mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1797 lines
44 KiB
1797 lines
44 KiB
//+---------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 1992 - 2000.
|
|
//
|
|
// File: cadssec.cxx
|
|
//
|
|
// Contents: This file contains the support ADsSecurityUtility class
|
|
// implementation and the support routines it requires. The
|
|
// default interface for the ADsSecurityClassUtility class
|
|
// is IADsSecurityUtility.
|
|
//
|
|
// History: 10-11-00 AjayR Created.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
#include "oleds.hxx"
|
|
|
|
//
|
|
// Helper functions.
|
|
//
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: GetServerAndResource - Helper routine.
|
|
//
|
|
// Synopsis: Splits the string into a serverName piece and rest piece.
|
|
// This is used for fileshare paths like \\Computer\share to return
|
|
// \\computer and share. In the case of registry a string like
|
|
// \\Computer\HKLM\Microsoft will be split into \\Computer and
|
|
// HKLM\Microsoft. if there is no computer name specified, then
|
|
// the serverName will be NULL.
|
|
//
|
|
// Arguments: pszName - Name to be split.
|
|
// ppszServer - Return value for server name.
|
|
// ppszResource - Return value for rest of string.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: ppSD and pdwLength on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
GetServerAndResource(
|
|
LPWSTR pszName,
|
|
LPWSTR *ppszServer,
|
|
LPWSTR *ppszResource
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
DWORD dwLength = wcslen(pszName);
|
|
LPWSTR pszTemp = pszName;
|
|
LPWSTR pszServer = NULL;
|
|
LPWSTR pszResource = NULL;
|
|
DWORD dwLen = 0;
|
|
BOOL fNoServer = FALSE;
|
|
|
|
*ppszServer = NULL;
|
|
*ppszResource = NULL;
|
|
|
|
//
|
|
// If we have just 1 \ or no \'s there is no server name.
|
|
//
|
|
if ((dwLength < 2)
|
|
|| (pszName[0] != L'\\')
|
|
|| (pszName[1] != L'\\')
|
|
) {
|
|
fNoServer = TRUE;
|
|
}
|
|
|
|
if (fNoServer) {
|
|
//
|
|
// Name is the entire string passed in.
|
|
//
|
|
pszResource = AllocADsStr(pszName);
|
|
if (!pszResource) {
|
|
BAIL_ON_FAILURE(hr = E_FAIL);
|
|
}
|
|
|
|
*ppszResource = pszResource;
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//
|
|
// Make sure that the first 2 chars are \\
|
|
//
|
|
if (pszTemp[0] != L'\\'
|
|
|| pszTemp[1] != L'\\' )
|
|
{
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
pszTemp += 2;
|
|
|
|
while (pszTemp && *pszTemp != L'\\') {
|
|
dwLen++;
|
|
pszTemp++;
|
|
}
|
|
|
|
if (!pszTemp
|
|
|| !*pszTemp
|
|
|| !dwLen
|
|
) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
dwLen += 2; // the 2 \\ in the serverName
|
|
|
|
//
|
|
// Advance past the \ in \\testShare\FileShare.
|
|
//
|
|
pszTemp++;
|
|
if (!pszTemp || !*pszTemp) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG)
|
|
}
|
|
|
|
//
|
|
// If we get here we have valid server and share names.
|
|
//
|
|
pszServer = (LPWSTR) AllocADsMem((dwLen+1) * sizeof(WCHAR));
|
|
if (!pszServer) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
wcsncpy(pszServer, pszName, dwLen);
|
|
|
|
pszResource = AllocADsStr(pszTemp);
|
|
if (!pszResource) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
*ppszServer = pszServer;
|
|
*ppszResource = pszResource;
|
|
|
|
error:
|
|
|
|
if (FAILED(hr)) {
|
|
if (pszResource) {
|
|
FreeADsMem(pszResource);
|
|
}
|
|
|
|
if (pszServer) {
|
|
FreeADsMem(pszServer);
|
|
}
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: GetKeyRootAndSubKey - Helper routine.
|
|
//
|
|
// Synopsis: Gets the root (such as HKLM) from the registry key path. This
|
|
// is needed when we open a handle to the key. The rest of the path
|
|
// constitutes the SubKey name.
|
|
//
|
|
// Arguments: pszKeyName - Name of the key we need to open.
|
|
// ppszSubKey - Return value for the subKey
|
|
// phKey - Return value for key root to open.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: phKey, NULL on failure and one of
|
|
// HKEY_USERS, HKEY_CURRENT_USER, HKEY_CURRENT_CONFIG,
|
|
// HKEY_LOCAL_MACHINE, HKEY_CLASSES_ROOT
|
|
// or HKEY_PERFORMANCE_DATA on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
GetKeyRootAndSubKey(
|
|
LPWSTR pszKeyName,
|
|
LPWSTR * ppszSubKey,
|
|
HKEY * phKey
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
HKEY hKey = NULL;
|
|
LPWSTR pszRoot = NULL;
|
|
LPWSTR pszTemp = pszKeyName;
|
|
LPWSTR pszSubKey = NULL;
|
|
DWORD dwLen = 0;
|
|
|
|
*phKey = NULL;
|
|
*ppszSubKey = NULL;
|
|
|
|
while (pszTemp
|
|
&& *pszTemp
|
|
&& *pszTemp != L'\\') {
|
|
dwLen++;
|
|
pszTemp++;
|
|
}
|
|
|
|
//
|
|
// If the length is less than 3 something is wrong.
|
|
//
|
|
if ((dwLen < 3)
|
|
|| !pszTemp
|
|
|| !*pszTemp
|
|
) {
|
|
BAIL_ON_FAILURE(hr = E_ADS_BAD_PARAMETER);
|
|
}
|
|
|
|
//
|
|
// To get the subkey, we need to move past the \.
|
|
//
|
|
pszTemp++;
|
|
if (pszTemp && *pszTemp) {
|
|
pszSubKey = AllocADsStr(pszTemp);
|
|
if (!pszSubKey) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
}
|
|
|
|
pszRoot = (LPWSTR) AllocADsMem((dwLen+1) * sizeof(WCHAR));
|
|
if (!pszRoot) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
//
|
|
// Copy over the root so we can use it in the subsequent comparisions.
