mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1596 lines
39 KiB
1596 lines
39 KiB
/*++
|
|
|
|
Copyright (c) 1996 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
misc.cpp
|
|
|
|
Abstract:
|
|
|
|
SCE Engine miscellaneous APIs
|
|
|
|
Author:
|
|
|
|
Jin Huang (jinhuang) 23-Jun-1997 created
|
|
|
|
--*/
|
|
#include "headers.h"
|
|
#include "serverp.h"
|
|
#include <ntregapi.h>
|
|
#include <userenv.h>
|
|
#include <ntlsa.h>
|
|
#include <io.h>
|
|
#pragma hdrstop
|
|
|
|
extern "C" {
|
|
#include "dumpnt.h"
|
|
|
|
}
|
|
|
|
//#define SCE_DBG 1
|
|
|
|
NTSTATUS
|
|
ScepGetLsaDomainInfo(
|
|
PPOLICY_ACCOUNT_DOMAIN_INFO *PolicyAccountDomainInfo,
|
|
PPOLICY_PRIMARY_DOMAIN_INFO *PolicyPrimaryDomainInfo
|
|
);
|
|
|
|
DWORD
|
|
ScepGetEnvVarsFromProfile(
|
|
IN PWSTR UserProfileName,
|
|
IN PCWSTR VarName1,
|
|
IN PCWSTR VarName2 OPTIONAL,
|
|
OUT PWSTR *StrValue
|
|
);
|
|
|
|
|
|
|
|
NTSTATUS
|
|
ScepOpenSamDomain(
|
|
IN ACCESS_MASK ServerAccess,
|
|
IN ACCESS_MASK DomainAccess,
|
|
OUT PSAM_HANDLE pServerHandle,
|
|
OUT PSAM_HANDLE pDomainHandle,
|
|
OUT PSID *DomainSid,
|
|
OUT PSAM_HANDLE pBuiltinDomainHandle OPTIONAL,
|
|
OUT PSID *BuiltinDomainSid OPTIONAL
|
|
)
|
|
/*
|
|
Routine Description
|
|
|
|
This routine opens the local SAM server for account domain and builtin
|
|
domain. The domain handles and their SIDs are returned.
|
|
|
|
*/
|
|
{
|
|
NTSTATUS NtStatus;
|
|
|
|
PPOLICY_ACCOUNT_DOMAIN_INFO PolicyAccountDomainInfo=NULL;
|
|
PPOLICY_PRIMARY_DOMAIN_INFO PolicyPrimaryDomainInfo=NULL;
|
|
UNICODE_STRING AccountDomainName;
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
|
|
|
|
if ( !pServerHandle || !pDomainHandle || !DomainSid ) {
|
|
return(SCESTATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
//
|
|
// initialize output buffers
|
|
//
|
|
*pServerHandle = NULL;
|
|
*pDomainHandle = NULL;
|
|
*DomainSid = NULL;
|
|
|
|
if ( pBuiltinDomainHandle ) {
|
|
*pBuiltinDomainHandle = NULL;
|
|
}
|
|
if ( BuiltinDomainSid ) {
|
|
*BuiltinDomainSid = NULL;
|
|
}
|
|
|
|
//
|
|
// Get information for the account domain
|
|
//
|
|
|
|
NtStatus = ScepGetLsaDomainInfo(
|
|
&PolicyAccountDomainInfo,
|
|
&PolicyPrimaryDomainInfo
|
|
);
|
|
|
|
if (!NT_SUCCESS(NtStatus)) {
|
|
return( NtStatus );
|
|
}
|
|
AccountDomainName = PolicyAccountDomainInfo->DomainName;
|
|
|
|
//
|
|
// Connect to the local SAM server
|
|
//
|
|
|
|
InitializeObjectAttributes( &ObjectAttributes, NULL, 0, 0, NULL );
|
|
|
|
NtStatus = SamConnect(
|
|
NULL, // ServerName (Local machine)
|
|
pServerHandle,
|
|
ServerAccess,
|
|
&ObjectAttributes
|
|
);
|
|
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
|
|
//
|
|
// Lookup the DomainSid for AccountDomainName
|
|
//
|
|
|
|
NtStatus = SamLookupDomainInSamServer(
|
|
*pServerHandle,
|
|
&AccountDomainName,
|
|
DomainSid
|
|
);
|
|
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
//
|
|
// open the account domain
|
|
//
|
|
NtStatus = SamOpenDomain(
|
|
*pServerHandle,
|
|
DomainAccess,
|
|
*DomainSid,
|
|
pDomainHandle
|
|
);
|
|
if ( NT_SUCCESS(NtStatus) && BuiltinDomainSid != NULL ) {
|
|
//
|
|
// build the builtin domain sid
|
|
//
|
|
NtStatus = RtlAllocateAndInitializeSid(
|
|
&NtAuthority,
|
|
1,
|
|
SECURITY_BUILTIN_DOMAIN_RID,
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
BuiltinDomainSid
|
|
);
|
|
|
|
if ( NT_SUCCESS(NtStatus) && pBuiltinDomainHandle != NULL ) {
|
|
//
|
|
// open the builtin domain
|
|
//
|
|
NtStatus = SamOpenDomain(
|
|
*pServerHandle,
|
|
DomainAccess,
|
|
*BuiltinDomainSid,
|
|
pBuiltinDomainHandle
|
|
);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// free memory and clean up
|
|
//
|
|
if ( PolicyAccountDomainInfo != NULL ) {
|
|
LsaFreeMemory( PolicyAccountDomainInfo );
|
|
}
|
|
if ( PolicyPrimaryDomainInfo != NULL ) {
|
|
LsaFreeMemory( PolicyPrimaryDomainInfo );
|
|
}
|
|
|
|
if ( !NT_SUCCESS(NtStatus)) {
|
|
|
|
SamCloseHandle( *pDomainHandle );
|
|
*pDomainHandle = NULL;
|
|
|
|
if ( pBuiltinDomainHandle ) {
|
|
SamCloseHandle( *pBuiltinDomainHandle );
|
|
*pBuiltinDomainHandle = NULL;
|
|
}
|
|
SamCloseHandle( *pServerHandle );
|
|
*pServerHandle = NULL;
|
|
|
|
SamFreeMemory(*DomainSid);
|
|
*DomainSid = NULL;
|
|
|
|
if ( BuiltinDomainSid ) {
|
|
SamFreeMemory(*BuiltinDomainSid);
|
|
*BuiltinDomainSid = NULL;
|
|
}
|
|
|
|
}
|
|
return(NtStatus);
|
|
|
|
}
|
|
|
|
|
|
|
|
NTSTATUS
|
|
ScepLookupNamesInDomain(
|
|
IN SAM_HANDLE DomainHandle,
|
|
IN PSCE_NAME_LIST NameList,
|
|
OUT PUNICODE_STRING *Names,
|
|
OUT PULONG *RIDs,
|
|
OUT PSID_NAME_USE *Use,
|
|
OUT PULONG CountOfName
|
|
)
|
|
/* ++
|
|
Routine Description:
|
|
|
|
This routine looks up one or more names in the SAM account domain and
|
|
returns the relative IDs for each name in the list. The name list may
|
|
be user list, group list, or alias list.
