⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 logon.c

📁 winNT技术操作系统,国外开放的原代码和LIUX一样
💻 C
📖 第 1 页 / 共 2 页
字号:

static PTOKEN_GROUPS
AllocateGroupSids(PSID *PrimaryGroupSid,
		  PSID *OwnerSid)
{
  SID_IDENTIFIER_AUTHORITY WorldAuthority = {SECURITY_WORLD_SID_AUTHORITY};
  SID_IDENTIFIER_AUTHORITY LocalAuthority = {SECURITY_LOCAL_SID_AUTHORITY};
  SID_IDENTIFIER_AUTHORITY SystemAuthority = {SECURITY_NT_AUTHORITY};
  PTOKEN_GROUPS TokenGroups;
  PSID DomainSid;
  PSID Sid;
  LUID Luid;
  NTSTATUS Status;

  Status = NtAllocateLocallyUniqueId(&Luid);
  if (!NT_SUCCESS(Status))
    {
      return NULL;
    }

  if (!SamGetDomainSid(&DomainSid))
    {
      return NULL;
    }

  TokenGroups = RtlAllocateHeap(GetProcessHeap(), 0,
                                sizeof(TOKEN_GROUPS) +
                                8 * sizeof(SID_AND_ATTRIBUTES));
  if (TokenGroups == NULL)
    {
      RtlFreeHeap (RtlGetProcessHeap (),
		   0,
		   DomainSid);
      return NULL;
    }

  TokenGroups->GroupCount = 8;

  Sid = AppendRidToSid(DomainSid,
                       DOMAIN_GROUP_RID_USERS);

  RtlFreeHeap(RtlGetProcessHeap(),
	      0,
	      DomainSid);

  TokenGroups->Groups[0].Sid = Sid;
  TokenGroups->Groups[0].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;
  *PrimaryGroupSid = Sid;


  RtlAllocateAndInitializeSid(&WorldAuthority,
			      1,
			      SECURITY_WORLD_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[1].Sid = Sid;
  TokenGroups->Groups[1].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;


  RtlAllocateAndInitializeSid(&SystemAuthority,
			      2,
			      SECURITY_BUILTIN_DOMAIN_RID,
			      DOMAIN_ALIAS_RID_ADMINS,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[2].Sid = Sid;
  TokenGroups->Groups[2].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;

  *OwnerSid = Sid;

  RtlAllocateAndInitializeSid(&SystemAuthority,
			      2,
			      SECURITY_BUILTIN_DOMAIN_RID,
			      DOMAIN_ALIAS_RID_USERS,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[3].Sid = Sid;
  TokenGroups->Groups[3].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;

  /* Logon SID */
  RtlAllocateAndInitializeSid(&SystemAuthority,
			      SECURITY_LOGON_IDS_RID_COUNT,
			      SECURITY_LOGON_IDS_RID,
			      Luid.HighPart,
			      Luid.LowPart,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[4].Sid = Sid;
  TokenGroups->Groups[4].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY | SE_GROUP_LOGON_ID;

  RtlAllocateAndInitializeSid(&LocalAuthority,
			      1,
			      SECURITY_LOCAL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[5].Sid = Sid;
  TokenGroups->Groups[5].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;

  RtlAllocateAndInitializeSid(&SystemAuthority,
			      1,
			      SECURITY_INTERACTIVE_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[6].Sid = Sid;
  TokenGroups->Groups[6].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;

  RtlAllocateAndInitializeSid(&SystemAuthority,
			      1,
			      SECURITY_AUTHENTICATED_USER_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &Sid);

  TokenGroups->Groups[7].Sid = Sid;
  TokenGroups->Groups[7].Attributes = SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_MANDATORY;

  return TokenGroups;
}


static VOID
FreeGroupSids(PTOKEN_GROUPS TokenGroups)
{
  ULONG i;

  for (i = 0; i < TokenGroups->GroupCount; i++)
    {
       if (TokenGroups->Groups[i].Sid != NULL)
         RtlFreeHeap(GetProcessHeap(), 0, TokenGroups->Groups[i].Sid);
    }

