[FREELDR] Merge boot-drive and partition functionalities together (#6760)
[reactos.git] / dll / win32 / advapi32 / misc / sysfunc.c
1 /*
2 * COPYRIGHT: See COPYING in the top level directory
3 * PROJECT: ReactOS system libraries
4 * FILE: dll/win32/advapi32/misc/sysfunc.c
5 * PURPOSE: advapi32.dll system functions (undocumented)
6 * PROGRAMMER: Emanuele Aliberti
7 * UPDATE HISTORY:
8 * 19990413 EA created
9 * 19990415 EA
10 * 20080424 Ported from WINE
11 */
12
13 #include <advapi32.h>
14 #include <ntsecapi.h>
15 #include <ksecioctl.h>
16 #include <md4.h>
17 #include <md5.h>
18 #include <rc4.h>
19
20 static const unsigned char CRYPT_LMhash_Magic[8] =
21 { 'K', 'G', 'S', '!', '@', '#', '$', '%' };
22 static const unsigned char DefaultSessionKey[16] =
23 {'D', 'e', 'f', 'S', 'e', 's', 's', 'i', 'o', 'n', 'K', 'e', 'y', '!', '@', '#'};
24
25 /******************************************************************************
26 * SystemFunction001 [ADVAPI32.@]
27 *
28 * Encrypts a single block of data using DES
29 *
30 * PARAMS
31 * data [I] data to encrypt (8 bytes)
32 * key [I] key data (7 bytes)
33 * output [O] the encrypted data (8 bytes)
34 *
35 * RETURNS
36 * Success: STATUS_SUCCESS
37 * Failure: STATUS_UNSUCCESSFUL
38 *
39 */
40 NTSTATUS
41 WINAPI SystemFunction001(const BYTE *data, const BYTE *key, LPBYTE output)
42 {
43 if (!data || !output)
44 return STATUS_UNSUCCESSFUL;
45 CRYPT_DEShash(output, key, data);
46 return STATUS_SUCCESS;
47 }
48
49
50 /******************************************************************************
51 * SystemFunction002 [ADVAPI32.@]
52 *
53 * Decrypts a single block of data using DES
54 *
55 * PARAMS
56 * data [I] data to decrypt (8 bytes)
57 * key [I] key data (7 bytes)
58 * output [O] the decrypted data (8 bytes)
59 *
60 * RETURNS
61 * Success: STATUS_SUCCESS
62 * Failure: STATUS_UNSUCCESSFUL
63 *
64 */
65 NTSTATUS
66 WINAPI SystemFunction002(const BYTE *data, const BYTE *key, LPBYTE output)
67 {
68 if (!data || !output)
69 return STATUS_UNSUCCESSFUL;
70 CRYPT_DESunhash(output, key, data);
71 return STATUS_SUCCESS;
72 }
73
74
75 /******************************************************************************
76 * SystemFunction003 [ADVAPI32.@]
77 *
78 * Hashes a key using DES and a fixed datablock
79 *
80 * PARAMS
81 * key [I] key data (7 bytes)
82 * output [O] hashed key (8 bytes)
83 *
84 * RETURNS
85 * Success: STATUS_SUCCESS
86 * Failure: STATUS_UNSUCCESSFUL
87 *
88 */
89 NTSTATUS
90 WINAPI SystemFunction003(const BYTE *key, LPBYTE output)
91 {
92 if (!output)
93 return STATUS_UNSUCCESSFUL;
94 CRYPT_DEShash(output, key, CRYPT_LMhash_Magic);
95 return STATUS_SUCCESS;
96 }
97
98
99 /******************************************************************************
100 * SystemFunction004 [ADVAPI32.@]
101 *
102 * Encrypts a block of data with DES in ECB mode, preserving the length
103 *
104 * PARAMS
105 * data [I] data to encrypt
106 * key [I] key data (up to 7 bytes)
107 * output [O] buffer to receive encrypted data
108 *
109 * RETURNS
110 * Success: STATUS_SUCCESS
111 * Failure: STATUS_BUFFER_TOO_SMALL if the output buffer is too small
112 * Failure: STATUS_INVALID_PARAMETER_2 if the key is zero length
113 *
114 * NOTES
115 * Encrypt buffer size should be input size rounded up to 8 bytes
116 * plus an extra 8 bytes.
