You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1203 lines
32 KiB
1203 lines
32 KiB
/*
|
|
File usrparms.c
|
|
|
|
Callback routines exported to SAM for migrating and updating
|
|
user parms.
|
|
|
|
Paul Mayfield, 9/10/98
|
|
*/
|
|
|
|
#include <nt.h>
|
|
#include <ntrtl.h>
|
|
#include <nturtl.h>
|
|
#include <ntlsa.h>
|
|
#include <ntsam.h>
|
|
#include <samrpc.h>
|
|
#include <samisrv.h>
|
|
#include <windows.h>
|
|
#include <lm.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <memory.h>
|
|
#include <malloc.h>
|
|
#include <raserror.h>
|
|
#include <rasman.h>
|
|
#include <rasppp.h>
|
|
#include <mprapi.h>
|
|
#include <mprapip.h>
|
|
#include <usrparms.h> // for UP_CLIENT_DIAL
|
|
#include <cleartxt.h> // for IASParmsGetUserPassword
|
|
#include <rassfmhp.h> // for RasSfmHeap
|
|
#include <oaidl.h>
|
|
|
|
//
|
|
// Flags that restrict the values generated for a given
|
|
// set of ras user properties. See UPGenerateDsAttribs
|
|
//
|
|
#define UP_F_Dialin 0x1 // Generate dialup params
|
|
#define UP_F_Callback 0x2 // Generate callback params
|
|
#define UP_F_Upgrade 0x4 // Generate upgraded params
|
|
|
|
//
|
|
// Constants in the profiles
|
|
//
|
|
#define SDO_FRAMED 2
|
|
#define SDO_FRAMED_CALLBACK 4
|
|
|
|
// Names of user attributes that we set
|
|
//
|
|
static const WCHAR pszAttrDialin[] = L"msNPAllowDialin";
|
|
static const WCHAR pszAttrServiceType[] = L"msRADIUSServiceType";
|
|
static const WCHAR pszAttrCbNumber[] = L"msRADIUSCallbackNumber";
|
|
static const WCHAR pszAttrSavedCbNumber[] = L"msRASSavedCallbackNumber";
|
|
|
|
//
|
|
// Will be equal to the number of times the common allocation
|
|
// routine is called minus the number of times the common free
|
|
// routine is called. Should be zero else leaking memory.
|
|
//
|
|
DWORD dwUpLeakCount = 0;
|
|
|
|
//
|
|
// Prototype of free func.
|
|
//
|
|
VOID WINAPI
|
|
UserParmsFree(
|
|
IN PVOID pvData);
|
|
|
|
//
|
|
// Common tracing for the UserParm functions.
|
|
//
|
|
DWORD UpTrace (LPSTR pszTrace, ...) {
|
|
#if 0
|
|
va_list arglist;
|
|
char szBuffer[1024], szTemp[1024];
|
|
|
|
va_start(arglist, pszTrace);
|
|
vsprintf(szTemp, pszTrace, arglist);
|
|
va_end(arglist);
|
|
|
|
sprintf(szBuffer, "UserParms: %s\n", szTemp);
|
|
|
|
OutputDebugStringA(szBuffer);
|
|
#endif
|
|
|
|
return NO_ERROR;
|
|
}
|
|
|
|
//
|
|
// Allocation and free routines for UserParms functions
|
|
//
|
|
PVOID
|
|
UpAlloc(
|
|
IN DWORD dwSize,
|
|
IN BOOL bZero)
|
|
{
|
|
dwUpLeakCount++;
|
|
return RtlAllocateHeap(
|
|
RasSfmHeap(),
|
|
(bZero ? HEAP_ZERO_MEMORY : 0),
|
|
dwSize
|
|
);
|
|
}
|
|
|
|
//
|
|
// Callback function called by NT5 SAM to free the blob
|
|
// returned by UserParmsConvert.
|
|
//
|
|
VOID
|
|
UpFree(
|
|
IN PVOID pvData)
|
|
{
|
|
dwUpLeakCount--;
|
|
if (pvData)
|
|
RtlFreeHeap(
|
|
RasSfmHeap(),
|
|
0,
|
|
pvData
|
|
);
|
|
}
|
|
|
|
//
|
|
// Returns a heap-allocated copy of the given
|
|
// string
|
|
//
|
|
PWCHAR
|
|
UpStrDup(
|
|
IN PCWSTR pszSrc)
|
|
{
|
|
PWCHAR pszRet = NULL;
|
|
DWORD dwLen = wcslen(pszSrc);
|
|
|
|
pszRet = (PWCHAR) UpAlloc((dwLen + 1) * sizeof(WCHAR), FALSE);
|
|
if (pszRet)
|
|
wcscpy(pszRet, pszSrc);
|
|
|
|
return pszRet;
|
|
}
|
|
|
|
//
|
|
// Returns a heap-allocated copy of the given unicode
|
|
// string converted into multibyte.
