2007-09-25 21:45:29 +00:00
|
|
|
/*
|
|
|
|
* crypt32 Crypt*Object functions
|
|
|
|
*
|
|
|
|
* Copyright 2007 Juan Lang
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
|
|
*/
|
|
|
|
#include <stdarg.h>
|
2008-11-06 21:48:14 +00:00
|
|
|
#define NONAMELESSUNION
|
2007-09-25 21:45:29 +00:00
|
|
|
#include "windef.h"
|
|
|
|
#include "winbase.h"
|
|
|
|
#include "wincrypt.h"
|
2008-08-05 05:04:10 +00:00
|
|
|
#include "mssip.h"
|
2008-11-06 21:48:14 +00:00
|
|
|
#include "winuser.h"
|
2007-09-25 21:45:29 +00:00
|
|
|
#include "crypt32_private.h"
|
2008-11-06 21:48:14 +00:00
|
|
|
#include "cryptres.h"
|
2008-10-31 16:32:31 +00:00
|
|
|
#include "wine/unicode.h"
|
2007-09-25 21:45:29 +00:00
|
|
|
#include "wine/debug.h"
|
|
|
|
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(crypt);
|
|
|
|
|
|
|
|
static BOOL CRYPT_ReadBlobFromFile(LPCWSTR fileName, PCERT_BLOB blob)
|
|
|
|
{
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
HANDLE file;
|
|
|
|
|
|
|
|
TRACE("%s\n", debugstr_w(fileName));
|
|
|
|
|
|
|
|
file = CreateFileW(fileName, GENERIC_READ, FILE_SHARE_READ, NULL,
|
|
|
|
OPEN_EXISTING, 0, NULL);
|
|
|
|
if (file != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
ret = TRUE;
|
|
|
|
blob->cbData = GetFileSize(file, NULL);
|
|
|
|
if (blob->cbData)
|
|
|
|
{
|
|
|
|
blob->pbData = CryptMemAlloc(blob->cbData);
|
|
|
|
if (blob->pbData)
|
|
|
|
{
|
|
|
|
DWORD read;
|
|
|
|
|
|
|
|
ret = ReadFile(file, blob->pbData, blob->cbData, &read, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
CloseHandle(file);
|
|
|
|
}
|
|
|
|
TRACE("returning %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_QueryContextObject(DWORD dwObjectType, const void *pvObject,
|
|
|
|
DWORD dwExpectedContentTypeFlags, DWORD *pdwMsgAndCertEncodingType,
|
|
|
|
DWORD *pdwContentType, HCERTSTORE *phCertStore, const void **ppvContext)
|
|
|
|
{
|
|
|
|
CERT_BLOB fileBlob;
|
|
|
|
const CERT_BLOB *blob;
|
|
|
|
HCERTSTORE store;
|
|
|
|
DWORD contentType;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
switch (dwObjectType)
|
|
|
|
{
|
|
|
|
case CERT_QUERY_OBJECT_FILE:
|
|
|
|
/* Cert, CRL, and CTL contexts can't be "embedded" in a file, so
|
|
|
|
* just read the file directly
|
|
|
|
*/
|
|
|
|
ret = CRYPT_ReadBlobFromFile((LPCWSTR)pvObject, &fileBlob);
|
|
|
|
blob = &fileBlob;
|
|
|
|
break;
|
|
|
|
case CERT_QUERY_OBJECT_BLOB:
|
|
|
|
blob = (const CERT_BLOB *)pvObject;
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SetLastError(E_INVALIDARG); /* FIXME: is this the correct error? */
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
if (!ret)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
|
|
|
|
CERT_STORE_CREATE_NEW_FLAG, NULL);
|
|
|
|
ret = FALSE;
|
|
|
|
if (dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_CERT)
|
|
|
|
{
|
|
|
|
ret = pCertInterface->addEncodedToStore(store, X509_ASN_ENCODING,
|
|
|
|
blob->pbData, blob->cbData, CERT_STORE_ADD_ALWAYS, ppvContext);
|
|
|
|
if (ret)
|
|
|
|
contentType = CERT_QUERY_CONTENT_CERT;
|
|
|
|
}
|
|
|
|
if (!ret && (dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_CRL))
|
|
|
|
{
|
|
|
|
ret = pCRLInterface->addEncodedToStore(store, X509_ASN_ENCODING,
|
|
|
|
blob->pbData, blob->cbData, CERT_STORE_ADD_ALWAYS, ppvContext);
|
|
|
|
if (ret)
|
|
|
|
contentType = CERT_QUERY_CONTENT_CRL;
|
|
|
|
}
|
|
|
|
if (!ret && (dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_CTL))
|
|
|
|
{
|
|
|
|
ret = pCTLInterface->addEncodedToStore(store, X509_ASN_ENCODING,
|
|
|
|
blob->pbData, blob->cbData, CERT_STORE_ADD_ALWAYS, ppvContext);
|
|
|
|
if (ret)
|
|
|
|
contentType = CERT_QUERY_CONTENT_CTL;
|
|
|
|
}
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
if (pdwMsgAndCertEncodingType)
|
|
|
|
*pdwMsgAndCertEncodingType = X509_ASN_ENCODING;
|
|
|
|
if (pdwContentType)
|
|
|
|
*pdwContentType = contentType;
|
|
|
|
if (phCertStore)
|
|
|
|
*phCertStore = CertDuplicateStore(store);
|
|
|
|
}
|
|
|
|
CertCloseStore(store, 0);
|
|
|
|
if (blob == &fileBlob)
|
|
|
|
CryptMemFree(blob->pbData);
|
|
|
|
TRACE("returning %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_QuerySerializedContextObject(DWORD dwObjectType,
|
|
|
|
const void *pvObject, DWORD dwExpectedContentTypeFlags,
|
|
|
|
DWORD *pdwMsgAndCertEncodingType, DWORD *pdwContentType,
|
|
|
|