|
|
|
|
Arguments:
|
|
|
|
DomainHandle - SAM handle to the account domain
|
|
|
|
NameList -- The list of names
|
|
|
|
Names - Translated UNICODE_STRING names. The name list must be freed by
|
|
|
|
RIDs -- List of relative IDs for each name
|
|
|
|
Use -- List of type for each name
|
|
|
|
CoutnOfName - The number of names in the list
|
|
|
|
Return value:
|
|
|
|
NTSTATUS
|
|
-- */
|
|
{
|
|
PSCE_NAME_LIST pUser;
|
|
ULONG cnt;
|
|
NTSTATUS NtStatus=ERROR_SUCCESS;
|
|
PUNICODE_STRING pUnicodeName=NULL;
|
|
|
|
|
|
UNICODE_STRING uName;
|
|
LPTSTR pTemp;
|
|
|
|
//
|
|
// Count how many names in the list
|
|
//
|
|
|
|
for (pUser=NameList, cnt=0;
|
|
pUser != NULL;
|
|
pUser = pUser->Next) {
|
|
|
|
if ( pUser->Name == NULL ) {
|
|
continue;
|
|
}
|
|
//
|
|
// note, this may be bigger than supposed to
|
|
//
|
|
cnt++;
|
|
}
|
|
|
|
if ( cnt > 0 ) {
|
|
//
|
|
// Allocate memory for UNICODE_STRING names
|
|
//
|
|
pUnicodeName = (PUNICODE_STRING)RtlAllocateHeap(
|
|
RtlProcessHeap(),
|
|
0,
|
|
cnt * sizeof (UNICODE_STRING)
|
|
);
|
|
if ( pUnicodeName == NULL ) {
|
|
NtStatus = STATUS_NO_MEMORY;
|
|
cnt = 0;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Initialize each UNICODE_STRING
|
|
//
|
|
for (pUser=NameList, cnt=0;
|
|
pUser != NULL;
|
|
pUser = pUser->Next) {
|
|
|
|
if ( pUser->Name == NULL ) {
|
|
continue;
|
|
}
|
|
|
|
pTemp = wcschr(pUser->Name, L'\\');
|
|
|
|
if ( pTemp ) {
|
|
|
|
uName.Buffer = pUser->Name;
|
|
uName.Length = ((USHORT)(pTemp-pUser->Name))*sizeof(TCHAR);
|
|
|
|
if ( !ScepIsDomainLocal(&uName) ) {
|
|
ScepLogOutput3(1, 0, SCEDLL_NO_MAPPINGS, pUser->Name);
|
|
continue;
|
|
}
|
|
pTemp++;
|
|
} else {
|
|
pTemp = pUser->Name;
|
|
}
|
|
|
|
RtlInitUnicodeString(&(pUnicodeName[cnt]), pTemp);
|
|
|
|
cnt++;
|
|
}
|
|
|
|
// lookup
|
|
NtStatus = SamLookupNamesInDomain(
|
|
DomainHandle,
|
|
cnt,
|
|
pUnicodeName,
|
|
RIDs,
|
|
Use
|
|
);
|
|
if ( !NT_SUCCESS(NtStatus) ) {
|
|
RtlFreeHeap(RtlProcessHeap(), 0, pUnicodeName);
|
|
pUnicodeName = NULL;
|
|
}
|
|
}
|
|
Done:
|
|
|
|
*CountOfName = cnt;
|
|
*Names = pUnicodeName;
|
|
|
|
return(NtStatus);
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
ScepGetLsaDomainInfo(
|
|
PPOLICY_ACCOUNT_DOMAIN_INFO *PolicyAccountDomainInfo,
|
|
PPOLICY_PRIMARY_DOMAIN_INFO *PolicyPrimaryDomainInfo
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine retrieves ACCOUNT domain information from the LSA
|
|
policy database.
|
|
|
|
|
|
Arguments:
|
|
|
|
PolicyAccountDomainInfo - Receives a pointer to a
|
|
POLICY_ACCOUNT_DOMAIN_INFO structure containing the account
|
|
domain info.
|
|
|
|
PolicyPrimaryDomainInfo - Receives a pointer to a
|
|
POLICY_PRIMARY_DOMAIN_INFO structure containing the Primary
|
|
domain info.
|
|
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS - Succeeded.
|
|
|
|
Other status values that may be returned from:
|
|
|
|
LsaOpenPolicy()
|
|
LsaQueryInformationPolicy()
|
|
--*/
|
|
|
|
{
|
|
NTSTATUS Status, IgnoreStatus;
|
|
|
|
LSA_HANDLE PolicyHandle;
|
|
OBJECT_ATTRIBUTES PolicyObjectAttributes;
|
|
|
|
//
|
|
// Open the policy database
|
|
//
|
|
|
|
InitializeObjectAttributes( &PolicyObjectAttributes,
|
|
NULL, // Name
|
|
0, // Attributes
|
|
NULL, // Root
|
|
NULL ); // Security Descriptor
|
|
|
|
Status = LsaOpenPolicy( NULL,
|
|
&PolicyObjectAttributes,
|
|
POLICY_VIEW_LOCAL_INFORMATION,
|
|
&PolicyHandle );
|
|
if ( NT_SUCCESS(Status) ) {
|
|
|
|
//
|
|
// Query the account domain information
|
|
//
|
|
|
|
Status = LsaQueryInformationPolicy( PolicyHandle,
|
|
PolicyAccountDomainInformation,
|
|
(PVOID *)PolicyAccountDomainInfo );
|
|
|
|
if ( NT_SUCCESS(Status) ) {
|
|
|
|
//
|
|
// Query the Primary domain information
|
|
//
|
|
|
|
Status = LsaQueryInformationPolicy( PolicyHandle,
|
|
PolicyPrimaryDomainInformation,
|
|
(PVOID *)PolicyPrimaryDomainInfo );
|
|
}
|
|
|
|
IgnoreStatus = LsaClose( PolicyHandle );
|
|
ASSERT(NT_SUCCESS(IgnoreStatus));
|
|
}
|
|
|
|
return(Status);
|
|
}
|
|
|
|
|
|
|
|
VOID
|
|
ScepConvertLogonHours(
|
|
IN PSCE_LOGON_HOUR pLogonHours,
|
|
OUT PUCHAR LogonHourBitMask
|
|
)
|
|
/* ++
|
|
Routine Description:
|
|
|
|
This routine converted the logon hour range in hours (for example, 7-20)
|
|
to logon hour bit mask (for example, 0001 1111 1111 1111 1000 0000,
|
|
for one day).
