windows-nt/Source/XPSP1/NT/inetsrv/iis/ui/itools/w3key/keydata.cpp
2020-09-26 16:20:57 +08:00

347 lines
9.5 KiB
C++

/* Key.cpp : defines the key object.
This file contains the routines that allow a key to store and restore itself
*/
#include "stdafx.h"
#include "resource.h"
#include "KeyObjs.h"
#include "cmnkey.h"
#include "W3Key.h"
#define KEY_VERSION 0x102
/*========
The scheme here is to create a handle that contains all the data necessary to
restore the key object. The data contained in that handle is then stored as a
secret on the target machine. This does require that the size of the handle be
less than 65000 bytes, which should be no problem.
*/
//------------------------------------------------------------------------------
// generate a handle containing data that gets stored and then is used to restore
// the key object at a later date. Restore this key by passing this dereferenced
// handle back into the FInitKey routine above.
HANDLE CW3Key::HGenerateDataHandle( BOOL fIncludePassword )
{
DWORD cbSize;
DWORD cbChar = sizeof(TCHAR);
PUCHAR p;
HANDLE h;
CString szReserved; // save an empty string so that one can be added later
szReserved.Empty();
// calculate the size of the handle
cbSize = 2*sizeof(DWORD) + sizeof(BOOL);
cbSize += sizeof(DWORD); // reserved dword
cbSize += sizeof(DWORD) + szReserved.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szName.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szPassword.GetLength() * cbChar + cbChar;
// no longer need to store all the distinguishing info now that crack certificate works
cbSize += (sizeof(DWORD) + szReserved.GetLength() * cbChar + cbChar) * 6;
/*
cbSize += sizeof(DWORD) + m_szOrganization.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szUnit.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szNetAddress.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szCountry.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szStateProvince.GetLength() * cbChar + cbChar;
cbSize += sizeof(DWORD) + m_szLocality.GetLength() * cbChar + cbChar;
*/
cbSize += sizeof(DWORD) + m_szIPAddress.GetLength() * cbChar + cbChar;
cbSize += sizeof(BOOL); //m_fDefault
cbSize += sizeof(DWORD) + m_cbPrivateKey;
cbSize += sizeof(DWORD) + m_cbCertificate;
cbSize += sizeof(DWORD) + m_cbCertificateRequest;
cbSize += sizeof(FILETIME); // no longer used
// create the new handle and lock it
h = GlobalAlloc( GHND, cbSize );
if ( !h )
{
AfxThrowMemoryException();
return NULL;
}
p = (PUCHAR)GlobalLock( h );
// put in the version, fComplete, and nBits
*((UNALIGNED DWORD*)p) = KEY_VERSION;
p += sizeof(DWORD);
*((UNALIGNED DWORD*)p) = 0; // no longer used
p += sizeof(DWORD);
*((UNALIGNED BOOL*)p) = (m_pCertificate != NULL); // no longer used
p += sizeof(BOOL);
// add in a reserved dword for future use.
*((UNALIGNED DWORD*)p) = 0L;
p += sizeof(DWORD);
// now the strings......
// for each string, first write out the size of the string, then the string data.
// save the reserved string. If you need to add one later and don't want to
// invalidate the older keys on a machine, replace this string.
cbSize = szReserved.GetLength() * cbChar + cbChar;
*((UNALIGNED DWORD*)p) = cbSize;
p += sizeof(DWORD);
CopyMemory( p, LPCTSTR(szReserved), cbSize );
p += cbSize;
// save the name
cbSize = m_szName.GetLength() * cbChar + cbChar;
*((UNALIGNED DWORD*)p) = cbSize;
p += sizeof(DWORD);
CopyMemory( p, LPCTSTR(m_szName), cbSize );
p += cbSize;
// save the password
if ( fIncludePassword )
{
cbSize = m_szPassword.GetLength() * cbChar + cbChar;
*((UNALIGNED DWORD*)p) = cbSize;
p += sizeof(DWORD);
CopyMemory( p, LPCTSTR(m_szPassword), cbSize );
p += cbSize;
}
else
// do not include the password - just put in an empty field
{
*((UNALIGNED DWORD*)p) = 0;
p += sizeof(DWORD);
}
// no longer need to store all the distinguishing info now that crack certificate works
for ( WORD i = 0; i < 6; i++ )
{
cbSize = szReserved.GetLength() * cbChar + cbChar;
*((UNALIGNED DWORD*)p) = cbSize;
p += sizeof(DWORD);
CopyMemory( p, LPCTSTR(szReserved), cbSize );
p += cbSize;
}
// save the ip address it is attached to
cbSize = m_szIPAddress.GetLength() * cbChar + cbChar;
*((UNALIGNED DWORD*)p) = cbSize;
p += sizeof(DWORD);
CopyMemory( p, LPCTSTR(m_szIPAddress), cbSize );
p += cbSize;
// put in the m_fDefault flag
*((UNALIGNED BOOL*)p) = m_fDefault;
p += sizeof(BOOL);
// now put in the number of bytes in the private key
*((UNALIGNED DWORD*)p) = m_cbPrivateKey;
p += sizeof(DWORD);
// put in the private key
CopyMemory( p, m_pPrivateKey, m_cbPrivateKey );
p += m_cbPrivateKey;
// now put in the number of bytes in the certificate
*((UNALIGNED DWORD*)p) = m_cbCertificate;
p += sizeof(DWORD);
// put in the certificate key
CopyMemory( p, m_pCertificate, m_cbCertificate );
p += m_cbCertificate;
// now put in the number of bytes in the certificate request
*((UNALIGNED DWORD*)p) = m_cbCertificateRequest;
p += sizeof(DWORD);
// put in the certificate request
CopyMemory( p, m_pCertificateRequest, m_cbCertificateRequest );
p += m_cbCertificateRequest;
// and finally, add the timestamp
FILETIME ft;
memset( &ft, 0, sizeof(ft) );
*((UNALIGNED FILETIME*)p) = ft;
p += sizeof(FILETIME);
// unlock the handle
GlobalUnlock( h );
// all done
return h;
}
//------------------------------------------------------------------------------
// Given a pointer to a block of data originally created by the above routine, fill
// in the key object
BOOL CW3Key::InitializeFromPointer( PUCHAR pSrc, DWORD cbSrc )
{
DWORD dword, version;
DWORD cbChar = sizeof(TCHAR);
PUCHAR p = pSrc;
ASSERT(pSrc && cbSrc);
// get the version of the data - just put it into dword for now
version = *((UNALIGNED DWORD*)p);
// check the version for validity
if ( version > KEY_VERSION )
{
return FALSE;
}
p += sizeof(DWORD);
// anything below version 0x101 is BAD. Do not accept it
if ( version < 0x101 )
{
AfxMessageBox( IDS_INVALID_KEY, MB_OK|MB_ICONINFORMATION );
return FALSE;
}
// get the bits and the complete flag
// no longer used
p += sizeof(DWORD);
p += sizeof(BOOL);
ASSERT( p < (pSrc + cbSrc) );
// get the reserved dword - (acutally, just skip over it)
p += sizeof(DWORD);
// now the strings......
// for each string, first get the size of the string, then the data from the string
// get the reserved string - (actually, just skip over it)
dword = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
p += dword;
// get the name
dword = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
m_szName= p;
p += dword;
ASSERT( p < (pSrc + cbSrc) );
// get the password
dword = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
// if there is no password, don't worry, just skip it
if ( dword )
{
m_szPassword = p;
p += dword;
ASSERT( p < (pSrc + cbSrc) );
}
// get the organization
// no longer used - skip the DN info
for ( WORD i = 0; i < 6; i++ )
{
dword = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
p += dword;
ASSERT( p < (pSrc + cbSrc) );
}
// get the ip addres it is attached to
dword = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
m_szIPAddress = p;
p += dword;
ASSERT( p < (pSrc + cbSrc) );
// get the default flag
m_fDefault = *((UNALIGNED BOOL*)p);
p += sizeof(BOOL);
// now put get the number of bytes in the private key
m_cbPrivateKey = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
ASSERT( p < (pSrc + cbSrc) );
// if the private key already exists, kill it. Then make a new pointer for it
if ( m_pPrivateKey )
GlobalFree( (HANDLE)m_pPrivateKey );
m_pPrivateKey = (PVOID)GlobalAlloc( GPTR, m_cbPrivateKey );
if ( !m_pPrivateKey ) return FALSE;
// put in the private key
CopyMemory( m_pPrivateKey, p, m_cbPrivateKey );
p += m_cbPrivateKey;
ASSERT( p < (pSrc + cbSrc) );
// now put get the number of bytes in the certificate
m_cbCertificate = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
ASSERT( p < (pSrc + cbSrc) );
// if the private key already exists, kill it. Then make a new pointer for it
if ( m_pCertificate )
GlobalFree( (HANDLE)m_pCertificate );
m_pCertificate = NULL;
// only make a certificate pointer if m_cbCertificate is greater than zero
if ( m_cbCertificate )
{
m_pCertificate = (PVOID)GlobalAlloc( GPTR, m_cbCertificate );
if ( !m_pCertificate ) return FALSE;
// put in the private key
CopyMemory( m_pCertificate, p, m_cbCertificate );
p += m_cbCertificate;
if ( version >= KEY_VERSION )
ASSERT( p < (pSrc + cbSrc) );
else
ASSERT( p == (pSrc + cbSrc) );
}
// added near the end
if ( version >= KEY_VERSION )
{
// now put get the number of bytes in the certificte request
m_cbCertificateRequest = *((UNALIGNED DWORD*)p);
p += sizeof(DWORD);
ASSERT( p < (pSrc + cbSrc) );
// if the private key already exists, kill it. Then make a new pointer for it
if ( m_pCertificateRequest )
GlobalFree( (HANDLE)m_pCertificateRequest );
m_pCertificateRequest = NULL;
// only make a certificate pointer if m_cbCertificate is greater than zero
if ( m_cbCertificateRequest )
{
m_pCertificateRequest = (PVOID)GlobalAlloc( GPTR, m_cbCertificateRequest );
if ( !m_pCertificateRequest ) return FALSE;
// put in the private key
CopyMemory( m_pCertificateRequest, p, m_cbCertificateRequest );
p += m_cbCertificateRequest;
ASSERT( p < (pSrc + cbSrc) );
}
// finally read in the expiration timestamp
// m_tsExpires = *((UNALIGNED FILETIME*)p);
p += sizeof(FILETIME);
}
else
{
m_cbCertificateRequest = 0;
if ( m_pCertificateRequest )
GlobalFree( (HANDLE)m_pCertificateRequest );
m_pCertificateRequest = NULL;
// m_tsExpires.dwLowDateTime = 0;
// m_tsExpires.dwHighDateTime = 0;
}
// all done
return TRUE;
}