reactos/dll/win32/msgina/msgina.c
Timo Kreuzer e4930be4ff [REACTOS] Use the ISO C and C++ conformant names: _wcsicmp, _stricmp
Stop using non-conforming wcsicmp, stricmp, strcasecmp
2024-10-20 14:12:25 +03:00

1091 lines
27 KiB
C

/*
* ReactOS GINA
* Copyright (C) 2003-2004, 2006 ReactOS Team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
/*
* PROJECT: ReactOS msgina.dll
* FILE: dll/win32/msgina/msgina.c
* PURPOSE: ReactOS Logon GINA DLL
* PROGRAMMER: Thomas Weidenmueller (w3seek@users.sourceforge.net)
* Hervé Poussineau (hpoussin@reactos.org)
*/
#include "msgina.h"
#include <winsvc.h>
#include <userenv.h>
#include <ndk/sefuncs.h>
HINSTANCE hDllInstance;
extern GINA_UI GinaGraphicalUI;
extern GINA_UI GinaTextUI;
static PGINA_UI pGinaUI;
static SID_IDENTIFIER_AUTHORITY SystemAuthority = {SECURITY_NT_AUTHORITY};
static PSID AdminSid;
/*
* @implemented
*/
BOOL WINAPI
WlxNegotiate(
IN DWORD dwWinlogonVersion,
OUT PDWORD pdwDllVersion)
{
TRACE("WlxNegotiate(%lx, %p)\n", dwWinlogonVersion, pdwDllVersion);
if(!pdwDllVersion || (dwWinlogonVersion < WLX_VERSION_1_3))
return FALSE;
*pdwDllVersion = WLX_VERSION_1_3;
return TRUE;
}
LONG
ReadRegSzValue(
IN HKEY hKey,
IN LPCWSTR pszValue,
OUT LPWSTR* pValue)
{
LONG rc;
DWORD dwType;
DWORD cbData = 0;
LPWSTR Value;
if (!pValue)
return ERROR_INVALID_PARAMETER;
*pValue = NULL;
rc = RegQueryValueExW(hKey, pszValue, NULL, &dwType, NULL, &cbData);
if (rc != ERROR_SUCCESS)
return rc;
if (dwType != REG_SZ)
return ERROR_FILE_NOT_FOUND;
Value = HeapAlloc(GetProcessHeap(), 0, cbData + sizeof(WCHAR));
if (!Value)
return ERROR_NOT_ENOUGH_MEMORY;
rc = RegQueryValueExW(hKey, pszValue, NULL, NULL, (LPBYTE)Value, &cbData);
if (rc != ERROR_SUCCESS)
{
HeapFree(GetProcessHeap(), 0, Value);
return rc;
}
/* NULL-terminate the string */
Value[cbData / sizeof(WCHAR)] = '\0';
*pValue = Value;
return ERROR_SUCCESS;
}
static LONG
ReadRegDwordValue(
IN HKEY hKey,
IN LPCWSTR pszValue,
OUT LPDWORD pValue)
{
LONG rc;
DWORD dwType;
DWORD cbData;
DWORD dwValue;
if (!pValue)
return ERROR_INVALID_PARAMETER;
cbData = sizeof(DWORD);
rc = RegQueryValueExW(hKey, pszValue, NULL, &dwType, (LPBYTE)&dwValue, &cbData);
if (rc == ERROR_SUCCESS && dwType == REG_DWORD)
*pValue = dwValue;
return ERROR_SUCCESS;
}
static VOID
ChooseGinaUI(VOID)
{
HKEY ControlKey = NULL;
LPWSTR SystemStartOptions = NULL;
LPWSTR CurrentOption, NextOption; /* Pointers into SystemStartOptions */
BOOL ConsoleBoot = FALSE;
LONG rc;
rc = RegOpenKeyExW(
HKEY_LOCAL_MACHINE,
L"SYSTEM\\CurrentControlSet\\Control",
0,
KEY_QUERY_VALUE,
&ControlKey);
rc = ReadRegSzValue(ControlKey, L"SystemStartOptions", &SystemStartOptions);
