Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

5900 lines
169 KiB

/*++
Copyright (c) 1997, 1998, 1999 Microsoft Corporation
Module Name:
keyman.cpp
Abstract:
This module contains routines to read and write data (key containers) from
and to files.
Author:
16 Mar 98 jeffspel
--*/
// Don't whine about unnamed unions
#pragma warning (disable: 4201)
#include <nt.h>
#include <ntrtl.h>
#include <nturtl.h>
#include <crypt.h>
#include <windows.h>
#include <userenv.h>
#include <userenvp.h> // for GetUserAppDataPathW
#include <wincrypt.h>
#include <cspdk.h>
#include <rpc.h>
#include <shlobj.h>
#include <contman.h>
#include <md5.h>
#include <des.h>
#include <modes.h>
#include <csprc.h>
#include <crtdbg.h>
#include <mincrypt.h>
#ifdef USE_HW_RNG
#ifdef _M_IX86
#include <winioctl.h>
// INTEL h files for on chip RNG
#include "deftypes.h" //ISD typedefs and constants
#include "ioctldef.h" //ISD ioctl definitions
#endif // _M_IX86
#endif // USE_HW_RNG
static LPBYTE l_pbStringBlock = NULL;
CSP_STRINGS g_Strings = {
NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL, NULL, NULL };
typedef struct _OLD_KEY_CONTAINER_LENS_
{
DWORD cbSigPub;
DWORD cbSigEncPriv;
DWORD cbExchPub;
DWORD cbExchEncPriv;
} OLD_KEY_CONTAINER_LENS, *POLD_KEY_CONTAINER_LENS;
#define OLD_KEY_CONTAINER_FILE_FORMAT_VER 1
#define FAST_BUF_SIZE 256
#define ContInfoAlloc(cb) ContAlloc(cb)
#define ContInfoReAlloc(pb, cb) ContRealloc(pb, cb)
#define ContInfoFree(pb) ContFree(pb)
#define MACHINE_KEYS_DIR L"MachineKeys"
// Location of the keys in the registry (minus the logon name)
// Length of the full location (including the logon name)
#define RSA_REG_KEY_LOC "Software\\Microsoft\\Cryptography\\UserKeys"
#define RSA_REG_KEY_LOC_LEN sizeof(RSA_REG_KEY_LOC)
#define RSA_MACH_REG_KEY_LOC "Software\\Microsoft\\Cryptography\\MachineKeys"
#define RSA_MACH_REG_KEY_LOC_LEN sizeof(RSA_MACH_REG_KEY_LOC)
#define DSS_REG_KEY_LOC "Software\\Microsoft\\Cryptography\\DSSUserKeys"
#define DSS_REG_KEY_LOC_LEN sizeof(DSS_REG_KEY_LOC)
#define DSS_MACH_REG_KEY_LOC "Software\\Microsoft\\Cryptography\\DSSUserKeys"
#define DSS_MACH_REG_KEY_LOC_LEN sizeof(DSS_MACH_REG_KEY_LOC)
#define MAX_DPAPI_RETRY_COUNT 5
//
// Memory allocation support.
//
#ifndef ASSERT
#define ASSERT _ASSERTE
#endif
#ifdef _X86_
#define InterlockedAccess(pl) *(pl)
#define InterlockedPointerAccess(ppv) *(ppv)
#else
#define InterlockedAccess(pl) InterlockedExchangeAdd((pl), 0)
#define InterlockedPointerAccess(ppv) InterlockedExchangePointer((ppv), *(ppv))
#endif
#define CONT_HEAP_FLAGS (HEAP_ZERO_MEMORY)
// Scrub sensitive data from memory
extern void
memnuke(
volatile BYTE *pData,
DWORD dwLen);
extern unsigned int
RSA32API
NewGenRandom(
IN OUT unsigned char **,
IN unsigned long *,
IN OUT unsigned char *,
IN unsigned long);
LPVOID
ContAlloc(
ULONG cbLen)
{
return HeapAlloc(GetProcessHeap(), CONT_HEAP_FLAGS, cbLen);
}
LPVOID
ContRealloc(
LPVOID pvMem,
ULONG cbLen)
{
return HeapReAlloc(GetProcessHeap(), CONT_HEAP_FLAGS, pvMem, cbLen);
}
void
ContFree(
LPVOID pvMem)
{
if (NULL != pvMem)
HeapFree(GetProcessHeap(), CONT_HEAP_FLAGS, pvMem);
}
//
// Determines the buffer size to use for encrypting/decrypting a private key
// using the EncryptMemory functions below.
//
// cbKey should include the BSAFE_PRV_KEY struct size
//
#ifndef BSAFE_PRV_KEY
#include <rsa.h>
#endif
DWORD GetKeySizeForEncryptMemory(
IN DWORD cbKey)
{
cbKey -= sizeof(BSAFE_PRV_KEY);
//
// Only the private key will be encrypted, not the leading BSAFE_PRV_KEY
// structure. Therefore, make sure the private key buffer is a multiple
// of the cipher block size in length. Then add back the length of the
// leading struct.
//
if (cbKey % MY_RTL_ENCRYPT_MEMORY_SIZE)
cbKey += MY_RTL_ENCRYPT_MEMORY_SIZE -
(cbKey % MY_RTL_ENCRYPT_MEMORY_SIZE);
return (cbKey + sizeof(BSAFE_PRV_KEY));
}
//
// Wrapper for RtlEncryptMemory, which returns an NTSTATUS. The return
// value is translated to a winerror code.
//
DWORD MyRtlEncryptMemory(
IN PVOID pvMem,
IN DWORD cbMem)
{
NTSTATUS status = RtlEncryptMemory(pvMem, cbMem, 0);
return RtlNtStatusToDosError(status);
}
//
// Wrapper for RtlDecryptMemory, which returns an NTSTATUS. The return value
// is translated to a winerror code.
//
DWORD MyRtlDecryptMemory(
IN PVOID pvMem,
IN DWORD cbMem)
{
NTSTATUS status = RtlDecryptMemory(pvMem, cbMem, 0);
return RtlNtStatusToDosError(status);
}
//
// Return TRUE if Force High Key Protection is set on this machine, return
// FALSE otherwise.
//
BOOL IsForceHighProtectionEnabled(
IN PKEY_CONTAINER_INFO pContInfo)
{
return pContInfo->fForceHighKeyProtection;
}
//
// Retrieves the Force High Key Protection setting for this machine from the
// registry.
//
DWORD InitializeForceHighProtection(
IN OUT PKEY_CONTAINER_INFO pContInfo)
{
HKEY hKey = 0;
DWORD dwSts = ERROR_SUCCESS;
DWORD cbData = 0;
DWORD dwValue = 0;
pContInfo->fForceHighKeyProtection = FALSE;
//
// Open the Cryptography key
//
dwSts = RegOpenKeyEx(
HKEY_LOCAL_MACHINE,
szKEY_CRYPTOAPI_PRIVATE_KEY_OPTIONS,
0,
KEY_READ | KEY_WOW64_64KEY,
&hKey);
if (ERROR_FILE_NOT_FOUND == dwSts)
{
// Key doesn't exist. Assume feature should remain off.
dwSts = ERROR_SUCCESS;
goto Ret;
}
if (ERROR_SUCCESS != dwSts)
goto Ret;
//
// Find out if force high key protection is on
//
cbData = sizeof(DWORD);
dwSts = RegQueryValueEx(
hKey,
szFORCE_KEY_PROTECTION,
0,
NULL,
(PBYTE) &dwValue,
&cbData);
if (ERROR_SUCCESS == dwSts && dwFORCE_KEY_PROTECTION_HIGH == dwValue)
pContInfo->fForceHighKeyProtection = TRUE;
else if (ERROR_FILE_NOT_FOUND == dwSts)
// If the value isn't present, assume Force High is turned off.
dwSts = ERROR_SUCCESS;
Ret:
if (hKey)
RegCloseKey(hKey);
return dwSts;
}
//
// Returns True if key caching w/ timeouts has been enabled.
//
BOOL IsPrivateKeyCachingEnabled(
IN PKEY_CONTAINER_INFO pContInfo)
{
return pContInfo->fCachePrivateKeys;
}
//
// Returns True is the cached private key of the indicated type
// is still valid.
//
// Returns False if no cached key is available, or if the available
// cached key is stale.
//
BOOL IsCachedKeyValid(
IN PKEY_CONTAINER_INFO pContInfo,
IN BOOL fSigKey)
{
DWORD *pdwPreviousTimestamp = NULL;
// If the new caching behavior isn't enabled, let the
// caller proceed as before.
if (FALSE == pContInfo->fCachePrivateKeys)
return TRUE;
if (fSigKey)
pdwPreviousTimestamp = &pContInfo->dwSigKeyTimestamp;
else
pdwPreviousTimestamp = &pContInfo->dwKeyXKeyTimestamp;
if ((GetTickCount() - *pdwPreviousTimestamp) >
pContInfo->cMaxKeyLifetime)
{
// Cached key is stale
*pdwPreviousTimestamp = 0;
return FALSE;
}
return TRUE;
}
//
// Updates the cache counter for the key of the indicated type. This
// is called immediately after the key is read from storage, to
// restart the cached key lifetime "countdown."
//
DWORD SetCachedKeyTimestamp(
IN PKEY_CONTAINER_INFO pContInfo,
IN BOOL fSigKey)
{
if (FALSE == pContInfo->fCachePrivateKeys)
return ERROR_SUCCESS;
if (fSigKey)
pContInfo->dwSigKeyTimestamp = GetTickCount();
else
pContInfo->dwKeyXKeyTimestamp = GetTickCount();
return ERROR_SUCCESS;
}
//
// Reads the key cache initialization parameters from the registry.
//
DWORD InitializeKeyCacheInfo(
IN OUT PKEY_CONTAINER_INFO pContInfo)
{
HKEY hKey = 0;
DWORD dwSts = ERROR_SUCCESS;
DWORD cbData = 0;
//
// Open the Cryptography key
//
dwSts = RegOpenKeyEx(
HKEY_LOCAL_MACHINE,
szKEY_CRYPTOAPI_PRIVATE_KEY_OPTIONS,
0,
KEY_READ | KEY_WOW64_64KEY,
&hKey);
if (ERROR_FILE_NOT_FOUND == dwSts)
{
// Key doesn't exist. Assume feature should remain off.
dwSts = ERROR_SUCCESS;
goto Ret;
}
if (ERROR_SUCCESS != dwSts)
goto Ret;
//
// Find out if private key caching is turned on
//
cbData = sizeof(DWORD);
dwSts = RegQueryValueEx(
hKey,
szKEY_CACHE_ENABLED,
0,
NULL,
(PBYTE) &pContInfo->fCachePrivateKeys,
&cbData);
if (ERROR_FILE_NOT_FOUND == dwSts)
{
// Reg key enabling the new behavior isn't set, so we're done.
dwSts = ERROR_SUCCESS;
goto Ret;
}
else if (ERROR_SUCCESS != dwSts || FALSE == pContInfo->fCachePrivateKeys)
goto Ret;
//
// Find out how long to cache private keys
//
cbData = sizeof(DWORD);
dwSts = RegQueryValueEx(
hKey,
szKEY_CACHE_SECONDS,
0,
NULL,
(PBYTE) &pContInfo->cMaxKeyLifetime,
&cbData);
if (ERROR_SUCCESS != dwSts)
goto Ret;
// Cache lifetime value stored in registry is in seconds. We'll remember
// the value in milliseconds for easy comparison.
pContInfo->cMaxKeyLifetime *= 1000;
Ret:
if (hKey)
RegCloseKey(hKey);
return dwSts;
}
/*++
OpenCallerToken:
This routine returns the caller's ID token.
Arguments:
dwFlags supplies the flags to use when opening the token.
phToken receives the token. It must be closed via CloseHandle.
Return Value:
A DWORD status code.
Remarks:
Author:
Doug Barlow (dbarlow) 5/2/2000
--*/
#undef __SUBROUTINE__
#define __SUBROUTINE__ TEXT("OpenCallerToken")
/*static*/ DWORD
OpenCallerToken(
IN DWORD dwFlags,
OUT HANDLE *phToken)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwSts;
BOOL fSts;
HANDLE hToken = NULL;
fSts = OpenThreadToken(GetCurrentThread(), dwFlags, TRUE, &hToken);
if (!fSts)
{
dwSts = GetLastError();
if (ERROR_NO_TOKEN != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// For Jeff, fall back and get the process token
fSts = OpenProcessToken(GetCurrentProcess(), dwFlags, &hToken);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
*phToken = hToken;
return ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
DWORD
MyCryptProtectData(
IN DATA_BLOB *pDataIn,
IN LPCWSTR szDataDescr,
IN OPTIONAL DATA_BLOB *pOptionalEntropy,
IN PVOID pvReserved,
IN OPTIONAL CRYPTPROTECT_PROMPTSTRUCT *pPromptStruct,
IN DWORD dwFlags,
OUT DATA_BLOB *pDataOut) // out encr blob
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwRetryCount = 0;
DWORD dwMilliseconds = 10;
DWORD dwSts;
for (;;)
{
if (CryptProtectData(pDataIn, szDataDescr, pOptionalEntropy,
pvReserved, pPromptStruct, dwFlags, pDataOut))
{
break;
}
dwSts = GetLastError();
switch (dwSts)
{
case RPC_S_SERVER_TOO_BUSY:
if (MAX_DPAPI_RETRY_COUNT <= dwRetryCount)
{
dwReturn = dwSts;
goto ErrorExit;
}
Sleep(dwMilliseconds);
dwMilliseconds *= 2;
dwRetryCount++;
break;
case RPC_S_UNKNOWN_IF: // Make this error code more friendly.
dwReturn = ERROR_SERVICE_NOT_ACTIVE;
goto ErrorExit;
break;
default:
dwReturn = dwSts;
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
DWORD
MyCryptUnprotectData(
IN DATA_BLOB *pDataIn, // in encr blob
OUT OPTIONAL LPWSTR *ppszDataDescr, // out
IN OPTIONAL DATA_BLOB *pOptionalEntropy,
IN PVOID pvReserved,
IN OPTIONAL CRYPTPROTECT_PROMPTSTRUCT *pPromptStruct,
IN DWORD dwFlags,
OUT DATA_BLOB *pDataOut,
OUT LPDWORD pdwReprotectFlags)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwRetryCount = 0;
DWORD dwMilliseconds = 10;
DWORD dwSts;
BOOL fSts;
if (NULL != pdwReprotectFlags)
{
*pdwReprotectFlags = 0;
dwFlags |= (CRYPTPROTECT_VERIFY_PROTECTION
| CRYPTPROTECT_UI_FORBIDDEN);
}
for (;;)
{
fSts = CryptUnprotectData(pDataIn, // in encr blob
ppszDataDescr, // out
pOptionalEntropy,
pvReserved,
pPromptStruct,
dwFlags,
pDataOut);
if (!fSts)
{
dwSts = GetLastError();
if ((RPC_S_SERVER_TOO_BUSY == dwSts)
&& (MAX_DPAPI_RETRY_COUNT > dwRetryCount))
{
Sleep(dwMilliseconds);
dwMilliseconds *= 2;
dwRetryCount++;
}
else if ((ERROR_PASSWORD_RESTRICTION == dwSts)
&& (NULL != pdwReprotectFlags))
{
*pdwReprotectFlags |= CRYPT_USER_PROTECTED;
dwFlags &= ~CRYPTPROTECT_UI_FORBIDDEN;
}
else
{
dwReturn = dwSts;
break;
}
}
else
{
if (NULL != pdwReprotectFlags)
{
dwSts = GetLastError();
if (CRYPT_I_NEW_PROTECTION_REQUIRED == dwSts)
*pdwReprotectFlags |= CRYPT_UPDATE_KEY;
}
dwReturn = ERROR_SUCCESS;
break;
}
}
return dwReturn;
}
void
FreeEnumOldMachKeyEntries(
PKEY_CONTAINER_INFO pInfo)
{
if (pInfo)
{
if (pInfo->pchEnumOldMachKeyEntries)
{
ContInfoFree(pInfo->pchEnumOldMachKeyEntries);
pInfo->dwiOldMachKeyEntry = 0;
pInfo->cMaxOldMachKeyEntry = 0;
pInfo->cbOldMachKeyEntry = 0;
pInfo->pchEnumOldMachKeyEntries = NULL;
}
}
}
void
FreeEnumRegEntries(
PKEY_CONTAINER_INFO pInfo)
{
if (pInfo)
{
if (pInfo->pchEnumRegEntries)
{
ContInfoFree(pInfo->pchEnumRegEntries);
pInfo->dwiRegEntry = 0;
pInfo->cMaxRegEntry = 0;
pInfo->cbRegEntry = 0;
pInfo->pchEnumRegEntries = NULL;
}
}
}
void
FreeContainerInfo(
PKEY_CONTAINER_INFO pInfo)
{
if (NULL != pInfo)
{
if (NULL != pInfo->pbSigPub)
{
ContInfoFree(pInfo->pbSigPub);
pInfo->ContLens.cbSigPub = 0;
pInfo->pbSigPub = NULL;
}
if (NULL != pInfo->pbSigEncPriv)
{
memnuke(pInfo->pbSigEncPriv, pInfo->ContLens.cbSigEncPriv);
ContInfoFree(pInfo->pbSigEncPriv);
pInfo->ContLens.cbSigEncPriv = 0;
pInfo->pbSigEncPriv = NULL;
}
if (NULL != pInfo->pbExchPub)
{
ContInfoFree(pInfo->pbExchPub);
pInfo->ContLens.cbExchPub = 0;
pInfo->pbExchPub = NULL;
}
if (NULL != pInfo->pbExchEncPriv)
{
memnuke(pInfo->pbExchEncPriv, pInfo->ContLens.cbExchEncPriv);
ContInfoFree(pInfo->pbExchEncPriv);
pInfo->ContLens.cbExchEncPriv = 0;
pInfo->pbExchEncPriv = NULL;
}
if (NULL != pInfo->pbRandom)
{
ContInfoFree(pInfo->pbRandom);
pInfo->ContLens.cbRandom = 0;
pInfo->pbRandom = NULL;
}
if (NULL != pInfo->pszUserName)
{
ContInfoFree(pInfo->pszUserName);
pInfo->ContLens.cbName = 0;
pInfo->pszUserName = NULL;
}
FreeEnumOldMachKeyEntries(pInfo);
FreeEnumRegEntries(pInfo);
if (NULL != pInfo->hFind)
FindClose(pInfo->hFind);
}
}
/*static*/ DWORD
GetHashOfContainer(
LPCSTR pszContainer,
LPWSTR pszHash)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
MD5_CTX MD5;
LPSTR pszLowerContainer = NULL;
DWORD *pdw1;
DWORD *pdw2;
DWORD *pdw3;
DWORD *pdw4;
pszLowerContainer = (LPSTR)ContInfoAlloc(
strlen(pszContainer) + sizeof(CHAR));
if (NULL == pszLowerContainer)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
lstrcpy(pszLowerContainer, pszContainer);
_strlwr(pszLowerContainer);
MD5Init(&MD5);
MD5Update(&MD5,
(LPBYTE)pszLowerContainer,
strlen(pszLowerContainer) + sizeof(CHAR));
MD5Final(&MD5);
pdw1 = (DWORD*)&MD5.digest[0];
pdw2 = (DWORD*)&MD5.digest[4];
pdw3 = (DWORD*)&MD5.digest[8];
pdw4 = (DWORD*)&MD5.digest[12];
wsprintfW(pszHash, L"%08hx%08hx%08hx%08hx", *pdw1, *pdw2, *pdw3, *pdw4);
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pszLowerContainer)
ContInfoFree(pszLowerContainer);
return dwReturn;
}
/*static*/ DWORD
GetMachineGUID(
LPWSTR *ppwszUuid)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HKEY hRegKey = 0;
LPSTR pszUuid = NULL;
LPWSTR pwszUuid = NULL;
DWORD cbUuid = sizeof(UUID);
DWORD cch = 0;
DWORD dwSts;
*ppwszUuid = NULL;
// read the GUID from the Local Machine portion of the registry
dwSts = RegOpenKeyEx(HKEY_LOCAL_MACHINE, SZLOCALMACHINECRYPTO,
0, KEY_READ | KEY_WOW64_64KEY, &hRegKey);
if (ERROR_FILE_NOT_FOUND == dwSts)
{
dwReturn = ERROR_SUCCESS;
goto ErrorExit; // Return a success code, but a null GUID.
}
else if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // (DWORD)NTE_FAIL
goto ErrorExit;
}
dwSts = RegQueryValueEx(hRegKey, SZCRYPTOMACHINEGUID,
0, NULL, NULL, &cbUuid);
if (ERROR_FILE_NOT_FOUND == dwSts)
{
dwReturn = ERROR_SUCCESS;
goto ErrorExit; // Return a success code, but a null GUID.
}
else if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // (DWORD)NTE_FAIL
goto ErrorExit;
}
pszUuid = (LPSTR)ContInfoAlloc(cbUuid);
if (NULL == pszUuid)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
dwSts = RegQueryValueEx(hRegKey, SZCRYPTOMACHINEGUID,
0, NULL, (LPBYTE)pszUuid, &cbUuid);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // (DWORD)NTE_FAIL;
goto ErrorExit;
}
// convert from ansi to unicode
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE, pszUuid, -1, NULL, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pwszUuid = ContInfoAlloc((cch + 1) * sizeof(WCHAR));
if (NULL == pwszUuid)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE, pszUuid, -1,
pwszUuid, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
*ppwszUuid = pwszUuid;
pwszUuid = NULL;
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pwszUuid)
ContInfoFree(pwszUuid);
if (NULL != pszUuid)
ContInfoFree(pszUuid);
if (NULL != hRegKey)
RegCloseKey(hRegKey);
return dwReturn;
}
DWORD
SetMachineGUID(
void)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HKEY hRegKey = 0;
UUID Uuid;
LPSTR pszUuid = NULL;
DWORD cbUuid;
LPWSTR pwszOldUuid = NULL;
DWORD dwSts;
DWORD dwResult;
dwSts = GetMachineGUID(&pwszOldUuid);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (NULL != pwszOldUuid)
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
dwSts = (DWORD) UuidCreate(&Uuid);
if (RPC_S_OK != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = (DWORD) UuidToStringA(&Uuid, &pszUuid);
if (RPC_S_OK != dwSts)
{
dwReturn = dwSts; // (DWORD)NTE_FAIL;
goto ErrorExit;
}
// read the GUID from the Local Machine portion of the registry
dwSts = RegCreateKeyEx(HKEY_LOCAL_MACHINE,
SZLOCALMACHINECRYPTO,
0, NULL, REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS | KEY_WOW64_64KEY, NULL, &hRegKey,
&dwResult);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // (DWORD)NTE_FAIL;
goto ErrorExit;
}
dwSts = RegQueryValueEx(hRegKey, SZCRYPTOMACHINEGUID,
0, NULL, NULL,
&cbUuid);
if (ERROR_FILE_NOT_FOUND != dwSts)
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
dwSts = RegSetValueEx(hRegKey, SZCRYPTOMACHINEGUID,
0, REG_SZ, (BYTE*)pszUuid,
strlen(pszUuid) + 1);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // (DWORD)NTE_FAIL;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (pszUuid)
RpcStringFreeA(&pszUuid);
if (pwszOldUuid)
ContInfoFree(pwszOldUuid);
if (hRegKey)
RegCloseKey(hRegKey);
return dwReturn;
}
/*static*/ DWORD
AddMachineGuidToContainerName(
LPSTR pszContainer,
LPWSTR pwszNewContainer)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
WCHAR rgwszHash[33];
LPWSTR pwszUuid = NULL;
DWORD dwSts;
memset(rgwszHash, 0, sizeof(rgwszHash));
// get the stringized hash of the container name
dwSts = GetHashOfContainer(pszContainer, rgwszHash);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// get the GUID of the machine
dwSts = GetMachineGUID(&pwszUuid);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (NULL == pwszUuid)
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
wcscpy(pwszNewContainer, rgwszHash);
wcscat(pwszNewContainer, L"_");
wcscat(pwszNewContainer, pwszUuid);
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (pwszUuid)
ContInfoFree(pwszUuid);
return dwReturn;
}
//
// Just tries to use DPAPI to make sure it works before creating a key
// container.
//
DWORD
TryDPAPI(
void)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
CRYPTPROTECT_PROMPTSTRUCT PromptStruct;
CRYPT_DATA_BLOB DataIn;
CRYPT_DATA_BLOB DataOut;
CRYPT_DATA_BLOB ExtraEntropy;
DWORD dwJunk = 0;
DWORD dwSts;
memset(&PromptStruct, 0, sizeof(PromptStruct));
memset(&DataIn, 0, sizeof(DataIn));
memset(&DataOut, 0, sizeof(DataOut));
PromptStruct.cbSize = sizeof(PromptStruct);
DataIn.cbData = sizeof(DWORD);
DataIn.pbData = (BYTE*)&dwJunk;
ExtraEntropy.cbData = sizeof(STUFF_TO_GO_INTO_MIX);
ExtraEntropy.pbData = (LPBYTE)STUFF_TO_GO_INTO_MIX;
dwSts = MyCryptProtectData(&DataIn, L"Export Flag", &ExtraEntropy, NULL,
&PromptStruct, 0, &DataOut);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != DataOut.pbData)
LocalFree(DataOut.pbData);
return dwReturn;
}
/*static*/ DWORD
ProtectExportabilityFlag(
IN BOOL fExportable,
IN BOOL fMachineKeyset,
OUT BYTE **ppbProtectedExportability,
OUT DWORD *pcbProtectedExportability)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
CRYPTPROTECT_PROMPTSTRUCT PromptStruct;
CRYPT_DATA_BLOB DataIn;
CRYPT_DATA_BLOB DataOut;
CRYPT_DATA_BLOB ExtraEntropy;
DWORD dwProtectFlags = 0;
DWORD dwSts = 0;
memset(&PromptStruct, 0, sizeof(PromptStruct));
memset(&DataIn, 0, sizeof(DataIn));
memset(&DataOut, 0, sizeof(DataOut));
if (fMachineKeyset)
dwProtectFlags = CRYPTPROTECT_LOCAL_MACHINE;
PromptStruct.cbSize = sizeof(PromptStruct);
DataIn.cbData = sizeof(BOOL);
DataIn.pbData = (BYTE*)&fExportable;
ExtraEntropy.cbData = sizeof(STUFF_TO_GO_INTO_MIX);
ExtraEntropy.pbData = (LPBYTE)STUFF_TO_GO_INTO_MIX;
dwSts = MyCryptProtectData(&DataIn, L"Export Flag", &ExtraEntropy, NULL,
&PromptStruct, dwProtectFlags, &DataOut);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
*ppbProtectedExportability = ContInfoAlloc(DataOut.cbData);
if (NULL == *ppbProtectedExportability)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
*pcbProtectedExportability = DataOut.cbData;
memcpy(*ppbProtectedExportability, DataOut.pbData, DataOut.cbData);
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != DataOut.pbData)
LocalFree(DataOut.pbData);
return dwReturn;
}
/*static*/ DWORD
UnprotectExportabilityFlag(
IN BOOL fMachineKeyset,
IN BYTE *pbProtectedExportability,
IN DWORD cbProtectedExportability,
IN BOOL *pfExportable)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
CRYPTPROTECT_PROMPTSTRUCT PromptStruct;
CRYPT_DATA_BLOB DataIn;
CRYPT_DATA_BLOB DataOut;
CRYPT_DATA_BLOB ExtraEntropy;
DWORD dwProtectFlags = 0;
DWORD dwSts = 0;
memset(&PromptStruct, 0, sizeof(PromptStruct));
memset(&DataIn, 0, sizeof(DataIn));
memset(&DataOut, 0, sizeof(DataOut));
memset(&ExtraEntropy, 0, sizeof(ExtraEntropy));
if (fMachineKeyset)
dwProtectFlags = CRYPTPROTECT_LOCAL_MACHINE;
PromptStruct.cbSize = sizeof(PromptStruct);
DataIn.cbData = cbProtectedExportability;
DataIn.pbData = pbProtectedExportability;
ExtraEntropy.cbData = sizeof(STUFF_TO_GO_INTO_MIX);
ExtraEntropy.pbData = (LPBYTE)STUFF_TO_GO_INTO_MIX;
dwSts = MyCryptUnprotectData(&DataIn, NULL, &ExtraEntropy, NULL,
&PromptStruct, dwProtectFlags, &DataOut,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // NTE_BAD_KEYSET
goto ErrorExit;
}
if (sizeof(BOOL) != DataOut.cbData)
{
dwReturn = (DWORD)NTE_BAD_KEYSET;
goto ErrorExit;
}
*pfExportable = *((BOOL*)DataOut.pbData);
dwReturn = ERROR_SUCCESS;
ErrorExit:
// free the DataOut struct if necessary
if (NULL != DataOut.pbData)
LocalFree(DataOut.pbData);
return dwReturn;
}
/*++
Creates a DACL for the MachineKeys directory for
machine keysets so that Everyone may create machine keys.
--*/
/*static*/ DWORD
GetMachineKeysetDirDACL(
IN OUT PACL *ppDacl)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
SID_IDENTIFIER_AUTHORITY siaWorld = SECURITY_WORLD_SID_AUTHORITY;
SID_IDENTIFIER_AUTHORITY siaNTAuth = SECURITY_NT_AUTHORITY;
PSID pEveryoneSid = NULL;
PSID pAdminsSid = NULL;
DWORD dwAclSize;
//
// prepare Sids representing the world and admins
//
if (!AllocateAndInitializeSid(&siaWorld,
1,
SECURITY_WORLD_RID,
0, 0, 0, 0, 0, 0, 0,
&pEveryoneSid))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (!AllocateAndInitializeSid(&siaNTAuth,
2,
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS,
0, 0, 0, 0, 0, 0,
&pAdminsSid))
{
dwReturn = GetLastError();
goto ErrorExit;
}
//
// compute size of new acl
//
dwAclSize = sizeof(ACL)
+ 2 * (sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD))
+ GetLengthSid(pEveryoneSid)
+ GetLengthSid(pAdminsSid);
//
// allocate storage for Acl
//
*ppDacl = (PACL)ContInfoAlloc(dwAclSize);
if (NULL == *ppDacl)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
if (!InitializeAcl(*ppDacl, dwAclSize, ACL_REVISION))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (!AddAccessAllowedAce(*ppDacl,
ACL_REVISION,
(FILE_GENERIC_WRITE | FILE_GENERIC_READ) & (~WRITE_DAC),
pEveryoneSid))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (!AddAccessAllowedAce(*ppDacl,
ACL_REVISION,
FILE_ALL_ACCESS,
pAdminsSid))
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pEveryoneSid)
FreeSid(pEveryoneSid);
if (NULL != pAdminsSid)
FreeSid(pAdminsSid);
return dwReturn;
}
DWORD
CreateSystemDirectory(
LPCWSTR lpPathName,
SECURITY_ATTRIBUTES *pSecAttrib)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
NTSTATUS Status;
OBJECT_ATTRIBUTES Obja;
HANDLE Handle;
UNICODE_STRING FileName;
IO_STATUS_BLOCK IoStatusBlock;
RTL_RELATIVE_NAME_U RelativeName;
PVOID FreeBuffer;
if(!RtlDosPathNameToRelativeNtPathName_U( lpPathName,
&FileName,
NULL,
&RelativeName))
{
dwReturn = ERROR_PATH_NOT_FOUND;
goto ErrorExit;
}
FreeBuffer = FileName.Buffer;
if ( RelativeName.RelativeName.Length )
{
FileName = RelativeName.RelativeName;
}
else
{
RelativeName.ContainingDirectory = NULL;
}
InitializeObjectAttributes( &Obja,
&FileName,
OBJ_CASE_INSENSITIVE,
RelativeName.ContainingDirectory,
(NULL != pSecAttrib)
? pSecAttrib->lpSecurityDescriptor
: NULL);
// Creating the directory with attribute FILE_ATTRIBUTE_SYSTEM to avoid inheriting encryption
// property from parent directory
Status = NtCreateFile( &Handle,
FILE_LIST_DIRECTORY | SYNCHRONIZE,
&Obja,
&IoStatusBlock,
NULL,
FILE_ATTRIBUTE_SYSTEM,
FILE_SHARE_READ | FILE_SHARE_WRITE,
FILE_CREATE,
FILE_DIRECTORY_FILE | FILE_SYNCHRONOUS_IO_NONALERT | FILE_OPEN_FOR_BACKUP_INTENT,
NULL,
0L );
RtlReleaseRelativeName(&RelativeName);
RtlFreeHeap(RtlProcessHeap(), 0, FreeBuffer);
if(NT_SUCCESS(Status))
{
NtClose(Handle);
dwReturn = ERROR_SUCCESS;
}
else
{
if (STATUS_TIMEOUT == Status)
dwReturn = ERROR_TIMEOUT;
else
dwReturn = RtlNtStatusToDosError(Status);
}
ErrorExit:
return dwReturn;
}
/*++
Create all subdirectories if they do not exists starting at
szCreationStartPoint.
szCreationStartPoint must point to a character within the null terminated
buffer specified by the szFullPath parameter.
Note that szCreationStartPoint should not point at the first character
of a drive root, eg:
d:\foo\bar\bilge\water
\\server\share\foo\bar
\\?\d:\big\path\bilge\water
Instead, szCreationStartPoint should point beyond these components, eg:
bar\bilge\water
foo\bar
big\path\bilge\water
This function does not implement logic for adjusting to compensate for
these inputs because the environment it was design to be used in causes
the input szCreationStartPoint to point well into the szFullPath input
buffer.
--*/
/*static*/ DWORD
CreateNestedDirectories(
IN LPWSTR wszFullPath,
IN LPWSTR wszCreationStartPoint, // must point in null-terminated range of szFullPath
IN BOOL fMachineKeyset)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD i;
DWORD dwPrevious = 0;
DWORD cchRemaining;
SECURITY_ATTRIBUTES SecAttrib;
SECURITY_ATTRIBUTES *pSecAttrib;
SECURITY_DESCRIPTOR sd;
PACL pDacl = NULL;
DWORD dwSts = ERROR_SUCCESS;
BOOL fSts;
if (wszCreationStartPoint < wszFullPath ||
wszCreationStartPoint > (wcslen(wszFullPath) + wszFullPath))
{
dwReturn = ERROR_INVALID_PARAMETER;
goto ErrorExit;
}
cchRemaining = wcslen(wszCreationStartPoint);
//
// scan from left to right in the szCreationStartPoint string
// looking for directory delimiter.
//
for (i = 0; i < cchRemaining; i++)
{
WCHAR charReplaced = wszCreationStartPoint[i];
if (charReplaced == '\\' || charReplaced == '/')
{
wszCreationStartPoint[ i ] = '\0';
pSecAttrib = NULL;
if (fMachineKeyset)
{
memset(&SecAttrib, 0, sizeof(SecAttrib));
SecAttrib.nLength = sizeof(SecAttrib);
if (0 == wcscmp(MACHINE_KEYS_DIR,
&(wszCreationStartPoint[ dwPrevious ])))
{
dwSts = GetMachineKeysetDirDACL(&pDacl);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
fSts = InitializeSecurityDescriptor(&sd,
SECURITY_DESCRIPTOR_REVISION);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
fSts = SetSecurityDescriptorDacl(&sd, TRUE, pDacl, FALSE);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
SecAttrib.lpSecurityDescriptor = &sd;
pSecAttrib = &SecAttrib;
}
}
dwSts = CreateSystemDirectory(wszFullPath, pSecAttrib);
dwPrevious = i + 1;
wszCreationStartPoint[ i ] = charReplaced;
if (ERROR_SUCCESS != dwSts)
{
//
// continue onwards, trying to create specified
// subdirectories. This is done to address the obscure
// scenario where the Bypass Traverse Checking Privilege
// allows the caller to create directories below an
// existing path where one component denies the user
// access. We just keep trying and the last
// CreateDirectory() result is returned to the caller.
