Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1323 lines
39 KiB

//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 1995.
//
// File: pct1msg.c
//
// Contents:
//
// Classes:
//
// Functions:
//
// History: 09-23-97 jbanes LSA integration stuff.
//
//----------------------------------------------------------------------------
#include <spbase.h>
#include <pct1msg.h>
#include <pct1prot.h>
static SP_STATUS
Pct1ComputeMac(
PSPContext pContext,
BOOL fWriteMAC,
PSPBuffer pData,
DWORD dwSequence,
PBYTE pbMac,
PDWORD pcbMac);
Pct1CipherMap Pct1CipherRank[] = {
{CALG_RC4, 128, PCT1_CIPHER_RC4 | PCT1_ENC_BITS_128 | PCT1_MAC_BITS_128},
{CALG_RC4, 64, PCT1_CIPHER_RC4 | PCT1_ENC_BITS_64 | PCT1_MAC_BITS_128},
{CALG_RC4, 40, PCT1_CIPHER_RC4 | PCT1_ENC_BITS_40 | PCT1_MAC_BITS_128},
};
DWORD Pct1NumCipher = sizeof(Pct1CipherRank)/sizeof(Pct1CipherMap);
/* available hashes, in order of preference */
Pct1HashMap Pct1HashRank[] = {
{CALG_MD5, PCT1_HASH_MD5},
{CALG_SHA, PCT1_HASH_SHA}
};
DWORD Pct1NumHash = sizeof(Pct1HashRank)/sizeof(Pct1HashMap);
CertTypeMap aPct1CertEncodingPref[] =
{
{ X509_ASN_ENCODING , PCT1_CERT_X509_CHAIN },
{ X509_ASN_ENCODING , PCT1_CERT_X509 }
};
DWORD cPct1CertEncodingPref = sizeof(aPct1CertEncodingPref)/sizeof(CertTypeMap);
KeyTypeMap aPct1LocalExchKeyPref[] = // CAPI Key type, SCHANNEL ALGID
{
{ CALG_RSA_KEYX, SP_EXCH_RSA_PKCS1 }
};
DWORD cPct1LocalExchKeyPref = sizeof(aPct1LocalExchKeyPref)/sizeof(KeyTypeMap);
KeyTypeMap aPct1LocalSigKeyPref[] = // CAPI Key type, SCHANNEL ALGID
{
{ CALG_RSA_KEYX, SP_SIG_RSA_MD5 },
{ CALG_RSA_KEYX, SP_SIG_RSA_SHA }
};
DWORD cPct1LocalSigKeyPref = sizeof(aPct1LocalSigKeyPref)/sizeof(KeyTypeMap);
SP_STATUS WINAPI
Pct1EncryptRaw( PSPContext pContext,
PSPBuffer pAppInput,
PSPBuffer pCommOutput,
DWORD dwFlags)
{
SP_STATUS pctRet;
DWORD cPadding;
SPBuffer Encrypted;
BOOL fEscape;
DWORD cbHeader;
DWORD cbBlockSize;
BYTE rgbMac[SP_MAX_DIGEST_LEN];
DWORD cbMac;
fEscape = (0 != (dwFlags & PCT1_ENCRYPT_ESCAPE));
cbBlockSize = pContext->pCipherInfo->dwBlockSize;
cPadding = pAppInput->cbData & (cbBlockSize - 1);
if(cPadding)
{
cPadding = cbBlockSize - cPadding;
}
if(fEscape || (cbBlockSize > 1))
{
cbHeader = sizeof(PCT1_MESSAGE_HEADER_EX);
}
else
{
cbHeader = sizeof(PCT1_MESSAGE_HEADER);
}
if(pCommOutput->cbBuffer < (cbHeader + cPadding + pAppInput->cbData))
{
return PCT_INT_BUFF_TOO_SMALL;
}
Encrypted.pvBuffer = (PUCHAR)pCommOutput->pvBuffer + cbHeader;
Encrypted.cbBuffer = pCommOutput->cbBuffer - cbHeader;
Encrypted.cbData = pAppInput->cbData;
// Copy input data to output buffer (we're encrypting in place).
if(pAppInput->pvBuffer != Encrypted.pvBuffer)
{
DebugLog((DEB_WARN, "Pct1EncryptRaw: Unnecessary Move, performance hog\n"));
MoveMemory(Encrypted.pvBuffer,
pAppInput->pvBuffer,
pAppInput->cbData);
}
/* Generate Padding */
pctRet = GenerateRandomBits((PUCHAR)Encrypted.pvBuffer + Encrypted.cbData, cPadding);
if(!NT_SUCCESS(pctRet))
{
return SP_LOG_RESULT(pctRet);
}
Encrypted.cbData += cPadding;
DebugLog((DEB_TRACE, "Sealing message %x\n", pContext->WriteCounter));
// Transfer the write key over from the application process.
