/** * WinPR: Windows Portable Runtime * Cryptography API (CryptoAPI) * * Copyright 2012-2013 Marc-Andre Moreau * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifdef HAVE_CONFIG_H #include "config.h" #endif #include /** * CryptAcquireCertificatePrivateKey * CryptBinaryToStringA * CryptBinaryToStringW * CryptCloseAsyncHandle * CryptCreateAsyncHandle * CryptCreateKeyIdentifierFromCSP * CryptDecodeMessage * CryptDecodeObject * CryptDecodeObjectEx * CryptDecryptAndVerifyMessageSignature * CryptDecryptMessage * CryptEncodeObject * CryptEncodeObjectEx * CryptEncryptMessage * CryptEnumKeyIdentifierProperties * CryptEnumOIDFunction * CryptEnumOIDInfo * CryptExportPKCS8 * CryptExportPublicKeyInfo * CryptExportPublicKeyInfoEx * CryptExportPublicKeyInfoFromBCryptKeyHandle * CryptFindCertificateKeyProvInfo * CryptFindLocalizedName * CryptFindOIDInfo * CryptFormatObject * CryptFreeOIDFunctionAddress * CryptGetAsyncParam * CryptGetDefaultOIDDllList * CryptGetDefaultOIDFunctionAddress * CryptGetKeyIdentifierProperty * CryptGetMessageCertificates * CryptGetMessageSignerCount * CryptGetOIDFunctionAddress * CryptGetOIDFunctionValue * CryptHashCertificate * CryptHashCertificate2 * CryptHashMessage * CryptHashPublicKeyInfo * CryptHashToBeSigned * CryptImportPKCS8 * CryptImportPublicKeyInfo * CryptImportPublicKeyInfoEx * CryptImportPublicKeyInfoEx2 * CryptInitOIDFunctionSet * CryptInstallDefaultContext * CryptInstallOIDFunctionAddress * CryptLoadSip * CryptMemAlloc * CryptMemFree * CryptMemRealloc * CryptMsgCalculateEncodedLength * CryptMsgClose * CryptMsgControl * CryptMsgCountersign * CryptMsgCountersignEncoded * CryptMsgDuplicate * CryptMsgEncodeAndSignCTL * CryptMsgGetAndVerifySigner * CryptMsgGetParam * CryptMsgOpenToDecode * CryptMsgOpenToEncode * CryptMsgSignCTL * CryptMsgUpdate * CryptMsgVerifyCountersignatureEncoded * CryptMsgVerifyCountersignatureEncodedEx * CryptQueryObject * CryptRegisterDefaultOIDFunction * CryptRegisterOIDFunction * CryptRegisterOIDInfo * CryptRetrieveTimeStamp * CryptSetAsyncParam * CryptSetKeyIdentifierProperty * CryptSetOIDFunctionValue * CryptSignAndEncodeCertificate * CryptSignAndEncryptMessage * CryptSignCertificate * CryptSignMessage * CryptSignMessageWithKey * CryptSIPAddProvider * CryptSIPCreateIndirectData * CryptSIPGetCaps * CryptSIPGetSignedDataMsg * CryptSIPLoad * CryptSIPPutSignedDataMsg * CryptSIPRemoveProvider * CryptSIPRemoveSignedDataMsg * CryptSIPRetrieveSubjectGuid * CryptSIPRetrieveSubjectGuidForCatalogFile * CryptSIPVerifyIndirectData * CryptUninstallDefaultContext * CryptUnregisterDefaultOIDFunction * CryptUnregisterOIDFunction * CryptUnregisterOIDInfo * CryptUpdateProtectedState * CryptVerifyCertificateSignature * CryptVerifyCertificateSignatureEx * CryptVerifyDetachedMessageHash * CryptVerifyDetachedMessageSignature * CryptVerifyMessageHash * CryptVerifyMessageSignature * CryptVerifyMessageSignatureWithKey * CryptVerifyTimeStampSignature * DbgInitOSS * DbgPrintf * PFXExportCertStore * PFXExportCertStore2 * PFXExportCertStoreEx * PFXImportCertStore * PFXIsPFXBlob * PFXVerifyPassword */ #ifndef _WIN32 #include "crypto.h" #include #include static wListDictionary* g_ProtectedMemoryBlocks = NULL; BOOL CryptProtectMemory(LPVOID pData, DWORD cbData, DWORD dwFlags) { BYTE* pCipherText; int cbOut, cbFinal; BYTE randomKey[256]; WINPR_PROTECTED_MEMORY_BLOCK* pMemBlock; if (dwFlags != CRYPTPROTECTMEMORY_SAME_PROCESS) return FALSE; if (!g_ProtectedMemoryBlocks) { g_ProtectedMemoryBlocks = ListDictionary_New(TRUE); if (!g_ProtectedMemoryBlocks) return FALSE; } pMemBlock = (WINPR_PROTECTED_MEMORY_BLOCK*) calloc(1, sizeof(WINPR_PROTECTED_MEMORY_BLOCK)); if (!pMemBlock) return FALSE; pMemBlock->pData = pData; pMemBlock->cbData = cbData; pMemBlock->dwFlags = dwFlags; /* AES Initialization */ RAND_bytes(pMemBlock->salt, 8); RAND_bytes(randomKey, sizeof(randomKey)); EVP_BytesToKey(EVP_aes_256_cbc(), EVP_sha1(), pMemBlock->salt, randomKey, sizeof(randomKey), 4, pMemBlock->key, pMemBlock->iv); SecureZeroMemory(randomKey, sizeof(randomKey)); EVP_CIPHER_CTX_init(&(pMemBlock->enc)); EVP_EncryptInit_ex(&(pMemBlock->enc), EVP_aes_256_cbc(), NULL, pMemBlock->key, pMemBlock->iv); EVP_CIPHER_CTX_init(&(pMemBlock->dec)); EVP_DecryptInit_ex(&(pMemBlock->dec), EVP_aes_256_cbc(), NULL, pMemBlock->key, pMemBlock->iv); /* AES Encryption */ cbOut = pMemBlock->cbData + AES_BLOCK_SIZE - 1; pCipherText = (BYTE*) malloc(cbOut); if (!pCipherText) { free(pMemBlock); return FALSE; } EVP_EncryptInit_ex(&(pMemBlock->enc), NULL, NULL, NULL, NULL); EVP_EncryptUpdate(&(pMemBlock->enc), pCipherText, &cbOut, pMemBlock->pData, pMemBlock->cbData); EVP_EncryptFinal_ex(&(pMemBlock->enc), pCipherText + cbOut, &cbFinal); CopyMemory(pMemBlock->pData, pCipherText, pMemBlock->cbData); free(pCipherText); return ListDictionary_Add(g_ProtectedMemoryBlocks, pData, pMemBlock); } BOOL CryptUnprotectMemory(LPVOID pData, DWORD cbData, DWORD dwFlags) { BYTE* pPlainText; int cbOut, cbFinal; WINPR_PROTECTED_MEMORY_BLOCK* pMemBlock; if (dwFlags != CRYPTPROTECTMEMORY_SAME_PROCESS) return FALSE; if (!g_ProtectedMemoryBlocks) return FALSE; pMemBlock = (WINPR_PROTECTED_MEMORY_BLOCK*) ListDictionary_GetItemValue(g_ProtectedMemoryBlocks, pData); if (!pMemBlock) return FALSE; /* AES Decryption */ cbOut = pMemBlock->cbData + AES_BLOCK_SIZE - 1; pPlainText = (BYTE*) malloc(cbOut); if (!pPlainText) return FALSE; EVP_DecryptInit_ex(&(pMemBlock->dec), NULL, NULL, NULL, NULL); EVP_DecryptUpdate(&(pMemBlock->dec), pPlainText, &cbOut, pMemBlock->pData, pMemBlock->cbData); EVP_DecryptFinal_ex(&(pMemBlock->dec), pPlainText + cbOut, &cbFinal); CopyMemory(pMemBlock->pData, pPlainText, pMemBlock->cbData); SecureZeroMemory(pPlainText, pMemBlock->cbData); free(pPlainText); ListDictionary_Remove(g_ProtectedMemoryBlocks, pData); /* AES Cleanup */ EVP_CIPHER_CTX_cleanup(&(pMemBlock->enc)); EVP_CIPHER_CTX_cleanup(&(pMemBlock->dec)); free(pMemBlock); return TRUE; } BOOL CryptProtectData(DATA_BLOB* pDataIn, LPCWSTR szDataDescr, DATA_BLOB* pOptionalEntropy, PVOID pvReserved, CRYPTPROTECT_PROMPTSTRUCT* pPromptStruct, DWORD dwFlags, DATA_BLOB* pDataOut) { return TRUE; } BOOL CryptUnprotectData(DATA_BLOB* pDataIn, LPWSTR* ppszDataDescr, DATA_BLOB* pOptionalEntropy, PVOID pvReserved, CRYPTPROTECT_PROMPTSTRUCT* pPromptStruct, DWORD dwFlags, DATA_BLOB* pDataOut) { return TRUE; } BOOL CryptStringToBinaryW(LPCWSTR pszString, DWORD cchString, DWORD dwFlags, BYTE* pbBinary, DWORD* pcbBinary, DWORD* pdwSkip, DWORD* pdwFlags) { return TRUE; } BOOL CryptStringToBinaryA(LPCSTR pszString, DWORD cchString, DWORD dwFlags, BYTE* pbBinary, DWORD* pcbBinary, DWORD* pdwSkip, DWORD* pdwFlags) { return TRUE; } BOOL CryptBinaryToStringW(CONST BYTE* pbBinary, DWORD cbBinary, DWORD dwFlags, LPWSTR pszString, DWORD* pcchString) { return TRUE; } BOOL CryptBinaryToStringA(CONST BYTE* pbBinary, DWORD cbBinary, DWORD dwFlags, LPSTR pszString, DWORD* pcchString) { return TRUE; } #endif