Re: [PATCH] wincred: improve compatibility with windows versions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jan 4, 2013 at 9:28 PM, Karsten Blees <karsten.blees@xxxxxxxxx> wrote:
> On WinXP, the windows credential helper doesn't work at all (due to missing
> Cred[Un]PackAuthenticationBuffer APIs). On Win7, the credential format used
> by wincred is incompatible with native Windows tools (such as the control
> panel applet or 'cmdkey.exe /generic'). These Windows tools only set the
> TargetName, UserName and CredentialBlob members of the CREDENTIAL
> structure (where CredentialBlob is the UTF-16-encoded password).
>
> Remove the unnecessary packing / unpacking of the password, along with the
> related API definitions, for compatibility with Windows XP.
>
> Don't use CREDENTIAL_ATTRIBUTEs to identify credentials for compatibility
> with Windows credential manager tools. Parse the protocol, username, host
> and path fields from the credential's target name instead.
>
> While we're at it, optionally accept CRLF (instead of LF only) to simplify
> debugging in bash / cmd.
>
> Signed-off-by: Karsten Blees <blees@xxxxxxx>
> ---
>
> Hi,
>
> I tried the windows credential helper yesterday and found that it doesn't work on XP at all, and doesn't work properly in combination with Win7 credential manager tools. So here's a patch that reduces it to the functionality provided / expected by Windows.
>
> @Erik, Jeff: Please let me know if I'm missing something and the use of Cred[Un]PackAuthenticationBuffer or CREDENTIAL_ATTRIBUTEs actually served a useful purpose.
>

The only reason why I used Cred[Un]PackAuthenticationBuffer, were that
I wasn't aware that it was possible any other way. I didn't even know
there was a Windows Credential Manager in Windows XP.

The credential attributes were because they were convenient, and I'm
not sure I understand what you mean about the Win7 credential manager
tools. I did test my code with it - in fact, it was a very useful tool
for debugging the helper.

Are you referring to the credentials not *looking* like normal
HTTP-credentials? If so, I simply didn't see that as a goal. Why would
it be? Compatibility with IE? We already lose that with our "git:"
prefix in the target, no? Perhaps we can lose the "git:"-prefix, and
gain IE-compatibility when the protocol matches?

But, if we do any of these changes, does this mean I will lose my
existing credentials? It's probably not a big deal, but it's worth a
mention, isn't it?

> @@ -67,20 +61,14 @@ typedef struct _CREDENTIALW {
>  #define CRED_MAX_ATTRIBUTES 64
>
>  typedef BOOL (WINAPI *CredWriteWT)(PCREDENTIALW, DWORD);
> -typedef BOOL (WINAPI *CredUnPackAuthenticationBufferWT)(DWORD, PVOID, DWORD,
> -    LPWSTR, DWORD *, LPWSTR, DWORD *, LPWSTR, DWORD *);
>  typedef BOOL (WINAPI *CredEnumerateWT)(LPCWSTR, DWORD, DWORD *,
>      PCREDENTIALW **);
> -typedef BOOL (WINAPI *CredPackAuthenticationBufferWT)(DWORD, LPWSTR, LPWSTR,
> -    PBYTE, DWORD *);
>  typedef VOID (WINAPI *CredFreeT)(PVOID);
>  typedef BOOL (WINAPI *CredDeleteWT)(LPCWSTR, DWORD, DWORD);
>
>  static HMODULE advapi, credui;

Perhaps get rid of credui also?

>  static CredWriteWT CredWriteW;
> -static CredUnPackAuthenticationBufferWT CredUnPackAuthenticationBufferW;
>  static CredEnumerateWT CredEnumerateW;
> -static CredPackAuthenticationBufferWT CredPackAuthenticationBufferW;
>  static CredFreeT CredFree;
>  static CredDeleteWT CredDeleteW;
>
> @@ -88,74 +76,64 @@ static void load_cred_funcs(void)
>  {
>         /* load DLLs */
>         advapi = LoadLibrary("advapi32.dll");
> -       credui = LoadLibrary("credui.dll");
> -       if (!advapi || !credui)
> +       if (!advapi)
>                 die("failed to load DLLs");

It's not multiple DLLs any more, so perhaps "failed to load
advapi32.dll" instead?

