/*++ Copyright (c) 1999-2000 Microsoft Corporation Module Name: SafeIdep.c (WinSAFER Identify Objects privates) Abstract: This module implements the WinSAFER APIs that loads the names (and high-level information) of all Authorization Levels defined within a given registry context. The list of available levels is loaded into a Rtl Generic Table that can be enumerated and accessed using conventional Rtl Generic Table techniques. Author: Jeffrey Lawson (JLawson) - Nov 1999 Environment: User mode only. Exported Functions: CodeAuthzLevelObjpInitializeTable CodeAuthzLevelObjpLoadTable CodeAuthzLevelObjpEntireTableFree Revision History: Created - Nov 1999 --*/ #include "pch.h" #pragma hdrstop #include #include #include "saferp.h" PVOID NTAPI SaferpGenericTableAllocate ( IN PRTL_GENERIC_TABLE Table, IN CLONG ByteSize ) /*++ Routine Description: Internal callback for the generic table implementation. This function allocates memory for a new entry in a GENERIC_TABLE Arguments: Table - pointer to the Generic Table structure ByteSize - the size, in bytes, of the structure to allocate Return Value: Pointer to the allocated space. --*/ { UNREFERENCED_PARAMETER(Table); return (PVOID) RtlAllocateHeap(RtlProcessHeap(), 0, ByteSize); } VOID NTAPI SaferpGenericTableFree ( IN PRTL_GENERIC_TABLE Table, IN PVOID Buffer ) /*++ Routine Description: Internal callback for the generic table implementation. This function frees the space used by a GENERIC_TABLE entry. Arguments: Table - pointer to the Generic Table structure Buffer - pointer to the space to deallocate. Return Value: None. --*/ { UNREFERENCED_PARAMETER(Table); ASSERT(Buffer != NULL); RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) Buffer); } RTL_GENERIC_COMPARE_RESULTS NTAPI SaferpGuidIdentsTableCompare ( IN PRTL_GENERIC_TABLE Table, IN PVOID FirstStruct, IN PVOID SecondStruct ) /*++ Routine Description: Arguments: Return Value: --*/ { PAUTHZIDENTSTABLERECORD FirstObj = (PAUTHZIDENTSTABLERECORD) FirstStruct; PAUTHZIDENTSTABLERECORD SecondObj = (PAUTHZIDENTSTABLERECORD) SecondStruct; int result; UNREFERENCED_PARAMETER(Table); // Explicitly handle null parameters as wildcards, allowing them // to match anything. We use this for quick deletion of the table. if (FirstStruct == NULL || SecondStruct == NULL) return GenericEqual; // Compare ascending by guid. result = memcmp(&FirstObj->IdentGuid, &SecondObj->IdentGuid, sizeof(GUID)); if ( result < 0 ) return GenericLessThan; else if ( result > 0 ) return GenericGreaterThan; else return GenericEqual; } VOID NTAPI CodeAuthzGuidIdentsInitializeTable( IN OUT PRTL_GENERIC_TABLE pAuthzObjTable ) /*++ Routine Description: Arguments: pAuthzObjTable - pointer to the generic table structure to initialize. Return Value: Does not return a value. --*/ { RtlInitializeGenericTable( pAuthzObjTable, (PRTL_GENERIC_COMPARE_ROUTINE) SaferpGuidIdentsTableCompare, (PRTL_GENERIC_ALLOCATE_ROUTINE) SaferpGenericTableAllocate, (PRTL_GENERIC_FREE_ROUTINE) SaferpGenericTableFree, NULL); } NTSTATUS NTAPI SaferpGuidIdentsLoadTable ( IN OUT PRTL_GENERIC_TABLE pAuthzIdentTable, IN DWORD dwScopeId, IN HANDLE hKeyCustomBase, IN DWORD dwLevelId, IN SAFER_IDENTIFICATION_TYPES