USER_ALL_ACCESS
};
+PGENERIC_MAPPING pServerMapping = &ServerMapping;
+
/* FUNCTIONS *****************************************************************/
+static
+LARGE_INTEGER
+SampAddRelativeTimeToTime(IN LARGE_INTEGER AbsoluteTime,
+ IN LARGE_INTEGER RelativeTime)
+{
+ LARGE_INTEGER NewTime;
+
+ NewTime.QuadPart = AbsoluteTime.QuadPart - RelativeTime.QuadPart;
+
+ if (NewTime.QuadPart < 0)
+ NewTime.QuadPart = 0;
+
+ return NewTime;
+}
+
+
VOID
SampStartRpcServer(VOID)
{
NTAPI
SamrShutdownSamServer(IN SAMPR_HANDLE ServerHandle)
{
- UNIMPLEMENTED;
- return STATUS_NOT_IMPLEMENTED;
+ PSAM_DB_OBJECT ServerObject;
+ NTSTATUS Status;
+
+ TRACE("(%p)\n", ServerHandle);
+
+ /* Validate the server handle */
+ Status = SampValidateDbObject(ServerHandle,
+ SamDbServerObject,
+ SAM_SERVER_SHUTDOWN,
+ &ServerObject);
+ if (!NT_SUCCESS(Status))
+ return Status;
+
+ /* Shut the server down */
+ RpcMgmtStopServerListening(0);
+
+ return STATUS_SUCCESS;
}
SAM_USER_FIXED_DATA FixedUserData;
PSAM_DB_OBJECT DomainObject;
PSAM_DB_OBJECT UserObject;
+ GROUP_MEMBERSHIP GroupMembership;
+ UCHAR LogonHours[23];
ULONG ulSize;
ULONG ulRid;
WCHAR szRid[9];
return Status;
}
- /* FIXME: Set LogonHours attribute*/
- /* FIXME: Set Groups attribute*/
+ /* Set LogonHours attribute*/
+ *((PUSHORT)LogonHours) = 168;
+ memset(&(LogonHours[2]), 0xff, 21);
+
+ Status = SampSetObjectAttribute(UserObject,
+ L"LogonHours",
+ REG_BINARY,
+ &LogonHours,
+ sizeof(LogonHours));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Set Groups attribute*/
+ GroupMembership.RelativeId = DOMAIN_GROUP_RID_USERS;
+ GroupMembership.Attributes = SE_GROUP_MANDATORY |
+ SE_GROUP_ENABLED |
+ SE_GROUP_ENABLED_BY_DEFAULT;
+
+ Status = SampSetObjectAttribute(UserObject,
+ L"Groups",
+ REG_BINARY,
+ &GroupMembership,
+ sizeof(GROUP_MEMBERSHIP));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("failed with status 0x%08lx\n", Status);
+ return Status;
+ }
/* Set LMPwd attribute*/
Status = SampSetObjectAttribute(UserObject,
L"LMPwd",
REG_BINARY,
- NULL,
- 0);
+ &EmptyLmHash,
+ sizeof(ENCRYPTED_LM_OWF_PASSWORD));
if (!NT_SUCCESS(Status))
{
TRACE("failed with status 0x%08lx\n", Status);
Status = SampSetObjectAttribute(UserObject,
L"NTPwd",
REG_BINARY,
- NULL,
- 0);
+ &EmptyNtHash,
+ sizeof(ENCRYPTED_NT_OWF_PASSWORD));
if (!NT_SUCCESS(Status))
{
TRACE("failed with status 0x%08lx\n", Status);
}
+static NTSTATUS
+SampSetGroupName(PSAM_DB_OBJECT GroupObject,
+ PSAMPR_GROUP_INFO_BUFFER Buffer)
+{
+ UNICODE_STRING OldGroupName = {0, 0, NULL};
+ UNICODE_STRING NewGroupName;
+ NTSTATUS Status;
+
+ Status = SampGetObjectAttributeString(GroupObject,
+ L"Name",
+ (PRPC_UNICODE_STRING)&OldGroupName);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttributeString failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ NewGroupName.Length = Buffer->Name.Name.Length;
+ NewGroupName.MaximumLength = Buffer->Name.Name.MaximumLength;
+ NewGroupName.Buffer = Buffer->Name.Name.Buffer;
+
+ if (!RtlEqualUnicodeString(&OldGroupName, &NewGroupName, TRUE))
+ {
+ Status = SampCheckAccountNameInDomain(GroupObject->ParentObject,
+ NewGroupName.Buffer);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Group name \'%S\' already exists in domain (Status 0x%08lx)\n",
+ NewGroupName.Buffer, Status);
+ goto done;
+ }
+ }
+
+ Status = SampSetAccountNameInDomain(GroupObject->ParentObject,
+ L"Groups",
+ NewGroupName.Buffer,
+ GroupObject->RelativeId);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampSetAccountNameInDomain failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SampRemoveAccountNameFromDomain(GroupObject->ParentObject,
+ L"Groups",
+ OldGroupName.Buffer);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampRemoveAccountNameFromDomain failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SampSetObjectAttribute(GroupObject,
+ L"Name",
+ REG_SZ,
+ NewGroupName.Buffer,
+ NewGroupName.Length + sizeof(WCHAR));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampSetObjectAttribute failed (Status 0x%08lx)\n", Status);
+ }
+
+done:
+ if (OldGroupName.Buffer != NULL)
+ midl_user_free(OldGroupName.Buffer);
+
+ return Status;
+}
+
+
static NTSTATUS
SampSetGroupAttribute(PSAM_DB_OBJECT GroupObject,
PSAMPR_GROUP_INFO_BUFFER Buffer)
switch (GroupInformationClass)
{
case GroupNameInformation:
- Status = SampSetObjectAttribute(GroupObject,
- L"Name",
- REG_SZ,
- Buffer->Name.Name.Buffer,
- Buffer->Name.Name.Length + sizeof(WCHAR));
+ Status = SampSetGroupName(GroupObject,
+ Buffer);
break;
case GroupAttributeInformation:
}
+static NTSTATUS
+SampSetAliasName(PSAM_DB_OBJECT AliasObject,
+ PSAMPR_ALIAS_INFO_BUFFER Buffer)
+{
+ UNICODE_STRING OldAliasName = {0, 0, NULL};
+ UNICODE_STRING NewAliasName;
+ NTSTATUS Status;
+
+ Status = SampGetObjectAttributeString(AliasObject,
+ L"Name",
+ (PRPC_UNICODE_STRING)&OldAliasName);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttributeString failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ NewAliasName.Length = Buffer->Name.Name.Length;
+ NewAliasName.MaximumLength = Buffer->Name.Name.MaximumLength;
+ NewAliasName.Buffer = Buffer->Name.Name.Buffer;
+
+ if (!RtlEqualUnicodeString(&OldAliasName, &NewAliasName, TRUE))
+ {
+ Status = SampCheckAccountNameInDomain(AliasObject->ParentObject,
+ NewAliasName.Buffer);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Alias name \'%S\' already exists in domain (Status 0x%08lx)\n",
+ NewAliasName.Buffer, Status);
+ goto done;
+ }
+ }
+
+ Status = SampSetAccountNameInDomain(AliasObject->ParentObject,
+ L"Aliases",
+ NewAliasName.Buffer,
+ AliasObject->RelativeId);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampSetAccountNameInDomain failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SampRemoveAccountNameFromDomain(AliasObject->ParentObject,
+ L"Aliases",
+ OldAliasName.Buffer);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampRemoveAccountNameFromDomain failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SampSetObjectAttribute(AliasObject,
+ L"Name",
+ REG_SZ,
+ NewAliasName.Buffer,
+ NewAliasName.Length + sizeof(WCHAR));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampSetObjectAttribute failed (Status 0x%08lx)\n", Status);
+ }
+
+done:
+ if (OldAliasName.Buffer != NULL)
+ midl_user_free(OldAliasName.Buffer);
+
+ return Status;
+}
+
+
/* Function 29 */
NTSTATUS
NTAPI
switch (AliasInformationClass)
{
case AliasNameInformation:
- Status = SampSetObjectAttribute(AliasObject,
- L"Name",
- REG_SZ,
- Buffer->Name.Name.Buffer,
- Buffer->Name.Name.Length + sizeof(WCHAR));
+ Status = SampSetAliasName(AliasObject,
+ Buffer);
break;
case AliasAdminCommentInformation:
NTSTATUS Status;
/* Validate the alias handle */
- Status = SampValidateDbObject(AliasHandle,
+ Status = SampValidateDbObject(*AliasHandle,
SamDbAliasObject,
DELETE,
&AliasObject);
if (!NT_SUCCESS(Status))
{
- TRACE("failed with status 0x%08lx\n", Status);
+ TRACE("SampValidateDbObject failed (Status 0x%08lx)\n", Status);
return Status;
}
IN PRPC_SID MemberId)
{
PSAM_DB_OBJECT AliasObject;
- LPWSTR MemberIdString = NULL;
- HANDLE MembersKeyHandle = NULL;
- HANDLE MemberKeyHandle = NULL;
- ULONG MemberIdLength;
NTSTATUS Status;
- TRACE("SamrAddMemberToAlias(%p %p)\n",
- AliasHandle, MemberId);
+ TRACE("(%p %p)\n", AliasHandle, MemberId);
/* Validate the alias handle */
Status = SampValidateDbObject(AliasHandle,
return Status;
}
- ConvertSidToStringSidW(MemberId, &MemberIdString);
- TRACE("Member SID: %S\n", MemberIdString);
-
- MemberIdLength = RtlLengthSid(MemberId);
-
- Status = SampRegCreateKey(AliasObject->KeyHandle,
- L"Members",
- KEY_WRITE,
- &MembersKeyHandle);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegCreateKey failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegSetValue(MembersKeyHandle,
- MemberIdString,
- REG_BINARY,
- MemberId,
- MemberIdLength);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegSetValue failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegCreateKey(AliasObject->MembersKeyHandle,
- MemberIdString,
- KEY_WRITE,
- &MemberKeyHandle);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegCreateKey failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegSetValue(MemberKeyHandle,
- AliasObject->Name,
- REG_BINARY,
- MemberId,
- MemberIdLength);
+ Status = SampAddMemberToAlias(AliasObject,
+ MemberId);
if (!NT_SUCCESS(Status))
{
- TRACE("SampRegSetValue failed with status 0x%08lx\n", Status);
- goto done;
+ TRACE("failed with status 0x%08lx\n", Status);
}
-done:
- if (MemberKeyHandle != NULL)
- SampRegCloseKey(MemberKeyHandle);
-
- if (MembersKeyHandle != NULL)
- SampRegCloseKey(MembersKeyHandle);
-
- if (MemberIdString != NULL)
- LocalFree(MemberIdString);
-
return Status;
}
IN PRPC_SID MemberId)
{
PSAM_DB_OBJECT AliasObject;
- LPWSTR MemberIdString = NULL;
- HANDLE MembersKeyHandle = NULL;
- HANDLE MemberKeyHandle = NULL;
- ULONG ulValueCount;
NTSTATUS Status;
- TRACE("SamrRemoveMemberFromAlias(%p %p)\n",
- AliasHandle, MemberId);
+ TRACE("(%p %p)\n", AliasHandle, MemberId);
/* Validate the alias handle */
Status = SampValidateDbObject(AliasHandle,
return Status;
}
- ConvertSidToStringSidW(MemberId, &MemberIdString);
- TRACE("Member SID: %S\n", MemberIdString);
-
- Status = SampRegOpenKey(AliasObject->MembersKeyHandle,
- MemberIdString,
- KEY_WRITE | KEY_QUERY_VALUE,
- &MemberKeyHandle);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegOpenKey failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegDeleteValue(MemberKeyHandle,
- AliasObject->Name);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegDeleteValue failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegQueryKeyInfo(MemberKeyHandle,
- NULL,
- &ulValueCount);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegQueryKeyInfo failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- if (ulValueCount == 0)
- {
- SampRegCloseKey(MemberKeyHandle);
- MemberKeyHandle = NULL;
-
- Status = SampRegDeleteKey(AliasObject->MembersKeyHandle,
- MemberIdString);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegDeleteKey failed with status 0x%08lx\n", Status);
- goto done;
- }
- }
-
- Status = SampRegOpenKey(AliasObject->KeyHandle,
- L"Members",
- KEY_WRITE | KEY_QUERY_VALUE,