|
|
//
|
|
wcsncpy(pszRoot, pszKeyName, dwLen);
|
|
|
|
if (_wcsicmp( pszRoot, L"HKEY_CLASSES_ROOT") == 0
|
|
|| _wcsicmp( pszRoot, L"HKCR") == 0
|
|
) {
|
|
hKey = HKEY_CLASSES_ROOT;
|
|
}
|
|
else if (_wcsicmp( pszRoot, L"HKEY_LOCAL_MACHINE") == 0
|
|
|| _wcsicmp( pszRoot, L"HKLM") == 0
|
|
) {
|
|
hKey = HKEY_LOCAL_MACHINE;
|
|
}
|
|
else if (_wcsicmp(pszRoot, L"HKEY_CURRENT_CONFIG") == 0
|
|
|| _wcsicmp(pszRoot, L"HKCC") == 0
|
|
) {
|
|
hKey = HKEY_CURRENT_CONFIG;
|
|
}
|
|
else if (_wcsicmp(pszRoot, L"HKEY_CURRENT_USER" ) == 0
|
|
|| _wcsicmp( pszRoot, L"HKCU") == 0
|
|
) {
|
|
hKey = HKEY_CURRENT_USER;
|
|
}
|
|
else if (_wcsicmp(pszRoot, L"HKEY_USERS") == 0
|
|
|| _wcsicmp(pszRoot, L"HKU")
|
|
) {
|
|
hKey = HKEY_USERS;
|
|
}
|
|
else if ( _wcsicmp(pszRoot, L"HKEY_PERFORMANCE_DATA") == 0) {
|
|
hKey = HKEY_PERFORMANCE_DATA;
|
|
}
|
|
else {
|
|
//
|
|
// Has to be one of the above.
|
|
//
|
|
BAIL_ON_FAILURE(hr = E_FAIL);
|
|
}
|
|
|
|
*phKey = hKey;
|
|
*ppszSubKey = pszSubKey;
|
|
|
|
error:
|
|
|
|
if (pszRoot) {
|
|
FreeADsStr(pszRoot);
|
|
}
|
|
|
|
if (FAILED(hr) && pszSubKey) {
|
|
FreeADsStr(pszSubKey);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: ConvertRawSDToBinary - Helper routine.
|
|
//
|
|
// Synopsis: Converts the binary SD to a VT_UI1 | VT_ARRAY.
|
|
//
|
|
// Arguments: pSecurityDescriptor - Binary sd to convert.
|
|
// dwLength - Length of SD.
|
|
// pVariant - Return value.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: pVariant to point to IID_IADsSecurityDescriptor on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
ConvertRawSDToBinary(
|
|
PSECURITY_DESCRIPTOR pSecurityDescriptor,
|
|
DWORD dwLength,
|
|
VARIANT *pVariant
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
SAFEARRAY * aList = NULL;
|
|
SAFEARRAYBOUND aBound;
|
|
CHAR HUGEP *pArray = NULL;
|
|
|
|
aBound.lLbound = 0;
|
|
aBound.cElements = dwLength;
|
|
|
|
aList = SafeArrayCreate( VT_UI1, 1, &aBound );
|
|
if (!aList) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
hr = SafeArrayAccessData( aList, (void HUGEP * FAR *) &pArray );
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
memcpy( pArray, pSecurityDescriptor, aBound.cElements );
|
|
SafeArrayUnaccessData( aList );
|
|
|
|
V_VT(pVariant) = VT_ARRAY | VT_UI1;
|
|
V_ARRAY(pVariant) = aList;
|
|
|
|
RRETURN(hr);
|
|
|
|
error:
|
|
|
|
if ( aList ) {
|
|
SafeArrayDestroy( aList );
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: ConvertRawSDToHexString - Helper routine.
|
|
//
|
|
// Synopsis: Converts the binary SD to a VT_BSTR in hex string format.
|
|
//
|
|
// Arguments: pSecurityDescriptor - Binary sd to convert.
|
|
// dwLength - Length of SD.
|
|
// pVariant - Return value for VT_BSTR.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: pVariant to point to IID_IADsSecurityDescriptor on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
ConvertRawSDToHexString(
|
|
PSECURITY_DESCRIPTOR pSecurityDescriptor,
|
|
DWORD dwLength,
|
|
VARIANT *pVariant
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
LPWSTR pszHexStr = NULL;
|
|
BSTR bstrHexSD = NULL;
|
|
WCHAR szSmallStr[10];
|
|
|
|
pszHexStr = (LPWSTR) AllocADsMem((dwLength+1) * 2 * sizeof(WCHAR));
|
|
if (!pszHexStr) {
|
|
BAIL_ON_FAILURE(hr);
|
|
}
|
|
|
|
for (DWORD dwCtr = 0; dwCtr < dwLength; dwCtr++) {
|
|
wsprintf(
|
|
szSmallStr,
|
|
L"%02x",
|
|
((BYTE*)pSecurityDescriptor)[dwCtr]
|
|
);
|
|
wcscat(pszHexStr, szSmallStr);
|
|
}
|
|
|
|
hr = ADsAllocString(pszHexStr, &bstrHexSD);
|
|
|
|
if (SUCCEEDED(hr)) {
|
|
pVariant->vt = VT_BSTR;
|
|
pVariant->bstrVal = bstrHexSD;
|
|
}
|
|
|
|
error:
|
|
|
|
if (pszHexStr) {
|
|
FreeADsMem(pszHexStr);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: ConvertHexSDToRawSD - Helper routine.
|
|
//
|
|
// Synopsis: Converts the hex string SD to a binary SD.
|
|
//
|
|
// Arguments: pVarHexSD - Variant with hex string.
|
|
// ppSecurityDescriptor - Return value for binary SD
|
|
// pdwLength - Return value for length of SD.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: ppSecurityDescriptor and pdwLength updated accordingly.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
ConvertHexSDToRawSD(
|
|
PVARIANT pVarHexSD,
|
|
PSECURITY_DESCRIPTOR *ppSecurityDescriptor,
|
|
DWORD *pdwLength
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
LPWSTR pszHexSD = V_BSTR(pVarHexSD);
|
|
DWORD dwLen;
|
|
LPBYTE lpByte = NULL;
|
|
|
|
*ppSecurityDescriptor = NULL;
|
|
*pdwLength = 0;
|
|
|
|
if (!pszHexSD
|
|
|| ((dwLen = wcslen(pszHexSD)) == 0)
|
|
) {
|
|
//
|
|
// NULL SD.
