⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 signimage.c

📁 wince底层驱动开发代码 ARM作为一种嵌入式系统处理器
💻 C
字号:
//
// Copyright (c) Microsoft Corporation.  All rights reserved.
//
//
// Use of this source code is subject to the terms of the Microsoft end-user
// license agreement (EULA) under which you licensed this SOFTWARE PRODUCT.
// If you did not accept the terms of the EULA, you are not authorized to use
// this source code. For a copy of the EULA, please see the LICENSE.RTF on your
// install media.
//
/*++
THIS CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A
PARTICULAR PURPOSE.

Module Name:  
    signimage.c
    
Abstract:  
        
Functions:


Notes: 

--*/
#include <windows.h>
#include <halether.h>
#include <minasn1.h>
#include <mincrypt.h>
#include <traverse.h>

// Matches BIB file EXTENSION area (note BIB file names are forced to lower case).
const unsigned char WHQLSigExtName[] = "whql_sig";

// Secure loader globals
extern DWORD g_dwROMOffset;
DWORD g_hHash;
BYTE rgbOID_Attr[] =
//OID (1.3.6.1.4.1.311.12.2.1) has the following encoding:
// "1.3.6.1.4.1.311.12.2.1"
{0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x0C, 0x02, 0x01};

BYTE  rgbManufacturerTag[] = 
//"Manufacturer" as a BMP string
{ 0x00, 0x4D, 0x00, 0x61, 0x00, 0x6E, 0x00, 0x75, 0x00, 0x66, 0x00, 0x61, 0x00, 0x63, 0x00, 
0x74, 0x00, 0x75, 0x00, 0x72, 0x00, 0x65, 0x00, 0x72};

BYTE  rgbModelTag[] = 
//"Model" as a BMP string
{0x00, 0x4D, 0x00, 0x6F, 0x00, 0x64, 0x00, 0x65, 0x00, 0x6C};


BOOL UpdateHash(DWORD dwAddr, DWORD dwSize)
{
    CRYPT_DER_BLOB ScratchBlob;

    ScratchBlob.cbData = dwSize;
    ScratchBlob.pbData = (BYTE *)dwAddr;

    if (MinCryptUpdateHashMemory(CALG_SHA1, g_hHash, 1, &ScratchBlob))
    {
        return(FALSE);
    }

    return(TRUE);
}


BOOL CheckSignature(DWORD dwStoreBase, DWORD dwRunBase, BOOL fTestSignature,
                    OPTIONAL IN BYTE* pbDeviceMakeData, OPTIONAL IN DWORD dwDeviceMakeSize,
                    OPTIONAL IN BYTE* pbDeviceModelData, OPTIONAL IN DWORD dwDeviceModelSize)
{
#define REBASE_ADDR(x)   (x + (dwStoreBase - dwRunBase))
    DWORD dwpTOC = 0;
    ROMHDR *pROMHdr = NULL;
    EXTENSION *pExt = NULL;
    BYTE *pSig = NULL;
    DWORD dwSigLen = 0;
    DWORD cbHash = 0;
    DWORD cbAttr = 0;
    LONG rglErr = 0;
    LONG lStatus = 0;
    BYTE rgbHash[MINCRYPT_MAX_HASH_LEN];
    CRYPT_HASH_BLOB rgHashBlob;
    MAP_CAT_INFO rgMapCatInfo;
    CRYPT_DATA_BLOB rgExtensionTagName;
    CRYPT_DATA_BLOB rgExtensionValue;
    CRYPT_DATA_BLOB rgAttrEncodedOIDBlob;


    // Check for TOC signature.
    //
    if (*(LPDWORD)(dwStoreBase + ROM_SIGNATURE_OFFSET) != ROM_SIGNATURE)
    {
        EdbgOutputDebugString ("!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!\r\n");
        EdbgOutputDebugString ("! ERROR: Did not find pTOC signature.  ABORTING. !\r\n");
        EdbgOutputDebugString ("!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!\r\n");

        return(FALSE);
    }

    // Get pointer to TOC.
    //
    dwpTOC = *(LPDWORD)(dwStoreBase + ROM_SIGNATURE_OFFSET + sizeof(ULONG));

