mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
312 lines
9.5 KiB
312 lines
9.5 KiB
/*---------------------------------------------------------------------------
|
|
File: PwdSvc.cpp
|
|
|
|
Comments: entry point functions and other exported functions for ADMT's
|
|
password migration Lsa notification package.
|
|
|
|
REVISION LOG ENTRY
|
|
Revision By: Paul Thompson
|
|
Revised on 09/06/00
|
|
|
|
---------------------------------------------------------------------------
|
|
*/
|
|
|
|
#include "Pwd.h"
|
|
#include "PwdSvc.h"
|
|
#include "PwdSvc_s.c"
|
|
|
|
// These global variables can be changed if required
|
|
#define gsPwdProtoSeq TEXT("ncacn_np")
|
|
#define gsPwdEndPoint TEXT("\\pipe\\PwdMigRpc")
|
|
DWORD gPwdRpcMinThreads = 1;
|
|
DWORD gPwdRpcMaxThreads = RPC_C_LISTEN_MAX_CALLS_DEFAULT;
|
|
|
|
#ifndef STATUS_SUCCESS
|
|
#define STATUS_SUCCESS ((NTSTATUS) 0x00000000L)
|
|
#endif
|
|
|
|
extern "C"
|
|
{
|
|
BOOL WINAPI _CRT_INIT( HANDLE hInstance, DWORD nReason, LPVOID pReserved );
|
|
}
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
* *
|
|
* Written by: Paul Thompson *
|
|
* Date: 7 SEPT 2000 *
|
|
* *
|
|
* This function is called by Lsa when trying to load all *
|
|
* registered Lsa password filter notification dlls. Here we will *
|
|
* initialize the RPC run-time library to handle our ADMT password *
|
|
* migration RPC interface and to begin looking for RPC calls. If we*
|
|
* fail to successfully setup our RPC, we will return FALSE from this*
|
|
* function which will cause Lsa not to load this password filter *
|
|
* Dll. *
|
|
* Note that the other two password filter dll functions: *
|
|
* PasswordChangeNotify and PasswordFilter do nothing at this point *
|
|
* in time. *
|
|
* *
|
|
*********************************************************************/
|
|
|
|
//BEGIN InitializeChangeNotify
|
|
BOOLEAN __stdcall InitializeChangeNotify()
|
|
{
|
|
/* local variables */
|
|
RPC_STATUS rc = 0;
|
|
BOOLEAN bSuccess = FALSE;
|
|
// FILE * dbgFile;
|
|
|
|
/* function body */
|
|
// dbgFile = _wfopen(L"c:\\aa.txt", L"w+");
|
|
// fwprintf(dbgFile, L"Entering InitializeChangeNotify\n");
|
|
// MessageBeep(-1);
|
|
// specify protocol sequence and endpoint
|
|
// for receiving remote procedure calls
|
|
rc = RpcServerUseProtseqEp(gsPwdProtoSeq,
|
|
RPC_C_PROTSEQ_MAX_REQS_DEFAULT,
|
|
gsPwdEndPoint,
|
|
NULL );
|
|
if (rc == RPC_S_OK)
|
|
{
|
|
// fwprintf(dbgFile, L"RpcServerUseProtseqEp Succeeded!\n");
|
|
// register an interface with the RPC run-time library
|
|
rc = RpcServerRegisterIf(PwdMigRpc_ServerIfHandle, NULL, NULL);
|
|
if (rc == RPC_S_OK)
|
|
{
|
|
// fwprintf(dbgFile, L"RpcServerRegisterIf Succeeded!\n");
|
|
//set the authenification for this RPC interface
|
|
rc = RpcServerRegisterAuthInfo(NULL, RPC_C_AUTHN_WINNT, NULL, NULL);
|
|
if (rc == RPC_S_OK)
|
|
{
|
|
// fwprintf(dbgFile, L"RpcServerRegisterAuthInfo Succeeded!\n");