  RtlFreeHeap(GetProcessHeap(), 0, TokenGroups);
}


/*
 * @unimplemented
 */
BOOL STDCALL
LogonUserW (LPWSTR lpszUsername,
	    LPWSTR lpszDomain,
	    LPWSTR lpszPassword,
	    DWORD dwLogonType,
	    DWORD dwLogonProvider,
	    PHANDLE phToken)
{
  /* FIXME shouldn't use hard-coded list of privileges */
  static struct
    {
      LPCWSTR PrivName;
      DWORD Attributes;
    }
  DefaultPrivs[] =
    {
      { L"SeUnsolicitedInputPrivilege", 0 },
      { L"SeMachineAccountPrivilege", 0 },
      { L"SeSecurityPrivilege", 0 },
      { L"SeTakeOwnershipPrivilege", 0 },
      { L"SeLoadDriverPrivilege", 0 },
      { L"SeSystemProfilePrivilege", 0 },
      { L"SeSystemtimePrivilege", 0 },
      { L"SeProfileSingleProcessPrivilege", 0 },
      { L"SeIncreaseBasePriorityPrivilege", 0 },
      { L"SeCreatePagefilePrivilege", 0 },
      { L"SeBackupPrivilege", 0 },
      { L"SeRestorePrivilege", 0 },
      { L"SeShutdownPrivilege", 0 },
      { L"SeDebugPrivilege", 0 },
      { L"SeSystemEnvironmentPrivilege", 0 },
      { L"SeChangeNotifyPrivilege", SE_PRIVILEGE_ENABLED | SE_PRIVILEGE_ENABLED_BY_DEFAULT },
      { L"SeRemoteShutdownPrivilege", 0 },
      { L"SeUndockPrivilege", 0 },
      { L"SeEnableDelegationPrivilege", 0 },
      { L"SeImpersonatePrivilege", SE_PRIVILEGE_ENABLED | SE_PRIVILEGE_ENABLED_BY_DEFAULT },
      { L"SeCreateGlobalPrivilege", SE_PRIVILEGE_ENABLED | SE_PRIVILEGE_ENABLED_BY_DEFAULT }
    };
  OBJECT_ATTRIBUTES ObjectAttributes;
  SECURITY_QUALITY_OF_SERVICE Qos;
  TOKEN_USER TokenUser;
  TOKEN_OWNER TokenOwner;
  TOKEN_PRIMARY_GROUP TokenPrimaryGroup;
  PTOKEN_GROUPS TokenGroups;
  PTOKEN_PRIVILEGES TokenPrivileges;
  TOKEN_DEFAULT_DACL TokenDefaultDacl;
  LARGE_INTEGER ExpirationTime;
  LUID AuthenticationId;
  TOKEN_SOURCE TokenSource;
  PSID UserSid = NULL;
  PSID PrimaryGroupSid = NULL;
  PSID OwnerSid = NULL;
  PSID LocalSystemSid;
  PACL Dacl;
  NTSTATUS Status;
  SID_IDENTIFIER_AUTHORITY SystemAuthority = {SECURITY_NT_AUTHORITY};
  unsigned i;

  Qos.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
  Qos.ImpersonationLevel = SecurityAnonymous;
  Qos.ContextTrackingMode = SECURITY_STATIC_TRACKING;
  Qos.EffectiveOnly = FALSE;

  ObjectAttributes.Length = sizeof(OBJECT_ATTRIBUTES);
  ObjectAttributes.RootDirectory = NULL;
  ObjectAttributes.ObjectName = NULL;
  ObjectAttributes.Attributes = 0;
  ObjectAttributes.SecurityDescriptor = NULL;
  ObjectAttributes.SecurityQualityOfService = &Qos;

  Status = NtAllocateLocallyUniqueId(&AuthenticationId);
  if (!NT_SUCCESS(Status))
    {
      return FALSE;
    }
  ExpirationTime.QuadPart = -1;

  /* Get the user SID from the registry */
  if (!SamGetUserSid (lpszUsername, &UserSid))
    {
      DPRINT ("SamGetUserSid() failed\n");
      RtlAllocateAndInitializeSid (&SystemAuthority,
				   5,
				   SECURITY_NT_NON_UNIQUE,
				   0x12345678,
				   0x12345678,
				   0x12345678,
				   DOMAIN_USER_RID_ADMIN,
				   SECURITY_NULL_RID,
				   SECURITY_NULL_RID,
				   SECURITY_NULL_RID,
				   &UserSid);
    }

  TokenUser.User.Sid = UserSid;
  TokenUser.User.Attributes = 0;

