2025-05-13 19:45:22 +03:00

363 lines
13 KiB
C

/*
* Process Hacker -
* Custom data signing tool
*
* Copyright (C) 2016 wj32
*
* This file is part of Process Hacker.
*
* Process Hacker is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Process Hacker is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with Process Hacker. If not, see <http://www.gnu.org/licenses/>.
*/
#include <ph.h>
#include <bcrypt.h>
#define CST_SIGN_ALGORITHM BCRYPT_ECDSA_P256_ALGORITHM
#define CST_SIGN_ALGORITHM_BITS 256
#define CST_HASH_ALGORITHM BCRYPT_SHA256_ALGORITHM
#define CST_BLOB_PRIVATE BCRYPT_ECCPRIVATE_BLOB
#define CST_BLOB_PUBLIC BCRYPT_ECCPUBLIC_BLOB
#define FILE_BUFFER_SIZE PAGE_SIZE
#define ARG_KEY 1
#define ARG_SIG 2
PPH_STRING CstCommand = NULL;
PPH_STRING CstArgument1 = NULL;
PPH_STRING CstArgument2 = NULL;
PPH_STRING CstKeyFileName = NULL;
PPH_STRING CstSigFileName = NULL;
PWSTR CstHelpMessage =
L"Usage: CustomSignTool.exe command ...\n"
L"Commands:\n"
L"createkeypair\tprivatekeyfile publickeyfile\n"
L"sign\t\t-k privatekeyfile -s outputsigfile inputfile\n"
L"verify\t\t-k publickeyfile -s inputsigfile inputfile\n"
;
static BOOLEAN NTAPI CstCommandLineCallback(
_In_opt_ PPH_COMMAND_LINE_OPTION Option,
_In_opt_ PPH_STRING Value,
_In_opt_ PVOID Context
)
{
if (Option)
{
switch (Option->Id)
{
case ARG_KEY:
PhSwapReference(&CstKeyFileName, Value);
break;
case ARG_SIG:
PhSwapReference(&CstSigFileName, Value);
break;
}
}
else
{
if (!CstCommand)
PhSwapReference(&CstCommand, Value);
else if (!CstArgument1)
PhSwapReference(&CstArgument1, Value);
else if (!CstArgument2)
PhSwapReference(&CstArgument2, Value);
}
return TRUE;
}
DECLSPEC_NORETURN
static VOID CstFailWith(
_In_ PWSTR Message
)
{
wprintf(L"%s\n", Message);
RtlExitUserProcess(1);
}
DECLSPEC_NORETURN
static VOID CstFailWithStatus(
_In_ PWSTR Message,
_In_ NTSTATUS Status,
_In_opt_ ULONG Win32Result
)
{
wprintf(L"%s: %s\n", Message, PhGetStatusMessage(Status, Win32Result)->Buffer);
RtlExitUserProcess(1);
}
static VOID CstExportKey(
_In_ BCRYPT_KEY_HANDLE KeyHandle,
_In_ PWSTR BlobType,
_In_ PWSTR FileName,
_In_ PWSTR Description
)
{
NTSTATUS status;
ULONG blobSize;
PVOID blob;
HANDLE fileHandle;
IO_STATUS_BLOCK iosb;
if (!NT_SUCCESS(status = BCryptExportKey(KeyHandle, NULL, BlobType, NULL, 0, &blobSize, 0)))
CstFailWithStatus(PhFormatString(L"Unable to export %s: Unable to get blob size", Description)->Buffer, status, 0);
blob = PhAllocate(blobSize);
if (!NT_SUCCESS(status = BCryptExportKey(KeyHandle, NULL, BlobType, blob, blobSize, &blobSize, 0)))
CstFailWithStatus(PhFormatString(L"Unable to export %s: Unable to get blob data", Description)->Buffer, status, 0);
if (!NT_SUCCESS(status = PhCreateFileWin32(&fileHandle, FileName, FILE_GENERIC_WRITE, FILE_ATTRIBUTE_NORMAL, 0, FILE_OVERWRITE_IF, FILE_SYNCHRONOUS_IO_NONALERT | FILE_NON_DIRECTORY_FILE)))
