Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

338 lines
11 KiB

#include "windows.h"
#include "wincrypt.h"
#include "mscat.h"
#include <stdio.h>
#include <stdlib.h>
#include <vector>
VOID
DumpBytes(PBYTE pbBuffer, DWORD dwLength)
{
for (DWORD dw = 0; dw < dwLength; dw++)
{
if ((dw % 4 == 0) && (dw != 0))
::wprintf(L" ");
if ((dw % 32 == 0) && (dw != 0))
::wprintf(L"\n");
::wprintf(L"%02x", pbBuffer[dw]);
}
}
#pragma pack(1)
typedef struct _PublicKeyBlob
{
unsigned int SigAlgID;
unsigned int HashAlgID;
ULONG cbPublicKey;
BYTE PublicKey[1];
} PublicKeyBlob, *PPublicKeyBlob;
VOID
GenerateFusionStrongNameAndKeyFromCertificate(PCCERT_CONTEXT pContext)
{
HCRYPTPROV hProvider = NULL;
HCRYPTKEY hKey = NULL;
std::vector<BYTE> pbBlobData;
DWORD cbBlobData = 8192;
pbBlobData.resize(cbBlobData);
DWORD cbFusionKeyBlob = 0;
DWORD dwTemp = 0;
PPublicKeyBlob pFusionKeyStruct = NULL;
if (!::CryptAcquireContextW(
&hProvider,
NULL,
NULL,
PROV_RSA_FULL,
CRYPT_VERIFYCONTEXT))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Failed opening the crypt context: 0x%08x", ::GetLastError());
return;
}
//
// Load the public key info into a key to start with
//
if (!::CryptImportPublicKeyInfo(
hProvider,
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
&pContext->pCertInfo->SubjectPublicKeyInfo,
&hKey))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Failed importing public key info from the cert-context, 0x%08x", ::GetLastError());
return;
}
//
// Export the key info to a public-key blob
//
if (!::CryptExportKey(
hKey,
NULL,
PUBLICKEYBLOB,
0,
&pbBlobData[0],
&cbBlobData))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Failed exporting public key info back from an hcryptkey: 0x%08x\n", ::GetLastError());
return;
}
//
// Allocate the Fusion public key blob
//
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - use of -1 here obscure; use offsetof instead
cbFusionKeyBlob = sizeof(PublicKeyBlob) + cbBlobData - 1;
pFusionKeyStruct = (PPublicKeyBlob)HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, cbFusionKeyBlob);
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - missing allocation failure check
//
// Key parameter for the signing algorithm
//
dwTemp = sizeof(pFusionKeyStruct->SigAlgID);
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - missing return status check; missing
// verification of dwTemp
::CryptGetKeyParam(hKey, KP_ALGID, (PBYTE)&pFusionKeyStruct->SigAlgID, &dwTemp, 0);
//
// Move over the public key bits from CryptExportKey
//
pFusionKeyStruct->cbPublicKey = cbBlobData;
pFusionKeyStruct->HashAlgID = CALG_SHA1;
::memcpy(pFusionKeyStruct->PublicKey, &pbBlobData[0], cbBlobData);
::wprintf(L"\n Public key structure:\n");
::DumpBytes((PBYTE)pFusionKeyStruct, cbFusionKeyBlob);
//
// Now let's go hash it.
//
{
HCRYPTHASH hKeyHash = NULL;
DWORD cbHashedKeyInfo = 8192;
std::vector<BYTE> bHashedKeyInfo;
bHashedKeyInfo.resize(cbHashedKeyInfo);
if (!::CryptCreateHash(hProvider, pFusionKeyStruct->HashAlgID, NULL, 0, &hKeyHash))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Failed creating a hash for this key: 0x%08x\n", ::GetLastError());
return;
}
if (!::CryptHashData(hKeyHash, (PBYTE)pFusionKeyStruct, cbFusionKeyBlob, 0))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Failed hashing data: 0x%08x\n", ::GetLastError());
return;
}
if (!::CryptGetHashParam(hKeyHash, HP_HASHVAL, &bHashedKeyInfo[0], &cbHashedKeyInfo, 0))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Can't get hashed key info 0x%08x\n", ::GetLastError());
return;
}
::CryptDestroyHash(hKeyHash);
hKeyHash = NULL;
::wprintf(L"\n Hash of public key bits: ");
::DumpBytes(&bHashedKeyInfo[0], cbHashedKeyInfo);
::wprintf(L"\n Fusion-compatible strong name: ");
::DumpBytes(&bHashedKeyInfo[0] + (cbHashedKeyInfo - 8), 8);
}
}
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - this function should be static
VOID
PrintKeyContextInfo(PCCERT_CONTEXT pContext)
{
DWORD cbHash = 0;
std::vector<BYTE> bHash;
const SIZE_T sizeof_bHash = 8192;
bHash.resize(sizeof_bHash);
DWORD cchBuffer = 8192;