if (rc != ERROR_SUCCESS)
goto cleanup;
/* Check for CONSOLE switch in SystemStartOptions */
CurrentOption = SystemStartOptions;
while (CurrentOption)
{
NextOption = wcschr(CurrentOption, L' ');
if (NextOption)
*NextOption = L'\0';
if (_wcsicmp(CurrentOption, L"CONSOLE") == 0)
{
TRACE("Found %S. Switching to console boot\n", CurrentOption);
ConsoleBoot = TRUE;
goto cleanup;
}
CurrentOption = NextOption ? NextOption + 1 : NULL;
}
cleanup:
if (ConsoleBoot)
pGinaUI = &GinaTextUI;
else
pGinaUI = &GinaGraphicalUI;
if (ControlKey != NULL)
RegCloseKey(ControlKey);
HeapFree(GetProcessHeap(), 0, SystemStartOptions);
}
static
BOOL
GetRegistrySettings(PGINA_CONTEXT pgContext)
{
HKEY hKey = NULL;
LPWSTR lpAutoAdminLogon = NULL;
LPWSTR lpDontDisplayLastUserName = NULL;
LPWSTR lpShutdownWithoutLogon = NULL;
LPWSTR lpIgnoreShiftOverride = NULL;
DWORD dwDisableCAD = 0;
DWORD dwSize;
LONG rc;
rc = RegOpenKeyExW(HKEY_LOCAL_MACHINE,
L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon",
0,
KEY_QUERY_VALUE,
&hKey);
if (rc != ERROR_SUCCESS)
{
WARN("RegOpenKeyExW() failed with error %lu\n", rc);
return FALSE;
}
rc = ReadRegSzValue(hKey,
L"AutoAdminLogon",
&lpAutoAdminLogon);
if (rc == ERROR_SUCCESS)
{
if (wcscmp(lpAutoAdminLogon, L"1") == 0)
pgContext->bAutoAdminLogon = TRUE;
}
TRACE("bAutoAdminLogon: %s\n", pgContext->bAutoAdminLogon ? "TRUE" : "FALSE");
rc = ReadRegDwordValue(hKey,
L"DisableCAD",
&dwDisableCAD);
if (rc == ERROR_SUCCESS)
{
if (dwDisableCAD != 0)
pgContext->bDisableCAD = TRUE;
}
TRACE("bDisableCAD: %s\n", pgContext->bDisableCAD ? "TRUE" : "FALSE");
pgContext->bShutdownWithoutLogon = TRUE;
rc = ReadRegSzValue(hKey,
L"ShutdownWithoutLogon",
&lpShutdownWithoutLogon);
if (rc == ERROR_SUCCESS)
{
if (wcscmp(lpShutdownWithoutLogon, L"0") == 0)
pgContext->bShutdownWithoutLogon = FALSE;
}
rc = ReadRegSzValue(hKey,
L"DontDisplayLastUserName",
&lpDontDisplayLastUserName);
if (rc == ERROR_SUCCESS)
{
if (wcscmp(lpDontDisplayLastUserName, L"1") == 0)
pgContext->bDontDisplayLastUserName = TRUE;
}
rc = ReadRegSzValue(hKey,
L"IgnoreShiftOverride",
&lpIgnoreShiftOverride);
if (rc == ERROR_SUCCESS)
{
if (wcscmp(lpIgnoreShiftOverride, L"1") == 0)
pgContext->bIgnoreShiftOverride = TRUE;
}
dwSize = sizeof(pgContext->UserName);
rc = RegQueryValueExW(hKey,
L"DefaultUserName",
NULL,
NULL,
(LPBYTE)&pgContext->UserName,
&dwSize);
dwSize = sizeof(pgContext->DomainName);
rc = RegQueryValueExW(hKey,
L"DefaultDomainName",
NULL,
NULL,
(LPBYTE)&pgContext->DomainName,
&dwSize);
dwSize = sizeof(pgContext->Password);
rc = RegQueryValueExW(hKey,
L"DefaultPassword",
NULL,
NULL,
(LPBYTE)&pgContext->Password,
&dwSize);
if (lpIgnoreShiftOverride != NULL)
HeapFree(GetProcessHeap(), 0, lpIgnoreShiftOverride);
if (lpShutdownWithoutLogon != NULL)
HeapFree(GetProcessHeap(), 0, lpShutdownWithoutLogon);
if (lpDontDisplayLastUserName != NULL)
HeapFree(GetProcessHeap(), 0, lpDontDisplayLastUserName);
if (lpAutoAdminLogon != NULL)
HeapFree(GetProcessHeap(), 0, lpAutoAdminLogon);
if (hKey != NULL)
RegCloseKey(hKey);
return TRUE;
}
typedef DWORD (WINAPI *pThemeWait)(DWORD dwTimeout);
typedef BOOL (WINAPI *pThemeWatch)(void);
static void
InitThemeSupport(VOID)
{
HMODULE hDll = LoadLibraryW(L"shsvcs.dll");
pThemeWait themeWait;
pThemeWatch themeWatch;
if(!hDll)
return;
themeWait = (pThemeWait) GetProcAddress(hDll, (LPCSTR)2);
themeWatch = (pThemeWatch) GetProcAddress(hDll, (LPCSTR)1);
if(themeWait && themeWatch)
{
themeWait(5000);
themeWatch();
}
}
/*
* @implemented
*/
BOOL WINAPI
WlxInitialize(
LPWSTR lpWinsta,
HANDLE hWlx,
PVOID pvReserved,
PVOID pWinlogonFunctions,
PVOID *pWlxContext)
{
PGINA_CONTEXT pgContext;
UNREFERENCED_PARAMETER(pvReserved);
InitThemeSupport();
pgContext = (PGINA_CONTEXT)LocalAlloc(LMEM_FIXED | LMEM_ZEROINIT, sizeof(GINA_CONTEXT));
if(!pgContext)
{
WARN("LocalAlloc() failed\n");
return FALSE;
}
if (!GetRegistrySettings(pgContext))
{
WARN("GetRegistrySettings() failed\n");
LocalFree(pgContext);
return FALSE;
}
/* Return the context to winlogon */
*pWlxContext = (PVOID)pgContext;
pgContext->hDllInstance = hDllInstance;
/* Save pointer to dispatch table */
pgContext->pWlxFuncs = (PWLX_DISPATCH_VERSION_1_3)pWinlogonFunctions;
/* Save the winlogon handle used to call the dispatch functions */
pgContext->hWlx = hWlx;
/* Save window station */
pgContext->station = lpWinsta;
/* Clear status window handle */
pgContext->hStatusWindow = NULL;
/* Notify winlogon that we will use the default SAS */
pgContext->pWlxFuncs->WlxUseCtrlAltDel(hWlx);
/* Locates the authentication package */
//LsaRegisterLogonProcess(...);
pgContext->nShutdownAction = WLX_SAS_ACTION_SHUTDOWN_POWER_OFF;
ChooseGinaUI();
return pGinaUI->Initialize(pgContext);
}
/*
* @implemented
*/
BOOL
WINAPI
WlxScreenSaverNotify(
PVOID pWlxContext,
BOOL *pSecure)
{
#if 0
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
WCHAR szBuffer[2];
HKEY hKeyCurrentUser, hKey;
DWORD bufferSize = sizeof(szBuffer);
DWORD varType = REG_SZ;
LONG rc;
TRACE("(%p %p)\n", pWlxContext, pSecure);
*pSecure = TRUE;
/*
* Policy setting:
* HKLM\Software\Policies\Microsoft\Windows\Control Panel\Desktop : ScreenSaverIsSecure
* User setting:
* HKCU\Control Panel\Desktop : ScreenSaverIsSecure
*/
if (!ImpersonateLoggedOnUser(pgContext->UserToken))
{
ERR("WL: ImpersonateLoggedOnUser() failed with error %lu\n", GetLastError());
