zoukankan      html  css  js  c++  java
  • 【PE结构】恶意代码数字签名验证

    说明

    恶意代码数字签名验证功能,WinverityTrust、CryptQueryObject

    代码实现

    WinVerifyTrust

    //-------------------------------------------------------------------
    // Copyright (C) Microsoft.  All rights reserved.
    // Example of verifying the embedded signature of a PE file by using 
    // the WinVerifyTrust function.
    
    #define _UNICODE 1
    #define UNICODE 1
    
    #include <tchar.h>
    #include <stdio.h>
    #include <stdlib.h>
    #include <windows.h>
    #include <Softpub.h>
    #include <wincrypt.h>
    #include <wintrust.h>
    
    // Link with the Wintrust.lib file.
    #pragma comment (lib, "wintrust")
    
    BOOL VerifyEmbeddedSignature(LPCWSTR pwszSourceFile)
    {
        LONG lStatus;
        DWORD dwLastError;
    
        // Initialize the WINTRUST_FILE_INFO structure.
    
        WINTRUST_FILE_INFO FileData;
        memset(&FileData, 0, sizeof(FileData));
        FileData.cbStruct = sizeof(WINTRUST_FILE_INFO);
        FileData.pcwszFilePath = pwszSourceFile;
        FileData.hFile = NULL;
        FileData.pgKnownSubject = NULL;
    
        /*
        WVTPolicyGUID specifies the policy to apply on the file
        WINTRUST_ACTION_GENERIC_VERIFY_V2 policy checks:
        
        1) The certificate used to sign the file chains up to a root 
        certificate located in the trusted root certificate store. This 
        implies that the identity of the publisher has been verified by 
        a certification authority.
        
        2) In cases where user interface is displayed (which this example
        does not do), WinVerifyTrust will check for whether the  
        end entity certificate is stored in the trusted publisher store,  
        implying that the user trusts content from this publisher.
        
        3) The end entity certificate has sufficient permission to sign 
        code, as indicated by the presence of a code signing EKU or no 
        EKU.
        */
    
        GUID WVTPolicyGUID = WINTRUST_ACTION_GENERIC_VERIFY_V2;
        WINTRUST_DATA WinTrustData;
    
        // Initialize the WinVerifyTrust input data structure.
    
        // Default all fields to 0.
        memset(&WinTrustData, 0, sizeof(WinTrustData));
    
        WinTrustData.cbStruct = sizeof(WinTrustData);
        
        // Use default code signing EKU.
        WinTrustData.pPolicyCallbackData = NULL;
    
        // No data to pass to SIP.
        WinTrustData.pSIPClientData = NULL;
    
        // Disable WVT UI.
        WinTrustData.dwUIChoice = WTD_UI_NONE;
    
        // No revocation checking.
        WinTrustData.fdwRevocationChecks = WTD_REVOKE_NONE; 
    
        // Verify an embedded signature on a file.
        WinTrustData.dwUnionChoice = WTD_CHOICE_FILE;
    
        // Verify action.
        WinTrustData.dwStateAction = WTD_STATEACTION_VERIFY;
    
        // Verification sets this value.
        WinTrustData.hWVTStateData = NULL;
    
        // Not used.
        WinTrustData.pwszURLReference = NULL;
    
        // This is not applicable if there is no UI because it changes 
        // the UI to accommodate running applications instead of 
        // installing applications.
        WinTrustData.dwUIContext = 0;
    
        // Set pFile.
        WinTrustData.pFile = &FileData;
    
        // WinVerifyTrust verifies signatures as specified by the GUID 
        // and Wintrust_Data.
        lStatus = WinVerifyTrust(
            NULL,
            &WVTPolicyGUID,
            &WinTrustData);
    
        switch (lStatus) 
        {
            case ERROR_SUCCESS:
                /*
                Signed file:
                    - Hash that represents the subject is trusted.
    