|
|
// listen for remote procedure calls
|
|
rc = RpcServerListen(gPwdRpcMinThreads,
|
|
gPwdRpcMaxThreads,
|
|
FALSE );
|
|
if (rc != RPC_S_OK)
|
|
{
|
|
// fwprintf(dbgFile, L"RpcServerListen Failed!\n");
|
|
switch (rc)
|
|
{
|
|
case RPC_S_ALREADY_LISTENING:
|
|
// fwprintf(dbgFile, L"RPC_S_ALREADY_LISTENING\n");
|
|
//if already listening, that's fine
|
|
bSuccess = TRUE;
|
|
break;
|
|
case RPC_S_NO_PROTSEQS_REGISTERED:
|
|
// fwprintf(dbgFile, L"RPC_S_NO_PROTSEQS_REGISTERED\n");
|
|
break;
|
|
case RPC_S_MAX_CALLS_TOO_SMALL:
|
|
// fwprintf(dbgFile, L"RPC_S_MAX_CALLS_TOO_SMALL\n");
|
|
break;
|
|
default:
|
|
// fwprintf(dbgFile, L"Unknown\n");
|
|
break;
|
|
}
|
|
}
|
|
//else success, set return value to load this dll as an
|
|
//Lsa password filter dll
|
|
else
|
|
// {
|
|
// fwprintf(dbgFile, L"RpcServerListen Succeeded!\n");
|
|
bSuccess = TRUE;
|
|
// }
|
|
}
|
|
// else
|
|
// fwprintf(dbgFile, L"RpcServerRegisterAuthInfo Failed!\n");
|
|
|
|
// unregister an interface with the RPC run-time library
|
|
// rc = RpcServerUnregisterIf(PwdMigRpc_ServerIfHandle, NULL, NULL);
|
|
}
|
|
// else
|
|
// fwprintf(dbgFile, L"RpcServerRegisterIf Failed!\n");
|
|
}//end if set protocal sequence and end point set
|
|
else
|
|
{
|
|
// fwprintf(dbgFile, L"RpcServerUseProtseqEp Failed!\n");
|
|
switch (rc)
|
|
{
|
|
case RPC_S_PROTSEQ_NOT_SUPPORTED:
|
|
// fwprintf(dbgFile, L"RPC_S_PROTSEQ_NOT_SUPPORTED\n");
|
|
break;
|
|
case RPC_S_INVALID_RPC_PROTSEQ:
|
|
// fwprintf(dbgFile, L"RPC_S_INVALID_RPC_PROTSEQ\n");
|
|
break;
|
|
case RPC_S_INVALID_ENDPOINT_FORMAT:
|
|
// fwprintf(dbgFile, L"RPC_S_INVALID_ENDPOINT_FORMAT\n");
|
|
break;
|
|
case RPC_S_OUT_OF_MEMORY:
|
|
// fwprintf(dbgFile, L"RPC_S_OUT_OF_MEMORY\n");
|
|
break;
|
|
case RPC_S_DUPLICATE_ENDPOINT:
|
|
// fwprintf(dbgFile, L"RPC_S_DUPLICATE_ENDPOINT\n");
|
|
break;
|
|
case RPC_S_INVALID_SECURITY_DESC:
|
|
// fwprintf(dbgFile, L"RPC_S_INVALID_SECURITY_DESC\n");
|
|
break;
|
|
default:
|
|
// fwprintf(dbgFile, L"Unknown\n");
|
|
break;
|
|
}
|
|
}
|
|
|
|
//if we successfully initialized our RPC interface, now open SAM
|
|
//handles used later in our Interface function CopyPassword
|
|
// if (bSuccess)
|
|
// bSuccess = ConnectToSam();
|
|
|
|
// fwprintf(dbgFile, L"Leaving InitializeChangeNotify\n");
|
|
// fclose(dbgFile);
|
|
|
|
//initialize a critical section to be used on the very first RPC call
|
|
__try
|
|
{
|
|
InitializeCriticalSection (&csADMTCriticalSection);
|
|
}
|
|
__except (EXCEPTION_EXECUTE_HANDLER)
|
|
{
|
|
;
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
//END InitializeChangeNotify
|
|
|
|
/*********************************************************************
|
|
* *
|
|
* Written by: Paul Thompson *
|
|
* Date: 7 SEPT 2000 *
|
|
* *
|
|
* This function is called by Lsa for all registered Lsa password*
|
|
* filter notification dlls when a password in the domain has been *
|
|
