/* ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is Maintenance service certificate check code. * * The Initial Developer of the Original Code is * Mozilla Foundation. * Portions created by the Initial Developer are Copyright (C) 2011 * the Initial Developer. All Rights Reserved. * * Contributor(s): * Brian R. Bondy * * Alternatively, the contents of this file may be used under the terms of * either the GNU General Public License Version 2 or later (the "GPL"), or * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ #include #include #include #include #include #include "certificatecheck.h" #include "servicebase.h" #pragma comment(lib, "wintrust.lib") #pragma comment(lib, "crypt32.lib") static const int ENCODING = X509_ASN_ENCODING | PKCS_7_ASN_ENCODING; /** * Checks to see if a file stored at filePath matches the specified info. * * @param filePath The PE file path to check * @param infoToMatch The acceptable information to match * @return ERROR_SUCCESS if successful, ERROR_NOT_FOUND if the info * does not match, or the last error otherwise. */ DWORD CheckCertificateForPEFile(LPCWSTR filePath, CertificateCheckInfo &infoToMatch) { HCERTSTORE certStore = NULL; HCRYPTMSG cryptMsg = NULL; PCCERT_CONTEXT certContext = NULL; PCMSG_SIGNER_INFO signerInfo = NULL; DWORD lastError = ERROR_SUCCESS; // Get the HCERTSTORE and HCRYPTMSG from the signed file. DWORD encoding, contentType, formatType; BOOL result = CryptQueryObject(CERT_QUERY_OBJECT_FILE, filePath, CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED, CERT_QUERY_CONTENT_FLAG_ALL, 0, &encoding, &contentType, &formatType, &certStore, &cryptMsg, NULL); if (!result) { lastError = GetLastError(); LOG(("CryptQueryObject failed with %d\n", lastError)); goto cleanup; } // Pass in NULL to get the needed signer information size. DWORD signerInfoSize; result = CryptMsgGetParam(cryptMsg, CMSG_SIGNER_INFO_PARAM, 0, NULL, &signerInfoSize); if (!result) { lastError = GetLastError(); LOG(("CryptMsgGetParam failed with %d\n", lastError)); goto cleanup; } // Allocate the needed size for the signer information. signerInfo = (PCMSG_SIGNER_INFO)LocalAlloc(LPTR, signerInfoSize); if (!signerInfo) { lastError = GetLastError(); LOG(("Unable to allocate memory for Signer Info.\n")); goto cleanup; } // Get the signer information (PCMSG_SIGNER_INFO). // In particular we want the issuer and serial number. result = CryptMsgGetParam(cryptMsg, CMSG_SIGNER_INFO_PARAM, 0, (PVOID)signerInfo, &signerInfoSize); if (!result) { lastError = GetLastError(); LOG(("CryptMsgGetParam failed with %d\n", lastError)); goto cleanup; } // Search for the signer certificate in the certificate store. CERT_INFO certInfo; certInfo.Issuer = signerInfo->Issuer; certInfo.SerialNumber = signerInfo->SerialNumber; certContext = CertFindCertificateInStore(certStore, ENCODING, 0, CERT_FIND_SUBJECT_CERT, (PVOID)&certInfo, NULL); if (!certContext) { lastError = GetLastError(); LOG(("CertFindCertificateInStore failed with %d\n", lastError)); goto cleanup; } if (!DoCertificateAttributesMatch(certContext, infoToMatch)) { lastError = ERROR_NOT_FOUND; LOG(("Certificate did not match issuer or name\n")); goto cleanup; } cleanup: if (signerInfo) { LocalFree(signerInfo); } if (certContext) { CertFreeCertificateContext(certContext); } if (certStore) { CertCloseStore(certStore, 0); } if (cryptMsg) { CryptMsgClose(cryptMsg); } return lastError; } /** * Checks to see if a file stored at filePath matches the specified info. * * @param certContext The certificate context of the file * @param infoToMatch The acceptable information to match * @return FALSE if the info does not match or if any error occurs in the check */ BOOL DoCertificateAttributesMatch(PCCERT_CONTEXT certContext, CertificateCheckInfo &infoToMatch) { DWORD dwData; LPTSTR szName = NULL; if (infoToMatch.issuer) { // Pass in NULL to get the needed size of the issuer buffer. dwData = CertGetNameString(certContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, CERT_NAME_ISSUER_FLAG, NULL, NULL, 0); if (!dwData) { LOG(("CertGetNameString failed.