117 */
118 NTSTATUS
119 WINAPI SystemFunction004(const struct ustring *in,
120 const struct ustring *key,
121 struct ustring *out)
122 {
123 union {
124 unsigned char uc[8];
125 unsigned int ui[2];
126 } data;
127 unsigned char deskey[7];
128 unsigned int crypt_len, ofs;
129
130 if (key->Length<=0)
131 return STATUS_INVALID_PARAMETER_2;
132
133 crypt_len = ((in->Length+7)&~7);
134 if (out->MaximumLength < (crypt_len+8))
135 {
136 out->Length = crypt_len + 8;
137 return STATUS_BUFFER_TOO_SMALL;
138 }
139
140 data.ui[0] = in->Length;
141 data.ui[1] = 1;
142
143 if (key->Length<sizeof deskey)
144 {
145 memset(deskey, 0, sizeof deskey);
146 memcpy(deskey, key->Buffer, key->Length);
147 }
148 else
149 memcpy(deskey, key->Buffer, sizeof deskey);
150
151 CRYPT_DEShash(out->Buffer, deskey, data.uc);
152
153 for(ofs=0; ofs<(crypt_len-8); ofs+=8)
154 CRYPT_DEShash(out->Buffer+8+ofs, deskey, in->Buffer+ofs);
155
156 memset(data.uc, 0, sizeof data.uc);
157 memcpy(data.uc, in->Buffer+ofs, in->Length +8-crypt_len);
158 CRYPT_DEShash(out->Buffer+8+ofs, deskey, data.uc);
159
160 out->Length = crypt_len+8;
161
162 return STATUS_SUCCESS;
163 }
164
165 /******************************************************************************
166 * SystemFunction005 [ADVAPI32.@]
167 *
168 * Decrypts a block of data with DES in ECB mode
169 *
170 * PARAMS
171 * data [I] data to decrypt
172 * key [I] key data (up to 7 bytes)
173 * output [O] buffer to receive decrypted data
174 *
175 * RETURNS
176 * Success: STATUS_SUCCESS
177 * Failure: STATUS_BUFFER_TOO_SMALL if the output buffer is too small
178 * Failure: STATUS_INVALID_PARAMETER_2 if the key is zero length
179 *
180 */
181 NTSTATUS
182 WINAPI SystemFunction005(const struct ustring *in,
183 const struct ustring *key,
184 struct ustring *out)
185 {
186 union {
187 unsigned char uc[8];
188 unsigned int ui[2];
189 } data;
190 unsigned char deskey[7];
191 unsigned int ofs, crypt_len;
192
193 if (key->Length<=0)
194 return STATUS_INVALID_PARAMETER_2;
195
196 if (key->Length<sizeof deskey)
197 {
198 memset(deskey, 0, sizeof deskey);
199 memcpy(deskey, key->Buffer, key->Length);
200 }
201 else
202 memcpy(deskey, key->Buffer, sizeof deskey);
203
204 CRYPT_DESunhash(data.uc, deskey, in->Buffer);
205
206 if (data.ui[1] != 1)
207 return STATUS_UNKNOWN_REVISION;
208
209 crypt_len = data.ui[0];
210 if (crypt_len > out->MaximumLength)
211 {
212 out->Length = crypt_len;
213 return STATUS_BUFFER_TOO_SMALL;
214 }
215
216 for (ofs=0; (ofs+8)<crypt_len; ofs+=8)
217 CRYPT_DESunhash(out->Buffer+ofs, deskey, in->Buffer+ofs+8);
218
219 if (ofs<crypt_len)
220 {
221 CRYPT_DESunhash(data.uc, deskey, in->Buffer+ofs+8);
222 memcpy(out->Buffer+ofs, data.uc, crypt_len-ofs);
223 }
224
225 out->Length = crypt_len;
226
227 return STATUS_SUCCESS;
228 }
229
230 /******************************************************************************
231 * SystemFunction007 [ADVAPI32.@]
232 *
233 * MD4 hash a unicode string
234 *
235 * PARAMS
236 * string [I] the string to hash
