Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1949 lines
62 KiB

/*++
Copyright (c) 1997-2000 Microsoft Corporation
Module Name:
safeset.c (WinSAFER SetInformation)
Abstract:
This module implements the WinSAFER APIs to set attributes and
information relating to the Code Authorization Levels.
Author:
Jeffrey Lawson (JLawson) - May 2000
Environment:
User mode only.
Exported Functions:
SaferSetLevelInformation
Revision History:
Created - Nov 1999
--*/
#include "pch.h"
#pragma hdrstop
#include <sddl.h>
#include <accctrl.h>
#include <aclapi.h>
#include <winsafer.h>
#include <winsaferp.h>
#include "saferp.h"
#include "safewild.h"
NTSTATUS NTAPI
SaferpCreateSecondLevelKey(
IN HANDLE hObjectKeyBase,
IN LPCWSTR szFirstLevel,
IN LPCWSTR szSecondLevel OPTIONAL,
OUT PHANDLE phOutKey
)
/*++
Routine Description:
Opens a subkey under a specified registry key handle, creating that
subkey if necessary. Up to two subkeys (ie: two levels deep) can
be specified by specifying both the szFirstLevel and szSecondLevel
arguments.
Arguments:
hObjectKeyBase - specifies a pre-opened registry handle to the
base registry key under which the specified szFirstLevel subkey
will be opened/created. This registry handle must be opened
for write access, or else subkey creation will fail.
szFirstLevel - specifies the first level subkey to open/create.
szSecondLevel - optionally specifies the second subkey to open/create.
phOutKey - pointer that will receive the opened registry key handle
on successful execution of this function. This handle must be
closed by the caller when its use is no longer required.
Return Value:
Returns STATUS_SUCCESS on successful opening of the requested key.
Otherwise returns a status code indicating the nature of the failure.
--*/
{
NTSTATUS Status;
UNICODE_STRING SubkeyName;
OBJECT_ATTRIBUTES ObjectAttributes;
HANDLE hKeyFirstLevel, hKeySecondLevel;
ASSERT(phOutKey != NULL && szFirstLevel != NULL);
//
// Open a handle to the "szFirstLevel" subkey,
// creating it if needed.
//
RtlInitUnicodeString(&SubkeyName, szFirstLevel);
InitializeObjectAttributes(&ObjectAttributes,
&SubkeyName,
OBJ_CASE_INSENSITIVE,
hObjectKeyBase,
NULL
);
Status = NtCreateKey(&hKeyFirstLevel, KEY_WRITE,
&ObjectAttributes, 0, NULL,
g_dwKeyOptions, NULL);
if (!NT_SUCCESS(Status)) return Status;
//
// Open a handle to the "szFirstLevel\szSecondLevel"
// subkey, creating it if needed.
//
if (ARGUMENT_PRESENT(szSecondLevel)) {
RtlInitUnicodeString(&SubkeyName, szSecondLevel);
InitializeObjectAttributes(&ObjectAttributes,
&SubkeyName,
OBJ_CASE_INSENSITIVE,
hKeyFirstLevel,
NULL
);
Status = NtCreateKey(&hKeySecondLevel,
(KEY_WRITE & ~KEY_CREATE_SUB_KEY),
&ObjectAttributes, 0,
NULL, g_dwKeyOptions, NULL);
NtClose(hKeyFirstLevel);
if (!NT_SUCCESS(Status)) return Status;
}
else {
hKeySecondLevel = hKeyFirstLevel;
}
*phOutKey = hKeySecondLevel;
return STATUS_SUCCESS;
}
NTSTATUS NTAPI
SaferpSetRegistryHelper(
IN HANDLE hObjectKeyBase,
IN LPCWSTR szFirstLevel,
IN LPCWSTR szSecondLevel OPTIONAL,
IN LPCWSTR szValueName,
IN DWORD dwRegType,
IN LPVOID lpDataBuffer,
IN DWORD dwDataBufferSize
)
/*++
Routine Description:
Arguments:
Return Value:
--*/
{
NTSTATUS Status;
HKEY hKeySecondLevel;
UNICODE_STRING ValueName;
//
// Open a handle to the correct subkey.
//
Status = SaferpCreateSecondLevelKey(
hObjectKeyBase,
szFirstLevel,
szSecondLevel,
&hKeySecondLevel
);
if (!NT_SUCCESS(Status)) return Status;
//
// Write the new value to "szValueName"
//
RtlInitUnicodeString(&ValueName, szValueName);
Status = NtSetValueKey(hKeySecondLevel,
&ValueName, 0, dwRegType,
(LPBYTE) lpDataBuffer, dwDataBufferSize);
NtClose(hKeySecondLevel);
return Status;
}
#ifdef ALLOW_FULL_WINSAFER
NTSTATUS NTAPI
SaferpClearRegistryListHelper(
IN HANDLE hObjectKeyBase,
IN LPCWSTR szValueCountName,
IN LPCWSTR szPrefixName
)
/*++
Routine Description:
Arguments:
Return Value:
--*/
{
NTSTATUS Status;
BOOLEAN bCompletePass;
BYTE LocalBuffer[256];
ULONG ulKeyInfoSize = sizeof(LocalBuffer);
PKEY_VALUE_BASIC_INFORMATION pKeyInfo =
(PKEY_VALUE_BASIC_INFORMATION) LocalBuffer;
ULONG ulKeyIndex, ulSizeUsed;
//
// Start iterating through all of the values under this subkey and
// see if there are any values that match the prefix that we are
// supposed to delete. If we find something we should delete, then
// we do that, but we continue iterating with the expectation that
// the enumeration values might possibly change when we deleted.
// So we will keep looping until we are able to enumerate completely
// through without finding something to delete.
//
ulKeyIndex = 0;
bCompletePass = TRUE;
for (;;)
{
//
// Determine the next value name under this key.
//
Status = NtEnumerateValueKey(hObjectKeyBase,
ulKeyIndex,
KeyValueBasicInformation,
pKeyInfo,
ulKeyInfoSize,
&ulSizeUsed);
if (!NT_SUCCESS(Status))
{
if (Status == STATUS_BUFFER_TOO_SMALL) {
// Buffer is too small, so we need to enlarge.
ASSERT(ulSizeUsed > ulKeyInfoSize);
if (pKeyInfo != (PKEY_VALUE_BASIC_INFORMATION) LocalBuffer) {
RtlFreeHeap(RtlProcessHeap(), 0, pKeyInfo);
}
ulKeyInfoSize = ulSizeUsed;
pKeyInfo = (PKEY_VALUE_BASIC_INFORMATION )
RtlAllocateHeap(RtlProcessHeap(), 0, ulKeyInfoSize);
if (!pKeyInfo) {
Status = STATUS_NO_MEMORY;
goto ExitHandler;
}
continue;
}
else if (Status == STATUS_NO_MORE_ENTRIES) {
// All done enumerating.
if (bCompletePass) {
// We just finished a complete pass through without any
// deletions so we really know that we're done now.
break;
} else {
// We haven't yet completed a full pass without hitting
// any deletions so we must try again, since the value
// enumerations might have changed at least once.
bCompletePass = TRUE;
ulKeyIndex = 0;
continue;
}
}
else {
// All other errors get literally returned.
// This is especially yucky if this error occurred partially
// through our attempt to delete everything.
goto ExitHandler;
}
}
//
// If this value is something that we need to delete,
// then delete it now and then restart the enumeration.
//
if (_wcsnicmp(pKeyInfo->Name, szPrefixName,
wcslen(szPrefixName)) == 0 ||
_wcsicmp(pKeyInfo->Name, szValueCountName) == 0)
{
UNICODE_STRING ValueName;
bCompletePass = FALSE;
ValueName.Buffer = pKeyInfo->Name;
ValueName.MaximumLength = ValueName.Length =
pKeyInfo->NameLength;
ASSERT(ValueName.Length == sizeof(WCHAR) * wcslen(ValueName.Buffer));
Status = NtDeleteValueKey(hObjectKeyBase, &ValueName);
if (!NT_SUCCESS(Status)) {
// Oh yuck, we got an error deleting. This is especially
// yucky if this error occurred partially through our
// attempt to delete everything.
goto ExitHandler;
}
continue;
}
ulKeyIndex++;
}
Status = STATUS_SUCCESS;
ExitHandler:
if (pKeyInfo != (PKEY_VALUE_BASIC_INFORMATION) LocalBuffer) {
RtlFreeHeap(RtlProcessHeap(), 0, pKeyInfo);
}
return Status;
}
#endif // ALLOW_FULL_WINSAFER
#ifdef ALLOW_FULL_WINSAFER
NTSTATUS NTAPI
SaferpSetListOfSids(
IN HKEY hKeyBase,
IN LPCWSTR szFirstLevel,
IN LPCWSTR szSecondLevel OPTIONAL,
IN LPCWSTR szValueCountName,
IN LPCWSTR szPrefixName,
IN PTOKEN_GROUPS pTokenGroups,
IN BOOLEAN bAllowWildcardSids
)
/*++
Routine Description:
Arguments:
Return Value:
--*/
//BLACKCOMB TODO: This really needs to take a dwInBufferSize argument so that
// the size of the pTokenGroups structure can be verified.
{
NTSTATUS Status;
HKEY hSidsToDisable;
UNICODE_STRING ValueName;
DWORD Index;
//
// First verify the SIDs and that the Attributes field
// of all of the SIDs are zero.
//
for (Index = 0; Index < pTokenGroups->GroupCount; Index++)
{
if (!RtlValidSid(pTokenGroups->Groups[Index].Sid))
return STATUS_INVALID_SID;
if (pTokenGroups->Groups[Index].Attributes != 0)
{
if (bAllowWildcardSids) {
//BLACKCOMB TODO: handle wildcard sids differently?
if ((pTokenGroups->Groups[Index].Attributes >> 24) != '*' &&
(pTokenGroups->Groups[Index].Attributes & 0x0000FFFF) >
((PISID)pTokenGroups->Groups[Index].Sid)->SubAuthorityCount)
return STATUS_INVALID_SID;
}
else
return STATUS_INVALID_SID;
}
}
//
// Open a handle to the correct subkey.
//
Status = SaferpCreateSecondLevelKey(
hKeyBase,
szFirstLevel,
szSecondLevel,
&hSidsToDisable);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//
// Clear out all old values under the subkey.
//
Status = SaferpClearRegistryListHelper(
hSidsToDisable,
szValueCountName,
szPrefixName);
if (!NT_SUCCESS(Status)) {
// Bad luck! Possibly left in incomplete state!
NtClose(hSidsToDisable);
goto ExitHandler2;
}
//
// Now add all of the new ones we're supposed to add.
//
RtlInitUnicodeString(&ValueName, szValueCountName);
Status = NtSetValueKey(hSidsToDisable,
&ValueName, 0, REG_DWORD,
(LPBYTE) pTokenGroups->GroupCount, sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
// Bad luck! Possibly left in incomplete state!
NtClose(hSidsToDisable);
goto ExitHandler2;
}
for (Index = 0; Index < pTokenGroups->GroupCount; Index++)
{
WCHAR ValueNameBuffer[20];
UNICODE_STRING UnicodeStringSid;
wsprintfW(ValueNameBuffer, L"%S%d", szPrefixName, Index);
RtlInitUnicodeString(&ValueName, ValueNameBuffer);
//BLACKCOMB TODO: wildcard sids not yet supported
if (bAllowWildcardSids)
Status = xxxxx;
else
Status = RtlConvertSidToUnicodeString( &UnicodeStringSid,
pTokenGroups->Groups[Index].Sid, TRUE );
if (!NT_SUCCESS(Status))
{
// Bad luck! Possibly left in incomplete state!
NtClose(hSidsToDisable);
goto ExitHandler2;
}
Status = NtSetValueKey(hSidsToDisable,
&ValueName, 0, REG_SZ,
(LPBYTE) UnicodeStringSid.Buffer,
UnicodeStringSid.Length + sizeof(UNICODE_NULL));
RtlFreeUnicodeString( &UnicodeStringSid );
if (!NT_SUCCESS(Status)) {
// Bad luck! Possibly left in incomplete state!
NtClose(hSidsToDisable);
goto ExitHandler2;
}
}
NtClose(hSidsToDisable);
return STATUS_SUCCESS;
ExitHandler2:
return Status;
}
#endif // ALLOW_FULL_WINSAFER
NTSTATUS NTAPI
SaferpDeleteSingleIdentificationGuid(
IN PAUTHZLEVELTABLERECORD pLevelRecord,
IN PAUTHZIDENTSTABLERECORD pIdentRecord)
/*++
Routine Description:
This API allows the caller to delete an existing Code Identifier.
If the GUID exists it will be deleted from both the persisted
registry store and the in-process identity cache.
Arguments:
pLevelRecord - the level to which the identity belongs.
pIdentRecord - points to the identifier record to delete.
Return Value:
Returns STATUS_SUCCESS on successful operation.
--*/
{
NTSTATUS Status;
WCHAR szPathBuffer[MAX_PATH];
UNICODE_STRING UnicodePath;
HANDLE hKeyIdentity;
LPCWSTR szIdentityType;
//
// Verify our input arguments.
//
if (!ARGUMENT_PRESENT(pIdentRecord) ||
!ARGUMENT_PRESENT(pLevelRecord)) {
// Specified a NULL buffer pointer.
Status = STATUS_ACCESS_VIOLATION;
goto ExitHandler;
}
//
// Ensure that all of the GUIDs supplied by the user represent
// Code Identities that exist within this Safer Level.
//
if (pIdentRecord->dwLevelId != pLevelRecord->dwLevelId) {
// One of the Identifier GUIDs specified does
// not actually exist.
Status = STATUS_NOT_FOUND;
goto ExitHandler;
}
//
// Delete the Code Identity from the registry first.
