ReactOS 0.4.15-dev-7907-g95bf896
msv1_0.c File Reference
#include "precomp.h"
Include dependency graph for msv1_0.c:

Go to the source code of this file.

Functions

 WINE_DEFAULT_DEBUG_CHANNEL (msv1_0)
 
static NTSTATUS BuildInteractiveProfileBuffer (IN PLSA_CLIENT_REQUEST ClientRequest, IN PSAMPR_USER_INFO_BUFFER UserInfo, IN PWSTR ComputerName, OUT PMSV1_0_INTERACTIVE_PROFILE *ProfileBuffer, OUT PULONG ProfileBufferLength)
 
static NTSTATUS BuildLm20LogonProfileBuffer (_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ PSAMPR_USER_INFO_BUFFER UserInfo, _In_ PLSA_SAM_PWD_DATA LogonPwdData, _Out_ PMSV1_0_LM20_LOGON_PROFILE *ProfileBuffer, _Out_ PULONG ProfileBufferLength)
 
static PSID AppendRidToSid (PSID SrcSid, ULONG Rid)
 
static NTSTATUS BuildTokenUser (OUT PTOKEN_USER User, IN PSID AccountDomainSid, IN ULONG RelativeId)
 
static NTSTATUS BuildTokenPrimaryGroup (OUT PTOKEN_PRIMARY_GROUP PrimaryGroup, IN PSID AccountDomainSid, IN ULONG RelativeId)
 
static NTSTATUS BuildTokenGroups (OUT PTOKEN_GROUPS *Groups, IN PSID AccountDomainSid, IN ULONG RelativeId, IN BOOL SpecialAccount)
 
static NTSTATUS BuildTokenInformationBuffer (PLSA_TOKEN_INFORMATION_V1 *TokenInformation, PRPC_SID AccountDomainSid, PSAMPR_USER_INFO_BUFFER UserInfo, BOOL SpecialAccount)
 
static NTSTATUS MsvpChangePassword (IN PLSA_CLIENT_REQUEST ClientRequest, IN PVOID ProtocolSubmitBuffer, IN PVOID ClientBufferBase, IN ULONG SubmitBufferLength, OUT PVOID *ProtocolReturnBuffer, OUT PULONG ReturnBufferLength, OUT PNTSTATUS ProtocolStatus)
 
NTSTATUS NTAPI LsaApCallPackage (IN PLSA_CLIENT_REQUEST ClientRequest, IN PVOID ProtocolSubmitBuffer, IN PVOID ClientBufferBase, IN ULONG SubmitBufferLength, OUT PVOID *ProtocolReturnBuffer, OUT PULONG ReturnBufferLength, OUT PNTSTATUS ProtocolStatus)
 
NTSTATUS NTAPI LsaApCallPackagePassthrough (IN PLSA_CLIENT_REQUEST ClientRequest, IN PVOID ProtocolSubmitBuffer, IN PVOID ClientBufferBase, IN ULONG SubmitBufferLength, OUT PVOID *ProtocolReturnBuffer, OUT PULONG ReturnBufferLength, OUT PNTSTATUS ProtocolStatus)
 
NTSTATUS NTAPI LsaApCallPackageUntrusted (IN PLSA_CLIENT_REQUEST ClientRequest, IN PVOID ProtocolSubmitBuffer, IN PVOID ClientBufferBase, IN ULONG SubmitBufferLength, OUT PVOID *ProtocolReturnBuffer, OUT PULONG ReturnBufferLength, OUT PNTSTATUS ProtocolStatus)
 
NTSTATUS NTAPI LsaApInitializePackage (IN ULONG AuthenticationPackageId, IN PLSA_DISPATCH_TABLE LsaDispatchTable, IN PLSA_STRING Database OPTIONAL, IN PLSA_STRING Confidentiality OPTIONAL, OUT PLSA_STRING *AuthenticationPackageName)
 
VOID NTAPI LsaApLogonTerminated (IN PLUID LogonId)
 
static NTSTATUS LsaApLogonUserEx2_Network (_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ PVOID ProtocolSubmitBuffer, _In_ PVOID ClientBufferBase, _In_ ULONG SubmitBufferSize, _In_ PUNICODE_STRING ComputerName, _Out_ PUNICODE_STRING *LogonUserRef, _Out_ PUNICODE_STRING *LogonDomainRef, _Inout_ PLSA_SAM_PWD_DATA LogonPwdData, _Out_ SAMPR_HANDLE *UserHandlePtr, _Out_ PSAMPR_USER_INFO_BUFFER *UserInfoPtr, _Out_ PRPC_SID *AccountDomainSidPtr, _Out_ PBOOL SpecialAccount, _Out_ PMSV1_0_LM20_LOGON_PROFILE *LogonProfile, _Out_ PULONG LogonProfileSize, _Out_ PNTSTATUS SubStatus)
 
NTSTATUS NTAPI LsaApLogonUserEx2 (IN PLSA_CLIENT_REQUEST ClientRequest, IN SECURITY_LOGON_TYPE LogonType, IN PVOID ProtocolSubmitBuffer, IN PVOID ClientBufferBase, IN ULONG SubmitBufferSize, OUT PVOID *ProfileBuffer, OUT PULONG ProfileBufferSize, OUT PLUID LogonId, OUT PNTSTATUS SubStatus, OUT PLSA_TOKEN_INFORMATION_TYPE TokenInformationType, OUT PVOID *TokenInformation, OUT PUNICODE_STRING *AccountName, OUT PUNICODE_STRING *AuthenticatingAuthority, OUT PUNICODE_STRING *MachineName, OUT PSECPKG_PRIMARY_CRED PrimaryCredentials, OUT PSECPKG_SUPPLEMENTAL_CRED_ARRAY *SupplementalCredentials)
 
NTSTATUS NTAPI SpLsaModeInitialize (_In_ ULONG LsaVersion, _Out_ PULONG PackageVersion, _Out_ PSECPKG_FUNCTION_TABLE *ppTables, _Out_ PULONG pcTables)
 
NTSTATUS WINAPI SpUserModeInitialize (_In_ ULONG LsaVersion, _Out_ PULONG PackageVersion, _Out_ PSECPKG_USER_FUNCTION_TABLE *ppTables, _Out_ PULONG pcTables)
 

Function Documentation

◆ AppendRidToSid()

static PSID AppendRidToSid ( PSID  SrcSid,
ULONG  Rid 
)
static

Definition at line 280 of file msv1_0.c.

282{
283 PSID DstSid = NULL;
284 UCHAR RidCount;
285
286 RidCount = *RtlSubAuthorityCountSid(SrcSid);
287 if (RidCount >= 8)
288 return NULL;
289
290 DstSid = DispatchTable.AllocateLsaHeap(RtlLengthRequiredSid(RidCount + 1));
291 if (DstSid == NULL)
292 return NULL;
293
294 RtlCopyMemory(DstSid,
295 SrcSid,
296 RtlLengthRequiredSid(RidCount));
297
298 *RtlSubAuthorityCountSid(DstSid) = RidCount + 1;
299 *RtlSubAuthoritySid(DstSid, RidCount) = Rid;
300
301 return DstSid;
302}
#define NULL
Definition: types.h:112
NTSYSAPI PULONG NTAPI RtlSubAuthoritySid(_In_ PSID Sid, _In_ ULONG SubAuthority)
NTSYSAPI ULONG NTAPI RtlLengthRequiredSid(IN ULONG SubAuthorityCount)
Definition: sid.c:54
NTSYSAPI PUCHAR NTAPI RtlSubAuthorityCountSid(IN PSID Sid)
Definition: sid.c:104
#define RtlCopyMemory(Destination, Source, Length)
Definition: typedefs.h:263
_In_ PWDFDEVICE_INIT _In_ PWDF_PDO_EVENT_CALLBACKS DispatchTable
Definition: wdfpdo.h:248
unsigned char UCHAR
Definition: xmlstorage.h:181

Referenced by BuildTokenGroups(), BuildTokenPrimaryGroup(), BuildTokenUser(), SampCreateAccountSid(), SampInitializeSAM(), and SampSetupCreateUserAccount().

◆ BuildInteractiveProfileBuffer()

static NTSTATUS BuildInteractiveProfileBuffer ( IN PLSA_CLIENT_REQUEST  ClientRequest,
IN PSAMPR_USER_INFO_BUFFER  UserInfo,
IN PWSTR  ComputerName,
OUT PMSV1_0_INTERACTIVE_PROFILE ProfileBuffer,
OUT PULONG  ProfileBufferLength 
)
static

Definition at line 20 of file msv1_0.c.

25{
27 PVOID ClientBaseAddress = NULL;
28 LPWSTR Ptr;
30 USHORT ComputerNameLength;
32
35
36 if (UIntPtrToUShort(wcslen(ComputerName), &ComputerNameLength) != S_OK)
37 {
39 }
40
42 UserInfo->All.FullName.Length + sizeof(WCHAR) +
43 UserInfo->All.HomeDirectory.Length + sizeof(WCHAR) +
44 UserInfo->All.HomeDirectoryDrive.Length + sizeof(WCHAR) +
45 UserInfo->All.ScriptPath.Length + sizeof(WCHAR) +
46 UserInfo->All.ProfilePath.Length + sizeof(WCHAR) +
47 ((ComputerNameLength + 3) * sizeof(WCHAR));
48
49 LocalBuffer = DispatchTable.AllocateLsaHeap(BufferLength);
50 if (LocalBuffer == NULL)
51 {
52 TRACE("Failed to allocate the local buffer!\n");
54 goto done;
55 }
56
57 Status = DispatchTable.AllocateClientBuffer(ClientRequest,
59 &ClientBaseAddress);
60 if (!NT_SUCCESS(Status))
61 {
62 TRACE("DispatchTable.AllocateClientBuffer failed (Status 0x%08lx)\n", Status);
63 goto done;
64 }
65
66 TRACE("ClientBaseAddress: %p\n", ClientBaseAddress);
67
68 Ptr = (LPWSTR)((ULONG_PTR)LocalBuffer + sizeof(MSV1_0_INTERACTIVE_PROFILE));
69
71 LocalBuffer->LogonCount = UserInfo->All.LogonCount;
72 LocalBuffer->BadPasswordCount = UserInfo->All.BadPasswordCount;
73
74 LocalBuffer->LogonTime.LowPart = UserInfo->All.LastLogon.LowPart;
75 LocalBuffer->LogonTime.HighPart = UserInfo->All.LastLogon.HighPart;
76
77 LocalBuffer->LogoffTime.LowPart = UserInfo->All.AccountExpires.LowPart;
78 LocalBuffer->LogoffTime.HighPart = UserInfo->All.AccountExpires.HighPart;
79
80 LocalBuffer->KickOffTime.LowPart = UserInfo->All.AccountExpires.LowPart;
81 LocalBuffer->KickOffTime.HighPart = UserInfo->All.AccountExpires.HighPart;
82
83 LocalBuffer->PasswordLastSet.LowPart = UserInfo->All.PasswordLastSet.LowPart;
84 LocalBuffer->PasswordLastSet.HighPart = UserInfo->All.PasswordLastSet.HighPart;
85
86 LocalBuffer->PasswordCanChange.LowPart = UserInfo->All.PasswordCanChange.LowPart;
87 LocalBuffer->PasswordCanChange.HighPart = UserInfo->All.PasswordCanChange.HighPart;
88
89 LocalBuffer->PasswordMustChange.LowPart = UserInfo->All.PasswordMustChange.LowPart;
90 LocalBuffer->PasswordMustChange.HighPart = UserInfo->All.PasswordMustChange.HighPart;
91
92 LocalBuffer->LogonScript.Length = UserInfo->All.ScriptPath.Length;
93 LocalBuffer->LogonScript.MaximumLength = UserInfo->All.ScriptPath.Length + sizeof(WCHAR);
94 LocalBuffer->LogonScript.Buffer = (LPWSTR)((ULONG_PTR)ClientBaseAddress + (ULONG_PTR)Ptr - (ULONG_PTR)LocalBuffer);
95 memcpy(Ptr,
96 UserInfo->All.ScriptPath.Buffer,
97 UserInfo->All.ScriptPath.Length);
98
99 Ptr = (LPWSTR)((ULONG_PTR)Ptr + LocalBuffer->LogonScript.MaximumLength);
100
101 LocalBuffer->HomeDirectory.Length = UserInfo->All.HomeDirectory.Length;
102 LocalBuffer->HomeDirectory.MaximumLength = UserInfo->All.HomeDirectory.Length + sizeof(WCHAR);
103 LocalBuffer->HomeDirectory.Buffer = (LPWSTR)((ULONG_PTR)ClientBaseAddress + (ULONG_PTR)Ptr - (ULONG_PTR)LocalBuffer);
104 memcpy(Ptr,
105 UserInfo->All.HomeDirectory.Buffer,
106 UserInfo->All.HomeDirectory.Length);
107
108 Ptr = (LPWSTR)((ULONG_PTR)Ptr + LocalBuffer->HomeDirectory.MaximumLength);
109
110 LocalBuffer->FullName.Length = UserInfo->All.FullName.Length;
111 LocalBuffer->FullName.MaximumLength = UserInfo->All.FullName.Length + sizeof(WCHAR);
112 LocalBuffer->FullName.Buffer = (LPWSTR)((ULONG_PTR)ClientBaseAddress + (ULONG_PTR)Ptr - (ULONG_PTR)LocalBuffer);
113 memcpy(Ptr,
114 UserInfo->All.FullName.Buffer,
115 UserInfo->All.FullName.Length);
116 TRACE("FullName.Buffer: %p\n", LocalBuffer->FullName.Buffer);
117
118 Ptr = (LPWSTR)((ULONG_PTR)Ptr + LocalBuffer->FullName.MaximumLength);
119
120 LocalBuffer->ProfilePath.Length = UserInfo->All.ProfilePath.Length;
121 LocalBuffer->ProfilePath.MaximumLength = UserInfo->All.ProfilePath.Length + sizeof(WCHAR);
122 LocalBuffer->ProfilePath.Buffer = (LPWSTR)((ULONG_PTR)ClientBaseAddress + (ULONG_PTR)Ptr - (ULONG_PTR)LocalBuffer);
123 memcpy(Ptr,
124 UserInfo->All.ProfilePath.Buffer,
125 UserInfo->All.ProfilePath.Length);
126
127 Ptr = (LPWSTR)((ULONG_PTR)Ptr + LocalBuffer->ProfilePath.MaximumLength);
128
129 LocalBuffer->HomeDirectoryDrive.Length = UserInfo->All.HomeDirectoryDrive.Length;
130 LocalBuffer->HomeDirectoryDrive.MaximumLength = UserInfo->All.HomeDirectoryDrive.Length + sizeof(WCHAR);
131 LocalBuffer->HomeDirectoryDrive.Buffer = (LPWSTR)((ULONG_PTR)ClientBaseAddress + (ULONG_PTR)Ptr - (ULONG_PTR)LocalBuffer);
132 memcpy(Ptr,
133 UserInfo->All.HomeDirectoryDrive.Buffer,
134 UserInfo->All.HomeDirectoryDrive.Length);
135
137
138 LocalBuffer->LogonServer.Length = (ComputerNameLength + 2) * sizeof(WCHAR);
139 LocalBuffer->LogonServer.MaximumLength = LocalBuffer->LogonServer.Length + sizeof(WCHAR);
140 LocalBuffer->LogonServer.Buffer = (LPWSTR)((ULONG_PTR)ClientBaseAddress + (ULONG_PTR)Ptr - (ULONG_PTR)LocalBuffer);
141 wcscpy(Ptr, L"\\");
142 wcscat(Ptr, ComputerName);
143
144 LocalBuffer->UserFlags = 0;
145
146 Status = DispatchTable.CopyToClientBuffer(ClientRequest,
148 ClientBaseAddress,
149 LocalBuffer);
150 if (!NT_SUCCESS(Status))
151 {
152 TRACE("DispatchTable.CopyToClientBuffer failed (Status 0x%08lx)\n", Status);
153 goto done;
154 }
155
156 *ProfileBuffer = (PMSV1_0_INTERACTIVE_PROFILE)ClientBaseAddress;
158
159done:
160 if (LocalBuffer != NULL)
161 DispatchTable.FreeLsaHeap(LocalBuffer);
162
163 if (!NT_SUCCESS(Status))
164 {
165 if (ClientBaseAddress != NULL)
166 DispatchTable.FreeClientBuffer(ClientRequest,
167 ClientBaseAddress);
168 }
169
170 return Status;
171}
LONG NTSTATUS
Definition: precomp.h:26
#define NT_SUCCESS(StatCode)
Definition: apphelp.c:32
#define ULONG_PTR
Definition: config.h:101
_Must_inspect_result_ _In_ PFSRTL_PER_STREAM_CONTEXT Ptr
Definition: fsrtlfuncs.h:898
Status
Definition: gdiplustypes.h:25
_CRTIMP size_t __cdecl wcslen(_In_z_ const wchar_t *_Str)
#define S_OK
Definition: intsafe.h:52
#define memcpy(s1, s2, n)
Definition: mkisofs.h:878
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE _In_ ULONG _In_ ULONG _In_opt_ PTOKEN_GROUPS _In_ PTOKEN_SOURCE _Out_ PVOID * ProfileBuffer
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE _In_ ULONG _In_ ULONG _In_opt_ PTOKEN_GROUPS _In_ PTOKEN_SOURCE _Out_ PVOID _Out_ PULONG ProfileBufferLength
struct _MSV1_0_INTERACTIVE_PROFILE * PMSV1_0_INTERACTIVE_PROFILE
struct _MSV1_0_INTERACTIVE_PROFILE MSV1_0_INTERACTIVE_PROFILE
@ MsV1_0InteractiveProfile
Definition: ntsecapi.h:206
#define L(x)
Definition: ntvdm.h:50
unsigned short USHORT
Definition: pedump.c:61
_CRTIMP wchar_t *__cdecl wcscpy(_Out_writes_z_(_String_length_(_Source)+1) wchar_t *_Dest, _In_z_ const wchar_t *_Source)
_CRTIMP wchar_t *__cdecl wcscat(_Inout_updates_z_(_String_length_(_Dest)+_String_length_(_Source)+1) wchar_t *_Dest, _In_z_ const wchar_t *_Source)
#define STATUS_SUCCESS
Definition: shellext.h:65
#define TRACE(s)
Definition: solgame.cpp:4
LARGE_INTEGER LogonTime
Definition: ntsecapi.h:443
MSV1_0_PROFILE_BUFFER_TYPE MessageType
Definition: ntsecapi.h:440
LARGE_INTEGER KickOffTime
Definition: ntsecapi.h:445
LARGE_INTEGER PasswordMustChange
Definition: ntsecapi.h:448
UNICODE_STRING LogonScript
Definition: ntsecapi.h:449
LARGE_INTEGER PasswordCanChange
Definition: ntsecapi.h:447
LARGE_INTEGER LogoffTime
Definition: ntsecapi.h:444
UNICODE_STRING FullName
Definition: ntsecapi.h:451
LARGE_INTEGER PasswordLastSet
Definition: ntsecapi.h:446
UNICODE_STRING ProfilePath
Definition: ntsecapi.h:452
UNICODE_STRING LogonServer
Definition: ntsecapi.h:454
UNICODE_STRING HomeDirectory
Definition: ntsecapi.h:450
UNICODE_STRING HomeDirectoryDrive
Definition: ntsecapi.h:453
USHORT MaximumLength
Definition: env_spec_w32.h:370
uint32_t ULONG_PTR
Definition: typedefs.h:65
uint32_t ULONG
Definition: typedefs.h:59
#define STATUS_INVALID_PARAMETER
Definition: udferr_usr.h:135
#define STATUS_INSUFFICIENT_RESOURCES
Definition: udferr_usr.h:158
ULONG LowPart
Definition: typedefs.h:106
_Must_inspect_result_ _In_ WDFDEVICE _In_ DEVICE_REGISTRY_PROPERTY _In_ ULONG BufferLength
Definition: wdfdevice.h:3771
__wchar_t WCHAR
Definition: xmlstorage.h:180
WCHAR * LPWSTR
Definition: xmlstorage.h:184

Referenced by LsaApLogonUserEx2().

◆ BuildLm20LogonProfileBuffer()

static NTSTATUS BuildLm20LogonProfileBuffer ( _In_ PLSA_CLIENT_REQUEST  ClientRequest,
_In_ PSAMPR_USER_INFO_BUFFER  UserInfo,
_In_ PLSA_SAM_PWD_DATA  LogonPwdData,
_Out_ PMSV1_0_LM20_LOGON_PROFILE ProfileBuffer,
_Out_ PULONG  ProfileBufferLength 
)
static

Definition at line 176 of file msv1_0.c.

182{
183 PMSV1_0_LM20_LOGON_PROFILE LocalBuffer;
188 UNICODE_STRING ComputerNameUCS;
189
192
193 if (!NtlmUStrAlloc(&ComputerNameUCS, LogonPwdData->ComputerName->Length + sizeof(WCHAR) * 3, 0))
194 {
196 goto done;
197 }
198 Status = RtlAppendUnicodeToString(&ComputerNameUCS, L"\\\\");
199 if (!NT_SUCCESS(Status))
200 {
201 ERR("RtlAppendUnicodeToString failed 0x%lx\n", Status);
202 goto done;
203 }
204 Status = RtlAppendUnicodeStringToString(&ComputerNameUCS, LogonPwdData->ComputerName);
205 if (!NT_SUCCESS(Status))
206 {
207 ERR("RtlAppendUnicodeStringToString failed 0x%lx\n", Status);
208 goto done;
209 }
210
211 BufferLength = sizeof(MSV1_0_LM20_LOGON_PROFILE) + ComputerNameUCS.Length + sizeof(WCHAR);
212
214 if (!NT_SUCCESS(Status))
215 {
216 TRACE("DispatchTable.AllocateClientBuffer failed (Status 0x%08lx)\n", Status);
217 goto done;
218 }
219
220 TRACE("ClientBaseAddress: %p\n", Buffer.ClientBaseAddress);
221
222 LocalBuffer = (PMSV1_0_LM20_LOGON_PROFILE)Buffer.LocalBuffer;
223 PtrOffset = (PBYTE)(LocalBuffer + 1);
224
225 LocalBuffer->MessageType = MsV1_0Lm20LogonProfile;
226 LocalBuffer->KickOffTime.LowPart = UserInfo->All.AccountExpires.LowPart;
227 LocalBuffer->KickOffTime.HighPart = UserInfo->All.AccountExpires.HighPart;
228 LocalBuffer->LogoffTime.LowPart = UserInfo->All.AccountExpires.LowPart;
229 LocalBuffer->LogoffTime.HighPart = UserInfo->All.AccountExpires.HighPart;
230
231 memcpy(LocalBuffer->UserSessionKey,
232 &LogonPwdData->UserSessionKey,
234
235 //FIXME: Set Domainname if we domain joined
236 // what to do if not? WORKGROUP
238
239 memcpy(LocalBuffer->LanmanSessionKey,
240 &LogonPwdData->LanmanSessionKey,
242
243 if (!NtlmUStrWriteToStruct(LocalBuffer,
245 &LocalBuffer->LogonServer,
246 &ComputerNameUCS,
247 &PtrOffset,
248 TRUE))
249 {
250 ERR("NtlmStructWriteUCS failed.\n");
252 goto done;
253 }
254 /* not supported */
256 /* Build user flags */
257 LocalBuffer->UserFlags = 0x0;
258 if (LogonPwdData->LogonType == NetLogonLmKey)
259 LocalBuffer->UserFlags |= LOGON_USED_LM_PASSWORD;
260
261 /* copy data to client buffer */
263 if (!NT_SUCCESS(Status))
264 {
265 TRACE("DispatchTable.CopyToClientBuffer failed (Status 0x%08lx)\n", Status);
266 goto done;
267 }
268
269 *ProfileBuffer = (PMSV1_0_LM20_LOGON_PROFILE)Buffer.ClientBaseAddress;
271done:
272 /* On success Buffer.ClientBaseAddress will not be free */
273 NtlmFreeClientBuffer(ClientRequest, !NT_SUCCESS(Status), &Buffer);
274 NtlmUStrFree(&ComputerNameUCS);
275 return Status;
276}
#define ERR(fmt,...)
Definition: debug.h:110
#define PtrOffset(BASE, OFFSET)
Definition: cdprocs.h:1547
Definition: bufpool.h:45
#define TRUE
Definition: types.h:120
bool NtlmUStrWriteToStruct(_In_ PVOID DataStart, _In_ ULONG DataSize, _Out_ PUNICODE_STRING DstData, _In_ const PUNICODE_STRING SrcData, _Inout_ PBYTE *AbsoluteOffsetPtr, _In_ bool TerminateWith0)
Definition: util.c:197
VOID NtlmUStrFree(_In_ PUNICODE_STRING String)
Definition: util.c:115
NTSTATUS NtlmCopyToClientBuffer(_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ ULONG BufferLength, _Inout_ PNTLM_CLIENT_BUFFER Buffer)
Definition: util.c:301
bool NtlmUStrAlloc(_Inout_ PUNICODE_STRING Dst, _In_ UINT16 SizeInBytes, _In_ UINT16 InitLength)
Definition: util.c:103
NTSTATUS NtlmAllocateClientBuffer(_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ ULONG BufferLength, _Inout_ PNTLM_CLIENT_BUFFER Buffer)
Definition: util.c:264
VOID NtlmFreeClientBuffer(_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ bool FreeClientBuffer, _Inout_ PNTLM_CLIENT_BUFFER Buffer)
Definition: util.c:335
NTSTATUS RtlAppendUnicodeToString(IN PUNICODE_STRING Str1, IN PWSTR Str2)
Definition: string_lib.cpp:62
NTSYSAPI NTSTATUS NTAPI RtlAppendUnicodeStringToString(PUNICODE_STRING Destination, PUNICODE_STRING Source)
NTSYSAPI VOID NTAPI RtlInitUnicodeString(PUNICODE_STRING DestinationString, PCWSTR SourceString)
#define MSV1_0_USER_SESSION_KEY_LENGTH
Definition: ntsecapi.h:60
struct _MSV1_0_LM20_LOGON_PROFILE MSV1_0_LM20_LOGON_PROFILE
@ MsV1_0Lm20LogonProfile
Definition: ntsecapi.h:207
struct _MSV1_0_LM20_LOGON_PROFILE * PMSV1_0_LM20_LOGON_PROFILE
#define MSV1_0_LANMAN_SESSION_KEY_LENGTH
Definition: ntsecapi.h:34
#define LOGON_USED_LM_PASSWORD
Definition: ntsecapi.h:11
BYTE * PBYTE
Definition: pedump.c:66
@ NetLogonLmKey
Definition: sam.h:13
MSV1_0_PROFILE_BUFFER_TYPE MessageType
Definition: ntsecapi.h:479
UCHAR UserSessionKey[MSV1_0_USER_SESSION_KEY_LENGTH]
Definition: ntsecapi.h:483
UNICODE_STRING LogonServer
Definition: ntsecapi.h:486
UCHAR LanmanSessionKey[MSV1_0_LANMAN_SESSION_KEY_LENGTH]
Definition: ntsecapi.h:485
UNICODE_STRING LogonDomainName
Definition: ntsecapi.h:484
LARGE_INTEGER LogoffTime
Definition: ntsecapi.h:481
UNICODE_STRING UserParameters
Definition: ntsecapi.h:487
LARGE_INTEGER KickOffTime
Definition: ntsecapi.h:480
#define ERROR_INTERNAL_ERROR
Definition: winerror.h:840

Referenced by LsaApLogonUserEx2_Network().

◆ BuildTokenGroups()

static NTSTATUS BuildTokenGroups ( OUT PTOKEN_GROUPS Groups,
IN PSID  AccountDomainSid,
IN ULONG  RelativeId,
IN BOOL  SpecialAccount 
)
static

Definition at line 345 of file msv1_0.c.

349{
352 DWORD GroupCount = 0;
353 DWORD MaxGroups = 2;
354 PSID Sid;
356
357 if (SpecialAccount)
358 MaxGroups++;
359
360 TokenGroups = DispatchTable.AllocateLsaHeap(sizeof(TOKEN_GROUPS) +
361 MaxGroups * sizeof(SID_AND_ATTRIBUTES));
362 if (TokenGroups == NULL)
363 {
365 }
366
367 if (SpecialAccount)
368 {
369 /* Self */
370 Sid = AppendRidToSid(AccountDomainSid, RelativeId);
371 if (Sid == NULL)
372 {
373
374 }
375
376 TokenGroups->Groups[GroupCount].Sid = Sid;
377 TokenGroups->Groups[GroupCount].Attributes =
379 GroupCount++;
380
381 /* Member of 'Users' alias */
383 2,
392 &Sid);
393 TokenGroups->Groups[GroupCount].Sid = Sid;
394 TokenGroups->Groups[GroupCount].Attributes =
396 GroupCount++;
397 }
398 else
399 {
400 /* Member of the domains users group */
402 if (Sid == NULL)
403 {
404
405 }
406
407 TokenGroups->Groups[GroupCount].Sid = Sid;
408 TokenGroups->Groups[GroupCount].Attributes =
410 GroupCount++;
411 }
412
413 /* Member of 'Authenticated users' */
415 1,
424 &Sid);
425 TokenGroups->Groups[GroupCount].Sid = Sid;
426 TokenGroups->Groups[GroupCount].Attributes =
428 GroupCount++;
429
430 TokenGroups->GroupCount = GroupCount;
431 ASSERT(TokenGroups->GroupCount <= MaxGroups);
432
433 *Groups = TokenGroups;
434
435 return Status;
436}
PSID AccountDomainSid
Definition: database.c:24
unsigned long DWORD
Definition: ntddk_ex.h:95
#define ASSERT(a)
Definition: mode.c:44
static SID_IDENTIFIER_AUTHORITY SystemAuthority
Definition: msgina.c:38
static PSID AppendRidToSid(PSID SrcSid, ULONG Rid)
Definition: msv1_0.c:280
_In_ ULONG _In_ ACCESS_MASK _In_ PSID Sid
Definition: rtlfuncs.h:1133
#define SE_GROUP_MANDATORY
Definition: setypes.h:90
#define SE_GROUP_ENABLED_BY_DEFAULT
Definition: setypes.h:91
#define SE_GROUP_ENABLED
Definition: setypes.h:92
NTSYSAPI NTSTATUS NTAPI RtlAllocateAndInitializeSid(IN PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, IN UCHAR SubAuthorityCount, IN ULONG SubAuthority0, IN ULONG SubAuthority1, IN ULONG SubAuthority2, IN ULONG SubAuthority3, IN ULONG SubAuthority4, IN ULONG SubAuthority5, IN ULONG SubAuthority6, IN ULONG SubAuthority7, OUT PSID *Sid)
Definition: sid.c:290
#define DOMAIN_ALIAS_RID_USERS
Definition: setypes.h:653
#define SECURITY_BUILTIN_DOMAIN_RID
Definition: setypes.h:581
#define SECURITY_AUTHENTICATED_USER_RID
Definition: setypes.h:568
#define SECURITY_NULL_RID
Definition: setypes.h:540
#define SECURITY_NT_AUTHORITY
Definition: setypes.h:554
@ TokenGroups
Definition: setypes.h:967
#define DOMAIN_GROUP_RID_USERS
Definition: setypes.h:640

Referenced by BuildTokenInformationBuffer().

◆ BuildTokenInformationBuffer()

static NTSTATUS BuildTokenInformationBuffer ( PLSA_TOKEN_INFORMATION_V1 TokenInformation,
PRPC_SID  AccountDomainSid,
PSAMPR_USER_INFO_BUFFER  UserInfo,
BOOL  SpecialAccount 
)
static

Definition at line 441 of file msv1_0.c.

445{
447 ULONG i;
449
450 Buffer = DispatchTable.AllocateLsaHeap(sizeof(LSA_TOKEN_INFORMATION_V1));
451 if (Buffer == NULL)
452 {
453 WARN("Failed to allocate the local buffer!\n");
455 goto done;
456 }
457
458 Buffer->ExpirationTime.LowPart = UserInfo->All.AccountExpires.LowPart;
459 Buffer->ExpirationTime.HighPart = UserInfo->All.AccountExpires.HighPart;
460
463 UserInfo->All.UserId);
464 if (!NT_SUCCESS(Status))
465 {
466 WARN("BuildTokenUser() failed (Status 0x%08lx)\n", Status);
467 goto done;
468 }
469
470 Status = BuildTokenPrimaryGroup(&Buffer->PrimaryGroup,
472 UserInfo->All.PrimaryGroupId);
473 if (!NT_SUCCESS(Status))
474 {
475 WARN("BuildTokenPrimaryGroup() failed (Status 0x%08lx)\n", Status);
476 goto done;
477 }
478
479 Status = BuildTokenGroups(&Buffer->Groups,
481 UserInfo->All.UserId,
482 SpecialAccount);
483 if (!NT_SUCCESS(Status))
484 {
485 WARN("BuildTokenGroups() failed (Status 0x%08lx)\n", Status);
486 goto done;
487 }
488
489 *TokenInformation = Buffer;
490
491done:
492 if (!NT_SUCCESS(Status))
493 {
494 if (Buffer != NULL)
495 {
496 if (Buffer->User.User.Sid != NULL)
497 DispatchTable.FreeLsaHeap(Buffer->User.User.Sid);
498
499 if (Buffer->Groups != NULL)
500 {
501 for (i = 0; i < Buffer->Groups->GroupCount; i++)
502 {
503 if (Buffer->Groups->Groups[i].Sid != NULL)
504 DispatchTable.FreeLsaHeap(Buffer->Groups->Groups[i].Sid);
505 }
506
507 DispatchTable.FreeLsaHeap(Buffer->Groups);
508 }
509
510 if (Buffer->PrimaryGroup.PrimaryGroup != NULL)
511 DispatchTable.FreeLsaHeap(Buffer->PrimaryGroup.PrimaryGroup);
512
513 if (Buffer->DefaultDacl.DefaultDacl != NULL)
514 DispatchTable.FreeLsaHeap(Buffer->DefaultDacl.DefaultDacl);
515
516 DispatchTable.FreeLsaHeap(Buffer);
517 }
518 }
519
520 return Status;
521}
#define WARN(fmt,...)
Definition: debug.h:112
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint i
Definition: glfuncs.h:248
static NTSTATUS BuildTokenGroups(OUT PTOKEN_GROUPS *Groups, IN PSID AccountDomainSid, IN ULONG RelativeId, IN BOOL SpecialAccount)
Definition: msv1_0.c:345
static NTSTATUS BuildTokenPrimaryGroup(OUT PTOKEN_PRIMARY_GROUP PrimaryGroup, IN PSID AccountDomainSid, IN ULONG RelativeId)
Definition: msv1_0.c:327
static NTSTATUS BuildTokenUser(OUT PTOKEN_USER User, IN PSID AccountDomainSid, IN ULONG RelativeId)
Definition: msv1_0.c:307
unsigned long LowPart
Definition: msv1_0.h:32
unsigned long PrimaryGroupId
Definition: msv1_0.h:101
unsigned long UserId
Definition: msv1_0.h:100
OLD_LARGE_INTEGER AccountExpires
Definition: msv1_0.h:83
SAMPR_USER_ALL_INFORMATION All
Definition: msv1_0.h:141

Referenced by LsaApLogonUserEx2().

◆ BuildTokenPrimaryGroup()

static NTSTATUS BuildTokenPrimaryGroup ( OUT PTOKEN_PRIMARY_GROUP  PrimaryGroup,
IN PSID  AccountDomainSid,
IN ULONG  RelativeId 
)
static

Definition at line 327 of file msv1_0.c.

330{
332 RelativeId);
333 if (PrimaryGroup->PrimaryGroup == NULL)
334 {
335 ERR("Could not create the primary group SID\n");
337 }
338
339 return STATUS_SUCCESS;
340}
_Out_writes_bytes_to_opt_ AbsoluteSecurityDescriptorSize PSECURITY_DESCRIPTOR _Inout_ PULONG _Out_writes_bytes_to_opt_ DaclSize PACL _Inout_ PULONG _Out_writes_bytes_to_opt_ SaclSize PACL _Inout_ PULONG _Out_writes_bytes_to_opt_ OwnerSize PSID _Inout_ PULONG _Out_writes_bytes_to_opt_ PrimaryGroupSize PSID PrimaryGroup
Definition: rtlfuncs.h:1599

Referenced by BuildTokenInformationBuffer().

◆ BuildTokenUser()

static NTSTATUS BuildTokenUser ( OUT PTOKEN_USER  User,
IN PSID  AccountDomainSid,
IN ULONG  RelativeId 
)
static

Definition at line 307 of file msv1_0.c.

310{
311 User->User.Sid = AppendRidToSid(AccountDomainSid,
312 RelativeId);
313 if (User->User.Sid == NULL)
314 {
315 ERR("Could not create the user SID\n");
317 }
318
319 User->User.Attributes = 0;
320
321 return STATUS_SUCCESS;
322}

Referenced by BuildTokenInformationBuffer().

◆ LsaApCallPackage()

NTSTATUS NTAPI LsaApCallPackage ( IN PLSA_CLIENT_REQUEST  ClientRequest,
IN PVOID  ProtocolSubmitBuffer,
IN PVOID  ClientBufferBase,
IN ULONG  SubmitBufferLength,
OUT PVOID ProtocolReturnBuffer,
OUT PULONG  ReturnBufferLength,
OUT PNTSTATUS  ProtocolStatus 
)

Definition at line 827 of file msv1_0.c.

834{
837
838 TRACE("LsaApCallPackage()\n");
839
840 if (SubmitBufferLength < sizeof(MSV1_0_PROTOCOL_MESSAGE_TYPE))
842
843 MessageType = *((PMSV1_0_PROTOCOL_MESSAGE_TYPE)ProtocolSubmitBuffer);
844
845 *ProtocolReturnBuffer = NULL;
846 *ReturnBufferLength = 0;
847
848 switch (MessageType)
849 {
853 break;
854
859 break;
860
862 Status = MsvpChangePassword(ClientRequest,
863 ProtocolSubmitBuffer,
864 ClientBufferBase,
865 SubmitBufferLength,
866 ProtocolReturnBuffer,
867 ReturnBufferLength,
869 break;
870
873 case MsV1_0CacheLogon:
874 case MsV1_0SubAuth:
878 break;
879
880 default:
882 }
883
884 return Status;
885}
VOID NTAPI ProtocolStatus(NDIS_HANDLE BindingContext, NDIS_STATUS GenerelStatus, PVOID StatusBuffer, UINT StatusBufferSize)
Called by NDIS when the underlying driver has changed state.
Definition: lan.c:461
static NTSTATUS MsvpChangePassword(IN PLSA_CLIENT_REQUEST ClientRequest, IN PVOID ProtocolSubmitBuffer, IN PVOID ClientBufferBase, IN ULONG SubmitBufferLength, OUT PVOID *ProtocolReturnBuffer, OUT PULONG ReturnBufferLength, OUT PNTSTATUS ProtocolStatus)
Definition: msv1_0.c:526
@ MsV1_0ChangeCachedPassword
Definition: ntsecapi.h:224
@ MsV1_0GenericPassthrough
Definition: ntsecapi.h:225
@ MsV1_0Lm20GetChallengeResponse
Definition: ntsecapi.h:219
@ MsV1_0CacheLookup
Definition: ntsecapi.h:229
@ MsV1_0DeriveCredential
Definition: ntsecapi.h:228
@ MsV1_0ReLogonUsers
Definition: ntsecapi.h:222
@ MsV1_0ChangePassword
Definition: ntsecapi.h:223
@ MsV1_0Lm20ChallengeRequest
Definition: ntsecapi.h:218
@ MsV1_0EnumerateUsers
Definition: ntsecapi.h:220
@ MsV1_0CacheLogon
Definition: ntsecapi.h:226
@ MsV1_0GetUserInfo
Definition: ntsecapi.h:221
@ MsV1_0SubAuth
Definition: ntsecapi.h:227
enum _MSV1_0_PROTOCOL_MESSAGE_TYPE * PMSV1_0_PROTOCOL_MESSAGE_TYPE
enum _MSV1_0_PROTOCOL_MESSAGE_TYPE MSV1_0_PROTOCOL_MESSAGE_TYPE
#define STATUS_NOT_IMPLEMENTED
Definition: ntstatus.h:239

◆ LsaApCallPackagePassthrough()

NTSTATUS NTAPI LsaApCallPackagePassthrough ( IN PLSA_CLIENT_REQUEST  ClientRequest,
IN PVOID  ProtocolSubmitBuffer,
IN PVOID  ClientBufferBase,
IN ULONG  SubmitBufferLength,
OUT PVOID ProtocolReturnBuffer,
OUT PULONG  ReturnBufferLength,
OUT PNTSTATUS  ProtocolStatus 
)

Definition at line 893 of file msv1_0.c.

900{
901 TRACE("LsaApCallPackagePassthrough()\n");
903}

◆ LsaApCallPackageUntrusted()

NTSTATUS NTAPI LsaApCallPackageUntrusted ( IN PLSA_CLIENT_REQUEST  ClientRequest,
IN PVOID  ProtocolSubmitBuffer,
IN PVOID  ClientBufferBase,
IN ULONG  SubmitBufferLength,
OUT PVOID ProtocolReturnBuffer,
OUT PULONG  ReturnBufferLength,
OUT PNTSTATUS  ProtocolStatus 
)

Definition at line 911 of file msv1_0.c.

918{
919 ULONG MessageType;
921
922 TRACE("LsaApCallPackageUntrusted()\n");
923
924 if (SubmitBufferLength < sizeof(MSV1_0_PROTOCOL_MESSAGE_TYPE))
926
927 MessageType = (ULONG)*((PMSV1_0_PROTOCOL_MESSAGE_TYPE)ProtocolSubmitBuffer);
928
929 *ProtocolReturnBuffer = NULL;
930 *ReturnBufferLength = 0;
931
932 if (MessageType == MsV1_0ChangePassword)
933 Status = MsvpChangePassword(ClientRequest,
934 ProtocolSubmitBuffer,
935 ClientBufferBase,
936 SubmitBufferLength,
937 ProtocolReturnBuffer,
938 ReturnBufferLength,
940 else
942
943 return Status;
944}
#define STATUS_ACCESS_DENIED
Definition: udferr_usr.h:145

◆ LsaApInitializePackage()

NTSTATUS NTAPI LsaApInitializePackage ( IN ULONG  AuthenticationPackageId,
IN PLSA_DISPATCH_TABLE  LsaDispatchTable,
IN PLSA_STRING Database  OPTIONAL,
IN PLSA_STRING Confidentiality  OPTIONAL,
OUT PLSA_STRING AuthenticationPackageName 
)

Definition at line 952 of file msv1_0.c.

957{
958 PANSI_STRING NameString;
959 PCHAR NameBuffer;
960
961 TRACE("LsaApInitializePackage(%lu %p %p %p %p)\n",
962 AuthenticationPackageId, LsaDispatchTable, Database,
963 Confidentiality, AuthenticationPackageName);
964
965 /* Get the dispatch table entries */
966 DispatchTable.CreateLogonSession = LsaDispatchTable->CreateLogonSession;
967 DispatchTable.DeleteLogonSession = LsaDispatchTable->DeleteLogonSession;
968 DispatchTable.AddCredential = LsaDispatchTable->AddCredential;
969 DispatchTable.GetCredentials = LsaDispatchTable->GetCredentials;
970 DispatchTable.DeleteCredential = LsaDispatchTable->DeleteCredential;
971 DispatchTable.AllocateLsaHeap = LsaDispatchTable->AllocateLsaHeap;
972 DispatchTable.FreeLsaHeap = LsaDispatchTable->FreeLsaHeap;
973 DispatchTable.AllocateClientBuffer = LsaDispatchTable->AllocateClientBuffer;
974 DispatchTable.FreeClientBuffer = LsaDispatchTable->FreeClientBuffer;
975 DispatchTable.CopyToClientBuffer = LsaDispatchTable->CopyToClientBuffer;
976 DispatchTable.CopyFromClientBuffer = LsaDispatchTable->CopyFromClientBuffer;
977
978 /* Return the package name */
979 NameString = DispatchTable.AllocateLsaHeap(sizeof(LSA_STRING));
980 if (NameString == NULL)
982
983 NameBuffer = DispatchTable.AllocateLsaHeap(sizeof(MSV1_0_PACKAGE_NAME));
984 if (NameBuffer == NULL)
985 {
986 DispatchTable.FreeLsaHeap(NameString);
988 }
989
990 strcpy(NameBuffer, MSV1_0_PACKAGE_NAME);
991
992 RtlInitAnsiString(NameString, NameBuffer);
993
994 *AuthenticationPackageName = (PLSA_STRING)NameString;
995
996 return STATUS_SUCCESS;
997}
char * strcpy(char *DstString, const char *SrcString)
Definition: utclib.c:388
NTSYSAPI VOID NTAPI RtlInitAnsiString(PANSI_STRING DestinationString, PCSZ SourceString)
struct _LSA_STRING * PLSA_STRING
#define MSV1_0_PACKAGE_NAME
Definition: ntsecapi.h:42
char * PCHAR
Definition: typedefs.h:51

◆ LsaApLogonTerminated()

VOID NTAPI LsaApLogonTerminated ( IN PLUID  LogonId)

Definition at line 1005 of file msv1_0.c.

1006{
1007 TRACE("LsaApLogonTerminated()\n");
1008}

◆ LsaApLogonUserEx2()

NTSTATUS NTAPI LsaApLogonUserEx2 ( IN PLSA_CLIENT_REQUEST  ClientRequest,
IN SECURITY_LOGON_TYPE  LogonType,
IN PVOID  ProtocolSubmitBuffer,
IN PVOID  ClientBufferBase,
IN ULONG  SubmitBufferSize,
OUT PVOID ProfileBuffer,
OUT PULONG  ProfileBufferSize,
OUT PLUID  LogonId,
OUT PNTSTATUS  SubStatus,
OUT PLSA_TOKEN_INFORMATION_TYPE  TokenInformationType,
OUT PVOID TokenInformation,
OUT PUNICODE_STRING AccountName,
OUT PUNICODE_STRING AuthenticatingAuthority,
OUT PUNICODE_STRING MachineName,
OUT PSECPKG_PRIMARY_CRED  PrimaryCredentials,
OUT PSECPKG_SUPPLEMENTAL_CRED_ARRAY SupplementalCredentials 
)

Definition at line 1106 of file msv1_0.c.

1122{
1124 UNICODE_STRING ComputerName;
1125 WCHAR ComputerNameData[MAX_COMPUTERNAME_LENGTH + 1];
1126 PUNICODE_STRING LogonUserName = NULL;
1127 LSA_SAM_PWD_DATA LogonPwdData = { FALSE, NULL };
1128 PUNICODE_STRING LogonDomain = NULL;
1129 SAMPR_HANDLE UserHandle = NULL;
1131 PSAMPR_USER_INFO_BUFFER UserInfo = NULL;
1132 BOOLEAN SessionCreated = FALSE;
1133 DWORD ComputerNameSize;
1134 BOOL SpecialAccount = FALSE;
1135 UCHAR LogonPassHash;
1136 PUNICODE_STRING ErasePassword = NULL;
1137
1138 TRACE("LsaApLogonUserEx2()\n");
1139
1140 TRACE("LogonType: %lu\n", LogonType);
1141 TRACE("ProtocolSubmitBuffer: %p\n", ProtocolSubmitBuffer);
1142 TRACE("SubmitBufferSize: %lu\n", SubmitBufferSize);
1143
1145 *ProfileBufferSize = 0;
1147 *AccountName = NULL;
1148 *AuthenticatingAuthority = NULL;
1149
1150 /* Get the computer name */
1151 ComputerNameSize = ARRAYSIZE(ComputerNameData);
1152 if (!GetComputerNameW(ComputerNameData, &ComputerNameSize))
1153 {
1154 ERR("Failed to get Computername.\n");
1155 return STATUS_INTERNAL_ERROR;
1156 }
1157 RtlInitUnicodeString(&ComputerName, ComputerNameData);
1158
1159 /* Parameters validation */
1160 if (LogonType == Interactive ||
1161 LogonType == Batch ||
1162 LogonType == Service)
1163 {
1164 PMSV1_0_INTERACTIVE_LOGON LogonInfo;
1166
1167 if (SubmitBufferSize < sizeof(MSV1_0_INTERACTIVE_LOGON))
1168 {
1169 ERR("Invalid SubmitBufferSize %lu\n", SubmitBufferSize);
1171 }
1172
1173 LogonInfo = (PMSV1_0_INTERACTIVE_LOGON)ProtocolSubmitBuffer;
1174
1175 if (LogonInfo->MessageType != MsV1_0InteractiveLogon &&
1177 {
1178 ERR("Invalid MessageType %lu\n", LogonInfo->MessageType);
1180 }
1181
1182#if 0 // FIXME: These checks happen to be done on Windows. We however keep them general on ReactOS for now...
1183 if (LogonInfo->UserName.Length > 512) // CRED_MAX_STRING_LENGTH * sizeof(WCHAR) or (CREDUI_MAX_USERNAME_LENGTH (== CRED_MAX_USERNAME_LENGTH) - 1) * sizeof(WCHAR)
1184 {
1185 ERR("UserName too long (%lu, maximum 512)\n", LogonInfo->UserName.Length);
1186 return STATUS_NAME_TOO_LONG;
1187 }
1188 if (LogonInfo->Password.Length > 512) // CREDUI_MAX_PASSWORD_LENGTH * sizeof(WCHAR)
1189 {
1190 ERR("Password too long (%lu, maximum 512)\n", LogonInfo->Password.Length);
1191 return STATUS_NAME_TOO_LONG;
1192 }
1193#endif
1194
1195 /* Fix-up pointers in the authentication info */
1196 PtrOffset = (ULONG_PTR)ProtocolSubmitBuffer - (ULONG_PTR)ClientBufferBase;
1197
1198 /* LogonDomainName is optional and can be an empty string */
1199 if (LogonInfo->LogonDomainName.Length)
1200 {
1201 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
1203 LogonInfo->LogonDomainName.MaximumLength = LogonInfo->LogonDomainName.Length;
1204 }
1205 else
1206 {
1207 LogonInfo->LogonDomainName.Buffer = NULL;
1208 LogonInfo->LogonDomainName.MaximumLength = 0;
1209 }
1211 if (!NT_SUCCESS(Status))
1213
1214 /* UserName is mandatory and cannot be an empty string */
1215 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
1216 LogonInfo->UserName.Buffer = FIXUP_POINTER(LogonInfo->UserName.Buffer, PtrOffset);
1217 LogonInfo->UserName.MaximumLength = LogonInfo->UserName.Length;
1218
1219 Status = RtlValidateUnicodeString(0, &LogonInfo->UserName);
1220 if (!NT_SUCCESS(Status))
1222
1223 /* MS docs says max length is 0xFF bytes. But thats not the full story:
1224 *
1225 * A Quote from https://groups.google.com/forum/#!topic/microsoft.public.win32.programmer.kernel/eFGcCo_ZObk:
1226 * "... At least on my WinXP SP2. Domain and UserName are passed
1227 * in clear text, but the Password is NOT. ..."
1228 *
1229 * If the higher byte of length != 0 we have to use RtlRunDecodeUnicodeString.
1230 */
1231 LogonPassHash = (LogonInfo->Password.Length >> 8) & 0xFF;
1232 LogonInfo->Password.Length = LogonInfo->Password.Length & 0xFF;
1233
1234 /* Password is optional and can be an empty string */
1235 if (LogonInfo->Password.Length)
1236 {
1237 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
1238 LogonInfo->Password.Buffer = FIXUP_POINTER(LogonInfo->Password.Buffer, PtrOffset);
1239 LogonInfo->Password.MaximumLength = LogonInfo->Password.Length;
1240 }
1241 else
1242 {
1243 LogonInfo->Password.Buffer = NULL;
1244 LogonInfo->Password.MaximumLength = 0;
1245 }
1246
1247 /* Decode password */
1248 if (LogonPassHash > 0)
1249 {
1250 RtlRunDecodeUnicodeString(LogonPassHash, &LogonInfo->Password);
1251 }
1252
1253 /* ErasePassword will be "erased" before we return */
1254 ErasePassword = &LogonInfo->Password;
1255
1256 Status = RtlValidateUnicodeString(0, &LogonInfo->Password);
1257 if (!NT_SUCCESS(Status))
1259
1260 LogonUserName = &LogonInfo->UserName;
1261 LogonDomain = &LogonInfo->LogonDomainName;
1262 LogonPwdData.IsNetwork = FALSE;
1263 LogonPwdData.PlainPwd = &LogonInfo->Password;
1264 LogonPwdData.ComputerName = &ComputerName;
1265
1266 TRACE("Domain: %wZ\n", &LogonInfo->LogonDomainName);
1267 TRACE("User: %wZ\n", &LogonInfo->UserName);
1268 TRACE("Password: %wZ\n", &LogonInfo->Password);
1269
1270 // TODO: If LogonType == Service, do some extra work using LogonInfo->Password.
1271 }
1272 else if (LogonType == Network)
1273 {
1274 Status = LsaApLogonUserEx2_Network(ClientRequest,
1275 ProtocolSubmitBuffer,
1276 ClientBufferBase,
1277 SubmitBufferSize,
1278 &ComputerName,
1279 &LogonUserName,
1280 &LogonDomain,
1281 &LogonPwdData,
1282 &UserHandle,
1283 &UserInfo,
1285 &SpecialAccount,
1287 ProfileBufferSize,
1288 SubStatus);
1289 if (!NT_SUCCESS(Status))
1290 goto done;
1291 }
1292 else
1293 {
1294 FIXME("LogonType %lu is not supported yet!\n", LogonType);
1296 }
1297 // TODO: Add other LogonType validity checks.
1298
1300 LogonUserName,
1301 LogonDomain,
1302 &LogonPwdData,
1303 &ComputerName,
1304 &SpecialAccount,
1306 &UserHandle,
1307 &UserInfo,
1308 SubStatus);
1309 if (!NT_SUCCESS(Status))
1310 goto done;
1311
1312 /* Return logon information */
1313
1314 /* Create and return a new logon id */
1316 if (!NT_SUCCESS(Status))
1317 {
1318 TRACE("NtAllocateLocallyUniqueId failed (Status %08lx)\n", Status);
1319 goto done;
1320 }
1321
1322 /* Create the logon session */
1323 Status = DispatchTable.CreateLogonSession(LogonId);
1324 if (!NT_SUCCESS(Status))
1325 {
1326 TRACE("CreateLogonSession failed (Status %08lx)\n", Status);
1327 goto done;
1328 }
1329
1330 SessionCreated = TRUE;
1331
1333 {
1334 /* Build and fill the interactive profile buffer */
1335 Status = BuildInteractiveProfileBuffer(ClientRequest,
1336 UserInfo,
1337 ComputerName.Buffer,
1339 ProfileBufferSize);
1340 if (!NT_SUCCESS(Status))
1341 {
1342 TRACE("BuildInteractiveProfileBuffer failed (Status %08lx)\n", Status);
1343 goto done;
1344 }
1345 }
1346 else if (LogonType == Network)
1347 {
1348 //FIXME: no need to do anything, its already done ...
1349 }
1350
1351 /* Return the token information type */
1352 *TokenInformationType = LsaTokenInformationV1;
1353
1354 /* Build and fill the token information buffer */
1357 UserInfo,
1358 SpecialAccount);
1359 if (!NT_SUCCESS(Status))
1360 {
1361 TRACE("BuildTokenInformationBuffer failed (Status %08lx)\n", Status);
1362 goto done;
1363 }
1364
1365done:
1366 /* Erase password */
1367 if (ErasePassword)
1368 {
1369 RtlEraseUnicodeString(ErasePassword);
1370 }
1371
1372 /* Update the logon time/count or the bad password time/count */
1373 if ((UserHandle != NULL) &&
1375 {
1376 SAMPR_USER_INFO_BUFFER InternalInfo;
1377
1378 RtlZeroMemory(&InternalInfo, sizeof(InternalInfo));
1379
1380 if (Status == STATUS_SUCCESS)
1381 InternalInfo.Internal2.Flags = USER_LOGON_SUCCESS;
1382 else
1384
1385 SamrSetInformationUser(UserHandle,
1387 &InternalInfo);
1388 }
1389
1390 if (NT_SUCCESS(Status))
1391 {
1392 /* Return the account name */
1393 *AccountName = DispatchTable.AllocateLsaHeap(sizeof(UNICODE_STRING));
1394 if ((LogonUserName != NULL) &&
1395 (*AccountName != NULL))
1396 {
1397 (*AccountName)->Buffer = DispatchTable.AllocateLsaHeap(LogonUserName->Length +
1398 sizeof(UNICODE_NULL));
1399 if ((*AccountName)->Buffer != NULL)
1400 {
1401 (*AccountName)->MaximumLength = LogonUserName->Length +
1402 sizeof(UNICODE_NULL);
1403 RtlCopyUnicodeString(*AccountName, LogonUserName);
1404 }
1405 }
1406
1407 /* Return the authenticating authority */
1408 *AuthenticatingAuthority = DispatchTable.AllocateLsaHeap(sizeof(UNICODE_STRING));
1409 if ((LogonDomain != NULL) &&
1410 (*AuthenticatingAuthority != NULL))
1411 {
1412 (*AuthenticatingAuthority)->Buffer = DispatchTable.AllocateLsaHeap(LogonDomain->Length +
1413 sizeof(UNICODE_NULL));
1414 if ((*AuthenticatingAuthority)->Buffer != NULL)
1415 {
1416 (*AuthenticatingAuthority)->MaximumLength = LogonDomain->Length +
1417 sizeof(UNICODE_NULL);
1418 RtlCopyUnicodeString(*AuthenticatingAuthority, LogonDomain);
1419 }
1420 }
1421
1422 /* Return the machine name */
1423 *MachineName = DispatchTable.AllocateLsaHeap(sizeof(UNICODE_STRING));
1424 if (*MachineName != NULL)
1425 {
1426 (*MachineName)->Buffer = DispatchTable.AllocateLsaHeap(ComputerName.MaximumLength);
1427 if ((*MachineName)->Buffer != NULL)
1428 {
1429 (*MachineName)->MaximumLength = ComputerName.MaximumLength;
1430 (*MachineName)->Length = ComputerName.Length;
1431 RtlCopyMemory((*MachineName)->Buffer,
1432 ComputerName.Buffer,
1433 ComputerName.MaximumLength);
1434 }
1435 }
1436 }
1437
1438 if (!NT_SUCCESS(Status))
1439 {
1440 if (SessionCreated != FALSE)
1441 DispatchTable.DeleteLogonSession(LogonId);
1442
1443 if (*ProfileBuffer != NULL)
1444 {
1445 DispatchTable.FreeClientBuffer(ClientRequest,
1446 *ProfileBuffer);
1448 }
1449 }
1450
1451 if (UserHandle != NULL)
1452 SamrCloseHandle(&UserHandle);
1453
1456
1457 if (AccountDomainSid != NULL)
1458 RtlFreeHeap(RtlGetProcessHeap(), 0, AccountDomainSid);
1459
1460 if (Status == STATUS_NO_SUCH_USER ||
1462 {
1463 *SubStatus = Status;
1465 }
1466
1467 TRACE("LsaApLogonUserEx2 done (Status 0x%08lx, SubStatus 0x%08lx)\n", Status, *SubStatus);
1468
1469 return Status;
1470}
unsigned char BOOLEAN
@ LsaTokenInformationV1
Definition: authpackage.c:17
NTSTATUS __stdcall SamrCloseHandle(SAMPR_HANDLE *SamHandle)
#define FIXME(fmt,...)
Definition: debug.h:111
BOOLEAN NTAPI RtlFreeHeap(IN PVOID HeapHandle, IN ULONG Flags, IN PVOID HeapBase)
Definition: heap.c:608
BOOL WINAPI GetComputerNameW(LPWSTR lpBuffer, LPDWORD lpnSize)
Definition: compname.c:446
@ Network
#define FALSE
Definition: types.h:117
#define ARRAYSIZE(array)
Definition: filtermapper.c:47
unsigned int BOOL
Definition: ntddk_ex.h:94
static NTSTATUS LsaApLogonUserEx2_Network(_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ PVOID ProtocolSubmitBuffer, _In_ PVOID ClientBufferBase, _In_ ULONG SubmitBufferSize, _In_ PUNICODE_STRING ComputerName, _Out_ PUNICODE_STRING *LogonUserRef, _Out_ PUNICODE_STRING *LogonDomainRef, _Inout_ PLSA_SAM_PWD_DATA LogonPwdData, _Out_ SAMPR_HANDLE *UserHandlePtr, _Out_ PSAMPR_USER_INFO_BUFFER *UserInfoPtr, _Out_ PRPC_SID *AccountDomainSidPtr, _Out_ PBOOL SpecialAccount, _Out_ PMSV1_0_LM20_LOGON_PROFILE *LogonProfile, _Out_ PULONG LogonProfileSize, _Out_ PNTSTATUS SubStatus)
Definition: msv1_0.c:1016
static NTSTATUS BuildTokenInformationBuffer(PLSA_TOKEN_INFORMATION_V1 *TokenInformation, PRPC_SID AccountDomainSid, PSAMPR_USER_INFO_BUFFER UserInfo, BOOL SpecialAccount)
Definition: msv1_0.c:441
static NTSTATUS BuildInteractiveProfileBuffer(IN PLSA_CLIENT_REQUEST ClientRequest, IN PSAMPR_USER_INFO_BUFFER UserInfo, IN PWSTR ComputerName, OUT PMSV1_0_INTERACTIVE_PROFILE *ProfileBuffer, OUT PULONG ProfileBufferLength)
Definition: msv1_0.c:20
VOID NTAPI SamIFree_SAMPR_USER_INFO_BUFFER(PSAMPR_USER_INFO_BUFFER Ptr, USER_INFORMATION_CLASS InformationClass)
Definition: samsrv.c:540
NTSTATUS NTAPI SamrSetInformationUser(IN SAMPR_HANDLE UserHandle, IN USER_INFORMATION_CLASS UserInformationClass, IN PSAMPR_USER_INFO_BUFFER Buffer)
Definition: samrpc.c:7848
#define USER_LOGON_SUCCESS
Definition: sam.idl:649
#define FIXUP_POINTER(Pointer, Offset)
Definition: msv1_0.h:9
#define USER_LOGON_BAD_PASSWORD
Definition: sam.idl:648
NTSYSAPI VOID NTAPI RtlEraseUnicodeString(_Inout_ PUNICODE_STRING String)
NTSYSAPI NTSTATUS NTAPI RtlValidateUnicodeString(_In_ ULONG Flags, _In_ PCUNICODE_STRING String)
Definition: unicode.c:2605
NTSYSAPI VOID NTAPI RtlCopyUnicodeString(PUNICODE_STRING DestinationString, PUNICODE_STRING SourceString)
#define UNICODE_NULL
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE LogonType
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE _In_ ULONG _In_ ULONG _In_opt_ PTOKEN_GROUPS _In_ PTOKEN_SOURCE _Out_ PVOID _Out_ PULONG _Inout_ PLUID _Out_ PHANDLE _Out_ PQUOTA_LIMITS _Out_ PNTSTATUS SubStatus
_IRQL_requires_same_ _In_ PLSA_STRING _In_ SECURITY_LOGON_TYPE _In_ ULONG _In_ ULONG _In_opt_ PTOKEN_GROUPS _In_ PTOKEN_SOURCE _Out_ PVOID _Out_ PULONG _Inout_ PLUID LogonId
NTSTATUS NTAPI NtAllocateLocallyUniqueId(OUT LUID *LocallyUniqueId)
Definition: uuid.c:348
@ UserInternal2Information
Definition: ntsam.h:532
@ UserAllInformation
Definition: ntsam.h:534
@ Interactive
Definition: ntsecapi.h:289
@ Service
Definition: ntsecapi.h:292
@ Batch
Definition: ntsecapi.h:291
struct _MSV1_0_INTERACTIVE_LOGON * PMSV1_0_INTERACTIVE_LOGON
@ MsV1_0WorkstationUnlockLogon
Definition: ntsecapi.h:203
@ MsV1_0InteractiveLogon
Definition: ntsecapi.h:199
#define STATUS_INTERNAL_ERROR
Definition: ntstatus.h:465
#define STATUS_WRONG_PASSWORD
Definition: ntstatus.h:342
#define STATUS_BAD_VALIDATION_CLASS
Definition: ntstatus.h:403
#define STATUS_NO_SUCH_USER
Definition: ntstatus.h:336
#define STATUS_LOGON_FAILURE
Definition: ntstatus.h:345
#define STATUS_NAME_TOO_LONG
Definition: ntstatus.h:498
NTSTATUS SamValidateUser(_In_ SECURITY_LOGON_TYPE LogonType, _In_ PUNICODE_STRING LogonUserName, _In_ PUNICODE_STRING LogonDomain, _In_ PLSA_SAM_PWD_DATA LogonPwdData, _In_ PUNICODE_STRING ComputerName, _Out_ PBOOL SpecialAccount, _Out_ PRPC_SID *AccountDomainSidPtr, _Out_ SAMPR_HANDLE *UserHandlePtr, _Out_ PSAMPR_USER_INFO_BUFFER *UserInfoPtr, _Out_ PNTSTATUS SubStatus)
Validates a user by checking if it exists in the sam database. Some other checks are done further.
Definition: sam.c:460
VOID NTAPI RtlRunDecodeUnicodeString(IN UCHAR Hash, IN OUT PUNICODE_STRING String)
Definition: encode.c:20
_In_ DWORD _Out_ PDWORD _In_opt_ PCSTR MachineName
Definition: setupapi.h:1293
PUNICODE_STRING PlainPwd
Definition: sam.h:22
PUNICODE_STRING ComputerName
Definition: sam.h:26
BOOL IsNetwork
Definition: sam.h:21
UNICODE_STRING Password
Definition: ntsecapi.h:437
UNICODE_STRING UserName
Definition: ntsecapi.h:436
MSV1_0_LOGON_SUBMIT_TYPE MessageType
Definition: ntsecapi.h:434
UNICODE_STRING LogonDomainName
Definition: ntsecapi.h:435
#define RtlZeroMemory(Destination, Length)
Definition: typedefs.h:262
SAMPR_USER_INTERNAL2_INFORMATION Internal2
Definition: msv1_0.h:137
#define MAX_COMPUTERNAME_LENGTH
Definition: winbase.h:243

◆ LsaApLogonUserEx2_Network()

static NTSTATUS LsaApLogonUserEx2_Network ( _In_ PLSA_CLIENT_REQUEST  ClientRequest,
_In_ PVOID  ProtocolSubmitBuffer,
_In_ PVOID  ClientBufferBase,
_In_ ULONG  SubmitBufferSize,
_In_ PUNICODE_STRING  ComputerName,
_Out_ PUNICODE_STRING LogonUserRef,
_Out_ PUNICODE_STRING LogonDomainRef,
_Inout_ PLSA_SAM_PWD_DATA  LogonPwdData,
_Out_ SAMPR_HANDLE UserHandlePtr,
_Out_ PSAMPR_USER_INFO_BUFFER UserInfoPtr,
_Out_ PRPC_SID AccountDomainSidPtr,
_Out_ PBOOL  SpecialAccount,
_Out_ PMSV1_0_LM20_LOGON_PROFILE LogonProfile,
_Out_ PULONG  LogonProfileSize,
_Out_ PNTSTATUS  SubStatus 
)
static

Definition at line 1016 of file msv1_0.c.

1032{
1034 PMSV1_0_LM20_LOGON LogonInfo;
1036
1037 *LogonProfile = NULL;
1038 *LogonProfileSize = 0;
1039 *UserInfoPtr = NULL;
1040 *AccountDomainSidPtr = NULL;
1041 *SpecialAccount = FALSE;
1042 LogonInfo = ProtocolSubmitBuffer;
1043
1044 if (SubmitBufferSize < sizeof(MSV1_0_LM20_LOGON))
1045 {
1046 ERR("Invalid SubmitBufferSize %lu\n", SubmitBufferSize);
1048 }
1049
1050 /* Fix-up pointers in the authentication info */
1051 PtrOffset = (ULONG_PTR)ProtocolSubmitBuffer - (ULONG_PTR)ClientBufferBase;
1052
1053 if ((!NtlmFixupAndValidateUStr(&LogonInfo->LogonDomainName, PtrOffset)) ||
1054 (!NtlmFixupAndValidateUStr(&LogonInfo->UserName, PtrOffset)) ||
1058 {
1060 }
1061
1062 LogonPwdData->IsNetwork = TRUE;
1063 LogonPwdData->LogonInfo = LogonInfo;
1064 LogonPwdData->ComputerName = ComputerName;
1066 &LogonInfo->UserName,
1067 &LogonInfo->LogonDomainName,
1068 LogonPwdData,
1069 ComputerName,
1070 SpecialAccount,
1071 AccountDomainSidPtr,
1072 UserHandlePtr,
1073 UserInfoPtr,
1074 SubStatus);
1075 if (!NT_SUCCESS(Status))
1076 {
1077 ERR("SamValidateUser failed with 0x%lx\n", Status);
1078 return Status;
1079 }
1080
1082 {
1083 Status = BuildLm20LogonProfileBuffer(ClientRequest,
1084 *UserInfoPtr,
1085 LogonPwdData,
1086 LogonProfile,
1087 LogonProfileSize);
1088 if (!NT_SUCCESS(Status))
1089 {
1090 ERR("BuildLm20LogonProfileBuffer failed with 0x%lx\n", Status);
1091 return Status;
1092 }
1093 }
1094
1095 *LogonUserRef = &LogonInfo->UserName;
1096 *LogonDomainRef = &LogonInfo->LogonDomainName;
1097
1098 return Status;
1099}
bool NtlmFixupAndValidateUStr(_Inout_ PUNICODE_STRING String, _In_ ULONG_PTR FixupOffset)
Definition: util.c:223
bool NtlmFixupAStr(_Inout_ PSTRING String, _In_ ULONG_PTR FixupOffset)
Definition: util.c:245
static NTSTATUS BuildLm20LogonProfileBuffer(_In_ PLSA_CLIENT_REQUEST ClientRequest, _In_ PSAMPR_USER_INFO_BUFFER UserInfo, _In_ PLSA_SAM_PWD_DATA LogonPwdData, _Out_ PMSV1_0_LM20_LOGON_PROFILE *ProfileBuffer, _Out_ PULONG ProfileBufferLength)
Definition: msv1_0.c:176
#define MSV1_0_RETURN_PROFILE_PATH
Definition: ntsecapi.h:47
UNICODE_STRING UserName
Definition: ntsecapi.h:460
STRING CaseInsensitiveChallengeResponse
Definition: ntsecapi.h:464
UNICODE_STRING LogonDomainName
Definition: ntsecapi.h:459
UNICODE_STRING Workstation
Definition: ntsecapi.h:461
ULONG ParameterControl
Definition: ntsecapi.h:465
STRING CaseSensitiveChallengeResponse
Definition: ntsecapi.h:463

Referenced by LsaApLogonUserEx2().

◆ MsvpChangePassword()

static NTSTATUS MsvpChangePassword ( IN PLSA_CLIENT_REQUEST  ClientRequest,
IN PVOID  ProtocolSubmitBuffer,
IN PVOID  ClientBufferBase,
IN ULONG  SubmitBufferLength,
OUT PVOID ProtocolReturnBuffer,
OUT PULONG  ReturnBufferLength,
OUT PNTSTATUS  ProtocolStatus 
)
static

Definition at line 526 of file msv1_0.c.