*pSecure = FALSE;
return TRUE;
}
/* Open the current user HKCU key */
rc = RegOpenCurrentUser(MAXIMUM_ALLOWED, &hKeyCurrentUser);
TRACE("RegOpenCurrentUser: %ld\n", rc);
if (rc == ERROR_SUCCESS)
{
/* Open the subkey */
rc = RegOpenKeyExW(hKeyCurrentUser,
L"Control Panel\\Desktop",
0,
KEY_QUERY_VALUE,
&hKey);
TRACE("RegOpenKeyExW: %ld\n", rc);
RegCloseKey(hKeyCurrentUser);
}
/* Read the value */
if (rc == ERROR_SUCCESS)
{
rc = RegQueryValueExW(hKey,
L"ScreenSaverIsSecure",
NULL,
&varType,
(LPBYTE)szBuffer,
&bufferSize);
TRACE("RegQueryValueExW: %ld\n", rc);
if (rc == ERROR_SUCCESS)
{
TRACE("szBuffer: \"%S\"\n", szBuffer);
*pSecure = _wtoi(szBuffer);
}
RegCloseKey(hKey);
}
/* Revert the impersonation */
RevertToSelf();
TRACE("*pSecure: %ld\n", *pSecure);
#endif
*pSecure = FALSE;
return TRUE;
}
/*
* @implemented
*/
BOOL WINAPI
WlxStartApplication(
PVOID pWlxContext,
PWSTR pszDesktopName,
PVOID pEnvironment,
PWSTR pszCmdLine)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
STARTUPINFOW StartupInfo;
PROCESS_INFORMATION ProcessInformation;
WCHAR CurrentDirectory[MAX_PATH];
HANDLE hAppToken;
UINT len;
BOOL ret;
len = GetWindowsDirectoryW(CurrentDirectory, MAX_PATH);
if (len == 0 || len > MAX_PATH)
{
ERR("GetWindowsDirectoryW() failed\n");
return FALSE;
}
ret = DuplicateTokenEx(pgContext->UserToken, MAXIMUM_ALLOWED, NULL, SecurityImpersonation, TokenPrimary, &hAppToken);
if (!ret)
{
ERR("DuplicateTokenEx() failed with error %lu\n", GetLastError());
return FALSE;
}
ZeroMemory(&StartupInfo, sizeof(StartupInfo));
ZeroMemory(&ProcessInformation, sizeof(ProcessInformation));
StartupInfo.cb = sizeof(StartupInfo);
StartupInfo.lpTitle = pszCmdLine;
StartupInfo.dwFlags = STARTF_USESHOWWINDOW;
StartupInfo.wShowWindow = SW_SHOW;
StartupInfo.lpDesktop = pszDesktopName;
len = GetWindowsDirectoryW(CurrentDirectory, MAX_PATH);
if (len == 0 || len > MAX_PATH)
{
ERR("GetWindowsDirectoryW() failed\n");
return FALSE;
}
ret = CreateProcessAsUserW(
hAppToken,
pszCmdLine,
NULL,
NULL,
NULL,
FALSE,
CREATE_UNICODE_ENVIRONMENT,
pEnvironment,
CurrentDirectory,
&StartupInfo,
&ProcessInformation);
CloseHandle(ProcessInformation.hProcess);
CloseHandle(ProcessInformation.hThread);
CloseHandle(hAppToken);
if (!ret)
ERR("CreateProcessAsUserW() failed with error %lu\n", GetLastError());
return ret;
}
/*
* @implemented
*/
BOOL WINAPI
WlxActivateUserShell(
PVOID pWlxContext,
PWSTR pszDesktopName,
PWSTR pszMprLogonScript,
PVOID pEnvironment)
{
HKEY hKey;
DWORD BufSize, ValueType;
WCHAR pszUserInitApp[MAX_PATH + 1];
WCHAR pszExpUserInitApp[MAX_PATH];
DWORD len;
LONG rc;
TRACE("WlxActivateUserShell()\n");
