1 |
vletoux |
1 |
/* OpenPGP Smart Card Mini Driver |
2 |
|
|
Copyright (C) 2009 Vincent Le Toux |
3 |
|
|
|
4 |
|
|
This library is Free software; you can redistribute it and/or |
5 |
|
|
modify it under the terms of the GNU Lesser General Public |
6 |
|
|
License version 2.1 as published by the Free Software Foundation. |
7 |
|
|
|
8 |
|
|
This library is distributed in the hope that it will be useful, |
9 |
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
10 |
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
11 |
|
|
Lesser General Public License for more details. |
12 |
|
|
|
13 |
|
|
You should have received a copy of the GNU Lesser General Public |
14 |
|
|
License along with this library; if not, write to the Free Software |
15 |
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
16 |
|
|
*/ |
17 |
|
|
|
18 |
|
|
#include <windows.h> |
19 |
|
|
#include <tchar.h> |
20 |
|
|
#include <Cryptuiapi.h> |
21 |
|
|
#include <commctrl.h> |
22 |
vletoux |
3 |
#include <cardmod.h> |
23 |
vletoux |
1 |
#include "dialog.h" |
24 |
vletoux |
3 |
#include "global.h" |
25 |
vletoux |
1 |
#pragma comment(lib,"Cryptui") |
26 |
|
|
#pragma comment(lib,"Crypt32") |
27 |
|
|
|
28 |
|
|
extern HWND hMainWnd; |
29 |
|
|
|
30 |
|
|
BOOL SchGetProviderNameFromCardName(__in LPCTSTR szCardName, __out LPTSTR szProviderName, __out PDWORD pdwProviderNameLen) |
31 |
|
|
{ |
32 |
|
|
// get provider name |
33 |
|
|
SCARDCONTEXT hSCardContext; |
34 |
|
|
LONG lCardStatus; |
35 |
|
|
lCardStatus = SCardEstablishContext(SCARD_SCOPE_USER,NULL,NULL,&hSCardContext); |
36 |
|
|
if (SCARD_S_SUCCESS != lCardStatus) |
37 |
|
|
{ |
38 |
|
|
return FALSE; |
39 |
|
|
} |
40 |
|
|
|
41 |
|
|
lCardStatus = SCardGetCardTypeProviderName(hSCardContext, |
42 |
|
|
szCardName, |
43 |
|
|
SCARD_PROVIDER_CSP, |
44 |
|
|
szProviderName, |
45 |
|
|
pdwProviderNameLen); |
46 |
|
|
if (SCARD_S_SUCCESS != lCardStatus) |
47 |
|
|
{ |
48 |
|
|
SCardReleaseContext(hSCardContext); |
49 |
|
|
return FALSE; |
50 |
|
|
} |
51 |
|
|
SCardReleaseContext(hSCardContext); |
52 |
|
|
return TRUE; |
53 |
|
|
} |
54 |
|
|
|
55 |
|
|
DWORD ListContainer() |
56 |
|
|
{ |
57 |
|
|
HCRYPTPROV HMainCryptProv = NULL; |
58 |
|
|
BOOL bStatus = FALSE; |
59 |
|
|
LPTSTR szMainContainerName = NULL; |
60 |
|
|
CHAR szContainerName[1024]; |
61 |
|
|
DWORD dwContainerNameLen = sizeof(szContainerName); |
62 |
|
|
DWORD dwErr = 0; |
63 |
|
|
DWORD dwFlags = CRYPT_FIRST; |
64 |
|
|
DWORD dwContextArrayLen = 0; |
65 |
|
|
HCRYPTPROV hProv = NULL; |
66 |
|
|
HCRYPTKEY hKey = NULL; |
67 |
|
|
LPBYTE pbCert = NULL; |
68 |
|
|
DWORD dwCertLen = 0; |
69 |
|
|
PCCERT_CONTEXT pCertContext = NULL; |
70 |
|
|
