mirror of
https://github.com/reactos/wine.git
synced 2024-11-25 04:39:45 +00:00
crypt32: Implement CryptSignAndEncodeCertificate.
This commit is contained in:
parent
a9436ea85f
commit
2868977995
@ -1198,33 +1198,116 @@ BOOL WINAPI CryptSignCertificate(HCRYPTPROV hCryptProv, DWORD dwKeySpec,
|
||||
const void *pvHashAuxInfo, BYTE *pbSignature, DWORD *pcbSignature)
|
||||
{
|
||||
BOOL ret;
|
||||
ALG_ID algID;
|
||||
PCCRYPT_OID_INFO info;
|
||||
HCRYPTHASH hHash;
|
||||
|
||||
TRACE("(%08lx, %ld, %ld, %p, %ld, %p, %p, %p, %p)\n", hCryptProv,
|
||||
dwKeySpec, dwCertEncodingType, pbEncodedToBeSigned, cbEncodedToBeSigned,
|
||||
pSignatureAlgorithm, pvHashAuxInfo, pbSignature, pcbSignature);
|
||||
|
||||
algID = CertOIDToAlgId(pSignatureAlgorithm->pszObjId);
|
||||
if (!algID)
|
||||
info = CryptFindOIDInfo(CRYPT_OID_INFO_OID_KEY,
|
||||
pSignatureAlgorithm->pszObjId, 0);
|
||||
if (!info)
|
||||
{
|
||||
SetLastError(NTE_BAD_ALGID);
|
||||
return FALSE;
|
||||
}
|
||||
if (!hCryptProv)
|
||||
if (info->dwGroupId == CRYPT_HASH_ALG_OID_GROUP_ID)
|
||||
{
|
||||
SetLastError(ERROR_INVALID_PARAMETER);
|
||||
return FALSE;
|
||||
if (!hCryptProv)
|
||||
hCryptProv = CRYPT_GetDefaultProvider();
|
||||
ret = CryptCreateHash(hCryptProv, info->Algid, 0, 0, &hHash);
|
||||
if (ret)
|
||||
{
|
||||
ret = CryptHashData(hHash, pbEncodedToBeSigned,
|
||||
cbEncodedToBeSigned, 0);
|
||||
if (ret)
|
||||
ret = CryptGetHashParam(hHash, HP_HASHVAL, pbSignature,
|
||||
pcbSignature, 0);
|
||||
CryptDestroyHash(hHash);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if (!hCryptProv)
|
||||
{
|
||||
SetLastError(ERROR_INVALID_PARAMETER);
|
||||
ret = FALSE;
|
||||
}
|
||||
else
|
||||
{
|
||||
ret = CryptCreateHash(hCryptProv, info->Algid, 0, 0, &hHash);
|
||||
if (ret)
|
||||
{
|
||||
ret = CryptHashData(hHash, pbEncodedToBeSigned,
|
||||
cbEncodedToBeSigned, 0);
|
||||
if (ret)
|
||||
ret = CryptSignHashW(hHash, dwKeySpec, NULL, 0, pbSignature,
|
||||
pcbSignature);
|
||||
CryptDestroyHash(hHash);
|
||||
}
|
||||
}
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = CryptCreateHash(hCryptProv, algID, 0, 0, &hHash);
|
||||
BOOL WINAPI CryptSignAndEncodeCertificate(HCRYPTPROV hCryptProv,
|
||||
DWORD dwKeySpec, DWORD dwCertEncodingType, LPCSTR lpszStructType,
|
||||
const void *pvStructInfo, PCRYPT_ALGORITHM_IDENTIFIER pSignatureAlgorithm,
|
||||
const void *pvHashAuxInfo, PBYTE pbEncoded, DWORD *pcbEncoded)
|
||||
{
|
||||
BOOL ret;
|
||||
DWORD encodedSize, hashSize;
|
||||
|
||||
TRACE("(%08lx, %ld, %ld, %s, %p, %p, %p, %p, %p)\n", hCryptProv, dwKeySpec,
|
||||
dwCertEncodingType, debugstr_a(lpszStructType), pvStructInfo,
|
||||
pSignatureAlgorithm, pvHashAuxInfo, pbEncoded, pcbEncoded);
|
||||
|
||||
ret = CryptEncodeObject(dwCertEncodingType, lpszStructType, pvStructInfo,
|
||||
NULL, &encodedSize);
|
||||
if (ret)
|
||||
{
|
||||
ret = CryptHashData(hHash, pbEncodedToBeSigned, cbEncodedToBeSigned, 0);
|
||||
if (ret)
|
||||
ret = CryptSignHashW(hHash, dwKeySpec, NULL, 0, pbSignature,
|
||||
pcbSignature);
|
||||
CryptDestroyHash(hHash);
|
||||
PBYTE encoded = CryptMemAlloc(encodedSize);
|
||||
|
||||
if (encoded)
|
||||
{
|
||||
ret = CryptEncodeObject(dwCertEncodingType, lpszStructType,
|
||||
pvStructInfo, encoded, &encodedSize);
