2021-12-07 02:07:57 +03:00
|
|
|
/**
|
|
|
|
* WinPR: Windows Portable Runtime
|
|
|
|
* NCrypt library
|
|
|
|
*
|
|
|
|
* Copyright 2021 David Fort <contact@hardening-consulting.com>
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <winpr/assert.h>
|
|
|
|
#include <winpr/ncrypt.h>
|
|
|
|
|
|
|
|
#ifndef _WIN32
|
|
|
|
|
|
|
|
#include <winpr/print.h>
|
|
|
|
#include "../log.h"
|
|
|
|
|
|
|
|
#include "ncrypt.h"
|
|
|
|
|
|
|
|
#define TAG WINPR_TAG("ncrypt")
|
|
|
|
|
|
|
|
const static char NCRYPT_MAGIC[6] = { 'N', 'C', 'R', 'Y', 'P', 'T' };
|
|
|
|
|
|
|
|
SECURITY_STATUS checkNCryptHandle(NCRYPT_HANDLE handle, NCryptHandleType matchType)
|
|
|
|
{
|
|
|
|
if (!handle)
|
2023-06-07 10:31:18 +03:00
|
|
|
{
|
|
|
|
WLog_VRB(TAG, "invalid handle '%p'", handle);
|
2021-12-07 02:07:57 +03:00
|
|
|
return ERROR_INVALID_PARAMETER;
|
2023-06-07 10:31:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
const NCryptBaseHandle* base = (NCryptBaseHandle*)handle;
|
|
|
|
if (memcmp(base->magic, NCRYPT_MAGIC, ARRAYSIZE(NCRYPT_MAGIC)) != 0)
|
|
|
|
{
|
|
|
|
char magic1[ARRAYSIZE(NCRYPT_MAGIC) + 1] = { 0 };
|
|
|
|
char magic2[ARRAYSIZE(NCRYPT_MAGIC) + 1] = { 0 };
|
|
|
|
|
|
|
|
memcpy(magic1, base->magic, ARRAYSIZE(NCRYPT_MAGIC));
|
|
|
|
memcpy(magic2, NCRYPT_MAGIC, ARRAYSIZE(NCRYPT_MAGIC));
|
2021-12-07 02:07:57 +03:00
|
|
|
|
2023-06-07 10:31:18 +03:00
|
|
|
WLog_VRB(TAG, "handle '%p' invalid magic '%s' instead of '%s'", base, magic1, magic2);
|
2021-12-07 02:07:57 +03:00
|
|
|
return ERROR_INVALID_PARAMETER;
|
2023-06-07 10:31:18 +03:00
|
|
|
}
|
2021-12-07 02:07:57 +03:00
|
|
|
|
|
|
|
switch (base->type)
|
|
|
|
{
|
|
|
|
case WINPR_NCRYPT_PROVIDER:
|
|
|
|
case WINPR_NCRYPT_KEY:
|
|
|
|
break;
|
|
|
|
default:
|
2023-06-07 10:31:18 +03:00
|
|
|
WLog_VRB(TAG, "handle '%p' invalid type %d", base, base->type);
|
2021-12-07 02:07:57 +03:00
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
2023-06-07 10:31:18 +03:00
|
|
|
if ((matchType != WINPR_NCRYPT_INVALID) && (base->type != matchType))
|
|
|
|
{
|
|
|
|
WLog_VRB(TAG, "handle '%p' invalid type %d, expected %d", base, base->type, matchType);
|
2021-12-07 02:07:57 +03:00
|
|
|
return ERROR_INVALID_PARAMETER;
|
2023-06-07 10:31:18 +03:00
|
|
|
}
|
2021-12-07 02:07:57 +03:00
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
void* ncrypt_new_handle(NCryptHandleType kind, size_t len, NCryptGetPropertyFn getProp,
|
|
|
|
NCryptReleaseFn dtor)
|
|
|
|
{
|
|
|
|
NCryptBaseHandle* ret = calloc(1, len);
|
|
|
|
if (!ret)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
memcpy(ret->magic, NCRYPT_MAGIC, sizeof(ret->magic));
|
|
|
|
ret->type = kind;
|
|
|
|
ret->getPropertyFn = getProp;
|
|
|
|
ret->releaseFn = dtor;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-02-14 15:05:59 +03:00
|
|
|
SECURITY_STATUS winpr_NCryptDefault_dtor(NCRYPT_HANDLE handle)
|
2021-12-07 02:07:57 +03:00
|
|
|
{
|
2022-02-14 15:05:59 +03:00
|
|
|
NCryptBaseHandle* h = (NCryptBaseHandle*)handle;
|
|
|
|
WINPR_ASSERT(h);
|
|
|
|
|
2021-12-07 02:07:57 +03:00
|
|
|
memset(h->magic, 0, sizeof(h->magic));
|
|
|
|
h->type = WINPR_NCRYPT_INVALID;
|
|
|
|
h->releaseFn = NULL;
|
|
|
|
free(h);
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2022-01-06 11:29:20 +03:00
|
|
|
SECURITY_STATUS NCryptEnumStorageProviders(DWORD* wProviderCount,
|
|
|
|
NCryptProviderName** ppProviderList, DWORD dwFlags)
|
|
|
|
{
|
2024-01-23 18:49:54 +03:00
|
|
|
NCryptProviderName* ret = NULL;
|
2022-01-06 11:29:20 +03:00
|
|
|
size_t stringAllocSize = 0;
|
2022-02-02 01:23:34 +03:00
|
|
|
#ifdef WITH_PKCS11
|
2024-01-23 18:49:54 +03:00
|
|
|
LPWSTR strPtr = NULL;
|
2022-02-02 01:23:34 +03:00
|
|
|
static const WCHAR emptyComment[] = { 0 };
|
2024-01-23 18:49:54 +03:00
|
|
|
size_t copyAmount = 0;
|
2022-02-02 01:23:34 +03:00
|
|
|
#endif
|
2022-01-06 11:29:20 +03:00
|
|
|
|
|
|
|
*wProviderCount = 0;
|
|
|
|
*ppProviderList = NULL;
|
|
|
|
|
|
|
|
#ifdef WITH_PKCS11
|
|
|
|
*wProviderCount += 1;
|
|
|
|
stringAllocSize += (_wcslen(MS_SCARD_PROV) + 1) * 2;
|
|
|
|
stringAllocSize += sizeof(emptyComment);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (!*wProviderCount)
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
|
|
|
|
ret = malloc(*wProviderCount * sizeof(NCryptProviderName) + stringAllocSize);
|
|
|
|
if (!ret)
|
|
|
|
return NTE_NO_MEMORY;
|
|
|
|
|
|
|
|
#ifdef WITH_PKCS11
|
2022-02-02 01:23:34 +03:00
|
|
|
strPtr = (LPWSTR)(ret + *wProviderCount);
|
|
|
|
|
2022-01-06 11:29:20 +03:00
|
|
|
ret->pszName = strPtr;
|
|
|
|
copyAmount = (_wcslen(MS_SCARD_PROV) + 1) * 2;
|
|
|
|
memcpy(strPtr, MS_SCARD_PROV, copyAmount);
|
|
|
|
strPtr += copyAmount / 2;
|
|
|
|
|
|
|
|
ret->pszComment = strPtr;
|
|
|
|
copyAmount = sizeof(emptyComment);
|
|
|
|
memcpy(strPtr, emptyComment, copyAmount);
|
|
|
|
|
|
|
|
*ppProviderList = ret;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2021-12-07 02:07:57 +03:00
|
|
|
SECURITY_STATUS NCryptOpenStorageProvider(NCRYPT_PROV_HANDLE* phProvider, LPCWSTR pszProviderName,
|
|
|
|
DWORD dwFlags)
|
|
|
|
{
|
2023-06-07 10:31:18 +03:00
|
|
|
return winpr_NCryptOpenStorageProviderEx(phProvider, pszProviderName, dwFlags, NULL);
|
2021-12-07 02:07:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_STATUS winpr_NCryptOpenStorageProviderEx(NCRYPT_PROV_HANDLE* phProvider,
|
|
|
|
LPCWSTR pszProviderName, DWORD dwFlags,
|
|
|
|
LPCSTR* modulePaths)
|
|
|
|
{
|
2023-06-07 10:31:18 +03:00
|
|
|
#if defined(WITH_PKCS11)
|
|
|
|
if (pszProviderName && ((_wcscmp(pszProviderName, MS_SMART_CARD_KEY_STORAGE_PROVIDER) == 0) ||
|
|
|
|
(_wcscmp(pszProviderName, MS_SCARD_PROV) == 0)))
|
2021-12-07 02:07:57 +03:00
|
|
|
return NCryptOpenP11StorageProviderEx(phProvider, pszProviderName, dwFlags, modulePaths);
|
2023-06-07 10:31:18 +03:00
|
|
|
|
|
|
|
char buffer[128] = { 0 };
|
|
|
|
ConvertWCharToUtf8(pszProviderName, buffer, sizeof(buffer));
|
|
|
|
WLog_WARN(TAG, "provider '%s' not supported", buffer);
|
2021-12-07 02:07:57 +03:00
|
|
|
return ERROR_NOT_SUPPORTED;
|
2023-06-07 10:31:18 +03:00
|
|
|
#else
|
|
|
|
WLog_WARN(TAG, "rebuild with -DWITH_PKCS11=ON to enable smartcard logon support");
|
|
|
|
return ERROR_NOT_SUPPORTED;
|
|
|
|
#endif
|
2021-12-07 02:07:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_STATUS NCryptEnumKeys(NCRYPT_PROV_HANDLE hProvider, LPCWSTR pszScope,
|
|
|
|
NCryptKeyName** ppKeyName, PVOID* ppEnumState, DWORD dwFlags)
|
|
|
|
{
|
2024-01-23 18:49:54 +03:00
|
|
|
SECURITY_STATUS ret = 0;
|
2021-12-07 02:07:57 +03:00
|
|
|
NCryptBaseProvider* provider = (NCryptBaseProvider*)hProvider;
|
|
|
|
|
|
|
|
ret = checkNCryptHandle((NCRYPT_HANDLE)hProvider, WINPR_NCRYPT_PROVIDER);
|
|
|
|
if (ret != ERROR_SUCCESS)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
return provider->enumKeysFn(hProvider, pszScope, ppKeyName, ppEnumState, dwFlags);
|
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_STATUS NCryptOpenKey(NCRYPT_PROV_HANDLE hProvider, NCRYPT_KEY_HANDLE* phKey,
|
|
|
|
LPCWSTR pszKeyName, DWORD dwLegacyKeySpec, DWORD dwFlags)
|
|
|
|
{
|
2024-01-23 18:49:54 +03:00
|
|
|
SECURITY_STATUS ret = 0;
|
2021-12-07 02:07:57 +03:00
|
|
|
NCryptBaseProvider* provider = (NCryptBaseProvider*)hProvider;
|
|
|
|
|
|
|
|
ret = checkNCryptHandle((NCRYPT_HANDLE)hProvider, WINPR_NCRYPT_PROVIDER);
|
|
|
|
if (ret != ERROR_SUCCESS)
|
|
|
|
return ret;
|
|
|
|
if (!phKey || !pszKeyName)
|
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
return provider->openKeyFn(hProvider, phKey, pszKeyName, dwLegacyKeySpec, dwFlags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static NCryptKeyGetPropertyEnum propertyStringToEnum(LPCWSTR pszProperty)
|
|
|
|
{
|
|
|
|
