




已阅读5页,还剩11页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
WinVerifyTrust FunctionThe WinVerifyTrust function performs a trust verification action on a specified object. The function passes the inquiry to a trust provider that supports the action identifier, if one exists.For certificate verification, use the CertGetCertificateChain and CertVerifyCertificateChainPolicy functions.SyntaxCopyLONG WINAPI WinVerifyTrust( _inHWND hWnd, _inGUID *pgActionID, _inLPVOID pWVTData);ParametershWnd in Optional handle to a caller window. A trust provider can use this value to determine whether it can interact with the user. However, trust providers typically perform verification actions without input from the user.This parameter can be one of the following values.ValueMeaningINVALID_HANDLE_VALUE There is no interactive user. The trust provider performs the verification action without the users assistance.Zero The trust provider can use the interactive desktop to display its user interface.A valid window handle A trust provider can treat any value other than INVALID_HANDLE_VALUE or zero as a valid window handle that it can use to interact with the user.pgActionID in A pointer to a GUID structure that identifies an action and the trust provider that supports that action. This value indicates the type of verification action to be performed on the structure pointed to by pWinTrustData.The WinTrust service is designed to work with trust providers implemented by third parties. Each trust provider provides its own unique set of action identifiers. For information about the action identifiers supported by a trust provider, see the documentation for that trust provider.For example, Microsoft provides a Software Publisher Trust Provider that can establish the trustworthiness of software being downloaded from the Internet or some other public network. The Software Publisher Trust Provider supports the following action identifiers. These constants are defined in Softpub.h.ValueMeaningDRIVER_ACTION_VERIFY Verify the authenticity of a Windows Hardware Quality Labs (WHQL) signed driver. This is an Authenticode add-on policy provider.HTTPSPROV_ACTION Verify an SSL/TLS connection through Internet Explorer.OFFICESIGN_ACTION_VERIFY Verify the authenticity of a structured storage file by using the Microsoft Office Authenticode add-on policy provider.NoteThis Action ID is only supported on Windows Server2003, WindowsXP, and Windows2000.WINTRUST_ACTION_GENERIC_CERT_VERIFY Verify a certificate chain only. This is only valid when passing in a certificate context in the WinVerifyTrust input structures.NoteWe do not recommend using this function to perform certificate verification. To perform certificate verification, use the CertGetCertificateChain and CertVerifyCertificateChainPolicy functions.WINTRUST_ACTION_GENERIC_CHAIN_VERIFY Verify certificate chains created from any object type. A callback is provided to implement the final chain policy by using the chain context for each signer and counter signer.WINTRUST_ACTION_GENERIC_VERIFY Verify a certificate chain only.NoteWe do not recommend using this function to perform certificate verification. To perform certificate verification, use the CertGetCertificateChain and