std::vector<WCHAR> wszBuffer;
wszBuffer.resize(cchBuffer);
::wprintf(L"\n\n");
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - missing error check
::CertGetNameStringW(pContext, CERT_NAME_FRIENDLY_DISPLAY_TYPE,
0, NULL, &wszBuffer[0], cchBuffer);
::wprintf(L"Certificate owner: %ls\n", &wszBuffer[0]);
//
// Spit out the key bits
//
::wprintf(L"Found key info:\n");
::DumpBytes(
pContext->pCertInfo->SubjectPublicKeyInfo.PublicKey.pbData,
pContext->pCertInfo->SubjectPublicKeyInfo.PublicKey.cbData);
//
// And now the "strong name" (ie: sha1 hash) of the public key bits
//
if (::CryptHashPublicKeyInfo(
NULL,
CALG_SHA1,
0,
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
&pContext->pCertInfo->SubjectPublicKeyInfo,
&bHash[0],
&(cbHash = sizeof_bHash)))
{
::wprintf(L"\nPublic key hash: ");
::DumpBytes(&bHash[0], cbHash);
::wprintf(L"\nStrong name is: ");
::DumpBytes(&bHash[0], cbHash < 8 ? cbHash : 8);
}
else
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Unable to hash public key info: 0x%08x\n", ::GetLastError());
}
::GenerateFusionStrongNameAndKeyFromCertificate(pContext);
::wprintf(L"\n\n");
}
int __cdecl wmain(int argc, WCHAR* argv[])
{
HANDLE hCatalog = NULL;
HANDLE hMapping = NULL;
PBYTE pByte = NULL;
SIZE_T cBytes = 0;
PCCTL_CONTEXT pContext = NULL;
hCatalog = ::CreateFileW(argv[1], GENERIC_READ,
FILE_SHARE_READ, NULL,
OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
if (hCatalog == INVALID_HANDLE_VALUE)
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Ensure that %ls exists.\n", argv[1]);
return 0;
}
hMapping = ::CreateFileMappingW(hCatalog, NULL, PAGE_READONLY, 0, 0, NULL);
if (!hMapping || (hMapping == INVALID_HANDLE_VALUE))
{
::CloseHandle(hCatalog);
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error. Don't forget that calling CloseHandle
// may have overwritten the last error
::wprintf(L"Unable to map file into address space.\n");
return 1;
}
pByte = (PBYTE) ::MapViewOfFile(hMapping, FILE_MAP_READ, 0, 0, 0);
::CloseHandle(hMapping);
hMapping = INVALID_HANDLE_VALUE;
if (pByte == NULL)
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - MapViewOfFile failure cause not reported;
// don't forget that above call to CloseHandle may have lost the last error
::wprintf(L"Unable to open view of file.\n");
::CloseHandle(hCatalog);
return 2;
}
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - GetFileSize error cause not reported
if (((cBytes = ::GetFileSize(hCatalog, NULL)) == -1) || (cBytes < 1))
{
::wprintf(L"Bad file size %d\n", cBytes);
return 3;
}
if (pByte[0] != 0x30)
{
::wprintf(L"File is not a catalog.\n");
return 4;
}
pContext = (PCCTL_CONTEXT) ::CertCreateCTLContext(
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
pByte,
(DWORD)cBytes);
if (pContext != NULL)
{
BYTE bIdent[8192];
DWORD cbIdent = 0;
PCERT_ID cIdent = NULL;
if (!::CryptMsgGetParam(
pContext->hCryptMsg,
CMSG_SIGNER_CERT_ID_PARAM,
0,
bIdent,
&(cbIdent = sizeof(bIdent))))
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Unable to get top-level signer's certificate ID: 0x%08x\n", ::GetLastError());
return 6;
}
cIdent = (PCERT_ID)bIdent;
HCERTSTORE hStore = NULL;
//
// Maybe it's there in the message?
//
{
PCCERT_CONTEXT pThisContext = NULL;
hStore = ::CertOpenStore(
CERT_STORE_PROV_MSG,
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
NULL,
0,
pContext->hCryptMsg);
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - What does hStore == NULL indicate?
// There seems to be a lack of error path handling here.
if ((hStore != NULL) && (hStore != INVALID_HANDLE_VALUE))
{
while (pThisContext = ::CertEnumCertificatesInStore(hStore, pThisContext))
{
::PrintKeyContextInfo(pThisContext);
}
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - CertEnumCertificatesInStore could
// fail for reasons other than end-of-list.
}
}
}
else
{
// NTRAID#NTBUG9 - 590964 - 2002/03/30 - mgrier - Use common error reporting function that
// will format the win32 last error.
::wprintf(L"Failed creating certificate context: 0x%08x\n", ::GetLastError());
return 5;
}
}