1 |
vletoux |
12 |
/* OpenPGP Smart Card Mini Driver |
2 |
|
|
Copyright (C) 2009 Vincent Le Toux |
3 |
|
|
|
4 |
|
|
This library is Free software; you can redistribute it and/or |
5 |
|
|
modify it under the terms of the GNU Lesser General Public |
6 |
|
|
License version 2.1 as published by the Free Software Foundation. |
7 |
|
|
|
8 |
|
|
This library is distributed in the hope that it will be useful, |
9 |
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
10 |
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
11 |
|
|
Lesser General Public License for more details. |
12 |
|
|
|
13 |
|
|
You should have received a copy of the GNU Lesser General Public |
14 |
|
|
License along with this library; if not, write to the Free Software |
15 |
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
16 |
|
|
*/ |
17 |
|
|
|
18 |
|
|
#include <windows.h> |
19 |
|
|
#include <tchar.h> |
20 |
|
|
#include <cardmod.h> |
21 |
|
|
#include "global.h" |
22 |
|
|
|
23 |
|
|
|
24 |
|
|
|
25 |
|
|
LPBYTE AllocateAndEncodeObject(LPVOID pvStruct, LPCSTR lpszStructType, LPDWORD pdwSize ) |
26 |
|
|
{ |
27 |
|
|
// Get Key Usage blob size |
28 |
|
|
LPBYTE pbEncodedObject = NULL; |
29 |
|
|
BOOL bResult = TRUE; |
30 |
|
|
DWORD dwError; |
31 |
|
|
__try |
32 |
|
|
{ |
33 |
|
|
*pdwSize = 0; |
34 |
|
|
bResult = CryptEncodeObject(X509_ASN_ENCODING, |
35 |
|
|
lpszStructType, |
36 |
|
|
pvStruct, |
37 |
|
|
NULL, pdwSize); |
38 |
|
|
if (!bResult) |
39 |
|
|
{ |
40 |
|
|
dwError = GetLastError(); |
41 |
|
|
__leave; |
42 |
|
|
} |
43 |
|
|
|
44 |
|
|
// Allocate Memory for Key Usage Blob |
45 |
|
|
pbEncodedObject = (LPBYTE)LocalAlloc(0,*pdwSize); |
46 |
|
|
if (!pbEncodedObject) |
47 |
|
|
{ |
48 |
|
|
bResult = FALSE; |
49 |
|
|
dwError = GetLastError(); |
50 |
|
|
__leave; |
51 |
|
|
} |
52 |
|
|
|
53 |
|
|
// Get Key Usage Extension blob |
54 |
|
|
bResult = CryptEncodeObject(X509_ASN_ENCODING, |
55 |
|
|
lpszStructType, |
56 |
|
|
pvStruct, |
57 |
|
|
pbEncodedObject, pdwSize); |
58 |
|
|
if (!bResult) |
59 |
|
|
{ |
60 |
|
|
dwError = GetLastError(); |
61 |
|
|
__leave; |
62 |
|
|
} |
63 |
|
|
} |
64 |
|
|
__finally |
65 |
|
|
{ |
66 |
|
|
if (pbEncodedObject && !bResult) |
67 |
|
|
{ |
68 |
|
|
LocalFree(pbEncodedObject); |
69 |
|
|
} |
70 |
|
|
} |
71 |
|
|
return pbEncodedObject; |
72 |
|
|
} |
73 |
|
|
|
74 |
|
|
DWORD Personnalize() |
75 |
|
|
{ |
76 |
|
|
DWORD dwReturn; |
77 |
|
|
BOOL fSet; |
78 |
|
|
HCRYPTPROV hProv = NULL; |
79 |
|
|
HCRYPTKEY hKey = NULL; |
80 |
|
|
