mirror of
https://github.com/reactos/reactos.git
synced 2024-11-18 21:13:52 +00:00
536 lines
16 KiB
C
536 lines
16 KiB
C
/*
|
|
* PROJECT: Local Security Authority Server DLL
|
|
* LICENSE: GPL - See COPYING in the top level directory
|
|
* FILE: dll/win32/lsasrv/session.c
|
|
* PURPOSE: Logon session management routines
|
|
* COPYRIGHT: Copyright 2013 Eric Kohl
|
|
*/
|
|
|
|
#include "lsasrv.h"
|
|
|
|
typedef struct _LSAP_LOGON_SESSION
|
|
{
|
|
LIST_ENTRY Entry;
|
|
LUID LogonId;
|
|
ULONG LogonType;
|
|
ULONG Session;
|
|
LARGE_INTEGER LogonTime;
|
|
PSID Sid;
|
|
UNICODE_STRING UserName;
|
|
UNICODE_STRING LogonDomain;
|
|
UNICODE_STRING AuthenticationPackage;
|
|
UNICODE_STRING LogonServer;
|
|
UNICODE_STRING DnsDomainName;
|
|
UNICODE_STRING Upn;
|
|
} LSAP_LOGON_SESSION, *PLSAP_LOGON_SESSION;
|
|
|
|
|
|
/* GLOBALS *****************************************************************/
|
|
|
|
LIST_ENTRY SessionListHead;
|
|
ULONG SessionCount;
|
|
|
|
/* FUNCTIONS ***************************************************************/
|
|
|
|
VOID
|
|
LsapInitLogonSessions(VOID)
|
|
{
|
|
InitializeListHead(&SessionListHead);
|
|
SessionCount = 0;
|
|
}
|
|
|
|
|
|
static
|
|
PLSAP_LOGON_SESSION
|
|
LsapGetLogonSession(IN PLUID LogonId)
|
|
{
|
|
PLIST_ENTRY SessionEntry;
|
|
PLSAP_LOGON_SESSION CurrentSession;
|
|
|
|
SessionEntry = SessionListHead.Flink;
|
|
while (SessionEntry != &SessionListHead)
|
|
{
|
|
CurrentSession = CONTAINING_RECORD(SessionEntry,
|
|
LSAP_LOGON_SESSION,
|
|
Entry);
|
|
if (RtlEqualLuid(&CurrentSession->LogonId, LogonId))
|
|
return CurrentSession;
|
|
|
|
SessionEntry = SessionEntry->Flink;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
LsapSetLogonSessionData(
|
|
_In_ PLUID LogonId,
|
|
_In_ ULONG LogonType,
|
|
_In_ PUNICODE_STRING UserName,
|
|
_In_ PUNICODE_STRING LogonDomain,
|
|
_In_ PSID Sid)
|
|
{
|
|
PLSAP_LOGON_SESSION Session;
|
|
ULONG Length;
|
|
|
|
TRACE("LsapSetLogonSessionData(%p)\n", LogonId);
|
|
|
|
Session = LsapGetLogonSession(LogonId);
|
|
if (Session == NULL)
|
|
return STATUS_NO_SUCH_LOGON_SESSION;
|
|
|
|
TRACE("LogonType %lu\n", LogonType);
|
|
Session->LogonType = LogonType;
|
|
|
|
TRACE("UserName %wZ\n", UserName);
|
|
Session->UserName.Buffer = RtlAllocateHeap(RtlGetProcessHeap(), HEAP_ZERO_MEMORY, UserName->MaximumLength);
|
|
if (Session->UserName.Buffer == NULL)
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
|
|
Session->UserName.Length = UserName->Length;
|
|
Session->UserName.MaximumLength = UserName->MaximumLength;
|
|
RtlCopyMemory(Session->UserName.Buffer, UserName->Buffer, UserName->MaximumLength);
|
|
|
|
TRACE("LogonDomain %wZ\n", LogonDomain);
|
|
Session->LogonDomain.Buffer = RtlAllocateHeap(RtlGetProcessHeap(), HEAP_ZERO_MEMORY, LogonDomain->MaximumLength);
|
|
if (Session->LogonDomain.Buffer == NULL)
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
|
|
Session->LogonDomain.Length = LogonDomain->Length;
|
|
Session->LogonDomain.MaximumLength = LogonDomain->MaximumLength;
|
|
RtlCopyMemory(Session->LogonDomain.Buffer, LogonDomain->Buffer, LogonDomain->MaximumLength);
|
|
|
|
Length = RtlLengthSid(Sid);
|
|
Session->Sid = RtlAllocateHeap(RtlGetProcessHeap(), HEAP_ZERO_MEMORY, Length);