|
|
//
|
|
RRETURN(S_OK);
|
|
}
|
|
|
|
dwLen = wcslen(pszHexSD);
|
|
|
|
//
|
|
// Length has to be even.
|
|
//
|
|
if (((dwLen/2) * 2) != dwLen) {
|
|
BAIL_ON_FAILURE(hr = E_ADS_CANT_CONVERT_DATATYPE);
|
|
}
|
|
|
|
dwLen /= 2;
|
|
|
|
if (dwLen) {
|
|
|
|
lpByte = (LPBYTE) AllocADsMem(dwLen);
|
|
if (!lpByte) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
//
|
|
// Go through and read one 2 hex chars at a time.
|
|
//
|
|
for (
|
|
DWORD dwCtr = 0;
|
|
(dwCtr < dwLen) && (pszHexSD && *pszHexSD);
|
|
dwCtr++ ) {
|
|
|
|
DWORD dwCount, dwHexVal;
|
|
dwCount = swscanf(pszHexSD, L"%02x", &dwHexVal);
|
|
|
|
//
|
|
// The read has to be successful and the data valid.
|
|
//
|
|
if (dwCount != 1) {
|
|
BAIL_ON_FAILURE(hr = E_FAIL);
|
|
}
|
|
|
|
//
|
|
// Make sure that the value is in the correct range.
|
|
//
|
|
if (dwHexVal & (0xFFFFFF00)) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
lpByte[dwCtr] = (BYTE) dwHexVal;
|
|
|
|
pszHexSD++;
|
|
if (!pszHexSD) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
pszHexSD++;
|
|
} // for loop
|
|
|
|
//
|
|
// The sd translation was succesful.
|
|
//
|
|
*ppSecurityDescriptor = (PSECURITY_DESCRIPTOR)(LPVOID) lpByte;
|
|
*pdwLength = dwLen;
|
|
} // if the string had any data in it.
|
|
|
|
error:
|
|
|
|
if (FAILED(hr) && lpByte) {
|
|
FreeADsMem(lpByte);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: ConvertBinarySDToRawSD - Helper routine.
|
|
//
|
|
// Synopsis: Converts a VT_UI1 | VT_ARRAY to a binary SD.
|
|
//
|
|
// Arguments: pvVarBinSD - The input variant array to convert.
|
|
// ppSecurityDescriptor - Return value for binary sd.
|
|
// pdwLength - Return value for length of binary sd.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: ppSecurityDescriptor and pdwLength modified appropriately.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
ConvertBinarySDToRawSD(
|
|
PVARIANT pvVarBinSD,
|
|
PSECURITY_DESCRIPTOR *ppSecurityDescriptor,
|
|
DWORD *pdwLength
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
LPVOID lpMem = NULL;
|
|
long lBoundLower = -1;
|
|
long lBoundUpper = -1;
|
|
CHAR HUGEP *pArray = NULL;
|
|
|
|
*ppSecurityDescriptor = NULL;
|
|
*pdwLength = 0;
|
|
|
|
//
|
|
// Make sure we have an array and then get length.
|
|
//
|
|
if( pvVarBinSD->vt != (VT_ARRAY | VT_UI1)) {
|
|
RRETURN(hr = E_ADS_CANT_CONVERT_DATATYPE);
|
|
}
|
|
|
|
hr = SafeArrayGetLBound(
|
|
V_ARRAY(pvVarBinSD),
|
|
1,
|
|
&lBoundLower
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
hr = SafeArrayGetUBound(
|
|
V_ARRAY(pvVarBinSD),
|
|
1,
|
|
&lBoundUpper
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
if ((lBoundUpper == -1)
|
|
&& (lBoundLower == -1)
|
|
) {
|
|
//
|
|
// Nothing further to do in this case.
|
|
//
|
|
;
|
|
}
|
|
else {
|
|
long lLength;
|
|
|
|
lLength = (lBoundUpper - lBoundLower) + 1;
|
|
lpMem = AllocADsMem(lLength);
|
|
if (!lpMem) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
hr = SafeArrayAccessData(
|
|
V_ARRAY(pvVarBinSD),
|
|
(void HUGEP * FAR *) &pArray
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
memcpy(lpMem, pArray, lLength);
|
|
|
|
SafeArrayUnaccessData(V_ARRAY(pvVarBinSD));
|
|
|
|
*ppSecurityDescriptor = (PSECURITY_DESCRIPTOR) lpMem;
|
|
*pdwLength = (DWORD) lLength;
|
|
}
|
|
|
|
error:
|
|
|
|
if (FAILED(hr) && lpMem) {
|
|
FreeADsMem(lpMem);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: GetRawSDFromFile - Helper routine.
|
|
//
|
|
// Synopsis: Gets the security descriptor from the file in binary format.
|
|
//
|
|
// Arguments: pszFileName - Name of file to get sd from.
|
|
// secInfo - Security mask to use for the operation.
|
|
// ppSD - Return value for the SD.
|
|
// pdwLength - Return value for the lenght of the SD.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: ppSD and pdwLength on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
GetRawSDFromFile(
|
|
LPWSTR pszFileName,
|
|
SECURITY_INFORMATION secInfo,
|
|
PSECURITY_DESCRIPTOR *ppSD,
|
|
PDWORD pdwLength
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
DWORD dwLength = 0;
|
|
PSECURITY_DESCRIPTOR pSD = NULL;
|
|
|
|
|
|
*ppSD = NULL;
|
|
*pdwLength = 0;
|
|
|
|
//
|
|
// Get the length of the SD.
|
|
//
|
|
if (!GetFileSecurity(
|
|
pszFileName,
|
|
secInfo,
|
|
NULL,
|
|
0,
|
|
&dwLength
|
|
)
|
|
&& (dwLength == 0)
|
|
) {
|
|
//
|
|
// There was an error.