UNREFERENCED_PARAMETER(pszMprLogonScript);
/* Get the path of userinit */
rc = RegOpenKeyExW(
HKEY_LOCAL_MACHINE,
L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon",
0,
KEY_QUERY_VALUE,
&hKey);
if (rc != ERROR_SUCCESS)
{
WARN("RegOpenKeyExW() failed with error %lu\n", rc);
return FALSE;
}
/* Query userinit application */
BufSize = sizeof(pszUserInitApp) - sizeof(UNICODE_NULL);
rc = RegQueryValueExW(
hKey,
L"Userinit",
NULL,
&ValueType,
(LPBYTE)pszUserInitApp,
&BufSize);
RegCloseKey(hKey);
if (rc != ERROR_SUCCESS || (ValueType != REG_SZ && ValueType != REG_EXPAND_SZ))
{
WARN("RegQueryValueExW() failed with error %lu\n", rc);
return FALSE;
}
pszUserInitApp[MAX_PATH] = UNICODE_NULL;
len = ExpandEnvironmentStringsW(pszUserInitApp, pszExpUserInitApp, MAX_PATH);
if (len > MAX_PATH)
{
WARN("ExpandEnvironmentStringsW() failed. Required size %lu\n", len);
return FALSE;
}
/* Start userinit app */
return WlxStartApplication(pWlxContext, pszDesktopName, pEnvironment, pszExpUserInitApp);
}
/*
* @implemented
*/
int WINAPI
WlxLoggedOnSAS(
PVOID pWlxContext,
DWORD dwSasType,
PVOID pReserved)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
INT SasAction = WLX_SAS_ACTION_NONE;
TRACE("WlxLoggedOnSAS(0x%lx)\n", dwSasType);
UNREFERENCED_PARAMETER(pReserved);
switch (dwSasType)
{
case WLX_SAS_TYPE_CTRL_ALT_DEL:
case WLX_SAS_TYPE_TIMEOUT:
{
SasAction = pGinaUI->LoggedOnSAS(pgContext, dwSasType);
break;
}
case WLX_SAS_TYPE_SC_INSERT:
{
FIXME("WlxLoggedOnSAS: SasType WLX_SAS_TYPE_SC_INSERT not supported!\n");
break;
}
case WLX_SAS_TYPE_SC_REMOVE:
{
FIXME("WlxLoggedOnSAS: SasType WLX_SAS_TYPE_SC_REMOVE not supported!\n");
break;
}
default:
{
WARN("WlxLoggedOnSAS: Unknown SasType: 0x%x\n", dwSasType);
break;
}
}
return SasAction;
}
/*
* @implemented
*/
BOOL WINAPI
WlxDisplayStatusMessage(
IN PVOID pWlxContext,
IN HDESK hDesktop,
IN DWORD dwOptions,
IN PWSTR pTitle,
IN PWSTR pMessage)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
TRACE("WlxDisplayStatusMessage(\"%S\")\n", pMessage);
return pGinaUI->DisplayStatusMessage(pgContext, hDesktop, dwOptions, pTitle, pMessage);
}
/*
* @implemented
*/
BOOL WINAPI
WlxRemoveStatusMessage(
IN PVOID pWlxContext)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
TRACE("WlxRemoveStatusMessage()\n");
return pGinaUI->RemoveStatusMessage(pgContext);
}
static PWSTR
DuplicationString(PWSTR Str)
{
DWORD cb;
PWSTR NewStr;
if (Str == NULL) return NULL;
cb = (wcslen(Str) + 1) * sizeof(WCHAR);
if ((NewStr = LocalAlloc(LMEM_FIXED, cb)))
memcpy(NewStr, Str, cb);
return NewStr;
}
BOOL
DoAdminUnlock(
IN PGINA_CONTEXT pgContext,
IN PWSTR UserName,
IN PWSTR Domain,
IN PWSTR Password)
{
HANDLE hToken = NULL;
PTOKEN_GROUPS Groups = NULL;
BOOL bIsAdmin = FALSE;
ULONG Size;
ULONG i;
NTSTATUS Status;
NTSTATUS SubStatus = STATUS_SUCCESS;
TRACE("(%S %S %S)\n", UserName, Domain, Password);
Status = ConnectToLsa(pgContext);
if (!NT_SUCCESS(Status))
{
WARN("ConnectToLsa() failed\n");
return FALSE;
}
Status = MyLogonUser(pgContext->LsaHandle,
pgContext->AuthenticationPackage,
UserName,
Domain,
Password,
&pgContext->UserToken,
&SubStatus);
if (!NT_SUCCESS(Status))
{
WARN("MyLogonUser() failed\n");
return FALSE;
}
Status = NtQueryInformationToken(hToken,
TokenGroups,
NULL,
0,
&Size);
if ((Status != STATUS_SUCCESS) && (Status != STATUS_BUFFER_TOO_SMALL))
{
TRACE("NtQueryInformationToken() failed (Status 0x%08lx)\n", Status);
goto done;
}
Groups = HeapAlloc(GetProcessHeap(), 0, Size);
if (Groups == NULL)
{
TRACE("HeapAlloc() failed\n");
goto done;
}
Status = NtQueryInformationToken(hToken,
TokenGroups,
Groups,
Size,
&Size);
if (!NT_SUCCESS(Status))
{
TRACE("NtQueryInformationToken() failed (Status 0x%08lx)\n", Status);
goto done;
}
for (i = 0; i < Groups->GroupCount; i++)
{
if (RtlEqualSid(Groups->Groups[i].Sid, AdminSid))
{
TRACE("Member of Admins group\n");
bIsAdmin = TRUE;
break;
}
}
done:
if (Groups != NULL)
HeapFree(GetProcessHeap(), 0, Groups);
if (hToken != NULL)
CloseHandle(hToken);
return bIsAdmin;
}
NTSTATUS
DoLoginTasks(
IN OUT PGINA_CONTEXT pgContext,
IN PWSTR UserName,
IN PWSTR Domain,
IN PWSTR Password,
OUT PNTSTATUS SubStatus)
{
NTSTATUS Status;
Status = ConnectToLsa(pgContext);
if (!NT_SUCCESS(Status))
{
WARN("ConnectToLsa() failed (Status 0x%08lx)\n", Status);
return Status;
}
Status = MyLogonUser(pgContext->LsaHandle,
pgContext->AuthenticationPackage,
UserName,
Domain,
Password,
&pgContext->UserToken,
SubStatus);
if (!NT_SUCCESS(Status))
{
WARN("MyLogonUser() failed (Status 0x%08lx)\n", Status);
}
return Status;
}
BOOL
CreateProfile(
IN OUT PGINA_CONTEXT pgContext,
IN PWSTR UserName,
IN PWSTR Domain,
IN PWSTR Password)
{
LPWSTR ProfilePath = NULL;
LPWSTR lpEnvironment = NULL;
TOKEN_STATISTICS Stats;
PWLX_PROFILE_V2_0 pProfile = NULL;
DWORD cbStats, cbSize;
DWORD dwLength;
BOOL bResult;
/* Store the logon time in the context */
GetLocalTime(&pgContext->LogonTime);
/* Store user and domain in the context */
wcscpy(pgContext->UserName, UserName);
if (Domain == NULL || wcslen(Domain) == 0)
{
dwLength = _countof(pgContext->DomainName);
GetComputerNameW(pgContext->DomainName, &dwLength);
}
else
{
wcscpy(pgContext->DomainName, Domain);
}
/* Get profile path */
cbSize = 0;
bResult = GetProfilesDirectoryW(NULL, &cbSize);
if (!bResult && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
{