dwIdentityType ) /*++ Routine Description: Loads all Code Identities of a particular fragment type and which map to a specific LevelId value. Arguments: pAuthzIdentTable - specifies the table into which the new Code Identity records should be inserted. dwScopeId - can be AUTHZSCOPEID_USER, AUTHZSCOPEID_MACHINE, or AUTHSCOPEID_REGISTRY. hKeyCustomBase - used only if dwScopeId is AUTHZSCOPEID_REGISTRY. dwLevelId - specifies the LevelId for which identities should be loaded. dwIdentityType - specifies the type of identity to load. This can be SaferIdentityTypeImageName, SaferIdentityTypeImageHash, or SaferIdentityTypeUrlZone. Return Value: Returns STATUS_SUCCESS if no error occurs. --*/ { DWORD dwIndex; NTSTATUS Status; HANDLE hKeyIdentityBase = NULL; HANDLE hKeyThisIdentity = NULL; PUCHAR LocalBuffer = NULL; DWORD Size = sizeof(KEY_BASIC_INFORMATION) + MAX_PATH * sizeof(WCHAR); LocalBuffer = (PUCHAR) RtlAllocateHeap(RtlProcessHeap(), 0, Size); if (LocalBuffer == NULL) { return STATUS_NO_MEMORY; } // // We were given the key to the root of the policy storage, // so we need to open the subkey that contains the Identities. // { WCHAR szPathSuffix[MAX_PATH]; WCHAR szDigits[20]; UNICODE_STRING UnicodePathSuffix; UNICODE_STRING UnicodeDigits; UnicodePathSuffix.Buffer = szPathSuffix; UnicodePathSuffix.Length = 0; UnicodePathSuffix.MaximumLength = sizeof(szPathSuffix); UnicodeDigits.Buffer = szDigits; UnicodeDigits.Length = 0; UnicodeDigits.MaximumLength = sizeof(szDigits); Status = RtlAppendUnicodeToString( &UnicodePathSuffix, SAFER_CODEIDS_REGSUBKEY L"\\"); if (!NT_SUCCESS(Status)) { goto Cleanup; } Status = RtlIntegerToUnicodeString( dwLevelId, 10, &UnicodeDigits); if (!NT_SUCCESS(Status)) { goto Cleanup; } Status = RtlAppendUnicodeStringToString( &UnicodePathSuffix, &UnicodeDigits); if (!NT_SUCCESS(Status)) { goto Cleanup; } switch (dwIdentityType) { case SaferIdentityTypeImageName: Status = RtlAppendUnicodeToString( &UnicodePathSuffix, L"\\" SAFER_PATHS_REGSUBKEY); break; case SaferIdentityTypeImageHash: Status = RtlAppendUnicodeToString( &UnicodePathSuffix, L"\\" SAFER_HASHMD5_REGSUBKEY); break; case SaferIdentityTypeUrlZone: Status = RtlAppendUnicodeToString( &UnicodePathSuffix, L"\\" SAFER_SOURCEURL_REGSUBKEY); break; default: Status = STATUS_INVALID_PARAMETER; break; } if (!NT_SUCCESS(Status)) { goto Cleanup; } ASSERT(UnicodePathSuffix.Buffer[ UnicodePathSuffix.Length / sizeof(WCHAR) ] == UNICODE_NULL); Status = CodeAuthzpOpenPolicyRootKey( dwScopeId, hKeyCustomBase, UnicodePathSuffix.Buffer, KEY_READ, FALSE, &hKeyIdentityBase); if (!NT_SUCCESS(Status)) { goto Cleanup; } } // // Iterate through all subkeys under this branch. // for (dwIndex = 0; ; dwIndex++) { DWORD dwLength; OBJECT_ATTRIBUTES ObjectAttributes; AUTHZIDENTSTABLERECORD AuthzIdentsRec; PKEY_BASIC_INFORMATION pBasicInformation = (PKEY_BASIC_INFORMATION) LocalBuffer; PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64 pPartialInformation = (PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64) LocalBuffer; UNICODE_STRING ValueName; UNICODE_STRING UnicodeKeyname; // // Find the next Identity GUID that we will check. // Status = NtEnumerateKey(hKeyIdentityBase, dwIndex, KeyBasicInformation, pBasicInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { // // If this one key was too large to fit in our query buffer // then simply skip over it and try enumerating the next one. // if (Status == STATUS_BUFFER_OVERFLOW) { // // Reallocate and retry. // RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) LocalBuffer); Size = dwLength; LocalBuffer = (PUCHAR) RtlAllocateHeap(RtlProcessHeap(), 0, Size); if (LocalBuffer == NULL) { Status = STATUS_NO_MEMORY; goto Cleanup; } pBasicInformation = (PKEY_BASIC_INFORMATION) LocalBuffer; pPartialInformation = (PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64) LocalBuffer; Status = NtEnumerateKey(hKeyIdentityBase, dwIndex, KeyBasicInformation, pBasicInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { break; } } else { break; } } UnicodeKeyname.Buffer = pBasicInformation->Name; UnicodeKeyname.MaximumLength = UnicodeKeyname.Length = (USHORT) pBasicInformation->NameLength; // // Translate the keyname (which we expect to be a GUID). // RtlZeroMemory(&AuthzIdentsRec, sizeof(AUTHZIDENTSTABLERECORD)); Status = RtlGUIDFromString(&UnicodeKeyname, &AuthzIdentsRec.IdentGuid); if (!NT_SUCCESS(Status) || IsZeroGUID(&AuthzIdentsRec.IdentGuid)) { // the keyname was apparently not numeric. continue; } AuthzIdentsRec.dwScopeId = dwScopeId; AuthzIdentsRec.dwLevelId = dwLevelId; AuthzIdentsRec.dwIdentityType = dwIdentityType; if (RtlLookupElementGenericTable( pAuthzIdentTable, (PVOID) &AuthzIdentsRec) != NULL) { // this identity GUID happens to have already been found. continue; } // // Try to open a handle to that Identity GUID. // InitializeObjectAttributes(&ObjectAttributes, &UnicodeKeyname, OBJ_CASE_INSENSITIVE, hKeyIdentityBase, NULL ); Status = NtOpenKey(&hKeyThisIdentity, KEY_READ, &ObjectAttributes); if (!NT_SUCCESS(Status)) { // If we failed to open it, skip to the next one. break; } // // Add the new record into our table. // switch (dwIdentityType) { // -------------------- case SaferIdentityTypeImageName: // // Read the image path. // RtlInitUnicodeString( &ValueName, SAFER_IDS_ITEMDATA_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { if (Status == STATUS_BUFFER_OVERFLOW) { // // Reallocate and retry. // RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) LocalBuffer); Size = dwLength; LocalBuffer = (PUCHAR) RtlAllocateHeap(RtlProcessHeap(), 0, Size); if (LocalBuffer == NULL) { Status = STATUS_NO_MEMORY; goto Cleanup; } pBasicInformation = (PKEY_BASIC_INFORMATION) LocalBuffer; pPartialInformation = (PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64) LocalBuffer; Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { break; } } else { break; } } if (pPartialInformation->Type == REG_SZ || pPartialInformation->Type == REG_EXPAND_SZ) { AuthzIdentsRec.ImageNameInfo.bExpandVars = (pPartialInformation->Type == REG_EXPAND_SZ); Status = RtlCreateUnicodeString( &AuthzIdentsRec.ImageNameInfo.ImagePath, (LPCWSTR) pPartialInformation->Data); if (!NT_SUCCESS(Status)) { break; } } else { Status = STATUS_UNSUCCESSFUL; break; } // // Read the extra WinSafer