//
continue;
}
}
}
if (ERROR_ALREADY_EXISTS == dwSts)
dwSts = ERROR_SUCCESS;
dwReturn = dwSts;
ErrorExit:
if (NULL != pDacl)
ContInfoFree(pDacl);
return dwReturn;
}
#ifdef _M_IX86
BOOL WINAPI
FIsWinNT(
void)
{
static BOOL fIKnow = FALSE;
static BOOL fIsWinNT = FALSE;
OSVERSIONINFO osVer;
if (fIKnow)
return(fIsWinNT);
memset(&osVer, 0, sizeof(OSVERSIONINFO));
osVer.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
if (GetVersionEx(&osVer))
fIsWinNT = (osVer.dwPlatformId == VER_PLATFORM_WIN32_NT);
// even on an error, this is as good as it gets
fIKnow = TRUE;
return fIsWinNT;
}
#else // other than _M_IX86
BOOL WINAPI
FIsWinNT(
void)
{
return TRUE;
}
#endif // _M_IX86
/*++
This function determines if the user associated with the
specified token is the Local System account.
--*/
DWORD
IsLocalSystem(
BOOL *pfIsLocalSystem)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HANDLE hToken = 0;
HANDLE hThreadToken = NULL;
UCHAR InfoBuffer[1024];
DWORD dwInfoBufferSize = sizeof(InfoBuffer);
PTOKEN_USER SlowBuffer = NULL;
PTOKEN_USER pTokenUser = (PTOKEN_USER)InfoBuffer;
PSID psidLocalSystem = NULL;
SID_IDENTIFIER_AUTHORITY siaNtAuthority = SECURITY_NT_AUTHORITY;
BOOL fSts;
DWORD dwSts;
*pfIsLocalSystem = FALSE;
fSts = OpenThreadToken(GetCurrentThread(),
MAXIMUM_ALLOWED,
TRUE,
&hThreadToken);
if (fSts)
{
// impersonation is going on need to save handle
if (FALSE == RevertToSelf())
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
fSts = OpenProcessToken(GetCurrentProcess(),
TOKEN_QUERY,
&hToken);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (NULL != hThreadToken)
{
// put the impersonation token back
fSts = SetThreadToken(NULL, hThreadToken);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
fSts = GetTokenInformation(hToken, TokenUser, pTokenUser,
dwInfoBufferSize, &dwInfoBufferSize);
if (!fSts)
{
dwSts = GetLastError();
if (ERROR_INSUFFICIENT_BUFFER == dwSts)
{
//
// if fast buffer wasn't big enough, allocate enough storage
// and try again.
//
SlowBuffer = (PTOKEN_USER)ContInfoAlloc(dwInfoBufferSize);
if (NULL == SlowBuffer)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
pTokenUser = SlowBuffer;
fSts = GetTokenInformation(hToken, TokenUser, pTokenUser,
dwInfoBufferSize,
&dwInfoBufferSize);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
else
{
dwReturn = dwSts;
goto ErrorExit;
}
}
fSts = AllocateAndInitializeSid(&siaNtAuthority,
1,
SECURITY_LOCAL_SYSTEM_RID,
0, 0, 0, 0, 0, 0, 0,
&psidLocalSystem);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (EqualSid(psidLocalSystem, pTokenUser->User.Sid))
*pfIsLocalSystem = TRUE;
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != SlowBuffer)
ContInfoFree(SlowBuffer);
if (NULL != psidLocalSystem)
FreeSid(psidLocalSystem);
if (NULL != hThreadToken)
CloseHandle(hThreadToken);
if (NULL != hToken)
CloseHandle(hToken);
return dwReturn;
}
/*++
This function determines if the user associated with the
specified token is the Local System account.
--*/
/*static*/ DWORD
IsThreadLocalSystem(
BOOL *pfIsLocalSystem)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
BOOL fSts;
DWORD dwSts;
HANDLE hToken = 0;
UCHAR InfoBuffer[1024];
DWORD dwInfoBufferSize = sizeof(InfoBuffer);
PTOKEN_USER SlowBuffer = NULL;
PTOKEN_USER pTokenUser = (PTOKEN_USER)InfoBuffer;
PSID psidLocalSystem = NULL;
SID_IDENTIFIER_AUTHORITY siaNtAuthority = SECURITY_NT_AUTHORITY;
*pfIsLocalSystem = FALSE;
dwSts = OpenCallerToken(TOKEN_QUERY, &hToken);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
fSts = GetTokenInformation(hToken, TokenUser, pTokenUser,
dwInfoBufferSize, &dwInfoBufferSize);
//
// if fast buffer wasn't big enough, allocate enough storage
// and try again.
//
if (!fSts)
{
dwSts = GetLastError();
if (ERROR_INSUFFICIENT_BUFFER != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
SlowBuffer = (PTOKEN_USER)ContInfoAlloc(dwInfoBufferSize);
if (NULL == SlowBuffer)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
pTokenUser = SlowBuffer;
fSts = GetTokenInformation(hToken, TokenUser, pTokenUser,
dwInfoBufferSize, &dwInfoBufferSize);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
fSts = AllocateAndInitializeSid(&siaNtAuthority,
1,
SECURITY_LOCAL_SYSTEM_RID,
0, 0, 0, 0, 0, 0, 0,
&psidLocalSystem);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (EqualSid(psidLocalSystem, pTokenUser->User.Sid))
*pfIsLocalSystem = TRUE;
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != SlowBuffer)
ContInfoFree(SlowBuffer);
if (NULL != psidLocalSystem)
FreeSid(psidLocalSystem);
if (NULL != hToken)
CloseHandle(hToken);
return dwReturn;
}
/*static*/ DWORD
GetTextualSidA(
PSID pSid, // binary Sid
LPSTR TextualSid, // buffer for Textual representaion of Sid
LPDWORD dwBufferLen) // required/provided TextualSid buffersize
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
BOOL fSts;
PSID_IDENTIFIER_AUTHORITY psia;
DWORD dwSubAuthorities;
DWORD dwCounter;
DWORD dwSidSize;
fSts = IsValidSid(pSid);
if (!fSts)
{
dwReturn = ERROR_INVALID_PARAMETER;
goto ErrorExit;
}
// obtain SidIdentifierAuthority
psia = GetSidIdentifierAuthority(pSid);
// obtain sidsubauthority count
dwSubAuthorities = *GetSidSubAuthorityCount(pSid);
//
// compute buffer length (conservative guess)
// S-SID_REVISION- + identifierauthority- + subauthorities- + NULL
dwSidSize = (15 + 12 + (12 * dwSubAuthorities) + 1) * sizeof(WCHAR);
//
// check provided buffer length.
// If not large enough, indicate proper size and setlasterror
if (*dwBufferLen < dwSidSize)
{
*dwBufferLen = dwSidSize;
dwReturn = ERROR_INSUFFICIENT_BUFFER;
goto ErrorExit;
}
//
// prepare S-SID_REVISION-
dwSidSize = wsprintfA(TextualSid, "S-%lu-", SID_REVISION );
//
// prepare SidIdentifierAuthority
if ((psia->Value[0] != 0) || (psia->Value[1] != 0))
{
dwSidSize += wsprintfA(TextualSid + dwSidSize,
"0x%02hx%02hx%02hx%02hx%02hx%02hx",
(USHORT)psia->Value[0],
(USHORT)psia->Value[1],
(USHORT)psia->Value[2],
(USHORT)psia->Value[3],
(USHORT)psia->Value[4],
(USHORT)psia->Value[5]);
}
else
{
dwSidSize += wsprintfA(TextualSid + dwSidSize,
"%lu",
(ULONG)(psia->Value[5])
+ (ULONG)(psia->Value[4] << 8)
+ (ULONG)(psia->Value[3] << 16)
+ (ULONG)(psia->Value[2] << 24));
}
//
// loop through SidSubAuthorities
for (dwCounter = 0; dwCounter < dwSubAuthorities; dwCounter++)
{
dwSidSize += wsprintfA(TextualSid + dwSidSize,
"-%lu",
*GetSidSubAuthority(pSid, dwCounter));
}
*dwBufferLen = dwSidSize + 1; // tell caller how many chars (include NULL)
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
/*static*/ DWORD
GetTextualSidW(
PSID pSid, // binary Sid
LPWSTR wszTextualSid, // buffer for Textual representaion of Sid
LPDWORD dwBufferLen) // required/provided TextualSid buffersize
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
BOOL fSts;
PSID_IDENTIFIER_AUTHORITY psia;
DWORD dwSubAuthorities;
DWORD dwCounter;
DWORD dwSidSize;
fSts = IsValidSid(pSid);
if (!fSts)
{
dwReturn = ERROR_INVALID_PARAMETER;
goto ErrorExit;
}
// obtain SidIdentifierAuthority
psia = GetSidIdentifierAuthority(pSid);
// obtain sidsubauthority count
dwSubAuthorities = *GetSidSubAuthorityCount(pSid);
//
// compute buffer length (conservative guess)
// S-SID_REVISION- + identifierauthority- + subauthorities- + NULL
dwSidSize = (15 + 12 + (12 * dwSubAuthorities) + 1) * sizeof(WCHAR);
//
// check provided buffer length.
// If not large enough, indicate proper size and setlasterror
if (*dwBufferLen < dwSidSize)
{
*dwBufferLen = dwSidSize;
dwReturn = ERROR_INSUFFICIENT_BUFFER;
goto ErrorExit;
}
//
// prepare S-SID_REVISION-
dwSidSize = wsprintfW(wszTextualSid, L"S-%lu-", SID_REVISION);
//
// prepare SidIdentifierAuthority
if ((psia->Value[0] != 0) || (psia->Value[1] != 0))
{
dwSidSize += wsprintfW(wszTextualSid + dwSidSize,
L"0x%02hx%02hx%02hx%02hx%02hx%02hx",
(USHORT)psia->Value[0],
(USHORT)psia->Value[1],
(USHORT)psia->Value[2],
(USHORT)psia->Value[3],
(USHORT)psia->Value[4],
(USHORT)psia->Value[5]);
}
else
{
dwSidSize += wsprintfW(wszTextualSid + dwSidSize,
L"%lu",
(ULONG)(psia->Value[5])
+ (ULONG)(psia->Value[4] << 8)
+ (ULONG)(psia->Value[3] << 16)
+ (ULONG)(psia->Value[2] << 24));
}
//
// loop through SidSubAuthorities
for (dwCounter = 0; dwCounter < dwSubAuthorities; dwCounter++)
{
dwSidSize += wsprintfW(wszTextualSid + dwSidSize,
L"-%lu",
*GetSidSubAuthority(pSid, dwCounter));
}
*dwBufferLen = dwSidSize + 1; // tell caller how many chars (include NULL)
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
/*static*/ DWORD
GetUserSid(
PTOKEN_USER *pptgUser,
DWORD *pcbUser,
BOOL *pfAlloced)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
BOOL fSts;
DWORD dwSts;
HANDLE hToken = 0;
*pfAlloced = FALSE;
dwSts = OpenCallerToken(TOKEN_QUERY, &hToken);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
fSts = GetTokenInformation(hToken, // identifies access token
TokenUser, // TokenUser info type
*pptgUser, // retrieved info buffer
*pcbUser, // size of buffer passed-in
pcbUser); // required buffer size
if (!fSts)
{
dwSts = GetLastError();
if (ERROR_INSUFFICIENT_BUFFER != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
//
// try again with the specified buffer size
//
*pptgUser = (PTOKEN_USER)ContInfoAlloc(*pcbUser);
if (NULL == *pptgUser)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
*pfAlloced = TRUE;
fSts = GetTokenInformation(hToken, // identifies access token
TokenUser, // TokenUser info type
*pptgUser, // retrieved info buffer
*pcbUser, // size of buffer passed-in
pcbUser); // required buffer size
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != hToken)
CloseHandle(hToken);
return dwReturn;
}
DWORD
GetUserTextualSidA(
LPSTR lpBuffer,
LPDWORD nSize)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwSts;
BYTE FastBuffer[FAST_BUF_SIZE];
PTOKEN_USER ptgUser;
DWORD cbUser;
BOOL fAlloced = FALSE;
ptgUser = (PTOKEN_USER)FastBuffer; // try fast buffer first
cbUser = FAST_BUF_SIZE;
dwSts = GetUserSid(&ptgUser, &cbUser, &fAlloced);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
//
// obtain the textual representaion of the Sid
//
dwSts = GetTextualSidA(ptgUser->User.Sid, // user binary Sid
lpBuffer, // buffer for TextualSid
nSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (fAlloced)
{
if (NULL != ptgUser)
ContInfoFree(ptgUser);
}
return dwReturn;
}
DWORD
GetUserTextualSidW(
LPWSTR lpBuffer,
LPDWORD nSize)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwSts;
BYTE FastBuffer[FAST_BUF_SIZE];
PTOKEN_USER ptgUser;
DWORD cbUser;
BOOL fAlloced = FALSE;
ptgUser = (PTOKEN_USER)FastBuffer; // try fast buffer first
cbUser = FAST_BUF_SIZE;
dwSts = GetUserSid(&ptgUser, &cbUser, &fAlloced);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
//
// obtain the textual representaion of the Sid
//
dwSts = GetTextualSidW(ptgUser->User.Sid, // user binary Sid
lpBuffer, // buffer for TextualSid
nSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (fAlloced)
{
if (NULL != ptgUser)
ContInfoFree(ptgUser);
}
return dwReturn;
}
/*static*/ DWORD
GetUserDirectory(
IN BOOL fMachineKeyset,
OUT LPWSTR pwszUser,
OUT DWORD *pcbUser)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwSts;
if (fMachineKeyset)
{
wcscpy(pwszUser, MACHINE_KEYS_DIR);
*pcbUser = wcslen(pwszUser) + 1;
}
else
{
if (FIsWinNT())
{
dwSts = GetUserTextualSidW(pwszUser, pcbUser);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
else
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
#define WSZRSAPRODUCTSTRING L"\\Microsoft\\Crypto\\RSA\\"
#define WSZDSSPRODUCTSTRING L"\\Microsoft\\Crypto\\DSS\\"
#define PRODUCTSTRINGLEN sizeof(WSZRSAPRODUCTSTRING) - sizeof(WCHAR)
typedef HRESULT
(WINAPI *SHGETFOLDERPATHW)(
HWND hwnd,
int csidl,
HANDLE hToken,
DWORD dwFlags,
LPWSTR pwszPath);
/*static*/ DWORD
GetUserStorageArea(
IN DWORD dwProvType,
IN BOOL fMachineKeyset,
IN BOOL fOldWin2KMachineKeyPath,
OUT BOOL *pfIsLocalSystem, // used if fMachineKeyset is FALSE, in this
// case TRUE is returned if running as Local
// System
IN OUT LPWSTR *ppwszUserStorageArea)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
WCHAR wszUserStorageRoot[MAX_PATH+1];
DWORD cbUserStorageRoot;
WCHAR *wszProductString = NULL;
WCHAR wszUser[MAX_PATH];
DWORD cbUser;
DWORD cchUser = MAX_PATH;
HANDLE hToken = NULL;
DWORD dwTempProfileFlags = 0;
DWORD dwSts;
BOOL fSts;
HMODULE hShell32 = NULL;
PBYTE pbCurrent;
*pfIsLocalSystem = FALSE;
if ((PROV_RSA_SIG == dwProvType)
|| (PROV_RSA_FULL == dwProvType)
|| (PROV_RSA_SCHANNEL == dwProvType)
|| (PROV_RSA_AES == dwProvType))
{
wszProductString = WSZRSAPRODUCTSTRING;
}
else if ((PROV_DSS == dwProvType)
|| (PROV_DSS_DH == dwProvType)
|| (PROV_DH_SCHANNEL == dwProvType))
{
wszProductString = WSZDSSPRODUCTSTRING;
}
//
// check if running in the LocalSystem context
//
if (!fMachineKeyset)
{
dwSts = IsThreadLocalSystem(pfIsLocalSystem);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
//
// determine path to per-user storage area, based on whether this
// is a local machine disposition call or a per-user disposition call.
//
if (fMachineKeyset || *pfIsLocalSystem)
{
if (!fOldWin2KMachineKeyPath)
{
// Should not call SHGetFolderPathW with a caller token for
// the local machine case. The COMMON_APPDATA location is
// per-machine, not per-user, therefor we shouldn't be supplying
// a user token. The shell team should make their own change to ignore
// this, though.
/*
dwSts = OpenCallerToken(TOKEN_QUERY | TOKEN_IMPERSONATE,
&hToken);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
*/
dwSts = (DWORD) SHGetFolderPathW(NULL,
CSIDL_COMMON_APPDATA | CSIDL_FLAG_CREATE,
0 /*hToken*/,
0,
wszUserStorageRoot);
if (dwSts != ERROR_SUCCESS)
{
dwReturn = dwSts;
goto ErrorExit;
}
/*
CloseHandle(hToken);
hToken = NULL;
*/
cbUserStorageRoot = wcslen( wszUserStorageRoot ) * sizeof(WCHAR);
}
else
{
cbUserStorageRoot = GetSystemDirectoryW(wszUserStorageRoot,
MAX_PATH);
cbUserStorageRoot *= sizeof(WCHAR);
}
}
else
{
// check if the profile is temporary
fSts = GetProfileType(&dwTempProfileFlags);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if ((dwTempProfileFlags & PT_MANDATORY)
|| ((dwTempProfileFlags & PT_TEMPORARY)
&& !(dwTempProfileFlags & PT_ROAMING)))
{
dwReturn = (DWORD)NTE_TEMPORARY_PROFILE;
goto ErrorExit;
}
dwSts = OpenCallerToken(TOKEN_QUERY | TOKEN_IMPERSONATE,
&hToken);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// Use new private shell entry point for finding user storage path
if (ERROR_SUCCESS !=
(dwSts = GetUserAppDataPathW(hToken, FALSE, wszUserStorageRoot)))
{
dwReturn = dwSts;
goto ErrorExit;
}
CloseHandle(hToken);
hToken = NULL;
cbUserStorageRoot = wcslen( wszUserStorageRoot ) * sizeof(WCHAR);
}
if (cbUserStorageRoot == 0)
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
//
// get the user name associated with the call.