                    - Trusted publisher without any verification errors.
    
                    - UI was disabled in dwUIChoice. No publisher or 
                        time stamp chain errors.
    
                    - UI was enabled in dwUIChoice and the user clicked 
                        "Yes" when asked to install and run the signed 
                        subject.
                */
                wprintf_s(L"The file "%s" is signed and the signature "
                    L"was verified.
    ",
                    pwszSourceFile);
                break;
            
            case TRUST_E_NOSIGNATURE:
                // The file was not signed or had a signature 
                // that was not valid.
    
                // Get the reason for no signature.
                dwLastError = GetLastError();
                if (TRUST_E_NOSIGNATURE == dwLastError ||
                        TRUST_E_SUBJECT_FORM_UNKNOWN == dwLastError ||
                        TRUST_E_PROVIDER_UNKNOWN == dwLastError) 
                {
                    // The file was not signed.
                    wprintf_s(L"The file "%s" is not signed.
    ",
                        pwszSourceFile);
                } 
                else 
                {
                    // The signature was not valid or there was an error 
                    // opening the file.
                    wprintf_s(L"An unknown error occurred trying to "
                        L"verify the signature of the "%s" file.
    ",
                        pwszSourceFile);
                }
    
                break;
    
            case TRUST_E_EXPLICIT_DISTRUST:
                // The hash that represents the subject or the publisher 
                // is not allowed by the admin or user.
                wprintf_s(L"The signature is present, but specifically "
                    L"disallowed.
    ");
                break;
    
            case TRUST_E_SUBJECT_NOT_TRUSTED:
                // The user clicked "No" when asked to install and run.
                wprintf_s(L"The signature is present, but not "
                    L"trusted.
    ");
                break;
    
            case CRYPT_E_SECURITY_SETTINGS:
                /*
                The hash that represents the subject or the publisher 
                was not explicitly trusted by the admin and the 
                admin policy has disabled user trust. No signature, 
                publisher or time stamp errors.
                */
                wprintf_s(L"CRYPT_E_SECURITY_SETTINGS - The hash "
                    L"representing the subject or the publisher wasn't "
                    L"explicitly trusted by the admin and admin policy "
                    L"has disabled user trust. No signature, publisher "
                    L"or timestamp errors.
    ");
                break;
    
            default:
                // The UI was disabled in dwUIChoice or the admin policy 
                // has disabled user trust. lStatus contains the 
                // publisher or time stamp chain error.
                wprintf_s(L"Error is: 0x%x.
    ",
                    lStatus);
                break;
        }
    
        // Any hWVTStateData must be released by a call with close.
        WinTrustData.dwStateAction = WTD_STATEACTION_CLOSE;
    
        lStatus = WinVerifyTrust(
            NULL,
            &WVTPolicyGUID,
            &WinTrustData);
    
        return true;
    }
    
    int _tmain(int argc, _TCHAR* argv[])
    {
        if(argc > 1)
        {
            VerifyEmbeddedSignature(argv[1]);
        }
    
        return 0;
    }
    
    
    