237 * output [O] the md4 hash of the string (16 bytes)
238 *
239 * RETURNS
240 * Success: STATUS_SUCCESS
241 * Failure: STATUS_UNSUCCESSFUL
242 *
243 */
244 NTSTATUS
245 WINAPI SystemFunction007(const UNICODE_STRING *string, LPBYTE hash)
246 {
247 MD4_CTX ctx;
248
249 MD4Init( &ctx );
250 MD4Update( &ctx, (const BYTE *)string->Buffer, string->Length );
251 MD4Final( &ctx );
252 memcpy( hash, ctx.digest, 0x10 );
253
254 return STATUS_SUCCESS;
255 }
256
257 /******************************************************************************
258 * SystemFunction008 [ADVAPI32.@]
259 *
260 * Creates a LM response from a challenge and a password hash
261 *
262 * PARAMS
263 * challenge [I] Challenge from authentication server
264 * hash [I] NTLM hash (from SystemFunction006)
265 * response [O] response to send back to the server
266 *
267 * RETURNS
268 * Success: STATUS_SUCCESS
269 * Failure: STATUS_UNSUCCESSFUL
270 *
271 * NOTES
272 * see http://davenport.sourceforge.net/ntlm.html#theLmResponse
273 *
274 */
275 NTSTATUS
276 WINAPI SystemFunction008(const BYTE *challenge, const BYTE *hash, LPBYTE response)
277 {
278 BYTE key[7*3];
279
280 if (!challenge || !response)
281 return STATUS_UNSUCCESSFUL;
282
283 memset(key, 0, sizeof key);
284 memcpy(key, hash, 0x10);
285
286 CRYPT_DEShash(response, key, challenge);
287 CRYPT_DEShash(response+8, key+7, challenge);
288 CRYPT_DEShash(response+16, key+14, challenge);
289
290 return STATUS_SUCCESS;
291 }
292
293 /******************************************************************************
294 * SystemFunction009 [ADVAPI32.@]
295 *
296 * Seems to do the same as SystemFunction008...
297 */
298 NTSTATUS
299 WINAPI SystemFunction009(const BYTE *challenge, const BYTE *hash, LPBYTE response)
300 {
301 return SystemFunction008(challenge, hash, response);
302 }
303
304 /******************************************************************************
305 * SystemFunction010 [ADVAPI32.@]
306 * SystemFunction011 [ADVAPI32.@]
307 *
308 * MD4 hashes 16 bytes of data
309 *
310 * PARAMS
311 * unknown [] seems to have no effect on the output
312 * data [I] pointer to data to hash (16 bytes)
313 * output [O] the md4 hash of the data (16 bytes)
314 *
315 * RETURNS
316 * Success: STATUS_SUCCESS
317 * Failure: STATUS_UNSUCCESSFUL
318 *
319 */
320 NTSTATUS
321 WINAPI SystemFunction010(LPVOID unknown, const BYTE *data, LPBYTE hash)
322 {
323 MD4_CTX ctx;
324
325 MD4Init( &ctx );
326 MD4Update( &ctx, data, 0x10 );
327 MD4Final( &ctx );
328 memcpy( hash, ctx.digest, 0x10 );
329
330 return STATUS_SUCCESS;
331 }
332
333 /******************************************************************************
334 * SystemFunction012 [ADVAPI32.@]
335 * SystemFunction014 [ADVAPI32.@]
336 * SystemFunction016 [ADVAPI32.@]
337 * SystemFunction018 [ADVAPI32.@]
338 * SystemFunction020 [ADVAPI32.@]
339 * SystemFunction022 [ADVAPI32.@]
340 *
341 * Encrypts two DES blocks with two keys
342 *
343 * PARAMS
344 * data [I] data to encrypt (16 bytes)
345 * key [I] key data (two lots of 7 bytes)