|
|
//
|
|
PUCHAR
|
|
UpWcstombsDup(
|
|
IN PWCHAR pszSrc)
|
|
{
|
|
PUCHAR pszRet = NULL;
|
|
DWORD dwSize = (wcslen(pszSrc) + 1) * sizeof(WCHAR);
|
|
|
|
pszRet = (PUCHAR) UpAlloc(dwSize, TRUE);
|
|
if (pszRet)
|
|
wcstombs(pszRet, pszSrc, dwSize);
|
|
|
|
return pszRet;
|
|
}
|
|
|
|
|
|
//
|
|
// Returns a heap-allocated copy of the given
|
|
// blob
|
|
//
|
|
PVOID
|
|
UpBlobDup(
|
|
IN PVOID pvSrc,
|
|
IN ULONG ulLen)
|
|
{
|
|
PVOID pvRet = NULL;
|
|
|
|
if (ulLen == 0)
|
|
return NULL;
|
|
|
|
pvRet = UpAlloc(ulLen + sizeof(WCHAR), TRUE);
|
|
if (pvRet)
|
|
{
|
|
CopyMemory(pvRet, pvSrc, ulLen);
|
|
}
|
|
else
|
|
{
|
|
UpTrace("UpBlobDup: Failed to dupe %x %d.", pvSrc, ulLen);
|
|
}
|
|
|
|
return pvRet;
|
|
}
|
|
|
|
//
|
|
// Allocates and initializes a dword attribute
|
|
//
|
|
NTSTATUS
|
|
UpInitializeDwordAttr(
|
|
IN SAM_USERPARMS_ATTR * pAttr,
|
|
IN PWCHAR pszAttr,
|
|
IN DWORD dwVal)
|
|
{
|
|
if (pszAttr == NULL)
|
|
{
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
|
|
// Initialize the name
|
|
RtlInitUnicodeString (&(pAttr->AttributeIdentifier), pszAttr);
|
|
pAttr->Syntax = Syntax_Attribute;
|
|
|
|
// Alloc/Initailze the value structure
|
|
pAttr->Values =
|
|
(SAM_USERPARMS_ATTRVALS*)
|
|
UpAlloc(sizeof(SAM_USERPARMS_ATTRVALS), TRUE);
|
|
if (pAttr->Values == NULL)
|
|
return STATUS_NO_MEMORY;
|
|
|
|
// Alloc/Init the value
|
|
pAttr->Values->value = UpAlloc(sizeof(DWORD), TRUE);
|
|
if (pAttr->Values->value == NULL)
|
|
return STATUS_NO_MEMORY;
|
|
*((DWORD*)pAttr->Values->value) = dwVal;
|
|
pAttr->Values->length = sizeof(DWORD);
|
|
|
|
// Put in the value count
|
|
pAttr->CountOfValues = 1;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// Allocates and initializes a dword attribute
|
|
//
|
|
NTSTATUS
|
|
UpInitializeStringAttrA(
|
|
OUT SAM_USERPARMS_ATTR * pAttr,
|
|
IN PWCHAR pszAttr,
|
|
IN PUCHAR pszVal)
|
|
{
|
|
if (pszAttr == NULL)
|
|
{
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
|
|
// Initialize the name
|
|
RtlInitUnicodeString (&(pAttr->AttributeIdentifier), pszAttr);
|
|
pAttr->Syntax = Syntax_Attribute;
|
|
|
|
// Alloc/Initailze the value structure
|
|
pAttr->Values =
|
|
(SAM_USERPARMS_ATTRVALS*)
|
|
UpAlloc(sizeof(SAM_USERPARMS_ATTRVALS), TRUE);
|
|
if (pAttr->Values == NULL)
|
|
return STATUS_NO_MEMORY;
|
|
|
|
// Alloc/Init the value
|
|
pAttr->Values->value = pszVal;
|
|
|
|
if (pszVal)
|
|
{
|
|
pAttr->Values->length = (strlen(pszVal) + 1) * sizeof(CHAR);
|
|
}
|
|
else
|
|
{
|
|
pAttr->Values->length = 1 * sizeof(CHAR);
|
|
}
|
|
|
|
// Put in the value count
|
|
pAttr->CountOfValues = 1;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// Allocates and initializes a cleartext password attribute
|
|
//
|
|
NTSTATUS
|
|
UpInitializePasswordAttr(
|
|
OUT SAM_USERPARMS_ATTR * pAttr,
|
|
IN PWSTR pszPassword)
|
|
{
|
|
// Alloc/Initialize the value structure
|
|
pAttr->Values =
|
|
(SAM_USERPARMS_ATTRVALS*)
|
|
UpAlloc(sizeof(SAM_USERPARMS_ATTRVALS), TRUE);
|
|
if (pAttr->Values == NULL)
|
|
return STATUS_NO_MEMORY;
|
|
|
|
// Alloc/Init the value
|
|
pAttr->Values->value = pszPassword;
|
|
pAttr->Values->length = (wcslen(pszPassword) + 1) * sizeof(WCHAR);
|
|
|
|
// Put in the value count
|
|
pAttr->CountOfValues = 1;
|
|
|
|
// Initialize the name and syntax.
|
|
RtlInitUnicodeString(
|
|
&pAttr->AttributeIdentifier,
|
|
UpStrDup(L"CLEARTEXT")
|
|
);
|
|
pAttr->Syntax = Syntax_EncryptedAttribute;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// Allocates and initializes an attribute
|
|
// to be deleted.
