mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2005 lines
50 KiB
2005 lines
50 KiB
//=============================================================================
|
|
// Copyright (c) 2000 Microsoft Corporation
|
|
//
|
|
// api.cpp
|
|
//
|
|
// Win32 API function implementation and the DLL entry function.
|
|
//
|
|
// Created 02/29/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
#include "precomp.hpp"
|
|
#include "dialogs.hpp"
|
|
#include "resource.h"
|
|
//#include "utils.hpp"
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// Global Variables
|
|
//-----------------------------------------------------------------------------
|
|
|
|
HMODULE CreduiInstance = NULL;
|
|
ULONG CreduiComReferenceCount = 0;
|
|
|
|
BOOL CreduiIsPersonal = FALSE;
|
|
BOOL CreduiIsDomainController = FALSE;
|
|
BOOL CreduiIsSafeMode = FALSE;
|
|
|
|
CREDUI_STRINGS CreduiStrings;
|
|
|
|
UINT CreduiScarduiWmReaderArrival = 0;
|
|
UINT CreduiScarduiWmReaderRemoval = 0;
|
|
UINT CreduiScarduiWmCardInsertion = 0;
|
|
UINT CreduiScarduiWmCardRemoval = 0;
|
|
UINT CreduiScarduiWmCardCertAvail = 0;
|
|
UINT CreduiScarduiWmCardStatus = 0;
|
|
|
|
BOOL CreduiHasSmartCardSupport = FALSE;
|
|
|
|
static LONG CreduiFirstTime = TRUE;
|
|
static HANDLE CreduiInitEvent = NULL;
|
|
|
|
BOOL gbWaitingForSSOCreds = FALSE;
|
|
WCHAR gszSSOUserName[CREDUI_MAX_USERNAME_LENGTH];
|
|
WCHAR gszSSOPassword[CREDUI_MAX_PASSWORD_LENGTH];
|
|
BOOL gbStoredSSOCreds = FALSE;
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// Functions
|
|
//-----------------------------------------------------------------------------
|
|
|
|
//=============================================================================
|
|
// CreduiInitStringTable
|
|
//
|
|
// This function loads all the string resources into the global string table.
|
|
// It only needs to be called once per process.
|
|
//
|
|
// Return TRUE if the string table was successfully initialized or FALSE
|
|
// otherwise.
|
|
//
|
|
// Created 03/26/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
BOOL
|
|
CreduiInitStringTable()
|
|
{
|
|
#define CREDUI_STRING(id, name) {\
|
|
id, CreduiStrings.##name, (sizeof CreduiStrings.##name) / (sizeof WCHAR)\
|
|
}
|
|
|
|
static struct
|
|
{
|
|
UINT Id;
|
|
WCHAR *String;
|
|
ULONG Length;
|
|
} stringInfo[] = {
|
|
// Static labels for controls
|
|
CREDUI_STRING(IDS_USERNAME_STATIC, UserNameStatic),
|
|
CREDUI_STRING(IDS_PASSWORD_STATIC, PasswordStatic),
|
|
CREDUI_STRING(IDS_CERTIFICATE_STATIC, CertificateStatic),
|
|
CREDUI_STRING(IDS_PIN_STATIC, PinStatic),
|
|
CREDUI_STRING(IDS_CARD_STATIC, SmartCardStatic),
|
|
// Caption strings
|
|
CREDUI_STRING(IDS_DNS_CAPTION, DnsCaption),
|
|
CREDUI_STRING(IDS_NETBIOS_CAPTION, NetbiosCaption),
|
|
CREDUI_STRING(IDS_GENERIC_CAPTION, GenericCaption),
|
|
CREDUI_STRING(IDS_WELCOME, Welcome),
|
|
CREDUI_STRING(IDS_WELCOME_BACK, WelcomeBack),
|
|
CREDUI_STRING(IDS_CONNECTING, Connecting),
|
|
CREDUI_STRING(IDS_LOOKUP_NAME, LookupName),
|
|
CREDUI_STRING(IDS_CARD_ERROR, CardError),
|
|
CREDUI_STRING(IDS_SAVE, Save),
|
|
CREDUI_STRING(IDS_PASSPORT_SAVE, PassportSave ),
|
|
CREDUI_STRING(IDS_EMAIL_NAME, EmailName ),
|
|
// Tooltip strings
|
|
CREDUI_STRING(IDS_USERNAME_TIP_TITLE, UserNameTipTitle),
|
|
CREDUI_STRING(IDS_USERNAME_TIP_TEXT, UserNameTipText),
|
|
CREDUI_STRING(IDS_PASSWORD_TIP_TITLE, PasswordTipTitle),
|
|
CREDUI_STRING(IDS_PASSWORD_TIP_TEXT, PasswordTipText),
|
|
CREDUI_STRING(IDS_CAPSLOCK_TIP_TITLE, CapsLockTipTitle),
|
|
CREDUI_STRING(IDS_CAPSLOCK_TIP_TEXT, CapsLockTipText),
|
|
CREDUI_STRING(IDS_LOGON_TIP_TITLE, LogonTipTitle),
|
|
CREDUI_STRING(IDS_LOGON_TIP_TEXT, LogonTipText),
|
|
CREDUI_STRING(IDS_LOGON_TIP_CAPS, LogonTipCaps),
|
|
CREDUI_STRING(IDS_BACKWARDS_TIP_TITLE, BackwardsTipTitle),
|
|
CREDUI_STRING(IDS_BACKWARDS_TIP_TEXT, BackwardsTipText),
|
|
CREDUI_STRING(IDS_WRONG_OLD_TIP_TITLE, WrongOldTipTitle),
|
|
CREDUI_STRING(IDS_WRONG_OLD_TIP_TEXT, WrongOldTipText),
|
|
CREDUI_STRING(IDS_NOT_SAME_TIP_TITLE, NotSameTipTitle),
|
|
CREDUI_STRING(IDS_NOT_SAME_TIP_TEXT, NotSameTipText),
|
|
CREDUI_STRING(IDS_TOO_SHORT_TIP_TITLE, TooShortTipTitle),
|
|
CREDUI_STRING(IDS_TOO_SHORT_TIP_TEXT, TooShortTipText),
|
|
CREDUI_STRING(IDS_DOWNGRADE_TIP_TEXT, DowngradeTipText),
|
|
CREDUI_STRING(IDS_EMAILNAME_TIP_TITLE, EmailNameTipTitle),
|
|
CREDUI_STRING(IDS_EMAILNAME_TIP_TEXT, EmailNameTipText),
|
|
// strings that can appear in GUI or be copied from GUI and presented on cmdline
|
|
CREDUI_STRING(IDS_CMDLINE_NOCARD,NoCard),
|
|
CREDUI_STRING(IDS_EMPTY_READER, EmptyReader),
|
|
CREDUI_STRING(IDS_READING_CARD, ReadingCard),
|
|
CREDUI_STRING(IDS_CERTIFICATE, Certificate),
|
|
CREDUI_STRING(IDS_EMPTY_CARD, EmptyCard),
|
|
CREDUI_STRING(IDS_UNKNOWN_CARD, UnknownCard),
|
|
CREDUI_STRING(IDS_BACKWARDS_CARD, BackwardsCard)
|
|
};
|
|
|
|
#undef CREDUI_STRING
|
|
|
|
for (UINT i = 0; i < (sizeof stringInfo) / (sizeof stringInfo[0]); ++i)
|
|
{
|
|
// Read all strings into string array from resources of application
|
|
// Some strings which are GUI-only taken from resources
|
|
// Strings that are may be output to cmdline are taken from MC file, which also
|
|
// permits more flexible argument substitution during localization
|
|
if (stringInfo[i].Id >= 2500)
|
|
{
|
|
stringInfo[i].String[0] = 0;
|
|
FormatMessage(FORMAT_MESSAGE_FROM_HMODULE | FORMAT_MESSAGE_ARGUMENT_ARRAY,
|
|
CreduiInstance,
|
|
stringInfo[i].Id,
|
|
0,
|
|
stringInfo[i].String,
|
|
stringInfo[i].Length - 1,
|
|
NULL);
|
|
}
|
|
else if (!LoadString(CreduiInstance,
|
|
stringInfo[i].Id,
|
|
stringInfo[i].String,
|
|
stringInfo[i].Length))
|
|
{
|
|
CreduiDebugLog("CreduiInitStringTable: Load string %u failed\n",
|
|
stringInfo[i].Id);
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
//=============================================================================
|
|
// CreduiInitSmartCardWindowMessages
|
|
//
|
|
// Return TRUE on success or FALSE otherwise.
|
|
//
|
|
// Created 03/26/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
BOOL
|
|
CreduiInitSmartCardWindowMessages()
|
|
{
|
|
struct
|
|
{
|
|
UINT *message;
|
|
CHAR *string;
|
|
} messageInfo[] = {
|
|
&CreduiScarduiWmReaderArrival, SCARDUI_READER_ARRIVAL,
|
|
&CreduiScarduiWmReaderRemoval, SCARDUI_READER_REMOVAL,
|
|
&CreduiScarduiWmCardInsertion, SCARDUI_SMART_CARD_INSERTION,
|
|
&CreduiScarduiWmCardRemoval, SCARDUI_SMART_CARD_REMOVAL,
|
|
&CreduiScarduiWmCardCertAvail, SCARDUI_SMART_CARD_CERT_AVAIL,
|
|
&CreduiScarduiWmCardStatus, SCARDUI_SMART_CARD_STATUS
|
|
};
|
|
|
|
for (UINT i = 0; i < (sizeof messageInfo) / (sizeof messageInfo[0]); ++i)
|
|
{
|
|
*messageInfo[i].message =
|
|
RegisterWindowMessageA(messageInfo[i].string);
|
|
|
|
if (*messageInfo[i].message == 0)
|
|
{
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
//=============================================================================
|
|
// CreduiApiInit
|
|
//
|
|
// This function is called at API entry points to ensure the common controls
|
|
// we need are initialized. Currently, the only initialization done is only
|
|
// needed once per process, but this macro will handle per thread
|
|
// initialization in the future, if necessary:
|
|
//
|
|
// Returns TRUE on success or FALSE otherwise.
|
|
//
|
|
// Created 03/10/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
static
|
|
BOOL
|
|
CreduiApiInit()
|
|
{
|
|
// First time initialization:
|
|
|
|
ASSERT(CreduiInitEvent != NULL);
|
|
|
|
if (InterlockedCompareExchange(&CreduiFirstTime, FALSE, TRUE))
|
|
{
|
|
INITCOMMONCONTROLSEX init;
|
|
init.dwSize = sizeof init;
|
|
init.dwICC = ICC_USEREX_CLASSES;
|
|
|
|
if (!InitCommonControlsEx(&init))
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
// Check for Personal SKU:
|
|
|
|
OSVERSIONINFOEXW versionInfo;
|
|
|
|
versionInfo.dwOSVersionInfoSize = sizeof OSVERSIONINFOEXW;
|
|
|
|
if (GetVersionEx(reinterpret_cast<OSVERSIONINFOW *>(&versionInfo)))
|
|
{
|
|
CreduiIsPersonal =
|
|
(versionInfo.wProductType == VER_NT_WORKSTATION) &&
|
|
(versionInfo.wSuiteMask & VER_SUITE_PERSONAL);
|
|
CreduiIsDomainController =
|
|
(versionInfo.wProductType == VER_NT_DOMAIN_CONTROLLER);
|
|
}
|
|
|
|
// Check for safe mode:
|
|
|
|
HKEY key;
|
|
|
|
if (RegOpenKeyEx(
|
|
HKEY_LOCAL_MACHINE,
|
|
L"SYSTEM\\CurrentControlSet\\Control\\SafeBoot\\Option",
|
|
0,
|
|
KEY_READ,
|
|
&key) == ERROR_SUCCESS)
|
|
{
|
|
if (RegQueryValueEx(
|
|
key,
|
|
L"OptionValue",
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL) == ERROR_SUCCESS)
|
|
{
|
|
CreduiIsSafeMode = TRUE;
|
|
}
|
|
|
|
RegCloseKey(key);
|
|
}
|
|
|
|
// Do other initialization:
|
|
|
|
InitializeCredMgr();
|
|
if (!CreduiInitStringTable())
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
CreduiHasSmartCardSupport = CreduiInitSmartCardWindowMessages();
|
|
|
|
CreduiIconParentWindow::Register(CreduiInstance);
|
|
|
|
SetEvent(CreduiInitEvent);
|
|
}
|
|
else
|
|
{
|
|
WaitForSingleObject(CreduiInitEvent, INFINITE);
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
//=============================================================================
|
|
// CreduiValidateUiInfo
|
|
//
|
|
// This function validates the CREDUI_INFO structure passed in. A NULL value
|
|
// is acceptable, and impies defaults.
|
|
//
|
|
// CredValidateUiInfoW for wide
|
|
// CredValidateUiInfoA for ANSI
|
|
//
|
|
// Arguments:
|
|
// uiInfo (in) - structure to validate
|
|
//
|
|
// Returns TRUE if the structure is valid, or FALSE otherwise.
|
|
//
|
|
// Created 03/25/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
static
|
|
BOOL
|
|
CreduiValidateUiInfoW(
|
|
CREDUI_INFOW *uiInfo
|
|
)
|
|
{
|
|
|
|
if (uiInfo != NULL)
|
|
{
|
|
if (uiInfo->cbSize != sizeof(*uiInfo) )
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
if ((uiInfo->hbmBanner != NULL) &&
|
|
(GetObjectType(uiInfo->hbmBanner) != OBJ_BITMAP))
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
if ((uiInfo->pszMessageText != NULL) &&
|
|
(lstrlenW(uiInfo->pszMessageText) > CREDUI_MAX_MESSAGE_LENGTH))
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
if ((uiInfo->pszCaptionText != NULL) &&
|
|
(lstrlenW(uiInfo->pszCaptionText) > CREDUI_MAX_CAPTION_LENGTH))
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
//=============================================================================
|
|
// CreduiConvertUiInfoToWide
|
|
//
|
|
// This function converts a CREDUI_INFOA structure to CREDUI_INFOW. On
|
|
// success,The caller is responsible for freeing pszMessageText and
|
|
// pszCaptionText via the delete [] operator.
|
|
//
|
|
// Arguments:
|
|
// uiInfoA (in) - structure to convert
|
|
// uiInfoW (out) - storage for converted structure. The pszMessageText and
|
|
// pszCaptionText will be set to NULL on failure or valid
|
|
// pointers (unless the in pointer is NULL) on success,
|
|
// allocated via the new [] operator.
|
|
//
|
|
// Returns TRUE if the structure is valid, or FALSE otherwise.
