minizip-ng/mz_crypt_win32.c

920 lines
27 KiB
C
Raw Normal View History

/* mz_crypt_win32.c -- Crypto/hash functions for Windows
2021-01-23 16:18:11 -08:00
part of the minizip-ng project
2023-02-16 13:14:21 -08:00
Copyright (C) Nathan Moinvaziri
2021-01-23 16:18:11 -08:00
https://github.com/zlib-ng/minizip-ng
This program is distributed under the terms of the same license as zlib.
See the accompanying LICENSE file for the full text of the license.
*/
2018-11-19 21:34:35 -08:00
#include "mz.h"
#include "mz_os.h"
#include "mz_crypt.h"
#include <windows.h>
#include <wincrypt.h>
/***************************************************************************/
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_rand(uint8_t *buf, int32_t size) {
HCRYPTPROV provider;
int32_t result = 0;
result = CryptAcquireContext(&provider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT);
2020-06-14 15:19:14 -07:00
if (result) {
result = CryptGenRandom(provider, size, buf);
CryptReleaseContext(provider, 0);
if (result)
return size;
}
return mz_os_rand(buf, size);
}
/***************************************************************************/
2023-02-13 13:52:12 -07:00
/* Adapted from RFC4634 and Igor Pavlov's 2010 public domain implementation */
2022-01-17 12:37:25 -07:00
typedef struct mz_crypt_sha224_s {
uint8_t buffer[64];
uint32_t state[8];
uint64_t count;
} mz_crypt_sha224;
/***************************************************************************/
#define rotl(x, n) (((x) << (n)) | ((x) >> ((8 * sizeof(x)) - (n))))
#define rotr(x, n) (((x) >> (n)) | ((x) << ((8 * sizeof(x)) - (n))))
#define Ch(x,y,z) (z ^ (x & (y ^ z)))
#define Maj(x,y,z) ((x & y) | (z & (x | y)))
#define S0_256(x) (rotr(x, 2) ^ rotr(x,13) ^ rotr(x, 22))
#define S1_256(x) (rotr(x, 6) ^ rotr(x,11) ^ rotr(x, 25))
#define s0_256(x) (rotr(x, 7) ^ rotr(x,18) ^ (x >> 3))
#define s1_256(x) (rotr(x,17) ^ rotr(x,19) ^ (x >> 10))
#define blk0(i) (w[i] = buffer[i])
#define blk2(i) (w[i&15] += s1_256(w[(i-2)&15]) + w[(i-7)&15] + s0_256(w[(i-15)&15]))
#define R(a,b,c,d,e,f,g,h,i) \
h += S1_256(e) + Ch(e,f,g) + k256[i+j] + (j?blk2(i):blk0(i)); \
d += h; h += S0_256(a) + Maj(a, b, c)
#define RX_8(i) \
R(a,b,c,d,e,f,g,h, (i)); \
R(h,a,b,c,d,e,f,g, (i+1)); \
R(g,h,a,b,c,d,e,f, (i+2)); \
R(f,g,h,a,b,c,d,e, (i+3)); \
R(e,f,g,h,a,b,c,d, (i+4)); \
R(d,e,f,g,h,a,b,c, (i+5)); \
R(c,d,e,f,g,h,a,b, (i+6)); \
R(b,c,d,e,f,g,h,a, (i+7))
static const uint32_t k256[64] = {
0x428a2f98u, 0x71374491u, 0xb5c0fbcfu, 0xe9b5dba5u,
0x3956c25bu, 0x59f111f1u, 0x923f82a4u, 0xab1c5ed5u,
0xd807aa98u, 0x12835b01u, 0x243185beu, 0x550c7dc3u,
0x72be5d74u, 0x80deb1feu, 0x9bdc06a7u, 0xc19bf174u,
0xe49b69c1u, 0xefbe4786u, 0x0fc19dc6u, 0x240ca1ccu,
0x2de92c6fu, 0x4a7484aau, 0x5cb0a9dcu, 0x76f988dau,
0x983e5152u, 0xa831c66du, 0xb00327c8u, 0xbf597fc7u,
0xc6e00bf3u, 0xd5a79147u, 0x06ca6351u, 0x14292967u,
0x27b70a85u, 0x2e1b2138u, 0x4d2c6dfcu, 0x53380d13u,
0x650a7354u, 0x766a0abbu, 0x81c2c92eu, 0x92722c85u,
0xa2bfe8a1u, 0xa81a664bu, 0xc24b8b70u, 0xc76c51a3u,
0xd192e819u, 0xd6990624u, 0xf40e3585u, 0x106aa070u,
0x19a4c116u, 0x1e376c08u, 0x2748774cu, 0x34b0bcb5u,
0x391c0cb3u, 0x4ed8aa4au, 0x5b9cca4fu, 0x682e6ff3u,
0x748f82eeu, 0x78a5636fu, 0x84c87814u, 0x8cc70208u,
0x90befffau, 0xa4506cebu, 0xbef9a3f7u, 0xc67178f2u
};
/***************************************************************************/
static void mz_crypt_sha224_init(mz_crypt_sha224 *sha) {
sha->state[0] = 0xc1059ed8u;
sha->state[1] = 0x367cd507u;