    // Locate the WHQL signature record via the ROMHDR extension pointer.
    //
    pROMHdr = (ROMHDR *)REBASE_ADDR(dwpTOC);

    if (!pROMHdr->pExtensions)
    {
        EdbgOutputDebugString("ERROR: No extensions list (NULL pointer).\r\n");
        return(FALSE);
    }

    pExt = (EXTENSION *)REBASE_ADDR((DWORD)pROMHdr->pExtensions);

    while(pExt && memcmp(pExt->name, WHQLSigExtName, strlen(WHQLSigExtName)))
    {
        if (!pExt->pNextExt)
        {
            pExt = NULL;
            break;
        }

        pExt = (EXTENSION *)REBASE_ADDR((DWORD)pExt->pNextExt);
    }

    if (!pExt)
    {
        EdbgOutputDebugString("ERROR: No signature record in extensions list (an extension block hasn't been reserved in this image)?\r\n");
        return(FALSE);
    }

    // Get location and length of the signature.
    //
    dwSigLen = pExt->length;
    pSig     = (BYTE *)REBASE_ADDR((DWORD)pExt->pdata);
    if (!dwSigLen)
    {
        EdbgOutputDebugString("ERROR: Signature length is zero.  Was this image stamped with a signature?\r\n");
        return(FALSE);
    }
    
    EdbgOutputDebugString("INFO: Found signature (Address=0x%x  Length=0x%x).\r\n", (DWORD)pSig, dwSigLen);

    // Hash memory initialization.
    //
    MinCryptCreateHashMemory(CALG_SHA1, &g_hHash);

    // Traverse the image and compute the hash.
    //
    if (!SigProcessImage((ROMHDR *)dwpTOC, (dwStoreBase - dwRunBase), UpdateHash))
    {
        return(FALSE);
    }

    // Finish computing the hash.
    //
    MinCryptGetHashParam(CALG_SHA1, g_hHash, rgbHash, &cbHash);
    
    rgHashBlob.cbData = cbHash;
    rgHashBlob.pbData = rgbHash;

    memset(&rgMapCatInfo, 0, sizeof(MAP_CAT_INFO));
    
    rgMapCatInfo.FileBlob.cbData = dwSigLen;
    rgMapCatInfo.FileBlob.pbData = pSig;

    rgAttrEncodedOIDBlob.cbData = sizeof(rgbOID_Attr);
    rgAttrEncodedOIDBlob.pbData = rgbOID_Attr;

    // Compute a CAT record for the hashed data and compare against the CAT record stamped in the image.
    //
    lStatus = MinCryptVerifyHashInCatalogBlob(CALG_SHA1, 1, &rgHashBlob, 1, &rgMapCatInfo, fTestSignature, &rglErr);
    if (lStatus || rglErr)
    {
        EdbgOutputDebugString("ERROR: MinCryptVerifyHashInCatalogs returned 0x%x (rglErr=0x%x).\r\n", lStatus, rglErr);
        return(FALSE);
    }

    // Optionally verify the Make attribute.    
    if (pbDeviceMakeData && dwDeviceMakeSize)
    {
        // Now check the Make string
        rgExtensionTagName.cbData = sizeof(rgbManufacturerTag);
        rgExtensionTagName.pbData = rgbManufacturerTag;
       
        rgExtensionValue.cbData = dwDeviceMakeSize;
        rgExtensionValue.pbData = pbDeviceMakeData;
        
        lStatus = MinCryptVerifyExtension(rgMapCatInfo, rgAttrEncodedOIDBlob, rgExtensionTagName, rgExtensionValue);
        if (lStatus)
        {
            EdbgOutputDebugString("ERROR: MinCryptVerifyExtension failed to verify manufacturer\r\n");
            return (FALSE);
        }
    }
    
    // Optionally verify the Model attribute.    
    if (pbDeviceModelData && dwDeviceModelSize)
    {
        rgExtensionTagName.cbData = sizeof(rgbModelTag);
        rgExtensionTagName.pbData = rgbModelTag;
       
        rgExtensionValue.cbData = dwDeviceModelSize;
        rgExtensionValue.pbData = pbDeviceModelData;
    
        lStatus = MinCryptVerifyExtension(rgMapCatInfo, rgAttrEncodedOIDBlob, rgExtensionTagName, rgExtensionValue);
        if (lStatus)
        {
            EdbgOutputDebugString("ERROR: MinCryptVerifyExtension failed to verify Model\r\n");
            return (FALSE);
        }
    }

    EdbgOutputDebugString("INFO: Signature check passed!\r\n");
    
    return(TRUE);
}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -