windows-nt/Source/XPSP1/NT/ds/adsi/nds/cuar.cxx

593 lines
13 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
//---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 1995
//
// File: cuar.cxx
//
// Contents: Account Restrictions Propset for the User object
//
// History: 11-1-95 krishnag Created.
// 8-5-96 ramv Modified to be consistent with spec
//
// PROPERTY_RW(AccountDisabled, boolean, 1) I
// PROPERTY_RW(AccountExpirationDate, DATE, 2) I
// PROPERTY_RW(GraceLoginsAllowed, long, 5) NI
// PROPERTY_RW(GraceLoginsRemaining, long, 6) NI
// PROPERTY_RW(IsAccountLocked, boolean, 7) I
// PROPERTY_RW(IsAdmin, boolean, 8) I
// PROPERTY_RW(LoginHours, VARIANT, 9) I
// PROPERTY_RW(LoginWorkstations, VARIANT, 10) I
// PROPERTY_RW(MaxLogins, long, 11) I
// PROPERTY_RW(MaxStorage, long, 12) I
// PROPERTY_RW(PasswordExpirationDate, DATE, 13) I
// PROPERTY_RW(PasswordRequired, boolean, 14) I
// PROPERTY_RW(RequireUniquePassword,boolean, 15) I
//
//
//----------------------------------------------------------------------------
#include "nds.hxx"
#pragma hdrstop
// Class CNDSUser
STDMETHODIMP
CNDSUser::get_AccountDisabled(THIS_ VARIANT_BOOL FAR* retval)
{
GET_PROPERTY_VARIANT_BOOL((IADsUser *)this, AccountDisabled);
}
STDMETHODIMP
CNDSUser::put_AccountDisabled(THIS_ VARIANT_BOOL fAccountDisabled)
{
PUT_PROPERTY_VARIANT_BOOL((IADsUser *)this, AccountDisabled);
}
STDMETHODIMP
CNDSUser::get_AccountExpirationDate(THIS_ DATE FAR* retval)
{
GET_PROPERTY_DATE((IADsUser *)this, AccountExpirationDate);
}
STDMETHODIMP
CNDSUser::put_AccountExpirationDate(THIS_ DATE daAccountExpirationDate)
{
PUT_PROPERTY_DATE((IADsUser *)this, AccountExpirationDate);
}
STDMETHODIMP
CNDSUser::get_GraceLoginsAllowed(THIS_ long FAR* retval)
{
GET_PROPERTY_LONG((IADsUser *)this, GraceLoginsAllowed);
}
STDMETHODIMP
CNDSUser::put_GraceLoginsAllowed(THIS_ long lGraceLoginsAllowed)
{
PUT_PROPERTY_LONG((IADsUser *)this, GraceLoginsAllowed);
}
STDMETHODIMP
CNDSUser::get_GraceLoginsRemaining(THIS_ long FAR* retval)
{
GET_PROPERTY_LONG((IADsUser *)this, GraceLoginsRemaining);
}
STDMETHODIMP
CNDSUser::put_GraceLoginsRemaining(THIS_ long lGraceLoginsRemaining)
{
PUT_PROPERTY_LONG((IADsUser *)this, GraceLoginsRemaining);
}
STDMETHODIMP
CNDSUser::get_IsAccountLocked(THIS_ VARIANT_BOOL FAR* retval)
{
HRESULT hr;
hr = get_VARIANT_BOOL_Property(
(IADs *)this,
TEXT("Locked By Intruder"),
retval
);
RRETURN_EXP_IF_ERR(hr);
}
STDMETHODIMP
CNDSUser::put_IsAccountLocked(THIS_ VARIANT_BOOL fIsAccountLocked)
{
HRESULT hr;
