536 lines
12 KiB
C
536 lines
12 KiB
C
/*++
|
||
|
||
Copyright (c) 1993 Microsoft Corporation
|
||
|
||
Module Name:
|
||
|
||
Util.c
|
||
|
||
Abstract:
|
||
|
||
This module contains utilities function for the netware redirector.
|
||
|
||
Author:
|
||
|
||
Manny Weiser [MannyW] 07-Jan-1994
|
||
|
||
Revision History:
|
||
|
||
--*/
|
||
|
||
#include "Procs.h"
|
||
|
||
//
|
||
// The local debug trace level
|
||
//
|
||
|
||
#define Dbg (DEBUG_TRACE_CONVERT)
|
||
|
||
#ifdef ALLOC_PRAGMA
|
||
#ifndef QFE_BUILD
|
||
#pragma alloc_text( PAGE1, CopyBufferToMdl )
|
||
#endif
|
||
#endif
|
||
|
||
#if 0 // Not pageable
|
||
|
||
// see ifndef QFE_BUILD above
|
||
|
||
#endif
|
||
|
||
|
||
|
||
VOID
|
||
CopyBufferToMdl(
|
||
PMDL DestinationMdl,
|
||
ULONG DataOffset,
|
||
PUCHAR SourceData,
|
||
ULONG SourceByteCount
|
||
)
|
||
/*++
|
||
|
||
Routine Description:
|
||
|
||
This routine copies data from a buffer described by a pointer to a
|
||
given offset in a buffer described by an MDL.
|
||
|
||
Arguments:
|
||
|
||
DestinationMdl - The MDL for the destination buffer.
|
||
|
||
DataOffset - The offset into the destination buffer to copy the data.
|
||
|
||
SourceData - A pointer to the source data buffer.
|
||
|
||
SourceByteCount - The number of bytes to copy.
|
||
|
||
Return Value:
|
||
|
||
None.
|
||
|
||
--*/
|
||
{
|
||
ULONG BufferOffset;
|
||
ULONG PreviousBufferOffset;
|
||
PMDL Mdl;
|
||
ULONG BytesToCopy;
|
||
ULONG MdlByteCount;
|
||
PVOID pSystemVa;
|
||
|
||
DebugTrace( +1, Dbg, "MdlMoveMemory...\n", 0 );
|
||
DebugTrace( 0, Dbg, "Desitination MDL = %X\n", DestinationMdl );
|
||
DebugTrace( 0, Dbg, "DataOffset = %d\n", DataOffset );
|
||
DebugTrace( 0, Dbg, "SourceData = %X\n", SourceData );
|
||
DebugTrace( 0, Dbg, "SourceByteCount = %d\n", SourceByteCount );
|
||
|
||
BufferOffset = 0;
|
||
|
||
Mdl = DestinationMdl;
|
||
|
||
//
|
||
// Truncate the response if it is too big.
|
||
//
|
||
|
||
MdlByteCount = MdlLength( Mdl );
|
||
if ( SourceByteCount + DataOffset > MdlByteCount ) {
|
||
SourceByteCount = MdlByteCount - DataOffset;
|
||
}
|
||
|
||
while ( Mdl != NULL && SourceByteCount != 0 ) {
|
||
|
||
PreviousBufferOffset = BufferOffset;
|
||
BufferOffset += MmGetMdlByteCount( Mdl );
|
||
|
||
if ( DataOffset < BufferOffset ) {
|
||
|
||
//
|
||
// Copy the data to this buffer
|
||
//
|
||
|
||
while ( SourceByteCount > 0 ) {
|
||
|
||
BytesToCopy = MIN( SourceByteCount,
|
||
BufferOffset - DataOffset );
|
||
|
||
pSystemVa = MmGetSystemAddressForMdlSafe( Mdl, NormalPagePriority );
|
||
|
||
DebugTrace( 0, Dbg, "Copy to %X\n", (PUCHAR) pSystemVa +
|
||
DataOffset -
|
||
PreviousBufferOffset );
|
||
DebugTrace( 0, Dbg, "Copy from %X\n", SourceData );
|
||
DebugTrace( 0, Dbg, "Copy bytes %d\n", BytesToCopy );
|
||
|
||
TdiCopyLookaheadData(
|
||
(PUCHAR)pSystemVa + DataOffset - PreviousBufferOffset,
|
||
SourceData,
|
||
BytesToCopy,
|
||
0 );
|
||
|
||
SourceData += BytesToCopy;
|
||
DataOffset += BytesToCopy;
|
||
SourceByteCount -= BytesToCopy;
|
||
|
||
Mdl = Mdl->Next;
|
||
if ( Mdl != NULL ) {
|
||
PreviousBufferOffset = BufferOffset;
|
||
BufferOffset += MmGetMdlByteCount( Mdl );
|
||
} else {
|
||
ASSERT( SourceByteCount == 0 );
|
||
}
|
||
}
|
||
|
||
} else {
|
||
|
||
Mdl = Mdl->Next;
|
||
|
||
}
|
||
}
|
||
|
||
DebugTrace( -1, Dbg, "MdlMoveMemory -> VOID\n", 0 );
|
||
}
|
||
|
||
//
|
||
// These parsing routines are used to do multiple credential
|
||
// connects to a single server.
|
||
//
|
||
|
||
NTSTATUS
|
||
GetCredentialFromServerName(
|
||
IN PUNICODE_STRING puServerName,
|
||
OUT PUNICODE_STRING puCredentialName
|
||
)
|
||
/*+++
|
||
|
||
Description: Given a munged server(credential) name,
|
||
this routine returns the credential.
|
||
---*/
|
||
{
|
||
|
||
DWORD NameLength = 0;
|
||
BOOLEAN FoundFirstParen = FALSE;
|
||
BOOLEAN FoundLastParen = FALSE;
|
||
|
||
DebugTrace( 0, Dbg, "GetCredentialFromServerName: %wZ\n", puServerName );
|
||
|
||
puCredentialName->Length = puServerName->Length;
|
||
puCredentialName->Buffer = puServerName->Buffer;
|
||
|
||
//
|
||
// Find the first paren.
|
||
//
|
||
|
||
while ( ( puCredentialName->Length ) && !FoundFirstParen ) {
|
||
|
||
if ( puCredentialName->Buffer[0] == L'(' ) {
|
||
FoundFirstParen = TRUE;
|
||
}
|
||
|
||
puCredentialName->Buffer++;
|
||
puCredentialName->Length -= sizeof( WCHAR );
|
||
}
|
||
|
||
if ( !FoundFirstParen ) {
|
||
DebugTrace( 0, Dbg, "No opening paren for server(credential) name.\n", 0 );
|
||
return STATUS_UNSUCCESSFUL;
|
||
}
|
||
|
||
//
|
||
// Figure out the name length.
|
||
//
|
||
|
||
while ( ( puCredentialName->Length ) && !FoundLastParen ) {
|
||
|
||
if ( puCredentialName->Buffer[NameLength] == L')' ) {
|
||
FoundLastParen = TRUE;
|
||
}
|
||
|
||
NameLength++;
|
||
puCredentialName->Length -= sizeof( WCHAR );
|
||
}
|
||
|
||
if ( !FoundLastParen ) {
|
||
DebugTrace( 0, Dbg, "No closing paren for server(credential) name.\n", 0 );
|
||
return STATUS_UNSUCCESSFUL;
|
||
}
|
||
|
||
//
|
||
// Format the name and return. Don't count the closing paren.
|
||
//
|
||
|
||
NameLength--;
|
||
|
||
if ( !NameLength ) {
|
||
DebugTrace( 0, Dbg, "Null credential name.\n", 0 );
|
||
return STATUS_UNSUCCESSFUL;
|
||
}
|
||
|
||
puCredentialName->Length = (USHORT) (NameLength * sizeof( WCHAR ));
|
||
puCredentialName->MaximumLength = puCredentialName->Length;
|
||
|
||
DebugTrace( 0, Dbg, "GetCredentialFromServerName --> %wZ\n", puCredentialName );
|
||
|
||
return STATUS_SUCCESS;
|
||
|
||
}
|
||
|
||
NTSTATUS
|
||
BuildExCredentialServerName(
|
||
IN PUNICODE_STRING puServerName,
|
||
IN PUNICODE_STRING puUserName,
|
||
OUT PUNICODE_STRING puExCredServerName
|
||
)
|
||
/*+++
|
||
|
||
Description:
|
||
|
||
Takes a server name and a user name and makes an
|
||
ExCredServerName, which is simply: server(user)
|
||
|
||
This routine allocates memory for the credential
|
||
server name and the caller is responsible for
|
||
freeing the memory when it is no longer needed.