TCHAR szContainerName[] = OPENPGP_TEST_CONTAINER; |
81 |
|
|
BYTE pbData[4096]; |
82 |
|
|
DWORD dwDataSize = ARRAYSIZE(pbData); |
83 |
|
|
BOOL bStatus; |
84 |
|
|
BYTE One = 1; |
85 |
|
|
CERT_NAME_BLOB SubjectIssuerBlob = {0}; |
86 |
|
|
CERT_INFO CertInfo = {0}; |
87 |
|
|
CertInfo.rgExtension = 0; |
88 |
|
|
CRYPT_BIT_BLOB KeyUsage; |
89 |
|
|
BYTE ByteData; |
90 |
|
|
LPBYTE pbKeyUsage = NULL; |
91 |
|
|
DWORD dwSize; |
92 |
|
|
CERT_BASIC_CONSTRAINTS2_INFO BasicConstraints; |
93 |
|
|
LPBYTE pbBasicConstraints = NULL; |
94 |
|
|
CERT_ENHKEY_USAGE CertEnhKeyUsage = { 0, NULL }; |
95 |
|
|
LPBYTE pbEnhKeyUsage = NULL; |
96 |
|
|
CERT_EXTENSIONS CertExtensions = {0} ; |
97 |
|
|
PCCERT_CONTEXT pNewCertificateContext = NULL; |
98 |
|
|
SYSTEMTIME StartTime; |
99 |
|
|
SYSTEMTIME EndTime; |
100 |
|
|
HCERTSTORE hCertStore = NULL; |
101 |
|
|
BYTE pbCertificateBlob[4096]; |
102 |
|
|
CERT_BLOB dbStore = {ARRAYSIZE(pbCertificateBlob),pbCertificateBlob}; |
103 |
|
|
__try |
104 |
|
|
{ |
105 |
|
|
if (!pCardData) |
106 |
|
|
{ |
107 |
|
|
dwReturn = SCARD_E_COMM_DATA_LOST; |
108 |
|
|
__leave; |
109 |
|
|
} |
110 |
|
|
fSet = FALSE; |
111 |
|
|
dwReturn = pCardData->pfnCardSetProperty(pCardData, CP_CARD_READ_ONLY, (PBYTE) &fSet, sizeof(BOOL),0); |
112 |
|
|
if (dwReturn) __leave; |
113 |
|
|
dwReturn = pCardData->pfnCardWriteFile(pCardData, "openpgp", "statusP1", 0, &One, 1); |
114 |
|
|
if (dwReturn) __leave; |
115 |
|
|
dwReturn = pCardData->pfnCardCreateContainerEx(pCardData, (BYTE) 0, |
116 |
|
|
CARD_CREATE_CONTAINER_KEY_GEN, |
117 |
|
|
AT_SIGNATURE, 1024, NULL, 1); |
118 |
|
|
if (dwReturn) __leave; |
119 |
|
|
bStatus = CryptAcquireContext(&hProv, szContainerName, MS_ENHANCED_PROV, PROV_RSA_FULL, 0); |
120 |
|
|
if (!bStatus) |
121 |
|
|
{ |
122 |
|
|
dwReturn = GetLastError(); |
123 |
|
|
if (dwReturn == NTE_BAD_KEYSET) |
124 |
|
|
{ |
125 |
|
|
bStatus = CryptAcquireContext(&hProv, szContainerName, MS_ENHANCED_PROV, PROV_RSA_FULL, CRYPT_NEWKEYSET); |
126 |
|
|
} |
127 |
|
|
if (!bStatus) |
128 |
|
|
{ |
129 |
|
|
dwReturn = GetLastError(); |
130 |
|
|
__leave; |
131 |
|
|
} |
132 |
|
|
} |
133 |
|
|
// WARNING : AT_SIGNATURE is used implicitely when creating a new certificate |
134 |
|
|
// if you use AT_KEYEXCHANGE, the public key of the container |
135 |
|
|
// won't match the public key of the certificate |
136 |
|
|
bStatus = CryptGenKey(hProv, AT_SIGNATURE, CRYPT_EXPORTABLE, &hKey); |
137 |
|
|
if (!bStatus) |
138 |
|
|
{ |
139 |
|
|
dwReturn = GetLastError(); |
140 |
|
|
__leave; |
141 |
|
|
} |
142 |
|
|
bStatus = CryptExportKey(hKey, NULL, PRIVATEKEYBLOB, 0, pbData, &dwDataSize); |
143 |
|
|
if (!bStatus) |
144 |
|
|
{ |
145 |
|
|
dwReturn = GetLastError(); |
146 |
|
|
__leave; |
147 |
|
|
} |
148 |
|
|
dwReturn = pCardData->pfnCardCreateContainerEx(pCardData, (BYTE) 1, |
149 |
|
|
CARD_CREATE_CONTAINER_KEY_IMPORT, |
150 |
|
|
AT_KEYEXCHANGE, 1024, pbData, 3); |
151 |
|
|
if (dwReturn) |
152 |
|
|
{ |
153 |
|
|
__leave; |
154 |
|
|
} |
155 |
|
|
dwReturn = pCardData->pfnCardCreateContainerEx(pCardData, (BYTE) 2, |
156 |
|
|
CARD_CREATE_CONTAINER_KEY_IMPORT, |
157 |
|
|
AT_SIGNATURE, 1024, pbData, 3); |
158 |
|
|
if (dwReturn) |
159 |
|
|
{ |
160 |
|
|
__leave; |
161 |
|
|
} |
162 |
|
|
// create the cert data |
163 |
|
|
if (!CertStrToName(X509_ASN_ENCODING,TEXT("CN=test"),CERT_X500_NAME_STR,NULL,NULL,&SubjectIssuerBlob.cbData,NULL)) |
164 |
|
|
{ |
165 |
|
|
dwReturn = GetLastError(); |
166 |
|
|
__leave; |
167 |
|
|
} |
168 |
|
|
SubjectIssuerBlob.pbData = (PBYTE) LocalAlloc(0,SubjectIssuerBlob.cbData); |
169 |
|
|
if (!SubjectIssuerBlob.pbData) |
170 |
|
|
{ |
171 |
|
|
dwReturn = GetLastError(); |
172 |
|
|
__leave; |
173 |
|
|
} |
174 |
|
|
if (!CertStrToName(X509_ASN_ENCODING,TEXT("CN=test"),CERT_X500_NAME_STR,NULL,(PBYTE)SubjectIssuerBlob.pbData,&SubjectIssuerBlob.cbData,NULL)) |
175 |
|
|
{ |
176 |
|
|
dwReturn = GetLastError(); |
177 |
|
|
__leave; |
178 |
|
|
} |
179 |
|
|
// max 10 extensions => we don't count them |
180 |
|
|
CertInfo.rgExtension = (PCERT_EXTENSION) LocalAlloc(0,sizeof(CERT_EXTENSION) * 10); |
181 |
|
|
CertInfo.cExtension = 0; |
182 |
|
|
if (!CertInfo.rgExtension) __leave; |
183 |
|
|
|
184 |
|
|
|
185 |
|
|
// Set Key Usage according to Public Key Type |
186 |
|
|
ZeroMemory(&KeyUsage, sizeof(KeyUsage)); |
187 |
|
|
KeyUsage.cbData = 1; |
188 |
|
|
KeyUsage.pbData = &ByteData; |
189 |
|
|
ByteData = CERT_DIGITAL_SIGNATURE_KEY_USAGE | |
190 |
|
|
CERT_DATA_ENCIPHERMENT_KEY_USAGE| |
191 |
|
|
CERT_KEY_ENCIPHERMENT_KEY_USAGE | |
192 |
|
|
CERT_KEY_AGREEMENT_KEY_USAGE; |
193 |
|
|
pbKeyUsage = AllocateAndEncodeObject(&KeyUsage,X509_KEY_USAGE,&dwSize); |
194 |
|
|
if (!pbKeyUsage) __leave; |
195 |
|
|
|
196 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].pszObjId = szOID_KEY_USAGE; |
197 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].fCritical = FALSE; |
198 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].Value.cbData = dwSize; |
199 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].Value.pbData = pbKeyUsage; |