|
|
//
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(GetLastError()));
|
|
}
|
|
|
|
if (dwLength == 0) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(GetLastError()));
|
|
}
|
|
|
|
pSD = (PSECURITY_DESCRIPTOR) AllocADsMem(dwLength);
|
|
|
|
if (!pSD) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
if (!GetFileSecurity(
|
|
pszFileName,
|
|
secInfo,
|
|
pSD,
|
|
dwLength,
|
|
&dwLength
|
|
)
|
|
) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(GetLastError()));
|
|
}
|
|
|
|
*pdwLength = dwLength;
|
|
*ppSD = pSD;
|
|
|
|
error:
|
|
|
|
if (FAILED(hr) && pSD) {
|
|
FreeADsMem(pSD);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: SetRawSDToFile - Helper routine.
|
|
//
|
|
// Synopsis: Sets the binary security descriptor on the file.
|
|
//
|
|
// Arguments: pszFileName - Name of file to set sd on.
|
|
// secInfo - Security mask to use for the operation.
|
|
// pSD - Value of SD to set.
|
|
// dwLength - Length of the sd.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
SetRawSDToFile(
|
|
LPWSTR pszFileName,
|
|
SECURITY_INFORMATION secInfo,
|
|
PSECURITY_DESCRIPTOR pSD
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
|
|
if (!SetFileSecurity(
|
|
pszFileName,
|
|
secInfo,
|
|
pSD
|
|
)
|
|
) {
|
|
RRETURN(HRESULT_FROM_WIN32(GetLastError()));
|
|
}
|
|
else {
|
|
RRETURN(S_OK);
|
|
}
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: GetRawSDFromFileShare - Helper routine.
|
|
//
|
|
// Synopsis: Gets the security descriptor from the fileshare in bin format.
|
|
//
|
|
// Arguments: pszFileShareName - Name of fileshare to get sd from.
|
|
// ppSD - Return value for the SD.
|
|
// pdwLength - Return value for the lenght of the SD.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: ppSD and pdwLength on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
GetRawSDFromFileShare(
|
|
LPWSTR pszFileShareName,
|
|
PSECURITY_DESCRIPTOR *ppSD,
|
|
PDWORD pdwLength
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
LPWSTR pszServerName = NULL;
|
|
LPWSTR pszShareName = NULL;
|
|
|
|
DWORD dwLength = 0;
|
|
PSECURITY_DESCRIPTOR pSD = NULL;
|
|
SHARE_INFO_502 * pShareInfo502 = NULL;
|
|
NET_API_STATUS nasStatus = NERR_Success;
|
|
|
|
*ppSD = NULL;
|
|
*pdwLength = 0;
|
|
|
|
//
|
|
// We need to split the name into serverName and shareName
|
|
//
|
|
hr = GetServerAndResource(
|
|
pszFileShareName,
|
|
&pszServerName,
|
|
&pszShareName
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// Only 502 level call returns the SD Info.
|
|
//
|
|
nasStatus = NetShareGetInfo(
|
|
pszServerName,
|
|
pszShareName,
|
|
502,
|
|
(LPBYTE *)&pShareInfo502
|
|
);
|
|
if (nasStatus != NERR_Success) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(nasStatus));
|
|
}
|
|
|
|
//
|
|
// If the SD is non NULL process the SD.
|
|
//
|
|
if (pShareInfo502->shi502_security_descriptor) {
|
|
//
|
|
// Get the length of the SD, it should not be 0.
|
|
//
|
|
SetLastError(0);
|
|
dwLength = GetSecurityDescriptorLength(
|
|
pShareInfo502->shi502_security_descriptor
|
|
);
|
|
|
|
|
|
//
|
|
// The return length should not be zero.
|
|
//
|
|
if (dwLength == 0) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(GetLastError()));
|
|
}
|
|
|
|
pSD = (PSECURITY_DESCRIPTOR) AllocADsMem(dwLength);
|
|
|
|
if (!pSD) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
memcpy(pSD, pShareInfo502->shi502_security_descriptor, dwLength);
|
|
|
|
*ppSD = pSD;
|
|
*pdwLength = dwLength;
|
|
}
|
|
else {
|
|
//
|
|
// The SD was NULL the ret values are set correctly
|
|
//
|
|
;
|
|
}
|
|
|
|
error:
|
|
|
|
if (pszServerName) {
|
|
FreeADsStr(pszServerName);
|
|
}
|
|
|
|
if (pszShareName) {
|
|
FreeADsStr(pszShareName);
|
|
}
|
|
|
|
if (pShareInfo502) {
|
|
NetApiBufferFree(pShareInfo502);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: SetRawSDToFileShare - Helper routine.
|
|
//
|
|
// Synopsis: Sets the binary SD on the fileshare.
|
|
//
|
|
// Arguments: pszFileShare - Name of fileshare to set sd on.
|
|
// pSD - The SD to set.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
SetRawSDToFileShare(
|
|
LPWSTR pszFileShare,
|
|
PSECURITY_DESCRIPTOR pSD
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
LPWSTR pszServerName = NULL;
|
|
LPWSTR pszShareName = NULL;
|
|
SHARE_INFO_502 * pShareInfo502 = NULL;
|
|
NET_API_STATUS nasStatus = NERR_Success;
|
|
PSECURITY_DESCRIPTOR pTempSD = NULL;
|
|
|
|
//
|
|
// We need to split the name into serverName and shareName
|
|
//
|
|
hr = GetServerAndResource(
|
|
pszFileShare,
|
|
&pszServerName,
|
|
&pszShareName
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// Ideally we should use 1501 level but that is only on Win2k. So
|
|
// we need to read the info, update SD and then set it.
|
|
//
|
|
nasStatus = NetShareGetInfo(
|
|
pszServerName,
|
|
pszShareName,
|
|
502,
|
|
(LPBYTE *) &pShareInfo502
|
|
);
|
|
if (nasStatus != NERR_Success) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(nasStatus));
|
|
}
|
|
|
|
//
|
|
// Store away the SD so we restore before free.