HCERTSTORE *phCertStore, const void **ppvContext)
|
|
|
|
{
|
|
|
|
CERT_BLOB fileBlob;
|
|
|
|
const CERT_BLOB *blob;
|
|
|
|
const WINE_CONTEXT_INTERFACE *contextInterface = NULL;
|
|
|
|
const void *context;
|
|
|
|
DWORD contextType;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
switch (dwObjectType)
|
|
|
|
{
|
|
|
|
case CERT_QUERY_OBJECT_FILE:
|
|
|
|
/* Cert, CRL, and CTL contexts can't be "embedded" in a file, so
|
|
|
|
* just read the file directly
|
|
|
|
*/
|
|
|
|
ret = CRYPT_ReadBlobFromFile((LPCWSTR)pvObject, &fileBlob);
|
|
|
|
blob = &fileBlob;
|
|
|
|
break;
|
|
|
|
case CERT_QUERY_OBJECT_BLOB:
|
|
|
|
blob = (const CERT_BLOB *)pvObject;
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SetLastError(E_INVALIDARG); /* FIXME: is this the correct error? */
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
if (!ret)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
context = CRYPT_ReadSerializedElement(blob->pbData, blob->cbData,
|
|
|
|
CERT_STORE_ALL_CONTEXT_FLAG, &contextType);
|
|
|
|
if (context)
|
|
|
|
{
|
|
|
|
DWORD contentType, certStoreOffset;
|
|
|
|
|
|
|
|
ret = TRUE;
|
|
|
|
switch (contextType)
|
|
|
|
{
|
|
|
|
case CERT_STORE_CERTIFICATE_CONTEXT:
|
|
|
|
contextInterface = pCertInterface;
|
|
|
|
contentType = CERT_QUERY_CONTENT_SERIALIZED_CERT;
|
|
|
|
certStoreOffset = offsetof(CERT_CONTEXT, hCertStore);
|
|
|
|
if (!(dwExpectedContentTypeFlags &
|
|
|
|
CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT))
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case CERT_STORE_CRL_CONTEXT:
|
|
|
|
contextInterface = pCRLInterface;
|
|
|
|
contentType = CERT_QUERY_CONTENT_SERIALIZED_CRL;
|
|
|
|
certStoreOffset = offsetof(CRL_CONTEXT, hCertStore);
|
|
|
|
if (!(dwExpectedContentTypeFlags &
|
|
|
|
CERT_QUERY_CONTENT_FLAG_SERIALIZED_CRL))
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case CERT_STORE_CTL_CONTEXT:
|
|
|
|
contextInterface = pCTLInterface;
|
|
|
|
contentType = CERT_QUERY_CONTENT_SERIALIZED_CTL;
|
|
|
|
certStoreOffset = offsetof(CTL_CONTEXT, hCertStore);
|
|
|
|
if (!(dwExpectedContentTypeFlags &
|
|
|
|
CERT_QUERY_CONTENT_FLAG_SERIALIZED_CTL))
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SetLastError(ERROR_INVALID_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
if (pdwMsgAndCertEncodingType)
|
|
|
|
*pdwMsgAndCertEncodingType = X509_ASN_ENCODING;
|
|
|
|
if (pdwContentType)
|
|
|
|
*pdwContentType = contentType;
|
|
|
|
if (phCertStore)
|
|
|
|
*phCertStore = CertDuplicateStore(
|
|
|
|
*(HCERTSTORE *)((const BYTE *)context + certStoreOffset));
|
|
|
|
if (ppvContext)
|
|
|
|
*ppvContext = contextInterface->duplicate(context);
|
|
|
|
}
|
|
|
|
|
|
|
|
end:
|
|
|
|
if (contextInterface && context)
|
|
|
|
contextInterface->free(context);
|
|
|
|
if (blob == &fileBlob)
|
|
|
|
CryptMemFree(blob->pbData);
|
|
|
|
TRACE("returning %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_QuerySerializedStoreObject(DWORD dwObjectType,
|
|
|
|
const void *pvObject, DWORD *pdwMsgAndCertEncodingType, DWORD *pdwContentType,
|
|
|
|
HCERTSTORE *phCertStore, HCRYPTMSG *phMsg)
|
|
|
|
{
|
|
|
|
LPCWSTR fileName = (LPCWSTR)pvObject;
|
|
|
|
HANDLE file;
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
|
|
|
if (dwObjectType != CERT_QUERY_OBJECT_FILE)
|
|
|
|
{
|
|
|
|
FIXME("unimplemented for non-file type %d\n", dwObjectType);
|
|
|
|
SetLastError(E_INVALIDARG); /* FIXME: is this the correct error? */
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
TRACE("%s\n", debugstr_w(fileName));
|
|
|
|
file = CreateFileW(fileName, GENERIC_READ, FILE_SHARE_READ, NULL,
|
|
|
|
OPEN_EXISTING, 0, NULL);
|
|
|
|
if (file != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
|
|
|
|
CERT_STORE_CREATE_NEW_FLAG, NULL);
|
|
|
|
|
2007-09-27 18:54:24 +00:00
|
|
|
ret = CRYPT_ReadSerializedStoreFromFile(file, store);
|
2007-09-25 21:45:29 +00:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
if (pdwMsgAndCertEncodingType)
|
|
|
|
*pdwMsgAndCertEncodingType = X509_ASN_ENCODING;
|
|
|
|
if (pdwContentType)
|
|
|
|
*pdwContentType = CERT_QUERY_CONTENT_SERIALIZED_STORE;
|
|
|
|
if (phCertStore)
|
|
|
|
*phCertStore = CertDuplicateStore(store);
|
|
|
|
}
|
|
|
|
CertCloseStore(store, 0);
|
|
|
|
CloseHandle(file);
|
|
|
|
}
|
|
|
|
TRACE("returning %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Used to decode non-embedded messages */
|
|
|
|
static BOOL CRYPT_QueryMessageObject(DWORD dwObjectType, const void *pvObject,
|
|
|
|
DWORD dwExpectedContentTypeFlags, DWORD *pdwMsgAndCertEncodingType,
|
|
|
|
DWORD *pdwContentType, HCERTSTORE *phCertStore, HCRYPTMSG *phMsg)
|
|
|
|
{
|
|
|
|
CERT_BLOB fileBlob;
|
|
|
|
const CERT_BLOB *blob;
|
|
|
|
BOOL ret;
|
|
|
|
HCRYPTMSG msg = NULL;
|
|
|
|
DWORD encodingType = X509_ASN_ENCODING | PKCS_7_ASN_ENCODING;
|
|
|
|
|
|
|
|
switch (dwObjectType)
|
|
|
|
{
|
|
|
|
case CERT_QUERY_OBJECT_FILE:
|
|
|
|
/* This isn't an embedded PKCS7 message, so just read the file
|
|
|
|
* directly
|
|
|
|
*/
|
|
|
|
ret = CRYPT_ReadBlobFromFile((LPCWSTR)pvObject, &fileBlob);
|
|
|
|
blob = &fileBlob;
|
|
|
|
break;
|
|
|
|
case CERT_QUERY_OBJECT_BLOB:
|
|
|
|
blob = (const CERT_BLOB *)pvObject;
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
SetLastError(E_INVALIDARG); /* FIXME: is this the correct error? */
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
if (!ret)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
ret = FALSE;
|
2007-09-27 17:01:30 +00:00
|
|
|
/* Try it first as a PKCS content info */
|
|
|
|
if ((dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED) ||
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED))
|
|
|
|
{
|
|
|
|
msg = CryptMsgOpenToDecode(encodingType, 0, 0, 0, NULL, NULL);
|
|
|
|
if (msg)
|
|
|
|
{
|
|
|
|
ret = CryptMsgUpdate(msg, blob->pbData, blob->cbData, TRUE);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
DWORD type, len = sizeof(type);
|
|
|
|
|
|
|
|
ret = CryptMsgGetParam(msg, CMSG_TYPE_PARAM, 0, &type, &len);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
if ((dwExpectedContentTypeFlags &
|
|
|
|
CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED))
|
|
|
|
{
|
|
|
|
if (type != CMSG_SIGNED)
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else if (pdwContentType)
|
|
|
|
*pdwContentType = CERT_QUERY_CONTENT_PKCS7_SIGNED;
|
|
|
|
}
|
|
|
|
else if ((dwExpectedContentTypeFlags &
|
|
|
|
CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED))
|
|
|
|
{
|
|
|
|
if (type != CMSG_DATA)
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else if (pdwContentType)
|
|
|
|
*pdwContentType = CERT_QUERY_CONTENT_PKCS7_UNSIGNED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
CryptMsgClose(msg);
|
|
|
|
msg = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Failing that, try explicitly typed messages */
|
|
|
|
if (!ret &&
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED))
|
2007-09-25 21:45:29 +00:00
|
|
|
{
|
|
|
|
msg = CryptMsgOpenToDecode(encodingType, 0, CMSG_SIGNED, 0, NULL, NULL);
|
|
|
|
if (msg)
|
|
|
|
{
|
|
|
|
ret = CryptMsgUpdate(msg, blob->pbData, blob->cbData, TRUE);
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
CryptMsgClose(msg);
|
|
|
|
msg = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (msg && pdwContentType)
|
|
|
|
*pdwContentType = CERT_QUERY_CONTENT_PKCS7_SIGNED;
|
|
|
|
}
|
|
|
|
if (!ret &&
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED))
|
|
|
|
{
|
|
|
|
msg = CryptMsgOpenToDecode(encodingType, 0, CMSG_DATA, 0, NULL, NULL);
|
|
|
|
if (msg)
|
|
|
|
{
|
|
|
|
ret = CryptMsgUpdate(msg, blob->pbData, blob->cbData, TRUE);
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
CryptMsgClose(msg);
|
|
|
|
msg = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (msg && pdwContentType)
|
|
|
|
*pdwContentType = CERT_QUERY_CONTENT_PKCS7_UNSIGNED;
|
|
|
|
}
|
|
|
|
if (pdwMsgAndCertEncodingType)
|
|
|
|
*pdwMsgAndCertEncodingType = encodingType;
|
|
|
|
if (msg)
|
|
|
|
{
|
|
|
|
if (phMsg)
|
|
|
|
*phMsg = msg;
|
|
|
|
if (phCertStore)
|
|
|
|
*phCertStore = CertOpenStore(CERT_STORE_PROV_MSG, encodingType, 0,
|
|
|
|
0, msg);
|
|
|
|
}
|
|
|
|
if (blob == &fileBlob)
|
|
|
|
CryptMemFree(blob->pbData);
|
|
|
|
TRACE("returning %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_QueryEmbeddedMessageObject(DWORD dwObjectType,
|
|
|
|
const void *pvObject, DWORD dwExpectedContentTypeFlags,
|
|
|
|
DWORD *pdwMsgAndCertEncodingType, DWORD *pdwContentType,
|
|
|
|
HCERTSTORE *phCertStore, HCRYPTMSG *phMsg)
|
|
|
|
{
|
|
|
|
HANDLE file;
|
2008-08-05 05:04:10 +00:00
|
|
|
GUID subject;
|
2007-09-25 21:45:29 +00:00
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
2008-08-05 05:04:10 +00:00
|
|
|
TRACE("%s\n", debugstr_w((LPCWSTR)pvObject));
|
|
|
|
|
2007-09-25 21:45:29 +00:00
|
|
|
if (dwObjectType != CERT_QUERY_OBJECT_FILE)
|
|
|
|
{
|
|
|
|
FIXME("don't know what to do for type %d embedded signed messages\n",
|
|
|
|
dwObjectType);
|
|
|
|
SetLastError(E_INVALIDARG);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
file = CreateFileW((LPCWSTR)pvObject, GENERIC_READ, FILE_SHARE_READ,
|
|
|
|
NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
|
|
|
if (file != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
2008-08-05 05:04:10 +00:00
|
|
|
ret = CryptSIPRetrieveSubjectGuid((LPCWSTR)pvObject, file, &subject);
|
|
|
|
if (ret)
|
2007-09-25 21:45:29 +00:00
|
|
|
{
|
2008-08-05 05:04:10 +00:00
|
|
|
SIP_DISPATCH_INFO sip;
|
2007-09-27 17:00:44 +00:00
|
|
|
|
2008-08-05 05:04:10 +00:00
|
|
|
memset(&sip, 0, sizeof(sip));
|
|
|
|
sip.cbSize = sizeof(sip);
|
|
|
|
ret = CryptSIPLoad(&subject, 0, &sip);
|
|
|
|
if (ret)
|
2007-09-25 21:45:29 +00:00
|
|
|
{
|
2008-08-05 05:04:10 +00:00
|
|
|
SIP_SUBJECTINFO subjectInfo;
|
|
|
|
CERT_BLOB blob;
|
|
|
|
DWORD encodingType;
|
|
|
|
|
|
|
|
memset(&subjectInfo, 0, sizeof(subjectInfo));
|
|
|
|
subjectInfo.cbSize = sizeof(subjectInfo);
|
|
|
|
subjectInfo.pgSubjectType = &subject;
|
|
|
|
subjectInfo.hFile = file;
|
|
|
|
subjectInfo.pwsFileName = (LPCWSTR)pvObject;
|
|
|
|
ret = sip.pfGet(&subjectInfo, &encodingType, 0, &blob.cbData,
|
|
|
|
NULL);
|
2007-09-25 21:45:29 +00:00
|
|
|
if (ret)
|
|
|
|
{
|
2008-08-05 05:04:10 +00:00
|
|
|
blob.pbData = CryptMemAlloc(blob.cbData);
|
|
|
|
if (blob.pbData)
|
|
|
|
{
|
|
|
|
ret = sip.pfGet(&subjectInfo, &encodingType, 0,
|
|
|
|
&blob.cbData, blob.pbData);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
ret = CRYPT_QueryMessageObject(
|
|
|
|
CERT_QUERY_OBJECT_BLOB, &blob,
|
|
|
|
CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED,
|
|
|
|
pdwMsgAndCertEncodingType, NULL, phCertStore,
|
|
|
|
phMsg);
|
|
|
|
if (ret && pdwContentType)
|
|
|
|
*pdwContentType =
|
|
|
|
CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED;
|
|
|
|
}
|
|
|
|
CryptMemFree(blob.pbData);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_OUTOFMEMORY);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
2007-09-25 21:45:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
CloseHandle(file);
|
|
|
|
}
|
|
|
|
TRACE("returning %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptQueryObject(DWORD dwObjectType, const void *pvObject,
|
|
|
|
DWORD dwExpectedContentTypeFlags, DWORD dwExpectedFormatTypeFlags,
|
|
|
|
DWORD dwFlags, DWORD *pdwMsgAndCertEncodingType, DWORD *pdwContentType,
|
|
|
|
DWORD *pdwFormatType, HCERTSTORE *phCertStore, HCRYPTMSG *phMsg,
|
|
|
|
const void **ppvContext)
|
|
|
|
{
|
|
|
|
static const DWORD unimplementedTypes =
|
|
|
|
CERT_QUERY_CONTENT_FLAG_PKCS10 | CERT_QUERY_CONTENT_FLAG_PFX |
|
|
|
|
CERT_QUERY_CONTENT_FLAG_CERT_PAIR;
|
|
|
|
BOOL ret = TRUE;
|
|
|
|
|
|
|
|
TRACE("(%08x, %p, %08x, %08x, %08x, %p, %p, %p, %p, %p, %p)\n",
|
|
|
|
dwObjectType, pvObject, dwExpectedContentTypeFlags,
|
|
|
|
dwExpectedFormatTypeFlags, dwFlags, pdwMsgAndCertEncodingType,
|
|
|
|
pdwContentType, pdwFormatType, phCertStore, phMsg, ppvContext);
|
|
|
|
|
|
|
|
if (dwExpectedContentTypeFlags & unimplementedTypes)
|
|
|
|
WARN("unimplemented for types %08x\n",
|
|
|
|
dwExpectedContentTypeFlags & unimplementedTypes);
|
|
|
|
if (!(dwExpectedFormatTypeFlags & CERT_QUERY_FORMAT_FLAG_BINARY))
|
|
|
|
{
|
|
|
|
FIXME("unimplemented for anything but binary\n");
|
|
|
|
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
if (pdwFormatType)
|
|
|
|
*pdwFormatType = CERT_QUERY_FORMAT_BINARY;
|
|
|
|
|
|
|
|
if (phCertStore)
|
|
|
|
*phCertStore = NULL;
|
|
|
|
if (phMsg)
|
|
|
|
*phMsg = NULL;
|
|
|
|
if (ppvContext)
|
|
|
|
*ppvContext = NULL;
|
|
|
|
|
|
|
|
ret = FALSE;
|
|
|
|
if ((dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_CERT) ||
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_CRL) ||
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_CTL))
|
|
|
|
{
|
|
|
|
ret = CRYPT_QueryContextObject(dwObjectType, pvObject,
|
|
|
|
dwExpectedContentTypeFlags, pdwMsgAndCertEncodingType, pdwContentType,
|
|
|
|
phCertStore, ppvContext);
|
|
|
|
}
|
|
|
|
if (!ret &&
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_SERIALIZED_STORE))
|
|
|
|
{
|
|
|
|
ret = CRYPT_QuerySerializedStoreObject(dwObjectType, pvObject,
|
|
|
|
pdwMsgAndCertEncodingType, pdwContentType, phCertStore, phMsg);
|
|
|
|
}
|
|
|
|
if (!ret &&
|
|
|
|
((dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_SERIALIZED_CERT) ||
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_SERIALIZED_CRL) ||
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_SERIALIZED_CTL)))
|
|
|
|
{
|
|
|
|
ret = CRYPT_QuerySerializedContextObject(dwObjectType, pvObject,
|
|
|
|
dwExpectedContentTypeFlags, pdwMsgAndCertEncodingType, pdwContentType,
|
|
|
|
phCertStore, ppvContext);
|
|
|
|
}
|
|
|
|
if (!ret &&
|
|
|
|
((dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED) ||
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED)))
|
|
|
|
{
|
|
|
|
ret = CRYPT_QueryMessageObject(dwObjectType, pvObject,
|
|
|
|
dwExpectedContentTypeFlags, pdwMsgAndCertEncodingType, pdwContentType,
|
|
|
|
phCertStore, phMsg);
|
|
|
|
}
|
|
|
|
if (!ret &&
|
|
|
|
(dwExpectedContentTypeFlags & CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED))
|
|
|
|
{
|
|
|
|
ret = CRYPT_QueryEmbeddedMessageObject(dwObjectType, pvObject,
|
|
|
|
dwExpectedContentTypeFlags, pdwMsgAndCertEncodingType, pdwContentType,
|
|
|
|
phCertStore, phMsg);
|
|
|
|
}
|
2007-09-26 16:57:38 +00:00
|
|
|
TRACE("returning %d\n", ret);
|
2007-09-25 21:45:29 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2008-10-31 16:32:31 +00:00
|
|
|
|
|
|
|
static BOOL WINAPI CRYPT_FormatHexString(DWORD dwCertEncodingType,
|
|
|
|
DWORD dwFormatType, DWORD dwFormatStrType, void *pFormatStruct,
|
|
|
|
LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, void *pbFormat,
|
|
|
|
DWORD *pcbFormat)
|
|
|
|
{
|
|
|
|
BOOL ret;
|
|
|
|
DWORD bytesNeeded;
|
|
|
|
|
|
|
|
if (cbEncoded)
|
|
|
|
bytesNeeded = (cbEncoded * 3) * sizeof(WCHAR);
|
|
|
|
else
|
|
|
|
bytesNeeded = sizeof(WCHAR);
|
|
|
|
if (!pbFormat)
|
|
|
|
{
|
|
|
|
*pcbFormat = bytesNeeded;
|
|
|
|
ret = TRUE;
|
|
|
|
}
|
|
|
|
else if (*pcbFormat < bytesNeeded)
|
|
|
|
{
|
|
|
|
*pcbFormat = bytesNeeded;
|
|
|
|
SetLastError(ERROR_MORE_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
static const WCHAR fmt[] = { '%','0','2','x',' ',0 };
|
|
|
|
static const WCHAR endFmt[] = { '%','0','2','x',0 };
|
|
|
|
DWORD i;
|
|
|
|
LPWSTR ptr = pbFormat;
|
|
|
|
|
|
|
|
*pcbFormat = bytesNeeded;
|
|
|
|
if (cbEncoded)
|
|
|
|
{
|
|
|
|
for (i = 0; i < cbEncoded; i++)
|
|
|
|
{
|
|
|
|
if (i < cbEncoded - 1)
|
|
|
|
ptr += sprintfW(ptr, fmt, pbEncoded[i]);
|
|
|
|
else
|
|
|
|
ptr += sprintfW(ptr, endFmt, pbEncoded[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
*ptr = 0;
|
|
|
|
ret = TRUE;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-11-06 21:48:14 +00:00
|
|
|
#define MAX_STRING_RESOURCE_LEN 128
|
|
|
|
|
|
|
|
static BOOL CRYPT_FormatHexStringWithPrefix(CRYPT_DATA_BLOB *blob, int id,
|
|
|
|
LPWSTR str, DWORD *pcbStr)
|
|
|
|
{
|
|
|
|
WCHAR buf[MAX_STRING_RESOURCE_LEN];
|
|
|
|
DWORD bytesNeeded;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
LoadStringW(hInstance, id, buf, sizeof(buf) / sizeof(buf[0]));
|
|
|
|
CRYPT_FormatHexString(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
|
|
|
blob->pbData, blob->cbData, NULL, &bytesNeeded);
|
|
|
|
bytesNeeded += strlenW(buf) * sizeof(WCHAR);
|
|
|
|
if (!str)
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
ret = TRUE;
|
|
|
|
}
|
|
|
|
else if (*pcbStr < bytesNeeded)
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
SetLastError(ERROR_MORE_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
strcpyW(str, buf);
|
|
|
|
str += strlenW(str);
|
|
|
|
bytesNeeded -= strlenW(str) * sizeof(WCHAR);
|
|
|
|
ret = CRYPT_FormatHexString(X509_ASN_ENCODING, 0, 0, NULL, NULL,
|
|
|
|
blob->pbData, blob->cbData, str, &bytesNeeded);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_FormatKeyId(CRYPT_DATA_BLOB *keyId, LPWSTR str,
|
|
|
|
DWORD *pcbStr)
|
|
|
|
{
|
|
|
|
return CRYPT_FormatHexStringWithPrefix(keyId, IDS_KEY_ID, str, pcbStr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_FormatCertSerialNumber(CRYPT_DATA_BLOB *serialNum, LPWSTR str,
|
|
|
|
DWORD *pcbStr)
|
|
|
|
{
|
|
|
|
return CRYPT_FormatHexStringWithPrefix(serialNum, IDS_CERT_SERIAL_NUMBER,
|
|
|
|
str, pcbStr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const WCHAR crlf[] = { '\r','\n',0 };
|
|
|
|
|
|
|
|
static BOOL CRYPT_FormatAltNameEntry(DWORD dwFormatStrType,
|
|
|
|
CERT_ALT_NAME_ENTRY *entry, LPWSTR str, DWORD *pcbStr)
|
|
|
|
{
|
|
|
|
BOOL ret;
|
|
|
|
WCHAR buf[MAX_STRING_RESOURCE_LEN];
|
|
|
|
WCHAR mask[MAX_STRING_RESOURCE_LEN];
|
|
|
|
WCHAR ipAddrBuf[32];
|
|
|
|
WCHAR maskBuf[16];
|
|
|
|
DWORD bytesNeeded = sizeof(WCHAR);
|
|
|
|
|
|
|
|
switch (entry->dwAltNameChoice)
|
|
|
|
{
|
|
|
|
case CERT_ALT_NAME_RFC822_NAME:
|
|
|
|
LoadStringW(hInstance, IDS_ALT_NAME_RFC822_NAME, buf,
|
|
|
|
sizeof(buf) / sizeof(buf[0]));
|
|
|
|
bytesNeeded += strlenW(entry->u.pwszRfc822Name) * sizeof(WCHAR);
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
case CERT_ALT_NAME_DNS_NAME:
|
|
|
|
LoadStringW(hInstance, IDS_ALT_NAME_DNS_NAME, buf,
|
|
|
|
sizeof(buf) / sizeof(buf[0]));
|
|
|
|
bytesNeeded += strlenW(entry->u.pwszDNSName) * sizeof(WCHAR);
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
case CERT_ALT_NAME_URL:
|
|
|
|
LoadStringW(hInstance, IDS_ALT_NAME_URL, buf,
|
|
|
|
sizeof(buf) / sizeof(buf[0]));
|
|
|
|
bytesNeeded += strlenW(entry->u.pwszURL) * sizeof(WCHAR);
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
case CERT_ALT_NAME_IP_ADDRESS:
|
|
|
|
{
|
|
|
|
static const WCHAR ipAddrWithMaskFmt[] = { '%','d','.','%','d','.',
|
|
|
|
'%','d','.','%','d','/','%','d','.','%','d','.','%','d','.','%','d',0
|
|
|
|
};
|
|
|
|
static const WCHAR ipAddrFmt[] = { '%','d','.','%','d','.','%','d',
|
|
|
|
'.','%','d',0 };
|
|
|
|
|
|
|
|
LoadStringW(hInstance, IDS_ALT_NAME_IP_ADDRESS, buf,
|
|
|
|
sizeof(buf) / sizeof(buf[0]));
|
|
|
|
if (entry->u.IPAddress.cbData == 8)
|
|
|
|
{
|
|
|
|
if (dwFormatStrType & CRYPT_FORMAT_STR_MULTI_LINE)
|
|
|
|
{
|
|
|
|
LoadStringW(hInstance, IDS_ALT_NAME_MASK, mask,
|
|
|
|
sizeof(mask) / sizeof(mask[0]));
|
|
|
|
bytesNeeded += strlenW(mask) * sizeof(WCHAR);
|
|
|
|
sprintfW(ipAddrBuf, ipAddrFmt,
|
|
|
|
entry->u.IPAddress.pbData[0],
|
|
|
|
entry->u.IPAddress.pbData[1],
|
|
|
|
entry->u.IPAddress.pbData[2],
|
|
|
|
entry->u.IPAddress.pbData[3]);
|
|
|
|
bytesNeeded += strlenW(ipAddrBuf) * sizeof(WCHAR);
|
|
|
|
sprintfW(maskBuf, ipAddrFmt,
|
|
|
|
entry->u.IPAddress.pbData[4],
|
|
|
|
entry->u.IPAddress.pbData[5],
|
|
|
|
entry->u.IPAddress.pbData[6],
|
|
|
|
entry->u.IPAddress.pbData[7]);
|
|
|
|
bytesNeeded += strlenW(maskBuf) * sizeof(WCHAR);
|
|
|
|
bytesNeeded += strlenW(crlf) * sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
sprintfW(ipAddrBuf, ipAddrWithMaskFmt,
|
|
|
|
entry->u.IPAddress.pbData[0],
|
|
|
|
entry->u.IPAddress.pbData[1],
|
|
|
|
entry->u.IPAddress.pbData[2],
|
|
|
|
entry->u.IPAddress.pbData[3],
|
|
|
|
entry->u.IPAddress.pbData[4],
|
|
|
|
entry->u.IPAddress.pbData[5],
|
|
|
|
entry->u.IPAddress.pbData[6],
|
|
|
|
entry->u.IPAddress.pbData[7]);
|
|
|
|
bytesNeeded += (strlenW(ipAddrBuf) + 1) * sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
ret = TRUE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FIXME("unknown IP address format (%d bytes)\n",
|
|
|
|
entry->u.IPAddress.cbData);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
FIXME("unimplemented for %d\n", entry->dwAltNameChoice);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
bytesNeeded += strlenW(buf) * sizeof(WCHAR);
|
|
|
|
if (!str)
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
else if (*pcbStr < bytesNeeded)
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
SetLastError(ERROR_MORE_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
strcpyW(str, buf);
|
|
|
|
str += strlenW(str);
|
|
|
|
switch (entry->dwAltNameChoice)
|
|
|
|
{
|
|
|
|
case CERT_ALT_NAME_RFC822_NAME:
|
|
|
|
case CERT_ALT_NAME_DNS_NAME:
|
|
|
|
case CERT_ALT_NAME_URL:
|
|
|
|
strcpyW(str, entry->u.pwszURL);
|
|
|
|
break;
|
|
|
|
case CERT_ALT_NAME_IP_ADDRESS:
|
|
|
|
if (dwFormatStrType & CRYPT_FORMAT_STR_MULTI_LINE)
|
|
|
|
{
|
|
|
|
strcpyW(str, ipAddrBuf);
|
|
|
|
str += strlenW(ipAddrBuf);
|
|
|
|
strcpyW(str, crlf);
|
|
|
|
str += strlenW(crlf);
|
|
|
|
strcpyW(str, mask);
|
|
|
|
str += strlenW(mask);
|
|
|
|
strcpyW(str, maskBuf);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
strcpyW(str, ipAddrBuf);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const WCHAR commaSpace[] = { ',',' ',0 };
|
|
|
|
|
|
|
|
static BOOL CRYPT_FormatAltNameInfo(DWORD dwFormatStrType,
|
|
|
|
CERT_ALT_NAME_INFO *name, LPWSTR str, DWORD *pcbStr)
|
|
|
|
{
|
|
|
|
DWORD i, size, bytesNeeded = 0;
|
|
|
|
BOOL ret = TRUE;
|
|
|
|
LPCWSTR sep;
|
|
|
|
DWORD sepLen;
|
|
|
|
|
|
|
|
if (dwFormatStrType & CRYPT_FORMAT_STR_MULTI_LINE)
|
|
|
|
{
|
|
|
|
sep = crlf;
|
|
|
|
sepLen = strlenW(crlf) * sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
sep = commaSpace;
|
|
|
|
sepLen = strlenW(commaSpace) * sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; ret && i < name->cAltEntry; i++)
|
|
|
|
{
|
|
|
|
ret = CRYPT_FormatAltNameEntry(dwFormatStrType, &name->rgAltEntry[i],
|
|
|
|
NULL, &size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
bytesNeeded += size - sizeof(WCHAR);
|
|
|
|
if (i < name->cAltEntry - 1)
|
|
|
|
bytesNeeded += sepLen;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
bytesNeeded += sizeof(WCHAR);
|
|
|
|
if (!str)
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
else if (*pcbStr < bytesNeeded)
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
SetLastError(ERROR_MORE_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
for (i = 0; ret && i < name->cAltEntry; i++)
|
|
|
|
{
|
|
|
|
ret = CRYPT_FormatAltNameEntry(dwFormatStrType,
|
|
|
|
&name->rgAltEntry[i], str, &size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
str += size / sizeof(WCHAR) - 1;
|
|
|
|
if (i < name->cAltEntry - 1)
|
|
|
|
{
|
|
|
|
strcpyW(str, sep);
|
|
|
|
str += sepLen / sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_FormatCertIssuer(DWORD dwFormatStrType,
|
|
|
|
CERT_ALT_NAME_INFO *issuer, LPWSTR str, DWORD *pcbStr)
|
|
|
|
{
|
|
|
|
WCHAR buf[MAX_STRING_RESOURCE_LEN];
|
|
|
|
DWORD bytesNeeded;
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
LoadStringW(hInstance, IDS_CERT_ISSUER, buf, sizeof(buf) / sizeof(buf[0]));
|
|
|
|
ret = CRYPT_FormatAltNameInfo(dwFormatStrType, issuer, NULL, &bytesNeeded);
|
|
|
|
bytesNeeded += strlenW(buf) * sizeof(WCHAR);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
if (!str)
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
else if (*pcbStr < bytesNeeded)
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
SetLastError(ERROR_MORE_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*pcbStr = bytesNeeded;
|
|
|
|
strcpyW(str, buf);
|
|
|
|
str += strlenW(str);
|
|
|
|
bytesNeeded -= strlenW(str) * sizeof(WCHAR);
|
|
|
|
ret = CRYPT_FormatAltNameInfo(dwFormatStrType, issuer, str,
|
|
|
|
&bytesNeeded);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL WINAPI CRYPT_FormatAuthorityKeyId2(DWORD dwCertEncodingType,
|
|
|
|
DWORD dwFormatType, DWORD dwFormatStrType, void *pFormatStruct,
|
|
|
|
LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, void *pbFormat,
|
|
|
|
DWORD *pcbFormat)
|
|
|
|
{
|
|
|
|
CERT_AUTHORITY_KEY_ID2_INFO *info;
|
|
|
|
DWORD size;
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
|
|
|
if (!cbEncoded)
|
|
|
|
{
|
|
|
|
SetLastError(E_INVALIDARG);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
if ((ret = CryptDecodeObjectEx(dwCertEncodingType, X509_AUTHORITY_KEY_ID2,
|
|
|
|
pbEncoded, cbEncoded, CRYPT_DECODE_ALLOC_FLAG, NULL, &info, &size)))
|
|
|
|
{
|
|
|
|
DWORD bytesNeeded = sizeof(WCHAR); /* space for the NULL terminator */
|
|
|
|
LPCWSTR sep;
|
|
|
|
DWORD sepLen;
|
|
|
|
BOOL needSeparator = FALSE;
|
|
|
|
|
|
|
|
if (dwFormatStrType & CRYPT_FORMAT_STR_MULTI_LINE)
|
|
|
|
{
|
|
|
|
sep = crlf;
|
|
|
|
sepLen = strlenW(crlf) * sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
sep = commaSpace;
|
|
|
|
sepLen = strlenW(commaSpace) * sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->KeyId.cbData)
|
|
|
|
{
|
|
|
|
needSeparator = TRUE;
|
|
|
|
ret = CRYPT_FormatKeyId(&info->KeyId, NULL, &size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
/* don't include NULL-terminator more than once */
|
|
|
|
bytesNeeded += size - sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (info->AuthorityCertIssuer.cAltEntry)
|
|
|
|
{
|
|
|
|
if (needSeparator)
|
|
|
|
bytesNeeded += sepLen;
|
|
|
|
needSeparator = TRUE;
|
|
|
|
ret = CRYPT_FormatCertIssuer(dwFormatStrType,
|
|
|
|
&info->AuthorityCertIssuer, NULL, &size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