- &MembersKeyHandle);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegOpenKey failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegDeleteValue(MembersKeyHandle,
- MemberIdString);
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegDeleteValue failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- Status = SampRegQueryKeyInfo(MembersKeyHandle,
- NULL,
- &ulValueCount);
+ Status = SampRemoveMemberFromAlias(AliasObject,
+ MemberId);
if (!NT_SUCCESS(Status))
{
- TRACE("SampRegQueryKeyInfo failed with status 0x%08lx\n", Status);
- goto done;
- }
-
- if (ulValueCount == 0)
- {
- SampRegCloseKey(MembersKeyHandle);
- MembersKeyHandle = NULL;
-
- Status = SampRegDeleteKey(AliasObject->KeyHandle,
- L"Members");
- if (!NT_SUCCESS(Status))
- {
- TRACE("SampRegDeleteKey failed with status 0x%08lx\n", Status);
- goto done;
- }
+ TRACE("failed with status 0x%08lx\n", Status);
}
-done:
- if (MemberKeyHandle != NULL)
- SampRegCloseKey(MemberKeyHandle);
-
- if (MembersKeyHandle != NULL)
- SampRegCloseKey(MembersKeyHandle);
-
- if (MemberIdString != NULL)
- LocalFree(MemberIdString);
-
return Status;
}
PSAMPR_USER_INFO_BUFFER *Buffer)
{
PSAMPR_USER_INFO_BUFFER InfoBuffer = NULL;
+ SAM_DOMAIN_FIXED_DATA DomainFixedData;
SAM_USER_FIXED_DATA FixedData;
+ LARGE_INTEGER PasswordCanChange;
+ LARGE_INTEGER PasswordMustChange;
ULONG Length = 0;
NTSTATUS Status;
if (InfoBuffer == NULL)
return STATUS_INSUFFICIENT_RESOURCES;
+ /* Get the fixed size domain data */
+ Length = sizeof(SAM_DOMAIN_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject->ParentObject,
+ L"F",
+ NULL,
+ (PVOID)&DomainFixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ goto done;
+
+ /* Get the fixed size user data */
Length = sizeof(SAM_USER_FIXED_DATA);
Status = SampGetObjectAttribute(UserObject,
L"F",
InfoBuffer->Logon.LogonCount = FixedData.LogonCount;
InfoBuffer->Logon.UserAccountControl = FixedData.UserAccountControl;
-// OLD_LARGE_INTEGER PasswordCanChange;
-// OLD_LARGE_INTEGER PasswordMustChange;
+ PasswordCanChange = SampAddRelativeTimeToTime(FixedData.PasswordLastSet,
+ DomainFixedData.MinPasswordAge);
+ InfoBuffer->Logon.PasswordCanChange.LowPart = PasswordCanChange.LowPart;
+ InfoBuffer->Logon.PasswordCanChange.HighPart = PasswordCanChange.HighPart;
+
+ PasswordMustChange = SampAddRelativeTimeToTime(FixedData.PasswordLastSet,
+ DomainFixedData.MaxPasswordAge);
+ InfoBuffer->Logon.PasswordMustChange.LowPart = PasswordMustChange.LowPart;
+ InfoBuffer->Logon.PasswordMustChange.HighPart = PasswordMustChange.HighPart;
/* Get the Name string */
Status = SampGetObjectAttributeString(UserObject,
goto done;
}
- /* FIXME: LogonHours */
+ /* Get the LogonHours attribute */
+ Status = SampGetLogonHoursAttrbute(UserObject,
+ &InfoBuffer->Logon.LogonHours);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
*Buffer = InfoBuffer;
goto done;
}
- /* FIXME: LogonHours */
+ /* Get the LogonHours attribute */
+ Status = SampGetLogonHoursAttrbute(UserObject,
+ &InfoBuffer->Account.LogonHours);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
*Buffer = InfoBuffer;
return Status;
}
-/* FIXME: SampQueryUserLogonHours */
static
NTSTATUS
-SampQueryUserName(PSAM_DB_OBJECT UserObject,
- PSAMPR_USER_INFO_BUFFER *Buffer)
+SampQueryUserLogonHours(PSAM_DB_OBJECT UserObject,
+ PSAMPR_USER_INFO_BUFFER *Buffer)
{
PSAMPR_USER_INFO_BUFFER InfoBuffer = NULL;
NTSTATUS Status;
+ TRACE("(%p %p)\n", UserObject, Buffer);
+
*Buffer = NULL;
InfoBuffer = midl_user_allocate(sizeof(SAMPR_USER_INFO_BUFFER));
if (InfoBuffer == NULL)
+ {
+ TRACE("Failed to allocate InfoBuffer!\n");
return STATUS_INSUFFICIENT_RESOURCES;
+ }
- /* Get the Name string */
- Status = SampGetObjectAttributeString(UserObject,
+ Status = SampGetLogonHoursAttrbute(UserObject,
+ &InfoBuffer->LogonHours.LogonHours);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetLogonHoursAttrbute failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ *Buffer = InfoBuffer;
+
+done:
+ if (!NT_SUCCESS(Status))
+ {
+ if (InfoBuffer != NULL)
+ {
+ if (InfoBuffer->LogonHours.LogonHours.LogonHours != NULL)
+ midl_user_free(InfoBuffer->LogonHours.LogonHours.LogonHours);
+
+ midl_user_free(InfoBuffer);
+ }
+ }
+
+ return Status;
+}
+
+
+static
+NTSTATUS
+SampQueryUserName(PSAM_DB_OBJECT UserObject,
+ PSAMPR_USER_INFO_BUFFER *Buffer)
+{
+ PSAMPR_USER_INFO_BUFFER InfoBuffer = NULL;
+ NTSTATUS Status;
+
+ *Buffer = NULL;
+
+ InfoBuffer = midl_user_allocate(sizeof(SAMPR_USER_INFO_BUFFER));
+ if (InfoBuffer == NULL)
+ return STATUS_INSUFFICIENT_RESOURCES;
+
+ /* Get the Name string */
+ Status = SampGetObjectAttributeString(UserObject,
L"Name",
&InfoBuffer->Name.UserName);
if (!NT_SUCCESS(Status))
}
+static
+NTSTATUS
+SampQueryUserInternal1(PSAM_DB_OBJECT UserObject,
+ PSAMPR_USER_INFO_BUFFER *Buffer)
+{
+ PSAMPR_USER_INFO_BUFFER InfoBuffer = NULL;
+ ULONG Length = 0;
+ NTSTATUS Status = STATUS_SUCCESS;
+
+ /* Fail, if the caller is not a trusted caller */
+ if (UserObject->Trusted == FALSE)
+ return STATUS_INVALID_INFO_CLASS;
+
+ *Buffer = NULL;
+
+ InfoBuffer = midl_user_allocate(sizeof(SAMPR_USER_INFO_BUFFER));