if(pContext->hWriteKey == 0)
{
DebugLog((DEB_TRACE, "Transfer write key from user process.\n"));
pctRet = SPGetUserKeys(pContext, SCH_FLAG_WRITE_KEY);
if(pctRet != PCT_ERR_OK)
{
return SP_LOG_RESULT(pctRet);
}
}
// Compute the MAC.
cbMac = sizeof(rgbMac);
pctRet = Pct1ComputeMac(pContext,
TRUE,
&Encrypted,
pContext->WriteCounter,
rgbMac,
&cbMac);
if(pctRet != PCT_ERR_OK)
{
return SP_LOG_RESULT(pctRet);
}
pContext->WriteCounter ++ ;
// Encrypt data.
if(!CryptEncrypt(pContext->hWriteKey,
0, FALSE, 0,
Encrypted.pvBuffer,
&Encrypted.cbData,
Encrypted.cbBuffer))
{
SP_LOG_RESULT(GetLastError());
return PCT_INT_INTERNAL_ERROR;
}
// Add MAC to encrypted buffer.
if(Encrypted.cbData + cbMac > Encrypted.cbBuffer)
{
return PCT_INT_BUFF_TOO_SMALL;
}
CopyMemory((PUCHAR)Encrypted.pvBuffer + Encrypted.cbData,
rgbMac,
cbMac);
Encrypted.cbData += cbMac;
/* set sizes */
if(fEscape || (cbBlockSize > 1))
{
if(Encrypted.cbData > 0x3fff)
{
return PCT_INT_DATA_OVERFLOW;
}
((PUCHAR)pCommOutput->pvBuffer)[0]= (UCHAR)(0x3f & (Encrypted.cbData>>8));
if(fEscape)
{
((PUCHAR)pCommOutput->pvBuffer)[0] |= 0x40;
}
((PUCHAR)pCommOutput->pvBuffer)[1]= (UCHAR)(0xff & Encrypted.cbData);
((PUCHAR)pCommOutput->pvBuffer)[2]= (UCHAR)cPadding;
}
else
{
if(Encrypted.cbData > 0x7fff)
{
return PCT_INT_DATA_OVERFLOW;
}
((PUCHAR)pCommOutput->pvBuffer)[0]= (UCHAR)(0x7f & (Encrypted.cbData>>8)) | 0x80;
((PUCHAR)pCommOutput->pvBuffer)[1]= (UCHAR)(0xff & Encrypted.cbData);
}
pCommOutput->cbData = Encrypted.cbData + cbHeader;
#if DBG
{
DWORD di;
CHAR KeyDispBuf[SP_MAX_DIGEST_LEN*2+1];
for(di=0;di<cbMac;di++)
wsprintf(KeyDispBuf+(di*2), "%2.2x", rgbMac[di]);
DebugLog((DEB_TRACE, " Computed MAC\t%s\n", KeyDispBuf));
}
#endif
return PCT_ERR_OK;
}
SP_STATUS WINAPI
Pct1EncryptMessage( PSPContext pContext,
PSPBuffer pAppInput,
PSPBuffer pCommOutput)
{
return Pct1EncryptRaw(pContext, pAppInput, pCommOutput,0);
}
SP_STATUS WINAPI
Pct1GetHeaderSize(
PSPContext pContext,
PSPBuffer pCommInput,
DWORD * pcbHeaderSize)
{
UNREFERENCED_PARAMETER(pContext);
if(pcbHeaderSize == NULL)
{
return SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR);
}
if(pCommInput->cbData < 1)
{
return (PCT_INT_INCOMPLETE_MSG);
}
if( ((PUCHAR)pCommInput->pvBuffer)[0]&0x80 )
{
*pcbHeaderSize = 2;
}
else
{
*pcbHeaderSize = 3;
}
return PCT_ERR_OK;
}
SP_STATUS WINAPI
Pct1DecryptMessage(PSPContext pContext,
PSPBuffer pMessage,
PSPBuffer pAppOutput)
{
SP_STATUS pctRet;
DWORD cbHeader;
DWORD cbPadding;
DWORD cbPayload;
DWORD cbActualData;
SPBuffer Encrypted;
PUCHAR pbMAC;
BYTE rgbMac[SP_MAX_DIGEST_LEN];
DWORD cbMac;
cbActualData = pMessage->cbData;
// Do we have a complete header?
pMessage->cbData = 2;
if(cbActualData < 2)
{
return PCT_INT_INCOMPLETE_MSG;
}
if(((PUCHAR)pMessage->pvBuffer)[0] & 0x80)
{
cbHeader = 2;
cbPadding = 0;
cbPayload = MAKEWORD(((PUCHAR)pMessage->pvBuffer)[1],
((PUCHAR)pMessage->pvBuffer)[0] & 0x7f);
}
else
{
// Do we still have a complete header?
cbHeader = 3;
pMessage->cbData++;
if(cbActualData < cbHeader)
{
return PCT_INT_INCOMPLETE_MSG;
}
cbPadding = ((PUCHAR)pMessage->pvBuffer)[2];
cbPayload = MAKEWORD(((PUCHAR)pMessage->pvBuffer)[1],
((PUCHAR)pMessage->pvBuffer)[0] & 0x3f);
}
// Do we have the complete message?
pMessage->cbData += cbPayload;
if(cbActualData < cbHeader + cbPayload)
{
return PCT_INT_INCOMPLETE_MSG;
}
/* do we have enough data for our checksum */
if(cbPayload < pContext->pHashInfo->cbCheckSum)
{
return SP_LOG_RESULT(PCT_INT_MSG_ALTERED);
}
Encrypted.pvBuffer = (PUCHAR)pMessage->pvBuffer + cbHeader;
Encrypted.cbBuffer = cbPayload - pContext->pHashInfo->cbCheckSum;
Encrypted.cbData = Encrypted.cbBuffer;
pbMAC = (PUCHAR)Encrypted.pvBuffer + Encrypted.cbData;
/* check to see if we have a block size violation */
if(Encrypted.cbData % pContext->pCipherInfo->dwBlockSize)
{
return SP_LOG_RESULT(PCT_INT_MSG_ALTERED);
}
Encrypted.cbBuffer = Encrypted.cbData;
// Decrypt message.
if(Encrypted.cbData > pAppOutput->cbBuffer)
{
return SP_LOG_RESULT(PCT_INT_BUFF_TOO_SMALL);
}
if(Encrypted.pvBuffer != pAppOutput->pvBuffer)
{
DebugLog((DEB_WARN, "Pct1DecryptMessage: Unnecessary MoveMemory, performance hog\n"));
MoveMemory(pAppOutput->pvBuffer,
Encrypted.pvBuffer,
Encrypted.cbData);
}
pAppOutput->cbData = Encrypted.cbData;
// Transfer the read key over from the application process.
if(pContext->hReadKey == 0)
{
DebugLog((DEB_TRACE, "Transfer read key from user process.\n"));
pctRet = SPGetUserKeys(pContext, SCH_FLAG_READ_KEY);
if(pctRet != PCT_ERR_OK)
{
return SP_LOG_RESULT(pctRet);
}
}
if(!CryptDecrypt(pContext->hReadKey,
0, FALSE, 0,
pAppOutput->pvBuffer,
&pAppOutput->cbData))
{
SP_LOG_RESULT(GetLastError());
return PCT_INT_INTERNAL_ERROR;
}
// Compute MAC
cbMac = sizeof(rgbMac);
pctRet = Pct1ComputeMac(pContext,
FALSE,
pAppOutput,
pContext->ReadCounter,
rgbMac,
&cbMac);
if(pctRet != PCT_ERR_OK)
{
return SP_LOG_RESULT(pctRet);
}
pContext->ReadCounter++;
#if DBG
{
DWORD di;
CHAR KeyDispBuf[SP_MAX_DIGEST_LEN*2+1];
for(di=0;di<pContext->pHashInfo->cbCheckSum;di++)
wsprintf(KeyDispBuf+(di*2), "%2.2x", pbMAC[di]);
DebugLog((DEB_TRACE, " Incoming MAC\t%s\n", KeyDispBuf));
for(di=0;di<cbMac;di++)
wsprintf(KeyDispBuf+(di*2), "%2.2x", rgbMac[di]);
DebugLog((DEB_TRACE, " Computed MAC\t%s\n", KeyDispBuf));
}
#endif
// Validate MAC
if (memcmp( rgbMac, pbMAC, cbMac ) )
{
return SP_LOG_RESULT(PCT_INT_MSG_ALTERED);
}
// Strip off the block cipher padding.
