Windows-powershell / PowerShell-master /src /System.Management.Automation /security /Authenticode.cs
| // Copyright (c) Microsoft Corporation. | |
| // Licensed under the MIT License. | |
| using Microsoft.Security.Extensions; | |
| using System.ComponentModel; | |
| using System.IO; | |
| using System.Management.Automation.Internal; | |
| using System.Management.Automation.Security; | |
| using System.Management.Automation.Win32Native; | |
| using System.Runtime.InteropServices; | |
| using System.Security.Cryptography.X509Certificates; | |
| using Dbg = System.Management.Automation; | |
| namespace System.Management.Automation | |
| { | |
| /// <summary> | |
| /// Defines the options that control what data is embedded in the | |
| /// signature blob. | |
| /// </summary> | |
| public enum SigningOption | |
| { | |
| /// <summary> | |
| /// Embeds only the signer's certificate. | |
| /// </summary> | |
| AddOnlyCertificate, | |
| /// <summary> | |
| /// Embeds the entire certificate chain. | |
| /// </summary> | |
| AddFullCertificateChain, | |
| /// <summary> | |
| /// Embeds the entire certificate chain, except for the root | |
| /// certificate. | |
| /// </summary> | |
| AddFullCertificateChainExceptRoot, | |
| /// <summary> | |
| /// Default: Embeds the entire certificate chain, except for the | |
| /// root certificate. | |
| /// </summary> | |
| Default = AddFullCertificateChainExceptRoot | |
| } | |
| /// <summary> | |
| /// Helper functions for signature functionality. | |
| /// </summary> | |
| internal static class SignatureHelper | |
| { | |
| private static Guid WINTRUST_ACTION_GENERIC_VERIFY_V2 = new Guid("00AAC56B-CD44-11d0-8CC2-00C04FC295EE"); | |
| /// <summary> | |
| /// Tracer for SignatureHelper. | |
| /// </summary> | |
| [ | |
| ] | |
| private static readonly Dbg.PSTraceSource s_tracer = | |
| Dbg.PSTraceSource.GetTracer("SignatureHelper", | |
| "tracer for SignatureHelper"); | |
| /// <summary> | |
| /// Sign a file. | |
| /// </summary> | |
| /// <param name="option">Option that controls what gets embedded in the signature blob.</param> | |
| /// <param name="fileName">Name of file to sign.</param> | |
| /// <param name="certificate">Signing cert.</param> | |
| /// <param name="timeStampServerUrl">URL of time stamping server.</param> | |
| /// <param name="hashAlgorithm"> The name of the hash | |
| /// algorithm to use.</param> | |
| /// <returns>Does not return a value.</returns> | |
| /// <exception cref="System.ArgumentNullException"> | |
| /// Thrown if argument fileName or certificate is null. | |
| /// </exception> | |
| /// <exception cref="System.ArgumentException"> | |
| /// Thrown if | |
| /// -- argument fileName is empty OR | |
| /// -- the specified certificate is not suitable for | |
| /// signing code | |
| /// </exception> | |
| /// <exception cref="System.Security.Cryptography.CryptographicException"> | |
| /// This exception can be thrown if any cryptographic error occurs. | |
| /// It is not possible to know exactly what went wrong. | |
| /// This is because of the way CryptographicException is designed. | |
| /// Possible reasons: | |
| /// -- certificate is invalid | |
| /// -- certificate has no private key | |
| /// -- certificate password mismatch | |
| /// -- etc | |
| /// </exception> | |
| /// <exception cref="System.IO.FileNotFoundException"> | |
| /// Thrown if the file specified by argument fileName is not found | |
| /// </exception> | |
| internal static Signature SignFile(SigningOption option, | |
| string fileName, | |
| X509Certificate2 certificate, | |
| string timeStampServerUrl, | |
