#include #include "misc.h" #define HTTPS_URL_SCHEME L"https://" #define HTTPS_URL_SCHEME_CCH (ARRAYSIZE(HTTPS_URL_SCHEME) - 1) // wininet reg key #define WININET_REG_LOC L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\passport" #define WININET_NEXUS_API "ForceNexusLookupExW" #define PASSPORT_MAX_URL 1024 typedef BOOL (STDAPICALLTYPE *PFNFORCENEXUSLOOKUPEXW) ( IN BOOL fForce, IN PWSTR pwszRegUrl, // user supplied buffer ... IN OUT PDWORD pdwRegUrlLen, // ... and length (will be updated to actual length // on successful return) IN PWSTR pwszDARealm, // user supplied buffer ... IN OUT PDWORD pdwDARealmLen // ... and length (will be updated to actual length // on successful return) ); // Misc functions HRESULT PassportGetURL(PCWSTR pszName, PWSTR pszBuf, PDWORD pdwBufLen); VOID PassportForceNexusRepopulate(); class CPassportClientServices : public CObjectSafety, public CImpIDispatch, public IPassportClientServices { public: CPassportClientServices() : CImpIDispatch(LIBID_Shell32, 1, 0, IID_IPassportClientServices), _cRef(1) {} // IUnknown STDMETHOD(QueryInterface)(REFIID riid, void **ppvObj); STDMETHOD_(ULONG,AddRef)(void); STDMETHOD_(ULONG,Release)(void); // IDispatch STDMETHODIMP GetTypeInfoCount(UINT *pctinfo) { return E_NOTIMPL; } STDMETHODIMP GetTypeInfo(UINT iTInfo, LCID lcid, ITypeInfo **ppTInfo) { return CImpIDispatch::GetTypeInfo(iTInfo, lcid, ppTInfo); } STDMETHODIMP GetIDsOfNames(REFIID riid, LPOLESTR *rgszNames, UINT cNames, LCID lcid, DISPID *rgDispId) { return CImpIDispatch::GetIDsOfNames(riid, rgszNames, cNames, lcid, rgDispId); } STDMETHODIMP Invoke(DISPID dispIdMember, REFIID riid, LCID lcid, WORD wFlags, DISPPARAMS *pDispParams, VARIANT *pVarResult, EXCEPINFO *pExcepInfo, UINT *puArgErr) { return CImpIDispatch::Invoke(dispIdMember, riid, lcid, wFlags, pDispParams, pVarResult, pExcepInfo, puArgErr); } // IPassportClientServices STDMETHOD(MemberExists)(BSTR bstrUser, BSTR bstrPassword, VARIANT_BOOL* pvfExists); private: long _cRef; }; STDAPI CPassportClientServices_CreateInstance(IUnknown* pUnkOuter, IUnknown** ppunk, LPCOBJECTINFO poi) { CPassportClientServices *pPCS = new CPassportClientServices(); if (!pPCS) return E_OUTOFMEMORY; HRESULT hr = pPCS->QueryInterface(IID_PPV_ARG(IUnknown, ppunk)); pPCS->Release(); return hr; } ULONG CPassportClientServices::AddRef() { return InterlockedIncrement(&_cRef); } ULONG CPassportClientServices::Release() { if (InterlockedDecrement(&_cRef)) return _cRef; delete this; return 0; } HRESULT CPassportClientServices::QueryInterface(REFIID riid, void **ppv) { static const QITAB qit[] = { QITABENT(CPassportClientServices, IObjectSafety), // IID_IObjectSafety QITABENT(CPassportClientServices, IDispatch), // IID_IDispatch QITABENT(CPassportClientServices, IPassportClientServices), // IID_IPassportClientServices {0, 0 }, }; return QISearch(this, qit, riid, ppv); } // DONT_USE_HTTPS - Uncomment this #define to turn off secure sending of information - for debugging purposes only HRESULT CPassportClientServices::MemberExists(BSTR bstrUser, BSTR bstrPassword, VARIANT_BOOL* pvfExists) { *pvfExists = VARIANT_FALSE; WCHAR szURL[PASSPORT_MAX_URL]; DWORD cch = PASSPORT_MAX_URL; HRESULT hr = PassportGetURL(PASSPORTURL_LOGON, szURL, &cch); if (SUCCEEDED(hr)) { PBYTE lpBuffer = NULL; if (0 == StrCmpNI(szURL, HTTPS_URL_SCHEME, HTTPS_URL_SCHEME_CCH)) { PWSTR pszServer = szURL + HTTPS_URL_SCHEME_CCH; // NULL terminate PWSTR psz = wcschr(pszServer, L'/'); if (psz) { *psz = L'\0'; } HINTERNET hInternet = InternetOpen(L"Shell Registration", INTERNET_OPEN_TYPE_PRECONFIG, NULL, NULL, 0); if (hInternet) { HINTERNET hConnection = InternetConnectW(hInternet, pszServer, INTERNET_DEFAULT_HTTPS_PORT, bstrUser, bstrPassword, INTERNET_SERVICE_HTTP, 0, 0); if (psz) { *psz = L'/'; } if (hConnection) { // set username/pwd // send the GET request HINTERNET hRequest = HttpOpenRequest(hConnection, NULL, psz, L"HTTP/1.1", NULL, NULL, INTERNET_FLAG_PRAGMA_NOCACHE | INTERNET_FLAG_SECURE, 0); if (hRequest) { if (HttpSendRequest(hRequest, NULL, 0, NULL, 0)) { DWORD dwStatus, dwLength = sizeof(dwStatus); if (HttpQueryInfo(hRequest, HTTP_QUERY_STATUS_CODE | HTTP_QUERY_FLAG_NUMBER, &dwStatus, &dwLength, NULL)) { // if 200, member is there ... if (dwStatus == 200) { *pvfExists = VARIANT_TRUE; } } } InternetCloseHandle(hRequest); } InternetCloseHandle(hConnection); } InternetCloseHandle(hInternet); } } } return S_OK; } // // read registry for the desired URL // HRESULT _PassportGetURLFromHKey(HKEY hkey, PCWSTR pszName, PWSTR pszBuf, PDWORD pdwBufLen) { HRESULT hr = E_FAIL; HKEY hk; LONG lErr = RegOpenKeyExW(hkey, WININET_REG_LOC, 0, KEY_READ, &hk); if (!lErr) { DWORD type; lErr = RegQueryValueExW(hk, pszName, 0, &type, (PBYTE)pszBuf, pdwBufLen); if ((!lErr) && (L'\0' != *pszBuf)) { hr = S_OK; } RegCloseKey(hk); } return hr; } HRESULT PassportGetURL(PCWSTR pszName, PWSTR pszBuf, PDWORD pdwBufLen) { PassportForceNexusRepopulate(); HRESULT hr = _PassportGetURLFromHKey(HKEY_LOCAL_MACHINE, pszName, pszBuf, pdwBufLen); if (FAILED(hr)) { hr = _PassportGetURLFromHKey(HKEY_CURRENT_USER, pszName, pszBuf, pdwBufLen); } return hr; } // // populate nexus values // // #define USE_PRIVATE_WININET VOID PassportForceNexusRepopulate() { #ifdef USE_PRIVATE_WININET HMODULE hm = LoadLibraryA(".\\wininet.dll"); #else HMODULE hm = LoadLibraryA("wininet.dll"); #endif if (hm) { PFNFORCENEXUSLOOKUPEXW pfnForceNexusLookupExW = (PFNFORCENEXUSLOOKUPEXW) GetProcAddress(hm, WININET_NEXUS_API); if (pfnForceNexusLookupExW) { pfnForceNexusLookupExW(TRUE, NULL, 0, NULL, 0); } FreeLibrary(hm); } }