> -static char target_buf[1024];
> -static char *protocol, *host, *path, *username;
> -static WCHAR *wusername, *password, *target;
> +static WCHAR *wusername, *password, *protocol, *host, *path, target[1024];
>
> -static void write_item(const char *what, WCHAR *wbuf)
> +static void write_item(const char *what, LPCWSTR wbuf, int wlen)
>  {
>         char *buf;
> -       int len = WideCharToMultiByte(CP_UTF8, 0, wbuf, -1, NULL, 0, NULL,
> +       int len = WideCharToMultiByte(CP_UTF8, 0, wbuf, wlen, NULL, 0, NULL,
>             FALSE);
>         buf = xmalloc(len);
>
> -       if (!WideCharToMultiByte(CP_UTF8, 0, wbuf, -1, buf, len, NULL, FALSE))
> +       if (!WideCharToMultiByte(CP_UTF8, 0, wbuf, wlen, buf, len, NULL, FALSE))
>                 die("WideCharToMultiByte failed!");
>
>         printf("%s=", what);
> -       fwrite(buf, 1, len - 1, stdout);
> +       fwrite(buf, 1, len, stdout);
>         putchar('\n');
>         free(buf);
>  }
>

When the password-blob is simply UTF-16 encoded, are the
zero-termination not included? That's the reason for this change,
right?

> -static int match_attr(const CREDENTIALW *cred, const WCHAR *keyword,
> -    const char *want)
> +static int match_part(LPCWSTR *ptarget, LPCWSTR want, LPCWSTR delim)
>  {
> -       int i;
> -       if (!want)
> -               return 1;
> -
> -       for (i = 0; i < cred->AttributeCount; ++i)
> -               if (!wcscmp(cred->Attributes[i].Keyword, keyword))
> -                       return !strcmp((const char *)cred->Attributes[i].Value,
> -                           want);
> -
> -       return 0; /* not found */
> +       LPCWSTR start = *ptarget;
> +       LPCWSTR end = *delim ? wcsstr(start, delim) : start + wcslen(start);
> +       int len = end ? end - start : wcslen(start);
> +       /* update ptarget if we either found a delimiter or need a match */
> +       if (end || want)
> +               *ptarget = end ? end + wcslen(delim) : start + len;
> +       return !want || (!wcsncmp(want, start, len) && !want[len]);
>  }
>

I'm a bit tired now, but I'm having a hard time reading this code.
Right now it seems it's a bit too ternary-expression heavy for my
taste, though.

>  static int match_cred(const CREDENTIALW *cred)
>  {
> -       return (!wusername || !wcscmp(wusername, cred->UserName)) &&
> -           match_attr(cred, L"git_protocol", protocol) &&
> -           match_attr(cred, L"git_host", host) &&
> -           match_attr(cred, L"git_path", path);
> +       LPCWSTR target = cred->TargetName;
> +       if (wusername && wcscmp(wusername, cred->UserName))
> +               return 0;
> +
> +       return match_part(&target, L"git", L":") &&
> +               match_part(&target, protocol, L"://") &&
> +               match_part(&target, wusername, L"@") &&
> +               match_part(&target, host, L"/") &&
> +               match_part(&target, path, L"");
>  }
>

Ugh, it feels a bit wrong to store and verify the username twice. Do
we really have to?

The target needs to be unique, even if two different usernames are
stored for the same site under the same conditions. So probably. It
just doesn't feel quite right.

> @@ -165,44 +143,15 @@ static void get_credential(void)
>         /* search for the first credential that matches username */
>         for (i = 0; i < num_creds; ++i)
>                 if (match_cred(creds[i])) {
> -                       cred = creds[i];
> +                       write_item("username", creds[i]->UserName,
> +                               wcslen(creds[i]->UserName));
> +                       write_item("password",
> +                               (LPCWSTR)creds[i]->CredentialBlob,
> +                               creds[i]->CredentialBlobSize / sizeof(WCHAR));
>                         break;
>                 }
> -       if (!cred)
> -               return;
> -
> -       CredUnPackAuthenticationBufferW(0, cred->CredentialBlob,
> -           cred->CredentialBlobSize, NULL, &user_buf_size, NULL, NULL,
> -           NULL, &pass_buf_size);
> -
> -       user_buf = xmalloc(user_buf_size * sizeof(WCHAR));
> -       pass_buf = xmalloc(pass_buf_size * sizeof(WCHAR));
> -
> -       if (!CredUnPackAuthenticationBufferW(0, cred->CredentialBlob,
> -           cred->CredentialBlobSize, user_buf, &user_buf_size, NULL, NULL,
> -           pass_buf, &pass_buf_size))
> -               die("CredUnPackAuthenticationBuffer failed");
>
>         CredFree(creds);
> -
> -       /* zero-terminate (sizes include zero-termination) */
> -       user_buf[user_buf_size - 1] = L'\0';
> -       pass_buf[pass_buf_size - 1] = L'\0';
> -
> -       write_item("username", user_buf);
> -       write_item("password", pass_buf);
> -
> -       free(user_buf);
> -       free(pass_buf);
> -}

Nice!

