Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

314 lines
6.1 KiB

/*++
Copyright (c) 1994-1998 Microsoft Corporation
Module Name:
local.c
Abstract:
Contains functions that encrypt and decrypt data to be stored locally
Author:
Adam Overton (adamo) 08-Feb-1998
Environment:
User Mode - Win32
Revision History:
--*/
#include <seccom.h>
#include <tchar.h>
#include <extypes.h>
#include <license.h>
#include <cryptkey.h>
#if defined(OS_WINCE)
BOOL GetUserName(
LPTSTR lpBuffer, // address of name buffer
LPDWORD pdwSize // address of size of name buffer
)
/*++
Routine Description:
Provides the GetUserName API on platforms that don't have it
Arguments:
lpBuffer - pointer to a buffer for the username
nSize - size of name buffer
Return Value:
TRUE - successfully retrieved UserName
FALSE - otherwise
--*/
{
DWORD dwT;
memset(lpBuffer, 0, *pdwSize);
//
// There doesn't appear to be user name available, just
// use a default and rely on the machine UUID for security
//
dwT = *pdwSize;
#define USER_RANDOM "eefdbcf0001255b4009c9e1800f73774"
if (dwT > sizeof(USER_RANDOM))
dwT = sizeof(USER_RANDOM);
memcpy(lpBuffer, USER_RANDOM, (size_t)dwT);
return TRUE;
}
#endif // defined(OS_WINCE)
BOOL GetLocalKey(
struct RC4_KEYSTRUCT *prc4Key
)
/*++
Routine Description:
This function creates and caches a rc4 key which can be used to store
private information locally
Arguments:
prc4Key - pointer to a buffer to hold the RC4 key
Return Value:
TRUE - successfully generated key
FALSE - otherwise
--*/
{
A_SHA_CTX SHAHash;
BYTE abSHADigest[A_SHA_DIGEST_LEN];
static BOOL fCreatedKey = FALSE;
static struct RC4_KEYSTRUCT rc4Key;
TCHAR szUserName[SEC_MAX_USERNAME];
DWORD dwSize;
HWID hwid;
if (!fCreatedKey) {
A_SHAInit(&SHAHash);
//
// Get the user name
//
dwSize = (DWORD)sizeof(szUserName);
memset(szUserName, 0, (size_t)dwSize);
if (!GetUserName(szUserName, &dwSize))
return FALSE;
A_SHAUpdate(&SHAHash, (unsigned char *)szUserName, dwSize);
//
// Get unique machine identifier
//
if (LICENSE_STATUS_OK == GenerateClientHWID(&hwid)) {
A_SHAUpdate(&SHAHash, (unsigned char *)&hwid, sizeof(HWID));
}
//
// Update the Hash with something less guessable
// but known to our apps
//
#define RANDOM_CONSTANT "deed047e-a3cb-11d1-b96c-00c04fb15601"
A_SHAUpdate(&SHAHash, RANDOM_CONSTANT, sizeof(RANDOM_CONSTANT));
//
// Finalize the hash
//
A_SHAFinal(&SHAHash, abSHADigest);
//
// Generate a key based on this hash
//
msrc4_key(&rc4Key, (UINT)MAX_SESSION_KEY_SIZE, abSHADigest);
fCreatedKey = TRUE;
}
memcpy(prc4Key, &rc4Key, sizeof(rc4Key));
return TRUE;
}
BOOL GetLocalKey50(
struct RC4_KEYSTRUCT *prc4Key,
LPBYTE pbSalt,
DWORD dwSaltLength
)
/*++
Routine Description:
This function creates and caches a rc4 key which can be used to store
private information locally
Arguments:
prc4Key - pointer to a buffer to hold the RC4 key
Return Value:
TRUE - successfully generated key
FALSE - otherwise
--*/
{
A_SHA_CTX SHAHash;
BYTE abSHADigest[A_SHA_DIGEST_LEN];
struct RC4_KEYSTRUCT rc4Key;
TCHAR szUserName[SEC_MAX_USERNAME];
DWORD dwSize;
HWID hwid;
DWORD dw;
A_SHAInit(&SHAHash);
//
// Get the user name
//
dwSize = (DWORD)sizeof(szUserName);
memset(szUserName, 0, (size_t)dwSize);
if (!GetUserName(szUserName, &dwSize))
return FALSE;
A_SHAUpdate(&SHAHash, (unsigned char *)szUserName, dwSize);
//
// Get unique machine identifier
//
if (LICENSE_STATUS_OK == GenerateClientHWID(&hwid)) {
A_SHAUpdate(&SHAHash, (unsigned char *)&hwid, sizeof(HWID));
}
//
// Update the Hash with something less guessable
// but known to our apps
//
#define RANDOM_CONSTANT "deed047e-a3cb-11d1-b96c-00c04fb15601"
A_SHAUpdate(&SHAHash, RANDOM_CONSTANT, sizeof(RANDOM_CONSTANT));
//
// Finalize the hash
//
A_SHAFinal(&SHAHash, abSHADigest);
//
// Add salt and stir gently
//
for (dw = 0; dw < 256; dw++) {
A_SHAInit(&SHAHash);
A_SHAUpdate(&SHAHash, pbSalt, dwSaltLength);
A_SHAUpdate(&SHAHash, abSHADigest, A_SHA_DIGEST_LEN);
A_SHAFinal(&SHAHash, abSHADigest);
}
//
// Generate a key based on this hash
//
msrc4_key(&rc4Key, (UINT)MAX_SESSION_KEY_SIZE, abSHADigest);
memcpy(prc4Key, &rc4Key, sizeof(rc4Key));
return TRUE;
}
BOOL EncryptDecryptLocalData(
LPBYTE pbData,
DWORD dwDataLen
)
/*++
Routine Description:
This function encrypts/decrypts data to be stored locally, but usable
only by the current user on the this machine
Arguments:
pbData - pointer to a data buffer.
dwDataLen - length of the above data.
Return Value:
TRUE - successfully encrypted data
FALSE - otherwise
--*/
{
struct RC4_KEYSTRUCT rc4Key;
if (!GetLocalKey(&rc4Key))
return FALSE;
msrc4(&rc4Key, (UINT)dwDataLen, pbData);
return TRUE;
}
BOOL EncryptDecryptLocalData50(
LPBYTE pbData,
DWORD dwDataLen,
LPBYTE pbSalt,
DWORD dwSaltLen
)
/*++
Routine Description:
This function encrypts/decrypts data to be stored locally, but usable
only by the current user on the this machine
Arguments:
pbData - pointer to a data buffer.
dwDataLen - length of the above data.
Return Value:
TRUE - successfully encrypted data
FALSE - otherwise
--*/
{
struct RC4_KEYSTRUCT rc4Key;
if (!GetLocalKey50(&rc4Key, pbSalt, dwSaltLen))
return FALSE;
msrc4(&rc4Key, (UINT)dwDataLen, pbData);
return TRUE;
}