DWORD pKeySpecs[2] = { AT_KEYEXCHANGE,AT_SIGNATURE}; |
71 |
|
|
PCCERT_CONTEXT pSelectedContext = NULL; |
72 |
|
|
HCERTSTORE hStore = NULL; |
73 |
|
|
TCHAR szCardName[256]; |
74 |
|
|
TCHAR szReaderName[256]; |
75 |
|
|
TCHAR szOutProviderName[256]; |
76 |
|
|
DWORD dwOutProviderLength = ARRAYSIZE(szOutProviderName); |
77 |
|
|
OPENCARDNAME_EX dlgStruct; |
78 |
|
|
DWORD dwReturn; |
79 |
|
|
SCARDCONTEXT hSCardContext = NULL; |
80 |
|
|
SCARDHANDLE hSCardHandle = NULL; |
81 |
|
|
__try |
82 |
|
|
{ |
83 |
|
|
|
84 |
|
|
SendMessage(GetDlgItem(hMainWnd, IDC_LSTCONTAINER),LB_RESETCONTENT,0,0); |
85 |
|
|
dwReturn = SCardEstablishContext(SCARD_SCOPE_USER, |
86 |
|
|
NULL, |
87 |
|
|
NULL, |
88 |
|
|
&hSCardContext ); |
89 |
|
|
if ( SCARD_S_SUCCESS != dwReturn ) |
90 |
|
|
{ |
91 |
|
|
__leave; |
92 |
|
|
} |
93 |
|
|
// Initialize the structure. |
94 |
|
|
memset(&dlgStruct, 0, sizeof(dlgStruct)); |
95 |
|
|
dlgStruct.dwStructSize = sizeof(dlgStruct); |
96 |
|
|
dlgStruct.hSCardContext = hSCardContext; |
97 |
|
|
dlgStruct.dwFlags = SC_DLG_MINIMAL_UI; |
98 |
|
|
dlgStruct.lpstrRdr = szReaderName; |
99 |
|
|
dlgStruct.nMaxRdr = ARRAYSIZE(szReaderName); |
100 |
|
|
dlgStruct.lpstrCard = szCardName; |
101 |
|
|
dlgStruct.nMaxCard = ARRAYSIZE(szCardName); |
102 |
|
|
dlgStruct.lpstrTitle = L"Select Card"; |
103 |
|
|
dlgStruct.dwShareMode = 0; |
104 |
|
|
// Display the select card dialog box. |
105 |
|
|
dwReturn = SCardUIDlgSelectCard(&dlgStruct); |
106 |
|
|
if ( SCARD_S_SUCCESS != dwReturn ) |
107 |
|
|
{ |
108 |
|
|
__leave; |
109 |
|
|
} |
110 |
|
|
dwReturn = SCardUIDlgSelectCard(&dlgStruct); |
111 |
|
|
if ( SCARD_S_SUCCESS != dwReturn ) |
112 |
|
|
{ |
113 |
|
|
__leave; |
114 |
|
|
} |
115 |
|
|
if (!SchGetProviderNameFromCardName(szCardName, szOutProviderName, &dwOutProviderLength)) |
116 |
|
|
{ |
117 |
|
|
dwReturn = GetLastError(); |
118 |
|
|
__leave; |
119 |
|
|
} |
120 |
|
|
|
121 |
|
|
size_t ulNameLen = _tcslen(szReaderName); |
122 |
|
|
szMainContainerName = (LPWSTR) LocalAlloc(0,(DWORD)(ulNameLen + 6) * sizeof(WCHAR)); |
123 |
|
|
if (!szMainContainerName) |
124 |
|
|
{ |
125 |
|
|
dwReturn = GetLastError(); |
126 |
|
|
__leave; |
127 |
|
|
} |
128 |
|
|
swprintf_s(szMainContainerName,(ulNameLen + 6), L"\\\\.\\%s\\", szReaderName); |
129 |
|
|
|
130 |
|
|
bStatus = CryptAcquireContext(&HMainCryptProv, |
131 |
|
|
szMainContainerName, |
132 |
|
|
szOutProviderName, |
133 |
|
|
PROV_RSA_FULL, |
134 |
|
|
CRYPT_SILENT); |
135 |
|
|
if (!bStatus) |
136 |
|
|
{ |
137 |
|
|
dwReturn = GetLastError(); |
138 |
|
|
if (dwReturn == NTE_BAD_KEYSET) |
139 |
|
|
{ |
140 |
|
|
bStatus = CryptAcquireContext(&HMainCryptProv,NULL, szOutProviderName, PROV_RSA_FULL, CRYPT_SILENT); |
141 |
|
|
if (!bStatus) |
142 |
|
|
{ |
143 |
|
|
dwReturn = GetLastError(); |
144 |
|
|
__leave; |
145 |
|
|
} |
146 |
|
|
} |
147 |
|
|
else |
148 |
|
|
{ |
149 |
|
|
__leave; |
150 |
|
|
} |
151 |
|
|
|
152 |
|
|
} |
153 |
|
|
|
154 |
|
|
|
155 |
|
|
|
156 |
|
|
/* Enumerate all the containers */ |
157 |
|
|
while (CryptGetProvParam(HMainCryptProv, |
158 |
|
|
PP_ENUMCONTAINERS, |
159 |
|
|
(LPBYTE) szContainerName, |
160 |
|
|
&dwContainerNameLen, |
161 |
|
|
dwFlags) && |
162 |
|
|
(dwContextArrayLen < 128) |
163 |
|
|
) |
164 |
|
|
{ |
165 |
|
|
|
166 |
|
|
// convert the container name to unicode |
167 |
|
|
int wLen = MultiByteToWideChar(CP_ACP, 0, szContainerName, -1, NULL, 0); |
168 |
|
|
LPWSTR szWideContainerName = (LPWSTR) LocalAlloc(0,wLen * sizeof(WCHAR)); |
169 |
|
|
MultiByteToWideChar(CP_ACP, 0, szContainerName, -1, szWideContainerName, wLen); |
170 |
|
|
|
171 |
|
|
// Acquire a context on the current container |
172 |
|
|
if (CryptAcquireContext(&hProv, |
173 |
|
|
szWideContainerName, |
174 |
|
|
szOutProviderName, |
175 |
|
|
PROV_RSA_FULL, |
176 |
|
|
0)) |
177 |
|
|
{ |
178 |
|
|
// Loop over all the key specs |
179 |
|
|
for (int i = 0; i < 2; i++) |
180 |
|
|
{ |
181 |
|
|
if (CryptGetUserKey(hProv, |
182 |
|
|
pKeySpecs[i], |
183 |
|
|
&hKey) ) |
184 |
|
|
{ |
185 |
|
|
TCHAR szText[256]; |
186 |
|
|
_stprintf_s(szText, ARRAYSIZE(szText), TEXT("%s %d"),szWideContainerName,pKeySpecs[i]); |
187 |
|
|
SendDlgItemMessage(hMainWnd,IDC_LSTCONTAINER,LB_ADDSTRING,0,(LPARAM)szText); |
188 |
|
|
CryptDestroyKey(hKey); |
189 |
|
|
hKey = NULL; |
190 |
|
|
} |
191 |
|
|
} |
192 |
|
|
CryptReleaseContext(hProv, 0); |
193 |
|
|
hProv = NULL; |
194 |
|
|
} |
195 |
|
|
LocalFree(szWideContainerName); |
196 |
|
|
|
197 |
|
|
// prepare parameters for the next loop |
198 |
|
|
dwContainerNameLen = sizeof(szContainerName); |
199 |
|
|
dwFlags = 0; |
200 |
|
|
} |
201 |
|
|
} |
202 |
|
|
__finally |
203 |
|
|
{ |
204 |
|
|
if (hKey) |
205 |
|
|
CryptDestroyKey(hKey); |
206 |
|
|
if (hProv) |
207 |
|
|
CryptReleaseContext(hProv, 0); |
208 |
|
|
if (szMainContainerName) |
209 |
|
|
LocalFree(szMainContainerName); |
210 |
|
|
if (HMainCryptProv) |
211 |
|
|
CryptReleaseContext(HMainCryptProv, 0); |
212 |
|
|
} |
213 |
|
|
return dwReturn; |
214 |
|
|
} |
215 |
|
|
|
216 |
|
|
|
217 |
|
|
DWORD ViewCertificate(PTSTR szContainer, DWORD dwKeySpec) |
218 |
|
|
{ |
219 |
|
|
BOOL bStatus; |
220 |
|
|
DWORD dwReturn = 0; |
221 |
|
|
HCRYPTPROV hProv = NULL; |
222 |
|
|
HCRYPTKEY hKey = NULL; |
223 |
|
|
DWORD dwCertLen = 0; |
224 |
|
|
PBYTE pbCert = NULL; |
225 |
|
|
PCCERT_CONTEXT pCertContext = NULL; |
