Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

962 lines
21 KiB

//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 1997.
//
// File: wxcli.c
//
// Contents:
//
// Classes:
//
// Functions:
//
// History: 4-18-97 RichardW Created
//
//----------------------------------------------------------------------------
#include <nt.h>
#include <ntrtl.h>
#include <nturtl.h>
#include <ntsam.h>
#include <ntsamp.h>
#include <ntlsa.h>
#include <caiseapi.h>
#include <windows.h>
#include <windef.h>
#include <md5.h>
#include <crypt.h>
#include <wxlpc.h>
#include <wxlpcp.h>
#define safe_min(x,y) ( x < y ? x : y )
NTSTATUS
WxConnect(
PHANDLE Handle
)
{
NTSTATUS Status ;
UNICODE_STRING PortName ;
SECURITY_QUALITY_OF_SERVICE DynamicQos;
//
// Set up the security quality of service parameters to use over the
// port. Use the most efficient (least overhead) - which is dynamic
// rather than static tracking.
//
DynamicQos.ImpersonationLevel = SecurityImpersonation;
DynamicQos.ContextTrackingMode = SECURITY_DYNAMIC_TRACKING;
DynamicQos.EffectiveOnly = TRUE;
//
// Connect to the Winlogon server thread
//
RtlInitUnicodeString(&PortName, WX_PORT_NAME );
Status = NtConnectPort(
Handle,
&PortName,
&DynamicQos,
NULL,
NULL,
NULL,
NULL,
0
);
if ( !NT_SUCCESS(Status) )
{
// DbgPrint("WX: Connection failed %lx\n",Status);
}
return Status;
}
NTSTATUS
WxGetKeyData(
IN HANDLE Handle,
IN WX_AUTH_TYPE ExpectedAuthSource,
IN ULONG BufferSize,
OUT PUCHAR Buffer,
OUT PULONG BufferData
)
{
WXLPC_MESSAGE Message ;
NTSTATUS Status ;
WXLPC_GETKEYDATA * Parameters ;
PREPARE_MESSAGE( Message, WxGetKeyDataApi );
Parameters = &Message.Parameters.GetKeyData ;
Parameters->ExpectedAuth = ExpectedAuthSource ;
Parameters->BufferSize = BufferSize ;
Status = NtRequestWaitReplyPort(
Handle,
&Message.Message,
&Message.Message );
if ( !NT_SUCCESS( Status ) )
{
return Status ;
}
if ( NT_SUCCESS( Message.Status ) )
{
RtlCopyMemory( Buffer,
Parameters->Buffer,
safe_min( Parameters->BufferData, BufferSize ) );
}
return Message.Status ;
}
NTSTATUS
WxReportResults(
IN HANDLE Handle,
IN NTSTATUS ResultStatus
)
{
WXLPC_MESSAGE Message ;
NTSTATUS Status ;
WXLPC_REPORTRESULTS * Parameters ;
PREPARE_MESSAGE( Message, WxReportResultsApi );
Parameters = &Message.Parameters.ReportResults ;
Parameters->Status = ResultStatus ;
Status = NtRequestWaitReplyPort(
Handle,
&Message.Message,
&Message.Message );
if ( !NT_SUCCESS( Status ) )
{
return Status ;
}
return Message.Status ;
}
/*++
The following code was moved from syskey to wxcli so as to commonalize this code
between syskey and samsrv.dll
--*/