hr = put_VARIANT_BOOL_Property(
(IADs *)this,
TEXT("Locked By Intruder"),
fIsAccountLocked
);
RRETURN_EXP_IF_ERR(hr);
}
STDMETHODIMP
CNDSUser::get_LoginHours(THIS_ VARIANT FAR* retval)
{
GET_PROPERTY_VARIANT((IADsUser *)this,LoginHours);
}
STDMETHODIMP
CNDSUser::put_LoginHours(THIS_ VARIANT vLoginHours)
{
PUT_PROPERTY_VARIANT((IADsUser *)this,LoginHours);
}
STDMETHODIMP
CNDSUser::get_LoginWorkstations(THIS_ VARIANT FAR* retval)
{
GET_PROPERTY_VARIANT((IADsUser *)this,LoginWorkstations);
}
STDMETHODIMP
CNDSUser::put_LoginWorkstations(THIS_ VARIANT vLoginWorkstations)
{
PUT_PROPERTY_VARIANT((IADsUser *)this,LoginWorkstations);
}
STDMETHODIMP
CNDSUser::get_MaxLogins(THIS_ long FAR* retval)
{
GET_PROPERTY_LONG((IADsUser *)this, MaxLogins);
}
STDMETHODIMP
CNDSUser::put_MaxLogins(THIS_ long lMaxLogins)
{
PUT_PROPERTY_LONG((IADsUser *)this, MaxLogins);
}
STDMETHODIMP
CNDSUser::get_MaxStorage(THIS_ long FAR* retval)
{
GET_PROPERTY_LONG((IADsUser *)this, MaxStorage);
}
STDMETHODIMP
CNDSUser::put_MaxStorage(THIS_ long lMaxStorage)
{
PUT_PROPERTY_LONG((IADsUser *)this, MaxStorage);
}
STDMETHODIMP
CNDSUser::get_PasswordExpirationDate(THIS_ DATE FAR* retval)
{
GET_PROPERTY_DATE((IADsUser *)this, PasswordExpirationDate);
}
STDMETHODIMP
CNDSUser::put_PasswordExpirationDate(THIS_ DATE daPasswordExpirationDate)
{
PUT_PROPERTY_DATE((IADsUser *)this, PasswordExpirationDate);
}
STDMETHODIMP
CNDSUser::get_PasswordRequired(THIS_ VARIANT_BOOL FAR* retval)
{
GET_PROPERTY_VARIANT_BOOL((IADsUser *)this, PasswordRequired);
}
STDMETHODIMP
CNDSUser::put_PasswordRequired(THIS_ VARIANT_BOOL fPasswordRequired)
{
PUT_PROPERTY_VARIANT_BOOL((IADsUser *)this, PasswordRequired);
}
STDMETHODIMP
CNDSUser::get_PasswordMinimumLength(THIS_ LONG FAR* retval)
{
GET_PROPERTY_LONG((IADsUser *)this, PasswordMinimumLength);
}
STDMETHODIMP
CNDSUser::put_PasswordMinimumLength(THIS_ LONG lPasswordMinimumLength)
{
PUT_PROPERTY_LONG((IADsUser *)this, PasswordMinimumLength);
}
STDMETHODIMP
CNDSUser::get_RequireUniquePassword(THIS_ VARIANT_BOOL FAR* retval)
{
GET_PROPERTY_VARIANT_BOOL((IADsUser *)this, RequireUniquePassword);
}
STDMETHODIMP
CNDSUser::put_RequireUniquePassword(THIS_ VARIANT_BOOL fRequireUniquePassword)
{
PUT_PROPERTY_VARIANT_BOOL((IADsUser *)this, RequireUniquePassword);
}
STDMETHODIMP
CNDSUser::ChangePassword(
THIS_ BSTR bstrOldPassword,
BSTR bstrNewPassword
)
{
HANDLE hObject = NULL;
LPWSTR pszNDSPathName = NULL;
DWORD dwStatus;
HRESULT hr = S_OK;
BSTR bstrADsPath = NULL;
hr = _pADs->get_ADsPath(
&bstrADsPath