+ if (InfoBuffer == NULL)
+ return STATUS_INSUFFICIENT_RESOURCES;
+
+ /* Get the NT password */
+ Length = 0;
+ SampGetObjectAttribute(UserObject,
+ L"NTPwd",
+ NULL,
+ NULL,
+ &Length);
+
+ if (Length == sizeof(ENCRYPTED_NT_OWF_PASSWORD))
+ {
+ Status = SampGetObjectAttribute(UserObject,
+ L"NTPwd",
+ NULL,
+ (PVOID)&InfoBuffer->Internal1.EncryptedNtOwfPassword,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ goto done;
+ }
+
+ InfoBuffer->Internal1.NtPasswordPresent = (Length == sizeof(ENCRYPTED_NT_OWF_PASSWORD));
+
+ /* Get the LM password */
+ Length = 0;
+ SampGetObjectAttribute(UserObject,
+ L"LMPwd",
+ NULL,
+ NULL,
+ &Length);
+
+ if (Length == sizeof(ENCRYPTED_LM_OWF_PASSWORD))
+ {
+ Status = SampGetObjectAttribute(UserObject,
+ L"LMPwd",
+ NULL,
+ (PVOID)&InfoBuffer->Internal1.EncryptedLmOwfPassword,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ goto done;
+ }
+
+ InfoBuffer->Internal1.LmPasswordPresent = (Length == sizeof(ENCRYPTED_LM_OWF_PASSWORD));
+
+ InfoBuffer->Internal1.PasswordExpired = FALSE;
+
+ *Buffer = InfoBuffer;
+
+done:
+ if (!NT_SUCCESS(Status))
+ {
+ if (InfoBuffer != NULL)
+ {
+ midl_user_free(InfoBuffer);
+ }
+ }
+
+ return Status;
+}
+
+
static NTSTATUS
SampQueryUserParameters(PSAM_DB_OBJECT UserObject,
PSAMPR_USER_INFO_BUFFER *Buffer)
}
+static NTSTATUS
+SampQueryUserAll(PSAM_DB_OBJECT UserObject,
+ PSAMPR_USER_INFO_BUFFER *Buffer)
+{
+ PSAMPR_USER_INFO_BUFFER InfoBuffer = NULL;
+ SAM_DOMAIN_FIXED_DATA DomainFixedData;
+ SAM_USER_FIXED_DATA FixedData;
+ LARGE_INTEGER PasswordCanChange;
+ LARGE_INTEGER PasswordMustChange;
+ ULONG Length = 0;
+ NTSTATUS Status;
+
+ *Buffer = NULL;
+
+ InfoBuffer = midl_user_allocate(sizeof(SAMPR_USER_INFO_BUFFER));
+ if (InfoBuffer == NULL)
+ return STATUS_INSUFFICIENT_RESOURCES;
+
+ /* Get the fixed size domain data */
+ Length = sizeof(SAM_DOMAIN_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject->ParentObject,
+ L"F",
+ NULL,
+ (PVOID)&DomainFixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ goto done;
+
+ /* Get the fixed size user data */
+ Length = sizeof(SAM_USER_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject,
+ L"F",
+ NULL,
+ (PVOID)&FixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ goto done;
+
+ if (UserObject->Access & USER_READ_GENERAL)
+ {
+ /* Get the Name string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"Name",
+ &InfoBuffer->All.UserName);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the FullName string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"FullName",
+ &InfoBuffer->All.FullName);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the user ID*/
+ InfoBuffer->All.UserId = FixedData.UserId;
+
+ /* Get the primary group ID */
+ InfoBuffer->All.PrimaryGroupId = FixedData.PrimaryGroupId;
+
+ /* Get the AdminComment string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"AdminComment",
+ &InfoBuffer->All.AdminComment);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the UserComment string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"UserComment",
+ &InfoBuffer->All.UserComment);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ InfoBuffer->All.WhichFields |= USER_ALL_READ_GENERAL_MASK;
+// USER_ALL_USERNAME |
+// USER_ALL_FULLNAME |
+// USER_ALL_USERID |
+// USER_ALL_PRIMARYGROUPID |
+// USER_ALL_ADMINCOMMENT |
+// USER_ALL_USERCOMMENT;
+ }
+
+ if (UserObject->Access & USER_READ_LOGON)
+ {
+ /* Get the HomeDirectory string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"HomeDirectory",
+ &InfoBuffer->All.HomeDirectory);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the HomeDirectoryDrive string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"HomeDirectoryDrive",
+ &InfoBuffer->Home.HomeDirectoryDrive);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the ScriptPath string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"ScriptPath",
+ &InfoBuffer->All.ScriptPath);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the ProfilePath string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"ProfilePath",
+ &InfoBuffer->All.ProfilePath);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the WorkStations string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"WorkStations",
+ &InfoBuffer->All.WorkStations);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ /* Get the LogonHours attribute */
+ Status = SampGetLogonHoursAttrbute(UserObject,
+ &InfoBuffer->All.LogonHours);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ InfoBuffer->All.LastLogon.LowPart = FixedData.LastLogon.LowPart;
+ InfoBuffer->All.LastLogon.HighPart = FixedData.LastLogon.HighPart;
+
+ InfoBuffer->All.LastLogoff.LowPart = FixedData.LastLogoff.LowPart;
+ InfoBuffer->All.LastLogoff.HighPart = FixedData.LastLogoff.HighPart;
+
+ InfoBuffer->All.BadPasswordCount = FixedData.BadPasswordCount;
+
+ InfoBuffer->All.LogonCount = FixedData.LogonCount;
+
+ PasswordCanChange = SampAddRelativeTimeToTime(FixedData.PasswordLastSet,
+ DomainFixedData.MinPasswordAge);
+ InfoBuffer->All.PasswordCanChange.LowPart = PasswordCanChange.LowPart;
+ InfoBuffer->All.PasswordCanChange.HighPart = PasswordCanChange.HighPart;
+
+ PasswordMustChange = SampAddRelativeTimeToTime(FixedData.PasswordLastSet,
+ DomainFixedData.MaxPasswordAge);
+ InfoBuffer->All.PasswordMustChange.LowPart = PasswordMustChange.LowPart;
+ InfoBuffer->All.PasswordMustChange.HighPart = PasswordMustChange.HighPart;
+
+ InfoBuffer->All. WhichFields |= USER_ALL_READ_LOGON_MASK;
+/*
+ USER_ALL_HOMEDIRECTORY |
+ USER_ALL_HOMEDIRECTORYDRIVE |
+ USER_ALL_SCRIPTPATH |
+ USER_ALL_PROFILEPATH |
+ USER_ALL_WORKSTATIONS |
+ USER_ALL_LASTLOGON |
+ USER_ALL_LASTLOGOFF |
+ USER_ALL_LOGONHOURS |
+ USER_ALL_BADPASSWORDCOUNT |
+ USER_ALL_LOGONCOUNT;
+ USER_ALL_PASSWORDCANCHANGE |
+ USER_ALL_PASSWORDMUSTCHANGE;
+*/
+ }
+
+ if (UserObject->Access & USER_READ_ACCOUNT)
+ {
+ InfoBuffer->All.PasswordLastSet.LowPart = FixedData.PasswordLastSet.LowPart;
+ InfoBuffer->All.PasswordLastSet.HighPart = FixedData.PasswordLastSet.HighPart;
+
+ InfoBuffer->All.AccountExpires.LowPart = FixedData.AccountExpires.LowPart;
+ InfoBuffer->All.AccountExpires.HighPart = FixedData.AccountExpires.HighPart;
+
+ InfoBuffer->All.UserAccountControl = FixedData.UserAccountControl;
+
+ /* Get the Parameters string */
+ Status = SampGetObjectAttributeString(UserObject,
+ L"Parameters",
+ &InfoBuffer->All.Parameters);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("Status 0x%08lx\n", Status);
+ goto done;
+ }
+
+ InfoBuffer->All. WhichFields |= USER_ALL_READ_ACCOUNT_MASK;
+// USER_ALL_PASSWORDLASTSET |
+// USER_ALL_ACCOUNTEXPIRES |
+// USER_ALL_USERACCOUNTCONTROL |
+// USER_ALL_PARAMETERS;
+ }
+
+ if (UserObject->Access & USER_READ_PREFERENCES)
+ {
+ InfoBuffer->All.CountryCode = FixedData.CountryCode;
+
+ InfoBuffer->All.CodePage = FixedData.CodePage;
+
+ InfoBuffer->All. WhichFields |= USER_ALL_READ_PREFERENCES_MASK;
+// USER_ALL_COUNTRYCODE |
+// USER_ALL_CODEPAGE;
+ }
+
+ *Buffer = InfoBuffer;
+
+done:
+ if (!NT_SUCCESS(Status))
+ {
+ if (InfoBuffer != NULL)
+ {
+ if (InfoBuffer->All.UserName.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.UserName.Buffer);
+
+ if (InfoBuffer->All.FullName.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.FullName.Buffer);
+
+ if (InfoBuffer->All.AdminComment.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.AdminComment.Buffer);
+
+ if (InfoBuffer->All.UserComment.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.UserComment.Buffer);
+
+ if (InfoBuffer->All.HomeDirectory.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.HomeDirectory.Buffer);
+
+ if (InfoBuffer->All.HomeDirectoryDrive.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.HomeDirectoryDrive.Buffer);
+
+ if (InfoBuffer->All.ScriptPath.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.ScriptPath.Buffer);
+
+ if (InfoBuffer->All.ProfilePath.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.ProfilePath.Buffer);
+
+ if (InfoBuffer->All.WorkStations.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.WorkStations.Buffer);
+
+ if (InfoBuffer->All.LogonHours.LogonHours != NULL)
+ midl_user_free(InfoBuffer->All.LogonHours.LogonHours);
+
+ if (InfoBuffer->All.Parameters.Buffer != NULL)
+ midl_user_free(InfoBuffer->All.Parameters.Buffer);
+
+ midl_user_free(InfoBuffer);
+ }
+ }
+
+ return Status;
+}
+
+
/* Function 36 */
NTSTATUS
NTAPI
USER_READ_ACCOUNT;
break;
+ case UserInternal1Information:
+ case UserAllInformation:
+ DesiredAccess = 0;
+ break;
+
default:
return STATUS_INVALID_INFO_CLASS;
}
Buffer);
break;
-// case UserLogonHoursInformation:
-// Status = SampQueryUserLogonHours(UserObject,
-// Buffer);
-// break;
+ case UserLogonHoursInformation:
+ Status = SampQueryUserLogonHours(UserObject,
+ Buffer);
+ break;
case UserAccountInformation:
Status = SampQueryUserAccount(UserObject,
Buffer);
break;
-// case UserInternal1Information:
+ case UserInternal1Information:
+ Status = SampQueryUserInternal1(UserObject,
+ Buffer);
+ break;
case UserParametersInformation:
Status = SampQueryUserParameters(UserObject,
Buffer);
break;
-// case UserAllInformation:
+ case UserAllInformation:
+ Status = SampQueryUserAll(UserObject,
+ Buffer);
+ break;
+
// case UserInternal4Information:
// case UserInternal5Information:
// case UserInternal4InformationNew:
}
+static NTSTATUS
+SampSetUserName(PSAM_DB_OBJECT UserObject,
+ PRPC_UNICODE_STRING NewUserName)
+{
+ UNICODE_STRING OldUserName = {0, 0, NULL};
+ NTSTATUS Status;
+
+ Status = SampGetObjectAttributeString(UserObject,
+ L"Name",
+ (PRPC_UNICODE_STRING)&OldUserName);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttributeString failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ if (!RtlEqualUnicodeString(&OldUserName, (PCUNICODE_STRING)NewUserName, TRUE))
+ {
+ Status = SampCheckAccountNameInDomain(UserObject->ParentObject,
+ NewUserName->Buffer);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("User name \'%S\' already exists in domain (Status 0x%08lx)\n",
+ NewUserName->Buffer, Status);
+ goto done;
+ }
+ }
+
+ Status = SampSetAccountNameInDomain(UserObject->ParentObject,
+ L"Users",
+ NewUserName->Buffer,
+ UserObject->RelativeId);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampSetAccountNameInDomain failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SampRemoveAccountNameFromDomain(UserObject->ParentObject,
+ L"Users",
+ OldUserName.Buffer);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampRemoveAccountNameFromDomain failed (Status 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SampSetObjectAttribute(UserObject,
+ L"Name",
+ REG_SZ,
+ NewUserName->Buffer,
+ NewUserName->Length + sizeof(WCHAR));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampSetObjectAttribute failed (Status 0x%08lx)\n", Status);
+ }
+
+done:
+ if (OldUserName.Buffer != NULL)
+ midl_user_free(OldUserName.Buffer);
+
+ return Status;
+}
+
+
static NTSTATUS
SampSetUserGeneral(PSAM_DB_OBJECT UserObject,
PSAMPR_USER_INFO_BUFFER Buffer)
if (!NT_SUCCESS(Status))
goto done;
- Status = SampSetObjectAttribute(UserObject,
- L"Name",
- REG_SZ,
- Buffer->General.UserName.Buffer,
- Buffer->General.UserName.MaximumLength);
+ Status = SampSetUserName(UserObject,
+ &Buffer->General.UserName);
if (!NT_SUCCESS(Status))
goto done;
if (!NT_SUCCESS(Status))
goto done;
- FixedData.UserAccountControl = Buffer->Control.UserAccountControl;
+ FixedData.UserAccountControl = Buffer->Control.UserAccountControl;
+
+ Status = SampSetObjectAttribute(UserObject,
+ L"F",
+ REG_BINARY,
+ &FixedData,
+ Length);
+
+done:
+ return Status;
+}
+
+
+static NTSTATUS
+SampSetUserExpires(PSAM_DB_OBJECT UserObject,
+ PSAMPR_USER_INFO_BUFFER Buffer)
+{
+ SAM_USER_FIXED_DATA FixedData;
+ ULONG Length = 0;
+ NTSTATUS Status;
+
+ Length = sizeof(SAM_USER_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject,
+ L"F",
+ NULL,
+ (PVOID)&FixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ goto done;
+
+ FixedData.AccountExpires.LowPart = Buffer->Expires.AccountExpires.LowPart;
+ FixedData.AccountExpires.HighPart = Buffer->Expires.AccountExpires.HighPart;
Status = SampSetObjectAttribute(UserObject,
L"F",
static NTSTATUS
-SampSetUserExpires(PSAM_DB_OBJECT UserObject,
- PSAMPR_USER_INFO_BUFFER Buffer)
+SampSetUserInternal1(PSAM_DB_OBJECT UserObject,
+ PSAMPR_USER_INFO_BUFFER Buffer)
{
SAM_USER_FIXED_DATA FixedData;
ULONG Length = 0;
- NTSTATUS Status;
+ NTSTATUS Status = STATUS_SUCCESS;
+
+ /* FIXME: Decrypt NT password */
+ /* FIXME: Decrypt LM password */
+ Status = SampSetUserPassword(UserObject,
+ &Buffer->Internal1.EncryptedNtOwfPassword,
+ Buffer->Internal1.NtPasswordPresent,
+ &Buffer->Internal1.EncryptedLmOwfPassword,
+ Buffer->Internal1.LmPasswordPresent);
+ if (!NT_SUCCESS(Status))
+ goto done;
+
+ /* Get the fixed user attributes */
Length = sizeof(SAM_USER_FIXED_DATA);
Status = SampGetObjectAttribute(UserObject,
L"F",
if (!NT_SUCCESS(Status))
goto done;
- FixedData.AccountExpires.LowPart = Buffer->Expires.AccountExpires.LowPart;
- FixedData.AccountExpires.HighPart = Buffer->Expires.AccountExpires.HighPart;
+ if (Buffer->Internal1.PasswordExpired)
+ {
+ /* The pasword was last set ages ago */
+ FixedData.PasswordLastSet.LowPart = 0;
+ FixedData.PasswordLastSet.HighPart = 0;
+ }
+ else
+ {
+ /* The pasword was last set right now */
+ Status = NtQuerySystemTime(&FixedData.PasswordLastSet);
+ if (!NT_SUCCESS(Status))
+ goto done;
+ }
+ /* Set the fixed user attributes */
Status = SampSetObjectAttribute(UserObject,
L"F",
REG_BINARY,
if (WhichFields & USER_ALL_USERNAME)
{
- Status = SampSetObjectAttribute(UserObject,
- L"Name",
- REG_SZ,
- Buffer->All.UserName.Buffer,
- Buffer->All.UserName.MaximumLength);
+ Status = SampSetUserName(UserObject,
+ &Buffer->All.UserName);
if (!NT_SUCCESS(Status))
goto done;
}
REG_SZ,
Buffer->All.Parameters.Buffer,
Buffer->All.Parameters.MaximumLength);
+ if (!NT_SUCCESS(Status))
+ goto done;
+ }
+
+ if (WhichFields & USER_ALL_LOGONHOURS)
+ {
+ Status = SampSetLogonHoursAttrbute(UserObject,
+ &Buffer->All.LogonHours);
+ if (!NT_SUCCESS(Status))
+ goto done;
}
if (WhichFields & (USER_ALL_PRIMARYGROUPID |
/*
FIXME:
- USER_ALL_LOGONHOURS
USER_ALL_NTPASSWORDPRESENT
USER_ALL_LMPASSWORDPRESENT
USER_ALL_PASSWORDEXPIRED
break;
case UserSetPasswordInformation:
+ case UserInternal1Information:
DesiredAccess = USER_FORCE_PASSWORD_CHANGE;
break;
Status = SampSetUserPreferences(UserObject,
Buffer);
break;
-/*
+
case UserLogonHoursInformation:
- Status = SampSetUserLogonHours(UserObject,
- Buffer);
+ Status = SampSetLogonHoursAttrbute(UserObject,
+ &Buffer->LogonHours.LogonHours);
break;
-*/
+
case UserNameInformation:
- Status = SampSetObjectAttribute(UserObject,
- L"Name",
- REG_SZ,
- Buffer->Name.UserName.Buffer,
- Buffer->Name.UserName.MaximumLength);
+ Status = SampSetUserName(UserObject,
+ &Buffer->Name.UserName);
if (!NT_SUCCESS(Status))
break;
break;
case UserAccountNameInformation:
- Status = SampSetObjectAttribute(UserObject,
- L"Name",
- REG_SZ,
- Buffer->AccountName.UserName.Buffer,
- Buffer->AccountName.UserName.MaximumLength);
+ Status = SampSetUserName(UserObject,
+ &Buffer->AccountName.UserName);
break;
case UserFullNameInformation:
Buffer);
break;
-// case UserInternal1Information:
+ case UserInternal1Information:
+ Status = SampSetUserInternal1(UserObject,
+ Buffer);
+ break;
case UserParametersInformation:
Status = SampSetObjectAttribute(UserObject,
IN unsigned char LmCrossEncryptionPresent,
IN PENCRYPTED_LM_OWF_PASSWORD NewLmEncryptedWithNewNt)
{
- UNIMPLEMENTED;
- return STATUS_NOT_IMPLEMENTED;
+ ENCRYPTED_LM_OWF_PASSWORD StoredLmPassword;
+ ENCRYPTED_NT_OWF_PASSWORD StoredNtPassword;
+ PENCRYPTED_LM_OWF_PASSWORD OldLmPassword;
+ PENCRYPTED_LM_OWF_PASSWORD NewLmPassword;
+ PENCRYPTED_NT_OWF_PASSWORD OldNtPassword;
+ PENCRYPTED_NT_OWF_PASSWORD NewNtPassword;
+ BOOLEAN StoredLmPresent = FALSE;
+ BOOLEAN StoredNtPresent = FALSE;
+ BOOLEAN StoredLmEmpty = TRUE;
+ BOOLEAN StoredNtEmpty = TRUE;
+ PSAM_DB_OBJECT UserObject;
+ ULONG Length;
+ SAM_USER_FIXED_DATA UserFixedData;
+ SAM_DOMAIN_FIXED_DATA DomainFixedData;
+ LARGE_INTEGER SystemTime;
+ NTSTATUS Status;
+
+ TRACE("(%p %u %p %p %u %p %p %u %p %u %p)\n",
+ UserHandle, LmPresent, OldLmEncryptedWithNewLm, NewLmEncryptedWithOldLm,
+ NtPresent, OldNtEncryptedWithNewNt, NewNtEncryptedWithOldNt, NtCrossEncryptionPresent,
+ NewNtEncryptedWithNewLm, LmCrossEncryptionPresent, NewLmEncryptedWithNewNt);
+
+ /* Validate the user handle */
+ Status = SampValidateDbObject(UserHandle,
+ SamDbUserObject,
+ USER_CHANGE_PASSWORD,
+ &UserObject);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampValidateDbObject failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Get the current time */
+ Status = NtQuerySystemTime(&SystemTime);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("NtQuerySystemTime failed (Status 0x%08lx)\n", Status);
+ return Status;
+ }
+
+ /* Retrieve the LM password */
+ Length = sizeof(ENCRYPTED_LM_OWF_PASSWORD);
+ Status = SampGetObjectAttribute(UserObject,
+ L"LMPwd",
+ NULL,
+ &StoredLmPassword,
+ &Length);
+ if (NT_SUCCESS(Status))
+ {
+ if (Length == sizeof(ENCRYPTED_LM_OWF_PASSWORD))
+ {
+ StoredLmPresent = TRUE;
+ if (!RtlEqualMemory(&StoredLmPassword,
+ &EmptyLmHash,
+ sizeof(ENCRYPTED_LM_OWF_PASSWORD)))
+ StoredLmEmpty = FALSE;
+ }
+ }
+
+ /* Retrieve the NT password */
+ Length = sizeof(ENCRYPTED_NT_OWF_PASSWORD);
+ Status = SampGetObjectAttribute(UserObject,
+ L"NTPwd",
+ NULL,
+ &StoredNtPassword,
+ &Length);
+ if (NT_SUCCESS(Status))
+ {
+ if (Length == sizeof(ENCRYPTED_NT_OWF_PASSWORD))
+ {
+ StoredNtPresent = TRUE;
+ if (!RtlEqualMemory(&StoredNtPassword,
+ &EmptyNtHash,
+ sizeof(ENCRYPTED_NT_OWF_PASSWORD)))
+ StoredNtEmpty = FALSE;
+ }
+ }
+
+ /* Retrieve the fixed size user data */
+ Length = sizeof(SAM_USER_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject,
+ L"F",
+ NULL,
+ &UserFixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttribute failed to retrieve the fixed user data (Status 0x%08lx)\n", Status);
+ return Status;
+ }
+
+ /* Check if we can change the password at this time */
+ if ((StoredNtEmpty == FALSE) || (StoredNtEmpty == FALSE))
+ {
+ /* Get fixed domain data */
+ Length = sizeof(SAM_DOMAIN_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject->ParentObject,
+ L"F",
+ NULL,
+ &DomainFixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttribute failed to retrieve the fixed domain data (Status 0x%08lx)\n", Status);
+ return Status;
+ }
+
+ if (DomainFixedData.MinPasswordAge.QuadPart > 0)
+ {
+ if (SystemTime.QuadPart < (UserFixedData.PasswordLastSet.QuadPart + DomainFixedData.MinPasswordAge.QuadPart))
+ return STATUS_ACCOUNT_RESTRICTION;
+ }
+ }
+
+ /* FIXME: Decrypt passwords */
+ OldLmPassword = OldLmEncryptedWithNewLm;
+ NewLmPassword = NewLmEncryptedWithOldLm;
+ OldNtPassword = OldNtEncryptedWithNewNt;
+ NewNtPassword = NewNtEncryptedWithOldNt;
+
+ /* Check if the old passwords match the stored ones */
+ if (NtPresent)
+ {
+ if (LmPresent)
+ {
+ if (!RtlEqualMemory(&StoredLmPassword,
+ OldLmPassword,
+ sizeof(ENCRYPTED_LM_OWF_PASSWORD)))
+ {
+ TRACE("Old LM Password does not match!\n");
+ Status = STATUS_WRONG_PASSWORD;
+ }
+ else
+ {
+ if (!RtlEqualMemory(&StoredNtPassword,
+ OldNtPassword,
+ sizeof(ENCRYPTED_LM_OWF_PASSWORD)))
+ {
+ TRACE("Old NT Password does not match!\n");
+ Status = STATUS_WRONG_PASSWORD;
+ }
+ }
+ }
+ else
+ {
+ if (!RtlEqualMemory(&StoredNtPassword,
+ OldNtPassword,
+ sizeof(ENCRYPTED_LM_OWF_PASSWORD)))
+ {
+ TRACE("Old NT Password does not match!\n");
+ Status = STATUS_WRONG_PASSWORD;
+ }
+ }
+ }
+ else
+ {
+ if (LmPresent)
+ {
+ if (!RtlEqualMemory(&StoredLmPassword,
+ OldLmPassword,
+ sizeof(ENCRYPTED_LM_OWF_PASSWORD)))
+ {
+ TRACE("Old LM Password does not match!\n");
+ Status = STATUS_WRONG_PASSWORD;
+ }
+ }
+ else
+ {
+ Status = STATUS_INVALID_PARAMETER;
+ }
+ }
+
+ /* Store the new password hashes */
+ if (NT_SUCCESS(Status))
+ {
+ Status = SampSetUserPassword(UserObject,
+ NewNtPassword,
+ NtPresent,
+ NewLmPassword,
+ LmPresent);
+ if (NT_SUCCESS(Status))
+ {
+ /* Update PasswordLastSet */
+ UserFixedData.PasswordLastSet.QuadPart = SystemTime.QuadPart;
+
+ /* Set the fixed size user data */
+ Length = sizeof(SAM_USER_FIXED_DATA);
+ Status = SampSetObjectAttribute(UserObject,
+ L"F",
+ REG_BINARY,
+ &UserFixedData,
+ Length);
+ }
+ }
+
+ if (Status == STATUS_WRONG_PASSWORD)
+ {
+ /* Update BadPasswordCount and LastBadPasswordTime */
+ UserFixedData.BadPasswordCount++;
+ UserFixedData.LastBadPasswordTime.QuadPart = SystemTime.QuadPart;
+
+ /* Set the fixed size user data */
+ Length = sizeof(SAM_USER_FIXED_DATA);
+ Status = SampSetObjectAttribute(UserObject,
+ L"F",
+ REG_BINARY,
+ &UserFixedData,
+ Length);
+ }
+
+ return Status;
}
return STATUS_NOT_IMPLEMENTED;
}
+
/* Function 44 */
NTSTATUS
NTAPI
SamrGetUserDomainPasswordInformation(IN SAMPR_HANDLE UserHandle,
OUT PUSER_DOMAIN_PASSWORD_INFORMATION PasswordInformation)
{
- UNIMPLEMENTED;
- return STATUS_NOT_IMPLEMENTED;
+ SAM_DOMAIN_FIXED_DATA DomainFixedData;
+ SAM_USER_FIXED_DATA UserFixedData;
+ PSAM_DB_OBJECT DomainObject;
+ PSAM_DB_OBJECT UserObject;
+ ULONG Length = 0;
+ NTSTATUS Status;
+
+ TRACE("(%p %p)\n",
+ UserHandle, PasswordInformation);
+
+ /* Validate the user handle */
+ Status = SampValidateDbObject(UserHandle,
+ SamDbUserObject,
+ 0,
+ &UserObject);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampValidateDbObject failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Validate the domain object */
+ Status = SampValidateDbObject((SAMPR_HANDLE)UserObject->ParentObject,
+ SamDbDomainObject,
+ DOMAIN_READ_PASSWORD_PARAMETERS,
+ &DomainObject);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampValidateDbObject failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Get fixed user data */
+ Length = sizeof(SAM_USER_FIXED_DATA);
+ Status = SampGetObjectAttribute(UserObject,
+ L"F",
+ NULL,
+ (PVOID)&UserFixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttribute failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ if ((UserObject->RelativeId == DOMAIN_USER_RID_KRBTGT) ||
+ (UserFixedData.UserAccountControl & (USER_INTERDOMAIN_TRUST_ACCOUNT |
+ USER_WORKSTATION_TRUST_ACCOUNT |
+ USER_SERVER_TRUST_ACCOUNT)))
+ {
+ PasswordInformation->MinPasswordLength = 0;
+ PasswordInformation->PasswordProperties = 0;
+ }
+ else
+ {
+ /* Get fixed domain data */
+ Length = sizeof(SAM_DOMAIN_FIXED_DATA);
+ Status = SampGetObjectAttribute(DomainObject,
+ L"F",
+ NULL,
+ (PVOID)&DomainFixedData,
+ &Length);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetObjectAttribute failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ PasswordInformation->MinPasswordLength = DomainFixedData.MinPasswordLength;
+ PasswordInformation->PasswordProperties = DomainFixedData.PasswordProperties;
+ }
+
+ return STATUS_SUCCESS;
}
+
/* Function 45 */
NTSTATUS
NTAPI
SamrRemoveMemberFromForeignDomain(IN SAMPR_HANDLE DomainHandle,
IN PRPC_SID MemberSid)
{
- UNIMPLEMENTED;
- return STATUS_NOT_IMPLEMENTED;
+ PSAM_DB_OBJECT DomainObject;
+ ULONG Rid = 0;
+ NTSTATUS Status;
+
+ TRACE("(%p %p)\n",
+ DomainHandle, MemberSid);
+
+ /* Validate the domain object */
+ Status = SampValidateDbObject(DomainHandle,
+ SamDbDomainObject,
+ DOMAIN_LOOKUP,
+ &DomainObject);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampValidateDbObject failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Retrieve the RID from the MemberSID */
+ Status = SampGetRidFromSid((PSID)MemberSid,
+ &Rid);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampGetRidFromSid failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Fail, if the RID represents a special account */
+ if (Rid < 1000)
+ {
+ TRACE("Cannot remove a special account (RID: %lu)\n", Rid);
+ return STATUS_SPECIAL_ACCOUNT;
+ }
+
+ /* Remove the member from all aliases in the domain */
+ Status = SampRemoveMemberFromAllAliases(DomainObject,
+ MemberSid);
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("SampRemoveMemberFromAllAliases failed with status 0x%08lx\n", Status);
+ }
+
+ return Status;
}
SAM_USER_FIXED_DATA FixedUserData;
PSAM_DB_OBJECT DomainObject;
PSAM_DB_OBJECT UserObject;
+ GROUP_MEMBERSHIP GroupMembership;
+ UCHAR LogonHours[23];
ULONG ulSize;
ULONG ulRid;
WCHAR szRid[9];
return Status;
}
- /* FIXME: Set LogonHours attribute*/
- /* FIXME: Set Groups attribute*/
+ /* Set LogonHours attribute*/
+ *((PUSHORT)LogonHours) = 168;
+ memset(&(LogonHours[2]), 0xff, 21);
+
+ Status = SampSetObjectAttribute(UserObject,
+ L"LogonHours",
+ REG_BINARY,
+ &LogonHours,
+ sizeof(LogonHours));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("failed with status 0x%08lx\n", Status);
+ return Status;
+ }
+
+ /* Set Groups attribute*/
+ GroupMembership.RelativeId = DOMAIN_GROUP_RID_USERS;
+ GroupMembership.Attributes = SE_GROUP_MANDATORY |
+ SE_GROUP_ENABLED |
+ SE_GROUP_ENABLED_BY_DEFAULT;
+
+ Status = SampSetObjectAttribute(UserObject,
+ L"Groups",
+ REG_BINARY,
+ &GroupMembership,
+ sizeof(GROUP_MEMBERSHIP));
+ if (!NT_SUCCESS(Status))
+ {
+ TRACE("failed with status 0x%08lx\n", Status);
+ return Status;
+ }
/* Set LMPwd attribute*/
Status = SampSetObjectAttribute(UserObject,
return STATUS_NOT_IMPLEMENTED;
}
+
/* Function 57 */
NTSTATUS
NTAPI
OUT SAMPR_HANDLE *ServerHandle,
IN ACCESS_MASK DesiredAccess)
{
- UNIMPLEMENTED;
- return STATUS_NOT_IMPLEMENTED;
+ TRACE("(%p %p %lx)\n", ServerName, ServerHandle, DesiredAccess);
+
+ return SamrConnect(ServerName,
+ ServerHandle,
+ DesiredAccess);
}