if (_wcscmp(pszProperty, NCRYPT_CERTIFICATE_PROPERTY) == 0)
|
|
|
|
{
|
|
|
|
return NCRYPT_PROPERTY_CERTIFICATE;
|
|
|
|
}
|
2022-01-27 14:04:52 +03:00
|
|
|
else if (_wcscmp(pszProperty, NCRYPT_READER_PROPERTY) == 0)
|
2022-01-10 17:27:10 +03:00
|
|
|
{
|
|
|
|
return NCRYPT_PROPERTY_READER;
|
|
|
|
}
|
2022-01-27 14:04:52 +03:00
|
|
|
else if (_wcscmp(pszProperty, NCRYPT_WINPR_SLOTID) == 0)
|
|
|
|
{
|
|
|
|
return NCRYPT_PROPERTY_SLOTID;
|
|
|
|
}
|
2022-10-16 18:36:20 +03:00
|
|
|
else if (_wcscmp(pszProperty, NCRYPT_NAME_PROPERTY) == 0)
|
|
|
|
{
|
|
|
|
return NCRYPT_PROPERTY_NAME;
|
|
|
|
}
|
2021-12-07 02:07:57 +03:00
|
|
|
|
|
|
|
return NCRYPT_PROPERTY_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_STATUS NCryptGetProperty(NCRYPT_HANDLE hObject, LPCWSTR pszProperty, PBYTE pbOutput,
|
|
|
|
DWORD cbOutput, DWORD* pcbResult, DWORD dwFlags)
|
|
|
|
{
|
2024-01-23 18:49:54 +03:00
|
|
|
NCryptKeyGetPropertyEnum property = NCRYPT_PROPERTY_UNKNOWN;
|
|
|
|
NCryptBaseHandle* base = NULL;
|
2021-12-07 02:07:57 +03:00
|
|
|
|
|
|
|
if (!hObject)
|
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
base = (NCryptBaseHandle*)hObject;
|
|
|
|
if (memcmp(base->magic, NCRYPT_MAGIC, 6) != 0)
|
|
|
|
return ERROR_INVALID_HANDLE;
|
|
|
|
|
|
|
|
property = propertyStringToEnum(pszProperty);
|
|
|
|
if (property == NCRYPT_PROPERTY_UNKNOWN)
|
|
|
|
return ERROR_NOT_SUPPORTED;
|
|
|
|
|
|
|
|
return base->getPropertyFn(hObject, property, pbOutput, cbOutput, pcbResult, dwFlags);
|
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_STATUS NCryptFreeObject(NCRYPT_HANDLE hObject)
|
|
|
|
{
|
2024-01-23 18:49:54 +03:00
|
|
|
NCryptBaseHandle* base = NULL;
|
2021-12-07 02:07:57 +03:00
|
|
|
SECURITY_STATUS ret = checkNCryptHandle((NCRYPT_HANDLE)hObject, WINPR_NCRYPT_INVALID);
|
|
|
|
if (ret != ERROR_SUCCESS)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
base = (NCryptBaseHandle*)hObject;
|
|
|
|
if (base->releaseFn)
|
|
|
|
ret = base->releaseFn(hObject);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_STATUS NCryptFreeBuffer(PVOID pvInput)
|
|
|
|
{
|
|
|
|
if (!pvInput)
|
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
free(pvInput);
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
SECURITY_STATUS winpr_NCryptOpenStorageProviderEx(NCRYPT_PROV_HANDLE* phProvider,
|
|
|
|
LPCWSTR pszProviderName, DWORD dwFlags,
|
|
|
|
LPCSTR* modulePaths)
|
|
|
|
{
|
|
|
|
typedef SECURITY_STATUS (*NCryptOpenStorageProviderFn)(NCRYPT_PROV_HANDLE * phProvider,
|
|
|
|
LPCWSTR pszProviderName, DWORD dwFlags);
|
|
|
|
NCryptOpenStorageProviderFn ncryptOpenStorageProviderFn;