|
||
|
||
---*/
|
||
{
|
||
|
||
NTSTATUS Status;
|
||
PBYTE pbCredNameBuffer;
|
||
|
||
DebugTrace( 0, Dbg, "BuildExCredentialServerName\n", 0 );
|
||
|
||
if ( ( !puExCredServerName ) ||
|
||
( !puServerName ) ||
|
||
( !puUserName ) ) {
|
||
|
||
DebugTrace( 0, DEBUG_TRACE_ALWAYS, "BuildExCredentialServerName -> STATUS_INVALID_PARAMETER\n", 0 );
|
||
return STATUS_INVALID_PARAMETER;
|
||
}
|
||
|
||
puExCredServerName->MaximumLength = puServerName->Length +
|
||
puUserName->Length +
|
||
( 2 * sizeof( WCHAR ) );
|
||
|
||
pbCredNameBuffer = ALLOCATE_POOL( PagedPool,
|
||
puExCredServerName->MaximumLength );
|
||
|
||
if ( pbCredNameBuffer == NULL ) {
|
||
return STATUS_INSUFFICIENT_RESOURCES;
|
||
}
|
||
|
||
puExCredServerName->Buffer = (PWCHAR) pbCredNameBuffer;
|
||
puExCredServerName->Length = puExCredServerName->MaximumLength;
|
||
|
||
//
|
||
// Copy over the server name.
|
||
//
|
||
|
||
RtlCopyMemory( pbCredNameBuffer,
|
||
puServerName->Buffer,
|
||
puServerName->Length );
|
||
|
||
pbCredNameBuffer += puServerName->Length;
|
||
|
||
//
|
||
// Add the credential name in parenthesis.
|
||
//
|
||
|
||
*( (PWCHAR) pbCredNameBuffer ) = L'(';
|
||
|
||
pbCredNameBuffer += sizeof( WCHAR );
|
||
|
||
RtlCopyMemory( pbCredNameBuffer,
|
||
puUserName->Buffer,
|
||
puUserName->Length );
|
||
|
||
pbCredNameBuffer += puUserName->Length;
|
||
|
||
*( (PWCHAR) pbCredNameBuffer ) = L')';
|
||
|
||
DebugTrace( 0, Dbg, "BuildExCredentialServerName: %wZ\n", puExCredServerName );
|
||
return STATUS_SUCCESS;
|
||
|
||
}
|
||
|
||
NTSTATUS
|
||
UnmungeCredentialName(
|
||
IN PUNICODE_STRING puCredName,
|
||
OUT PUNICODE_STRING puServerName
|
||
)
|
||
/*+++
|
||
|
||
Description:
|
||
|
||
Given server(username), return the server
|
||
name portion.
|
||
|
||
---*/
|
||
{
|
||
|
||
USHORT Length = 0;
|
||
|
||
DebugTrace( 0, Dbg, "UnmungeCredentialName: %wZ\n", puCredName );
|
||
|
||
puServerName->Buffer = puCredName->Buffer;
|
||
puServerName->MaximumLength = puCredName->MaximumLength;
|
||
|
||
while ( Length < ( puCredName->Length / sizeof( WCHAR ) ) ) {
|
||
|
||
//
|
||
// Look for the opening paren.
|
||
//
|
||
|
||
if ( puCredName->Buffer[Length] == L'(' ) {
|
||
break;
|
||
}
|
||
|
||
Length++;
|
||
}
|
||
|
||
puServerName->Length = Length * sizeof( WCHAR );
|
||
|
||
DebugTrace( 0, Dbg, " -> %wZ\n", puServerName );
|
||
return STATUS_SUCCESS;
|
||
|
||
}
|
||
|
||
BOOLEAN
|
||
IsCredentialName(
|
||
IN PUNICODE_STRING puObjectName
|
||
)
|
||
/*+++
|
||
|
||
Description: This returns TRUE if the object is an extended
|
||
credential munged name.
|
||
|
||
---*/
|
||
{
|
||
|
||
DWORD dwCurrent = 0;
|
||
|
||
if ( !puObjectName ) {
|
||
return FALSE;
|
||
}
|
||
|
||
while ( dwCurrent < ( puObjectName->Length ) / sizeof( WCHAR ) ) {
|
||
|
||
if ( puObjectName->Buffer[dwCurrent] == L'(' ) {
|
||
return TRUE;
|
||
}
|
||
|
||
dwCurrent++;
|
||
}
|
||
|
||
return FALSE;
|
||
}
|
||
|
||
NTSTATUS
|
||
ExCreateReferenceCredentials(
|
||
PIRP_CONTEXT pIrpContext,
|
||
PUNICODE_STRING puResource
|
||
)
|
||
/*+++
|
||
|
||
On an extended create this checks for credentials
|
||
and, if they exist, references them and resets the
|
||
last used time. If the credentials do not exist
|
||
then a credential shell is created and referenced.
|
||
|
||
This function is responsible for determining the
|
||
tree name from the resource. The resource may be
|
||
a server in the tree, or the name of the tree.
|
||
|
||
---*/
|
||
{
|
||
|
||
NTSTATUS Status;
|
||
PLOGON pLogon;
|
||
PSCB pScb;
|
||
UNICODE_STRING TreeName;
|
||
PNDS_SECURITY_CONTEXT pCredentials;
|
||
UNICODE_STRING ExName;
|
||
|
||
NwAcquireExclusiveRcb( &NwRcb, TRUE );
|
||
pLogon = FindUser( &(pIrpContext->Specific.Create.UserUid), FALSE );
|
||
NwReleaseRcb( &NwRcb );
|
||
|
||
if ( !pLogon ) {
|
||
DebugTrace( 0, Dbg, "Invalid client security context in ExCreateReferenceCredentials.\n", 0 );
|
||
return STATUS_ACCESS_DENIED;
|
||
}
|
||
|
||
//
|
||
// The resource name is either a server or a tree. We need the tree
|
||
// name to create the credential. The following should work even if
|
||
// there is a server and tree with the same name.
|
||
//
|
||
|
||
Status = CreateScb( &pScb,
|
||
pIrpContext,
|
||
puResource,
|
||
NULL,
|
||
NULL,
|
||
NULL,
|
||
TRUE,
|
||
FALSE );
|
||
|
||
if ( NT_SUCCESS( Status ) ) {
|
||
|
||
//
|
||
// This is a server, dig out the tree name.
|
||
//
|
||
|
||
TreeName.Length = pScb->NdsTreeName.Length;
|
||
TreeName.MaximumLength = pScb->NdsTreeName.MaximumLength;
|
||
TreeName.Buffer = pScb->NdsTreeName.Buffer;
|
||
|
||
} else {
|
||
|
||
//
|
||
// This must already be the tree name.
|
||
//
|
||
|
||
TreeName.Length = puResource->Length;
|
||
TreeName.MaximumLength = puResource->MaximumLength;
|
||
TreeName.Buffer = puResource->Buffer;
|
||
pScb = NULL;
|
||
}
|
||
|
||
//
|
||
// Get/Create the credential shell and reference it.
|
||
//
|
||
|
||
if ( !IsCredentialName( &TreeName ) ) {
|
||
|
||
Status = BuildExCredentialServerName(
|
||
&TreeName,
|
||
pIrpContext->Specific.Create.puCredentialName,
|
||
&ExName );
|
||
|
||
if ( !NT_SUCCESS( Status ) ) {
|
||
goto ExitWithCleanup;
|
||
}
|
||
}
|
||
else {
|
||
|
||
ExName = TreeName ;
|
||
}
|
||
|
||
|
||
Status = NdsLookupCredentials( pIrpContext,
|
||
&ExName,
|
||
pLogon,
|
||
&pCredentials,
|
||
CREDENTIAL_WRITE,
|
||
TRUE );
|
||
|
||
if ( !NT_SUCCESS( Status ) ) {
|
||
goto ExitWithCleanup;
|
||
}
|
||
|
||
//
|
||
// Adjust the reference counts.
|
||
//
|
||
|
||
ASSERT( IsCredentialName( &pCredentials->NdsTreeName ) );
|
||
pCredentials->SupplementalHandleCount += 1;
|
||
KeQuerySystemTime( &pCredentials->LastUsedTime );
|
||
pIrpContext->Specific.Create.pExCredentials = pCredentials;
|
||
|
||
NwReleaseCredList( pLogon, pIrpContext );
|
||
|
||
if (ExName.Buffer != TreeName.Buffer) {
|
||
|
||
//
|
||
// only free if we allocated it via BuildExCredentialServerName
|
||
//
|
||
FREE_POOL( ExName.Buffer );
|
||
}
|
||
|
||
ExitWithCleanup:
|
||
|
||
if ( pScb ) {
|
||
NwDereferenceScb( pScb->pNpScb );
|
||
}
|
||
|
||
return Status;
|
||
}
|
||
|
||
NTSTATUS
|
||
ExCreateDereferenceCredentials(
|
||
PIRP_CONTEXT pIrpContext,
|
||
PNDS_SECURITY_CONTEXT pNdsCredentials
|
||
)
|
||
/*+++
|
||
|
||
Dereferce extended credentials.
|
||
|
||
---*/
|
||
{
|
||
|
||
NwAcquireExclusiveCredList( pNdsCredentials->pOwningLogon, pIrpContext );
|
||
pNdsCredentials->SupplementalHandleCount -= 1;
|
||
KeQuerySystemTime( &pNdsCredentials->LastUsedTime );
|
||
NwReleaseCredList( pNdsCredentials->pOwningLogon, pIrpContext );
|
||
return STATUS_SUCCESS;
|
||
}
|