467 lines
8.8 KiB
C
467 lines
8.8 KiB
C
/*++
|
|
|
|
Copyright (c) 1998 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
seed.c
|
|
|
|
Abstract:
|
|
|
|
Storage and retrieval of cryptographic RNG seed material.
|
|
|
|
Author:
|
|
|
|
Scott Field (sfield) 24-Sep-98
|
|
|
|
--*/
|
|
|
|
#ifndef KMODE_RNG
|
|
|
|
#include <nt.h>
|
|
#include <ntrtl.h>
|
|
#include <nturtl.h>
|
|
#include <zwapi.h>
|
|
#include <windows.h>
|
|
|
|
#else
|
|
|
|
#include <ntifs.h>
|
|
#include <windef.h>
|
|
|
|
#endif // KMODE_RNG
|
|
|
|
#include "seed.h"
|
|
#include "umkm.h"
|
|
|
|
BOOL
|
|
AccessSeed(
|
|
IN ACCESS_MASK DesiredAccess,
|
|
IN OUT PHKEY phkResult
|
|
);
|
|
|
|
|
|
BOOL
|
|
AdjustSeedSecurity(
|
|
IN HKEY hKeySeed
|
|
);
|
|
|
|
#ifdef KMODE_RNG
|
|
|
|
#define SEED_KEY_LOCATION L"\\Registry\\Machine\\SOFTWARE\\Microsoft\\Cryptography\\RNG"
|
|
#define SEED_VALUE_NAME L"Seed"
|
|
|
|
#ifdef ALLOC_PRAGMA
|
|
#pragma alloc_text(PAGE, ReadSeed)
|
|
#pragma alloc_text(PAGE, WriteSeed)
|
|
#pragma alloc_text(PAGE, AccessSeed)
|
|
#endif // ALLOC_PRAGMA
|
|
|
|
#else
|
|
|
|
#define SEED_KEY_LOCATION "SOFTWARE\\Microsoft\\Cryptography\\RNG"
|
|
#define SEED_VALUE_NAME "Seed"
|
|
|
|
#endif // KMODE_RNG
|
|
|
|
|
|
//
|
|
// globally cached registry handle to seed material.
|
|
// TODO: later.
|
|
//
|
|
|
|
///HKEY g_hKeySeed = NULL;
|
|
|
|
|
|
|
|
BOOL
|
|
ReadSeed(
|
|
IN PBYTE pbSeed,
|
|
IN DWORD cbSeed
|
|
)
|
|
{
|
|
HKEY hKeySeed;
|
|
|
|
#ifndef KMODE_RNG
|
|
DWORD dwType;
|
|
LONG lRet;
|
|
#else
|
|
|
|
static const WCHAR wszValue[] = SEED_VALUE_NAME;
|
|
BYTE FastBuffer[ 256 ];
|
|
PKEY_VALUE_PARTIAL_INFORMATION pKeyInfo;
|
|
DWORD cbKeyInfo;
|
|
UNICODE_STRING ValueName;
|
|
NTSTATUS Status;
|
|
|
|
PAGED_CODE();
|
|
#endif // KMODE_RNG
|
|
|
|
|
|
//
|
|
// open handle to RNG registry key.
|
|
//
|
|
|
|
if(!AccessSeed( KEY_QUERY_VALUE, &hKeySeed ))
|
|
return FALSE;
|
|
|
|
#ifndef KMODE_RNG
|
|
|
|
lRet = RegQueryValueExA(
|
|
hKeySeed,
|
|
SEED_VALUE_NAME,
|
|
NULL,
|
|
&dwType,
|
|
pbSeed,
|
|
&cbSeed
|
|
);
|
|
|
|
REGCLOSEKEY( hKeySeed );
|
|
|
|
if( lRet != ERROR_SUCCESS )
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
|
|
#else
|
|
|
|
ValueName.Buffer = (LPWSTR)wszValue;
|
|
ValueName.Length = sizeof(wszValue) - sizeof(WCHAR);
|
|
ValueName.MaximumLength = sizeof(wszValue);
|
|
|
|
|
|
pKeyInfo = (PKEY_VALUE_PARTIAL_INFORMATION)FastBuffer;
|
|
cbKeyInfo = sizeof(FastBuffer);
|
|
|
|
Status = ZwQueryValueKey(
|
|
hKeySeed,
|
|
&ValueName,
|
|
KeyValuePartialInformation,
|
|
pKeyInfo,
|
|
cbKeyInfo,
|
|
&cbKeyInfo
|
|
);
|
|
|
|
REGCLOSEKEY( hKeySeed );
|
|
|
|
if(!NT_SUCCESS(Status))
|
|
return FALSE;
|
|
|
|
if( pKeyInfo->DataLength > cbSeed )
|
|
return FALSE;
|
|
|
|
RtlCopyMemory( pbSeed, pKeyInfo->Data, pKeyInfo->DataLength );
|
|
|
|
return TRUE;
|
|
|
|
#endif
|
|
}
|
|
|
|
BOOL
|
|
WriteSeed(
|
|
IN PBYTE pbSeed,
|
|
IN DWORD cbSeed
|
|
)
|
|
{
|
|
HKEY hKeySeed;
|
|
|
|
#ifndef KMODE_RNG
|
|
LONG lRet;
|
|
#else
|
|
static const WCHAR wszValue[] = SEED_VALUE_NAME;
|
|
UNICODE_STRING ValueName;
|
|
NTSTATUS Status;
|
|
|
|
PAGED_CODE();
|
|
#endif // KMODE_RNG
|
|
|
|
|
|
//
|
|
// open handle to RNG registry key.
|
|
//
|
|
|
|
if(!AccessSeed( KEY_SET_VALUE, &hKeySeed ))
|
|
return FALSE;
|
|
|
|
|
|
#ifndef KMODE_RNG
|
|
|
|
lRet = RegSetValueExA(
|
|
hKeySeed,
|
|
SEED_VALUE_NAME,
|
|
0,
|
|
REG_BINARY,
|
|
pbSeed,
|
|
cbSeed
|
|
);
|
|
|
|
REGCLOSEKEY( hKeySeed );
|
|
|
|
if( lRet != ERROR_SUCCESS )
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
|
|
#else
|
|
|
|
ValueName.Buffer = (LPWSTR)wszValue;
|
|
ValueName.Length = sizeof(wszValue) - sizeof(WCHAR);
|
|
ValueName.MaximumLength = sizeof(wszValue);
|
|
|
|
Status = ZwSetValueKey(
|
|
hKeySeed,
|
|
&ValueName,
|
|
0,
|
|
REG_BINARY,
|
|
pbSeed,
|
|
cbSeed
|
|
);
|
|
|
|
REGCLOSEKEY( hKeySeed );
|
|
|
|
if(!NT_SUCCESS(Status))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
BOOL
|
|
AccessSeed(
|
|
IN ACCESS_MASK DesiredAccess,
|
|
IN OUT PHKEY phkResult
|
|
)
|
|
{
|
|
|
|
#ifndef KMODE_RNG
|
|
|
|
DWORD dwDisposition;
|
|
LONG lRet;
|
|
|
|
lRet = RegCreateKeyExA(
|
|
HKEY_LOCAL_MACHINE,
|
|
SEED_KEY_LOCATION,
|
|
0,
|
|
NULL,
|
|
0,
|
|
DesiredAccess,
|
|
NULL, // sa
|
|
phkResult,
|
|
&dwDisposition
|
|
);
|
|
|
|
|
|
if( lRet != ERROR_SUCCESS )
|
|
return FALSE;
|
|
|
|
#if 0
|
|
if( dwDisposition == REG_CREATED_NEW_KEY ) {
|
|
|
|
//
|
|
// if we just created the seed, make sure it's Acl'd appropriately.
|
|
//
|
|
|
|
AdjustSeedSecurity( *phkResult );
|
|
}
|
|
#endif
|
|
|
|
return TRUE;
|
|
#else
|
|
|
|
NTSTATUS Status;
|
|
|
|
/// TODO at a later date: cache the registry key
|
|
/// *phkResult = g_hKeySeed;
|
|
/// if( *phkResult == NULL ) {
|
|
|
|
UNICODE_STRING RegistryKeyName;
|
|
static const WCHAR KeyLocation[] = SEED_KEY_LOCATION;
|
|
ULONG Disposition;
|
|
OBJECT_ATTRIBUTES ObjAttr;
|
|
|
|
/// HKEY hKeyPrevious;
|
|
|
|
PAGED_CODE();
|
|
|
|
RegistryKeyName.Buffer = (LPWSTR)KeyLocation;
|
|
RegistryKeyName.Length = sizeof(KeyLocation) - sizeof(WCHAR);
|
|
RegistryKeyName.MaximumLength = sizeof(KeyLocation);
|
|
|
|
InitializeObjectAttributes(
|
|
&ObjAttr,
|
|
&RegistryKeyName,
|
|
OBJ_CASE_INSENSITIVE | OBJ_KERNEL_HANDLE,
|
|
0,
|
|
NULL
|
|
);
|
|
|
|
Status = ZwCreateKey(
|
|
phkResult,
|
|
DesiredAccess,
|
|
&ObjAttr,
|
|
0,
|
|
NULL,
|
|
0,
|
|
&Disposition
|
|
);
|
|
|
|
|
|
if(!NT_SUCCESS(Status))
|
|
return FALSE;
|
|
|
|
/// hKeyPrevious = INTERLOCKEDCOMPAREEXCHANGEPOINTER( &g_hKeySeed, *phkResult, NULL );
|
|
/// if( hKeyPrevious ) {
|
|
/// REGCLOSEKEY( *phkResult );
|
|
/// *phkResult = hKeyPrevious;
|
|
/// }
|
|
/// }
|
|
|
|
return TRUE;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
#ifndef KMODE_RNG
|
|
|
|
//
|
|
// NOTE: this function should be removed if we can get the key into
|
|
// the setup hives with Acl applied appropriately.