226 |
|
|
CRYPTUI_VIEWCERTIFICATE_STRUCT certViewInfo; |
227 |
|
|
BOOL fPropertiesChanged = FALSE; |
228 |
|
|
__try |
229 |
|
|
{ |
230 |
|
|
bStatus = CryptAcquireContext(&hProv,szContainer, MS_SCARD_PROV, PROV_RSA_FULL, CRYPT_SILENT); |
231 |
|
|
if (!bStatus) |
232 |
|
|
{ |
233 |
|
|
dwReturn = GetLastError(); |
234 |
|
|
__leave; |
235 |
|
|
} |
236 |
|
|
bStatus = CryptGetUserKey(hProv, dwKeySpec, &hKey); |
237 |
|
|
if (!bStatus) |
238 |
|
|
{ |
239 |
|
|
dwReturn = GetLastError(); |
240 |
|
|
__leave; |
241 |
|
|
} |
242 |
|
|
bStatus = CryptGetKeyParam(hKey, |
243 |
|
|
KP_CERTIFICATE, |
244 |
|
|
NULL, |
245 |
|
|
&dwCertLen, |
246 |
|
|
0); |
247 |
|
|
if (!bStatus) |
248 |
|
|
{ |
249 |
|
|
dwReturn = GetLastError(); |
250 |
|
|
__leave; |
251 |
|
|
} |
252 |
|
|
pbCert = (LPBYTE) LocalAlloc(0,dwCertLen); |
253 |
|
|
if (!pbCert) |
254 |
|
|
{ |
255 |
|
|
dwReturn = GetLastError(); |
256 |
|
|
__leave; |
257 |
|
|
} |
258 |
|
|
bStatus = CryptGetKeyParam(hKey, |
259 |
|
|
KP_CERTIFICATE, |
260 |
|
|
pbCert, |
261 |
|
|
&dwCertLen, |
262 |
|
|
0); |
263 |
|
|
if (!bStatus) |
264 |
|
|
{ |
265 |
|
|
dwReturn = GetLastError(); |
266 |
|
|
__leave; |
267 |
|
|
} |
268 |
|
|
pCertContext = CertCreateCertificateContext( |
269 |
|
|
X509_ASN_ENCODING|PKCS_7_ASN_ENCODING, |
270 |
|
|
pbCert, |
271 |
|
|
dwCertLen); |
272 |
|
|
if (!pCertContext) |
273 |
|
|
{ |
274 |
|
|
dwReturn = GetLastError(); |
275 |
|
|
__leave; |
276 |
|
|
} |
277 |
|
|
|
278 |
|
|
certViewInfo.dwSize = sizeof(CRYPTUI_VIEWCERTIFICATE_STRUCT); |
279 |
|
|
certViewInfo.hwndParent = hMainWnd; |
280 |
|
|
certViewInfo.dwFlags = CRYPTUI_DISABLE_EDITPROPERTIES | CRYPTUI_DISABLE_ADDTOSTORE | CRYPTUI_DISABLE_EXPORT | CRYPTUI_DISABLE_HTMLLINK; |
281 |
|
|
certViewInfo.szTitle = TEXT("Info"); |
282 |
|
|
certViewInfo.pCertContext = pCertContext; |
283 |
|
|
certViewInfo.cPurposes = 0; |
284 |
|
|
certViewInfo.rgszPurposes = 0; |
285 |
|
|
certViewInfo.pCryptProviderData = NULL; |
286 |
|
|
certViewInfo.hWVTStateData = NULL; |
287 |
|
|
certViewInfo.fpCryptProviderDataTrustedUsage = FALSE; |
288 |
|
|
certViewInfo.idxSigner = 0; |
289 |
|
|
certViewInfo.idxCert = 0; |
290 |
|
|
certViewInfo.fCounterSigner = FALSE; |
291 |
|
|
certViewInfo.idxCounterSigner = 0; |
292 |
|
|
certViewInfo.cStores = 0; |
293 |
|
|
certViewInfo.rghStores = NULL; |
294 |
|
|
certViewInfo.cPropSheetPages = 0; |
295 |
|
|
certViewInfo.rgPropSheetPages = NULL; |
296 |
|
|
certViewInfo.nStartPage = 0; |
297 |
|
|
|
298 |
|
|
dwReturn = CryptUIDlgViewCertificate(&certViewInfo,&fPropertiesChanged); |
299 |
|
|
|
300 |
|
|
} |
301 |
|
|
__finally |
302 |
|
|
{ |
303 |
|
|
if (pCertContext) |
304 |
|