#if DBG
#define HIDDEN
#else
#define HIDDEN static
#endif
HIDDEN
UCHAR KeyShuffle[ 16 ] = { 8, 10, 3, 7, 2, 1, 9, 15, 0, 5, 13, 4, 11, 6, 12, 14 };
HIDDEN
CHAR HexKey[ 17 ] = "0123456789abcdef" ;
#define ToHex( f ) (HexKey[f & 0xF])
#define SYSTEM_KEY L"SecureBoot"
HIDDEN BOOLEAN
WxpDeleteLocalKey(VOID)
/*++
Routine Description
Deletes the syskey stored on the local machine
--*/
{
HKEY LsaKey;
ULONG err;
err = RegOpenKeyExW( HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\Lsa",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
if (0!=err)
{
return (FALSE);
}
(void) RegDeleteKey( LsaKey, TEXT("Data") );
(void) RegDeleteKey( LsaKey, TEXT("Skew1") );
(void) RegDeleteKey( LsaKey, TEXT("GBG") );
(void) RegDeleteKey( LsaKey, TEXT("JD") );
RegCloseKey(LsaKey);
return STATUS_SUCCESS ;
}
HIDDEN BOOLEAN
WxpObfuscateKey(
PWXHASH Hash
)
{
HKEY Key ;
HKEY Key2 ;
int Result ;
WXHASH H ;
CHAR Classes[ 9 ];
int i ;
WXHASH R ;
PCHAR Class ;
DWORD Disp ;
DWORD FailCount = 0;
HKEY LsaKey = NULL;
ULONG err=0;
BOOLEAN fResult = FALSE;
err = RegOpenKeyExW( HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\Lsa",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
if (0!=err)
{
return FALSE;
}
for (Result = 0 ; Result < 16 ; Result++ )
{
H.Digest[Result] = Hash->Digest[ KeyShuffle[ Result ] ];
}
WxpDeleteLocalKey();
Classes[8] = '\0';
if (!RtlGenRandom( R.Digest, 16 ))
{
goto Cleanup;
}
Class = Classes ;
for ( i = 0 ; i < 4 ; i++ )
{
*Class++ = ToHex( (H.Digest[ i ] >> 4) );
*Class++ = ToHex( H.Digest[ i ] );
}
Result = RegCreateKeyExA( LsaKey,
"JD",
0,
Classes,
REG_OPTION_NON_VOLATILE,
KEY_WRITE,
NULL,
&Key,
&Disp );
if ( Result == 0 )
{
RegSetValueEx( Key, TEXT("Lookup"), 0,
REG_BINARY, R.Digest, 6 );
RegCloseKey( Key );
}
else
{
goto Cleanup;
}
Class = Classes ;
for ( i = 0 ; i < 4 ; i++ )
{
if (!RtlGenRandom( R.Digest, 16 ))
{
goto Cleanup;
}
*Class++ = ToHex( (H.Digest[ i+4 ] >> 4 ) );
*Class++ = ToHex( H.Digest[ i+4 ] );
}
Result = RegCreateKeyExA( LsaKey,
"Skew1",
0,
Classes,
REG_OPTION_NON_VOLATILE,
KEY_WRITE,
NULL,
&Key,
&Disp );
if ( Result == 0 )
{
RegSetValueEx( Key, TEXT("SkewMatrix"), 0,
REG_BINARY, R.Digest, 16 );
RegCloseKey( Key );
}
else
{
FailCount++;
}
if (!RtlGenRandom( R.Digest, 16 ))
{
goto Cleanup;
}
for ( i = 0, Class = Classes ; i < 4 ; i++ )
{
*Class++ = ToHex( (H.Digest[ i+8 ] >> 4 ));
*Class++ = ToHex( H.Digest[i+8] );
}
Result = RegCreateKeyExA( LsaKey,
"GBG",
0,
Classes,
REG_OPTION_NON_VOLATILE,
KEY_WRITE,
NULL,
&Key,
&Disp );
if ( Result == 0 )
{
RegSetValueEx( Key, TEXT("GrafBlumGroup"), 0,
REG_BINARY, R.Digest, 9 );