|
|
//
|
|
|
|
#if 0
|
|
|
|
BOOL
|
|
AdjustSeedSecurity(
|
|
IN HKEY hKeySeed
|
|
)
|
|
{
|
|
HKEY hKeySecurityAdjust = NULL;
|
|
|
|
SID_IDENTIFIER_AUTHORITY siaWorldAuthority = SECURITY_WORLD_SID_AUTHORITY;
|
|
SID_IDENTIFIER_AUTHORITY siaNtAuthority = SECURITY_NT_AUTHORITY;
|
|
SECURITY_DESCRIPTOR sd;
|
|
BYTE FastBuffer[ 256 ];
|
|
PACL pDacl;
|
|
DWORD cbDacl;
|
|
PSID psidAdministrators = NULL;
|
|
PSID psidEveryone = NULL;
|
|
|
|
LONG lRet;
|
|
BOOL fSuccess = FALSE;
|
|
|
|
//
|
|
// re-open key with WRITE_DAC access and update security.
|
|
// note: Wide version will fail on Win9x, which is fine, since
|
|
// no security there...
|
|
//
|
|
|
|
lRet = RegOpenKeyExW(
|
|
hKeySeed,
|
|
NULL,
|
|
0,
|
|
WRITE_DAC,
|
|
&hKeySecurityAdjust
|
|
);
|
|
|
|
|
|
if( lRet != ERROR_SUCCESS )
|
|
goto cleanup;
|
|
|
|
if(!InitializeSecurityDescriptor( &sd, SECURITY_DESCRIPTOR_REVISION ))
|
|
goto cleanup;
|
|
|
|
if(!AllocateAndInitializeSid(
|
|
&siaWorldAuthority,
|
|
1,
|
|
SECURITY_WORLD_RID,
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
&psidEveryone
|
|
)) {
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
if(!AllocateAndInitializeSid(
|
|
&siaNtAuthority,
|
|
2,
|
|
SECURITY_BUILTIN_DOMAIN_RID,
|
|
DOMAIN_ALIAS_RID_ADMINS,
|
|
0, 0, 0, 0, 0, 0,
|
|
&psidAdministrators
|
|
)) {
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
cbDacl = sizeof(ACL) +
|
|
2 * ( sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) ) +
|
|
GetLengthSid(psidEveryone) +
|
|
GetLengthSid(psidAdministrators) ;
|
|
|
|
|
|
if( cbDacl > sizeof( FastBuffer ) )
|
|
goto cleanup;
|
|
|
|
pDacl = (PACL)FastBuffer;
|
|
|
|
|
|
if(!InitializeAcl( pDacl, cbDacl, ACL_REVISION ))
|
|
goto cleanup;
|
|
|
|
|
|
if(!AddAccessAllowedAce(
|
|
pDacl,
|
|
ACL_REVISION,
|
|
KEY_QUERY_VALUE,
|
|
psidEveryone
|
|
)) {
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
if(!AddAccessAllowedAce(
|
|
pDacl,
|
|
ACL_REVISION,
|
|
KEY_ALL_ACCESS,
|
|
psidAdministrators
|
|
)) {
|
|
goto cleanup;
|
|
}
|
|
|
|
if(!SetSecurityDescriptorDacl( &sd, TRUE, pDacl, FALSE ))
|
|
goto cleanup;
|
|
|
|
|
|
lRet = RegSetKeySecurity(
|
|
hKeySecurityAdjust,
|
|
DACL_SECURITY_INFORMATION,
|
|
&sd
|
|
);
|
|
|
|
if( lRet != ERROR_SUCCESS)
|
|
goto cleanup;
|
|
|
|
|
|
fSuccess = TRUE;
|
|
|
|
cleanup:
|
|
|
|
if( hKeySecurityAdjust )
|
|
REGCLOSEKEY( hKeySecurityAdjust );
|
|
|
|
if( psidAdministrators )
|
|
FreeSid( psidAdministrators );
|
|
|
|
if( psidEveryone )
|
|
FreeSid( psidEveryone );
|
|
|
|
return fSuccess;
|
|
}
|
|
#endif
|
|
|
|
#endif // !KMODE_RNG
|