| string hashAlgorithm) | |
| { | |
| bool result = false; | |
| Signature signature = null; | |
| IntPtr pSignInfo = IntPtr.Zero; | |
| uint error = 0; | |
| string hashOid = null; | |
| Utils.CheckArgForNullOrEmpty(fileName, "fileName"); | |
| Utils.CheckArgForNull(certificate, "certificate"); | |
| // If given, TimeStamp server URLs must begin with http:// or https:// | |
| if (!string.IsNullOrEmpty(timeStampServerUrl)) | |
| { | |
| if ((timeStampServerUrl.Length <= 7) || ( | |
| !timeStampServerUrl.StartsWith("http://", StringComparison.OrdinalIgnoreCase) && | |
| !timeStampServerUrl.StartsWith("https://", StringComparison.OrdinalIgnoreCase))) | |
| { | |
| throw PSTraceSource.NewArgumentException( | |
| nameof(certificate), | |
| Authenticode.TimeStampUrlRequired); | |
| } | |
| } | |
| // Validate that the hash algorithm is valid | |
| if (!string.IsNullOrEmpty(hashAlgorithm)) | |
| { | |
| IntPtr intptrAlgorithm = Marshal.StringToHGlobalUni(hashAlgorithm); | |
| IntPtr oidPtr = NativeMethods.CryptFindOIDInfo(NativeConstants.CRYPT_OID_INFO_NAME_KEY, | |
| intptrAlgorithm, | |
| 0); | |
| // If we couldn't find an OID for the hash | |
| // algorithm, it was invalid. | |
| if (oidPtr == IntPtr.Zero) | |
| { | |
| throw PSTraceSource.NewArgumentException( | |
| nameof(certificate), | |
| Authenticode.InvalidHashAlgorithm); | |
| } | |
| else | |
| { | |
| NativeMethods.CRYPT_OID_INFO oidInfo = | |
| Marshal.PtrToStructure<NativeMethods.CRYPT_OID_INFO>(oidPtr); | |
| hashOid = oidInfo.pszOID; | |
| } | |
| } | |
| if (!SecuritySupport.CertIsGoodForSigning(certificate)) | |
| { | |
| throw PSTraceSource.NewArgumentException( | |
| nameof(certificate), | |
| Authenticode.CertNotGoodForSigning); | |
| } | |
| SecuritySupport.CheckIfFileExists(fileName); | |
| // SecurityUtils.CheckIfFileSmallerThan4Bytes(fileName); | |
| try | |
| { | |
| // CryptUI is not documented either way, but does not | |
| // support empty strings for the timestamp server URL. | |
| // It expects null, only. Instead, it randomly AVs if you | |
| // try. | |
| string timeStampServerUrlForCryptUI = null; | |
| if (!string.IsNullOrEmpty(timeStampServerUrl)) | |
| { | |
| timeStampServerUrlForCryptUI = timeStampServerUrl; | |
| } | |
| // | |
| // first initialize the struct to pass to | |
| // CryptUIWizDigitalSign() function | |
| // | |
| NativeMethods.CRYPTUI_WIZ_DIGITAL_SIGN_INFO si = NativeMethods.InitSignInfoStruct(fileName, | |
| certificate, | |
| timeStampServerUrlForCryptUI, | |
| hashOid, | |
| option); | |
| pSignInfo = Marshal.AllocCoTaskMem(Marshal.SizeOf(si)); | |
| Marshal.StructureToPtr(si, pSignInfo, false); | |
| // | |
| // sign the file | |
| // | |
| // The GetLastWin32Error of this is checked, but PreSharp doesn't seem to be | |
| // able to see that. | |
| result = NativeMethods.CryptUIWizDigitalSign( | |
| (uint)NativeMethods.CryptUIFlags.CRYPTUI_WIZ_NO_UI, | |
| IntPtr.Zero, | |
| IntPtr.Zero, | |
| pSignInfo, | |
| IntPtr.Zero); | |
| if (si.pSignExtInfo != IntPtr.Zero) | |
| { | |
| Marshal.DestroyStructure<NativeMethods.CRYPTUI_WIZ_DIGITAL_SIGN_EXTENDED_INFO>(si.pSignExtInfo); | |
| Marshal.FreeCoTaskMem(si.pSignExtInfo); | |
| } | |
| if (!result) | |
| { | |
| error = GetLastWin32Error(); | |
| // | |
| // ISSUE-2004/05/08-kumarp : there seems to be a bug | |
| // in CryptUIWizDigitalSign(). | |
| // It returns 80004005 or 80070001 | |
| // but it signs the file correctly. Mask this error | |
| // till we figure out this odd behavior. | |
| // | |
| if ((error == 0x80004005) || | |
| (error == 0x80070001) || | |
| // CryptUIWizDigitalSign introduced a breaking change in Win8 to return this | |
