windows-nt/Source/XPSP1/NT/ds/win32/ntcrypto/rsaaes/manage.c
2020-09-26 16:20:57 +08:00

1103 lines
33 KiB
C

/////////////////////////////////////////////////////////////////////////////
// FILE : manage.c //
// DESCRIPTION : Misc list/memory management routines. //
// AUTHOR : //
// HISTORY : //
// Jan 25 1995 larrys Changed from Nametag //
// Feb 23 1995 larrys Changed NTag_SetLastError to SetLastError //
// Apr 19 1995 larrys Cleanup //
// Sep 11 1995 Jeffspel/ramas Merge STT into default CSP //
// Oct 27 1995 rajeshk RandSeed Stuff added hUID to PKCS2Encrypt //
// Nov 3 1995 larrys Merge for NT checkin //
// Nov 13 1995 larrys Fixed memory leak //
// Dec 11 1995 larrys Added WIN95 password cache //
// Dec 13 1995 larrys Remove MTS stuff //
// May 15 1996 larrys Remove old cert stuff //
// May 28 1996 larrys Added Win95 registry install stuff //
// Jun 12 1996 larrys Encrypted public keys //
// Jun 26 1996 larrys Put rsabase.sig into a resource for regsrv32 //
// Sep 16 1996 mattt Added Strong provider type in #define //
// Oct 14 1996 jeffspel Changed GenRandom to NewGenRandom //
// May 23 1997 jeffspel Added provider type checking //
// //
// Copyright (C) 1993 Microsoft Corporation All Rights Reserved //
/////////////////////////////////////////////////////////////////////////////
#include "precomp.h"
#include "resource.h"
#include "nt_rsa.h"
#include "randlib.h"
#include "protstor.h"
#include "ole2.h"
#include "swnt_pk.h"
#include "sgccheck.h"
#include "swnt_pk.h"
#include <delayimp.h>
#define MAXITER 0xFFFF
#define RSAFULL_TYPE_STRING "Type 001"
#define RSA_SCH_TYPE_STRING "Type 012"
#define RSAAES_TYPE_STRING "Type 024"
#define MS_RSA_TYPE "RSA Full (Signature and Key Exchange)"
#define MS_RSA_SCH_TYPE "RSA SChannel"
#define MS_RSAAES_TYPE "RSA Full and AES"
#define PROVPATH "SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\"
#define PROVPATH_LEN sizeof(PROVPATH)
#define TYPEPATH "SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider Types\\"
#define TYPEPATH_LEN sizeof(TYPEPATH)
HINSTANCE g_hInstance;
extern DWORD SelfMACCheck(IN LPSTR pszImage);
static CHAR l_szImagePath[MAX_PATH];
#define KEYSIZE1024 0x88
#if 0
struct _mskey
{
BSAFE_PUB_KEY PUB;
unsigned char pubmodulus[KEYSIZE1024];
} MSKEY = {
{
0x2bad85ae,
0x883adacc,
0xb32ebd68,
0xa7ec8b06,
0x58dbeb81,
},
{
0x42, 0x34, 0xb7, 0xab, 0x45, 0x0f, 0x60, 0xcd,
0x8f, 0x77, 0xb5, 0xd1, 0x79, 0x18, 0x34, 0xbe,
0x66, 0xcb, 0x5c, 0x66, 0x4a, 0x9f, 0x03, 0x18,
0x13, 0x36, 0x8e, 0x88, 0x21, 0x78, 0xb1, 0x94,
0xa1, 0xd5, 0x8f, 0x8c, 0xa5, 0xd3, 0x9f, 0x86,
0x43, 0x89, 0x05, 0xa0, 0xe3, 0xee, 0xe2, 0xd0,
0xe5, 0x1d, 0x5f, 0xaf, 0xff, 0x85, 0x71, 0x7a,
0x0a, 0xdb, 0x2e, 0xd8, 0xc3, 0x5f, 0x2f, 0xb1,
0xf0, 0x53, 0x98, 0x3b, 0x44, 0xee, 0x7f, 0xc9,
0x54, 0x26, 0xdb, 0xdd, 0xfe, 0x1f, 0xd0, 0xda,
0x96, 0x89, 0xc8, 0x9e, 0x2b, 0x5d, 0x96, 0xd1,
0xf7, 0x52, 0x14, 0x04, 0xfb, 0xf8, 0xee, 0x4d,
0x92, 0xd1, 0xb6, 0x37, 0x6a, 0xe0, 0xaf, 0xde,
0xc7, 0x41, 0x06, 0x7a, 0xe5, 0x6e, 0xb1, 0x8c,
0x8f, 0x17, 0xf0, 0x63, 0x8d, 0xaf, 0x63, 0xfd,
0x22, 0xc5, 0xad, 0x1a, 0xb1, 0xe4, 0x7a, 0x6b,
0x1e, 0x0e, 0xea, 0x60, 0x56, 0xbd, 0x49, 0xd0,
}
};
struct _key
{
BSAFE_PUB_KEY PUB;
unsigned char pubmodulus[KEYSIZE1024];
} KEY = {
{
0x3fcbf1a9,
0x08f597db,
0xe4aecab4,
0x75360f90,
0x9d6c0f00,
},
{
0x85, 0xdd, 0x9b, 0xf4, 0x4d, 0x0b, 0xc4, 0x96,
0x3e, 0x79, 0x86, 0x30, 0x6d, 0x27, 0x31, 0xee,
0x4a, 0x85, 0xf5, 0xff, 0xbb, 0xa9, 0xbd, 0x81,
0x86, 0xf2, 0x4f, 0x87, 0x6c, 0x57, 0x55, 0x19,
0xe4, 0xf4, 0x49, 0xa3, 0x19, 0x27, 0x08, 0x82,
0x9e, 0xf9, 0x8a, 0x8e, 0x41, 0xd6, 0x91, 0x71,
0x47, 0x48, 0xee, 0xd6, 0x24, 0x2d, 0xdd, 0x22,
0x72, 0x08, 0xc6, 0xa7, 0x34, 0x6f, 0x93, 0xd2,
0xe7, 0x72, 0x57, 0x78, 0x7a, 0x96, 0xc1, 0xe1,
0x47, 0x38, 0x78, 0x43, 0x53, 0xea, 0xf3, 0x88,
0x82, 0x66, 0x41, 0x43, 0xd4, 0x62, 0x44, 0x01,
0x7d, 0xb2, 0x16, 0xb3, 0x50, 0x89, 0xdb, 0x0a,
0x93, 0x17, 0x02, 0x02, 0x46, 0x49, 0x79, 0x76,
0x59, 0xb6, 0xb1, 0x2b, 0xfc, 0xb0, 0x9a, 0x21,
0xe6, 0xfa, 0x2d, 0x56, 0x07, 0x36, 0xbc, 0x13,
0x7f, 0x1c, 0xde, 0x55, 0xfb, 0x0d, 0x67, 0x0f,
0xc2, 0x17, 0x45, 0x8a, 0x14, 0x2b, 0xba, 0x55,
}
};
#endif
#if 0
NTVersion(
void)
{
static BOOL dwVersion = 0;
OSVERSIONINFO osVer;
memset(&osVer, 0, sizeof(OSVERSIONINFO));
osVer.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
if(!GetVersionEx(&osVer) )
goto ErrorExit;
dwVersion = osVer.dwMajorVersion;
ErrorExit:
return dwVersion;
}
#endif
/*static*/ DWORD
SetCSPInfo(
LPSTR pszProvider,
LPSTR pszImagePath,
BYTE *pbSig,
DWORD cbSig,
DWORD dwProvType,
LPSTR pszType,
LPSTR pszTypeName,
BOOL fSigInFile,
BOOL fMakeDefault)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
DWORD dwIgn;
HKEY hKey = 0;
HKEY hTypeKey = 0;
DWORD cbProv;
BYTE *pszProv = NULL;
DWORD cbTypePath;
BYTE *pszTypePath = NULL;
DWORD dwVal = 0;
DWORD dwSts;
cbProv = PROVPATH_LEN + strlen(pszProvider);
pszProv = _nt_malloc(cbProv);
if (NULL == pszProv)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
strcpy((LPSTR)pszProv, PROVPATH);
strcat((LPSTR)pszProv, pszProvider);
//
// Create or open in local machine for provider:
//
dwSts = RegCreateKeyEx(HKEY_LOCAL_MACHINE,
(const char *)pszProv,
0L, "", REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS, NULL, &hKey,
&dwIgn);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
//
// Set Image path to: scp.dll
//
dwSts = RegSetValueEx(hKey, "Image Path", 0L, REG_SZ,
(LPBYTE)pszImagePath,
strlen(pszImagePath) + 1);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
//
// Set Type to: Type 003
//
dwSts = RegSetValueEx(hKey, "Type", 0L, REG_DWORD,
(LPBYTE)&dwProvType,
sizeof(DWORD));
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if (fSigInFile)
{
//
// Place signature in file value
//
dwSts = RegSetValueEx(hKey, "SigInFile", 0L,
REG_DWORD, (LPBYTE)&dwVal,
sizeof(DWORD));
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
else
{
//
// Place signature
//
dwSts = RegSetValueEx(hKey, "Signature", 0L,
REG_BINARY, pbSig, cbSig);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
//
// Create or open in local machine for provider type:
//
cbTypePath = TYPEPATH_LEN + strlen(pszType) + 1;
pszTypePath = _nt_malloc(cbTypePath);
if (NULL == pszTypePath)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
strcpy((LPSTR)pszTypePath, TYPEPATH);
strcat((LPSTR)pszTypePath, pszType);
dwSts = RegCreateKeyEx(HKEY_LOCAL_MACHINE,
(LPSTR)pszTypePath,
0L, "", REG_OPTION_NON_VOLATILE,
KEY_ALL_ACCESS, NULL, &hTypeKey,
&dwIgn);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
if ((REG_CREATED_NEW_KEY == dwIgn) || fMakeDefault)
{
dwSts = RegSetValueEx(hTypeKey, "Name", 0L,
REG_SZ, (LPBYTE)pszProvider,
strlen(pszProvider) + 1);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = RegSetValueEx(hTypeKey, "TypeName", 0L,
REG_SZ, (LPBYTE)pszTypeName,
strlen(pszTypeName) + 1);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
}
dwReturn = ERROR_SUCCESS;
ErrorExit:
if (hKey)
RegCloseKey(hKey);
if (hTypeKey)
RegCloseKey(hTypeKey);
if (pszProv)
_nt_free(pszProv, 0);
if (pszTypePath)
_nt_free(pszTypePath, 0);
return dwReturn;
}
// See if a handle of the given type is in the list.
