windows-nt/Source/XPSP1/NT/net/ias/providers/ntuser/dll/samutil.cpp

199 lines
4.7 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
///////////////////////////////////////////////////////////////////////////////
//
// Copyright (c) 1998, Microsoft Corp. All rights reserved.
//
// FILE
//
// samutil.cpp
//
// SYNOPSIS
//
// Defines the functions IASEncryptAttribute & IASProcessFailure.
//
// MODIFICATION HISTORY
//
// 08/24/1998 Original version.
// 02/13/1999 Check for VSAs in IASEncryptAttribute.
// 03/23/1999 Added IASStoreFQUserName.
// 05/04/1999 New reason codes.
// 05/11/1999 Fix RADIUS encryption.
// 07/09/1999 IAS_ATTRIBUTE_FULLY_QUALIFIED_USER_NAME is internal.
// 10/21/1999 Add support for IAS_NO_CLEARTEXT_PASSWORD.
//
///////////////////////////////////////////////////////////////////////////////
#include <ias.h>
#include <lm.h>
#include <ntdsapi.h>
#include <sdoias.h>
#include <samutil.h>
HRESULT
WINAPI
IASStoreFQUserName(
IAttributesRaw* request,
DS_NAME_FORMAT format,
PCWSTR fqdn
) throw ()
{
// Check the arguments.
if (!request || !fqdn) { return E_POINTER; }
// Convert DN's to canonical names.
PDS_NAME_RESULTW result = NULL;
if (format == DS_FQDN_1779_NAME)
{
DWORD err = DsCrackNamesW(
NULL,
DS_NAME_FLAG_SYNTACTICAL_ONLY,
format,
DS_CANONICAL_NAME,
1,
&fqdn,
&result
);
if (err == NO_ERROR &&
result->cItems == 1 &&
result->rItems[0].status == DS_NAME_NO_ERROR)
{
fqdn = result->rItems[0].pName;
}
}
HRESULT hr;
// Allocate an attribute.
PIASATTRIBUTE attr;
if (IASAttributeAlloc(1, &attr) == NO_ERROR)
{
// Allocate memory for the string.
ULONG nbyte = (wcslen(fqdn) + 1) * sizeof(WCHAR);
attr->Value.String.pszWide = (PWSTR)CoTaskMemAlloc(nbyte);
if (attr->Value.String.pszWide)
{
// Copy in the value.
memcpy(attr->Value.String.pszWide, fqdn, nbyte);
attr->Value.String.pszAnsi = NULL;
// Set the other fields of the struct.
attr->Value.itType = IASTYPE_STRING;
attr->dwId = IAS_ATTRIBUTE_FULLY_QUALIFIED_USER_NAME;
// Remove any existing attributes of this type.
request->RemoveAttributesByType(1, &attr->dwId);
// Store the attribute in the request.
ATTRIBUTEPOSITION pos = { 0, attr };
hr = request->AddAttributes(1, &pos);
}
else
{
// CoTaskMemAlloc failed.
hr = E_OUTOFMEMORY;
}
// Free up the attribute.
IASAttributeRelease(attr);
}
else
{
// IASAttributeAlloc failed.
hr = E_OUTOFMEMORY;
}
DsFreeNameResult(result);
return hr;
}
VOID
WINAPI
IASEncryptBuffer(
IAttributesRaw* request,
BOOL salted,
PBYTE buf,
ULONG buflen
) throw ()
{
/////////
// Do we have the attributes required for encryption.
/////////
PIASATTRIBUTE secret, header;
secret = IASPeekAttribute(
request,
IAS_ATTRIBUTE_SHARED_SECRET,
IASTYPE_OCTET_STRING
);
header = IASPeekAttribute(
request,
IAS_ATTRIBUTE_CLIENT_PACKET_HEADER,
IASTYPE_OCTET_STRING
);
if (secret && header)
{
IASRadiusCrypt(
TRUE,
salted,
secret->Value.OctetString.lpValue,
secret->Value.OctetString.dwLength,
header->Value.OctetString.lpValue + 4,
buf,
buflen
);
}
}
IASREQUESTSTATUS
WINAPI
IASProcessFailure(
IRequest* pRequest,
HRESULT hrError
)
{
if (pRequest == NULL) { return IAS_REQUEST_STATUS_ABORT; }
if (hrError == S_OK) { hrError = E_FAIL; }
IASRESPONSE response;
IASREQUESTSTATUS status;
switch (hrError)
{
// Errors which cause a reject.
case IAS_NO_SUCH_DOMAIN:
case IAS_NO_SUCH_USER:
case IAS_AUTH_FAILURE:
case IAS_CHANGE_PASSWORD_FAILURE:
case IAS_UNSUPPORTED_AUTH_TYPE:
case IAS_NO_CLEARTEXT_PASSWORD:
case IAS_LM_NOT_ALLOWED:
case IAS_LOCAL_USERS_ONLY:
case IAS_PASSWORD_MUST_CHANGE:
case IAS_ACCOUNT_DISABLED:
case IAS_ACCOUNT_EXPIRED:
case IAS_ACCOUNT_LOCKED_OUT:
case IAS_INVALID_LOGON_HOURS:
case IAS_ACCOUNT_RESTRICTION:
{
response = IAS_RESPONSE_ACCESS_REJECT;
status = IAS_REQUEST_STATUS_HANDLED;
break;
}
// Everything else we discard.
default:
{
response = IAS_RESPONSE_DISCARD_PACKET;
status = IAS_REQUEST_STATUS_ABORT;
}
}
HRESULT hr = pRequest->SetResponse(response, hrError);
return (FAILED(hr)) ? IAS_REQUEST_STATUS_ABORT : status;
}