if(cbPadding > pAppOutput->cbData)
{
return SP_LOG_RESULT(PCT_INT_ILLEGAL_MSG);
}
pAppOutput->cbData -= cbPadding;
return( PCT_ERR_OK );
}
#if 0
SP_STATUS
PctComputeKey(PSPContext pContext,
PBYTE pKey,
DWORD cbKey,
PUCHAR pConst,
DWORD dwCLen,
DWORD fFlags)
{
DWORD pctRet;
HashBuf HBHash;
PCheckSumBuffer pHash;
PSessCacheItem pZombie=NULL;
PSPCredentialGroup pCred=NULL;
BYTE i,j;
DWORD iMax;
BYTE Buffer[MAX_CHECKSUM];
pZombie = pContext->RipeZombie;
pCred = pZombie ->pCred;
SP_BEGIN("PctComputeKey");
pHash = (PCheckSumBuffer)HBHash;
iMax = (cbKey + pContext->pHashInfo->cbCheckSum - 1)/pContext->pHashInfo->cbCheckSum;
if(iMax > 4)
{
SP_RETURN(PCT_INT_INTERNAL_ERROR);
}
for(i=1; i <= iMax; i++)
{
InitHashBuf(HBHash, pContext);
pContext->pHashInfo->System->Sum( pHash, 1, &i );
if (!(fFlags & PCT_MAKE_MAC))
{
// constant^i
pContext->pHashInfo->System->Sum( pHash, dwCLen*i, pConst);
}
// MASTER KEY
pContext->pHashInfo->System->Sum( pHash, pContext->RipeZombie->cbMasterKey, pContext->RipeZombie->pMasterKey);
// constant^i
pContext->pHashInfo->System->Sum( pHash, dwCLen*i, pConst);
// ConnectionID
pContext->pHashInfo->System->Sum( pHash, pContext->cbConnectionID, pContext->pConnectionID);
// constant^i
pContext->pHashInfo->System->Sum( pHash, dwCLen*i, pConst);
if (fFlags & PCT_USE_CERT)
{
/* add in the certificate */
pContext->pHashInfo->System->Sum( pHash, pZombie->cbServerCertificate, pZombie->pbServerCertificate );
// constant^i
pContext->pHashInfo->System->Sum( pHash, dwCLen*i, pConst);
}
// ConnectionID
pContext->pHashInfo->System->Sum( pHash, pContext->cbChallenge, pContext->pChallenge);
// constant^i
pContext->pHashInfo->System->Sum( pHash, dwCLen*i, pConst);
if(pContext->pHashInfo->cbCheckSum*i <= cbKey)
{
pContext->pHashInfo->System->Finalize( pHash, pKey + pContext->pHashInfo->cbCheckSum*(i-1) );
}
else
{
pContext->pHashInfo->System->Finalize( pHash, Buffer );
CopyMemory(pKey + pContext->pHashInfo->cbCheckSum*(i-1),
Buffer,
cbKey - pContext->pHashInfo->cbCheckSum*(i-1));
}
}
SP_RETURN(PCT_ERR_OK);
}
#endif
#if 0
SP_STATUS
PctComputeExportKey(PSPContext pContext,
PBYTE pKey,
DWORD cbWriteKey,
DWORD cbCipherKey)
{
DWORD pctRet;
HashBuf HBHash;
PCheckSumBuffer pHash;
PSessCacheItem pZombie=NULL;
PSPCredentialGroup pCred=NULL;
BYTE i,j;
DWORD d;
DWORD cbClearChunk;
BYTE pWriteKey[SP_MAX_MASTER_KEY];
BYTE Buffer[MAX_CHECKSUM];
pZombie = pContext->RipeZombie;
pCred = pZombie ->pCred;
SP_BEGIN("PctComputeKey");
pHash = (PCheckSumBuffer)HBHash;
CopyMemory(pWriteKey, pKey, cbWriteKey);
d = (cbCipherKey + pContext->pHashInfo->cbCheckSum - 1)/pContext->pHashInfo->cbCheckSum;
if(d > 4)
{
SP_RETURN(PCT_INT_INTERNAL_ERROR);
}
cbClearChunk = pContext->RipeZombie->cbClearKey/d;
for(i=1; i <= d; i++)
{
InitHashBuf(HBHash, pContext);
pContext->pHashInfo->System->Sum( pHash, 1, &i );
// constant^i
pContext->pHashInfo->System->Sum( pHash, PCT_CONST_SLK_LEN*i, PCT_CONST_SLK);
// WRITE_KEY
pContext->pHashInfo->System->Sum( pHash, cbWriteKey, pWriteKey);
// constant^i
pContext->pHashInfo->System->Sum( pHash, PCT_CONST_SLK_LEN*i, PCT_CONST_SLK);
// Clear Key
pContext->pHashInfo->System->Sum( pHash,
cbClearChunk,
(PBYTE)pContext->RipeZombie->pClearKey + (i-1)*cbClearChunk);
if(pContext->pHashInfo->cbCheckSum*i <= cbCipherKey)
{
pContext->pHashInfo->System->Finalize( pHash, pKey + pContext->pHashInfo->cbCheckSum*(i-1) );
}
else
{
pContext->pHashInfo->System->Finalize( pHash, Buffer );
CopyMemory(pKey + pContext->pHashInfo->cbCheckSum*(i-1),
Buffer,
cbCipherKey - pContext->pHashInfo->cbCheckSum*(i-1));
}
}
SP_RETURN(PCT_ERR_OK);
}
#endif
#if 0
SP_STATUS
Pct1MakeSessionKeys(
PSPContext pContext)
{
SP_STATUS pctRet;
BOOL fClient;
UCHAR pWriteKey[SP_MAX_MASTER_KEY], pReadKey[SP_MAX_MASTER_KEY];
#if DBG
DWORD i;
CHAR KeyDispBuf[SP_MAX_MASTER_KEY*2+1];
#endif
PSessCacheItem pZombie=NULL;
PSPCredentialGroup pCred=NULL;
SP_BEGIN("PctMakeSessionKeys");
pZombie = pContext->RipeZombie;
pCred = pZombie ->pCred;
if (!pContext->InitMACState)
{
SP_RETURN(SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR));
}
#if DBG
DebugLog((DEB_TRACE, "Making session keys\n", KeyDispBuf));
for(i=0;i<PCT_SESSION_ID_SIZE;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x",
pContext->pConnectionID[i]);
DebugLog((DEB_TRACE, " ConnId\t%s\n", KeyDispBuf));
for(i=0;i<PCT_CHALLENGE_SIZE;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", (UCHAR)pContext->pChallenge[i]);
DebugLog((DEB_TRACE, " Challenge \t%s\n", KeyDispBuf));
for(i=0;i<pContext->RipeZombie->cbClearKey;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", (UCHAR)pContext->RipeZombie->pClearKey[i]);
DebugLog((DEB_TRACE, " ClearKey \t%s\n", KeyDispBuf));
#endif
fClient = ((pContext->Flags & CONTEXT_FLAG_CLIENT) != 0);
pctRet = PctComputeKey( pContext, fClient?pWriteKey:pReadKey, pContext->pCipherInfo->cbSecret, PCT_CONST_CWK,
PCT_CONST_CWK_LEN, PCT_USE_CERT);
if(PCT_ERR_OK != pctRet)
{
goto quit;
}
pctRet = PctComputeKey( pContext, fClient?pReadKey:pWriteKey, pContext->pCipherInfo->cbSecret, PCT_CONST_SWK,
PCT_CONST_SWK_LEN, 0);
if(PCT_ERR_OK != pctRet)
{
goto quit;
}
/* compute the ClientMacKey */
pctRet = PctComputeKey(pContext,
(fClient?pContext->WriteMACKey:pContext->ReadMACKey),
pContext->pHashInfo->cbCheckSum,
PCT_CONST_CMK,
PCT_CONST_CMK_LEN,
PCT_USE_CERT | PCT_MAKE_MAC);
if(PCT_ERR_OK != pctRet)
{
goto quit;
}
/* compute the ServerMacKey */
pctRet = PctComputeKey(pContext,
(fClient?pContext->ReadMACKey:pContext->WriteMACKey),
pContext->pHashInfo->cbCheckSum,
PCT_CONST_SMK,
PCT_CONST_SMK_LEN,
PCT_MAKE_MAC);
if(PCT_ERR_OK != pctRet)
{
goto quit;
}
// Initialize the hash states
InitHashBuf(pContext->RdMACBuf, pContext);
InitHashBuf(pContext->WrMACBuf, pContext);
// Note, we truncuate the MACing keys down to the negotiated key size
pContext->ReadMACState = (PCheckSumBuffer)pContext->RdMACBuf;
pContext->pHashInfo->System->Sum( pContext->ReadMACState,
pContext->pHashInfo->cbCheckSum,
pContext->ReadMACKey);
pContext->WriteMACState = (PCheckSumBuffer)pContext->WrMACBuf;
pContext->pHashInfo->System->Sum( pContext->WriteMACState,
pContext->pHashInfo->cbCheckSum,
pContext->WriteMACKey);
if (pContext->pCipherInfo->cbSecret < pContext->pCipherInfo->cbKey)
{
pctRet = PctComputeExportKey(pContext,
pWriteKey,
pContext->pCipherInfo->cbSecret,
pContext->pCipherInfo->cbKey);
if(PCT_ERR_OK != pctRet)
{
goto quit;
}
pctRet = PctComputeExportKey(pContext,
pReadKey,
pContext->pCipherInfo->cbSecret,
pContext->pCipherInfo->cbKey);
if(PCT_ERR_OK != pctRet)
{
goto quit;
}
/* chop the encryption keys down to selected length */
}
#if DBG
for(i=0;i<pContext->RipeZombie->cbMasterKey;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", pContext->RipeZombie->pMasterKey[i]);
DebugLog((DEB_TRACE, " MasterKey \t%s\n", KeyDispBuf));
for(i=0;i<pContext->pCipherInfo->cbKey;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", pReadKey[i]);
DebugLog((DEB_TRACE, " ReadKey\t%s\n", KeyDispBuf));
for(i=0;i<pContext->pHashInfo->cbCheckSum;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", pContext->ReadMACKey[i]);
DebugLog((DEB_TRACE, " MACKey\t%s\n", KeyDispBuf));
for(i=0;i<pContext->pCipherInfo->cbKey;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", pWriteKey[i]);
DebugLog((DEB_TRACE, " WriteKey\t%s\n", KeyDispBuf));
for(i=0;i<pContext->pHashInfo->cbCheckSum;i++)
