windows-nt/Source/XPSP1/NT/shell/ext/netplwiz/passportmisc.cpp

249 lines
8.3 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
#include <stdafx.h>
#include "misc.h"
#define HTTPS_URL_SCHEME L"https://"
#define HTTPS_URL_SCHEME_CCH (ARRAYSIZE(HTTPS_URL_SCHEME) - 1)
// wininet reg key
#define WININET_REG_LOC L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\passport"
#define WININET_NEXUS_API "ForceNexusLookupExW"
#define PASSPORT_MAX_URL 1024
typedef BOOL (STDAPICALLTYPE *PFNFORCENEXUSLOOKUPEXW) (
IN BOOL fForce,
IN PWSTR pwszRegUrl, // user supplied buffer ...
IN OUT PDWORD pdwRegUrlLen, // ... and length (will be updated to actual length
// on successful return)
IN PWSTR pwszDARealm, // user supplied buffer ...
IN OUT PDWORD pdwDARealmLen // ... and length (will be updated to actual length
// on successful return)
);
// Misc functions
HRESULT PassportGetURL(PCWSTR pszName, PWSTR pszBuf, PDWORD pdwBufLen);
VOID PassportForceNexusRepopulate();
class CPassportClientServices :
public CObjectSafety,
public CImpIDispatch,
public IPassportClientServices
{
public:
CPassportClientServices() :
CImpIDispatch(LIBID_Shell32, 1, 0, IID_IPassportClientServices),
_cRef(1) {}
// IUnknown
STDMETHOD(QueryInterface)(REFIID riid, void **ppvObj);
STDMETHOD_(ULONG,AddRef)(void);
STDMETHOD_(ULONG,Release)(void);
// IDispatch
STDMETHODIMP GetTypeInfoCount(UINT *pctinfo)
{ return E_NOTIMPL; }
STDMETHODIMP GetTypeInfo(UINT iTInfo, LCID lcid, ITypeInfo **ppTInfo)
{ return CImpIDispatch::GetTypeInfo(iTInfo, lcid, ppTInfo); }
STDMETHODIMP GetIDsOfNames(REFIID riid, LPOLESTR *rgszNames, UINT cNames, LCID lcid, DISPID *rgDispId)
{ return CImpIDispatch::GetIDsOfNames(riid, rgszNames, cNames, lcid, rgDispId); }
STDMETHODIMP Invoke(DISPID dispIdMember, REFIID riid, LCID lcid, WORD wFlags, DISPPARAMS *pDispParams, VARIANT *pVarResult, EXCEPINFO *pExcepInfo, UINT *puArgErr)
{ return CImpIDispatch::Invoke(dispIdMember, riid, lcid, wFlags, pDispParams, pVarResult, pExcepInfo, puArgErr); }
// IPassportClientServices
STDMETHOD(MemberExists)(BSTR bstrUser, BSTR bstrPassword, VARIANT_BOOL* pvfExists);
private:
long _cRef;
};
STDAPI CPassportClientServices_CreateInstance(IUnknown* pUnkOuter, IUnknown** ppunk, LPCOBJECTINFO poi)
{
CPassportClientServices *pPCS = new CPassportClientServices();
if (!pPCS)
return E_OUTOFMEMORY;
HRESULT hr = pPCS->QueryInterface(IID_PPV_ARG(IUnknown, ppunk));
pPCS->Release();
return hr;
}
ULONG CPassportClientServices::AddRef()
{
return InterlockedIncrement(&_cRef);
}
ULONG CPassportClientServices::Release()
{
if (InterlockedDecrement(&_cRef))
return _cRef;
delete this;
return 0;
}
HRESULT CPassportClientServices::QueryInterface(REFIID riid, void **ppv)
{
static const QITAB qit[] =
{
QITABENT(CPassportClientServices, IObjectSafety), // IID_IObjectSafety
QITABENT(CPassportClientServices, IDispatch), // IID_IDispatch