RegCloseKey( Key );
}
else
{
FailCount++;
}
if (!RtlGenRandom( H.Digest, 8 ))
{
goto Cleanup;
}
Class = Classes ;
if (!RtlGenRandom( R.Digest, 16 ))
{
goto Cleanup;
}
for ( i = 0 ; i < 4 ; i++ )
{
*Class++ = ToHex( (H.Digest[ i+12 ] >> 4 ) );
*Class++ = ToHex( H.Digest[ i+12 ] );
}
Result = RegCreateKeyExA( LsaKey,
"Data",
0,
Classes,
REG_OPTION_NON_VOLATILE,
KEY_WRITE,
NULL,
&Key,
&Disp );
if ( Result == 0 )
{
if (!RtlGenRandom( H.Digest, 16 ))
{
RegCloseKey( Key );
goto Cleanup;
}
RegSetValueEx( Key, TEXT("Pattern"), 0,
REG_BINARY, R.Digest, 16 );
RegCloseKey( Key );
}
else
{
FailCount++;
}
fResult = TRUE;
Cleanup:
if (LsaKey)
{
RegCloseKey(LsaKey);
}
return fResult ;
}
#define FromHex( c ) ( ( ( c >= '0' ) && ( c <= '9') ) ? c - '0' : \
( ( c >= 'a' ) && ( c <= 'f') ) ? c - 'a' + 10: \
( ( c >= 'A' ) && ( c <= 'F' ) ) ? c - 'A' + 10: -1 )
HIDDEN BOOLEAN
WxpDeObfuscateKey(
HKEY Keylocation,
PWXHASH Hash
)
{
WXHASH ProtoHash ;
int Result ;
CHAR Class[ 9 ];
HKEY Key ;
DWORD Size ;
DWORD i ;
PUCHAR j ;
int t;
int t2 ;
HKEY LsaKey;
ULONG err;
if (Keylocation!=NULL) {
DWORD Type=REG_DWORD;
DWORD Data;
DWORD cbData=sizeof(DWORD);
WCHAR Controlset[256];
err = RegOpenKeyExW( Keylocation,
L"Select",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
if (0!=err)
{
return (FALSE);
}
err = RegQueryValueExW(
LsaKey,
L"Default",
NULL,
&Type,
(LPBYTE)&Data,
&cbData
);
RegCloseKey(LsaKey);
if (0!=err)
{
return (FALSE);
}
if(Data==1){
err = RegOpenKeyExW( Keylocation,
L"ControlSet001\\Control\\Lsa",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
} else {
err = RegOpenKeyExW( Keylocation,
L"ControlSet002\\Control\\Lsa",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
}
if (0!=err)
{
RegCloseKey(LsaKey);
return (FALSE);
}
} else {
err = RegOpenKeyExW( HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\Lsa",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
if (0!=err)
{
return (FALSE);
}
}
Result = RegOpenKeyEx( LsaKey, TEXT("JD"), 0,
KEY_READ, &Key );
j = ProtoHash.Digest ;
if ( Result == 0 )
{
Size = 9 ;
Result = RegQueryInfoKeyA( Key,
Class,
&Size,
NULL, NULL, NULL,
NULL, NULL, NULL,
NULL, NULL, NULL );
RegCloseKey( Key );
if ( Result == 0 )
{
for ( i = 0 ; i < 8 ; i += 2 )
{
t = FromHex( Class[ i ] );
t2 = FromHex( Class[ i+1 ] );
if ( (t >= 0 ) && ( t2 >= 0 ) )
{
*j++ = (t << 4) + t2 ;
}
else
{
RegCloseKey(LsaKey);
return FALSE ;
}
}
}
}
Result = RegOpenKeyEx( LsaKey, TEXT("Skew1"), 0,
KEY_READ, &Key );
if ( Result == 0 )
{
Size = 9 ;
Result = RegQueryInfoKeyA( Key,
Class,
&Size,
NULL, NULL, NULL,
NULL, NULL, NULL,
