mountmgr: Add ioctl to enumerate host credentials on macOS.
Signed-off-by: Hans Leidekker <hans@codeweavers.com> Signed-off-by: Alexandre Julliard <julliard@winehq.org>
This commit is contained in:
parent
f69b9e2446
commit
bf9ae67275
|
@ -159,7 +159,7 @@ static char *strdupA( const char *str )
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static WCHAR *strdupW( const WCHAR *str )
|
WCHAR *strdupW( const WCHAR *str )
|
||||||
{
|
{
|
||||||
WCHAR *ret;
|
WCHAR *ret;
|
||||||
|
|
||||||
|
|
|
@ -836,6 +836,137 @@ static NTSTATUS delete_credential( void *buff, SIZE_T insize, SIZE_T outsize, IO
|
||||||
CFRelease( item );
|
CFRelease( item );
|
||||||
return STATUS_SUCCESS;
|
return STATUS_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static BOOL match_credential( void *data, UInt32 data_len, const WCHAR *filter )
|
||||||
|
{
|
||||||
|
int len;
|
||||||
|
WCHAR *targetname;
|
||||||
|
const WCHAR *p;
|
||||||
|
BOOL ret;
|
||||||
|
|
||||||
|
if (!*filter) return TRUE;
|
||||||
|
|
||||||
|
len = MultiByteToWideChar( CP_UTF8, 0, data, data_len, NULL, 0 );
|
||||||
|
if (!(targetname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) ))) return FALSE;
|
||||||
|
MultiByteToWideChar( CP_UTF8, 0, data, data_len, targetname, len );
|
||||||
|
targetname[len] = 0;
|
||||||
|
|
||||||
|
TRACE( "comparing filter %s to target name %s\n", debugstr_w(filter), debugstr_w(targetname) );
|
||||||
|
|
||||||
|
p = strchrW( filter, '*' );
|
||||||
|
ret = CompareStringW( GetThreadLocale(), NORM_IGNORECASE, filter,
|
||||||
|
(p && !p[1]) ? p - filter : -1, targetname, (p && !p[1]) ? p - filter : -1 ) == CSTR_EQUAL;
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, targetname );
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static NTSTATUS search_credentials( const WCHAR *filter, struct mountmgr_credential_list *list, SIZE_T *ret_count, SIZE_T *ret_size )
|
||||||
|
{
|
||||||
|
SecKeychainSearchRef search;
|
||||||
|
SecKeychainItemRef item;
|
||||||
|
int status;
|
||||||
|
ULONG i = 0;
|
||||||
|
SIZE_T data_offset, data_size = 0, size;
|
||||||
|
NTSTATUS ret = STATUS_NOT_FOUND;
|
||||||
|
|
||||||
|
status = SecKeychainSearchCreateFromAttributes( NULL, kSecGenericPasswordItemClass, NULL, &search );
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
ERR( "SecKeychainSearchCreateFromAttributes returned status %d\n", status );
|
||||||
|
return STATUS_INTERNAL_ERROR;
|
||||||
|
}
|
||||||
|
|
||||||
|
while (SecKeychainSearchCopyNext( search, &item ) == noErr)
|
||||||
|
{
|
||||||
|
SecKeychainAttributeInfo info;
|
||||||
|
SecKeychainAttributeList *attr_list;
|
||||||
|
UInt32 info_tags[] = { kSecServiceItemAttr };
|
||||||
|
BOOL match;
|
||||||
|
|
||||||
|
info.count = ARRAY_SIZE(info_tags);
|
||||||
|
info.tag = info_tags;
|
||||||
|
info.format = NULL;
|
||||||
|
status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, NULL, NULL );
|
||||||
|
if (status != noErr)
|
||||||
|
{
|
||||||
|
WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (attr_list->count != 1 || attr_list->attr[0].tag != kSecServiceItemAttr)
|
||||||
|
{
|
||||||
|
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
TRACE( "service item: %.*s\n", (int)attr_list->attr[0].length, (char *)attr_list->attr[0].data );
|
||||||
|
|
||||||
|
match = match_credential( attr_list->attr[0].data, attr_list->attr[0].length, filter );
|
||||||
|
SecKeychainItemFreeAttributesAndData( attr_list, NULL );
|
||||||
|
if (!match)
|
||||||
|
{
|
||||||
|
CFRelease( item );
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!list) ret = fill_credential( item, FALSE, NULL, 0, 0, &size );
|
||||||
|
else
|
||||||
|
{
|
||||||
|
data_offset = FIELD_OFFSET( struct mountmgr_credential_list, creds[list->count] ) -
|
||||||
|
FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
|
||||||
|
ret = fill_credential( item, FALSE, &list->creds[i], data_offset, list->size - data_offset, &size );
|
||||||
|
}
|
||||||
|
|
||||||
|
CFRelease( item );
|
||||||
|
if (ret == STATUS_NOT_FOUND) continue;
|
||||||
|
if (ret != STATUS_SUCCESS) break;
|
||||||
|
data_size += size - sizeof(struct mountmgr_credential);
|
||||||
|
i++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ret_count) *ret_count = i;
|
||||||
|
if (ret_size) *ret_size = FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
|
||||||
|
|
||||||
|
CFRelease( search );
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static NTSTATUS enumerate_credentials( void *buff, SIZE_T insize, SIZE_T outsize, IO_STATUS_BLOCK *iosb )
|
||||||
|
{
|
||||||
|
struct mountmgr_credential_list *list = buff;
|
||||||
|
WCHAR *filter;
|
||||||
|
SIZE_T size, count;
|
||||||
|
Boolean saved_user_interaction_allowed;
|
||||||
|
NTSTATUS status;
|
||||||
|
|
||||||
|
if (!check_credential_string( buff, insize, list->filter_size, list->filter_offset )) return STATUS_INVALID_PARAMETER;
|
||||||
|
if (!(filter = strdupW( (const WCHAR *)((const char *)list + list->filter_offset) ))) return STATUS_NO_MEMORY;
|
||||||
|
|
||||||
|
SecKeychainGetUserInteractionAllowed( &saved_user_interaction_allowed );
|
||||||
|
SecKeychainSetUserInteractionAllowed( false );
|
||||||
|
|
||||||
|
if ((status = search_credentials( filter, NULL, &count, &size )) == STATUS_SUCCESS)
|
||||||
|
{
|
||||||
|
|
||||||
|
if (size > outsize)
|
||||||
|
{
|
||||||
|
if (size >= sizeof(list->size)) list->size = size;
|
||||||
|
iosb->Information = sizeof(list->size);
|
||||||
|
status = STATUS_MORE_ENTRIES;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
list->size = size;
|
||||||
|
list->count = count;
|
||||||
|
iosb->Information = size;
|
||||||
|
status = search_credentials( filter, list, NULL, NULL );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
SecKeychainSetUserInteractionAllowed( saved_user_interaction_allowed );
|
||||||
|
RtlFreeHeap( GetProcessHeap(), 0, filter );
|
||||||
|
return status;
|
||||||
|
}
|
||||||
#endif /* __APPLE__ */
|
#endif /* __APPLE__ */
|
||||||
|
|
||||||
/* handler for ioctls on the mount manager device */
|
/* handler for ioctls on the mount manager device */
|
||||||
|
@ -937,6 +1068,17 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
|
||||||
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
&irp->IoStatus );
|