// Note: this is the textual Sid on NT, and will fail on Win95.
//
dwSts = GetUserDirectory(fMachineKeyset, wszUser, &cchUser);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
cbUser = (cchUser-1) * sizeof(WCHAR);
*ppwszUserStorageArea = (LPWSTR)ContInfoAlloc(cbUserStorageRoot
+ PRODUCTSTRINGLEN
+ cbUser
+ 2 * sizeof(WCHAR)); // trailing slash and NULL
if (NULL == *ppwszUserStorageArea)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
pbCurrent = (PBYTE)*ppwszUserStorageArea;
CopyMemory(pbCurrent, wszUserStorageRoot, cbUserStorageRoot);
pbCurrent += cbUserStorageRoot;
CopyMemory(pbCurrent, wszProductString, PRODUCTSTRINGLEN);
pbCurrent += PRODUCTSTRINGLEN;
CopyMemory(pbCurrent, wszUser, cbUser);
pbCurrent += cbUser; // note: cbUser does not include terminal NULL
((LPSTR)pbCurrent)[0] = '\\';
((LPSTR)pbCurrent)[1] = '\0';
dwSts = CreateNestedDirectories(*ppwszUserStorageArea,
(LPWSTR)((LPBYTE)*ppwszUserStorageArea
+ cbUserStorageRoot
+ sizeof(WCHAR)),
fMachineKeyset);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != hToken)
CloseHandle(hToken);
return dwReturn;
}
/*static*/ DWORD
GetFilePath(
IN LPCWSTR pwszUserStorageArea,
IN LPCWSTR pwszFileName,
IN OUT LPWSTR *ppwszFilePath)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD cbUserStorageArea;
DWORD cbFileName;
cbUserStorageArea = wcslen(pwszUserStorageArea) * sizeof(WCHAR);
cbFileName = wcslen(pwszFileName) * sizeof(WCHAR);
*ppwszFilePath = (LPWSTR)ContInfoAlloc(cbUserStorageArea
+ cbFileName
+ sizeof(WCHAR));
if (*ppwszFilePath == NULL)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
CopyMemory(*ppwszFilePath, pwszUserStorageArea, cbUserStorageArea);
CopyMemory((LPBYTE)*ppwszFilePath+cbUserStorageArea, pwszFileName, cbFileName + sizeof(WCHAR));
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
static DWORD
rgdwCreateFileRetryMilliseconds[] =
{ 1, 10, 100, 500, 1000, 5000 };
#define MAX_CREATE_FILE_RETRY_COUNT \
(sizeof(rgdwCreateFileRetryMilliseconds) \
/ sizeof(rgdwCreateFileRetryMilliseconds[0]))
/*static*/ DWORD
MyCreateFile(
IN BOOL fMachineKeyset, // indicates if this is a machine keyset
IN LPCWSTR wszFilePath, // pointer to name of the file
IN DWORD dwDesiredAccess, // access (read-write) mode
IN DWORD dwShareMode, // share mode
IN DWORD dwCreationDisposition, // how to create
IN DWORD dwAttribs, // file attributes
OUT HANDLE *phFile) // Resultant handle
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HANDLE hToken = 0;
BYTE rgbPriv[sizeof(PRIVILEGE_SET) + sizeof(LUID_AND_ATTRIBUTES)];
PRIVILEGE_SET *pPriv = (PRIVILEGE_SET*)rgbPriv;
BOOL fPrivSet = FALSE;
HANDLE hFile = INVALID_HANDLE_VALUE;
DWORD dwSts, dwSavedSts;
BOOL fSts;
hFile = CreateFileW(wszFilePath,
dwDesiredAccess,
dwShareMode,
NULL,
dwCreationDisposition,
dwAttribs,
NULL);
if (INVALID_HANDLE_VALUE == hFile)
{
dwSts = GetLastError();
// check if machine keyset
if (fMachineKeyset)
{
dwSavedSts = dwSts;
// open a token handle
dwSts = OpenCallerToken(TOKEN_QUERY, &hToken);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
memset(rgbPriv, 0, sizeof(rgbPriv));
pPriv->PrivilegeCount = 1;
// reading file
if (dwDesiredAccess & GENERIC_READ)
{
fSts = LookupPrivilegeValue(NULL, SE_BACKUP_NAME,
&(pPriv->Privilege[0].Luid));
}
// writing
else
{
fSts = LookupPrivilegeValue(NULL, SE_RESTORE_NAME,
&(pPriv->Privilege[0].Luid));
}
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
// check if the BACKUP or RESTORE privileges are set
pPriv->Privilege[0].Attributes = SE_PRIVILEGE_ENABLED;
fSts = PrivilegeCheck(hToken, pPriv, &fPrivSet);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (fPrivSet)
{
hFile = CreateFileW(wszFilePath,
dwDesiredAccess,
dwShareMode,
NULL,
dwCreationDisposition,
dwAttribs | FILE_FLAG_BACKUP_SEMANTICS,
NULL);
if (INVALID_HANDLE_VALUE == hFile)
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
else
{
dwReturn = dwSavedSts;
goto ErrorExit;
}
}
else
{
dwReturn = dwSts;
goto ErrorExit;
}
}
*phFile = hFile;
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != hToken)
CloseHandle(hToken);
return dwReturn;
}
/*static*/ DWORD
OpenFileInStorageArea(
IN BOOL fMachineKeyset,
IN DWORD dwDesiredAccess,
IN LPCWSTR wszUserStorageArea,
IN LPCWSTR wszFileName,
IN OUT HANDLE *phFile)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR wszFilePath = NULL;
DWORD dwShareMode = 0;
DWORD dwCreationDistribution = OPEN_EXISTING;
DWORD dwRetryCount;
DWORD dwAttribs = 0;
DWORD dwSts;
*phFile = INVALID_HANDLE_VALUE;
if (dwDesiredAccess & GENERIC_READ)
{
dwShareMode |= FILE_SHARE_READ;
dwCreationDistribution = OPEN_EXISTING;
}
if (dwDesiredAccess & GENERIC_WRITE)
{
dwShareMode = 0;
dwCreationDistribution = OPEN_ALWAYS;
dwAttribs = FILE_ATTRIBUTE_SYSTEM;
}
dwSts = GetFilePath(wszUserStorageArea, wszFileName, &wszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwRetryCount = 0;
for (;;)
{
dwSts = MyCreateFile(fMachineKeyset,
wszFilePath,
dwDesiredAccess,
dwShareMode,
dwCreationDistribution,
dwAttribs | FILE_FLAG_SEQUENTIAL_SCAN,
phFile);
if (ERROR_SUCCESS == dwSts)
break;
if (((ERROR_SHARING_VIOLATION == dwSts)
|| (ERROR_ACCESS_DENIED == dwSts))
&& (MAX_CREATE_FILE_RETRY_COUNT > dwRetryCount))
{
Sleep(rgdwCreateFileRetryMilliseconds[dwRetryCount]);
dwRetryCount++;
}
else
{
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = (DWORD)NTE_BAD_KEYSET;
else
dwReturn = dwSts;
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != wszFilePath)
ContInfoFree(wszFilePath);
return dwReturn;
}
/*static*/ DWORD
FindClosestFileInStorageArea(
IN LPCWSTR pwszUserStorageArea,
IN LPCSTR pszContainer,
OUT LPWSTR pwszNewFileName,
IN OUT HANDLE *phFile)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR pwszFilePath = NULL;
WCHAR rgwszNewFileName[35];
DWORD dwShareMode = 0;
DWORD dwCreationDistribution = OPEN_EXISTING;
HANDLE hFind = INVALID_HANDLE_VALUE;
WIN32_FIND_DATAW FindData;
DWORD dwSts;
memset(&FindData, 0, sizeof(FindData));
memset(rgwszNewFileName, 0, sizeof(rgwszNewFileName));
*phFile = INVALID_HANDLE_VALUE;
dwShareMode |= FILE_SHARE_READ;
dwCreationDistribution = OPEN_EXISTING;
// get the stringized hash of the container name
dwSts = GetHashOfContainer(pszContainer, rgwszNewFileName);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// ContInfoAlloc zeros memory so no need to set NULL terminator
rgwszNewFileName[32] = '_';
rgwszNewFileName[33] = '*';
dwSts = GetFilePath(pwszUserStorageArea, rgwszNewFileName, &pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
hFind = FindFirstFileExW(pwszFilePath,
FindExInfoStandard,
&FindData,
FindExSearchNameMatch,
NULL,
0);
if (hFind == INVALID_HANDLE_VALUE)
{
dwSts = GetLastError();
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = (DWORD)NTE_BAD_KEYSET;
else
dwReturn = dwSts;
goto ErrorExit;
}
ContInfoFree(pwszFilePath);
pwszFilePath = NULL;
dwSts = GetFilePath(pwszUserStorageArea, FindData.cFileName,
&pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
*phFile = CreateFileW(pwszFilePath,
GENERIC_READ,
dwShareMode,
NULL,
dwCreationDistribution,
FILE_FLAG_SEQUENTIAL_SCAN,
NULL);
if (*phFile == INVALID_HANDLE_VALUE)
{
dwSts = GetLastError();
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = (DWORD)NTE_BAD_KEYSET;
else
dwReturn = dwSts;
goto ErrorExit;
}
// allocate and copy in the real file name to be returned
wcscpy(pwszNewFileName, FindData.cFileName);
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != hFind)
FindClose(hFind);
if (NULL != pwszFilePath)
ContInfoFree(pwszFilePath);
return dwReturn;
}
//
// This function gets the determines if the user associated with the
// specified token is the Local System account.
//
/*static*/ DWORD
ZeroizeFile(
IN LPCWSTR wszFilePath)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HANDLE hFile = INVALID_HANDLE_VALUE;
BYTE *pb = NULL;
DWORD cb;
DWORD dwBytesWritten = 0;
DWORD dwSts;
BOOL fSts;
hFile = CreateFileW(wszFilePath,
GENERIC_WRITE,
0,
NULL,
OPEN_EXISTING,
FILE_ATTRIBUTE_SYSTEM,
NULL);
if (INVALID_HANDLE_VALUE == hFile)
{
dwSts = GetLastError();
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = (DWORD)NTE_BAD_KEYSET;
else
dwReturn = dwSts;
goto ErrorExit;
}
cb = GetFileSize(hFile, NULL);
if ((DWORD)(-1) == cb)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pb = ContInfoAlloc(cb);
if (NULL == pb)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
fSts = WriteFile(hFile, pb, cb, &dwBytesWritten, NULL);
if (!fSts)
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pb)
ContInfoFree(pb);
if (INVALID_HANDLE_VALUE != hFile)
CloseHandle(hFile);
return dwReturn;
}
/*static*/ DWORD
DeleteFileInStorageArea(
IN LPCWSTR wszUserStorageArea,
IN LPCWSTR wszFileName)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR wszFilePath = NULL;
DWORD cbUserStorageArea;
DWORD cbFileName;
DWORD dwSts;
WCHAR rgwszTempFile[MAX_PATH];
WCHAR rgwszTempPath[MAX_PATH];
DWORD dwTempFileUnique = 0;
cbUserStorageArea = wcslen(wszUserStorageArea) * sizeof(WCHAR);
cbFileName = wcslen(wszFileName) * sizeof(WCHAR);
wszFilePath = (LPWSTR)ContInfoAlloc((cbUserStorageArea + cbFileName + 1) * sizeof(WCHAR));
if (wszFilePath == NULL)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
CopyMemory(wszFilePath, wszUserStorageArea, cbUserStorageArea);
CopyMemory((LPBYTE)wszFilePath + cbUserStorageArea, wszFileName,
cbFileName + sizeof(WCHAR));
// write a file of the same size with all zeros first
dwSts = ZeroizeFile(wszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (!DeleteFileW(wszFilePath))
{
// DeleteFile failed, so the container is now corrupted since it's
// been zeroized. Attempt to recover by renaming the file to a temp,
// so it won't subsequently collide with a valid container file name.
dwReturn = GetLastError();
// The target temp file will be in the %tmp% or %temp% directory,
// since placing it in the container directory will affect other
// container-related code (enumeration, etc.).
if (0 == GetTempPathW(MAX_PATH, rgwszTempPath))
{
dwReturn = GetLastError();
goto ErrorExit;
}
// We want to be as certain as possible that the temp file name is
// unique, but we don't want GetTempFileName to create the file for
// us.