    CryptQueryObject

    #include <windows.h>
    #include <wincrypt.h>
    #include <wintrust.h>
    #include <stdio.h>
    #include <tchar.h>
     #pragma comment(lib, "crypt32.lib")
     #define ENCODING (X509_ASN_ENCODING | PKCS_7_ASN_ENCODING)
    typedef struct {
        LPWSTR lpszProgramName;
        LPWSTR lpszPublisherLink;
        LPWSTR lpszMoreInfoLink;
    } SPROG_PUBLISHERINFO, *PSPROG_PUBLISHERINFO;
    BOOL GetProgAndPublisherInfo(PCMSG_SIGNER_INFO pSignerInfo,
                                 PSPROG_PUBLISHERINFO Info);
    BOOL GetDateOfTimeStamp(PCMSG_SIGNER_INFO pSignerInfo, SYSTEMTIME *st);
    BOOL PrintCertificateInfo(PCCERT_CONTEXT pCertContext);
    BOOL GetTimeStampSignerInfo(PCMSG_SIGNER_INFO pSignerInfo,
                                PCMSG_SIGNER_INFO *pCounterSignerInfo);
     int _tmain(int argc, TCHAR *argv[])
    {
        WCHAR szFileName[MAX_PATH];
        HCERTSTORE hStore = NULL;
        HCRYPTMSG hMsg = NULL;
        PCCERT_CONTEXT pCertContext = NULL;
        BOOL fResult;
        DWORD dwEncoding, dwContentType, dwFormatType;
        PCMSG_SIGNER_INFO pSignerInfo = NULL;
        PCMSG_SIGNER_INFO pCounterSignerInfo = NULL;
        DWORD dwSignerInfo;
        CERT_INFO CertInfo;
        SPROG_PUBLISHERINFO ProgPubInfo;
        SYSTEMTIME st;
        ZeroMemory(&ProgPubInfo, sizeof(ProgPubInfo));
        __try
        {
            if (argc != 2)
            {
                _tprintf(_T("Usage: SignedFileInfo <filename>
    "));
                return 0;
            }
    #ifdef UNICODE
            lstrcpynW(szFileName, argv[1], MAX_PATH);
     #else
            if (mbstowcs(szFileName, argv[1], MAX_PATH) == -1)
            {
                printf("Unable to convert to unicode.
    ");
                __leave;
            }
     #endif
            // Get message handle and store handle from the signed file.
             fResult = CryptQueryObject(CERT_QUERY_OBJECT_FILE,
                szFileName,
                CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED,
                CERT_QUERY_FORMAT_FLAG_BINARY,
                0,
                &dwEncoding,
                &dwContentType,
                &dwFormatType,
                &hStore,
                &hMsg,
                NULL);
            if (!fResult)
            {
                _tprintf(_T("CryptQueryObject failed with %x
    "), GetLastError());
                __leave;
            }
            // Get signer information size.
             fResult = CryptMsgGetParam(hMsg,
                CMSG_SIGNER_INFO_PARAM,
                0,
                NULL,
                &dwSignerInfo);
            if (!fResult)
            {
                _tprintf(_T("CryptMsgGetParam failed with %x
    "), GetLastError());
                __leave;
            }
            // Allocate memory for signer information.
             pSignerInfo = (PCMSG_SIGNER_INFO)LocalAlloc(LPTR, dwSignerInfo);
            if (!pSignerInfo)
            {
                _tprintf(_T("Unable to allocate memory for Signer Info.
    "));
                __leave;
            }
            // Get Signer Information.
            fResult = CryptMsgGetParam(hMsg,
                CMSG_SIGNER_INFO_PARAM,
                0,
                (PVOID)pSignerInfo,
                &dwSignerInfo);
            if (!fResult)
            {
                _tprintf(_T("CryptMsgGetParam failed with %x
    "), GetLastError());
                __leave;
            }
            // Get program name and publisher information from
            // signer info structure.
            if (GetProgAndPublisherInfo(pSignerInfo, &ProgPubInfo))
            {
                if (ProgPubInfo.lpszProgramName != NULL)
                {
                    wprintf(L"Program Name : %s
    ",
                        ProgPubInfo.lpszProgramName);
                }
                if (ProgPubInfo.lpszPublisherLink != NULL)
                {
                    wprintf(L"Publisher Link : %s
    ",
                        ProgPubInfo.lpszPublisherLink);
                }
                if (ProgPubInfo.lpszMoreInfoLink != NULL)
                {
                    wprintf(L"MoreInfo Link : %s
    ",
                        ProgPubInfo.lpszMoreInfoLink);
                }
            }
            _tprintf(_T("
    "));
            // Search for the signer certificate in the temporary
            // certificate store.
            CertInfo.Issuer = pSignerInfo->Issuer;
            CertInfo.SerialNumber = pSignerInfo->SerialNumber;
            pCertContext = CertFindCertificateInStore(hStore,
                ENCODING,
                0,
                CERT_FIND_SUBJECT_CERT,
                (PVOID)&CertInfo,
                NULL);
            if (!pCertContext)
            {
                _tprintf(_T("CertFindCertificateInStore failed with %x
    "),
                    GetLastError());
                __leave;
            }
            // Print Signer certificate information.
            _tprintf(_T("Signer Certificate:
    
    "));
            PrintCertificateInfo(pCertContext);
            _tprintf(_T("
    "));
            // Get the timestamp certificate signerinfo structure.
            if (GetTimeStampSignerInfo(pSignerInfo, &pCounterSignerInfo))
            {
                // Search for Timestamp certificate in the temporary
                // certificate store.
                CertInfo.Issuer = pCounterSignerInfo->Issuer;
                CertInfo.SerialNumber = pCounterSignerInfo->SerialNumber;
                pCertContext = CertFindCertificateInStore(hStore,
                    ENCODING,
                    0,
                    CERT_FIND_SUBJECT_CERT,
                    (PVOID)&CertInfo,
                    NULL);
                if (!pCertContext)
                {
                    _tprintf(_T("CertFindCertificateInStore failed with %x
    "),
                        GetLastError());
                    __leave;
                }
                // Print timestamp certificate information.
                _tprintf(_T("TimeStamp Certificate:
    
    "));
                PrintCertificateInfo(pCertContext);
                _tprintf(_T("
    "));
                // Find Date of timestamp.
                if (GetDateOfTimeStamp(pCounterSignerInfo, &st))
                {
                    _tprintf(_T("Date of TimeStamp : %02d/%02d/%04d %02d:%02d
    "),
                        st.wMonth,
                        st.wDay,
                        st.wYear,
                        st.wHour,
                        st.wMinute);
                }
                _tprintf(_T("
    "));
            }
        }
        __finally
        {
            // Clean up.
            if (ProgPubInfo.lpszProgramName != NULL)
                LocalFree(ProgPubInfo.lpszProgramName);
            if (ProgPubInfo.lpszPublisherLink != NULL)
                LocalFree(ProgPubInfo.lpszPublisherLink);
            if (ProgPubInfo.lpszMoreInfoLink != NULL)
                LocalFree(ProgPubInfo.lpszMoreInfoLink);
            if (pSignerInfo != NULL) LocalFree(pSignerInfo);
            if (pCounterSignerInfo != NULL) LocalFree(pCounterSignerInfo);
            if (pCertContext != NULL) CertFreeCertificateContext(pCertContext);
            if (hStore != NULL) CertCloseStore(hStore, 0);
            if (hMsg != NULL) CryptMsgClose(hMsg);
        }
        return 0;
    }
    BOOL PrintCertificateInfo(PCCERT_CONTEXT pCertContext)
    {
        BOOL fReturn = FALSE;
        LPTSTR szName = NULL;
        DWORD dwData;
        __try
        {
            // Print Serial Number.
            _tprintf(_T("Serial Number: "));
            dwData = pCertContext->pCertInfo->SerialNumber.cbData;
            for (DWORD n = 0; n < dwData; n++)
            {
                _tprintf(_T("%02x "),
                    pCertContext->pCertInfo->SerialNumber.pbData[dwData - (n + 1)]);
            }
            _tprintf(_T("
    "));
            // Get Issuer name size.
            if (!(dwData = CertGetNameString(pCertContext,
                CERT_NAME_SIMPLE_DISPLAY_TYPE,
                CERT_NAME_ISSUER_FLAG,
                NULL,
                NULL,
                0)))
            {
                _tprintf(_T("CertGetNameString failed.
    "));
                __leave;
            }
            // Allocate memory for Issuer name.
            szName = (LPTSTR)LocalAlloc(LPTR, dwData * sizeof(TCHAR));
            if (!szName)
            {
                _tprintf(_T("Unable to allocate memory for issuer name.
    "));
                __leave;
            }
            // Get Issuer name.
            if (!(CertGetNameString(pCertContext,
                CERT_NAME_SIMPLE_DISPLAY_TYPE,
                CERT_NAME_ISSUER_FLAG,
                NULL,
                szName,
                dwData)))
            {
                _tprintf(_T("CertGetNameString failed.
    "));
                __leave;
            }
            // print Issuer name.
            _tprintf(_T("Issuer Name: %s
    "), szName);
            LocalFree(szName);
            szName = NULL;
            // Get Subject name size.
            if (!(dwData = CertGetNameString(pCertContext,
                CERT_NAME_SIMPLE_DISPLAY_TYPE,
                0,
                NULL,
                NULL,
                0)))
            {
                _tprintf(_T("CertGetNameString failed.
    "));
                __leave;
            }
            // Allocate memory for subject name.
            szName = (LPTSTR)LocalAlloc(LPTR, dwData * sizeof(TCHAR));
            if (!szName)
            {
                _tprintf(_T("Unable to allocate memory for subject name.
    "));
                __leave;
            }
            // Get subject name.
            if (!(CertGetNameString(pCertContext,
                CERT_NAME_SIMPLE_DISPLAY_TYPE,
                0,
                NULL,
                szName,
                dwData)))
            {
                _tprintf(_T("CertGetNameString failed.
    "));
                __leave;
            }
            // Print Subject Name.
            _tprintf(_T("Subject Name: %s
    "), szName);
            fReturn = TRUE;
        }
        __finally
        {
            if (szName != NULL) LocalFree(szName);
        }
        return fReturn;
    }
    LPWSTR AllocateAndCopyWideString(LPCWSTR inputString)
    {
        LPWSTR outputString = NULL;
        outputString = (LPWSTR)LocalAlloc(LPTR,
            (wcslen(inputString) + 1) * sizeof(WCHAR));
        if (outputString != NULL)
        {
            lstrcpyW(outputString, inputString);
        }
        return outputString;
    }
    BOOL GetProgAndPublisherInfo(PCMSG_SIGNER_INFO pSignerInfo,
                                 PSPROG_PUBLISHERINFO Info)
    {
        BOOL fReturn = FALSE;
        PSPC_SP_OPUS_INFO OpusInfo = NULL;
        DWORD dwData;
        BOOL fResult;
        __try
        {
            // Loop through authenticated attributes and find
            // SPC_SP_OPUS_INFO_OBJID OID.
            for (DWORD n = 0; n < pSignerInfo->AuthAttrs.cAttr; n++)
            {
                if (lstrcmpA(SPC_SP_OPUS_INFO_OBJID,
                    pSignerInfo->AuthAttrs.rgAttr[n].pszObjId) == 0)
                {
                    // Get Size of SPC_SP_OPUS_INFO structure.
                    fResult = CryptDecodeObject(ENCODING,
                        SPC_SP_OPUS_INFO_OBJID,
                        pSignerInfo->AuthAttrs.rgAttr[n].rgValue[0].pbData,
                        pSignerInfo->AuthAttrs.rgAttr[n].rgValue[0].cbData,
                        0,
                        NULL,
                        &dwData);
                    if (!fResult)
                    {
                        _tprintf(_T("CryptDecodeObject failed with %x
    "),
                            GetLastError());
                        __leave;
                    }
                    // Allocate memory for SPC_SP_OPUS_INFO structure.
                    OpusInfo = (PSPC_SP_OPUS_INFO)LocalAlloc(LPTR, dwData);
                    if (!OpusInfo)
                    {
                        _tprintf(_T("Unable to allocate memory for Publisher Info.
    "));
                        __leave;
                    }
                    // Decode and get SPC_SP_OPUS_INFO structure.
                    fResult = CryptDecodeObject(ENCODING,
                        SPC_SP_OPUS_INFO_OBJID,
                        pSignerInfo->AuthAttrs.rgAttr[n].rgValue[0].pbData,
                        pSignerInfo->AuthAttrs.rgAttr[n].rgValue[0].cbData,
                        0,
                        OpusInfo,
                        &dwData);
                    if (!fResult)
                    {
                        _tprintf(_T("CryptDecodeObject failed with %x
    "),
                            GetLastError());
                        __leave;
                    }
                    // Fill in Program Name if present.
                    if (OpusInfo->pwszProgramName)
                    {
                        Info->lpszProgramName =
                            AllocateAndCopyWideString(OpusInfo->pwszProgramName);
                    }
                    else
                        Info->lpszProgramName = NULL;
                    // Fill in Publisher Information if present.
                    if (OpusInfo->pPublisherInfo)
                    {
                        switch (OpusInfo->pPublisherInfo->dwLinkChoice)
                        {
                        case SPC_URL_LINK_CHOICE:
                            Info->lpszPublisherLink =
                                AllocateAndCopyWideString(OpusInfo->pPublisherInfo->pwszUrl);
                            break;
                        case SPC_FILE_LINK_CHOICE:
                            Info->lpszPublisherLink =
                                AllocateAndCopyWideString(OpusInfo->pPublisherInfo->pwszFile);
                            break;
                        default:
                            Info->lpszPublisherLink = NULL;
                            break;
                        }
                    }
                    else
                    {
                        Info->lpszPublisherLink = NULL;
                    }
                    // Fill in More Info if present.
                    if (OpusInfo->pMoreInfo)
                    {
                        switch (OpusInfo->pMoreInfo->dwLinkChoice)
                        {
                        case SPC_URL_LINK_CHOICE:
                            Info->lpszMoreInfoLink =
                                AllocateAndCopyWideString(OpusInfo->pMoreInfo->pwszUrl);
                            break;
                        case SPC_FILE_LINK_CHOICE:
                            Info->lpszMoreInfoLink =
                                AllocateAndCopyWideString(OpusInfo->pMoreInfo->pwszFile);
                            break;
                        default:
                            Info->lpszMoreInfoLink = NULL;
                            break;
                        }
                    }
                    else
                    {
                        Info->lpszMoreInfoLink = NULL;
                    }
                    fReturn = TRUE;
                    break; // Break from for loop.
                } // lstrcmp SPC_SP_OPUS_INFO_OBJID
            } // for
        }
        __finally
        {
            if (OpusInfo != NULL) LocalFree(OpusInfo);
        }
        return fReturn;
    }
    BOOL GetDateOfTimeStamp(PCMSG_SIGNER_INFO pSignerInfo, SYSTEMTIME *st)
    {
        BOOL fResult;
        FILETIME lft, ft;
        DWORD dwData;
        BOOL fReturn = FALSE;
        // Loop through authenticated attributes and find
        // szOID_RSA_signingTime OID.
        for (DWORD n = 0; n < pSignerInfo->AuthAttrs.cAttr; n++)
        {
            if (lstrcmpA(szOID_RSA_signingTime,
                pSignerInfo->AuthAttrs.rgAttr[n].pszObjId) == 0)
            {
                // Decode and get FILETIME structure.
                dwData = sizeof(ft);
                fResult = CryptDecodeObject(ENCODING,
                    szOID_RSA_signingTime,
                    pSignerInfo->AuthAttrs.rgAttr[n].rgValue[0].pbData,
                    pSignerInfo->AuthAttrs.rgAttr[n].rgValue[0].cbData,
                    0,
                    (PVOID)&ft,
                    &dwData);
                if (!fResult)
                {
                    _tprintf(_T("CryptDecodeObject failed with %x
    "),
                        GetLastError());
                    break;
                }
                // Convert to local time.
                FileTimeToLocalFileTime(&ft, &lft);
                FileTimeToSystemTime(&lft, st);
                fReturn = TRUE;
                break; // Break from for loop.
            } //lstrcmp szOID_RSA_signingTime
        } // for
        return fReturn;
    }
    BOOL GetTimeStampSignerInfo(PCMSG_SIGNER_INFO pSignerInfo, PCMSG_SIGNER_INFO *pCounterSignerInfo)
    {
        PCCERT_CONTEXT pCertContext = NULL;
        BOOL fReturn = FALSE;
        BOOL fResult;
        DWORD dwSize;
        __try
        {
            *pCounterSignerInfo = NULL;
            // Loop through unathenticated attributes for
            // szOID_RSA_counterSign OID.
            for (DWORD n = 0; n < pSignerInfo->UnauthAttrs.cAttr; n++)
            {
                if (lstrcmpA(pSignerInfo->UnauthAttrs.rgAttr[n].pszObjId,
                    szOID_RSA_counterSign) == 0)
                {
                    // Get size of CMSG_SIGNER_INFO structure.
                    fResult = CryptDecodeObject(ENCODING,
                        PKCS7_SIGNER_INFO,
                        pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].pbData,
                        pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].cbData,
                        0,
                        NULL,
                        &dwSize);
                    if (!fResult)
                    {
                        _tprintf(_T("CryptDecodeObject failed with %x
    "),
                            GetLastError());
                        __leave;
                    }
                    // Allocate memory for CMSG_SIGNER_INFO.
                    *pCounterSignerInfo = (PCMSG_SIGNER_INFO)LocalAlloc(LPTR, dwSize);
                    if (!*pCounterSignerInfo)
                    {
                        _tprintf(_T("Unable to allocate memory for timestamp info.
    "));
                        __leave;
                    }
                    // Decode and get CMSG_SIGNER_INFO structure
                    // for timestamp certificate.
                    fResult = CryptDecodeObject(ENCODING,
                        PKCS7_SIGNER_INFO,
                        pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].pbData,
                        pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].cbData,
                        0,
                        (PVOID)*pCounterSignerInfo,
                        &dwSize);
                    if (!fResult)
                    {
                        _tprintf(_T("CryptDecodeObject failed with %x
    "),
                            GetLastError());
                        __leave;
                    }
                    fReturn = TRUE;
                    break; // Break from for loop.
                }
            }
        }
        __finally
        {
            // Clean up.
            if (pCertContext != NULL) CertFreeCertificateContext(pCertContext);
        }
        return fReturn;
    }
    