> -
> -static void write_attr(CREDENTIAL_ATTRIBUTEW *attr, const WCHAR *keyword,
> -    const char *value)
> -{
> -       attr->Keyword = (LPWSTR)keyword;
> -       attr->Flags = 0;
> -       attr->ValueSize = strlen(value) + 1; /* store zero-termination */
> -       attr->Value = (LPBYTE)value;
>  }
>
>  static void store_credential(void)
> @@ -215,40 +164,18 @@ static void store_credential(void)
>         if (!wusername || !password)
>                 return;
>
> -       /* query buffer size */
> -       CredPackAuthenticationBufferW(0, wusername, password,
> -           NULL, &auth_buf_size);
> -
> -       auth_buf = xmalloc(auth_buf_size);
> -
> -       if (!CredPackAuthenticationBufferW(0, wusername, password,
> -           auth_buf, &auth_buf_size))
> -               die("CredPackAuthenticationBuffer failed");
> -
>         cred.Flags = 0;
>         cred.Type = CRED_TYPE_GENERIC;
>         cred.TargetName = target;
>         cred.Comment = L"saved by git-credential-wincred";
> -       cred.CredentialBlobSize = auth_buf_size;
> -       cred.CredentialBlob = auth_buf;
> +       cred.CredentialBlobSize = (wcslen(password)) * sizeof(WCHAR);
> +       cred.CredentialBlob = (LPVOID)password;
>         cred.Persist = CRED_PERSIST_LOCAL_MACHINE;
> -       cred.AttributeCount = 1;
> -       cred.Attributes = attrs;
> +       cred.AttributeCount = 0;
> +       cred.Attributes = NULL;
>         cred.TargetAlias = NULL;
>         cred.UserName = wusername;
>
> -       write_attr(attrs, L"git_protocol", protocol);
> -
> -       if (host) {
> -               write_attr(attrs + cred.AttributeCount, L"git_host", host);
> -               cred.AttributeCount++;
> -       }
> -
> -       if (path) {
> -               write_attr(attrs + cred.AttributeCount, L"git_path", path);
> -               cred.AttributeCount++;
> -       }
> -
>         if (!CredWriteW(&cred, 0))
>                 die("CredWrite failed");
>  }

Nice.

> @@ -284,10 +211,13 @@ static void read_credential(void)
>
>         while (fgets(buf, sizeof(buf), stdin)) {
>                 char *v;
> +               int len = strlen(buf);
> +               /* strip trailing CR / LF */
> +               while (len && strchr("\r\n", buf[len - 1]))
> +                       buf[--len] = 0;
>
> -               if (!strcmp(buf, "\n"))
> +               if (!*buf)
>                         break;
> -               buf[strlen(buf)-1] = '\0';
>
>                 v = strchr(buf, '=');
>                 if (!v)

I think this part deserves a separate patch, no?

> @@ -295,13 +225,12 @@ static void read_credential(void)
>                 *v++ = '\0';
>
>                 if (!strcmp(buf, "protocol"))
> -                       protocol = xstrdup(v);
> +                       protocol = utf8_to_utf16_dup(v);
>                 else if (!strcmp(buf, "host"))
> -                       host = xstrdup(v);
> +                       host = utf8_to_utf16_dup(v);
>                 else if (!strcmp(buf, "path"))
> -                       path = xstrdup(v);
> +                       path = utf8_to_utf16_dup(v);
>                 else if (!strcmp(buf, "username")) {
> -                       username = xstrdup(v);
>                         wusername = utf8_to_utf16_dup(v);
>                 } else if (!strcmp(buf, "password"))
>                         password = utf8_to_utf16_dup(v);

So, you need the strings as UTF-16 instead so you can match against them...

> @@ -330,22 +259,20 @@ int main(int argc, char *argv[])
>                 return 0;
>
>         /* prepare 'target', the unique key for the credential */
> -       strncat(target_buf, "git:", sizeof(target_buf));
> -       strncat(target_buf, protocol, sizeof(target_buf));
> -       strncat(target_buf, "://", sizeof(target_buf));
> -       if (username) {
> -               strncat(target_buf, username, sizeof(target_buf));
> -               strncat(target_buf, "@", sizeof(target_buf));
> +       wcscpy(target, L"git:");
> +       wcsncat(target, protocol, ARRAY_SIZE(target));
> +       wcsncat(target, L"://", ARRAY_SIZE(target));
> +       if (wusername) {
> +               wcsncat(target, wusername, ARRAY_SIZE(target));
> +               wcsncat(target, L"@", ARRAY_SIZE(target));
>         }
>         if (host)
> -               strncat(target_buf, host, sizeof(target_buf));
> +               wcsncat(target, host, ARRAY_SIZE(target));
>         if (path) {
> -               strncat(target_buf, "/", sizeof(target_buf));
> -               strncat(target_buf, path, sizeof(target_buf));
> +               wcsncat(target, L"/", ARRAY_SIZE(target));
> +               wcsncat(target, path, ARRAY_SIZE(target));
>         }
>
> -       target = utf8_to_utf16_dup(target_buf);
> -

...Which means that you are composing a UTF-16 target directly rather
than ASCII. Looks sane.
--
To unsubscribe from this list: send the line "unsubscribe git" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]