ProfilePath = HeapAlloc(GetProcessHeap(), 0, cbSize * sizeof(WCHAR));
if (!ProfilePath)
{
WARN("HeapAlloc() failed\n");
goto cleanup;
}
bResult = GetProfilesDirectoryW(ProfilePath, &cbSize);
}
if (!bResult)
{
WARN("GetUserProfileDirectoryW() failed\n");
goto cleanup;
}
/* Allocate memory for profile */
pProfile = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(WLX_PROFILE_V2_0));
if (!pProfile)
{
WARN("HeapAlloc() failed\n");
goto cleanup;
}
pProfile->dwType = WLX_PROFILE_TYPE_V2_0;
pProfile->pszProfile = ProfilePath;
cbSize = sizeof(L"LOGONSERVER=\\\\") +
wcslen(pgContext->DomainName) * sizeof(WCHAR) +
sizeof(UNICODE_NULL);
lpEnvironment = HeapAlloc(GetProcessHeap(), 0, cbSize);
if (!lpEnvironment)
{
WARN("HeapAlloc() failed\n");
goto cleanup;
}
StringCbPrintfW(lpEnvironment, cbSize, L"LOGONSERVER=\\\\%ls", pgContext->DomainName);
ASSERT(wcslen(lpEnvironment) == cbSize / sizeof(WCHAR) - 2);
lpEnvironment[cbSize / sizeof(WCHAR) - 1] = UNICODE_NULL;
pProfile->pszEnvironment = lpEnvironment;
if (!GetTokenInformation(pgContext->UserToken,
TokenStatistics,
&Stats,
sizeof(Stats),
&cbStats))
{
WARN("Couldn't get Authentication id from user token!\n");
goto cleanup;
}
*pgContext->pAuthenticationId = Stats.AuthenticationId;
pgContext->pMprNotifyInfo->pszUserName = DuplicationString(UserName);
pgContext->pMprNotifyInfo->pszDomain = DuplicationString(Domain);
pgContext->pMprNotifyInfo->pszPassword = DuplicationString(Password);
pgContext->pMprNotifyInfo->pszOldPassword = NULL;
*pgContext->pdwOptions = 0;
*pgContext->pProfile = pProfile;
return TRUE;
cleanup:
if (pProfile)
{
HeapFree(GetProcessHeap(), 0, pProfile->pszEnvironment);
}
HeapFree(GetProcessHeap(), 0, pProfile);
HeapFree(GetProcessHeap(), 0, ProfilePath);
return FALSE;
}
/*
* @implemented
*/
VOID WINAPI
WlxDisplaySASNotice(
IN PVOID pWlxContext)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
TRACE("WlxDisplaySASNotice(%p)\n", pWlxContext);
if (GetSystemMetrics(SM_REMOTESESSION))
{
/* User is remotely logged on. Don't display a notice */
pgContext->pWlxFuncs->WlxSasNotify(pgContext->hWlx, WLX_SAS_TYPE_CTRL_ALT_DEL);
return;
}
if (pgContext->bAutoAdminLogon)
{
if (pgContext->bIgnoreShiftOverride ||
(GetKeyState(VK_SHIFT) >= 0))
{
/* Don't display the window, we want to do an automatic logon */
pgContext->pWlxFuncs->WlxSasNotify(pgContext->hWlx, WLX_SAS_TYPE_CTRL_ALT_DEL);
return;
}
pgContext->bAutoAdminLogon = FALSE;
}
if (pgContext->bDisableCAD)
{
pgContext->pWlxFuncs->WlxSasNotify(pgContext->hWlx, WLX_SAS_TYPE_CTRL_ALT_DEL);
return;
}
pGinaUI->DisplaySASNotice(pgContext);
TRACE("WlxDisplaySASNotice() done\n");
}
/*
* @implemented
*/
INT WINAPI