|
|
//
|
|
pTempSD = pShareInfo502->shi502_security_descriptor;
|
|
|
|
pShareInfo502->shi502_security_descriptor = pSD;
|
|
|
|
nasStatus = NetShareSetInfo(
|
|
pszServerName,
|
|
pszShareName,
|
|
502,
|
|
(LPBYTE) pShareInfo502,
|
|
NULL
|
|
);
|
|
|
|
pShareInfo502->shi502_security_descriptor = pTempSD;
|
|
|
|
if (nasStatus != NERR_Success) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(nasStatus));
|
|
}
|
|
|
|
error:
|
|
|
|
if (pShareInfo502) {
|
|
NetApiBufferFree(pShareInfo502);
|
|
}
|
|
|
|
if (pszServerName) {
|
|
FreeADsStr(pszServerName);
|
|
}
|
|
if (pszShareName) {
|
|
FreeADsStr(pszShareName);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: GetRawSDFromRegistry - Helper routine.
|
|
//
|
|
// Synopsis: Gets the security descriptor from the registry in bin format.
|
|
//
|
|
// Arguments: pszFileRegKeyName - Name of fileshare to get sd from.
|
|
// secInfo - Security mask to use for the operation.
|
|
// ppSD - Return value for the SD.
|
|
// pdwLength - Return value for the lenght of the SD.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: ppSD and pdwLength on success.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
GetRawSDFromRegistry(
|
|
LPWSTR pszFileRegKeyName,
|
|
SECURITY_INFORMATION secInfo,
|
|
PSECURITY_DESCRIPTOR *ppSD,
|
|
PDWORD pdwLength
|
|
)
|
|
{
|
|
HRESULT hr;
|
|
LPWSTR pszServerName = NULL;
|
|
LPWSTR pszKeyName = NULL;
|
|
LPWSTR pszSubKey = NULL;
|
|
DWORD dwLength = 0;
|
|
DWORD dwErr;
|
|
PSECURITY_DESCRIPTOR pSD = NULL;
|
|
HKEY hKey = NULL;
|
|
HKEY hKeyRoot = NULL;
|
|
HKEY hKeyMachine = NULL;
|
|
|
|
*ppSD = NULL;
|
|
*pdwLength = 0;
|
|
|
|
//
|
|
// We need to split the name into serverName and shareName
|
|
//
|
|
hr = GetServerAndResource(
|
|
pszFileRegKeyName,
|
|
&pszServerName,
|
|
&pszKeyName
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
|
|
//
|
|
// pszKeyName has to have a valid string. We need to process it
|
|
// to find out which key set we need to open (such as HKLM).
|
|
//
|
|
hr = GetKeyRootAndSubKey(pszKeyName, &pszSubKey, &hKeyRoot);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// Need to open the hKeyRoot on the appropriate machine.
|
|
// If the serverName is NULL it will be local machine.
|
|
//
|
|
dwErr = RegConnectRegistry(
|
|
pszServerName,
|
|
hKeyRoot,
|
|
&hKeyMachine
|
|
);
|
|
if (dwErr) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
//
|
|
// Open the key and try and read the security descriptor
|
|
//
|
|
dwErr = RegOpenKeyEx(
|
|
hKeyMachine,
|
|
pszSubKey,
|
|
0,
|
|
KEY_READ,
|
|
&hKey
|
|
);
|
|
if (dwErr) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
dwErr = RegGetKeySecurity(
|
|
hKey,
|
|
secInfo,
|
|
pSD,
|
|
&dwLength
|
|
);
|
|
if (dwLength == 0) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
pSD = (PSECURITY_DESCRIPTOR) AllocADsMem(dwLength);
|
|
if (!pSD) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
dwErr = RegGetKeySecurity(
|
|
hKey,
|
|
secInfo,
|
|
pSD,
|
|
&dwLength
|
|
);
|
|
if (dwErr) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
*ppSD = pSD;
|
|
*pdwLength = dwLength;
|
|
|
|
error:
|
|
|
|
if (pszServerName) {
|
|
FreeADsStr(pszServerName);
|
|
}
|
|
|
|
if (pszKeyName) {
|
|
FreeADsStr(pszKeyName);
|
|
}
|
|
|
|
if (pszSubKey) {
|
|
FreeADsStr(pszSubKey);
|
|
}
|
|
|
|
if (hKey) {
|
|
RegCloseKey(hKey);
|
|
}
|
|
|
|
if (hKeyMachine) {
|
|
RegCloseKey(hKeyMachine);
|
|
}
|
|
|
|
if (FAILED(hr) && pSD) {
|
|
FreeADsMem(pSD);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: SetRawSDToRegistry - Helper routine.
|
|
//
|
|
// Synopsis: Sets the security descriptor to the specified key.
|
|
//
|
|
// Arguments: pszFileRegKeyName - Name of fileshare to set sd on.
|
|
// secInfo - Security mask to use for the operation.
|
|
// pSD - SD to set on the reg key.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
SetRawSDToRegistry(
|
|
LPWSTR pszFileRegKeyName,
|
|
SECURITY_INFORMATION secInfo,
|
|
PSECURITY_DESCRIPTOR pSD
|
|
)
|
|
{
|
|
HRESULT hr;
|
|
LPWSTR pszServerName = NULL;
|
|
LPWSTR pszKeyName = NULL;
|
|
LPWSTR pszSubKey = NULL;
|
|
DWORD dwErr;
|
|
HKEY hKey = NULL;
|
|
HKEY hKeyRoot = NULL;
|
|
HKEY hKeyMachine = NULL;
|
|
|
|
//
|
|
// We need to split the name into serverName and shareName
|
|
//
|
|
hr = GetServerAndResource(
|
|
pszFileRegKeyName,
|
|
&pszServerName,
|
|
&pszKeyName
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// pszKeyName has to have a valid string. We need to process it
|
|
// to find out which key set we need to open (such as HKLM).
|
|
//
|
|
hr = GetKeyRootAndSubKey(pszKeyName, &pszSubKey, &hKeyRoot);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// Need to open the hKeyRoot on the appropriate machine.
|
|
// If the serverName is NULL it will be local machine.