|
|
//
|
|
NTSTATUS
|
|
UpInitializeDeletedAttr(
|
|
OUT SAM_USERPARMS_ATTR * pAttr,
|
|
IN PWCHAR pszAttr)
|
|
{
|
|
if (pszAttr == NULL)
|
|
{
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
|
|
// Initialize the name
|
|
RtlInitUnicodeString (&(pAttr->AttributeIdentifier), pszAttr);
|
|
pAttr->Syntax = Syntax_Attribute;
|
|
|
|
// Value count of zero means delete
|
|
//
|
|
pAttr->CountOfValues = 0;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// Converts the given user parms blob into a set of
|
|
// ras attributes
|
|
//
|
|
NTSTATUS
|
|
UpUserParmsToRasUser0 (
|
|
IN PVOID pvUserParms,
|
|
OUT RAS_USER_0 * pRasUser0)
|
|
{
|
|
DWORD dwErr;
|
|
|
|
// Initalize
|
|
ZeroMemory(pRasUser0, sizeof(RAS_USER_0));
|
|
pRasUser0->bfPrivilege = RASPRIV_NoCallback;
|
|
pRasUser0->wszPhoneNumber[0] = UNICODE_NULL;
|
|
|
|
// The the user parms are null, the defaults
|
|
// will do.
|
|
if (pvUserParms == NULL)
|
|
{
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
// Truncate user parms at sizeof USER_PARMS
|
|
if (lstrlenW((PWCHAR)pvUserParms) >= sizeof(USER_PARMS))
|
|
{
|
|
// We slam in a null at sizeof(USER_PARMS)-1 which
|
|
// corresponds to user_parms.up_Null
|
|
((PWCHAR)pvUserParms)[sizeof(USER_PARMS)-1] = L'\0';
|
|
}
|
|
|
|
// Get RAS info (and validate) from usr_parms
|
|
dwErr = MprGetUsrParams(
|
|
UP_CLIENT_DIAL,
|
|
(LPWSTR) pvUserParms,
|
|
(LPWSTR) pRasUser0);
|
|
if (dwErr == NO_ERROR)
|
|
{
|
|
// Get RAS Privilege and callback number
|
|
RasPrivilegeAndCallBackNumber(FALSE, pRasUser0);
|
|
}
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
/////////
|
|
// Signature of the extraction function.
|
|
/////////
|
|
typedef HRESULT (WINAPI *IASPARMSQUERYUSERPROPERTY)(
|
|
IN PCWSTR pszUserParms,
|
|
IN PCWSTR pszName,
|
|
OUT VARIANT *pvarValue
|
|
);
|
|
|
|
//////////
|
|
// Uplevel per-user attributes that will be migrated.
|
|
//////////
|
|
CONST PCWSTR UPLEVEL_PARMS[] =
|
|
{
|
|
L"msNPAllowDialin",
|
|
L"msNPCallingStationID",
|
|
L"msRADIUSCallbackNumber",
|
|
L"msRADIUSFramedIPAddress",
|
|
L"msRADIUSFramedRoute",
|
|
L"msRADIUSServiceType"
|
|
};
|
|
|
|
//////////
|
|
// Number of per-user attributes.
|
|
//////////
|
|
#define NUM_UPLEVEL_PARMS (sizeof(UPLEVEL_PARMS)/sizeof(UPLEVEL_PARMS[0]))
|
|
|
|
/////////
|
|
// Converts a ULONG into a SAM_USERPARMS_ATTRVALS struct.
|
|
/////////
|
|
NTSTATUS
|
|
NTAPI
|
|
ConvertULongToAttrVal(
|
|
IN ULONG ulValue,
|
|
OUT PSAM_USERPARMS_ATTRVALS pAttrVal
|
|
)
|
|
{
|
|
// Allocate memory to hold the ULONG.
|
|
pAttrVal->value = UpAlloc(sizeof(ULONG), FALSE);
|
|
if (pAttrVal->value == NULL) { return STATUS_NO_MEMORY; }
|
|
|
|
// Copy in the value.
|
|
*(PULONG)pAttrVal->value = ulValue;
|
|
|
|
// Set the length.
|
|
pAttrVal->length = sizeof(ULONG);
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//////////
|
|
// Converts a single-valued VARIANT into a SAM_USERPARMS_ATTRVALS struct.
|
|
//////////
|
|
NTSTATUS
|
|
NTAPI
|
|
ConvertVariantToAttrVal(
|
|
IN CONST VARIANT *pvarValue,
|
|
OUT PSAM_USERPARMS_ATTRVALS pAttrVal
|
|
)
|
|
{
|
|
NTSTATUS status;
|
|
ULONG length;
|
|
UNICODE_STRING wide;
|
|
ANSI_STRING ansi;
|
|
|
|
switch (V_VT(pvarValue))
|
|
{
|
|
case VT_EMPTY:
|
|
{
|
|
// VT_EMPTY means the attribute was deleted.
|
|
pAttrVal->value = NULL;
|
|
pAttrVal->length = 0;
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
case VT_I2:
|
|
return ConvertULongToAttrVal(V_I2(pvarValue), pAttrVal);
|
|
|
|
case VT_I4:
|
|
return ConvertULongToAttrVal(V_I4(pvarValue), pAttrVal);
|
|
|
|
case VT_BSTR:
|
|
{
|
|
// Check the BSTR.
|
|
if (V_BSTR(pvarValue) == NULL) { return STATUS_INVALID_PARAMETER; }
|
|
|
|
// Initialize the source string.
|
|
RtlInitUnicodeString(&wide, V_BSTR(pvarValue));
|
|
|
|
// Initialize the destination buffer.
|
|
ansi.Length = 0;
|
|
ansi.MaximumLength = wide.MaximumLength / sizeof(WCHAR);
|
|
ansi.Buffer = UpAlloc(ansi.MaximumLength, FALSE);
|
|
if (ansi.Buffer == NULL) { return STATUS_NO_MEMORY; }
|
|
|
|
// Convert from wide to ansi.
|
|
status = RtlUnicodeStringToAnsiString(&ansi, &wide, FALSE);
|
|
if (!NT_SUCCESS(status))
|
|
{
|
|
UpFree(ansi.Buffer);
|
|
return status;
|
|
}
|
|
|
|
// Store the result.
|
|
pAttrVal->value = ansi.Buffer;
|
|
pAttrVal->length = ansi.Length + 1;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
case VT_BOOL:
|
|
return ConvertULongToAttrVal((V_BOOL(pvarValue) ? 1 : 0), pAttrVal);
|
|
|
|
case VT_I1:
|
|
return ConvertULongToAttrVal(V_I1(pvarValue), pAttrVal);
|
|
|
|
case VT_UI1:
|
|
return ConvertULongToAttrVal(V_UI1(pvarValue), pAttrVal);
|
|
|
|
case VT_UI2:
|
|
return ConvertULongToAttrVal(V_UI2(pvarValue), pAttrVal);
|
|
|
|
case VT_UI4:
|
|
return ConvertULongToAttrVal(V_UI4(pvarValue), pAttrVal);
|
|
|
|
case VT_ARRAY | VT_I1:
|
|
case VT_ARRAY | VT_UI1:
|
|
{
|
|
// Check the SAFEARRAY.
|
|
if (V_ARRAY(pvarValue) == NULL) { return STATUS_INVALID_PARAMETER; }
|
|
|
|
// Allocate memory for the octet string.
|
|
length = V_ARRAY(pvarValue)->rgsabound[0].cElements;
|
|
pAttrVal->value = UpAlloc(length, FALSE);
|
|
if (pAttrVal->value == NULL) { return STATUS_NO_MEMORY; }
|
|
|
|
// Copy in the data.
|
|
memcpy(pAttrVal->value, V_ARRAY(pvarValue)->pvData, length);
|
|
|
|
// Set the length.
|
|
pAttrVal->length = length;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
}
|
|
|
|
// If we made it here it was an unsupported VARTYPE.
|
|
return STATUS_INVALID_PARAMETER;
|
|
}
|
|
|
|
//////////
|
|
// Frees the values array of a SAM_USERPARMS_ATTR struct.
|
|
//////////
|
|
VOID
|
|
NTAPI
|
|
FreeUserParmsAttrValues(
|
|
IN PSAM_USERPARMS_ATTR pAttrs
|
|
)
|
|
{
|
|
ULONG i;
|
|
|
|
if (pAttrs)
|
|
{
|
|
for (i = 0; i < pAttrs->CountOfValues; ++i)
|
|
{
|
|
UpFree(pAttrs->Values[i].value);
|
|
}
|
|
|
|
UpFree(pAttrs->Values);
|
|
}
|
|
}
|
|
|
|
//////////
|
|
// Converts a VARIANT into a SAM_USERPARMS_ATTR struct.
|
|
//////////
|
|
NTSTATUS
|
|
NTAPI
|
|
ConvertVariantToUserParmsAttr(
|
|
IN CONST VARIANT *pvarSrc,
|
|
OUT PSAM_USERPARMS_ATTR pAttrs
|
|
)
|
|
{
|
|
NTSTATUS status;
|
|
ULONG nelem;
|
|
CONST VARIANT *srcVal;
|
|
SAM_USERPARMS_ATTRVALS *dstVal;
|
|
|
|
// Get the array of values to be converted.
|
|
if (V_VT(pvarSrc) != (VT_VARIANT | VT_ARRAY))
|
|
{
|
|
nelem = 1;
|
|
srcVal = pvarSrc;
|
|
}
|
|
else
|
|
{
|
|
nelem = V_ARRAY(pvarSrc)->rgsabound[0].cElements;
|
|
srcVal = (CONST VARIANT *)V_ARRAY(pvarSrc)->pvData;
|
|
}
|
|
|
|
// Initialize CountOfValues to zero. We'll use this to track how many
|
|
// values have been successfully converted.
|
|
pAttrs->CountOfValues = 0;
|
|
|
|
// Allocate memory to hold the values.
|
|
pAttrs->Values = UpAlloc(sizeof(SAM_USERPARMS_ATTRVALS) * nelem, TRUE);
|
|
if (pAttrs->Values == NULL) { return STATUS_NO_MEMORY; }
|
|
|
|
// Loop through each value to be converted.
|
|
for (dstVal = pAttrs->Values; nelem > 0; ++srcVal, ++dstVal, --nelem)
|
|
{
|
|
status = ConvertVariantToAttrVal(srcVal, dstVal);
|
|
if (!NT_SUCCESS(status))
|
|
{
|
|
// Clean-up the partial results.
|
|
FreeUserParmsAttrValues(pAttrs);
|
|
return status;
|
|
}
|
|
|
|
++(pAttrs->CountOfValues);
|
|
}
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//////////
|
|
// Extracts the NT5 per-user attributes from a SAM UserParameters string and
|
|
// converts them to a SAM_USERPARMS_ATTRBLOCK struct.
|
|
//////////
|
|
NTSTATUS
|
|
NTAPI
|
|
ConvertUserParmsToAttrBlock(
|
|
IN PCWSTR lpUserParms,
|
|
OUT PSAM_USERPARMS_ATTRBLOCK *ppAttrs
|
|
)
|
|
{
|
|
static IASPARMSQUERYUSERPROPERTY IASParmsQueryUserProperty;
|
|
|
|
NTSTATUS status;
|
|
PSAM_USERPARMS_ATTR dst;
|
|
PWSTR szPassword;
|
|
ULONG i;
|
|
HRESULT hr;
|
|
VARIANT src;
|
|
|
|
//////////
|
|
// Make sure we have the extraction function loaded.
|
|
//////////
|
|
|
|
if (IASParmsQueryUserProperty == NULL)
|
|
{
|
|
IASParmsQueryUserProperty = (IASPARMSQUERYUSERPROPERTY)
|
|
GetProcAddress(
|
|
LoadLibraryW(
|
|
L"IASSAM.DLL"
|
|
),
|
|
"IASParmsQueryUserProperty"
|
|
);
|
|
|
|
if (!IASParmsQueryUserProperty) { return STATUS_PROCEDURE_NOT_FOUND; }
|
|
}
|
|
|
|
//////////
|
|
// Allocate memory for the SAM_USERPARMS_ATTRBLOCK.
|
|
//////////
|
|
|
|
*ppAttrs = (PSAM_USERPARMS_ATTRBLOCK)
|
|
UpAlloc(
|
|
sizeof(SAM_USERPARMS_ATTRBLOCK),
|
|
TRUE
|
|
);
|
|
if (*ppAttrs == NULL)
|
|
{
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
|
|
(*ppAttrs)->UserParmsAttr = (PSAM_USERPARMS_ATTR)
|
|
UpAlloc(
|
|
sizeof(SAM_USERPARMS_ATTR) *
|
|
(NUM_UPLEVEL_PARMS + 1),
|
|
TRUE
|
|
);
|
|
if ((*ppAttrs)->UserParmsAttr == NULL)
|
|
{
|
|
UpFree(*ppAttrs);
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
|
|
//////////
|
|
// Convert the cleartext password.
|
|
//////////
|
|
|
|
dst = (*ppAttrs)->UserParmsAttr;
|
|
|
|
szPassword = NULL;
|
|
IASParmsGetUserPassword(
|
|
lpUserParms,
|
|
&szPassword
|
|
);
|
|
|
|
if (szPassword)
|
|
{
|
|
status = UpInitializePasswordAttr(
|
|
dst,
|
|
UpStrDup(szPassword)
|
|
);
|
|
|
|
LocalFree(szPassword);
|
|
|
|
if (NT_SUCCESS(status))
|
|
{
|
|
++dst;
|
|
}
|
|
}
|
|
|
|
//////////
|
|
// Convert the dial-in parameters.
|
|
//////////
|
|
|
|
for (i = 0; i < NUM_UPLEVEL_PARMS; ++i)
|
|
{
|
|
// Try to extract the parameter from UserParms.
|
|
hr = IASParmsQueryUserProperty(
|
|
lpUserParms,
|
|
UPLEVEL_PARMS[i],
|
|
&src
|
|
);
|
|
if (FAILED(hr) || V_VT(&src) == VT_EMPTY) { continue; }
|
|
|
|
// Convert to a SAM_USERPARMS_ATTRVALS array.
|
|
status = ConvertVariantToUserParmsAttr(
|
|
&src,
|
|
dst
|
|
);
|
|
if (NT_SUCCESS(status))
|
|
{
|
|
// Fill in the AttributeIdentifier ...
|
|
RtlInitUnicodeString(
|
|
&dst->AttributeIdentifier,
|
|
UpStrDup(UPLEVEL_PARMS[i])
|
|
);
|
|
|
|
// ... and the Syntax.
|
|
dst->Syntax = Syntax_Attribute;
|
|
|
|
// All went well, so advance to the next element in the array.
|
|
++dst;
|
|
}
|
|
|
|
// We're done with the VARIANT.
|
|
VariantClear(&src);
|
|
}
|
|
|
|
(*ppAttrs)->attCount = (ULONG)(dst - (*ppAttrs)->UserParmsAttr);
|
|
|
|
// If there weren't any attributes, then free the UserParmsAttr array.
|
|
if ((*ppAttrs)->attCount == 0)
|
|
{
|
|
UpFree((*ppAttrs)->UserParmsAttr);
|
|
|
|
(*ppAttrs)->UserParmsAttr = NULL;
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
//
|
|
// Generate an appropriate set of ds attributes based on the
|
|
// ras user information provided
|
|
//
|
|
NTSTATUS
|
|
UpGenerateDsAttribs (
|
|
IN DWORD dwFlags,
|
|
IN RAS_USER_0 * pRasUser0,
|
|
IN PWSTR szPassword,
|
|
OUT PSAM_USERPARMS_ATTRBLOCK * ppAttrs)
|
|
{
|
|
PSAM_USERPARMS_ATTRBLOCK pRet = NULL;
|
|
SAM_USERPARMS_ATTR * pCurAttr = NULL;
|
|
PWCHAR pszDupPassword, pszCurAttr = NULL;
|
|
DWORD dwCurVal = 0, dwDsParamCount;
|
|
NTSTATUS ntStatus = STATUS_SUCCESS;
|
|
|
|
UpTrace("UpGenerateDsAttribs: enter %x", dwFlags);
|
|
|
|
do
|
|
{
|
|
// pmay: 330184
|
|
//
|
|
// If we're upgrading, then having NULL userparms or having
|
|
// deny set explicitly should cause us to not add the msNPAllowDialin
|
|
// value so that user will be managed by policy.