|
|
//
|
|
// Created 03/26/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
static
|
|
BOOL
|
|
CreduiConvertUiInfoToWide(
|
|
CREDUI_INFOA *uiInfoA,
|
|
CREDUI_INFOW *uiInfoW
|
|
)
|
|
{
|
|
uiInfoW->cbSize = uiInfoA->cbSize;
|
|
uiInfoW->hwndParent = uiInfoA->hwndParent;
|
|
uiInfoW->pszMessageText = NULL;
|
|
uiInfoW->pszCaptionText = NULL;
|
|
uiInfoW->hbmBanner = uiInfoA->hbmBanner;
|
|
|
|
if (uiInfoA->pszMessageText != NULL)
|
|
{
|
|
uiInfoW->pszMessageText =
|
|
new WCHAR[lstrlenA(uiInfoA->pszMessageText) + 1];
|
|
|
|
if (uiInfoW->pszMessageText == NULL)
|
|
{
|
|
goto ErrorExit;
|
|
}
|
|
|
|
if (MultiByteToWideChar(
|
|
CP_ACP, 0, uiInfoA->pszMessageText, -1,
|
|
const_cast<WCHAR *>(uiInfoW->pszMessageText),
|
|
CREDUI_MAX_MESSAGE_LENGTH + 1) == 0)
|
|
{
|
|
goto ErrorExit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
uiInfoW->pszMessageText = NULL;
|
|
}
|
|
|
|
if (uiInfoA->pszCaptionText != NULL)
|
|
{
|
|
uiInfoW->pszCaptionText =
|
|
new WCHAR[lstrlenA(uiInfoA->pszCaptionText) + 1];
|
|
|
|
if (uiInfoW->pszCaptionText == NULL)
|
|
{
|
|
goto ErrorExit;
|
|
}
|
|
|
|
if (MultiByteToWideChar(
|
|
CP_ACP, 0, uiInfoA->pszCaptionText, -1,
|
|
const_cast<WCHAR *>(uiInfoW->pszCaptionText),
|
|
CREDUI_MAX_CAPTION_LENGTH + 1) == 0)
|
|
{
|
|
goto ErrorExit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
uiInfoW->pszCaptionText = NULL;
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
ErrorExit:
|
|
|
|
if (uiInfoW->pszCaptionText != NULL)
|
|
{
|
|
delete [] const_cast<WCHAR *>(uiInfoW->pszCaptionText);
|
|
uiInfoW->pszCaptionText = NULL;
|
|
}
|
|
|
|
if (uiInfoW->pszMessageText != NULL)
|
|
{
|
|
delete [] const_cast<WCHAR *>(uiInfoW->pszMessageText);
|
|
uiInfoW->pszMessageText = NULL;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// CredUIPromptForCredentials
|
|
//
|
|
// Presents a user interface to get credentials from an application.
|
|
//
|
|
// CredUIPromptForCredentialsW for wide
|
|
// CredUIPromptForCredentialsA for ANSI
|
|
//
|
|
// Arguments:
|
|
// uiInfo (in,optional)
|
|
// targetName (in) - if specified, securityContext must be NULL
|
|
// securityContext (in) - if specified, targetName must be NULL
|
|
// error (in) - the authentication error
|
|
// userName (in,out)
|
|
// userNameBufferSize (in) - maximum length of userName
|
|
// password (in,out)
|
|
// passwordBufferSize (in) - maximum length of password
|
|
// save (in/out) - TRUE if save check box was checked
|
|
// flags (in)
|
|
//
|
|
// Returns:
|
|
// ERROR_SUCCESS
|
|
// ERROR_CANCELLED
|
|
// ERROR_NO_SUCH_LOGON_SESSION - if credential manager cannot be used
|
|
// ERROR_GEN_FAILURE
|
|
// ERROR_INVALID_FLAGS
|
|
// ERROR_INVALID_PARAMETER
|
|
// ERROR_OUTOFMEMORY
|
|
//
|
|
// Created 10/17/2000 johnhaw
|
|
|
|
DWORD
|
|
CredUIPromptForCredentialsWorker(
|
|
IN BOOL doingCommandLine,
|
|
CREDUI_INFOW *uiInfo,
|
|
CONST WCHAR *targetName,
|
|
CtxtHandle *securityContext,
|
|
DWORD authError,
|
|
PWSTR pszUserName,
|
|
ULONG ulUserNameBufferSize,
|
|
PWSTR pszPassword,
|
|
ULONG ulPasswordBufferSize,
|
|
BOOL *save,
|
|
DWORD flags
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine implements the GUI and command line prompt for credentials.
|
|
|
|
Arguments:
|
|
|
|
DoingCommandLine - TRUE if prompting is to be done via the command line
|
|
FALSE if prompting is to be done via GUI
|
|
|
|
... - Other parameters are the same a CredUIPromptForCredentials API
|
|
|
|
Return Values:
|
|
|
|
Same as CredUIPromptForCredentials.
|
|
|
|
--*/
|
|
{
|
|
ULONG CertFlags;
|
|
ULONG CredCategory;
|
|
ULONG PersistFlags;
|
|
|
|
CreduiDebugLog("CUIPFCWorker: Flags: %x, Target: %S doingCommandLine: %i\n", flags, targetName, doingCommandLine);
|
|
|
|
if ((NULL == pszUserName) || (NULL == pszPassword))
|
|
{
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (!CreduiApiInit())
|
|
{
|
|
return ERROR_GEN_FAILURE;
|
|
}
|
|
|
|
// Validate arguments:
|
|
if ((flags & ~CREDUI_FLAGS_PROMPT_VALID) != 0)
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: flags not valid %lx.\n", flags );
|
|
return ERROR_INVALID_FLAGS;
|
|
}
|
|
|
|
//
|
|
// Ensure there is is only one bit defining cert support
|
|
//
|
|
CertFlags = flags & (CREDUI_FLAGS_REQUIRE_SMARTCARD|CREDUI_FLAGS_REQUIRE_CERTIFICATE|CREDUI_FLAGS_EXCLUDE_CERTIFICATES);
|
|
|
|
if ( CertFlags != 0 && !JUST_ONE_BIT(CertFlags) ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: require smartcard, require certificate, and exclude certificates are mutually exclusive %lx.\n", flags );
|
|
return ERROR_INVALID_FLAGS;
|
|
}
|
|
|
|
//
|
|
// For the command line version,
|
|
// limit cert support further.
|
|
//
|
|
|
|
if ( doingCommandLine ) {
|
|
if ( CertFlags == 0 ||
|
|
(CertFlags & CREDUI_FLAGS_REQUIRE_CERTIFICATE) != 0 ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: need either require smartcard or exclude certificates for command line %lx.\n", flags );
|
|
return ERROR_INVALID_FLAGS;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Ensure there is only one bit defining the credential category
|
|
|
|
CredCategory = flags & (CREDUI_FLAGS_GENERIC_CREDENTIALS|CREDUI_FLAGS_USERNAME_TARGET_CREDENTIALS);
|
|
|
|
if ( CredCategory != 0 && !JUST_ONE_BIT(CredCategory) ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: generic creds and username target are mutually exclusive %lx.\n", flags );
|
|
return ERROR_INVALID_FLAGS;
|
|
}
|
|
|
|
//
|
|
// Ensure there is only one bit set saying whether the cred is to persist or not
|
|
//
|
|
|
|
PersistFlags = flags & (CREDUI_FLAGS_DO_NOT_PERSIST|CREDUI_FLAGS_PERSIST);
|
|
|
|
if ( PersistFlags != 0 && !JUST_ONE_BIT(PersistFlags) ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: DoNotPersist and Persist are mutually exclusive %lx.\n", flags );
|
|
return ERROR_INVALID_FLAGS;
|
|
}
|
|
|
|
//
|
|
// Ensure AlwaysShowUi is only specified for generic credentials
|
|
//
|
|
|
|
if ( flags & CREDUI_FLAGS_ALWAYS_SHOW_UI ) {
|
|
if ( (flags & CREDUI_FLAGS_GENERIC_CREDENTIALS) == 0) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: AlwaysShowUi is only supported for generic credentials %lx.\n", flags );
|
|
return ERROR_INVALID_FLAGS;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Don't support a half-implemented feature
|
|
//
|
|
|
|
if ( securityContext != NULL ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: securityContext must be null.\n" );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the passed in UI info
|
|
//
|
|
|
|
if (!CreduiValidateUiInfoW(uiInfo))
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: UI info is invalid.\n" );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Ensure there are strings defined for the caption
|
|
//
|
|
|
|
if (flags & CREDUI_FLAGS_DO_NOT_PERSIST)
|
|
{
|
|
if ((targetName == NULL) &&
|
|
((uiInfo == NULL) ||
|
|
(uiInfo->pszMessageText == NULL) ||
|
|
(uiInfo->pszCaptionText == NULL)))
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: DoNotPersist and target data empty.\n" );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
}
|
|
else if (targetName != NULL)
|
|
{
|
|
if ((securityContext != NULL) ||
|
|
(targetName[0] == L'\0') ||
|
|
(lstrlen(targetName) > CREDUI_MAX_DOMAIN_TARGET_LENGTH))
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: target name bad %ws.\n", targetName );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
else if (securityContext == NULL)
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: no target data.\n" );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Ensure the caller supplied the default value for the save check box
|
|
//
|
|
if (flags & CREDUI_FLAGS_SHOW_SAVE_CHECK_BOX)
|
|
{
|
|
if (save == NULL)
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: ShowSaveCheckbox and save is NULL.\n" );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Ensure the user supplied a username if they set CREDUI_FLAGS_KEEP_USERNAME
|
|
//
|
|
if ( flags & CREDUI_FLAGS_KEEP_USERNAME )
|
|
{
|
|
if ( pszUserName == NULL )
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: CREDUI_FLAGS_KEEP_USERNAME and pszUserName is NULL.\n" );
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
}
|
|
|
|
// Use the stack for user name and password:
|
|
|
|
WCHAR userName[CREDUI_MAX_USERNAME_LENGTH + 1];
|
|
WCHAR password[CREDUI_MAX_PASSWORD_LENGTH + 1];
|
|
|
|
ZeroMemory(userName, sizeof(userName));
|
|
ZeroMemory(password, sizeof(password));
|
|
|
|
if ( pszUserName != NULL && wcslen(pszUserName) > 0 )
|
|
{
|
|
wcscpy ( userName, pszUserName );
|
|
}
|
|
|
|
if ( pszPassword != NULL && wcslen(pszPassword) > 0)
|
|
{
|
|
wcscpy ( password, pszPassword );
|
|
}
|
|
|
|
// Do the password dialog box:
|
|
//
|
|
// Delay actually writing the credential to cred man if we're returning
|
|
// the credential to the caller.
|
|
// Otherwise, the CredWrite is just harvesting credentials for the next caller.
|
|
// So delay the CredWrite until this caller confirms the validity.
|
|
//
|
|
|
|
|
|
DWORD result = ERROR_OUTOFMEMORY;
|
|
|
|
CreduiPasswordDialog* pDlg = new CreduiPasswordDialog(
|
|
doingCommandLine,
|
|
(pszUserName != NULL && pszPassword != NULL ),
|
|
CredCategory,
|
|
uiInfo,
|
|
targetName,
|
|
userName,
|
|
sizeof(userName)/sizeof(WCHAR)-sizeof(WCHAR), // Pass MaxChars instead of buffer size
|
|
password,
|
|
sizeof(password)/sizeof(WCHAR)-sizeof(WCHAR), // Pass MaxChars instead of buffer size
|
|
save,
|
|
flags,
|
|
(flags & CREDUI_FLAGS_GENERIC_CREDENTIALS) ? NULL : securityContext,
|
|
authError,
|
|
&result);
|
|
|
|
if ( pDlg != NULL )
|
|
{
|
|
delete pDlg;
|
|
pDlg = NULL;
|
|
}
|
|
else
|
|
{
|
|
// couldn't create dialog, return.
|
|
result = ERROR_OUTOFMEMORY;
|
|
goto Cleanup;
|
|
}
|
|
|
|
// copy outbound username
|
|
if ( pszUserName != NULL )
|
|
{
|
|
if (ulUserNameBufferSize > wcslen ( userName ) )
|
|
{
|
|
wcscpy ( pszUserName, userName );
|
|
}
|
|
else
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: type username is too long.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
goto Cleanup;
|
|
}
|
|
}
|
|
|
|
if ( pszPassword != NULL )
|
|
{
|
|
if (ulPasswordBufferSize > wcslen ( password ) )
|
|
{
|
|
wcscpy ( pszPassword, password );
|
|
}
|
|
else
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: type password is too long.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
goto Cleanup;
|
|
}
|
|
}
|
|
|
|
|
|
Cleanup:
|
|
ZeroMemory(password, sizeof(password) );
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
//=============================================================================
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIPromptForCredentialsW(
|
|
CREDUI_INFOW *uiInfo,
|
|
CONST WCHAR *targetName,
|
|
CtxtHandle *securityContext,
|
|
DWORD authError,
|
|
PWSTR pszUserName,
|
|
ULONG ulUserNameBufferSize,
|
|
PWSTR pszPassword,
|
|
ULONG ulPasswordBufferSize,
|
|
BOOL *save,
|
|
DWORD flags
|
|
)
|
|
{
|
|
|
|
//
|
|
// Call the common code indicating this is the GUI interface
|
|
//
|
|
|
|
|
|
return CredUIPromptForCredentialsWorker(
|
|
FALSE, // GUI version
|
|
uiInfo,
|
|
targetName,
|
|
securityContext,
|
|
authError,
|
|
pszUserName,
|
|
ulUserNameBufferSize,
|
|
pszPassword,
|
|
ulPasswordBufferSize,
|
|
save,
|
|
flags );
|
|
|
|
}
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIPromptForCredentialsA(
|
|
CREDUI_INFOA *uiInfo,
|
|
CONST CHAR *targetName,
|
|
CtxtHandle *securityContext,
|
|
DWORD authError,
|
|
PSTR pszUserName,
|
|
ULONG ulUserNameBufferSize,
|
|
PSTR pszPassword,
|
|
ULONG ulPasswordBufferSize,
|
|
BOOL *save,
|
|
DWORD flags
|
|
)
|
|
{
|
|
DWORD result;
|
|
WCHAR targetNameW[CREDUI_MAX_DOMAIN_TARGET_LENGTH + 1];
|
|
|
|
WCHAR userName[CREDUI_MAX_USERNAME_LENGTH + 1];
|
|
WCHAR password[CREDUI_MAX_PASSWORD_LENGTH + 1];
|
|
|
|
CREDUI_INFOW uiInfoW = {0};
|
|
|
|
if ((NULL == pszUserName) || (NULL == pszPassword))
|
|
{
|
|
result = ERROR_INVALID_PARAMETER;
|
|
goto Exit;
|
|
}
|
|
|
|
// Convert in paramters to Unicode:
|
|
// If a CREDUI_INFO structure was passed, convert it to wide now:
|
|
|
|
if (uiInfo != NULL) {
|
|
if (!CreduiConvertUiInfoToWide(uiInfo, &uiInfoW)) {
|
|
result = ERROR_OUTOFMEMORY;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
|
|
// If a target name was passed, convert it to wide now:
|
|
|
|
if (targetName != NULL)
|
|
{
|
|
if (MultiByteToWideChar(
|
|
CP_ACP, 0, targetName, -1,
|
|
targetNameW,
|
|
CREDUI_MAX_DOMAIN_TARGET_LENGTH + 1) == 0)
|
|
{
|
|
result = ERROR_OUTOFMEMORY;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
|
|
userName[0] ='\0';
|
|
password[0] = '\0';
|
|
|
|
if (lstrlenA(pszUserName) > 0 )
|
|
{
|
|
if ( !MultiByteToWideChar( CP_ACP, 0, pszUserName, -1,
|
|
userName, sizeof(userName)/sizeof(WCHAR) ) ) {
|
|
|
|
result = ERROR_OUTOFMEMORY;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
if (lstrlenA(pszPassword) > 0)
|
|
{
|
|
if ( !MultiByteToWideChar( CP_ACP, 0, pszPassword, -1,
|
|
password, sizeof(password)/sizeof(WCHAR) ) ) {
|
|
|
|
result = ERROR_OUTOFMEMORY;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Call the common code indicating this is the GUI interface
|
|
//
|
|
result = CredUIPromptForCredentialsWorker(
|
|
FALSE, // GUI version
|
|
(uiInfo != NULL) ? &uiInfoW : NULL,
|
|
(targetName != NULL) ? targetNameW : NULL,
|
|
securityContext,
|
|
authError,
|
|
userName,
|
|
ulUserNameBufferSize,
|
|
password,
|
|
ulPasswordBufferSize,
|
|
save,
|
|
flags );
|
|
|
|
|
|
if ( result == NO_ERROR && pszUserName != NULL )
|
|
{
|
|
if ( wcslen(userName) < ulUserNameBufferSize )
|
|
{
|
|
if (!WideCharToMultiByte(CP_ACP, 0, userName, -1, pszUserName,
|
|
ulUserNameBufferSize, NULL, NULL) ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: type username cannot be converted to ANSI.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: type username is too long.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
if ( result == NO_ERROR && pszPassword != NULL )
|
|
{
|
|
if ( wcslen ( password ) < ulPasswordBufferSize )
|
|
{
|
|
if (!WideCharToMultiByte(CP_ACP, 0, password, -1, pszPassword,
|
|
ulPasswordBufferSize, NULL, NULL) ) {
|
|
CreduiDebugLog("CreduiPromptForCredentials: type password cannot be converted to ANSI.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: type password is too long.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
Exit:
|
|
ZeroMemory(password, sizeof(password) );
|
|
|
|
// Free the CREDUI_INFO allocations:
|
|
|
|
if (uiInfo != NULL)
|
|
{
|
|
if (uiInfoW.pszMessageText != NULL)
|
|
{
|
|
delete [] const_cast<WCHAR *>(uiInfoW.pszMessageText);
|
|
}
|
|
|
|
if (uiInfoW.pszCaptionText != NULL)
|
|
{
|
|
delete [] const_cast<WCHAR *>(uiInfoW.pszCaptionText);
|
|
}
|
|
}
|
|
|
|
return result;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD
|
|
WINAPI
|
|
CredUIParseUserNameW(
|
|
CONST WCHAR *UserName,
|
|
WCHAR *user,
|
|
ULONG userBufferSize,
|
|
WCHAR *domain,
|
|
ULONG domainBufferSize
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
CredUIParseUserName is used to breakup a username returned by the cred management APIs
|
|
into a username and domain part that can be used as input to other system APIs that
|
|
require the full broken-up user credential.