|
|
|
|
SECURITY_STATUS ret;
|
|
|
|
HANDLE lib = LoadLibraryA("ncrypt.dll");
|
|
|
|
if (!lib)
|
|
|
|
return NTE_PROV_DLL_NOT_FOUND;
|
|
|
|
|
|
|
|
ncryptOpenStorageProviderFn =
|
|
|
|
(NCryptOpenStorageProviderFn)GetProcAddress(lib, "NCryptOpenStorageProvider");
|
|
|
|
if (!ncryptOpenStorageProviderFn)
|
|
|
|
{
|
|
|
|
ret = NTE_PROV_DLL_NOT_FOUND;
|
|
|
|
goto out_free_lib;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ncryptOpenStorageProviderFn(phProvider, pszProviderName, dwFlags);
|
|
|
|
|
|
|
|
out_free_lib:
|
|
|
|
FreeLibrary(lib);
|
|
|
|
return ret;
|
|
|
|
}
|
2022-10-13 01:09:52 +03:00
|
|
|
#endif /* _WIN32 */
|
|
|
|
|
|
|
|
const char* winpr_NCryptSecurityStatusError(SECURITY_STATUS status)
|
|
|
|
{
|
2023-10-11 15:55:31 +03:00
|
|
|
#define NTE_CASE(S) \
|
|
|
|
case (SECURITY_STATUS)S: \
|
2022-10-13 01:09:52 +03:00
|
|
|
return #S
|
|
|
|
|
|
|
|
switch (status)
|
|
|
|
{
|
|
|
|
NTE_CASE(ERROR_SUCCESS);
|
|
|
|
NTE_CASE(ERROR_INVALID_PARAMETER);
|
|
|
|
NTE_CASE(ERROR_INVALID_HANDLE);
|
|
|
|
NTE_CASE(ERROR_NOT_SUPPORTED);
|
|
|
|
|
|
|
|
NTE_CASE(NTE_BAD_UID);
|
|
|
|
NTE_CASE(NTE_BAD_HASH);
|
|
|
|
NTE_CASE(NTE_BAD_KEY);
|
|
|
|
NTE_CASE(NTE_BAD_LEN);
|
|
|
|
NTE_CASE(NTE_BAD_DATA);
|
|
|
|
NTE_CASE(NTE_BAD_SIGNATURE);
|
|
|
|
NTE_CASE(NTE_BAD_VER);
|
|
|
|
NTE_CASE(NTE_BAD_ALGID);
|
|
|
|
NTE_CASE(NTE_BAD_FLAGS);
|
|
|
|
NTE_CASE(NTE_BAD_TYPE);
|
|
|
|
NTE_CASE(NTE_BAD_KEY_STATE);
|
|
|
|
NTE_CASE(NTE_BAD_HASH_STATE);
|
|
|
|
NTE_CASE(NTE_NO_KEY);
|
|
|
|
NTE_CASE(NTE_NO_MEMORY);
|
|
|
|
NTE_CASE(NTE_EXISTS);
|
|
|
|
NTE_CASE(NTE_PERM);
|
|
|
|
NTE_CASE(NTE_NOT_FOUND);
|
|
|
|
NTE_CASE(NTE_DOUBLE_ENCRYPT);
|
|
|
|
NTE_CASE(NTE_BAD_PROVIDER);
|
|
|
|
NTE_CASE(NTE_BAD_PROV_TYPE);
|
|
|
|
NTE_CASE(NTE_BAD_PUBLIC_KEY);
|
|
|
|
NTE_CASE(NTE_BAD_KEYSET);
|
|
|
|
NTE_CASE(NTE_PROV_TYPE_NOT_DEF);
|
|
|
|
NTE_CASE(NTE_PROV_TYPE_ENTRY_BAD);
|
|
|
|
NTE_CASE(NTE_KEYSET_NOT_DEF);
|
|
|
|
NTE_CASE(NTE_KEYSET_ENTRY_BAD);
|
|
|
|
NTE_CASE(NTE_PROV_TYPE_NO_MATCH);
|
|
|
|
NTE_CASE(NTE_SIGNATURE_FILE_BAD);
|
|
|
|
NTE_CASE(NTE_PROVIDER_DLL_FAIL);
|
|
|
|
NTE_CASE(NTE_PROV_DLL_NOT_FOUND);
|
|
|
|
NTE_CASE(NTE_BAD_KEYSET_PARAM);
|
|
|
|
NTE_CASE(NTE_FAIL);
|
|
|
|
NTE_CASE(NTE_SYS_ERR);
|
|
|
|
NTE_CASE(NTE_SILENT_CONTEXT);
|
|
|
|
NTE_CASE(NTE_TOKEN_KEYSET_STORAGE_FULL);
|
|
|
|
NTE_CASE(NTE_TEMPORARY_PROFILE);
|
|
|
|
NTE_CASE(NTE_FIXEDPARAMETER);
|
|
|
|
|
|
|
|
default:
|
|
|
|
return "<unknown>";
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef NTE_CASE
|
|
|
|
}
|