sha->state[2] = 0x3070dd17u;
sha->state[3] = 0xf70e5939u;
sha->state[4] = 0xffc00b31u;
sha->state[5] = 0x68581511u;
sha->state[6] = 0x64f98fa7u;
sha->state[7] = 0xbefa4fa4u;
sha->count = 0;
}
static void mz_crypt_sha224_transform(uint32_t *state, const uint32_t *buffer) {
uint32_t w[16];
int32_t j = 0;
uint32_t a = state[0], b = state[1], c = state[2], d = state[3];
uint32_t e = state[4], f = state[5], g = state[6], h = state[7];
for (j = 0; j < 64; j += 16) {
RX_8(0);
RX_8(8);
}
state[0] += a; state[1] += b; state[2] += c; state[3] += d;
state[4] += e; state[5] += f; state[6] += g; state[7] += h;
}
static void mz_crypt_sha224_write_byte_block(mz_crypt_sha224 *sha) {
uint32_t data32[16];
int32_t i = 0;
for (i = 0; i < 16; i++) {
data32[i] = ((uint32_t)(sha->buffer[i * 4 + 0]) << 24) +
((uint32_t)(sha->buffer[i * 4 + 1]) << 16) +
((uint32_t)(sha->buffer[i * 4 + 2]) << 8 ) +
((uint32_t)(sha->buffer[i * 4 + 3]));
}
mz_crypt_sha224_transform(sha->state, data32);
}
static void mz_crypt_sha224_update(mz_crypt_sha224 *sha, const uint8_t *data, size_t size) {
uint32_t pos = (uint32_t)sha->count & 0x3F;
while (size > 0) {
sha->buffer[pos++] = *data++;
sha->count++;
size--;
if (pos == 64) {
pos = 0;
mz_crypt_sha224_write_byte_block(sha);
}
}
}
static void mz_crypt_sha224_end(mz_crypt_sha224 *sha, uint8_t *digest) {
uint64_t bits = (sha->count << 3);
uint32_t pos = (uint32_t)sha->count & 0x3F;
int32_t i = 0;
sha->buffer[pos++] = 0x80;
while (pos != (64 - 8)) {
pos &= 0x3F;
if (pos == 0)
mz_crypt_sha224_write_byte_block(sha);
sha->buffer[pos++] = 0;
}
for (i = 0; i < 8; i++) {
sha->buffer[pos++] = (uint8_t)(bits >> 56);
bits <<= 8;
}
mz_crypt_sha224_write_byte_block(sha);
for (i = 0; i < 7; i++) {
*digest++ = (uint8_t)(sha->state[i] >> 24);
*digest++ = (uint8_t)(sha->state[i] >> 16);
*digest++ = (uint8_t)(sha->state[i] >> 8 );
*digest++ = (uint8_t)(sha->state[i]);
}
mz_crypt_sha224_init(sha);
}
/***************************************************************************/
typedef struct mz_crypt_sha_s {
2022-01-17 12:37:25 -07:00
union {
struct {
HCRYPTPROV provider;
HCRYPTHASH hash;
};
mz_crypt_sha224 *sha224;
};
int32_t error;
uint16_t algorithm;
} mz_crypt_sha;
/***************************************************************************/
2020-06-14 15:19:14 -07:00
void mz_crypt_sha_reset(void *handle) {
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
2022-01-17 12:37:25 -07:00
if (sha->algorithm == MZ_HASH_SHA224) {
free(sha->sha224);
2022-01-17 12:37:25 -07:00
sha->sha224 = NULL;
} else {
2022-01-17 12:37:25 -07:00
if (sha->hash)
CryptDestroyHash(sha->hash);
sha->hash = 0;
if (sha->provider)
CryptReleaseContext(sha->provider, 0);
sha->provider = 0;
}
sha->error = 0;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sha_begin(void *handle) {
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
ALG_ID alg_id = 0;
int32_t result = 0;
int32_t err = MZ_OK;
2023-02-19 11:17:54 -08:00
if (!sha)
return MZ_PARAM_ERROR;
2022-01-17 12:37:25 -07:00
if (sha->algorithm == MZ_HASH_SHA224) {
sha->sha224 = malloc(sizeof(mz_crypt_sha224));
2023-02-19 11:17:54 -08:00
if (!sha->sha224)
2022-01-17 12:37:25 -07:00
return MZ_MEM_ERROR;
mz_crypt_sha224_init(sha->sha224);
return MZ_OK;
}
switch (sha->algorithm) {
2022-01-17 12:37:25 -07:00
case MZ_HASH_SHA1:
alg_id = CALG_SHA1;
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA256:
alg_id = CALG_SHA_256;
2022-01-17 12:37:25 -07:00
break;
case MZ_HASH_SHA384:
