/*++ Copyright (c) 1991 Microsoft Corporation Module Name: user.c Abstract: NetUser API functions Author: Cliff Van Dyke (cliffv) 26-Mar-1991 Environment: User mode only. Contains NT-specific code. Requires ANSI C extensions: slash-slash comments, long external names. Revision History: 17-Apr-1991 (cliffv) Incorporated review comments. 20-Jan-1992 (madana) Sundry API changes 28-Nov-1992 (chuckc) Added stub for NetUserGetLocalGroups 1-Dec-1992 (chuckc) Added real code for NetUserGetLocalGroups --*/ #include #include #include #undef DOMAIN_ALL_ACCESS // defined in both ntsam.h and ntwinapi.h #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /*lint -e614 */ /* Auto aggregate initializers need not be constant */ // Lint complains about casts of one structure type to another. // That is done frequently in the code below. /*lint -e740 */ /* don't complain about unusual cast */ // // Define the SAM info classes and pseudo-classes used in NetUserModalsSet. // // The values of these definitions must match the order of the // SamInfoClass array in NetUserModalsSet. // #define SAM_LogoffClass 0 #define SAM_NameClass 1 #define SAM_PasswordClass 2 #define SAM_ReplicationClass 3 #define SAM_ServerRoleClass 4 #define SAM_LockoutClass 5 // // Relate the NetUser API fields to the SAM API fields. // // This table contains as much information as possible to describe the // relationship between fields in the NetUser API and the SAM API. // struct _USER_UAS_SAM_TABLE { // // Describe the field types for UAS and SAM. // enum { UMT_STRING, // UAS is LPWSTR. SAM is UNICODE_STRING. UMT_USHORT, // UAS is DWORD. SAM is USHORT. UMT_ULONG, // UAS is DWORD. SAM is ULONG. UMT_ROLE, // UAS is role. SAM is enum. UMT_DELTA // UAS is delta seconds. SAM is LARGE_INTEGER. } ModalsFieldType; // // Define the UAS level and UAS parmnum for this field // DWORD UasLevel; DWORD UasParmNum; // // Describe the byte offset of the field in the appropriate UAS // and SAM structures. // DWORD UasOffset; DWORD SamOffset; // // Index to the structure describing the Sam Information class. // // If multiple fields use the same Sam information class, then // this field should have the same index for each such field. // DWORD Class; } UserUasSamTable[] = { { UMT_USHORT, 0, MODALS_MIN_PASSWD_LEN_PARMNUM, offsetof( USER_MODALS_INFO_0, usrmod0_min_passwd_len ), offsetof( DOMAIN_PASSWORD_INFORMATION, MinPasswordLength ), SAM_PasswordClass }, { UMT_USHORT, 1001, MODALS_MIN_PASSWD_LEN_PARMNUM, offsetof( USER_MODALS_INFO_1001, usrmod1001_min_passwd_len ), offsetof( DOMAIN_PASSWORD_INFORMATION, MinPasswordLength ), SAM_PasswordClass }, { UMT_DELTA, 0, MODALS_MAX_PASSWD_AGE_PARMNUM, offsetof( USER_MODALS_INFO_0, usrmod0_max_passwd_age ), offsetof( DOMAIN_PASSWORD_INFORMATION, MaxPasswordAge ), SAM_PasswordClass }, { UMT_DELTA, 1002, MODALS_MAX_PASSWD_AGE_PARMNUM, offsetof( USER_MODALS_INFO_1002, usrmod1002_max_passwd_age ), offsetof( DOMAIN_PASSWORD_INFORMATION, MaxPasswordAge ), SAM_PasswordClass }, { UMT_DELTA, 0, MODALS_MIN_PASSWD_AGE_PARMNUM, offsetof( USER_MODALS_INFO_0, usrmod0_min_passwd_age ), offsetof( DOMAIN_PASSWORD_INFORMATION, MinPasswordAge ), SAM_PasswordClass }, { UMT_DELTA, 1003, MODALS_MIN_PASSWD_AGE_PARMNUM, offsetof( USER_MODALS_INFO_1003, usrmod1003_min_passwd_age ), offsetof( DOMAIN_PASSWORD_INFORMATION, MinPasswordAge ), SAM_PasswordClass }, { UMT_DELTA, 0, MODALS_FORCE_LOGOFF_PARMNUM, offsetof( USER_MODALS_INFO_0, usrmod0_force_logoff ), offsetof( DOMAIN_LOGOFF_INFORMATION, ForceLogoff ), SAM_LogoffClass }, { UMT_DELTA, 1004, MODALS_FORCE_LOGOFF_PARMNUM, offsetof( USER_MODALS_INFO_1004, usrmod1004_force_logoff ), offsetof( DOMAIN_LOGOFF_INFORMATION, ForceLogoff ), SAM_LogoffClass }, { UMT_USHORT, 0, MODALS_PASSWD_HIST_LEN_PARMNUM, offsetof( USER_MODALS_INFO_0, usrmod0_password_hist_len ), offsetof( DOMAIN_PASSWORD_INFORMATION, PasswordHistoryLength ), SAM_PasswordClass }, { UMT_USHORT, 1005, MODALS_PASSWD_HIST_LEN_PARMNUM, offsetof( USER_MODALS_INFO_1005, usrmod1005_password_hist_len ), offsetof( DOMAIN_PASSWORD_INFORMATION, PasswordHistoryLength ), SAM_PasswordClass }, { UMT_ROLE, 1, MODALS_ROLE_PARMNUM, offsetof( USER_MODALS_INFO_1, usrmod1_role ), offsetof( DOMAIN_SERVER_ROLE_INFORMATION, DomainServerRole ), SAM_ServerRoleClass }, { UMT_ROLE, 1006, MODALS_ROLE_PARMNUM, offsetof( USER_MODALS_INFO_1006, usrmod1006_role ), offsetof( DOMAIN_SERVER_ROLE_INFORMATION, DomainServerRole ), SAM_ServerRoleClass }, { UMT_STRING, 1, MODALS_PRIMARY_PARMNUM, offsetof( USER_MODALS_INFO_1, usrmod1_primary ), offsetof( DOMAIN_REPLICATION_INFORMATION, ReplicaSourceNodeName ), SAM_ReplicationClass }, { UMT_STRING, 1007, MODALS_PRIMARY_PARMNUM, offsetof( USER_MODALS_INFO_1007, usrmod1007_primary ), offsetof( DOMAIN_REPLICATION_INFORMATION, ReplicaSourceNodeName ), SAM_ReplicationClass }, { UMT_STRING, 2, MODALS_DOMAIN_NAME_PARMNUM, offsetof( USER_MODALS_INFO_2, usrmod2_domain_name ), offsetof( DOMAIN_NAME_INFORMATION, DomainName ), SAM_NameClass }, { UMT_DELTA, 3, MODALS_LOCKOUT_DURATION_PARMNUM, offsetof( USER_MODALS_INFO_3, usrmod3_lockout_duration ), offsetof( DOMAIN_LOCKOUT_INFORMATION, LockoutDuration ), SAM_LockoutClass }, { UMT_DELTA, 3, MODALS_LOCKOUT_OBSERVATION_WINDOW_PARMNUM, offsetof( USER_MODALS_INFO_3, usrmod3_lockout_observation_window ), offsetof( DOMAIN_LOCKOUT_INFORMATION, LockoutObservationWindow ), SAM_LockoutClass }, { UMT_USHORT, 3, MODALS_LOCKOUT_THRESHOLD_PARMNUM, offsetof( USER_MODALS_INFO_3, usrmod3_lockout_threshold ), offsetof( DOMAIN_LOCKOUT_INFORMATION, LockoutThreshold ), SAM_LockoutClass }, }; NET_API_STATUS NET_API_FUNCTION NetUserAdd( IN LPCWSTR ServerName OPTIONAL, IN DWORD Level, IN LPBYTE Buffer, OUT LPDWORD ParmError OPTIONAL // Name required by NetpSetParmError ) /*++ Routine Description: Create a user account in the user accounts database. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. Level - Level of information provided. Must be 1, 2, 3 or 22. Buffer - A pointer to the buffer containing the user information structure. ParmError - Optional pointer to a DWORD to return the index of the first parameter in error when ERROR_INVALID_PARAMETER is returned. If NULL, the parameter is not returned on error. Return Value: Error code for the operation. --*/ { UNICODE_STRING UserNameString; NET_API_STATUS NetStatus; NTSTATUS Status; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE UserHandle = NULL; SAM_HANDLE DomainHandle = NULL; ULONG RelativeId; ULONG GrantedAccess; ULONG NewSamAccountType; DWORD UasUserFlags; ULONG WhichFieldsMask = 0xFFFFFFFF; // // Variables for building the new user's Sid // PSID DomainId = NULL; // Domain Id of the primary domain IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: entered \n")); } // // Initialize // NetpSetParmError( PARM_ERROR_NONE ); // // Validate Level parameter. // switch (Level) { case 1: case 2: case 3: case 4: NetpAssert ( offsetof( USER_INFO_1, usri1_flags ) == offsetof( USER_INFO_2, usri2_flags ) ); NetpAssert ( offsetof( USER_INFO_1, usri1_flags ) == offsetof( USER_INFO_3, usri3_flags ) ); NetpAssert ( offsetof( USER_INFO_1, usri1_flags ) == offsetof( USER_INFO_4, usri4_flags ) ); UasUserFlags = ((PUSER_INFO_1)Buffer)->usri1_flags; break; case 22: UasUserFlags = ((PUSER_INFO_22)Buffer)->usri22_flags; break; default: return ERROR_INVALID_LEVEL; // Nothing to cleanup yet } // // Determine the account type we're creating. // if( UasUserFlags & UF_ACCOUNT_TYPE_MASK ) { // // Account Types bits are exclusive, so make sure that // precisely one Account Type bit is set. // if ( !JUST_ONE_BIT( UasUserFlags & UF_ACCOUNT_TYPE_MASK )) { NetpSetParmError( USER_FLAGS_PARMNUM ); NetStatus = ERROR_INVALID_PARAMETER; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: Invalid account control bits (2) \n" )); } goto Cleanup; } // // Determine what the new account type should be. // if ( UasUserFlags & UF_TEMP_DUPLICATE_ACCOUNT ) { NewSamAccountType = USER_TEMP_DUPLICATE_ACCOUNT; } else if ( UasUserFlags & UF_NORMAL_ACCOUNT ) { NewSamAccountType = USER_NORMAL_ACCOUNT; } else if (UasUserFlags & UF_WORKSTATION_TRUST_ACCOUNT){ NewSamAccountType = USER_WORKSTATION_TRUST_ACCOUNT; // Because of a bug in NT 3.5x, we have to initially create SERVER // and interdomain trust accounts as normal accounts and change them // later. Specifically, SAM didn't call I_NetNotifyMachineAccount // in SamCreateUser2InDomain. Therefore, netlogon didn't get notified // of the change. That bug is fixed in NT 4.0. // // In NT 5.0, we relaxed that restriction for BDC accounts. An NT 5.0 // client creating a BDC account on an NT 3.5x DC will have the problem // above. However, by making the change, an NT 5.0 BDC creating a BDC // account on an NT 5.0 DC will properly create the BDC account as a // Computer object. // } else if ( UasUserFlags & UF_SERVER_TRUST_ACCOUNT ) { NewSamAccountType = USER_SERVER_TRUST_ACCOUNT; } else if (UasUserFlags & UF_INTERDOMAIN_TRUST_ACCOUNT){ NewSamAccountType = USER_NORMAL_ACCOUNT; } else { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: Invalid account type (3)\n")); } NetStatus = NERR_InternalError; goto Cleanup; } // // If SAM has none of its bits set, // set USER_NORMAL_ACCOUNT. // } else { NewSamAccountType = USER_NORMAL_ACCOUNT; } // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domain asking for DOMAIN_CREATE_USER access. // // DOMAIN_LOOKUP is needed to lookup group memberships later. // // DOMAIN_READ_PASSWORD_PARAMETERS is needed in those cases that we'll // set the password on the account. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_CREATE_USER | DOMAIN_LOOKUP | DOMAIN_READ_PASSWORD_PARAMETERS, TRUE, // Account Domain &DomainHandle, &DomainId ); if ( NetStatus == ERROR_ACCESS_DENIED && NewSamAccountType == USER_WORKSTATION_TRUST_ACCOUNT ) { // Workstation accounts can be created with either DOMAIN_CREATE_USER access // or SE_CREATE_MACHINE_ACCOUNT_PRIVILEGE. So we'll try both. // In the later case, we probably will only have access to the account // to set the password, so we'll avoid setting any other parameters on the // account. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP | DOMAIN_READ_PASSWORD_PARAMETERS, TRUE, // Account Domain &DomainHandle, &DomainId ); WhichFieldsMask = USER_ALL_NTPASSWORDPRESENT; } if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: UaspOpenDomain returns %ld\n", NetStatus )); } goto Cleanup; } // // Create the User with the specified name // Create workstation trust accounts(and default security descriptor). // RtlInitUnicodeString( &UserNameString, ((PUSER_INFO_1)Buffer)->usri1_name ); Status = SamCreateUser2InDomain( DomainHandle, &UserNameString, NewSamAccountType, GENERIC_READ | GENERIC_WRITE | GENERIC_EXECUTE | WRITE_DAC | DELETE | USER_FORCE_PASSWORD_CHANGE | USER_READ_ACCOUNT | USER_WRITE_ACCOUNT, &UserHandle, &GrantedAccess, &RelativeId ); if ( !NT_SUCCESS(Status) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: SamCreateUserInDomain rets %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Set all the other attributes for this user // NetStatus = UserpSetInfo( DomainHandle, DomainId, UserHandle, NULL, // BuiltinDomainHandle not needed for create case RelativeId, ((PUSER_INFO_1)Buffer)->usri1_name, Level, Buffer, WhichFieldsMask, ParmError ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: UserpSetInfo returns %ld\n", NetStatus )); } goto Cleanup; } // // Done // NetStatus = NERR_Success; // // Clean up // Cleanup: // // Delete the user or close the handle depending on success or failure. // if ( UserHandle != NULL ) { if ( NetStatus != NERR_Success ) { (VOID) SamDeleteUser( UserHandle ); } else { (VOID) SamCloseHandle( UserHandle ); } } // // Free locally used resources. // if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserAdd( (LPWSTR) ServerName, Level, Buffer, ParmError ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserAdd: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserAdd NET_API_STATUS NET_API_FUNCTION NetUserDel( IN LPCWSTR ServerName OPTIONAL, IN LPCWSTR UserName ) /*++ Routine Description: Delete a User Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. UserName - Name of the user to delete. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; NTSTATUS Status; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; SAM_HANDLE BuiltinDomainHandle = NULL; SAM_HANDLE UserHandle = NULL; PSID DomainId = NULL; // Domain Id of the primary domain ULONG UserRelativeId; // RelativeId of the user being deleted PSID UserSid = NULL; // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserDel: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domain // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP, TRUE, // Account Domain &DomainHandle, &DomainId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Open the Builtin Domain. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP, FALSE, // Builtin Domain &BuiltinDomainHandle, NULL ); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Open the user asking for delete access. // NetStatus = UserpOpenUser( DomainHandle, DELETE, UserName, &UserHandle, &UserRelativeId ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserDel: UserpOpenUser returns %ld\n", NetStatus )); } goto Cleanup; } // // Determine the SID of the User being deleted. // NetStatus = NetpSamRidToSid( UserHandle, UserRelativeId, &UserSid ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Delete any aliases to this user from the Builtin domain // Status = SamRemoveMemberFromForeignDomain( BuiltinDomainHandle, UserSid ); if ( !NT_SUCCESS(Status) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserDel: SamRemoveMembershipFromForeignDomain returns %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Delete the user. // Status = SamDeleteUser( UserHandle ); if ( !NT_SUCCESS(Status) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserDel: SamDeleteUser returns %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } NetStatus = NERR_Success; UserHandle = NULL; // Don't touch the handle to a deleted user // // Clean up. // Cleanup: if ( UserHandle != NULL ) { (VOID) SamCloseHandle( UserHandle ); } if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( BuiltinDomainHandle != NULL ) { UaspCloseDomain( BuiltinDomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } if ( UserSid != NULL ) { NetpMemoryFree( UserSid ); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserDel( (LPWSTR)ServerName, (LPWSTR)UserName ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserDel: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserDel ULONG UserpComputeSamPrefMaxLen( IN DWORD Level, IN DWORD NetUserPrefMaxLen, IN DWORD NetUserBytesAlreadyReturned, IN DWORD SamBytesAlreadyReturned ) /*++ Routine Description: This routine is a helper function for NetUserEnum. NetUserEnum enumerates the appropriate users by calling SamEnumerateUsersInDomain. NetUserEnum builds the appropriate return structure for each such enumerated user. SamEnumerateUsersInDomain returns a resume handle as does NetUserEnum. If NetUserEnum were to return to its caller without having processed all of the entries returned from SAM, NetUserEnum would have to "compute" a resume handle corresponding to an intermediate entry returned from SAM. That's impossible (except in the special cases where no "filter" parameter is passed to SAM). Instead, we choose to pass SamEnumerateUsersInDomain a PrefMaxLen which will attempt to enumerate exactly the right number of users that NetUserEnum can pack into its PrefMaxLen buffer. Since the size of the structure returned from SAM is different than the size of the structure returned from it is difficult to determine an optimal PrefMaxLen to pass to SamEnumerateUsersInDomain. This routine attempts to do that. We realise that this algorithm may cause NetUserEnum to exceed its PrefMaxLen by a significant amount. Arguments: Level - The NetUserEnum info level. NetUserPrefMaxLen - The NetUserEnum prefered maximum length of returned data. NetUserBytesAlreadyReturned - The number of bytes already packed by NetUserEnum SamBytesAlreadyReturned - The number of bytes already returned by SamEnumerateUserInDomain. Return Value: Value to use as PrefMaxLen on next call to SamEnumerateUsersInDomain. --*/ { ULONG RemainingPrefMaxLen; ULARGE_INTEGER LargeTemp; ULONG SamPrefMaxLen; // // If caller simply wants ALL the data, // ask SAM for the same thing. // if ( NetUserPrefMaxLen == 0xFFFFFFFF ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("SamPrefMaxLen: Net Pref: %ld Net bytes: %ld Sam Bytes: %ld Sam Pref: %ld\n", NetUserPrefMaxLen, NetUserBytesAlreadyReturned, SamBytesAlreadyReturned, NetUserPrefMaxLen )); } return NetUserPrefMaxLen; } // // If no bytes have been returned yet, // use sample data based on a sample domain (REDMOND). // Since the information returned by SAM and NetUserEnum is variable // length, there is no way to compute a value. // if ( NetUserBytesAlreadyReturned == 0 ) { // // Use a different constant for each info level. // switch ( Level ) { case 0: SamBytesAlreadyReturned = 1; NetUserBytesAlreadyReturned = 1; break; case 2: case 3: case 11: SamBytesAlreadyReturned = 1; NetUserBytesAlreadyReturned = 10; break; case 1: case 10: case 20: SamBytesAlreadyReturned = 1; NetUserBytesAlreadyReturned = 4; break; default: SamBytesAlreadyReturned = 1; NetUserBytesAlreadyReturned = 1; break; } } // // Use the above computed divisor to compute the desired number of bytes to // enumerate from SAM. // if ( NetUserBytesAlreadyReturned >= NetUserPrefMaxLen ) { RemainingPrefMaxLen = 0; } else { RemainingPrefMaxLen = NetUserPrefMaxLen - NetUserBytesAlreadyReturned; } LargeTemp.QuadPart = UInt32x32To64 ( RemainingPrefMaxLen, SamBytesAlreadyReturned ); SamPrefMaxLen = (ULONG)(LargeTemp.QuadPart / (ULONGLONG) NetUserBytesAlreadyReturned); // // Ensure we always make reasonable progress by returning at least 5 // entries from SAM (unless the caller is really conservative). // #define MIN_SAM_ENUMERATION \ ((sizeof(SAM_RID_ENUMERATION) + LM20_UNLEN * sizeof(WCHAR) + sizeof(WCHAR))) #define TYPICAL_SAM_ENUMERATION \ (MIN_SAM_ENUMERATION * 5) if ( SamPrefMaxLen < TYPICAL_SAM_ENUMERATION && NetUserPrefMaxLen > 1 ) { SamPrefMaxLen = TYPICAL_SAM_ENUMERATION; } else if ( SamPrefMaxLen < MIN_SAM_ENUMERATION ) { SamPrefMaxLen = MIN_SAM_ENUMERATION; } IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("SamPrefMaxLen: Net Pref: %ld Net bytes: %ld Sam Bytes: %ld Sam Pref: %ld\n", NetUserPrefMaxLen, NetUserBytesAlreadyReturned, SamBytesAlreadyReturned, SamPrefMaxLen )); } return SamPrefMaxLen; } NET_API_STATUS NET_API_FUNCTION NetUserEnum( IN LPCWSTR ServerName OPTIONAL, IN DWORD Level, IN DWORD Filter, OUT LPBYTE *Buffer, IN DWORD PrefMaxLen, OUT LPDWORD EntriesRead, OUT LPDWORD EntriesLeft, IN OUT LPDWORD ResumeHandle OPTIONAL ) /*++ Routine Description: Retrieve information about each user on a server. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. Level - Level of information required. level 0, 1, 2, 3, 10, and 20 are valid Filter - Returns the user accounts of the type specified here. Combination of the following types may be specified as filter parameter. #define FILTER_TEMP_DUPLICATE_ACCOUNT (0x0001) #define FILTER_NORMAL_ACCOUNT (0x0002) #define FILTER_INTERDOMAIN_TRUST_ACCOUNT (0x0008) #define FILTER_WORKSTATION_TRUST_ACCOUNT (0x0010) #define FILTER_SERVER_TRUST_ACCOUNT (0x0020) Buffer - Returns a pointer to the return information structure. Caller must deallocate buffer using NetApiBufferFree. PrefMaxLen - Prefered maximum length of returned data. EntriesRead - Returns the actual enumerated element count. EntriesLeft - Returns the total entries available to be enumerated. ResumeHandle - Used to continue an existing search. The handle should be zero on the first call and left unchanged for subsequent calls. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; NTSTATUS Status; NTSTATUS CachedStatus; BUFFER_DESCRIPTOR BufferDescriptor; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; SAM_HANDLE BuiltinDomainHandle = NULL; PSID DomainId = NULL; ULONG TotalRemaining = 0; SAM_ENUMERATE_HANDLE EnumHandle; PSAM_RID_ENUMERATION EnumBuffer = NULL; DWORD CountReturned = 0; BOOL AllDone = FALSE; SAM_ENUMERATE_HANDLE LocalEnumHandle; DWORD LocalResumeHandle; DWORD SamFilter; DWORD SamPrefMaxLen; DWORD NetUserBytesAlreadyReturned; DWORD SamBytesAlreadyReturned; DWORD Mode = SAM_SID_COMPATIBILITY_ALL; #define USERACCOUNTCONTROL( _f ) ( \ ( ( (_f) & FILTER_TEMP_DUPLICATE_ACCOUNT ) ? \ USER_TEMP_DUPLICATE_ACCOUNT : 0 ) | \ ( ( (_f) & FILTER_NORMAL_ACCOUNT ) ? \ USER_NORMAL_ACCOUNT : 0 ) | \ ( ( (_f) & FILTER_INTERDOMAIN_TRUST_ACCOUNT ) ? \ USER_INTERDOMAIN_TRUST_ACCOUNT : 0 ) | \ ( ( (_f) & FILTER_WORKSTATION_TRUST_ACCOUNT ) ? \ USER_WORKSTATION_TRUST_ACCOUNT : 0 ) | \ ( ( (_f) & FILTER_SERVER_TRUST_ACCOUNT ) ? \ USER_SERVER_TRUST_ACCOUNT : 0 ) \ ) // // Pick up the resume handle. // // Do this early to ensure we don't scrog the ResumeHandle in // case we go downlevel. // if ( ARGUMENT_PRESENT( ResumeHandle ) ) { LocalResumeHandle = *ResumeHandle; } else { LocalResumeHandle = 0; } EnumHandle = (SAM_ENUMERATE_HANDLE) LocalResumeHandle; // // Initialization // *Buffer = NULL; *EntriesRead = 0; *EntriesLeft = 0; RtlZeroMemory( &BufferDescriptor, sizeof(BUFFER_DESCRIPTOR) ); SamFilter = USERACCOUNTCONTROL( Filter ); // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserEnum: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } Status = SamGetCompatibilityMode(SamServerHandle, &Mode); if (NT_SUCCESS(Status)) { if ( (Mode == SAM_SID_COMPATIBILITY_STRICT) && ( Level == 3 || Level == 20 ) ) { // // These info levels return RID's // Status = STATUS_NOT_SUPPORTED; } } if (!NT_SUCCESS(Status)) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Validate Level parameter // switch (Level) { case 1: case 2: case 3: case 11: // // Open the Builtin Domain. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_GET_ALIAS_MEMBERSHIP, FALSE, // Builtin Domain &BuiltinDomainHandle, NULL ); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } case 0: case 10: case 20: break; default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Open the Account Domain. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LIST_ACCOUNTS | DOMAIN_READ_OTHER_PARAMETERS, TRUE, // Account Domain &DomainHandle, &DomainId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Get the total number of users from SAM // // // the only way to get the total number of specified accounts is // enumerate the specified accounts till there is no more accounts // and add all CountReturned. // TotalRemaining = 0; LocalEnumHandle = EnumHandle; SamPrefMaxLen = UserpComputeSamPrefMaxLen( Level, PrefMaxLen, 0, // NetUserBytesAlreadyReturned, 0 );// SamBytesAlreadyReturned SamBytesAlreadyReturned = SamPrefMaxLen; do { NTSTATUS LocalStatus; PSAM_RID_ENUMERATION LocalEnumBuffer = NULL; DWORD LocalCountReturned; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("Calling Enumerate phase 1: PrefLen %ld\n", SamPrefMaxLen )); } Status = SamEnumerateUsersInDomain( DomainHandle, &LocalEnumHandle, SamFilter, (PVOID *) &LocalEnumBuffer, SamPrefMaxLen, &LocalCountReturned ); if ( !NT_SUCCESS(Status) ) { NetStatus = NetpNtStatusToApiStatus( Status ); if(LocalEnumBuffer != NULL ) { Status = SamFreeMemory( LocalEnumBuffer ); NetpAssert( NT_SUCCESS( Status ) ); } goto Cleanup; } // // aggrigate total count. // IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("Enumerate phase 1: Returned %ld entries\n", LocalCountReturned )); } TotalRemaining += LocalCountReturned; // // cache first enum buffer to use it in the loop below. // if( EnumBuffer == NULL ) { EnumBuffer = LocalEnumBuffer; EnumHandle = LocalEnumHandle; CountReturned = LocalCountReturned; CachedStatus = Status; // Subsequent calls can use a reasonably large buffer size. if ( SamPrefMaxLen < NETP_ENUM_GUESS ) { SamPrefMaxLen = NETP_ENUM_GUESS; } } else { LocalStatus = SamFreeMemory( LocalEnumBuffer ); NetpAssert( NT_SUCCESS( LocalStatus ) ); } } while ( Status == STATUS_MORE_ENTRIES ); // // Loop for each user // // NetUserBytesAlreadyReturned = 0; for ( ;; ) { DWORD i; // // use cached enum buffer if one available // if( EnumBuffer != NULL ) { Status = CachedStatus; } else { SamPrefMaxLen = UserpComputeSamPrefMaxLen( Level, PrefMaxLen, NetUserBytesAlreadyReturned, SamBytesAlreadyReturned ); IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("Calling Enumerate phase 2: PrefLen %ld\n", SamPrefMaxLen )); } Status = SamEnumerateUsersInDomain( DomainHandle, &EnumHandle, SamFilter, (PVOID *) &EnumBuffer, SamPrefMaxLen, &CountReturned ); IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("Enumerate phase 2: Returned %ld entries\n", CountReturned )); } SamBytesAlreadyReturned += SamPrefMaxLen; } if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } if( Status != STATUS_MORE_ENTRIES ) { AllDone = TRUE; } for( i = 0; i < CountReturned; i++ ) { LPBYTE EndOfVariableData; LPBYTE FixedDataEnd; // // save return buffer end points. // EndOfVariableData = BufferDescriptor.EndOfVariableData; FixedDataEnd = BufferDescriptor.FixedDataEnd; // // Place another entry into the return buffer. // // Use 0xFFFFFFFF as PrefMaxLen to prevent this routine from // prematurely returning ERROR_MORE_DATA. We'll calculate that // ourselves below. // NetStatus = UserpGetInfo( DomainHandle, DomainId, BuiltinDomainHandle, EnumBuffer[i].Name, EnumBuffer[i].RelativeId, Level, 0xFFFFFFFF, &BufferDescriptor, FALSE, // Not a 'get' operation 0 ); if (NetStatus != NERR_Success) { // // We may have access to enumerate objects we don't have access // to touch. So, simply ignore those accounts we can't get // information for. // if ( NetStatus == ERROR_ACCESS_DENIED ) { continue; } goto Cleanup; } // // Only count this entry if it was added to the return buffer. // if ( (EndOfVariableData != BufferDescriptor.EndOfVariableData ) || (FixedDataEnd != BufferDescriptor.FixedDataEnd ) ) { (*EntriesRead)++; } } // // free up current EnumBuffer and get another EnumBuffer. // Status = SamFreeMemory( EnumBuffer ); NetpAssert( NT_SUCCESS(Status) ); EnumBuffer = NULL; if( AllDone == TRUE ) { NetStatus = NERR_Success; break; } // // Check here if we've exceeded PrefMaxLen since here we know // a valid resume handle. // NetUserBytesAlreadyReturned = ( BufferDescriptor.AllocSize - ((DWORD)(BufferDescriptor.EndOfVariableData - BufferDescriptor.FixedDataEnd)) ); if ( NetUserBytesAlreadyReturned >= PrefMaxLen ) { LocalResumeHandle = EnumHandle; NetStatus = ERROR_MORE_DATA; goto Cleanup; } } // // Clean up. // Cleanup: // // Set EntriesLeft to the number left to return plus those that // we returned on this call. // if( TotalRemaining >= *EntriesRead ) { *EntriesLeft = TotalRemaining; } else { *EntriesLeft = *EntriesRead; } // // Free up all resources, we reopen them if the caller calls again. // if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( BuiltinDomainHandle != NULL ) { UaspCloseDomain( BuiltinDomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } if ( EnumBuffer != NULL ) { Status = SamFreeMemory( EnumBuffer ); NetpAssert( NT_SUCCESS(Status) ); } // // If we're not returning data to the caller, // free the return buffer. // if ( NetStatus != NERR_Success && NetStatus != ERROR_MORE_DATA ) { if( NetStatus != NERR_BufTooSmall ) { if ( BufferDescriptor.Buffer != NULL ) { MIDL_user_free( BufferDescriptor.Buffer ); BufferDescriptor.Buffer = NULL; } *EntriesRead = 0; *EntriesLeft = 0; } else { NetpAssert( BufferDescriptor.Buffer == NULL ); NetpAssert( *EntriesRead == 0 ); } } // // Set the output parameters // *Buffer = BufferDescriptor.Buffer; if ( ARGUMENT_PRESENT( ResumeHandle ) ) { *ResumeHandle = LocalResumeHandle; } IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(("NetUserEnum: PrefLen %ld Returned %ld\n", PrefMaxLen, ( BufferDescriptor.AllocSize - ((DWORD)(BufferDescriptor.EndOfVariableData - BufferDescriptor.FixedDataEnd)) ) )); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserEnum( (LPWSTR)ServerName, Level, Buffer, PrefMaxLen, EntriesRead, EntriesLeft, ResumeHandle ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserEnum: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserEnum NET_API_STATUS NET_API_FUNCTION NetUserGetInfo( IN LPCWSTR ServerName OPTIONAL, IN LPCWSTR UserName, IN DWORD Level, OUT LPBYTE *Buffer ) /*++ Routine Description: Retrieve information about a particular user. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. UserName - Name of the user to get information about. Level - Level of information required. Buffer - Returns a pointer to the return information structure. Caller must deallocate buffer using NetApiBufferFree. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; PSID DomainId = NULL; SAM_HANDLE BuiltinDomainHandle = NULL; BUFFER_DESCRIPTOR BufferDescriptor; ULONG RelativeId; // Relative Id of the user UNICODE_STRING UserNameString; BufferDescriptor.Buffer = NULL; // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetInfo: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domain // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP, TRUE, // Account Domain &DomainHandle, &DomainId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Open the Builtin Domain. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_GET_ALIAS_MEMBERSHIP, FALSE, // Builtin Domain &BuiltinDomainHandle, NULL ); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Validate the user name and get the relative ID. // NetStatus = UserpOpenUser( DomainHandle, 0, // DesiredAccess UserName, NULL, // UserHandle &RelativeId ); if (NetStatus != NERR_Success ) { goto Cleanup; } // // Get the Information about the user. // RtlInitUnicodeString( &UserNameString, UserName ); NetStatus = UserpGetInfo( DomainHandle, DomainId, BuiltinDomainHandle, UserNameString, RelativeId, Level, 0, // PrefMaxLen &BufferDescriptor, TRUE, // Is a 'get' operation 0 ); // don't filter account // // Clean up. // Cleanup: // // If we're returning data to the caller, // Don't free the return buffer. // if ( NetStatus == NERR_Success ) { *Buffer = BufferDescriptor.Buffer; } else { if ( BufferDescriptor.Buffer != NULL ) { MIDL_user_free( BufferDescriptor.Buffer ); } } if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( BuiltinDomainHandle != NULL ) { UaspCloseDomain( BuiltinDomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserGetInfo( (LPWSTR)ServerName, (LPWSTR)UserName, Level, Buffer ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetInfo: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserGetInfo NET_API_STATUS NET_API_FUNCTION NetUserSetInfo( IN LPCWSTR ServerName OPTIONAL, IN LPCWSTR UserName, IN DWORD Level, IN LPBYTE Buffer, OUT LPDWORD ParmError OPTIONAL // Name required by NetpSetParmError ) /*++ Routine Description: Set the parameters on a user account in the user accounts database. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. UserName - Name of the user to modify. Level - Level of information provided. Buffer - A pointer to the buffer containing the user information structure. ParmError - Optional pointer to a DWORD to return the index of the first parameter in error when ERROR_INVALID_PARAMETER is returned. If NULL, the parameter is not returned on error. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; PSID DomainId = NULL; SAM_HANDLE BuiltinDomainHandle = NULL; ULONG UserRelativeId; // // Initialize // NetpSetParmError( PARM_ERROR_NONE ); // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetInfo: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Account Domain // DOMAIN_READ_PASSWORD_PARAMETERS is needed in those cases that we'll // set the password on the account. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP | DOMAIN_READ_PASSWORD_PARAMETERS, TRUE, // Account Domain &DomainHandle, &DomainId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Open the Builtin Domain. // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_GET_ALIAS_MEMBERSHIP, FALSE, // Builtin Domain &BuiltinDomainHandle, NULL ); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Get the relative ID of the user. Don't open the user yet // since we don't know the desired access. // NetStatus = UserpOpenUser( DomainHandle, 0, // DesiredAccess UserName, NULL, // UserHandle &UserRelativeId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Change the user // NetStatus = UserpSetInfo( DomainHandle, DomainId, NULL, // UserHandle (let UserpSetInfo open the user) BuiltinDomainHandle, UserRelativeId, UserName, Level, Buffer, 0xFFFFFFFF, // set all requested fields ParmError ); // // Clean up. // Cleanup: if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( BuiltinDomainHandle != NULL ) { UaspCloseDomain( BuiltinDomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserSetInfo( (LPWSTR) ServerName, (LPWSTR) UserName, Level, Buffer, ParmError ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetInfo: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserSetInfo NET_API_STATUS NET_API_FUNCTION NetUserGetGroups( IN LPCWSTR ServerName OPTIONAL, IN LPCWSTR UserName, IN DWORD Level, OUT LPBYTE *Buffer, IN DWORD PrefMaxLen, OUT LPDWORD EntriesRead, OUT LPDWORD EntriesLeft ) /*++ Routine Description: Enumerate the groups that this user is a member of. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. UserName - The name of the user whose members are to be listed. Level - Level of information required (must be 0 or 1) Buffer - Returns a pointer to the return information structure. Caller must deallocate buffer using NetApiBufferFree. PrefMaxLen - Prefered maximum length of returned data. EntriesRead - Returns the actual enumerated element count. EntriesLeft - Returns the total entries available to be enumerated. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; NTSTATUS Status; BUFFER_DESCRIPTOR BufferDescriptor; DWORD FixedSize; // The fixed size of each new entry. DWORD i; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; SAM_HANDLE UserHandle = NULL; PUNICODE_STRING Names = NULL; // Names corresponding to Ids ULONG GroupCount; PGROUP_MEMBERSHIP GroupAttributes = NULL; PULONG MemberIds = NULL; // Sam returned MemberIds PULONG MemberGroupAttributes = NULL; // Sam returned MemberAttributes; // // Validate Parameters // *EntriesRead = 0; *EntriesLeft = 0; BufferDescriptor.Buffer = NULL; switch (Level) { case 0: FixedSize = sizeof(GROUP_USERS_INFO_0); break; case 1: FixedSize = sizeof(GROUP_USERS_INFO_1); break; default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domain // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP, TRUE, // Account Domain &DomainHandle, NULL); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Open the user asking for USER_LIST_GROUPS access. // NetStatus = UserpOpenUser( DomainHandle, USER_LIST_GROUPS, UserName, &UserHandle, NULL); // Relative Id if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Get the membership from SAM // // This API is an odd one for SAM. It returns all of the membership // information in a single call. // Status = SamGetGroupsForUser( UserHandle, &GroupAttributes, &GroupCount ); if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: SamGetGroupsForUser returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Handle the case where there is nothing to return. // if ( GroupCount == 0 ) { NetStatus = NERR_Success; goto Cleanup; } // // Convert the returned relative IDs to user names. // // // Allocate a buffer for converting relative ids to user names // MemberIds = NetpMemoryAllocate( GroupCount * sizeof(ULONG) ); if ( MemberIds == NULL ) { NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } MemberGroupAttributes = NetpMemoryAllocate( GroupCount * sizeof(ULONG) ); if ( MemberGroupAttributes == NULL ) { NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } // // Allocate another buffer for store attributes of the groups // we returning. // // // Copy the relative IDs returned from SAM to the allocated buffer. // for ( i=0; i < GroupCount; i++ ) { MemberIds[*EntriesLeft] = GroupAttributes[i].RelativeId; MemberGroupAttributes[*EntriesLeft] = GroupAttributes[i].Attributes; (*EntriesLeft)++; } // // Convert the relative IDs to names // Status = SamLookupIdsInDomain( DomainHandle, *EntriesLeft, MemberIds, &Names, NULL ); // NameUse if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: SamLookupIdsInDomain returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Determine the number of entries that will fit in the caller's // buffer. // for ( i=0; i < *EntriesLeft; i++ ) { DWORD Size; PGROUP_USERS_INFO_0 grui0; // // Compute the size of the next entry // Size = FixedSize + Names[i].Length + sizeof(WCHAR); // // Ensure the return buffer is big enough. // Size = ROUND_UP_COUNT( Size, ALIGN_WCHAR ); NetStatus = NetpAllocateEnumBuffer( &BufferDescriptor, FALSE, // Is an enumeration routine. PrefMaxLen, Size, GrouppMemberRelocationRoutine, Level ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Copy the data into the buffer // grui0 = (PGROUP_USERS_INFO_0) BufferDescriptor.FixedDataEnd; BufferDescriptor.FixedDataEnd += FixedSize ; NetpAssert( offsetof( GROUP_USERS_INFO_0, grui0_name ) == offsetof( GROUP_USERS_INFO_1, grui1_name ) ); if ( !NetpCopyStringToBuffer( Names[i].Buffer, Names[i].Length/sizeof(WCHAR), BufferDescriptor.FixedDataEnd, (LPWSTR *)&BufferDescriptor.EndOfVariableData, &grui0->grui0_name) ) { NetStatus = NERR_InternalError; goto Cleanup; } if ( Level == 1 ) { ((PGROUP_USERS_INFO_1)grui0)->grui1_attributes = MemberGroupAttributes[i]; } (*EntriesRead)++; } NetStatus = NERR_Success ; // // Clean up. // Cleanup: // // Free any resources used locally // if( MemberIds != NULL ) { NetpMemoryFree( MemberIds ); } if( MemberGroupAttributes != NULL ) { NetpMemoryFree( MemberGroupAttributes ); } if ( Names != NULL ) { Status = SamFreeMemory( Names ); NetpAssert( NT_SUCCESS(Status) ); } if ( UserHandle != NULL ) { (VOID) SamCloseHandle( UserHandle ); } if ( GroupAttributes != NULL ) { Status = SamFreeMemory( GroupAttributes ); NetpAssert( NT_SUCCESS(Status) ); } UaspCloseDomain( DomainHandle ); if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } // // If we're not returning data to the caller, // free the return buffer. // if ( NetStatus != NERR_Success && NetStatus != ERROR_MORE_DATA ) { if ( BufferDescriptor.Buffer != NULL ) { MIDL_user_free( BufferDescriptor.Buffer ); BufferDescriptor.Buffer = NULL; } *EntriesLeft = 0; *EntriesRead = 0; } *Buffer = BufferDescriptor.Buffer; // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserGetGroups( (LPWSTR)ServerName, (LPWSTR)UserName, Level, Buffer, PrefMaxLen, EntriesRead, EntriesLeft ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserGetGroups NET_API_STATUS NET_API_FUNCTION NetUserSetGroups ( IN LPCWSTR ServerName OPTIONAL, IN LPCWSTR UserName, IN DWORD Level, IN LPBYTE Buffer, IN DWORD NewGroupCount ) /*++ Routine Description: Set the list of groups that is user is a member of. The groups specified by "Buffer" are called new groups. The groups that the user is currently a member of are called old groups. Groups which are on both the old and new list are called common groups. The SAM API allows only one member to be added or deleted at a time. This API allows all of the groups this user is a member of to be specified en-masse. This API is careful to always leave the group membership in the SAM database in a reasonable state. It does by merging the list of old and new groups, then only changing those memberships which absolutely need changing. Group membership is restored to its previous state (if possible) if an error occurs during changing the group membership. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. UserName - Name of the user to modify. Level - Level of information provided. Must be 0 or 1. Buffer - A pointer to the buffer containing an array of NewGroupCount group membership information structures. NewGroupCount - Number of entries in Buffer. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; NTSTATUS Status; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; SAM_HANDLE UserHandle = NULL; ULONG UserRelativeId; DWORD FixedSize; PULONG NewRelativeIds = NULL; // Relative Ids of a list of new groups PSID_NAME_USE NewNameUse = NULL; // Name usage of a list of new groups PUNICODE_STRING NewNameStrings = NULL;// Names of a list of new groups // // Define an internal group membership list structure. // // This structure defines a list of new group memberships to be added, // group memberships whose attributes merely need to be changed, // and group memberships which need to be deleted. // // The list is maintained in relative ID sorted order. // struct _GROUP_DESCRIPTION { struct _GROUP_DESCRIPTION * Next; // Next entry in linked list; ULONG RelativeId; // Relative ID of this group SAM_HANDLE GroupHandle; // Group Handle of this group enum _Action { // Action taken for this group membership AddMember, // Add membership to group RemoveMember, // Remove membership from group SetAttributesMember, // Change the membership's attributes IgnoreMember // Ignore this membership } Action; BOOL Done; // True if this action has been taken ULONG NewAttributes; // Attributes to set for the membership ULONG OldAttributes; // Attributes to restore on a recovery } *GroupList = NULL, *CurEntry, **Entry, *TempEntry; // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domain // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP, TRUE, // Account Domain &DomainHandle, NULL); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Open the user // NetStatus = UserpOpenUser( DomainHandle, USER_LIST_GROUPS, UserName, &UserHandle, &UserRelativeId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Validate the level // switch (Level) { case 0: FixedSize = sizeof( GROUP_USERS_INFO_0 ); break; case 1: FixedSize = sizeof( GROUP_USERS_INFO_1 ); break; default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Build the list of new groups // if ( NewGroupCount > 0 ) { DWORD NewIndex; // Index to the current New group // // Allocate a buffer big enough to contain all the string variables // for the new group names. // NewNameStrings = NetpMemoryAllocate( NewGroupCount * sizeof(UNICODE_STRING)); if ( NewNameStrings == NULL ) { NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } // // Fill in the list of group name strings for each new group. // NetpAssert( offsetof( GROUP_USERS_INFO_0, grui0_name ) == offsetof( GROUP_USERS_INFO_1, grui1_name ) ); for ( NewIndex=0; NewIndexgrui0_name; RtlInitUnicodeString( &NewNameStrings[NewIndex], GroupName ); } // // Convert the group names to relative Ids. // Status = SamLookupNamesInDomain( DomainHandle, NewGroupCount, NewNameStrings, &NewRelativeIds, &NewNameUse ); if ( !NT_SUCCESS( Status )) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: SamLookupNamesInDomain returned %lX\n", Status )); } if ( Status == STATUS_NONE_MAPPED ) { NetStatus = NERR_GroupNotFound; goto Cleanup; } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Build a group entry for each of the new groups. // The list is maintained in RelativeId sorted order. // for ( NewIndex=0; NewIndexRelativeId < NewRelativeIds[NewIndex] ) { Entry = &( (*Entry)->Next ); } // // If this is not a duplicate entry, allocate a new group structure // and fill it in. // // Just ignore duplicate relative Ids. // if ( *Entry == NULL || (*Entry)->RelativeId > NewRelativeIds[NewIndex] ) { CurEntry = NetpMemoryAllocate( sizeof(struct _GROUP_DESCRIPTION) ); if ( CurEntry == NULL ) { NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } CurEntry->Next = *Entry; CurEntry->RelativeId = NewRelativeIds[NewIndex]; CurEntry->Action = AddMember; CurEntry->Done = FALSE; CurEntry->GroupHandle = NULL; CurEntry->NewAttributes = ( Level == 1 ) ? ((PGROUP_USERS_INFO_1)Buffer)[NewIndex].grui1_attributes : SE_GROUP_MANDATORY | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_ENABLED; *Entry = CurEntry; } } } // // Merge the old groups into the list. // { ULONG OldIndex; // Index to current entry ULONG OldCount; // Total Number of entries PGROUP_MEMBERSHIP GroupAttributes = NULL; // // Determine the old group membership // Status = SamGetGroupsForUser( UserHandle, &GroupAttributes, &OldCount ); if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: SamGetGroupsForUser returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Merge each old group into the list // for ( OldIndex=0; OldIndex < OldCount; OldIndex++) { // // Find the place to put the new entry // Entry = &GroupList ; while ( *Entry != NULL && (*Entry)->RelativeId < GroupAttributes[OldIndex].RelativeId ) { Entry = &( (*Entry)->Next ); } // // If this entry is not already in the list, // this is a group membership which exists now but should // be deleted. // if( *Entry == NULL || (*Entry)->RelativeId > GroupAttributes[OldIndex].RelativeId){ CurEntry = NetpMemoryAllocate(sizeof(struct _GROUP_DESCRIPTION)); if ( CurEntry == NULL ) { Status = SamFreeMemory( GroupAttributes ); NetpAssert( NT_SUCCESS(Status) ); NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } CurEntry->Next = *Entry; CurEntry->RelativeId = GroupAttributes[OldIndex].RelativeId; CurEntry->Action = RemoveMember; CurEntry->Done = FALSE; CurEntry->OldAttributes = GroupAttributes[OldIndex].Attributes; CurEntry->GroupHandle = NULL; *Entry = CurEntry; // // Handle the case where this group is already in the list // } else { // // Watch out for SAM returning the same group twice. // if ( (*Entry)->Action != AddMember ) { Status = SamFreeMemory( GroupAttributes ); NetpAssert( NT_SUCCESS(Status) ); NetStatus = NERR_InternalError; goto Cleanup; } // // If this is info level 1 and the requested attributes are // different than the current attributes, // Remember to change the attributes. // if ( Level == 1 && (*Entry)->NewAttributes != GroupAttributes[OldIndex].Attributes ) { (*Entry)->OldAttributes = GroupAttributes[OldIndex].Attributes; (*Entry)->Action = SetAttributesMember; // // This is either info level 0 or the level 1 attributes // are the same as the existing attributes. // // In either case, this group membership is already set // up properly and we should ignore this entry for the // rest of this routine. // } else { (*Entry)->Action = IgnoreMember; } } } } // // Loop through the list opening all of the groups // // Ask for add and remove access for BOTH added and removed memberships. // One access is required to do the operation initially. The other access // is required to undo the operation during recovery. // for ( CurEntry = GroupList; CurEntry != NULL ; CurEntry=CurEntry->Next ) { if ( CurEntry->Action == AddMember || CurEntry->Action == RemoveMember){ Status = SamOpenGroup( DomainHandle, GROUP_ADD_MEMBER | GROUP_REMOVE_MEMBER, CurEntry->RelativeId, &CurEntry->GroupHandle ); if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: SamOpenGroup returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } } } // // Loop through the list adding membership to all new groups. // We do this in a separate loop to minimize the damage that happens // should we get an error and not be able to recover. // for ( CurEntry = GroupList; CurEntry != NULL ; CurEntry=CurEntry->Next ) { if ( CurEntry->Action == AddMember ) { Status = SamAddMemberToGroup( CurEntry->GroupHandle, UserRelativeId, CurEntry->NewAttributes ); // // For level 0, if the default attributes were incompatible, // try these attributes. // if ( Level == 0 && Status == STATUS_INVALID_GROUP_ATTRIBUTES ) { Status = SamAddMemberToGroup( CurEntry->GroupHandle, UserRelativeId, SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_ENABLED ); } if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: SamAddMemberToGroup returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } CurEntry->Done = TRUE; } } // // Loop through the list deleting membership from all old groups // and changing the membership attributes of all common groups. // for ( CurEntry = GroupList; CurEntry != NULL ; CurEntry=CurEntry->Next ) { if ( CurEntry->Action == RemoveMember ) { Status = SamRemoveMemberFromGroup( CurEntry->GroupHandle, UserRelativeId); } else if ( CurEntry->Action == SetAttributesMember ) { Status = SamSetMemberAttributesOfGroup( CurEntry->GroupHandle, UserRelativeId, CurEntry->NewAttributes); } if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: SamRemoveMemberFromGroup (or SetMemberAttributes) returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } CurEntry->Done = TRUE; } NetStatus = NERR_Success; // // Clean up. // Cleanup: // // Walk the group list cleaning up any damage we've done // for ( CurEntry = GroupList; CurEntry != NULL ; ) { if ( NetStatus != NERR_Success && CurEntry->Done ) { switch (CurEntry->Action) { case AddMember: Status = SamRemoveMemberFromGroup( CurEntry->GroupHandle, UserRelativeId ); NetpAssert( NT_SUCCESS(Status) ); break; case RemoveMember: Status = SamAddMemberToGroup( CurEntry->GroupHandle, UserRelativeId, CurEntry->OldAttributes ); NetpAssert( NT_SUCCESS(Status) ); break; case SetAttributesMember: Status = SamSetMemberAttributesOfGroup(CurEntry->GroupHandle, UserRelativeId, CurEntry->OldAttributes); NetpAssert( NT_SUCCESS(Status) ); break; default: break; } } if (CurEntry->GroupHandle != NULL) { (VOID) SamCloseHandle( CurEntry->GroupHandle ); } TempEntry = CurEntry; CurEntry = CurEntry->Next; NetpMemoryFree( TempEntry ); } // // Free up any locally used resources. // if ( NewNameStrings != NULL ) { NetpMemoryFree( NewNameStrings ); } if ( NewRelativeIds != NULL ) { Status = SamFreeMemory( NewRelativeIds ); NetpAssert( NT_SUCCESS(Status) ); } if ( NewNameUse != NULL ) { Status = SamFreeMemory( NewNameUse ); NetpAssert( NT_SUCCESS(Status) ); } if (UserHandle != NULL) { (VOID) SamCloseHandle( UserHandle ); } UaspCloseDomain( DomainHandle ); if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserSetGroups( (LPWSTR)ServerName, (LPWSTR)UserName, Level, Buffer, NewGroupCount ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserSetGroups: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserSetGroups NET_API_STATUS NET_API_FUNCTION NetUserGetLocalGroups( IN LPCWSTR ServerName OPTIONAL, IN LPCWSTR UserName, IN DWORD Level, IN DWORD Flags, OUT LPBYTE *Buffer, IN DWORD PrefMaxLen, OUT LPDWORD EntriesRead, OUT LPDWORD EntriesLeft ) /*++ Routine Description: Enumerate the local groups that this user is a member of. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. UserName - The name of the user whose members are to be listed. The UserName can be of the form in which case the UserName is expected to be found on ServerName. The UserName can also be of the form \ in which case is expected to be trusted by ServerName and is expected to be to be found on that domain. Level - Level of information required (must be 0) Flags - Indicates if indirect local group membership is to be included. Buffer - Returns a pointer to the return information structure. Caller must deallocate buffer using NetApiBufferFree. PrefMaxLen - Prefered maximum length of returned data. EntriesRead - Returns the actual enumerated element count. EntriesLeft - Returns the total entries available to be enumerated. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; NTSTATUS Status; BUFFER_DESCRIPTOR BufferDescriptor; DWORD FixedSize; // The fixed size of each new entry. SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; SAM_HANDLE UsersDomainHandle = NULL; SAM_HANDLE BuiltinDomainHandle = NULL; SAM_HANDLE UserHandle = NULL; PSID DomainId = NULL ; PSID DomainIdToUse; PSID UsersDomainId = NULL ; PSID *UserSidList = NULL; ULONG PartialCount = 0; LPCWSTR OrigUserName = UserName; PWCHAR BackSlash; PUNICODE_STRING Names = NULL; // Names corresponding to Ids PULONG Aliases = NULL; ULONG GroupCount = 0 ; ULONG GroupIndex; PGROUP_MEMBERSHIP GroupMembership = NULL; PSID *UserSids = NULL; ULONG UserSidCount = 0; ULONG UserRelativeId = 0; // // Validate Parameters // *EntriesRead = 0; *EntriesLeft = 0; BufferDescriptor.Buffer = NULL; if (Flags & ~LG_INCLUDE_INDIRECT) { NetStatus = ERROR_INVALID_PARAMETER; // unknown flag goto Cleanup; } switch (Level) { case 0: FixedSize = sizeof(LOCALGROUP_USERS_INFO_0); break; default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetLocalGroups: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domains (Account & Builtin) // NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_LOOKUP | DOMAIN_GET_ALIAS_MEMBERSHIP, TRUE, // Account Domain &DomainHandle, &DomainId); if ( NetStatus != NERR_Success ) { goto Cleanup; } NetStatus = UaspOpenDomain( SamServerHandle, DOMAIN_GET_ALIAS_MEMBERSHIP, FALSE, // Builtin Domain &BuiltinDomainHandle, NULL ); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Parse the \ // BackSlash = wcschr( UserName, L'\\' ); // // If the global group of the user are to be taken into consideration, // get the global groups now. // if ( Flags & LG_INCLUDE_INDIRECT ) { SAM_HANDLE DomainHandleToUse; // // Handle the case where no domain is specified // if ( BackSlash == NULL ) { DomainHandleToUse = DomainHandle; DomainIdToUse = DomainId; // // Handle the case where a domain name was specified // } else { DWORD UsersDomainNameLength; WCHAR UsersDomainName[DNLEN+1]; // // Grab the domain name // UsersDomainNameLength = (DWORD)(BackSlash - UserName); if ( UsersDomainNameLength == 0 || UsersDomainNameLength > DNLEN ) { NetStatus = NERR_DCNotFound; goto Cleanup; } RtlCopyMemory( UsersDomainName, UserName, UsersDomainNameLength*sizeof(WCHAR) ); UsersDomainName[UsersDomainNameLength] = L'\0'; UserName = BackSlash+1; // // Open a handle to the specified domain's SAM. // NetStatus = UaspOpenDomainWithDomainName( UsersDomainName, DOMAIN_LOOKUP, TRUE, // Account Domain &UsersDomainHandle, &UsersDomainId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } DomainHandleToUse = UsersDomainHandle; DomainIdToUse = UsersDomainId; } // // Open the user asking for USER_LIST_GROUPS access. // NetStatus = UserpOpenUser( DomainHandleToUse, USER_LIST_GROUPS, UserName, &UserHandle, &UserRelativeId); // Relative Id if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Get the group membership from SAM, since we are // interested in indirect alias membership via group membership. // // This API is an odd one for SAM. It returns all of the membership // information in a single call. // Status = SamGetGroupsForUser( UserHandle, &GroupMembership, &GroupCount ); if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: SamGetGroupsForUser returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } } // // Allocate a buffer to point to the SIDs we're interested in // alias membership for. // UserSids = (PSID *) NetpMemoryAllocate( (GroupCount+1) * sizeof(PSID) ); if ( UserSids == NULL ) { NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } RtlZeroMemory( UserSids, (GroupCount+1) * sizeof(PSID) ); // // If no domain is specified, // just grab the SID of the user account from SAM. // if ( BackSlash == NULL ) { // // Get the rid of the account // if ( UserRelativeId == 0 ) { NetStatus = UserpOpenUser( DomainHandle, 0, UserName, NULL, &UserRelativeId); // Relative Id if ( NetStatus != NERR_Success ) { goto Cleanup; } } // // Add the User's Sid to the Array of Sids. // NetStatus = NetpSamRidToSid( DomainHandle, UserRelativeId, &UserSids[UserSidCount] ); if ( NetStatus != NERR_Success ) { goto Cleanup; } UserSidCount ++; // // If a domain name is specified, // use LookupAccountName to translate the name to a SID. // // Don't open the user account. We typically don't have access to do that. // Newer version of NT don't allow anything over the NULL session. // } else { // // Translate the name to a SID. // NetStatus = AliaspNamesToSids ( ServerName, TRUE, // Only allow users 1, (LPWSTR *)&OrigUserName, &UserSidList ); if ( NetStatus != NERR_Success ) { if ( NetStatus == ERROR_NO_SUCH_MEMBER ) { NetStatus = NERR_UserNotFound; } goto Cleanup; } // // Add the User's Sid to the Array of Sids. // UserSids[UserSidCount] = UserSidList[0]; UserSidList[0] = NULL; UserSidCount ++; } // // Add each group the user is a member of to the array of Sids. // Note that GroupCount would still be zero if LG_INCLUDE_INDIRECT isn't // specified. // for ( GroupIndex = 0; GroupIndex < GroupCount; GroupIndex ++ ) { NetStatus = NetpSamRidToSid( UserHandle, GroupMembership[GroupIndex].RelativeId, &UserSids[UserSidCount] ); if ( NetStatus != NERR_Success ) { goto Cleanup; } UserSidCount ++; } // // Find out which aliases in the ACCOUNT domain this user is a member of. // Status = SamGetAliasMembership( DomainHandle, UserSidCount, UserSids, &PartialCount, &Aliases ); if ( !NT_SUCCESS(Status) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "UserpGetUserPriv: SamGetAliasMembership returns %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } if (PartialCount > 0) { // // Convert the RIDs to names // Status = SamLookupIdsInDomain( DomainHandle, PartialCount, Aliases, &Names, NULL ); // NameUse if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: SamLookupIdsInDomain returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } NetStatus = AliaspPackBuf( Level, PrefMaxLen, PartialCount, EntriesRead, &BufferDescriptor, FixedSize, Names) ; if (NetStatus != NERR_Success && NetStatus != ERROR_MORE_DATA) goto Cleanup; // // free up and reset pointers that need to be reused // Status = SamFreeMemory( Names ); NetpAssert( NT_SUCCESS(Status) ); Names = NULL ; Status = SamFreeMemory( Aliases ); NetpAssert( NT_SUCCESS(Status) ); Aliases = NULL ; *EntriesLeft = PartialCount ; } // // Find out which aliases in the BUILTIN domain this user is a member of. // Status = SamGetAliasMembership( BuiltinDomainHandle, UserSidCount, UserSids, &PartialCount, &Aliases ); if ( !NT_SUCCESS(Status) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "UserpGetUserPriv: SamGetAliasMembership returns %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } // // Convert the RIDs to names // Status = SamLookupIdsInDomain( BuiltinDomainHandle, PartialCount, Aliases, &Names, NULL ); // NameUse if ( !NT_SUCCESS( Status ) ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: SamLookupIdsInDomain returned %lX\n", Status )); } NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } NetStatus = AliaspPackBuf( Level, PrefMaxLen, PartialCount, EntriesRead, &BufferDescriptor, FixedSize, Names) ; *EntriesLeft += PartialCount ; // // Clean up. // Cleanup: // // Free any resources used locally // if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } if ( UsersDomainId != NULL ) { NetpMemoryFree( UsersDomainId ); } if ( Names != NULL ) { Status = SamFreeMemory( Names ); NetpAssert( NT_SUCCESS(Status) ); } if ( UserHandle != NULL ) { (VOID) SamCloseHandle( UserHandle ); } if ( GroupMembership != NULL ) { Status = SamFreeMemory( GroupMembership ); NetpAssert( NT_SUCCESS(Status) ); } if ( UserSids != NULL ) { for ( GroupIndex = 0; GroupIndex < UserSidCount; GroupIndex ++ ) { NetpMemoryFree( UserSids[GroupIndex] ); } NetpMemoryFree( UserSids ); } if ( UserSidList != NULL ) { AliaspFreeSidList ( 1, UserSidList ); } if ( Aliases != NULL ) { Status = SamFreeMemory( Aliases ); NetpAssert( NT_SUCCESS(Status) ); } if ( BuiltinDomainHandle != NULL ) { UaspCloseDomain( BuiltinDomainHandle ); } if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( UsersDomainHandle != NULL ) { UaspCloseDomain( UsersDomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } // // If we're not returning data to the caller, // free the return buffer. // if ( NetStatus != NERR_Success && NetStatus != ERROR_MORE_DATA ) { if ( BufferDescriptor.Buffer != NULL ) { MIDL_user_free( BufferDescriptor.Buffer ); BufferDescriptor.Buffer = NULL; } *EntriesLeft = 0; *EntriesRead = 0; } *Buffer = BufferDescriptor.Buffer; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserGetGroups: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserGetLocalGroups NET_API_STATUS NET_API_FUNCTION AliaspPackBuf( IN DWORD Level, IN DWORD PrefMaxLen, IN DWORD EntriesCount, OUT LPDWORD EntriesRead, BUFFER_DESCRIPTOR *BufferDescriptor, DWORD FixedSize, PUNICODE_STRING Names) { NET_API_STATUS NetStatus = NERR_Success ; ULONG i ; // // Determine the number of entries that will fit in the caller's // buffer. // for ( i=0; i < EntriesCount; i++ ) { DWORD Size; PLOCALGROUP_USERS_INFO_0 lgrui0; // // Compute the size of the next entry // Size = FixedSize + Names[i].Length + sizeof(WCHAR); // // Ensure the return buffer is big enough. // Size = ROUND_UP_COUNT( Size, ALIGN_WCHAR ); NetStatus = NetpAllocateEnumBuffer( BufferDescriptor, FALSE, // Is an enumeration routine. PrefMaxLen, Size, AliaspMemberRelocationRoutine, Level ); if ( NetStatus != NERR_Success ) { break ; } // // Copy the data into the buffer // lgrui0 = (PLOCALGROUP_USERS_INFO_0) BufferDescriptor->FixedDataEnd; BufferDescriptor->FixedDataEnd += FixedSize ; if ( !NetpCopyStringToBuffer( Names[i].Buffer, Names[i].Length/sizeof(WCHAR), BufferDescriptor->FixedDataEnd, (LPWSTR *)&(BufferDescriptor->EndOfVariableData), &lgrui0->lgrui0_name) ) { NetStatus = NERR_InternalError; break ; } (*EntriesRead)++; } return NetStatus ; } NET_API_STATUS NET_API_FUNCTION NetUserModalsGet( IN LPCWSTR ServerName OPTIONAL, IN DWORD Level, OUT LPBYTE *Buffer ) /*++ Routine Description: Retrieve global information for all users and groups in the user account database. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. Level - Level of information required. 0, 1, and 2 are valid. Buffer - Returns a pointer to the return information structure. Caller must deallocate buffer using NetApiBufferFree. Return Value: Error code for the operation. --*/ { NTSTATUS Status; NET_API_STATUS NetStatus; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; PSID DomainId = NULL; ACCESS_MASK DesiredAccess; DWORD Size; // Size of returned information PDOMAIN_PASSWORD_INFORMATION DomainPassword = NULL; PDOMAIN_LOGOFF_INFORMATION DomainLogoff = NULL; PDOMAIN_SERVER_ROLE_INFORMATION DomainServerRole = NULL; PDOMAIN_REPLICATION_INFORMATION DomainReplication = NULL; PDOMAIN_NAME_INFORMATION DomainName = NULL; PDOMAIN_LOCKOUT_INFORMATION DomainLockout = NULL; // // Validate Level // *Buffer = NULL; switch (Level) { case 0: DesiredAccess = DOMAIN_READ_OTHER_PARAMETERS | DOMAIN_READ_PASSWORD_PARAMETERS ; break; case 1: DesiredAccess = DOMAIN_READ_OTHER_PARAMETERS; break; case 2: DesiredAccess = DOMAIN_READ_OTHER_PARAMETERS; break; case 3: DesiredAccess = DOMAIN_READ_PASSWORD_PARAMETERS; break; default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserModalsGet: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the Domain // NetStatus = UaspOpenDomain( SamServerHandle, DesiredAccess, TRUE, // Account Domain &DomainHandle, &DomainId ); if ( NetStatus != NERR_Success ) { goto Cleanup; } // // Get the desired information from SAM and determine the size of // our return information. // switch (Level) { case 0: Status = SamQueryInformationDomain( DomainHandle, DomainPasswordInformation, (PVOID *)&DomainPassword ); if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } Status = SamQueryInformationDomain( DomainHandle, DomainLogoffInformation, (PVOID *)&DomainLogoff ); if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } Size = sizeof( USER_MODALS_INFO_0 ); break; case 1: Status = SamQueryInformationDomain( DomainHandle, DomainServerRoleInformation, (PVOID *)&DomainServerRole ); if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } Status = SamQueryInformationDomain( DomainHandle, DomainReplicationInformation, (PVOID *)&DomainReplication ); if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } Size = sizeof( USER_MODALS_INFO_1 ) + DomainReplication->ReplicaSourceNodeName.Length + sizeof(WCHAR); break; case 2: Status = SamQueryInformationDomain( DomainHandle, DomainNameInformation, (PVOID *)&DomainName ); if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } Size = sizeof( USER_MODALS_INFO_2 ) + DomainName->DomainName.Length + sizeof(WCHAR) + RtlLengthSid( DomainId ); break; case 3: Status = SamQueryInformationDomain( DomainHandle, DomainLockoutInformation, (PVOID *)&DomainLockout ); if ( !NT_SUCCESS( Status ) ) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } Size = sizeof( USER_MODALS_INFO_3 ); break; default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Allocate the return buffer // Size = ROUND_UP_COUNT( Size, ALIGN_WCHAR ); *Buffer = MIDL_user_allocate( Size ); if ( *Buffer == NULL ) { NetStatus = ERROR_NOT_ENOUGH_MEMORY; goto Cleanup; } // // Fill in the return buffer // switch (Level) { case 0: { PUSER_MODALS_INFO_0 usrmod0 = (PUSER_MODALS_INFO_0) *Buffer; usrmod0->usrmod0_min_passwd_len = DomainPassword->MinPasswordLength; usrmod0->usrmod0_max_passwd_age = NetpDeltaTimeToSeconds( DomainPassword->MaxPasswordAge ); usrmod0->usrmod0_min_passwd_age = NetpDeltaTimeToSeconds( DomainPassword->MinPasswordAge ); usrmod0->usrmod0_force_logoff = NetpDeltaTimeToSeconds( DomainLogoff->ForceLogoff ); usrmod0->usrmod0_password_hist_len = DomainPassword->PasswordHistoryLength; break; } case 1: { PUSER_MODALS_INFO_1 usrmod1 = (PUSER_MODALS_INFO_1) *Buffer; LPWSTR EndOfVariableData = (LPWSTR) (*Buffer + Size); switch (DomainServerRole->DomainServerRole) { case DomainServerRolePrimary: usrmod1->usrmod1_role = UAS_ROLE_PRIMARY; break; case DomainServerRoleBackup: usrmod1->usrmod1_role = UAS_ROLE_BACKUP; break; default: NetStatus = NERR_InternalError; goto Cleanup; } if ( !NetpCopyStringToBuffer( DomainReplication->ReplicaSourceNodeName.Buffer, DomainReplication->ReplicaSourceNodeName.Length/sizeof(WCHAR), *Buffer + sizeof(USER_MODALS_INFO_1), &EndOfVariableData, &usrmod1->usrmod1_primary) ) { NetStatus = NERR_InternalError; goto Cleanup; } break; } case 2: { PUSER_MODALS_INFO_2 usrmod2 = (PUSER_MODALS_INFO_2) *Buffer; LPWSTR EndOfVariableData = (LPWSTR) (*Buffer + Size); // // Copy text first size it has more stringent alignment requirements // if ( !NetpCopyStringToBuffer( DomainName->DomainName.Buffer, DomainName->DomainName.Length/sizeof(WCHAR), *Buffer + sizeof(USER_MODALS_INFO_2), &EndOfVariableData, &usrmod2->usrmod2_domain_name) ) { NetStatus = NERR_InternalError; goto Cleanup; } if ( !NetpCopyDataToBuffer( DomainId, RtlLengthSid( DomainId ), *Buffer + sizeof(USER_MODALS_INFO_2), (LPBYTE *)&EndOfVariableData, (LPBYTE *)&usrmod2->usrmod2_domain_id, sizeof(BYTE) ) ) { NetStatus = NERR_InternalError; goto Cleanup; } break; } case 3: { PUSER_MODALS_INFO_3 usrmod3 = (PUSER_MODALS_INFO_3) *Buffer; usrmod3->usrmod3_lockout_duration = NetpDeltaTimeToSeconds( DomainLockout->LockoutDuration ); usrmod3->usrmod3_lockout_observation_window = NetpDeltaTimeToSeconds( DomainLockout->LockoutObservationWindow ); usrmod3->usrmod3_lockout_threshold = DomainLockout->LockoutThreshold; break; } default: NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } NetStatus = NERR_Success; // // Clean up. // Cleanup: if (DomainPassword != NULL) { Status = SamFreeMemory( DomainPassword ); NetpAssert( NT_SUCCESS(Status) ); } if (DomainLogoff != NULL) { Status = SamFreeMemory( DomainLogoff ); NetpAssert( NT_SUCCESS(Status) ); } if (DomainServerRole != NULL) { Status = SamFreeMemory( DomainServerRole ); NetpAssert( NT_SUCCESS(Status) ); } if (DomainReplication != NULL) { Status = SamFreeMemory( DomainReplication ); NetpAssert( NT_SUCCESS(Status) ); } if (DomainName != NULL) { Status = SamFreeMemory( DomainName ); NetpAssert( NT_SUCCESS(Status) ); } if ( DomainLockout != NULL ) { Status = SamFreeMemory( DomainLockout ); NetpAssert( NT_SUCCESS(Status) ); } if ( DomainId != NULL ) { NetpMemoryFree( DomainId ); } if ( DomainHandle != NULL ) { UaspCloseDomain( DomainHandle ); } if ( SamServerHandle != NULL ) { (VOID) SamCloseHandle( SamServerHandle ); } // // Handle downlevel. // UASP_DOWNLEVEL_BEGIN( ServerName, NetStatus ) NetStatus = RxNetUserModalsGet( (LPWSTR)ServerName, Level, Buffer ); UASP_DOWNLEVEL_END; IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserModalsGet: returning %ld\n", NetStatus )); } return NetStatus; } // NetUserModalsGet NET_API_STATUS NET_API_FUNCTION NetUserModalsSet( IN LPCWSTR ServerName OPTIONAL, IN DWORD Level, IN LPBYTE Buffer, OUT LPDWORD ParmError OPTIONAL // Name required by NetpSetParmError ) /*++ Routine Description: Sets global information for all users and group in the user account. Arguments: ServerName - A pointer to a string containing the name of the remote server on which the function is to execute. A NULL pointer or string specifies the local machine. Level - Level of information provided. Buffer - A pointer to the buffer containing the user information structure. ParmError - Optional pointer to a DWORD to return the index of the first parameter in error when ERROR_INVALID_PARAMETER is returned. If NULL, the parameter is not returned on error. Return Value: Error code for the operation. --*/ { NET_API_STATUS NetStatus; NTSTATUS Status; SAM_HANDLE SamServerHandle = NULL; SAM_HANDLE DomainHandle = NULL; ACCESS_MASK DesiredAccess; DWORD UasSamIndex; BOOL LSAServerRoleSet = FALSE; BOOL BuiltinDomainServerRoleSet = FALSE; // // Each SAM Information Class is described here. If multiple fields // can be set in the same information class, each field is set in a // common copy of the information class strcuture. // struct _SAM_INFORMATION_CLASS { // // Sam's DomainInformation class for this class. // DOMAIN_INFORMATION_CLASS DomainInformationClass; // // The size of this information class structure. // DWORD SamSize; // // The state of this information class. As we decide to use this // information class, actually change it, and possibly restore // its old value, we change the state so later stages of this routine // can handle each entry. // enum { UTS_NOT_USED, // No fields are being used UTS_USED, // At least one field is to be changed UTS_READ, // This info class has been read from SAM UTS_DONE, // This info class has been changed in SAM UTS_RECOVERED // This info class has be reverted to old values. } State; // // Before this routine changes anything, it gets the old value for // each of the information classes. This old value is used for // recovery in the event that an error occurs. That is, we will // attempt to put the old information back if we aren't successful // in changing all the information to the new values. // // The old information is also used in the case where a single // information class contains multiple fields and we're only changing // a subset of those fields. // PVOID OldInformation; // // The new field values are stored in this instance of the information // class. // PVOID NewInformation; // // The DesiredAccess mask includes both the access to read and the // access to write the appropriate DomainInformationClass. // ACCESS_MASK DesiredAccess; } SamInfoClass[] = { // // Define a SAM_INFORMATION_CLASS for each information class possibly // used. // // The order of the entries in this array must match the order of // the SAM_* defines above. // /* SAM_LogoffClass */ { DomainLogoffInformation, sizeof( DOMAIN_LOGOFF_INFORMATION ), UTS_NOT_USED, NULL, NULL, DOMAIN_READ_OTHER_PARAMETERS | DOMAIN_WRITE_OTHER_PARAMETERS }, /* SAM_NameClass */ { DomainNameInformation, sizeof( DOMAIN_NAME_INFORMATION ), UTS_NOT_USED, NULL, NULL, DOMAIN_READ_OTHER_PARAMETERS | DOMAIN_WRITE_OTHER_PARAMETERS }, /* SAM_PasswordClass */ { DomainPasswordInformation, sizeof( DOMAIN_PASSWORD_INFORMATION), UTS_NOT_USED, NULL, NULL, DOMAIN_READ_PASSWORD_PARAMETERS | DOMAIN_WRITE_PASSWORD_PARAMS }, /* SAM_ReplicationClass */ { DomainReplicationInformation, sizeof( DOMAIN_REPLICATION_INFORMATION ), UTS_NOT_USED, NULL, NULL, DOMAIN_READ_OTHER_PARAMETERS | DOMAIN_ADMINISTER_SERVER }, /* SAM_ServerRoleClass */ { DomainServerRoleInformation, sizeof( DOMAIN_SERVER_ROLE_INFORMATION ), UTS_NOT_USED, NULL, NULL, DOMAIN_READ_OTHER_PARAMETERS | DOMAIN_ADMINISTER_SERVER }, /* Sam_LockoutClass */ { DomainLockoutInformation, sizeof( DOMAIN_LOCKOUT_INFORMATION ), UTS_NOT_USED, NULL, NULL, DOMAIN_READ_PASSWORD_PARAMETERS | DOMAIN_WRITE_PASSWORD_PARAMS } }; // // Define several macros for accessing the various fields of the UAS // structure. Each macro takes an index into the UserUasSamTable // array and returns the value. // #define GET_UAS_MODAL_STRING_POINTER( _i ) \ (*((LPWSTR *)(Buffer + UserUasSamTable[_i].UasOffset))) #define GET_UAS_MODAL_DWORD( _i ) \ (*((DWORD *)(Buffer + UserUasSamTable[_i].UasOffset))) // // Define a macro which returns a pointer the appropriate SamInfoClass // structure given an index into the UserUasSamTable. // #define SAM_MODAL_CLASS( _i ) \ SamInfoClass[ UserUasSamTable[_i].Class ] // // Define a macro to return a pointer to the appropriate field in the // new sam structure. // // The caller should coerce the pointer as appropriate. // #define GET_SAM_MODAL_FIELD_POINTER( _i ) \ (((LPBYTE)(SAM_MODAL_CLASS(_i).NewInformation)) + \ UserUasSamTable[_i].SamOffset) // // Initialize // NetpSetParmError( PARM_ERROR_NONE ); // // Go through the list of valid fields determining if the info level // is valid and computing the desired access to the domain. // DesiredAccess = 0; for ( UasSamIndex=0 ; UasSamIndex USHRT_MAX ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserModalsSet: ushort too big %lx Index:%ld\n", GET_UAS_MODAL_DWORD(UasSamIndex), UasSamIndex )); } NetpSetParmError( UserUasSamTable[UasSamIndex].UasParmNum ); NetStatus = ERROR_INVALID_PARAMETER; goto Cleanup; } // // Some values are always valid // case UMT_ULONG: case UMT_DELTA: break; // // Ensure the role is a recognized one. // case UMT_ROLE: switch ( GET_UAS_MODAL_DWORD(UasSamIndex) ) { case UAS_ROLE_PRIMARY: case UAS_ROLE_BACKUP: case UAS_ROLE_MEMBER: break; default: IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserModalsSet: invalid role %lx Index:%ld\n", GET_UAS_MODAL_DWORD(UasSamIndex), UasSamIndex )); } NetpSetParmError( UserUasSamTable[UasSamIndex].UasParmNum ); NetStatus = ERROR_INVALID_PARAMETER; goto Cleanup; } break; // // All cases are explicitly handled. // default: NetStatus = NERR_InternalError; goto Cleanup; } // // Flag that this information class is to be set and // accumulate the desired access to do all this functionality. // SAM_MODAL_CLASS(UasSamIndex).State = UTS_USED; DesiredAccess |= SAM_MODAL_CLASS(UasSamIndex).DesiredAccess; } // // Check to be sure the user specified a valid Level. // // The search of the UserUasSamTable should have resulted in // at least one match if the arguments are valid. // if ( DesiredAccess == 0 ) { NetStatus = ERROR_INVALID_LEVEL; goto Cleanup; } // // Connect to the SAM server // NetStatus = UaspOpenSam( ServerName, FALSE, // Don't try null session &SamServerHandle ); if ( NetStatus != NERR_Success ) { IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserModalsSet: Cannot UaspOpenSam %ld\n", NetStatus )); } goto Cleanup; } // // Open the domain asking for accumulated desired access // NetStatus = UaspOpenDomain( SamServerHandle, DesiredAccess, TRUE, // Account Domain &DomainHandle, NULL ); // DomainId if ( NetStatus != NERR_Success ) { goto Cleanup; } // // For each field we're going to change, // Get the current value of the field // Determine what the new value will be. // // The old values will be used later in error recovery and when multiple // fields are changed in SAM with one information level. // for ( UasSamIndex=0 ; UasSamIndexHighPart, ((PLARGE_INTEGER) GET_SAM_MODAL_FIELD_POINTER(UasSamIndex)) ->LowPart, GET_UAS_MODAL_DWORD(UasSamIndex) )); } break; // // Copy the unsigned short to the SAM structure // case UMT_USHORT: *((PUSHORT)GET_SAM_MODAL_FIELD_POINTER(UasSamIndex)) = (USHORT)GET_UAS_MODAL_DWORD(UasSamIndex); break; // // Copy the unsigned long to the SAM structure // case UMT_ULONG: *((PULONG)GET_SAM_MODAL_FIELD_POINTER(UasSamIndex)) = (ULONG)GET_UAS_MODAL_DWORD(UasSamIndex); break; // // Ensure the role is a recognized one. // case UMT_ROLE: switch ( GET_UAS_MODAL_DWORD(UasSamIndex) ) { case UAS_ROLE_PRIMARY: *((PDOMAIN_SERVER_ROLE)GET_SAM_MODAL_FIELD_POINTER(UasSamIndex)) = DomainServerRolePrimary; break; case UAS_ROLE_BACKUP: *((PDOMAIN_SERVER_ROLE)GET_SAM_MODAL_FIELD_POINTER(UasSamIndex)) = DomainServerRoleBackup; break; default: IF_DEBUG( UAS_DEBUG_USER ) { NetpKdPrint(( "NetUserModalsSet: invalid role %lx Index:%ld\n", GET_UAS_MODAL_DWORD(UasSamIndex), UasSamIndex )); } NetpSetParmError( UserUasSamTable[UasSamIndex].UasParmNum ); NetStatus = ERROR_INVALID_PARAMETER; goto Cleanup; } break; // // All types should have been handled above. // default: NetStatus = NERR_InternalError; goto Cleanup; } } // // Set the new values of the fields // // For role change, I should stop/start the SAM server as appropriate. // The UI will stop/start the NetLogon service. ?? // for ( UasSamIndex=0 ; UasSamIndexMessageType = MsV1_0ChangePassword; ChangeRequest->DomainName = DomainNameU; ChangeRequest->AccountName = UserNameU; RtlInitUnicodeString( &ChangeRequest->OldPassword, OldPassword ); // // Limit passwords to 127 bytes so we can run-encode them. // if (ChangeRequest->OldPassword.Length > 127) { NetStatus = ERROR_PASSWORD_RESTRICTION; goto Cleanup; } RtlInitUnicodeString( &ChangeRequest->NewPassword, NewPassword ); if (ChangeRequest->NewPassword.Length > 127) { NetStatus = ERROR_PASSWORD_RESTRICTION; goto Cleanup; } // // Marshall the buffer pointers. We run-encode the passwords so // we don't have cleartext password lying around the pagefile. // Where = (PBYTE) (ChangeRequest+1); ChangeRequest->DomainName.Buffer = (LPWSTR) Where; RtlCopyMemory( Where, DomainNameU.Buffer, ChangeRequest->DomainName.MaximumLength ); Where += ChangeRequest->DomainName.MaximumLength; ChangeRequest->AccountName.Buffer = (LPWSTR) Where; RtlCopyMemory( Where, UserNameU.Buffer, ChangeRequest->AccountName.MaximumLength ); Where += ChangeRequest->AccountName.MaximumLength; ChangeRequest->OldPassword.Buffer = (LPWSTR) Where; RtlCopyMemory( Where, OldPassword, ChangeRequest->OldPassword.MaximumLength ); Where += ChangeRequest->OldPassword.MaximumLength; // // Run encode the passwords so they don't lie around the page file. // Seed = 0; RtlRunEncodeUnicodeString( &Seed, &ChangeRequest->OldPassword ); SeedAndLength = (PSECURITY_SEED_AND_LENGTH) &ChangeRequest->OldPassword.Length; SeedAndLength->Seed = Seed; ChangeRequest->NewPassword.Buffer = (LPWSTR) Where; RtlCopyMemory( Where, NewPassword, ChangeRequest->NewPassword.MaximumLength ); Where += ChangeRequest->NewPassword.MaximumLength; Seed = 0; RtlRunEncodeUnicodeString( &Seed, &ChangeRequest->NewPassword ); SeedAndLength = (PSECURITY_SEED_AND_LENGTH) &ChangeRequest->NewPassword.Length; SeedAndLength->Seed = Seed; // // Since we are running in the caller's process, we most certainly are // impersonating him/her. // ChangeRequest->Impersonating = TRUE; // // Call the MSV1_0 package to change the password. // Status = LsaCallAuthenticationPackage( LsaHandle, PackageId, ChangeRequest, RequestSize, (PVOID *) &ChangeResponse, &ResponseSize, &ProtocolStatus ); if (!NT_SUCCESS(Status)) { NetStatus = NetpNtStatusToApiStatus( Status ); goto Cleanup; } if (!NT_SUCCESS(ProtocolStatus)) { NetStatus = NetpNtStatusToApiStatus( ProtocolStatus ); goto Cleanup; } NetStatus = ERROR_SUCCESS; Cleanup: if (LsaHandle != NULL) { NtClose(LsaHandle); } if (ChangeRequest != NULL) { RtlZeroMemory( ChangeRequest, RequestSize ); NetpMemoryFree( ChangeRequest ); } if (ChangeResponse != NULL) { LsaFreeReturnBuffer( ChangeResponse ); } if (LsaUserName != NULL) { LsaFreeMemory(LsaUserName->Buffer); LsaFreeMemory(LsaUserName); } if (LsaDomainName != NULL) { LsaFreeMemory(LsaDomainName->Buffer); LsaFreeMemory(LsaDomainName); } return(NetStatus); } /*lint +e614 */ /*lint +e740 */