mountmgr: Move the macOS credentials support to a separate file.
Signed-off-by: Alexandre Julliard <julliard@winehq.org>
This commit is contained in:
parent
086e9e0eda
commit
af7b364a28
|
@ -7,6 +7,7 @@ EXTRALIBS = $(DISKARBITRATION_LIBS) $(SYSTEMCONFIGURATION_LIBS) $(CORESERVICES_L
|
||||||
EXTRADLLFLAGS = -Wl,--subsystem,native -mcygwin
|
EXTRADLLFLAGS = -Wl,--subsystem,native -mcygwin
|
||||||
|
|
||||||
C_SRCS = \
|
C_SRCS = \
|
||||||
|
cred.c \
|
||||||
dbus.c \
|
dbus.c \
|
||||||
device.c \
|
device.c \
|
||||||
diskarb.c \
|
diskarb.c \
|
||||||
|
|
|
@ -0,0 +1,633 @@
|
||||||
|
/*
|
||||||
|
* Mount manager macOS credentials support
|
||||||
|
*
|
||||||
|
* Copyright 2020 Hans Leidekker
|
||||||
|
*
|
||||||
|
* This library is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU Lesser General Public
|
||||||
|
* License as published by the Free Software Foundation; either
|
||||||
|
* version 2.1 of the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This library is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
* Lesser General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
|
* License along with this library; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "config.h"
|
||||||
|
|
||||||
|
#include <stdarg.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
|
||||||
|
#ifdef __APPLE__
|
||||||
|
#include <CoreFoundation/CFString.h>
|
||||||
|
#define LoadResource mac_LoadResource
|
||||||
|
#define GetCurrentThread mac_GetCurrentThread
|
||||||
|
#include <CoreServices/CoreServices.h>
|
||||||
|
#undef LoadResource
|
||||||
|
#undef GetCurrentThread
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#define NONAMELESSUNION
|
||||||
|
|
||||||
|
#include "mountmgr.h"
|
||||||
|
#include "unixlib.h"
|
||||||
|
#include "wine/unicode.h"
|
||||||
|
#include "wine/debug.h"
|
||||||
|
|
||||||
|
WINE_DEFAULT_DEBUG_CHANNEL(mountmgr);
|
||||||
|
|
||||||
|
#ifdef __APPLE__
|
||||||
|
|
||||||
|
/* implementation of Wine extension to use host APIs to find symbol file by GUID */
|
||||||
|
NTSTATUS query_symbol_file( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
MOUNTMGR_TARGET_NAME *result;
|
||||||
|
CFStringRef query_cfstring;
|
||||||
|
WCHAR *filename, *unix_buf = NULL;
|
||||||
|
ANSI_STRING unix_path;
|
||||||
|
UNICODE_STRING path;
|
||||||
|
MDQueryRef mdquery;
|
||||||
|
const GUID *id;
|
||||||
|
size_t size;
|
||||||
|
NTSTATUS status = STATUS_NO_MEMORY;
|
||||||
|
|
||||||
|
static const WCHAR formatW[] = { 'c','o','m','_','a','p','p','l','e','_','x','c','o','d','e',
|
||||||
|
'_','d','s','y','m','_','u','u','i','d','s',' ','=','=',' ',
|
||||||
|
'"','%','0','8','X','-','%','0','4','X','-',
|
||||||
|
'%','0','4','X','-','%','0','2','X','%','0','2','X','-',
|
||||||
|
'%','0','2','X','%','0','2','X','%','0','2','X','%','0','2','X',
|
||||||
|
'%','0','2','X','%','0','2','X','"',0 };
|
||||||
|
WCHAR query_string[ARRAY_SIZE(formatW)];
|
||||||
|
|
||||||
|
id = buff;
|
||||||
|
sprintfW( query_string, formatW, id->Data1, id->Data2, id->Data3,
|
||||||
|
id->Data4[0], id->Data4[1], id->Data4[2], id->Data4[3],
|
||||||
|
id->Data4[4], id->Data4[5], id->Data4[6], id->Data4[7] );
|
||||||
|
if (!(query_cfstring = CFStringCreateWithCharacters(NULL, query_string, lstrlenW(query_string))))
|
||||||
|
return STATUS_NO_MEMORY;
|
||||||
|
|
||||||
|
mdquery = MDQueryCreate(NULL, query_cfstring, NULL, NULL);
|
||||||
|
CFRelease(query_cfstring);
|
||||||
|
if (!mdquery) return STATUS_NO_MEMORY;
|
||||||
|
|
||||||
|
MDQuerySetMaxCount(mdquery, 1);
|
||||||
|
TRACE("Executing %s\n", debugstr_w(query_string));
|
||||||
|
if (MDQueryExecute(mdquery, kMDQuerySynchronous))
|
||||||
|
{
|
||||||
|
if (MDQueryGetResultCount(mdquery) >= 1)
|
||||||
|
{
|
||||||
|
MDItemRef item = (MDItemRef)MDQueryGetResultAtIndex(mdquery, 0);
|
||||||
|
CFStringRef item_path = MDItemCopyAttribute(item, kMDItemPath);
|
||||||
|
|
||||||
|
if (item_path)
|
||||||
|
{
|
||||||
|
CFIndex item_path_len = CFStringGetLength(item_path);
|
||||||
|
if ((unix_buf = HeapAlloc(GetProcessHeap(), 0, (item_path_len + 1) * sizeof(WCHAR))))
|
||||||
|
{
|
||||||
|
CFStringGetCharacters(item_path, CFRangeMake(0, item_path_len), unix_buf);
|
||||||
|
unix_buf[item_path_len] = 0;
|
||||||
|
TRACE("found %s\n", debugstr_w(unix_buf));
|
||||||
|
}
|
||||||
|
CFRelease(item_path);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else status = STATUS_NO_MORE_ENTRIES;
|
||||||
|
}
|
||||||
|
CFRelease(mdquery);
|
||||||
|
if (!unix_buf) return status;
|
||||||
|
|
||||||
|
RtlInitUnicodeString( &path, unix_buf );
|
||||||
|
status = RtlUnicodeStringToAnsiString( &unix_path, &path, TRUE );
|
||||||
|
HeapFree( GetProcessHeap(), 0, unix_buf );
|
||||||
|
if (status) return status;
|
||||||
|
|
||||||
|
filename = wine_get_dos_file_name( unix_path.Buffer );
|
||||||
|
RtlFreeAnsiString( &unix_path );
|
||||||
|
if (!filename) return STATUS_NO_SUCH_FILE;
|
||||||
|
result = buff;
|
||||||
|
result->DeviceNameLength = lstrlenW(filename) * sizeof(WCHAR);
|
||||||
|
size = FIELD_OFFSET(MOUNTMGR_TARGET_NAME, DeviceName[lstrlenW(filename)]);
|
||||||
|
if (size <= outsize)
|
||||||
|
{
|
||||||
|
memcpy( result->DeviceName, filename, lstrlenW(filename) * sizeof(WCHAR) );
|
||||||
|
*info = size;
|
||||||
|
status = STATUS_SUCCESS;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
*info = sizeof(*result);
|
||||||
|
status = STATUS_BUFFER_OVERFLOW;
|
||||||
|
}
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, filename );
|
||||||
|
return status;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline BOOL check_credential_string( const void *buf, ULONG buflen, ULONG size, ULONG offset )
|
||||||
|
{
|
||||||
|
const WCHAR *ptr = buf;
|
||||||
|
if (!size || size % sizeof(WCHAR) || offset + size > buflen || ptr[(offset + size) / sizeof(WCHAR) - 1]) return FALSE;
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
static SecKeychainItemRef find_credential( const WCHAR *name )
|
||||||
|
{
|
||||||
|
int status;
|
||||||
|
SecKeychainSearchRef search;
|
||||||
|
SecKeychainItemRef item;
|
||||||
|
|
||||||
|
status = SecKeychainSearchCreateFromAttributes( NULL, kSecGenericPasswordItemClass, NULL, &search );
|
||||||
|
if (status != noErr) return NULL;
|
||||||
|
|
||||||
|
while (SecKeychainSearchCopyNext( search, &item ) == noErr)
|
||||||
|
{
|
||||||
|
SecKeychainAttributeInfo info;
|
||||||
|
SecKeychainAttributeList *attr_list;
|
||||||
|
UInt32 info_tags[] = { kSecServiceItemAttr };
|
||||||
|
WCHAR *itemname;
|
||||||
|
int len;
|
||||||
|
|
||||||
|
info.count = ARRAY_SIZE(info_tags);
|
||||||
|
info.tag = info_tags;
|
||||||
|
info.format = NULL;
|
||||||
|
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, NULL, NULL );
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (attr_list->count != 1 || attr_list->attr[0].tag != kSecServiceItemAttr)
|
||||||
|
{
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[0].data, attr_list->attr[0].length, NULL, 0 );
|
||||||
|
if (!(itemname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) )))
|
||||||
|
{
|
||||||
|
CFRelease( item );
|
||||||
|
CFRelease( search );
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[0].data, attr_list->attr[0].length, itemname, len );
|
||||||
|
itemname[len] = 0;
|
||||||
|
if (strcmpiW( itemname, name ))
|
||||||
|
{
|
||||||
|
CFRelease( item );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, itemname );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, itemname );
|
||||||
|
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
||||||
|
CFRelease( search );
|
||||||
|
return item;
|
||||||
|
}
|
||||||
|
|
||||||
|
CFRelease( search );
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
static NTSTATUS fill_credential( SecKeychainItemRef item, BOOL require_password, void *buf, ULONG data_offset,
|
||||||
|
ULONG buflen, ULONG *retlen )
|
||||||
|
{
|
||||||
|
struct mountmgr_credential *cred = buf;
|
||||||
|
int status, len;
|
||||||
|
ULONG size;
|
||||||
|
UInt32 i, cred_blob_len = 0;
|
||||||
|
void *cred_blob;
|
||||||
|
WCHAR *ptr;
|
||||||
|
BOOL user_name_present = FALSE;
|
||||||
|
SecKeychainAttributeInfo info;
|
||||||
|
SecKeychainAttributeList *attr_list = NULL;
|
||||||
|
UInt32 info_tags[] = { kSecServiceItemAttr, kSecAccountItemAttr, kSecCommentItemAttr, kSecCreationDateItemAttr };
|
||||||
|
|
||||||
|
info.count = ARRAY_SIZE(info_tags);
|
||||||
|
info.tag = info_tags;
|
||||||
|
info.format = NULL;
|
||||||
|
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, &cred_blob_len, &cred_blob );
|
||||||
|
if (status == errSecAuthFailed && !require_password)
|
||||||
|
{
|
||||||
|
cred_blob_len = 0;
|
||||||
|
cred_blob = NULL;
|
||||||
|
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, &cred_blob_len, NULL );
|
||||||
|
}
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
||||||
|
return STATUS_NOT_FOUND;
|
||||||
|
}
|
||||||
|
for (i = 0; i < attr_list->count; i++)
|
||||||
|
{
|
||||||
|
if (attr_list->attr[i].tag == kSecAccountItemAttr && attr_list->attr[i].data)
|
||||||
|
{
|
||||||
|
user_name_present = TRUE;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (!user_name_present)
|
||||||
|
{
|
||||||
|
WARN( "no kSecAccountItemAttr for item\n" );
|
||||||
|
SecKeychainItemFreeAttributesAndData( attr_list, cred_blob );
|
||||||
|
return STATUS_NOT_FOUND;
|
||||||
|
}
|
||||||
|
|
||||||
|
*retlen = sizeof(*cred);
|
||||||
|
for (i = 0; i < attr_list->count; i++)
|
||||||
|
{
|
||||||
|
switch (attr_list->attr[i].tag)
|
||||||
|
{
|
||||||
|
case kSecServiceItemAttr:
|
||||||
|
TRACE( "kSecServiceItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
||||||
|
if (cred) cred->targetname_offset = cred->targetname_size = 0;
|
||||||
|
if (!attr_list->attr[i].data) continue;
|
||||||
|
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, NULL, 0 );
|
||||||
|
size = (len + 1) * sizeof(WCHAR);
|
||||||
|
if (cred && *retlen + size <= buflen)
|
||||||
|
{
|
||||||
|
cred->targetname_offset = data_offset;
|
||||||
|
cred->targetname_size = size;
|
||||||
|
ptr = (WCHAR *)((char *)cred + cred->targetname_offset);
|
||||||
|
MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, ptr, len );
|
||||||
|
ptr[len] = 0;
|
||||||
|
data_offset += size;
|
||||||
|
}
|
||||||
|
*retlen += size;
|
||||||
|
break;
|
||||||
|
case kSecAccountItemAttr:
|
||||||
|
{
|
||||||
|
TRACE( "kSecAccountItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
||||||
|
if (cred) cred->username_offset = cred->username_size = 0;
|
||||||
|
if (!attr_list->attr[i].data) continue;
|
||||||
|
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, NULL, 0 );
|
||||||
|
size = (len + 1) * sizeof(WCHAR);
|
||||||
|
if (cred && *retlen + size <= buflen)
|
||||||
|
{
|
||||||
|
cred->username_offset = data_offset;
|
||||||
|
cred->username_size = size;
|
||||||
|
ptr = (WCHAR *)((char *)cred + cred->username_offset);
|
||||||
|
MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, ptr, len );
|
||||||
|
ptr[len] = 0;
|
||||||
|
data_offset += size;
|
||||||
|
}
|
||||||
|
*retlen += size;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case kSecCommentItemAttr:
|
||||||
|
TRACE( "kSecCommentItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
||||||
|
if (cred) cred->comment_offset = cred->comment_size = 0;
|
||||||
|
if (!attr_list->attr[i].data) continue;
|
||||||
|
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, NULL, 0 );
|
||||||
|
size = (len + 1) * sizeof(WCHAR);
|
||||||
|
if (cred && *retlen + size <= buflen)
|
||||||
|
{
|
||||||
|
cred->comment_offset = data_offset;
|
||||||
|
cred->comment_size = size;
|
||||||
|
ptr = (WCHAR *)((char *)cred + cred->comment_offset);
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, ptr, len );
|
||||||
|
ptr[len] = 0;
|
||||||
|
data_offset += size;
|
||||||
|
}
|
||||||
|
*retlen += size;
|
||||||
|
break;
|
||||||
|
case kSecCreationDateItemAttr:
|
||||||
|
{
|
||||||
|
LARGE_INTEGER wintime;
|
||||||
|
struct tm tm;
|
||||||
|
time_t time;
|
||||||
|
|
||||||
|
TRACE( "kSecCreationDateItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
||||||
|
if (cred) cred->last_written.dwLowDateTime = cred->last_written.dwHighDateTime = 0;
|
||||||
|
if (!attr_list->attr[i].data) continue;
|
||||||
|
|
||||||
|
if (cred)
|
||||||
|
{
|
||||||
|
memset( &tm, 0, sizeof(tm) );
|
||||||
|
strptime( attr_list->attr[i].data, "%Y%m%d%H%M%SZ", &tm );
|
||||||
|
time = mktime( &tm );
|
||||||
|
RtlSecondsSince1970ToTime( time, &wintime );
|
||||||
|
cred->last_written.dwLowDateTime = wintime.u.LowPart;
|
||||||
|
cred->last_written.dwHighDateTime = wintime.u.HighPart;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
FIXME( "unhandled attribute %u\n", (unsigned)attr_list->attr[i].tag );
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (cred)
|
||||||
|
{
|
||||||
|
if (*retlen + cred_blob_len <= buflen)
|
||||||
|
{
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, cred_blob, cred_blob_len, NULL, 0 );
|
||||||
|
cred->blob_offset = data_offset;
|
||||||
|
cred->blob_size = len * sizeof(WCHAR);
|
||||||
|
ptr = (WCHAR *)((char *)cred + cred->blob_offset);
|
||||||
|
MultiByteToWideChar( CP_UTF8, 0, cred_blob, cred_blob_len, ptr, len );
|
||||||
|
}
|
||||||
|
else cred->blob_offset = cred->blob_size = 0;
|
||||||
|
}
|
||||||
|
*retlen += cred_blob_len;
|
||||||
|
|
||||||
|
if (attr_list) SecKeychainItemFreeAttributesAndData( attr_list, cred_blob );
|
||||||
|
return STATUS_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS read_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
struct mountmgr_credential *cred = buff;
|
||||||
|
const WCHAR *targetname;
|
||||||
|
SecKeychainItemRef item;
|
||||||
|
ULONG size;
|
||||||
|
NTSTATUS status;
|
||||||
|
|
||||||
|
if (!check_credential_string( buff, insize, cred->targetname_size, cred->targetname_offset ))
|
||||||
|
return STATUS_INVALID_PARAMETER;
|
||||||
|
targetname = (const WCHAR *)((const char *)cred + cred->targetname_offset);
|
||||||
|
|
||||||
|
if (!(item = find_credential( targetname ))) return STATUS_NOT_FOUND;
|
||||||
|
|
||||||
|
status = fill_credential( item, TRUE, cred, sizeof(*cred), outsize, &size );
|
||||||
|
CFRelease( item );
|
||||||
|
if (status != STATUS_SUCCESS) return status;
|
||||||
|
|
||||||
|
*info = size;
|
||||||
|
return (size > outsize) ? STATUS_BUFFER_OVERFLOW : STATUS_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS write_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
const struct mountmgr_credential *cred = buff;
|
||||||
|
int status, len, len_password = 0;
|
||||||
|
const WCHAR *ptr;
|
||||||
|
SecKeychainItemRef keychain_item;
|
||||||
|
char *targetname, *username = NULL, *password = NULL;
|
||||||
|
SecKeychainAttribute attrs[1];
|
||||||
|
SecKeychainAttributeList attr_list;
|
||||||
|
NTSTATUS ret = STATUS_NO_MEMORY;
|
||||||
|
|
||||||
|
if (!check_credential_string( buff, insize, cred->targetname_size, cred->targetname_offset ) ||
|
||||||
|
!check_credential_string( buff, insize, cred->username_size, cred->username_offset ) ||
|
||||||
|
((cred->blob_size && cred->blob_size % sizeof(WCHAR)) || cred->blob_offset + cred->blob_size > insize) ||
|
||||||
|
(cred->comment_size && !check_credential_string( buff, insize, cred->comment_size, cred->comment_offset )) ||
|
||||||
|
sizeof(*cred) + cred->targetname_size + cred->username_size + cred->blob_size + cred->comment_size > insize)
|
||||||
|
{
|
||||||
|
return STATUS_INVALID_PARAMETER;
|
||||||
|
}
|
||||||
|
|
||||||
|
ptr = (const WCHAR *)((const char *)cred + cred->targetname_offset);
|
||||||
|
len = WideCharToMultiByte( CP_UTF8, 0, ptr, -1, NULL, 0, NULL, NULL );
|
||||||
|
if (!(targetname = RtlAllocateHeap( GetProcessHeap(), 0, len ))) goto error;
|
||||||
|
WideCharToMultiByte( CP_UTF8, 0, ptr, -1, targetname, len, NULL, NULL );
|
||||||
|
|
||||||
|
ptr = (const WCHAR *)((const char *)cred + cred->username_offset);
|
||||||
|
len = WideCharToMultiByte( CP_UTF8, 0, ptr, -1, NULL, 0, NULL, NULL );
|
||||||
|
if (!(username = RtlAllocateHeap( GetProcessHeap(), 0, len ))) goto error;
|
||||||
|
WideCharToMultiByte( CP_UTF8, 0, ptr, -1, username, len, NULL, NULL );
|
||||||
|
|
||||||
|
if (cred->blob_size)
|
||||||
|
{
|
||||||
|
ptr = (const WCHAR *)((const char *)cred + cred->blob_offset);
|
||||||
|
len_password = WideCharToMultiByte( CP_UTF8, 0, ptr, cred->blob_size / sizeof(WCHAR), NULL, 0, NULL, NULL );
|
||||||
|
if (!(password = RtlAllocateHeap( GetProcessHeap(), 0, len_password ))) goto error;
|
||||||
|
WideCharToMultiByte( CP_UTF8, 0, ptr, cred->blob_size / sizeof(WCHAR), password, len_password, NULL, NULL );
|
||||||
|
}
|
||||||
|
|
||||||
|
TRACE("adding target %s, username %s using Keychain\n", targetname, username );
|
||||||
|
status = SecKeychainAddGenericPassword( NULL, strlen(targetname), targetname, strlen(username), username,
|
||||||
|
len_password, password, &keychain_item );
|
||||||
|
if (status != noErr) ERR( "SecKeychainAddGenericPassword returned %d\n", status );
|
||||||
|
if (status == errSecDuplicateItem)
|
||||||
|
{
|
||||||
|
status = SecKeychainFindGenericPassword( NULL, strlen(targetname), targetname, strlen(username), username, NULL,
|
||||||
|
NULL, &keychain_item );
|
||||||
|
if (status != noErr) ERR( "SecKeychainFindGenericPassword returned %d\n", status );
|
||||||
|
}
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, username );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, password );
|
||||||
|
return STATUS_UNSUCCESSFUL;
|
||||||
|
}
|
||||||
|
if (cred->comment_size)
|
||||||
|
{
|
||||||
|
attr_list.count = 1;
|
||||||
|
attr_list.attr = attrs;
|
||||||
|
attrs[0].tag = kSecCommentItemAttr;
|
||||||
|
ptr = (const WCHAR *)((const char *)cred + cred->comment_offset);
|
||||||
|
attrs[0].length = WideCharToMultiByte( CP_UTF8, 0, ptr, -1, NULL, 0, NULL, NULL );
|
||||||
|
if (attrs[0].length) attrs[0].length--;
|
||||||
|
if (!(attrs[0].data = RtlAllocateHeap( GetProcessHeap(), 0, attrs[0].length ))) goto error;
|
||||||
|
WideCharToMultiByte( CP_UTF8, 0, ptr, -1, attrs[0].data, attrs[0].length, NULL, NULL );
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
attr_list.count = 0;
|
||||||
|
attr_list.attr = NULL;
|
||||||
|
}
|
||||||
|
status = SecKeychainItemModifyAttributesAndData( keychain_item, &attr_list, cred->blob_preserve ? 0 : len_password,
|
||||||
|
cred->blob_preserve ? NULL : password );
|
||||||
|
|
||||||
|
if (cred->comment_size) RtlFreeHeap( GetProcessHeap(), 0, attrs[0].data );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, password );
|
||||||
|
/* FIXME: set TargetAlias attribute */
|
||||||
|
CFRelease( keychain_item );
|
||||||
|
if (status != noErr) return STATUS_UNSUCCESSFUL;
|
||||||
|
return STATUS_SUCCESS;
|
||||||
|
|
||||||
|
error:
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, username );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, password );
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS delete_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
const struct mountmgr_credential *cred = buff;
|
||||||
|
const WCHAR *targetname;
|
||||||
|
SecKeychainItemRef item;
|
||||||
|
|
||||||
|
if (!check_credential_string( buff, insize, cred->targetname_size, cred->targetname_offset ))
|
||||||
|
return STATUS_INVALID_PARAMETER;
|
||||||
|
targetname = (const WCHAR *)((const char *)cred + cred->targetname_offset);
|
||||||
|
|
||||||
|
if (!(item = find_credential( targetname ))) return STATUS_NOT_FOUND;
|
||||||
|
|
||||||
|
SecKeychainItemDelete( item );
|
||||||
|
CFRelease( item );
|
||||||
|
return STATUS_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
static BOOL match_credential( void *data, UInt32 data_len, const WCHAR *filter )
|
||||||
|
{
|
||||||
|
int len;
|
||||||
|
WCHAR *targetname;
|
||||||
|
const WCHAR *p;
|
||||||
|
BOOL ret;
|
||||||
|
|
||||||
|
if (!*filter) return TRUE;
|
||||||
|
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, data, data_len, NULL, 0 );
|
||||||
|
if (!(targetname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) ))) return FALSE;
|
||||||
|
MultiByteToWideChar( CP_UTF8, 0, data, data_len, targetname, len );
|
||||||
|
targetname[len] = 0;
|
||||||
|
|
||||||
|
TRACE( "comparing filter %s to target name %s\n", debugstr_w(filter), debugstr_w(targetname) );
|
||||||
|
|
||||||
|
p = strchrW( filter, '*' );
|
||||||
|
ret = CompareStringW( GetThreadLocale(), NORM_IGNORECASE, filter,
|
||||||
|
(p && !p[1]) ? p - filter : -1, targetname, (p && !p[1]) ? p - filter : -1 ) == CSTR_EQUAL;
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static NTSTATUS search_credentials( const WCHAR *filter, struct mountmgr_credential_list *list, ULONG *ret_count, ULONG *ret_size )
|
||||||
|
{
|
||||||
|
SecKeychainSearchRef search;
|
||||||
|
SecKeychainItemRef item;
|
||||||
|
int status;
|
||||||
|
ULONG i = 0;
|
||||||
|
ULONG data_offset, data_size = 0, size;
|
||||||
|
NTSTATUS ret = STATUS_NOT_FOUND;
|
||||||
|
|
||||||
|
status = SecKeychainSearchCreateFromAttributes( NULL, kSecGenericPasswordItemClass, NULL, &search );
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
ERR( "SecKeychainSearchCreateFromAttributes returned status %d\n", status );
|
||||||
|
return STATUS_INTERNAL_ERROR;
|
||||||
|
}
|
||||||
|
|
||||||
|
while (SecKeychainSearchCopyNext( search, &item ) == noErr)
|
||||||
|
{
|
||||||
|
SecKeychainAttributeInfo info;
|
||||||
|
SecKeychainAttributeList *attr_list;
|
||||||
|
UInt32 info_tags[] = { kSecServiceItemAttr };
|
||||||
|
BOOL match;
|
||||||
|
|
||||||
|
info.count = ARRAY_SIZE(info_tags);
|
||||||
|
info.tag = info_tags;
|
||||||
|
info.format = NULL;
|
||||||
|
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, NULL, NULL );
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (attr_list->count != 1 || attr_list->attr[0].tag != kSecServiceItemAttr)
|
||||||
|
{
|
||||||
|
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
TRACE( "service item: %.*s\n", (int)attr_list->attr[0].length, (char *)attr_list->attr[0].data );
|
||||||
|
|
||||||
|
match = match_credential( attr_list->attr[0].data, attr_list->attr[0].length, filter );
|
||||||
|
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
||||||
|
if (!match)
|
||||||
|
{
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!list) ret = fill_credential( item, FALSE, NULL, 0, 0, &size );
|
||||||
|
else
|
||||||
|
{
|
||||||
|
data_offset = FIELD_OFFSET( struct mountmgr_credential_list, creds[list->count] ) -
|
||||||
|
FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
|
||||||
|
ret = fill_credential( item, FALSE, &list->creds[i], data_offset, list->size - data_offset, &size );
|
||||||
|
}
|
||||||
|
|
||||||
|
CFRelease( item );
|
||||||
|
if (ret == STATUS_NOT_FOUND) continue;
|
||||||
|
if (ret != STATUS_SUCCESS) break;
|
||||||
|
data_size += size - sizeof(struct mountmgr_credential);
|
||||||
|
i++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ret_count) *ret_count = i;
|
||||||
|
if (ret_size) *ret_size = FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
|
||||||
|
|
||||||
|
CFRelease( search );
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS enumerate_credentials( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
struct mountmgr_credential_list *list = buff;
|
||||||
|
WCHAR *filter;
|
||||||
|
ULONG size, count;
|
||||||
|
Boolean saved_user_interaction_allowed;
|
||||||
|
NTSTATUS status;
|
||||||
|
|
||||||
|
if (!check_credential_string( buff, insize, list->filter_size, list->filter_offset )) return STATUS_INVALID_PARAMETER;
|
||||||
|
if (!(filter = strdupW( (const WCHAR *)((const char *)list + list->filter_offset) ))) return STATUS_NO_MEMORY;
|
||||||
|
|
||||||
|
SecKeychainGetUserInteractionAllowed( &saved_user_interaction_allowed );
|
||||||
|
SecKeychainSetUserInteractionAllowed( false );
|
||||||
|
|
||||||
|
if ((status = search_credentials( filter, NULL, &count, &size )) == STATUS_SUCCESS)
|
||||||
|
{
|
||||||
|
|
||||||
|
if (size > outsize)
|
||||||
|
{
|
||||||
|
if (size >= sizeof(list->size)) list->size = size;
|
||||||
|
*info = sizeof(list->size);
|
||||||
|
status = STATUS_BUFFER_OVERFLOW;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
list->size = size;
|
||||||
|
list->count = count;
|
||||||
|
*info = size;
|
||||||
|
status = search_credentials( filter, list, NULL, NULL );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
SecKeychainSetUserInteractionAllowed( saved_user_interaction_allowed );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, filter );
|
||||||
|
return status;
|
||||||
|
}
|
||||||
|
|
||||||
|
#else /* __APPLE__ */
|
||||||
|
|
||||||
|
NTSTATUS query_symbol_file( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
FIXME( "not supported\n" );
|
||||||
|
return STATUS_NOT_SUPPORTED;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS read_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
FIXME( "not supported\n" );
|
||||||
|
return STATUS_NOT_SUPPORTED;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS write_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
FIXME( "not supported\n" );
|
||||||
|
return STATUS_NOT_SUPPORTED;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS delete_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
FIXME( "not supported\n" );
|
||||||
|
return STATUS_NOT_SUPPORTED;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS enumerate_credentials( void *buff, ULONG insize, ULONG outsize, ULONG *info )
|
||||||
|
{
|
||||||
|
FIXME( "not supported\n" );
|
||||||
|
return STATUS_NOT_SUPPORTED;
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif /* __APPLE__ */
|
|
@ -19,16 +19,6 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
#include "wine/port.h"
|
|
||||||
|
|
||||||
#ifdef __APPLE__
|
|
||||||
#include <CoreFoundation/CFString.h>
|
|
||||||
#define LoadResource mac_LoadResource
|
|
||||||
#define GetCurrentThread mac_GetCurrentThread
|
|
||||||
#include <CoreServices/CoreServices.h>
|
|
||||||
#undef LoadResource
|
|
||||||
#undef GetCurrentThread
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#include <stdarg.h>
|
#include <stdarg.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
|
@ -425,575 +415,26 @@ err:
|
||||||
IoCompleteRequest( irp, IO_NO_INCREMENT );
|
IoCompleteRequest( irp, IO_NO_INCREMENT );
|
||||||
}
|
}
|
||||||
|
|
||||||
/* implementation of Wine extension to use host APIs to find symbol file by GUID */
|
static void WINAPI query_symbol_file_callback( TP_CALLBACK_INSTANCE *instance, void *context )
|
||||||
#ifdef __APPLE__
|
|
||||||
static void WINAPI query_symbol_file( TP_CALLBACK_INSTANCE *instance, void *context )
|
|
||||||
{
|
{
|
||||||
IRP *irp = context;
|
IRP *irp = context;
|
||||||
MOUNTMGR_TARGET_NAME *result;
|
IO_STACK_LOCATION *irpsp = IoGetCurrentIrpStackLocation( irp );
|
||||||
CFStringRef query_cfstring;
|
ULONG info = 0;
|
||||||
WCHAR *filename, *unix_buf = NULL;
|
NTSTATUS status = query_symbol_file( irp->AssociatedIrp.SystemBuffer,
|
||||||
ANSI_STRING unix_path;
|
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
||||||
UNICODE_STRING path;
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
MDQueryRef mdquery;
|
&info );
|
||||||
const GUID *id;
|
irp->IoStatus.Information = info;
|
||||||
size_t size;
|
|
||||||
NTSTATUS status = STATUS_NO_MEMORY;
|
|
||||||
|
|
||||||
static const WCHAR formatW[] = { 'c','o','m','_','a','p','p','l','e','_','x','c','o','d','e',
|
|
||||||
'_','d','s','y','m','_','u','u','i','d','s',' ','=','=',' ',
|
|
||||||
'"','%','0','8','X','-','%','0','4','X','-',
|
|
||||||
'%','0','4','X','-','%','0','2','X','%','0','2','X','-',
|
|
||||||
'%','0','2','X','%','0','2','X','%','0','2','X','%','0','2','X',
|
|
||||||
'%','0','2','X','%','0','2','X','"',0 };
|
|
||||||
WCHAR query_string[ARRAY_SIZE(formatW)];
|
|
||||||
|
|
||||||
id = irp->AssociatedIrp.SystemBuffer;
|
|
||||||
sprintfW( query_string, formatW, id->Data1, id->Data2, id->Data3,
|
|
||||||
id->Data4[0], id->Data4[1], id->Data4[2], id->Data4[3],
|
|
||||||
id->Data4[4], id->Data4[5], id->Data4[6], id->Data4[7] );
|
|
||||||
if (!(query_cfstring = CFStringCreateWithCharacters(NULL, query_string, lstrlenW(query_string)))) goto done;
|
|
||||||
|
|
||||||
mdquery = MDQueryCreate(NULL, query_cfstring, NULL, NULL);
|
|
||||||
CFRelease(query_cfstring);
|
|
||||||
if (!mdquery) goto done;
|
|
||||||
|
|
||||||
MDQuerySetMaxCount(mdquery, 1);
|
|
||||||
TRACE("Executing %s\n", debugstr_w(query_string));
|
|
||||||
if (MDQueryExecute(mdquery, kMDQuerySynchronous))
|
|
||||||
{
|
|
||||||
if (MDQueryGetResultCount(mdquery) >= 1)
|
|
||||||
{
|
|
||||||
MDItemRef item = (MDItemRef)MDQueryGetResultAtIndex(mdquery, 0);
|
|
||||||
CFStringRef item_path = MDItemCopyAttribute(item, kMDItemPath);
|
|
||||||
|
|
||||||
if (item_path)
|
|
||||||
{
|
|
||||||
CFIndex item_path_len = CFStringGetLength(item_path);
|
|
||||||
if ((unix_buf = HeapAlloc(GetProcessHeap(), 0, (item_path_len + 1) * sizeof(WCHAR))))
|
|
||||||
{
|
|
||||||
CFStringGetCharacters(item_path, CFRangeMake(0, item_path_len), unix_buf);
|
|
||||||
unix_buf[item_path_len] = 0;
|
|
||||||
TRACE("found %s\n", debugstr_w(unix_buf));
|
|
||||||
}
|
|
||||||
CFRelease(item_path);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else status = STATUS_NO_MORE_ENTRIES;
|
|
||||||
}
|
|
||||||
CFRelease(mdquery);
|
|
||||||
if (!unix_buf) goto done;
|
|
||||||
|
|
||||||
RtlInitUnicodeString( &path, unix_buf );
|
|
||||||
status = RtlUnicodeStringToAnsiString( &unix_path, &path, TRUE );
|
|
||||||
HeapFree( GetProcessHeap(), 0, unix_buf );
|
|
||||||
if (status) goto done;
|
|
||||||
|
|
||||||
filename = wine_get_dos_file_name( unix_path.Buffer );
|
|
||||||
RtlFreeAnsiString( &unix_path );
|
|
||||||
if (!filename)
|
|
||||||
{
|
|
||||||
status = STATUS_NO_SUCH_FILE;
|
|
||||||
goto done;
|
|
||||||
}
|
|
||||||
result = irp->AssociatedIrp.SystemBuffer;
|
|
||||||
result->DeviceNameLength = lstrlenW(filename) * sizeof(WCHAR);
|
|
||||||
size = FIELD_OFFSET(MOUNTMGR_TARGET_NAME, DeviceName[lstrlenW(filename)]);
|
|
||||||
if (size <= IoGetCurrentIrpStackLocation(irp)->Parameters.DeviceIoControl.OutputBufferLength)
|
|
||||||
{
|
|
||||||
memcpy( result->DeviceName, filename, lstrlenW(filename) * sizeof(WCHAR) );
|
|
||||||
irp->IoStatus.Information = size;
|
|
||||||
status = STATUS_SUCCESS;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
irp->IoStatus.Information = sizeof(*result);
|
|
||||||
status = STATUS_BUFFER_OVERFLOW;
|
|
||||||
}
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, filename );
|
|
||||||
|
|
||||||
done:
|
|
||||||
irp->IoStatus.u.Status = status;
|
irp->IoStatus.u.Status = status;
|
||||||
IoCompleteRequest( irp, IO_NO_INCREMENT );
|
IoCompleteRequest( irp, IO_NO_INCREMENT );
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline BOOL check_credential_string( const void *buf, SIZE_T buflen, ULONG size, ULONG offset )
|
|
||||||
{
|
|
||||||
const WCHAR *ptr = buf;
|
|
||||||
if (!size || size % sizeof(WCHAR) || offset + size > buflen || ptr[(offset + size) / sizeof(WCHAR) - 1]) return FALSE;
|
|
||||||
return TRUE;
|
|
||||||
}
|
|
||||||
|
|
||||||
static SecKeychainItemRef find_credential( const WCHAR *name )
|
|
||||||
{
|
|
||||||
int status;
|
|
||||||
SecKeychainSearchRef search;
|
|
||||||
SecKeychainItemRef item;
|
|
||||||
|
|
||||||
status = SecKeychainSearchCreateFromAttributes( NULL, kSecGenericPasswordItemClass, NULL, &search );
|
|
||||||
if (status != noErr) return NULL;
|
|
||||||
|
|
||||||
while (SecKeychainSearchCopyNext( search, &item ) == noErr)
|
|
||||||
{
|
|
||||||
SecKeychainAttributeInfo info;
|
|
||||||
SecKeychainAttributeList *attr_list;
|
|
||||||
UInt32 info_tags[] = { kSecServiceItemAttr };
|
|
||||||
WCHAR *itemname;
|
|
||||||
int len;
|
|
||||||
|
|
||||||
info.count = ARRAY_SIZE(info_tags);
|
|
||||||
info.tag = info_tags;
|
|
||||||
info.format = NULL;
|
|
||||||
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, NULL, NULL );
|
|
||||||
if (status != noErr)
|
|
||||||
{
|
|
||||||
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
if (attr_list->count != 1 || attr_list->attr[0].tag != kSecServiceItemAttr)
|
|
||||||
{
|
|
||||||
CFRelease( item );
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[0].data, attr_list->attr[0].length, NULL, 0 );
|
|
||||||
if (!(itemname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) )))
|
|
||||||
{
|
|
||||||
CFRelease( item );
|
|
||||||
CFRelease( search );
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[0].data, attr_list->attr[0].length, itemname, len );
|
|
||||||
itemname[len] = 0;
|
|
||||||
if (strcmpiW( itemname, name ))
|
|
||||||
{
|
|
||||||
CFRelease( item );
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, itemname );
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, itemname );
|
|
||||||
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
|
||||||
CFRelease( search );
|
|
||||||
return item;
|
|
||||||
}
|
|
||||||
|
|
||||||
CFRelease( search );
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
static NTSTATUS fill_credential( SecKeychainItemRef item, BOOL require_password, void *buf, SIZE_T data_offset,
|
|
||||||
SIZE_T buflen, SIZE_T *retlen )
|
|
||||||
{
|
|
||||||
struct mountmgr_credential *cred = buf;
|
|
||||||
int status, len;
|
|
||||||
SIZE_T size;
|
|
||||||
UInt32 i, cred_blob_len = 0;
|
|
||||||
void *cred_blob;
|
|
||||||
WCHAR *ptr;
|
|
||||||
BOOL user_name_present = FALSE;
|
|
||||||
SecKeychainAttributeInfo info;
|
|
||||||
SecKeychainAttributeList *attr_list = NULL;
|
|
||||||
UInt32 info_tags[] = { kSecServiceItemAttr, kSecAccountItemAttr, kSecCommentItemAttr, kSecCreationDateItemAttr };
|
|
||||||
|
|
||||||
info.count = ARRAY_SIZE(info_tags);
|
|
||||||
info.tag = info_tags;
|
|
||||||
info.format = NULL;
|
|
||||||
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, &cred_blob_len, &cred_blob );
|
|
||||||
if (status == errSecAuthFailed && !require_password)
|
|
||||||
{
|
|
||||||
cred_blob_len = 0;
|
|
||||||
cred_blob = NULL;
|
|
||||||
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, &cred_blob_len, NULL );
|
|
||||||
}
|
|
||||||
if (status != noErr)
|
|
||||||
{
|
|
||||||
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
|
||||||
return STATUS_NOT_FOUND;
|
|
||||||
}
|
|
||||||
for (i = 0; i < attr_list->count; i++)
|
|
||||||
{
|
|
||||||
if (attr_list->attr[i].tag == kSecAccountItemAttr && attr_list->attr[i].data)
|
|
||||||
{
|
|
||||||
user_name_present = TRUE;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (!user_name_present)
|
|
||||||
{
|
|
||||||
WARN( "no kSecAccountItemAttr for item\n" );
|
|
||||||
SecKeychainItemFreeAttributesAndData( attr_list, cred_blob );
|
|
||||||
return STATUS_NOT_FOUND;
|
|
||||||
}
|
|
||||||
|
|
||||||
*retlen = sizeof(*cred);
|
|
||||||
for (i = 0; i < attr_list->count; i++)
|
|
||||||
{
|
|
||||||
switch (attr_list->attr[i].tag)
|
|
||||||
{
|
|
||||||
case kSecServiceItemAttr:
|
|
||||||
TRACE( "kSecServiceItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
|
||||||
if (cred) cred->targetname_offset = cred->targetname_size = 0;
|
|
||||||
if (!attr_list->attr[i].data) continue;
|
|
||||||
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, NULL, 0 );
|
|
||||||
size = (len + 1) * sizeof(WCHAR);
|
|
||||||
if (cred && *retlen + size <= buflen)
|
|
||||||
{
|
|
||||||
cred->targetname_offset = data_offset;
|
|
||||||
cred->targetname_size = size;
|
|
||||||
ptr = (WCHAR *)((char *)cred + cred->targetname_offset);
|
|
||||||
MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, ptr, len );
|
|
||||||
ptr[len] = 0;
|
|
||||||
data_offset += size;
|
|
||||||
}
|
|
||||||
*retlen += size;
|
|
||||||
break;
|
|
||||||
case kSecAccountItemAttr:
|
|
||||||
{
|
|
||||||
TRACE( "kSecAccountItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
|
||||||
if (cred) cred->username_offset = cred->username_size = 0;
|
|
||||||
if (!attr_list->attr[i].data) continue;
|
|
||||||
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, NULL, 0 );
|
|
||||||
size = (len + 1) * sizeof(WCHAR);
|
|
||||||
if (cred && *retlen + size <= buflen)
|
|
||||||
{
|
|
||||||
cred->username_offset = data_offset;
|
|
||||||
cred->username_size = size;
|
|
||||||
ptr = (WCHAR *)((char *)cred + cred->username_offset);
|
|
||||||
MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, ptr, len );
|
|
||||||
ptr[len] = 0;
|
|
||||||
data_offset += size;
|
|
||||||
}
|
|
||||||
*retlen += size;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case kSecCommentItemAttr:
|
|
||||||
TRACE( "kSecCommentItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
|
||||||
if (cred) cred->comment_offset = cred->comment_size = 0;
|
|
||||||
if (!attr_list->attr[i].data) continue;
|
|
||||||
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, NULL, 0 );
|
|
||||||
size = (len + 1) * sizeof(WCHAR);
|
|
||||||
if (cred && *retlen + size <= buflen)
|
|
||||||
{
|
|
||||||
cred->comment_offset = data_offset;
|
|
||||||
cred->comment_size = size;
|
|
||||||
ptr = (WCHAR *)((char *)cred + cred->comment_offset);
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, attr_list->attr[i].data, attr_list->attr[i].length, ptr, len );
|
|
||||||
ptr[len] = 0;
|
|
||||||
data_offset += size;
|
|
||||||
}
|
|
||||||
*retlen += size;
|
|
||||||
break;
|
|
||||||
case kSecCreationDateItemAttr:
|
|
||||||
{
|
|
||||||
LARGE_INTEGER wintime;
|
|
||||||
struct tm tm;
|
|
||||||
time_t time;
|
|
||||||
|
|
||||||
TRACE( "kSecCreationDateItemAttr: %.*s\n", (int)attr_list->attr[i].length, (char *)attr_list->attr[i].data );
|
|
||||||
if (cred) cred->last_written.dwLowDateTime = cred->last_written.dwHighDateTime = 0;
|
|
||||||
if (!attr_list->attr[i].data) continue;
|
|
||||||
|
|
||||||
if (cred)
|
|
||||||
{
|
|
||||||
memset( &tm, 0, sizeof(tm) );
|
|
||||||
strptime( attr_list->attr[i].data, "%Y%m%d%H%M%SZ", &tm );
|
|
||||||
time = mktime( &tm );
|
|
||||||
RtlSecondsSince1970ToTime( time, &wintime );
|
|
||||||
cred->last_written.dwLowDateTime = wintime.u.LowPart;
|
|
||||||
cred->last_written.dwHighDateTime = wintime.u.HighPart;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
default:
|
|
||||||
FIXME( "unhandled attribute %u\n", (unsigned)attr_list->attr[i].tag );
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (cred)
|
|
||||||
{
|
|
||||||
if (*retlen + cred_blob_len <= buflen)
|
|
||||||
{
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, cred_blob, cred_blob_len, NULL, 0 );
|
|
||||||
cred->blob_offset = data_offset;
|
|
||||||
cred->blob_size = len * sizeof(WCHAR);
|
|
||||||
ptr = (WCHAR *)((char *)cred + cred->blob_offset);
|
|
||||||
MultiByteToWideChar( CP_UTF8, 0, cred_blob, cred_blob_len, ptr, len );
|
|
||||||
}
|
|
||||||
else cred->blob_offset = cred->blob_size = 0;
|
|
||||||
}
|
|
||||||
*retlen += cred_blob_len;
|
|
||||||
|
|
||||||
if (attr_list) SecKeychainItemFreeAttributesAndData( attr_list, cred_blob );
|
|
||||||
return STATUS_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
static NTSTATUS read_credential( void *buff, SIZE_T insize, SIZE_T outsize, IO_STATUS_BLOCK *iosb )
|
|
||||||
{
|
|
||||||
struct mountmgr_credential *cred = buff;
|
|
||||||
const WCHAR *targetname;
|
|
||||||
SecKeychainItemRef item;
|
|
||||||
SIZE_T size;
|
|
||||||
NTSTATUS status;
|
|
||||||
|
|
||||||
if (!check_credential_string( buff, insize, cred->targetname_size, cred->targetname_offset ))
|
|
||||||
return STATUS_INVALID_PARAMETER;
|
|
||||||
targetname = (const WCHAR *)((const char *)cred + cred->targetname_offset);
|
|
||||||
|
|
||||||
if (!(item = find_credential( targetname ))) return STATUS_NOT_FOUND;
|
|
||||||
|
|
||||||
status = fill_credential( item, TRUE, cred, sizeof(*cred), outsize, &size );
|
|
||||||
CFRelease( item );
|
|
||||||
if (status != STATUS_SUCCESS) return status;
|
|
||||||
|
|
||||||
iosb->Information = size;
|
|
||||||
return (size > outsize) ? STATUS_BUFFER_OVERFLOW : STATUS_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
static NTSTATUS write_credential( void *buff, SIZE_T insize, SIZE_T outsize, IO_STATUS_BLOCK *iosb )
|
|
||||||
{
|
|
||||||
const struct mountmgr_credential *cred = buff;
|
|
||||||
int status, len, len_password = 0;
|
|
||||||
const WCHAR *ptr;
|
|
||||||
SecKeychainItemRef keychain_item;
|
|
||||||
char *targetname, *username = NULL, *password = NULL;
|
|
||||||
SecKeychainAttribute attrs[1];
|
|
||||||
SecKeychainAttributeList attr_list;
|
|
||||||
NTSTATUS ret = STATUS_NO_MEMORY;
|
|
||||||
|
|
||||||
if (!check_credential_string( buff, insize, cred->targetname_size, cred->targetname_offset ) ||
|
|
||||||
!check_credential_string( buff, insize, cred->username_size, cred->username_offset ) ||
|
|
||||||
((cred->blob_size && cred->blob_size % sizeof(WCHAR)) || cred->blob_offset + cred->blob_size > insize) ||
|
|
||||||
(cred->comment_size && !check_credential_string( buff, insize, cred->comment_size, cred->comment_offset )) ||
|
|
||||||
sizeof(*cred) + cred->targetname_size + cred->username_size + cred->blob_size + cred->comment_size > insize)
|
|
||||||
{
|
|
||||||
return STATUS_INVALID_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
ptr = (const WCHAR *)((const char *)cred + cred->targetname_offset);
|
|
||||||
len = WideCharToMultiByte( CP_UTF8, 0, ptr, -1, NULL, 0, NULL, NULL );
|
|
||||||
if (!(targetname = RtlAllocateHeap( GetProcessHeap(), 0, len ))) goto error;
|
|
||||||
WideCharToMultiByte( CP_UTF8, 0, ptr, -1, targetname, len, NULL, NULL );
|
|
||||||
|
|
||||||
ptr = (const WCHAR *)((const char *)cred + cred->username_offset);
|
|
||||||
len = WideCharToMultiByte( CP_UTF8, 0, ptr, -1, NULL, 0, NULL, NULL );
|
|
||||||
if (!(username = RtlAllocateHeap( GetProcessHeap(), 0, len ))) goto error;
|
|
||||||
WideCharToMultiByte( CP_UTF8, 0, ptr, -1, username, len, NULL, NULL );
|
|
||||||
|
|
||||||
if (cred->blob_size)
|
|
||||||
{
|
|
||||||
ptr = (const WCHAR *)((const char *)cred + cred->blob_offset);
|
|
||||||
len_password = WideCharToMultiByte( CP_UTF8, 0, ptr, cred->blob_size / sizeof(WCHAR), NULL, 0, NULL, NULL );
|
|
||||||
if (!(password = RtlAllocateHeap( GetProcessHeap(), 0, len_password ))) goto error;
|
|
||||||
WideCharToMultiByte( CP_UTF8, 0, ptr, cred->blob_size / sizeof(WCHAR), password, len_password, NULL, NULL );
|
|
||||||
}
|
|
||||||
|
|
||||||
TRACE("adding target %s, username %s using Keychain\n", targetname, username );
|
|
||||||
status = SecKeychainAddGenericPassword( NULL, strlen(targetname), targetname, strlen(username), username,
|
|
||||||
len_password, password, &keychain_item );
|
|
||||||
if (status != noErr) ERR( "SecKeychainAddGenericPassword returned %d\n", status );
|
|
||||||
if (status == errSecDuplicateItem)
|
|
||||||
{
|
|
||||||
status = SecKeychainFindGenericPassword( NULL, strlen(targetname), targetname, strlen(username), username, NULL,
|
|
||||||
NULL, &keychain_item );
|
|
||||||
if (status != noErr) ERR( "SecKeychainFindGenericPassword returned %d\n", status );
|
|
||||||
}
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, username );
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
|
||||||
if (status != noErr)
|
|
||||||
{
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, password );
|
|
||||||
return STATUS_UNSUCCESSFUL;
|
|
||||||
}
|
|
||||||
if (cred->comment_size)
|
|
||||||
{
|
|
||||||
attr_list.count = 1;
|
|
||||||
attr_list.attr = attrs;
|
|
||||||
attrs[0].tag = kSecCommentItemAttr;
|
|
||||||
ptr = (const WCHAR *)((const char *)cred + cred->comment_offset);
|
|
||||||
attrs[0].length = WideCharToMultiByte( CP_UTF8, 0, ptr, -1, NULL, 0, NULL, NULL );
|
|
||||||
if (attrs[0].length) attrs[0].length--;
|
|
||||||
if (!(attrs[0].data = RtlAllocateHeap( GetProcessHeap(), 0, attrs[0].length ))) goto error;
|
|
||||||
WideCharToMultiByte( CP_UTF8, 0, ptr, -1, attrs[0].data, attrs[0].length, NULL, NULL );
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
attr_list.count = 0;
|
|
||||||
attr_list.attr = NULL;
|
|
||||||
}
|
|
||||||
status = SecKeychainItemModifyAttributesAndData( keychain_item, &attr_list, cred->blob_preserve ? 0 : len_password,
|
|
||||||
cred->blob_preserve ? NULL : password );
|
|
||||||
|
|
||||||
if (cred->comment_size) RtlFreeHeap( GetProcessHeap(), 0, attrs[0].data );
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, password );
|
|
||||||
/* FIXME: set TargetAlias attribute */
|
|
||||||
CFRelease( keychain_item );
|
|
||||||
if (status != noErr) return STATUS_UNSUCCESSFUL;
|
|
||||||
return STATUS_SUCCESS;
|
|
||||||
|
|
||||||
error:
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, username );
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, password );
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static NTSTATUS delete_credential( void *buff, SIZE_T insize, SIZE_T outsize, IO_STATUS_BLOCK *iosb )
|
|
||||||
{
|
|
||||||
const struct mountmgr_credential *cred = buff;
|
|
||||||
const WCHAR *targetname;
|
|
||||||
SecKeychainItemRef item;
|
|
||||||
|
|
||||||
if (!check_credential_string( buff, insize, cred->targetname_size, cred->targetname_offset ))
|
|
||||||
return STATUS_INVALID_PARAMETER;
|
|
||||||
targetname = (const WCHAR *)((const char *)cred + cred->targetname_offset);
|
|
||||||
|
|
||||||
if (!(item = find_credential( targetname ))) return STATUS_NOT_FOUND;
|
|
||||||
|
|
||||||
SecKeychainItemDelete( item );
|
|
||||||
CFRelease( item );
|
|
||||||
return STATUS_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
static BOOL match_credential( void *data, UInt32 data_len, const WCHAR *filter )
|
|
||||||
{
|
|
||||||
int len;
|
|
||||||
WCHAR *targetname;
|
|
||||||
const WCHAR *p;
|
|
||||||
BOOL ret;
|
|
||||||
|
|
||||||
if (!*filter) return TRUE;
|
|
||||||
|
|
||||||
len = MultiByteToWideChar( CP_UTF8, 0, data, data_len, NULL, 0 );
|
|
||||||
if (!(targetname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) ))) return FALSE;
|
|
||||||
MultiByteToWideChar( CP_UTF8, 0, data, data_len, targetname, len );
|
|
||||||
targetname[len] = 0;
|
|
||||||
|
|
||||||
TRACE( "comparing filter %s to target name %s\n", debugstr_w(filter), debugstr_w(targetname) );
|
|
||||||
|
|
||||||
p = strchrW( filter, '*' );
|
|
||||||
ret = CompareStringW( GetThreadLocale(), NORM_IGNORECASE, filter,
|
|
||||||
(p && !p[1]) ? p - filter : -1, targetname, (p && !p[1]) ? p - filter : -1 ) == CSTR_EQUAL;
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static NTSTATUS search_credentials( const WCHAR *filter, struct mountmgr_credential_list *list, SIZE_T *ret_count, SIZE_T *ret_size )
|
|
||||||
{
|
|
||||||
SecKeychainSearchRef search;
|
|
||||||
SecKeychainItemRef item;
|
|
||||||
int status;
|
|
||||||
ULONG i = 0;
|
|
||||||
SIZE_T data_offset, data_size = 0, size;
|
|
||||||
NTSTATUS ret = STATUS_NOT_FOUND;
|
|
||||||
|
|
||||||
status = SecKeychainSearchCreateFromAttributes( NULL, kSecGenericPasswordItemClass, NULL, &search );
|
|
||||||
if (status != noErr)
|
|
||||||
{
|
|
||||||
ERR( "SecKeychainSearchCreateFromAttributes returned status %d\n", status );
|
|
||||||
return STATUS_INTERNAL_ERROR;
|
|
||||||
}
|
|
||||||
|
|
||||||
while (SecKeychainSearchCopyNext( search, &item ) == noErr)
|
|
||||||
{
|
|
||||||
SecKeychainAttributeInfo info;
|
|
||||||
SecKeychainAttributeList *attr_list;
|
|
||||||
UInt32 info_tags[] = { kSecServiceItemAttr };
|
|
||||||
BOOL match;
|
|
||||||
|
|
||||||
info.count = ARRAY_SIZE(info_tags);
|
|
||||||
info.tag = info_tags;
|
|
||||||
info.format = NULL;
|
|
||||||
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, NULL, NULL );
|
|
||||||
if (status != noErr)
|
|
||||||
{
|
|
||||||
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
|
||||||
CFRelease( item );
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
if (attr_list->count != 1 || attr_list->attr[0].tag != kSecServiceItemAttr)
|
|
||||||
{
|
|
||||||
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
|
||||||
CFRelease( item );
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
TRACE( "service item: %.*s\n", (int)attr_list->attr[0].length, (char *)attr_list->attr[0].data );
|
|
||||||
|
|
||||||
match = match_credential( attr_list->attr[0].data, attr_list->attr[0].length, filter );
|
|
||||||
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
|
||||||
if (!match)
|
|
||||||
{
|
|
||||||
CFRelease( item );
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!list) ret = fill_credential( item, FALSE, NULL, 0, 0, &size );
|
|
||||||
else
|
|
||||||
{
|
|
||||||
data_offset = FIELD_OFFSET( struct mountmgr_credential_list, creds[list->count] ) -
|
|
||||||
FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
|
|
||||||
ret = fill_credential( item, FALSE, &list->creds[i], data_offset, list->size - data_offset, &size );
|
|
||||||
}
|
|
||||||
|
|
||||||
CFRelease( item );
|
|
||||||
if (ret == STATUS_NOT_FOUND) continue;
|
|
||||||
if (ret != STATUS_SUCCESS) break;
|
|
||||||
data_size += size - sizeof(struct mountmgr_credential);
|
|
||||||
i++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ret_count) *ret_count = i;
|
|
||||||
if (ret_size) *ret_size = FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
|
|
||||||
|
|
||||||
CFRelease( search );
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static NTSTATUS enumerate_credentials( void *buff, SIZE_T insize, SIZE_T outsize, IO_STATUS_BLOCK *iosb )
|
|
||||||
{
|
|
||||||
struct mountmgr_credential_list *list = buff;
|
|
||||||
WCHAR *filter;
|
|
||||||
SIZE_T size, count;
|
|
||||||
Boolean saved_user_interaction_allowed;
|
|
||||||
NTSTATUS status;
|
|
||||||
|
|
||||||
if (!check_credential_string( buff, insize, list->filter_size, list->filter_offset )) return STATUS_INVALID_PARAMETER;
|
|
||||||
if (!(filter = strdupW( (const WCHAR *)((const char *)list + list->filter_offset) ))) return STATUS_NO_MEMORY;
|
|
||||||
|
|
||||||
SecKeychainGetUserInteractionAllowed( &saved_user_interaction_allowed );
|
|
||||||
SecKeychainSetUserInteractionAllowed( false );
|
|
||||||
|
|
||||||
if ((status = search_credentials( filter, NULL, &count, &size )) == STATUS_SUCCESS)
|
|
||||||
{
|
|
||||||
|
|
||||||
if (size > outsize)
|
|
||||||
{
|
|
||||||
if (size >= sizeof(list->size)) list->size = size;
|
|
||||||
iosb->Information = sizeof(list->size);
|
|
||||||
status = STATUS_BUFFER_OVERFLOW;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
list->size = size;
|
|
||||||
list->count = count;
|
|
||||||
iosb->Information = size;
|
|
||||||
status = search_credentials( filter, list, NULL, NULL );
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
SecKeychainSetUserInteractionAllowed( saved_user_interaction_allowed );
|
|
||||||
RtlFreeHeap( GetProcessHeap(), 0, filter );
|
|
||||||
return status;
|
|
||||||
}
|
|
||||||
#endif /* __APPLE__ */
|
|
||||||
|
|
||||||
/* handler for ioctls on the mount manager device */
|
/* handler for ioctls on the mount manager device */
|
||||||
static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
{
|
{
|
||||||
IO_STACK_LOCATION *irpsp = IoGetCurrentIrpStackLocation( irp );
|
IO_STACK_LOCATION *irpsp = IoGetCurrentIrpStackLocation( irp );
|
||||||
NTSTATUS status;
|
NTSTATUS status;
|
||||||
|
ULONG info = 0;
|
||||||
|
|
||||||
TRACE( "ioctl %x insize %u outsize %u\n",
|
TRACE( "ioctl %x insize %u outsize %u\n",
|
||||||
irpsp->Parameters.DeviceIoControl.IoControlCode,
|
irpsp->Parameters.DeviceIoControl.IoControlCode,
|
||||||
|
@ -1061,7 +502,6 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
return (irp->IoStatus.u.Status = STATUS_PENDING);
|
return (irp->IoStatus.u.Status = STATUS_PENDING);
|
||||||
status = STATUS_NO_MEMORY;
|
status = STATUS_NO_MEMORY;
|
||||||
break;
|
break;
|
||||||
#ifdef __APPLE__
|
|
||||||
case IOCTL_MOUNTMGR_QUERY_SYMBOL_FILE:
|
case IOCTL_MOUNTMGR_QUERY_SYMBOL_FILE:
|
||||||
if (irpsp->Parameters.DeviceIoControl.InputBufferLength != sizeof(GUID)
|
if (irpsp->Parameters.DeviceIoControl.InputBufferLength != sizeof(GUID)
|
||||||
|| irpsp->Parameters.DeviceIoControl.OutputBufferLength < sizeof(MOUNTMGR_TARGET_NAME))
|
|| irpsp->Parameters.DeviceIoControl.OutputBufferLength < sizeof(MOUNTMGR_TARGET_NAME))
|
||||||
|
@ -1069,7 +509,7 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
status = STATUS_INVALID_PARAMETER;
|
status = STATUS_INVALID_PARAMETER;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
if (TrySubmitThreadpoolCallback( query_symbol_file, irp, NULL ))
|
if (TrySubmitThreadpoolCallback( query_symbol_file_callback, irp, NULL ))
|
||||||
return (irp->IoStatus.u.Status = STATUS_PENDING);
|
return (irp->IoStatus.u.Status = STATUS_PENDING);
|
||||||
status = STATUS_NO_MEMORY;
|
status = STATUS_NO_MEMORY;
|
||||||
break;
|
break;
|
||||||
|
@ -1082,7 +522,8 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
status = read_credential( irp->AssociatedIrp.SystemBuffer,
|
status = read_credential( irp->AssociatedIrp.SystemBuffer,
|
||||||
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
||||||
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
&irp->IoStatus );
|
&info );
|
||||||
|
irp->IoStatus.Information = info;
|
||||||
break;
|
break;
|
||||||
case IOCTL_MOUNTMGR_WRITE_CREDENTIAL:
|
case IOCTL_MOUNTMGR_WRITE_CREDENTIAL:
|
||||||
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential))
|
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential))
|
||||||
|
@ -1093,7 +534,8 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
status = write_credential( irp->AssociatedIrp.SystemBuffer,
|
status = write_credential( irp->AssociatedIrp.SystemBuffer,
|
||||||
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
||||||
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
&irp->IoStatus );
|
&info );
|
||||||
|
irp->IoStatus.Information = info;
|
||||||
break;
|
break;
|
||||||
case IOCTL_MOUNTMGR_DELETE_CREDENTIAL:
|
case IOCTL_MOUNTMGR_DELETE_CREDENTIAL:
|
||||||
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential))
|
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential))
|
||||||
|
@ -1104,7 +546,8 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
status = delete_credential( irp->AssociatedIrp.SystemBuffer,
|
status = delete_credential( irp->AssociatedIrp.SystemBuffer,
|
||||||
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
||||||
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
&irp->IoStatus );
|
&info );
|
||||||
|
irp->IoStatus.Information = info;
|
||||||
break;
|
break;
|
||||||
case IOCTL_MOUNTMGR_ENUMERATE_CREDENTIALS:
|
case IOCTL_MOUNTMGR_ENUMERATE_CREDENTIALS:
|
||||||
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential_list))
|
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential_list))
|
||||||
|
@ -1115,9 +558,9 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
status = enumerate_credentials( irp->AssociatedIrp.SystemBuffer,
|
status = enumerate_credentials( irp->AssociatedIrp.SystemBuffer,
|
||||||
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
||||||
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
&irp->IoStatus );
|
&info );
|
||||||
|
irp->IoStatus.Information = info;
|
||||||
break;
|
break;
|
||||||
#endif
|
|
||||||
default:
|
default:
|
||||||
FIXME( "ioctl %x not supported\n", irpsp->Parameters.DeviceIoControl.IoControlCode );
|
FIXME( "ioctl %x not supported\n", irpsp->Parameters.DeviceIoControl.IoControlCode );
|
||||||
status = STATUS_NOT_SUPPORTED;
|
status = STATUS_NOT_SUPPORTED;
|
||||||
|
|
|
@ -30,3 +30,9 @@ extern NTSTATUS detect_serial_ports( char *names, ULONG size ) DECLSPEC_HIDDEN;
|
||||||
extern NTSTATUS detect_parallel_ports( char *names, ULONG size ) DECLSPEC_HIDDEN;
|
extern NTSTATUS detect_parallel_ports( char *names, ULONG size ) DECLSPEC_HIDDEN;
|
||||||
extern NTSTATUS set_shell_folder( const char *folder, const char *backup, const char *link ) DECLSPEC_HIDDEN;
|
extern NTSTATUS set_shell_folder( const char *folder, const char *backup, const char *link ) DECLSPEC_HIDDEN;
|
||||||
extern NTSTATUS get_shell_folder( const char *folder, char *buffer, ULONG size ) DECLSPEC_HIDDEN;
|
extern NTSTATUS get_shell_folder( const char *folder, char *buffer, ULONG size ) DECLSPEC_HIDDEN;
|
||||||
|
|
||||||
|
extern NTSTATUS query_symbol_file( void *buff, ULONG insize, ULONG outsize, ULONG *info ) DECLSPEC_HIDDEN;
|
||||||
|
extern NTSTATUS read_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info ) DECLSPEC_HIDDEN;
|
||||||
|
extern NTSTATUS write_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info ) DECLSPEC_HIDDEN;
|
||||||
|
extern NTSTATUS delete_credential( void *buff, ULONG insize, ULONG outsize, ULONG *info ) DECLSPEC_HIDDEN;
|
||||||
|
extern NTSTATUS enumerate_credentials( void *buff, ULONG insize, ULONG outsize, ULONG *info ) DECLSPEC_HIDDEN;
|
||||||
|
|
Loading…
Reference in New Issue