|
|
if (Session->UserName.Buffer == NULL)
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
|
|
RtlCopyMemory(Session->Sid, Sid, Length);
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
NTAPI
|
|
LsapCreateLogonSession(IN PLUID LogonId)
|
|
{
|
|
PLSAP_LOGON_SESSION Session;
|
|
NTSTATUS Status;
|
|
|
|
TRACE("LsapCreateLogonSession(%p)\n", LogonId);
|
|
|
|
/* Fail, if a session already exists */
|
|
if (LsapGetLogonSession(LogonId) != NULL)
|
|
return STATUS_LOGON_SESSION_COLLISION;
|
|
|
|
/* Allocate a new session entry */
|
|
Session = RtlAllocateHeap(RtlGetProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
sizeof(LSAP_LOGON_SESSION));
|
|
if (Session == NULL)
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
|
|
/* Initialize the session entry */
|
|
RtlCopyLuid(&Session->LogonId, LogonId);
|
|
|
|
TRACE("LsapCreateLogonSession(<0x%lx,0x%lx>)\n",
|
|
LogonId->HighPart, LogonId->LowPart);
|
|
|
|
/* Tell ntoskrnl to create a new logon session */
|
|
Status = LsapRmCreateLogonSession(LogonId);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session);
|
|
return Status;
|
|
}
|
|
|
|
/* Insert the new session into the session list */
|
|
InsertHeadList(&SessionListHead, &Session->Entry);
|
|
SessionCount++;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
NTAPI
|
|
LsapDeleteLogonSession(IN PLUID LogonId)
|
|
{
|
|
PLSAP_LOGON_SESSION Session;
|
|
NTSTATUS Status;
|
|
|
|
TRACE("LsapDeleteLogonSession(%p)\n", LogonId);
|
|
|
|
/* Fail, if the session does not exist */
|
|
Session = LsapGetLogonSession(LogonId);
|
|
if (Session == NULL)
|
|
return STATUS_NO_SUCH_LOGON_SESSION;
|
|
|
|
TRACE("LsapDeleteLogonSession(<0x%lx,0x%lx>)\n",
|
|
LogonId->HighPart, LogonId->LowPart);
|
|
|
|
/* Tell ntoskrnl to delete the logon session */
|
|
Status = LsapRmDeleteLogonSession(LogonId);
|
|
if (!NT_SUCCESS(Status))
|
|
return Status;
|
|
|
|
/* Remove the session entry from the list */
|
|
RemoveEntryList(&Session->Entry);
|
|
SessionCount--;
|
|
|
|
/* Free the session data */
|
|
if (Session->Sid != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->Sid);
|
|
|
|
if (Session->UserName.Buffer != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->UserName.Buffer);
|
|
|
|
if (Session->LogonDomain.Buffer != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->LogonDomain.Buffer);
|
|
|
|
if (Session->AuthenticationPackage.Buffer != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->AuthenticationPackage.Buffer);
|
|
|
|
if (Session->LogonServer.Buffer != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->LogonServer.Buffer);
|
|
|
|
if (Session->DnsDomainName.Buffer != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->DnsDomainName.Buffer);
|
|
|
|
if (Session->Upn.Buffer != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session->Upn.Buffer);
|
|
|
|
/* Free the session entry */
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, Session);
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
NTAPI
|
|
LsapAddCredential(
|
|
_In_ PLUID LogonId,
|
|
_In_ ULONG AuthenticationPackage,
|
|
_In_ PLSA_STRING PrimaryKeyValue,
|
|
_In_ PLSA_STRING Credential)
|
|
{