|
|
//
|
|
dwErr = RegConnectRegistry(
|
|
pszServerName,
|
|
hKeyRoot,
|
|
&hKeyMachine
|
|
);
|
|
if (dwErr) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
//
|
|
// Open the key and try and read the security descriptor
|
|
//
|
|
dwErr = RegOpenKeyEx(
|
|
hKeyMachine,
|
|
pszSubKey,
|
|
0,
|
|
KEY_WRITE,
|
|
&hKey
|
|
);
|
|
if (dwErr) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
dwErr = RegSetKeySecurity(
|
|
hKey,
|
|
secInfo,
|
|
pSD
|
|
);
|
|
if (dwErr) {
|
|
BAIL_ON_FAILURE(hr = HRESULT_FROM_WIN32(dwErr));
|
|
}
|
|
|
|
error:
|
|
|
|
if (pszServerName) {
|
|
FreeADsStr(pszServerName);
|
|
}
|
|
|
|
if (pszKeyName) {
|
|
FreeADsStr(pszKeyName);
|
|
}
|
|
|
|
if (pszSubKey) {
|
|
FreeADsStr(pszSubKey);
|
|
}
|
|
|
|
if (hKey) {
|
|
RegCloseKey(hKey);
|
|
}
|
|
|
|
if (hKeyMachine) {
|
|
RegCloseKey(hKeyMachine);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
/****************************************************************************/
|
|
//
|
|
// CADsSecurityUtility Class.
|
|
//
|
|
/****************************************************************************/
|
|
|
|
DEFINE_IDispatch_Implementation(CADsSecurityUtility)
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CSecurity::CSecurityDescriptor - Constructor.
|
|
//
|
|
// Synopsis: Standard constructor.
|
|
//
|
|
// Arguments: N/A.
|
|
//
|
|
// Returns: N/A.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
CADsSecurityUtility::CADsSecurityUtility():
|
|
_secInfo( DACL_SECURITY_INFORMATION
|
|
| GROUP_SECURITY_INFORMATION
|
|
| OWNER_SECURITY_INFORMATION
|
|
),
|
|
_pDispMgr(NULL)
|
|
{
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::~CADsSecurityUtility - Destructor.
|
|
//
|
|
// Synopsis: Standard destructor.
|
|
//
|
|
// Arguments: N/A.
|
|
//
|
|
// Returns: N/A.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
CADsSecurityUtility::~CADsSecurityUtility()
|
|
{
|
|
//
|
|
// Only the dispmgr needs to be cleaned up.
|
|
//
|
|
delete _pDispMgr;
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::AllocateADsSecurityUtilityObject -
|
|
// Static helper method.
|
|
//
|
|
// Synopsis: Standard static allocation routine.
|
|
//
|
|
// Arguments: ppADsSecurityUtil - Return ptr.
|
|
//
|
|
// Returns: S_OK on success or appropriate error code on failure.
|
|
//
|
|
// Modifies: *ppADsSecurity.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
CADsSecurityUtility::AllocateADsSecurityUtilityObject(
|
|
CADsSecurityUtility **ppADsSecurityUtil
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
CADsSecurityUtility FAR * pADsSecurityUtil = NULL;
|
|
CDispatchMgr FAR * pDispMgr = NULL;
|
|
|
|
pADsSecurityUtil = new CADsSecurityUtility();
|
|
|
|
if (!pADsSecurityUtil) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
pDispMgr = new CDispatchMgr;
|
|
|
|
if (!pDispMgr) {
|
|
BAIL_ON_FAILURE(hr = E_OUTOFMEMORY);
|
|
}
|
|
|
|
hr = LoadTypeInfoEntry(
|
|
pDispMgr,
|
|
LIBID_ADs,
|
|
IID_IADsSecurityUtility,
|
|
(IADsSecurityUtility *)pADsSecurityUtil,
|
|
DISPID_REGULAR
|
|
);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
pADsSecurityUtil->_pDispMgr = pDispMgr;
|
|
*ppADsSecurityUtil = pADsSecurityUtil;
|
|
|
|
RRETURN(hr);
|
|
|
|
error:
|
|
|
|
delete pADsSecurityUtil;
|
|
delete pDispMgr;
|
|
|
|
RRETURN_EXP_IF_ERR(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::CreateADsSecurityUtility - Static
|
|
// helper method.
|
|
//
|
|
// Synopsis: Standard static class factor helper method.
|
|
//
|
|
// Arguments: riid - IID needed on returned object.
|
|
// ppvObj - Return ptr.
|
|
//
|
|
// Returns: S_OK on success or appropriate error code on failure.
|
|
//
|
|
// Modifies: *ppvObj is suitably modified.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
HRESULT
|
|
CADsSecurityUtility::CreateADsSecurityUtility(
|
|
REFIID riid,
|
|
void **ppvObj
|
|
)
|
|
{
|
|
CADsSecurityUtility FAR * pADsSecurityUtil = NULL;
|
|
HRESULT hr = S_OK;
|
|
|
|
hr = AllocateADsSecurityUtilityObject(&pADsSecurityUtil);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
hr = pADsSecurityUtil->QueryInterface(riid, ppvObj);
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
pADsSecurityUtil->Release();
|
|
|
|
RRETURN(hr);
|
|
|
|
error:
|
|
delete pADsSecurityUtil;
|
|
|
|
RRETURN_EXP_IF_ERR(hr);
|
|
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::QueryInterface --- IUnknown support.
|
|
//
|
|
// Synopsis: Standard query interface method.
|
|
//
|
|
// Arguments: iid - Interface requested.
|
|
// ppInterface - Return pointer to interface requested.
|
|
//
|
|
// Returns: S_OK on success. Error code otherwise.
|
|
//
|
|
// Modifies: *ppInterface to return interface pointer.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::QueryInterface(
|
|
REFIID iid,
|
|
LPVOID *ppInterface
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
|
|
if (!ppInterface) {
|
|
RRETURN(E_INVALIDARG);
|
|
}
|
|
|
|
if (IsEqualIID(iid, IID_IUnknown)) {
|
|
*ppInterface = (IADsSecurityUtility *) this;
|
|
}
|
|
else if (IsEqualIID(iid, IID_IDispatch)) {
|
|
*ppInterface = (IADsSecurityUtility *) this;
|
|
}
|
|
else if (IsEqualIID(iid, IID_IADsSecurityUtility)) {
|
|
*ppInterface = (IADsSecurityUtility *) this;
|
|
}
|
|
else if (IsEqualIID(iid, IID_ISupportErrorInfo)) {
|
|
*ppInterface = (ISupportErrorInfo *) this;
|
|
}
|
|
else {
|
|
RRETURN(E_NOINTERFACE);
|
|
}
|
|
|
|
AddRef();
|
|
RRETURN(S_OK);
|
|
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::InterfaceSupportserrorInfo
|
|
// ISupportErrorInfo support.