|
CertFreeCertificateContext(pCertContext); |
305 |
|
|
if (pbCert) |
306 |
|
|
LocalFree(pbCert); |
307 |
|
|
if (hKey) |
308 |
|
|
CryptDestroyKey(hKey); |
309 |
|
|
if (hProv) |
310 |
|
|
CryptReleaseContext(hProv, 0); |
311 |
|
|
} |
312 |
|
|
return dwReturn; |
313 |
|
|
} |
314 |
|
|
|
315 |
|
|
DWORD Sign(PTSTR szContainer, DWORD dwKeySpec) |
316 |
|
|
{ |
317 |
|
|
BOOL bStatus; |
318 |
|
|
DWORD dwReturn = 0; |
319 |
|
|
HCRYPTPROV hProv = NULL; |
320 |
|
|
HCRYPTKEY hKey = NULL; |
321 |
|
|
HCRYPTHASH hHash = NULL; |
322 |
|
|
PBYTE pbSignature = NULL; |
323 |
|
|
DWORD dwSignatureSize = 0; |
324 |
vletoux |
3 |
PBYTE pbSignatureTest = NULL; |
325 |
|
|
DWORD dwSignatureTestSize = 0; |
326 |
vletoux |
1 |
BYTE pbChallenge[20]; |
327 |
|
|
TCHAR szDescription[] = TEXT("Test"); |
328 |
vletoux |
3 |
TCHAR szContainerName[] = OPENPGP_TEST_CONTAINER; |
329 |
vletoux |
1 |
__try |
330 |
|
|
{ |
331 |
|
|
bStatus = CryptAcquireContext(&hProv,szContainer, MS_SCARD_PROV, PROV_RSA_FULL, 0); |
332 |
|
|
if (!bStatus) |
333 |
|
|
{ |
334 |
|
|
dwReturn = GetLastError(); |
335 |
|
|
__leave; |
336 |
|
|
} |
337 |
|
|
bStatus = CryptGetUserKey(hProv, dwKeySpec, &hKey); |
338 |
|
|
if (!bStatus) |
339 |
|
|
{ |
340 |
|
|
dwReturn = GetLastError(); |
341 |
|
|
__leave; |
342 |
|
|
} |
343 |
|
|
bStatus = CryptGenRandom(hProv,ARRAYSIZE(pbChallenge),pbChallenge); |
344 |
|
|
if (!bStatus) |
345 |
|
|
{ |
346 |
|
|
dwReturn = GetLastError(); |
347 |
|
|
__leave; |
348 |
|
|
} |
349 |
|
|
if (!CryptCreateHash(hProv,CALG_SHA,NULL,0,&hHash)) |
350 |
|
|
{ |
351 |
|
|
dwReturn = GetLastError(); |
352 |
|
|
__leave; |
353 |
|
|
} |
354 |
|
|
if (!CryptSetHashParam(hHash, HP_HASHVAL, pbChallenge, 0)) |
355 |
|
|
{ |
356 |
|
|
dwReturn = GetLastError(); |
357 |
|
|
__leave; |
358 |
|
|
} |
359 |
|
|
if (!CryptSignHash(hHash,dwKeySpec, szDescription, 0, NULL, &dwSignatureSize)) |
360 |
|
|
{ |
361 |
|
|
dwReturn = GetLastError(); |
362 |
|
|
__leave; |
363 |
|
|
} |
364 |
|
|
pbSignature = (PBYTE) LocalAlloc(0,dwSignatureSize); |
365 |
|
|
if (!pbSignature) |
366 |
|
|
{ |
367 |
|
|
dwReturn = GetLastError(); |
368 |
|
|
__leave; |
369 |
|
|
} |
370 |
|
|
if (!CryptSignHash(hHash,dwKeySpec, szDescription, 0, pbSignature, &dwSignatureSize)) |
371 |
|
|
{ |
372 |
|
|
dwReturn = GetLastError(); |
373 |
|
|
__leave; |
374 |
|
|
} |
375 |
|
|
if (!CryptVerifySignature(hHash, pbSignature, dwSignatureSize, hKey, szDescription, 0)) |
376 |
|
|
{ |
377 |
|
|
dwReturn = GetLastError(); |
378 |
|
|
} |
379 |
|
|
} |
380 |
|
|
__finally |
381 |
|
|
{ |
382 |
|
|
if (pbSignature) |
383 |
|
|
LocalFree(pbSignature); |
384 |
|
|
if (hHash) |
385 |
|
|
CryptDestroyHash(hHash); |