wsprintf(KeyDispBuf+(i*2), "%2.2x", pContext->WriteMACKey[i]);
DebugLog((DEB_TRACE, " MACKey\t%s\n", KeyDispBuf));
#endif
if (pContext->pCipherInfo->System->Initialize( pReadKey,
pContext->pCipherInfo->cbKey,
pZombie->pKeyArgs, // IV
pZombie->cbKeyArgs, // IV length
&pContext->pReadState ) )
{
if (pContext->pCipherInfo->System->Initialize( pWriteKey,
pContext->pCipherInfo->cbKey,
pZombie->pKeyArgs, // IV
pZombie->cbKeyArgs, // IV length
&pContext->pWriteState) )
{
pctRet = PCT_ERR_OK;
goto quit;
}
pctRet = SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR);
pContext->pCipherInfo->System->Discard( &pContext->pReadState );
}
pctRet = SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR);
quit:
SP_RETURN(pctRet);
}
#endif
SP_STATUS WINAPI Pct1DecryptHandler(PSPContext pContext,
PSPBuffer pCommInput,
PSPBuffer pAppOutput)
{
SP_STATUS pctRet= 0;
BOOL fEscape;
PPCT1_CLIENT_HELLO pHello;
if(pCommInput->cbData > 0) {
/* first, we'll handle incoming data packets */
if((pContext->State == SP_STATE_CONNECTED) && (pContext->Decrypt))
{
fEscape = (((*(PUCHAR)pCommInput->pvBuffer) & 0xc0) == 0x40);
/* BUGFIX: IE 3.0 and 3.0a incorrectly respond to a REDO request
* by just sending a PCT1 client hello, instead of another REDO.
* We therefore look at the incomming message and see if it
* looks like a PCT1 client hello.
*/
pHello = (PPCT1_CLIENT_HELLO)pCommInput->pvBuffer;
if((pCommInput->cbData >= 5) &&
(pHello->MessageId == PCT1_MSG_CLIENT_HELLO) &&
(pHello->VersionMsb == MSBOF(PCT_VERSION_1)) &&
(pHello->VersionLsb == LSBOF(PCT_VERSION_1)) &&
(pHello->OffsetMsb == MSBOF(PCT_CH_OFFSET_V1)) &&
(pHello->OffsetLsb == LSBOF(PCT_CH_OFFSET_V1)))
{
// This looks a lot like a client hello
/* InitiateRedo */
pAppOutput->cbData = 0;
pCommInput->cbData = 0;
pContext->State = PCT1_STATE_RENEGOTIATE;
;
return SP_LOG_RESULT(PCT_INT_RENEGOTIATE);
}
if(PCT_ERR_OK ==
(pctRet = pContext->Decrypt(pContext,
pCommInput, /* message */
pAppOutput /* Unpacked Message */
)))
{
/* look for escapes */
if(fEscape)
{
if(pAppOutput->cbData < 1)
{
return SP_LOG_RESULT(PCT_INT_ILLEGAL_MSG);
}
/* The first byte of the decrypt buffer is the escape code */
switch(*(PUCHAR)pAppOutput->pvBuffer)
{
case PCT1_ET_REDO_CONN:
{
/* InitiateRedo */
if(pAppOutput->cbData != 1)
{
return SP_LOG_RESULT(PCT_INT_ILLEGAL_MSG);
}
pContext->State = PCT1_STATE_RENEGOTIATE;
pAppOutput->cbData = 0;
return SP_LOG_RESULT(PCT_INT_RENEGOTIATE);
}
case PCT1_ET_OOB_DATA:
/* HandleOOB */
default:
/* Unknown escape, generate error */
pctRet = SP_LOG_RESULT(PCT_INT_ILLEGAL_MSG);
/* Disconnect */
break;
}
}
}
return (pctRet);
}
else
{
return SP_LOG_RESULT(PCT_INT_ILLEGAL_MSG);
}
}
return PCT_INT_INCOMPLETE_MSG;
}
SP_STATUS Pct1GenerateError(PSPContext pContext,
PSPBuffer pCommOutput,
SP_STATUS pError,
PSPBuffer pErrData)
{
Pct1Error XmitError;
/* Only pack up an error if we are allowed to return errors */
if(!(pContext->Flags & CONTEXT_FLAG_EXT_ERR)) return pError;
XmitError.Error = pError;
XmitError.ErrInfoLen = 0;
XmitError.ErrInfo = NULL;
if(pErrData) {
XmitError.ErrInfoLen = pErrData->cbData;
XmitError.ErrInfo = pErrData->pvBuffer;
}
Pct1PackError(&XmitError,
pCommOutput);
return pError;
}
/* session key computation */
SP_STATUS Pct1HandleError(PSPContext pContext,
PSPBuffer pCommInput,
PSPBuffer pCommOutput)
{
UNREFERENCED_PARAMETER(pContext);
pCommOutput->cbData = 0;
return(((PPCT1_ERROR)pCommInput->pvBuffer)->ErrorMsb << 8 )| ((PPCT1_ERROR)pCommInput->pvBuffer)->ErrorLsb;
}
//+---------------------------------------------------------------------------
//
// Function: Pct1BeginVerifyPrelude
//
// Synopsis: Initiate the "verify prelude" computation.
//
// Arguments: [pContext] -- Schannel context.
// [pClientHello] --
// [cbClientHello] --
// [pServerHello] --
// [cServerHello] --
//
// History: 10-10-97 jbanes Added CAPI integration.
//
// Notes: Hash(CLIENT_MAC_KEY, Hash("cvp", CLIENT_HELLO, SERVER_HELLO));
//
//----------------------------------------------------------------------------
SP_STATUS Pct1BeginVerifyPrelude(PSPContext pContext,
PUCHAR pClientHello,
DWORD cbClientHello,
PUCHAR pServerHello,
DWORD cbServerHello)
{
HCRYPTHASH hHash;
if(!CryptCreateHash(pContext->RipeZombie->hMasterProv,
pContext->pHashInfo->aiHash,
0,
0,
&hHash))
{
SP_LOG_RESULT(GetLastError());
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash,
(PBYTE)PCT_CONST_VP,
PCT_CONST_VP_LEN,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash,
pClientHello,
cbClientHello,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash,
pServerHello,
cbServerHello,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
pContext->hMd5Handshake = hHash;
return PCT_ERR_OK;
}
//+---------------------------------------------------------------------------
//
// Function: Pct1EndVerifyPrelude
//
// Synopsis: Finish the "verify prelude" computation.
//
// Arguments: [pContext] -- Schannel context.
// [VerifyPrelude] --
// [pcbVerifyPrelude] --
//
// History: 10-10-97 jbanes Added CAPI integration.
//
// Notes:
//
//----------------------------------------------------------------------------
SP_STATUS Pct1EndVerifyPrelude(PSPContext pContext,
PUCHAR VerifyPrelude,
DWORD * pcbVerifyPrelude)
{
BOOL fClient;
HCRYPTHASH hHash;
fClient = !(pContext->RipeZombie->fProtocol & SP_PROT_SERVERS);
if(!CryptGetHashParam(pContext->hMd5Handshake,
HP_HASHVAL,
VerifyPrelude,
pcbVerifyPrelude,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(pContext->hMd5Handshake);
pContext->hMd5Handshake = 0;
return PCT_INT_INTERNAL_ERROR;
}
CryptDestroyHash(pContext->hMd5Handshake);
pContext->hMd5Handshake = 0;
if(!CryptCreateHash(pContext->RipeZombie->hMasterProv,
pContext->pHashInfo->aiHash,
0,
0,
&hHash))
{
SP_LOG_RESULT(GetLastError());
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashSessionKey(hHash,
fClient ? pContext->hWriteMAC : pContext->hReadMAC,
CRYPT_LITTLE_ENDIAN))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash,
VerifyPrelude,
*pcbVerifyPrelude,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptGetHashParam(hHash,
HP_HASHVAL,
VerifyPrelude,
pcbVerifyPrelude,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
CryptDestroyHash(hHash);
return PCT_ERR_OK;
}
//+---------------------------------------------------------------------------
//
// Function: Pct1ComputeMac
//
// Synopsis: Compute the
//
// Arguments: [pContext] -- Schannel context.
//
// History: 10-10-97 jbanes Created.