NULL, NULL, NULL );
RegCloseKey( Key );
if ( Result == 0 )
{
for ( i = 0 ; i < 8 ; i += 2 )
{
t = FromHex( Class[ i ] );
t2 = FromHex( Class[ i+1 ] );
if ( (t >= 0 ) && ( t2 >= 0 ) )
{
*j++ = (t << 4) + t2 ;
}
else
{
RegCloseKey(LsaKey);
return FALSE ;
}
}
}
}
Result = RegOpenKeyEx( LsaKey, TEXT("GBG"), 0,
KEY_READ, &Key );
if ( Result == 0 )
{
Size = 9 ;
Result = RegQueryInfoKeyA( Key,
Class,
&Size,
NULL, NULL, NULL,
NULL, NULL, NULL,
NULL, NULL, NULL );
RegCloseKey( Key );
if ( Result == 0 )
{
for ( i = 0 ; i < 8 ; i += 2 )
{
t = FromHex( Class[ i ] );
t2 = FromHex( Class[ i+1 ] );
if ( (t >= 0 ) && ( t2 >= 0 ) )
{
*j++ = (t << 4) + t2 ;
}
else
{
RegCloseKey(LsaKey);
return FALSE ;
}
}
}
}
Result = RegOpenKeyEx( LsaKey, TEXT("Data"), 0,
KEY_READ, &Key );
if ( Result == 0 )
{
Size = 9 ;
Result = RegQueryInfoKeyA( Key,
Class,
&Size,
NULL, NULL, NULL,
NULL, NULL, NULL,
NULL, NULL, NULL );
RegCloseKey( Key );
if ( Result == 0 )
{
for ( i = 0 ; i < 8 ; i += 2 )
{
t = FromHex( Class[ i ] );
t2 = FromHex( Class[ i+1 ] );
if ( (t >= 0 ) && ( t2 >= 0 ) )
{
*j++ = (t << 4) + t2 ;
}
else
{
RegCloseKey(LsaKey);
return FALSE ;
}
}
}
}
for ( i = 0 ; i < 16 ; i++ )
{
Hash->Digest[ KeyShuffle[ i ] ] = ProtoHash.Digest[ i ] ;
}
RegCloseKey(LsaKey);
return TRUE ;
}
NTSTATUS
WxSaveSysKey(
IN ULONG Keylen,
IN PVOID Key
)
/*++
Routine Description
This routine is used to store the syskey
in the registry
Paramaeters
Keylen - the length of the key
Key the actual key itself
Return Values
STATUS_SUCCESS
STATUS_UNSUCCESSFUL
--*/
{
WXHASH H;
//
// key should be 128 bits
//
if (Keylen!=sizeof(H.Digest))
return (STATUS_INVALID_PARAMETER);
RtlCopyMemory(&H.Digest,
Key,
Keylen
);
if (WxpObfuscateKey(&H))
{
return(STATUS_SUCCESS);
}
else
{
return(STATUS_UNSUCCESSFUL);
}
}
NTSTATUS
WxReadSysKey(
IN OUT PULONG BufferLength,
OUT PVOID Key
)
/*++
Routine Description
This routine is used to retrieve the syskey from
the registry
Paramaeters
BufferLength is filled in with the length required on output
is used to indicate the size of the buffer
pointed to by Key.
Key Points to a buffer into which the key is recieved
Return Values
STATUS_SUCCESS
STATUS_UNSUCCESSFUL
--*/
{
return WxReadSysKeyEx(
NULL,
BufferLength,
Key
);
}
NTSTATUS
WxReadSysKeyEx(
IN HKEY Handle,
IN OUT PULONG BufferLength,
OUT PVOID Key
)
/*++
Routine Description
This routine is used to retrieve the syskey from
the registry
Paramaeters
Handle Contains a pointer to the syskey in the old registry
BufferLength is filled in with the length required on output
is used to indicate the size of the buffer
pointed to by Key.