|
|
|
|
The following formats are supported:
|
|
|
|
@@<MarshalledCredentialReference>: This is a marshaled credential reference as
|
|
as defined by the CredIsMarshaledCredential API. Such a credential is returned
|
|
in the 'user' parameter. The 'domain' parameter is set to an empty string.
|
|
|
|
|
|
<DomainName>\<UserName>: The <UserName> is returned in the 'user' parameter and
|
|
the <DomainName> is returned in the 'domain' parameter. The name is considered
|
|
to have the this syntax if the 'UserName' string contains a \.
|
|
|
|
<UserName>@<DnsDomainName>: The entire string is returned in the 'user' parameter.
|
|
The 'domain' parameter is set to an empty string.
|
|
For this syntax, the last @ in the string is used since <UserName> may
|
|
contain an @ but <DnsDomainName> cannot.
|
|
|
|
<UserName>: The <UserName> is returned in the 'user' parameter.
|
|
The 'domain' parameter is set to an empty string.
|
|
|
|
|
|
Arguments:
|
|
|
|
UserName - The user name to be parsed.
|
|
|
|
user - Specifies a buffer to copy the user name portion of the parsed string to.
|
|
|
|
userBufferSize - Specifies the size of the 'user' array in characters.
|
|
The caller can ensure the passed in array is large enough by using an array
|
|
that is CRED_MAX_USERNAME_LENGTH+1 characters long or by passing in an array that
|
|
is wcslen(UserName)+1 characters long.
|
|
|
|
domain - Specifies a buffer to copy the domain name portion of the parsed string to.
|
|
|
|
domainBufferSize - Specifies the size of the 'domain' array in characters.
|
|
The caller can ensure the passed in array is large enough by using an array
|
|
that is CRED_MAX_USERNAME_LENGTH+1 characters long or by passing in an array that
|
|
is wcslen(UserName)+1 characters long.
|
|
|
|
Return Values:
|
|
|
|
The following status codes may be returned:
|
|
|
|
ERROR_INVALID_ACCOUNT_NAME - The user name is not valid.
|
|
|
|
ERROR_INVALID_PARAMETER - One of the parameters is invalid.
|
|
|
|
ERROR_INSUFFICIENT_BUFFER - One of the buffers is too small.
|
|
|
|
|
|
--*/
|
|
{
|
|
DWORD Status;
|
|
CREDUI_USERNAME_TYPE UsernameType;
|
|
|
|
|
|
//
|
|
// Use the low level routine to do the work
|
|
//
|
|
|
|
Status = CredUIParseUserNameWithType(
|
|
UserName,
|
|
user,
|
|
userBufferSize,
|
|
domain,
|
|
domainBufferSize,
|
|
&UsernameType );
|
|
|
|
if ( Status != NO_ERROR ) {
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// Avoid relative user names (for backward compatibility)
|
|
//
|
|
|
|
if ( UsernameType == CreduiRelativeUsername ) {
|
|
user[0] = L'\0';
|
|
domain[0] = L'\0';
|
|
return ERROR_INVALID_ACCOUNT_NAME;
|
|
}
|
|
|
|
return NO_ERROR;
|
|
|
|
}
|
|
|
|
DWORD
|
|
WINAPI
|
|
CredUIParseUserNameA(
|
|
CONST CHAR *userName,
|
|
CHAR *user,
|
|
ULONG userBufferSize,
|
|
CHAR *domain,
|
|
ULONG domainBufferSize
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Ansi version of CredUIParseUserName.
|
|
|
|
Arguments:
|
|
|
|
Same as wide version except userBufferSize and domainBufferSize are in terms of bytes.
|
|
|
|
Return Values:
|
|
|
|
Same as wide version.
|
|
|
|
--*/
|
|
{
|
|
DWORD Status;
|
|
|
|
WCHAR LocalUserName[CRED_MAX_USERNAME_LENGTH + 1];
|
|
WCHAR RetUserName[CRED_MAX_USERNAME_LENGTH + 1];
|
|
WCHAR RetDomainName[CRED_MAX_USERNAME_LENGTH + 1];
|
|
|
|
|
|
//
|
|
// Convert the passed in username to unicode
|
|
//
|
|
|
|
if ( MultiByteToWideChar( CP_ACP,
|
|
MB_ERR_INVALID_CHARS,
|
|
userName,
|
|
-1,
|
|
LocalUserName,
|
|
CRED_MAX_USERNAME_LENGTH + 1 ) == 0 ) {
|
|
|
|
|
|
Status = GetLastError();
|
|
goto Cleanup;
|
|
}
|
|
|
|
//
|
|
// Call the unicode version of the API
|
|
//
|
|
|
|
Status = CredUIParseUserNameW(
|
|
LocalUserName,
|
|
RetUserName,
|
|
CRED_MAX_USERNAME_LENGTH + 1,
|
|
RetDomainName,
|
|
CRED_MAX_USERNAME_LENGTH + 1 );
|
|
|
|
if ( Status != NO_ERROR ) {
|
|
goto Cleanup;
|
|
}
|
|
|
|
//
|
|
// Convert the answers back to ANSI
|
|
//
|
|
|
|
if ( WideCharToMultiByte( CP_ACP,
|
|
0,
|
|
RetUserName,
|
|
-1,
|
|
user,
|
|
userBufferSize,
|
|
NULL,
|
|
NULL ) == 0 ) {
|
|
|
|
Status = GetLastError();
|
|
goto Cleanup;
|
|
}
|
|
|
|
if ( WideCharToMultiByte( CP_ACP,
|
|
0,
|
|
RetDomainName,
|
|
-1,
|
|
domain,
|
|
domainBufferSize,
|
|
NULL,
|
|
NULL ) == 0 ) {
|
|
|
|
Status = GetLastError();
|
|
goto Cleanup;
|
|
}
|
|
|
|
|
|
|
|
Status = NO_ERROR;
|
|
|
|
Cleanup:
|
|
if ( Status != NO_ERROR ) {
|
|
user[0] = L'\0';
|
|
domain[0] = L'\0';
|
|
}
|
|
return Status;
|
|
}
|
|
|
|
|
|
|
|
////////////////////////
|
|
// Command Line functions
|
|
|
|
|
|
//=============================================================================
|
|
// CredUIInitControls
|
|
//
|
|
// Returns TRUE on success or FALSE otherwise.
