home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Gold Medal Software 3
/
Gold Medal Software - Volume 3 (Gold Medal) (1994).iso
/
virus
/
secdr13a.arj
/
LOGIN.C
< prev
next >
Wrap
C/C++ Source or Header
|
1994-01-29
|
12KB
|
479 lines
/* Secure Drive LOGIN V1.3A */
/* Logs into encrypted disks */
#include "secdrv.h"
extern char pass1[MAXPASS];
extern char pass2[MAXPASS];
extern char Old13Check[4];
extern int tsr_not_installed;
extern int tsr_wrong_version;
extern int df10,ef10;
extern char compat_mode;
int setenv(char*,char *);
void clrbufs(void);
char *pgpv;
int main(int argc,char *argv[])
{
unsigned drive,firstcyl,firsthead,maxcyl;
unsigned maxhead,maxsector,secsize,i;
unsigned safemode=FALSE;
unsigned pgpsw=FALSE;
unsigned char buf[512],key[16],check[4];
word16 expkey[52];
unsigned serial[2];
unsigned char *p;
char drvltr;
int ekeyexp=0;
if(argc==1)
{
printf("\n\
Secure Drive Login Version 1.3A\n\
This program sets parameters and loads passphrases for encrypted\
drives.\n\n\
LOGIN /F [/PGP] to enter floppy disk passphrase\n\
[use/set PGPPASS]\n\
\n\
LOGIN /C [/PGP] to erase keys and disable encryption\n\
[clear PGPPASS]\n\
\n\
LOGIN drive letter [/PGP] to activate an encrypted hard drive\n\
[use/set PGPPASS]\n\
LOGIN D: (example)\n\
LOGIN D: /S to prevent accidental access to an\n\
encrypted drive without logging in\n\
\n\
LOGIN /PGP to set PGPPASS environment variable\n\
\n\
LOGIN drive cylinder head to manually enter parameters for\n\
a hard drive partition\n\
LOGIN drive cylinder head /S to prevent accidental access\n\
LOGIN 0 100 1 (example)\n\
drives are numbered from zero\n\n");
exit(1);
}
for (i=1;i<argc;i++)
{
if (stricmp(argv[i],"/PGP") == 0)
{
pgpsw=TRUE;
pgpv=getenv("PGPPASS");
break;
}
}
if (argc == 2 && pgpsw)
{
printf("\nEnter PGPPASS passphrase for PGP Secret Key: ");
invgets(pass1);
if(pass1[0] != 0)
{
if (setenv("PGPPASS",pass1) == 0)
{
printf("PGPPASS set. \n");
clrbufs();
exit(0);
}
else
{
printf("PGPPASS not set. \n");
clrbufs();
exit(1);
}
}
else
{
if (pgpv != NULL)
{
for (i=0;i<strlen(pgpv);i++)
pass1[i]='x';
pass1[i]=0;
setenv("PGPPASS",pass1);
setenv("PGPPASS","");
printf("PGPPASS removed from environment\n");
clrbufs();
exit(0);
}
else
{
printf("PGPPASS not removed from environment because not present\n");
clrbufs();
exit(1);
}
}
}
if(!(cryptdata=gettsradr()))
{
printf("\nError: Secure Drive TSR %s.\n",
tsr_wrong_version ? "wrong Version" : "not loaded");
exit(1);
}
if((*argv[1]=='/')&&(toupper(*(argv[1]+1))=='C'))
{
bdos(0x0D, 0, 0); /* Reset Disk Subsystem - Flush all buffers */
for (i=0;i<MAXDRV;i++)
cryptdata->hd[i].active=0;
memset(cryptdata->fkey,0xaa,104);
memset(cryptdata->hkey,0xbb,104);
memset(cryptdata->fkeychk,0x0ff,4);
memset(cryptdata->hkeychk,0x0ff,4);
printf("\nClearing free memory...");
while ((p=malloc(1024)) != NULL)
{
memset(p,0,1024);
}
while ((p=malloc(8)) != NULL)
{
memset(p,0,8);
}
printf("\nAll keys erased. System secured.\n");
if (pgpsw && pgpv != NULL)
{
for (i=0;i<strlen(pgpv);i++)
pass1[i]='x';
pass1[i]=0;
setenv("PGPPASS",pass1);
setenv("PGPPASS","");
printf("PGPPASS removed from environment\n");
}
clrbufs();
exit(0);
}
set_compat_mode();
if((*argv[1]=='/')&&(toupper(*(argv[1]+1))=='F'))
{
char c;
int drive;
int fdpr=1;
while (1)
{
printf("\nInsert encrypted diskette in drive A or B\n\
then press A or B to check passphrase.\n\
Or Press Esc to bypass passphrase check.: ");
while ((c=toupper(getch())) != 'A' && c != 'B' && c != ESC) {}
if (c == ESC) break;
printf("%c\n\n",c);
drvltr=c;
drive=(unsigned) c-'A';
readsec(drive,0,0,1,1,buf);
if((buf[510]!=0x55)||(buf[511]!=0xaa))
{
printf("This diskette is not formatted.\n\n");
continue;
}
if(memcmp(buf+3,"CRYP",4) != 0)
{
printf ("This diskette is not encrypted.\n\n");
continue;
}
break;
} /* while (1)*/
{
unsigned char temp[16];
unsigned char nokey [104];
MD5_CTX md5buf;
memset(nokey,0xbb,104);
if (memcmp(cryptdata->hkey,nokey,104) != 0)
{
if (c != ESC)
{
if(memcmp(cryptdata->hkeychk,buf+7,4) == 0)
{
memcpy(check,cryptdata->hkeychk,4);
memcpy(expkey,cryptdata->hkey,104);
ef10 = df10 = cryptdata->fkeyv10 = cryptdata->hkeyv10;
ekeyexp=1;
fdpr=0;
printf("Floppy disk encryption enabled with\n\
verified active hard disk partition %s passphrase.\n",
df10 ? "(V 1.0)" : "(V 1.1)");
}
}
else /*verify bypassed*/
{
printf("Use active Hard Disk passphrase as unverified floppy passphrase? :");
if (getyn())
{
memcpy(check,cryptdata->hkeychk,4);
memcpy(expkey,cryptdata->hkey,104);
ef10 = cryptdata->hkeyv10;
ekeyexp=1;
fdpr=0;
printf("Floppy disk encryption enabled with\n\
unverified active hard disk partition %s passphrase.\n",
ef10 ? "(V 1.0)" : "(V 1.1)");
}
}
}
}
if (fdpr && pgpsw && pgpv != NULL)
{
strcpy(pass1,pgpv);
if (c != ESC)
{
setkeydf(key,check,buf+7);
if(!df10 && !memcmp(Old13Check,buf+7,4))
{
printf("Check bytes in Disk %c: Boot Sector need updating from 1.3 to 1.1/1.3A. Proceed? ",
drvltr);
if(getyn())
{
memcpy(buf+7,check,4);
writesec(drive,0,0,1,1,buf);
}
}
ef10=df10;
if(memcmp(check,buf+7,4) == 0)
{
printf("\nPGPPASS entered as %s floppy disk passphrase\n",
df10 ? "(V 1.0)" : "(V 1.1)");
fdpr=0;
}
else
{
printf("\nPGPPASS is wrong passphrase.\n");
fdpr=1;
}
}
else
{
setkeye (key,check);
printf("\nPGPPASS entered as %s unverified floppy passphrase\n",
ef10 ? "(V 1.0)":"(V 1.1)");
fdpr=0;
}
}
if (fdpr)
{
printf("\nEnter floppy disk passphrase: ");
if (c != ESC)
{
getkeydf(key,check,buf+7);
if(!df10 && !memcmp(Old13Check,buf+7,4))
{
printf("Check bytes in Disk %c: Boot Sector need updating from 1.3 to 1.1/1.3A. Proceed? ",
drvltr);
if(getyn())
{
memcpy(buf+7,check,4);
writesec(drive,0,0,1,1,buf);
}
}
ef10=df10;
if(memcmp(check,buf+7,4) == 0)
{
printf("Floppy disk encryption enabled with\n");
printf("verified %s passphrase.\n",
df10 ? "(V 1.0)" : "(V 1.1)");
}
else
{
printf("Wrong passphrase.\n");
exit(1);
}
}
else
{
getkey(key,check,FALSE);
printf("Floppy disk encryption enabled with\n");
printf("Unverified %s passphrase.\n",
ef10 ? "(V 1.0)":"(V 1.1)");
}
}
if (!ekeyexp)
en_key_idea((word16 *) key,expkey);
memcpy(cryptdata->fkey,expkey,104);
memcpy(cryptdata->fkeychk,check,4);
cryptdata->fkeyv10=(char) ef10;
cryptdata->fda.firstcyl=0;
cryptdata->fdb.firstcyl=0;
if (pgpsw && pgpv == NULL && setenv("PGPPASS",pass1) == 0)
printf("PGPPASS set. \n");
bdos(0x0D, 0, 0); /* Reset Disk Subsystem - Flush all buffers */
clrbufs();
exit(0);
}
else if(isalpha(*argv[1]))
{
drvltr=toupper(*argv[1]);
drive=255;
readptbl(drvltr,&drive,&firsthead,&firstcyl); /*1.1*/
if(drive==255) {
printf("\nDrive not found.\n");
exit(1); }
if((*argv[2]=='/')&&(toupper(*(argv[2]+1))=='S'))
safemode=TRUE;
printf("\nDrive %c is physical hard drive %u, head %u,\
cylinder %u\n",drvltr,drive,firsthead,firstcyl);
}
else
{
drvltr='X';
i=sscanf(argv[1],"%u",&drive);
i=i&&sscanf(argv[2],"%u",&firstcyl);
i=i&&sscanf(argv[3],"%u",&firsthead);
if((*argv[4]=='/')&&(toupper(*(argv[4]+1))=='S'))
safemode=TRUE;
if(!i)
{
printf("Incorrect drive, cylinder, or head input.\n\
Run without a command line for help.\n");
exit(1);
}
}
drive+=0x80;
readsec(drive,firsthead,firstcyl,1,1,buf);
if((buf[510]!=0x55)||(buf[511]!=0xaa)) {
printf("This is not a boot sector.\n");
exit(1); }
calcdiskparams(buf,&maxcyl,&maxhead,&maxsector,
&secsize,serial);
printf("Disk %c: has: %i cylinders, %i sectors, %i heads, sector \
size %i bytes\n",drvltr,maxcyl+1,maxsector,maxhead,secsize);
if(memcmp("CRYP",buf+3,4)) {
printf("This disk is not encrypted.\n\n");
exit(1); }
if(!safemode)
{
int hdpr=1;
if (pgpsw && pgpv != NULL)
{
strcpy(pass1,pgpv);
setkeydf(key,check,buf+7);
if(!df10 && !memcmp(Old13Check,buf+7,4))
{
printf("Check bytes in Disk %c: Boot Sector need updating from 1.3 to 1.1/1.3A. Proceed? ",
drvltr);
if(getyn())
{
memcpy(buf+7,check,4);
writesec(drive,firsthead,firstcyl,1,1,buf);
}
}
if(memcmp(check,buf+7,4))
{
printf("\nPGPPASS is wrong passphrase.\n");
hdpr=1;
}
else
{
printf("\nPGPPASS entered as %s hard disk passphrase.\n",
df10 ? "(V 1.0)" : "(V 1.1)");
hdpr=0;
}
}
if (hdpr)
{
printf("\nEnter hard disk passphrase: ");
getkeydf(key,check,buf+7);
if(!df10 && !memcmp(Old13Check,buf+7,4))
{
printf("Check bytes in Disk %c: Boot Sector need updating from 1.3 to 1.1/1.3A. Proceed? ",
drvltr);
if(getyn())
{
memcpy(buf+7,check,4);
writesec(drive,firsthead,firstcyl,1,1,buf);
}
}
}
if(memcmp(check,buf+7,4))
{
printf("Wrong passphrase.\n");
exit(1);
}
en_key_idea((word16 *)key,expkey);
memcpy(cryptdata->hkey,expkey,104);
memcpy(cryptdata->hkeychk,check,4);
cryptdata->hkeyv10=(char) df10;
}
bdos(0x0D, 0, 0); /* Reset Disk Subsystem - Flush all buffers */
/*set all slots inactive*/
for (i=0;i<MAXDRV;i++)
{
if (cryptdata->hd[i].active)
printf("Drive %c: set to Safe mode.\n",cryptdata->hd[i].drvltr);
cryptdata->hd[i].active=0;
}
/*find empty or duplicate HD slot*/
for (i=0;i<MAXDRV;i++)
{
if ( cryptdata->hd[i].dddrv == 0 ||
(cryptdata->hd[i].dddrv == drive &&
cryptdata->hd[i].firstcyl == firstcyl) )
{
cryptdata->hd[i].dddrv=drive;
cryptdata->hd[i].drvltr=drvltr;
cryptdata->hd[i].firstcyl=firstcyl;
cryptdata->hd[i].firsthd=firsthead;
cryptdata->hd[i].firstsec=1;
cryptdata->hd[i].lastcyl=firstcyl+maxcyl;
cryptdata->hd[i].maxsec=maxsector;
cryptdata->hd[i].maxhd=maxhead;
cryptdata->hd[i].secsize=secsize;
if(!safemode)
{
cryptdata->hd[i].serial[0]=serial[0];
cryptdata->hd[i].serial[1]=serial[1];
cryptdata->hd[i].active=1;
printf("\nHard disk %s encryption enabled logical drive %c:.\n",
df10 ? "(V 1.0)" : "(V 1.1)",
drvltr);
if (pgpsw && pgpv == NULL && setenv("PGPPASS",pass1) == 0)
printf("PGPPASS set. \n");
break;
}
else
{
printf("\nHard disk set to safe mode.\n");
break;
}
}
}
if (i == MAXDRV)
printf("\nERROR: More than %d Encrypted Partitions not supported\n",MAXDRV);
for(i=0;i<16;i++) key[i]='\0';
for(i=0;i<52;i++) expkey[i]=0;
bdos(0x0D, 0, 0); /* Reset Disk Subsystem - Flush all buffers */
clrbufs();
return(0);
}