/* don't include NULL-terminator more than once */
|
|
|
|
bytesNeeded += size - sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (info->AuthorityCertSerialNumber.cbData)
|
|
|
|
{
|
|
|
|
if (needSeparator)
|
|
|
|
bytesNeeded += sepLen;
|
|
|
|
ret = CRYPT_FormatCertSerialNumber(
|
|
|
|
&info->AuthorityCertSerialNumber, NULL, &size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
/* don't include NULL-terminator more than once */
|
|
|
|
bytesNeeded += size - sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
if (!pbFormat)
|
|
|
|
*pcbFormat = bytesNeeded;
|
|
|
|
else if (*pcbFormat < bytesNeeded)
|
|
|
|
{
|
|
|
|
*pcbFormat = bytesNeeded;
|
|
|
|
SetLastError(ERROR_MORE_DATA);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LPWSTR str = pbFormat;
|
|
|
|
|
|
|
|
*pcbFormat = bytesNeeded;
|
|
|
|
needSeparator = FALSE;
|
|
|
|
if (info->KeyId.cbData)
|
|
|
|
{
|
|
|
|
needSeparator = TRUE;
|
|
|
|
ret = CRYPT_FormatKeyId(&info->KeyId, str, &size);
|
|
|
|
if (ret)
|
|
|
|
str += size / sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
if (info->AuthorityCertIssuer.cAltEntry)
|
|
|
|
{
|
|
|
|
if (needSeparator)
|
|
|
|
{
|
|
|
|
strcpyW(str, sep);
|
|
|
|
str += sepLen / sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
needSeparator = TRUE;
|
|
|
|
ret = CRYPT_FormatCertIssuer(dwFormatStrType,
|
|
|
|
&info->AuthorityCertIssuer, str, &size);
|
|
|
|
if (ret)
|
|
|
|
str += size / sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
if (info->AuthorityCertSerialNumber.cbData)
|
|
|
|
{
|
|
|
|
if (needSeparator)
|
|
|
|
{
|
|
|
|
strcpyW(str, sep);
|
|
|
|
str += sepLen / sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
ret = CRYPT_FormatCertSerialNumber(
|
|
|
|
&info->AuthorityCertSerialNumber, str, &size);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LocalFree(info);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-10-31 16:32:31 +00:00
|
|
|
typedef BOOL (WINAPI *CryptFormatObjectFunc)(DWORD, DWORD, DWORD, void *,
|
|
|
|
LPCSTR, const BYTE *, DWORD, void *, DWORD *);
|
|
|
|
|
2008-11-06 21:48:14 +00:00
|
|
|
static CryptFormatObjectFunc CRYPT_GetBuiltinFormatFunction(DWORD encodingType,
|
|
|
|
DWORD formatStrType, LPCSTR lpszStructType)
|
|
|
|
{
|
|
|
|
CryptFormatObjectFunc format = NULL;
|
|
|
|
|
|
|
|
if ((encodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING)
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_FILE_NOT_FOUND);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (!HIWORD(lpszStructType))
|
|
|
|
{
|
|
|
|
switch (LOWORD(lpszStructType))
|
|
|
|
{
|
|
|
|
case LOWORD(X509_AUTHORITY_KEY_ID2):
|
|
|
|
format = CRYPT_FormatAuthorityKeyId2;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (!strcmp(lpszStructType, szOID_AUTHORITY_KEY_IDENTIFIER2))
|
|
|
|
format = CRYPT_FormatAuthorityKeyId2;
|
|
|
|
if (!format && !(formatStrType & CRYPT_FORMAT_STR_NO_HEX))
|
|
|
|
format = CRYPT_FormatHexString;
|
|
|
|
return format;
|
|
|
|
}
|
|
|
|
|
2008-10-31 16:32:31 +00:00
|
|
|
BOOL WINAPI CryptFormatObject(DWORD dwCertEncodingType, DWORD dwFormatType,
|
|
|
|
DWORD dwFormatStrType, void *pFormatStruct, LPCSTR lpszStructType,
|
|
|
|
const BYTE *pbEncoded, DWORD cbEncoded, void *pbFormat, DWORD *pcbFormat)
|
|
|
|
{
|
|
|
|
CryptFormatObjectFunc format = NULL;
|
|
|
|
HCRYPTOIDFUNCADDR hFunc = NULL;
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
|
|
|
TRACE("(%08x, %d, %08x, %p, %s, %p, %d, %p, %p)\n", dwCertEncodingType,
|
|
|
|
dwFormatType, dwFormatStrType, pFormatStruct, debugstr_a(lpszStructType),
|
|
|
|
pbEncoded, cbEncoded, pbFormat, pcbFormat);
|
|
|
|
|
2008-11-06 21:48:14 +00:00
|
|
|
if (!(format = CRYPT_GetBuiltinFormatFunction(dwCertEncodingType,
|
|
|
|
dwFormatStrType, lpszStructType)))
|
|
|
|
{
|
|
|
|
static HCRYPTOIDFUNCSET set = NULL;
|
|
|
|
|
|
|
|
if (!set)
|
|
|
|
set = CryptInitOIDFunctionSet(CRYPT_OID_FORMAT_OBJECT_FUNC, 0);
|
|
|
|
CryptGetOIDFunctionAddress(set, dwCertEncodingType, lpszStructType, 0,
|
|
|
|
(void **)&format, &hFunc);
|
|
|
|
}
|
2008-10-31 16:32:31 +00:00
|
|
|
if (format)
|
|
|
|
ret = format(dwCertEncodingType, dwFormatType, dwFormatStrType,
|
|
|
|
pFormatStruct, lpszStructType, pbEncoded, cbEncoded, pbFormat,
|
|
|
|
pcbFormat);
|
|
|
|
if (hFunc)
|
|
|
|
CryptFreeOIDFunctionAddress(hFunc, 0);
|
|
|
|
return ret;
|
|
|
|
}
|