|
|
//
|
|
// Synopsis: N/A.
|
|
//
|
|
// Arguments: riid - Interface being tested..
|
|
//
|
|
// Returns: S_OK or S_FALSE on failure.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::InterfaceSupportsErrorInfo(THIS_ REFIID riid)
|
|
{
|
|
if (IsEqualIID(riid, IID_IADsSecurityUtility)) {
|
|
return S_OK;
|
|
} else {
|
|
return S_FALSE;
|
|
}
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::GetSecurityDescriptor -
|
|
// IADsSecurityUtility support.
|
|
//
|
|
// Synopsis: Gets the security descriptor from the named object.
|
|
//
|
|
// Arguments: varPath - Path of object to get SD from.
|
|
// lPathFormat - Specifies type of object path.
|
|
// Only ADS_PATH_FILE, ADS_PATH_FILESHARE
|
|
// and ADS_PATH_REGISTRY are supported.
|
|
// lOutFormat - Specifies output SD format.
|
|
// pVariant - Return value for SD.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: pVariant is update appropriately.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::GetSecurityDescriptor(
|
|
IN VARIANT varPath,
|
|
IN long lPathFormat,
|
|
IN OPTIONAL long lOutFormat,
|
|
OUT VARIANT *pVariant
|
|
)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
PSECURITY_DESCRIPTOR pSecurityDescriptor = NULL;
|
|
DWORD dwLength = 0;
|
|
VARIANT *pvPath = NULL;
|
|
|
|
//
|
|
// Make sure the params are correct.
|
|
//
|
|
if (!pVariant) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
VariantInit(pVariant);
|
|
|
|
if (lPathFormat < ADS_PATH_FILE
|
|
|| lPathFormat > ADS_PATH_REGISTRY
|
|
) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
//
|
|
// Make sure we handle byRef params correctly.
|
|
//
|
|
pvPath = &varPath;
|
|
if (V_VT(pvPath) == (VT_BYREF|VT_VARIANT)) {
|
|
pvPath = V_VARIANTREF(&varPath);
|
|
}
|
|
|
|
//
|
|
// For the path to be valid for now, it has to be a string.
|
|
//
|
|
if (pvPath->vt != VT_BSTR) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
if (pvPath->bstrVal == NULL) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
if (lOutFormat < ADS_SD_FORMAT_IID
|
|
|| lOutFormat > ADS_SD_FORMAT_HEXSTRING
|
|
) {
|
|
BAIL_ON_FAILURE(hr);
|
|
}
|
|
|
|
//
|
|
// Time to get the raw sd from the source.
|
|
//
|
|
switch (lPathFormat) {
|
|
case ADS_PATH_FILE:
|
|
hr = GetRawSDFromFile(
|
|
pvPath->bstrVal,
|
|
_secInfo,
|
|
&pSecurityDescriptor,
|
|
&dwLength
|
|
);
|
|
break;
|
|
|
|
case ADS_PATH_FILESHARE:
|
|
hr = GetRawSDFromFileShare(
|
|
pvPath->bstrVal,
|
|
&pSecurityDescriptor,
|
|
&dwLength
|
|
);
|
|
break;
|
|
|
|
case ADS_PATH_REGISTRY:
|
|
hr = GetRawSDFromRegistry(
|
|
pvPath->bstrVal,
|
|
_secInfo,
|
|
&pSecurityDescriptor,
|
|
&dwLength
|
|
);
|
|
break;
|
|
|
|
default:
|
|
hr = E_INVALIDARG;
|
|
break;
|
|
} // end of case to read sd.
|
|
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// Now convert the sd to the required format.
|
|
//
|
|
switch (lOutFormat) {
|
|
case ADS_SD_FORMAT_IID:
|
|
hr = BinarySDToSecurityDescriptor(
|
|
pSecurityDescriptor,
|
|
pVariant,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
0
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_RAW:
|
|
hr = ConvertRawSDToBinary(
|
|
pSecurityDescriptor,
|
|
dwLength,
|
|
pVariant
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_HEXSTRING:
|
|
hr = ConvertRawSDToHexString(
|
|
pSecurityDescriptor,
|
|
dwLength,
|
|
pVariant
|
|
);
|
|
break;
|
|
|
|
default:
|
|
hr = E_INVALIDARG;
|
|
} // end of case for output format.
|
|
|
|
error:
|
|
|
|
if (pSecurityDescriptor) {
|
|
FreeADsMem(pSecurityDescriptor);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::SetSecurityDescriptor -
|
|
// IADsSecurityUtility support.
|
|
//
|
|
// Synopsis: Sets the security descriptor from the named object.
|
|
//
|
|
// Arguments: varPath - Path of object to set SD on.
|
|
// lPathFormat - Format of path.
|
|
// varData - Variant with SD to set.
|
|
// lDataFormat - Format of the SD data.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: N/A.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::SetSecurityDescriptor(
|
|
IN VARIANT varPath,
|
|
IN long lPathFormat,
|
|
IN VARIANT varData,
|
|
IN long lDataFormat
|
|
)
|
|
{
|
|
HRESULT hr = E_INVALIDARG;
|
|
VARIANT *pvPath = NULL;
|
|
VARIANT *pvData = NULL;
|
|
PSECURITY_DESCRIPTOR pSD = NULL;
|
|
DWORD dwLength = 0;
|
|
|
|
if ((lPathFormat < ADS_PATH_FILE)
|
|
|| (lPathFormat > ADS_PATH_REGISTRY)
|
|
|| (lDataFormat < ADS_SD_FORMAT_IID)
|
|
|| (lDataFormat > ADS_SD_FORMAT_HEXSTRING)
|
|
) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
//
|
|
// Make sure we handle byRef params correctly.
|
|
//
|
|
pvPath = &varPath;
|
|
if (V_VT(pvPath) == (VT_BYREF | VT_VARIANT)) {
|
|
pvPath = V_VARIANTREF(&varPath);
|
|
}
|
|
|
|
pvData = &varData;
|
|
if (V_VT(pvData) == (VT_BYREF | VT_VARIANT)) {
|
|
pvData = V_VARIANTREF(&varData);
|
|
}
|
|
|
|
//
|
|
// Find out what format the SD is in and convert to raw binary
|
|
// format as that is what we need to set.