&irp->IoStatus );
|
||||||
break;
|
break;
|
||||||
|
case IOCTL_MOUNTMGR_ENUMERATE_CREDENTIALS:
|
||||||
|
if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential_list))
|
||||||
|
{
|
||||||
|
irp->IoStatus.u.Status = STATUS_INVALID_PARAMETER;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
irp->IoStatus.u.Status = enumerate_credentials( irp->AssociatedIrp.SystemBuffer,
|
||||||
|
irpsp->Parameters.DeviceIoControl.InputBufferLength,
|
||||||
|
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
|
||||||
|
&irp->IoStatus );
|
||||||
|
break;
|
||||||
#endif
|
#endif
|
||||||
default:
|
default:
|
||||||
FIXME( "ioctl %x not supported\n", irpsp->Parameters.DeviceIoControl.IoControlCode );
|
FIXME( "ioctl %x not supported\n", irpsp->Parameters.DeviceIoControl.IoControlCode );
|
||||||
|
|
|
@ -36,6 +36,8 @@
|
||||||
extern void initialize_dbus(void) DECLSPEC_HIDDEN;
|
extern void initialize_dbus(void) DECLSPEC_HIDDEN;
|
||||||
extern void initialize_diskarbitration(void) DECLSPEC_HIDDEN;
|
extern void initialize_diskarbitration(void) DECLSPEC_HIDDEN;
|
||||||
|
|
||||||
|
extern WCHAR *strdupW( const WCHAR * ) DECLSPEC_HIDDEN;
|
||||||
|
|
||||||
/* device functions */
|
/* device functions */
|
||||||
|
|
||||||
enum device_type
|
enum device_type
|
||||||
|
|
|
@ -77,6 +77,7 @@ struct mountmgr_unix_drive
|
||||||
#define IOCTL_MOUNTMGR_READ_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 48, METHOD_BUFFERED, FILE_READ_ACCESS)
|
#define IOCTL_MOUNTMGR_READ_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 48, METHOD_BUFFERED, FILE_READ_ACCESS)
|
||||||
#define IOCTL_MOUNTMGR_WRITE_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 49, METHOD_BUFFERED, FILE_WRITE_ACCESS)
|
#define IOCTL_MOUNTMGR_WRITE_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 49, METHOD_BUFFERED, FILE_WRITE_ACCESS)
|
||||||
#define IOCTL_MOUNTMGR_DELETE_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 50, METHOD_BUFFERED, FILE_WRITE_ACCESS)
|
#define IOCTL_MOUNTMGR_DELETE_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 50, METHOD_BUFFERED, FILE_WRITE_ACCESS)
|
||||||
|
#define IOCTL_MOUNTMGR_ENUMERATE_CREDENTIALS CTL_CODE(MOUNTMGRCONTROLTYPE, 51, METHOD_BUFFERED, FILE_READ_ACCESS)
|
||||||
|
|
||||||
struct mountmgr_credential
|
struct mountmgr_credential
|
||||||
{
|
{
|
||||||
|
@ -92,6 +93,15 @@ struct mountmgr_credential
|
||||||
FILETIME last_written;
|
FILETIME last_written;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct mountmgr_credential_list
|
||||||
|
{
|
||||||
|
ULONG size;
|
||||||
|
ULONG count;
|
||||||
|
ULONG filter_offset;
|
||||||
|
ULONG filter_size;
|
||||||
|
struct mountmgr_credential creds[1];
|
||||||
|
};
|
||||||
|
|
||||||
#define IOCTL_MOUNTMGR_QUERY_DHCP_REQUEST_PARAMS CTL_CODE(MOUNTMGRCONTROLTYPE, 64, METHOD_BUFFERED, FILE_READ_ACCESS | FILE_WRITE_ACCESS)
|
#define IOCTL_MOUNTMGR_QUERY_DHCP_REQUEST_PARAMS CTL_CODE(MOUNTMGRCONTROLTYPE, 64, METHOD_BUFFERED, FILE_READ_ACCESS | FILE_WRITE_ACCESS)
|
||||||
|
|
||||||
struct mountmgr_dhcp_request_param
|
struct mountmgr_dhcp_request_param
|
||||||
|
|
Loading…
Reference in New Issue