alg_id = CALG_SHA_384;
break;
case MZ_HASH_SHA512:
alg_id = CALG_SHA_512;
break;
}
result = CryptAcquireContext(&sha->provider, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT | CRYPT_SILENT);
2020-06-14 15:19:14 -07:00
if (!result) {
sha->error = GetLastError();
err = MZ_CRYPT_ERROR;
}
2020-06-14 15:19:14 -07:00
if (result) {
result = CryptCreateHash(sha->provider, alg_id, 0, 0, &sha->hash);
2020-06-14 15:19:14 -07:00
if (!result) {
sha->error = GetLastError();
err = MZ_HASH_ERROR;
}
}
return err;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sha_update(void *handle, const void *buf, int32_t size) {
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
int32_t result = 0;
2023-02-19 11:17:54 -08:00
if (!sha || !buf || size < 0)
2022-01-17 12:37:25 -07:00
return MZ_PARAM_ERROR;
if (sha->algorithm == MZ_HASH_SHA224) {
2023-02-19 11:17:54 -08:00
if (!sha->sha224)
2022-01-17 12:37:25 -07:00
return MZ_PARAM_ERROR;
mz_crypt_sha224_update(sha->sha224, buf, size);
return size;
2022-01-17 12:37:25 -07:00
}
if (sha->hash == 0)
return MZ_PARAM_ERROR;
2022-01-17 12:37:25 -07:00
result = CryptHashData(sha->hash, buf, size, 0);
2020-06-14 15:19:14 -07:00
if (!result) {
sha->error = GetLastError();
return MZ_HASH_ERROR;
}
return size;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sha_end(void *handle, uint8_t *digest, int32_t digest_size) {
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
int32_t result = 0;
int32_t expected_size = 0;
2023-02-19 11:17:54 -08:00
if (!sha || !digest)
2022-01-17 12:37:25 -07:00
return MZ_PARAM_ERROR;
if (sha->algorithm == MZ_HASH_SHA224) {
2023-02-19 11:17:54 -08:00
if (!sha->sha224 || digest_size < 28)
2022-01-17 12:37:25 -07:00
return MZ_PARAM_ERROR;
mz_crypt_sha224_end(sha->sha224, digest);
return MZ_OK;
}
if (sha->hash == 0)
return MZ_PARAM_ERROR;
2022-01-17 12:37:25 -07:00
result = CryptGetHashParam(sha->hash, HP_HASHVAL, NULL, (DWORD *)&expected_size, 0);
if (expected_size > digest_size)
return MZ_BUF_ERROR;
if (!result)
return MZ_HASH_ERROR;
result = CryptGetHashParam(sha->hash, HP_HASHVAL, digest, (DWORD *)&digest_size, 0);
2020-06-14 15:19:14 -07:00
if (!result) {
sha->error = GetLastError();
return MZ_HASH_ERROR;
}
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_sha_set_algorithm(void *handle, uint16_t algorithm) {
mz_crypt_sha *sha = (mz_crypt_sha *)handle;
sha->algorithm = algorithm;
}
2020-06-14 15:19:14 -07:00
void *mz_crypt_sha_create(void **handle) {
mz_crypt_sha *sha = NULL;
sha = (mz_crypt_sha *)calloc(1, sizeof(mz_crypt_sha));
if (sha)
sha->algorithm = MZ_HASH_SHA256;
2023-02-19 11:17:54 -08:00
if (handle)
*handle = sha;
return sha;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_sha_delete(void **handle) {
mz_crypt_sha *sha = NULL;
2023-02-19 11:17:54 -08:00
if (!handle)
return;
sha = (mz_crypt_sha *)*handle;
2023-02-19 11:17:54 -08:00
if (sha) {
mz_crypt_sha_reset(*handle);
free(sha);
}
*handle = NULL;
}
/***************************************************************************/
typedef struct mz_crypt_aes_s {
HCRYPTPROV provider;
HCRYPTKEY key;
int32_t mode;
int32_t error;
} mz_crypt_aes;
/***************************************************************************/
2020-06-14 15:19:14 -07:00
static void mz_crypt_aes_free(void *handle) {
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
if (aes->key)
CryptDestroyKey(aes->key);
aes->key = 0;
if (aes->provider)
CryptReleaseContext(aes->provider, 0);