    参考

    恶意文件分析系统中的数字签名验证
    http://blog.nsfocus.net/digital-signature-with-malware-analysis/
    校验文件数字签名的合法性(VerifyPE)
    https://www.cnblogs.com/ahuo/archive/2011/07/13/2105252.html
    WinVerifyTrust
    https://docs.microsoft.com/en-us/windows/desktop/SecCrypto/example-c-program--verifying-the-signature-of-a-pe-file
    CryptQueryObject
    https://blog.csdn.net/echoisland/article/details/6707059
    http://www.cnblogs.com/Quincy/archive/2010/07/11/1775217.html

  • 相关阅读:
    Android ---------- 下拉刷新,上拉加载
    Android ---------- 富文本构建
    php操作字符串(移除字符,计算字符串中字符个数,分割字符串,字符串序列化
    Android ---------- 弹出层自定义布局 之 AlertDialog
    Android ---------- 延时操作
    Android ---------- TabLayout 实战 (二) 仿京东商品详情页
    定风波·莫听穿林打叶声
    hiveSQL执行,转化为MR过程
    who 命令显示关于当前在本地系统上的所有用户的信息
    hadoop中压缩与解压详解
  • 原文地址:https://www.cnblogs.com/17bdw/p/9770617.html
Copyright © 2011-2022 走看看