Hans Leidekker : mountmgr: Add ioctl to enumerate host credentials on macOS.
Alexandre Julliard
julliard at winehq.org
Thu Sep 3 15:26:47 CDT 2020
Module: wine
Branch: master
Commit: bf9ae672754c3dc2480d0042df619ba87f8ed1da
URL: https://source.winehq.org/git/wine.git/?a=commit;h=bf9ae672754c3dc2480d0042df619ba87f8ed1da
Author: Hans Leidekker <hans at codeweavers.com>
Date: Thu Sep 3 14:59:08 2020 +0200
mountmgr: Add ioctl to enumerate host credentials on macOS.
Signed-off-by: Hans Leidekker <hans at codeweavers.com>
Signed-off-by: Alexandre Julliard <julliard at winehq.org>
---
dlls/mountmgr.sys/device.c | 2 +-
dlls/mountmgr.sys/mountmgr.c | 142 +++++++++++++++++++++++++++++++++++++++++++
dlls/mountmgr.sys/mountmgr.h | 2 +
include/ddk/mountmgr.h | 10 +++
4 files changed, 155 insertions(+), 1 deletion(-)
diff --git a/dlls/mountmgr.sys/device.c b/dlls/mountmgr.sys/device.c
index 97208da481..ccb0685ced 100644
--- a/dlls/mountmgr.sys/device.c
+++ b/dlls/mountmgr.sys/device.c
@@ -159,7 +159,7 @@ static char *strdupA( const char *str )
return ret;
}
-static WCHAR *strdupW( const WCHAR *str )
+WCHAR *strdupW( const WCHAR *str )
{
WCHAR *ret;
diff --git a/dlls/mountmgr.sys/mountmgr.c b/dlls/mountmgr.sys/mountmgr.c
index 95b11d864a..54ba2857e0 100644
--- a/dlls/mountmgr.sys/mountmgr.c
+++ b/dlls/mountmgr.sys/mountmgr.c
@@ -836,6 +836,137 @@ static NTSTATUS delete_credential( void *buff, SIZE_T insize, SIZE_T outsize, IO
CFRelease( item );
return STATUS_SUCCESS;
}
+
+static BOOL match_credential( void *data, UInt32 data_len, const WCHAR *filter )
+{
+ int len;
+ WCHAR *targetname;
+ const WCHAR *p;
+ BOOL ret;
+
+ if (!*filter) return TRUE;
+
+ len = MultiByteToWideChar( CP_UTF8, 0, data, data_len, NULL, 0 );
+ if (!(targetname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) ))) return FALSE;
+ MultiByteToWideChar( CP_UTF8, 0, data, data_len, targetname, len );
+ targetname[len] = 0;
+
+ TRACE( "comparing filter %s to target name %s\n", debugstr_w(filter), debugstr_w(targetname) );
+
+ p = strchrW( filter, '*' );
+ ret = CompareStringW( GetThreadLocale(), NORM_IGNORECASE, filter,
+ (p && !p[1]) ? p - filter : -1, targetname, (p && !p[1]) ? p - filter : -1 ) == CSTR_EQUAL;
+ RtlFreeHeap( GetProcessHeap(), 0, targetname );
+ return ret;
+}
+
+static NTSTATUS search_credentials( const WCHAR *filter, struct mountmgr_credential_list *list, SIZE_T *ret_count, SIZE_T *ret_size )
+{
+ SecKeychainSearchRef search;
+ SecKeychainItemRef item;
+ int status;
+ ULONG i = 0;
+ SIZE_T data_offset, data_size = 0, size;
+ NTSTATUS ret = STATUS_NOT_FOUND;
+
+ status = SecKeychainSearchCreateFromAttributes( NULL, kSecGenericPasswordItemClass, NULL, &search );
+ if (status != noErr)
+ {
+ ERR( "SecKeychainSearchCreateFromAttributes returned status %d\n", status );
+ return STATUS_INTERNAL_ERROR;
+ }
+
+ while (SecKeychainSearchCopyNext( search, &item ) == noErr)
+ {
+ SecKeychainAttributeInfo info;
+ SecKeychainAttributeList *attr_list;
+ UInt32 info_tags[] = { kSecServiceItemAttr };
+ BOOL match;
+
+ info.count = ARRAY_SIZE(info_tags);
+ info.tag = info_tags;
+ info.format = NULL;
+ status = SecKeychainItemCopyAttributesAndData( item, &info, NULL, &attr_list, NULL, NULL );
+ if (status != noErr)
+ {
+ WARN( "SecKeychainItemCopyAttributesAndData returned status %d\n", status );
+ CFRelease( item );
+ continue;
+ }
+ if (attr_list->count != 1 || attr_list->attr[0].tag != kSecServiceItemAttr)
+ {
+ SecKeychainItemFreeAttributesAndData( attr_list, NULL );
+ CFRelease( item );
+ continue;
+ }
+ TRACE( "service item: %.*s\n", (int)attr_list->attr[0].length, (char *)attr_list->attr[0].data );
+
+ match = match_credential( attr_list->attr[0].data, attr_list->attr[0].length, filter );
+ SecKeychainItemFreeAttributesAndData( attr_list, NULL );
+ if (!match)
+ {
+ CFRelease( item );
+ continue;
+ }
+
+ if (!list) ret = fill_credential( item, FALSE, NULL, 0, 0, &size );
+ else
+ {
+ data_offset = FIELD_OFFSET( struct mountmgr_credential_list, creds[list->count] ) -
+ FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
+ ret = fill_credential( item, FALSE, &list->creds[i], data_offset, list->size - data_offset, &size );
+ }
+
+ CFRelease( item );
+ if (ret == STATUS_NOT_FOUND) continue;
+ if (ret != STATUS_SUCCESS) break;
+ data_size += size - sizeof(struct mountmgr_credential);
+ i++;
+ }
+
+ if (ret_count) *ret_count = i;
+ if (ret_size) *ret_size = FIELD_OFFSET( struct mountmgr_credential_list, creds[i] ) + data_size;
+
+ CFRelease( search );
+ return ret;
+}
+
+static NTSTATUS enumerate_credentials( void *buff, SIZE_T insize, SIZE_T outsize, IO_STATUS_BLOCK *iosb )
+{
+ struct mountmgr_credential_list *list = buff;
+ WCHAR *filter;
+ SIZE_T size, count;
+ Boolean saved_user_interaction_allowed;
+ NTSTATUS status;
+
+ if (!check_credential_string( buff, insize, list->filter_size, list->filter_offset )) return STATUS_INVALID_PARAMETER;
+ if (!(filter = strdupW( (const WCHAR *)((const char *)list + list->filter_offset) ))) return STATUS_NO_MEMORY;
+
+ SecKeychainGetUserInteractionAllowed( &saved_user_interaction_allowed );
+ SecKeychainSetUserInteractionAllowed( false );
+
+ if ((status = search_credentials( filter, NULL, &count, &size )) == STATUS_SUCCESS)
+ {
+
+ if (size > outsize)
+ {
+ if (size >= sizeof(list->size)) list->size = size;
+ iosb->Information = sizeof(list->size);
+ status = STATUS_MORE_ENTRIES;
+ }
+ else
+ {
+ list->size = size;
+ list->count = count;
+ iosb->Information = size;
+ status = search_credentials( filter, list, NULL, NULL );
+ }
+ }
+
+ SecKeychainSetUserInteractionAllowed( saved_user_interaction_allowed );
+ RtlFreeHeap( GetProcessHeap(), 0, filter );
+ return status;
+}
#endif /* __APPLE__ */
/* handler for ioctls on the mount manager device */
@@ -937,6 +1068,17 @@ static NTSTATUS WINAPI mountmgr_ioctl( DEVICE_OBJECT *device, IRP *irp )
irpsp->Parameters.DeviceIoControl.OutputBufferLength,
&irp->IoStatus );
break;
+ case IOCTL_MOUNTMGR_ENUMERATE_CREDENTIALS:
+ if (irpsp->Parameters.DeviceIoControl.InputBufferLength < sizeof(struct mountmgr_credential_list))
+ {
+ irp->IoStatus.u.Status = STATUS_INVALID_PARAMETER;
+ break;
+ }
+ irp->IoStatus.u.Status = enumerate_credentials( irp->AssociatedIrp.SystemBuffer,
+ irpsp->Parameters.DeviceIoControl.InputBufferLength,
+ irpsp->Parameters.DeviceIoControl.OutputBufferLength,
+ &irp->IoStatus );
+ break;
#endif
default:
FIXME( "ioctl %x not supported\n", irpsp->Parameters.DeviceIoControl.IoControlCode );
diff --git a/dlls/mountmgr.sys/mountmgr.h b/dlls/mountmgr.sys/mountmgr.h
index 5fb43119c6..3e4554c476 100644
--- a/dlls/mountmgr.sys/mountmgr.h
+++ b/dlls/mountmgr.sys/mountmgr.h
@@ -36,6 +36,8 @@
extern void initialize_dbus(void) DECLSPEC_HIDDEN;
extern void initialize_diskarbitration(void) DECLSPEC_HIDDEN;
+extern WCHAR *strdupW( const WCHAR * ) DECLSPEC_HIDDEN;
+
/* device functions */
enum device_type
diff --git a/include/ddk/mountmgr.h b/include/ddk/mountmgr.h
index a5aae2a085..3e4bacbb82 100644
--- a/include/ddk/mountmgr.h
+++ b/include/ddk/mountmgr.h
@@ -77,6 +77,7 @@ struct mountmgr_unix_drive
#define IOCTL_MOUNTMGR_READ_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 48, METHOD_BUFFERED, FILE_READ_ACCESS)
#define IOCTL_MOUNTMGR_WRITE_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 49, METHOD_BUFFERED, FILE_WRITE_ACCESS)
#define IOCTL_MOUNTMGR_DELETE_CREDENTIAL CTL_CODE(MOUNTMGRCONTROLTYPE, 50, METHOD_BUFFERED, FILE_WRITE_ACCESS)
+#define IOCTL_MOUNTMGR_ENUMERATE_CREDENTIALS CTL_CODE(MOUNTMGRCONTROLTYPE, 51, METHOD_BUFFERED, FILE_READ_ACCESS)
struct mountmgr_credential
{
@@ -92,6 +93,15 @@ struct mountmgr_credential
FILETIME last_written;
};
+struct mountmgr_credential_list
+{
+ ULONG size;
+ ULONG count;
+ ULONG filter_offset;
+ ULONG filter_size;
+ struct mountmgr_credential creds[1];
+};
+
#define IOCTL_MOUNTMGR_QUERY_DHCP_REQUEST_PARAMS CTL_CODE(MOUNTMGRCONTROLTYPE, 64, METHOD_BUFFERED, FILE_READ_ACCESS | FILE_WRITE_ACCESS)
struct mountmgr_dhcp_request_param
More information about the wine-cvs
mailing list