aes->provider = 0;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_aes_reset(void *handle) {
mz_crypt_aes_free(handle);
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_aes_encrypt(void *handle, uint8_t *buf, int32_t size) {
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
int32_t result = 0;
2023-02-19 11:17:54 -08:00
if (!aes || !buf)
return MZ_PARAM_ERROR;
if (size != MZ_AES_BLOCK_SIZE)
return MZ_PARAM_ERROR;
result = CryptEncrypt(aes->key, 0, 0, 0, buf, (DWORD *)&size, size);
2020-06-14 15:19:14 -07:00
if (!result) {
aes->error = GetLastError();
return MZ_CRYPT_ERROR;
}
return size;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_aes_decrypt(void *handle, uint8_t *buf, int32_t size) {
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
int32_t result = 0;
2023-02-19 11:17:54 -08:00
if (!aes || !buf)
return MZ_PARAM_ERROR;
if (size != MZ_AES_BLOCK_SIZE)
return MZ_PARAM_ERROR;
result = CryptDecrypt(aes->key, 0, 0, 0, buf, (DWORD *)&size);
2020-06-14 15:19:14 -07:00
if (!result) {
aes->error = GetLastError();
return MZ_CRYPT_ERROR;
}
return size;
}
2020-06-14 15:19:14 -07:00
static int32_t mz_crypt_aes_set_key(void *handle, const void *key, int32_t key_length) {
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
HCRYPTHASH hash = 0;
ALG_ID alg_id = 0;
typedef struct key_blob_header_s {
BLOBHEADER hdr;
uint32_t key_length;
} key_blob_header_s;
key_blob_header_s *key_blob_s = NULL;
uint32_t mode = CRYPT_MODE_ECB;
uint8_t *key_blob = NULL;
int32_t key_blob_size = 0;
int32_t result = 0;
int32_t err = MZ_OK;
2023-02-19 11:17:54 -08:00
if (!aes || !key || !key_length)
return MZ_PARAM_ERROR;
2019-07-04 10:32:02 -07:00
mz_crypt_aes_reset(handle);
2019-07-04 10:32:02 -07:00
if (key_length == MZ_AES_KEY_LENGTH(MZ_AES_ENCRYPTION_MODE_128))
alg_id = CALG_AES_128;
else if (key_length == MZ_AES_KEY_LENGTH(MZ_AES_ENCRYPTION_MODE_192))
alg_id = CALG_AES_192;
else if (key_length == MZ_AES_KEY_LENGTH(MZ_AES_ENCRYPTION_MODE_256))
alg_id = CALG_AES_256;
else
return MZ_PARAM_ERROR;
2019-07-04 10:32:02 -07:00
result = CryptAcquireContext(&aes->provider, NULL, MS_ENH_RSA_AES_PROV, PROV_RSA_AES, CRYPT_VERIFYCONTEXT | CRYPT_SILENT);
2020-06-14 15:19:14 -07:00
if (result) {
key_blob_size = sizeof(key_blob_header_s) + key_length;
key_blob = (uint8_t *)malloc(key_blob_size);
2020-06-14 15:19:14 -07:00
if (key_blob) {
key_blob_s = (key_blob_header_s *)key_blob;
key_blob_s->hdr.bType = PLAINTEXTKEYBLOB;
key_blob_s->hdr.bVersion = CUR_BLOB_VERSION;
key_blob_s->hdr.aiKeyAlg = alg_id;
key_blob_s->hdr.reserved = 0;
key_blob_s->key_length = key_length;
memcpy(key_blob + sizeof(key_blob_header_s), key, key_length);
result = CryptImportKey(aes->provider, key_blob, key_blob_size, 0, 0, &aes->key);
SecureZeroMemory(key_blob, key_blob_size);
free(key_blob);
2020-06-14 15:19:14 -07:00
} else {
err = MZ_MEM_ERROR;
}
}
if (result && err == MZ_OK)
result = CryptSetKeyParam(aes->key, KP_MODE, (const uint8_t *)&mode, 0);
2020-06-14 15:19:14 -07:00
if (!result && err == MZ_OK) {
aes->error = GetLastError();
err = MZ_CRYPT_ERROR;
}
if (hash)
CryptDestroyHash(hash);
return err;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_aes_set_encrypt_key(void *handle, const void *key, int32_t key_length) {
return mz_crypt_aes_set_key(handle, key, key_length);
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_aes_set_decrypt_key(void *handle, const void *key, int32_t key_length) {
return mz_crypt_aes_set_key(handle, key, key_length);
}