346 * output [O] buffer to receive encrypted data (16 bytes)
347 *
348 * RETURNS
349 * Success: STATUS_SUCCESS
350 * Failure: STATUS_UNSUCCESSFUL if the input or output buffer is NULL
351 */
352 NTSTATUS
353 WINAPI SystemFunction012(const BYTE *in, const BYTE *key, LPBYTE out)
354 {
355 if (!in || !out)
356 return STATUS_UNSUCCESSFUL;
357
358 CRYPT_DEShash(out, key, in);
359 CRYPT_DEShash(out+8, key+7, in+8);
360 return STATUS_SUCCESS;
361 }
362
363 /******************************************************************************
364 * SystemFunction013 [ADVAPI32.@]
365 * SystemFunction015 [ADVAPI32.@]
366 * SystemFunction017 [ADVAPI32.@]
367 * SystemFunction019 [ADVAPI32.@]
368 * SystemFunction021 [ADVAPI32.@]
369 * SystemFunction023 [ADVAPI32.@]
370 *
371 * Decrypts two DES blocks with two keys
372 *
373 * PARAMS
374 * data [I] data to decrypt (16 bytes)
375 * key [I] key data (two lots of 7 bytes)
376 * output [O] buffer to receive decrypted data (16 bytes)
377 *
378 * RETURNS
379 * Success: STATUS_SUCCESS
380 * Failure: STATUS_UNSUCCESSFUL if the input or output buffer is NULL
381 */
382 NTSTATUS
383 WINAPI SystemFunction013(const BYTE *in, const BYTE *key, LPBYTE out)
384 {
385 if (!in || !out)
386 return STATUS_UNSUCCESSFUL;
387 CRYPT_DESunhash(out, key, in);
388 CRYPT_DESunhash(out+8, key+7, in+8);
389 return STATUS_SUCCESS;
390 }
391
392 /******************************************************************************
393 * SystemFunction024 [ADVAPI32.@]
394 *
395 * Encrypts two DES blocks with a 32 bit key...
396 *
397 * PARAMS
398 * data [I] data to encrypt (16 bytes)
399 * key [I] key data (4 bytes)
400 * output [O] buffer to receive encrypted data (16 bytes)
401 *
402 * RETURNS
403 * Success: STATUS_SUCCESS
404 */
405 NTSTATUS
406 WINAPI SystemFunction024(const BYTE *in, const BYTE *key, LPBYTE out)
407 {
408 BYTE deskey[0x10];
409
410 memcpy(deskey, key, 4);
411 memcpy(deskey+4, key, 4);
412 memcpy(deskey+8, key, 4);
413 memcpy(deskey+12, key, 4);
414
415 CRYPT_DEShash(out, deskey, in);
416 CRYPT_DEShash(out+8, deskey+7, in+8);
417
418 return STATUS_SUCCESS;
419 }
420
421 /******************************************************************************
422 * SystemFunction025 [ADVAPI32.@]
423 *
424 * Decrypts two DES blocks with a 32 bit key...
425 *
426 * PARAMS
427 * data [I] data to encrypt (16 bytes)
428 * key [I] key data (4 bytes)
429 * output [O] buffer to receive encrypted data (16 bytes)
430 *
431 * RETURNS
432 * Success: STATUS_SUCCESS
433 */
434 NTSTATUS
435 WINAPI SystemFunction025(const BYTE *in, const BYTE *key, LPBYTE out)
436 {
437 BYTE deskey[0x10];
438
439 memcpy(deskey, key, 4);
440 memcpy(deskey+4, key, 4);
441 memcpy(deskey+8, key, 4);
442 memcpy(deskey+12, key, 4);
443
444 CRYPT_DESunhash(out, deskey, in);
445 CRYPT_DESunhash(out+8, deskey+7, in+8);
446
447 return STATUS_SUCCESS;
448 }
449
450 /**********************************************************************
451 * SystemFunction028 [ADVAPI32.@]
452 *
453 * Retrieves an encryption session key...
454 *
455 * PARAMS
456 * ContextHandle [I] RPC context handle
457 * SessionKey [O] buffer to receive the session key (16 bytes)
458 *
459 * RETURNS
460 * Success: STATUS_LOCAL_USER_SESSION_KEY
461 *
462 * @unimplemented
463 */
464 NTSTATUS
465 WINAPI
466 SystemFunction028(
467 _In_ PVOID ContextHandle,
468 _Out_ LPBYTE SessionKey)
469 {
470 /* HACK: Always return the default key */
471 memcpy(SessionKey, DefaultSessionKey, sizeof(DefaultSessionKey));
472 return STATUS_LOCAL_USER_SESSION_KEY;
473
474 #if 0
475 //NDRCContextBinding();
476 //SystemFunction034()
477 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
478 return 28;
479 #endif
480 }
481
482
483 /**********************************************************************
484 *
485 * @unimplemented
486 */
487 INT
488 WINAPI
489 SystemFunction029(INT a, INT b)
490 {
491 //I_RpcBindingIsClientLocal()
492 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
493 return 29;
494 }
495
496
497 /******************************************************************************
498 * SystemFunction030 (ADVAPI32.@)
499 *
500 * Tests if two blocks of 16 bytes are equal
501 *
502 * PARAMS
503 * b1,b2 [I] block of 16 bytes
504 *
505 * RETURNS
506 * TRUE if blocks are the same
507 * FALSE if blocks are different
508 */
509 BOOL
510 WINAPI SystemFunction030(LPCVOID b1, LPCVOID b2)
511 {
512 return !memcmp(b1, b2, 0x10);
513 }
514
515
516 /******************************************************************************
517 * SystemFunction032 [ADVAPI32.@]
518 *
519 * Encrypts a string data using ARC4
520 *
521 * PARAMS
522 * data [I/O] data to encrypt
523 * key [I] key data
524 *
525 * RETURNS
526 * Success: STATUS_SUCCESS
527 * Failure: STATUS_UNSUCCESSFUL
528 *
529 * NOTES
530 * see http://web.it.kth.se/~rom/ntsec.html#crypto-strongavail
531 */
532 NTSTATUS
533 WINAPI SystemFunction032(struct ustring *data, const struct ustring *key)
534 {
535 RC4_CONTEXT a4i;
536
537 rc4_init(&a4i, key->Buffer, key->Length);
538 rc4_crypt(&a4i, data->Buffer, data->Length);
539
540 return STATUS_SUCCESS;
541 }
542
543
544 /**********************************************************************
545 *
546 * @unimplemented
547 */
548 INT
549 WINAPI
550 SystemFunction033(INT a, INT b)
551 {
552 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
553 return 33;
554 }
555
556 /**********************************************************************
557 *
558 * @unimplemented
559 */
560 INT
561 WINAPI
562 SystemFunction034(INT a, INT b)
563 {
564 //RpcBindingToStringBindingW
565 //I_RpcMapWin32Status
566 //RpcStringBindingParseW
567 //RpcStringFreeW
568 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
569 return 34;
570 }
571
572
573 /******************************************************************************
574 * SystemFunction035 (ADVAPI32.@)
575 *
576 * Described here:
577 http://disc.server.com/discussion.cgi?disc=148775;article=942;title=Coding%2FASM%2FSystem
578 *
579 * NOTES
580 * Stub, always return TRUE.
581 */
582 BOOL WINAPI SystemFunction035(LPCSTR lpszDllFilePath)
583 {
584 //FIXME("%s: stub\n", debugstr_a(lpszDllFilePath));
585 return TRUE;
586 }
587
588 /******************************************************************************
589 * SystemFunction036 (ADVAPI32.@)
590 *
591 * MSDN documents this function as RtlGenRandom and declares it in ntsecapi.h
592 *
593 * PARAMS
594 * pbBuffer [O] Pointer to memory to receive random bytes.
595 * dwLen [I] Number of random bytes to fetch.
596 *
597 * RETURNS
598 * Always TRUE in my tests
599 */
600 BOOLEAN
601 WINAPI
602 SystemFunction036(PVOID pbBuffer, ULONG dwLen)
603 {
604 ////////////////////////////////////////////////////////////////
605 //////////////////// B I G W A R N I N G !!! ////////////////
606 // This function will output numbers based on the tick count. //
607 // It will NOT OUTPUT CRYPTOGRAPHIC-SAFE RANDOM NUMBERS !!! //
608 ////////////////////////////////////////////////////////////////
609
610 DWORD dwSeed;
611 PBYTE pBuffer;
612 ULONG uPseudoRandom;
613 LARGE_INTEGER time;
614 static ULONG uCounter = 17;
615
616 if(!pbBuffer || !dwLen)
617 {
618 /* This function always returns TRUE, even if invalid parameters were passed. (verified under WinXP SP2) */
619 return TRUE;
620 }
621
622 /* Get the first seed from the performance counter */
623 QueryPerformanceCounter(&time);
624 dwSeed = time.LowPart ^ time.HighPart ^ RtlUlongByteSwap(uCounter++);
625
626 /* We will access the buffer bytewise */
627 pBuffer = (PBYTE)pbBuffer;
628
629 do
630 {
631 /* Use the pseudo random number generator RtlRandom, which outputs a 4-byte value and a new seed */
632 uPseudoRandom = RtlRandom(&dwSeed);
633
634 do
635 {
636 /* Get each byte from the pseudo random number and store it in the buffer */
637 *pBuffer = (BYTE)(uPseudoRandom >> 8 * (dwLen % 3) & 0xFF);
638 ++pBuffer;
639 } while(--dwLen % 3);
640 } while(dwLen);
641
642 return TRUE;
643 }
644
645 HANDLE KsecDeviceHandle;
646
647 static
648 NTSTATUS
649 KsecOpenDevice()
650 {
651 UNICODE_STRING DeviceName = RTL_CONSTANT_STRING(L"\\Device\\KsecDD");
652 OBJECT_ATTRIBUTES ObjectAttributes;
653 IO_STATUS_BLOCK IoStatusBlock;
654 HANDLE DeviceHandle;
655 NTSTATUS Status;
656
657 InitializeObjectAttributes(&ObjectAttributes,
658 &DeviceName,
659 OBJ_CASE_INSENSITIVE,
660 NULL,
661 NULL);
662 Status = NtOpenFile(&DeviceHandle,
663 FILE_READ_DATA | SYNCHRONIZE,
664 &ObjectAttributes,
665 &IoStatusBlock,
666 FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
667 FILE_SYNCHRONOUS_IO_NONALERT);
668 if (!NT_SUCCESS(Status))
669 {
670 return Status;
671 }
672
673 if (InterlockedCompareExchangePointer(&KsecDeviceHandle, DeviceHandle, NULL) != NULL)
674 {
675 NtClose(DeviceHandle);
676 }
677
678 return STATUS_SUCCESS;
679 }
680
681 VOID
682 CloseKsecDdHandle(VOID)
683 {
684 /* Check if we already opened a handle to ksecdd */
685 if (KsecDeviceHandle != NULL)
686 {
687 /* Close it */
688 CloseHandle(KsecDeviceHandle);
689 KsecDeviceHandle = NULL;
690 }
691 }
692
693 static
694 NTSTATUS
695 KsecDeviceIoControl(
696 ULONG IoControlCode,
697 PVOID InputBuffer,
698 SIZE_T InputBufferLength,
699 PVOID OutputBuffer,
700 SIZE_T OutputBufferLength)
701 {
702 IO_STATUS_BLOCK IoStatusBlock;
703 NTSTATUS Status;
704
705 /* Check if we already have a handle */
706 if (KsecDeviceHandle == NULL)
707 {
708 /* Try to open the device */
709 Status = KsecOpenDevice();
710 if (!NT_SUCCESS(Status))
711 {
712 //ERR("Failed to open handle to KsecDd driver!\n");
713 return Status;
714 }
715 }
716
717 /* Call the driver */
718 Status = NtDeviceIoControlFile(KsecDeviceHandle,
719 NULL,
720 NULL,
721 NULL,
722 &IoStatusBlock,
723 IoControlCode,
724 InputBuffer,
725 InputBufferLength,
726 OutputBuffer,
727 OutputBufferLength);
728
729 return Status;
730 }
731
732 /*
733 These functions have nearly identical prototypes to CryptProtectMemory and CryptUnprotectMemory,
734 in crypt32.dll.
735 */
736
737 /******************************************************************************
738 * SystemFunction040 (ADVAPI32.@)
739 *
740 * MSDN documents this function as RtlEncryptMemory and declares it in ntsecapi.h.
741 *
742 * PARAMS
743 * memory [I/O] Pointer to memory to encrypt.
744 * length [I] Length of region to encrypt in bytes.
745 * flags [I] Control whether other processes are able to decrypt the memory.
746 * RTL_ENCRYPT_OPTION_SAME_PROCESS
747 * RTL_ENCRYPT_OPTION_CROSS_PROCESS
748 * RTL_ENCRYPT_OPTION_SAME_LOGON
749 *
750 * RETURNS
751 * Success: STATUS_SUCCESS
752 * Failure: NTSTATUS error code
753 *
754 * NOTES
755 * length must be a multiple of RTL_ENCRYPT_MEMORY_SIZE.
756 * If flags are specified when encrypting, the same flag value must be given
757 * when decrypting the memory.
758 */
759 NTSTATUS
760 WINAPI
761 SystemFunction040(
762 _Inout_ PVOID Memory,
763 _In_ ULONG MemoryLength,
764 _In_ ULONG OptionFlags)
765 {
766 ULONG IoControlCode;
767
768 if (OptionFlags == RTL_ENCRYPT_OPTION_SAME_PROCESS)
769 {
770 IoControlCode = IOCTL_KSEC_ENCRYPT_SAME_PROCESS;
771 }
772 else if (OptionFlags == RTL_ENCRYPT_OPTION_CROSS_PROCESS)
773 {
774 IoControlCode = IOCTL_KSEC_ENCRYPT_CROSS_PROCESS;
775 }
776 else if (OptionFlags == RTL_ENCRYPT_OPTION_SAME_LOGON)
777 {
778 IoControlCode = IOCTL_KSEC_ENCRYPT_SAME_LOGON;
779 }
780 else
781 {
782 return STATUS_INVALID_PARAMETER;
783 }
784
785 return KsecDeviceIoControl(IoControlCode, Memory, MemoryLength, Memory, MemoryLength);
786 }
787
788 /******************************************************************************
789 * SystemFunction041 (ADVAPI32.@)
790 *
791 * MSDN documents this function as RtlDecryptMemory and declares it in ntsecapi.h.
792 *
793 * PARAMS
794 * memory [I/O] Pointer to memory to decrypt.
795 * length [I] Length of region to decrypt in bytes.
796 * flags [I] Control whether other processes are able to decrypt the memory.
797 * RTL_ENCRYPT_OPTION_SAME_PROCESS
798 * RTL_ENCRYPT_OPTION_CROSS_PROCESS
799 * RTL_ENCRYPT_OPTION_SAME_LOGON
800 *
801 * RETURNS
802 * Success: STATUS_SUCCESS
803 * Failure: NTSTATUS error code
804 *
805 * NOTES
806 * length must be a multiple of RTL_ENCRYPT_MEMORY_SIZE.
807 * If flags are specified when encrypting, the same flag value must be given
808 * when decrypting the memory.
809 */
810 NTSTATUS
811 WINAPI
812 SystemFunction041(
813 _Inout_ PVOID Memory,
814 _In_ ULONG MemoryLength,
815 _In_ ULONG OptionFlags)
816 {
817 ULONG IoControlCode;
818
819 if (OptionFlags == RTL_ENCRYPT_OPTION_SAME_PROCESS)
820 {
821 IoControlCode = IOCTL_KSEC_DECRYPT_SAME_PROCESS;
822 }
823 else if (OptionFlags == RTL_ENCRYPT_OPTION_CROSS_PROCESS)
824 {
825 IoControlCode = IOCTL_KSEC_DECRYPT_CROSS_PROCESS;
826 }
827 else if (OptionFlags == RTL_ENCRYPT_OPTION_SAME_LOGON)
828 {
829 IoControlCode = IOCTL_KSEC_DECRYPT_SAME_LOGON;
830 }
831 else
832 {
833 return STATUS_INVALID_PARAMETER;
834 }
835
836 return KsecDeviceIoControl(IoControlCode, Memory, MemoryLength, Memory, MemoryLength);
837 }
838
839 /* EOF */