533{
535 PMSV1_0_CHANGEPASSWORD_REQUEST RequestBuffer;
537
538 SAMPR_HANDLE ServerHandle = NULL;
539 SAMPR_HANDLE DomainHandle = NULL;
540 SAMPR_HANDLE UserHandle = NULL;
541 PRPC_SID DomainSid = NULL;
543 SAMPR_ULONG_ARRAY RelativeIds = {0, NULL};
544 SAMPR_ULONG_ARRAY Use = {0, NULL};
545
546 ENCRYPTED_NT_OWF_PASSWORD OldNtPassword;
547 ENCRYPTED_NT_OWF_PASSWORD NewNtPassword;
548 ENCRYPTED_LM_OWF_PASSWORD OldLmPassword;
549 ENCRYPTED_LM_OWF_PASSWORD NewLmPassword;
550 OEM_STRING LmPwdString;
551 CHAR LmPwdBuffer[15];
552 BOOLEAN OldLmPasswordPresent = FALSE;
553 BOOLEAN NewLmPasswordPresent = FALSE;
554
555 ENCRYPTED_LM_OWF_PASSWORD OldLmEncryptedWithNewLm;
556 ENCRYPTED_LM_OWF_PASSWORD NewLmEncryptedWithOldLm;
557 ENCRYPTED_LM_OWF_PASSWORD OldNtEncryptedWithNewNt;
558 ENCRYPTED_LM_OWF_PASSWORD NewNtEncryptedWithOldNt;
559 PENCRYPTED_LM_OWF_PASSWORD pOldLmEncryptedWithNewLm = NULL;
560 PENCRYPTED_LM_OWF_PASSWORD pNewLmEncryptedWithOldLm = NULL;
561
562 TRACE("MsvpChangePassword()\n");
563
564 /* Parameters validation */
565
566 if (SubmitBufferLength < sizeof(MSV1_0_CHANGEPASSWORD_REQUEST))
567 {
568 ERR("Invalid SubmitBufferLength %lu\n", SubmitBufferLength);
570 }
571
572 RequestBuffer = (PMSV1_0_CHANGEPASSWORD_REQUEST)ProtocolSubmitBuffer;
573
574 /* Fix-up pointers in the request buffer info */
575 PtrOffset = (ULONG_PTR)ProtocolSubmitBuffer - (ULONG_PTR)ClientBufferBase;
576
577 Status = RtlValidateUnicodeString(0, &RequestBuffer->DomainName);
578 if (!NT_SUCCESS(Status))
580 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
581 RequestBuffer->DomainName.Buffer = FIXUP_POINTER(RequestBuffer->DomainName.Buffer, PtrOffset);
582 RequestBuffer->DomainName.MaximumLength = RequestBuffer->DomainName.Length;
583
584 Status = RtlValidateUnicodeString(0, &RequestBuffer->AccountName);
585 if (!NT_SUCCESS(Status))
587 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
588 RequestBuffer->AccountName.Buffer = FIXUP_POINTER(RequestBuffer->AccountName.Buffer, PtrOffset);
589 RequestBuffer->AccountName.MaximumLength = RequestBuffer->AccountName.Length;
590
591 Status = RtlValidateUnicodeString(0, &RequestBuffer->OldPassword);
592 if (!NT_SUCCESS(Status))
594 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
595 RequestBuffer->OldPassword.Buffer = FIXUP_POINTER(RequestBuffer->OldPassword.Buffer, PtrOffset);
596 RequestBuffer->OldPassword.MaximumLength = RequestBuffer->OldPassword.Length;
597
598 Status = RtlValidateUnicodeString(0, &RequestBuffer->NewPassword);
599 if (!NT_SUCCESS(Status))
601 // TODO: Check for Buffer limits wrt. ClientBufferBase and alignment.
602 RequestBuffer->NewPassword.Buffer = FIXUP_POINTER(RequestBuffer->NewPassword.Buffer, PtrOffset);
603 RequestBuffer->NewPassword.MaximumLength = RequestBuffer->NewPassword.Length;
604
605 TRACE("Domain: %S\n", RequestBuffer->DomainName.Buffer);
606 TRACE("Account: %S\n", RequestBuffer->AccountName.Buffer);
607 TRACE("Old Password: %S\n", RequestBuffer->OldPassword.Buffer);
608 TRACE("New Password: %S\n", RequestBuffer->NewPassword.Buffer);
609
610 /* Connect to the SAM server */
612 &ServerHandle,
614 TRUE);
615 if (!NT_SUCCESS(Status))
616 {
617 TRACE("SamIConnect() failed (Status 0x%08lx)\n", Status);
618 goto done;
619 }
620
621 /* Get the domain SID */
622 Status = SamrLookupDomainInSamServer(ServerHandle,
623 (PRPC_UNICODE_STRING)&RequestBuffer->DomainName,
624 &DomainSid);
625 if (!NT_SUCCESS(Status))
626 {
627 TRACE("SamrLookupDomainInSamServer failed (Status %08lx)\n", Status);
628 goto done;
629 }
630
631 /* Open the domain */
632 Status = SamrOpenDomain(ServerHandle,
634 DomainSid,
635 &DomainHandle);
636 if (!NT_SUCCESS(Status))
637 {
638 TRACE("SamrOpenDomain failed (Status %08lx)\n", Status);
639 goto done;
640 }
641
642 Names[0].Length = RequestBuffer->AccountName.Length;
643 Names[0].MaximumLength = RequestBuffer->AccountName.MaximumLength;
644 Names[0].Buffer = RequestBuffer->AccountName.Buffer;
645
646 /* Try to get the RID for the user name */
647 Status = SamrLookupNamesInDomain(DomainHandle,
648 1,
649 Names,
650 &RelativeIds,
651 &Use);
652 if (!NT_SUCCESS(Status))
653 {
654 TRACE("SamrLookupNamesInDomain failed (Status %08lx)\n", Status);
656 goto done;
657 }
658
659 /* Fail, if it is not a user account */
660 if (Use.Element[0] != SidTypeUser)
661 {
662 TRACE("Account is not a user account!\n");
664 goto done;
665 }
666
667 /* Open the user object */
668 Status = SamrOpenUser(DomainHandle,
670 RelativeIds.Element[0],
671 &UserHandle);
672 if (!NT_SUCCESS(Status))
673 {
674 TRACE("SamrOpenUser failed (Status %08lx)\n", Status);
675 goto done;
676 }
677
678
679 /* Calculate the NT hash for the old password */
680 Status = SystemFunction007(&RequestBuffer->OldPassword,
681 (LPBYTE)&OldNtPassword);
682 if (!NT_SUCCESS(Status))
683 {
684 TRACE("SystemFunction007 failed (Status 0x%08lx)\n", Status);
685 goto done;
686 }
687
688 /* Calculate the NT hash for the new password */
689 Status = SystemFunction007(&RequestBuffer->NewPassword,
690 (LPBYTE)&NewNtPassword);
691 if (!NT_SUCCESS(Status))
692 {
693 TRACE("SystemFunction007 failed (Status 0x%08lx)\n", Status);
694 goto done;
695 }
696
697 /* Calculate the LM password and hash for the old password */
698 LmPwdString.Length = 15;
699 LmPwdString.MaximumLength = 15;
700 LmPwdString.Buffer = LmPwdBuffer;
701 ZeroMemory(LmPwdString.Buffer, LmPwdString.MaximumLength);
702
704 &RequestBuffer->OldPassword,
705 FALSE);
706 if (NT_SUCCESS(Status))
707 {
708 /* Calculate the LM hash value of the password */
709 Status = SystemFunction006(LmPwdString.Buffer,
710 (LPSTR)&OldLmPassword);
711 if (NT_SUCCESS(Status))
712 {
713 OldLmPasswordPresent = TRUE;
714 }
715 }
716
717 /* Calculate the LM password and hash for the new password */
718 LmPwdString.Length = 15;
719 LmPwdString.MaximumLength = 15;
720 LmPwdString.Buffer = LmPwdBuffer;
721 ZeroMemory(LmPwdString.Buffer, LmPwdString.MaximumLength);
722
724 &RequestBuffer->NewPassword,
725 FALSE);
726 if (NT_SUCCESS(Status))
727 {
728 /* Calculate the LM hash value of the password */
729 Status = SystemFunction006(LmPwdString.Buffer,
730 (LPSTR)&NewLmPassword);
731 if (NT_SUCCESS(Status))
732 {
733 NewLmPasswordPresent = TRUE;
734 }
735 }
736
737 /* Encrypt the old and new LM passwords, if they exist */
738 if (OldLmPasswordPresent && NewLmPasswordPresent)
739 {
740 /* Encrypt the old LM password */
741 Status = SystemFunction012((const BYTE *)&OldLmPassword,
742 (const BYTE *)&NewLmPassword,
743 (LPBYTE)&OldLmEncryptedWithNewLm);
744 if (!NT_SUCCESS(Status))
745 {
746 TRACE("SystemFunction012 failed (Status 0x%08lx)\n", Status);
747 goto done;
748 }
749
750 /* Encrypt the new LM password */
751 Status = SystemFunction012((const BYTE *)&NewLmPassword,
752 (const BYTE *)&OldLmPassword,
753 (LPBYTE)&NewLmEncryptedWithOldLm);
754 if (!NT_SUCCESS(Status))
755 {
756 TRACE("SystemFunction012 failed (Status 0x%08lx)\n", Status);
757 goto done;
758 }
759
760 pOldLmEncryptedWithNewLm = &OldLmEncryptedWithNewLm;
761 pNewLmEncryptedWithOldLm = &NewLmEncryptedWithOldLm;
762 }
763
764 /* Encrypt the old NT password */
765 Status = SystemFunction012((const BYTE *)&OldNtPassword,
766 (const BYTE *)&NewNtPassword,
767 (LPBYTE)&OldNtEncryptedWithNewNt);
768 if (!NT_SUCCESS(Status))
769 {
770 TRACE("SystemFunction012 failed (Status 0x%08lx)\n", Status);
771 goto done;
772 }
773
774 /* Encrypt the new NT password */
775 Status = SystemFunction012((const BYTE *)&NewNtPassword,
776 (const BYTE *)&OldNtPassword,
777 (LPBYTE)&NewNtEncryptedWithOldNt);
778 if (!NT_SUCCESS(Status))
779 {
780 TRACE("SystemFunction012 failed (Status 0x%08lx)\n", Status);
781 goto done;
782 }
783
784 /* Change the password */
785 Status = SamrChangePasswordUser(UserHandle,
786 OldLmPasswordPresent && NewLmPasswordPresent,
787 pOldLmEncryptedWithNewLm,
788 pNewLmEncryptedWithOldLm,
789 TRUE,
790 &OldNtEncryptedWithNewNt,
791 &NewNtEncryptedWithOldNt,
792 FALSE,
793 NULL,
794 FALSE,
795 NULL);
796 if (!NT_SUCCESS(Status))
797 {
798 TRACE("SamrChangePasswordUser failed (Status %08lx)\n", Status);
799 goto done;
800 }
801
802done:
803 if (UserHandle != NULL)
804 SamrCloseHandle(&UserHandle);
805
806 SamIFree_SAMPR_ULONG_ARRAY(&RelativeIds);
808
809 if (DomainHandle != NULL)
810 SamrCloseHandle(&DomainHandle);
811
812 if (DomainSid != NULL)
813 SamIFreeVoid(DomainSid);
814
815 if (ServerHandle != NULL)
816 SamrCloseHandle(&ServerHandle);
817
818 return Status;
819}
PWSTR Names[]
NTSTATUS __stdcall SamrOpenDomain(SAMPR_HANDLE ServerHandle, ACCESS_MASK DesiredAccess, PRPC_SID DomainId, SAMPR_HANDLE *DomainHandle)
VOID NTAPI SamIFree_SAMPR_ULONG_ARRAY(PSAMPR_ULONG_ARRAY Ptr)
Definition: samsrv.c:524
NTSTATUS NTAPI SamIConnect(PSAMPR_SERVER_NAME ServerName, SAMPR_HANDLE *ServerHandle, ACCESS_MASK DesiredAccess, BOOLEAN Trusted)
NTSTATUS WINAPI SystemFunction006(LPCSTR password, LPSTR hash)
Definition: crypt_lmhash.c:53
NTSTATUS NTAPI SamrLookupNamesInDomain(IN SAMPR_HANDLE DomainHandle, IN ULONG Count, IN RPC_UNICODE_STRING Names[], OUT PSAMPR_ULONG_ARRAY RelativeIds, OUT PSAMPR_ULONG_ARRAY Use)
Definition: samrpc.c:3464
@ SidTypeUser
Definition: lsa.idl:118
NTSTATUS NTAPI SamrChangePasswordUser(IN SAMPR_HANDLE UserHandle, IN unsigned char LmPresent, IN PENCRYPTED_LM_OWF_PASSWORD OldLmEncryptedWithNewLm, IN PENCRYPTED_LM_OWF_PASSWORD NewLmEncryptedWithOldLm, IN unsigned char NtPresent, IN PENCRYPTED_NT_OWF_PASSWORD OldNtEncryptedWithNewNt, IN PENCRYPTED_NT_OWF_PASSWORD NewNtEncryptedWithOldNt, IN unsigned char NtCrossEncryptionPresent, IN PENCRYPTED_NT_OWF_PASSWORD NewNtEncryptedWithNewLm, IN unsigned char LmCrossEncryptionPresent, IN PENCRYPTED_LM_OWF_PASSWORD NewLmEncryptedWithNewNt)
Definition: samrpc.c:7864
NTSTATUS NTAPI SamrLookupDomainInSamServer(IN SAMPR_HANDLE ServerHandle, IN PRPC_UNICODE_STRING Name, OUT PRPC_SID *DomainId)
Definition: samrpc.c:504
NTSTATUS NTAPI SamrOpenUser(IN SAMPR_HANDLE DomainHandle, IN ACCESS_MASK DesiredAccess, IN ULONG UserId, OUT SAMPR_HANDLE *UserHandle)
VOID NTAPI SamIFreeVoid(PVOID Ptr)
Definition: samsrv.c:155
NTSYSAPI NTSTATUS NTAPI RtlUpcaseUnicodeStringToOemString(POEM_STRING DestinationString, PCUNICODE_STRING SourceString, BOOLEAN AllocateDestinationString)
#define DOMAIN_LOOKUP
Definition: ntsam.h:42
#define SAM_SERVER_LOOKUP_DOMAIN
Definition: ntsam.h:104
#define SAM_SERVER_CONNECT
Definition: ntsam.h:99
#define USER_CHANGE_PASSWORD
Definition: ntsam.h:132
struct _MSV1_0_CHANGEPASSWORD_REQUEST * PMSV1_0_CHANGEPASSWORD_REQUEST
USHORT MaximumLength
Definition: ntsecapi.h:164
UNICODE_STRING AccountName
Definition: ntsecapi.h:513
UNICODE_STRING NewPassword
Definition: ntsecapi.h:515
UNICODE_STRING OldPassword
Definition: ntsecapi.h:514
unsigned long * Element
Definition: lsasrv.h:88
NTSTATUS WINAPI SystemFunction012(const BYTE *in, const BYTE *key, LPBYTE out)
Definition: sysfunc.c:353
NTSTATUS WINAPI SystemFunction007(const UNICODE_STRING *string, LPBYTE hash)
Definition: sysfunc.c:245
unsigned char * LPBYTE
Definition: typedefs.h:53
STRING OEM_STRING
Definition: umtypes.h:203
#define ZeroMemory
Definition: winbase.h:1712
char * LPSTR
Definition: xmlstorage.h:182
char CHAR
Definition: xmlstorage.h:175
unsigned char BYTE
Definition: xxhash.c:193

Referenced by LsaApCallPackage(), and LsaApCallPackageUntrusted().

◆ SpLsaModeInitialize()

NTSTATUS NTAPI SpLsaModeInitialize ( _In_ ULONG  LsaVersion,
_Out_ PULONG  PackageVersion,
_Out_ PSECPKG_FUNCTION_TABLE ppTables,
_Out_ PULONG  pcTables 
)

Definition at line 1478 of file msv1_0.c.

1483{
1484 TRACE("SpLsaModeInitialize(0x%lx %p %p %p)\n",
1485 LsaVersion, PackageVersion, ppTables, pcTables);
1486
1487 if (LsaVersion != SECPKG_INTERFACE_VERSION)
1489
1490 *PackageVersion = SECPKG_INTERFACE_VERSION;
1491
1492 *ppTables = NtlmLsaFn;
1493 *pcTables = 1;
1494
1495 return STATUS_SUCCESS;
1496}
SECPKG_FUNCTION_TABLE NtlmLsaFn[1]
Definition: global.c:23
#define SECPKG_INTERFACE_VERSION
Definition: ntsecpkg.h:34

◆ SpUserModeInitialize()

NTSTATUS WINAPI SpUserModeInitialize ( _In_ ULONG  LsaVersion,
_Out_ PULONG  PackageVersion,
_Out_ PSECPKG_USER_FUNCTION_TABLE ppTables,
_Out_ PULONG  pcTables 
)

Definition at line 1503 of file msv1_0.c.

1508{
1509 TRACE("SpUserModeInitialize(0x%lx %p %p %p)\n",
1510 LsaVersion, PackageVersion, ppTables, pcTables);
1511
1512 if (LsaVersion != SECPKG_INTERFACE_VERSION)
1514
1515 *PackageVersion = SECPKG_INTERFACE_VERSION;
1516
1517 *ppTables = NtlmUsrFn;
1518 *pcTables = 1;
1519
1520 return STATUS_SUCCESS;
1521}
SECPKG_USER_FUNCTION_TABLE NtlmUsrFn[1]
Definition: global.c:57

◆ WINE_DEFAULT_DEBUG_CHANNEL()

WINE_DEFAULT_DEBUG_CHANNEL ( msv1_0  )