CstFailWithStatus(PhFormatString(L"Unable to create '%s'", FileName)->Buffer, status, 0);
if (!NT_SUCCESS(status = NtWriteFile(fileHandle, NULL, NULL, NULL, &iosb, blob, blobSize, NULL, NULL)))
CstFailWithStatus(PhFormatString(L"Unable to write blob to '%s'", FileName)->Buffer, status, 0);
NtClose(fileHandle);
RtlSecureZeroMemory(blob, blobSize);
PhFree(blob);
}
static PVOID CstReadFile(
_In_ PWSTR FileName,
_In_ ULONG FileSizeLimit,
_Out_ PULONG FileSize
)
{
NTSTATUS status;
HANDLE fileHandle;
LARGE_INTEGER fileSize;
PVOID buffer;
IO_STATUS_BLOCK iosb;
if (!NT_SUCCESS(status = PhCreateFileWin32(&fileHandle, FileName, FILE_GENERIC_READ, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OPEN, FILE_SYNCHRONOUS_IO_NONALERT | FILE_NON_DIRECTORY_FILE)))
CstFailWithStatus(PhFormatString(L"Unable to open '%s'", FileName)->Buffer, status, 0);
if (!NT_SUCCESS(status = PhGetFileSize(fileHandle, &fileSize)))
CstFailWithStatus(PhFormatString(L"Unable to get the size of '%s'", FileName)->Buffer, status, 0);
if (fileSize.QuadPart > FileSizeLimit)
CstFailWith(PhFormatString(L"The file '%s' is too large", FileName)->Buffer);
buffer = PhAllocate((ULONG)fileSize.QuadPart);
if (!NT_SUCCESS(status = NtReadFile(fileHandle, NULL, NULL, NULL, &iosb, buffer, (ULONG)fileSize.QuadPart, NULL, NULL)))
CstFailWithStatus(PhFormatString(L"Unable to read '%s'", FileName)->Buffer, status, 0);
NtClose(fileHandle);
*FileSize = (ULONG)fileSize.QuadPart;
return buffer;
}
static PVOID CstHashFile(
_In_ PWSTR FileName,
_Out_ PULONG HashSize
)
{
NTSTATUS status;
HANDLE fileHandle;
PVOID buffer;
IO_STATUS_BLOCK iosb;
BCRYPT_ALG_HANDLE hashAlgHandle;
ULONG querySize;
ULONG hashObjectSize;
ULONG hashSize;
PVOID hashObject;
BCRYPT_HASH_HANDLE hashHandle;
PVOID hash;
if (!NT_SUCCESS(status = BCryptOpenAlgorithmProvider(&hashAlgHandle, CST_HASH_ALGORITHM, NULL, 0)))
CstFailWithStatus(L"Unable to open the hashing algorithm provider", status, 0);
if (!NT_SUCCESS(status = BCryptGetProperty(hashAlgHandle, BCRYPT_OBJECT_LENGTH, (PUCHAR)&hashObjectSize, sizeof(ULONG), &querySize, 0)))
CstFailWithStatus(L"Unable to query hash object size", status, 0);
if (!NT_SUCCESS(status = BCryptGetProperty(hashAlgHandle, BCRYPT_HASH_LENGTH, (PUCHAR)&hashSize, sizeof(ULONG), &querySize, 0)))
CstFailWithStatus(L"Unable to query hash size", status, 0);
hashObject = PhAllocate(hashObjectSize);
if (!NT_SUCCESS(status = BCryptCreateHash(hashAlgHandle, &hashHandle, hashObject, hashObjectSize, NULL, 0, 0)))
CstFailWithStatus(L"Unable to get hash handle", status, 0);
if (!NT_SUCCESS(status = PhCreateFileWin32(&fileHandle, FileName, FILE_GENERIC_READ, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OPEN, FILE_SYNCHRONOUS_IO_NONALERT | FILE_NON_DIRECTORY_FILE)))
CstFailWithStatus(PhFormatString(L"Unable to open '%s'", FileName)->Buffer, status, 0);
buffer = PhAllocatePage(FILE_BUFFER_SIZE, NULL);
while (TRUE)
{
if (!NT_SUCCESS(status = NtReadFile(fileHandle, NULL, NULL, NULL, &iosb, buffer, FILE_BUFFER_SIZE, NULL, NULL)))
{
if (status == STATUS_END_OF_FILE)
break;
CstFailWithStatus(PhFormatString(L"Unable to read '%s'", FileName)->Buffer, status, 0);
}
if (!NT_SUCCESS(status = BCryptHashData(hashHandle, buffer, (ULONG)iosb.Information, 0)))
CstFailWithStatus(L"Unable to hash file", status, 0);
}
PhFreePage(buffer);
NtClose(fileHandle);
hash = PhAllocate(hashSize);
if (!NT_SUCCESS(status = BCryptFinishHash(hashHandle, hash, hashSize, 0)))
CstFailWithStatus(L"Unable to complete the hash", status, 0);
PhFree(hashObject);
BCryptDestroyHash(hashHandle);
BCryptCloseAlgorithmProvider(hashAlgHandle, 0);
*HashSize = hashSize;
return hash;
}
int __cdecl wmain(int argc, wchar_t *argv[])
{
static PH_COMMAND_LINE_OPTION options[] =
{
{ ARG_KEY, L"k", MandatoryArgumentType },
{ ARG_SIG, L"s", MandatoryArgumentType }
};
NTSTATUS status;
PH_STRINGREF commandLine;
if (!NT_SUCCESS(PhInitializePhLibEx(0, 0, 0)))
return 1;
PhUnicodeStringToStringRef(&NtCurrentPeb()->ProcessParameters->CommandLine, &commandLine);
PhParseCommandLine(
&commandLine,
options,
sizeof(options) / sizeof(PH_COMMAND_LINE_OPTION),
PH_COMMAND_LINE_IGNORE_FIRST_PART,
CstCommandLineCallback,
NULL
);
if (!CstCommand)
CstFailWith(CstHelpMessage);
if (PhEqualString2(CstCommand, L"createkeypair", TRUE))
{
BCRYPT_ALG_HANDLE signAlgHandle;
BCRYPT_KEY_HANDLE keyHandle;
if (!CstArgument1 || !CstArgument2)
CstFailWith(CstHelpMessage);
if (!NT_SUCCESS(status = BCryptOpenAlgorithmProvider(&signAlgHandle, CST_SIGN_ALGORITHM, NULL, 0)))
CstFailWithStatus(L"Unable to open the signing algorithm provider", status, 0);
if (!NT_SUCCESS(status = BCryptGenerateKeyPair(signAlgHandle, &keyHandle, CST_SIGN_ALGORITHM_BITS, 0)))
CstFailWithStatus(L"Unable to create the key", status, 0);
if (!NT_SUCCESS(status = BCryptFinalizeKeyPair(keyHandle, 0)))
CstFailWithStatus(L"Unable to finalize the key", status, 0);
CstExportKey(keyHandle, CST_BLOB_PRIVATE, CstArgument1->Buffer, L"private key");
CstExportKey(keyHandle, CST_BLOB_PUBLIC, CstArgument2->Buffer, L"public key");
BCryptDestroyKey(keyHandle);
BCryptCloseAlgorithmProvider(signAlgHandle, 0);
}
else if (PhEqualString2(CstCommand, L"sign", TRUE))
{
BCRYPT_ALG_HANDLE signAlgHandle;
HANDLE fileHandle;
ULONG bufferSize;
PVOID buffer;
IO_STATUS_BLOCK iosb;
BCRYPT_KEY_HANDLE keyHandle;
ULONG hashSize;
PVOID hash;
ULONG signatureSize;
PVOID signature;
if (!CstArgument1 || !CstKeyFileName || !CstSigFileName)
CstFailWith(CstHelpMessage);
// Import the key.
if (!NT_SUCCESS(status = BCryptOpenAlgorithmProvider(&signAlgHandle, CST_SIGN_ALGORITHM, NULL, 0)))
CstFailWithStatus(L"Unable to open the signing algorithm provider", status, 0);
buffer = CstReadFile(CstKeyFileName->Buffer, 1024 * 1024, &bufferSize);
if (!NT_SUCCESS(status = BCryptImportKeyPair(signAlgHandle, NULL, CST_BLOB_PRIVATE, &keyHandle, buffer, bufferSize, 0)))
CstFailWithStatus(PhFormatString(L"Unable to import the private key", CstKeyFileName->Buffer)->Buffer, status, 0);
PhFree(buffer);
// Hash the file.
hash = CstHashFile(CstArgument1->Buffer, &hashSize);
// Sign the hash.
if (!NT_SUCCESS(status = BCryptSignHash(keyHandle, NULL, hash, hashSize, NULL, 0, &signatureSize, 0)))
CstFailWithStatus(L"Unable to get the signature size", status, 0);
signature = PhAllocate(signatureSize);
if (!NT_SUCCESS(status = BCryptSignHash(keyHandle, NULL, hash, hashSize, signature, signatureSize, &signatureSize, 0)))
CstFailWithStatus(L"Unable to create the signature", status, 0);
PhFree(hash);
BCryptDestroyKey(keyHandle);
BCryptCloseAlgorithmProvider(signAlgHandle, 0);
// Write the signature to the output file.
if (!NT_SUCCESS(status = PhCreateFileWin32(&fileHandle, CstSigFileName->Buffer, FILE_GENERIC_WRITE, FILE_ATTRIBUTE_NORMAL, 0, FILE_OVERWRITE_IF, FILE_SYNCHRONOUS_IO_NONALERT | FILE_NON_DIRECTORY_FILE)))
CstFailWithStatus(PhFormatString(L"Unable to create '%s'", CstSigFileName->Buffer)->Buffer, status, 0);
if (!NT_SUCCESS(status = NtWriteFile(fileHandle, NULL, NULL, NULL, &iosb, signature, signatureSize, NULL, NULL)))
CstFailWithStatus(PhFormatString(L"Unable to write signature to '%s'", CstSigFileName->Buffer)->Buffer, status, 0);
NtClose(fileHandle);
PhFree(signature);
}
else if (PhEqualString2(CstCommand, L"verify", TRUE))
{
BCRYPT_ALG_HANDLE signAlgHandle;
ULONG bufferSize;
PVOID buffer;
BCRYPT_KEY_HANDLE keyHandle;
ULONG hashSize;
PVOID hash;
ULONG signatureSize;
PVOID signature;
if (!CstArgument1 || !CstKeyFileName || !CstSigFileName)
CstFailWith(CstHelpMessage);
if (!CstArgument1 || !CstKeyFileName || !CstSigFileName)
CstFailWith(CstHelpMessage);
// Import the key.
if (!NT_SUCCESS(status = BCryptOpenAlgorithmProvider(&signAlgHandle, CST_SIGN_ALGORITHM, NULL, 0)))
CstFailWithStatus(L"Unable to open the signing algorithm provider", status, 0);
buffer = CstReadFile(CstKeyFileName->Buffer, 1024 * 1024, &bufferSize);
if (!NT_SUCCESS(status = BCryptImportKeyPair(signAlgHandle, NULL, CST_BLOB_PUBLIC, &keyHandle, buffer, bufferSize, 0)))
CstFailWithStatus(PhFormatString(L"Unable to import the public key", CstKeyFileName->Buffer)->Buffer, status, 0);
PhFree(buffer);
// Read the signature.
signature = CstReadFile(CstSigFileName->Buffer, 1024 * 1024, &signatureSize);
// Hash the file.
hash = CstHashFile(CstArgument1->Buffer, &hashSize);
// Verify the hash.
if (!NT_SUCCESS(status = BCryptVerifySignature(keyHandle, NULL, hash, hashSize, signature, signatureSize, 0)))
CstFailWithStatus(PhFormatString(L"Signature verification failed", CstKeyFileName->Buffer)->Buffer, status, 0);
PhFree(signature);
PhFree(hash);
wprintf(L"The signature is valid.\n");
}
return 0;
}