Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

373 lines
12 KiB

/*
Copyright (c) Microsoft Corporation
*/
#include "stdinc.h"
#include "windows.h"
#include "sxsapi.h"
#include "sxsprotect.h"
#include "sxssfcscan.h"
#include "wintrust.h"
#include "softpub.h"
#include "strongname.h"
#include "recover.h"
BOOL
SxspValidateEntireAssembly(
DWORD dwFlags,
const CAssemblyRecoveryInfo &RecoverInfo,
DWORD &dwResult,
PCASSEMBLY_IDENTITY pAssemblyIdentity,
const CBaseStringBuffer *pbuffWinsxsRoot
)
{
BOOL bSuccess = FALSE;
const CSecurityMetaData &rSecurityData = RecoverInfo.GetSecurityInformation();
FN_TRACE_WIN32(bSuccess);
#define CHECKSHOULDSTOPFAIL { if (dwFlags & SXS_VALIDATE_ASM_FLAG_MODE_STOP_ON_FAIL) { bSuccess = TRUE; goto Exit; } }
#define ADDFLAG(result, test, flag) { if (test) { (result) |= (flag); } else CHECKSHOULDSTOPFAIL }
ManifestValidationResult ManifestValidity;
CSecurityMetaData SecurityMetaData;
CStringBuffer sbManifestPath;
dwResult = 0;
if (dwFlags == 0)
{
dwFlags = SXS_VALIDATE_ASM_FLAG_CHECK_EVERYTHING;
dwFlags |= (SXS_VALIDATE_ASM_FLAG_MODE_STOP_ON_FAIL);
}
IFINVALID_FLAGS_EXIT_WIN32(dwFlags,
SXS_VALIDATE_ASM_FLAG_CHECK_CATALOG |
SXS_VALIDATE_ASM_FLAG_CHECK_FILES |
SXS_VALIDATE_ASM_FLAG_CHECK_STRONGNAME |
SXS_VALIDATE_ASM_FLAG_CHECK_CAT_STRONGNAME |
SXS_VALIDATE_ASM_FLAG_MODE_STOP_ON_FAIL);
//
// Asking us to check the catalog when there's no catalog on the assembly
// is a Bad Thing. Perhaps this should just return TRUE with a missing catalog?
//
PARAMETER_CHECK(dwFlags & SXS_VALIDATE_ASM_FLAG_CHECK_CATALOG);
PARAMETER_CHECK(RecoverInfo.GetHasCatalog());
#if DBG
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP,
"SXS.DLL: %s() - Beginning protection scan of %ls, flags 0x%08x\n",
__FUNCTION__,
static_cast<PCWSTR>(RecoverInfo.GetAssemblyDirectoryName()),
dwFlags);
#endif
if (pAssemblyIdentity == NULL)
{
IFW32FALSE_EXIT(::SxspResolveAssemblyManifestPath(RecoverInfo.GetAssemblyDirectoryName(), sbManifestPath));
}
else
{
CTinyStringBuffer buffWinsxsRoot;
PROBING_ATTRIBUTE_CACHE AttributeCache = { 0 };
if (pbuffWinsxsRoot == NULL)
{
IFW32FALSE_EXIT(::SxspGetAssemblyRootDirectory(buffWinsxsRoot));
pbuffWinsxsRoot = &buffWinsxsRoot;
}
IFW32FALSE_EXIT(
::SxspGenerateSxsPath_FullPathToManifestOrPolicyFile(
*pbuffWinsxsRoot,
pAssemblyIdentity,
&AttributeCache,
sbManifestPath));
}
//
// If we're checking the catalog, then do it. If the catalog is bad or
// otherwise doesn't match the actual assembly, then we need to mark
// ourselves as successful, then exit.
//
if (dwFlags & SXS_VALIDATE_ASM_FLAG_CHECK_CATALOG)
{
IFW32FALSE_EXIT(::SxspValidateManifestAgainstCatalog(
sbManifestPath,
ManifestValidity,
0));
#if DBG
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP,
"SXS.DLL: Manifest Validity = %ls\n",
::SxspManifestValidationResultToString(ManifestValidity));
#endif
ADDFLAG(
dwResult,
ManifestValidity == ManifestValidate_IsIntact,
SXS_VALIDATE_ASM_FLAG_VALID_CATALOG);
}
//TODO: Problems - make sure that we validate the manifest against what's in the
// registry. Maybe we need a special mode of incorporating assemblies (over a manifest)
// that will just fill out the security data and nothing else...