);
BAIL_ON_FAILURE(hr);
hr = BuildNDSPathFromADsPath(
bstrADsPath,
&pszNDSPathName
);
BAIL_ON_FAILURE(hr);
dwStatus = ADsNwNdsOpenObject(
pszNDSPathName,
_Credentials,
&hObject,
NULL,
NULL,
NULL,
NULL
);
CHECK_AND_SET_EXTENDED_ERROR(dwStatus, hr);
dwStatus = NwNdsChangeUserPassword(
hObject,
bstrOldPassword,
bstrNewPassword
);
CHECK_AND_SET_EXTENDED_ERROR(dwStatus, hr);
error:
if (hObject) {
dwStatus = NwNdsCloseObject(hObject);
}
if (bstrADsPath) {
ADsFreeString(bstrADsPath);
}
if (pszNDSPathName) {
FreeADsStr(pszNDSPathName);
}
RRETURN_EXP_IF_ERR(hr);
}
HRESULT
NWApiSetUserPassword(
NWCONN_HANDLE hConn,
DWORD dwUserObjID,
LPWSTR pszUserName,
LPWSTR pszPassword
);
HRESULT
BuildUserNameFromADsPath(
LPWSTR pszADsPath,
LPWSTR szUserName
);
#define NW_MAX_PASSWORD_LEN 256
STDMETHODIMP
CNDSUser::SetPassword(THIS_ BSTR NewPassword)
{
HANDLE hObject = NULL;
LPWSTR pszNDSPathName = NULL;
DWORD dwStatus;
HRESULT hr = S_OK;
BSTR bstrADsPath = NULL;
WCHAR szUserName[NDS_MAX_NAME_CHARS+1];
WCHAR szPasswordCopy[NW_MAX_PASSWORD_LEN + 1];
DWORD dwObjID;
NWCONN_HANDLE hConn = NULL;
wcscpy(szPasswordCopy, NewPassword);
hr = ChangePassword(L"", szPasswordCopy);
if (!FAILED(hr)) {
return hr;
}
hr = _pADs->get_ADsPath(
&bstrADsPath
);
BAIL_ON_FAILURE(hr);
hr = BuildNDSPathFromADsPath(
bstrADsPath,
&pszNDSPathName
);
BAIL_ON_FAILURE(hr);
hr = BuildUserNameFromADsPath(
bstrADsPath,
szUserName
);
BAIL_ON_FAILURE(hr);
dwStatus = ADsNwNdsOpenObject(
pszNDSPathName,
_Credentials,
&hObject,
NULL,
NULL,
NULL,
NULL
);
CHECK_AND_SET_EXTENDED_ERROR(dwStatus, hr);
dwObjID = NwNdsGetObjectId(hObject);
hConn = NwNdsObjectHandleToConnHandle(hObject);
if (hConn == NULL) {
hr = HRESULT_FROM_WIN32(GetLastError());
BAIL_ON_FAILURE(hr);
}
hr = NWApiSetUserPassword(
hConn,
dwObjID,
szUserName,
szPasswordCopy
);
NwNdsConnHandleFree(hConn);
error:
if (hObject) {
dwStatus = NwNdsCloseObject(hObject);
}
if (bstrADsPath) {
ADsFreeString(bstrADsPath);
}
if (pszNDSPathName) {
FreeADsStr(pszNDSPathName);
}
RRETURN_EXP_IF_ERR(hr);
}
HRESULT
NWApiSetUserPassword(
NWCONN_HANDLE hConn,
DWORD dwUserObjID,
LPWSTR pszUserName,
LPWSTR pszPassword
)
{
CHAR szOemUserName[NDS_MAX_NAME_CHARS + 1];
CHAR szOemPassword[NW_MAX_PASSWORD_LEN + 1];
CHAR Buffer[128];
DWORD rc, err = 0;
HRESULT hr = S_OK;
NTSTATUS NtStatus;
UCHAR ChallengeKey[8];
UCHAR ucMoreFlag;
UCHAR ucPropFlag;
if ( !pszUserName ||
!pszPassword ) {
hr = E_INVALIDARG ;
BAIL_ON_FAILURE(hr);
}
//
// Convert UNICODE into OEM representation required by NW APIs.