386 |
|
|
if (hProv) |
387 |
|
|
CryptReleaseContext(hProv, 0); |
388 |
|
|
} |
389 |
|
|
return dwReturn; |
390 |
|
|
} |
391 |
|
|
|
392 |
|
|
DWORD Decrypt(PTSTR szContainer, DWORD dwKeySpec) |
393 |
|
|
{ |
394 |
|
|
BOOL bStatus; |
395 |
|
|
DWORD dwReturn = 0; |
396 |
|
|
HCRYPTPROV hProv = NULL; |
397 |
|
|
HCRYPTKEY hKey = NULL; |
398 |
|
|
HCRYPTHASH hHash = NULL; |
399 |
|
|
PBYTE pbCrypt = NULL; |
400 |
|
|
DWORD dwCryptSize = 0, dwBufferSize; |
401 |
vletoux |
4 |
BYTE pbChallenge[20] = "test1234567890"; |
402 |
vletoux |
1 |
__try |
403 |
|
|
{ |
404 |
|
|
bStatus = CryptAcquireContext(&hProv,szContainer, MS_SCARD_PROV, PROV_RSA_FULL, 0); |
405 |
|
|
if (!bStatus) |
406 |
|
|
{ |
407 |
|
|
dwReturn = GetLastError(); |
408 |
|
|
__leave; |
409 |
|
|
} |
410 |
|
|
bStatus = CryptGetUserKey(hProv, dwKeySpec, &hKey); |
411 |
|
|
if (!bStatus) |
412 |
|
|
{ |
413 |
|
|
dwReturn = GetLastError(); |
414 |
|
|
__leave; |
415 |
|
|
} |
416 |
vletoux |
4 |
/*bStatus = CryptGenRandom(hProv,ARRAYSIZE(pbChallenge),pbChallenge); |
417 |
vletoux |
1 |
if (!bStatus) |
418 |
|
|
{ |
419 |
|
|
dwReturn = GetLastError(); |
420 |
|
|
__leave; |
421 |
vletoux |
4 |
}*/ |
422 |
vletoux |
1 |
dwCryptSize = 0; |
423 |
|
|
dwBufferSize = ARRAYSIZE(pbChallenge); |
424 |
|
|
if (!CryptEncrypt(hKey,NULL, TRUE, 0, NULL, &dwBufferSize,0)) |
425 |
|
|
{ |
426 |
|
|
dwReturn = GetLastError(); |
427 |
|
|
__leave; |
428 |
|
|
} |
429 |
|
|
pbCrypt = (PBYTE) LocalAlloc(0,dwBufferSize); |
430 |
|
|
if (!pbCrypt) |
431 |
|
|
{ |
432 |
|
|
dwReturn = GetLastError(); |
433 |
|
|
__leave; |
434 |
|
|
} |
435 |
|
|
memcpy(pbCrypt, pbChallenge, ARRAYSIZE(pbChallenge)); |
436 |
|
|
dwCryptSize = ARRAYSIZE(pbChallenge); |
437 |
vletoux |
3 |
if (!CryptEncrypt(hKey,NULL, TRUE, 0, pbCrypt, &dwCryptSize,dwBufferSize)) |
438 |
vletoux |
1 |
{ |
439 |
|
|
dwReturn = GetLastError(); |
440 |
|
|
__leave; |
441 |
|
|
} |
442 |
vletoux |
4 |
if (!CryptDecrypt(hKey, NULL, FALSE, 0, pbCrypt, &dwCryptSize)) |
443 |
vletoux |
1 |
{ |
444 |
|
|
dwReturn = GetLastError(); |
445 |
|
|
__leave; |
446 |
|
|
} |
447 |
|
|
if (dwCryptSize != ARRAYSIZE(pbChallenge)) |
448 |
|
|
{ |
449 |
|
|
dwReturn = NTE_BAD_DATA; |
450 |
|
|
__leave; |
451 |
|
|
} |
452 |
|
|
if (memcmp(pbChallenge, pbCrypt, dwCryptSize) != 0) |
453 |
|
|
{ |
454 |
|
|
dwReturn = NTE_BAD_DATA; |
455 |
|
|
__leave; |
456 |
|
|
} |
457 |
|
|
} |
458 |
|
|
__finally |
459 |
|
|
{ |
460 |
|
|
if (pbCrypt) |
461 |
|
|
LocalFree(pbCrypt); |
462 |
|
|
if (hKey) |
463 |
|
|
CryptDestroyKey(hKey); |
464 |
|
|
if (hProv) |
465 |
|
|
CryptReleaseContext(hProv, 0); |
466 |
|
|
} |
467 |
|
|
return dwReturn; |
468 |
|
|
} |