WlxLoggedOutSAS(
IN PVOID pWlxContext,
IN DWORD dwSasType,
OUT PLUID pAuthenticationId,
IN OUT PSID pLogonSid,
OUT PDWORD pdwOptions,
OUT PHANDLE phToken,
OUT PWLX_MPR_NOTIFY_INFO pMprNotifyInfo,
OUT PVOID *pProfile)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
INT res;
TRACE("WlxLoggedOutSAS()\n");
UNREFERENCED_PARAMETER(dwSasType);
UNREFERENCED_PARAMETER(pLogonSid);
pgContext->pAuthenticationId = pAuthenticationId;
pgContext->pdwOptions = pdwOptions;
pgContext->pMprNotifyInfo = pMprNotifyInfo;
pgContext->pProfile = pProfile;
res = pGinaUI->LoggedOutSAS(pgContext);
*phToken = pgContext->UserToken;
return res;
}
/*
* @implemented
*/
int WINAPI
WlxWkstaLockedSAS(
PVOID pWlxContext,
DWORD dwSasType)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
TRACE("WlxWkstaLockedSAS()\n");
UNREFERENCED_PARAMETER(dwSasType);
return pGinaUI->LockedSAS(pgContext);
}
/*
* @implemented
*/
VOID
WINAPI
WlxDisplayLockedNotice(PVOID pWlxContext)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
TRACE("WlxDisplayLockedNotice()\n");
if (pgContext->bDisableCAD)
{
pgContext->pWlxFuncs->WlxSasNotify(pgContext->hWlx, WLX_SAS_TYPE_CTRL_ALT_DEL);
return;
}
pGinaUI->DisplayLockedNotice(pgContext);
}
/*
* @implemented
*/
BOOL WINAPI
WlxIsLogoffOk(
PVOID pWlxContext)
{
TRACE("WlxIsLogoffOk()\n");
UNREFERENCED_PARAMETER(pWlxContext);
return TRUE;
}
/*
* @implemented
*/
VOID WINAPI
WlxLogoff(
PVOID pWlxContext)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
TRACE("WlxLogoff(%p)\n", pWlxContext);
/* Delete the password */
ZeroMemory(pgContext->Password, sizeof(pgContext->Password));
/* Close the user token */
CloseHandle(pgContext->UserToken);
pgContext->UserToken = NULL;
}
/*
* @implemented
*/
VOID WINAPI
WlxShutdown(
PVOID pWlxContext,
DWORD ShutdownType)
{
PGINA_CONTEXT pgContext = (PGINA_CONTEXT)pWlxContext;
NTSTATUS Status;
TRACE("WlxShutdown(%p %lx)\n", pWlxContext, ShutdownType);
/* Close the LSA handle */
pgContext->AuthenticationPackage = 0;
Status = LsaDeregisterLogonProcess(pgContext->LsaHandle);
if (!NT_SUCCESS(Status))
{
ERR("LsaDeregisterLogonProcess failed (Status 0x%08lx)\n", Status);
}
}
BOOL WINAPI
DllMain(
IN HINSTANCE hinstDLL,
IN DWORD dwReason,
IN LPVOID lpvReserved)
{
UNREFERENCED_PARAMETER(lpvReserved);
if (dwReason == DLL_PROCESS_ATTACH)
{
hDllInstance = hinstDLL;
RtlAllocateAndInitializeSid(&SystemAuthority,
2,
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS,
SECURITY_NULL_RID,
SECURITY_NULL_RID,
SECURITY_NULL_RID,
SECURITY_NULL_RID,
SECURITY_NULL_RID,
SECURITY_NULL_RID,
&AdminSid);
}
else if (dwReason == DLL_PROCESS_DETACH)
{
if (AdminSid != NULL)
RtlFreeSid(AdminSid);
}
return TRUE;
}