CertVerifyCertificateChainPolicy functions. WINTRUST_ACTION_GENERIC_VERIFY_V2 Verify a file or object using the Authenticode policy provider.WINTRUST_ACTION_TRUSTPROVIDER_TEST Write the CRYPT_PROVIDER_DATA structure to a file after calling the Authenticode policy provider.pWVTData in A pointer that, when cast as a WINTRUST_DATA structure, contains information that the trust provider needs to process the specified action identifier. Typically, the structure includes information that identifies the object that the trust provider must evaluate.The format of the structure depends on the action identifier. For information about the data required for a specific action identifier, see the documentation for the trust provider that supports that action.Return ValueIf the trust provider verifies that the subject is trusted for the specified action, the return value is zero. No other value besides zero should be considered a successful return.If the trust provider does not verify that the subject is trusted for the specified action, the function returns a status code from the trust provider.NoteThe return value is a LONG, not an HRESULT as previously documented. Do not use HRESULT macros such as SUCCEEDED to determine whether the function succeeded. Instead, check the return value for equality to zero.For example, a trust provider might indicate that the subject is not trusted, or is trusted but with limitations or warnings. The return value can be a trust-provider-specific value described in the documentation for an individual trust provider, or it can be one of the following error codes.Return codeDescriptionTRUST_E_SUBJECT_NOT_TRUSTED The subject failed the specified verification action. Most trust providers return a more detailed error code that describes the reason for the failure.TRUST_E_PROVIDER_UNKNOWN The trust provider is not recognized on this system.TRUST_E_ACTION_UNKNOWN The trust provider does not support the specified action.TRUST_E_SUBJECT_FORM_UNKNOWN The trust provider does not support the form specified for the subject.RemarksThe WinVerifyTrust function enables applications to invoke a trust provider to verify that a specified object satisfies the criteria of a specified verification operation. The pgActionID parameter identifies the verification operation, and the pWinTrustData parameter identifies the object whose trust is to be verified. A trust provider is a DLL registered with WinVerifyTrust. A call to WinVerifyTrust forwards that call to the registered trust provider, if there is one, that supports that specified action identifier.For example, the Software Publisher Trust Provider can verify that an executable image file comes from a trusted software publisher and that the file has not been modified since it was published. In this case, the pWinTrustData parameter specifies the name of the file and the type of file, such as a Microsoft Portable Executable image file.Each trust provider supports a specific set of actions that it can evaluate. Each action has a GUID that identifies it. A trust provider can support any number of action identifiers, but two trust providers cannot support the same action identifier.For an example that demonstrates how to use this function to verify the signature of a portable executable (PE) file, see Example C Program: Verifying the Signature of a PE File.RequirementsMinimum supported clientWindows2000 ProfessionalMinimum supported serverWindows2000 ServerHeaderWintrust.h (include Softpub.h)LibraryWintrust.libDLLWintrust.dllExample C Program: Verifying the Signature of a PE FileThe WinVerifyTrust API can be used to verify the signature of a portable executable file.The following example shows how to use the WinVerifyTrust API to verify the signature of a signed portable executable file.Copy/-/ Copyright (C) Microsoft. All rights reserved./ Example of verifying the embedded signature of a PE file by using / the WinVerifyTrust function.#define _UNICODE 1#define UNICODE 1#include #include #include #include #include #include #include / Link with the Wintrust.lib file.#pragma comment (lib, wintrust)BOOL VerifyEmbeddedSignature(LPCWSTR pwszSourceFile) LONG lStatus; DWORD dwLastError; / Initialize the WINTRUST_FILE_INFO structure. WINTRUST_FILE_INFO FileData; memset(&FileData, 0, sizeof(FileData); FileData.cbStruct = sizeof(WINTRUST_FILE_INFO); FileData.pcwszFilePath = pwszSourceFile; FileData.hFile = NULL; FileData.pgKnownSubject = NULL; /* WVTPolicyGUID specifies the policy to apply on the file WINTRUST_ACTION_GENERIC_VERIFY_V2 policy checks: 1) The certificate used to sign the file chains up to a root certificate located in the trusted root certificate store. This implies that the identity of the publisher has been verified by a certification authority. 2) In cases where user interface is displayed (which this example does not do), WinVerifyTrust will check for whether the end entity certificate is stored in the trusted publisher store, implying that the user trusts content from this publisher. 3) The end entity certificate has sufficient permission to sign code, as indicated by the presence of a code signing EKU or no EKU. */ GUID WVTPolicyGUID = WINTRUST_ACTION_GENERIC_VERIFY_V2; WINTRUST_DATA WinTrustData; / Initialize the WinVerifyTrust input data structure. / Default all fields to 0. memset(&WinTrustData, 0, sizeof(WinTrustData); WinTrustData.cbStruct = sizeof(WinTrustData); / Use default code signing EKU. WinTrustData.pPolicyCallbackData = NULL; / No data to pass to SIP. WinTrustData.pSIPClientData = NULL; / Disable WVT UI. WinTrustData.dwUIChoice = WTD_UI_NONE; / No revocation checking. WinTrustData.fdwRevocationChecks = WTD_REVOKE_NONE; / Verify an embedded signature on a file. WinTrustData.dwUnionChoice = WTD_CHOICE_FILE; / Default verification. WinTrustData.dwStateAction = 0; / Not applicable for default verification of embedded signature. WinTrustData.hWVTStateData = NULL; / Not used. WinTrustData.pwszURLReference = NULL; / This is not applicable if there is no UI because it changes / the UI to accommodate running applications instead of / installing applications. WinTrustData.dwUIContext = 0; / Set pFile. WinTrustData.pFile = &FileData; / WinVerifyTrust verifies signatures as specified by the GUID / and Wintrust_Data. lStatus = WinVerifyTrust( NULL, &WVTPolicyGUID, &WinTrustData); switch (lStatus) case ERROR_SUCCESS: /* Signed file: - Hash that represents the subject is trusted. - Trusted publisher without any verification errors. - UI was disabled in dwUIChoice. No publisher or time stamp chain errors. - UI was enabled in dwUIChoice and the user clicked Yes when asked to install and run the signed subject. */ wprintf_s(LThe file %s is signed and the signature Lwas verified.n, pwszSourceFile); break; case TRUST_E_NOSIGNATURE: / The file was not signed or had a signature / that was not valid. / Get the reason for no signature. dwLastError = GetLastError(); if (TRUST_E_NOSIGNATURE = dwLastError | TRUST_E_SUBJECT_FORM_UNKNOWN = dwLastError | TRUST_E_PROVIDER_UNKNOWN = dwLastError) / The file was not signed. wprintf_s(LThe file %s is not signed.n, pwszSourceFile); else / The signature was not valid or there was an error / opening the file. wprintf_s(LAn unknown error occurred trying to Lverify the signature of the %s file.n, pwszSourceFile); break; case TRUST_E_EXPLICIT_DISTRUST: / The hash that represents the subject or the publisher / is not allowed by the admin or user. wprintf_s(LThe signature is present, but specifically Ldisallowed.n); break; case TRUST_E_SUBJECT_NOT_TRUSTED: / The user clicked No when asked to install and run. wprintf_s(LThe signature is present, but not Ltrusted.n); break; case CRYPT_E_SECURITY_SETTINGS: /* The hash that represents the subject or the publisher was not explicitly trusted by the admin and the admin policy has disabled user trust. No signature, publisher or time stamp errors. */ wprintf_s(LCRYPT_E_SECURITY_SETTINGS - The hash Lrepresenting the subject or the publisher wasnt Lexplicitly trusted by the admin and admin policy Lhas disabled user trust. No signature, publisher Lor timestamp errors.n); break; default: / The UI was disabled in dwUIChoice or the admin policy / has disabled user trust. lStatus contains the / publisher or time stamp chain error. wprintf_s(LError is: 0x%x.n, lStatus); break; return true;int _tmain(int argc, _TCHAR* argv) if(argc 1) VerifyEmbeddedSignature(argv1); return 0;微软数字签名技术-WinVerifyTrust编程与电脑技术 2008-01-12 11:40:11 阅读176 评论0 字号:大中小订阅 使用Windows Verify Trust API 这个特殊的API在某些方面现在已经相当稳定,微软已经在IE3.x/4.x以及Windows自身中部分地实施了它。你阅读到的其它部分正处于不断的改变中,因为很多软件公司正在各自地研究检验下载软件的最好方法。 那么,Windows Verify Trust API的精确定义是什么?它是决定你是否能信任任何Windows 对象的一种通用方法,这些对象可以是客户请求的服务、服务器请求的信息、下载的文档文件或甚至是ActiveX控件。这个API的最终形式是允许你检测任何对象的可信度。 就像Windows支持的大多数API一样,Windows Verify Trust API也是可以扩展的,你可以增加新的特性来允许它执行一些扩展的检测。其中的一个扩展是IE 3.x/4.x带来的Windows Software Publishing Trust Provider,我们将在下一节进行阐述。现在,你所要知道的一点是,Windows Verify Trust API只是个通用的API,随着更多人对它的使用,它可能需要更多的扩展。 Windows Verify Trust API使用多种方法来检测文件的可信度。其中的一些方法尚存在争议,但有两种方法最为通用,即检测系统规则和校对伴随于对象的证书或数字签名。你将发现Windows Verify Trust API也依赖于外部的证书,例如,当前许多流行的Internet加密标准正使用公共密钥和私有密钥方式,公共密钥驻留在文件头上,私有密钥存在于用户的机器内。要破解一个加密文件,你必须要既有公共密钥又有私有密钥,因为只有用户拥有这个密钥,所以其他人将不能阅读这个文件。显然,还有一些比两把密钥更复杂的方法,有些简单的方案还增加了随机密钥,他与公共密钥相结合,使得黑客几乎没有可能破解它。 系统规则存在于许多地方,例如,浏览器的“信任”信息存储在配置文件或注册表中。系统管理员也可设置一些策略,这些设置可以在一个单独的用户注册文件中或在所有用户都可使用的通用注册文件中。策略所在的精确位置依赖于你使用的Windows 版本,和是否打开了多用户配置(在Windows 95/98中),以及系统管理员实施的策略类型(系统的或单独的)。你也可以使用委托供应商(CPS)规则(准确的名称叫做“trust provider”,因为其中的规则来源可以是任何委托代理,而不止是CPS),例如,你可以告诉浏览器,任何经过某个委托供应商认证的人都是可信的。作为受托检验规则,委托供应商提供了指定的拥有者的列表,并定义了指定对象的类型和委托供应商的级别。用户的操作也能够影响Windows Trust Verification API的使用规则,例如,如果用户告诉系统,某个供应商是可信的,则这个信息便存储于注册表中,而Windows 的受托检验服务每次在证书中看到这个商家的名字时,便不再对这个对象作深入的检测。 