  /* Allocate and initialize token groups */
  TokenGroups = AllocateGroupSids(&PrimaryGroupSid,
				  &OwnerSid);
  if (NULL == TokenGroups)
    {
      RtlFreeSid(UserSid);
      SetLastError(ERROR_OUTOFMEMORY);
      return FALSE;
    }

  /* Allocate and initialize token privileges */
  TokenPrivileges = RtlAllocateHeap(GetProcessHeap(), 0,
                                    sizeof(TOKEN_PRIVILEGES)
                                    + sizeof(DefaultPrivs) / sizeof(DefaultPrivs[0])
                                      * sizeof(LUID_AND_ATTRIBUTES));
  if (NULL == TokenPrivileges)
    {
      FreeGroupSids(TokenGroups);
      RtlFreeSid(UserSid);
      SetLastError(ERROR_OUTOFMEMORY);
      return FALSE;
    }

  TokenPrivileges->PrivilegeCount = 0;
  for (i = 0; i < sizeof(DefaultPrivs) / sizeof(DefaultPrivs[0]); i++)
    {
      if (! LookupPrivilegeValueW(NULL, DefaultPrivs[i].PrivName,
                                  &TokenPrivileges->Privileges[TokenPrivileges->PrivilegeCount].Luid))
        {
          DPRINT1("Can't set privilege %S\n", DefaultPrivs[i].PrivName);
        }
      else
        {
          TokenPrivileges->Privileges[TokenPrivileges->PrivilegeCount].Attributes = DefaultPrivs[i].Attributes;
          TokenPrivileges->PrivilegeCount++;
        }
    }

  TokenOwner.Owner = OwnerSid;
  TokenPrimaryGroup.PrimaryGroup = PrimaryGroupSid;


  Dacl = RtlAllocateHeap(GetProcessHeap(), 0, 1024);
  if (Dacl == NULL)
    {
      FreeGroupSids(TokenGroups);
      RtlFreeSid(UserSid);
      SetLastError(ERROR_OUTOFMEMORY);
      return FALSE;
    }

  Status = RtlCreateAcl(Dacl, 1024, ACL_REVISION);
  if (!NT_SUCCESS(Status))
    {
      RtlFreeHeap(GetProcessHeap(), 0, Dacl);
      FreeGroupSids(TokenGroups);
      RtlFreeHeap(GetProcessHeap(), 0, TokenPrivileges);
      RtlFreeSid(UserSid);
      return FALSE;
    }

  RtlAddAccessAllowedAce(Dacl,
			 ACL_REVISION,
			 GENERIC_ALL,
			 OwnerSid);

  RtlAllocateAndInitializeSid(&SystemAuthority,
			      1,
			      SECURITY_LOCAL_SYSTEM_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      SECURITY_NULL_RID,
			      &LocalSystemSid);

  /* SID: S-1-5-18 */
  RtlAddAccessAllowedAce(Dacl,
			 ACL_REVISION,
			 GENERIC_ALL,
			 LocalSystemSid);

  RtlFreeSid(LocalSystemSid);

  TokenDefaultDacl.DefaultDacl = Dacl;

  memcpy(TokenSource.SourceName,
	 "User32  ",
	 8);
  Status = NtAllocateLocallyUniqueId(&TokenSource.SourceIdentifier);
  if (!NT_SUCCESS(Status))
    {
      RtlFreeHeap(GetProcessHeap(), 0, Dacl);
      FreeGroupSids(TokenGroups);
      RtlFreeHeap(GetProcessHeap(), 0, TokenPrivileges);
      RtlFreeSid(UserSid);
      return FALSE;
    }

  Status = NtCreateToken(phToken,
			 TOKEN_ALL_ACCESS,
			 &ObjectAttributes,
			 TokenPrimary,
			 &AuthenticationId,
			 &ExpirationTime,
			 &TokenUser,
			 TokenGroups,
			 TokenPrivileges,
			 &TokenOwner,
			 &TokenPrimaryGroup,
			 &TokenDefaultDacl,
			 &TokenSource);

  RtlFreeHeap(GetProcessHeap(), 0, Dacl);
  FreeGroupSids(TokenGroups);
  RtlFreeHeap(GetProcessHeap(), 0, TokenPrivileges);
  RtlFreeSid(UserSid);

  return NT_SUCCESS(Status);
}

/* EOF */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -