windows-nt/Source/XPSP1/NT/ds/nw/rdr/util.c

536 lines
12 KiB
C
Raw Normal View History

2020-09-26 03:20:57 -05:00
/*++
Copyright (c) 1993 Microsoft Corporation
Module Name:
Util.c
Abstract:
This module contains utilities function for the netware redirector.
Author:
Manny Weiser [MannyW] 07-Jan-1994
Revision History:
--*/
#include "Procs.h"
//
// The local debug trace level
//
#define Dbg (DEBUG_TRACE_CONVERT)
#ifdef ALLOC_PRAGMA
#ifndef QFE_BUILD
#pragma alloc_text( PAGE1, CopyBufferToMdl )
#endif
#endif
#if 0 // Not pageable
// see ifndef QFE_BUILD above
#endif
VOID
CopyBufferToMdl(
PMDL DestinationMdl,
ULONG DataOffset,
PUCHAR SourceData,
ULONG SourceByteCount
)
/*++
Routine Description:
This routine copies data from a buffer described by a pointer to a
given offset in a buffer described by an MDL.
Arguments:
DestinationMdl - The MDL for the destination buffer.
DataOffset - The offset into the destination buffer to copy the data.
SourceData - A pointer to the source data buffer.
SourceByteCount - The number of bytes to copy.
Return Value:
None.
--*/
{
ULONG BufferOffset;
ULONG PreviousBufferOffset;
PMDL Mdl;
ULONG BytesToCopy;
ULONG MdlByteCount;
PVOID pSystemVa;
DebugTrace( +1, Dbg, "MdlMoveMemory...\n", 0 );
DebugTrace( 0, Dbg, "Desitination MDL = %X\n", DestinationMdl );
DebugTrace( 0, Dbg, "DataOffset = %d\n", DataOffset );
DebugTrace( 0, Dbg, "SourceData = %X\n", SourceData );
DebugTrace( 0, Dbg, "SourceByteCount = %d\n", SourceByteCount );
BufferOffset = 0;
Mdl = DestinationMdl;
//
// Truncate the response if it is too big.
//
MdlByteCount = MdlLength( Mdl );
if ( SourceByteCount + DataOffset > MdlByteCount ) {
SourceByteCount = MdlByteCount - DataOffset;
}
while ( Mdl != NULL && SourceByteCount != 0 ) {
PreviousBufferOffset = BufferOffset;
BufferOffset += MmGetMdlByteCount( Mdl );
if ( DataOffset < BufferOffset ) {
//
// Copy the data to this buffer
//
while ( SourceByteCount > 0 ) {
BytesToCopy = MIN( SourceByteCount,
BufferOffset - DataOffset );
pSystemVa = MmGetSystemAddressForMdlSafe( Mdl, NormalPagePriority );
DebugTrace( 0, Dbg, "Copy to %X\n", (PUCHAR) pSystemVa +
DataOffset -
PreviousBufferOffset );
DebugTrace( 0, Dbg, "Copy from %X\n", SourceData );
DebugTrace( 0, Dbg, "Copy bytes %d\n", BytesToCopy );
TdiCopyLookaheadData(
(PUCHAR)pSystemVa + DataOffset - PreviousBufferOffset,
SourceData,
BytesToCopy,
0 );
SourceData += BytesToCopy;
DataOffset += BytesToCopy;
SourceByteCount -= BytesToCopy;
Mdl = Mdl->Next;
if ( Mdl != NULL ) {
PreviousBufferOffset = BufferOffset;
BufferOffset += MmGetMdlByteCount( Mdl );
} else {
ASSERT( SourceByteCount == 0 );
}
}
} else {
Mdl = Mdl->Next;
}
}
DebugTrace( -1, Dbg, "MdlMoveMemory -> VOID\n", 0 );
}
//
// These parsing routines are used to do multiple credential
// connects to a single server.
//
NTSTATUS
GetCredentialFromServerName(
IN PUNICODE_STRING puServerName,
OUT PUNICODE_STRING puCredentialName
)
/*+++
Description: Given a munged server(credential) name,
this routine returns the credential.
---*/
{
DWORD NameLength = 0;
BOOLEAN FoundFirstParen = FALSE;
BOOLEAN FoundLastParen = FALSE;
DebugTrace( 0, Dbg, "GetCredentialFromServerName: %wZ\n", puServerName );
puCredentialName->Length = puServerName->Length;
puCredentialName->Buffer = puServerName->Buffer;
//
// Find the first paren.
//
while ( ( puCredentialName->Length ) && !FoundFirstParen ) {
if ( puCredentialName->Buffer[0] == L'(' ) {
FoundFirstParen = TRUE;
}
puCredentialName->Buffer++;
puCredentialName->Length -= sizeof( WCHAR );
}
if ( !FoundFirstParen ) {
DebugTrace( 0, Dbg, "No opening paren for server(credential) name.\n", 0 );
return STATUS_UNSUCCESSFUL;
}
//
// Figure out the name length.
//
while ( ( puCredentialName->Length ) && !FoundLastParen ) {
if ( puCredentialName->Buffer[NameLength] == L')' ) {
FoundLastParen = TRUE;
}
NameLength++;
puCredentialName->Length -= sizeof( WCHAR );
}
if ( !FoundLastParen ) {
DebugTrace( 0, Dbg, "No closing paren for server(credential) name.\n", 0 );
return STATUS_UNSUCCESSFUL;
}
//
// Format the name and return. Don't count the closing paren.
//
NameLength--;
if ( !NameLength ) {
DebugTrace( 0, Dbg, "Null credential name.\n", 0 );
return STATUS_UNSUCCESSFUL;
}
puCredentialName->Length = (USHORT) (NameLength * sizeof( WCHAR ));
puCredentialName->MaximumLength = puCredentialName->Length;
DebugTrace( 0, Dbg, "GetCredentialFromServerName --> %wZ\n", puCredentialName );
return STATUS_SUCCESS;
}
NTSTATUS
BuildExCredentialServerName(
IN PUNICODE_STRING puServerName,
IN PUNICODE_STRING puUserName,
OUT PUNICODE_STRING puExCredServerName
)
/*+++
Description:
Takes a server name and a user name and makes an
ExCredServerName, which is simply: server(user)
This routine allocates memory for the credential
server name and the caller is responsible for
freeing the memory when it is no longer needed.
---*/
{
NTSTATUS Status;
PBYTE pbCredNameBuffer;
DebugTrace( 0, Dbg, "BuildExCredentialServerName\n", 0 );
if ( ( !puExCredServerName ) ||
( !puServerName ) ||
( !puUserName ) ) {
DebugTrace( 0, DEBUG_TRACE_ALWAYS, "BuildExCredentialServerName -> STATUS_INVALID_PARAMETER\n", 0 );
return STATUS_INVALID_PARAMETER;
}
puExCredServerName->MaximumLength = puServerName->Length +
puUserName->Length +
( 2 * sizeof( WCHAR ) );
pbCredNameBuffer = ALLOCATE_POOL( PagedPool,
puExCredServerName->MaximumLength );
if ( pbCredNameBuffer == NULL ) {
return STATUS_INSUFFICIENT_RESOURCES;
}
puExCredServerName->Buffer = (PWCHAR) pbCredNameBuffer;
puExCredServerName->Length = puExCredServerName->MaximumLength;
//
// Copy over the server name.
//
RtlCopyMemory( pbCredNameBuffer,
puServerName->Buffer,
puServerName->Length );
pbCredNameBuffer += puServerName->Length;
//
// Add the credential name in parenthesis.
//
*( (PWCHAR) pbCredNameBuffer ) = L'(';
pbCredNameBuffer += sizeof( WCHAR );
RtlCopyMemory( pbCredNameBuffer,
puUserName->Buffer,
puUserName->Length );
pbCredNameBuffer += puUserName->Length;
*( (PWCHAR) pbCredNameBuffer ) = L')';
DebugTrace( 0, Dbg, "BuildExCredentialServerName: %wZ\n", puExCredServerName );
return STATUS_SUCCESS;
}
NTSTATUS
UnmungeCredentialName(
IN PUNICODE_STRING puCredName,
OUT PUNICODE_STRING puServerName
)
/*+++
Description:
Given server(username), return the server
name portion.
---*/
{
USHORT Length = 0;
DebugTrace( 0, Dbg, "UnmungeCredentialName: %wZ\n", puCredName );
puServerName->Buffer = puCredName->Buffer;
puServerName->MaximumLength = puCredName->MaximumLength;
while ( Length < ( puCredName->Length / sizeof( WCHAR ) ) ) {
//
// Look for the opening paren.
//
if ( puCredName->Buffer[Length] == L'(' ) {
break;
}
Length++;
}
puServerName->Length = Length * sizeof( WCHAR );
DebugTrace( 0, Dbg, " -> %wZ\n", puServerName );
return STATUS_SUCCESS;
}
BOOLEAN
IsCredentialName(
IN PUNICODE_STRING puObjectName
)
/*+++
Description: This returns TRUE if the object is an extended
credential munged name.
---*/
{
DWORD dwCurrent = 0;
if ( !puObjectName ) {
return FALSE;
}
while ( dwCurrent < ( puObjectName->Length ) / sizeof( WCHAR ) ) {
if ( puObjectName->Buffer[dwCurrent] == L'(' ) {
return TRUE;
}
dwCurrent++;
}
return FALSE;
}
NTSTATUS
ExCreateReferenceCredentials(
PIRP_CONTEXT pIrpContext,
PUNICODE_STRING puResource
)
/*+++
On an extended create this checks for credentials
and, if they exist, references them and resets the
last used time. If the credentials do not exist
then a credential shell is created and referenced.
This function is responsible for determining the
tree name from the resource. The resource may be
a server in the tree, or the name of the tree.
---*/
{
NTSTATUS Status;
PLOGON pLogon;
PSCB pScb;
UNICODE_STRING TreeName;
PNDS_SECURITY_CONTEXT pCredentials;
UNICODE_STRING ExName;
NwAcquireExclusiveRcb( &NwRcb, TRUE );
pLogon = FindUser( &(pIrpContext->Specific.Create.UserUid), FALSE );
NwReleaseRcb( &NwRcb );
if ( !pLogon ) {
DebugTrace( 0, Dbg, "Invalid client security context in ExCreateReferenceCredentials.\n", 0 );
return STATUS_ACCESS_DENIED;
}
//
// The resource name is either a server or a tree. We need the tree
// name to create the credential. The following should work even if
// there is a server and tree with the same name.
//
Status = CreateScb( &pScb,
pIrpContext,
puResource,
NULL,
NULL,
NULL,
TRUE,
FALSE );
if ( NT_SUCCESS( Status ) ) {
//
// This is a server, dig out the tree name.
//
TreeName.Length = pScb->NdsTreeName.Length;
TreeName.MaximumLength = pScb->NdsTreeName.MaximumLength;
TreeName.Buffer = pScb->NdsTreeName.Buffer;
} else {
//
// This must already be the tree name.
//
TreeName.Length = puResource->Length;
TreeName.MaximumLength = puResource->MaximumLength;
TreeName.Buffer = puResource->Buffer;
pScb = NULL;
}
//
// Get/Create the credential shell and reference it.
//
if ( !IsCredentialName( &TreeName ) ) {
Status = BuildExCredentialServerName(
&TreeName,
pIrpContext->Specific.Create.puCredentialName,
&ExName );
if ( !NT_SUCCESS( Status ) ) {
goto ExitWithCleanup;
}
}
else {
ExName = TreeName ;
}
Status = NdsLookupCredentials( pIrpContext,
&ExName,
pLogon,
&pCredentials,
CREDENTIAL_WRITE,
TRUE );
if ( !NT_SUCCESS( Status ) ) {
goto ExitWithCleanup;
}
//
// Adjust the reference counts.
//
ASSERT( IsCredentialName( &pCredentials->NdsTreeName ) );
pCredentials->SupplementalHandleCount += 1;
KeQuerySystemTime( &pCredentials->LastUsedTime );
pIrpContext->Specific.Create.pExCredentials = pCredentials;
NwReleaseCredList( pLogon, pIrpContext );
if (ExName.Buffer != TreeName.Buffer) {
//
// only free if we allocated it via BuildExCredentialServerName
//
FREE_POOL( ExName.Buffer );
}
ExitWithCleanup:
if ( pScb ) {
NwDereferenceScb( pScb->pNpScb );
}
return Status;
}
NTSTATUS
ExCreateDereferenceCredentials(
PIRP_CONTEXT pIrpContext,
PNDS_SECURITY_CONTEXT pNdsCredentials
)
/*+++
Dereferce extended credentials.
---*/
{
NwAcquireExclusiveCredList( pNdsCredentials->pOwningLogon, pIrpContext );
pNdsCredentials->SupplementalHandleCount -= 1;
KeQuerySystemTime( &pNdsCredentials->LastUsedTime );
NwReleaseCredList( pNdsCredentials->pOwningLogon, pIrpContext );
return STATUS_SUCCESS;
}