//
switch (pIdentRecord->dwIdentityType) {
case SaferIdentityTypeImageName:
szIdentityType = SAFER_PATHS_REGSUBKEY;
break;
case SaferIdentityTypeImageHash:
szIdentityType = SAFER_HASHMD5_REGSUBKEY;
break;
case SaferIdentityTypeUrlZone:
szIdentityType = SAFER_SOURCEURL_REGSUBKEY;
break;
default:
Status = STATUS_NOT_FOUND;
goto ExitHandler;
}
RtlInitEmptyUnicodeString(
&UnicodePath, szPathBuffer, sizeof(szPathBuffer));
Status = CodeAuthzpFormatIdentityKeyPath(
pIdentRecord->dwLevelId,
szIdentityType,
&pIdentRecord->IdentGuid,
&UnicodePath);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
Status = CodeAuthzpOpenPolicyRootKey(
pIdentRecord->dwScopeId,
g_hKeyCustomRoot,
szPathBuffer,
KEY_READ | DELETE,
FALSE, &hKeyIdentity);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
Status = CodeAuthzpDeleteKeyRecursively(hKeyIdentity, NULL);
NtClose(hKeyIdentity);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
//
// Delete the record from the cached table.
//
RtlDeleteElementGenericTable(
&g_CodeIdentitiesTable,
pIdentRecord);
Status = STATUS_SUCCESS;
ExitHandler:
return Status;
}
NTSTATUS NTAPI
SaferpSetSingleIdentificationPath(
IN BOOLEAN bAllowCreation,
IN OUT PAUTHZIDENTSTABLERECORD pIdentRecord,
IN PSAFER_PATHNAME_IDENTIFICATION pIdentChanges,
IN BOOL UpdateCache
)
/*++
Routine Description:
Updates the registry and the local Identification table cache
with new properties about a ImagePath Code Identifier.
Arguments:
bAllowCreation - indicates if the modification of this record has
the potential of being the initial creation of this record.
If this is false and the corresponding key location within the
registry does not already exist, then this function call
will fail.
pIdentRecord - the cached code identity record that should be
updated with new values. This argument must always be supplied,
even if the Code Identity is being created for the first time
(in which case, this argument should be the new record that
the caller has just inserted into the cached idents table).
pIdentChanges - the input structure containing the new modifications
that should be made to the specified Code Identity.
UpdateCache - When FALSE, this is a default rule being created and does
not need cache updation.
Return Value:
Return STATUS_SUCCESS on success completion, or another error
status code indicating the nature of the failure.
--*/
{
const static UNICODE_STRING UnicodeLastModified =
RTL_CONSTANT_STRING(SAFER_IDS_LASTMODIFIED_REGVALUE);
const static UNICODE_STRING UnicodeDescription =
RTL_CONSTANT_STRING(SAFER_IDS_DESCRIPTION_REGVALUE);
const static UNICODE_STRING UnicodeSaferFlags =
RTL_CONSTANT_STRING(SAFER_IDS_SAFERFLAGS_REGVALUE);
const static UNICODE_STRING UnicodeItemData =
RTL_CONSTANT_STRING(SAFER_IDS_ITEMDATA_REGVALUE);
NTSTATUS Status;
HANDLE hKeyIdentity = NULL;
UNICODE_STRING UnicodeTemp;
UNICODE_STRING UnicodeNewDescription;
UNICODE_STRING UnicodeNewImagePath;
WCHAR szPathBuffer[MAX_PATH];
DWORD dwSaferFlags;
FILETIME CurrentTime;
BOOLEAN bExpandVars;
//
// Verify our arguments. These things should have been ensured
// by our caller already, so we only assert them here.
//
ASSERT(ARGUMENT_PRESENT(pIdentRecord) &&
ARGUMENT_PRESENT(pIdentChanges) &&
pIdentChanges->header.dwIdentificationType == SaferIdentityTypeImageName &&
IsEqualGUID(&pIdentChanges->header.IdentificationGuid, &pIdentRecord->IdentGuid));
//
// Verify that the existing type matches the new type.
// Cannot change identity type once it has been created.
//
if (pIdentRecord->dwIdentityType != SaferIdentityTypeImageName) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
//
// Verify that the string arguments are properly terminated.
// We require that they fit entirely within the input buffer
// and also have an explicit null terminator.
//
RtlInitUnicodeString(&UnicodeNewImagePath, pIdentChanges->ImageName);
RtlInitUnicodeString(&UnicodeNewDescription, pIdentChanges->Description);
if (UnicodeNewDescription.Length >=
SAFER_MAX_DESCRIPTION_SIZE * sizeof(WCHAR) ||
UnicodeNewImagePath.Length == 0) {
// One of these buffers was not NULL terminated.
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
//
// Open a registry handle to the Code Identity.
//
RtlInitEmptyUnicodeString(
&UnicodeTemp, szPathBuffer, sizeof(szPathBuffer));
Status = CodeAuthzpFormatIdentityKeyPath(
pIdentRecord->dwLevelId,
SAFER_PATHS_REGSUBKEY,
&pIdentRecord->IdentGuid,
&UnicodeTemp);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
Status = CodeAuthzpOpenPolicyRootKey(
pIdentRecord->dwScopeId,
g_hKeyCustomRoot,
szPathBuffer,
KEY_READ | KEY_WRITE,
bAllowCreation,
&hKeyIdentity);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
//
// Set the "Last Modified" attribute in the registry.
//
GetSystemTimeAsFileTime(&CurrentTime);
ASSERT(sizeof(DWORD) * 2 == sizeof(FILETIME));
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeLastModified,
0, REG_QWORD, (LPBYTE) &CurrentTime,
sizeof(DWORD) * 2);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "Description" attribute in the registry.
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeDescription,
0, REG_SZ, (LPBYTE) UnicodeNewDescription.Buffer,
UnicodeNewDescription.MaximumLength);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "SaferFlags" attribute in the registry (and in our cache).
//
dwSaferFlags = pIdentChanges->dwSaferFlags;
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeSaferFlags,
0, REG_DWORD, (LPBYTE) &dwSaferFlags, sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "image pathname" attribute in the registry (and our cache).
//
bExpandVars = (wcschr(pIdentChanges->ImageName, L'%') != NULL ? TRUE : FALSE);
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeItemData,
0, (bExpandVars ? REG_EXPAND_SZ : REG_SZ),
(LPBYTE) UnicodeNewImagePath.Buffer,
UnicodeNewImagePath.MaximumLength );
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
if (UpdateCache) {
RtlFreeUnicodeString(&pIdentRecord->ImageNameInfo.ImagePath);
Status = RtlDuplicateUnicodeString(
RTL_DUPLICATE_UNICODE_STRING_NULL_TERMINATE,
&UnicodeNewImagePath,
&pIdentRecord->ImageNameInfo.ImagePath);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageNameInfo.bExpandVars = bExpandVars;
pIdentRecord->ImageNameInfo.dwSaferFlags = dwSaferFlags;
}
Status = STATUS_SUCCESS;
ExitHandler2:
NtClose(hKeyIdentity);
ExitHandler:
return Status;
}
NTSTATUS NTAPI
SaferpSetSingleIdentificationHash(
IN BOOLEAN bAllowCreation,
IN OUT PAUTHZIDENTSTABLERECORD pIdentRecord,
IN PSAFER_HASH_IDENTIFICATION pIdentChanges
)
/*++
Routine Description:
Updates the registry and the local Identification table cache
with new properties about a hash Code Identifier.
Arguments:
bAllowCreation - indicates if the modification of this record has
the potential of being the initial creation of this record.
If this is false and the corresponding key location within the
registry does not already exist, then this function call
will fail.
pIdentRecord - the cached code identity record that should be
updated with new values. This argument must always be supplied,
even if the Code Identity is being created for the first time
(in which case, this argument should be the new record that
the caller has just inserted into the cached idents table).
pIdentChanges - the input structure containing the new modifications
that should be made to the specified Code Identity.
Return Value:
Return STATUS_SUCCESS on success completion, or another error
status code indicating the nature of the failure.
--*/
{
const static UNICODE_STRING UnicodeLastModified =
RTL_CONSTANT_STRING(SAFER_IDS_LASTMODIFIED_REGVALUE);
const static UNICODE_STRING UnicodeDescription =
RTL_CONSTANT_STRING(SAFER_IDS_DESCRIPTION_REGVALUE);
const static UNICODE_STRING UnicodeSaferFlags =
RTL_CONSTANT_STRING(SAFER_IDS_SAFERFLAGS_REGVALUE);
const static UNICODE_STRING UnicodeItemData =
RTL_CONSTANT_STRING(SAFER_IDS_ITEMDATA_REGVALUE);
const static UNICODE_STRING UnicodeFriendlyName =
RTL_CONSTANT_STRING(SAFER_IDS_FRIENDLYNAME_REGVALUE);
const static UNICODE_STRING UnicodeItemSize =
RTL_CONSTANT_STRING(SAFER_IDS_ITEMSIZE_REGVALUE);
const static UNICODE_STRING UnicodeHashAlgorithm =
RTL_CONSTANT_STRING(SAFER_IDS_HASHALG_REGVALUE);
NTSTATUS Status;
HANDLE hKeyIdentity = NULL;
UNICODE_STRING UnicodeTemp;
UNICODE_STRING UnicodeNewFriendlyName;
UNICODE_STRING UnicodeNewDescription;
WCHAR szPathBuffer[MAX_PATH];
DWORD dwSaferFlags;
FILETIME CurrentTime;
//
// Verify our arguments. These things should have been ensured
// by our caller already, so we only assert them here.
//
ASSERT(ARGUMENT_PRESENT(pIdentRecord) &&
ARGUMENT_PRESENT(pIdentChanges) &&
pIdentChanges->header.dwIdentificationType == SaferIdentityTypeImageHash &&
pIdentChanges->header.cbStructSize == sizeof(SAFER_HASH_IDENTIFICATION) &&
IsEqualGUID(&pIdentChanges->header.IdentificationGuid, &pIdentRecord->IdentGuid));
//
// Verify that the existing type matches the new type.
// Cannot change identity type once it has been created.
//
if (pIdentRecord->dwIdentityType != SaferIdentityTypeImageHash) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
//
// Verify that the string arguments are properly terminated.
// We require that they fit entirely within the input buffer
// and also have an explicit null terminator.
//
RtlInitUnicodeString(&UnicodeNewDescription, pIdentChanges->Description);
RtlInitUnicodeString(&UnicodeNewFriendlyName, pIdentChanges->FriendlyName);
if (UnicodeNewDescription.Length >=
SAFER_MAX_DESCRIPTION_SIZE * sizeof(WCHAR) ||
UnicodeNewFriendlyName.Length >=
SAFER_MAX_FRIENDLYNAME_SIZE * sizeof(WCHAR) ||
pIdentChanges->HashSize > SAFER_MAX_HASH_SIZE)
{
// One of these buffers was not NULL terminated or
// the hash size specified was invalid.
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
if ((pIdentChanges->HashAlgorithm & ALG_CLASS_ALL) != ALG_CLASS_HASH ||
pIdentChanges->HashSize < 1) {
// The hash algorithm method was an invalid type, or
// a zero-length hash was supplied.
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
//
// Open a registry handle to the Code Identity.
//
RtlInitEmptyUnicodeString(
&UnicodeTemp, szPathBuffer, sizeof(szPathBuffer));
Status = CodeAuthzpFormatIdentityKeyPath(
pIdentRecord->dwLevelId,
SAFER_HASHMD5_REGSUBKEY,
&pIdentRecord->IdentGuid,
&UnicodeTemp);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
Status = CodeAuthzpOpenPolicyRootKey(
pIdentRecord->dwScopeId,
g_hKeyCustomRoot,
szPathBuffer,
KEY_READ | KEY_WRITE,
bAllowCreation,
&hKeyIdentity);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
//
// Set the "Last Modified" attribute in the registry.
//
GetSystemTimeAsFileTime(&CurrentTime);
ASSERT(sizeof(DWORD) * 2 == sizeof(FILETIME));
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeLastModified, 0,
REG_QWORD, (LPBYTE) &CurrentTime,
sizeof(DWORD) * 2);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "Description" attribute in the registry.
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeDescription,
0, REG_SZ, (LPBYTE) UnicodeNewDescription.Buffer,
UnicodeNewDescription.MaximumLength);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "FriendlyName" attribute in the registry.
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeFriendlyName,
0, REG_SZ, (LPBYTE) UnicodeNewFriendlyName.Buffer,
UnicodeNewFriendlyName.MaximumLength);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "SaferFlags" attribute in the registry (and in our cache).
//
#ifdef SAFER_SAFERFLAGS_ONLY_EXES
dwSaferFlags = (pIdentChanges->dwSaferFlags &
~SAFER_SAFERFLAGS_ONLY_EXES);
#else
dwSaferFlags = pIdentChanges->dwSaferFlags;
#endif
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeSaferFlags,
0, REG_DWORD, (LPBYTE) &dwSaferFlags, sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageNameInfo.dwSaferFlags = dwSaferFlags;
//
// Set the "image size" attribute in the registry (and our cache).
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeItemSize,
0, REG_QWORD, (LPBYTE) &pIdentChanges->ImageSize.QuadPart,
sizeof(DWORD) * 2);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageHashInfo.ImageSize.QuadPart =
pIdentChanges->ImageSize.QuadPart;
//
// Set the "image hash" attribute in the registry (and our cache).
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeItemData,
0, REG_BINARY, (LPBYTE) pIdentChanges->ImageHash,
pIdentChanges->HashSize);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageHashInfo.HashSize =
pIdentChanges->HashSize;
RtlCopyMemory(&pIdentRecord->ImageHashInfo.ImageHash[0],
&pIdentChanges->ImageHash[0],
pIdentChanges->HashSize);
//
// Set the "hash algorithm" attribute in the registry (and our cache).
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeHashAlgorithm,
0, REG_DWORD, (LPBYTE) &pIdentChanges->HashAlgorithm,
sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageHashInfo.HashAlgorithm =
pIdentChanges->HashAlgorithm;
Status = STATUS_SUCCESS;
ExitHandler2:
NtClose(hKeyIdentity);
ExitHandler:
return Status;
}
NTSTATUS NTAPI
SaferpSetSingleIdentificationZone(
IN BOOLEAN bAllowCreation,
IN OUT PAUTHZIDENTSTABLERECORD pIdentRecord,
IN PSAFER_URLZONE_IDENTIFICATION pIdentChanges
)
/*++
Routine Description:
Updates the registry and the local Identification table cache
with new properties about a URL Zone Code Identifier.
Arguments:
bAllowCreation - indicates if the modification of this record has
the potential of being the initial creation of this record.
If this is false and the corresponding key location within the
registry does not already exist, then this function call
will fail.
pIdentRecord - the cached code identity record that should be
updated with new values. This argument must always be supplied,
even if the Code Identity is being created for the first time
(in which case, this argument should be the new record that
the caller has just inserted into the cached idents table).
pIdentChanges - the input structure containing the new modifications
that should be made to the specified Code Identity.
Return Value:
Return STATUS_SUCCESS on success completion, or another error
status code indicating the nature of the failure.
--*/
{
const static UNICODE_STRING UnicodeLastModified =
RTL_CONSTANT_STRING(SAFER_IDS_LASTMODIFIED_REGVALUE);
const static UNICODE_STRING UnicodeSaferFlags =
RTL_CONSTANT_STRING(SAFER_IDS_SAFERFLAGS_REGVALUE);
const static UNICODE_STRING UnicodeItemData =
RTL_CONSTANT_STRING(SAFER_IDS_ITEMDATA_REGVALUE);
NTSTATUS Status;
HANDLE hKeyIdentity = NULL;
UNICODE_STRING UnicodeTemp;
WCHAR szPathBuffer[MAX_PATH];
DWORD dwSaferFlags;
FILETIME CurrentTime;
//
// Verify our arguments. These things should have been ensured
// by our caller already, so we only assert them here.
//
ASSERT(ARGUMENT_PRESENT(pIdentRecord) &&
ARGUMENT_PRESENT(pIdentChanges) &&
pIdentChanges->header.dwIdentificationType == SaferIdentityTypeUrlZone &&
pIdentChanges->header.cbStructSize == sizeof(SAFER_URLZONE_IDENTIFICATION) &&
IsEqualGUID(&pIdentChanges->header.IdentificationGuid, &pIdentRecord->IdentGuid));
//
// Verify that the existing type matches the new type.
// Cannot change identity type once it has been created.
//
if (pIdentRecord->dwIdentityType != SaferIdentityTypeUrlZone) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
//
// Open a registry handle to the Code Identity.
//
RtlInitEmptyUnicodeString(
&UnicodeTemp, szPathBuffer, sizeof(szPathBuffer));
Status = CodeAuthzpFormatIdentityKeyPath(
pIdentRecord->dwLevelId,
SAFER_SOURCEURL_REGSUBKEY,
&pIdentRecord->IdentGuid,
&UnicodeTemp);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
Status = CodeAuthzpOpenPolicyRootKey(
pIdentRecord->dwScopeId,
g_hKeyCustomRoot,
szPathBuffer,
KEY_READ | KEY_WRITE,
bAllowCreation,
&hKeyIdentity);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
//
// Set the "Last Modified" attribute in the registry.
//
GetSystemTimeAsFileTime(&CurrentTime);
ASSERT(sizeof(DWORD) * 2 == sizeof(FILETIME));
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeLastModified,
0, REG_QWORD, (LPBYTE) &CurrentTime,
sizeof(DWORD) * 2);
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
//
// Set the "SaferFlags" attribute in the registry (and in our cache).
//
#ifdef SAFER_SAFERFLAGS_ONLY_EXES
dwSaferFlags = (pIdentChanges->dwSaferFlags &
~SAFER_SAFERFLAGS_ONLY_EXES);
#else
dwSaferFlags = pIdentChanges->dwSaferFlags;
#endif
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeSaferFlags,
0, REG_DWORD, (LPBYTE) &dwSaferFlags, sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageNameInfo.dwSaferFlags = dwSaferFlags;
//
// Set the "ZoneId" attribute in the registry (and our cache).
//
Status = NtSetValueKey(
hKeyIdentity,
(PUNICODE_STRING) &UnicodeItemData,
0, REG_DWORD, (LPBYTE) &pIdentChanges->UrlZoneId,
sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
goto ExitHandler2;
}
pIdentRecord->ImageZone.UrlZoneId = pIdentChanges->UrlZoneId;
Status = STATUS_SUCCESS;
ExitHandler2:
NtClose(hKeyIdentity);
ExitHandler:
return Status;
}
NTSTATUS NTAPI
SaferpSetExistingSingleIdentification(
IN OUT PAUTHZIDENTSTABLERECORD pIdentRecord,
IN PSAFER_IDENTIFICATION_HEADER pCommon
)
/*++
Routine Description:
Arguments:
Return Value:
--*/
{
NTSTATUS Status;
//
// Verify our arguments. These things should have been ensured
// by our caller already, so we only assert them here.
//
ASSERT(ARGUMENT_PRESENT(pIdentRecord) &&
ARGUMENT_PRESENT(pCommon) &&
pCommon->cbStructSize >= sizeof(SAFER_IDENTIFICATION_HEADER) &&
IsEqualGUID(&pCommon->IdentificationGuid, &pIdentRecord->IdentGuid) );
//
// Perform the appropriate action depending on the identification
// data type, including verifying that the structure size matches
// the size that we are expecting.
//
switch (pCommon->dwIdentificationType)
{
case SaferIdentityTypeImageName:
Status = SaferpSetSingleIdentificationPath(
FALSE, pIdentRecord,
(PSAFER_PATHNAME_IDENTIFICATION) pCommon, TRUE);
break;
// --------------------
case SaferIdentityTypeImageHash:
if (pCommon->cbStructSize ==
sizeof(SAFER_HASH_IDENTIFICATION)) {
// Request to change and a Unicode structure was given.
Status = SaferpSetSingleIdentificationHash(
FALSE, pIdentRecord,
(PSAFER_HASH_IDENTIFICATION) pCommon);
} else {
Status = STATUS_INFO_LENGTH_MISMATCH;
}
break;
// --------------------
case SaferIdentityTypeUrlZone:
if (pCommon->cbStructSize ==
sizeof(SAFER_URLZONE_IDENTIFICATION)) {
Status = SaferpSetSingleIdentificationZone(
FALSE, pIdentRecord,
(PSAFER_URLZONE_IDENTIFICATION) pCommon);
} else {
Status = STATUS_INFO_LENGTH_MISMATCH;
}
break;
// --------------------
default:
Status = STATUS_INVALID_INFO_CLASS;
}
return Status;
}
NTSTATUS NTAPI
SaferpCreateNewSingleIdentification(
IN DWORD dwScopeId,
IN PAUTHZLEVELTABLERECORD pLevelRecord,
IN PSAFER_IDENTIFICATION_HEADER pCommon
)
/*++
Routine Description:
Arguments:
Return Value:
--*/
{
NTSTATUS Status;
AUTHZIDENTSTABLERECORD NewIdentRecord;
PAUTHZIDENTSTABLERECORD pIdentRecord;
//
// Verify our arguments. These things should have been ensured
// by our caller already, so we only assert them here.
//
ASSERT(ARGUMENT_PRESENT(pLevelRecord) &&
ARGUMENT_PRESENT(pCommon) &&
pCommon->cbStructSize >= sizeof(SAFER_IDENTIFICATION_HEADER) &&
!CodeAuthzIdentsLookupByGuid(&g_CodeIdentitiesTable,
&pCommon->IdentificationGuid) );
if (g_hKeyCustomRoot != NULL) {
if (dwScopeId != SAFER_SCOPEID_REGISTRY) {
Status = STATUS_INVALID_PARAMETER_MIX;
goto ExitHandler;
}
} else {
if (dwScopeId != SAFER_SCOPEID_MACHINE &&
dwScopeId != SAFER_SCOPEID_USER) {
Status = STATUS_INVALID_PARAMETER_MIX;
goto ExitHandler;
}
if (dwScopeId == SAFER_SCOPEID_USER && !g_bHonorScopeUser) {
Status = STATUS_INVALID_PARAMETER_MIX;
goto ExitHandler;
}
}
//
// Prepare a new Code Identity structure since we will likely
// need to insert a new record for the entry that will be created.
//
RtlZeroMemory(&NewIdentRecord, sizeof(AUTHZIDENTSTABLERECORD));
NewIdentRecord.dwIdentityType = pCommon->dwIdentificationType;
NewIdentRecord.dwLevelId = pLevelRecord->dwLevelId;
NewIdentRecord.dwScopeId = dwScopeId;
RtlCopyMemory(&NewIdentRecord.IdentGuid,
&pCommon->IdentificationGuid,
sizeof(GUID));
if (IsZeroGUID(&NewIdentRecord.IdentGuid)) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler;
}
//
// Perform the appropriate action depending on the identification
// data type, including verifying that the structure size matches
// the size that we are expecting.
//
switch (pCommon->dwIdentificationType)
{
// --------------------
case SaferIdentityTypeImageName:
RtlInsertElementGenericTable(
&g_CodeIdentitiesTable,
(PVOID) &NewIdentRecord,
sizeof(AUTHZIDENTSTABLERECORD),
NULL);
pIdentRecord = CodeAuthzIdentsLookupByGuid(
&g_CodeIdentitiesTable,
&pCommon->IdentificationGuid);
if (!pIdentRecord) {
Status = STATUS_UNSUCCESSFUL;
break;
}
Status = SaferpSetSingleIdentificationPath(
TRUE, pIdentRecord,
(PSAFER_PATHNAME_IDENTIFICATION) pCommon, TRUE);
if (!NT_SUCCESS(Status)) {
RtlDeleteElementGenericTable(
&g_CodeIdentitiesTable,
(PVOID) &NewIdentRecord);
}
break;
// --------------------
case SaferIdentityTypeImageHash:
if (pCommon->cbStructSize ==
sizeof(SAFER_HASH_IDENTIFICATION)) {
RtlInsertElementGenericTable(
&g_CodeIdentitiesTable,
(PVOID) &NewIdentRecord,
sizeof(AUTHZIDENTSTABLERECORD),
NULL);
pIdentRecord = CodeAuthzIdentsLookupByGuid(
&g_CodeIdentitiesTable,
&pCommon->IdentificationGuid);
if (!pIdentRecord) {
Status = STATUS_UNSUCCESSFUL;
break;
}
Status = SaferpSetSingleIdentificationHash(
TRUE, pIdentRecord,
(PSAFER_HASH_IDENTIFICATION) pCommon);
if (!NT_SUCCESS(Status)) {
RtlDeleteElementGenericTable(
&g_CodeIdentitiesTable,
(PVOID) &NewIdentRecord);
}
} else {
Status = STATUS_INFO_LENGTH_MISMATCH;
}
break;
// --------------------
case SaferIdentityTypeUrlZone:
if (pCommon->cbStructSize ==
sizeof(SAFER_URLZONE_IDENTIFICATION)) {
RtlInsertElementGenericTable(
&g_CodeIdentitiesTable,
(PVOID) &NewIdentRecord,
sizeof(AUTHZIDENTSTABLERECORD),
NULL);
pIdentRecord = CodeAuthzIdentsLookupByGuid(
&g_CodeIdentitiesTable,
&pCommon->IdentificationGuid);
if (!pIdentRecord) {
Status = STATUS_UNSUCCESSFUL;
break;
}
Status = SaferpSetSingleIdentificationZone(
TRUE, pIdentRecord,
(PSAFER_URLZONE_IDENTIFICATION) pCommon);
if (!NT_SUCCESS(Status)) {
RtlDeleteElementGenericTable(
&g_CodeIdentitiesTable,
(PVOID) &NewIdentRecord);
}
} else {
Status = STATUS_INFO_LENGTH_MISMATCH;
}
break;
// --------------------
default:
Status = STATUS_INVALID_INFO_CLASS;
break;
}
ExitHandler:
return Status;
}
NTSTATUS NTAPI
CodeAuthzpSetAuthzLevelInfo(
IN SAFER_LEVEL_HANDLE LevelHandle,
IN SAFER_OBJECT_INFO_CLASS dwInfoType,
IN LPVOID lpQueryBuffer,
IN DWORD dwInBufferSize
)
/*++
Routine Description:
Allows the user to modify various pieces of information about a
given WinSafer Level.
Arguments:
LevelHandle - the handle to the authorization object to evaluate.
dwInfoType - specifies the type of information being modified.
lpQueryBuffer - pointer to a user-supplied memory buffer that
contains the new data for the item being modified.
dwInBufferSize - specifies the size of the user's memory block.
For string arguments, this size includes the terminating null.
Return Value:
Returns STATUS_SUCCESS on success.
--*/
{
NTSTATUS Status;
PAUTHZLEVELHANDLESTRUCT pLevelStruct;
PAUTHZLEVELTABLERECORD pLevelRecord;
DWORD dwHandleScopeId;
BOOLEAN bNeedLevelRegKey;
UNICODE_STRING ValueName, UnicodeRegistrySuffix;
HANDLE hRegLevelBase;
//
// Obtain a pointer to the authorization object structure
//
Status = CodeAuthzHandleToLevelStruct(LevelHandle, &pLevelStruct);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
ASSERT(pLevelStruct != NULL);
pLevelRecord = CodeAuthzLevelObjpLookupByLevelId(
&g_CodeLevelObjTable, pLevelStruct->dwLevelId);
if (!pLevelRecord) {
Status = STATUS_INVALID_HANDLE;
goto ExitHandler;
}
dwHandleScopeId = pLevelStruct->dwScopeId;
//
// Determine if we need to open a registry handle to the Level key.
//
bNeedLevelRegKey = FALSE;
switch (dwInfoType)
{
case SaferObjectLevelId: // DWORD
case SaferObjectScopeId: // DWORD
case SaferObjectBuiltin: // DWORD boolean
// These information classes cannot be altered with this API.
