) < 3 )
{
t_MachineName = new WCHAR [ 2 ] ;
if ( t_MachineName )
{
StringCchCopyW ( t_MachineName , 2, L"." ) ;
}
return t_MachineName ;
}
WCHAR *t_ThirdSlash ;
for ( t_ThirdSlash = a_Path + 2 ; *t_ThirdSlash ; t_ThirdSlash ++ )
{
if ( IsSlash ( *t_ThirdSlash ) )
break ;
}
if ( t_ThirdSlash == &a_Path [2] )
{
return NULL;
}
// allocate some memory
t_MachineName = new WCHAR [ t_ThirdSlash - a_Path - 1 ] ;
if ( t_MachineName == NULL )
{
return t_MachineName ;
}
// temporarily replace the third slash with a null and then copy
WCHAR t_SlashCharacter = *t_ThirdSlash ;
*t_ThirdSlash = NULL;
StringCchCopyW ( t_MachineName , t_ThirdSlash - a_Path - 1 , a_Path + 2 ) ;
*t_ThirdSlash = t_SlashCharacter ; // restore it.
return t_MachineName ;
}
//***************************************************************************
//
// BOOL bAreWeLocal
//
// DESCRIPTION:
//
// Determines if the connection is to the current machine.
//
// PARAMETERS:
//
// pwcServerName Server name as extracted from the path.
//
// RETURN VALUE:
//
// True if we are local
//
//***************************************************************************
POLARITY BOOL bAreWeLocal(WCHAR * pServerMachine)
{
BOOL bRet = FALSE;
if(pServerMachine == NULL)
return TRUE;
if(!wbem_wcsicmp(pServerMachine,L"."))
return TRUE;
if ( IsNT () )
{
wchar_t wczMyName[MAX_PATH];
DWORD dwSize = MAX_PATH;
if(!GetComputerNameW(wczMyName,&dwSize))
return FALSE;
bRet = !wbem_wcsicmp(wczMyName,pServerMachine);
}
else
{
TCHAR tcMyName[MAX_PATH];
DWORD dwSize = MAX_PATH;
if(!GetComputerName(tcMyName,&dwSize))
return FALSE;
#ifdef UNICODE
bRet = !wbem_wcsicmp(tcMyName,pServerMachine);
#else
WCHAR wWide[MAX_PATH];
mbstowcs(wWide, tcMyName, MAX_PATH-1);
bRet = !wbem_wcsicmp(wWide,pServerMachine);
#endif
}
return bRet;
}
POLARITY HRESULT WbemSetDynamicCloaking(IUnknown* pProxy,
DWORD dwAuthnLevel, DWORD dwImpLevel)
{
HRESULT hres;
if(!IsW2KOrMore())
{
// Not NT5 --- don't bother
// ========================
return WBEM_S_FALSE;
}
// Try to get IClientSecurity from it
// ==================================
IClientSecurity* pSec;
hres = pProxy->QueryInterface(IID_IClientSecurity, (void**)&pSec);
if(FAILED(hres))
{
// Not a proxy --- not a problem
// =============================
return WBEM_S_FALSE;
}
hres = pSec->SetBlanket(pProxy, RPC_C_AUTHN_WINNT,
RPC_C_AUTHZ_NONE, NULL, dwAuthnLevel,
dwImpLevel, NULL, EOAC_DYNAMIC_CLOAKING);
pSec->Release();
return hres;
}
POLARITY HRESULT EnableAllPrivileges(DWORD dwTokenType)
{
// Open thread token
// =================
HANDLE hToken = NULL;
BOOL bRes;
switch (dwTokenType)
{
case TOKEN_THREAD:
bRes = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, TRUE, &hToken);
break;
case TOKEN_PROCESS:
bRes = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, &hToken);
break;
}
if(!bRes)
return WBEM_E_ACCESS_DENIED;
// Get the privileges
// ==================
DWORD dwLen = 0;
bRes = GetTokenInformation(hToken, TokenPrivileges, NULL, 0, &dwLen);
BYTE* pBuffer = new BYTE[dwLen];
if(dwLen && pBuffer == NULL)
{
CloseHandle(hToken);
return WBEM_E_OUT_OF_MEMORY;
}
bRes = GetTokenInformation(hToken, TokenPrivileges, pBuffer, dwLen,
&dwLen);
if(!bRes)
{
CloseHandle(hToken);
delete [] pBuffer;
return WBEM_E_ACCESS_DENIED;
}
// Iterate through all the privileges and enable them all
// ======================================================
TOKEN_PRIVILEGES* pPrivs = (TOKEN_PRIVILEGES*)pBuffer;
for(DWORD i = 0; i < pPrivs->PrivilegeCount; i++)
{
pPrivs->Privileges[i].Attributes |= SE_PRIVILEGE_ENABLED;
}
// Store the information back into the token
// =========================================
bRes = AdjustTokenPrivileges(hToken, FALSE, pPrivs, 0, NULL, NULL);
delete [] pBuffer;
CloseHandle(hToken);
if(!bRes)
return WBEM_E_ACCESS_DENIED;
else
return WBEM_S_NO_ERROR;
}
POLARITY BOOL EnablePrivilege(DWORD dwTokenType, LPCTSTR pName)
{
if(pName == NULL) return FALSE;
LUID PrivilegeRequired ;
if(!LookupPrivilegeValue(NULL, pName, &PrivilegeRequired)) return FALSE;
BOOL bRes;
HANDLE hToken;
switch (dwTokenType)
{
case TOKEN_THREAD:
bRes = OpenThreadToken(GetCurrentThread(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, TRUE, &hToken);
break;
case TOKEN_PROCESS:
bRes = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, &hToken);
break;
}
if(!bRes) return FALSE;
OnDelete<HANDLE,BOOL(*)(HANDLE),CloseHandle> cm(hToken);
DWORD dwLen = 0;
bRes = GetTokenInformation(hToken, TokenPrivileges, NULL, 0, &dwLen);
if (TRUE == bRes) return FALSE;
wmilib::auto_ptr<BYTE> pBuffer(new BYTE[dwLen]);
if(NULL == pBuffer.get()) return FALSE;
if (!GetTokenInformation(hToken, TokenPrivileges, pBuffer.get(), dwLen, &dwLen)) return FALSE;
// Iterate through all the privileges and enable the one required
bRes = FALSE;
TOKEN_PRIVILEGES* pPrivs = (TOKEN_PRIVILEGES*)pBuffer.get();
for(DWORD i = 0; i < pPrivs->PrivilegeCount; i++)
{
if (pPrivs->Privileges[i].Luid.LowPart == PrivilegeRequired.LowPart &&
pPrivs->Privileges[i].Luid.HighPart == PrivilegeRequired.HighPart )
{
pPrivs->Privileges[i].Attributes |= SE_PRIVILEGE_ENABLED;
// here it's found
bRes = AdjustTokenPrivileges(hToken, FALSE, pPrivs, dwLen, NULL, NULL);
break;
}
}
return bRes;
}
POLARITY bool IsPrivilegePresent(HANDLE hToken, LPCTSTR pName)
{
if(pName == NULL)
return false;
LUID PrivilegeRequired ;
if(!LookupPrivilegeValue(NULL, pName, &PrivilegeRequired))
return FALSE;
// Get the privileges
// ==================
DWORD dwLen = 0;
BOOL bRes = GetTokenInformation(hToken, TokenPrivileges, NULL, 0, &dwLen);
if (0 == dwLen) return false;
BYTE* pBuffer = new BYTE[dwLen];
if(pBuffer == NULL) return false;
CDeleteMe<BYTE> dm(pBuffer);
bRes = GetTokenInformation(hToken, TokenPrivileges, pBuffer, dwLen, &dwLen);
if(!bRes)
return false;
// Iterate through all the privileges and look for the one in question.
// ======================================================
TOKEN_PRIVILEGES* pPrivs = (TOKEN_PRIVILEGES*)pBuffer;
for(DWORD i = 0; i < pPrivs->PrivilegeCount; i++)
{
if(pPrivs->Privileges[i].Luid.LowPart == PrivilegeRequired.LowPart &&
pPrivs->Privileges[i].Luid.HighPart == PrivilegeRequired.HighPart )
return true;
}
return false;
}