|
||||
if (ret)
|
||||
{
|
||||
ret = CryptSignCertificate(hCryptProv, dwKeySpec,
|
||||
dwCertEncodingType, encoded, encodedSize, pSignatureAlgorithm,
|
||||
pvHashAuxInfo, NULL, &hashSize);
|
||||
if (ret)
|
||||
{
|
||||
PBYTE hash = CryptMemAlloc(hashSize);
|
||||
|
||||
if (hash)
|
||||
{
|
||||
ret = CryptSignCertificate(hCryptProv, dwKeySpec,
|
||||
dwCertEncodingType, encoded, encodedSize,
|
||||
pSignatureAlgorithm, pvHashAuxInfo, hash, &hashSize);
|
||||
if (ret)
|
||||
{
|
||||
CERT_SIGNED_CONTENT_INFO info = { { 0 } };
|
||||
|
||||
info.ToBeSigned.cbData = encodedSize;
|
||||
info.ToBeSigned.pbData = encoded;
|
||||
memcpy(&info.SignatureAlgorithm,
|
||||
pSignatureAlgorithm,
|
||||
sizeof(info.SignatureAlgorithm));
|
||||
info.Signature.cbData = hashSize;
|
||||
info.Signature.pbData = hash;
|
||||
info.Signature.cUnusedBits = 0;
|
||||
ret = CryptEncodeObject(dwCertEncodingType,
|
||||
X509_CERT, &info, pbEncoded, pcbEncoded);
|
||||
}
|
||||
CryptMemFree(hash);
|
||||
}
|
||||
}
|
||||
}
|
||||
CryptMemFree(encoded);
|
||||
}
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
@ -165,7 +165,7 @@
|
||||
@ stub CryptSetAsyncParam
|
||||
@ stdcall CryptSetOIDFunctionValue(long str str wstr long ptr long)
|
||||
@ stub CryptSetProviderU
|
||||
@ stub CryptSignAndEncodeCertificate
|
||||
@ stdcall CryptSignAndEncodeCertificate(long long long str ptr ptr ptr ptr ptr)
|
||||
@ stub CryptSignAndEncryptMessage
|
||||
@ stdcall CryptSignCertificate(long long long ptr long ptr ptr ptr ptr)
|
||||
@ stub CryptSignHashU
|
||||
|
@ -1061,6 +1061,97 @@ static void testCertSigs(void)
|
||||
CRYPT_DELETEKEYSET);
|
||||
}
|
||||
|
||||
static const BYTE md5SignedEmptyCert[] = {
|
||||
0x30,0x56,0x30,0x33,0x02,0x00,0x30,0x02,0x06,0x00,0x30,0x22,0x18,0x0f,0x31,0x36,
|
||||
0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,0x30,0x5a,0x18,0x0f,0x31,
|
||||
0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,0x30,0x5a,0x30,0x07,
|
||||
0x30,0x02,0x06,0x00,0x03,0x01,0x00,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,
|
||||
0x0d,0x02,0x05,0x05,0x00,0x03,0x11,0x00,0xfb,0x0f,0x66,0x82,0x66,0xd9,0xe5,0xf8,
|
||||
0xd8,0xa2,0x55,0x2b,0xe1,0xa5,0xd9,0x04 };
|
||||
static const BYTE md5SignedEmptyCertNoNull[] = {
|
||||
0x30,0x54,0x30,0x33,0x02,0x00,0x30,0x02,0x06,0x00,0x30,0x22,0x18,0x0f,0x31,0x36,
|
||||
0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,0x30,0x5a,0x18,0x0f,0x31,
|
||||
0x36,0x30,0x31,0x30,0x31,0x30,0x31,0x30,0x30,0x30,0x30,0x30,0x30,0x5a,0x30,0x07,
|
||||
0x30,0x02,0x06,0x00,0x03,0x01,0x00,0x30,0x0a,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,
|
||||
0x0d,0x02,0x05,0x03,0x11,0x00,0x04,0xd9,0xa5,0xe1,0x2b,0x55,0xa2,0xd8,0xf8,0xe5,
|
||||
0xd9,0x66,0x82,0x66,0x0f,0xfb };
|
||||
|
||||
static void testSignAndEncodeCert(void)
|
||||
{
|
||||
static char oid_rsa_md5rsa[] = szOID_RSA_MD5RSA;
|
||||
static char oid_rsa_md5[] = szOID_RSA_MD5;
|
||||
BOOL ret;
|
||||
DWORD size;
|
||||
CRYPT_ALGORITHM_IDENTIFIER algID = { 0 };
|
||||
CERT_INFO info = { 0 };
|
||||
|
||||
/* Crash
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, 0, NULL, NULL, NULL, NULL, NULL,
|
||||
NULL);
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, 0, NULL, NULL, NULL, NULL, NULL,
|
||||
&size);
|
||||
*/
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, 0, NULL, NULL, &algID, NULL, NULL,
|
||||
&size);
|
||||
ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
||||
"Expected ERROR_FILE_NOT_FOUND, got %08x\n", GetLastError());
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING, NULL, NULL,
|
||||
&algID, NULL, NULL, &size);
|
||||
ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
||||
"Expected ERROR_FILE_NOT_FOUND, got %08x\n", GetLastError());
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, 0, X509_CERT_TO_BE_SIGNED, NULL,
|
||||
&algID, NULL, NULL, &size);
|
||||
ok(!ret && GetLastError() == ERROR_FILE_NOT_FOUND,
|
||||
"Expected ERROR_FILE_NOT_FOUND, got %08x\n", GetLastError());
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING,
|
||||
X509_CERT_TO_BE_SIGNED, NULL, &algID, NULL, NULL, &size);
|
||||
ok(!ret && GetLastError() == STATUS_ACCESS_VIOLATION,
|
||||
"Expected STATUS_ACCESS_VIOLATION, got %08x\n", GetLastError());
|
||||
/* Crashes
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING,
|
||||
X509_CERT_TO_BE_SIGNED, &info, NULL, NULL, NULL, &size);
|
||||
*/
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING,
|
||||
X509_CERT_TO_BE_SIGNED, &info, &algID, NULL, NULL, &size);
|
||||
ok(!ret && GetLastError() == NTE_BAD_ALGID,
|
||||
"Expected NTE_BAD_ALGID, got %08x\n", GetLastError());
|
||||
algID.pszObjId = oid_rsa_md5rsa;
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING,
|
||||
X509_CERT_TO_BE_SIGNED, &info, &algID, NULL, NULL, &size);
|
||||
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
|
||||
"Expected ERROR_INVALID_PARAMETER, got %08x\n", GetLastError());
|
||||
algID.pszObjId = oid_rsa_md5;
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING,
|
||||
X509_CERT_TO_BE_SIGNED, &info, &algID, NULL, NULL, &size);
|
||||
ok(ret, "CryptSignAndEncodeCertificate failed: %08x\n", GetLastError());
|
||||
if (ret)
|
||||
{
|
||||
LPBYTE buf = HeapAlloc(GetProcessHeap(), 0, size);
|
||||
|
||||
if (buf)
|
||||
{
|
||||
ret = CryptSignAndEncodeCertificate(0, 0, X509_ASN_ENCODING,
|
||||
X509_CERT_TO_BE_SIGNED, &info, &algID, NULL, buf, &size);
|
||||
ok(ret, "CryptSignAndEncodeCertificate failed: %08x\n",
|
||||
GetLastError());
|
||||
/* Tricky: because the NULL parameters may either be omitted or
|
||||
* included as an asn.1-encoded NULL (0x05,0x00), two different
|
||||
* values are allowed.
|
||||
*/
|
||||
ok(size == sizeof(md5SignedEmptyCert) ||
|
||||
size == sizeof(md5SignedEmptyCertNoNull), "Unexpected size %d\n",
|
||||
size);
|
||||
if (size == sizeof(md5SignedEmptyCert))
|
||||
ok(!memcmp(buf, md5SignedEmptyCert, size),
|
||||
"Unexpected value\n");
|
||||
else if (size == sizeof(md5SignedEmptyCertNoNull))
|
||||
ok(!memcmp(buf, md5SignedEmptyCertNoNull, size),
|
||||
"Unexpected value\n");
|
||||
HeapFree(GetProcessHeap(), 0, buf);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static void testCreateSelfSignCert(void)
|
||||
{
|
||||
PCCERT_CONTEXT context;
|
||||
@ -1992,6 +2083,7 @@ START_TEST(cert)
|
||||
|
||||
testCryptHashCert();
|
||||
testCertSigs();
|
||||
testSignAndEncodeCert();
|
||||
testCreateSelfSignCert();
|
||||
testKeyUsage();
|
||||
testCompareCertName();
|
||||
|
Loading…
Reference in New Issue
Block a user