Status = STATUS_INVALID_INFO_CLASS;
goto ExitHandler;
case SaferObjectFriendlyName: // LPCTSTR
case SaferObjectDescription: // LPCTSTR
if (pLevelRecord->Builtin) {
// Don't allow built-in Levels to be modified at all.
Status = STATUS_ACCESS_DENIED;
goto ExitHandler;
}
// All of these classes need to access the Level key.
bNeedLevelRegKey = TRUE;
break;
#ifdef ALLOW_FULL_WINSAFER
case SaferObjectDisallowed: // DWORD boolean
case SaferObjectDisableMaxPrivilege: // DWORD boolean
case SaferObjectInvertDeletedPrivileges: // DWORD boolean
case SaferObjectDefaultOwner: // TOKEN_OWNER
case SaferObjectDeletedPrivileges: // TOKEN_PRIVILEGES
case SaferObjectSidsToDisable: // TOKEN_GROUPS
case SaferObjectRestrictedSidsInverted: // TOKEN_GROUPS
case SaferObjectRestrictedSidsAdded: // TOKEN_GROUPS
if (pLevelRecord->Builtin) {
// Don't allow built-in Levels to be modified at all.
Status = STATUS_ACCESS_DENIED;
goto ExitHandler;
}
// All of these classes need to access the Level key.
bNeedLevelRegKey = TRUE;
break;
#endif
case SaferObjectAllIdentificationGuids:
Status = STATUS_INVALID_INFO_CLASS;
goto ExitHandler;
case SaferObjectSingleIdentification:
// These only modify Code Identity keys.
break;
default:
Status = STATUS_INVALID_INFO_CLASS;
goto ExitHandler;
}
//
// Open the registry handle to where this Level is stored.
//
if (bNeedLevelRegKey) {
WCHAR szRegistrySuffix[MAX_PATH];
RtlInitEmptyUnicodeString(
&UnicodeRegistrySuffix,
szRegistrySuffix,
sizeof(szRegistrySuffix));
Status = CodeAuthzpFormatLevelKeyPath(
pLevelRecord->dwLevelId,
&UnicodeRegistrySuffix);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
Status = CodeAuthzpOpenPolicyRootKey(
g_hKeyCustomRoot != NULL ?
SAFER_SCOPEID_REGISTRY : SAFER_SCOPEID_MACHINE,
g_hKeyCustomRoot, szRegistrySuffix,
KEY_WRITE, TRUE, &hRegLevelBase);
if (!NT_SUCCESS(Status)) {
goto ExitHandler;
}
} else {
hRegLevelBase = NULL;
}
//
// Otherwise perform the actual "Set" operation.
//
switch (dwInfoType)
{
case SaferObjectFriendlyName: // LPCTSTR
ASSERT(hRegLevelBase != NULL);
RtlInitUnicodeString(&ValueName,
SAFER_OBJFRIENDLYNAME_REGVALUEW);
Status = NtSetValueKey(hRegLevelBase,
&ValueName, 0, REG_SZ,
(LPBYTE) lpQueryBuffer, dwInBufferSize);
goto ExitHandler2;
case SaferObjectDescription: // LPCTSTR
ASSERT(hRegLevelBase != NULL);
RtlInitUnicodeString(&ValueName,
SAFER_OBJDESCRIPTION_REGVALUEW);
Status = NtSetValueKey(hRegLevelBase,
&ValueName, 0, REG_SZ,
(LPBYTE) lpQueryBuffer, dwInBufferSize);
goto ExitHandler2;
#ifdef ALLOW_FULL_WINSAFER
case SaferObjectDisallowed: // DWORD boolean
ASSERT(hRegLevelBase != NULL);
if (!ARGUMENT_PRESENT(lpQueryBuffer) ||
dwInBufferSize != sizeof(DWORD)) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler2;
}
RtlInitUnicodeString(&ValueName, SAFER_OBJDISALLOW_REGVALUE);
Status = NtSetValueKey(hRegLevelBase,
&ValueName, 0, REG_DWORD,
(LPBYTE) lpQueryBuffer, dwInBufferSize);
if (NT_SUCCESS(Status)) {
goto ExitHandler2;
} else {
pLevelRecord->DisallowExecution =
( *((LPDWORD) lpQueryBuffer) != 0 ? TRUE : FALSE );
}
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
case SaferObjectDisableMaxPrivilege: // DWORD boolean
ASSERT(hRegLevelBase != NULL);
// Make sure the argument is the correct size.
if (!ARGUMENT_PRESENT(lpQueryBuffer) ||
dwInBufferSize != sizeof(DWORD)) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler2;
}
// Actually write the value to the correct place.
Status = SaferpSetRegistryHelper(
hRegLevelBase,
L"Restrictions",
L"PrivsToRemove",
L"DisableMaxPrivilege",
REG_DWORD,
lpQueryBuffer,
dwInBufferSize);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
case SaferObjectInvertDeletedPrivileges: // DWORD boolean
ASSERT(hRegLevelBase != NULL);
// Make sure the argument is the correct size.
if (!ARGUMENT_PRESENT(lpQueryBuffer) ||
dwInBufferSize != sizeof(DWORD)) {
Status = STATUS_INVALID_PARAMETER;
goto ExitHandler2;
}
// Actually write the value to the correct place.
Status = SaferpSetRegistryHelper(
hRegLevelBase,
L"Restrictions",
L"PrivsToRemove",
L"InvertPrivs",
REG_DWORD,
lpQueryBuffer,
dwInBufferSize);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
case SaferObjectDefaultOwner: // TOKEN_OWNER
{
BOOLEAN AllocatedStringSid = FALSE;
UNICODE_STRING UnicodeStringSid;
PTOKEN_OWNER pTokenOwner = (PTOKEN_OWNER) lpQueryBuffer;
ASSERT(hRegLevelBase != NULL);
if (pTokenOwner->Owner == NULL) {
RtlInitUnicodeString(&UnicodeStringSid, L"");
}
else {
Status = RtlConvertSidToUnicodeString( &UnicodeStringSid,
pTokenOwner->Owner, TRUE );
if (!NT_SUCCESS(Status)) goto ExitHandler2;
AllocatedStringSid = TRUE;
}
Status = SaferpSetRegistryHelper(
hRegLevelBase,
L"Restrictions",
NULL,
L"DefaultOwner",
REG_SZ,
lpQueryBuffer,
dwInBufferSize);
if (AllocatedStringSid)
RtlFreeUnicodeString(&UnicodeStringSid);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
}
case SaferObjectDeletedPrivileges: // TOKEN_PRIVILEGES
{
HKEY hKeyPrivsToRemove;
UNICODE_STRING ValueName;
PTOKEN_PRIVILEGES pTokenPrivs =
(PTOKEN_PRIVILEGES) lpQueryBuffer;
// Open a handle to the correct subkey.
ASSERT(hRegLevelBase != NULL);
Status = SaferpCreateSecondLevelKey(
hRegLevelBase,
L"Restrictions",
L"PrivsToRemove",
&hKeyPrivsToRemove);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
// Clear out all old values under the subkey.