flags. // RtlInitUnicodeString(&ValueName, SAFER_IDS_SAFERFLAGS_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (NT_SUCCESS(Status) && pPartialInformation->Type == REG_DWORD && pPartialInformation->DataLength == sizeof(DWORD)) { AuthzIdentsRec.ImageNameInfo.dwSaferFlags = (*(PDWORD) pPartialInformation->Data); } else { // default the flags if they are missing. AuthzIdentsRec.ImageNameInfo.dwSaferFlags = 0; Status = STATUS_SUCCESS; } break; // -------------------- case SaferIdentityTypeImageHash: // // Read the hash data and hash size. // RtlInitUnicodeString(&ValueName, SAFER_IDS_ITEMDATA_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { if (Status == STATUS_BUFFER_OVERFLOW) { // // Reallocate and retry. // RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) LocalBuffer); Size = dwLength; LocalBuffer = (PUCHAR) RtlAllocateHeap(RtlProcessHeap(), 0, Size); if (LocalBuffer == NULL) { Status = STATUS_NO_MEMORY; goto Cleanup; } pBasicInformation = (PKEY_BASIC_INFORMATION) LocalBuffer; pPartialInformation = (PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64) LocalBuffer; Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { break; } } else { break; } } if (pPartialInformation->Type == REG_BINARY && pPartialInformation->DataLength > 0 && pPartialInformation->DataLength <= SAFER_MAX_HASH_SIZE) { AuthzIdentsRec.ImageHashInfo.HashSize = pPartialInformation->DataLength; RtlCopyMemory(&AuthzIdentsRec.ImageHashInfo.ImageHash[0], pPartialInformation->Data, pPartialInformation->DataLength); } else { Status = STATUS_UNSUCCESSFUL; break; } // // Read the algorithm used to compute the hash. // RtlInitUnicodeString(&ValueName, SAFER_IDS_HASHALG_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { break; } if (pPartialInformation->Type == REG_DWORD && pPartialInformation->DataLength == sizeof(DWORD)) { AuthzIdentsRec.ImageHashInfo.HashAlgorithm = *((PDWORD) pPartialInformation->Data); } else { Status = STATUS_UNSUCCESSFUL; break; } if ((AuthzIdentsRec.ImageHashInfo.HashAlgorithm & ALG_CLASS_ALL) != ALG_CLASS_HASH) { Status = STATUS_UNSUCCESSFUL; break; } // // Read the original image size. // RtlInitUnicodeString(&ValueName, SAFER_IDS_ITEMSIZE_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { if (Status == STATUS_BUFFER_OVERFLOW) { // // Reallocate and retry. // RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) LocalBuffer); Size = dwLength; LocalBuffer = (PUCHAR) RtlAllocateHeap(RtlProcessHeap(), 0, Size); if (LocalBuffer == NULL) { Status = STATUS_NO_MEMORY; goto Cleanup; } pBasicInformation = (PKEY_BASIC_INFORMATION) LocalBuffer; pPartialInformation = (PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64) LocalBuffer; Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { break; } } else { break; } } if (pPartialInformation->Type == REG_DWORD && pPartialInformation->DataLength == sizeof(DWORD)) { AuthzIdentsRec.ImageHashInfo.ImageSize.LowPart = *((PDWORD) pPartialInformation->Data); AuthzIdentsRec.ImageHashInfo.ImageSize.HighPart = 0; } else if (pPartialInformation->Type == REG_QWORD && pPartialInformation->DataLength == 2 * sizeof(DWORD) ) { AuthzIdentsRec.ImageHashInfo.ImageSize.QuadPart = ((PLARGE_INTEGER) pPartialInformation->Data)->QuadPart; } else { Status = STATUS_UNSUCCESSFUL; break; } // // Read