| // error code (ERROR_INTERNET_NAME_NOT_RESOLVED) when you provide an invalid | |
| // timestamp server. It used to be 0x80070001. | |
| // Also masking this out so that we don't introduce a breaking change ourselves. | |
| (error == 0x80072EE7) | |
| ) | |
| { | |
| result = true; | |
| } | |
| else | |
| { | |
| if (error == Win32Errors.NTE_BAD_ALGID) | |
| { | |
| throw PSTraceSource.NewArgumentException( | |
| nameof(certificate), | |
| Authenticode.InvalidHashAlgorithm); | |
| } | |
| s_tracer.TraceError("CryptUIWizDigitalSign: failed: {0:x}", | |
| error); | |
| } | |
| } | |
| if (result) | |
| { | |
| signature = GetSignature(fileName, null); | |
| } | |
| else | |
| { | |
| signature = new Signature(fileName, (uint)error); | |
| } | |
| } | |
| finally | |
| { | |
| Marshal.DestroyStructure<NativeMethods.CRYPTUI_WIZ_DIGITAL_SIGN_INFO>(pSignInfo); | |
| Marshal.FreeCoTaskMem(pSignInfo); | |
| } | |
| return signature; | |
| } | |
| /// <summary> | |
| /// Get signature on the specified file. | |
| /// </summary> | |
| /// <param name="fileName">Name of file to check.</param> | |
| /// <param name="fileContent">Content of file to check.</param> | |
| /// <returns>Signature object.</returns> | |
| /// <exception cref="System.ArgumentException"> | |
| /// Thrown if argument fileName is empty. | |
| /// </exception> | |
| /// <exception cref="System.ArgumentNullException"> | |
| /// Thrown if argument fileName is null | |
| /// </exception> | |
| /// <exception cref="System.IO.FileNotFoundException"> | |
| /// Thrown if the file specified by argument fileName is not found. | |
| /// </exception> | |
| internal static Signature GetSignature(string fileName, byte[] fileContent) | |
| { | |
| Signature signature = null; | |
| if (fileContent == null) | |
| { | |
| // First, try to get the signature from the latest dotNet signing API. | |
| signature = GetSignatureFromMSSecurityExtensions(fileName); | |
| } | |
| // If there is no signature or it is invalid, go by the file content | |
| // with the older WinVerifyTrust APIs. | |
| if ((signature == null) || (signature.Status != SignatureStatus.Valid)) | |
| { | |
| signature = GetSignatureFromWinVerifyTrust(fileName, fileContent); | |
| } | |
| return signature; | |
| } | |
| /// <summary> | |
| /// Gets the file signature using the dotNet Microsoft.Security.Extensions package. | |
| /// This supports both Windows catalog file signatures and embedded file signatures. | |
| /// But it is not supported on all Windows platforms/skus, noteably Win7 and nanoserver. | |
| /// </summary> | |
| [] | |
| private static Signature GetSignatureFromMSSecurityExtensions(string filename) | |
| { | |
| return null; | |
| if (Signature.CatalogApiAvailable.HasValue && !Signature.CatalogApiAvailable.Value) | |
| { | |
| return null; | |
| } | |
| Utils.CheckArgForNullOrEmpty(filename, "fileName"); | |
| SecuritySupport.CheckIfFileExists(filename); | |
| Signature signature = null; | |
| FileSignatureInfo fileSigInfo; | |
| using (FileStream fileStream = File.OpenRead(filename)) | |
| { | |
| try | |
| { | |
| fileSigInfo = FileSignatureInfo.GetFromFileStream(fileStream); | |
| System.Diagnostics.Debug.Assert(fileSigInfo is not null, "Returned FileSignatureInfo should never be null."); | |
| } | |
| catch (Exception) | |
| { | |
| // For any API error, enable fallback to WinVerifyTrust APIs. | |
| Signature.CatalogApiAvailable = false; | |
| return null; | |
| } | |
| } | |
| uint error = GetErrorFromSignatureState(fileSigInfo.State); | |
| if (fileSigInfo.SigningCertificate is null) | |
