windows-nt/Source/XPSP1/NT/termsrv/tscert/tscrtadd/tscrtadd.c

300 lines
7.3 KiB
C
Raw Normal View History

2020-09-26 03:20:57 -05:00
#include <nt.h>
#include <ntrtl.h>
#include <nturtl.h>
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
#include <stddef.h>
#include <wincrypt.h>
#include <imagehlp.h>
#ifdef IN_TERMSRV
#else
#define MemAlloc malloc
#define MemFree free
#endif
#ifdef SIGN_DEBUG
#define SIGN_DBGP(x) printf x
#else // SIGN_DEBUG
#define SIGN_DBGP(x)
#endif // SIGN_DEBUG
#include "../inc/privblob.h"
#define WIN_CERT_TYPE_STACK_DLL_SIGNATURE WIN_CERT_TYPE_TS_STACK_SIGNED
BOOL SignFile( LPWSTR wszFile );
/*****************************************************************************/
void _cdecl main(int argc, char *argv[])
{
WCHAR szSourceFile[ MAX_PATH + 1];
DWORD dwBc;
if (argc != 2) {
printf( "Usage: %s PE_File_Name\n", argv[0] );
exit(1);
}
if(RtlMultiByteToUnicodeN( szSourceFile, sizeof(szSourceFile), &dwBc,
argv[1], (strlen(argv[1]) + 1) ) == STATUS_SUCCESS)
{
if( szSourceFile == NULL || !SignFile(szSourceFile) ) {
printf("Error signing file!\n");
exit(1);
}
printf("Signature added successfully.\n");
exit(0);
}
else
{
printf("Error conversion from Ansi to Unicode.\n");
exit(1);
}
}
typedef struct _DIGEST_PARA {
HCRYPTHASH hHash;
} DIGEST_PARA, *PDIGEST_PARA;
BOOL
WINAPI
DigestFile(
DIGEST_HANDLE hDigest,
PBYTE pb,
DWORD cb )
{
PDIGEST_PARA pdp = (PDIGEST_PARA)hDigest;
if (pb == (PBYTE)-1) {
return( TRUE );
} else {
return( CryptHashData(pdp->hHash, pb, cb, 0) );
}
}
//////////////////////////////////////////////////////////////
//
// Open a file in the appropriate permissions / mode for doing
// our signing stuff
//
//////////////////////////////////////////////////////////////
HANDLE OpenImageFile( LPCWSTR wszFile, DWORD dwAccess )
{
HANDLE hFile;
if (wszFile) {
hFile = CreateFile( wszFile,
dwAccess,
FILE_SHARE_READ,
NULL,
OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL,
NULL
);
return hFile;
} else {
return INVALID_HANDLE_VALUE;
}
}
///////////////////////////////////////////////////////////////////////
//
// Sign Code, Data, and Resources of a PE image file, and add the
// signature to the file in the form of a "WIN_CERTIFICATE".
//
///////////////////////////////////////////////////////////////////////
BOOL
SignFile(
LPWSTR wszFile
)
{
HCRYPTPROV hProv;
HCRYPTKEY hPrivateKeySig = 0;
BOOL fResult = FALSE; // preset ERROR case
HANDLE hFile;
DWORD dwErr = ERROR_SUCCESS;
DWORD dwSignatureLen;
DWORD dwCert;
DWORD dwCertIndex;
DWORD cCert;
DIGEST_PARA dp;
PBYTE pbSignature;
LPWIN_CERTIFICATE pCertHdr;
if ( !(hFile = OpenImageFile( wszFile, GENERIC_WRITE | GENERIC_READ )) ) {
printf("Error %x during OpenImageFile\n", GetLastError() );
goto OpenImageFileError;
}
if (!CryptAcquireContext(
&hProv,
NULL,
MS_DEF_PROV,
PROV_RSA_FULL,
CRYPT_VERIFYCONTEXT))
{
SIGN_DBGP( ("Error %x during CryptAcquireContext\n", GetLastError()) );
goto CryptAcquireContextError;
}
if (!CryptImportKey(
hProv,
PrivateKeySigBlob, // from #include "../inc/privblob.h"
sizeof( PrivateKeySigBlob ),
0,
CRYPT_EXPORTABLE,
&hPrivateKeySig)) {
SIGN_DBGP( ("Error %x during CryptImportKey!\n", GetLastError()) );
goto CryptImportKeyError;
}
memset( &dp, 0, sizeof(dp));
if (!CryptCreateHash(
hProv,
CALG_MD5,
0,
0,
&dp.hHash)) {
SIGN_DBGP( ("Error %x during CryptCreateHash\n", GetLastError()) );
goto CryptCreateHashError;
}
if (!ImageGetDigestStream(
hFile,
0,
DigestFile,
(DIGEST_HANDLE)&dp)) {
SIGN_DBGP( ("Error %x during ImageGetDigestStream\n", GetLastError()) );
goto ImageGetDigestStreamError;
}
//
// Sign hash object.
//
// Determine size of signature.
dwSignatureLen = 0;
if(!CryptSignHash(
dp.hHash,
AT_SIGNATURE,
NULL,
0,
NULL,
&dwSignatureLen)) {
SIGN_DBGP( ("Error %x during CryptSignHash 1! SigLen = %d\n",
GetLastError(),
dwSignatureLen) );
goto CryptSignHash1Error;
}
// Allocate memory for 'pbSignature'.
if((pbSignature = MemAlloc(dwSignatureLen)) == NULL) {
SIGN_DBGP( ("Out of memory Sig!\n") );
goto SigAllocError;
}
// Sign hash object (with signature key).
if(!CryptSignHash(
dp.hHash,
AT_SIGNATURE,
NULL,
0,
pbSignature,
&dwSignatureLen)) {
SIGN_DBGP( ("Error %x during CryptSignHash 2!\n", GetLastError()) );
goto CryptSignHash2Error;
}
SIGN_DBGP( ("Signature length = %d\n", dwSignatureLen) );
dwCert = offsetof( WIN_CERTIFICATE, bCertificate ) + dwSignatureLen;
if (NULL == (pCertHdr = (LPWIN_CERTIFICATE) MemAlloc(dwCert))) {
SIGN_DBGP( ("Out of memory Cert!\n") );
goto CertAllocError;
}
// Put the signature and key into the WIN_CERTIFICATE structure
pCertHdr->dwLength = dwCert;
pCertHdr->wRevision = WIN_CERT_REVISION_1_0;
pCertHdr->wCertificateType = WIN_CERT_TYPE_STACK_DLL_SIGNATURE;
memcpy( &pCertHdr->bCertificate[0], pbSignature, dwSignatureLen );
{
unsigned int cnt=0;
while ( cnt < dwSignatureLen ) {
int i;
for ( i=0; (i < 16) && (cnt < dwSignatureLen); cnt++,i++) {
SIGN_DBGP( ("%02x ", pCertHdr->bCertificate[cnt]) );
}
SIGN_DBGP( ("\n") );
}
}
// Remove any and all Stack DLL Signature Certificates from PE file
while (TRUE) {
cCert = 0;
dwCertIndex = 0;
if (!ImageEnumerateCertificates(
hFile,
WIN_CERT_TYPE_STACK_DLL_SIGNATURE,
&cCert,
&dwCertIndex,
1 // IndexCount
)) {
break;
}
if (cCert == 0) {
break;
}
if (!ImageRemoveCertificate(hFile, dwCertIndex)) {
SIGN_DBGP( ("Error %x during ImageRemoveCertificate\n",
GetLastError()) );
goto ImageRemoveCertificateError;
}
}
if (!ImageAddCertificate(
hFile,
pCertHdr,
&dwCertIndex)) {
SIGN_DBGP( ("Error %x during ImageAddCertificate\n", GetLastError()) );
goto ImageAddCertificateError;
}
fResult = TRUE;
ImageAddCertificateError:
ImageRemoveCertificateError:
MemFree( pCertHdr );
CertAllocError:
CryptSignHash2Error:
MemFree( pbSignature );
SigAllocError:
CryptSignHash1Error:
ImageGetDigestStreamError:
CryptDestroyHash( dp.hHash );
CryptCreateHashError:
CryptDestroyKey(hPrivateKeySig);
CryptImportKeyError:
dwErr = GetLastError();
CryptReleaseContext( hProv, 0 );
SetLastError( dwErr );
CryptAcquireContextError:
CloseHandle( hFile );
OpenImageFileError:
return fResult;
}