Status = SaferpClearRegistryListHelper(
hKeyPrivsToRemove,
L"Count",
L"Priv");
if (!NT_SUCCESS(Status)) {
// Bad luck! Possibly left in incomplete state!
NtClose(hKeyPrivsToRemove);
goto ExitHandler2;
}
// Now add all of the new ones we're supposed to add.
RtlInitUnicodeString(&ValueName, L"Count");
Status = NtSetValueKey(hKeyPrivsToRemove,
&ValueName, 0, REG_DWORD,
(LPBYTE) pTokenPrivs->PrivilegeCount, sizeof(DWORD));
if (!NT_SUCCESS(Status)) {
// Bad luck! Possibly left in incomplete state!
NtClose(hKeyPrivsToRemove);
goto ExitHandler2;
}
for (Index = 0; Index < pTokenPrivs->PrivilegeCount; Index++)
{
WCHAR ValueNameBuffer[20];
WCHAR PrivilegeNameBuffer[64];
DWORD dwPrivilegeNameLen;
wsprintfW(ValueNameBuffer, L"Priv%d", Index);
RtlInitUnicodeString(&ValueName, ValueNameBuffer);
dwPrivilegeNameLen = sizeof(PrivilegeNameBuffer) / sizeof(WCHAR);
if (!LookupPrivilegeNameW(NULL,
&pTokenPrivs->Privileges[Index].Luid,
PrivilegeNameBuffer,
&dwPrivilegeNameLen))
{
// Bad luck! Possibly left in incomplete state!
Status = STATUS_NO_SUCH_PRIVILEGE;
NtClose(hKeyPrivsToRemove);
goto ExitHandler2;
}
Status = NtSetValueKey(hKeyPrivsToRemove,
&ValueName, 0, REG_SZ,
(LPBYTE) PrivilegeNameBuffer,
(wcslen(PrivilegeNameBuffer) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status)) {
// Bad luck! Possibly left in incomplete state!
NtClose(hKeyPrivsToRemove);
goto ExitHandler2;
}
}
NtClose(hKeyPrivsToRemove);
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
}
case SaferObjectSidsToDisable: // TOKEN_GROUPS
//BLACKCOMB TODO: allow wildcard sids to be specified.
ASSERT(hRegLevelBase != NULL);
Status = SaferpSetListOfSids(
hRegLevelBase,
L"Restrictions",
L"SidsToDisable",
L"Count",
L"Group",
(PTOKEN_GROUPS) lpQueryBuffer);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
case SaferObjectRestrictedSidsInverted: // TOKEN_GROUPS
//BLACKCOMB TODO: allow wildcard sids to be specified.
ASSERT(hRegLevelBase != NULL);
Status = SaferpSetListOfSids(
hRegLevelBase,
L"Restrictions",
L"RestrictingSidsInverted",
L"Count",
L"Group",
(PTOKEN_GROUPS) lpQueryBuffer);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
case SaferObjectRestrictedSidsAdded: // TOKEN_GROUPS
ASSERT(hRegLevelBase != NULL);
Status = SaferpSetListOfSids(
hRegLevelBase,
L"Restrictions",
L"RestrictingSidsAdded",
L"Count",
L"Group",
(PTOKEN_GROUPS) lpQueryBuffer);
if (!NT_SUCCESS(Status)) goto ExitHandler2;
//BLACKCOMB TODO: update cached pLevelRecord on success
break;
#endif
case SaferObjectSingleIdentification:
{
PAUTHZIDENTSTABLERECORD pIdentRecord;
PSAFER_IDENTIFICATION_HEADER pCommon =
(PSAFER_IDENTIFICATION_HEADER) lpQueryBuffer;
if (!ARGUMENT_PRESENT(pCommon)) {
Status = STATUS_ACCESS_VIOLATION;
goto ExitHandler2;
}
if (dwInBufferSize < sizeof(SAFER_IDENTIFICATION_HEADER) ||
dwInBufferSize < pCommon->cbStructSize) {
Status = STATUS_INFO_LENGTH_MISMATCH;
goto ExitHandler2;
}
pIdentRecord = CodeAuthzIdentsLookupByGuid(
&g_CodeIdentitiesTable,
&pCommon->IdentificationGuid);
if (!pIdentRecord)
{
// Request to create a new Code Identifier.
Status = SaferpCreateNewSingleIdentification(
dwHandleScopeId, pLevelRecord, pCommon);
}
else if (pCommon->dwIdentificationType == 0)
{
// Request to delete an existing Code Identifier.
if (pIdentRecord->dwLevelId != pLevelRecord->dwLevelId ||
pIdentRecord->dwScopeId != dwHandleScopeId) {
Status = STATUS_NOT_FOUND;
} else {
Status = SaferpDeleteSingleIdentificationGuid(
pLevelRecord, pIdentRecord);
}
}
else
{
// Request to modify an existing Code Identifier.
if (pIdentRecord->dwLevelId != pLevelRecord->dwLevelId ||
pIdentRecord->dwScopeId != dwHandleScopeId)
{
// This was likely a request to create a new Code
// Identifier, but with a GUID that already exists.
Status = STATUS_OBJECT_NAME_COLLISION;
} else {
Status = SaferpSetExistingSingleIdentification(
pIdentRecord, pCommon);
}
}
goto ExitHandler2;
}
default:
ASSERTMSG("invalid info class unhandled earlier", 0);
Status = STATUS_INVALID_INFO_CLASS;
goto ExitHandler2;
}
Status = STATUS_SUCCESS;
//
// Cleanup and epilogue code.
//
ExitHandler2:
if (hRegLevelBase != NULL) {
NtClose(hRegLevelBase);
}
ExitHandler:
return Status;
}
BOOL WINAPI
SaferSetLevelInformation(
IN SAFER_LEVEL_HANDLE LevelHandle,
IN SAFER_OBJECT_INFO_CLASS dwInfoType,
IN LPVOID lpQueryBuffer,
IN DWORD dwInBufferSize
)
/*++
Routine Description:
Allows the user to modify various pieces of information about a
given WinSafer Level.
Arguments:
LevelHandle - the handle to the WinSafer Level to evaluate.
dwInfoType - specifies the type of information being modified.
lpQueryBuffer - pointer to a user-supplied memory buffer that
contains the new data for the item being modified.
dwInBufferSize - specifies the size of the user's memory block.
For string arguments, this size includes the terminating null.
Return Value:
Returns FALSE on error, otherwise success.
--*/
{
NTSTATUS Status;
if (!g_bInitializedFirstTime) {
Status = STATUS_UNSUCCESSFUL;
goto ExitHandler;
}
RtlEnterCriticalSection(&g_TableCritSec);
Status = CodeAuthzpSetAuthzLevelInfo(
LevelHandle, dwInfoType,
lpQueryBuffer, dwInBufferSize);
RtlLeaveCriticalSection(&g_TableCritSec);
if (NT_SUCCESS(Status))
return TRUE;
ExitHandler:
if (Status == STATUS_OBJECT_NAME_COLLISION) {
SetLastError(ERROR_OBJECT_ALREADY_EXISTS);
} else {
BaseSetLastNTError(Status);
}
return FALSE;
}