现在,你已经对这个API的功能做了一个概要的了解,让我们再关注一下这个API的自身。你将会对下面这个函数感兴趣: WinVerifyTrust(HWND hwnd,DWORD dwTrustProvider,DWORD dwActionID,LPVOIDActionData); 正如你所看到的,这个函数需要四个参数,大部分人应该牢记第一个参数,它是当前窗体的句柄,这个参数的目的是让WinVerifyTrust()函数知道当前正有用户在做决定,例如,函数可能想询问你是否下载一个没有签名的文件。如果想要在不干扰用户的情况下检验一个对象的可信度,你可以简单使用INVALID_HANDLE_VALUE来代替窗体的句柄;如果你想要用户的桌面代替当前的应用程序,对任何交互作用都做出反映,你也可以将参数值设为0。第二个参数定义了对谁来询问与信任相关的事情,Windows认识两个默认值(尽管商家也能定义任何指定的值用来明确真正的委托供应商):WIN_TRUST_PROVIDER_UNKNOWN(基于你想要执行的操作,找到一个代理商)或WIN_TRUST_SOFTWARE_PUBLISHER(一个实际的软件发布者)。如果你选择WIN_TRUST_PROVIDER选项,Windows 将尽量找到一个包含你要执行操作的注册项。如果不能发现这样一个注册项,WinVerifyTrust()函数将返回一个TRUST_E_PROVIDER_UNKNOWN的值。第三个参数指定了一个操作,它告诉代理供应商,你想要做的操作,因为每个代理供应商都不同,所以你将必须检查代理商提供的文档,最后一个参数的准确内容也依赖于你使用的代理商。在大多数情况下,你将至少需要告诉代理商你想要检验的数据,有些代理商也可能要求有关信任级别的信息或者信任裁决的内容。 WinVerifyTrust()函数在调用执行后,一般返回代理商的特定值;在某些情况下,它也返回四个标准值中的一个,你将注意到这四个标准值全是错误信息(Windows Verify Trust API没有定义任何默认的成功信息),下面就是这四个值的解释。 TRUST_E_SUBJECT_NOT_TRUSTED 通常,代理商会提供给你更多的错误信息,这个返回值简单地提示:检验的对象没有通过你指定的检验操作,它不代表这个对象从根本上不值得信任,而只是不能被当前指定的操作信任。除非代理商支持某些类型的通用操作,或者你只需要对这个对象执行单一的操作,否则你将需要为每个操作分别调用WinVerifyTrust()函数。 TRUST_E_PROVIDER_UNKNOWN 就像前面提示的,Windows基于当前的定义操作,不能找到指定的代理商时,便返回这个错误信息。 TRUST_E_ACTION_UNKNOWN 如果你要求的操作不被指定的代理商支持时,函数将返回这个错误值。WinVerifyTrust使用注册项来检验有效操作,而不是真正与代理商进行交流,这意味着,即便代理商支持指定的操作,你也可能会因为注册被损坏而不能执行某个操作。 TRUST_E_SUBJECT_FORM_UNKNOWN 产生这个错误信息的原因是多方面的,多数情况下是因为参数不正确或参数中包含了不完整的信息。如果代理商不能找到你想要检验的对象,也将返回这个信息,幸运的话,代理商将提供与数据相关的更详细的信息,但如果代理商不能判断问题的来源时,你或许也只能得到这个值。理解Windows软件发布信任供应商 Windows软件发布信任供应商(Windows Software Publishing TrustProvider)附加于Windows Trust Verification API(我们在前一节中已进行了阐述)之上,这个附加系统的主要目的是允许应用程序检验软件部件中是否包含数字签名或证书,其中的每个项目都将检验用户本地系统中的文档,并判断它们是否是由委托的供应商作为权威的软件发行的。对于Windows TrustVerification API,这个API使用丰富的技术和信息资源来判断指定的文档是否值得信赖。 你将发现Windows 软件发布信任供应商也使用WinVerifyTrust()函数,在前几节中我们讨论过这个函数,但这里的使用略有一些不同,首先,你总应使用WIN_TRUST_SOFTWARE_PUBLISHER委托供应商,除非委托供应商支持别的值,如果使用WIN_TRUST_PROVIDER_UNKNOWN委托供应商,Windows将简单选择默认的委托供应商,Windows 也定义了两种操作(你可以提供其它可供选择的委托供应商):WIN_SPUB_ACTION_TRUSTED_PUBLISHER(检验文档的供应商是否在信任列表中)以及WIN_SPUB_ACTION_PUBLISHED_SOFTWARE(检验文档自身是否有正确的鉴定证书)。当前版本的Windows软件发布信任供应商还不支持WIN_SPUB_ACTION_ TRUSTED_PUBLISHER操作,如果选择WIN_SPUB_ACTION _PUBLISHED_SOFTWARE操作,WinVerifyTrust()也将期待WIN_TRUST_ACTDATA_ SUBJECT_ONLY数据结构,该结构如下所示: typedef LPVOID WIN_TRUST_SUBJECT typedef struct WIN_TRUST_ACTDATA_SUBJECT_ONLY DWORD dwSubjectType; WIN_TRUST_SUBJECT Subject; WIN_TRUST_ACTDATA_SUBJECT_ONLY, *LPWIN_TRUST_ACTDATA_SUBJECT_ONLY 请注意,这个结构包含了两个变量,dwSubjectType定义了你将要检验的对象类型,你可以为大部分数据文件选择WIN_TRUST_SUBJTYPE_RAW_FILE,或为可执行文件选择WIN_TRUST_SUBJTYPE_IMAGE(其中包括DLL和OCXs),Subject结构指向你要检验的对象,其格式为: typedef struct _WIN_TRUST_SUBJECT_FILE HANDLE hFile; LPSTR lpPath; WIN_TRUST_SUBJECT_FILE,*LPWIN_TRUST_SUBJECT_FILE; 正如你所看到的,这个结构中的两个变量分别指向文件和文件的路径。在大多数情况下,你将在浏览器或其它应用程序的缓冲文件夹内找到这个文件,例如,Internet Explorer 3.0将它的缓冲内容保存在Internet临时文件中(数据文件)或OCCACHE(
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 楼宇赎回贷款合同模板
- 销售合同范本正规范本
- 社区科学理论知识
- 组建与管理创业团队
- 房屋转让合同范本大全
- 运动解剖学练习题库含参考答案
- 租赁合同的可变性与调整策略
- 等待戈多课件
- 简约商务述职报告
- 航空货物运输代理合同
- JJF(陕) 111-2024 超声流量计在线校准规范
- 2024年度城市公共交通线路特许经营协议2篇
- 心肺复苏术-cpr课件
- 装配式建筑混凝土构件深化设计基本要求知识点结构拆分设计课件讲解
- 神东煤炭集团笔试题
- 2023年高考英语真题全国乙卷及参考答案
- 仓库管理员转正汇报
- 2024年形势与政策 第二讲 中国经济高质量发展扎实推进(课件)
- 2024年人教版初二地理下册期末考试卷(附答案)
- 国家职业技术技能标准 4-04-05-05 人工智能训练师 人社厅发202181号
- 公司组织架构图模板完整版可编辑3
评论
0/150
提交评论