|
|
|
|
|
|
Arguments:
|
|
|
|
pLogonHours - The logon hour range (in hours)
|
|
|
|
LogonHourBitMask - The converted logon hour bit mask. Each bit represents
|
|
an hour. There are total 21 bytes (21*8 bits in this
|
|
argument, which represents a week (7 * 24 = 21 * 8).
|
|
Return value:
|
|
|
|
None
|
|
-- */
|
|
{ PSCE_LOGON_HOUR pTemp;
|
|
CHAR BitMask[3]={0,0,0};
|
|
ULONG j;
|
|
|
|
for ( pTemp=pLogonHours; pTemp != NULL; pTemp=pTemp->Next ) {
|
|
|
|
for (j=pTemp->Start; j<pTemp->End; j++)
|
|
BitMask[j / 8] |= 1 << (j % 8);
|
|
}
|
|
|
|
for ( j=0; j<7; j++ )
|
|
strncpy((CHAR *)&(LogonHourBitMask[j*3]), BitMask,3);
|
|
|
|
}
|
|
|
|
|
|
DWORD
|
|
ScepConvertToSceLogonHour(
|
|
IN PUCHAR LogonHourBitMask,
|
|
OUT PSCE_LOGON_HOUR *pLogonHours
|
|
)
|
|
/* ++
|
|
Routine Description:
|
|
|
|
This routine converted the logon hour bit mask (for example,
|
|
0001 1111 1111 1111 1000 0000 for one day) to SCE_LOGON_HOUR type,
|
|
which stores the logon hour range (start, end).
|
|
|
|
|
|
Arguments:
|
|
|
|
LogonHourBitMask - The logon hour bit mask to convert. Each bit represents
|
|
an hour. There are total 21 bytes (21*8 bits in this
|
|
argument, which represents a week (7 * 24 = 21 * 8).
|
|
|
|
pLogonHours - The logon hour range (in hours)
|
|
|
|
Return value:
|
|
|
|
None
|
|
-- */
|
|
{
|
|
BOOL findStart = TRUE;
|
|
DWORD i, j, rc=NO_ERROR;
|
|
DWORD start=0,
|
|
end=0;
|
|
LONG value;
|
|
|
|
PSCE_LOGON_HOUR pLogon=NULL;
|
|
|
|
if (pLogonHours == NULL )
|
|
return(ERROR_INVALID_PARAMETER);
|
|
|
|
|
|
for ( i=3; i<6; i++)
|
|
for ( j=0; j<8; j++) {
|
|
if ( findStart )
|
|
value = 1;
|
|
else
|
|
value = 0;
|
|
|
|
if ( (LogonHourBitMask[i] & (1 << j)) == value ) {
|
|
|
|
if ( findStart ) {
|
|
start = (i-3)*8 + j;
|
|
findStart = FALSE;
|
|
} else {
|
|
end = (i-3)*8 + j;
|
|
findStart = TRUE;
|
|
}
|
|
if ( findStart ) {
|
|
//
|
|
// find a pair
|
|
//
|
|
pLogon = (PSCE_LOGON_HOUR)ScepAlloc( (UINT)0, sizeof(SCE_LOGON_HOUR));
|
|
if ( pLogon == NULL ) {
|
|
rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
return(rc);
|
|
}
|
|
pLogon->Start = start;
|
|
pLogon->End = end;
|
|
pLogon->Next = *pLogonHours;
|
|
*pLogonHours = pLogon;
|
|
pLogon = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ( findStart == FALSE ) {
|
|
// find start but not end, which means end=24
|
|
end = 24;
|
|
pLogon = (PSCE_LOGON_HOUR)ScepAlloc( (UINT)0, sizeof(SCE_LOGON_HOUR));
|
|
if ( pLogon == NULL ) {
|
|
rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
return(rc);
|
|
}
|
|
pLogon->Start = start;
|
|
pLogon->End = end;
|
|
pLogon->Next = *pLogonHours;
|
|
*pLogonHours = pLogon;
|
|
pLogon = NULL;
|
|
|
|
}
|
|
|
|
return(rc);
|
|
}
|
|
|
|
|
|
|
|
NTSTATUS
|
|
ScepGetGroupsForAccount(
|
|
IN SAM_HANDLE DomainHandle,
|
|
IN SAM_HANDLE BuiltinDomainHandle,
|
|
IN SAM_HANDLE UserHandle,
|
|
IN PSID AccountSid,
|
|
OUT PSCE_NAME_LIST *GroupList
|
|
)
|
|
/* ++
|
|
Routine Description:
|
|
|
|
This routine queries the user's group membership.
|
|
|
|
Arguments:
|
|
|
|
DomainHandle - The SAM handle of the SAM account domain
|
|
|
|
BuiltindomainHandle - The SAM builtin domain handle
|
|
|
|
UserHandle - The SAM account handle for the user
|
|
|
|
AccountSid - The SID for the user
|
|
|
|
GroupList - The list of groups the user belongs to
|
|
|
|
Return value:
|
|
|
|
NTSTATUS
|
|
|
|
-- */
|
|
{
|
|
NTSTATUS NtStatus=ERROR_SUCCESS;
|
|
|
|
ULONG GroupCount=0,
|
|
AliasCount=0;
|
|
PULONG Aliases=NULL;
|
|
PGROUP_MEMBERSHIP GroupAttributes=NULL;
|
|
PULONG GroupIds=NULL;
|
|
PUNICODE_STRING Names=NULL;
|
|
PSID_NAME_USE Use=NULL;
|
|
|
|
DWORD i;
|
|
|
|
|
|
NtStatus = SamGetGroupsForUser(
|
|
UserHandle,
|
|
&GroupAttributes,
|
|
&GroupCount
|
|
);
|
|
|
|
if ( GroupCount == 0 )
|
|
NtStatus = ERROR_SUCCESS;
|
|
|
|
if ( !NT_SUCCESS(NtStatus) )
|
|
goto Done;
|
|
|
|
//
|
|
// See what local groups the account belongs to.