200 |
|
|
// Increase extension count |
201 |
|
|
CertInfo.cExtension++; |
202 |
|
|
////////////////////////////////////////////////// |
203 |
|
|
|
204 |
|
|
// Zero Basic Constraints structure |
205 |
|
|
ZeroMemory(&BasicConstraints, sizeof(BasicConstraints)); |
206 |
|
|
|
207 |
|
|
BasicConstraints.fCA = TRUE; |
208 |
|
|
BasicConstraints.fPathLenConstraint = TRUE; |
209 |
|
|
BasicConstraints.dwPathLenConstraint = 1; |
210 |
|
|
pbBasicConstraints = AllocateAndEncodeObject(&BasicConstraints,X509_BASIC_CONSTRAINTS2,&dwSize); |
211 |
|
|
if (!pbBasicConstraints) __leave; |
212 |
|
|
|
213 |
|
|
// Set Basic Constraints extension |
214 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].pszObjId = szOID_BASIC_CONSTRAINTS2; |
215 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].fCritical = FALSE; |
216 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].Value.cbData = dwSize; |
217 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].Value.pbData = pbBasicConstraints; |
218 |
|
|
// Increase extension count |
219 |
|
|
CertInfo.cExtension++; |
220 |
|
|
////////////////////////////////////////////////// |
221 |
|
|
CertEnhKeyUsage.cUsageIdentifier+=4; |
222 |
|
|
|
223 |
|
|
CertEnhKeyUsage.rgpszUsageIdentifier = (LPSTR*) LocalAlloc(0,sizeof(LPSTR)*CertEnhKeyUsage.cUsageIdentifier); |
224 |
|
|
if (!CertEnhKeyUsage.rgpszUsageIdentifier) __leave; |
225 |
|
|
CertEnhKeyUsage.cUsageIdentifier = 0; |
226 |
|
|
CertEnhKeyUsage.rgpszUsageIdentifier[CertEnhKeyUsage.cUsageIdentifier++] = szOID_PKIX_KP_CLIENT_AUTH; |
227 |
|
|
CertEnhKeyUsage.rgpszUsageIdentifier[CertEnhKeyUsage.cUsageIdentifier++] = szOID_PKIX_KP_SERVER_AUTH; |
228 |
|
|
CertEnhKeyUsage.rgpszUsageIdentifier[CertEnhKeyUsage.cUsageIdentifier++] = szOID_KP_SMARTCARD_LOGON; |
229 |
|
|
CertEnhKeyUsage.rgpszUsageIdentifier[CertEnhKeyUsage.cUsageIdentifier++] = szOID_KP_EFS; |
230 |
|
|
pbEnhKeyUsage = AllocateAndEncodeObject(&CertEnhKeyUsage,X509_ENHANCED_KEY_USAGE,&dwSize); |
231 |
|
|
if (!pbEnhKeyUsage) __leave; |
232 |
|
|
|
233 |
|
|
// Set Basic Constraints extension |
234 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].pszObjId = szOID_ENHANCED_KEY_USAGE; |
235 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].fCritical = FALSE; |
236 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].Value.cbData = dwSize; |
237 |
|
|
CertInfo.rgExtension[CertInfo.cExtension].Value.pbData = pbEnhKeyUsage; |
238 |
|
|
// Increase extension count |
239 |
|
|
CertInfo.cExtension++; |
240 |
|
|
|
241 |
|
|
////////////////////////////////////////////////// |
242 |
|
|
|
243 |
|
|
CertExtensions.cExtension = CertInfo.cExtension; |
244 |
|
|
CertExtensions.rgExtension = CertInfo.rgExtension; |
245 |
|
|
|
246 |
|
|
GetSystemTime(&StartTime); |
247 |
|
|
GetSystemTime(&EndTime); |
248 |
|
|
EndTime.wYear += 10; |
249 |
|
|
pNewCertificateContext = CertCreateSelfSignCertificate(hProv,&SubjectIssuerBlob, |
250 |
|
|
0,NULL,NULL,&StartTime,&EndTime,&CertExtensions); |
251 |
|
|
if (!pNewCertificateContext) |
252 |
|
|
{ |
253 |
|
|
dwReturn = GetLastError(); |
254 |
|
|
__leave; |
255 |
|
|
} |
256 |
|
|
/*hCertStore = CertOpenStore(CERT_STORE_PROV_MEMORY,0,(HCRYPTPROV)NULL,0,NULL); |
257 |
|
|
if (!hCertStore) |
258 |
|
|
{ |
259 |
|
|
dwReturn = GetLastError(); |
260 |
|
|
__leave; |
261 |
|
|
} |
262 |
|
|
if( !CertAddCertificateContextToStore(hCertStore, // Store handle |
263 |
|
|
pNewCertificateContext, // Pointer to a certificate |
264 |
|
|
CERT_STORE_ADD_REPLACE_EXISTING, NULL) ) |
265 |
|
|
{ |
266 |
|
|
dwReturn = GetLastError(); |
267 |
|
|
__leave; |
268 |
|
|
} |
269 |
|
|
if (!CertSaveStore( hCertStore, |
270 |
|
|
PKCS_7_ASN_ENCODING | X509_ASN_ENCODING, |
271 |
|
|
CERT_STORE_SAVE_AS_PKCS7, |
272 |
|
|
CERT_STORE_SAVE_TO_MEMORY, |
273 |
|
|
&dbStore, |
274 |
|
|
0)) |
275 |
|
|
{ |
276 |
|
|
dwReturn = GetLastError(); |
277 |
|
|
__leave; |
278 |
|
|
} |
279 |
|
|
dwReturn = pCardData->pfnCardWriteFile(pCardData, szBASE_CSP_DIR, "kxc01", 0, |
280 |
|
|
dbStore.pbData, |
281 |
|
|
dbStore.cbData); |
282 |
|
|
if (dwReturn) |
283 |
|
|
{ |
284 |
|
|
__leave; |
285 |
|
|
}*/ |
286 |
|
|
dwReturn = pCardData->pfnCardWriteFile(pCardData, szBASE_CSP_DIR, "kxc01", 0, |
287 |
|
|
pNewCertificateContext->pbCertEncoded, |
288 |
|
|
pNewCertificateContext->cbCertEncoded); |
289 |
|
|
if (dwReturn) |
290 |
|
|
{ |
291 |
|
|
__leave; |
292 |
|
|
} |
293 |
|
|
ViewCertificate(NULL, pNewCertificateContext); |
294 |
|
|
fSet = TRUE; |
295 |
|
|
dwReturn = pCardData->pfnCardSetProperty(pCardData, CP_CARD_READ_ONLY, (PBYTE) &fSet, sizeof(BOOL),0); |
296 |
|
|
if (dwReturn) __leave; |
297 |
|
|
|
298 |
|
|
} |
299 |
|
|
__finally |
300 |
|
|
{ |
301 |
|
|
if (hKey) |
302 |
|
|
CryptDestroyKey(hKey); |
303 |
|
|
//CryptAcquireContext(&hProv, szContainerName, MS_ENHANCED_PROV, PROV_RSA_FULL, CRYPT_DELETEKEYSET); |
304 |
|
|
if (hProv) |
305 |
|
|
CryptReleaseContext(hProv,0); |
306 |
|
|
} |
307 |
|
|
return dwReturn; |
308 |
|
|
} |