/* Derived from source code of TrueCrypt 7.1a, which is Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed by the TrueCrypt License 3.0. Modifications and additions to the original source code (contained in this file) and all other portions of this file are Copyright (c) 2013-2016 IDRIX and are governed by the Apache License 2.0 the full text of which is contained in the file License.txt included in VeraCrypt binary and source code distribution packages. */ #include #include #include #include #include "BaseCom.h" #include "BootEncryption.h" #include "Dlgcode.h" #include "Registry.h" using namespace VeraCrypt; HRESULT CreateElevatedComObject (HWND hwnd, REFGUID guid, REFIID iid, void **ppv) { WCHAR monikerName[1024]; WCHAR clsid[1024]; BIND_OPTS3 bo; StringFromGUID2 (guid, clsid, sizeof (clsid) / 2); swprintf_s (monikerName, sizeof (monikerName) / 2, L"Elevation:Administrator!new:%s", clsid); memset (&bo, 0, sizeof (bo)); bo.cbStruct = sizeof (bo); bo.hwnd = hwnd; bo.dwClassContext = CLSCTX_LOCAL_SERVER; // Prevent the GUI from being half-rendered when the UAC prompt "freezes" it ProcessPaintMessages (hwnd, 5000); return CoGetObject (monikerName, &bo, iid, ppv); } BOOL ComGetInstanceBase (HWND hWnd, REFCLSID clsid, REFIID iid, void **tcServer) { BOOL r; if (IsUacSupported ()) { while (true) { r = CreateElevatedComObject (hWnd, clsid, iid, tcServer) == S_OK; if (r) break; else { if (IDRETRY == ErrorRetryCancel ("UAC_INIT_ERROR", hWnd)) continue; else break; } } } else { r = CoCreateInstance (clsid, NULL, CLSCTX_LOCAL_SERVER, iid, tcServer) == S_OK; if (!r) Error ("UAC_INIT_ERROR", hWnd); } return r; } DWORD BaseCom::CallDriver (DWORD ioctl, BSTR input, BSTR *output) { try { BootEncryption bootEnc (NULL); bootEnc.CallDriver (ioctl, (BYTE *) input, !(BYTE *) input ? 0 : ((DWORD *) ((BYTE *) input))[-1], (BYTE *) *output, !(BYTE *) *output ? 0 : ((DWORD *) ((BYTE *) *output))[-1]); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::CopyFile (BSTR sourceFile, BSTR destinationFile) { if (!::CopyFileW (sourceFile, destinationFile, FALSE)) return GetLastError(); return ERROR_SUCCESS; } DWORD BaseCom::DeleteFile (BSTR file) { if (!::DeleteFileW (file)) return GetLastError(); return ERROR_SUCCESS; } BOOL BaseCom::IsPagingFileActive (BOOL checkNonWindowsPartitionsOnly) { return ::IsPagingFileActive (checkNonWindowsPartitionsOnly); } DWORD BaseCom::ReadWriteFile (BOOL write, BOOL device, BSTR filePath, BSTR *bufferBstr, unsigned __int64 offset, unsigned __int32 size, DWORD *sizeDone) { try { auto_ptr file (device ? new Device (filePath, !write) : new File (filePath, !write)); file->CheckOpened (SRC_POS); file->SeekAt (offset); if (write) { file->Write ((BYTE *) *bufferBstr, size); *sizeDone = size; } else { *sizeDone = file->Read ((BYTE *) *bufferBstr, size); } } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::GetFileSize (BSTR filePath, unsigned __int64 *pSize) { if (!pSize) return ERROR_INVALID_PARAMETER; try { std::wstring path (filePath); File file(filePath, true); file.CheckOpened (SRC_POS); file.GetFileSize (*pSize); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::DeviceIoControl (BOOL readOnly, BOOL device, BSTR filePath, DWORD dwIoControlCode, BSTR input, BSTR *output) { try { auto_ptr file (device ? new Device (filePath, readOnly == TRUE) : new File (filePath, readOnly == TRUE)); file->CheckOpened (SRC_POS); if (!file->IoCtl (dwIoControlCode, (BYTE *) input, !(BYTE *) input ? 0 : ((DWORD *) ((BYTE *) input))[-1], (BYTE *) *output, !(BYTE *) *output ? 0 : ((DWORD *) ((BYTE *) *output))[-1])) { return GetLastError(); } } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::RegisterFilterDriver (BOOL registerDriver, int filterType) { try { BootEncryption bootEnc (NULL); bootEnc.RegisterFilterDriver (registerDriver ? true : false, (BootEncryption::FilterType) filterType); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::RegisterSystemFavoritesService (BOOL registerService) { try { BootEncryption bootEnc (NULL); bootEnc.RegisterSystemFavoritesService (registerService); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::SetDriverServiceStartType (DWORD startType) { try { BootEncryption bootEnc (NULL); bootEnc.SetDriverServiceStartType (startType); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::WriteLocalMachineRegistryDwordValue (BSTR keyPath, BSTR valueName, DWORD value) { if (!::WriteLocalMachineRegistryDword (keyPath, valueName, value)) return GetLastError(); return ERROR_SUCCESS; } DWORD BaseCom::InstallEfiBootLoader (BOOL preserveUserConfig, BOOL hiddenOSCreation, int pim, int hashAlg) { try { BootEncryption bootEnc (NULL); bootEnc.InstallBootLoader (preserveUserConfig? true : false, hiddenOSCreation? true : false, pim, hashAlg); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::BackupEfiSystemLoader () { try { BootEncryption bootEnc (NULL); bootEnc.BackupSystemLoader (); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::RestoreEfiSystemLoader () { try { BootEncryption bootEnc (NULL); bootEnc.RestoreSystemLoader (); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::GetEfiBootDeviceNumber (BSTR* pSdn) { if (!pSdn || !(*pSdn) || ((((DWORD *) ((BYTE *) *pSdn))[-1]) < sizeof (STORAGE_DEVICE_NUMBER))) return ERROR_INVALID_PARAMETER; try { BootEncryption bootEnc (NULL); bootEnc.GetEfiBootDeviceNumber ((PSTORAGE_DEVICE_NUMBER) *pSdn); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::ReadEfiConfig (BSTR* pContent, DWORD *pcbRead) { if (!pContent || !(*pContent)) return ERROR_INVALID_PARAMETER; try { DWORD maxSize = ((DWORD *) ((BYTE *) *pContent))[-1]; BootEncryption bootEnc (NULL); bootEnc.ReadEfiConfig ((byte*) *pContent, maxSize, pcbRead); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; } DWORD BaseCom::WriteEfiBootSectorUserConfig (DWORD userConfig, BSTR customUserMessage, int pim, int hashAlg) { if (!customUserMessage) return ERROR_INVALID_PARAMETER; try { DWORD maxSize = ((DWORD *) ((BYTE *) customUserMessage))[-1]; char* msg = (char*) *customUserMessage; if (maxSize > 0) msg [maxSize - 1] = 0; std::string msgStr = maxSize > 0 ? msg : ""; BootEncryption bootEnc (NULL); bootEnc.WriteEfiBootSectorUserConfig ((byte) userConfig, msgStr, pim, hashAlg); } catch (SystemException &) { return GetLastError(); } catch (Exception &e) { e.Show (NULL); return ERROR_EXCEPTION_IN_SERVICE; } catch (...) { return ERROR_EXCEPTION_IN_SERVICE; } return ERROR_SUCCESS; }>173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245
/*
 Derived from source code of TrueCrypt 7.1a, which is
 Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
 by the TrueCrypt License 3.0.

 Modifications and additions to the original source code (contained in this file) 
 and all other portions of this file are Copyright (c) 2013-2015 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
*/

#include "Platform/Platform.h"
#include "Cipher.h"
#include "Crypto/Aes.h"
#include "Crypto/Serpent.h"
#include "Crypto/Twofish.h"

#ifdef TC_AES_HW_CPU
#	include "Crypto/Aes_hw_cpu.h"
#endif

namespace VeraCrypt
{
	Cipher::Cipher () : Initialized (false)
	{
	}

	Cipher::~Cipher ()
	{
	}

	void Cipher::DecryptBlock (byte *data) const
	{
		if (!Initialized)
			throw NotInitialized (SRC_POS);

		Decrypt (data);
	}

	void Cipher::DecryptBlocks (byte *data, size_t blockCount) const
	{
		if (!Initialized)
			throw NotInitialized (SRC_POS);

		while (blockCount-- > 0)
		{
			Decrypt (data);
			data += GetBlockSize();
		}
	}

	void Cipher::EncryptBlock (byte *data) const
	{
		if (!Initialized)
			throw NotInitialized (SRC_POS);

		Encrypt (data);
	}

	void Cipher::EncryptBlocks (byte *data, size_t blockCount) const
	{
		if (!Initialized)
			throw NotInitialized (SRC_POS);

		while (blockCount-- > 0)
		{
			Encrypt (data);
			data += GetBlockSize();
		}
	}

	CipherList Cipher::GetAvailableCiphers ()
	{
		CipherList l;

		l.push_back (shared_ptr <Cipher> (new CipherAES ()));
		l.push_back (shared_ptr <Cipher> (new CipherSerpent ()));
		l.push_back (shared_ptr <Cipher> (new CipherTwofish ()));

		return l;
	}

	void Cipher::SetKey (const ConstBufferPtr &key)
	{
		if (key.Size() != GetKeySize ())
			throw ParameterIncorrect (SRC_POS);

		if (!Initialized)
			ScheduledKey.Allocate (GetScheduledKeySize ());

		SetCipherKey (key);
		Key.CopyFrom (key);
		Initialized = true;
	}

#define TC_EXCEPTION(TYPE) TC_SERIALIZER_FACTORY_ADD(TYPE)
#undef TC_EXCEPTION_NODECL
#define TC_EXCEPTION_NODECL(TYPE) TC_SERIALIZER_FACTORY_ADD(TYPE)

	TC_SERIALIZER_FACTORY_ADD_EXCEPTION_SET (CipherException);


	// AES
	void CipherAES::Decrypt (byte *data) const
	{
#ifdef TC_AES_HW_CPU
		if (IsHwSupportAvailable())
			aes_hw_cpu_decrypt (ScheduledKey.Ptr() + sizeof (aes_encrypt_ctx), data);
		else
#endif
			aes_decrypt (data, data, (aes_decrypt_ctx *) (ScheduledKey.Ptr() + sizeof (aes_encrypt_ctx)));
	}

	void CipherAES::DecryptBlocks (byte *data, size_t blockCount) const
	{
		if (!Initialized)
			throw NotInitialized (SRC_POS);

#ifdef TC_AES_HW_CPU
		if ((blockCount & (32 - 1)) == 0
			&& IsHwSupportAvailable())
		{
			while (blockCount > 0)
			{
				aes_hw_cpu_decrypt_32_blocks (ScheduledKey.Ptr() + sizeof (aes_encrypt_ctx), data);

				data += 32 * GetBlockSize();
				blockCount -= 32;
			}
		}
		else
#endif
			Cipher::DecryptBlocks (data, blockCount);
	}

	void CipherAES::Encrypt (byte *data) const
	{
#ifdef TC_AES_HW_CPU
		if (IsHwSupportAvailable())
			aes_hw_cpu_encrypt (ScheduledKey.Ptr(), data);
		else
#endif
			aes_encrypt (data, data, (aes_encrypt_ctx *) ScheduledKey.Ptr());
	}

	void CipherAES::EncryptBlocks (byte *data, size_t blockCount) const
	{
		if (!Initialized)
			throw NotInitialized (SRC_POS);

#ifdef TC_AES_HW_CPU
		if ((blockCount & (32 - 1)) == 0
			&& IsHwSupportAvailable())
		{
			while (blockCount > 0)
			{
				aes_hw_cpu_encrypt_32_blocks (ScheduledKey.Ptr(), data);

				data += 32 * GetBlockSize();
				blockCount -= 32;
			}
		}
		else
#endif
			Cipher::EncryptBlocks (data, blockCount);
	}

	size_t CipherAES::GetScheduledKeySize () const
	{
		return sizeof(aes_encrypt_ctx) + sizeof(aes_decrypt_ctx);
	}

	bool CipherAES::IsHwSupportAvailable () const
	{
#ifdef TC_AES_HW_CPU
		static bool state = false;
		static bool stateValid = false;

		if (!stateValid)
		{
			state = is_aes_hw_cpu_supported() ? true : false;
			stateValid = true;
		}
		return state && HwSupportEnabled;
#else
		return false;
#endif
	}

	void CipherAES::SetCipherKey (const byte *key)
	{
		if (aes_encrypt_key256 (key, (aes_encrypt_ctx *) ScheduledKey.Ptr()) != EXIT_SUCCESS)
			throw CipherInitError (SRC_POS);

		if (aes_decrypt_key256 (key, (aes_decrypt_ctx *) (ScheduledKey.Ptr() + sizeof (aes_encrypt_ctx))) != EXIT_SUCCESS)
			throw CipherInitError (SRC_POS);
	}

	// Serpent
	void CipherSerpent::Decrypt (byte *data) const
	{
		serpent_decrypt (data, data, ScheduledKey);
	}

	void CipherSerpent::Encrypt (byte *data) const
	{
		serpent_encrypt (data, data, ScheduledKey);
	}
	
	size_t CipherSerpent::GetScheduledKeySize () const
	{
		return 140*4;
	}

	void CipherSerpent::SetCipherKey (const byte *key)
	{
		serpent_set_key (key, ScheduledKey);
	}


	// Twofish
	void CipherTwofish::Decrypt (byte *data) const
	{
		twofish_decrypt ((TwofishInstance *) ScheduledKey.Ptr(), (unsigned int *)data, (unsigned int *)data);
	}

	void CipherTwofish::Encrypt (byte *data) const
	{
		twofish_encrypt ((TwofishInstance *) ScheduledKey.Ptr(), (unsigned int *)data, (unsigned int *)data);
	}

	size_t CipherTwofish::GetScheduledKeySize () const
	{
		return TWOFISH_KS;
	}

	void CipherTwofish::SetCipherKey (const byte *key)
	{
		twofish_set_key ((TwofishInstance *) ScheduledKey.Ptr(), (unsigned int *) key);
	}


	bool Cipher::HwSupportEnabled = true;
}