1.14.0
This commit is contained in:
parent
c1e06897c8
commit
5f6c6b2c29
|
@ -0,0 +1,110 @@
|
|||
/*
|
||||
* Copyright 2024 David Xanatos, xanasoft.com
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
// Simple INSECURE Encryption Functions
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
#ifdef RC4_HEADER_ONLY
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
// Functions
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
void rc4_crypt(const unsigned char *key_ptr, unsigned int key_len, unsigned int stream_pos, unsigned char *buffer_ptr, unsigned int buffer_len);
|
||||
|
||||
#ifdef __cplusplus
|
||||
} // extern "C"
|
||||
#endif
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
// Body
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
#else RC4_HEADER_ONLY
|
||||
|
||||
typedef struct rc4_sbox_s
|
||||
{
|
||||
unsigned char state[256];
|
||||
unsigned int x;
|
||||
unsigned int y;
|
||||
} rc4_sbox_t;
|
||||
|
||||
void rc4_swap(unsigned char &a, unsigned char &b)
|
||||
{
|
||||
unsigned char c = a;
|
||||
a = b;
|
||||
b = c;
|
||||
}
|
||||
|
||||
void rc4_init(rc4_sbox_t *rc4_sbox, const unsigned char *key_ptr, unsigned int key_len)
|
||||
{
|
||||
rc4_sbox->x = 0;
|
||||
rc4_sbox->y = 0;
|
||||
|
||||
// Initialisation of the permutation
|
||||
unsigned int i;
|
||||
for (i = 0; i < 256; i++)
|
||||
rc4_sbox->state[i] = (char)i;
|
||||
|
||||
// Mixing permutation
|
||||
unsigned int j = 0;
|
||||
unsigned int k;
|
||||
for (i = 0; i < 256; i++)
|
||||
{
|
||||
k = i % key_len;
|
||||
|
||||
j = (key_ptr[k] + rc4_sbox->state[i] + j) & 0xff;
|
||||
rc4_swap(rc4_sbox->state[i], rc4_sbox->state[j]);
|
||||
}
|
||||
}
|
||||
|
||||
void rc4_transform(rc4_sbox_t *rc4_sbox, unsigned char *buffer_ptr, unsigned int buffer_len)
|
||||
{
|
||||
unsigned int i;
|
||||
for (i = 0; i < buffer_len; i++)
|
||||
{
|
||||
// The pseudo-random generation algorithm
|
||||
rc4_sbox->x = (rc4_sbox->x + 1) & 0xff;
|
||||
rc4_sbox->y = (rc4_sbox->y + rc4_sbox->state[rc4_sbox->x]) & 0xff;
|
||||
rc4_swap(rc4_sbox->state[rc4_sbox->x], rc4_sbox->state[rc4_sbox->y]);
|
||||
unsigned char keyChar = rc4_sbox->state[(rc4_sbox->state[rc4_sbox->x] + rc4_sbox->state[rc4_sbox->y]) & 0xff];
|
||||
|
||||
if (buffer_ptr) // NULL when seeking
|
||||
buffer_ptr[i] ^= keyChar;
|
||||
}
|
||||
}
|
||||
|
||||
void rc4_crypt(const unsigned char* key_ptr, unsigned int key_len, unsigned int stream_pos, unsigned char* buffer_ptr, unsigned int buffer_len)
|
||||
{
|
||||
rc4_sbox_s sbox;
|
||||
rc4_init(&sbox, key_ptr, key_len);
|
||||
if(stream_pos) // RC4 is very insecure but the first few kb are espetially insecure
|
||||
rc4_transform(&sbox, NULL, stream_pos);
|
||||
rc4_transform(&sbox, buffer_ptr, buffer_len);
|
||||
}
|
||||
|
||||
#endif RC4_HEADER_ONLY
|
|
@ -31,6 +31,8 @@
|
|||
#include "common/map.h"
|
||||
#include "common/str_util.h"
|
||||
#include "wsa_defs.h"
|
||||
#include "core/svc/sbieiniwire.h"
|
||||
#include "common/base64.c"
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
|
@ -1245,12 +1247,39 @@ BOOLEAN WSA_ParseNetProxy(NETPROXY_RULE* proxy, const WCHAR* found_value)
|
|||
|
||||
WCHAR* pass_value;
|
||||
ULONG pass_len;
|
||||
if (SbieDll_FindTagValuePtr(found_value, L"Password", &pass_value, &pass_len, L'=', L';')) {
|
||||
BOOLEAN ok = SbieDll_FindTagValuePtr(found_value, L"Password", &pass_value, &pass_len, L'=', L';');
|
||||
if (ok) {
|
||||
if (pass_len > 255)
|
||||
return FALSE;
|
||||
wmemcpy(proxy->pass, pass_value, pass_len);
|
||||
proxy->pass[pass_len] = L'\0';
|
||||
}
|
||||
else {
|
||||
ok = SbieDll_FindTagValuePtr(found_value, L"EncryptedPW", &pass_value, &pass_len, L'=', L';');
|
||||
if (ok) {
|
||||
|
||||
SBIE_INI_RC4_CRYPT_REQ req;
|
||||
SBIE_INI_RC4_CRYPT_RPL *rpl;
|
||||
|
||||
req.h.length = sizeof(SBIE_INI_RC4_CRYPT_REQ) + 255;
|
||||
req.h.msgid = MSGID_SBIE_INI_RC4_CRYPT;
|
||||
req.value_len = b64_decoded_size(pass_value);
|
||||
b64_decode(pass_value, req.value, req.value_len);
|
||||
|
||||
rpl = (SBIE_INI_RC4_CRYPT_RPL *)SbieDll_CallServer(&req.h);
|
||||
if (rpl){
|
||||
|
||||
pass_len = rpl->value_len / sizeof(wchar_t);
|
||||
if (pass_len > 255)
|
||||
return FALSE;
|
||||
wmemcpy(proxy->pass, rpl->value, pass_len);
|
||||
proxy->pass[pass_len] = L'\0';
|
||||
|
||||
Dll_Free(rpl);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
|
|
@ -373,6 +373,16 @@
|
|||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64EC'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64'">true</ExcludedFromBuild>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\common\rc4.c">
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|ARM64EC'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64EC'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|Win32'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|Win32'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|ARM64'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|x64'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|x64'">true</ExcludedFromBuild>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\common\stream.c">
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|Win32'">true</ExcludedFromBuild>
|
||||
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|Win32'">true</ExcludedFromBuild>
|
||||
|
|
|
@ -84,6 +84,9 @@
|
|||
<ClCompile Include="MountManagerHelpers.cpp">
|
||||
<Filter>MountManager</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\common\rc4.c">
|
||||
<Filter>common</Filter>
|
||||
</ClCompile>
|
||||
</ItemGroup>
|
||||
<ItemGroup>
|
||||
<ClInclude Include="misc.h" />
|
||||
|
|
|
@ -39,6 +39,8 @@ extern "C" {
|
|||
#define CRC_WITH_ADLER32
|
||||
#include "common/crc.c"
|
||||
|
||||
#include "common/rc4.c"
|
||||
|
||||
#define PATTERN XPATTERN
|
||||
#include "common/pattern.c"
|
||||
|
||||
|
|
|
@ -100,6 +100,9 @@
|
|||
#define MSGID_SBIE_INI_GET_VERSION 0x18AA
|
||||
#define MSGID_SBIE_INI_GET_WAIT_HANDLE 0x18AB
|
||||
#define MSGID_SBIE_INI_RUN_SBIE_CTRL 0x180A
|
||||
#define MSGID_SBIE_INI_RC4_CRYPT 0x180F
|
||||
|
||||
//#define MSGID_SBIE_MGR 0x1900
|
||||
|
||||
#define MSGID_NETAPI 0x1A00
|
||||
#define MSGID_NETAPI_USE_ADD 0x1A01
|
||||
|
|
|
@ -33,6 +33,9 @@
|
|||
#include "common/my_version.h"
|
||||
#define CRC_HEADER_ONLY
|
||||
#include "common/crc.c"
|
||||
#define RC4_HEADER_ONLY
|
||||
#include "common/rc4.c"
|
||||
#include "core/drv/api_defs.h"
|
||||
|
||||
#ifdef NEW_INI_MODE
|
||||
extern "C" {
|
||||
|
@ -147,6 +150,11 @@ MSG_HEADER *SbieIniServer::Handler2(MSG_HEADER *msg)
|
|||
return RunSbieCtrl(msg, idProcess, NT_SUCCESS(status));
|
||||
}
|
||||
|
||||
if (msg->msgid == MSGID_SBIE_INI_RC4_CRYPT) {
|
||||
|
||||
return RC4Crypt(msg, idProcess, NT_SUCCESS(status));
|
||||
}
|
||||
|
||||
if (NT_SUCCESS(status)) // if sandboxed
|
||||
return SHORT_REPLY(STATUS_NOT_SUPPORTED);
|
||||
|
||||
|
@ -2392,3 +2400,36 @@ MSG_HEADER *SbieIniServer::RunSbieCtrl(MSG_HEADER *msg, HANDLE idProcess, bool i
|
|||
|
||||
return SHORT_REPLY(status);
|
||||
}
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
// RC4Crypt
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
MSG_HEADER *SbieIniServer::RC4Crypt(MSG_HEADER *msg, HANDLE idProcess, bool isSandboxed)
|
||||
{
|
||||
SBIE_INI_RC4_CRYPT_REQ *req = (SBIE_INI_RC4_CRYPT_REQ *)msg;
|
||||
if (req->h.length < sizeof(SBIE_INI_RC4_CRYPT_REQ))
|
||||
return SHORT_REPLY(STATUS_INVALID_PARAMETER);
|
||||
|
||||
ULONG rpl_len = sizeof(SBIE_INI_RC4_CRYPT_RPL) + req->value_len;
|
||||
SBIE_INI_RC4_CRYPT_RPL *rpl = (SBIE_INI_RC4_CRYPT_RPL *)LONG_REPLY(rpl_len);
|
||||
if (!rpl)
|
||||
return SHORT_REPLY(STATUS_INSUFFICIENT_RESOURCES);
|
||||
|
||||
rpl->value_len = req->value_len;
|
||||
memcpy(rpl->value, req->value, req->value_len);
|
||||
|
||||
ULONG64 RandID = 0;
|
||||
SbieApi_Call(API_GET_SECURE_PARAM, 3, L"RandID", (ULONG_PTR)&RandID, sizeof(RandID));
|
||||
if (RandID == 0) {
|
||||
srand(GetTickCount());
|
||||
RandID = ULONG64(rand() & 0xFFFF) | (ULONG64(rand() & 0xFFFF) << 16) | (ULONG64(rand() & 0xFFFF) << 32) | (ULONG64(rand() & 0xFFFF) << 48);
|
||||
SbieApi_Call(API_SET_SECURE_PARAM, 3, L"RandID", (ULONG_PTR)&RandID, sizeof(RandID));
|
||||
}
|
||||
|
||||
rc4_crypt((BYTE*)&RandID, sizeof(RandID), 0x1000, rpl->value, rpl->value_len);
|
||||
|
||||
return (MSG_HEADER*)rpl;
|
||||
}
|
|
@ -105,6 +105,8 @@ protected:
|
|||
|
||||
MSG_HEADER *RunSbieCtrl(MSG_HEADER *msg, HANDLE idProcess, bool isSandboxed);
|
||||
|
||||
MSG_HEADER *RC4Crypt(MSG_HEADER *msg, HANDLE idProcess, bool isSandboxed);
|
||||
|
||||
|
||||
protected:
|
||||
|
||||
|
|
|
@ -174,6 +174,29 @@ struct tagSBIE_INI_PASSWORD_REQ
|
|||
typedef struct tagSBIE_INI_PASSWORD_REQ SBIE_INI_PASSWORD_REQ;
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
// rc4 Crypt
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
struct tagSBIE_INI_RC4_CRYPT_REQ
|
||||
{
|
||||
MSG_HEADER h;
|
||||
ULONG value_len;
|
||||
UCHAR value[1];
|
||||
};
|
||||
|
||||
struct tagSBIE_INI_RC4_CRYPT_RPL
|
||||
{
|
||||
MSG_HEADER h;
|
||||
ULONG value_len;
|
||||
UCHAR value[1];
|
||||
};
|
||||
|
||||
typedef struct tagSBIE_INI_RC4_CRYPT_REQ SBIE_INI_RC4_CRYPT_REQ;
|
||||
typedef struct tagSBIE_INI_RC4_CRYPT_RPL SBIE_INI_RC4_CRYPT_RPL;
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
|
|
@ -2150,6 +2150,27 @@ void CSbieAPI::ClearPassword()
|
|||
m->Password.clear();
|
||||
}
|
||||
|
||||
SB_RESULT(QByteArray) CSbieAPI::RC4Crypt(const QByteArray& Data)
|
||||
{
|
||||
ULONG req_len = sizeof(SBIE_INI_RC4_CRYPT_REQ) + Data.size();
|
||||
SScoped<SBIE_INI_RC4_CRYPT_REQ> req(malloc(req_len));
|
||||
|
||||
req->h.length = req_len;
|
||||
req->h.msgid = MSGID_SBIE_INI_RC4_CRYPT;
|
||||
req->value_len = Data.size();
|
||||
memcpy(req->value, Data.constData(), req->value_len);
|
||||
|
||||
SScoped<SBIE_INI_RC4_CRYPT_RPL> rpl;
|
||||
SB_STATUS Status = CallServer(&req->h, &rpl);
|
||||
if (!Status)
|
||||
return Status;
|
||||
if (!rpl)
|
||||
return SB_ERR(ERROR_SERVER_DISABLED);
|
||||
if (rpl->h.status != 0)
|
||||
return SB_ERR(rpl->h.status);
|
||||
return CSbieResult(QByteArray((char*)rpl->value, rpl->value_len));
|
||||
}
|
||||
|
||||
bool CSbieAPI::GetDriverInfo(quint32 InfoClass, void* pBuffer, size_t Size)
|
||||
{
|
||||
__declspec(align(8)) ULONG64 parms[API_NUM_ARGS];
|
||||
|
|
|
@ -108,6 +108,8 @@ public:
|
|||
virtual SB_STATUS LockConfig(const QString& NewPassword);
|
||||
virtual void ClearPassword();
|
||||
|
||||
virtual SB_RESULT(QByteArray) RC4Crypt(const QByteArray& Data);
|
||||
|
||||
virtual bool GetDriverInfo(quint32 InfoClass, void* pBuffer, size_t Size);
|
||||
|
||||
enum EFeatureFlags
|
||||
|
|
|
@ -986,6 +986,12 @@ void COptionsWindow::ParseAndAddNetProxy(const QString& Value, bool disabled, co
|
|||
pItem->setData(4, Qt::UserRole, Login);
|
||||
|
||||
QString Pass = Tags.value("password");
|
||||
if(Pass.isEmpty()) {
|
||||
Pass = Tags.value("encryptedpw");
|
||||
auto res = theAPI->RC4Crypt(QByteArray::fromBase64(Pass.toLatin1()));
|
||||
if (!res.IsError())
|
||||
Pass = QString::fromWCharArray((wchar_t*)res.GetValue().data(), res.GetValue().length() / sizeof(wchar_t));
|
||||
}
|
||||
if (Pass.length() > 255) Pass = Pass.left(255);
|
||||
pItem->setText(5, Pass);
|
||||
pItem->setData(5, Qt::UserRole, Pass);
|
||||
|
@ -1024,7 +1030,13 @@ void COptionsWindow::SaveNetProxy()
|
|||
Tags.append("Port=" + Port);
|
||||
if (!Auth.isEmpty()) Tags.append("Auth=" + Auth);
|
||||
if (!Login.isEmpty()) Tags.append("Login=" + Login);
|
||||
if (!Pass.isEmpty()) Tags.append("Password=" + Pass);
|
||||
if (!Pass.isEmpty()) {
|
||||
auto res = theAPI->RC4Crypt(QByteArray((char*)Pass.toStdWString().c_str(), Pass.length() * sizeof(wchar_t)));
|
||||
if(res.IsError())
|
||||
Tags.append("Password=" + Pass);
|
||||
else
|
||||
Tags.append("EncryptedPW=" + res.GetValue().toBase64(QByteArray::OmitTrailingEquals));
|
||||
}
|
||||
QString Entry = Tags.join(";").prepend(Program + ",");
|
||||
|
||||
if (pItem->checkState(0) == Qt::Checked)
|
||||
|
|
Loading…
Reference in New Issue