* modified. We will simply return STATUS_SUCCESS and do nothing. *
|
|
* *
|
|
*********************************************************************/
|
|
|
|
//BEGIN PasswordChangeNotify
|
|
NTSTATUS __stdcall PasswordChangeNotify(PUNICODE_STRING UserName, ULONG RelativeId,
|
|
PUNICODE_STRING NewPassword)
|
|
{
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
/*********************************************************************
|
|
* *
|
|
* Written by: Paul Thompson *
|
|
* Date: 7 SEPT 2000 *
|
|
* *
|
|
* This function is called by Lsa for all registered Lsa password*
|
|
* filter notification dlls when a password in the domain is being *
|
|
* modified. This function is designed to indicate to Lsa if the new*
|
|
* password is acceptable. We will simply return TRUE (indicating it*
|
|
* is acceptable) and do nothing. *
|
|
* *
|
|
*********************************************************************/
|
|
|
|
//BEGIN PasswordFilter
|
|
BOOLEAN __stdcall PasswordFilter(PUNICODE_STRING AccountName, PUNICODE_STRING FullName,
|
|
PUNICODE_STRING Password, BOOLEAN SetOperation)
|
|
{
|
|
return TRUE;
|
|
}
|
|
//END PasswordFilter
|
|
|
|
|
|
/***************************/
|
|
/* Internal DLL functions. */
|
|
/***************************/
|
|
|
|
static BOOL Initialize(void)
|
|
{
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL Terminate(BOOL procterm)
|
|
{
|
|
|
|
if (!procterm)
|
|
return TRUE;
|
|
|
|
/* XXX Do stuff here */
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
BOOL WINAPI
|
|
DllMain(HINSTANCE hinst, DWORD reason, VOID *rsvd)
|
|
/*++
|
|
|
|
Routine description:
|
|
|
|
Dynamic link library entry point. Does nothing meaningful.
|
|
|
|
|
|
Arguments:
|
|
|
|
hinst = handle for the DLL
|
|
reason = code indicating reason for call
|
|
rsvd = for process attach: non-NULL => process startup
|
|
for process detach: non-NULL => process termination
|
|
|
|
Return value:
|
|
|
|
status = success/failure
|
|
|
|
Side effects:
|
|
|
|
None
|
|
|
|
--*/
|
|
|
|
{
|
|
switch (reason) {
|
|
|
|
case DLL_PROCESS_ATTACH:
|
|
{
|
|
_CRT_INIT(hinst, reason, rsvd);
|
|
return Initialize();
|
|
break;
|
|
}
|
|
|
|
case DLL_PROCESS_DETACH:
|
|
{
|
|
BOOL bStat = Terminate(rsvd != NULL);
|
|
_CRT_INIT(hinst, reason, rsvd);
|
|
return bStat;
|
|
break;
|
|
}
|
|
|
|
case DLL_THREAD_ATTACH:
|
|
case DLL_THREAD_DETACH:
|
|
return TRUE;
|
|
|
|
default:
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
// Midl allocate memory
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
|
|
void __RPC_FAR * __RPC_USER
|
|
midl_user_allocate(
|
|
size_t len )
|
|
{
|
|
return new char[len];
|
|
}
|
|
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
// Midl free memory
|
|
///////////////////////////////////////////////////////////////////////////////
|
|
|
|
void __RPC_USER
|
|
midl_user_free(
|
|
void __RPC_FAR * ptr )
|
|
{
|
|
delete [] ptr;
|
|
}
|
|
|