if (! NewGenRandom(
NULL, NULL,
(PBYTE) &dwTempFileUnique, sizeof(dwTempFileUnique)))
{
dwReturn = ERROR_INTERNAL_ERROR;
goto ErrorExit;
}
if (0 == GetTempFileNameW(
rgwszTempPath,
L"csp",
dwTempFileUnique,
rgwszTempFile))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (! MoveFileExW(wszFilePath, rgwszTempFile, MOVEFILE_REPLACE_EXISTING))
{
dwReturn = GetLastError();
goto ErrorExit;
}
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != wszFilePath)
ContInfoFree(wszFilePath);
return dwReturn;
}
DWORD
SetContainerUserName(
IN LPSTR pszUserName,
IN PKEY_CONTAINER_INFO pContInfo)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
pContInfo->pszUserName = (LPSTR)ContInfoAlloc((strlen(pszUserName) + 1) * sizeof(CHAR));
if (NULL == pContInfo->pszUserName)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
strcpy(pContInfo->pszUserName, pszUserName);
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
DWORD
ReadContainerInfo(
IN DWORD dwProvType,
IN LPSTR pszContainerName,
IN BOOL fMachineKeyset,
IN DWORD dwFlags,
OUT PKEY_CONTAINER_INFO pContInfo)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
//HANDLE hMap = NULL;
BYTE *pbFile = NULL;
DWORD cbFile;
DWORD cb;
HANDLE hFile = INVALID_HANDLE_VALUE;
KEY_EXPORTABILITY_LENS Exportability;
LPWSTR pwszFileName = NULL;
LPWSTR pwszFilePath = NULL;
WCHAR rgwszOtherMachineFileName[84];
BOOL fGetUserNameFromFile = FALSE;
BOOL fIsLocalSystem = FALSE;
BOOL fRetryWithHashedName = TRUE;
DWORD cch = 0;
DWORD dwSts;
DWORD cbRead = 0;
memset(&Exportability, 0, sizeof(Exportability));
// get the correct storage area (directory)
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, FALSE,
&fIsLocalSystem, &pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// check if the length of the container name is the length of a new unique container,
// then try with the container name which was passed in, if this fails
// then try with the container name with the machine GUID appended
if (69 == strlen(pszContainerName))
{
// convert to UNICODE pszContainerName -> pwszFileName
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszContainerName,
-1, NULL, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pwszFileName = ContInfoAlloc((cch + 1) * sizeof(WCHAR));
if (NULL == pwszFileName)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszContainerName,
-1, pwszFileName, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwSts = OpenFileInStorageArea(fMachineKeyset, GENERIC_READ,
pwszFilePath, pwszFileName, &hFile);
if (ERROR_SUCCESS == dwSts)
{
wcscpy(pContInfo->rgwszFileName, pwszFileName);
// set the flag so the name of the key container will be retrieved
// from the file
fGetUserNameFromFile = TRUE;
fRetryWithHashedName = FALSE;
}
}
if (fRetryWithHashedName)
{
dwSts = AddMachineGuidToContainerName(pszContainerName,
pContInfo->rgwszFileName);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = OpenFileInStorageArea(fMachineKeyset, GENERIC_READ,
pwszFilePath,
pContInfo->rgwszFileName,
&hFile);
if (ERROR_SUCCESS != dwSts)
{
if ((ERROR_ACCESS_DENIED == dwSts) && (dwFlags & CRYPT_NEWKEYSET))
{
dwReturn = (DWORD)NTE_EXISTS;
goto ErrorExit;
}
if (NTE_BAD_KEYSET == dwSts)
{
if (fMachineKeyset || fIsLocalSystem)
{
dwReturn = dwSts;
goto ErrorExit;
}
else
{
memset(rgwszOtherMachineFileName, 0,
sizeof(rgwszOtherMachineFileName));
// try to open any file from another machine with this
// container name
dwSts = FindClosestFileInStorageArea(pwszFilePath,
pszContainerName,
rgwszOtherMachineFileName,
&hFile);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
wcscpy(pContInfo->rgwszFileName,
rgwszOtherMachineFileName);
}
}
}
}
if (dwFlags & CRYPT_NEWKEYSET)
{
dwReturn = (DWORD)NTE_EXISTS;
goto ErrorExit;
}
cbFile = GetFileSize(hFile, NULL);
if ((DWORD)(-1) == cbFile)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (sizeof(KEY_CONTAINER_LENS) > cbFile)
{
dwReturn = (DWORD)NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
pbFile = ContInfoAlloc(cbFile);
if (NULL == pbFile)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
if (FALSE == ReadFile(
hFile,
pbFile,
cbFile,
&cbRead,
NULL))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (cbFile != cbRead)
{
dwReturn = NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
/*
hMap = CreateFileMapping(hFile, NULL, PAGE_READONLY, 0, 0, NULL);
if (NULL == hMap)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pbFile = (BYTE*)MapViewOfFile(hMap, FILE_MAP_READ, 0, 0, 0);
if (NULL == pbFile)
{
dwReturn = GetLastError();
goto ErrorExit;
}
*/
// get the length information out of the file
memcpy(&pContInfo->dwVersion, pbFile, sizeof(DWORD));
cb = sizeof(DWORD);
if (KEY_CONTAINER_FILE_FORMAT_VER != pContInfo->dwVersion)
{
dwSts = (DWORD)NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
memcpy(&pContInfo->ContLens, pbFile + cb, sizeof(KEY_CONTAINER_LENS));
cb += sizeof(KEY_CONTAINER_LENS);
if (pContInfo->fCryptSilent && (0 != pContInfo->ContLens.dwUIOnKey))
{
dwReturn = (DWORD)NTE_SILENT_CONTEXT;
goto ErrorExit;
}
// get the private key exportability stuff
memcpy(&Exportability, pbFile + cb, sizeof(KEY_EXPORTABILITY_LENS));
cb += sizeof(KEY_EXPORTABILITY_LENS);
// get the user name
pContInfo->pszUserName = ContInfoAlloc(pContInfo->ContLens.cbName);
if (NULL == pContInfo->pszUserName)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
memcpy(pContInfo->pszUserName, pbFile + cb, pContInfo->ContLens.cbName);
cb += pContInfo->ContLens.cbName;
// get the random seed
pContInfo->pbRandom = ContInfoAlloc(pContInfo->ContLens.cbRandom);
if (NULL == pContInfo->pbRandom)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
memcpy(pContInfo->pbRandom, pbFile + cb, pContInfo->ContLens.cbRandom);
cb += pContInfo->ContLens.cbRandom;
// get the signature key info out of the file
if (pContInfo->ContLens.cbSigPub && pContInfo->ContLens.cbSigEncPriv)
{
pContInfo->pbSigPub = ContInfoAlloc(pContInfo->ContLens.cbSigPub);
if (NULL == pContInfo->pbSigPub)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
memcpy(pContInfo->pbSigPub, pbFile + cb, pContInfo->ContLens.cbSigPub);
cb += pContInfo->ContLens.cbSigPub;
pContInfo->pbSigEncPriv = ContInfoAlloc(pContInfo->ContLens.cbSigEncPriv);
if (NULL == pContInfo->pbSigEncPriv)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
memcpy(pContInfo->pbSigEncPriv, pbFile + cb,
pContInfo->ContLens.cbSigEncPriv);
cb += pContInfo->ContLens.cbSigEncPriv;
// get the exportability info for the sig key
dwSts = UnprotectExportabilityFlag(fMachineKeyset, pbFile + cb,
Exportability.cbSigExportability,
&pContInfo->fSigExportable);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
cb += Exportability.cbSigExportability;
}
// get the signature key info out of the file
if (pContInfo->ContLens.cbExchPub && pContInfo->ContLens.cbExchEncPriv)
{
pContInfo->pbExchPub = ContInfoAlloc(pContInfo->ContLens.cbExchPub);
if (NULL == pContInfo->pbExchPub)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
memcpy(pContInfo->pbExchPub, pbFile + cb,
pContInfo->ContLens.cbExchPub);
cb += pContInfo->ContLens.cbExchPub;
pContInfo->pbExchEncPriv = ContInfoAlloc(pContInfo->ContLens.cbExchEncPriv);
if (NULL == pContInfo->pbExchEncPriv)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
memcpy(pContInfo->pbExchEncPriv, pbFile + cb,
pContInfo->ContLens.cbExchEncPriv);
cb += pContInfo->ContLens.cbExchEncPriv;
// get the exportability info for the sig key
dwSts = UnprotectExportabilityFlag(fMachineKeyset, pbFile + cb,
Exportability.cbExchExportability,
&pContInfo->fExchExportable);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
cb += Exportability.cbExchExportability;
}
pContInfo = NULL;
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pwszFileName)
ContInfoFree(pwszFileName);
if (NULL != pContInfo)
FreeContainerInfo(pContInfo);
if (NULL != pwszFilePath)
ContInfoFree(pwszFilePath);
/*
if (NULL != pbFile)
UnmapViewOfFile(pbFile);
if (NULL != hMap)
CloseHandle(hMap);
*/
if (pbFile)
ContInfoFree(pbFile);
if (INVALID_HANDLE_VALUE != hFile)
CloseHandle(hFile);
return dwReturn;
}
DWORD
WriteContainerInfo(
IN DWORD dwProvType,
IN LPWSTR pwszFileName,
IN BOOL fMachineKeyset,
IN PKEY_CONTAINER_INFO pContInfo)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
BYTE *pbProtectedSigExportFlag = NULL;
BYTE *pbProtectedExchExportFlag = NULL;
KEY_EXPORTABILITY_LENS ExportabilityLens;
BYTE *pb = NULL;
DWORD cb;
LPWSTR pwszFilePath = NULL;
HANDLE hFile = 0;
DWORD dwBytesWritten;
BOOL fIsLocalSystem = FALSE;
DWORD dwSts;
BOOL fSts;
memset(&ExportabilityLens, 0, sizeof(ExportabilityLens));
// protect the signature exportability flag if necessary
if (pContInfo->ContLens.cbSigPub && pContInfo->ContLens.cbSigEncPriv)
{
dwSts = ProtectExportabilityFlag(pContInfo->fSigExportable,
fMachineKeyset, &pbProtectedSigExportFlag,
&ExportabilityLens.cbSigExportability);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
// protect the key exchange exportability flag if necessary
if (pContInfo->ContLens.cbExchPub && pContInfo->ContLens.cbExchEncPriv)
{
dwSts = ProtectExportabilityFlag(pContInfo->fExchExportable,
fMachineKeyset, &pbProtectedExchExportFlag,
&ExportabilityLens.cbExchExportability);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
pContInfo->ContLens.cbName = strlen(pContInfo->pszUserName) + sizeof(CHAR);
// calculate the buffer length required for the container info
cb = pContInfo->ContLens.cbSigPub + pContInfo->ContLens.cbSigEncPriv +
pContInfo->ContLens.cbExchPub + pContInfo->ContLens.cbExchEncPriv +
ExportabilityLens.cbSigExportability +
ExportabilityLens.cbExchExportability +
pContInfo->ContLens.cbName +
pContInfo->ContLens.cbRandom +
sizeof(KEY_EXPORTABILITY_LENS) + sizeof(KEY_CONTAINER_INFO) +
sizeof(DWORD);
pb = (BYTE*)ContInfoAlloc(cb);
if (NULL == pb)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
// copy the length information
pContInfo->dwVersion = KEY_CONTAINER_FILE_FORMAT_VER;
memcpy(pb, &pContInfo->dwVersion, sizeof(DWORD));
cb = sizeof(DWORD);
memcpy(pb + cb, &pContInfo->ContLens, sizeof(KEY_CONTAINER_LENS));
cb += sizeof(KEY_CONTAINER_LENS);
if (KEY_CONTAINER_FILE_FORMAT_VER != pContInfo->dwVersion)
{
dwReturn = (DWORD)NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
memcpy(pb + cb, &ExportabilityLens, sizeof(KEY_EXPORTABILITY_LENS));
cb += sizeof(KEY_EXPORTABILITY_LENS);
// copy the name of the container to the file
memcpy(pb + cb, pContInfo->pszUserName, pContInfo->ContLens.cbName);
cb += pContInfo->ContLens.cbName;
// copy the random seed to the file
memcpy(pb + cb, pContInfo->pbRandom, pContInfo->ContLens.cbRandom);
cb += pContInfo->ContLens.cbRandom;
// copy the signature key info to the file
if (pContInfo->ContLens.cbSigPub || pContInfo->ContLens.cbSigEncPriv)
{
memcpy(pb + cb, pContInfo->pbSigPub, pContInfo->ContLens.cbSigPub);
cb += pContInfo->ContLens.cbSigPub;
memcpy(pb + cb, pContInfo->pbSigEncPriv,
pContInfo->ContLens.cbSigEncPriv);
cb += pContInfo->ContLens.cbSigEncPriv;
// write the exportability info for the sig key
memcpy(pb + cb, pbProtectedSigExportFlag,
ExportabilityLens.cbSigExportability);
cb += ExportabilityLens.cbSigExportability;
}
// get the signature key info out of the file
if (pContInfo->ContLens.cbExchPub || pContInfo->ContLens.cbExchEncPriv)
{
memcpy(pb + cb, pContInfo->pbExchPub, pContInfo->ContLens.cbExchPub);
cb += pContInfo->ContLens.cbExchPub;
memcpy(pb + cb, pContInfo->pbExchEncPriv,
pContInfo->ContLens.cbExchEncPriv);
cb += pContInfo->ContLens.cbExchEncPriv;
// write the exportability info for the sig key
memcpy(pb + cb, pbProtectedExchExportFlag,
ExportabilityLens.cbExchExportability);
cb += ExportabilityLens.cbExchExportability;
}
// get the correct storage area (directory)
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, FALSE,
&fIsLocalSystem, &pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// open the file to write the information to
dwSts = OpenFileInStorageArea(fMachineKeyset, GENERIC_WRITE,
pwszFilePath, pwszFileName,
&hFile);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // NTE_FAIL
goto ErrorExit;
}
fSts = WriteFile(hFile, pb, cb, &dwBytesWritten, NULL);
if (!fSts)
{
dwReturn = GetLastError(); // NTE_FAIL
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pwszFilePath)
ContInfoFree(pwszFilePath);
if (NULL != pbProtectedSigExportFlag)
ContInfoFree(pbProtectedSigExportFlag);
if (NULL != pbProtectedExchExportFlag)
ContInfoFree(pbProtectedExchExportFlag);
if (NULL != pb)
ContInfoFree(pb);
if (NULL != hFile)
CloseHandle(hFile);
return dwReturn;
}
/*static*/ DWORD
DeleteKeyContainer(
IN LPWSTR pwszFilePath,
IN LPSTR pszContainer)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR pwszFileName = NULL;
WCHAR rgwchNewFileName[80];
BOOL fRetryWithHashedName = TRUE;
DWORD cch = 0;
DWORD dwSts;
memset(rgwchNewFileName, 0, sizeof(rgwchNewFileName));
// first try with the container name which was passed in, if this fails
if (69 == strlen(pszContainer))
{
// convert to UNICODE pszContainer -> pwszFileName
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszContainer,
-1, NULL, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pwszFileName = ContInfoAlloc((cch + 1) * sizeof(WCHAR));
if (NULL == pwszFileName)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszContainer,
-1, pwszFileName, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwSts = DeleteFileInStorageArea(pwszFilePath, pwszFileName);
if (ERROR_SUCCESS == dwSts)
fRetryWithHashedName = FALSE;
}
// then try with hash of container name and the machine GUID appended
if (fRetryWithHashedName)
{
dwSts = AddMachineGuidToContainerName(pszContainer,
rgwchNewFileName);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = DeleteFileInStorageArea(pwszFilePath, rgwchNewFileName);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pwszFileName)
ContInfoFree(pwszFileName);
return dwReturn;
}
DWORD
DeleteContainerInfo(
IN DWORD dwProvType,
IN LPSTR pszContainer,
IN BOOL fMachineKeyset)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR pwszFilePath = NULL;
HANDLE hFile = INVALID_HANDLE_VALUE;
BOOL fIsLocalSystem = FALSE;
WCHAR rgwchNewFileName[80];
BOOL fDeleted = FALSE;
DWORD dwSts;
// get the correct storage area (directory)
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, FALSE,
&fIsLocalSystem, &pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = DeleteKeyContainer(pwszFilePath, pszContainer);
if (ERROR_SUCCESS != dwSts)
{
// for migration of machine keys from system to All Users\App Data
if (fMachineKeyset)
{
ContInfoFree(pwszFilePath);
pwszFilePath = NULL;
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, TRUE,
&fIsLocalSystem, &pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = DeleteKeyContainer(pwszFilePath, pszContainer);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
else
{
fDeleted = TRUE;
}
}
}
else
{
fDeleted = TRUE;
}
// there may be other keys created with the same container name on
// different machines and these also need to be deleted
for (;;)
{
memset(rgwchNewFileName, 0, sizeof(rgwchNewFileName));
dwSts = FindClosestFileInStorageArea(pwszFilePath, pszContainer,
rgwchNewFileName, &hFile);
if (ERROR_SUCCESS != dwSts)
break;
CloseHandle(hFile);
hFile = INVALID_HANDLE_VALUE;
dwSts = DeleteFileInStorageArea(pwszFilePath, rgwchNewFileName);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
else
fDeleted = TRUE;
}
if (!fDeleted)
{
dwReturn = (DWORD)NTE_BAD_KEYSET;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (INVALID_HANDLE_VALUE != hFile)
CloseHandle(hFile);
if (NULL != pwszFilePath)
ContInfoFree(pwszFilePath);
return dwReturn;
}
/*static*/ DWORD
ReadContainerNameFromFile(
IN BOOL fMachineKeyset,
IN LPWSTR pwszFileName,
IN LPWSTR pwszFilePath,
OUT LPSTR pszNextContainer,
IN OUT DWORD *pcbNextContainer)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HANDLE hMap = NULL;
BYTE *pbFile = NULL;
HANDLE hFile = INVALID_HANDLE_VALUE;
DWORD cbFile = 0;
DWORD *pdwVersion;
PKEY_CONTAINER_LENS pContLens;
DWORD dwSts;
// open the file
dwSts = OpenFileInStorageArea(fMachineKeyset,
GENERIC_READ,
pwszFilePath,
pwszFileName,
&hFile);
if (ERROR_SUCCESS != dwSts)
{
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = (DWORD)NTE_BAD_KEYSET;
else
dwReturn = dwSts;
goto ErrorExit;
}
cbFile = GetFileSize(hFile, NULL);
if ((DWORD)(-1) == cbFile)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if ((sizeof(DWORD) + sizeof(KEY_CONTAINER_LENS)) > cbFile)
{
dwReturn = (DWORD)NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
hMap = CreateFileMapping(hFile, NULL, PAGE_READONLY,
0, 0, NULL);
if (NULL == hMap)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pbFile = (BYTE*)MapViewOfFile(hMap, FILE_MAP_READ,
0, 0, 0 );
if (NULL == pbFile)
{
dwReturn = GetLastError();
goto ErrorExit;
}
// get the length information out of the file
pdwVersion = (DWORD*)pbFile;
if (KEY_CONTAINER_FILE_FORMAT_VER != *pdwVersion)
{
dwReturn = (DWORD)NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
pContLens = (PKEY_CONTAINER_LENS)(pbFile + sizeof(DWORD));
if (NULL == pszNextContainer)
{
*pcbNextContainer = MAX_PATH + 1;
dwReturn = ERROR_SUCCESS; // Just tell them the length.
goto ErrorExit;
}
if (*pcbNextContainer < pContLens->cbName)
{
*pcbNextContainer = MAX_PATH + 1;
}
else if ((sizeof(DWORD) + sizeof(KEY_CONTAINER_LENS) +
sizeof(KEY_EXPORTABILITY_LENS) + pContLens->cbName) > cbFile)
{
dwReturn = (DWORD)NTE_KEYSET_ENTRY_BAD;
goto ErrorExit;
}
else
{
// get the container name
memcpy(pszNextContainer,
pbFile + sizeof(DWORD) + sizeof(KEY_CONTAINER_LENS) +
sizeof(KEY_EXPORTABILITY_LENS), pContLens->cbName);
// *pcbNextContainer = pContLens->cbName;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pbFile)
UnmapViewOfFile(pbFile);
if (NULL != hMap)
CloseHandle(hMap);
if (INVALID_HANDLE_VALUE != hFile)
CloseHandle(hFile);
return dwReturn;
}
DWORD
GetUniqueContainerName(
IN KEY_CONTAINER_INFO *pContInfo,
OUT BYTE *pbData,
OUT DWORD *pcbData)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPSTR pszUniqueContainer = NULL;
DWORD cch;
cch = WideCharToMultiByte(CP_ACP, WC_NO_BEST_FIT_CHARS,
pContInfo->rgwszFileName, -1,
NULL, 0, NULL, NULL);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
pszUniqueContainer = (LPSTR)ContInfoAlloc((cch + 1) * sizeof(WCHAR));
if (NULL == pszUniqueContainer)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
cch = WideCharToMultiByte(CP_ACP, WC_NO_BEST_FIT_CHARS,
pContInfo->rgwszFileName, -1,
pszUniqueContainer, cch,
NULL, NULL);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (pbData == NULL)
{
*pcbData = strlen(pszUniqueContainer) + 1;
}
else if (*pcbData < (strlen(pszUniqueContainer) + 1))
{
*pcbData = strlen(pszUniqueContainer) + 1;
dwReturn = ERROR_MORE_DATA;
goto ErrorExit;
}
else
{
*pcbData = strlen(pszUniqueContainer) + 1;
strcpy((LPSTR)pbData, pszUniqueContainer);
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pszUniqueContainer)
ContInfoFree(pszUniqueContainer);
return dwReturn;
}
//
// Function : MachineGuidInFilename
//
// Description : Check if the given Machine GUID is in the given filename.
// Returns TRUE if it is FALSE if it is not.
//
/*static*/ BOOL
MachineGuidInFilename(
LPWSTR pwszFileName,
LPWSTR pwszMachineGuid)
{
DWORD cbFileName;
BOOL fRet = FALSE;
cbFileName = wcslen(pwszFileName);
// make sure the length of the filename is longer than the GUID
if (cbFileName >= (DWORD)wcslen(pwszMachineGuid))
{
// compare the GUID with the last 36 characters of the file name
if (0 == memcmp(pwszMachineGuid, &(pwszFileName[cbFileName - 36]),
36 * sizeof(WCHAR)))
fRet = TRUE;
}
return fRet;
}
DWORD
GetNextContainer(
IN DWORD dwProvType,
IN BOOL fMachineKeyset,
IN DWORD dwFlags,
OUT LPSTR pszNextContainer,
IN OUT DWORD *pcbNextContainer,
IN OUT HANDLE *phFind)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR pwszFilePath = NULL;
LPWSTR pwszEnumFilePath = NULL;
WIN32_FIND_DATAW FindData;
BOOL fIsLocalSystem = FALSE;
LPWSTR pwszMachineGuid = NULL;
DWORD dwSts;
memset(&FindData, 0, sizeof(FindData));
// get the correct storage area (directory)
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, FALSE,
&fIsLocalSystem, &pwszFilePath);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (dwFlags & CRYPT_FIRST)
{
*phFind = INVALID_HANDLE_VALUE;
pwszEnumFilePath = (LPWSTR)ContInfoAlloc((wcslen(pwszFilePath) + 2) * sizeof(WCHAR));
if (NULL == pwszEnumFilePath)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
wcscpy(pwszEnumFilePath, pwszFilePath);
pwszEnumFilePath[wcslen(pwszFilePath)] = '*';
*phFind = FindFirstFileExW(
pwszEnumFilePath,
FindExInfoStandard,
&FindData,
FindExSearchNameMatch,
NULL,
0);
if (INVALID_HANDLE_VALUE == *phFind)
{
dwReturn = ERROR_NO_MORE_ITEMS;
goto ErrorExit;
}
// skip past . and ..
if (!FindNextFileW(*phFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
if (!FindNextFileW(*phFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
}
else
{
GetNextFile:
{
if (!FindNextFileW(*phFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
}
}
// if this is a machine keyset or this is local system then we want to
// ignore key containers not matching the current machine GUID
if (fMachineKeyset || fIsLocalSystem)
{
// get the GUID of the machine
dwSts = GetMachineGUID(&pwszMachineGuid);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (NULL == pwszMachineGuid)
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
// check if the file name has the machine GUID
while (!MachineGuidInFilename(FindData.cFileName, pwszMachineGuid))
{
if (!FindNextFileW(*phFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
}
}
// return the container name, in order to do that we need to open the
// file and pull out the container name
//
// we try to get the next file if failure occurs in case the file was
// deleted since the FindNextFile
//
dwSts = ReadContainerNameFromFile(fMachineKeyset,
FindData.cFileName,
pwszFilePath,
pszNextContainer,
pcbNextContainer);
if (ERROR_SUCCESS != dwSts)
goto GetNextFile;
else if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pwszMachineGuid)
ContInfoFree(pwszMachineGuid);
if (NULL != pwszFilePath)
ContInfoFree(pwszFilePath);
if (NULL != pwszEnumFilePath)
ContInfoFree(pwszEnumFilePath);
return dwReturn;
}
// Converts to UNICODE and uses RegOpenKeyExW
DWORD
MyRegOpenKeyEx(
IN HKEY hRegKey,
IN LPSTR pszKeyName,
IN DWORD dwReserved,
IN REGSAM SAMDesired,
OUT HKEY *phNewRegKey)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
WCHAR rgwchFastBuff[(MAX_PATH + 1) * 2];
LPWSTR pwsz = NULL;
BOOL fAlloced = FALSE;
DWORD cch;
DWORD dwSts;
memset(rgwchFastBuff, 0, sizeof(rgwchFastBuff));
// convert reg key name to unicode
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszKeyName, -1,
NULL, 0);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if ((cch + 1) > ((MAX_PATH + 1) * 2))
{
pwsz = ContInfoAlloc((cch + 1) * sizeof(WCHAR));
if (NULL == pwsz)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
fAlloced = TRUE;
}
else
{
pwsz = rgwchFastBuff;
}
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszKeyName, -1, pwsz, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwSts = RegOpenKeyExW(hRegKey,
pwsz,
dwReserved,
SAMDesired,
phNewRegKey);
if (ERROR_SUCCESS != dwSts)
{
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = (DWORD)NTE_BAD_KEYSET;
else
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (fAlloced && (NULL != pwsz))
ContInfoFree(pwsz);
return dwReturn;
}
// Converts to UNICODE and uses RegDeleteKeyW
DWORD
MyRegDeleteKey(
IN HKEY hRegKey,
IN LPSTR pszKeyName)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
WCHAR rgwchFastBuff[(MAX_PATH + 1) * 2];
LPWSTR pwsz = NULL;
BOOL fAlloced = FALSE;
DWORD cch;
DWORD dwSts;
memset(rgwchFastBuff, 0, sizeof(rgwchFastBuff));
// convert reg key name to unicode
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszKeyName, -1,
NULL, 0);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if ((cch + 1) > ((MAX_PATH + 1) * 2))
{
pwsz = ContInfoAlloc((cch + 1) * sizeof(WCHAR));
if (NULL == pwsz)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
fAlloced = TRUE;
}
else
{
pwsz = rgwchFastBuff;
}
cch = MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
pszKeyName, -1,
pwsz, cch);
if (0 == cch)
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwSts = RegDeleteKeyW(hRegKey, pwsz);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (fAlloced && (NULL != pwsz))
ContInfoFree(pwsz);
return dwReturn;
}
DWORD
AllocAndSetLocationBuff(
BOOL fMachineKeySet,
DWORD dwProvType,
CONST char *pszUserID,
HKEY *phTopRegKey,
TCHAR **ppszLocBuff,
BOOL fUserKeys,
BOOL *pfLeaveOldKeys,
LPDWORD pcbBuff)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwSts;
CHAR szSID[MAX_PATH];
DWORD cbSID = MAX_PATH;
DWORD cbLocBuff = 0;
DWORD cbTmp = 0;
CHAR *pszTmp;
BOOL fIsThreadLocalSystem = FALSE;
if (fMachineKeySet)
{
*phTopRegKey = HKEY_LOCAL_MACHINE;
if ((PROV_RSA_FULL == dwProvType) ||
(PROV_RSA_SCHANNEL == dwProvType) ||
(PROV_RSA_AES == dwProvType))
{
cbTmp = RSA_MACH_REG_KEY_LOC_LEN;
pszTmp = RSA_MACH_REG_KEY_LOC;
}
else if ((PROV_DSS == dwProvType) ||
(PROV_DSS_DH == dwProvType) ||
(PROV_DH_SCHANNEL == dwProvType))
{
cbTmp = DSS_MACH_REG_KEY_LOC_LEN;
pszTmp = DSS_MACH_REG_KEY_LOC;
}
else
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
}
else
{
if ((PROV_RSA_FULL == dwProvType) ||
(PROV_RSA_SCHANNEL == dwProvType) ||
(PROV_RSA_AES == dwProvType))
{
cbTmp = RSA_REG_KEY_LOC_LEN;
pszTmp = RSA_REG_KEY_LOC;
}
else if ((PROV_DSS == dwProvType) ||
(PROV_DSS_DH == dwProvType) ||
(PROV_DH_SCHANNEL == dwProvType))
{
cbTmp = DSS_REG_KEY_LOC_LEN;
pszTmp = DSS_REG_KEY_LOC;
}
else
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
if (FIsWinNT())
{
dwSts = IsThreadLocalSystem(&fIsThreadLocalSystem);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = GetUserTextualSidA(szSID, &cbSID);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts; // NTE_BAD_KEYSET
goto ErrorExit;
}
// this checks to see if the key to the current user may be opened
if (!fMachineKeySet)
{
dwSts = RegOpenKeyEx(HKEY_USERS,
szSID,
0, // dwOptions
KEY_READ,
phTopRegKey);
if (ERROR_SUCCESS != dwSts)
{
//
// if that failed, try HKEY_USERS\.Default (for services on NT).
//
cbSID = strlen(".DEFAULT") + 1;
strcpy(szSID, ".DEFAULT");
dwSts = RegOpenKeyEx(HKEY_USERS,
szSID,
0, // dwOptions
KEY_READ,
phTopRegKey);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
*pfLeaveOldKeys = TRUE;
}
}
}
else
{
*phTopRegKey = HKEY_CURRENT_USER;
}
}
if (!fUserKeys)
cbLocBuff = strlen(pszUserID);
cbLocBuff = cbLocBuff + cbTmp + 2;
*ppszLocBuff = (CHAR*)ContInfoAlloc(cbLocBuff);
if (NULL == *ppszLocBuff)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
// Copy the location of the key groups, append the userID to it
memcpy(*ppszLocBuff, pszTmp, cbTmp);
if (!fUserKeys)
{
(*ppszLocBuff)[cbTmp-1] = '\\';
strcpy(&(*ppszLocBuff)[cbTmp], pszUserID);
}
if (NULL != pcbBuff)
*pcbBuff = cbLocBuff;
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
//
// Enumerates the old machine keys in the file system
// keys were in this location in Beta 2 and Beta 3 of NT5/Win2K
//
DWORD
EnumOldMachineKeys(
IN DWORD dwProvType,
IN OUT PKEY_CONTAINER_INFO pContInfo)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HANDLE hFind = INVALID_HANDLE_VALUE;
WIN32_FIND_DATAW FindData;
LPWSTR pwszUserStorageArea = NULL;
LPWSTR pwszTmp = NULL;
BOOL fIsLocalSystem;
DWORD i;
LPSTR pszNextContainer;
DWORD cbNextContainer;
LPSTR pszTmpContainer;
DWORD dwSts;
// first check if the enumeration table is already set up
if (NULL != pContInfo->pchEnumOldMachKeyEntries)
{
dwReturn = ERROR_SUCCESS; // Nothing to do!
goto ErrorExit;
}
memset(&FindData, 0, sizeof(FindData));
dwSts = GetUserStorageArea(dwProvType, TRUE, TRUE,
&fIsLocalSystem, &pwszUserStorageArea);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = ERROR_NO_MORE_ITEMS;
goto ErrorExit;
}
// last character is backslash, so strip that off
pwszTmp = (LPWSTR)ContInfoAlloc((wcslen(pwszUserStorageArea) + 3) * sizeof(WCHAR));
if (NULL == pwszTmp)
{
dwSts = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
wcscpy(pwszTmp, pwszUserStorageArea);
wcscat(pwszTmp, L"*");
// figure out how many files are in the directroy
hFind = FindFirstFileExW(pwszTmp,
FindExInfoStandard,
&FindData,
FindExSearchNameMatch,
NULL,
0);
if (INVALID_HANDLE_VALUE == hFind)
{
dwSts = GetLastError();
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
// skip past . and ..
if (!FindNextFileW(hFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
if (!FindNextFileW(hFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
for (i = 1; ; i++)
{
memset(&FindData, 0, sizeof(FindData));
if (!FindNextFileW(hFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
break;
else if (ERROR_ACCESS_DENIED != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
}
FindClose(hFind);
hFind = INVALID_HANDLE_VALUE;
pContInfo->cbOldMachKeyEntry = MAX_PATH + 1;
pContInfo->dwiOldMachKeyEntry = 0;
pContInfo->cMaxOldMachKeyEntry = i;
// allocate space for the file names
pContInfo->pchEnumOldMachKeyEntries = ContInfoAlloc(i * (MAX_PATH + 1));
if (NULL == pContInfo->pchEnumOldMachKeyEntries)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
// enumerate through getting file name from each
memset(&FindData, 0, sizeof(FindData));
hFind = FindFirstFileExW(pwszTmp,
FindExInfoStandard,
&FindData,
FindExSearchNameMatch,
NULL,
0);
if (INVALID_HANDLE_VALUE == hFind)
{
dwSts = GetLastError();
if (ERROR_FILE_NOT_FOUND == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
// skip past . and ..
if (!FindNextFileW(hFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
memset(&FindData, 0, sizeof(FindData));
if (!FindNextFileW(hFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
pszNextContainer = pContInfo->pchEnumOldMachKeyEntries;
for (i = 0; i < pContInfo->cMaxOldMachKeyEntry; i++)
{
cbNextContainer = MAX_PATH;
// return the container name, in order to do that we need to open the
// file and pull out the container name
dwSts = ReadContainerNameFromFile(TRUE,
FindData.cFileName,
pwszUserStorageArea,
pszNextContainer,
&cbNextContainer);
if (ERROR_SUCCESS != dwSts)
{
pszTmpContainer = pszNextContainer;
}
else
{
pszTmpContainer = pszNextContainer + MAX_PATH + 1;
}
memset(&FindData, 0, sizeof(FindData));
if (!FindNextFileW(hFind, &FindData))
{
dwSts = GetLastError();
if (ERROR_NO_MORE_FILES == dwSts)
break;
else if (ERROR_ACCESS_DENIED != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
pszNextContainer = pszTmpContainer;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pwszTmp)
ContInfoFree(pwszTmp);
if (NULL != pwszUserStorageArea)
ContInfoFree(pwszUserStorageArea);
if (INVALID_HANDLE_VALUE != hFind)
FindClose(hFind);
return dwReturn;
}
DWORD
GetNextEnumedOldMachKeys(
IN PKEY_CONTAINER_INFO pContInfo,
IN BOOL fMachineKeyset,
OUT BYTE *pbData,
OUT DWORD *pcbData)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
CHAR *psz;
if (!fMachineKeyset)
{
dwReturn = ERROR_SUCCESS; // Nothing to do!
goto ErrorExit;
}
if ((NULL == pContInfo->pchEnumOldMachKeyEntries) ||
(pContInfo->dwiOldMachKeyEntry >= pContInfo->cMaxOldMachKeyEntry))
{
dwReturn = ERROR_NO_MORE_ITEMS;
goto ErrorExit;
}
if (NULL == pbData)
*pcbData = pContInfo->cbRegEntry;
else if (*pcbData < pContInfo->cbRegEntry)
{
*pcbData = pContInfo->cbRegEntry;
dwReturn = ERROR_MORE_DATA;
goto ErrorExit;
}
else
{
psz = pContInfo->pchEnumOldMachKeyEntries + (pContInfo->dwiOldMachKeyEntry *
pContInfo->cbOldMachKeyEntry);
memcpy(pbData, psz, strlen(psz) + 1);
pContInfo->dwiOldMachKeyEntry++;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (fMachineKeyset)
*pcbData = pContInfo->cbOldMachKeyEntry;
return dwReturn;
}
//
// Enumerates the keys in the registry into a list of entries
//
DWORD
EnumRegKeys(
IN OUT PKEY_CONTAINER_INFO pContInfo,
IN BOOL fMachineKeySet,
IN DWORD dwProvType,
OUT BYTE *pbData,
IN OUT DWORD *pcbData)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HKEY hTopRegKey = 0;
LPSTR pszBuff = NULL;
DWORD cbBuff;
BOOL fLeaveOldKeys = FALSE;
HKEY hKey = 0;
DWORD cSubKeys;
DWORD cchMaxSubkey;
DWORD cchMaxClass;
DWORD cValues;
DWORD cchMaxValueName;
DWORD cbMaxValueData;
DWORD cbSecurityDesriptor;
FILETIME ftLastWriteTime;
CHAR *psz;
DWORD i;
DWORD dwSts;
// first check if the enumeration table is already set up
if (NULL != pContInfo->pchEnumRegEntries)
{
dwReturn = ERROR_SUCCESS; // Nothing to do!
goto ErrorExit;
}
// get the path to the registry keys
dwSts = AllocAndSetLocationBuff(fMachineKeySet,
dwProvType,
pContInfo->pszUserName,
&hTopRegKey,
&pszBuff,
TRUE,
&fLeaveOldKeys,
&cbBuff);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// open the reg key
dwSts = MyRegOpenKeyEx(hTopRegKey,
pszBuff,
0,
KEY_READ,
&hKey);
if (ERROR_SUCCESS != dwSts)
{
if (NTE_BAD_KEYSET == dwSts)
dwReturn = ERROR_NO_MORE_ITEMS;
else
dwReturn = dwSts;
goto ErrorExit;
}
// find out info on old key containers
dwSts = RegQueryInfoKey(hKey,
NULL,
NULL,
NULL,
&cSubKeys,
&cchMaxSubkey,
&cchMaxClass,
&cValues,
&cchMaxValueName,
&cbMaxValueData,
&cbSecurityDesriptor,
&ftLastWriteTime);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// if there are old keys then enumerate them into a table
if (0 != cSubKeys)
{
pContInfo->cMaxRegEntry = cSubKeys;
pContInfo->cbRegEntry = cchMaxSubkey + 1;
pContInfo->pchEnumRegEntries =
ContInfoAlloc(pContInfo->cMaxRegEntry
* pContInfo->cbRegEntry
* sizeof(CHAR));
if (NULL == pContInfo->pchEnumRegEntries)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
for (i = 0; i < pContInfo->cMaxRegEntry; i++)
{
psz = pContInfo->pchEnumRegEntries + (i * pContInfo->cbRegEntry);
dwSts = RegEnumKey(hKey,
i,
psz,
pContInfo->cbRegEntry);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
if (NULL == pbData)
*pcbData = pContInfo->cbRegEntry;
else if (*pcbData < pContInfo->cbRegEntry)
{
*pcbData = pContInfo->cbRegEntry;
dwReturn = ERROR_MORE_DATA;
goto ErrorExit;
}
else
{
*pcbData = pContInfo->cbRegEntry;
// ?BUGBUG? What?
// CopyMemory(pbData, pContInfo->pbRegEntry, pContInfo->cbRegEntry);
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if ((NULL != hTopRegKey)
&& (HKEY_CURRENT_USER != hTopRegKey)
&& (HKEY_LOCAL_MACHINE != hTopRegKey))
{
RegCloseKey(hTopRegKey);
}
if (NULL != pszBuff)
ContInfoFree(pszBuff);
if (NULL != hKey)
RegCloseKey(hKey);
return dwReturn;
}
DWORD
GetNextEnumedRegKeys(
IN PKEY_CONTAINER_INFO pContInfo,
OUT BYTE *pbData,
OUT DWORD *pcbData)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
CHAR *psz;
if ((NULL == pContInfo->pchEnumRegEntries) ||
(pContInfo->dwiRegEntry >= pContInfo->cMaxRegEntry))
{
dwReturn = ERROR_NO_MORE_ITEMS;
goto ErrorExit;
}
if (NULL == pbData)
*pcbData = pContInfo->cbRegEntry;
else if (*pcbData < pContInfo->cbRegEntry)
{
*pcbData = pContInfo->cbRegEntry;
dwReturn = ERROR_MORE_DATA;
goto ErrorExit;
}
else
{
psz = pContInfo->pchEnumRegEntries + (pContInfo->dwiRegEntry *
pContInfo->cbRegEntry);
memcpy(pbData, psz, pContInfo->cbRegEntry);
pContInfo->dwiRegEntry++;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
//+ ===========================================================================
//
// The function adjusts the token priviledges so that SACL information
// may be gotten and then opens the indicated registry key. If the token
// priviledges may be set then the reg key is opened anyway but the
// flags field will not have the PRIVILEDGE_FOR_SACL value set.
