// Copyright (c) Microsoft Corporation. // Licensed under the MIT License. #pragma warning disable 1634, 1691 #pragma warning disable 56523 #if !UNIX using Microsoft.Security.Extensions; #endif using System.ComponentModel; using System.IO; using System.Management.Automation.Internal; using System.Management.Automation.Security; using System.Management.Automation.Win32Native; using System.Runtime.InteropServices; using System.Security.Cryptography.X509Certificates; using Dbg = System.Management.Automation; namespace System.Management.Automation { /// /// Defines the options that control what data is embedded in the /// signature blob. /// public enum SigningOption { /// /// Embeds only the signer's certificate. /// AddOnlyCertificate, /// /// Embeds the entire certificate chain. /// AddFullCertificateChain, /// /// Embeds the entire certificate chain, except for the root /// certificate. /// AddFullCertificateChainExceptRoot, /// /// Default: Embeds the entire certificate chain, except for the /// root certificate. /// Default = AddFullCertificateChainExceptRoot } /// /// Helper functions for signature functionality. /// internal static class SignatureHelper { private static Guid WINTRUST_ACTION_GENERIC_VERIFY_V2 = new Guid("00AAC56B-CD44-11d0-8CC2-00C04FC295EE"); /// /// Tracer for SignatureHelper. /// [Dbg.TraceSource("SignatureHelper", "tracer for SignatureHelper")] private static readonly Dbg.PSTraceSource s_tracer = Dbg.PSTraceSource.GetTracer("SignatureHelper", "tracer for SignatureHelper"); /// /// Sign a file. /// /// Option that controls what gets embedded in the signature blob. /// Name of file to sign. /// Signing cert. /// URL of time stamping server. /// The name of the hash /// algorithm to use. /// Does not return a value. /// /// Thrown if argument fileName or certificate is null. /// /// /// Thrown if /// -- argument fileName is empty OR /// -- the specified certificate is not suitable for /// signing code /// /// /// This exception can be thrown if any cryptographic error occurs. /// It is not possible to know exactly what went wrong. /// This is because of the way CryptographicException is designed. /// Possible reasons: /// -- certificate is invalid /// -- certificate has no private key /// -- certificate password mismatch /// -- etc /// /// /// Thrown if the file specified by argument fileName is not found /// internal static Signature SignFile(SigningOption option, string fileName, X509Certificate2 certificate, string timeStampServerUrl, string hashAlgorithm) { bool result = false; Signature signature = null; IntPtr pSignInfo = IntPtr.Zero; uint error = 0; string hashOid = null; Utils.CheckArgForNullOrEmpty(fileName, "fileName"); Utils.CheckArgForNull(certificate, "certificate"); // If given, TimeStamp server URLs must begin with http:// or https:// if (!string.IsNullOrEmpty(timeStampServerUrl)) { if ((timeStampServerUrl.Length <= 7) || ( !timeStampServerUrl.StartsWith("http://", StringComparison.OrdinalIgnoreCase) && !timeStampServerUrl.StartsWith("https://", StringComparison.OrdinalIgnoreCase))) { throw PSTraceSource.NewArgumentException( nameof(certificate), Authenticode.TimeStampUrlRequired); } } // Validate that the hash algorithm is valid if (!string.IsNullOrEmpty(hashAlgorithm)) { IntPtr intptrAlgorithm = Marshal.StringToHGlobalUni(hashAlgorithm); IntPtr oidPtr = NativeMethods.CryptFindOIDInfo(NativeConstants.CRYPT_OID_INFO_NAME_KEY, intptrAlgorithm, 0); // If we couldn't find an OID for the hash // algorithm, it was invalid. if (oidPtr == IntPtr.Zero) { throw PSTraceSource.NewArgumentException( nameof(certificate), Authenticode.InvalidHashAlgorithm); } else { NativeMethods.CRYPT_OID_INFO oidInfo = Marshal.PtrToStructure(oidPtr); hashOid = oidInfo.pszOID; } } if (!SecuritySupport.CertIsGoodForSigning(certificate)) { throw PSTraceSource.NewArgumentException( nameof(certificate), Authenticode.CertNotGoodForSigning); } SecuritySupport.CheckIfFileExists(fileName); // SecurityUtils.CheckIfFileSmallerThan4Bytes(fileName); try { // CryptUI is not documented either way, but does not // support empty strings for the timestamp server URL. // It expects null, only. Instead, it randomly AVs if you // try. string timeStampServerUrlForCryptUI = null; if (!string.IsNullOrEmpty(timeStampServerUrl)) { timeStampServerUrlForCryptUI = timeStampServerUrl; } // // first initialize the struct to pass to // CryptUIWizDigitalSign() function // NativeMethods.CRYPTUI_WIZ_DIGITAL_SIGN_INFO si = NativeMethods.InitSignInfoStruct(fileName, certificate, timeStampServerUrlForCryptUI, hashOid, option); pSignInfo = Marshal.AllocCoTaskMem(Marshal.SizeOf(si)); Marshal.StructureToPtr(si, pSignInfo, false); // // sign the file // // The GetLastWin32Error of this is checked, but PreSharp doesn't seem to be // able to see that. #pragma warning disable 56523 result = NativeMethods.CryptUIWizDigitalSign( (uint)NativeMethods.CryptUIFlags.CRYPTUI_WIZ_NO_UI, IntPtr.Zero, IntPtr.Zero, pSignInfo, IntPtr.Zero); #pragma warning restore 56523 if (si.pSignExtInfo != IntPtr.Zero) { Marshal.DestroyStructure(si.pSignExtInfo); Marshal.FreeCoTaskMem(si.pSignExtInfo); } if (!result) { error = GetLastWin32Error(); // // ISSUE-2004/05/08-kumarp : there seems to be a bug // in CryptUIWizDigitalSign(). // It returns 80004005 or 80070001 // but it signs the file correctly. Mask this error // till we figure out this odd behavior. // if ((error == 0x80004005) || (error == 0x80070001) || // CryptUIWizDigitalSign introduced a breaking change in Win8 to return this // error code (ERROR_INTERNET_NAME_NOT_RESOLVED) when you provide an invalid // timestamp server. It used to be 0x80070001. // Also masking this out so that we don't introduce a breaking change ourselves. (error == 0x80072EE7) ) { result = true; } else { if (error == Win32Errors.NTE_BAD_ALGID) { throw PSTraceSource.NewArgumentException( nameof(certificate), Authenticode.InvalidHashAlgorithm); } s_tracer.TraceError("CryptUIWizDigitalSign: failed: {0:x}", error); } } if (result) { signature = GetSignature(fileName, null); } else { signature = new Signature(fileName, (uint)error); } } finally { Marshal.DestroyStructure(pSignInfo); Marshal.FreeCoTaskMem(pSignInfo); } return signature; } /// /// Get signature on the specified file. /// /// Name of file to check. /// Content of file to check. /// Signature object. /// /// Thrown if argument fileName is empty. /// /// /// Thrown if argument fileName is null /// /// /// Thrown if the file specified by argument fileName is not found. /// internal static Signature GetSignature(string fileName, byte[] fileContent) { Signature signature = null; if (fileContent == null) { // First, try to get the signature from the latest dotNet signing API. signature = GetSignatureFromMSSecurityExtensions(fileName); } // If there is no signature or it is invalid, go by the file content // with the older WinVerifyTrust APIs. if ((signature == null) || (signature.Status != SignatureStatus.Valid)) { signature = GetSignatureFromWinVerifyTrust(fileName, fileContent); } return signature; } /// /// Gets the file signature using the dotNet Microsoft.Security.Extensions package. /// This supports both Windows catalog file signatures and embedded file signatures. /// But it is not supported on all Windows platforms/skus, noteably Win7 and nanoserver. /// [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Reliability", "CA2001:AvoidCallingProblematicMethods")] private static Signature GetSignatureFromMSSecurityExtensions(string filename) { #if UNIX return null; #else if (Signature.CatalogApiAvailable.HasValue && !Signature.CatalogApiAvailable.Value) { return null; } Utils.CheckArgForNullOrEmpty(filename, "fileName"); SecuritySupport.CheckIfFileExists(filename); Signature signature = null; FileSignatureInfo fileSigInfo; using (FileStream fileStream = File.OpenRead(filename)) { try { fileSigInfo = FileSignatureInfo.GetFromFileStream(fileStream); System.Diagnostics.Debug.Assert(fileSigInfo is not null, "Returned FileSignatureInfo should never be null."); } catch (Exception) { // For any API error, enable fallback to WinVerifyTrust APIs. Signature.CatalogApiAvailable = false; return null; } } uint error = GetErrorFromSignatureState(fileSigInfo.State); if (fileSigInfo.SigningCertificate is null) { signature = new Signature(filename, error); } else { signature = fileSigInfo.TimestampCertificate is null ? new Signature(filename, error, fileSigInfo.SigningCertificate) : new Signature(filename, error, fileSigInfo.SigningCertificate, fileSigInfo.TimestampCertificate); } switch (fileSigInfo.Kind) { case SignatureKind.None: signature.SignatureType = SignatureType.None; break; case SignatureKind.Embedded: signature.SignatureType = SignatureType.Authenticode; break; case SignatureKind.Catalog: signature.SignatureType = SignatureType.Catalog; break; default: System.Diagnostics.Debug.Fail("Signature type can only be None, Authenticode or Catalog."); break; } signature.IsOSBinary = fileSigInfo.IsOSBinary; if (signature.SignatureType == SignatureType.Catalog && !Signature.CatalogApiAvailable.HasValue) { Signature.CatalogApiAvailable = fileSigInfo.State != SignatureState.Invalid; } return signature; #endif } #if !UNIX private static uint GetErrorFromSignatureState(SignatureState signatureState) { switch (signatureState) { case SignatureState.Unsigned: return Win32Errors.TRUST_E_NOSIGNATURE; case SignatureState.SignedAndTrusted: return Win32Errors.NO_ERROR; case SignatureState.SignedAndNotTrusted: return Win32Errors.TRUST_E_EXPLICIT_DISTRUST; case SignatureState.Invalid: return Win32Errors.TRUST_E_BAD_DIGEST; default: System.Diagnostics.Debug.Fail("Should not get here - could not map FileSignatureInfo.State"); return Win32Errors.TRUST_E_NOSIGNATURE; } } #endif private static Signature GetSignatureFromWinVerifyTrust(string fileName, byte[] fileContent) { Signature signature = null; WinTrustMethods.WINTRUST_DATA wtd; uint error = Win32Errors.E_FAIL; if (fileContent == null) { Utils.CheckArgForNullOrEmpty(fileName, "fileName"); SecuritySupport.CheckIfFileExists(fileName); // SecurityUtils.CheckIfFileSmallerThan4Bytes(fileName); } try { error = GetWinTrustData(fileName, fileContent, out wtd); if (error != Win32Errors.NO_ERROR) { s_tracer.WriteLine("GetWinTrustData failed: {0:x}", error); } signature = GetSignatureFromWintrustData(fileName, error, wtd); wtd.dwStateAction = WinTrustAction.WTD_STATEACTION_CLOSE; error = WinTrustMethods.WinVerifyTrust( IntPtr.Zero, ref WINTRUST_ACTION_GENERIC_VERIFY_V2, ref wtd); if (error != Win32Errors.NO_ERROR) { s_tracer.WriteLine("DestroyWinTrustDataStruct failed: {0:x}", error); } } catch (AccessViolationException) { signature = new Signature(fileName, Win32Errors.TRUST_E_NOSIGNATURE); } return signature; } private static uint GetWinTrustData( string fileName, byte[] fileContent, out WinTrustMethods.WINTRUST_DATA wtData) { wtData = new() { cbStruct = (uint)Marshal.SizeOf(), dwUIChoice = WinTrustUIChoice.WTD_UI_NONE, dwStateAction = WinTrustAction.WTD_STATEACTION_VERIFY, }; unsafe { fixed (char* fileNamePtr = fileName) { if (fileContent == null) { WinTrustMethods.WINTRUST_FILE_INFO wfi = new() { cbStruct = (uint)Marshal.SizeOf(), pcwszFilePath = fileNamePtr, }; wtData.dwUnionChoice = WinTrustUnionChoice.WTD_CHOICE_FILE; wtData.pChoice = &wfi; return WinTrustMethods.WinVerifyTrust( IntPtr.Zero, ref WINTRUST_ACTION_GENERIC_VERIFY_V2, ref wtData); } fixed (byte* contentPtr = fileContent) { Guid pwshSIP = new("603BCC1F-4B59-4E08-B724-D2C6297EF351"); WinTrustMethods.WINTRUST_BLOB_INFO wbi = new() { cbStruct = (uint)Marshal.SizeOf(), gSubject = pwshSIP, pcwszDisplayName = fileNamePtr, cbMemObject = (uint)fileContent.Length, pbMemObject = contentPtr, }; wtData.dwUnionChoice = WinTrustUnionChoice.WTD_CHOICE_BLOB; wtData.pChoice = &wbi; return WinTrustMethods.WinVerifyTrust( IntPtr.Zero, ref WINTRUST_ACTION_GENERIC_VERIFY_V2, ref wtData); } } } } private static X509Certificate2 GetCertFromChain(IntPtr pSigner) { try { IntPtr pCert = WinTrustMethods.WTHelperGetProvCertFromChain(pSigner, 0); NativeMethods.CRYPT_PROVIDER_CERT provCert = Marshal.PtrToStructure(pCert); return new X509Certificate2(provCert.pCert); } catch (Win32Exception) { // We don't care about the Win32 error code here, so return // null on a failure and let the caller handle it. return null; } } private static Signature GetSignatureFromWintrustData( string filePath, uint error, WinTrustMethods.WINTRUST_DATA wtd) { s_tracer.WriteLine("GetSignatureFromWintrustData: error: {0}", error); Signature signature = null; if (TryGetProviderSigner(wtd.hWVTStateData, out IntPtr pProvSigner, out X509Certificate2 timestamperCert)) { // // get cert of the signer // X509Certificate2 signerCert = GetCertFromChain(pProvSigner); if (signerCert != null) { if (timestamperCert != null) { signature = new Signature(filePath, error, signerCert, timestamperCert); } else { signature = new Signature(filePath, error, signerCert); } signature.SignatureType = SignatureType.Authenticode; } } Diagnostics.Assert(error != 0 || signature != null, "GetSignatureFromWintrustData: general crypto failure"); if ((signature == null) && (error != 0)) { signature = new Signature(filePath, error); } return signature; } private static bool TryGetProviderSigner(IntPtr wvtStateData, out IntPtr pProvSigner, out X509Certificate2 timestamperCert) { pProvSigner = IntPtr.Zero; timestamperCert = null; try { IntPtr pProvData = WinTrustMethods.WTHelperProvDataFromStateData(wvtStateData); pProvSigner = WinTrustMethods.WTHelperGetProvSignerFromChain( pProvData, signerIdx: 0, counterSigner: false, counterSignerIdx: 0); NativeMethods.CRYPT_PROVIDER_SGNR provSigner = Marshal.PtrToStructure(pProvSigner); if (provSigner.csCounterSigners == 1) { // // time stamper cert available // timestamperCert = GetCertFromChain(provSigner.pasCounterSigners); } return true; } catch (Win32Exception) { return false; } } private static uint GetLastWin32Error() { int error = Marshal.GetLastWin32Error(); return SecuritySupport.GetDWORDFromInt(error); } } } #pragma warning restore 56523