| { | |
| signature = new Signature(filename, error); | |
| } | |
| else | |
| { | |
| signature = fileSigInfo.TimestampCertificate is null ? | |
| new Signature(filename, error, fileSigInfo.SigningCertificate) : | |
| new Signature(filename, error, fileSigInfo.SigningCertificate, fileSigInfo.TimestampCertificate); | |
| } | |
| switch (fileSigInfo.Kind) | |
| { | |
| case SignatureKind.None: | |
| signature.SignatureType = SignatureType.None; | |
| break; | |
| case SignatureKind.Embedded: | |
| signature.SignatureType = SignatureType.Authenticode; | |
| break; | |
| case SignatureKind.Catalog: | |
| signature.SignatureType = SignatureType.Catalog; | |
| break; | |
| default: | |
| System.Diagnostics.Debug.Fail("Signature type can only be None, Authenticode or Catalog."); | |
| break; | |
| } | |
| signature.IsOSBinary = fileSigInfo.IsOSBinary; | |
| if (signature.SignatureType == SignatureType.Catalog && !Signature.CatalogApiAvailable.HasValue) | |
| { | |
| Signature.CatalogApiAvailable = fileSigInfo.State != SignatureState.Invalid; | |
| } | |
| return signature; | |
| } | |
| private static uint GetErrorFromSignatureState(SignatureState signatureState) | |
| { | |
| switch (signatureState) | |
| { | |
| case SignatureState.Unsigned: | |
| return Win32Errors.TRUST_E_NOSIGNATURE; | |
| case SignatureState.SignedAndTrusted: | |
| return Win32Errors.NO_ERROR; | |
| case SignatureState.SignedAndNotTrusted: | |
| return Win32Errors.TRUST_E_EXPLICIT_DISTRUST; | |
| case SignatureState.Invalid: | |
| return Win32Errors.TRUST_E_BAD_DIGEST; | |
| default: | |
| System.Diagnostics.Debug.Fail("Should not get here - could not map FileSignatureInfo.State"); | |
| return Win32Errors.TRUST_E_NOSIGNATURE; | |
| } | |
| } | |
| private static Signature GetSignatureFromWinVerifyTrust(string fileName, byte[] fileContent) | |
| { | |
| Signature signature = null; | |
| WinTrustMethods.WINTRUST_DATA wtd; | |
| uint error = Win32Errors.E_FAIL; | |
| if (fileContent == null) | |
| { | |
| Utils.CheckArgForNullOrEmpty(fileName, "fileName"); | |
| SecuritySupport.CheckIfFileExists(fileName); | |
| // SecurityUtils.CheckIfFileSmallerThan4Bytes(fileName); | |
| } | |
| try | |
| { | |
| error = GetWinTrustData(fileName, fileContent, out wtd); | |
| if (error != Win32Errors.NO_ERROR) | |
| { | |
| s_tracer.WriteLine("GetWinTrustData failed: {0:x}", error); | |
| } | |
| signature = GetSignatureFromWintrustData(fileName, error, wtd); | |
| wtd.dwStateAction = WinTrustAction.WTD_STATEACTION_CLOSE; | |
| error = WinTrustMethods.WinVerifyTrust( | |
| IntPtr.Zero, | |
| ref WINTRUST_ACTION_GENERIC_VERIFY_V2, | |
| ref wtd); | |
| if (error != Win32Errors.NO_ERROR) | |
| { | |
| s_tracer.WriteLine("DestroyWinTrustDataStruct failed: {0:x}", error); | |
| } | |
| } | |
| catch (AccessViolationException) | |
| { | |
| signature = new Signature(fileName, Win32Errors.TRUST_E_NOSIGNATURE); | |
| } | |
| return signature; | |
| } | |
| private static uint GetWinTrustData( | |
| string fileName, | |
| byte[] fileContent, | |
| out WinTrustMethods.WINTRUST_DATA wtData) | |
| { | |
| wtData = new() | |
| { | |
| cbStruct = (uint)Marshal.SizeOf<WinTrustMethods.WINTRUST_DATA>(), | |
| dwUIChoice = WinTrustUIChoice.WTD_UI_NONE, | |
| dwStateAction = WinTrustAction.WTD_STATEACTION_VERIFY, | |
| }; | |
| unsafe | |
| { | |
| fixed (char* fileNamePtr = fileName) | |
| { | |
| if (fileContent == null) | |
| { | |
| WinTrustMethods.WINTRUST_FILE_INFO wfi = new() | |
| { | |
| cbStruct = (uint)Marshal.SizeOf<WinTrustMethods.WINTRUST_FILE_INFO>(), | |
| pcwszFilePath = fileNamePtr, | |
| }; | |
| wtData.dwUnionChoice = WinTrustUnionChoice.WTD_CHOICE_FILE; | |
| wtData.pChoice = &wfi; | |
| return WinTrustMethods.WinVerifyTrust( | |
| IntPtr.Zero, | |
| ref WINTRUST_ACTION_GENERIC_VERIFY_V2, | |
| ref wtData); | |
| } | |
| fixed (byte* contentPtr = fileContent) | |
| { | |
| Guid pwshSIP = new("603BCC1F-4B59-4E08-B724-D2C6297EF351"); | |
| WinTrustMethods.WINTRUST_BLOB_INFO wbi = new() | |
| { | |
| cbStruct = (uint)Marshal.SizeOf<WinTrustMethods.WINTRUST_BLOB_INFO>(), | |
| gSubject = pwshSIP, | |
| pcwszDisplayName = fileNamePtr, | |
| cbMemObject = (uint)fileContent.Length, | |
| pbMemObject = contentPtr, | |
| }; | |
| wtData.dwUnionChoice = WinTrustUnionChoice.WTD_CHOICE_BLOB; | |
| wtData.pChoice = &wbi; | |
| return WinTrustMethods.WinVerifyTrust( | |
| IntPtr.Zero, | |
| ref WINTRUST_ACTION_GENERIC_VERIFY_V2, | |
| ref wtData); | |
| } | |
| } | |
| } | |
| } | |
| private static X509Certificate2 GetCertFromChain(IntPtr pSigner) | |
| { | |
| try | |
| { | |
| IntPtr pCert = WinTrustMethods.WTHelperGetProvCertFromChain(pSigner, 0); | |
| NativeMethods.CRYPT_PROVIDER_CERT provCert = | |
| Marshal.PtrToStructure<NativeMethods.CRYPT_PROVIDER_CERT>(pCert); | |
| return new X509Certificate2(provCert.pCert); | |
| } | |
| catch (Win32Exception) | |
| { | |
| // We don't care about the Win32 error code here, so return | |
| // null on a failure and let the caller handle it. | |
| return null; | |
| } | |
| } | |
| private static Signature GetSignatureFromWintrustData( | |
| string filePath, | |
| uint error, | |
| WinTrustMethods.WINTRUST_DATA wtd) | |
| { | |
| s_tracer.WriteLine("GetSignatureFromWintrustData: error: {0}", error); | |
| Signature signature = null; | |
| if (TryGetProviderSigner(wtd.hWVTStateData, out IntPtr pProvSigner, out X509Certificate2 timestamperCert)) | |
| { | |
| // | |
| // get cert of the signer | |
| // | |
| X509Certificate2 signerCert = GetCertFromChain(pProvSigner); | |
| if (signerCert != null) | |
| { | |
| if (timestamperCert != null) | |
| { | |
| signature = new Signature(filePath, | |
| error, | |
| signerCert, | |
| timestamperCert); | |
| } | |
| else | |
| { | |
| signature = new Signature(filePath, | |
| error, | |
| signerCert); | |
| } | |
| signature.SignatureType = SignatureType.Authenticode; | |
| } | |
| } | |
| Diagnostics.Assert(error != 0 || signature != null, "GetSignatureFromWintrustData: general crypto failure"); | |
| if ((signature == null) && (error != 0)) | |
| { | |
| signature = new Signature(filePath, error); | |
| } | |
| return signature; | |
| } | |
| private static bool TryGetProviderSigner(IntPtr wvtStateData, out IntPtr pProvSigner, out X509Certificate2 timestamperCert) | |
| { | |
| pProvSigner = IntPtr.Zero; | |
| timestamperCert = null; | |
| try | |
| { | |
| IntPtr pProvData = WinTrustMethods.WTHelperProvDataFromStateData(wvtStateData); | |
| pProvSigner = WinTrustMethods.WTHelperGetProvSignerFromChain( | |
| pProvData, | |
| signerIdx: 0, | |
| counterSigner: false, | |
| counterSignerIdx: 0); | |
| NativeMethods.CRYPT_PROVIDER_SGNR provSigner = | |
| Marshal.PtrToStructure<NativeMethods.CRYPT_PROVIDER_SGNR>(pProvSigner); | |
| if (provSigner.csCounterSigners == 1) | |
| { | |
| // | |
| // time stamper cert available | |
| // | |
| timestamperCert = GetCertFromChain(provSigner.pasCounterSigners); | |
| } | |
| return true; | |
| } | |
| catch (Win32Exception) | |
| { | |
| return false; | |
| } | |
| } | |
| private static uint GetLastWin32Error() | |
| { | |
| int error = Marshal.GetLastWin32Error(); | |
| return SecuritySupport.GetDWORDFromInt(error); | |
| } | |
| } | |
| } | |