//
// Notes: MAC_DATA := Hash(MAC_KEY, Hash(RECORD_HEADER_DATA,
// ACTUAL_DATA, PADDING_DATA, SEQUENCE_NUMBER))
//
//----------------------------------------------------------------------------
static SP_STATUS
Pct1ComputeMac(
PSPContext pContext, // in
BOOL fWriteMAC, // in
PSPBuffer pData, // in
DWORD dwSequence, // in
PBYTE pbMac, // out
PDWORD pcbMac) // in, out
{
HCRYPTHASH hHash;
DWORD dwReverseSequence;
dwReverseSequence = htonl(dwSequence);
// Compute inner hash
if(!CryptCreateHash(pContext->RipeZombie->hMasterProv,
pContext->pHashInfo->aiHash,
0,
0,
&hHash))
{
SP_LOG_RESULT(GetLastError());
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash,
pData->pvBuffer,
pData->cbData,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash,
(PUCHAR)&dwReverseSequence,
sizeof(DWORD),
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptGetHashParam(hHash,
HP_HASHVAL,
pbMac,
pcbMac,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
SP_ASSERT(*pcbMac == pContext->pHashInfo->cbCheckSum);
CryptDestroyHash(hHash);
// Compute outer hash.
if(!CryptCreateHash(pContext->RipeZombie->hMasterProv,
pContext->pHashInfo->aiHash,
0,
0,
&hHash))
{
SP_LOG_RESULT(GetLastError());
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashSessionKey(hHash,
fWriteMAC ? pContext->hWriteMAC : pContext->hReadMAC,
CRYPT_LITTLE_ENDIAN))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptHashData(hHash, pbMac, *pcbMac, 0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
if(!CryptGetHashParam(hHash,
HP_HASHVAL,
pbMac,
pcbMac,
0))
{
SP_LOG_RESULT(GetLastError());
CryptDestroyHash(hHash);
return PCT_INT_INTERNAL_ERROR;
}
SP_ASSERT(*pcbMac == pContext->pHashInfo->cbCheckSum);
CryptDestroyHash(hHash);
return PCT_ERR_OK;
}
//+---------------------------------------------------------------------------
//
// Function: Pct1ComputeResponse
//
// Synopsis: Compute the "response" field of the ServerVerify message.
//
// Arguments: [pContext] -- Schannel context.
// [pbChallenge] --
// [cbChallenge] --
// [pbConnectionID] --
// [cbConnectionID] --
// [pbSessionID] --
// [cbSessionID] --
// [pbResponse] --
// [pcbResponse] --
//
// History: 10-10-97 jbanes Created.
//
// Notes: Hash(SERVER_MAC_KEY, Hash ("sr", CH_CHALLENGE_DATA,
// SH_CONNECTION_ID_DATA, SV_SESSION_ID_DATA))
//
//----------------------------------------------------------------------------
SP_STATUS
Pct1ComputeResponse(
PSPContext pContext, // in
PBYTE pbChallenge, // in
DWORD cbChallenge, // in
PBYTE pbConnectionID, // in
DWORD cbConnectionID, // in
PBYTE pbSessionID, // in
DWORD cbSessionID, // in
PBYTE pbResponse, // out
PDWORD pcbResponse) // in, out
{
BOOL fClient;
HCRYPTHASH hHash = 0;
SP_STATUS pctRet;
fClient = !(pContext->RipeZombie->fProtocol & SP_PROT_SERVERS);
//
// Hash ("sr", CH_CHALLENGE_DATA, SH_CONNECTION_ID_DATA,
// SV_SESSION_ID_DATA). Place the result in pbResponse.
//
if(!CryptCreateHash(pContext->RipeZombie->hMasterProv,
pContext->pHashInfo->aiHash,
0,
0,
&hHash))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptHashData(hHash,
(PBYTE)PCT_CONST_RESP,
PCT_CONST_RESP_LEN,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptHashData(hHash,
pbChallenge,
cbChallenge,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptHashData(hHash,
pbConnectionID,
cbConnectionID,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptHashData(hHash,
pbSessionID,
cbSessionID,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptGetHashParam(hHash,
HP_HASHVAL,
pbResponse,
pcbResponse,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
CryptDestroyHash(hHash);
hHash = 0;
//
// Hash (SERVER_MAC_KEY, pbResponse). Place the result back in pbResponse.
//
if(!CryptCreateHash(pContext->RipeZombie->hMasterProv,
pContext->pHashInfo->aiHash,
0,
0,
&hHash))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptHashSessionKey(hHash,
fClient ? pContext->hReadMAC : pContext->hWriteMAC,
CRYPT_LITTLE_ENDIAN))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptHashData(hHash,
pbResponse,
*pcbResponse,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
if(!CryptGetHashParam(hHash,
HP_HASHVAL,
pbResponse,
pcbResponse,
0))
{
SP_LOG_RESULT(GetLastError());
pctRet = PCT_INT_INTERNAL_ERROR;
goto cleanup;
}
CryptDestroyHash(hHash);
hHash = 0;
pctRet = PCT_ERR_OK;
cleanup:
if(hHash)
{
CryptDestroyHash(hHash);
}
return pctRet;
}