//
//- ============================================================================
DWORD
OpenRegKeyWithTokenPriviledges(
IN HKEY hTopRegKey,
IN LPSTR pszRegKey,
OUT HKEY *phRegKey,
OUT DWORD *pdwFlags)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
TOKEN_PRIVILEGES tp;
TOKEN_PRIVILEGES tpPrevious;
DWORD cbPrevious = sizeof(TOKEN_PRIVILEGES);
LUID luid;
HANDLE hToken = 0;
HKEY hRegKey = 0;
BOOL fSts;
BOOL fImpersonating = FALSE;
BOOL fAdjusted = FALSE;
DWORD dwAccessFlags = 0;
DWORD dwSts;
// check if there is a registry key to open
dwSts = MyRegOpenKeyEx(hTopRegKey, pszRegKey, 0,
KEY_ALL_ACCESS, &hRegKey);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
RegCloseKey(hRegKey);
hRegKey = 0;
// check if there is a thread token
fSts = OpenThreadToken(GetCurrentThread(),
MAXIMUM_ALLOWED, TRUE,
&hToken);
if (!fSts)
{
if (!ImpersonateSelf(SecurityImpersonation))
{
dwReturn = GetLastError();
goto ErrorExit;
}
fImpersonating = TRUE;
// get the process token
fSts = OpenThreadToken(GetCurrentThread(),
MAXIMUM_ALLOWED,
TRUE,
&hToken);
}
// set up the new priviledge state
if (fSts)
{
memset(&tp, 0, sizeof(tp));
memset(&tpPrevious, 0, sizeof(tpPrevious));
fSts = LookupPrivilegeValueA(NULL, SE_SECURITY_NAME, &luid);
if (fSts)
{
//
// first pass. get current privilege setting
//
tp.PrivilegeCount = 1;
tp.Privileges[0].Luid = luid;
tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
// adjust privilege
fSts = AdjustTokenPrivileges(hToken,
FALSE,
&tp,
sizeof(TOKEN_PRIVILEGES),
&tpPrevious,
&cbPrevious);
if (fSts && (ERROR_SUCCESS == GetLastError()))
{
fAdjusted = TRUE;
*pdwFlags |= PRIVILEDGE_FOR_SACL;
dwAccessFlags = ACCESS_SYSTEM_SECURITY;
}
}
}
// open the registry key
dwSts = MyRegOpenKeyEx(hTopRegKey,
pszRegKey,
0,
KEY_ALL_ACCESS | dwAccessFlags,
phRegKey);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
// now set the privilege back if necessary
if (fAdjusted)
{
// adjust the priviledge and with the previous state
fSts = AdjustTokenPrivileges(hToken,
FALSE,
&tpPrevious,
sizeof(TOKEN_PRIVILEGES),
NULL,
NULL);
}
if (NULL != hToken)
CloseHandle(hToken);
if (fImpersonating)
{
if (FALSE == RevertToSelf())
dwReturn = GetLastError();
}
return dwReturn;
}
//+ ===========================================================================
//
// The function adjusts the token priviledges so that SACL information
// may be set on a key container. If the token priviledges may be set
// indicated by the pUser->dwOldKeyFlags having the PRIVILEDGE_FOR_SACL value set.
// value set then the token privilege is adjusted before the security
// descriptor is set on the container. This is needed for the key
// migration case when keys are being migrated from the registry to files.
//- ============================================================================
DWORD
SetSecurityOnContainerWithTokenPriviledges(
IN DWORD dwOldKeyFlags,
IN LPCWSTR wszFileName,
IN DWORD dwProvType,
IN DWORD fMachineKeyset,
IN SECURITY_INFORMATION SecurityInformation,
IN PSECURITY_DESCRIPTOR pSecurityDescriptor)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
TOKEN_PRIVILEGES tp;
TOKEN_PRIVILEGES tpPrevious;
DWORD cbPrevious = sizeof(TOKEN_PRIVILEGES);
LUID luid;
HANDLE hToken = 0;
BOOL fStatus;
BOOL fImpersonating = FALSE;
BOOL fAdjusted = FALSE;
DWORD dwSts;
if (dwOldKeyFlags & PRIVILEDGE_FOR_SACL)
{
// check if there is a thread token
fStatus = OpenThreadToken(GetCurrentThread(),
MAXIMUM_ALLOWED, TRUE,
&hToken);
if (!fStatus)
{
if (!ImpersonateSelf(SecurityImpersonation))
{
dwReturn = GetLastError();
goto ErrorExit;
}
fImpersonating = TRUE;
// get the process token
fStatus = OpenThreadToken(GetCurrentThread(),
MAXIMUM_ALLOWED,
TRUE,
&hToken);
}
// set up the new priviledge state
if (fStatus)
{
memset(&tp, 0, sizeof(tp));
memset(&tpPrevious, 0, sizeof(tpPrevious));
fStatus = LookupPrivilegeValueA(NULL,
SE_SECURITY_NAME,
&luid);
if (fStatus)
{
//
// first pass. get current privilege setting
//
tp.PrivilegeCount = 1;
tp.Privileges[0].Luid = luid;
tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
// adjust privilege
fAdjusted = AdjustTokenPrivileges(hToken,
FALSE,
&tp,
sizeof(TOKEN_PRIVILEGES),
&tpPrevious,
&cbPrevious);
}
}
}
dwSts = SetSecurityOnContainer(wszFileName,
dwProvType,
fMachineKeyset,
SecurityInformation,
pSecurityDescriptor);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
// now set the privilege back if necessary
// now set the privilege back if necessary
if (dwOldKeyFlags & PRIVILEDGE_FOR_SACL)
{
if (fAdjusted)
{
// adjust the priviledge and with the previous state
fStatus = AdjustTokenPrivileges(hToken,
FALSE,
&tpPrevious,
sizeof(TOKEN_PRIVILEGES),
NULL,
NULL);
}
}
if (NULL != hToken)
CloseHandle(hToken);
if (fImpersonating)
{
if (FALSE == RevertToSelf())
dwReturn = GetLastError();
}
return dwReturn;
}
// Loops through the ACEs of an ACL and checks for special access bits
// for registry keys and converts the access mask so generic access
// bits are used
/*static*/ DWORD
CheckAndChangeAccessMasks(
IN PACL pAcl)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
ACL_SIZE_INFORMATION AclSizeInfo;
DWORD i;
ACCESS_ALLOWED_ACE *pAce;
ACCESS_MASK NewMask;
memset(&AclSizeInfo, 0, sizeof(AclSizeInfo));
// get the number of ACEs in the ACL
if (!GetAclInformation(pAcl, &AclSizeInfo, sizeof(AclSizeInfo),
AclSizeInformation))
{
dwReturn = GetLastError();
goto ErrorExit;
}
// loop through the ACEs checking and changing the access bits
for (i = 0; i < AclSizeInfo.AceCount; i++)
{
if (!GetAce(pAcl, i, &pAce))
{
dwReturn = GetLastError();
goto ErrorExit;
}
NewMask = 0;
// check if the specific access bits are set, if so convert to generic
if ((pAce->Mask & KEY_QUERY_VALUE) || (pAce->Mask & GENERIC_READ))
NewMask |= GENERIC_READ;
if ((pAce->Mask & KEY_SET_VALUE) || (pAce->Mask & GENERIC_ALL) ||
(pAce->Mask & GENERIC_WRITE))
{
NewMask |= GENERIC_ALL;
}
pAce->Mask = NewMask;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
// Converts a security descriptor from special access to generic access
/*static*/ DWORD
ConvertContainerSecurityDescriptor(
IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
OUT PSECURITY_DESCRIPTOR *ppNewSD,
OUT DWORD *pcbNewSD)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD cbSD;
SECURITY_DESCRIPTOR_CONTROL Control;
DWORD dwRevision;
PACL pDacl;
BOOL fDACLPresent;
BOOL fDaclDefaulted;
PACL pSacl;
BOOL fSACLPresent;
BOOL fSaclDefaulted;
DWORD dwSts;
// ge the control on the security descriptor to check if self relative
if (!GetSecurityDescriptorControl(pSecurityDescriptor,
&Control, &dwRevision))
{
dwReturn = GetLastError();
goto ErrorExit;
}
// get the length of the security descriptor and alloc space for a copy
cbSD = GetSecurityDescriptorLength(pSecurityDescriptor);
*ppNewSD =(PSECURITY_DESCRIPTOR)ContInfoAlloc(cbSD);
if (NULL == *ppNewSD)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
if (SE_SELF_RELATIVE & Control)
{
// if the Security Descriptor is self relative then make a copy
memcpy(*ppNewSD, pSecurityDescriptor, cbSD);
}
else
{
// if not self relative then make a self relative copy
if (!MakeSelfRelativeSD(pSecurityDescriptor, *ppNewSD, &cbSD))
{
dwReturn = GetLastError();
goto ErrorExit;
}
}
// get the DACL out of the security descriptor
if (!GetSecurityDescriptorDacl(*ppNewSD, &fDACLPresent, &pDacl,
&fDaclDefaulted))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (fDACLPresent && pDacl)
{
dwSts = CheckAndChangeAccessMasks(pDacl);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
// get the SACL out of the security descriptor
if (!GetSecurityDescriptorSacl(*ppNewSD, &fSACLPresent, &pSacl,
&fSaclDefaulted))
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (fSACLPresent && pSacl)
{
dwSts = CheckAndChangeAccessMasks(pSacl);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
*pcbNewSD = cbSD;
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
DWORD
SetSecurityOnContainer(
IN LPCWSTR wszFileName,
IN DWORD dwProvType,
IN DWORD fMachineKeyset,
IN SECURITY_INFORMATION SecurityInformation,
IN PSECURITY_DESCRIPTOR pSecurityDescriptor)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
PSECURITY_DESCRIPTOR pSD = NULL;
DWORD cbSD;
LPWSTR wszFilePath = NULL;
LPWSTR wszUserStorageArea = NULL;
DWORD cbUserStorageArea;
DWORD cbFileName;
BOOL fIsLocalSystem = FALSE;
DWORD dwSts;
dwSts = ConvertContainerSecurityDescriptor(pSecurityDescriptor,
&pSD, &cbSD);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// get the correct storage area (directory)
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, FALSE,
&fIsLocalSystem, &wszUserStorageArea);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
cbUserStorageArea = wcslen( wszUserStorageArea ) * sizeof(WCHAR);
cbFileName = wcslen( wszFileName ) * sizeof(WCHAR);
wszFilePath = (LPWSTR)ContInfoAlloc(cbUserStorageArea
+ cbFileName
+ sizeof(WCHAR));
if (wszFilePath == NULL)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
CopyMemory((BYTE*)wszFilePath, (BYTE*)wszUserStorageArea, cbUserStorageArea);
CopyMemory((LPBYTE)wszFilePath+cbUserStorageArea, wszFileName, cbFileName + sizeof(WCHAR));
if (!SetFileSecurityW(wszFilePath, SecurityInformation, pSD))
{
dwReturn = GetLastError();
goto ErrorExit;
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pSD)
ContInfoFree(pSD);
if (NULL != wszUserStorageArea)
ContInfoFree(wszUserStorageArea);
if (NULL != wszFilePath)
ContInfoFree(wszFilePath);
return dwReturn;
}
DWORD
GetSecurityOnContainer(
IN LPCWSTR wszFileName,
IN DWORD dwProvType,
IN DWORD fMachineKeyset,
IN SECURITY_INFORMATION RequestedInformation,
OUT PSECURITY_DESCRIPTOR pSecurityDescriptor,
IN OUT DWORD *pcbSecurityDescriptor)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
LPWSTR wszFilePath = NULL;
LPWSTR wszUserStorageArea = NULL;
DWORD cbUserStorageArea;
DWORD cbFileName;
PSECURITY_DESCRIPTOR pSD = NULL;
DWORD cbSD;
PSECURITY_DESCRIPTOR pNewSD = NULL;
DWORD cbNewSD;
BOOL fIsLocalSystem = FALSE;
DWORD dwSts;
// get the correct storage area (directory)
dwSts = GetUserStorageArea(dwProvType, fMachineKeyset, FALSE,
&fIsLocalSystem, &wszUserStorageArea);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
cbUserStorageArea = wcslen( wszUserStorageArea ) * sizeof(WCHAR);
cbFileName = wcslen( wszFileName ) * sizeof(WCHAR);
wszFilePath = (LPWSTR)ContInfoAlloc(cbUserStorageArea
+ cbFileName
+ sizeof(WCHAR));
if (wszFilePath == NULL)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
CopyMemory(wszFilePath, wszUserStorageArea, cbUserStorageArea);
CopyMemory((LPBYTE)wszFilePath+cbUserStorageArea, wszFileName, cbFileName + sizeof(WCHAR));
// get the security descriptor on the file
cbSD = sizeof(cbSD);
pSD = &cbSD;
if (!GetFileSecurityW(wszFilePath, RequestedInformation, pSD,
cbSD, &cbSD))
{
dwSts = GetLastError();
if (ERROR_INSUFFICIENT_BUFFER != dwSts)
{
dwReturn = dwSts;
pSD = NULL;
goto ErrorExit;
}
}
pSD = (PSECURITY_DESCRIPTOR)ContInfoAlloc(cbSD);
if (NULL == pSD)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
if (!GetFileSecurityW(wszFilePath, RequestedInformation, pSD,
cbSD, &cbSD))
{
dwReturn = GetLastError();
goto ErrorExit;
}
// convert the security descriptor from specific to generic
dwSts = ConvertContainerSecurityDescriptor(pSD, &pNewSD, &cbNewSD);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (NULL == pSecurityDescriptor)
*pcbSecurityDescriptor = cbNewSD;
else if (*pcbSecurityDescriptor < cbNewSD)
{
*pcbSecurityDescriptor = cbNewSD;
dwReturn = ERROR_MORE_DATA;
goto ErrorExit;
}
else
{
*pcbSecurityDescriptor = cbNewSD;
memcpy(pSecurityDescriptor, pNewSD, *pcbSecurityDescriptor);
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != pNewSD)
ContInfoFree(pNewSD);
if (NULL != pSD)
ContInfoFree(pSD);
if (NULL != wszUserStorageArea)
ContInfoFree(wszUserStorageArea);
if (NULL != wszFilePath)
ContInfoFree(wszFilePath);
return dwReturn;
}
//
// Function : FreeOffloadInfo
//
// Description : The function takes a pointer to Offload Information as the
// first parameter of the call. The function frees the
// information.
//
void
FreeOffloadInfo(
IN OUT PEXPO_OFFLOAD_STRUCT pOffloadInfo)
{
if (NULL != pOffloadInfo)
{
if (NULL != pOffloadInfo->hInst)
FreeLibrary(pOffloadInfo->hInst);
ContInfoFree(pOffloadInfo);
}
}
//
// Function : InitExpOffloadInfo
//
// Description : The function takes a pointer to Offload Information as the
// first parameter of the call. The function checks in the
// registry to see if an offload module has been registered.
// If a module is registered then it loads the module
// and gets the OffloadModExpo function pointer.
//
BOOL
InitExpOffloadInfo(
IN OUT PEXPO_OFFLOAD_STRUCT *ppOffloadInfo)
{
BYTE rgbModule[MAX_PATH + 1];
BYTE *pbModule = NULL;
DWORD cbModule;
BOOL fAlloc = FALSE;
PEXPO_OFFLOAD_STRUCT pTmpOffloadInfo = NULL;
HKEY hOffloadRegKey = 0;
DWORD dwSts;
BOOL fRet = FALSE;
// wrap with try/except
__try
{
// check for registration of an offload module
dwSts = RegOpenKeyEx(HKEY_LOCAL_MACHINE,
"Software\\Microsoft\\Cryptography\\Offload",
0, // dwOptions
KEY_READ,
&hOffloadRegKey);
if (ERROR_SUCCESS != dwSts)
goto ErrorExit;
// get the name of the offload module
cbModule = sizeof(rgbModule);
dwSts = RegQueryValueEx(hOffloadRegKey,
EXPO_OFFLOAD_REG_VALUE,
0, NULL, rgbModule,
&cbModule);
if (ERROR_SUCCESS != dwSts)
{
if (ERROR_MORE_DATA == dwSts)
{
pbModule = (BYTE*)ContInfoAlloc(cbModule);
if (NULL == pbModule)
goto ErrorExit;
fAlloc = TRUE;
dwSts = RegQueryValueEx(HKEY_LOCAL_MACHINE,
EXPO_OFFLOAD_REG_VALUE,
0, NULL, pbModule,
&cbModule);
if (ERROR_SUCCESS != dwSts)
goto ErrorExit;
}
else
goto ErrorExit;
}
else
pbModule = rgbModule;
// alloc space for the offload info
pTmpOffloadInfo = (PEXPO_OFFLOAD_STRUCT)ContInfoAlloc(sizeof(EXPO_OFFLOAD_STRUCT));
if (NULL == pTmpOffloadInfo)
goto ErrorExit;
pTmpOffloadInfo->dwVersion = sizeof(EXPO_OFFLOAD_STRUCT);
// load the module and get the function pointer
pTmpOffloadInfo->hInst = LoadLibraryEx((LPTSTR)pbModule, NULL, 0);
if (NULL == pTmpOffloadInfo->hInst)
goto ErrorExit;
pTmpOffloadInfo->pExpoFunc = (PFN_OFFLOAD_MOD_EXPO) GetProcAddress(pTmpOffloadInfo->hInst,
EXPO_OFFLOAD_FUNC_NAME);
if (NULL == pTmpOffloadInfo->pExpoFunc)
goto ErrorExit;
*ppOffloadInfo = pTmpOffloadInfo;
fRet = TRUE;
}
__except (EXCEPTION_EXECUTE_HANDLER)
{
goto ErrorExit;
}
ErrorExit:
if (NULL != hOffloadRegKey)
RegCloseKey(hOffloadRegKey);
if (fAlloc && (NULL != pbModule))
ContInfoFree(pbModule);
if (!fRet)
FreeOffloadInfo(pTmpOffloadInfo);
return fRet;
}
//
// Function : ModularExpOffload
//
// Description : This function does the offloading of modular exponentiation.
// The function takes a pointer to Offload Information as the
// first parameter of the call. If this pointer is not NULL
// then the function will use this module and call the function.
// The exponentiation with MOD function will implement
// Y^X MOD P where Y is the buffer pbBase, X is the buffer
// pbExpo and P is the buffer pbModulus. The length of the
// buffer pbExpo is cbExpo and the length of pbBase and
// pbModulus is cbModulus. The resulting value is output
// in the pbResult buffer and has length cbModulus.
// The pReserved and dwFlags parameters are currently ignored.
// If any of these functions fail then the function fails and
// returns FALSE. If successful then the function returns
// TRUE. If the function fails then most likely the caller
// should fall back to using hard linked modular exponentiation.
//
BOOL
ModularExpOffload(
IN PEXPO_OFFLOAD_STRUCT pOffloadInfo,
IN BYTE *pbBase,
IN BYTE *pbExpo,
IN DWORD cbExpo,
IN BYTE *pbModulus,
IN DWORD cbModulus,
OUT BYTE *pbResult,
IN VOID *pReserved,
IN DWORD dwFlags)
{
BOOL fRet = FALSE;
// wrap with try/except
__try
{
if (NULL == pOffloadInfo)
goto ErrorExit;
// call the offload module
if (!pOffloadInfo->pExpoFunc(pbBase, pbExpo, cbExpo, pbModulus,
cbModulus, pbResult, pReserved, dwFlags))
{
goto ErrorExit;
}
fRet = TRUE;
}
__except (EXCEPTION_EXECUTE_HANDLER)
{
goto ErrorExit;
}
ErrorExit:
return fRet;
}
//
// The following section of code is for the loading and unloading of
// unicode string resources from a resource DLL (csprc.dll). This
// allows the resources to be localize even though the CSPs
// themselves are signed.
//
#define MAX_STRING_RSC_SIZE 512
#define GLOBAL_STRING_BUFFERSIZE_INC 1000
#define GLOBAL_STRING_BUFFERSIZE 20000
//
// Function : FetchString
//
// Description : This function gets the specified string resource from
// the resource DLL, allocates memory for it and copies
// the string into that memory.
//
/*static*/ DWORD
FetchString(
HMODULE hModule, // module to get string from
DWORD dwResourceId, // resource identifier
LPWSTR *ppString, // target buffer for string
BYTE **ppStringBlock, // string buffer block
DWORD *pdwBufferSize, // size of string buffer block
DWORD *pdwRemainingBufferSize) // remaining size of string buffer block
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
WCHAR szMessage[MAX_STRING_RSC_SIZE];
DWORD cchMessage;
DWORD dwOldSize;
DWORD dwNewSize;
LPWSTR pNewStr;
if (ppStringBlock == NULL || *ppStringBlock == NULL || ppString == NULL)
{
dwReturn = ERROR_INVALID_PARAMETER;
goto ErrorExit;
}
cchMessage = LoadStringW(hModule, dwResourceId, szMessage,
MAX_STRING_RSC_SIZE);
if (0 == cchMessage)
{
dwReturn = GetLastError();
goto ErrorExit;
}
if (*pdwRemainingBufferSize < ((cchMessage + 1) * sizeof(WCHAR)))
{
//
// realloc buffer and update size
//
dwOldSize = *pdwBufferSize;
dwNewSize = dwOldSize + max(GLOBAL_STRING_BUFFERSIZE_INC,
(((cchMessage + 1) * sizeof(WCHAR)) - *pdwRemainingBufferSize));
*ppStringBlock = (BYTE*)ContInfoReAlloc(*ppStringBlock, dwNewSize);
if (NULL == *ppStringBlock)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
*pdwBufferSize = dwNewSize;
*pdwRemainingBufferSize += dwNewSize - dwOldSize;
}
pNewStr = (LPWSTR)(*ppStringBlock + *pdwBufferSize -
*pdwRemainingBufferSize);
// only store the offset just in case a realloc of the entire
// string buffer needs to be performed at a later time.
*ppString = (LPWSTR)((BYTE *)pNewStr - (BYTE *)*ppStringBlock);
wcscpy(pNewStr, szMessage);
*pdwRemainingBufferSize -= (cchMessage + 1) * sizeof(WCHAR);
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
DWORD
LoadStrings(
void)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HMODULE hMod = 0;
DWORD dwBufferSize;
DWORD dwRemainingBufferSize;
DWORD dwSts;
if (NULL == l_pbStringBlock)
{
hMod = LoadLibraryEx("crypt32.dll", NULL, LOAD_LIBRARY_AS_DATAFILE);
if (NULL == hMod)
{
dwReturn = GetLastError();
goto ErrorExit;
}
//
// get size of all string resources, and then allocate a single block
// of memory to contain all the strings. This way, we only have to
// free one block and we benefit memory wise due to locality of reference.
//
dwBufferSize = dwRemainingBufferSize = GLOBAL_STRING_BUFFERSIZE;
l_pbStringBlock = (BYTE*)ContInfoAlloc(dwBufferSize);
if (NULL == l_pbStringBlock)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_RSA_SIG_DESCR, &g_Strings.pwszRSASigDescr,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_RSA_EXCH_DESCR, &g_Strings.pwszRSAExchDescr,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_IMPORT_SIMPLE, &g_Strings.pwszImportSimple,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_SIGNING_E, &g_Strings.pwszSignWExch,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_CREATE_RSA_SIG, &g_Strings.pwszCreateRSASig,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_CREATE_RSA_EXCH, &g_Strings.pwszCreateRSAExch,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_DSS_SIG_DESCR, &g_Strings.pwszDSSSigDescr,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_DSS_EXCH_DESCR, &g_Strings.pwszDHExchDescr,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_CREATE_DSS_SIG, &g_Strings.pwszCreateDSS,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_CREATE_DH_EXCH, &g_Strings.pwszCreateDH,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_IMPORT_E_PUB, &g_Strings.pwszImportDHPub,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_MIGR, &g_Strings.pwszMigrKeys,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_DELETE_SIG, &g_Strings.pwszDeleteSig,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_DELETE_KEYX, &g_Strings.pwszDeleteExch,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_DELETE_SIG_MIGR, &g_Strings.pwszDeleteMigrSig,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_DELETE_KEYX_MIGR, &g_Strings.pwszDeleteMigrExch,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_SIGNING_S, &g_Strings.pwszSigning,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_EXPORT_E_PRIV, &g_Strings.pwszExportPrivExch,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_EXPORT_S_PRIV, &g_Strings.pwszExportPrivSig,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_IMPORT_E_PRIV, &g_Strings.pwszImportPrivExch,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_IMPORT_S_PRIV, &g_Strings.pwszImportPrivSig,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = FetchString(hMod, IDS_CSP_AUDIT_CAPI_KEY, &g_Strings.pwszAuditCapiKey,
&l_pbStringBlock, &dwBufferSize, &dwRemainingBufferSize);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// Fix up all the strings to be real pointers rather than offsets.
// the reason that offsets are originally stored is because we may
// need to reallocate the buffer that all the strings are stored in.
// So offsets are stored so that the pointers for those strings in
// the buffers don't become invalid.
g_Strings.pwszRSASigDescr = (LPWSTR)(((ULONG_PTR) g_Strings.pwszRSASigDescr) + l_pbStringBlock);
g_Strings.pwszRSAExchDescr = (LPWSTR)(((ULONG_PTR) g_Strings.pwszRSAExchDescr) + l_pbStringBlock);
g_Strings.pwszImportSimple = (LPWSTR)(((ULONG_PTR) g_Strings.pwszImportSimple) + l_pbStringBlock);
g_Strings.pwszSignWExch = (LPWSTR)(((ULONG_PTR) g_Strings.pwszSignWExch) + l_pbStringBlock);
g_Strings.pwszCreateRSASig = (LPWSTR)(((ULONG_PTR) g_Strings.pwszCreateRSASig) + l_pbStringBlock);
g_Strings.pwszCreateRSAExch = (LPWSTR)(((ULONG_PTR) g_Strings.pwszCreateRSAExch) + l_pbStringBlock);
g_Strings.pwszDSSSigDescr = (LPWSTR)(((ULONG_PTR) g_Strings.pwszDSSSigDescr) + l_pbStringBlock);
g_Strings.pwszDHExchDescr = (LPWSTR)(((ULONG_PTR) g_Strings.pwszDHExchDescr) + l_pbStringBlock);
g_Strings.pwszCreateDSS = (LPWSTR)(((ULONG_PTR) g_Strings.pwszCreateDSS) + l_pbStringBlock);
g_Strings.pwszCreateDH = (LPWSTR)(((ULONG_PTR) g_Strings.pwszCreateDH) + l_pbStringBlock);
g_Strings.pwszImportDHPub = (LPWSTR)(((ULONG_PTR) g_Strings.pwszImportDHPub) + l_pbStringBlock);
g_Strings.pwszMigrKeys = (LPWSTR)(((ULONG_PTR) g_Strings.pwszMigrKeys) + l_pbStringBlock);
g_Strings.pwszDeleteSig = (LPWSTR)(((ULONG_PTR) g_Strings.pwszDeleteSig) + l_pbStringBlock);
g_Strings.pwszDeleteExch = (LPWSTR)(((ULONG_PTR) g_Strings.pwszDeleteExch) + l_pbStringBlock);
g_Strings.pwszDeleteMigrSig = (LPWSTR)(((ULONG_PTR) g_Strings.pwszDeleteMigrSig) + l_pbStringBlock);
g_Strings.pwszDeleteMigrExch = (LPWSTR)(((ULONG_PTR) g_Strings.pwszDeleteMigrExch) + l_pbStringBlock);
g_Strings.pwszSigning = (LPWSTR)(((ULONG_PTR) g_Strings.pwszSigning) + l_pbStringBlock);
g_Strings.pwszExportPrivExch = (LPWSTR)(((ULONG_PTR) g_Strings.pwszExportPrivExch) + l_pbStringBlock);
g_Strings.pwszExportPrivSig = (LPWSTR)(((ULONG_PTR) g_Strings.pwszExportPrivSig) + l_pbStringBlock);
g_Strings.pwszImportPrivExch = (LPWSTR)(((ULONG_PTR) g_Strings.pwszImportPrivExch) + l_pbStringBlock);
g_Strings.pwszImportPrivSig = (LPWSTR)(((ULONG_PTR) g_Strings.pwszImportPrivSig) + l_pbStringBlock);
g_Strings.pwszAuditCapiKey = (LPWSTR)(((ULONG_PTR) g_Strings.pwszAuditCapiKey) + l_pbStringBlock);
FreeLibrary(hMod);
hMod = NULL;
}
return ERROR_SUCCESS;
ErrorExit:
if (NULL != l_pbStringBlock)
{
ContInfoFree(l_pbStringBlock);
l_pbStringBlock = NULL;
}
if (hMod)
FreeLibrary(hMod);
return dwReturn;
}
void
UnloadStrings(
void)
{
if (NULL != l_pbStringBlock)
{
ContInfoFree(l_pbStringBlock);
l_pbStringBlock = NULL;
memset(&g_Strings, 0, sizeof(g_Strings));
}
}
#ifdef USE_HW_RNG
#ifdef _M_IX86
// stuff for INTEL RNG usage
//
// Function : GetRNGDriverHandle
//
// Description : Gets the handle to the INTEL RNG driver if available, then
// checks if the chipset supports the hardware RNG. If so
// the previous driver handle is closed if necessary and the
// new handle is assigned to the passed in parameter.
//
DWORD
GetRNGDriverHandle(
IN OUT HANDLE *phDriver)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
ISD_Capability ISD_Cap; //in/out for GetCapability
DWORD dwBytesReturned;
char szDeviceName[80] = ""; //Name of device
HANDLE hDriver = INVALID_HANDLE_VALUE; //Driver handle
BOOL fReturnCode; //Return code from IOCTL call
memset(&ISD_Cap, 0, sizeof(ISD_Cap));
wsprintf(szDeviceName,"\\\\.\\"DRIVER_NAME);
hDriver = CreateFileA(szDeviceName,
FILE_SHARE_READ | FILE_SHARE_WRITE
| GENERIC_READ | GENERIC_WRITE,
0, NULL,
OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
if (INVALID_HANDLE_VALUE == hDriver)
{
dwReturn = GetLastError();
goto ErrorExit;
}
//Get RNG Enabled
ISD_Cap.uiIndex = ISD_RNG_ENABLED; //Set input member
fReturnCode = DeviceIoControl(hDriver,
IOCTL_ISD_GetCapability,
&ISD_Cap, sizeof(ISD_Cap),
&ISD_Cap, sizeof(ISD_Cap),
&dwBytesReturned,
NULL);
if (fReturnCode == FALSE || ISD_Cap.iStatus != ISD_EOK)
{
dwReturn = GetLastError();
goto ErrorExit;
}
// close the previous handle if already there
if (INVALID_HANDLE_VALUE != *phDriver)
CloseHandle(*phDriver);
*phDriver = hDriver;
return ERROR_SUCCESS;
ErrorExit:
if (INVALID_HANDLE_VALUE != hDriver)
CloseHandle(hDriver);
return dwReturn;
}
//
// Function : CheckIfRNGAvailable
//
// Description : Checks if the INTEL RNG driver is available, if so then
// checks if the chipset supports the hardware RNG.
//
DWORD
CheckIfRNGAvailable(
void)
{
HANDLE hDriver = INVALID_HANDLE_VALUE; //Driver handle
DWORD dwSts;
dwSts = GetRNGDriverHandle(&hDriver);
if (ERROR_SUCCESS == dwSts)
CloseHandle(hDriver);
return dwSts;
}
//
// Function : HWRNGGenRandom
//
// Description : Uses the passed in handle to the INTEL RNG driver
// to fill the buffer with random bits. Actually uses
// XOR to fill the buffer so that the passed in buffer
// is also mixed in.
//
DWORD
HWRNGGenRandom(
IN HANDLE hRNGDriver,
IN OUT BYTE *pbBuffer,
IN DWORD dwLen)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
ISD_RandomNumber ISD_Random; //in/out for GetRandomNumber
DWORD dwBytesReturned = 0;
DWORD i;
DWORD *pdw;
BYTE *pb;
BYTE *pbRand;
BOOL fReturnCode; //Return code from IOCTL call
memset(&ISD_Random, 0, sizeof(ISD_Random));
for (i = 0; i < (dwLen / sizeof(DWORD)); i++)
{
pdw = (DWORD*)(pbBuffer + i * sizeof(DWORD));
//No input needed in the ISD_Random structure for this operation,
//so just send it in as is.
fReturnCode = DeviceIoControl(hRNGDriver,
IOCTL_ISD_GetRandomNumber,
&ISD_Random, sizeof(ISD_Random),
&ISD_Random, sizeof(ISD_Random),
&dwBytesReturned,
NULL);
if (fReturnCode == 0 || ISD_Random.iStatus != ISD_EOK)
{
//Error - ignore the data returned
dwReturn = GetLastError();
goto ErrorExit;
}
*pdw = *pdw ^ ISD_Random.uiRandomNum;
}
pb = pbBuffer + i * sizeof(DWORD);
fReturnCode = DeviceIoControl(hRNGDriver,
IOCTL_ISD_GetRandomNumber,
&ISD_Random, sizeof(ISD_Random),
&ISD_Random, sizeof(ISD_Random),
&dwBytesReturned,
NULL);
if (fReturnCode == 0 || ISD_Random.iStatus != ISD_EOK)
{
//Error - ignore the data returned
dwReturn = GetLastError();
goto ErrorExit;
}
pbRand = (BYTE*)&ISD_Random.uiRandomNum;
for (i = 0; i < (dwLen % sizeof(DWORD)); i++)
pb[i] ^= pbRand[i];
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
#ifdef TEST_HW_RNG
//
// Function : SetupHWRNGIfRegistered
//
// Description : Checks if there is a registry setting indicating the HW RNG
// is to be used. If the registry entry is there then it attempts
// to get the HW RNG driver handle.
//
DWORD
SetupHWRNGIfRegistered(
OUT HANDLE *phRNGDriver)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwSts;
HKEY hRegKey = NULL;
// first check the registry entry to see if supposed to use HW RNG
dwSts = RegOpenKeyEx(HKEY_LOCAL_MACHINE,
"Software\\Microsoft\\Cryptography\\UseHWRNG",
0, // dwOptions
KEY_READ,
&hRegKey);
if (ERROR_SUCCESS == dwSts)
{
// get the driver handle
dwSts = GetRNGDriverHandle(phRNGDriver);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (NULL != hRegKey)
RegCloseKey(hRegKey);
return dwReturn;
}
#endif // TEST_HW_RNG
#endif // _M_IX86
#endif // USE_HW_RNG
// **********************************************************************
// SelfMACCheck performs a DES MAC on the binary image of this DLL
// **********************************************************************
DWORD
SelfMACCheck(
IN LPSTR pszImage)
{
ANSI_STRING ansiImage;
UNICODE_STRING unicodeImage;
NTSTATUS status = STATUS_SUCCESS;
DWORD dwError = ERROR_SUCCESS;
#ifndef VAULTSIGN
return ERROR_SUCCESS;
#endif
memset(&ansiImage, 0, sizeof(ansiImage));
memset(&unicodeImage, 0, sizeof(unicodeImage));
RtlInitAnsiString(
&ansiImage,
pszImage);
status = RtlAnsiStringToUnicodeString(
&unicodeImage,
&ansiImage,
TRUE);
if (! NT_SUCCESS(status))
return ERROR_NOT_ENOUGH_MEMORY;
//
// Try new signature check. Use "mincrypt"
// functionality.
//
// Look for valid embedded "signcode" signature
// in the CSP.
//
dwError = MinCryptVerifySignedFile(
MINCRYPT_FILE_NAME,
(PVOID) unicodeImage.Buffer,
0, NULL, NULL, NULL);
RtlFreeUnicodeString(&unicodeImage);
return dwError;
}