|
|
// account domain
|
|
//
|
|
|
|
NtStatus = SamGetAliasMembership(
|
|
DomainHandle,
|
|
1,
|
|
&AccountSid,
|
|
&AliasCount,
|
|
&Aliases );
|
|
|
|
if ( !NT_SUCCESS(NtStatus) )
|
|
goto Done;
|
|
|
|
if ( AliasCount != 0 || GroupCount != 0 ) {
|
|
|
|
//
|
|
// process each group's name in account domain
|
|
//
|
|
|
|
GroupIds = (PULONG)ScepAlloc((UINT)0,
|
|
(GroupCount+AliasCount)*sizeof(ULONG));
|
|
|
|
if ( GroupIds == NULL ) {
|
|
NtStatus = STATUS_NO_MEMORY;
|
|
goto Done;
|
|
}
|
|
|
|
for ( i=0; i<GroupCount; i++)
|
|
GroupIds[i] = GroupAttributes[i].RelativeId;
|
|
|
|
for ( i=0; i<AliasCount; i++)
|
|
GroupIds[i+GroupCount] = Aliases[i];
|
|
|
|
}
|
|
|
|
SamFreeMemory(GroupAttributes);
|
|
GroupAttributes = NULL;
|
|
|
|
SamFreeMemory(Aliases);
|
|
Aliases = NULL;
|
|
|
|
if ( AliasCount != 0 || GroupCount != 0 ) {
|
|
|
|
// lookup names
|
|
NtStatus = SamLookupIdsInDomain(
|
|
DomainHandle,
|
|
GroupCount+AliasCount,
|
|
GroupIds,
|
|
&Names,
|
|
&Use
|
|
);
|
|
|
|
if ( !NT_SUCCESS(NtStatus) )
|
|
goto Done;
|
|
}
|
|
|
|
for ( i=0; i<GroupCount+AliasCount; i++) {
|
|
if ( GroupIds[i] == DOMAIN_GROUP_RID_USERS )
|
|
continue;
|
|
switch (Use[i]) {
|
|
case SidTypeGroup:
|
|
case SidTypeAlias:
|
|
case SidTypeWellKnownGroup:
|
|
if ( ScepAddToNameList(GroupList, Names[i].Buffer, Names[i].Length/2) != NO_ERROR) {
|
|
NtStatus = STATUS_NO_MEMORY;
|
|
goto Done;
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ( GroupIds ) {
|
|
ScepFree(GroupIds);
|
|
GroupIds = NULL;
|
|
}
|
|
|
|
if ( Names ) {
|
|
SamFreeMemory(Names);
|
|
Names = NULL;
|
|
}
|
|
|
|
if ( Use ) {
|
|
SamFreeMemory(Use);
|
|
Use = NULL;
|
|
}
|
|
|
|
//
|
|
// check the builtin domain for alias membership
|
|
//
|
|
|
|
AliasCount=0;
|
|
NtStatus = SamGetAliasMembership(
|
|
BuiltinDomainHandle,
|
|
1,
|
|
&AccountSid,
|
|
&AliasCount,
|
|
&Aliases );
|
|
|
|
if ( !NT_SUCCESS(NtStatus) )
|
|
goto Done;
|
|
|
|
if ( AliasCount > 0 ) {
|
|
|
|
NtStatus = SamLookupIdsInDomain(
|
|
BuiltinDomainHandle,
|
|
AliasCount,
|
|
Aliases,
|
|
&Names,
|
|
&Use
|
|
);
|
|
|
|
if ( !NT_SUCCESS(NtStatus) )
|
|
goto Done;
|
|
}
|
|
|
|
for ( i=0; i<AliasCount; i++) {
|
|
if ( Aliases[i] == DOMAIN_GROUP_RID_USERS )
|
|
continue;
|
|
|
|
switch (Use[i]) {
|
|
case SidTypeGroup:
|
|
case SidTypeAlias:
|
|
case SidTypeWellKnownGroup:
|
|
if ( ScepAddToNameList(GroupList, Names[i].Buffer, Names[i].Length/2) != NO_ERROR) {
|
|
NtStatus = STATUS_NO_MEMORY;
|
|
goto Done;
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
Done:
|
|
|
|
if ( GroupAttributes != NULL )
|
|
SamFreeMemory(GroupAttributes);
|
|
|
|
if ( Aliases != NULL )
|
|
SamFreeMemory(Aliases);
|
|
|
|
if ( GroupIds != NULL )
|
|
ScepFree(GroupIds);
|
|
|
|
if ( Names != NULL )
|
|
SamFreeMemory(Names);
|
|
|
|
if ( Use != NULL )
|
|
SamFreeMemory(Use);
|
|
|
|
return(NtStatus);
|
|
|
|
}
|
|
|
|
|
|
|
|
ACCESS_MASK
|
|
ScepGetDesiredAccess(
|
|
IN SECURITY_OPEN_TYPE OpenType,
|
|
IN SECURITY_INFORMATION SecurityInfo
|
|
)
|
|
/*++
|
|
Routine Description:
|
|
|
|
Gets the access required to open object to be able to set or get the
|
|
specified security info.
|
|
|
|
Arguments:
|
|
|
|
OpenType - Flag indicating if the object is to be opened to read or
|
|
write the DACL
|
|
|
|
SecurityInfo - The Security information to read/write.
|
|
|
|
Return value:
|
|
|
|
Access mask
|
|
|
|
-- */
|
|
{
|
|
ACCESS_MASK DesiredAccess = 0;
|
|
|
|
if ( (SecurityInfo & OWNER_SECURITY_INFORMATION) ||
|
|
(SecurityInfo & GROUP_SECURITY_INFORMATION) )
|
|
{
|
|
switch (OpenType)
|
|
{
|
|
case READ_ACCESS_RIGHTS:
|
|
DesiredAccess |= READ_CONTROL;
|
|
break;
|
|
case WRITE_ACCESS_RIGHTS:
|
|
DesiredAccess |= WRITE_OWNER;
|
|
break;
|
|
case MODIFY_ACCESS_RIGHTS:
|
|
DesiredAccess |= READ_CONTROL | WRITE_OWNER;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (SecurityInfo & DACL_SECURITY_INFORMATION)
|
|
{
|
|
switch (OpenType)
|
|
{
|
|
case READ_ACCESS_RIGHTS:
|
|
DesiredAccess |= READ_CONTROL;
|
|
break;
|
|
case WRITE_ACCESS_RIGHTS:
|
|
DesiredAccess |= WRITE_DAC;
|
|
break;
|
|
case MODIFY_ACCESS_RIGHTS:
|
|
DesiredAccess |= READ_CONTROL | WRITE_DAC;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (SecurityInfo & SACL_SECURITY_INFORMATION)
|
|
{
|
|
DesiredAccess |= ACCESS_SYSTEM_SECURITY;
|
|
}
|
|
|
|
return (DesiredAccess);
|
|
}
|
|
|
|
|
|
SCESTATUS
|
|
ScepGetProfileOneArea(
|
|
IN PSCECONTEXT hProfile,
|
|
IN SCETYPE ProfileType,
|
|
IN AREA_INFORMATION Area,
|
|
IN DWORD dwAccountFormat,
|
|
OUT PSCE_PROFILE_INFO *ppInfoBuffer
|
|
)
|
|
/* ++
|
|
Routine Description:
|
|
|
|
A wrapper routine for GetDatabaseInfo except it get information
|
|
for one area at a call. This routine also logs the errors occur inside
|
|
GetSecrityProfileInfo
|
|
|
|
Arguments:
|
|
|
|
hProfile - Handle to a profile
|
|
|
|
ProfileType - The type of the profile
|
|
|
|
Area - The security area to read info from
|
|
|
|
ppInfoBuffer - output buffer for the info
|
|
|
|
Return value:
|
|
|
|
SCESTATUS returned from GetDatabaseInfo
|
|
|
|
-- */
|
|
{
|
|
SCESTATUS rc;
|
|
PSCE_ERROR_LOG_INFO pErrlog=NULL;
|
|
|
|
|
|
rc = ScepGetDatabaseInfo(
|
|
hProfile,
|
|
ProfileType,
|
|
Area,
|
|
dwAccountFormat,
|
|
ppInfoBuffer,
|
|
&pErrlog
|
|
);
|
|
|
|
ScepLogWriteError( pErrlog, 1 );
|
|
ScepFreeErrorLog( pErrlog );
|
|
|
|
return(rc);
|
|
}
|
|
|
|
|
|
SCESTATUS
|
|
ScepGetOneSection(
|
|
IN PSCECONTEXT hProfile,
|
|
IN AREA_INFORMATION Area,
|
|
IN PWSTR Name,
|
|
IN SCETYPE ProfileType,
|
|
OUT PVOID *ppInfo
|
|
)
|
|
/* ++
|
|
Routine Description:
|
|
|
|
This routine reads information for one or more Area and logs errors to
|
|
the log file. This routine should be only used by the SCP engine and
|
|
the SAP engine.
|
|
|
|
Arguments:
|
|
|
|
hProfile - Handle to a profile
|
|
|
|
ProfileType - The type of the profile
|
|
|
|
Area - The security area to read info from
|
|
|
|
Subarea - The subarea to read info from
|
|
|
|
ppInfo - output buffer for the info
|
|
|
|
Return value:
|
|
|
|
SCESTATUS
|
|
|
|
-- */
|
|
{
|
|
SCESTATUS rc;
|
|
PSCE_ERROR_LOG_INFO pErrlog=NULL;
|
|
|
|
if ( Name == NULL )
|
|
return(SCESTATUS_INVALID_PARAMETER);
|
|
|
|
if ( Area == AREA_REGISTRY_SECURITY ||
|
|
Area == AREA_FILE_SECURITY ||
|
|
Area == AREA_DS_OBJECTS ) {
|
|
|
|
rc = ScepGetObjectChildren(
|
|
hProfile,
|
|
ProfileType,
|
|
Area,
|
|
Name,
|
|
SCE_ALL_CHILDREN,
|
|
ppInfo,
|
|
&pErrlog
|
|
);
|
|
} else {
|
|
rc = ScepGetUserSection(
|
|
hProfile,
|
|
ProfileType,
|
|
Name,
|
|
ppInfo,
|
|
&pErrlog
|
|
);
|
|
}
|
|
|
|
ScepLogWriteError( pErrlog, 1 );
|
|
ScepFreeErrorLog( pErrlog );
|
|
|
|
return(rc);
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
ScepGetUserAccessAddress(
|
|
IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
|
|
IN PSID AccountSid,
|
|
OUT PACCESS_MASK *pUserAccess,
|
|
OUT PACCESS_MASK *pEveryone
|
|
)
|
|
{
|
|
NTSTATUS NtStatus;
|
|
PACL pAcl;
|
|
BOOLEAN aclPresent, tFlag;
|
|
DWORD i;
|
|
PVOID pAce;
|
|
PSID pSid;
|
|
ACCESS_MASK access;
|
|
SID_IDENTIFIER_AUTHORITY WorldAuth = SECURITY_WORLD_SID_AUTHORITY;
|
|
PSID EveryoneSid=NULL;
|
|
|
|
|
|
if ( AccountSid == NULL || pUserAccess == NULL || pEveryone == NULL )
|
|
return(STATUS_INVALID_PARAMETER);
|
|
|
|
*pUserAccess = NULL;
|
|
*pEveryone = NULL;
|
|
|
|
if ( pSecurityDescriptor == NULL )
|
|
return(STATUS_SUCCESS);
|
|
|
|
NtStatus = RtlGetDaclSecurityDescriptor(
|
|
pSecurityDescriptor,
|
|
&aclPresent,
|
|
&pAcl,
|
|
&tFlag);
|
|
|
|
if ( NT_SUCCESS(NtStatus) )
|
|
|
|
NtStatus = RtlAllocateAndInitializeSid(
