Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
573db9ef
Commit
573db9ef
authored
Aug 23, 2011
by
Nikolay Sivov
Committed by
Alexandre Julliard
Aug 23, 2011
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
ntdll: While requesting TokenGroups calculate required user buffer size in server.
parent
18549f33
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
67 additions
and
58 deletions
+67
-58
security.c
dlls/advapi32/tests/security.c
+18
-0
nt.c
dlls/ntdll/nt.c
+35
-55
token.c
server/token.c
+14
-3
No files found.
dlls/advapi32/tests/security.c
View file @
573db9ef
...
@@ -1442,6 +1442,24 @@ static void test_token_attr(void)
...
@@ -1442,6 +1442,24 @@ static void test_token_attr(void)
ok
(
ret
,
"OpenProcessToken failed with error %d
\n
"
,
GetLastError
());
ok
(
ret
,
"OpenProcessToken failed with error %d
\n
"
,
GetLastError
());
/* groups */
/* groups */
/* insufficient buffer length */
SetLastError
(
0xdeadbeef
);
Size2
=
0
;
ret
=
GetTokenInformation
(
Token
,
TokenGroups
,
NULL
,
0
,
&
Size2
);
ok
(
Size2
>
1
,
"got %d
\n
"
,
Size2
);
ok
(
!
ret
&&
GetLastError
()
==
ERROR_INSUFFICIENT_BUFFER
,
"%d with error %d
\n
"
,
ret
,
GetLastError
());
Size2
-=
1
;
Groups
=
HeapAlloc
(
GetProcessHeap
(),
0
,
Size2
);
memset
(
Groups
,
0xcc
,
Size2
);
Size
=
0
;
ret
=
GetTokenInformation
(
Token
,
TokenGroups
,
Groups
,
Size2
,
&
Size
);
ok
(
Size
>
1
,
"got %d
\n
"
,
Size
);
ok
(
!
ret
&&
GetLastError
()
==
ERROR_INSUFFICIENT_BUFFER
,
"%d with error %d
\n
"
,
ret
,
GetLastError
());
ok
(
*
((
BYTE
*
)
Groups
)
==
0xcc
,
"buffer altered
\n
"
);
HeapFree
(
GetProcessHeap
(),
0
,
Groups
);
SetLastError
(
0xdeadbeef
);
SetLastError
(
0xdeadbeef
);
ret
=
GetTokenInformation
(
Token
,
TokenGroups
,
NULL
,
0
,
&
Size
);
ret
=
GetTokenInformation
(
Token
,
TokenGroups
,
NULL
,
0
,
&
Size
);
ok
(
!
ret
&&
GetLastError
()
==
ERROR_INSUFFICIENT_BUFFER
,
ok
(
!
ret
&&
GetLastError
()
==
ERROR_INSUFFICIENT_BUFFER
,
...
...
dlls/ntdll/nt.c
View file @
573db9ef
...
@@ -320,68 +320,48 @@ NTSTATUS WINAPI NtQueryInformationToken(
...
@@ -320,68 +320,48 @@ NTSTATUS WINAPI NtQueryInformationToken(
break
;
break
;
case
TokenGroups
:
case
TokenGroups
:
{
{
char
stack_buffer
[
256
];
void
*
buffer
;
unsigned
int
server_buf_len
=
sizeof
(
stack_buffer
);
void
*
buffer
=
stack_buffer
;
/* reply buffer is always shorter than output one */
BOOLEAN
need_more_memory
;
buffer
=
tokeninfolength
?
RtlAllocateHeap
(
GetProcessHeap
(),
0
,
tokeninfolength
)
:
NULL
;
/* we cannot work out the size of the server buffer required for the
SERVER_START_REQ
(
get_token_groups
)
* input size, since there are two factors affecting how much can be
* stored in the buffer - number of groups and lengths of sids */
do
{
{
need_more_memory
=
FALSE
;
TOKEN_GROUPS
*
groups
=
tokeninfo
;
SERVER_START_REQ
(
get_token_groups
)
req
->
handle
=
wine_server_obj_handle
(
token
);
wine_server_set_reply
(
req
,
buffer
,
tokeninfolength
);
status
=
wine_server_call
(
req
);
if
(
status
==
STATUS_BUFFER_TOO_SMALL
)
{
{
TOKEN_GROUPS
*
groups
=
tokeninfo
;
if
(
retlen
)
*
retlen
=
reply
->
user_len
;
}
req
->
handle
=
wine_server_obj_handle
(
token
);
else
if
(
status
==
STATUS_SUCCESS
)
wine_server_set_reply
(
req
,
buffer
,
server_buf_len
);
{
status
=
wine_server_call
(
req
);
struct
token_groups
*
tg
=
buffer
;
if
(
status
==
STATUS_BUFFER_TOO_SMALL
)
unsigned
int
*
attr
=
(
unsigned
int
*
)(
tg
+
1
);
{
ULONG
i
;
if
(
buffer
==
stack_buffer
)
const
int
non_sid_portion
=
(
sizeof
(
struct
token_groups
)
+
tg
->
count
*
sizeof
(
unsigned
int
));
buffer
=
RtlAllocateHeap
(
GetProcessHeap
(),
0
,
reply
->
user_len
);
SID
*
sids
=
(
SID
*
)((
char
*
)
tokeninfo
+
FIELD_OFFSET
(
TOKEN_GROUPS
,
Groups
[
tg
->
count
]
));
else
buffer
=
RtlReAllocateHeap
(
GetProcessHeap
(),
0
,
buffer
,
reply
->
user_len
);
if
(
!