\n")); return FALSE; } // Allocate memory for Issuer name buffer. LPTSTR szName = (LPTSTR)LocalAlloc(LPTR, dwData * sizeof(WCHAR)); if (!szName) { LOG(("Unable to allocate memory for issuer name.\n")); return FALSE; } // Get Issuer name. if (!CertGetNameString(certContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, CERT_NAME_ISSUER_FLAG, NULL, szName, dwData)) { LOG(("CertGetNameString failed.\n")); LocalFree(szName); return FALSE; } // If the issuer does not match, return a failure. if (!infoToMatch.issuer || wcscmp(szName, infoToMatch.issuer)) { LocalFree(szName); return FALSE; } LocalFree(szName); szName = NULL; } if (infoToMatch.name) { // Pass in NULL to get the needed size of the name buffer. dwData = CertGetNameString(certContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, 0, NULL, NULL, 0); if (!dwData) { LOG(("CertGetNameString failed.\n")); return FALSE; } // Allocate memory for the name buffer. szName = (LPTSTR)LocalAlloc(LPTR, dwData * sizeof(WCHAR)); if (!szName) { LOG(("Unable to allocate memory for subject name.\n")); return FALSE; } // Obtain the name. if (!(CertGetNameString(certContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, 0, NULL, szName, dwData))) { LOG(("CertGetNameString failed.\n")); LocalFree(szName); return FALSE; } // If the issuer does not match, return a failure. if (!infoToMatch.name || wcscmp(szName, infoToMatch.name)) { LocalFree(szName); return FALSE; } // We have a match! LocalFree(szName); } // If there were any errors we would have aborted by now. return TRUE; } /** * Duplicates the specified string * * @param inputString The string to duplicate * @return The duplicated string which should be freed by the caller. */ LPWSTR AllocateAndCopyWideString(LPCWSTR inputString) { LPWSTR outputString = (LPWSTR)LocalAlloc(LPTR, (wcslen(inputString) + 1) * sizeof(WCHAR)); if (outputString) { lstrcpyW(outputString, inputString); } return outputString; } /** * Verifies the trust of the specified file path. * * @param filePath The file path to check. * @return ERROR_SUCCESS if successful, or the last error code otherwise. */ DWORD VerifyCertificateTrustForFile(LPCWSTR filePath) { // Setup the file to check. WINTRUST_FILE_INFO fileToCheck; ZeroMemory(&fileToCheck, sizeof(fileToCheck)); fileToCheck.cbStruct = sizeof(WINTRUST_FILE_INFO); fileToCheck.pcwszFilePath = filePath; // Setup what to check, we want to check it is signed and trusted. WINTRUST_DATA trustData; ZeroMemory(&trustData, sizeof(trustData)); trustData.cbStruct = sizeof(trustData); trustData.pPolicyCallbackData = NULL; trustData.pSIPClientData = NULL; trustData.dwUIChoice = WTD_UI_NONE; trustData.fdwRevocationChecks = WTD_REVOKE_NONE; trustData.dwUnionChoice = WTD_CHOICE_FILE; trustData.dwStateAction = 0; trustData.hWVTStateData = NULL; trustData.pwszURLReference = NULL; // no UI trustData.dwUIContext = 0; trustData.pFile = &fileToCheck; GUID policyGUID = WINTRUST_ACTION_GENERIC_VERIFY_V2; // Check if the file is signed by something that is trusted. LONG ret = WinVerifyTrust(NULL, &policyGUID, &trustData); if (ERROR_SUCCESS == ret) { // The hash that represents the subject is trusted and there were no // verification errors. No publisher nor time stamp chain errors. LOG(("The file \"%ls\" is signed and the signature was verified.\n", filePath)); return ERROR_SUCCESS; } DWORD lastError = GetLastError(); LOG(("There was an error validating trust of the certificate for file" " \"%ls\". Returned: %d, Last error: %d\n", filePath, ret, lastError)); return ret; }