|
|
//
|
|
// Created 06/21/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
extern "C"
|
|
BOOL
|
|
WINAPI
|
|
CredUIInitControls()
|
|
{
|
|
if (CreduiApiInit())
|
|
{
|
|
// Register the Credential controls:
|
|
|
|
if (CreduiCredentialControl::Register(CreduiInstance))
|
|
{
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//=============================================================================
|
|
// DllMain
|
|
//
|
|
// The DLL entry function. Since we are linked to the CRT, we must define a
|
|
// function with this name, which will be called from _DllMainCRTStartup.
|
|
//
|
|
// Arguments:
|
|
// instance (in)
|
|
// reason (in)
|
|
// (unused)
|
|
//
|
|
// Returns TRUE on success, or FALSE otherwise.
|
|
//
|
|
// Created 02/29/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
extern "C"
|
|
BOOL
|
|
WINAPI
|
|
DllMain(
|
|
HINSTANCE instance,
|
|
DWORD reason,
|
|
VOID *
|
|
)
|
|
{
|
|
BOOL success = TRUE;
|
|
|
|
switch (reason)
|
|
{
|
|
case DLL_PROCESS_ATTACH:
|
|
DisableThreadLibraryCalls(instance);
|
|
CreduiInstance = instance;
|
|
|
|
// Create a global event which will be set when first-time
|
|
// initialization is completed by the first API call:
|
|
|
|
CreduiInitEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
|
|
|
|
if (CreduiInitEvent == NULL)
|
|
{
|
|
success = FALSE;
|
|
}
|
|
|
|
SHFusionInitialize(NULL);
|
|
// Register the Credential controls:
|
|
|
|
if (!CreduiCredentialControl::Register(instance))
|
|
{
|
|
CloseHandle(CreduiInitEvent);
|
|
CreduiInitEvent = NULL;
|
|
|
|
success = FALSE;
|
|
}
|
|
|
|
// InitializeCredMgr();
|
|
|
|
//
|
|
// Initialize the confirmation list
|
|
//
|
|
|
|
if ( !InitConfirmationList() ) {
|
|
|
|
CreduiCredentialControl::Unregister();
|
|
CloseHandle(CreduiInitEvent);
|
|
CreduiInitEvent = NULL;
|
|
|
|
success = FALSE;
|
|
}
|
|
|
|
break;
|
|
|
|
case DLL_PROCESS_DETACH:
|
|
|
|
CleanUpConfirmationList();
|
|
|
|
if (CreduiFirstTime == FALSE)
|
|
{
|
|
CreduiIconParentWindow::Unregister();
|
|
}
|
|
|
|
// Unregister the Credential controls:
|
|
|
|
CreduiCredentialControl::Unregister();
|
|
|
|
SHFusionUninitialize();
|
|
// Make sure to free the global initialization event:
|
|
|
|
if (CreduiInitEvent != NULL)
|
|
{
|
|
CloseHandle(CreduiInitEvent);
|
|
}
|
|
|
|
UninitializeCredMgr();
|
|
|
|
break;
|
|
};
|
|
|
|
return success;
|
|
}
|
|
|
|
//=============================================================================
|
|
// DllCanUnloadNow (COM)
|
|
//
|
|
// Created 04/03/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
STDAPI
|
|
DllCanUnloadNow()
|
|
{
|
|
return (CreduiComReferenceCount == 0) ? S_OK : S_FALSE;
|
|
}
|
|
|
|
//=============================================================================
|
|
// DllGetClassObject (COM)
|
|
//
|
|
// Created 04/03/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
STDAPI
|
|
DllGetClassObject(
|
|
CONST CLSID &classId,
|
|
CONST IID &interfaceId,
|
|
VOID **outInterface
|
|
)
|
|
{
|
|
if (classId != CreduiStringArrayClassId)
|
|
{
|
|
return CLASS_E_CLASSNOTAVAILABLE;
|
|
}
|
|
|
|
CreduiStringArrayFactory *factory = new CreduiStringArrayFactory;
|
|
|
|
if (factory == NULL)
|
|
{
|
|
return E_OUTOFMEMORY;
|
|
}
|
|
|
|
HRESULT result = factory->QueryInterface(interfaceId, outInterface);
|
|
|
|
factory->Release();
|
|
|
|
// Release the string array object in any case, because of the
|
|
// QueryInterface succeeded, it already took another reference count on
|
|
// the object:
|
|
|
|
return result;
|
|
}
|
|
|
|
//=============================================================================
|
|
// DllRegisterServer (COM)
|
|
//
|
|
// Created 04/03/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
STDAPI
|
|
DllRegisterServer()
|
|
{
|
|
HRESULT result = E_FAIL;
|
|
|
|
WCHAR fileName[MAX_PATH + 1];
|
|
|
|
if (GetModuleFileName(CreduiInstance, fileName, MAX_PATH))
|
|
{
|
|
HKEY regKey;
|
|
|
|
if (RegCreateKeyEx(
|
|
HKEY_CLASSES_ROOT,
|
|
L"CLSID\\" CREDUI_STRING_ARRAY_CLASS_STRING
|
|
L"\\InProcServer32",
|
|
0,
|
|
NULL,
|
|
REG_OPTION_NON_VOLATILE,
|
|
KEY_SET_VALUE,
|
|
NULL,
|
|
®Key,
|
|
NULL) == ERROR_SUCCESS)
|
|
{
|
|
if (RegSetValueEx(
|
|
regKey,
|
|
NULL,
|
|
0,
|
|
REG_SZ,
|
|
reinterpret_cast<CONST BYTE *>(fileName),
|
|
(lstrlen(fileName) + 1) * 2) == ERROR_SUCCESS)
|
|
{
|
|
if (RegSetValueEx(
|
|
regKey,
|
|
L"ThreadingModel",
|
|
0,
|
|
REG_SZ,
|
|
reinterpret_cast<CONST BYTE *>(L"Apartment"),
|
|
18) == ERROR_SUCCESS)
|
|
{
|
|
result = S_OK;
|
|
}
|
|
}
|
|
|
|
RegCloseKey(regKey);
|
|
}
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
//=============================================================================
|
|
// DllUnregisterServer (COM)
|
|
//
|
|
// Created 04/03/2000 johnstep (John Stephens)
|
|
//=============================================================================
|
|
|
|
STDAPI
|
|
DllUnregisterServer()
|
|
{
|
|
HRESULT result = S_OK;
|
|
LONG error;
|
|
|
|
// Delete our InProcServer32 key:
|
|
|
|
error =
|
|
RegDeleteKey(
|
|
HKEY_CLASSES_ROOT,
|
|
L"CLSID\\" CREDUI_STRING_ARRAY_CLASS_STRING L"\\InProcServer32");
|
|
|
|
if ((error != ERROR_SUCCESS) &&
|
|
(error != ERROR_FILE_NOT_FOUND))
|
|
{
|
|
result = E_FAIL;
|
|
}
|
|
|
|
// Delete our class ID key:
|
|
|
|
error =
|
|
RegDeleteKey(
|
|
HKEY_CLASSES_ROOT,
|
|
L"CLSID\\" CREDUI_STRING_ARRAY_CLASS_STRING);
|
|
|
|
if ((error != ERROR_SUCCESS) &&
|
|
(error != ERROR_FILE_NOT_FOUND))
|
|
{
|
|
result = E_FAIL;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIConfirmCredentialsW(
|
|
PCWSTR pszTargetName,
|