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
NTAPI
|
|
LsapGetCredentials(
|
|
_In_ PLUID LogonId,
|
|
_In_ ULONG AuthenticationPackage,
|
|
_Inout_ PULONG QueryContext,
|
|
_In_ BOOLEAN RetrieveAllCredentials,
|
|
_Inout_ PLSA_STRING PrimaryKeyValue,
|
|
_Out_ PULONG PrimaryKeyLength,
|
|
_Out_ PLSA_STRING Credentials)
|
|
{
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
NTAPI
|
|
LsapDeleteCredential(
|
|
_In_ PLUID LogonId,
|
|
_In_ ULONG AuthenticationPackage,
|
|
_In_ PLSA_STRING PrimaryKeyValue)
|
|
{
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
LsapEnumLogonSessions(IN OUT PLSA_API_MSG RequestMsg)
|
|
{
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
HANDLE ProcessHandle = NULL;
|
|
PLIST_ENTRY SessionEntry;
|
|
PLSAP_LOGON_SESSION CurrentSession;
|
|
PLUID SessionList;
|
|
ULONG i, Length, MemSize;
|
|
PVOID ClientBaseAddress = NULL;
|
|
NTSTATUS Status;
|
|
|
|
TRACE("LsapEnumLogonSessions(%p)\n", RequestMsg);
|
|
|
|
Length = SessionCount * sizeof(LUID);
|
|
SessionList = RtlAllocateHeap(RtlGetProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
Length);
|
|
if (SessionList == NULL)
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
|
|
i = 0;
|
|
SessionEntry = SessionListHead.Flink;
|
|
while (SessionEntry != &SessionListHead)
|
|
{
|
|
CurrentSession = CONTAINING_RECORD(SessionEntry,
|
|
LSAP_LOGON_SESSION,
|
|
Entry);
|
|
|
|
RtlCopyLuid(&SessionList[i],
|
|
&CurrentSession->LogonId);
|
|
|
|
SessionEntry = SessionEntry->Flink;
|
|
i++;
|
|
}
|
|
|
|
InitializeObjectAttributes(&ObjectAttributes,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
NULL);
|
|
|
|
Status = NtOpenProcess(&ProcessHandle,
|
|
PROCESS_VM_READ | PROCESS_VM_WRITE | PROCESS_VM_OPERATION,
|
|
&ObjectAttributes,
|
|
&RequestMsg->h.ClientId);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
TRACE("NtOpenProcess() failed (Status %lx)\n", Status);
|
|
goto done;
|
|
}
|
|
|
|
TRACE("Length: %lu\n", Length);
|
|
|
|
MemSize = Length;
|
|
Status = NtAllocateVirtualMemory(ProcessHandle,
|
|
&ClientBaseAddress,
|
|
0,
|
|
&MemSize,
|
|
MEM_COMMIT,
|
|
PAGE_READWRITE);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
TRACE("NtAllocateVirtualMemory() failed (Status %lx)\n", Status);
|
|
goto done;
|
|
}
|
|
|
|
TRACE("MemSize: %lu\n", MemSize);
|
|
TRACE("ClientBaseAddress: %p\n", ClientBaseAddress);
|
|
|
|
Status = NtWriteVirtualMemory(ProcessHandle,
|
|
ClientBaseAddress,
|
|
SessionList,
|
|
Length,
|
|
NULL);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
TRACE("NtWriteVirtualMemory() failed (Status %lx)\n", Status);
|
|
goto done;
|
|
}
|
|
|
|
RequestMsg->EnumLogonSessions.Reply.LogonSessionCount = SessionCount;
|
|
RequestMsg->EnumLogonSessions.Reply.LogonSessionBuffer = ClientBaseAddress;
|
|
|
|
done:
|
|
if (ProcessHandle != NULL)
|
|
NtClose(ProcessHandle);
|
|
|
|
if (SessionList != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, SessionList);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
LsapGetLogonSessionData(IN OUT PLSA_API_MSG RequestMsg)
|
|
{
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
HANDLE ProcessHandle = NULL;
|
|
PLSAP_LOGON_SESSION Session;
|
|
PSECURITY_LOGON_SESSION_DATA LocalSessionData;
|
|
PVOID ClientBaseAddress = NULL;
|
|
ULONG TotalLength, MemSize, SidLength = 0;
|
|
PUCHAR Ptr;
|
|
NTSTATUS Status;
|
|
|
|
TRACE("LsapGetLogonSessionData(%p)\n", RequestMsg);
|
|
|
|
TRACE("LogonId: %lx\n", RequestMsg->GetLogonSessionData.Request.LogonId.LowPart);
|
|
Session = LsapGetLogonSession(&RequestMsg->GetLogonSessionData.Request.LogonId);
|
|
if (Session == NULL)
|
|
return STATUS_NO_SUCH_LOGON_SESSION;
|
|
|
|
/* Calculate the required buffer size */
|
|
TotalLength = sizeof(SECURITY_LOGON_SESSION_DATA) +
|
|
Session->UserName.MaximumLength +
|
|
Session->LogonDomain.MaximumLength +
|
|
Session->AuthenticationPackage.MaximumLength +
|
|
Session->LogonServer.MaximumLength +
|
|
Session->DnsDomainName.MaximumLength +
|
|
Session->Upn.MaximumLength;
|
|
if (Session->Sid != NULL)
|
|
{
|
|
SidLength = RtlLengthSid(Session->Sid);
|
|
TotalLength += SidLength;
|
|
}
|
|
TRACE("TotalLength: %lu\n", TotalLength);
|
|
|
|
/* Allocate the buffer */
|
|
LocalSessionData = RtlAllocateHeap(RtlGetProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
TotalLength);
|
|
if (LocalSessionData == NULL)
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)LocalSessionData + sizeof(SECURITY_LOGON_SESSION_DATA));
|
|
TRACE("LocalSessionData: %p Ptr: %p\n", LocalSessionData, Ptr);
|
|
|
|
LocalSessionData->Size = sizeof(SECURITY_LOGON_SESSION_DATA);
|
|
|
|
/* Copy the LogonId */
|
|
RtlCopyLuid(&LocalSessionData->LogonId,
|
|
&RequestMsg->GetLogonSessionData.Request.LogonId);
|
|
|
|
/* Copy the UserName string*/
|
|
LocalSessionData->UserName.Length = Session->UserName.Length;
|
|
LocalSessionData->UserName.MaximumLength = Session->UserName.MaximumLength;
|
|
|
|
if (Session->UserName.MaximumLength != 0)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->UserName.Buffer, Session->UserName.MaximumLength);
|
|
LocalSessionData->UserName.Buffer = (PWSTR)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + Session->UserName.MaximumLength);
|
|
}
|
|
|
|
/* Copy the LogonDomain string */
|
|
LocalSessionData->LogonDomain.Length = Session->LogonDomain.Length;
|
|
LocalSessionData->LogonDomain.MaximumLength = Session->LogonDomain.MaximumLength;
|
|
if (Session->LogonDomain.MaximumLength != 0)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->LogonDomain.Buffer, Session->LogonDomain.MaximumLength);
|
|
LocalSessionData->LogonDomain.Buffer = (PWSTR)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + Session->LogonDomain.MaximumLength);
|
|
}
|
|
|
|
/* Copy the AuthenticationPackage string */
|
|
LocalSessionData->AuthenticationPackage.Length = Session->AuthenticationPackage.Length;
|
|
LocalSessionData->AuthenticationPackage.MaximumLength = Session->AuthenticationPackage.MaximumLength;
|
|
if (Session->AuthenticationPackage.MaximumLength != 0)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->AuthenticationPackage.Buffer, Session->AuthenticationPackage.MaximumLength);
|
|
LocalSessionData->AuthenticationPackage.Buffer = (PWSTR)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + Session->AuthenticationPackage.MaximumLength);
|
|
}
|
|
|
|
LocalSessionData->LogonType = Session->LogonType;
|
|
LocalSessionData->Session = 0;
|
|
|
|
/* Sid */
|
|
if (Session->Sid != NULL)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->Sid, SidLength);
|
|
LocalSessionData->Sid = (PSID)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + SidLength);
|
|
}
|
|
|
|
/* LogonTime */
|
|
LocalSessionData->LogonTime.QuadPart = Session->LogonTime.QuadPart;
|
|
|
|
/* Copy the LogonServer string */
|
|
LocalSessionData->LogonServer.Length = Session->LogonServer.Length;
|
|
LocalSessionData->LogonServer.MaximumLength = Session->LogonServer.MaximumLength;
|
|
if (Session->LogonServer.MaximumLength != 0)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->LogonServer.Buffer, Session->LogonServer.MaximumLength);
|
|
LocalSessionData->LogonServer.Buffer = (PWSTR)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + Session->LogonServer.MaximumLength);
|
|
}
|
|
|
|
/* Copy the DnsDomainName string */
|
|
LocalSessionData->DnsDomainName.Length = Session->DnsDomainName.Length;
|
|
LocalSessionData->DnsDomainName.MaximumLength = Session->DnsDomainName.MaximumLength;
|
|
if (Session->DnsDomainName.MaximumLength != 0)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->DnsDomainName.Buffer, Session->DnsDomainName.MaximumLength);
|
|
LocalSessionData->DnsDomainName.Buffer = (PWSTR)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + Session->DnsDomainName.MaximumLength);
|
|
}
|
|
|
|
/* Copy the Upn string */
|
|
LocalSessionData->Upn.Length = Session->Upn.Length;
|
|
LocalSessionData->Upn.MaximumLength = Session->Upn.MaximumLength;
|
|
if (Session->Upn.MaximumLength != 0)
|
|
{
|
|
RtlCopyMemory(Ptr, Session->Upn.Buffer, Session->Upn.MaximumLength);
|
|
LocalSessionData->Upn.Buffer = (PWSTR)((ULONG_PTR)Ptr - (ULONG_PTR)LocalSessionData);
|
|
|
|
Ptr = (PUCHAR)((ULONG_PTR)Ptr + Session->Upn.MaximumLength);
|
|
}
|
|
|
|
|
|
InitializeObjectAttributes(&ObjectAttributes,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
NULL);
|
|
|
|
Status = NtOpenProcess(&ProcessHandle,
|
|
PROCESS_VM_READ | PROCESS_VM_WRITE | PROCESS_VM_OPERATION,
|
|
&ObjectAttributes,
|
|
&RequestMsg->h.ClientId);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
TRACE("NtOpenProcess() failed (Status %lx)\n", Status);
|
|
goto done;
|
|
}
|
|
|
|
MemSize = TotalLength;
|
|
Status = NtAllocateVirtualMemory(ProcessHandle,
|
|
&ClientBaseAddress,
|
|
0,
|
|
&MemSize,
|
|
MEM_COMMIT,
|
|
PAGE_READWRITE);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
TRACE("NtAllocateVirtualMemory() failed (Status %lx)\n", Status);
|
|
goto done;
|
|
}
|
|
|
|
TRACE("MemSize: %lu\n", MemSize);
|
|
TRACE("ClientBaseAddress: %p\n", ClientBaseAddress);
|
|
|
|
Status = NtWriteVirtualMemory(ProcessHandle,
|
|
ClientBaseAddress,
|
|
LocalSessionData,
|
|
TotalLength,
|
|
NULL);
|
|
if (!NT_SUCCESS(Status))
|
|
{
|
|
TRACE("NtWriteVirtualMemory() failed (Status %lx)\n", Status);
|
|
goto done;
|
|
}
|
|
|
|
RequestMsg->GetLogonSessionData.Reply.SessionDataBuffer = ClientBaseAddress;
|
|
|
|
done:
|
|
if (ProcessHandle != NULL)
|
|
NtClose(ProcessHandle);
|
|
|
|
if (LocalSessionData != NULL)
|
|
RtlFreeHeap(RtlGetProcessHeap(), 0, LocalSessionData);
|
|
|
|
return Status;
|
|
}
|
|
|
|
/* EOF */
|