//
rc = WideCharToMultiByte(
CP_OEMCP,
0,
pszUserName,
-1,
szOemUserName,
sizeof(szOemUserName),
NULL,
NULL) ;
if (rc == 0) {
err = GetLastError() ;
hr = HRESULT_FROM_WIN32(err);
BAIL_ON_FAILURE(hr);
}
_wcsupr(pszPassword) ;
rc = WideCharToMultiByte(
CP_OEMCP,
0,
pszPassword,
-1,
szOemPassword,
sizeof(szOemPassword),
NULL,
NULL) ;
if (rc == 0) {
err = GetLastError() ;
hr = HRESULT_FROM_WIN32(err);
BAIL_ON_FAILURE(hr);
}
//
// Get challenge key.
//
NtStatus = NWPGetChallengeKey(
hConn,
ChallengeKey
);
if (!NT_SUCCESS(NtStatus)) {
err = ERROR_UNEXP_NET_ERR ;
}
if (!err) {
//
// The old password and object ID make up the 17-byte Vold. This is used
// later to form the 17-byte Vc for changing password on the server.
//
UCHAR ValidationKey[8];
UCHAR NewKeyedPassword[17];
EncryptChangePassword(
(PUCHAR) "",
(PUCHAR) szOemPassword,
dwUserObjID,
ChallengeKey,
ValidationKey,
NewKeyedPassword
);
NtStatus = NWPChangeObjectPasswordEncrypted(
hConn,
szOemUserName,
OT_USER,
ValidationKey,
NewKeyedPassword
);
if (!NT_SUCCESS(NtStatus)) {
err = ERROR_NOT_SUPPORTED;
}
}
//
// Return.
//
hr = HRESULT_FROM_WIN32(err);
error:
RRETURN(hr);
}
//+---------------------------------------------------------------------------
// Function: Extract user name from ADs path
//
// Synopsis: This call attempts to extract a username from a NDS style
// ADs path. The last component is assumed to be the username.
//
// Arguments: [LPTSTR szBuffer]
// [LPVOID *ppObject]
//
// Returns: HRESULT
//
// Modifies: -
//
// History: 11-3-95 krishnag Created.
//
//----------------------------------------------------------------------------
HRESULT
BuildUserNameFromADsPath(
LPWSTR pszADsPath,
LPWSTR szUserName
)
{
OBJECTINFO ObjectInfo;
POBJECTINFO pObjectInfo = &ObjectInfo;
LPWSTR pszSrcComp = NULL;
LPWSTR pszSrcValue = NULL;
DWORD dwNumComponents = 0;
HRESULT hr = S_OK;
CLexer Lexer(pszADsPath);
memset(pObjectInfo, 0, sizeof(OBJECTINFO));
hr = ADsObject(&Lexer, pObjectInfo);
BAIL_ON_FAILURE(hr);
dwNumComponents = pObjectInfo->NumComponents ;
if (dwNumComponents) {
//
// take the last value
//
pszSrcComp = pObjectInfo->ComponentArray[dwNumComponents-1].szComponent;
pszSrcValue = pObjectInfo->ComponentArray[dwNumComponents-1].szValue;
if (pszSrcComp && pszSrcValue) {
//
// You have a CN = "MyUserName"
// Then copy the szValue as your UserName
//
wcscpy(szUserName, pszSrcValue);
}
else if (pszSrcComp) {
//
// Simply MyUserName. For example: path
// is "NDS://marsdev/mars/dev/MyUserName)"
//
wcscpy(szUserName, pszSrcComp);
}
}
error:
//
// Clean up the parser object
//
FreeObjectInfo(pObjectInfo);
RRETURN(hr);
}