|
BOOL bConfirm
|
|
)
|
|
{
|
|
|
|
return ConfirmCred ( pszTargetName, bConfirm, TRUE );
|
|
|
|
}
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIConfirmCredentialsA(
|
|
PCSTR pszTargetName,
|
|
BOOL bConfirm
|
|
)
|
|
{
|
|
WCHAR targetNameW[CRED_MAX_STRING_LENGTH+1+CRED_MAX_STRING_LENGTH];
|
|
|
|
// If a target name was passed, convert it to wide now:
|
|
|
|
if (pszTargetName != NULL)
|
|
{
|
|
if (MultiByteToWideChar(
|
|
CP_ACP, 0, pszTargetName, -1,
|
|
targetNameW,
|
|
CRED_MAX_STRING_LENGTH+1+CRED_MAX_STRING_LENGTH) == 0)
|
|
{
|
|
return GetLastError();
|
|
}
|
|
}
|
|
|
|
|
|
return CredUIConfirmCredentialsW ( targetNameW, bConfirm );
|
|
|
|
|
|
}
|
|
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUICmdLinePromptForCredentialsW(
|
|
PCWSTR targetName,
|
|
PCtxtHandle securityContext,
|
|
DWORD dwAuthError,
|
|
PWSTR UserName,
|
|
ULONG ulUserBufferSize,
|
|
PWSTR pszPassword,
|
|
ULONG ulPasswordBufferSize,
|
|
PBOOL pfSave,
|
|
DWORD flags
|
|
)
|
|
{
|
|
|
|
//
|
|
// Call the common code indicating this is the command line interface
|
|
//
|
|
|
|
return CredUIPromptForCredentialsWorker(
|
|
TRUE, // Command line version
|
|
NULL, // Command line version has no uiInfo,
|
|
targetName,
|
|
securityContext,
|
|
dwAuthError,
|
|
UserName,
|
|
ulUserBufferSize,
|
|
pszPassword,
|
|
ulPasswordBufferSize,
|
|
pfSave,
|
|
flags );
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUICmdLinePromptForCredentialsA(
|
|
PCSTR targetName,
|
|
PCtxtHandle pContext,
|
|
DWORD dwAuthError,
|
|
PSTR UserName,
|
|
ULONG ulUserBufferSize,
|
|
PSTR pszPassword,
|
|
ULONG ulPasswordBufferSize,
|
|
PBOOL pfSave,
|
|
DWORD flags
|
|
)
|
|
{
|
|
DWORD result = ERROR_GEN_FAILURE;
|
|
INT targetNameLength = lstrlenA(targetName);
|
|
WCHAR *targetNameW = NULL;
|
|
|
|
if (!CreduiApiInit())
|
|
{
|
|
return ERROR_GEN_FAILURE;
|
|
}
|
|
|
|
// convert to unicode
|
|
|
|
|
|
WCHAR userNameW[CREDUI_MAX_USERNAME_LENGTH + 1];
|
|
WCHAR *pUserNameW;
|
|
|
|
if ( UserName != NULL )
|
|
{
|
|
if (MultiByteToWideChar(CP_ACP, 0, UserName, -1,
|
|
userNameW, sizeof(userNameW)/sizeof(WCHAR)) == 0)
|
|
{
|
|
result = GetLastError();
|
|
goto Exit;
|
|
}
|
|
pUserNameW = userNameW;
|
|
}
|
|
else
|
|
{
|
|
pUserNameW = NULL;
|
|
}
|
|
|
|
|
|
WCHAR passwordW[CREDUI_MAX_PASSWORD_LENGTH + 1];
|
|
WCHAR *ppasswordW;
|
|
|
|
if ( pszPassword != NULL )
|
|
{
|
|
if (MultiByteToWideChar(CP_ACP, 0, pszPassword, -1,
|
|
passwordW, sizeof(passwordW)/sizeof(WCHAR)) == 0)
|
|
{
|
|
result = GetLastError();
|
|
goto Exit;
|
|
}
|
|
ppasswordW = passwordW;
|
|
}
|
|
else
|
|
{
|
|
ppasswordW = NULL;
|
|
}
|
|
|
|
|
|
// Allocate the target name memory because it can be up to 32 KB:
|
|
|
|
|
|
|
|
if (targetName != NULL)
|
|
{
|
|
targetNameW = new WCHAR[targetNameLength + 1];
|
|
|
|
if (targetNameW != NULL)
|
|
{
|
|
if (MultiByteToWideChar(CP_ACP, 0, targetName, -1,
|
|
targetNameW, sizeof(targetNameW)/sizeof(WCHAR)) == 0)
|
|
{
|
|
result = GetLastError();
|
|
goto Exit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
result = ERROR_NOT_ENOUGH_MEMORY;
|
|
goto Exit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
targetNameW = NULL;
|
|
}
|
|
|
|
|
|
result = CredUICmdLinePromptForCredentialsW ( targetNameW,
|
|
pContext,
|
|
dwAuthError,
|
|
userNameW,
|
|
ulUserBufferSize,
|
|
passwordW,
|
|
ulPasswordBufferSize,
|
|
pfSave,
|
|
flags );
|
|
|
|
|
|
if ( UserName != NULL )
|
|
{
|
|
if ( wcslen(userNameW) < ulUserBufferSize )
|
|
{
|
|
if (!WideCharToMultiByte(CP_ACP, 0, userNameW, -1, UserName,
|
|
ulUserBufferSize, NULL, NULL) ) {
|
|
result = GetLastError();
|
|
goto Exit;
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: typed username is too long.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
if ( pszPassword != NULL )
|
|
{
|
|
if ( wcslen ( passwordW ) < ulPasswordBufferSize )
|
|
{
|
|
if (!WideCharToMultiByte(CP_ACP, 0, passwordW, -1, pszPassword,
|
|
ulPasswordBufferSize, NULL, NULL)) {
|
|
result = GetLastError();
|
|
goto Exit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
CreduiDebugLog("CreduiPromptForCredentials: typed password is too long.\n" );
|
|
result = ERROR_INVALID_PARAMETER;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
ZeroMemory(passwordW, sizeof(passwordW) );
|
|
|
|
// Free the target name memory:
|
|
|
|
if (targetNameW != NULL)
|
|
{
|
|
delete [] targetNameW;
|
|
}
|
|
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
|
|
// call this api to store a single-sign-on credential
|
|
// retruns ERROR_SUCCESS if success
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIStoreSSOCredW (
|
|
PCWSTR pszRealm,
|
|
PCWSTR pszUsername,
|
|
PCWSTR pszPassword,
|
|
BOOL bPersist
|
|
)
|
|
{
|
|
|
|
DWORD dwResult = ERROR_GEN_FAILURE;
|
|
|
|
if ( pszUsername == NULL || pszPassword == NULL )
|
|
return dwResult;
|
|
|
|
WCHAR szTargetName[CREDUI_MAX_DOMAIN_TARGET_LENGTH];
|
|
PVOID password = (PVOID)pszPassword;
|
|
|
|
// temporarily cache them locally
|
|
wcsncpy ( gszSSOUserName, pszUsername, CREDUI_MAX_USERNAME_LENGTH );
|
|
wcsncpy ( gszSSOPassword, pszPassword, CREDUI_MAX_PASSWORD_LENGTH );
|
|
|
|
gbStoredSSOCreds = TRUE;
|
|
|
|
if ( gbWaitingForSSOCreds || !bPersist)
|
|
{
|
|
dwResult = ERROR_SUCCESS;
|
|
|
|
}
|
|
else
|
|
{
|
|
// otherwise store them in credmgr
|
|
|
|
if ( pszRealm )
|
|
{
|
|
// validate it's not zero length
|
|
int len = wcslen(pszRealm);
|
|
if ( len == 0 || len > CREDUI_MAX_DOMAIN_TARGET_LENGTH - 3 )
|
|
{
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
wcsncpy ( szTargetName, pszRealm, len+1 );
|
|
|
|
}
|
|
else
|
|
{
|
|
GetDeaultSSORealm(szTargetName, TRUE);
|
|
}
|
|
|
|
|
|
// finalize the target name
|
|
wcscat ( szTargetName, L"\\*" );
|
|
|
|
// encrypt the password
|
|
PVOID pEncryptedPassword;
|
|
DWORD dwESize = wcslen(pszPassword)+1;
|
|
DWORD dwEncrypt = EncryptPassword ( (PWSTR)pszPassword, &pEncryptedPassword, &dwESize );
|
|
if ( dwEncrypt == ERROR_SUCCESS )
|
|
{
|
|
password = pEncryptedPassword;
|
|
}
|
|
|
|
// write it out
|
|
|
|
CREDENTIALW NewCredential;
|
|
|
|
memset ( (void*)&NewCredential, 0, sizeof(CREDENTIALW));
|
|
|
|
DWORD dwFlags = 0;
|
|
|
|
NewCredential.TargetName = szTargetName;
|
|
NewCredential.Type = CRED_TYPE_DOMAIN_VISIBLE_PASSWORD;
|
|
NewCredential.Persist = bPersist ? CRED_PERSIST_ENTERPRISE : CRED_PERSIST_SESSION;
|
|
NewCredential.Flags = 0;
|
|
NewCredential.CredentialBlobSize = dwESize;
|
|
NewCredential.UserName = (LPWSTR)pszUsername;
|
|
NewCredential.CredentialBlob = reinterpret_cast<BYTE *>(password);
|
|
|
|
if ( CredWriteW(&NewCredential, dwFlags))
|
|
{
|
|
dwResult = ERROR_SUCCESS;
|
|
}
|
|
|
|
if ( dwEncrypt == ERROR_SUCCESS )
|
|
{
|
|
LocalFree (pEncryptedPassword);
|
|
}
|
|
|
|
}
|
|
|
|
return dwResult;
|
|
|
|
}
|
|
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIStoreSSOCredA (
|
|
PCSTR pszRealm,
|
|
PCSTR pszUsername,
|
|
PCSTR pszPassword,
|
|
BOOL bPersist
|
|
)
|
|
{
|
|
DWORD dwResult = ERROR_GEN_FAILURE;
|
|
|
|
// convert to unicode
|
|
|
|
WCHAR realmW[CREDUI_MAX_DOMAIN_TARGET_LENGTH];
|
|
WCHAR *prealmW;
|
|
|
|
if ( pszRealm != NULL )
|
|
{
|
|
if (MultiByteToWideChar(CP_ACP, 0, pszRealm, -1,
|
|
realmW, lstrlenA(pszRealm) + 1) == 0)
|
|
{
|
|
goto Exit;
|
|
}
|
|
prealmW = realmW;
|
|
}
|
|
else
|
|
{
|
|
prealmW = NULL;
|
|
}
|
|
|
|
|
|
|
|
WCHAR userNameW[CREDUI_MAX_USERNAME_LENGTH + 1];
|
|
WCHAR *pUserNameW;
|
|
|
|
if ( pszUsername != NULL )
|
|
{
|
|
if (MultiByteToWideChar(CP_ACP, 0, pszUsername, -1,
|
|
userNameW, lstrlenA(pszUsername) + 1) == 0)
|
|
{
|
|
goto Exit;
|
|
}
|
|
pUserNameW = userNameW;
|
|
}
|
|
else
|
|
{
|
|
pUserNameW = NULL;
|
|
}
|
|
|
|
|
|
WCHAR passwordW[CREDUI_MAX_PASSWORD_LENGTH + 1];
|
|
WCHAR *ppasswordW;
|
|
|
|
if ( pszPassword != NULL )
|
|
{
|
|
if (MultiByteToWideChar(CP_ACP, 0, pszPassword, -1,
|
|
passwordW, lstrlenA(pszPassword) + 1) == 0)
|
|
{
|
|
goto Exit;
|
|
}
|
|
ppasswordW = passwordW;
|
|
}
|
|
else
|
|
{
|
|
ppasswordW = NULL;
|
|
}
|
|
|
|
|
|
dwResult = CredUIStoreSSOCredW ( prealmW, pUserNameW, ppasswordW, bPersist );
|
|
|
|
|
|
Exit:
|
|
// clean up passwords in memory
|
|
ZeroMemory(passwordW, CREDUI_MAX_PASSWORD_LENGTH * sizeof (WCHAR) + 1);
|
|
|
|
|
|
return dwResult;
|
|
|
|
}
|
|
|
|
|
|
// call this api to retrieve the username for a single-sign-on credential
|
|
// retruns ERROR_SUCCESS if success, ERROR_NOT_FOUND if none was found
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIReadSSOCredW (
|
|
PCWSTR pszRealm,
|
|
PWSTR* ppszUsername
|
|
)
|
|
{
|
|
|
|
DWORD dwReturn = ERROR_NOT_FOUND;
|
|
WCHAR szTargetName[CREDUI_MAX_DOMAIN_TARGET_LENGTH];
|
|
|
|
if ( pszRealm )
|
|
{
|
|
// validate it's not zero length
|
|
int len = wcslen(pszRealm);
|
|
if ( len == 0 || len > CREDUI_MAX_DOMAIN_TARGET_LENGTH - 3 )
|
|
{
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
wcsncpy ( szTargetName, pszRealm, len+1 );
|
|
|
|
}
|
|
else
|
|
{
|
|
GetDeaultSSORealm(szTargetName, FALSE);
|
|
}
|
|
|
|
if ( wcslen ( szTargetName ) != 0 )
|
|
{
|
|
// finalize the target name
|
|
wcscat ( szTargetName, L"\\*" );
|
|
|
|
PCREDENTIALW pCred;
|
|
DWORD dwFlags = 0;
|
|
|
|
if ( CredReadW ( szTargetName,
|
|
CRED_TYPE_DOMAIN_VISIBLE_PASSWORD,
|
|
dwFlags,
|
|
&pCred ) )
|
|
{
|
|
*ppszUsername = (PWSTR)HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(WCHAR)*(wcslen(pCred->UserName)+1));
|
|
if ( *ppszUsername )
|
|
{
|
|
dwReturn = ERROR_SUCCESS;
|
|
wcscpy ( *ppszUsername, pCred->UserName );
|
|
|
|
}
|
|
|
|
|
|
CredFree ( pCred );
|
|
|
|
}
|
|
}
|
|
|
|
return dwReturn;
|
|
}
|
|
|
|
|
|
|
|
// call this api to retrieve the username for a single-sign-on credential
|
|
// retruns ERROR_SUCCESS if success, ERROR_NOT_FOUND if none was found
|
|
|
|
CREDUIAPI
|
|
DWORD
|
|
WINAPI
|
|
CredUIReadSSOCredA (
|
|
PCSTR pszRealm,
|
|
PSTR* ppszUsername
|
|
)
|
|
{
|
|
|
|
DWORD dwReturn = ERROR_NOT_FOUND;
|
|
WCHAR szTargetName[CREDUI_MAX_DOMAIN_TARGET_LENGTH];
|
|
|
|
PCREDENTIALW pCred;
|
|
DWORD dwFlags = 0;
|
|
|
|
if ( pszRealm )
|
|
{
|
|
// validate it's not zero length
|
|
int len = lstrlenA(pszRealm);
|
|
if ( len == 0 || len > CREDUI_MAX_DOMAIN_TARGET_LENGTH - 3 )
|
|
{
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (MultiByteToWideChar(CP_ACP, 0, pszRealm, -1,
|
|
szTargetName, len + 1) == 0)
|
|
{
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
}
|
|
else
|
|
{
|
|
GetDeaultSSORealm(szTargetName, FALSE);
|
|
}
|
|
|
|
if ( wcslen ( szTargetName ) != 0 )
|
|
{
|
|
|
|
|
|
// finalize the target name
|
|
wcscat ( szTargetName, L"\\*" );
|
|
|
|
|
|
// first call credmgr to set the target info
|
|
if ( CredReadW ( szTargetName,
|
|
CRED_TYPE_DOMAIN_VISIBLE_PASSWORD,
|
|
dwFlags,
|
|
&pCred ) )
|
|
{
|
|
DWORD dwLen = wcslen(pCred->UserName);
|
|
*ppszUsername = (PSTR)HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(CHAR)*(dwLen+1));
|
|
if ( *ppszUsername )
|
|
{
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, pCred->UserName, -1, *ppszUsername,
|
|
dwLen, NULL, NULL);
|
|
|
|
dwReturn = ERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
CredFree ( pCred );
|
|
|
|
}
|
|
}
|
|
|
|
Exit:
|
|
|
|
return dwReturn;
|
|
}
|
|
|