// If it is, return the data that the item holds.
void *
NTLCheckList(
HNTAG hThisThing,
BYTE bTypeValue)
{
HTABLE *pTable;
pTable = (HTABLE*)(hThisThing ^ HANDLE_MASK);
if ((BYTE)pTable->dwType != bTypeValue)
return NULL;
return (void*)pTable->pItem;
}
// Find & validate the passed list item against the user and type.
DWORD
NTLValidate(
HNTAG hItem,
HCRYPTPROV hUID,
BYTE bTypeValue,
LPVOID *ppvRet)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
void *pTmpVal;
// check to see if the key is in the key list
pTmpVal = NTLCheckList(hItem, bTypeValue);
if (pTmpVal == NULL)
{
dwReturn = (DWORD)NTE_FAIL; // converted by caller
goto ErrorExit;
}
// check to make sure there is a key value
if ((bTypeValue == KEY_HANDLE) &&
(((PNTAGKeyList)pTmpVal)->pKeyValue == NULL))
{
ASSERT(((PNTAGKeyList)pTmpVal)->cbKeyLen == 0);
dwReturn = (DWORD)NTE_BAD_KEY;
goto ErrorExit;
}
// make sure the UIDs are the same
if (((PNTAGKeyList)pTmpVal)->hUID != hUID)
{
dwReturn = (DWORD)NTE_BAD_UID;
goto ErrorExit;
}
*ppvRet = pTmpVal;
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
// Make a new list item of the given type, and assign the data to it.
DWORD
NTLMakeItem(
HNTAG *phItem,
BYTE bTypeValue,
void *NewData)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
HTABLE *NewMember;
NewMember = (HTABLE *)_nt_malloc(sizeof(HTABLE));
if (NULL == NewMember)
{
dwReturn = ERROR_NOT_ENOUGH_MEMORY;
goto ErrorExit;
}
NewMember->pItem = NewData;
NewMember->dwType = bTypeValue;
*phItem = (HNTAG)((HNTAG)NewMember ^ HANDLE_MASK);
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
// Remove the handle. Assumes that any memory used by the handle data has
// been freed.
void
NTLDelete(
HNTAG hItem)
{
HTABLE *pTable;
pTable = (HTABLE*)(hItem ^ HANDLE_MASK);
_nt_free(pTable, sizeof(HTABLE));
}
/****************************************************************/
/* FreeUserRec frees the dynamically allocated memory for the */
/* appropriate fields of the UserRec structure. */
/* */
/* MTS: we assume that pUser has only one reference (no */
/* MTS: multiple logon's for the same user name). */
/****************************************************************/
void
FreeUserRec(
PNTAGUserList pUser)
{
if (pUser != NULL)
{
// No need to zero lengths, since entire struct is going away
if (pUser->pExchPrivKey)
{
memnuke(pUser->pExchPrivKey, pUser->ExchPrivLen);
_nt_free (pUser->pExchPrivKey, 0);
}
if (pUser->pSigPrivKey)
{
memnuke(pUser->pSigPrivKey, pUser->SigPrivLen);
_nt_free (pUser->pSigPrivKey, 0);
}
if (pUser->pUser)
{
_nt_free(pUser->pUser, 0);
}
if (NULL != pUser->szProviderName)
{
_nt_free(pUser->szProviderName, 0);
}
if (pUser->pCachePW)
{
memnuke(pUser->pCachePW, STORAGE_RC4_KEYLEN);
_nt_free(pUser->pCachePW, 0);
}
if (pUser->pPStore)
{
FreePSInfo(pUser->pPStore);
}
#ifdef USE_SGC
// free the SGC key info
SGCDeletePubKeyValues(&pUser->pbSGCKeyMod,
&pUser->cbSGCKeyMod,
&pUser->dwSGCKeyExpo);
#endif
FreeContainerInfo(&pUser->ContInfo);
FreeOffloadInfo(pUser->pOffloadInfo);
DeleteCriticalSection(&pUser->CritSec);
ZeroMemory(pUser, sizeof(NTAGUserList));
_nt_free (pUser, 0);
}
}
// RSA private key in PRIVATEKEYBLOB format
static BYTE l_rgbRSAPriv[] =
{
0x52, 0x53, 0x41, 0x32, 0x48, 0x00, 0x00, 0x00,
0x00, 0x02, 0x00, 0x00, 0x3F, 0x00, 0x00, 0x00,
0x01, 0x00, 0x01, 0x00, 0xEF, 0x4C, 0x0D, 0x34,
0xCF, 0x44, 0x0F, 0xB1, 0x73, 0xAC, 0xD4, 0x9B,
0xBE, 0xCC, 0x2D, 0x11, 0x2A, 0x2B, 0xBD, 0x21,
0x04, 0x8E, 0xAC, 0xAD, 0xD5, 0xFC, 0xD2, 0x50,
0x14, 0x35, 0x1B, 0x43, 0x15, 0x62, 0x67, 0x8F,
0x5E, 0x00, 0xB9, 0x25, 0x1B, 0xE2, 0x4F, 0xBE,
0xA1, 0x50, 0xA1, 0x44, 0x3B, 0x17, 0xD8, 0x91,
0xF5, 0x28, 0xF9, 0xFA, 0xAE, 0xE7, 0xC0, 0xFD,
0xB9, 0xCD, 0x76, 0x4F, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0xE9, 0xBB, 0x38, 0x52,
0xD9, 0x0D, 0x56, 0xD7, 0x36, 0xBA, 0xDC, 0xE8,
0xB5, 0x57, 0x56, 0x13, 0x1A, 0x3A, 0x43, 0x30,
0xDE, 0x7D, 0x76, 0x6F, 0xBB, 0x71, 0x3B, 0x0A,
0x92, 0xBA, 0x60, 0x94, 0x00, 0x00, 0x00, 0x00,
0x17, 0x33, 0x3D, 0xB5, 0xEF, 0xD8, 0x2B, 0xDE,
0xCD, 0xA6, 0x6A, 0x94, 0x17, 0xC3, 0x57, 0xE9,
0x2E, 0x1C, 0x9F, 0x35, 0xDA, 0xA4, 0xBD, 0x02,
0x5B, 0x9D, 0xD1, 0x38, 0x4C, 0xF2, 0x19, 0x89,
0x00, 0x00, 0x00, 0x00, 0x89, 0x21, 0xCB, 0x3F,
0x0C, 0xA7, 0x71, 0xBC, 0xF6, 0xA1, 0x87, 0xDF,
0x00, 0x2D, 0x27, 0x64, 0x4A, 0xD4, 0x93, 0x9F,
0x58, 0x93, 0x4B, 0x83, 0x1E, 0xAB, 0xD8, 0x5D,
0xBC, 0x0E, 0x58, 0x03, 0x00, 0x00, 0x00, 0x00,
0xAB, 0x09, 0xD7, 0x21, 0xBA, 0x6F, 0x55, 0x08,
0x12, 0xEE, 0x5B, 0x47, 0x6B, 0x9F, 0x3F, 0xD3,
0xFC, 0xEA, 0xB5, 0x25, 0x19, 0xB7, 0x9E, 0xBD,
0xDF, 0x6F, 0x7F, 0x96, 0x00, 0x88, 0xC6, 0x7B,
0x00, 0x00, 0x00, 0x00, 0x95, 0x0B, 0x23, 0xC5,
0x72, 0x98, 0x9D, 0x49, 0x7A, 0x46, 0x4E, 0xE1,
0xE6, 0x2F, 0xC6, 0x63, 0x21, 0x8F, 0x66, 0xDC,
0x9B, 0xCC, 0xE2, 0x27, 0x03, 0x27, 0x85, 0xF0,
0x3A, 0x02, 0xFB, 0x40, 0x00, 0x00, 0x00, 0x00,
0x51, 0x74, 0xF6, 0xF2, 0x23, 0xEC, 0xA1, 0x76,
0x55, 0x58, 0x07, 0x71, 0xBF, 0x7F, 0x0A, 0x1E,
0x6B, 0x48, 0x48, 0xBB, 0x92, 0xB6, 0x2A, 0xB1,
0x07, 0xA4, 0x21, 0xD1, 0xC6, 0xCB, 0x5F, 0x40,
0xCE, 0xDD, 0xBA, 0xDB, 0xFC, 0x17, 0xFB, 0xA7,
0xBD, 0xE1, 0xF4, 0x63, 0xD8, 0x9E, 0x89, 0xE2,
0xDD, 0x7A, 0xEC, 0x11, 0xD6, 0xA9, 0x9C, 0xBA,
0xC7, 0x5E, 0x35, 0x96, 0xA6, 0x6F, 0x7F, 0x2C,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
};
// RSA private key in PUBLICKEYBLOB format
static BYTE l_rgbRSAPub[] =
{
0x52, 0x53, 0x41, 0x31, 0x48, 0x00, 0x00, 0x00,
0x00, 0x02, 0x00, 0x00, 0x3F, 0x00, 0x00, 0x00,
0x01, 0x00, 0x01, 0x00, 0xEF, 0x4C, 0x0D, 0x34,
0xCF, 0x44, 0x0F, 0xB1, 0x73, 0xAC, 0xD4, 0x9B,
0xBE, 0xCC, 0x2D, 0x11, 0x2A, 0x2B, 0xBD, 0x21,
0x04, 0x8E, 0xAC, 0xAD, 0xD5, 0xFC, 0xD2, 0x50,
0x14, 0x35, 0x1B, 0x43, 0x15, 0x62, 0x67, 0x8F,
0x5E, 0x00, 0xB9, 0x25, 0x1B, 0xE2, 0x4F, 0xBE,
0xA1, 0x50, 0xA1, 0x44, 0x3B, 0x17, 0xD8, 0x91,
0xF5, 0x28, 0xF9, 0xFA, 0xAE, 0xE7, 0xC0, 0xFD,
0xB9, 0xCD, 0x76, 0x4F, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00
};
// known result of an MD5 hash on the above buffer
static BYTE l_rgbKnownMD5[] =
{
0xb8, 0x2f, 0x6b, 0x11, 0x31, 0xc8, 0xec, 0xf4,
0xfe, 0x0b, 0xf0, 0x6d, 0x2a, 0xda, 0x3f, 0xc3
};
// known result of an SHA-1 hash on the above buffer
static BYTE l_rgbKnownSHA1[] =
{
0xe8, 0x96, 0x82, 0x85, 0xeb, 0xae, 0x01, 0x14,
0x73, 0xf9, 0x08, 0x45, 0xc0, 0x6a, 0x6d, 0x3e,
0x69, 0x80, 0x6a, 0x0c
};
// known key, plaintext, and ciphertext for RC4
static BYTE l_rgbRC4Key[] = {0x61, 0x8a, 0x63, 0xd2, 0xfb};
static BYTE l_rgbRC4KnownPlaintext[] = {0xDC, 0xEE, 0x4C, 0xF9, 0x2C};
static BYTE l_rgbRC4KnownCiphertext[] = {0xF1, 0x38, 0x29, 0xC9, 0xDE};
// IV for all block ciphers
BYTE l_rgbIV[] = {0x12, 0x34, 0x56, 0x78, 0x90, 0xAB, 0xCD, 0xEF};
// known key, plaintext, and ciphertext for RC2
BYTE l_rgbRC2Key[] = {0x59, 0x45, 0x9a, 0xf9, 0x27, 0x84, 0x74, 0xCA};
BYTE l_rgbRC2KnownPlaintext[] = {0xD5, 0x58, 0x75, 0x12, 0xCE, 0xEF, 0x77, 0x93};
BYTE l_rgbRC2KnownCiphertext[] = {0x7b, 0x98, 0xdf, 0x9d, 0xa2, 0xdc, 0x7b, 0x7a};
BYTE l_rgbRC2CBCCiphertext[] = {0x9d, 0x93, 0x8e, 0xf6, 0x7c, 0x01, 0x5e, 0xeb};
// known key, plaintext, and ciphertext for DES40 (CALG_CYLINK_MEK)
BYTE l_rgbDES40Key[] = {0x01, 0x23, 0x04, 0x67, 0x08, 0xab, 0x0d, 0xef};
BYTE l_rgbDES40KnownPlaintext[] = {0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74};
BYTE l_rgbDES40KnownCiphertext[] = {0xac, 0x97, 0x4d, 0xd9, 0x02, 0x13, 0x88, 0x2c};
BYTE l_rgbDES40CBCCiphertext[] = {0x47, 0xdc, 0xf0, 0x13, 0x7f, 0xa5, 0xd6, 0x32};
// known key, plaintext, and ciphertext for DES
BYTE l_rgbDESKey[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef};
BYTE l_rgbDESKnownPlaintext[] = {0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74};
BYTE l_rgbDESKnownCiphertext[] = {0x3F, 0xA4, 0x0E, 0x8A, 0x98, 0x4D, 0x48, 0x15};
BYTE l_rgbDESCBCCiphertext[] = {0xE5, 0xC7, 0xCD, 0xDE, 0x87, 0x2B, 0xF2, 0x7C};
// known key, plaintext, and ciphertext for 3 key 3DES
BYTE l_rgb3DESKey[] =
{
0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0x01,
0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0x01, 0x23
};
BYTE l_rgb3DESKnownPlaintext[] = {0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74};
BYTE l_rgb3DESKnownCiphertext[] = {0x31, 0x4F, 0x83, 0x27, 0xFA, 0x7A, 0x09, 0xA8};
BYTE l_rgb3DESCBCCiphertext[] = {0xf3, 0xc0, 0xff, 0x02, 0x6c, 0x02, 0x30, 0x89};
// known key, plaintext, and ciphertext for 2 key 3DES
BYTE l_rgb3DES112Key[] =
{
0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0x01
};
BYTE l_rgb3DES112KnownPlaintext[] = {0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74};
BYTE l_rgb3DES112KnownCiphertext[] = {0xb7, 0x83, 0x57, 0x79, 0xee, 0x26, 0xac, 0xb7};
BYTE l_rgb3DES112CBCCiphertext[] = {0x13, 0x4b, 0x98, 0xf8, 0xee, 0xb3, 0xf6, 0x07};
//
// AES vectors are from NIST web site
//
// known key, plaintext, and ciphertext for 128 bit AES
BYTE l_rgbAES128Key[] =
{
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
};
BYTE l_rgbAES128KnownPlaintext[] =
{
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
};
BYTE l_rgbAES128KnownCiphertext[] =
{
0x0A, 0x94, 0x0B, 0xB5, 0x41, 0x6E, 0xF0, 0x45,
0xF1, 0xC3, 0x94, 0x58, 0xC6, 0x53, 0xEA, 0x5A
};
// known key, plaintext, and ciphertext for 192 bit AES
BYTE l_rgbAES192Key[] =
{
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17
};
BYTE l_rgbAES192KnownPlaintext[] =
{
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
};
BYTE l_rgbAES192KnownCiphertext[] =
{
0x00, 0x60, 0xBF, 0xFE, 0x46, 0x83, 0x4B, 0xB8,
0xDA, 0x5C, 0xF9, 0xA6, 0x1F, 0xF2, 0x20, 0xAE
};
// known key, plaintext, and ciphertext for 256 bit AES
BYTE l_rgbAES256Key[] =
{
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
};
BYTE l_rgbAES256KnownPlaintext[] =
{
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
};
BYTE l_rgbAES256KnownCiphertext[] =
{
0x5A, 0x6E, 0x04, 0x57, 0x08, 0xFB, 0x71, 0x96,
0xF0, 0x2E, 0x55, 0x3D, 0x02, 0xC3, 0xA6, 0x92
};
// **********************************************************************
// AlgorithmCheck performs known answer tests using the algorithms
// supported by the provider.
// **********************************************************************
/*static*/ DWORD
AlgorithmCheck(
void)
{
DWORD dwReturn = ERROR_INTERNAL_ERROR;
BYTE rgbMD5[MD5DIGESTLEN];
BYTE rgbSHA1[A_SHA_DIGEST_LEN];
DWORD dwSts;
memset(rgbMD5, 0, sizeof(rgbMD5));
memset(rgbSHA1, 0, sizeof(rgbSHA1));
// check if RSA is working properly
dwSts = EncryptAndDecryptWithRSAKey(l_rgbRSAPub, l_rgbRSAPriv, TRUE, TRUE);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// check if RSA is working properly
dwSts = EncryptAndDecryptWithRSAKey(l_rgbRSAPub, l_rgbRSAPriv, FALSE, TRUE);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
#ifdef CSP_USE_MD5
// known answer test with MD5 (this function is found in hash.c)
if (!TestMD5((LPBYTE)"HashThis", 8, rgbMD5))
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
if (memcmp(rgbMD5, l_rgbKnownMD5, sizeof(rgbMD5)))
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
#endif // CSP_USE_MD5
#ifdef CSP_USE_SHA1
// known answer test with SHA-1 (this function is found in hash.c)
if (!TestSHA1((LPBYTE)"HashThis", 8, rgbSHA1))
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
if (memcmp(rgbSHA1, l_rgbKnownSHA1, sizeof(rgbSHA1)))
{
dwReturn = (DWORD)NTE_FAIL;
goto ErrorExit;
}
#endif // CSP_USE_SHA1
#ifdef CSP_USE_RC4
// known answer test with RC4
dwSts = TestSymmetricAlgorithm(CALG_RC4,
l_rgbRC4Key,
sizeof(l_rgbRC4Key),
l_rgbRC4KnownPlaintext,
sizeof(l_rgbRC4KnownPlaintext),
l_rgbRC4KnownCiphertext, NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
#endif // CSP_USE_RC4
#ifdef CSP_USE_RC2
// known answer test with RC2 - ECB
dwSts = TestSymmetricAlgorithm(CALG_RC2,
l_rgbRC2Key,
sizeof(l_rgbRC2Key),
l_rgbRC2KnownPlaintext,
sizeof(l_rgbRC2KnownPlaintext),
l_rgbRC2KnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// known answer test with RC2 - CBC
dwSts = TestSymmetricAlgorithm(CALG_RC2,
l_rgbRC2Key,
sizeof(l_rgbRC2Key),
l_rgbRC2KnownPlaintext,
sizeof(l_rgbRC2KnownPlaintext),
l_rgbRC2CBCCiphertext,
l_rgbIV);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
#endif // CSP_USE_RC2
#ifdef CSP_USE_DES
// known answer test with DES - ECB
dwSts = TestSymmetricAlgorithm(CALG_DES,
l_rgbDESKey,
sizeof(l_rgbDESKey),
l_rgbDESKnownPlaintext,
sizeof(l_rgbDESKnownPlaintext),
l_rgbDESKnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// known answer test with DES - CBC
dwSts = TestSymmetricAlgorithm(CALG_DES,
l_rgbDESKey,
sizeof(l_rgbDESKey),
l_rgbDESKnownPlaintext,
sizeof(l_rgbDESKnownPlaintext),
l_rgbDESCBCCiphertext,
l_rgbIV);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
#endif // CSP_USE_DES
#ifdef CSP_USE_3DES
// known answer test with 3DES - ECB
dwSts = TestSymmetricAlgorithm(CALG_3DES,
l_rgb3DESKey,
sizeof(l_rgb3DESKey),
l_rgb3DESKnownPlaintext,
sizeof(l_rgb3DESKnownPlaintext),
l_rgb3DESKnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// known answer test with 3DES - CBC
dwSts = TestSymmetricAlgorithm(CALG_3DES,
l_rgb3DESKey,
sizeof(l_rgb3DESKey),
l_rgb3DESKnownPlaintext,
sizeof(l_rgb3DESKnownPlaintext),
l_rgb3DESCBCCiphertext,
l_rgbIV);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// known answer test with 3DES 112 - ECB
dwSts = TestSymmetricAlgorithm(CALG_3DES_112,
l_rgb3DES112Key,
sizeof(l_rgb3DES112Key),
l_rgb3DES112KnownPlaintext,
sizeof(l_rgb3DES112KnownPlaintext),
l_rgb3DES112KnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
dwSts = TestSymmetricAlgorithm(CALG_3DES_112,
l_rgb3DES112Key,
sizeof(l_rgb3DES112Key),
l_rgb3DES112KnownPlaintext,
sizeof(l_rgb3DES112KnownPlaintext),
l_rgb3DES112CBCCiphertext,
l_rgbIV);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
#endif // CSP_USE_3DES
#ifdef CSP_USE_AES
// known answer test with AES 128 - ECB
dwSts = TestSymmetricAlgorithm(CALG_AES_128,
l_rgbAES128Key,
sizeof(l_rgbAES128Key),
l_rgbAES128KnownPlaintext,
sizeof(l_rgbAES128KnownPlaintext),
l_rgbAES128KnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// known answer test with AES 192 - ECB
dwSts = TestSymmetricAlgorithm(CALG_AES_192,
l_rgbAES192Key,
sizeof(l_rgbAES192Key),
l_rgbAES192KnownPlaintext,
sizeof(l_rgbAES192KnownPlaintext),
l_rgbAES192KnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
// known answer test with AES 256 - ECB
dwSts = TestSymmetricAlgorithm(CALG_AES_256,
l_rgbAES256Key,
sizeof(l_rgbAES256Key),
l_rgbAES256KnownPlaintext,
sizeof(l_rgbAES256KnownPlaintext),
l_rgbAES256KnownCiphertext,
NULL);
if (ERROR_SUCCESS != dwSts)
{
dwReturn = dwSts;
goto ErrorExit;
}
#endif
dwReturn = ERROR_SUCCESS;
ErrorExit:
return dwReturn;
}
BOOL WINAPI
DllInitialize(
IN PVOID hmod,
IN ULONG Reason,
IN PCONTEXT Context) // Unused parameter
{
g_hInstance = (HINSTANCE) hmod;
if (Reason == DLL_PROCESS_ATTACH)
{
DWORD dwLen;
DisableThreadLibraryCalls(hmod);
// Get our image name.
dwLen = GetModuleFileName(hmod, l_szImagePath,
sizeof(l_szImagePath) / sizeof(CHAR));
if (0 == dwLen)
return FALSE;
// load strings from csprc.dll
if (ERROR_SUCCESS != LoadStrings())
return FALSE;
// Verify this image hasn't been modified.
if (ERROR_SUCCESS != SelfMACCheck(l_szImagePath))
return FALSE;
// do a start up check on all supported algorithms to make sure they
// are working correctly
if (ERROR_SUCCESS != AlgorithmCheck())
return FALSE;
}
else if (Reason == DLL_PROCESS_DETACH)
{
// free the strings loaded from csprc.dll
UnloadStrings();
}
return TRUE;
}
STDAPI
DllRegisterServer(
void)
{
return ERROR_SUCCESS;
}
STDAPI
DllUnregisterServer(
void)
{
return S_OK;
}
//
// Delayload stubs
//
BOOL RsaenhGetProfileTypeStub(
DWORD dwFlags)
{
return FALSE;
}
HRESULT RsaenhSHGetFolderPathWStub(
HWND hwndOwner,
int nFolder,
HANDLE hToken,
DWORD dwFlags,
LPWSTR pwszPath)
{
return E_FAIL;
}
void RsaenhCoTaskMemFreeStub(
void *pv)
{
return;
}
BOOL WINAPI RsaenhCryptUnprotectDataStub(
DATA_BLOB *pDataIn,
LPWSTR *ppszDataDescr,
DATA_BLOB *pOptionalEntropy,
PVOID pvReserved,
CRYPTPROTECT_PROMPTSTRUCT *pPromptStruct,
DWORD dwFlags,
DATA_BLOB *pDataOut)
{
return FALSE;
}
BOOL WINAPI RsaenhCryptProtectDataStub(
DATA_BLOB *pDataIn,
LPCWSTR szDataDescr,
DATA_BLOB *pOptionalEntropy,
PVOID pvReserved,
CRYPTPROTECT_PROMPTSTRUCT *pPromptStruct,
DWORD dwFlags,
DATA_BLOB *pDataOut)
{
return FALSE;
}
RPC_STATUS RPC_ENTRY RsaenhUuidCreateStub(
UUID *Uuid)
{
return E_FAIL;
}
RPC_STATUS RPC_ENTRY RsaenhUuidToStringAStub(
UUID *Uuid,
unsigned char **StringUuid)
{
return E_FAIL;
}
RPC_STATUS RPC_ENTRY RsaenhRpcStringFreeAStub(
unsigned char **String)
{
return E_FAIL;
}
HRESULT __stdcall RsaenhPStoreCreateInstance(
IPStore __RPC_FAR *__RPC_FAR *ppProvider,
PST_PROVIDERID __RPC_FAR *pProviderID,
void __RPC_FAR *pReserved,
DWORD dwFlags)
{
return E_FAIL;
}
//
// Delayload failure and notification hook
//
BOOL RsaenhLookupModule(LPCSTR pszDll)
{
unsigned u;
for (u = 0; u < g_cRsaenhDelayLoadStubs; u++) {
if (0 == _stricmp(pszDll, g_RsaenhDelayLoadStubs[u].pszDll))
return TRUE;
}
return FALSE;
}
FARPROC RsaenhLookupExport(DelayLoadProc *pdlp)
{
unsigned u;
FARPROC fpResult = NULL;
if (! pdlp->fImportByName)
goto Return;
// could alphabetize and use binary search instead
for (u = 0; u < g_cRsaenhDelayLoadStubs; u++) {
if (0 == _stricmp(pdlp->szProcName, g_RsaenhDelayLoadStubs[u].pszExport)) {
fpResult = g_RsaenhDelayLoadStubs[u].fpStub;
goto Return;
}
}
Return:
return fpResult;
}
FARPROC WINAPI RsaenhDelayLoadHook(unsigned uReason, PDelayLoadInfo pdli)
{
FARPROC fpResult = NULL;
switch (uReason) {
case dliFailLoadLib:
if (RsaenhLookupModule(pdli->szDll))
fpResult = (FARPROC) -1;
break;
case dliNotePreGetProcAddress:
if ((HINSTANCE) -1 == pdli->hmodCur) {
SetLastError(ERROR_MOD_NOT_FOUND);
fpResult = RsaenhLookupExport(&pdli->dlp);
}
break;
case dliFailGetProc:
if ((HINSTANCE) -1 == pdli->hmodCur) {
SetLastError(ERROR_PROC_NOT_FOUND);
fpResult = RsaenhLookupExport(&pdli->dlp);
}
break;
}
return fpResult;
}
PfnDliHook __pfnDliFailureHook2 = RsaenhDelayLoadHook;
PfnDliHook __pfnDliNotifyHook = RsaenhDelayLoadHook;