Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1916 lines
43 KiB

/*++
Copyright (c) 1996 Microsoft Corporation
Module Name:
efsrtlsp.c
Abstract:
This module will provide EFS RTL support routines.
Author:
Robert Gu (robertg) 20-Dec-1996
Environment:
Kernel Mode Only
Revision History:
--*/
#include "efsrtl.h"
#ifdef ALLOC_PRAGMA
#pragma alloc_text(PAGE, EfsReadEfsData)
#pragma alloc_text(PAGE, EfsVerifyGeneralFsData)
#pragma alloc_text(PAGE, EfsVerifyKeyFsData)
#pragma alloc_text(PAGE, EfsDeleteEfsData)
#pragma alloc_text(PAGE, EfsSetEncrypt)
#pragma alloc_text(PAGE, EfsEncryptStream)
#pragma alloc_text(PAGE, EfsEncryptFile)
#pragma alloc_text(PAGE, EfsDecryptStream)
#pragma alloc_text(PAGE, EfsDecryptFile)
#pragma alloc_text(PAGE, EfsEncryptDir)
#pragma alloc_text(PAGE, EfsModifyEfsState)
#pragma alloc_text(PAGE, GetEfsStreamOffset)
#pragma alloc_text(PAGE, SetEfsData)
#pragma alloc_text(PAGE, EfsFindInCache)
#pragma alloc_text(PAGE, EfsRefreshCache)
#pragma alloc_text(PAGE, SkipCheckStream)
#endif
NTSTATUS
EfsReadEfsData(
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext,
OUT PVOID *EfsStreamData,
OUT PULONG PEfsStreamLength,
OUT PULONG Information
)
/*++
Routine Description:
This is an internal support routine. The purpose is to reduce the code size.
It is used to read $EFS data and set the context block.
Arguments:
FileHdl -- An object handle to access the attached $EFS
IrpContext -- Used in NtOfsCreateAttributeEx().
EfsStreamData -- Point to $EFS data read.
Information -- Return the processing information
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
NTSTATUS ntStatus;
ATTRIBUTE_HANDLE attribute = NULL;
LONGLONG attriOffset;
ULONG efsLength;
PVOID efsMapBuffer = NULL;
MAP_HANDLE efsMapHandle;
PAGED_CODE();
if (EfsStreamData) {
*EfsStreamData = NULL;
}
try {
ntStatus = NtOfsCreateAttributeEx(
IrpContext,
FileHdl,
EfsData.EfsName,
$LOGGED_UTILITY_STREAM,
OPEN_EXISTING,
TRUE,
&attribute
);
if (NT_SUCCESS(ntStatus)){
LONGLONG attrLength;
NtOfsInitializeMapHandle(&efsMapHandle);
//
// Prepare to map and read the $EFS data
//
attrLength = NtOfsQueryLength ( attribute );
if (attrLength <= sizeof ( EFS_DATA_STREAM_HEADER ) ){
//
// Not our $EFS
//
NtOfsCloseAttribute(IrpContext, attribute);
*Information = EFS_FORMAT_ERROR;
ntStatus = STATUS_SUCCESS;
leave;
}
if ( attrLength > EFS_MAX_LENGTH) {
//
// EFS stream too long ( > 256K )
// We might support that in the future
// In that case, we need multiple map window
//
NtOfsCloseAttribute(IrpContext, attribute);
*Information = EFS_FORMAT_ERROR;
ntStatus = STATUS_SUCCESS;
leave;
}
attriOffset = 0;
*PEfsStreamLength = efsLength = (ULONG) attrLength;
NtOfsMapAttribute(
IrpContext,
attribute,
attriOffset,
efsLength,
&efsMapBuffer,
&efsMapHandle
);
//
// Double check the EFS
//
if ( efsLength != *(ULONG *)efsMapBuffer){
//
// Not our $EFS
//
NtOfsReleaseMap(IrpContext, &efsMapHandle);
NtOfsCloseAttribute(IrpContext, attribute);
*Information = EFS_FORMAT_ERROR;
ntStatus = STATUS_SUCCESS;
leave;
}
//
// Allocate memory for $EFS
//
if ( EfsStreamData ){
//
// $EFS must be read
//
*EfsStreamData = ExAllocatePoolWithTag(
PagedPool,
efsLength,
'msfE'
);
if ( NULL == *EfsStreamData ){
NtOfsReleaseMap(IrpContext, &efsMapHandle);
NtOfsCloseAttribute(IrpContext, attribute);
*Information = OUT_OF_MEMORY;
ntStatus = STATUS_INSUFFICIENT_RESOURCES;
leave;
}
RtlCopyMemory(*EfsStreamData, efsMapBuffer, efsLength);
}
NtOfsReleaseMap(IrpContext, &efsMapHandle);
NtOfsCloseAttribute(IrpContext, attribute);
*Information = EFS_READ_SUCCESSFUL;
ntStatus = STATUS_SUCCESS;
} else {
//
// Open failed. Not encrypted by EFS.
//
*Information = OPEN_EFS_FAIL;
ntStatus = STATUS_SUCCESS;
}
} finally {
if (AbnormalTermination()) {
//
// Get the exception status
//
*Information = NTOFS_EXCEPTION;
if (*EfsStreamData) {
ExFreePool(*EfsStreamData);
*EfsStreamData = NULL;
}
if (efsMapBuffer) {
NtOfsReleaseMap(IrpContext, &efsMapHandle);
}
if (attribute) {
NtOfsCloseAttribute(IrpContext, attribute);
}
}
}
return ntStatus;
}
BOOLEAN
EfsVerifyGeneralFsData(
IN PUCHAR DataOffset,
IN ULONG InputDataLength
)
/*++
Routine Description:
This is an internal support routine. The purpose is to verify the general
FSCTL input data to see if it is sent by EFS component or not.
General EFS data format is like the following,
SessionKey, Handle, Handle, [SessionKey, Handle, Handle]sk
Arguments:
DataOffset -- Point to a buffer holding the FSCTL general data part.
InputDataLength -- The length of the FSCTL input puffer
Return Value:
TRUE if verified.
--*/
{
ULONG bytesSame;
ULONG minLength;
PAGED_CODE();
minLength = 4 * DES_BLOCKLEN + 3 * sizeof(ULONG);
if (InputDataLength < minLength){
return FALSE;
}
//
// Decrypt the encrypted data part.
//
des( DataOffset + 2 * DES_BLOCKLEN,
DataOffset + 2 * DES_BLOCKLEN,
&(EfsData.SessionDesTable[0]),
DECRYPT
);
des( DataOffset + 3 * DES_BLOCKLEN,
DataOffset + 3 * DES_BLOCKLEN,
&(EfsData.SessionDesTable[0]),
DECRYPT
);
bytesSame = (ULONG)RtlCompareMemory(
DataOffset,
DataOffset + 2 * DES_BLOCKLEN,
2 * DES_BLOCKLEN
);
if (( 2 * DES_BLOCKLEN ) != bytesSame ){
//
// Input data format error
//
return FALSE;
}
bytesSame = (ULONG)RtlCompareMemory(
DataOffset,
&(EfsData.SessionKey[0]),
DES_KEYSIZE
);
if ( DES_KEYSIZE != bytesSame ){
//
// Input data is not set by EFS component.
// The session key does not match.
//
return FALSE;
}
return TRUE;
}
BOOLEAN
EfsVerifyKeyFsData(
IN PUCHAR DataOffset,
IN ULONG InputDataLength
)
/*++
Routine Description:
This is an internal support routine. The purpose is to verify the
FSCTL input data with FEK encrypted to see if it is sent by EFS
component or not.
Key EFS data format is like the following,
FEK, [FEK]sk, [$EFS]
Arguments:
DataOffset -- Point to a buffer holding the FSCTL general data part.
InputDataLength -- The length of the FSCTL input puffer
Return Value:
TRUE if verified.
--*/
{
ULONG bytesSame;
LONG encLength;
PUCHAR encBuffer;
PAGED_CODE();
encLength = EFS_KEY_SIZE( ((PEFS_KEY)DataOffset) );
if ( (InputDataLength < (2 * encLength + 3 * sizeof(ULONG))) ||
(0 != ( encLength % DES_BLOCKLEN )) ||
( encLength <= 0 )){
return FALSE;
}
//
// Decrypt the encrypted data part.
//
encBuffer = DataOffset + encLength;
while ( encLength > 0 ){
des( encBuffer,
encBuffer,
&(EfsData.SessionDesTable[0]),
DECRYPT
);
encBuffer += DES_BLOCKLEN;
encLength -= DES_BLOCKLEN;
}
//
// Compare the two parts.
//
encLength = EFS_KEY_SIZE( ((PEFS_KEY)DataOffset) );
bytesSame = (ULONG)RtlCompareMemory(
DataOffset,
DataOffset + encLength,
encLength
);
if ( ((ULONG) encLength) != bytesSame ){
//
// Input data format error
//
return FALSE;
}
return TRUE;
}
NTSTATUS
EfsDeleteEfsData(
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext
)
/*++
Routine Description:
This is an internal support routine. It deletes $EFS.
Arguments:
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
ATTRIBUTE_HANDLE attribute = NULL;
NTSTATUS ntStatus;
PAGED_CODE();
//
// Delete the $EFS stream
//
try {
ntStatus = NtOfsCreateAttributeEx(
IrpContext,
FileHdl,
EfsData.EfsName,
$LOGGED_UTILITY_STREAM,
OPEN_EXISTING,
TRUE,
&attribute
);
if (NT_SUCCESS(ntStatus)){
NtOfsDeleteAttribute( IrpContext, FileHdl, attribute );
}
} finally {
if (attribute) {
//
// According to BrianAn, we shouldn't get exception below.
//
NtOfsCloseAttribute(IrpContext, attribute);
}
}
return ntStatus;
}
NTSTATUS
EfsSetEncrypt(
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN ULONG EncryptionFlag,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext,
IN OUT PVOID *Context,
IN OUT PULONG PContextLength
)
/*++
Routine Description:
This is an internal support routine. It process the call of
FSCTL_SET_ENCRYPT.
Arguments:
InputData -- Input data buffer of FSCTL.
InputDataLength -- The length of input data.
EncryptionFlag -- Indicating if this stream is encrypted or not.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Context -- Blob(key) for READ or WRITE later.
PContextLength -- Length og the key Blob
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
PAGED_CODE();
switch ( ((PFSCTL_INPUT)InputData)->CipherSubCode ){
case EFS_ENCRYPT_STREAM:
return EfsEncryptStream(
InputData,
InputDataLength,
EncryptionFlag,
FileHdl,
IrpContext,
Context,
PContextLength
);
case EFS_ENCRYPT_FILE:
return EfsEncryptFile(
InputData,
InputDataLength,
EncryptionFlag,
FileHdl,
IrpContext,
Context
);
case EFS_DECRYPT_STREAM:
return EfsDecryptStream(
InputData,
InputDataLength,
EncryptionFlag,
FileHdl,
IrpContext,
Context,
PContextLength
);
case EFS_DECRYPT_FILE:
case EFS_DECRYPT_DIRFILE:
return EfsDecryptFile(
InputData,
InputDataLength,
FileHdl,
IrpContext
);
case EFS_ENCRYPT_DIRSTR:
return EfsEncryptDir(
InputData,
InputDataLength,
EncryptionFlag,
FileHdl,
IrpContext
);
break;
case EFS_DECRYPT_DIRSTR:
//
// EFS ignore this case.\
//
break;
default:
break;
}
return STATUS_SUCCESS;
}
NTSTATUS
EfsEncryptStream(
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN ULONG EncryptionFlag,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext,
IN OUT PVOID *Context,
IN OUT PULONG PContextLength
)
/*++
Routine Description:
This is an internal support routine. It process the call of
FSCTL_SET_ENCRYPT for encrypting a stream. It verifies the caller
and set the key Blob for the stream.
Arguments:
InputData -- Input data buffer of FSCTL.
InputDataLength -- The length of input data.
EncryptionFlag - Indicating if this stream is encrypted or not.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Context -- Blob(key) for READ or WRITE later.
PContextLength -- Length of the key Blob
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
ULONG efsLength;
ULONG information;
PVOID efsStreamData = NULL;
PVOID efsKeyBlob = NULL;
PEFS_KEY efsKey = NULL;
NTSTATUS ntStatus;
ULONG bytesSame;
PAGED_CODE();
if ( EncryptionFlag & STREAM_ENCRYPTED ) {
//
// Stream already encrypted
//
return STATUS_SUCCESS;
}
if ( *Context ){
//
// The key Blob is already set without the bit set first.
// Not set by EFS
//
return STATUS_INVALID_DEVICE_REQUEST;
}
//
// [FsData] = FEK, [FEK]sk, $EFS
//
if ( !EfsVerifyKeyFsData(
&(((PFSCTL_INPUT)InputData)->EfsFsData[0]),
InputDataLength) ){
//
// Input data format error
//
return STATUS_INVALID_PARAMETER;
}
//
// Try to read an existing $EFS
//
ntStatus = EfsReadEfsData(
FileHdl,
IrpContext,
&efsStreamData,
&efsLength,
&information
);
if ( EFS_READ_SUCCESSFUL == information ){
BOOLEAN continueProcess = TRUE;
ULONG efsOffset;
efsOffset = GetEfsStreamOffset( InputData );
if ( 0 == (EncryptionFlag & FILE_ENCRYPTED) ){
//
// File is not encrypted, but $EFS exist. Invalid status.
// May caused by a crash during the SET_ENCRYPT file call.
//
ntStatus = STATUS_INVALID_DEVICE_REQUEST;
continueProcess = FALSE;
} else if ( efsLength != ( InputDataLength - efsOffset )) {
//
// $EFS stream length does not match
//
ntStatus = STATUS_INVALID_PARAMETER;
continueProcess = FALSE;
}
if ( !continueProcess ) {
ExFreePool( efsStreamData );
return ntStatus;
}
//
// Got the $EFS. Now double check the match of the $EFS stream.
// EFS use the same $EFS for all the stream within a file.
// Skip comparing the length and status fields.
//
bytesSame = (ULONG)RtlCompareMemory(
(PUCHAR)efsStreamData + 2 * sizeof(ULONG),
InputData + efsOffset + 2 * sizeof(ULONG),
efsLength - 2 * sizeof(ULONG)
);
ExFreePool( efsStreamData );
if ( bytesSame != efsLength - 2 * sizeof(ULONG) ){
//
// The EFS are not the same length
//
return STATUS_INVALID_PARAMETER;
}
efsKey = (PEFS_KEY)&(((PFSCTL_INPUT)InputData)->EfsFsData[0]);
efsKeyBlob = GetKeyBlobBuffer(efsKey->Algorithm);
if ( NULL == efsKeyBlob ){
return STATUS_INSUFFICIENT_RESOURCES;
}
if (!SetKeyTable( efsKeyBlob, efsKey )){
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
//
// We might be able to return a better error code if needed.
// This is not in the CreateFile() path.
//
return STATUS_ACCESS_DENIED;
}
*Context = efsKeyBlob;
*PContextLength = ((PKEY_BLOB)efsKeyBlob)->KeyLength;
return STATUS_SUCCESS;
}
//
// Try to encrypt a stream but the $EFS is not there.
// EFS server will always call encrypt on a file first.
//
return STATUS_INVALID_DEVICE_REQUEST;
}
NTSTATUS
EfsEncryptFile(
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN ULONG EncryptionFlag,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext,
IN OUT PVOID *Context
)
/*++
Routine Description:
This is an internal support routine. It process the call of
FSCTL_SET_ENCRYPT for encrypting a file. It does not deal with
the stream, it only writes the initial $EFS and put the file in
a transition status so that no one else can open the file.
Arguments:
InputData -- Input data buffer of FSCTL.
InputDataLength -- The length of input data.
EncryptionFlag - Indicating if this stream is encrypted or not.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Context - BLOB(key) for READ or WRITE later.
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
ULONG efsLength;
ULONG information;
ULONG efsOffset;
PVOID efsStreamData = NULL;
PVOID efsKeyBlob = NULL;
NTSTATUS ntStatus;
ATTRIBUTE_HANDLE attribute = NULL;
PAGED_CODE();
if ( EncryptionFlag & FILE_ENCRYPTED ){
//
// File encrypted.
//
return STATUS_INVALID_DEVICE_REQUEST;
}
//
// [FsData] = FEK, [FEK]sk, $EFS
//
if ( !EfsVerifyKeyFsData(
&(((PFSCTL_INPUT)InputData)->EfsFsData[0]),
InputDataLength) ){
//
// Input data format error
//
return STATUS_INVALID_PARAMETER;
}
//
// Allocate memory for $EFS
// Create the $EFS, if there is one, overwrite it.
//
efsOffset = GetEfsStreamOffset( InputData );
efsLength = InputDataLength - efsOffset;
try {
ntStatus = NtOfsCreateAttributeEx(
IrpContext,
FileHdl,
EfsData.EfsName,
$LOGGED_UTILITY_STREAM,
CREATE_NEW,
TRUE,
&attribute
);
#if DBG
if ( (EFSTRACEALL | EFSTRACELIGHT ) & EFSDebug ){
DbgPrint( "\n EFSFILTER: Create Attr. Status %x\n", ntStatus );
}
#endif
if (NT_SUCCESS(ntStatus)){
LONGLONG attriOffset = 0;
LONGLONG attriLength = (LONGLONG) efsLength;
NtOfsSetLength(
IrpContext,
attribute,
attriLength
);
//
// Write the $EFS with transition status
//
*(PULONG)(InputData + efsOffset + sizeof(ULONG)) =
EFS_STREAM_TRANSITION;
NtOfsPutData(
IrpContext,
attribute,
attriOffset,
efsLength,
InputData + efsOffset
);
NtOfsFlushAttribute (IrpContext, attribute, FALSE);
}
} finally {
if (attribute) {
NtOfsCloseAttribute(IrpContext, attribute);
}
}
return ntStatus;
}
NTSTATUS
EfsDecryptStream(
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN ULONG EncryptionFlag,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext,
IN OUT PVOID *Context,
IN OUT PULONG PContextLength
)
/*++
Routine Description:
This is an internal support routine. It process the call of
FSCTL_SET_ENCRYPT for decrypting a stream. It sets the key Blob to NULL.
Arguments:
InputData -- Input data buffer of FSCTL.
EncryptionFlag - Indicating if this stream is encrypted or not.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Context -- Blob(key) for READ or WRITE later.
PContextLength -- Length of the key Blob.
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
ULONG efsLength;
ULONG information;
NTSTATUS ntStatus;
PAGED_CODE();
if ( 0 == (EncryptionFlag & STREAM_ENCRYPTED) ) {
//
// Stream already decrypted
//
return STATUS_SUCCESS;
}
if ( 0 == (EncryptionFlag & FILE_ENCRYPTED)){
//
// File decrypted but the stream is still encrypted.
//
return STATUS_INVALID_DEVICE_REQUEST;
}
//
// [FsData] = SessionKey, Handle, Handle, [SessionKey, Handle, Handle]sk
// Verify the FsData format.
//
if (!EfsVerifyGeneralFsData(
&(((PFSCTL_INPUT)InputData)->EfsFsData[0]),
InputDataLength)){
return STATUS_INVALID_PARAMETER;
}
//
// Try to read an existing $EFS
//
ntStatus = EfsReadEfsData(
FileHdl,
IrpContext,
NULL,
&efsLength,
&information
);
if ( EFS_READ_SUCCESSFUL == information ){
//
// Everything is OK. We do not check user ID here,
// we suppose that has been checked during the Open path.
// Clear the key Blob. The caller should flushed this
// stream before the FSCTL is issued.
//
if ( *Context ){
CheckValidKeyBlock(*Context,"Please contact RobertG if you see this line, efsrtlsp.c.\n");
FreeMemoryBlock(Context);
*PContextLength = 0;
}
return STATUS_SUCCESS;
} else if ( ( OPEN_EFS_FAIL == information ) ||
( EFS_FORMAT_ERROR == information ) ) {
//
// EFS does not exist or not encrypted by the EFS ?
//
ntStatus = STATUS_INVALID_DEVICE_REQUEST;
}
//
// Other error while opening $EFS
//
return ntStatus;
}
NTSTATUS
EfsDecryptFile(
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext
)
/*++
Routine Description:
This is an internal support routine. It process the call of
FSCTL_SET_ENCRYPT for decrypting a file. It deletes the $EFS. NTFS
will clear the bit if STATUS_SUCCESS returned.
Arguments:
InputData -- Input data buffer of FSCTL.
EncryptionFlag - Indicating if this stream is encrypted or not.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Context - BLOB(key) for READ or WRITE later.
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
ULONG efsLength;
ULONG information;
NTSTATUS ntStatus;
PAGED_CODE();
//
// It is possible to have following situations,
// File bit set but no $EFS. Crash inside this call last time.
// File bit not set, $EFS exist. Crash inside EFS_ENCRYPT_FILE.
//
//
// [FsData] = SessionKey, Handle, Handle, [SessionKey, Handle, Handle]sk
// Verify the FsData format.
//
if (!EfsVerifyGeneralFsData(
&(((PFSCTL_INPUT)InputData)->EfsFsData[0]),
InputDataLength)){
return STATUS_INVALID_PARAMETER;
}
//
// Try to read an existing $EFS
//
ntStatus = EfsReadEfsData(
FileHdl,
IrpContext,
NULL,
&efsLength,
&information
);
if ( EFS_READ_SUCCESSFUL == information ){
//
// Everything is OK.
//
return ( EfsDeleteEfsData( FileHdl, IrpContext ) );
} else if ( OPEN_EFS_FAIL == information ){
//
// Bit set, no $EFS. OK, NTFS will clear the bit.
//
return STATUS_SUCCESS;
}
return STATUS_INVALID_DEVICE_REQUEST;
}
NTSTATUS
EfsEncryptDir(
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN ULONG EncryptionFlag,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext
)
/*++
Routine Description:
This is an internal support routine. It process the call of
FSCTL_SET_ENCRYPT for encrypting a directory. It writes initial $EFS.
Arguments:
InputData -- Input data buffer of FSCTL.
InputDataLength -- The length of input data.
EncryptionFlag - Indicating if this stream is encrypted or not.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Context - BLOB(key) for READ or WRITE later.
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
ULONG efsLength;
ULONG information;
ULONG efsStreamOffset;
PVOID efsStreamData = NULL;
PVOID efsKeyBlob = NULL;
NTSTATUS ntStatus;
ATTRIBUTE_HANDLE attribute = NULL;
PAGED_CODE();
if ( EncryptionFlag & STREAM_ENCRYPTED ){
//
// Dir string already encrypted.
//
return STATUS_INVALID_DEVICE_REQUEST;
}
//
// [FsData] = SessionKey, Handle, Handle, [SessionKey, Handle, Handle]sk
// Verify the FsData format.
//
if (!EfsVerifyGeneralFsData(
&(((PFSCTL_INPUT)InputData)->EfsFsData[0]),
InputDataLength)){
return STATUS_INVALID_PARAMETER;
}
//
// Allocate memory for $EFS
// Create the $EFS, if there is one, overwrite it.
//
efsStreamOffset = FIELD_OFFSET( FSCTL_INPUT, EfsFsData[0] )
+ FIELD_OFFSET( GENERAL_FS_DATA, EfsData[0]);
efsLength = InputDataLength - efsStreamOffset;
try {
ntStatus = NtOfsCreateAttributeEx(
IrpContext,
FileHdl,
EfsData.EfsName,
$LOGGED_UTILITY_STREAM,
CREATE_NEW,
TRUE,
&attribute
);
if (NT_SUCCESS(ntStatus)){
LONGLONG attriOffset = 0;
LONGLONG attriLength = (LONGLONG) efsLength;
NtOfsSetLength(
IrpContext,
attribute,
attriLength
);
//
// Write the $EFS
//
NtOfsPutData(
IrpContext,
attribute,
attriOffset,
efsLength,
InputData + efsStreamOffset
);
NtOfsFlushAttribute (IrpContext, attribute, FALSE);
}
} finally {
if (attribute) {
NtOfsCloseAttribute(IrpContext, attribute);
}
}
return ntStatus;
}
NTSTATUS
EfsModifyEfsState(
IN ULONG FunctionCode,
IN PUCHAR InputData,
IN ULONG InputDataLength,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext
)
/*++
Routine Description:
This is an internal support routine. It modifies the state field of $EFS.
Arguments:
FunctionCode -- EFS private code for FSCTL
InputData -- Input data buffer of FSCTL.
FileHdl -- An object handle to access the attached $EFS.
IrpContext -- Used in NtOfsCreateAttributeEx().
Return Value:
Result of the operation.
The value will be used to return to NTFS.
--*/
{
NTSTATUS ntStatus;
ATTRIBUTE_HANDLE attribute = NULL;
PAGED_CODE();
//
// [FsData] = SessionKey, Handle, Handle, [SessionKey, Handle, Handle]sk
// Verify the FsData format.
//
if (!EfsVerifyGeneralFsData(
&(((PFSCTL_INPUT)InputData)->EfsFsData[0]),
InputDataLength)){
return STATUS_INVALID_PARAMETER;
}
try {
ntStatus = NtOfsCreateAttributeEx(
IrpContext,
FileHdl,
EfsData.EfsName,
$LOGGED_UTILITY_STREAM,
OPEN_EXISTING,
TRUE,
&attribute
);
if (NT_SUCCESS(ntStatus)){
ULONG efsStatus = EFS_STREAM_NORMAL;
if ( EFS_DECRYPT_BEGIN == FunctionCode ){
efsStatus = EFS_STREAM_TRANSITION;
}
//
// Modify the status
//
NtOfsPutData(
IrpContext,
attribute,
(LONGLONG) &((( EFS_STREAM * ) 0)->Status),
sizeof( efsStatus ),
&efsStatus
);
NtOfsFlushAttribute (IrpContext, attribute, FALSE);
}
} finally {
if (attribute) {
NtOfsCloseAttribute(IrpContext, attribute);
}
}
return ntStatus;
}
ULONG
GetEfsStreamOffset(
IN PUCHAR InputData
)
/*++
Routine Description:
This is an internal support routine. It calculates the offset of $EFS.
Arguments:
InputData -- Input data buffer of FSCTL.
The format is always PSC, EfsCode, CSC, FEK, FEK, $EFS
Return Value:
The offset of $EFS in InputData.
--*/
{
ULONG efsOffset;
efsOffset = FIELD_OFFSET( FSCTL_INPUT, EfsFsData[0]);
efsOffset += 2 * EFS_KEY_SIZE( ((PEFS_KEY)(InputData + efsOffset)) );
return efsOffset;
}
NTSTATUS
SetEfsData(
PUCHAR InputData,
IN ULONG InputDataLength,
IN ULONG SystemState,
IN OBJECT_HANDLE FileHdl,
IN PIRP_CONTEXT IrpContext,
IN OUT PVOID *PContext,
IN OUT PULONG PContextLength
)
/*++
Routine Description:
This is an internal support routine. It sets the $EFS to the file.
Arguments:
InputData -- Input data buffer of FSCTL.
InputDataLength -- Input data length.
FileHdl -- Used to access the $EFS.
IrpContext -- Used to access the $EFS.
PContext -- BLOB(key) for READ or WRITE later.
PContextLength - The length of the context.
Return Value:
STATUS_SUCCESS or NT error
--*/
{
ULONG bytesSame;
ULONG efsLength;
PVOID efsStreamData = NULL;
PVOID efsKeyBlob = NULL;
NTSTATUS ntStatus = STATUS_SUCCESS;
ATTRIBUTE_HANDLE attribute = NULL;
PEFS_KEY efsKey;
PNPAGED_LOOKASIDE_LIST tmpMemSrc;
PAGED_CODE();
if ( ((PFSCTL_INPUT)InputData)->CipherSubCode & SET_EFS_KEYBLOB ){
//
// Set the key blob is required
//
efsKey = (PEFS_KEY) &(((PFSCTL_INPUT)InputData)->EfsFsData[0]);
efsKeyBlob = GetKeyBlobBuffer(efsKey->Algorithm);
if ( NULL == efsKeyBlob ){
return STATUS_INSUFFICIENT_RESOURCES;
}
if (!SetKeyTable(
efsKeyBlob,
(PEFS_KEY) &(((PFSCTL_INPUT)InputData)->EfsFsData[0])
)){
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
return STATUS_ACCESS_DENIED;
}
if ( (((PFSCTL_INPUT)InputData)->EfsFsCode == EFS_SET_ATTRIBUTE ) &&
*PContext ){
bytesSame = (ULONG)RtlCompareMemory(
efsKeyBlob,
*PContext,
((PKEY_BLOB)efsKeyBlob)->KeyLength
);
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
efsKeyBlob = NULL;
if ( bytesSame != ((PKEY_BLOB)(*PContext))->KeyLength ) {
//
// The new key blob is not the same one as in the memory
//
return STATUS_INVALID_PARAMETER;
}
}
//
// Defer the setting of key blob until the $EFS is written
// successfully.
//
}
if ( ((PFSCTL_INPUT)InputData)->CipherSubCode & WRITE_EFS_ATTRIBUTE ){
//
// Write $EFS is required. Either create or overwrite the EFS
//
ULONG efsOffset;
if (SystemState & SYSTEM_IS_READONLY) {
if ( efsKeyBlob ){
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
}
return STATUS_MEDIA_WRITE_PROTECTED;
}
if ( (((PFSCTL_INPUT)InputData)->EfsFsCode == EFS_SET_ATTRIBUTE ) ||
(((PFSCTL_INPUT)InputData)->CipherSubCode & SET_EFS_KEYBLOB) ){
efsOffset = GetEfsStreamOffset( InputData );
} else {
efsOffset = COMMON_FSCTL_HEADER_SIZE;
}
efsLength = InputDataLength - efsOffset;
try {
ntStatus = NtOfsCreateAttributeEx(
IrpContext,
FileHdl,
EfsData.EfsName,
$LOGGED_UTILITY_STREAM,
CREATE_OR_OPEN,
TRUE,
&attribute
);
if (NT_SUCCESS(ntStatus)){
LONGLONG attriOffset = 0;
LONGLONG attriLength = (LONGLONG) efsLength;
NtOfsSetLength(
IrpContext,
attribute,
attriLength
);
NtOfsPutData(
IrpContext,
attribute,
attriOffset,
efsLength,
InputData + efsOffset
);
NtOfsFlushAttribute (IrpContext, attribute, FALSE);
} else {
//
// Create or Open $EFS fail
//
if ( efsKeyBlob ){
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
efsKeyBlob = NULL;
}
leave;
}
} finally {
if (AbnormalTermination()) {
if ( efsKeyBlob ){
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
efsKeyBlob = NULL;
}
}
if (attribute) {
NtOfsCloseAttribute(IrpContext, attribute);
}
}
}
if ( efsKeyBlob && (((PFSCTL_INPUT)InputData)->CipherSubCode & SET_EFS_KEYBLOB) ){
if ( (((PFSCTL_INPUT)InputData)->EfsFsCode == EFS_SET_ATTRIBUTE ) &&
( *PContext == NULL ) ){
//
// Set the key blob
//
*PContext = efsKeyBlob;
*PContextLength = ((PKEY_BLOB) efsKeyBlob)->KeyLength;
} else if ( ((PFSCTL_INPUT)InputData)->EfsFsCode == EFS_OVERWRITE_ATTRIBUTE ) {
//
// Overwrite the key blob for legal import user
//
if ( *PContext == NULL){
//
// The file was not encrypted
//
*PContext = efsKeyBlob;
*PContextLength = ((PKEY_BLOB) efsKeyBlob)->KeyLength;
} else {
if ( ((PKEY_BLOB) efsKeyBlob)->KeyLength <= *PContextLength ){
tmpMemSrc = ((PKEY_BLOB)(*PContext))->MemSource;
RtlCopyMemory( *PContext, efsKeyBlob, ((PKEY_BLOB) efsKeyBlob)->KeyLength );
((PKEY_BLOB)(*PContext))->MemSource = tmpMemSrc;
//
// Keep the original buffer length
//
if (((PKEY_BLOB) efsKeyBlob)->KeyLength < *PContextLength) {
((PKEY_BLOB)(*PContext))->KeyLength = *PContextLength;
RtlZeroMemory((UCHAR *)(*PContext) + ((PKEY_BLOB) efsKeyBlob)->KeyLength,
*PContextLength - ((PKEY_BLOB) efsKeyBlob)->KeyLength);
}
} else{
//
// We could not swap the key blob because the old blob might be in use. Deleting
// the old blob could bug check the system.
// This could be avoid if MaximumBlob is defined nonzero in the registry.
//
ntStatus = STATUS_EFS_ALG_BLOB_TOO_BIG;
}
ExFreeToNPagedLookasideList(((PKEY_BLOB)efsKeyBlob)->MemSource, efsKeyBlob);
}
}
}
return ntStatus;
}
BOOLEAN
EfsFindInCache(
IN GUID *EfsId,
IN PTOKEN_USER UserId
)
/*++
Routine Description:
This routine will try to find the information in open cache.
Arguments:
EfsId - $EFS ID.
UserId - User ID
Return Value:
TRUE, if match found in the cache and the time is not expired. ( 5 second )
--*/
{
PLIST_ENTRY pListHead, pLink;
POPEN_CACHE pOpenCache;
LARGE_INTEGER crntTime;
PSID UserSid;
PAGED_CODE();
UserSid = UserId->User.Sid;
KeQuerySystemTime( &crntTime );
ExAcquireFastMutex( &(EfsData.EfsOpenCacheMutex) );
if ( EfsData.EfsOpenCacheList.Flink == &(EfsData.EfsOpenCacheList) ) {
//
// list empty
//
ExReleaseFastMutex( &(EfsData.EfsOpenCacheMutex) );
return FALSE;
}
for (pLink = EfsData.EfsOpenCacheList.Flink; pLink != &(EfsData.EfsOpenCacheList); pLink = pLink->Flink) {
pOpenCache = CONTAINING_RECORD(pLink, OPEN_CACHE, CacheChain);
ASSERT( pLink );
ASSERT( pLink->Flink );
if ( !memcmp( &(pOpenCache->EfsId), EfsId, sizeof(GUID)) &&
(crntTime.QuadPart - pOpenCache->TimeStamp.QuadPart <= EfsData.EfsDriverCacheLength ) &&
RtlEqualSid ( UserSid, pOpenCache->UserId->User.Sid)
) {
ExReleaseFastMutex( &(EfsData.EfsOpenCacheMutex) );
return TRUE;
}
}
ExReleaseFastMutex( &(EfsData.EfsOpenCacheMutex) );
return FALSE;
}
NTSTATUS
EfsRefreshCache(
IN GUID *EfsId,
IN PTOKEN_USER UserId
)
/*++
Routine Description:
This routine will set the latest open information in open cache. It will
delete the the obsolete info. Cache is refreshed.
Arguments:
EfsId - $EFS ID.
UserId - User ID
Return Value:
STATUS_SUCCESS if succeed.
--*/
{
PLIST_ENTRY pListHead, pLink;
POPEN_CACHE pOpenCache, pTmpCache;
LARGE_INTEGER crntTime;
KeQuerySystemTime( &crntTime );
pOpenCache = (POPEN_CACHE)ExAllocateFromPagedLookasideList(&(EfsData.EfsOpenCachePool));
if ( NULL == pOpenCache){
return STATUS_INSUFFICIENT_RESOURCES;
}
//
// Init the node
//
RtlZeroMemory( pOpenCache, sizeof( OPEN_CACHE ) );
RtlCopyMemory( &(pOpenCache->EfsId), EfsId, sizeof( GUID ) );
pOpenCache->UserId = UserId;
pOpenCache->TimeStamp.QuadPart = crntTime.QuadPart;
ExAcquireFastMutex( &(EfsData.EfsOpenCacheMutex) );
if ( EfsData.EfsOpenCacheList.Flink == &(EfsData.EfsOpenCacheList) ) {
//
// list empty
//
InsertHeadList(&( EfsData.EfsOpenCacheList ), &( pOpenCache->CacheChain ));
} else {
//
// Search for expired one
//
pLink = EfsData.EfsOpenCacheList.Flink;
while ( pLink != &(EfsData.EfsOpenCacheList) ){
pTmpCache = CONTAINING_RECORD(pLink, OPEN_CACHE, CacheChain);
ASSERT( pLink );
ASSERT( pLink->Flink );
pLink = pLink->Flink;
if ( ( (crntTime.QuadPart - pTmpCache->TimeStamp.QuadPart) > EfsData.EfsDriverCacheLength ) ||
!memcmp( &(pTmpCache->EfsId), EfsId, sizeof(GUID))
){
//
// Expired node. Delete it.
//
RemoveEntryList(&( pTmpCache->CacheChain ));
ExFreePool( pTmpCache->UserId );
ExFreeToPagedLookasideList(&(EfsData.EfsOpenCachePool), pTmpCache );
}
}
InsertHeadList(&( EfsData.EfsOpenCacheList ), &( pOpenCache->CacheChain ));
}
ExReleaseFastMutex( &(EfsData.EfsOpenCacheMutex) );
return STATUS_SUCCESS;
}
BOOLEAN
SkipCheckStream(
IN PIO_STACK_LOCATION IrpSp,
IN PVOID efsStreamData
)
/*++
Routine Description:
This routine will check if the related default data stream has just been opened
or not.
Arguments:
EfsId - $EFS ID.
UserId - User ID
Return Value:
TRUE if succeed.
--*/
{
BOOLEAN bRet = TRUE;
PACCESS_TOKEN accessToken;
NTSTATUS status;
PTOKEN_USER UserId;
PAGED_CODE();
if ( IrpSp->Parameters.Create.SecurityContext->AccessState->SubjectSecurityContext.ClientToken ){
accessToken = IrpSp->Parameters.Create.SecurityContext->AccessState->SubjectSecurityContext.ClientToken;
} else {
accessToken = IrpSp->Parameters.Create.SecurityContext->AccessState->SubjectSecurityContext.PrimaryToken;
}
if (accessToken) {
//
// Get User ID
//
status = SeQueryInformationToken(
accessToken,
TokenUser,
&UserId
);
if ( NT_SUCCESS(status) ){
if ( EfsFindInCache(
&((( PEFS_DATA_STREAM_HEADER ) efsStreamData)->EfsId),
UserId
)) {
bRet = TRUE;
} else {
bRet = FALSE;
}
ExFreePool( UserId );
}
} else {
bRet = FALSE;
}
return bRet;
}