|
|
//
|
|
switch (lDataFormat) {
|
|
case ADS_SD_FORMAT_IID:
|
|
hr = SecurityDescriptorToBinarySD(
|
|
*pvData,
|
|
&pSD,
|
|
&dwLength,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
0
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_HEXSTRING:
|
|
if (V_VT(pvData) == VT_BSTR) {
|
|
hr = ConvertHexSDToRawSD(
|
|
pvData,
|
|
&pSD,
|
|
&dwLength
|
|
);
|
|
}
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_RAW:
|
|
if (V_VT(pvData) == (VT_UI1 | VT_ARRAY)) {
|
|
hr = ConvertBinarySDToRawSD(
|
|
pvData,
|
|
&pSD,
|
|
&dwLength
|
|
);
|
|
}
|
|
|
|
default:
|
|
hr = E_INVALIDARG;
|
|
break;
|
|
} // end switch type of input data.
|
|
|
|
//
|
|
// This will catch conversion failures as well as bad params.
|
|
//
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// For now the path has to be a string.
|
|
//
|
|
if (pvPath->vt != VT_BSTR) {
|
|
BAIL_ON_FAILURE(hr = E_INVALIDARG);
|
|
}
|
|
|
|
switch (lPathFormat) {
|
|
case ADS_PATH_FILE:
|
|
hr = SetRawSDToFile(
|
|
pvPath->bstrVal,
|
|
_secInfo,
|
|
pSD
|
|
);
|
|
break;
|
|
|
|
case ADS_PATH_FILESHARE:
|
|
hr = SetRawSDToFileShare(
|
|
pvPath->bstrVal,
|
|
pSD
|
|
);
|
|
break;
|
|
|
|
case ADS_PATH_REGISTRY:
|
|
hr = SetRawSDToRegistry(
|
|
pvPath->bstrVal,
|
|
_secInfo,
|
|
pSD
|
|
);
|
|
break;
|
|
|
|
default:
|
|
hr = E_INVALIDARG;
|
|
break;
|
|
}
|
|
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
error:
|
|
|
|
if (pSD) {
|
|
FreeADsMem(pSD);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
//+---------------------------------------------------------------------------
|
|
// Function: CADsSecurityUtility::ConvertSecurityDescriptor -
|
|
// IADsSecurityUtility method.
|
|
//
|
|
// Synopsis: Converts the input SD to the appropriate format requested.
|
|
//
|
|
// Arguments: varData - Input SD to convert.
|
|
// lDataFormat - Input SD format.
|
|
// loutFormat - Format of output SD.
|
|
// pvResult - Return value.
|
|
//
|
|
// Returns: S_OK or any appropriate error code.
|
|
//
|
|
// Modifies: pvResult with appropriate value.
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::ConvertSecurityDescriptor(
|
|
IN VARIANT varData,
|
|
IN long lDataFormat,
|
|
IN long lOutFormat,
|
|
OUT VARIANT *pvResult
|
|
)
|
|
{
|
|
HRESULT hr;
|
|
PSECURITY_DESCRIPTOR pSD = NULL;
|
|
DWORD dwLenSD;
|
|
VARIANT *pVarData = &varData;
|
|
|
|
if (!pvResult) {
|
|
BAIL_ON_FAILURE(hr= E_INVALIDARG);
|
|
}
|
|
|
|
if (V_VT(pVarData) == (VT_BYREF | VT_VARIANT)) {
|
|
pVarData = V_VARIANTREF(&varData);
|
|
}
|
|
|
|
//
|
|
// We will convert to binary format and then to
|
|
// the requested format.
|
|
//
|
|
switch (lDataFormat) {
|
|
case ADS_SD_FORMAT_IID:
|
|
hr = SecurityDescriptorToBinarySD(
|
|
*pVarData,
|
|
&pSD,
|
|
&dwLenSD,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
0
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_RAW :
|
|
hr = ConvertBinarySDToRawSD(
|
|
pVarData,
|
|
&pSD,
|
|
&dwLenSD
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_HEXSTRING:
|
|
hr = ConvertHexSDToRawSD(
|
|
pVarData,
|
|
&pSD,
|
|
&dwLenSD
|
|
);
|
|
break;
|
|
|
|
default:
|
|
hr = E_INVALIDARG;
|
|
break;
|
|
}
|
|
BAIL_ON_FAILURE(hr);
|
|
|
|
//
|
|
// Convert to the requested format.
|
|
//
|
|
switch (lOutFormat) {
|
|
case ADS_SD_FORMAT_IID:
|
|
hr = BinarySDToSecurityDescriptor(
|
|
pSD,
|
|
pvResult,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
0
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_RAW:
|
|
hr = ConvertRawSDToBinary(
|
|
pSD,
|
|
dwLenSD,
|
|
pvResult
|
|
);
|
|
break;
|
|
|
|
case ADS_SD_FORMAT_HEXSTRING:
|
|
hr = ConvertRawSDToHexString(
|
|
pSD,
|
|
dwLenSD,
|
|
pvResult
|
|
);
|
|
break;
|
|
|
|
default:
|
|
hr = E_INVALIDARG;
|
|
break;
|
|
}
|
|
|
|
error:
|
|
|
|
if (pSD) {
|
|
FreeADsMem(pSD);
|
|
}
|
|
|
|
RRETURN(hr);
|
|
}
|
|
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::put_SecurityMask(
|
|
long lSecurityMask
|
|
)
|
|
{
|
|
_secInfo = (SECURITY_INFORMATION) lSecurityMask;
|
|
RRETURN(S_OK);
|
|
}
|
|
|
|
STDMETHODIMP
|
|
CADsSecurityUtility::get_SecurityMask(
|
|
long *plSecurityMask
|
|
)
|
|
{
|
|
if (!plSecurityMask) {
|
|
RRETURN(E_INVALIDARG);
|
|
}
|
|
|
|
*plSecurityMask = (long) _secInfo;
|
|
|
|
RRETURN(S_OK);
|
|
}
|
|
|