/** * ntfsdecrypt - Part of the Linux-NTFS project. * * Copyright (c) 2003 Richard Russon * Copyright (c) 2003 Anton Altaparmakov * Copyright (c) 2005 Yuval Fledel * * This utility will decrypt files and print on the standard output. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program (in the main directory of the Linux-NTFS * distribution in the file COPYING); if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #include "config.h" #include #include #include #include #include "types.h" #include "attrib.h" #include "utils.h" #include "volume.h" #include "debug.h" #include "dir.h" #include "layout.h" #include "decrypt.h" struct options { char *device; /* Device/File to work with */ char *file; /* File to display */ s64 inode; /* Inode to work with */ ATTR_TYPES attr; /* Attribute type to display */ int force; /* Override common sense */ int quiet; /* Less output */ int verbose; /* Extra output */ }; static const char *EXEC_NAME = "ntfscat"; static struct options opts; GEN_PRINTF (Eprintf, stderr, NULL, FALSE) GEN_PRINTF (Vprintf, stderr, &opts.verbose, TRUE) GEN_PRINTF (Qprintf, stderr, &opts.quiet, FALSE) static GEN_PRINTF (Printf, stderr, NULL, FALSE) static ntfschar EFS[5] = { const_cpu_to_le16('$'), const_cpu_to_le16('E'), const_cpu_to_le16('F'), const_cpu_to_le16('S'), const_cpu_to_le16('\0') }; static const int EFS_name_length = 4; /** * version - Print version information about the program * * Print a copyright statement and a brief description of the program. * * Return: none */ static void version (void) { Printf ("\n%s v%s - Concatenate files and print on the standard output.\n\n", EXEC_NAME, VERSION); Printf ("Copyright (c) 2003 Richard Russon\n"); Printf ("\n%s\n%s%s\n", ntfs_gpl, ntfs_bugs, ntfs_home); } /** * usage - Print a list of the parameters to the program * * Print a list of the parameters and options for the program. * * Return: none */ static void usage (void) { Printf ("\nUsage: %s [options] device [file]\n\n" " -a, --attribute num Display this attribute\n" " -i, --inode num Display this inode\n\n" " -f --force Use less caution\n" " -h --help Print this help\n" " -q --quiet Less output\n" " -V --version Version information\n" " -v --verbose More output\n\n", //" -N --name Display this attribute name", //" -F --file Display this file", //" -r --raw Display the compressed or encrypted file", EXEC_NAME); Printf ("%s%s\n", ntfs_bugs, ntfs_home); } /** * parse_options - Read and validate the programs command line * * Read the command line, verify the syntax and parse the options. * This function is very long, but quite simple. * * Return: 1 Success * 0 Error, one or more problems */ static int parse_options (int argc, char **argv) { static const char *sopt = "-a:fh?i:qVv"; // F:N: static const struct option lopt[] = { { "force", no_argument, NULL, 'f' }, { "help", no_argument, NULL, 'h' }, { "inode", required_argument, NULL, 'i' }, { "quiet", no_argument, NULL, 'q' }, { "version", no_argument, NULL, 'V' }, { "verbose", no_argument, NULL, 'v' }, // { "file", required_argument, NULL, 'F' }, // { "name", required_argument, NULL, 'N' }, { NULL, 0, NULL, 0 } }; char c = -1; int err = 0; int ver = 0; int help = 0; opterr = 0; /* We'll handle the errors, thank you. */ opts.inode = -1; while ((c = getopt_long (argc, argv, sopt, lopt, NULL)) != (char)-1) { switch (c) { case 1: /* A non-option argument */ if (!opts.device) { opts.device = argv[optind-1]; } else if (!opts.file) { opts.file = argv[optind-1]; } else { Eprintf("You must specify exactly one file.\n"); err++; } break; case 'f': opts.force++; break; case 'h': case '?': help++; break; case 'i': if (opts.inode != -1) Eprintf("You must specify exactly one inode.\n"); else if (utils_parse_size(optarg, &opts.inode, FALSE)) break; else Eprintf("Couldn't parse inode number.\n"); err++; break; case 'q': opts.quiet++; break; case 'V': ver++; break; case 'v': opts.verbose++; break; default: Eprintf ("Unknown option '%s'.\n", argv[optind-1]); err++; break; } } if (help || ver) { opts.quiet = 0; } else { if (opts.device == NULL) { Eprintf ("You must specify a device.\n"); err++; } else if (opts.file == NULL && opts.inode == -1) { Eprintf ("You must specify a file or inode " "with the -i option.\n"); err++; } else if (opts.file != NULL && opts.inode != -1) { Eprintf ("You can't specify both a file and inode.\n"); err++; } if (opts.quiet && opts.verbose) { Eprintf("You may not use --quiet and --verbose at the " "same time.\n"); err++; } } if (ver) version(); if (help || err) usage(); return (!err && !help && !ver); } /** * cat */ static int cat_decrypt(ntfs_inode *inode, decrypt_key *fek) { int bufsize = 512; char *buffer; ntfs_attr *attr; s64 bytes_read, written, offset, total; unsigned int i; buffer = malloc (bufsize); if (!buffer) return 1; attr = ntfs_attr_open (inode, AT_DATA, NULL, 0); if (!attr) { Eprintf ("Cannot cat a directory.\n"); free (buffer); return 1; } total = attr->data_size; // hack: make sure attr will not be commited to disk if you use this. // clear the encrypted bit, otherwise the library won't allow reading. NAttrClearEncrypted(attr); // extend the size, we may need to read past the end of the stream. attr->data_size = attr->initialized_size = attr->allocated_size; offset = 0; while (total>0) { bytes_read = ntfs_attr_pread (attr, offset, 512, buffer); if (bytes_read == -1) { perror ("ERROR: Couldn't read file"); break; } if (!bytes_read) break; if ((i = decrypt_decrypt_sector(fek, buffer, offset)) < bytes_read) { perror ("ERROR: Couldn't decrypt all data!"); Eprintf("%u/%lld/%lld/%lld\n", i, (long long)bytes_read, (long long)offset, (long long)total); break; } if (bytes_read > total) bytes_read = total; written = fwrite (buffer, 1, bytes_read, stdout); if (written != bytes_read) { perror ("ERROR: Couldn't output all data!"); break; } offset += bytes_read; total -= bytes_read; } ntfs_attr_close (attr); free (buffer); return 0; } /** * get_fek */ static decrypt_key *get_fek (ntfs_inode *inode) { ntfs_attr *na; char *efs_buffer, *ddf, *certificate, *hash_data, *fek_buf; u32 ddf_count, hash_size, fek_size; unsigned int i; decrypt_session *session; decrypt_key *key; /* obtain the $EFS contents */ na = ntfs_attr_open (inode, AT_LOGGED_UTILITY_STREAM, EFS, EFS_name_length); if (!na) { perror("Error"); return NULL; } efs_buffer = malloc(na->data_size); if (!efs_buffer) { perror("malloc failed"); return NULL; } if (ntfs_attr_pread(na, 0, na->data_size, efs_buffer) != na->data_size) { perror("ntfs_attr_pread failed"); free(efs_buffer); return NULL; } ntfs_attr_close(na); /* init the CryptoAPI */ if(!(session = decrypt_open())) { perror("Could not init the cryptoAPI."); return NULL; } /* iterate through the DDFs & DRFs until you obtain a key */ ddf = efs_buffer + le32_to_cpu(*(u32 *)(efs_buffer+0x40)); ddf_count = le32_to_cpu(*(u32 *)ddf); ddf = ddf + 0x04; for (i=0;i