the extra WinSafer flags. // RtlInitUnicodeString(&ValueName, SAFER_IDS_SAFERFLAGS_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (NT_SUCCESS(Status) && pPartialInformation->Type == REG_DWORD && pPartialInformation->DataLength == sizeof(DWORD)) { #ifdef SAFER_POLICY_ONLY_EXES AuthzIdentsRec.ImageHashInfo.dwSaferFlags = (*((PDWORD) pPartialInformation->Data)) & ~SAFER_POLICY_ONLY_EXES; #else AuthzIdentsRec.ImageHashInfo.dwSaferFlags = (*((PDWORD) pPartialInformation->Data)); #endif } else { // default the flags if they are missing. AuthzIdentsRec.ImageHashInfo.dwSaferFlags = 0; Status = STATUS_SUCCESS; } break; // -------------------- case SaferIdentityTypeUrlZone: // // Read the zone identifier. // RtlInitUnicodeString(&ValueName, SAFER_IDS_ITEMDATA_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { if (Status == STATUS_BUFFER_OVERFLOW) { // // Reallocate and retry. // RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) LocalBuffer); Size = dwLength; LocalBuffer = (PUCHAR) RtlAllocateHeap(RtlProcessHeap(), 0, Size); if (LocalBuffer == NULL) { Status = STATUS_NO_MEMORY; goto Cleanup; } pBasicInformation = (PKEY_BASIC_INFORMATION) LocalBuffer; pPartialInformation = (PKEY_VALUE_PARTIAL_INFORMATION_ALIGN64) LocalBuffer; Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (!NT_SUCCESS(Status)) { break; } } else { break; } } if (pPartialInformation->Type == REG_DWORD && pPartialInformation->DataLength == sizeof(DWORD)) { AuthzIdentsRec.ImageZone.UrlZoneId = * (PDWORD) pPartialInformation->Data; } else { Status = STATUS_UNSUCCESSFUL; break; } // // Read the extra WinSafer flags. // RtlInitUnicodeString(&ValueName, SAFER_IDS_SAFERFLAGS_REGVALUE); Status = NtQueryValueKey(hKeyThisIdentity, &ValueName, KeyValuePartialInformationAlign64, pPartialInformation, Size, &dwLength); if (NT_SUCCESS(Status) && pPartialInformation->Type == REG_DWORD && pPartialInformation->DataLength == sizeof(DWORD)) { #ifdef SAFER_POLICY_ONLY_EXES AuthzIdentsRec.ImageZone.dwSaferFlags = (*(PDWORD) pPartialInformation->Data) & ~SAFER_POLICY_ONLY_EXES; #else AuthzIdentsRec.ImageZone.dwSaferFlags = (*(PDWORD) pPartialInformation->Data); #endif } else { // default the flags if they are missing. AuthzIdentsRec.ImageZone.dwSaferFlags = 0; Status = STATUS_SUCCESS; } break; // -------------------- default: ASSERT(0 && "unexpected identity type"); Status = STATUS_INVALID_INFO_CLASS; } // Only insert the record if we don't have // any other entries with this same GUID. if (NT_SUCCESS(Status)) { RtlInsertElementGenericTable( pAuthzIdentTable, (PVOID) &AuthzIdentsRec, sizeof(AUTHZIDENTSTABLERECORD), NULL); } NtClose(hKeyThisIdentity); hKeyThisIdentity = NULL; } Cleanup: if (hKeyThisIdentity != NULL) { NtClose(hKeyThisIdentity); } if (hKeyIdentityBase != NULL) { NtClose(hKeyIdentityBase); } RtlFreeHeap(RtlProcessHeap(), 0, (LPVOID) LocalBuffer); return Status; } NTSTATUS NTAPI CodeAuthzGuidIdentsLoadTableAll ( IN PRTL_GENERIC_TABLE pAuthzLevelTable, IN OUT PRTL_GENERIC_TABLE pAuthzIdentTable, IN DWORD dwScopeId, IN HANDLE hKeyCustomBase ) /*++ Routine Description: Arguments: pAuthzLevelTable - specifies the table that has already been loaded with the WinSafer Levels that should be allowed. These Levels do not necessarily need to have been loaded from the same scope from which the Code Identities are being loaded from. pAuthzIdentTable - specifies the table into which the loaded Code Identities should be inserted. dwScopeId - scope from where the Code Identities should be loaded from. This may be AUTHZSCOPEID_MACHINE, AUTHZSCOPEID_USER, or AUTHZSCOPEID_REGISTRY. hKeyCustomBase - only used if dwScopeId was AUTHZSCOPEID_REGISTRY. Return Value: Returns STATUS_SUCCESS if no errors occurred. --*/ { NTSTATUS Status; NTSTATUS WorstStatus = STATUS_SUCCESS; PVOID RestartKey; PAUTHZLEVELTABLERECORD pAuthzLevelRecord; // // Enumerate through all records and close the registry handles. // RestartKey = NULL; for (pAuthzLevelRecord = (PAUTHZLEVELTABLERECORD) RtlEnumerateGenericTableWithoutSplaying( pAuthzLevelTable, &RestartKey); pAuthzLevelRecord != NULL; pAuthzLevelRecord = (PAUTHZLEVELTABLERECORD) RtlEnumerateGenericTableWithoutSplaying( pAuthzLevelTable, &RestartKey) ) { Status = SaferpGuidIdentsLoadTable( pAuthzIdentTable, dwScopeId, hKeyCustomBase, pAuthzLevelRecord->dwLevelId, SaferIdentityTypeImageName); if (!NT_SUCCESS(Status)) WorstStatus = Status; Status = SaferpGuidIdentsLoadTable( pAuthzIdentTable, dwScopeId, hKeyCustomBase, pAuthzLevelRecord->dwLevelId, SaferIdentityTypeImageHash); if (!NT_SUCCESS(Status)) WorstStatus = Status; Status = SaferpGuidIdentsLoadTable( pAuthzIdentTable, dwScopeId, hKeyCustomBase, pAuthzLevelRecord->dwLevelId, SaferIdentityTypeUrlZone); if (!NT_SUCCESS(Status)) WorstStatus = Status; } return WorstStatus; } VOID NTAPI CodeAuthzGuidIdentsEntireTableFree ( IN OUT PRTL_GENERIC_TABLE pAuthzIdentTable ) /*++ Routine Description: Frees the allocated memory associated with all of the entries currently within a Code Identities table. Once the table has been emptied, it may immediately be filled again without any other initialization necessary. Arguments: pAuthzIdentTable - pointer to the table that should be cleared. Return Value: Does not return any value. --*/ { ULONG NumElements; // // Now iterate through the table again and free all of the // elements themselves. // NumElements = RtlNumberGenericTableElements(pAuthzIdentTable); while ( NumElements-- > 0 ) { // Delete all elements. Note that we pass NULL as the element // to delete because our compare function is smart enough to // allow treatment of NULL as a wildcard element. BOOL retval = RtlDeleteElementGenericTable( pAuthzIdentTable, NULL); ASSERT(retval == TRUE); } } PAUTHZIDENTSTABLERECORD NTAPI CodeAuthzIdentsLookupByGuid ( IN PRTL_GENERIC_TABLE pAuthzIdentTable, IN REFGUID pIdentGuid ) /*++ Routine Description: This function searches for an identity within a GENERIC_TABLE. Arguments: pAuthzIdentTable - pointer to the Generic Table structure pIdentGuid - Return Value: Returns a pointer to the Code Identity record if the GUID specified was found. Otherwise NULL is returned. --*/ { AUTHZIDENTSTABLERECORD AuthzIdentsRec; RtlCopyMemory(&AuthzIdentsRec.IdentGuid, pIdentGuid, sizeof(GUID)); return (PAUTHZIDENTSTABLERECORD) RtlLookupElementGenericTable(pAuthzIdentTable, (PVOID) &AuthzIdentsRec); }