buffer
)
return
STATUS_NO_MEMORY
;
server_buf_len
=
reply
->
user_len
;
need_more_memory
=
TRUE
;
}
else
if
(
status
==
STATUS_SUCCESS
)
{
struct
token_groups
*
tg
=
buffer
;
unsigned
int
*
attr
=
(
unsigned
int
*
)(
tg
+
1
);
ULONG
i
;
const
int
non_sid_portion
=
(
sizeof
(
struct
token_groups
)
+
tg
->
count
*
sizeof
(
unsigned
int
));
SID
*
sids
=
(
SID
*
)((
char
*
)
tokeninfo
+
FIELD_OFFSET
(
TOKEN_GROUPS
,
Groups
[
tg
->
count
]
));
ULONG
needed_bytes
=
FIELD_OFFSET
(
TOKEN_GROUPS
,
Groups
[
tg
->
count
]
)
+
reply
->
user_len
-
non_sid_portion
;
if
(
retlen
)
*
retlen
=
needed_bytes
;
if
(
retlen
)
*
retlen
=
reply
->
user_len
;
if
(
needed_bytes
<=
tokeninfolength
)
groups
->
GroupCount
=
tg
->
count
;
{
memcpy
(
sids
,
(
char
*
)
buffer
+
non_sid_portion
,
groups
->
GroupCount
=
tg
->
count
;
reply
->
user_len
-
non_sid_portion
-
FIELD_OFFSET
(
TOKEN_GROUPS
,
Groups
[
tg
->
count
]
));
memcpy
(
sids
,
(
char
*
)
buffer
+
non_sid_portion
,
reply
->
user_len
-
non_sid_portion
);
for
(
i
=
0
;
i
<
tg
->
count
;
i
++
)
for
(
i
=
0
;
i
<
tg
->
count
;
i
++
)
{
{
groups
->
Groups
[
i
].
Attributes
=
attr
[
i
];
groups
->
Groups
[
i
].
Attributes
=
attr
[
i
];
groups
->
Groups
[
i
].
Sid
=
sids
;
groups
->
Groups
[
i
].
Sid
=
sids
;
sids
=
(
SID
*
)((
char
*
)
sids
+
RtlLengthSid
(
sids
));
sids
=
(
SID
*
)((
char
*
)
sids
+
RtlLengthSid
(
sids
));
}
}
else
status
=
STATUS_BUFFER_TOO_SMALL
;
}
}
else
if
(
retlen
)
*
retlen
=
0
;
}
}
else
if
(
retlen
)
*
retlen
=
0
;
SERVER_END_REQ
;
}
}
while
(
need_more_memory
);
SERVER_END_REQ
;
if
(
buffer
!=
stack_buffer
)
RtlFreeHeap
(
GetProcessHeap
(),
0
,
buffer
);
RtlFreeHeap
(
GetProcessHeap
(),
0
,
buffer
);
break
;
break
;
}
}
case
TokenPrimaryGroup
:
case
TokenPrimaryGroup
:
...
...
server/token.c
View file @
573db9ef
...
@@ -1295,19 +1295,30 @@ DECL_HANDLER(get_token_groups)
...
@@ -1295,19 +1295,30 @@ DECL_HANDLER(get_token_groups)
&
token_ops
)))
&
token_ops
)))
{
{
size_t
size_needed
=
sizeof
(
struct
token_groups
);
size_t
size_needed
=
sizeof
(
struct
token_groups
);
size_t
sid_size
=
0
;
unsigned
int
group_count
=
0
;
unsigned
int
group_count
=
0
;
const
struct
group
*
group
;
const
struct
group
*
group
;
LIST_FOR_EACH_ENTRY
(
group
,
&
token
->
groups
,
const
struct
group
,
entry
)
LIST_FOR_EACH_ENTRY
(
group
,
&
token
->
groups
,
const
struct
group
,
entry
)
{
{
group_count
++
;
group_count
++
;
si
ze_needed
+=
FIELD_OFFSET
(
SID
,
SubAuthority
[
group
->
sid
.
SubAuthorityCount
]);
si
d_size
+=
FIELD_OFFSET
(
SID
,
SubAuthority
[
group
->
sid
.
SubAuthorityCount
]);
}
}
size_needed
+=
sid_size
;
/* attributes size */
size_needed
+=
sizeof
(
unsigned
int
)
*
group_count
;
size_needed
+=
sizeof
(
unsigned
int
)
*
group_count
;
reply
->
user_len
=
size_needed
;
/* reply buffer contains size_needed bytes formatted as:
if
(
size_needed
<=
get_reply_max_size
())
unsigned int count;
unsigned int attrib[count];
char sid_data[];
user_len includes extra data needed for TOKEN_GROUPS representation,
required caller buffer size calculated here to avoid extra server call */
reply
->
user_len
=
FIELD_OFFSET
(
TOKEN_GROUPS
,
Groups
[
group_count
]
)
+
sid_size
;
if
(
reply
->
user_len
<=
get_reply_max_size
())
{
{
struct
token_groups
*
tg
=
set_reply_data_size
(
size_needed
);
struct
token_groups
*
tg
=
set_reply_data_size
(
size_needed
);
if
(
tg
)
if
(
tg
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment