POLICY_ACCOUNT_DOMAIN_INFO Info;
LSA_OBJECT_ATTRIBUTES ObjectAttributes;
LSA_HANDLE PolicyHandle;
+
+ SAM_HANDLE ServerHandle = NULL;
+ SAM_HANDLE DomainHandle = NULL;
+ DOMAIN_NAME_INFORMATION DomainNameInfo;
+
NTSTATUS Status;
DPRINT1("SYSSETUP: SetAccountDomain\n");
Status = LsaOpenPolicy(NULL,
&ObjectAttributes,
- POLICY_TRUST_ADMIN,
+ POLICY_VIEW_LOCAL_INFORMATION | POLICY_TRUST_ADMIN,
&PolicyHandle);
if (Status != STATUS_SUCCESS)
{
LsaClose(PolicyHandle);
+ DomainNameInfo.DomainName.Length = wcslen(DomainName) * sizeof(WCHAR);
+ DomainNameInfo.DomainName.MaximumLength = (wcslen(DomainName) + 1) * sizeof(WCHAR);
+ DomainNameInfo.DomainName.Buffer = (LPWSTR)DomainName;
+
+ Status = SamConnect(NULL,
+ &ServerHandle,
+ SAM_SERVER_CONNECT | SAM_SERVER_LOOKUP_DOMAIN,
+ NULL);
+ if (NT_SUCCESS(Status))
+ {
+ Status = SamOpenDomain(ServerHandle,
+ DOMAIN_WRITE_OTHER_PARAMETERS,
+ Info.DomainSid,
+ &DomainHandle);
+ if (NT_SUCCESS(Status))
+ {
+ Status = SamSetInformationDomain(DomainHandle,
+ DomainNameInformation,
+ (PVOID)&DomainNameInfo);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("SamSetInformationDomain failed (Status: 0x%08lx)\n", Status);
+ }
+
+ SamCloseHandle(DomainHandle);
+ }
+ else
+ {
+ DPRINT1("SamOpenDomain failed (Status: 0x%08lx)\n", Status);
+ }
+
+ SamCloseHandle(ServerHandle);
+ }
+
return Status;
}
InstallBuiltinAccounts();
InstallPrivileges();
}
+
+
+NTSTATUS
+SetAdministratorPassword(LPCWSTR Password)
+{
+ PPOLICY_ACCOUNT_DOMAIN_INFO OrigInfo = NULL;
+ PUSER_ACCOUNT_NAME_INFORMATION AccountNameInfo = NULL;
+ USER_SET_PASSWORD_INFORMATION PasswordInfo;
+ LSA_OBJECT_ATTRIBUTES ObjectAttributes;
+ LSA_HANDLE PolicyHandle = NULL;
+ SAM_HANDLE ServerHandle = NULL;
+ SAM_HANDLE DomainHandle = NULL;
+ SAM_HANDLE UserHandle = NULL;
+ NTSTATUS Status;
+
+ DPRINT1("SYSSETUP: SetAdministratorPassword(%S)\n", Password);
+
+ memset(&ObjectAttributes, 0, sizeof(LSA_OBJECT_ATTRIBUTES));
+ ObjectAttributes.Length = sizeof(LSA_OBJECT_ATTRIBUTES);
+
+ Status = LsaOpenPolicy(NULL,
+ &ObjectAttributes,
+ POLICY_VIEW_LOCAL_INFORMATION | POLICY_TRUST_ADMIN,
+ &PolicyHandle);
+ if (Status != STATUS_SUCCESS)
+ {
+ DPRINT1("LsaOpenPolicy() failed (Status: 0x%08lx)\n", Status);
+ return Status;
+ }
+
+ Status = LsaQueryInformationPolicy(PolicyHandle,
+ PolicyAccountDomainInformation,
+ (PVOID *)&OrigInfo);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("LsaQueryInformationPolicy() failed (Status: 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SamConnect(NULL,
+ &ServerHandle,
+ SAM_SERVER_CONNECT | SAM_SERVER_LOOKUP_DOMAIN,
+ NULL);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("SamConnect() failed (Status: 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SamOpenDomain(ServerHandle,
+ DOMAIN_LOOKUP,
+ OrigInfo->DomainSid,
+ &DomainHandle);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("SamOpenDomain() failed (Status: 0x%08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SamOpenUser(DomainHandle,
+ USER_FORCE_PASSWORD_CHANGE | USER_READ_GENERAL,
+ DOMAIN_USER_RID_ADMIN,
+ &UserHandle);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("SamOpenUser() failed (Status %08lx)\n", Status);
+ goto done;
+ }
+
+ RtlInitUnicodeString(&PasswordInfo.Password, Password);
+ PasswordInfo.PasswordExpired = FALSE;
+
+ Status = SamSetInformationUser(UserHandle,
+ UserSetPasswordInformation,
+ (PVOID)&PasswordInfo);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("SamSetInformationUser() failed (Status %08lx)\n", Status);
+ goto done;
+ }
+
+ Status = SamQueryInformationUser(UserHandle,
+ UserAccountNameInformation,
+ (PVOID*)&AccountNameInfo);
+ if (!NT_SUCCESS(Status))
+ {
+ DPRINT1("SamSetInformationUser() failed (Status %08lx)\n", Status);
+ goto done;
+ }
+
+ AdminInfo.Name = RtlAllocateHeap(RtlGetProcessHeap(),
+ HEAP_ZERO_MEMORY,
+ AccountNameInfo->UserName.Length + sizeof(WCHAR));
+ if (AdminInfo.Name != NULL)
+ RtlCopyMemory(AdminInfo.Name,
+ AccountNameInfo->UserName.Buffer,
+ AccountNameInfo->UserName.Length);
+
+ AdminInfo.Domain = RtlAllocateHeap(RtlGetProcessHeap(),
+ HEAP_ZERO_MEMORY,
+ OrigInfo->DomainName.Length + sizeof(WCHAR));
+ if (AdminInfo.Domain != NULL)
+ RtlCopyMemory(AdminInfo.Domain,
+ OrigInfo->DomainName.Buffer,
+ OrigInfo->DomainName.Length);
+
+ AdminInfo.Password = RtlAllocateHeap(RtlGetProcessHeap(),
+ 0,
+ (wcslen(Password) + 1) * sizeof(WCHAR));
+ if (AdminInfo.Password != NULL)
+ wcscpy(AdminInfo.Password, Password);
+
+ DPRINT1("Administrator Name: %S\n", AdminInfo.Name);
+ DPRINT1("Administrator Domain: %S\n", AdminInfo.Domain);
+ DPRINT1("Administrator Password: %S\n", AdminInfo.Password);
+
+done:
+ if (AccountNameInfo != NULL)
+ SamFreeMemory(AccountNameInfo);
+
+ if (OrigInfo != NULL)
+ LsaFreeMemory(OrigInfo);
+
+ if (PolicyHandle != NULL)
+ LsaClose(PolicyHandle);
+
+ if (UserHandle != NULL)
+ SamCloseHandle(UserHandle);
+
+ if (DomainHandle != NULL)
+ SamCloseHandle(DomainHandle);
+
+ if (ServerHandle != NULL)
+ SamCloseHandle(ServerHandle);
+
+ DPRINT1("SYSSETUP: SetAdministratorPassword() done (Status %08lx)\n", Status);
+
+ return Status;
+}
+
+
+VOID
+SetAutoAdminLogon(VOID)
+{
+ WCHAR szAutoAdminLogon[2];
+ HKEY hKey = NULL;
+ DWORD dwType;
+ DWORD dwSize;
+ LONG lError;
+
+ lError = RegOpenKeyExW(HKEY_LOCAL_MACHINE,
+ L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon",
+ 0,
+ KEY_READ | KEY_WRITE,
+ &hKey);
+ if (lError != ERROR_SUCCESS)
+ return;
+
+ dwSize = 2 * sizeof(WCHAR);
+ lError = RegQueryValueExW(hKey,
+ L"AutoAdminLogon",
+ NULL,
+ &dwType,
+ (LPBYTE)szAutoAdminLogon,
+ &dwSize);
+ if (lError != ERROR_SUCCESS)
+ goto done;
+
+ if (wcscmp(szAutoAdminLogon, L"1") == 0)
+ {
+ RegSetValueExW(hKey,
+ L"DefaultDomain",
+ 0,
+ REG_SZ,
+ (LPBYTE)AdminInfo.Domain,
+ (wcslen(AdminInfo.Domain) + 1) * sizeof(WCHAR));
+
+ RegSetValueExW(hKey,
+ L"DefaultUserName",
+ 0,
+ REG_SZ,
+ (LPBYTE)AdminInfo.Name,
+ (wcslen(AdminInfo.Name) + 1) * sizeof(WCHAR));
+
+ RegSetValueExW(hKey,
+ L"DefaultPassword",
+ 0,
+ REG_SZ,
+ (LPBYTE)AdminInfo.Password,
+ (wcslen(AdminInfo.Password) + 1) * sizeof(WCHAR));
+ }
+
+done:
+ if (hKey != NULL)
+ RegCloseKey(hKey);
+}
+
+
+/* EOF */
+