|
|
&WorldAuth,
|
|
1,
|
|
SECURITY_CREATOR_OWNER_RID,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
&EveryoneSid );
|
|
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
|
|
if ( pAcl != NULL && aclPresent ) {
|
|
|
|
for ( i=0; i < pAcl->AceCount; i++) {
|
|
NtStatus = RtlGetAce( pAcl, i, &pAce );
|
|
if ( !NT_SUCCESS( NtStatus ) )
|
|
break;
|
|
|
|
access = 0;
|
|
pSid = NULL;
|
|
|
|
switch ( ((PACE_HEADER)pAce)->AceType ) {
|
|
case ACCESS_ALLOWED_ACE_TYPE:
|
|
pSid = (PSID)&((PACCESS_ALLOWED_ACE)pAce)->SidStart;
|
|
access = ((PACCESS_ALLOWED_ACE)pAce)->Mask;
|
|
|
|
if ( EqualSid( AccountSid, pSid ) )
|
|
*pUserAccess = &(((PACCESS_ALLOWED_ACE)pAce)->Mask);
|
|
|
|
else if ( EqualSid( EveryoneSid, pSid) )
|
|
*pEveryone = &(((PACCESS_ALLOWED_ACE)pAce)->Mask);
|
|
|
|
break;
|
|
|
|
case ACCESS_DENIED_ACE_TYPE:
|
|
// do not look for denied ace type because it is not used here
|
|
// pSid = (PSID)&((PACCESS_DENIED_ACE)pAce)->SidStart;
|
|
// access = ((PACCESS_DENIED_ACE)pAce)->Mask;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if ( *pUserAccess != NULL && *pEveryone != NULL )
|
|
// stop the loop because both are found
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// free EveryoneSid
|
|
//
|
|
if (EveryoneSid) {
|
|
RtlFreeSid(EveryoneSid);
|
|
EveryoneSid = NULL;
|
|
}
|
|
return(NtStatus);
|
|
}
|
|
|
|
BOOL
|
|
ScepLastBackSlash(
|
|
IN PWSTR Name
|
|
)
|
|
{
|
|
if (Name == NULL )
|
|
return(FALSE);
|
|
|
|
if ( Name[wcslen(Name)-1] == L'\\')
|
|
return(TRUE);
|
|
else
|
|
return(FALSE);
|
|
|
|
}
|
|
|
|
|
|
DWORD
|
|
ScepGetUsersHomeDirectory(
|
|
IN UNICODE_STRING AssignedHomeDir,
|
|
IN PWSTR UserProfileName,
|
|
OUT PWSTR *UserHomeDir
|
|
)
|
|
/*++
|
|
Routine Description:
|
|
|
|
This routine gets user's default home directory. The home directory is
|
|
determined 1) if it is assigned in the user's object (user profile), 2)
|
|
if there is a HomePath environment variable defined for the user, and
|
|
3). Harcoded.
|
|
|
|
Arguments:
|
|
|
|
AssignedHomeDir - The home directory explicitly assigned in the user's
|
|
object.
|
|
|
|
UserProfileName - The user's environment profile name
|
|
|
|
UserHomeDir - The returned home directory for the user
|
|
|
|
Return Value:
|
|
|
|
Win32 error code.
|
|
|
|
--*/
|
|
{
|
|
DWORD Win32rc=NO_ERROR;
|
|
PWSTR StrValue=NULL;
|
|
|
|
PWSTR SystemRoot=NULL;
|
|
DWORD DirSize=0;
|
|
|
|
*UserHomeDir = NULL;
|
|
|
|
//
|
|
// if there is a home directory assigned in the user profile, use it.
|
|
//
|
|
if ( AssignedHomeDir.Length > 0 && AssignedHomeDir.Buffer != NULL ) {
|
|
*UserHomeDir = (PWSTR)ScepAlloc( LMEM_ZEROINIT, AssignedHomeDir.Length+2);
|
|
if ( *UserHomeDir == NULL )
|
|
return(ERROR_NOT_ENOUGH_MEMORY);
|
|
|
|
wcsncpy(*UserHomeDir, AssignedHomeDir.Buffer, AssignedHomeDir.Length/2);
|
|
return(NO_ERROR);
|
|
}
|
|
|
|
//
|
|
// Home directory is NULL in user profile, the HomePath environment
|
|
// is searched.
|
|
//
|
|
|
|
Win32rc = ScepGetNTDirectory( &SystemRoot, &DirSize, SCE_FLAG_WINDOWS_DIR );
|
|
if ( Win32rc != NO_ERROR ) {
|
|
ScepLogOutput3(1, Win32rc, SCEDLL_ERROR_QUERY_INFO, L"%WinDir%");
|
|
return(Win32rc);
|
|
}
|
|
|
|
Win32rc = ScepGetEnvVarsFromProfile(
|
|
UserProfileName,
|
|
L"HomePath",
|
|
NULL,
|
|
&StrValue
|
|
);
|
|
|
|
if ( Win32rc == NO_ERROR && StrValue != NULL ) {
|
|
*UserHomeDir = (PWSTR)ScepAlloc( LMEM_ZEROINIT, (wcslen(StrValue)+3)*sizeof(WCHAR));
|
|
if ( *UserHomeDir == NULL )
|
|
Win32rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
else {
|
|
swprintf(*UserHomeDir+1, L":%s", StrValue);
|
|
**UserHomeDir = SystemRoot[0];
|
|
}
|
|
} else
|
|
Win32rc = NO_ERROR; // do not care if can't get environment variable's value
|
|
|
|
if ( SystemRoot != NULL )
|
|
ScepFree(SystemRoot);
|
|
|
|
if ( StrValue != NULL )
|
|
ScepFree( StrValue );
|
|
|
|
return(Win32rc);
|
|
}
|
|
|
|
|
|
DWORD
|
|
ScepGetEnvVarsFromProfile(
|
|
IN PWSTR UserProfileName,
|
|
IN PCWSTR VarName1,
|
|
IN PCWSTR VarName2 OPTIONAL,
|
|
OUT PWSTR *StrValue
|
|
)
|
|
{
|
|
DWORD rc;
|
|
DWORD RegType;
|
|
|
|
|
|
rc = SceAdjustPrivilege(SE_RESTORE_PRIVILEGE, TRUE, NULL);
|
|
|
|
if ( rc == ERROR_SUCCESS ) {
|
|
rc = RegLoadKey(HKEY_USERS, L"TEMP", UserProfileName);
|
|
|
|
if ( rc == ERROR_SUCCESS ) {
|
|
rc = ScepRegQueryValue(
|
|
HKEY_USERS,
|
|
L"TEMP\\Environment",
|
|
VarName1,
|
|
(PVOID *)StrValue,
|
|
&RegType
|
|
);
|
|
|
|
if ( rc != ERROR_SUCCESS && VarName2 != NULL ) {
|
|
rc = ScepRegQueryValue(
|
|
HKEY_USERS,
|
|
L"TEMP\\Environment",
|
|
VarName2,
|
|
(PVOID *)StrValue,
|
|
&RegType
|
|
);
|
|
}
|
|
|
|
RegUnLoadKey(HKEY_USERS, L"TEMP");
|
|
|
|
} else { //if ( rc == ERROR_ALREADY_IN_USE) {
|
|
//
|
|
// this profile already in use. Open the one in HKEY_CURRENT_USER
|
|
//
|
|
rc = ScepRegQueryValue(
|
|
HKEY_CURRENT_USER,
|
|
L"Environment",
|
|
VarName1,
|
|
(PVOID *)StrValue,
|
|
&RegType
|
|
);
|
|
|
|
if ( rc != ERROR_SUCCESS && VarName2 != NULL ) {
|
|
rc = ScepRegQueryValue(
|
|
HKEY_CURRENT_USER,
|
|
L"Environment",
|
|
VarName2,
|
|
(PVOID *)StrValue,
|
|
&RegType
|
|
);
|
|
}
|
|
|
|
}
|
|
SceAdjustPrivilege(SE_RESTORE_PRIVILEGE, FALSE, NULL);
|
|
}
|
|
|
|
return(rc);
|
|
}
|
|
|
|
|
|
DWORD
|
|
ScepGetUsersTempDirectory(
|
|
IN PWSTR UserProfileName,
|
|
OUT PWSTR *UserTempDir
|
|
)
|
|
/*++
|
|
Routine Description:
|
|
|
|
This routine returns the user's temp directory. Temp directory for a
|
|
user is determined 1) environment variable "TEMP" or "TMP" defined
|
|
in the user's environment profile, or 2) Harcoded to %systemDrive%\TEMP
|
|
|
|
Arguments:
|
|
|
|
UserProfileName - The user's environment profile name
|
|
|
|
UserTempDir - The returned temp directory for the user
|
|
|
|
Return Value:
|
|
|
|
Win32 error code
|
|
|
|
--*/
|
|
{
|
|
DWORD rc=NO_ERROR;
|
|
PWSTR StrValue=NULL;
|
|
|
|
PWSTR SystemRoot=NULL;
|
|
DWORD DirSize=0;
|
|
|
|
|
|
//
|
|
// query the TEMP/TMP environment variable(s)
|
|
//
|
|
if ( UserProfileName != NULL ) {
|
|
ScepGetEnvVarsFromProfile(
|
|
UserProfileName,
|
|
L"TEMP",
|
|
L"TMP",
|
|
&StrValue
|
|
);
|
|
}
|
|
if ( StrValue != NULL ) {
|
|
//
|
|
// find the setting for temp dir
|
|
//
|
|
|
|
if ( wcsstr(_wcsupr(StrValue), L"%") != NULL ) {
|
|
|
|
rc = ScepTranslateFileDirName( StrValue, UserTempDir );
|
|
}
|
|
if ( rc == NO_ERROR ) {
|
|
ScepFree(StrValue);
|
|
} else
|
|
*UserTempDir = StrValue;
|
|
|
|
StrValue = NULL;
|
|
|
|
} else {
|
|
//
|
|
// hardcoded to %SystemDrive%\TEMP
|
|
//
|
|
rc = ScepGetNTDirectory( &SystemRoot, &DirSize, SCE_FLAG_WINDOWS_DIR );
|
|
if ( rc != NO_ERROR ) {
|
|
ScepLogOutput3(1, rc, SCEDLL_ERROR_QUERY_INFO, L"%WinDir%");
|
|
return(rc);
|
|
}
|
|
*UserTempDir = (PWSTR)ScepAlloc( 0, 8*sizeof(WCHAR));
|
|
if ( *UserTempDir == NULL )
|
|
rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
else {
|
|
swprintf(*UserTempDir+1, L":\\TEMP");
|
|
**UserTempDir = SystemRoot[0];
|
|
}
|
|
}
|
|
|
|
if (SystemRoot != NULL )
|
|
ScepFree(SystemRoot);
|
|
|
|
return(rc);
|
|
}
|
|
|
|
|
|
SCESTATUS
|
|
ScepGetRegKeyCase(
|
|
IN PWSTR ObjName,
|
|
IN DWORD BufOffset,
|
|
IN DWORD BufLen
|
|
)
|
|
{
|
|
DWORD Win32rc;
|
|
HKEY hKey=NULL;
|
|
|
|
PWSTR Buffer=NULL;
|
|
TCHAR Buffer1[MAX_PATH];
|
|
DWORD BufSize, index;
|
|
FILETIME LastWriteTime;
|
|
|
|
|
|
if ( BufOffset <= 0 || BufLen <= 0 ) {
|
|
_wcsupr(ObjName);
|
|
return(SCESTATUS_SUCCESS);
|
|
}
|
|
|
|
Buffer = (PWSTR)ScepAlloc(LMEM_ZEROINIT, BufOffset*sizeof(WCHAR));
|
|
|
|
if ( Buffer != NULL ) {
|
|
|
|
wcsncpy(Buffer, ObjName, BufOffset-1);
|
|
|
|
Win32rc = ScepOpenRegistryObject(
|
|
SE_REGISTRY_KEY,
|
|
Buffer,
|
|
KEY_READ,
|
|
&hKey
|
|
);
|
|
if ( Win32rc == NO_ERROR ) {
|
|
|
|
index = 0;
|
|
//
|
|
// enumerate all subkeys of the key
|
|
//
|
|
do {
|
|
memset(Buffer1, '\0', MAX_PATH*sizeof(WCHAR));
|
|
BufSize = MAX_PATH;
|
|
|
|
Win32rc = RegEnumKeyEx(hKey,
|
|
index,
|
|
Buffer1,
|
|
&BufSize,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&LastWriteTime);
|
|
|
|
if ( Win32rc == ERROR_SUCCESS ) {
|
|
index++;
|
|
//
|
|
// find if the subkey matches the object name
|
|
//
|
|
if ( _wcsicmp(ObjName+BufOffset, Buffer1) == 0 )
|
|
break;
|
|
}
|
|
|
|
} while ( Win32rc != ERROR_NO_MORE_ITEMS );
|
|
|
|
RegCloseKey(hKey);
|
|
|
|
if ( Win32rc == ERROR_SUCCESS ) {
|
|
//
|
|
// find it
|
|
//
|
|
if ( BufSize > BufLen )
|
|
BufSize = BufLen;
|
|
|
|
wcsncpy(ObjName+BufOffset, Buffer1, BufSize);
|
|
*(ObjName+BufOffset+BufSize) = L'\0';
|
|
|
|
} else if ( Win32rc == ERROR_NO_MORE_ITEMS) {
|
|
//
|
|
// does not find it
|
|
//
|
|
Win32rc = ERROR_FILE_NOT_FOUND;
|
|
}
|
|
|
|
}
|
|
ScepFree(Buffer);
|
|
|
|
} else
|
|
Win32rc = ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
if ( Win32rc != NO_ERROR ) {
|
|
//
|
|
// convert everything to uppercase
|
|
//
|
|
_wcsupr(ObjName+BufOffset);
|
|
}
|
|
|
|
return(ScepDosErrorToSceStatus(Win32rc));
|
|
|
|
}
|
|
|
|
|
|
SCESTATUS
|
|
ScepGetFileCase(
|
|
IN PWSTR ObjName,
|
|
IN DWORD BufOffset,
|
|
IN DWORD BufLen
|
|
)
|
|
{
|
|
|
|
intptr_t hFile;
|
|
struct _wfinddata_t FileInfo;
|
|
|
|
hFile = _wfindfirst(ObjName, &FileInfo);
|
|
|
|
if ( hFile != -1 ) {
|
|
|
|
wcsncpy(ObjName+BufOffset, FileInfo.name, BufLen);
|
|
|
|
_findclose(hFile);
|
|
|
|
} else
|
|
return(ScepDosErrorToSceStatus(GetLastError()));
|
|
|
|
return(SCESTATUS_SUCCESS);
|
|
}
|
|
|
|
|
|
SCESTATUS
|
|
ScepGetGroupCase(
|
|
IN OUT PWSTR GroupName,
|
|
IN DWORD Length
|
|
)
|
|
{
|
|
NTSTATUS NtStatus;
|
|
|
|
SAM_HANDLE ServerHandle=NULL,
|
|
DomainHandle=NULL,
|
|
BuiltinDomainHandle=NULL,
|
|
ThisDomain=NULL,
|
|
GroupHandle=NULL;
|
|
|
|
PSID DomainSid=NULL,
|
|
BuiltinDomainSid=NULL;
|
|
UNICODE_STRING Name;
|
|
PULONG GrpId=NULL;
|
|
PSID_NAME_USE GrpUse=NULL;
|
|
PVOID pNameInfo=NULL;
|
|
|
|
NtStatus = ScepOpenSamDomain(
|
|
SAM_SERVER_READ | SAM_SERVER_EXECUTE,
|
|
DOMAIN_READ | DOMAIN_EXECUTE,
|
|
&ServerHandle,
|
|
&DomainHandle,
|
|
&DomainSid,
|
|
&BuiltinDomainHandle,
|
|
&BuiltinDomainSid
|
|
);
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
|
|
RtlInitUnicodeString(&Name, GroupName);
|
|
|
|
NtStatus = SamLookupNamesInDomain(
|
|
DomainHandle,
|
|
1,
|
|
&Name,
|
|
&GrpId,
|
|
&GrpUse
|
|
);
|
|
ThisDomain = DomainHandle;
|
|
|
|
if ( NtStatus == STATUS_NONE_MAPPED ) {
|
|
//
|
|
// not found in account domain. Lookup in the builtin domain
|
|
//
|
|
NtStatus = SamLookupNamesInDomain(
|
|
BuiltinDomainHandle,
|
|
1,
|
|
&Name,
|
|
&GrpId,
|
|
&GrpUse
|
|
);
|
|
ThisDomain=BuiltinDomainHandle;
|
|
}
|
|
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
|
|
switch ( GrpUse[0] ) {
|
|
case SidTypeGroup:
|
|
NtStatus = SamOpenGroup(
|
|
ThisDomain,
|
|
GROUP_READ | GROUP_EXECUTE,
|
|
GrpId[0],
|
|
&GroupHandle
|
|
);
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
|
|
NtStatus = SamQueryInformationGroup(
|
|
GroupHandle,
|
|
GroupNameInformation,
|
|
&pNameInfo
|
|
);
|
|
}
|
|
|
|
break;
|
|
case SidTypeAlias:
|
|
NtStatus = SamOpenAlias(
|
|
ThisDomain,
|
|
ALIAS_READ | ALIAS_EXECUTE,
|
|
GrpId[0],
|
|
&GroupHandle
|
|
);
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
|
|
NtStatus = SamQueryInformationAlias(
|
|
GroupHandle,
|
|
AliasNameInformation,
|
|
&pNameInfo
|
|
);
|
|
}
|
|
break;
|
|
default:
|
|
NtStatus = STATUS_NONE_MAPPED;
|
|
break;
|
|
}
|
|
|
|
if ( NT_SUCCESS(NtStatus) ) {
|
|
//
|
|
// get name information
|
|
//
|
|
if ( ((PGROUP_NAME_INFORMATION)pNameInfo)->Name.Buffer != NULL &&
|
|
((PGROUP_NAME_INFORMATION)pNameInfo)->Name.Length > 0 ) {
|
|
|
|
if ( Length > (DWORD)(((PGROUP_NAME_INFORMATION)pNameInfo)->Name.Length/2) ) {
|
|
|
|
wcsncpy(GroupName, ((PGROUP_NAME_INFORMATION)pNameInfo)->Name.Buffer,
|
|
((PGROUP_NAME_INFORMATION)pNameInfo)->Name.Length/2);
|
|
} else {
|
|
wcsncpy(GroupName, ((PGROUP_NAME_INFORMATION)pNameInfo)->Name.Buffer,
|
|
Length);
|
|
}
|
|
|
|
} else
|
|
NtStatus = STATUS_NONE_MAPPED;
|
|
|
|
SamFreeMemory(pNameInfo);
|
|
}
|
|
|
|
if (GroupHandle)
|
|
SamCloseHandle(GroupHandle);
|
|
|
|
SamFreeMemory(GrpId);
|
|
SamFreeMemory(GrpUse);
|
|
}
|
|
SamCloseHandle( DomainHandle );
|
|
SamCloseHandle( BuiltinDomainHandle );
|
|
SamCloseHandle( ServerHandle );
|
|
|
|
SamFreeMemory(DomainSid);
|
|
RtlFreeSid(BuiltinDomainSid);
|
|
}
|
|
|
|
return(ScepDosErrorToSceStatus( RtlNtStatusToDosError(NtStatus) ));
|
|
}
|
|
|
|
|
|
|
|
VOID
|
|
ScepPrintSecurityDescriptor(
|
|
IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
|
|
IN BOOL ToDumpSD
|
|
)
|
|
{
|
|
if (pSecurityDescriptor != NULL) {
|
|
|
|
if ( ToDumpSD )
|
|
DumpSECURITY_DESCRIPTOR(pSecurityDescriptor);
|
|
else
|
|
printf("Security Descriptor\n");
|
|
}
|
|
}
|
|
|
|
|