/* Benjamin DELPY `gentilkiwi` http://blog.gentilkiwi.com benjamin@gentilkiwi.com Licence : https://creativecommons.org/licenses/by/4.0/ */ #include "kull_m_crypto.h" BOOL kull_m_crypto_hash(ALG_ID algid, LPCVOID data, DWORD dataLen, LPVOID hash, DWORD hashWanted) { BOOL status = FALSE; HCRYPTPROV hProv; HCRYPTHASH hHash; DWORD hashLen; PBYTE buffer; PKERB_CHECKSUM pCheckSum; PVOID Context; if(algid == CALG_CRC32) { if((hashWanted == sizeof(DWORD)) && NT_SUCCESS(CDLocateCheckSum(KERB_CHECKSUM_REAL_CRC32, &pCheckSum))) { if(NT_SUCCESS(pCheckSum->Initialize(0, &Context))) { pCheckSum->Sum(Context, dataLen, data); status = NT_SUCCESS(pCheckSum->Finalize(Context, hash)); pCheckSum->Finish(&Context); } } } else if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(CryptCreateHash(hProv, algid, 0, 0, &hHash)) { if(CryptHashData(hHash, (LPCBYTE) data, dataLen, 0)) { if(CryptGetHashParam(hHash, HP_HASHVAL, NULL, &hashLen, 0)) { if(buffer = (PBYTE) LocalAlloc(LPTR, hashLen)) { status = CryptGetHashParam(hHash, HP_HASHVAL, buffer, &hashLen, 0); RtlCopyMemory(hash, buffer, min(hashLen, hashWanted)); LocalFree(buffer); } } } CryptDestroyHash(hHash); } CryptReleaseContext(hProv, 0); } return status; } BOOL kull_m_crypto_hkey(HCRYPTPROV hProv, DWORD calgid, LPCVOID key, DWORD keyLen, DWORD flags, HCRYPTKEY *hKey, HCRYPTPROV *hSessionProv) { BOOL status = FALSE; PGENERICKEY_BLOB keyBlob; DWORD szBlob = sizeof(GENERICKEY_BLOB) + keyLen; if(calgid != CALG_3DES) { if(keyBlob = (PGENERICKEY_BLOB) LocalAlloc(LPTR, szBlob)) { keyBlob->Header.bType = PLAINTEXTKEYBLOB; keyBlob->Header.bVersion = CUR_BLOB_VERSION; keyBlob->Header.reserved = 0; keyBlob->Header.aiKeyAlg = calgid; keyBlob->dwKeyLen = keyLen; RtlCopyMemory((PBYTE) keyBlob + sizeof(GENERICKEY_BLOB), key, keyBlob->dwKeyLen); status = CryptImportKey(hProv, (LPCBYTE) keyBlob, szBlob, 0, flags, hKey); LocalFree(keyBlob); } } else if(hSessionProv) status = kull_m_crypto_hkey_session(calgid, key, keyLen, flags, hKey, hSessionProv); return status; } BOOL kull_m_crypto_DeriveKeyRaw(ALG_ID hashId, LPVOID hash, DWORD hashLen, LPVOID key, DWORD keyLen) { BOOL status = FALSE; BYTE buffer[152], ipad[64], opad[64]; DWORD i; if(status = (hashLen >= keyLen)) RtlCopyMemory(key, hash, keyLen); else { RtlFillMemory(ipad, sizeof(ipad), '6'); RtlFillMemory(opad, sizeof(opad), '\\'); for(i = 0; i < hashLen; i++) { ipad[i] ^= ((PBYTE) hash)[i]; opad[i] ^= ((PBYTE) hash)[i]; } if(kull_m_crypto_hash(hashId, ipad, sizeof(ipad), buffer, hashLen)) if(status = kull_m_crypto_hash(hashId, opad, sizeof(opad), buffer + hashLen, hashLen)) RtlCopyMemory(key, buffer, min(keyLen, 2 * hashLen)); } return status; } BOOL kull_m_crypto_close_hprov_delete_container(HCRYPTPROV hProv) { BOOL status = FALSE; DWORD provtype, szLen = 0; PSTR container, provider; if(CryptGetProvParam(hProv, PP_CONTAINER, NULL, &szLen, 0)) { if(container = (PSTR) LocalAlloc(LPTR, szLen)) { if(CryptGetProvParam(hProv, PP_CONTAINER, (LPBYTE) container, &szLen, 0)) { if(CryptGetProvParam(hProv, PP_NAME, NULL, &szLen, 0)) { if(provider = (PSTR) LocalAlloc(LPTR, szLen)) { if(CryptGetProvParam(hProv, PP_NAME, (LPBYTE) provider, &szLen, 0)) { szLen = sizeof(DWORD); if(CryptGetProvParam(hProv, PP_PROVTYPE, (LPBYTE) &provtype, &szLen, 0)) { CryptReleaseContext(hProv, 0); status = CryptAcquireContextA(&hProv, container, provider, provtype, CRYPT_DELETEKEYSET); } } LocalFree(provider); } } LocalFree(container); } } } return status; } BOOL kull_m_crypto_hmac(DWORD calgid, LPCVOID key, DWORD keyLen, LPCVOID message, DWORD messageLen, LPVOID hash, DWORD hashWanted) // for keyLen > 1 { BOOL status = FALSE; DWORD hashLen; HCRYPTPROV hProv; HCRYPTKEY hKey; HCRYPTHASH hHash; HMAC_INFO HmacInfo = {calgid, NULL, 0, NULL, 0}; PBYTE buffer; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(kull_m_crypto_hkey(hProv, CALG_RC2, key, keyLen, CRYPT_IPSEC_HMAC_KEY, &hKey, NULL)) { if(CryptCreateHash(hProv, CALG_HMAC, hKey, 0, &hHash)) { if(CryptSetHashParam(hHash, HP_HMAC_INFO, (LPCBYTE) &HmacInfo, 0)) if(CryptHashData(hHash, (LPCBYTE) message, messageLen, 0)) if(CryptGetHashParam(hHash, HP_HASHVAL, NULL, &hashLen, 0)) { if(buffer = (PBYTE) LocalAlloc(LPTR, hashLen)) { status = CryptGetHashParam(hHash, HP_HASHVAL, buffer, &hashLen, 0); RtlCopyMemory(hash, buffer, min(hashLen, hashWanted)); LocalFree(buffer); } } CryptDestroyHash(hHash); } CryptDestroyKey(hKey); } CryptReleaseContext(hProv, 0); } return status; } BOOL kull_m_crypto_pkcs5_pbkdf2_hmac(DWORD calgid, LPCVOID password, DWORD passwordLen, LPCVOID salt, DWORD saltLen, DWORD iterations, BYTE *key, DWORD keyLen, BOOL isDpapiInternal) { BOOL status = FALSE; HCRYPTPROV hProv; HCRYPTHASH hHash; DWORD sizeHmac, count, i, j, r; PBYTE asalt, obuf, d1; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(CryptCreateHash(hProv, calgid, 0, 0, &hHash)) { if(CryptGetHashParam(hHash, HP_HASHVAL, NULL, &sizeHmac, 0)) { if(asalt = (PBYTE) LocalAlloc(LPTR, saltLen + sizeof(DWORD))) { if(obuf = (PBYTE) LocalAlloc(LPTR, sizeHmac)) { if(d1 = (PBYTE) LocalAlloc(LPTR, sizeHmac)) { status = TRUE; RtlCopyMemory(asalt, salt, saltLen); for (count = 1; keyLen > 0; count++) { *(PDWORD) (asalt + saltLen) = _byteswap_ulong(count); kull_m_crypto_hmac(calgid, password, passwordLen, asalt, saltLen + 4, d1, sizeHmac); RtlCopyMemory(obuf, d1, sizeHmac); for (i = 1; i < iterations; i++) { kull_m_crypto_hmac(calgid, password, passwordLen, d1, sizeHmac, d1, sizeHmac); for (j = 0; j < sizeHmac; j++) obuf[j] ^= d1[j]; if(isDpapiInternal) // thank you MS! RtlCopyMemory(d1, obuf, sizeHmac); } r = min(keyLen, sizeHmac); RtlCopyMemory(key, obuf, r); key += r; keyLen -= r; } LocalFree(d1); } LocalFree(obuf); } LocalFree(asalt); } } CryptDestroyHash(hHash); } CryptReleaseContext(hProv, 0); } return status; } BOOL kull_m_crypto_aesBlockEncryptDecrypt(HCRYPTKEY hKey, PBYTE data, DWORD nbBlock, BOOL encrypt) { nbBlock *= 16; return (encrypt ? CryptEncrypt(hKey, 0, FALSE, 0, data, &nbBlock, nbBlock) : CryptDecrypt(hKey, 0, FALSE, 0, data, &nbBlock)); } BOOL kull_m_crypto_aesCTSDecrypt(HCRYPTKEY hKey, PBYTE data, DWORD szData, PBYTE pbIV) { BOOL status = FALSE; DWORD nbBlock, lastLen, i; BYTE buffer[32], *ptr; HCRYPTKEY hKeyNoIV; if(szData > 16) { if(CryptDuplicateKey(hKey, NULL, 0, &hKeyNoIV)) { if(CryptSetKeyParam(hKey, KP_IV, pbIV, 0)) { nbBlock = (szData + 15) >> 4; lastLen = (szData & 0xf) ? (szData & 0xf) : 16; if (nbBlock <= 2 || kull_m_crypto_aesBlockEncryptDecrypt(hKey, data, nbBlock - 2, FALSE)) { ptr = &data[16 * (nbBlock - 2)]; RtlCopyMemory(buffer, ptr, lastLen + 16); RtlZeroMemory(&buffer[lastLen + 16], 16 - lastLen); if(kull_m_crypto_aesBlockEncryptDecrypt(hKeyNoIV, buffer, 1, FALSE)) { for(i = 0; i < 16; i++) buffer[i] ^= buffer[i + 16]; RtlCopyMemory(&buffer[lastLen + 16], &buffer[lastLen], 16 - lastLen); if(status = kull_m_crypto_aesBlockEncryptDecrypt(hKey, buffer + 16, 1, FALSE)) { RtlCopyMemory(ptr, buffer + 16, 16); RtlCopyMemory(&data[16 * nbBlock - 16], buffer, lastLen); } } } } CryptDestroyKey(hKeyNoIV); } } else if(szData == 16) status = kull_m_crypto_aesBlockEncryptDecrypt(hKey, data, 1, FALSE); return status; } BOOL kull_m_crypto_aesCTSEncrypt(HCRYPTKEY hKey, PBYTE data, DWORD szData, PBYTE pbIV) { BOOL status = FALSE; DWORD nbBlock, lastLen; BYTE buffer[32], *ptr; if(szData > 16) { if(CryptSetKeyParam(hKey, KP_IV, pbIV, 0)) { nbBlock = (szData + 15) >> 4; lastLen = (szData & 0xf) ? (szData & 0xf) : 16; if (nbBlock <= 2 || kull_m_crypto_aesBlockEncryptDecrypt(hKey, data, nbBlock - 2, TRUE)) { ptr = &data[16 * (nbBlock - 2)]; RtlCopyMemory(buffer, ptr, lastLen + 16); RtlZeroMemory(&buffer[lastLen + 16], 16 - lastLen); if(status = kull_m_crypto_aesBlockEncryptDecrypt(hKey, buffer, 2, TRUE)) { RtlCopyMemory(ptr, buffer + 16, 16); RtlCopyMemory(&data[16 * nbBlock - 16], buffer, lastLen); } } } } else if(szData == 16) status = kull_m_crypto_aesBlockEncryptDecrypt(hKey, data, 1, TRUE); return status; } BOOL kull_m_crypto_aesCTSEncryptDecrypt(DWORD aesCalgId, PVOID data, DWORD szData, PVOID key, DWORD szKey, PVOID pbIV, BOOL encrypt) { BOOL status = FALSE; HCRYPTPROV hProv; HCRYPTKEY hKey; DWORD mode = CRYPT_MODE_CBC; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(kull_m_crypto_hkey(hProv, aesCalgId, key, szKey, 0, &hKey, NULL)) { if(CryptSetKeyParam(hKey, KP_MODE, (LPCBYTE) &mode, 0)) status = (encrypt ? kull_m_crypto_aesCTSEncrypt(hKey, (PBYTE) data, szData, (PBYTE) pbIV) : kull_m_crypto_aesCTSDecrypt(hKey, (PBYTE) data, szData, (PBYTE) pbIV)); CryptDestroyKey(hKey); } CryptReleaseContext(hProv, 0); } return status; } BOOL kull_m_crypto_hkey_session(ALG_ID calgid, LPCVOID key, DWORD keyLen, DWORD flags, HCRYPTKEY *hSessionKey, HCRYPTPROV *hSessionProv) { BOOL status = FALSE; PBYTE keyblob, pbSessionBlob, ptr; DWORD dwkeyblob, dwLen, i; PWSTR container; HCRYPTKEY hPrivateKey; if(container = kull_m_string_getRandomGUID()) { if(CryptAcquireContext(hSessionProv, container, NULL, PROV_RSA_AES, CRYPT_NEWKEYSET)) { hPrivateKey = 0; if(CryptGenKey(*hSessionProv, AT_KEYEXCHANGE, CRYPT_EXPORTABLE | RSA1024BIT_KEY, &hPrivateKey)) // 1024 { if(CryptExportKey(hPrivateKey, 0, PRIVATEKEYBLOB, 0, NULL, &dwkeyblob)) { if(keyblob = (LPBYTE)LocalAlloc(LPTR, dwkeyblob)) { if(CryptExportKey(hPrivateKey, 0, PRIVATEKEYBLOB, 0, keyblob, &dwkeyblob)) { CryptDestroyKey(hPrivateKey); hPrivateKey = 0; dwLen = ((RSAPUBKEY *) (keyblob + sizeof(PUBLICKEYSTRUC)))->bitlen / 8; ((RSAPUBKEY *) (keyblob + sizeof(PUBLICKEYSTRUC)))->pubexp = 1; ptr = keyblob + sizeof(PUBLICKEYSTRUC) + sizeof(RSAPUBKEY); ptr += 2 * dwLen; // Skip pubexp, modulus, prime1, prime2 *ptr = 1; // Convert exponent1 to 1 RtlZeroMemory(ptr + 1, dwLen / 2 - 1); ptr += dwLen / 2; // Skip exponent1 *ptr = 1; // Convert exponent2 to 1 RtlZeroMemory(ptr + 1, dwLen / 2 - 1); ptr += dwLen; // Skip exponent2, coefficient *ptr = 1; // Convert privateExponent to 1 RtlZeroMemory(ptr + 1, (dwLen/2) - 1); if(CryptImportKey(*hSessionProv, keyblob, dwkeyblob, 0, 0, &hPrivateKey)) { dwkeyblob = (1024 / 8) + sizeof(ALG_ID) + sizeof(BLOBHEADER); // 1024 if(pbSessionBlob = (LPBYTE)LocalAlloc(LPTR, dwkeyblob)) { ((BLOBHEADER *) pbSessionBlob)->bType = SIMPLEBLOB; ((BLOBHEADER *) pbSessionBlob)->bVersion = CUR_BLOB_VERSION; ((BLOBHEADER *) pbSessionBlob)->reserved = 0; ((BLOBHEADER *) pbSessionBlob)->aiKeyAlg = calgid; ptr = pbSessionBlob + sizeof(BLOBHEADER); *(ALG_ID *) ptr = CALG_RSA_KEYX; ptr += sizeof(ALG_ID); for (i = 0; i < keyLen; i++) ptr[i] = ((LPCBYTE) key)[keyLen - i - 1]; ptr += (keyLen + 1); for (i = 0; i < dwkeyblob - (sizeof(ALG_ID) + sizeof(BLOBHEADER) + keyLen + 3); i++) if (ptr[i] == 0) ptr[i] = 0x42; pbSessionBlob[dwkeyblob - 2] = 2; status = CryptImportKey(*hSessionProv, pbSessionBlob, dwkeyblob, hPrivateKey, flags, hSessionKey); LocalFree(pbSessionBlob); } } } LocalFree(keyblob); } } } if(hPrivateKey) CryptDestroyKey(hPrivateKey); if(!status) kull_m_crypto_close_hprov_delete_container(*hSessionProv); } LocalFree(container); } return status; } DWORD kull_m_crypto_hash_len(ALG_ID hashId) { DWORD len = 0; HCRYPTPROV hProv; HCRYPTHASH hHash; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(CryptCreateHash(hProv, hashId, 0, 0, &hHash)) { CryptGetHashParam(hHash, HP_HASHVAL, NULL, &len, 0); CryptDestroyHash(hHash); } CryptReleaseContext(hProv, 0); } return len; } DWORD kull_m_crypto_cipher_blocklen(ALG_ID hashId) { DWORD len = 0, dwSize = sizeof(DWORD); HCRYPTPROV hProv; HCRYPTKEY hKey; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(CryptGenKey(hProv, hashId, 0, &hKey)) { CryptGetKeyParam(hKey, KP_BLOCKLEN, (PBYTE) &len, &dwSize, 0); CryptDestroyKey(hKey); } CryptReleaseContext(hProv, 0); } return len / 8; } DWORD kull_m_crypto_cipher_keylen(ALG_ID hashId) { DWORD len = 0, dwSize = sizeof(DWORD); HCRYPTPROV hProv; HCRYPTKEY hKey; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(CryptGenKey(hProv, hashId, 0, &hKey)) { CryptGetKeyParam(hKey, KP_KEYLEN, (PBYTE) &len, &dwSize, 0); CryptDestroyKey(hKey); } CryptReleaseContext(hProv, 0); } return len / 8; } NTSTATUS kull_m_crypto_get_dcc(PBYTE dcc, PBYTE ntlm, PUNICODE_STRING Username, DWORD realIterations) { NTSTATUS status; LSA_UNICODE_STRING HashAndLowerUsername; LSA_UNICODE_STRING LowerUsername; BYTE buffer[LM_NTLM_HASH_LENGTH]; status = RtlDowncaseUnicodeString(&LowerUsername, Username, TRUE); if(NT_SUCCESS(status)) { HashAndLowerUsername.Length = HashAndLowerUsername.MaximumLength = LowerUsername.Length + LM_NTLM_HASH_LENGTH; if(HashAndLowerUsername.Buffer = (PWSTR) LocalAlloc(LPTR, HashAndLowerUsername.MaximumLength)) { RtlCopyMemory(HashAndLowerUsername.Buffer, ntlm, LM_NTLM_HASH_LENGTH); RtlCopyMemory((PBYTE) HashAndLowerUsername.Buffer + LM_NTLM_HASH_LENGTH, LowerUsername.Buffer, LowerUsername.Length); status = RtlDigestNTLM(&HashAndLowerUsername, dcc); if(realIterations && NT_SUCCESS(status)) { if(kull_m_crypto_pkcs5_pbkdf2_hmac(CALG_SHA1, dcc, LM_NTLM_HASH_LENGTH, LowerUsername.Buffer, LowerUsername.Length, realIterations, buffer, LM_NTLM_HASH_LENGTH, FALSE)) { RtlCopyMemory(dcc, buffer, LM_NTLM_HASH_LENGTH); status = STATUS_SUCCESS; } } LocalFree(HashAndLowerUsername.Buffer); } RtlFreeUnicodeString(&LowerUsername); } return status; } BOOL kull_m_crypto_genericAES128Decrypt(LPCVOID pKey, LPCVOID pIV, LPCVOID pData, DWORD dwDataLen, LPVOID *pOut, DWORD *dwOutLen) { BOOL status = FALSE; HCRYPTPROV hProv; HCRYPTKEY hKey; DWORD mode = CRYPT_MODE_CBC; if(CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { if(kull_m_crypto_hkey(hProv, CALG_AES_128, pKey, 16, 0, &hKey, NULL)) { if(CryptSetKeyParam(hKey, KP_MODE, (LPCBYTE) &mode, 0)) { if(CryptSetKeyParam(hKey, KP_IV, (LPCBYTE) pIV, 0)) { if(*pOut = LocalAlloc(LPTR, dwDataLen)) { *dwOutLen = dwDataLen; RtlCopyMemory(*pOut, pData, dwDataLen); if(!(status = CryptDecrypt(hKey, 0, TRUE, 0, (PBYTE) *pOut, dwOutLen))) { PRINT_ERROR_AUTO(L"CryptDecrypt"); *pOut = LocalFree(*pOut); *dwOutLen = 0; } } } else PRINT_ERROR_AUTO(L"CryptSetKeyParam (IV)"); } else PRINT_ERROR_AUTO(L"CryptSetKeyParam (MODE)"); CryptDestroyKey(hKey); } else PRINT_ERROR_AUTO(L"kull_m_crypto_hkey"); CryptReleaseContext(hProv, 0); } else PRINT_ERROR_AUTO(L"CryptAcquireContext"); return status; } BOOL kull_m_crypto_exportPfx(HCERTSTORE hStore, LPCWSTR filename) { BOOL isExported = FALSE; CRYPT_DATA_BLOB bDataBlob = {0, NULL}; if(PFXExportCertStoreEx(hStore, &bDataBlob, MIMIKATZ, NULL, EXPORT_PRIVATE_KEYS | REPORT_NOT_ABLE_TO_EXPORT_PRIVATE_KEY)) { if(bDataBlob.pbData = (BYTE *) LocalAlloc(LPTR, bDataBlob.cbData)) { if(PFXExportCertStoreEx(hStore, &bDataBlob, MIMIKATZ, NULL, EXPORT_PRIVATE_KEYS | REPORT_NOT_ABLE_TO_EXPORT_PRIVATE_KEY)) isExported = kull_m_file_writeData(filename, bDataBlob.pbData, bDataBlob.cbData); LocalFree(bDataBlob.pbData); } } if(!isExported) PRINT_ERROR_AUTO(L"PFXExportCertStoreEx"); return isExported; } BOOL kull_m_crypto_DerAndKeyToPfx(LPCVOID der, DWORD derLen, LPCVOID key, DWORD keyLen, BOOL isPvk, LPCWSTR filename) // no PVK support at this time { BOOL isExported = FALSE; CRYPT_KEY_PROV_INFO infos = {NULL, MS_ENHANCED_PROV, PROV_RSA_FULL, 0, 0, NULL, AT_KEYEXCHANGE}; HCRYPTPROV hCryptProv; HCRYPTKEY hCryptKey; if(infos.pwszContainerName = kull_m_string_getRandomGUID()) { if(CryptAcquireContext(&hCryptProv, infos.pwszContainerName, infos.pwszProvName, infos.dwProvType, CRYPT_NEWKEYSET)) { if(CryptImportKey(hCryptProv, (LPCBYTE) key, keyLen, 0, CRYPT_EXPORTABLE, &hCryptKey)) { isExported = kull_m_crypto_DerAndKeyInfoToPfx(der, derLen, &infos, filename); CryptDestroyKey(hCryptKey); } else PRINT_ERROR_AUTO(L"CryptImportKey"); CryptReleaseContext(hCryptProv, 0); if(!CryptAcquireContext(&hCryptProv, infos.pwszContainerName, NULL, PROV_RSA_FULL, CRYPT_DELETEKEYSET)) PRINT_ERROR(L"Unable to delete temp keyset %s\n", infos.pwszContainerName); } else PRINT_ERROR_AUTO(L"CryptAcquireContext"); LocalFree(infos.pwszContainerName); } return isExported; } BOOL kull_m_crypto_DerAndKeyInfoToPfx(LPCVOID der, DWORD derLen, PCRYPT_KEY_PROV_INFO pInfo, LPCWSTR filename) { BOOL isExported = FALSE; HCERTSTORE hTempStore; PCCERT_CONTEXT pCertContext; if(hTempStore = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0, CERT_STORE_CREATE_NEW_FLAG, NULL)) { if(CertAddEncodedCertificateToStore(hTempStore, X509_ASN_ENCODING, (LPCBYTE) der, derLen, CERT_STORE_ADD_NEW, &pCertContext)) { if(CertSetCertificateContextProperty(pCertContext, CERT_KEY_PROV_INFO_PROP_ID, 0, (LPCVOID) pInfo)) isExported = kull_m_crypto_exportPfx(hTempStore, filename); else PRINT_ERROR_AUTO(L"CertSetCertificateContextProperty(CERT_KEY_PROV_INFO_PROP_ID)"); CertFreeCertificateContext(pCertContext); } else PRINT_ERROR_AUTO(L"CertAddEncodedCertificateToStore"); CertCloseStore(hTempStore, CERT_CLOSE_STORE_FORCE_FLAG); } return isExported; } BOOL kull_m_crypto_DerAndKeyInfoToStore(LPCVOID der, DWORD derLen, PCRYPT_KEY_PROV_INFO pInfo, DWORD systemStore, LPCWSTR store, BOOL force) { BOOL status = FALSE; HCERTSTORE hTempStore; PCCERT_CONTEXT pCertContext; if(hTempStore = CertOpenStore(CERT_STORE_PROV_SYSTEM, 0, 0, CERT_STORE_OPEN_EXISTING_FLAG | systemStore, store)) { if(CertAddEncodedCertificateToStore(hTempStore, X509_ASN_ENCODING, (LPCBYTE) der, derLen, force ? CERT_STORE_ADD_ALWAYS : CERT_STORE_ADD_NEW, &pCertContext)) { if(!