QITABENT(CPassportClientServices, IPassportClientServices), // IID_IPassportClientServices
{0, 0 },
};
return QISearch(this, qit, riid, ppv);
}
// DONT_USE_HTTPS - Uncomment this #define to turn off secure sending of information - for debugging purposes only
HRESULT CPassportClientServices::MemberExists(BSTR bstrUser, BSTR bstrPassword, VARIANT_BOOL* pvfExists)
{
*pvfExists = VARIANT_FALSE;
WCHAR szURL[PASSPORT_MAX_URL];
DWORD cch = PASSPORT_MAX_URL;
HRESULT hr = PassportGetURL(PASSPORTURL_LOGON, szURL, &cch);
if (SUCCEEDED(hr))
{
PBYTE lpBuffer = NULL;
if (0 == StrCmpNI(szURL, HTTPS_URL_SCHEME, HTTPS_URL_SCHEME_CCH))
{
PWSTR pszServer = szURL + HTTPS_URL_SCHEME_CCH;
// NULL terminate
PWSTR psz = wcschr(pszServer, L'/');
if (psz)
{
*psz = L'\0';
}
HINTERNET hInternet = InternetOpen(L"Shell Registration",
INTERNET_OPEN_TYPE_PRECONFIG,
NULL,
NULL,
0);
if (hInternet)
{
HINTERNET hConnection = InternetConnectW(hInternet,
pszServer,
INTERNET_DEFAULT_HTTPS_PORT,
bstrUser,
bstrPassword,
INTERNET_SERVICE_HTTP,
0,
0);
if (psz)
{
*psz = L'/';
}
if (hConnection)
{
// set username/pwd
// send the GET request
HINTERNET hRequest = HttpOpenRequest(hConnection,
NULL,
psz,
L"HTTP/1.1",
NULL,
NULL,
INTERNET_FLAG_PRAGMA_NOCACHE | INTERNET_FLAG_SECURE,
0);
if (hRequest)
{
if (HttpSendRequest(hRequest, NULL, 0, NULL, 0))
{
DWORD dwStatus, dwLength = sizeof(dwStatus);
if (HttpQueryInfo(hRequest,
HTTP_QUERY_STATUS_CODE |
HTTP_QUERY_FLAG_NUMBER,
&dwStatus,
&dwLength,
NULL))
{
// if 200, member is there ...
if (dwStatus == 200)
{
*pvfExists = VARIANT_TRUE;
}
}
}
InternetCloseHandle(hRequest);
}
InternetCloseHandle(hConnection);
}
InternetCloseHandle(hInternet);
}
}
}
return S_OK;
}
//
// read registry for the desired URL
//
HRESULT _PassportGetURLFromHKey(HKEY hkey, PCWSTR pszName, PWSTR pszBuf, PDWORD pdwBufLen)
{
HRESULT hr = E_FAIL;
HKEY hk;
LONG lErr = RegOpenKeyExW(hkey,
WININET_REG_LOC,
0,
KEY_READ,
&hk);
if (!lErr)
{
DWORD type;
lErr = RegQueryValueExW(hk,
pszName,
0,
&type,
(PBYTE)pszBuf,
pdwBufLen);
if ((!lErr) &&
(L'\0' != *pszBuf))
{
hr = S_OK;
}
RegCloseKey(hk);
}
return hr;
}
HRESULT PassportGetURL(PCWSTR pszName, PWSTR pszBuf, PDWORD pdwBufLen)
{
PassportForceNexusRepopulate();
HRESULT hr = _PassportGetURLFromHKey(HKEY_LOCAL_MACHINE, pszName, pszBuf, pdwBufLen);
if (FAILED(hr))
{
hr = _PassportGetURLFromHKey(HKEY_CURRENT_USER, pszName, pszBuf, pdwBufLen);
}
return hr;
}
//
// populate nexus values
//
// #define USE_PRIVATE_WININET
VOID PassportForceNexusRepopulate()
{
#ifdef USE_PRIVATE_WININET
HMODULE hm = LoadLibraryA(".\\wininet.dll");
#else
HMODULE hm = LoadLibraryA("wininet.dll");
#endif
if (hm)
{
PFNFORCENEXUSLOOKUPEXW pfnForceNexusLookupExW = (PFNFORCENEXUSLOOKUPEXW) GetProcAddress(hm, WININET_NEXUS_API);
if (pfnForceNexusLookupExW)
{
pfnForceNexusLookupExW(TRUE, NULL, 0, NULL, 0);
}
FreeLibrary(hm);
}
}