//
// Validate the strong name of the assembly first.
//
if (dwFlags & SXS_VALIDATE_ASM_FLAG_CHECK_STRONGNAME)
{
//
// JW 3/19/2001 - Public keys are NO LONGER IN THE BUILD, and as such
// this check is moot.
//
ADDFLAG(dwResult, TRUE, SXS_VALIDATE_ASM_FLAG_VALID_STRONGNAME);
}
//
// Let's open the catalog and scour through it certificate-wise
// looking for a strong name that matches up.
//
if (dwFlags & SXS_VALIDATE_ASM_FLAG_CHECK_CAT_STRONGNAME)
{
CStringBuffer sbCatalogName;
CSmallStringBuffer sbTheorheticalStrongName;
const CFusionByteArray &rbaSignerPublicKey = rSecurityData.GetSignerPublicKeyTokenBits();
CPublicKeyInformation PublicKeyInfo;
BOOL bStrongNameFoundInCatalog;
IFW32FALSE_EXIT(sbCatalogName.Win32Assign(sbManifestPath));
IFW32FALSE_EXIT(sbCatalogName.Win32ChangePathExtension(
FILE_EXTENSION_CATALOG,
FILE_EXTENSION_CATALOG_CCH,
eAddIfNoExtension));
if (!PublicKeyInfo.Initialize(sbCatalogName))
{
const DWORD dwLastError = ::FusionpGetLastWin32Error();
if ((dwLastError != ERROR_PATH_NOT_FOUND) &&
(dwLastError != ERROR_FILE_NOT_FOUND))
goto Exit;
}
IFW32FALSE_EXIT(
::SxspHashBytesToString(
rbaSignerPublicKey.GetArrayPtr(),
rbaSignerPublicKey.GetSize(),
sbTheorheticalStrongName));
IFW32FALSE_EXIT(
PublicKeyInfo.DoesStrongNameMatchSigner(
sbTheorheticalStrongName,
bStrongNameFoundInCatalog));
ADDFLAG(dwResult, bStrongNameFoundInCatalog, SXS_VALIDATE_ASM_FLAG_VALID_CAT_STRONGNAME);
}
//
// Now, scan through all the files that are listed in the manifest and
// ensure that they're all OK.
//
if (dwFlags & SXS_VALIDATE_ASM_FLAG_CHECK_FILES)
{
CStringBuffer sbTempScanPath;
CStringBuffer sbAsmRootDir;
const CBaseStringBuffer &sbAssemblyName = RecoverInfo.GetAssemblyDirectoryName();
CFileInformationTableIter ContentTableIter(const_cast<CFileInformationTable&>(rSecurityData.GetFileDataTable()));
HashValidateResult hvResult;
BOOL bAllFilesMatch = TRUE;
BOOL fTempBoolean;
SIZE_T cchPath;
IFW32FALSE_EXIT(::SxspGetAssemblyRootDirectory(sbAsmRootDir));
IFW32FALSE_EXIT(sbTempScanPath.Win32Assign(sbAsmRootDir));
IFW32FALSE_EXIT(sbTempScanPath.Win32AppendPathElement(sbAssemblyName));
cchPath = sbTempScanPath.Cch();
for (ContentTableIter.Reset();
ContentTableIter.More();
ContentTableIter.Next())
{
//
// Cobble together a path to scan for the file in, based on the
// assembly root directory, the 'name' of the assembly (note:
// we can't use this to go backwards to get an identity,
// unfortunately), and the name of the file to be validated.
//
PCWSTR wsString = ContentTableIter.GetKey();
CMetaDataFileElement &HashEntry = ContentTableIter.GetValue();
sbTempScanPath.Left(cchPath);
IFW32FALSE_EXIT(sbTempScanPath.Win32AppendPathElement(wsString, ::wcslen(wsString)));
IFW32FALSE_EXIT_UNLESS( ::SxspValidateAllFileHashes(
HashEntry,
sbTempScanPath,
hvResult ),
FILE_OR_PATH_NOT_FOUND(::FusionpGetLastWin32Error()),
fTempBoolean );
if ( ( hvResult != HashValidate_Matches ) || ( fTempBoolean ) )
{
bAllFilesMatch = FALSE;
break;
}
}
ADDFLAG(dwResult, bAllFilesMatch, SXS_VALIDATE_ASM_FLAG_VALID_FILES);
}
//
// Phew - should be done doing everything the user wanted us to.
//
bSuccess = TRUE;
Exit:
#if DBG
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP,
"SXS.DLL: Done validating, result = 0x%08x, success = %d\n",
dwResult,
bSuccess);
#endif
return bSuccess;
#undef CHECKSHOULDSTOPFAIL
}
//
// Single-shot scanning
//
BOOL
SxsProtectionPerformScanNowNoSEH(
HWND hwProgressWindow,
BOOL bValidate,
BOOL bUIAllowed
)
{
BOOL bSuccess = TRUE;
FN_TRACE_WIN32(bSuccess);
CFusionRegKey hkInstallRoot;
CStringBuffer sbKeyName;
DWORD dwKeyIndex;
BOOL fNoMoreKeys = FALSE;
CStringBuffer sbAssemblyDirectory, sbManifestPath;
//
// If we're scanning, then we don't want to bother sxs-sfc with changes,
// now do we?
//
// REVIEW: Handy way to get around sfc-sxs... start a series of scans, and
// insert 'bad' files into assemblies while we're scanning.
//
::SxsProtectionEnableProcessing(FALSE);
bSuccess = TRUE;
IFW32FALSE_EXIT(::SxspOpenAssemblyInstallationKey( 0, KEY_READ, hkInstallRoot ));
dwKeyIndex = 0;
while (!fNoMoreKeys)
{
CAssemblyRecoveryInfo ri;
bool fHasAssociatedAssembly;
IFW32FALSE_EXIT(hkInstallRoot.EnumKey(dwKeyIndex++, sbKeyName, NULL, &fNoMoreKeys));
if (fNoMoreKeys)
{
break;
}
IFW32FALSE_EXIT(ri.AssociateWithAssembly(sbKeyName, fHasAssociatedAssembly));
if (!fHasAssociatedAssembly)
{
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP,
"SXS.DLL: %s() - We found the assembly %ls in the registry, but were not able to associate it with an assembly\n",
__FUNCTION__,
static_cast<PCWSTR>(sbKeyName));
}
else if (!ri.GetHasCatalog())
{
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP,
"SXS.DLL: %s() - Assembly %ls in registry, no catalog, not validating.\n",
__FUNCTION__,
static_cast<PCWSTR>(sbKeyName));
}
else
{
DWORD dwValidateMode, dwResult;
SxsRecoveryResult RecoverResult;
dwValidateMode = SXS_VALIDATE_ASM_FLAG_CHECK_EVERYTHING;
IFW32FALSE_EXIT(::SxspValidateEntireAssembly(
dwValidateMode,
ri,
dwResult));
if (dwResult != SXS_VALIDATE_ASM_FLAG_VALID_PERFECT)
{
#if DBG
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP | FUSION_DBG_LEVEL_ERROR,
"SXS.DLL: %s() - Scan of %ls failed one or more, flagset 0x%08x\n",
__FUNCTION__,
static_cast<PCWSTR>(sbKeyName),
dwResult);
#endif
IFW32FALSE_EXIT(
::SxspRecoverAssembly(
ri,
RecoverResult));
#if DBG
if (RecoverResult != Recover_OK)
{
::FusionpDbgPrintEx(
FUSION_DBG_LEVEL_WFP | FUSION_DBG_LEVEL_ERROR,
"SXS.DLL: %s() - Reinstallation of assembly %ls failed, status %ls\n",
static_cast<PCWSTR>(sbKeyName),
::SxspRecoveryResultToString(RecoverResult));
}
#endif
}
}
}
bSuccess = TRUE;
Exit:
return bSuccess;
}
BOOL
SxsProtectionPerformScanNow(
HWND hwProgressWindow,
BOOL bValidate,
BOOL bUIAllowed
)
{
BOOL bSuccess = TRUE;
bSuccess = ::SxsProtectionPerformScanNowNoSEH(hwProgressWindow, bValidate, bUIAllowed);
//
// Always reenable sfc notifications!
//
::SxsProtectionEnableProcessing(TRUE);
return bSuccess;
}