(status = CertSetCertificateContextProperty(pCertContext, CERT_KEY_PROV_INFO_PROP_ID, 0, (LPCVOID) pInfo))) PRINT_ERROR_AUTO(L"CertSetCertificateContextProperty(CERT_KEY_PROV_INFO_PROP_ID)"); CertFreeCertificateContext(pCertContext); } else PRINT_ERROR_AUTO(L"CertAddEncodedCertificateToStore"); CertCloseStore(hTempStore, CERT_CLOSE_STORE_FORCE_FLAG); } return status; } const KULL_M_CRYPTO_DUAL_STRING_DWORD kull_m_crypto_system_stores[] = { {L"CERT_SYSTEM_STORE_CURRENT_USER", CERT_SYSTEM_STORE_CURRENT_USER}, {L"CERT_SYSTEM_STORE_CURRENT_USER_GROUP_POLICY", CERT_SYSTEM_STORE_CURRENT_USER_GROUP_POLICY}, {L"CERT_SYSTEM_STORE_LOCAL_MACHINE", CERT_SYSTEM_STORE_LOCAL_MACHINE}, {L"CERT_SYSTEM_STORE_LOCAL_MACHINE_GROUP_POLICY", CERT_SYSTEM_STORE_LOCAL_MACHINE_GROUP_POLICY}, {L"CERT_SYSTEM_STORE_LOCAL_MACHINE_ENTERPRISE", CERT_SYSTEM_STORE_LOCAL_MACHINE_ENTERPRISE}, {L"CERT_SYSTEM_STORE_CURRENT_SERVICE", CERT_SYSTEM_STORE_CURRENT_SERVICE}, {L"CERT_SYSTEM_STORE_USERS", CERT_SYSTEM_STORE_USERS}, {L"CERT_SYSTEM_STORE_SERVICES", CERT_SYSTEM_STORE_SERVICES}, }; const KULL_M_CRYPTO_DUAL_STRING_STRING kull_m_crypto_provider_names[] = { {L"MS_DEF_PROV", MS_DEF_PROV}, {L"MS_ENHANCED_PROV", MS_ENHANCED_PROV}, {L"MS_STRONG_PROV", MS_STRONG_PROV}, {L"MS_DEF_RSA_SIG_PROV", MS_DEF_RSA_SIG_PROV}, {L"MS_DEF_RSA_SCHANNEL_PROV", MS_DEF_RSA_SCHANNEL_PROV}, {L"MS_DEF_DSS_PROV", MS_DEF_DSS_PROV}, {L"MS_DEF_DSS_DH_PROV", MS_DEF_DSS_DH_PROV}, {L"MS_ENH_DSS_DH_PROV", MS_ENH_DSS_DH_PROV}, {L"MS_DEF_DH_SCHANNEL_PROV", MS_DEF_DH_SCHANNEL_PROV}, {L"MS_SCARD_PROV", MS_SCARD_PROV}, {L"MS_ENH_RSA_AES_PROV_XP", MS_ENH_RSA_AES_PROV_XP}, {L"MS_ENH_RSA_AES_PROV", MS_ENH_RSA_AES_PROV}, }; const KULL_M_CRYPTO_DUAL_STRING_DWORD kull_m_crypto_provider_types[] = { {L"PROV_RSA_FULL", PROV_RSA_FULL}, {L"PROV_RSA_SIG", PROV_RSA_SIG}, {L"PROV_DSS", PROV_DSS}, {L"PROV_FORTEZZA", PROV_FORTEZZA}, {L"PROV_MS_EXCHANGE", PROV_MS_EXCHANGE}, {L"PROV_SSL", PROV_SSL}, {L"PROV_RSA_SCHANNEL", PROV_RSA_SCHANNEL}, {L"PROV_DSS_DH", PROV_DSS_DH}, {L"PROV_EC_ECDSA_SIG", PROV_EC_ECDSA_SIG}, {L"PROV_EC_ECNRA_SIG", PROV_EC_ECNRA_SIG}, {L"PROV_EC_ECDSA_FULL", PROV_EC_ECDSA_FULL}, {L"PROV_EC_ECNRA_FULL", PROV_EC_ECNRA_FULL}, {L"PROV_DH_SCHANNEL", PROV_DH_SCHANNEL}, {L"PROV_SPYRUS_LYNKS", PROV_SPYRUS_LYNKS}, {L"PROV_RNG", PROV_RNG}, {L"PROV_INTEL_SEC", PROV_INTEL_SEC}, {L"PROV_REPLACE_OWF", PROV_REPLACE_OWF}, {L"PROV_RSA_AES", PROV_RSA_AES}, }; const KULL_M_CRYPTO_DUAL_STRING_DWORD kull_m_crypto_calgid[] = { {L"CALG_MD2", CALG_MD2}, {L"CALG_MD4", CALG_MD4}, {L"CALG_MD5", CALG_MD5}, //{L"CALG_SHA", CALG_SHA}, {L"CALG_SHA1", CALG_SHA1}, {L"CALG_MAC", CALG_MAC}, {L"CALG_RSA_SIGN", CALG_RSA_SIGN}, {L"CALG_DSS_SIGN", CALG_DSS_SIGN}, {L"CALG_NO_SIGN", CALG_NO_SIGN}, {L"CALG_RSA_KEYX", CALG_RSA_KEYX}, {L"CALG_DES", CALG_DES}, {L"CALG_3DES_112", CALG_3DES_112}, {L"CALG_3DES", CALG_3DES}, {L"CALG_DESX", CALG_DESX}, {L"CALG_RC2", CALG_RC2}, {L"CALG_RC4", CALG_RC4}, {L"CALG_SEAL", CALG_SEAL}, {L"CALG_DH_SF", CALG_DH_SF}, {L"CALG_DH_EPHEM", CALG_DH_EPHEM}, {L"CALG_AGREEDKEY_ANY", CALG_AGREEDKEY_ANY}, {L"CALG_KEA_KEYX", CALG_KEA_KEYX}, {L"CALG_HUGHES_MD5", CALG_HUGHES_MD5}, {L"CALG_SKIPJACK", CALG_SKIPJACK}, {L"CALG_TEK", CALG_TEK}, {L"CALG_CYLINK_MEK", CALG_CYLINK_MEK}, {L"CALG_SSL3_SHAMD5", CALG_SSL3_SHAMD5}, {L"CALG_SSL3_MASTER", CALG_SSL3_MASTER}, {L"CALG_SCHANNEL_MASTER_HASH", CALG_SCHANNEL_MASTER_HASH}, {L"CALG_SCHANNEL_MAC_KEY", CALG_SCHANNEL_MAC_KEY}, {L"CALG_SCHANNEL_ENC_KEY", CALG_SCHANNEL_ENC_KEY}, {L"CALG_PCT1_MASTER", CALG_PCT1_MASTER}, {L"CALG_SSL2_MASTER", CALG_SSL2_MASTER}, {L"CALG_TLS1_MASTER", CALG_TLS1_MASTER}, {L"CALG_RC5", CALG_RC5}, {L"CALG_HMAC", CALG_HMAC}, {L"CALG_TLS1PRF", CALG_TLS1PRF}, {L"CALG_HASH_REPLACE_OWF", CALG_HASH_REPLACE_OWF}, {L"CALG_AES_128", CALG_AES_128}, {L"CALG_AES_192", CALG_AES_192}, {L"CALG_AES_256", CALG_AES_256}, {L"CALG_AES", CALG_AES}, {L"CALG_SHA_256", CALG_SHA_256}, {L"CALG_SHA_384", CALG_SHA_384}, {L"CALG_SHA_512", CALG_SHA_512}, {L"CALG_ECDH", CALG_ECDH}, {L"CALG_ECMQV", CALG_ECMQV}, {L"CALG_ECDSA", CALG_ECDSA}, }; const KULL_M_CRYPTO_DUAL_STRING_DWORD kull_m_crypto_cert_prop_id[] = { {L"CERT_KEY_PROV_HANDLE_PROP_ID", CERT_KEY_PROV_HANDLE_PROP_ID}, {L"CERT_KEY_PROV_INFO_PROP_ID", CERT_KEY_PROV_INFO_PROP_ID}, {L"CERT_SHA1_HASH_PROP_ID", CERT_SHA1_HASH_PROP_ID}, {L"CERT_MD5_HASH_PROP_ID", CERT_MD5_HASH_PROP_ID}, {L"CERT_HASH_PROP_ID", CERT_HASH_PROP_ID}, {L"CERT_KEY_CONTEXT_PROP_ID", CERT_KEY_CONTEXT_PROP_ID}, {L"CERT_KEY_SPEC_PROP_ID", CERT_KEY_SPEC_PROP_ID}, {L"CERT_IE30_RESERVED_PROP_ID", CERT_IE30_RESERVED_PROP_ID}, {L"CERT_PUBKEY_HASH_RESERVED_PROP_ID", CERT_PUBKEY_HASH_RESERVED_PROP_ID}, {L"CERT_ENHKEY_USAGE_PROP_ID", CERT_ENHKEY_USAGE_PROP_ID}, {L"CERT_CTL_USAGE_PROP_ID", CERT_ENHKEY_USAGE_PROP_ID}, {L"CERT_NEXT_UPDATE_LOCATION_PROP_ID", CERT_NEXT_UPDATE_LOCATION_PROP_ID}, {L"CERT_FRIENDLY_NAME_PROP_ID", CERT_FRIENDLY_NAME_PROP_ID}, {L"CERT_PVK_FILE_PROP_ID", CERT_PVK_FILE_PROP_ID}, {L"CERT_DESCRIPTION_PROP_ID", CERT_DESCRIPTION_PROP_ID}, {L"CERT_ACCESS_STATE_PROP_ID", CERT_ACCESS_STATE_PROP_ID}, {L"CERT_SIGNATURE_HASH_PROP_ID", CERT_SIGNATURE_HASH_PROP_ID}, {L"CERT_SMART_CARD_DATA_PROP_ID", CERT_SMART_CARD_DATA_PROP_ID}, {L"CERT_EFS_PROP_ID", CERT_EFS_PROP_ID}, {L"CERT_FORTEZZA_DATA_PROP_ID", CERT_FORTEZZA_DATA_PROP_ID}, {L"CERT_ARCHIVED_PROP_ID", CERT_ARCHIVED_PROP_ID}, {L"CERT_KEY_IDENTIFIER_PROP_ID", CERT_KEY_IDENTIFIER_PROP_ID}, {L"CERT_AUTO_ENROLL_PROP_ID", CERT_AUTO_ENROLL_PROP_ID}, {L"CERT_PUBKEY_ALG_PARA_PROP_ID", CERT_PUBKEY_ALG_PARA_PROP_ID}, {L"CERT_CROSS_CERT_DIST_POINTS_PROP_ID", CERT_CROSS_CERT_DIST_POINTS_PROP_ID}, {L"CERT_ISSUER_PUBLIC_KEY_MD5_HASH_PROP_ID", CERT_ISSUER_PUBLIC_KEY_MD5_HASH_PROP_ID}, {L"CERT_SUBJECT_PUBLIC_KEY_MD5_HASH_PROP_ID", CERT_SUBJECT_PUBLIC_KEY_MD5_HASH_PROP_ID}, {L"CERT_ENROLLMENT_PROP_ID", CERT_ENROLLMENT_PROP_ID}, {L"CERT_DATE_STAMP_PROP_ID", CERT_DATE_STAMP_PROP_ID}, {L"CERT_ISSUER_SERIAL_NUMBER_MD5_HASH_PROP_ID", CERT_ISSUER_SERIAL_NUMBER_MD5_HASH_PROP_ID}, {L"CERT_SUBJECT_NAME_MD5_HASH_PROP_ID", CERT_SUBJECT_NAME_MD5_HASH_PROP_ID}, {L"CERT_EXTENDED_ERROR_INFO_PROP_ID", CERT_EXTENDED_ERROR_INFO_PROP_ID}, {L"CERT_cert_file_element", CERT_cert_file_element}, {L"CERT_crl_file_element", CERT_crl_file_element}, {L"CERT_ctl_file_element", CERT_ctl_file_element}, {L"CERT_keyid_file_element", CERT_keyid_file_element}, // 36 - 62 future elements IDs // 63 ? {L"CERT_RENEWAL_PROP_ID", CERT_RENEWAL_PROP_ID}, {L"CERT_ARCHIVED_KEY_HASH_PROP_ID", CERT_ARCHIVED_KEY_HASH_PROP_ID}, {L"CERT_AUTO_ENROLL_RETRY_PROP_ID", CERT_AUTO_ENROLL_RETRY_PROP_ID}, {L"CERT_AIA_URL_RETRIEVED_PROP_ID", CERT_AIA_URL_RETRIEVED_PROP_ID}, {L"CERT_AUTHORITY_INFO_ACCESS_PROP_ID", CERT_AUTHORITY_INFO_ACCESS_PROP_ID}, {L"CERT_BACKED_UP_PROP_ID", CERT_BACKED_UP_PROP_ID}, {L"CERT_OCSP_RESPONSE_PROP_ID", CERT_OCSP_RESPONSE_PROP_ID}, {L"CERT_REQUEST_ORIGINATOR_PROP_ID", CERT_REQUEST_ORIGINATOR_PROP_ID}, {L"CERT_SOURCE_LOCATION_PROP_ID", CERT_SOURCE_LOCATION_PROP_ID}, {L"CERT_SOURCE_URL_PROP_ID", CERT_SOURCE_URL_PROP_ID}, {L"CERT_NEW_KEY_PROP_ID", CERT_NEW_KEY_PROP_ID}, {L"CERT_OCSP_CACHE_PREFIX_PROP_ID", CERT_OCSP_CACHE_PREFIX_PROP_ID}, {L"CERT_SMART_CARD_ROOT_INFO_PROP_ID", CERT_SMART_CARD_ROOT_INFO_PROP_ID}, {L"CERT_NO_AUTO_EXPIRE_CHECK_PROP_ID", CERT_NO_AUTO_EXPIRE_CHECK_PROP_ID}, {L"CERT_NCRYPT_KEY_HANDLE_PROP_ID", CERT_NCRYPT_KEY_HANDLE_PROP_ID}, {L"CERT_HCRYPTPROV_OR_NCRYPT_KEY_HANDLE_PROP_ID", CERT_HCRYPTPROV_OR_NCRYPT_KEY_HANDLE_PROP_ID}, {L"CERT_SUBJECT_INFO_ACCESS_PROP_ID", CERT_SUBJECT_INFO_ACCESS_PROP_ID}, {L"CERT_CA_OCSP_AUTHORITY_INFO_ACCESS_PROP_ID", CERT_CA_OCSP_AUTHORITY_INFO_ACCESS_PROP_ID}, {L"CERT_CA_DISABLE_CRL_PROP_ID", CERT_CA_DISABLE_CRL_PROP_ID}, {L"CERT_ROOT_PROGRAM_CERT_POLICIES_PROP_ID", CERT_ROOT_PROGRAM_CERT_POLICIES_PROP_ID}, {L"CERT_ROOT_PROGRAM_NAME_CONSTRAINTS_PROP_ID", CERT_ROOT_PROGRAM_NAME_CONSTRAINTS_PROP_ID}, {L"CERT_SUBJECT_OCSP_AUTHORITY_INFO_ACCESS_PROP_ID", 85}, {L"CERT_SUBJECT_DISABLE_CRL_PROP_ID", 86}, {L"CERT_CEP_PROP_ID", 87}, {L"CERT_original_CEP_PROP_ID", 88}, {L"CERT_SIGN_HASH_CNG_ALG_PROP_ID", 89}, {L"CERT_SCARD_PIN_ID_PROP_ID", 90}, {L"CERT_SCARD_PIN_INFO_PROP_ID", 91}, {L"CERT_SUBJECT_PUB_KEY_BIT_LENGTH_PROP_ID", 92}, {L"CERT_PUB_KEY_CNG_ALG_BIT_LENGTH_PROP_ID", 93}, {L"CERT_ISSUER_PUB_KEY_BIT_LENGTH_PROP_ID", 94}, {L"CERT_ISSUER_CHAIN_SIGN_HASH_CNG_ALG_PROP_ID", 95}, {L"CERT_ISSUER_CHAIN_PUB_KEY_CNG_ALG_BIT_LENGTH_PROP_ID", 96}, {L"CERT_NO_EXPIRE_NOTIFICATION_PROP_ID", 97}, {L"CERT_AUTH_ROOT_SHA256_HASH_PROP_ID", 98}, {L"CERT_NCRYPT_KEY_HANDLE_TRANSFER_PROP_ID", 99}, {L"CERT_HCRYPTPROV_TRANSFER_PROP_ID", 100}, {L"CERT_SMART_CARD_READER_PROP_ID", 101}, //string {L"CERT_SEND_AS_TRUSTED_ISSUER_PROP_ID", 102}, //boolean {L"CERT_KEY_REPAIR_ATTEMPTED_PROP_ID", 103}, // FILETME {L"CERT_DISALLOWED_FILETIME_PROP_ID", 104}, {L"CERT_ROOT_PROGRAM_CHAIN_POLICIES_PROP_ID", 105}, {L"CERT_SMART_CARD_READER_NON_REMOVABLE_PROP_ID", 106}, // boolean {L"CERT_SHA256_HASH_PROP_ID", 107}, {L"CERT_SCEP_SERVER_CERTS_PROP_ID", 108}, // Pkcs7 {L"CERT_SCEP_RA_SIGNATURE_CERT_PROP_ID", 109}, // sha1 Thumbprint {L"CERT_SCEP_RA_ENCRYPTION_CERT_PROP_ID", 110}, // sha1 Thumbprint {L"CERT_SCEP_CA_CERT_PROP_ID", 111}, // sha1 Thumbprint {L"CERT_SCEP_SIGNER_CERT_PROP_ID", 112}, // sha1 Thumbprint {L"CERT_SCEP_NONCE_PROP_ID", 113}, // blob {L"CERT_SCEP_ENCRYPT_HASH_CNG_ALG_PROP_ID", 114}, // string: "CNGEncryptAlgId/CNGHashAlgId" example: "3DES/SHA1" {L"CERT_SCEP_FLAGS_PROP_ID", 115}, }; DWORD kull_m_crypto_system_store_to_dword(PCWSTR name) { DWORD i; if(name) for(i = 0; i < ARRAYSIZE(kull_m_crypto_system_stores); i++) if((_wcsicmp(name, kull_m_crypto_system_stores[i].name) == 0) || (_wcsicmp(name, kull_m_crypto_system_stores[i].name + 18) == 0)) return kull_m_crypto_system_stores[i].id; return 0; } DWORD kull_m_crypto_provider_type_to_dword(PCWSTR name) { DWORD i; if(name) for(i = 0; i < ARRAYSIZE(kull_m_crypto_provider_types); i++) if((_wcsicmp(name, kull_m_crypto_provider_types[i].name) == 0) || (_wcsicmp(name, kull_m_crypto_provider_types[i].name + 5) == 0)) return kull_m_crypto_provider_types[i].id; return 0; } PCWSTR kull_m_crypto_provider_type_to_name(const DWORD dwProvType) { DWORD i; if(!dwProvType) return L"PROV_cng" + 5; for(i = 0; i < ARRAYSIZE(kull_m_crypto_provider_types); i++) if(kull_m_crypto_provider_types[i].id == dwProvType) return kull_m_crypto_provider_types[i].name + 5; return NULL; } PCWCHAR kull_m_crypto_provider_to_realname(PCWSTR name) { DWORD i; if(name) for(i = 0; i < ARRAYSIZE(kull_m_crypto_provider_names); i++) if((_wcsicmp(name, kull_m_crypto_provider_names[i].name) == 0) || (_wcsicmp(name, kull_m_crypto_provider_names[i].name + 3) == 0)) return kull_m_crypto_provider_names[i].realname; return NULL; } PCWCHAR kull_m_crypto_keytype_to_str(const DWORD keyType) { switch (keyType) { case AT_KEYEXCHANGE: return L"AT_KEYEXCHANGE"; case AT_SIGNATURE: return L"AT_SIGNATURE"; case CERT_NCRYPT_KEY_SPEC: return L"CNG Key"; default: return L"?"; } } PCWCHAR kull_m_crypto_algid_to_name(ALG_ID algid) { DWORD i; for(i = 0; i < ARRAYSIZE(kull_m_crypto_calgid); i++) if(kull_m_crypto_calgid[i].id == algid) return kull_m_crypto_calgid[i].name; return NULL; } ALG_ID kull_m_crypto_name_to_algid(PCWSTR name) { DWORD i; if(name) for(i = 0; i < ARRAYSIZE(kull_m_crypto_calgid); i++) if((_wcsicmp(name, kull_m_crypto_calgid[i].name) == 0) || (_wcsicmp(name, kull_m_crypto_calgid[i].name + 5) == 0)) return kull_m_crypto_calgid[i].id; return 0; } PCWCHAR kull_m_crypto_cert_prop_id_to_name(const DWORD propId) { DWORD i; PCWCHAR result = NULL; for(i = 0; i < ARRAYSIZE(kull_m_crypto_cert_prop_id); i++) if(kull_m_crypto_cert_prop_id[i].id == propId) { result = kull_m_crypto_cert_prop_id[i].name; break; } if(!result) { if((propId >= 36) && (propId <= 62)) result = L"CERT_unk_future_use"; else if(propId == 63) result = L"CERT_unk_63_maybe_future_use"; else if ((propId >= 116) && (propId <= CERT_LAST_RESERVED_PROP_ID)) result = L"CERT_reserved_prop_id"; else if ((propId >= CERT_FIRST_USER_PROP_ID) && (propId <= CERT_LAST_USER_PROP_ID)) result = L"CERT_user_prop_id"; } return result + 5; } const BYTE kull_m_crypto_dh_g_rgbPrime[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x81, 0x53, 0xe6, 0xec, 0x51, 0x66, 0x28, 0x49, 0xe6, 0x1f, 0x4b, 0x7c, 0x11, 0x24, 0x9f, 0xae, 0xa5, 0x9f, 0x89, 0x5a, 0xfb, 0x6b, 0x38, 0xee, 0xed, 0xb7, 0x06, 0xf4, 0xb6, 0x5c, 0xff, 0x0b, 0x6b, 0xed, 0x37, 0xa6, 0xe9, 0x42, 0x4c, 0xf4, 0xc6, 0x7e, 0x5e, 0x62, 0x76, 0xb5, 0x85, 0xe4, 0x45, 0xc2, 0x51, 0x6d, 0x6d, 0x35, 0xe1, 0x4f, 0x37, 0x14, 0x5f, 0xf2, 0x6d, 0x0a, 0x2b, 0x30, 0x1b, 0x43, 0x3a, 0xcd, 0xb3, 0x19, 0x95, 0xef, 0xdd, 0x04, 0x34, 0x8e, 0x79, 0x08, 0x4a, 0x51, 0x22, 0x9b, 0x13, 0x3b, 0xa6, 0xbe, 0x0b, 0x02, 0x74, 0xcc, 0x67, 0x8a, 0x08, 0x4e, 0x02, 0x29, 0xd1, 0x1c, 0xdc, 0x80, 0x8b, 0x62, 0xc6, 0xc4, 0x34, 0xc2, 0x68, 0x21, 0xa2, 0xda, 0x0f, 0xc9, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, }; const BYTE kull_m_crypto_dh_g_rgbGenerator[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; const CERT_X942_DH_PARAMETERS kull_m_crypto_dh_GlobParameters = { {sizeof(kull_m_crypto_dh_g_rgbPrime), (PBYTE) kull_m_crypto_dh_g_rgbPrime}, {sizeof(kull_m_crypto_dh_g_rgbGenerator), (PBYTE) kull_m_crypto_dh_g_rgbGenerator}, {0, NULL}, {0, NULL}, NULL }; PKIWI_DH kull_m_crypto_dh_Delete(PKIWI_DH dh) { if(dh) { if(dh->publicKey.pbPublicKey) LocalFree(dh->publicKey.pbPublicKey); if(dh->hPrivateKey) CryptDestroyKey(dh->hPrivateKey); if(dh->hSessionKey) CryptDestroyKey(dh->hSessionKey); if(dh->hProvParty) CryptReleaseContext(dh->hProvParty, 0); dh = (PKIWI_DH) LocalFree(dh); } return dh; } PKIWI_DH kull_m_crypto_dh_Create(ALG_ID targetSessionKeyType) { PKIWI_DH dh = NULL; BOOL status = FALSE; if(dh = (PKIWI_DH) LocalAlloc(LPTR, sizeof(KIWI_DH))) { dh->publicKey.sessionType = targetSessionKeyType; if(CryptAcquireContext(&dh->hProvParty, NULL, MS_ENH_DSS_DH_PROV, PROV_DSS_DH, CRYPT_VERIFYCONTEXT)) if(CryptGenKey(dh->hProvParty, CALG_DH_EPHEM, (1024 << 16) | CRYPT_EXPORTABLE | CRYPT_PREGEN, &dh->hPrivateKey)) if(CryptSetKeyParam(dh->hPrivateKey, KP_P, (PBYTE) &kull_m_crypto_dh_GlobParameters.p, 0)) if(CryptSetKeyParam(dh->hPrivateKey, KP_G, (PBYTE) &kull_m_crypto_dh_GlobParameters.g, 0)) if(CryptSetKeyParam(dh->hPrivateKey, KP_X, NULL, 0)) if(CryptExportKey(dh->hPrivateKey, 0, PUBLICKEYBLOB, 0, NULL, &dh->publicKey.cbPublicKey)) if(dh->publicKey.pbPublicKey = (PBYTE) LocalAlloc(LPTR, dh->publicKey.cbPublicKey)) status = CryptExportKey(dh->hPrivateKey, 0, PUBLICKEYBLOB, 0, dh->publicKey.pbPublicKey, &dh->publicKey.cbPublicKey); if(!status) dh = (PKIWI_DH) kull_m_crypto_dh_Delete(dh); } return dh; } BOOL kull_m_crypto_dh_CreateSessionKey(PKIWI_DH dh, PMIMI_PUBLICKEY publicKey) { BOOL status = FALSE; dh->hSessionKey = 0; if(dh && publicKey) { if(dh->publicKey.sessionType == publicKey->sessionType) { if(CryptImportKey(dh->hProvParty, publicKey->pbPublicKey, publicKey->cbPublicKey, dh->hPrivateKey, 0, &dh->hSessionKey)) { if(!(status = CryptSetKeyParam(dh->hSessionKey, KP_ALGID, (PBYTE) &dh->publicKey.sessionType, 0))) { PRINT_ERROR_AUTO(L"CryptSetKeyParam"); CryptDestroyKey(dh->hSessionKey); dh->hSessionKey = 0; } } else PRINT_ERROR_AUTO(L"CryptImportKey"); } else PRINT_ERROR(L"Alg mismatch: DH - %s (%08x) / P - %s (%08x)\n", kull_m_crypto_algid_to_name(dh->publicKey.sessionType), dh->publicKey.sessionType, kull_m_crypto_algid_to_name(publicKey->sessionType), publicKey->sessionType); } return status; } BOOL kull_m_crypto_dh_simpleEncrypt(HCRYPTKEY key, LPVOID data, DWORD dataLen, LPVOID *out, DWORD *outLen) { BOOL status = FALSE; HCRYPTKEY hTmp; *out = NULL; *outLen = dataLen; if(CryptDuplicateKey(key, NULL, 0, &hTmp)) { if(CryptEncrypt(hTmp, 0, TRUE, 0, NULL, outLen, 0)) { if(*out = LocalAlloc(LPTR, *outLen)) { RtlCopyMemory(*out, data, dataLen); if(!(status = CryptEncrypt(hTmp, 0, TRUE, 0, (PBYTE) *out, &dataLen, *outLen))) *out = LocalFree(*out); } } CryptDestroyKey(hTmp); } return status; } BOOL kull_m_crypto_dh_simpleDecrypt(HCRYPTKEY key, LPVOID data, DWORD dataLen, LPVOID *out, DWORD *outLen) { BOOL status = FALSE; HCRYPTKEY hTmp; *out = NULL; *outLen = dataLen; if(CryptDuplicateKey(key, NULL, 0, &hTmp)) { if(*out = LocalAlloc(LPTR, dataLen)) { RtlCopyMemory(*out, data, dataLen); if(!(status = CryptDecrypt(hTmp, 0, TRUE, 0, (PBYTE) *out, outLen))) *out = LocalFree(*out); } CryptDestroyKey(hTmp); } return status; }