|
|
//
|
|
if (
|
|
(dwFlags & UP_F_Upgrade) &&
|
|
(!(pRasUser0->bfPrivilege & RASPRIV_DialinPrivilege))
|
|
)
|
|
{
|
|
dwFlags &= ~UP_F_Dialin;
|
|
}
|
|
|
|
// Initialize the return value
|
|
pRet = (PSAM_USERPARMS_ATTRBLOCK)
|
|
UpAlloc(sizeof(SAM_USERPARMS_ATTRBLOCK), TRUE);
|
|
if (pRet == NULL)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: alloc block failed");
|
|
ntStatus = STATUS_NO_MEMORY;
|
|
break;
|
|
}
|
|
|
|
// Calculate the total number of values
|
|
dwDsParamCount = 0;
|
|
if (dwFlags & UP_F_Dialin)
|
|
{
|
|
dwDsParamCount += 1;
|
|
}
|
|
if (dwFlags & UP_F_Callback)
|
|
{
|
|
dwDsParamCount += 3;
|
|
}
|
|
if (szPassword != NULL)
|
|
{
|
|
dwDsParamCount += 1;
|
|
}
|
|
|
|
//
|
|
// Set the array to be big enough to accomodate 4 attributes:
|
|
// 1. Dialin bit
|
|
// 2. Callback Number or Saved Callback Number
|
|
// 3. Deleted version of #2
|
|
// 4. Service Type (for callback policy)
|
|
//
|
|
pCurAttr = (SAM_USERPARMS_ATTR*)
|
|
UpAlloc(sizeof(SAM_USERPARMS_ATTR) * dwDsParamCount, TRUE);
|
|
if (pCurAttr == NULL)
|
|
{
|
|
ntStatus = STATUS_NO_MEMORY;
|
|
UpTrace("UpGenerateDsAttribs: alloc of %d values failed",
|
|
dwDsParamCount);
|
|
break;
|
|
}
|
|
pRet->attCount = dwDsParamCount;
|
|
pRet->UserParmsAttr = pCurAttr;
|
|
|
|
// Set any appropriate dialin parameters
|
|
//
|
|
if (dwFlags & UP_F_Dialin)
|
|
{
|
|
dwCurVal =
|
|
(pRasUser0->bfPrivilege & RASPRIV_DialinPrivilege) ? 1 : 0;
|
|
|
|
// Initialize the dialin setting
|
|
ntStatus = UpInitializeDwordAttr(
|
|
pCurAttr,
|
|
UpStrDup((PWCHAR)pszAttrDialin),
|
|
dwCurVal);
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: fail dialin val %x", ntStatus);
|
|
break;
|
|
}
|
|
|
|
pCurAttr++;
|
|
}
|
|
|
|
// Set any appropriate callback parameters
|
|
//
|
|
if (dwFlags & UP_F_Callback)
|
|
{
|
|
|
|
// The following logic was modified for SP1 of Win2K. The reason is that
|
|
// the values being set did not conform to the rules outlined in the
|
|
// comments to the UserParmsConvert function.
|
|
//
|
|
// Namely,
|
|
// 1. the msRADIUSServiceType was being set to SDO_FRAMED instead of
|
|
// <empty> when RASPRIV_NoCallback was set.
|
|
//
|
|
// 2. When RASPRIV_NoCallback was set, the msRADIUSCallbackNumber was
|
|
// set and the msRASSavedCallbackNumber was deleted instead of the
|
|
// vice-versa
|
|
//
|
|
|
|
// Initialize the service type
|
|
if (pRasUser0->bfPrivilege & RASPRIV_NoCallback)
|
|
{
|
|
ntStatus = UpInitializeDeletedAttr(
|
|
pCurAttr,
|
|
UpStrDup((PWCHAR)pszAttrServiceType));
|
|
}
|
|
else
|
|
{
|
|
ntStatus = UpInitializeDwordAttr(
|
|
pCurAttr,
|
|
UpStrDup((PWCHAR)pszAttrServiceType),
|
|
SDO_FRAMED_CALLBACK);
|
|
}
|
|
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: fail ST val %x", ntStatus);
|
|
break;
|
|
}
|
|
pCurAttr++;
|
|
|
|
// Initialize the callback number that will be committed
|
|
pszCurAttr = (pRasUser0->bfPrivilege & RASPRIV_AdminSetCallback) ?
|
|
(PWCHAR) pszAttrCbNumber :
|
|
(PWCHAR) pszAttrSavedCbNumber;
|
|
if (*(pRasUser0->wszPhoneNumber))
|
|
{
|
|
ntStatus = UpInitializeStringAttrA(
|
|
pCurAttr,
|
|
UpStrDup(pszCurAttr),
|
|
UpWcstombsDup(pRasUser0->wszPhoneNumber));
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: fail CB val %x", ntStatus);
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ntStatus = UpInitializeDeletedAttr(
|
|
pCurAttr,
|
|
UpStrDup(pszCurAttr));
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: fail del CB val %x", ntStatus);
|
|
break;
|
|
}
|
|
}
|
|
pCurAttr++;
|
|
|
|
// Remove the callback number that doesn't apply.
|
|
pszCurAttr = (pszCurAttr == pszAttrCbNumber) ?
|
|
(PWCHAR) pszAttrSavedCbNumber :
|
|
(PWCHAR) pszAttrCbNumber;
|
|
ntStatus = UpInitializeDeletedAttr(
|
|
pCurAttr,
|
|
UpStrDup(pszCurAttr));
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: fail del SCB val %x", ntStatus);
|
|
break;
|
|
}
|
|
pCurAttr++;
|
|
}
|
|
|
|
// Set the cleartext password if present
|
|
//
|
|
if (szPassword != NULL)
|
|
{
|
|
// Make a duplicate copy of the password
|
|
if ((pszDupPassword = UpStrDup(szPassword)) == NULL)
|
|
{
|
|
ntStatus = STATUS_NO_MEMORY;
|
|
break;
|
|
}
|
|
|
|
// Initialize the password attribute
|
|
ntStatus = UpInitializePasswordAttr(
|
|
pCurAttr,
|
|
pszDupPassword);
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UpGenerateDsAttribs: fail password val %x", ntStatus);
|
|
break;
|
|
}
|
|
|
|
pCurAttr++;
|
|
}
|
|
|
|
} while (FALSE);
|
|
|
|
// Cleanup
|
|
{
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UserParmsFree(pRet);
|
|
*ppAttrs = NULL;
|
|
}
|
|
else
|
|
{
|
|
*ppAttrs = pRet;
|
|
}
|
|
}
|
|
|
|
return ntStatus;
|
|
}
|
|
|
|
//
|
|
// Callback function called by NT5 SAM whenever the user parms
|
|
// of a particular user are modified. The job of this callout
|
|
// is to take the new value of user parms and generate a set of
|
|
// domain attributes that need to be set for the given user so
|
|
// that per-user DS attributes and userparms are kept in sync.
|
|
//
|
|
// This callout will be invoked during dcpromo to upgrade user parms
|
|
// and whenever userparms is modified (by downlevel api's and apps).
|
|
//
|
|
// Callback functions for NT5 SAM are registered in the following
|
|
// registry key:
|
|
//
|
|
// HKLM\SYS\CCS\Control\LSA\NotificationPackages
|
|
//
|
|
// The following are the rules of the RAS LDAP parameters:
|
|
//
|
|
// msNPAllowDialin
|
|
// - Empty = Use policy to determine dialin privilege
|
|
// - 1 = Allow dialin
|
|
// - 2 = Deny dialin
|
|
//
|
|
// msRADIUSServiceType
|
|
// - Empty = NoCallback policy
|
|
// - 4 = CallerCallback if msRADIUSCallbackNumber is empty
|
|
// AdminCallback if msRADIUSCallbackNumber is not empty
|
|
//
|
|
// msRADIUSCallbackNumber
|
|
// - Determines the callback policy depending on msRADIUSServiceType
|
|
//
|
|
// msRASSavedCallbackNumber
|
|
// - Used to store the last known value of msRADIUSCallbackNumber when
|
|
// switching from AdminCallback policy to some other policy.
|
|
//
|
|
|
|
NTSTATUS
|
|
UserParmsConvert (
|
|
IN ULONG ulFlags,
|
|
IN PSID pDomainSid,
|
|
IN ULONG ulObjectRid,
|
|
IN ULONG ulOrigLen,
|
|
IN PVOID pvOrigUserParms,
|
|
IN ULONG ulNewLen,
|
|
IN PVOID pvNewUserParms,
|
|
OUT PSAM_USERPARMS_ATTRBLOCK * ppAttrs)
|
|
{
|
|
RAS_USER_0 RasUser00, *pOrigUser = &RasUser00;
|
|
RAS_USER_0 RasUser01, *pNewUser = &RasUser01;
|
|
NTSTATUS ntStatus = STATUS_SUCCESS;
|
|
PVOID pvOrig = NULL, pvNew = NULL;
|
|
DWORD dwFlags = 0, dwMask;
|
|
PWSTR szPassword = NULL;
|
|
|
|
UpTrace(
|
|
"UPConvert: F=%x, Rid=%x, OLen=%d, OPar=%x, NLen=%d, NPar=%x",
|
|
ulFlags, ulObjectRid, ulOrigLen, pvOrigUserParms,
|
|
ulNewLen, pvNewUserParms);
|
|
|
|
// Validate parameters
|
|
if (ppAttrs == NULL)
|
|
return STATUS_INVALID_PARAMETER;
|
|
|
|
// Initialize the return value;
|
|
*ppAttrs = NULL;
|
|
|
|
// If the user parms passed to us are NULL,
|
|
// then keep defaults.
|
|
if ((pvNewUserParms == NULL) || (ulNewLen == 0))
|
|
{
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
do
|
|
{
|
|
// Allocate and initialize local copies of
|
|
// the user parms
|
|
pvOrig = UpBlobDup(pvOrigUserParms, ulOrigLen);
|
|
pvNew = UpBlobDup(pvNewUserParms, ulNewLen);
|
|
|
|
// If this is a NT5 standalone being promoted to a DC, then we
|
|
// just convert the uplevel userparms 'as is'.
|
|
if ((ulFlags & SAM_USERPARMS_DURING_UPGRADE) &&
|
|
!SamINT4UpgradeInProgress())
|
|
{
|
|
ntStatus = ConvertUserParmsToAttrBlock(pvNew, ppAttrs);
|
|
break;
|
|
}
|
|
|
|
// Get the new ras properties
|
|
ntStatus = UpUserParmsToRasUser0(
|
|
pvNew,
|
|
pNewUser);
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UPConvert: Conversion to RAS_USER_0 failed.(1)");
|
|
break;
|
|
}
|
|
|
|
// If we're upgrading, then we should blindly
|
|
// set whatever information is stored in the user.
|
|
if (ulFlags & SAM_USERPARMS_DURING_UPGRADE)
|
|
{
|
|
IASParmsGetUserPassword(pvNewUserParms, &szPassword);
|
|
|
|
ntStatus = UpGenerateDsAttribs(
|
|
UP_F_Dialin | UP_F_Callback | UP_F_Upgrade,
|
|
pNewUser,
|
|
szPassword,
|
|
ppAttrs);
|
|
|
|
LocalFree(szPassword);
|
|
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UPConvert: GenerateDsAttribs failed %x", ntStatus);
|
|
}
|
|
break;
|
|
}
|
|
|
|
// Get the ras properties of the old user parms
|
|
ntStatus = UpUserParmsToRasUser0(
|
|
pvOrig,
|
|
pOrigUser);
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UPConvert: Conversion to RAS_USER_0 failed.(2)");
|
|
break;
|
|
}
|
|
|
|
// Find out if the dialin privilege should be updated
|
|
dwFlags = 0;
|
|
if (!!(pOrigUser->bfPrivilege & RASPRIV_DialinPrivilege) !=
|
|
!!(pNewUser->bfPrivilege & RASPRIV_DialinPrivilege))
|
|
{
|
|
dwFlags |= UP_F_Dialin;
|
|
}
|
|
|
|
// pmay: 264409
|
|
//
|
|
// If we are adding null usrparms for the first time,
|
|
// go ahead and add the dialin bit value to the ds.
|
|
//
|
|
if ((pvOrig == NULL) && (pvNew != NULL))
|
|
{
|
|
dwFlags |= UP_F_Dialin;
|
|
}
|
|
|
|
// Findout if any callback info should be updated
|
|
dwMask = RASPRIV_NoCallback |
|
|
RASPRIV_CallerSetCallback |
|
|
RASPRIV_AdminSetCallback;
|
|
if (((pOrigUser->bfPrivilege & dwMask) !=
|
|
(pNewUser->bfPrivilege & dwMask)) ||
|
|
(wcscmp(pOrigUser->wszPhoneNumber, pNewUser->wszPhoneNumber) != 0)
|
|
)
|
|
{
|
|
dwFlags |= UP_F_Callback;
|
|
}
|
|
|
|
// If there were no changes, we're done.
|
|
if (dwFlags == 0)
|
|
{
|
|
UpTrace("UPConvert: nothing to update.");
|
|
ntStatus = STATUS_SUCCESS;
|
|
break;
|
|
}
|
|
|
|
// Create the new attributes
|
|
ntStatus = UpGenerateDsAttribs(dwFlags, pNewUser, NULL, ppAttrs);
|
|
if (ntStatus != STATUS_SUCCESS)
|
|
{
|
|
UpTrace("UPConvert: UpGenerateDsAttribs failed %x.", ntStatus);
|
|
break;
|
|
}
|
|
|
|
} while (FALSE);
|
|
|
|
// Cleanup
|
|
{
|
|
if (pvOrig)
|
|
{
|
|
UpFree(pvOrig);
|
|
}
|
|
if (pvNew)
|
|
{
|
|
UpFree(pvNew);
|
|
}
|
|
}
|
|
|
|
return ntStatus;
|
|
}
|
|
|
|
//
|
|
// Callback function called by NT5 SAM to free the blob
|
|
// returned by UserParmsConvert.
|
|
//
|
|
VOID
|
|
UserParmsFree(
|
|
IN PSAM_USERPARMS_ATTRBLOCK pData)
|
|
{
|
|
SAM_USERPARMS_ATTR * pCur = NULL;
|
|
DWORD i, j;
|
|
|
|
UpTrace("UserParmsFree: Entered. %x", pData);
|
|
|
|
// If no attributes were given, we're all done
|
|
if (pData == NULL)
|
|
return;
|
|
|
|
if (pData->UserParmsAttr)
|
|
{
|
|
// Loop through all the attributes, freeing them
|
|
// as you go.
|
|
for (i = 0; i < pData->attCount; i++)
|
|
{
|
|
// Keep track of the current attribute
|
|
pCur = &(pData->UserParmsAttr[i]);
|
|
|
|
// Free the copied attribute name
|
|
if (pCur->AttributeIdentifier.Buffer)
|
|
UpFree(pCur->AttributeIdentifier.Buffer);
|
|
|
|
// Free any associated values as well.
|
|
if (pCur->Values)
|
|
{
|
|
for (j = 0; j < pCur->CountOfValues; j++)
|
|
{
|
|
// Assume there's only one value since that's
|
|
// all we ever set. Free the value
|
|
if (pCur->Values[j].value)
|
|
UpFree(pCur->Values[j].value);
|
|
}
|
|
|
|
// Free the value structure
|
|
UpFree(pCur->Values);
|
|
}
|
|
}
|
|
|
|
// Free the array of attributes
|
|
UpFree (pData->UserParmsAttr);
|
|
}
|
|
|
|
// Finally, free the whole structure
|
|
UpFree (pData);
|
|
}
|