2020-06-14 15:19:14 -07:00
void mz_crypt_aes_set_mode(void *handle, int32_t mode) {
mz_crypt_aes *aes = (mz_crypt_aes *)handle;
aes->mode = mode;
}
2020-06-14 15:19:14 -07:00
void *mz_crypt_aes_create(void **handle) {
mz_crypt_aes *aes = NULL;
aes = (mz_crypt_aes *)malloc(sizeof(mz_crypt_aes));
2023-02-19 11:17:54 -08:00
if (aes)
memset(aes, 0, sizeof(mz_crypt_aes));
2023-02-19 11:17:54 -08:00
if (handle)
*handle = aes;
return aes;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_aes_delete(void **handle) {
mz_crypt_aes *aes = NULL;
2023-02-19 11:17:54 -08:00
if (!handle)
return;
aes = (mz_crypt_aes *)*handle;
2023-02-19 11:17:54 -08:00
if (aes) {
mz_crypt_aes_free(*handle);
free(aes);
}
*handle = NULL;
}
/***************************************************************************/
typedef struct mz_crypt_hmac_s {
HCRYPTPROV provider;
HCRYPTHASH hash;
HCRYPTKEY key;
HMAC_INFO info;
int32_t mode;
int32_t error;
uint16_t algorithm;
} mz_crypt_hmac;
/***************************************************************************/
2020-06-14 15:19:14 -07:00
static void mz_crypt_hmac_free(void *handle) {
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
if (hmac->key)
CryptDestroyKey(hmac->key);
hmac->key = 0;
if (hmac->hash)
CryptDestroyHash(hmac->hash);
hmac->hash = 0;
if (hmac->provider)
CryptReleaseContext(hmac->provider, 0);
hmac->provider = 0;
memset(&hmac->info, 0, sizeof(hmac->info));
}
2020-06-14 15:19:14 -07:00
void mz_crypt_hmac_reset(void *handle) {
mz_crypt_hmac_free(handle);
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_init(void *handle, const void *key, int32_t key_length) {
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
ALG_ID alg_id = 0;
typedef struct key_blob_header_s {
BLOBHEADER hdr;
uint32_t key_length;
} key_blob_header_s;
key_blob_header_s *key_blob_s = NULL;
uint8_t *key_blob = NULL;
int32_t key_blob_size = 0;
int32_t pad_key_length = key_length;
int32_t result = 0;
int32_t err = MZ_OK;
2023-02-19 11:17:54 -08:00
if (!hmac || !key)
return MZ_PARAM_ERROR;
2019-07-04 10:32:02 -07:00
mz_crypt_hmac_reset(handle);
2019-07-04 10:32:02 -07:00
if (hmac->algorithm == MZ_HASH_SHA1)
alg_id = CALG_SHA1;
else
alg_id = CALG_SHA_256;
hmac->info.HashAlgid = alg_id;
2019-07-04 10:32:02 -07:00
result = CryptAcquireContext(&hmac->provider, NULL, MS_ENHANCED_PROV, PROV_RSA_FULL,
CRYPT_VERIFYCONTEXT | CRYPT_SILENT);
2020-06-14 15:19:14 -07:00
if (!result) {
hmac->error = GetLastError();
err = MZ_CRYPT_ERROR;
2020-06-14 15:19:14 -07:00
} else {
/* Zero-pad odd key lengths */
if (pad_key_length % 2 == 1)
pad_key_length += 1;
key_blob_size = sizeof(key_blob_header_s) + pad_key_length;
key_blob = (uint8_t *)malloc(key_blob_size);
}
2020-06-14 15:19:14 -07:00
if (key_blob) {
memset(key_blob, 0, key_blob_size);
key_blob_s = (key_blob_header_s *)key_blob;
key_blob_s->hdr.bType = PLAINTEXTKEYBLOB;
key_blob_s->hdr.bVersion = CUR_BLOB_VERSION;
key_blob_s->hdr.aiKeyAlg = CALG_RC2;
key_blob_s->hdr.reserved = 0;
key_blob_s->key_length = pad_key_length;
memcpy(key_blob + sizeof(key_blob_header_s), key, key_length);
result = CryptImportKey(hmac->provider, key_blob, key_blob_size, 0, CRYPT_IPSEC_HMAC_KEY, &hmac->key);
if (result)
result = CryptCreateHash(hmac->provider, CALG_HMAC, hmac->key, 0, &hmac->hash);
if (result)
result = CryptSetHashParam(hmac->hash, HP_HMAC_INFO, (uint8_t *)&hmac->info, 0);
SecureZeroMemory(key_blob, key_blob_size);
free(key_blob);
2020-06-14 15:19:14 -07:00
} else if (err == MZ_OK) {
err = MZ_MEM_ERROR;
}
2020-06-14 15:19:14 -07:00
if (!result) {
hmac->error = GetLastError();
err = MZ_CRYPT_ERROR;
}
if (err != MZ_OK)
mz_crypt_hmac_free(handle);
return err;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_update(void *handle, const void *buf, int32_t size) {
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
int32_t result = 0;
2023-02-19 11:17:54 -08:00
if (!hmac || !buf || !hmac->hash)
return MZ_PARAM_ERROR;
result = CryptHashData(hmac->hash, buf, size, 0);
2020-06-14 15:19:14 -07:00
if (!result) {
hmac->error = GetLastError();
return MZ_HASH_ERROR;
}
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_end(void *handle, uint8_t *digest, int32_t digest_size) {
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
int32_t result = 0;
int32_t expected_size = 0;
2023-02-19 11:17:54 -08:00
if (!hmac || !digest || !hmac->hash)
return MZ_PARAM_ERROR;
result = CryptGetHashParam(hmac->hash, HP_HASHVAL, NULL, (DWORD *)&expected_size, 0);
if (expected_size > digest_size)
return MZ_BUF_ERROR;
if (!result)
return MZ_HASH_ERROR;
result = CryptGetHashParam(hmac->hash, HP_HASHVAL, digest, (DWORD *)&digest_size, 0);
2020-06-14 15:19:14 -07:00
if (!result) {
hmac->error = GetLastError();
return MZ_HASH_ERROR;
}
return MZ_OK;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_hmac_set_algorithm(void *handle, uint16_t algorithm) {
mz_crypt_hmac *hmac = (mz_crypt_hmac *)handle;
hmac->algorithm = algorithm;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_hmac_copy(void *src_handle, void *target_handle) {
mz_crypt_hmac *source = (mz_crypt_hmac *)src_handle;
mz_crypt_hmac *target = (mz_crypt_hmac *)target_handle;
int32_t result = 0;
int32_t err = MZ_OK;
2020-06-14 15:19:14 -07:00
if (target->hash) {
2019-03-04 14:25:41 -05:00
CryptDestroyHash(target->hash);
2019-03-07 16:31:04 -08:00
target->hash = 0;
2019-03-04 14:25:41 -05:00
}
result = CryptDuplicateHash(source->hash, NULL, 0, &target->hash);
2020-06-14 15:19:14 -07:00
if (!result) {
target->error = GetLastError();
err = MZ_HASH_ERROR;
}
return err;
}
2020-06-14 15:19:14 -07:00
void *mz_crypt_hmac_create(void **handle) {
mz_crypt_hmac *hmac = NULL;
hmac = (mz_crypt_hmac *)calloc(1, sizeof(mz_crypt_hmac));
if (hmac)
hmac->algorithm = MZ_HASH_SHA256;
2023-02-19 11:17:54 -08:00
if (handle)
*handle = hmac;
return hmac;
}
2020-06-14 15:19:14 -07:00
void mz_crypt_hmac_delete(void **handle) {
mz_crypt_hmac *hmac = NULL;
2023-02-19 11:17:54 -08:00
if (!handle)
return;
hmac = (mz_crypt_hmac *)*handle;
2023-02-19 11:17:54 -08:00
if (hmac) {
mz_crypt_hmac_free(*handle);
free(hmac);
}
*handle = NULL;
}
/***************************************************************************/
#if defined(MZ_ZIP_SIGNING)
2019-07-04 10:32:02 -07:00
int32_t mz_crypt_sign(uint8_t *message, int32_t message_size, uint8_t *cert_data, int32_t cert_data_size,
2020-06-14 15:19:14 -07:00
const char *cert_pwd, uint8_t **signature, int32_t *signature_size) {
CRYPT_SIGN_MESSAGE_PARA sign_params;
CRYPT_DATA_BLOB cert_data_blob;
PCCERT_CONTEXT cert_context = NULL;
HCERTSTORE cert_store = 0;
wchar_t *password_wide = NULL;
int32_t result = 0;
int32_t err = MZ_OK;
uint32_t messages_sizes[1];
uint8_t *messages[1];
2023-02-19 11:17:54 -08:00
if (!message || !cert_data || !signature || !signature_size)
return MZ_PARAM_ERROR;
*signature = NULL;
*signature_size = 0;
cert_data_blob.pbData = cert_data;
cert_data_blob.cbData = cert_data_size;
password_wide = mz_os_unicode_string_create(cert_pwd, MZ_ENCODING_UTF8);
2020-06-14 15:19:14 -07:00
if (password_wide) {
cert_store = PFXImportCertStore(&cert_data_blob, password_wide, 0);
mz_os_unicode_string_delete(&password_wide);
}
2023-02-19 11:17:54 -08:00
if (!cert_store)
cert_store = PFXImportCertStore(&cert_data_blob, L"", 0);
2023-02-19 11:17:54 -08:00
if (!cert_store)
cert_store = PFXImportCertStore(&cert_data_blob, NULL, 0);
2023-02-19 11:17:54 -08:00
if (!cert_store)
return MZ_PARAM_ERROR;
2020-06-14 15:19:14 -07:00
if (err == MZ_OK) {
cert_context = CertFindCertificateInStore(cert_store,
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0, CERT_FIND_HAS_PRIVATE_KEY, NULL, NULL);
2023-02-19 11:17:54 -08:00
if (!cert_context)
err = MZ_PARAM_ERROR;
}
2020-06-14 15:19:14 -07:00
if (err == MZ_OK) {
memset(&sign_params, 0, sizeof(sign_params));
sign_params.cbSize = sizeof(sign_params);
sign_params.dwMsgEncodingType = PKCS_7_ASN_ENCODING | X509_ASN_ENCODING;
sign_params.pSigningCert = cert_context;
sign_params.HashAlgorithm.pszObjId = szOID_NIST_sha256;
sign_params.cMsgCert = 1;
sign_params.rgpMsgCert = &cert_context;
messages[0] = message;
messages_sizes[0] = message_size;
#if 0 /* Timestamp support */
CRYPT_ATTR_BLOB crypt_blob;
CRYPT_TIMESTAMP_CONTEXT *ts_context = NULL;
CRYPT_ATTRIBUTE unauth_attribs[1];
wchar_t *timestamp_url_wide = NULL;
const char *timestamp_url = NULL;
2023-02-19 11:17:54 -08:00
if (timestamp_url)
timestamp_url_wide = mz_os_unicode_string_create(timestamp_url);
2023-02-19 11:17:54 -08:00
if (timestamp_url_wide) {
2019-07-04 10:32:02 -07:00
result = CryptRetrieveTimeStamp(timestamp_url_wide,
TIMESTAMP_NO_AUTH_RETRIEVAL | TIMESTAMP_VERIFY_CONTEXT_SIGNATURE, 0, szOID_NIST_sha256,
NULL, message, message_size, &ts_context, NULL, NULL);
mz_os_unicode_string_delete(&timestamp_url_wide);
2023-02-19 11:17:54 -08:00
if (result && ts_context) {
crypt_blob.cbData = ts_context->cbEncoded;
crypt_blob.pbData = ts_context->pbEncoded;
unauth_attribs[0].pszObjId = "1.2.840.113549.1.9.16.2.14"; //id-smime-aa-timeStampToken
unauth_attribs[0].cValue = 1;
unauth_attribs[0].rgValue = &crypt_blob;
sign_params.rgUnauthAttr = &unauth_attribs[0];
sign_params.cUnauthAttr = 1;
}
}
2023-02-19 11:17:54 -08:00
if (ts_context)
CryptMemFree(ts_context);
if (result)
#endif
result = CryptSignMessage(&sign_params, FALSE, 1, (const BYTE **)messages, (DWORD *)messages_sizes,
NULL, (DWORD *)signature_size);
if (result && *signature_size > 0)
*signature = (uint8_t *)malloc(*signature_size);
2023-02-19 11:17:54 -08:00
if (result && *signature)
result = CryptSignMessage(&sign_params, FALSE, 1, (const BYTE **)messages, (DWORD *)messages_sizes,
*signature, (DWORD *)signature_size);
if (!result)
err = MZ_SIGN_ERROR;
}
2023-02-19 11:17:54 -08:00
if (cert_context)
CertFreeCertificateContext(cert_context);
2023-02-19 11:17:54 -08:00
if (cert_store)
CertCloseStore(cert_store, 0);
return err;
}
2020-06-14 15:19:14 -07:00
int32_t mz_crypt_sign_verify(uint8_t *message, int32_t message_size, uint8_t *signature, int32_t signature_size) {
CRYPT_VERIFY_MESSAGE_PARA verify_params;
CERT_CONTEXT *signer_cert = NULL;
CERT_CHAIN_PARA chain_para;
CERT_CHAIN_CONTEXT *chain_context = NULL;
CERT_CHAIN_POLICY_PARA chain_policy;
CERT_CHAIN_POLICY_STATUS chain_policy_status;
HCRYPTMSG crypt_msg = 0;
int32_t result = 0;
int32_t err = MZ_SIGN_ERROR;
uint8_t *decoded = NULL;
int32_t decoded_size = 0;
memset(&verify_params, 0, sizeof(verify_params));
verify_params.cbSize = sizeof(verify_params);
verify_params.dwMsgAndCertEncodingType = PKCS_7_ASN_ENCODING | X509_ASN_ENCODING;
2019-07-04 10:32:02 -07:00
result = CryptVerifyMessageSignature(&verify_params, 0, signature, signature_size,
NULL, (DWORD *)&decoded_size, NULL);
if (result && decoded_size > 0)
decoded = (uint8_t *)malloc(decoded_size);
2023-02-19 11:17:54 -08:00
if (result && decoded)
result = CryptVerifyMessageSignature(&verify_params, 0, signature, signature_size,
decoded, (DWORD *)&decoded_size, (const CERT_CONTEXT **)&signer_cert);
/* Get and validate certificate chain */
memset(&chain_para, 0, sizeof(chain_para));
2023-02-19 11:17:54 -08:00
if (result && signer_cert)
2019-11-15 13:24:17 -08:00
result = CertGetCertificateChain(NULL, signer_cert, NULL, NULL, &chain_para,
CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT, NULL, (const CERT_CHAIN_CONTEXT **)&chain_context);
memset(&chain_policy, 0, sizeof(chain_policy));
chain_policy.cbSize = sizeof(CERT_CHAIN_POLICY_PARA);
memset(&chain_policy_status, 0, sizeof(chain_policy_status));
chain_policy_status.cbSize = sizeof(CERT_CHAIN_POLICY_STATUS);
2023-02-19 11:17:54 -08:00
if (result && chain_context)
2019-11-15 13:24:17 -08:00
result = CertVerifyCertificateChainPolicy(CERT_CHAIN_POLICY_BASE, chain_context,
&chain_policy, &chain_policy_status);
if (chain_policy_status.dwError != S_OK)
result = 0;
2018-12-01 08:59:21 -08:00
#if 0
crypt_msg = CryptMsgOpenToDecode(PKCS_7_ASN_ENCODING | X509_ASN_ENCODING, 0, 0, 0, NULL, NULL);
2023-02-19 11:17:54 -08:00
if (crypt_msg) {
2018-12-01 08:59:21 -08:00
/* Timestamp support */
PCRYPT_ATTRIBUTES unauth_attribs = NULL;
HCRYPTMSG ts_msg = 0;
uint8_t *ts_content = NULL;
int32_t ts_content_size = 0;
uint8_t *ts_signature = NULL;
int32_t ts_signature_size = 0;
result = CryptMsgUpdate(crypt_msg, signature, signature_size, 1);
if (result)
CryptMsgGetParam(crypt_msg, CMSG_SIGNER_UNAUTH_ATTR_PARAM, 0, NULL, &ts_signature_size);
2023-02-19 11:17:54 -08:00
if (result && ts_signature_size > 0)
ts_signature = (uint8_t *)malloc(ts_signature_size);
2023-02-19 11:17:54 -08:00
if (result && ts_signature) {
result = CryptMsgGetParam(crypt_msg, CMSG_SIGNER_UNAUTH_ATTR_PARAM, 0, ts_signature,
&ts_signature_size);
if (result)
{
unauth_attribs = (PCRYPT_ATTRIBUTES)ts_signature;
if ((unauth_attribs->cAttr > 0) && (unauth_attribs->rgAttr[0].cValue > 0))
{
ts_content = unauth_attribs->rgAttr[0].rgValue->pbData;
ts_content_size = unauth_attribs->rgAttr[0].rgValue->cbData;
}
}
2023-02-19 11:17:54 -08:00
if (result && ts_content)
result = CryptVerifyTimeStampSignature(ts_content, ts_content_size, decoded,
decoded_size, 0, &crypt_context, NULL, NULL);
if (result)
err = MZ_OK;
}
2023-02-19 11:17:54 -08:00
if (ts_signature)
free(ts_signature);
2023-02-19 11:17:54 -08:00
if (crypt_context)
CryptMemFree(crypt_context);
2020-06-14 15:19:14 -07:00
} else {
2018-12-01 08:59:21 -08:00
result = 0;
}
#endif
2023-02-19 11:17:54 -08:00
if (result && decoded && decoded_size == message_size) {
/* Verify cms message with our stored message */
if (memcmp(decoded, message, message_size) == 0)
err = MZ_OK;
}
2019-11-15 13:24:17 -08:00
2023-02-19 11:17:54 -08:00
if (chain_context)
CertFreeCertificateChain(chain_context);
2023-02-19 11:17:54 -08:00
if (signer_cert)
CertFreeCertificateContext(signer_cert);
2023-02-19 11:17:54 -08:00
if (crypt_msg)
CryptMsgClose(crypt_msg);
2023-02-19 11:17:54 -08:00
if (decoded)
free(decoded);
return err;
}
#endif