Key Points to a buffer into which the key is recieved
Return Values
STATUS_SUCCESS
STATUS_UNSUCCESSFUL
--*/
{
WXHASH H;
if ((NULL==Key) || (*BufferLength <sizeof(H.Digest)))
{
*BufferLength = sizeof(H.Digest);
return(STATUS_BUFFER_OVERFLOW);
}
if (WxpDeObfuscateKey(Handle,&H))
{
*BufferLength = sizeof(H.Digest);
RtlCopyMemory(
Key,
&H.Digest,
*BufferLength
);
return(STATUS_SUCCESS);
}
return (STATUS_UNSUCCESSFUL);
}
NTSTATUS
WxLoadSysKeyFromDisk(OUT PVOID Key,
OUT PULONG BufferLength
)
/*++
Routine Description
This routine is used to read the syskey
from the Disk
Paramaeters
Key - buffer where the key will be read into
BufferLength - size of the returned key
Return Values
STATUS_OBJECT_NAME_NOT_FOUND
STATUS_FILE_CORRUPT_ERROR
STATUS_UNSUCCESSFUL
--*/
{
HANDLE hFile ;
ULONG Actual ;
ULONG ErrorMode ;
LPSTR SysKeyFileName = "A:\\startkey.key";
ErrorMode = SetErrorMode( SEM_FAILCRITICALERRORS | SEM_NOOPENFILEERRORBOX );
hFile = CreateFileA( SysKeyFileName,
GENERIC_READ,
0,
NULL,
OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL,
NULL );
if ( hFile == INVALID_HANDLE_VALUE )
{
SetErrorMode( ErrorMode );
return STATUS_OBJECT_NAME_NOT_FOUND ;
}
if (!ReadFile( hFile, Key, SYSKEY_SIZE, &Actual, NULL ) ||
(Actual != SYSKEY_SIZE ))
{
SetErrorMode( ErrorMode );
CloseHandle( hFile );
return STATUS_FILE_CORRUPT_ERROR ;
}
SetErrorMode( ErrorMode );
CloseHandle( hFile );
*BufferLength = SYSKEY_SIZE;
return STATUS_SUCCESS;
}
NTSTATUS
WxHashKey(
IN OUT LPWSTR key, //will be killed
OUT PVOID SysKey,
IN OUT DWORD cbSysKey
)
/*++
Routine Description
This routine is used to store the boot type
in the registry
Paramaeters
NewType Indicates the new boot type
Return Values
STATUS_SUCCESS
STATUS_UNSUCCESSFUL
--*/
{
MD5_CTX Md5;
if(cbSysKey<SYSKEY_SIZE) {
return STATUS_BUFFER_TOO_SMALL;
}
cbSysKey=wcslen(key)*sizeof(WCHAR);
MD5Init( &Md5 );
MD5Update( &Md5, (PUCHAR) key, cbSysKey );
MD5Final( &Md5 );
ZeroMemory( key, cbSysKey );
cbSysKey=SYSKEY_SIZE;
CopyMemory( SysKey, Md5.digest, cbSysKey );
return STATUS_SUCCESS;
}
NTSTATUS
WxSaveBootOption( WX_AUTH_TYPE NewType )
/*++
Routine Description
This routine is used to store the boot type
in the registry
Paramaeters
NewType Indicates the new boot type
Return Values
STATUS_SUCCESS
STATUS_UNSUCCESSFUL
--*/
{
HKEY LsaKey;
ULONG err;
err = RegOpenKeyExW( HKEY_LOCAL_MACHINE,
L"System\\CurrentControlSet\\Control\\Lsa",
0,
KEY_READ | KEY_WRITE,
& LsaKey );
if (0!=err)
{
return (STATUS_UNSUCCESSFUL);
}
err = RegSetValueExW(
LsaKey,
SYSTEM_KEY,
0,
REG_DWORD,
(PUCHAR) &NewType,
sizeof( NewType )
);
if (0!=err)
{
RegCloseKey(LsaKey);
return (STATUS_UNSUCCESSFUL);
}
RegCloseKey(LsaKey);
return ( STATUS_SUCCESS);
}