2005-12-02 11:28:09 +01:00
|
|
|
/*
|
|
|
|
* Copyright 2002 Mike McCormack for CodeWeavers
|
2006-02-23 22:18:13 +01:00
|
|
|
* Copyright 2005-2006 Juan Lang
|
2018-10-05 10:40:47 +02:00
|
|
|
* Copyright 2018 Dmitry Timoshkov
|
2005-12-02 11:28:09 +01:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
2006-05-18 14:49:52 +02:00
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
2005-12-02 11:28:09 +01:00
|
|
|
*/
|
2006-09-30 12:26:20 +02:00
|
|
|
|
2005-12-02 11:28:09 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdarg.h>
|
2020-11-09 11:41:21 +01:00
|
|
|
#include <stdlib.h>
|
2006-02-27 18:23:07 +01:00
|
|
|
#define NONAMELESSUNION
|
2005-12-02 11:28:09 +01:00
|
|
|
#include "windef.h"
|
|
|
|
#include "winbase.h"
|
2018-06-22 15:26:55 +02:00
|
|
|
#define CRYPT_OID_INFO_HAS_EXTRA_FIELDS
|
2005-12-02 11:28:09 +01:00
|
|
|
#include "wincrypt.h"
|
|
|
|
#include "winreg.h"
|
2019-04-03 18:20:30 +02:00
|
|
|
#include "winternl.h"
|
2006-02-23 22:18:13 +01:00
|
|
|
#include "winuser.h"
|
2005-12-02 11:28:09 +01:00
|
|
|
#include "wine/debug.h"
|
|
|
|
#include "wine/list.h"
|
|
|
|
#include "crypt32_private.h"
|
2006-02-23 22:18:13 +01:00
|
|
|
#include "cryptres.h"
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(crypt);
|
|
|
|
|
2006-06-12 13:45:11 +02:00
|
|
|
static CRITICAL_SECTION funcSetCS;
|
2007-05-25 01:42:45 +02:00
|
|
|
static CRITICAL_SECTION_DEBUG funcSetCSDebug =
|
|
|
|
{
|
|
|
|
0, 0, &funcSetCS,
|
|
|
|
{ &funcSetCSDebug.ProcessLocksList, &funcSetCSDebug.ProcessLocksList },
|
|
|
|
0, 0, { (DWORD_PTR)(__FILE__ ": funcSetCS") }
|
|
|
|
};
|
|
|
|
static CRITICAL_SECTION funcSetCS = { &funcSetCSDebug, -1, 0, 0, 0, 0 };
|
|
|
|
static struct list funcSets = { &funcSets, &funcSets };
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
struct OIDFunctionSet
|
|
|
|
{
|
|
|
|
LPSTR name;
|
|
|
|
CRITICAL_SECTION cs; /* protects functions */
|
|
|
|
struct list functions;
|
|
|
|
struct list next;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct OIDFunction
|
|
|
|
{
|
2018-10-31 13:43:08 +01:00
|
|
|
HMODULE hModule;
|
2005-12-02 11:28:09 +01:00
|
|
|
DWORD encoding;
|
|
|
|
CRYPT_OID_FUNC_ENTRY entry;
|
|
|
|
struct list next;
|
|
|
|
};
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
static const LPCWSTR LocalizedKeys[] =
|
|
|
|
{
|
|
|
|
L"ROOT",
|
|
|
|
L"MY",
|
|
|
|
L"CA",
|
|
|
|
L"ADDRESSBOOK",
|
|
|
|
L"TrustedPublisher",
|
|
|
|
L"Disallowed"
|
|
|
|
};
|
2018-06-20 09:37:55 +02:00
|
|
|
static WCHAR LocalizedNames[ARRAY_SIZE(LocalizedKeys)][256];
|
2008-01-06 17:02:33 +01:00
|
|
|
|
2006-02-23 22:18:13 +01:00
|
|
|
static void free_function_sets(void)
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
|
|
|
struct OIDFunctionSet *setCursor, *setNext;
|
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY_SAFE(setCursor, setNext, &funcSets,
|
|
|
|
struct OIDFunctionSet, next)
|
|
|
|
{
|
|
|
|
struct OIDFunction *functionCursor, *funcNext;
|
|
|
|
|
|
|
|
list_remove(&setCursor->next);
|
|
|
|
CryptMemFree(setCursor->name);
|
|
|
|
LIST_FOR_EACH_ENTRY_SAFE(functionCursor, funcNext,
|
|
|
|
&setCursor->functions, struct OIDFunction, next)
|
|
|
|
{
|
|
|
|
list_remove(&functionCursor->next);
|
|
|
|
CryptMemFree(functionCursor);
|
|
|
|
}
|
2007-03-10 22:08:02 +01:00
|
|
|
setCursor->cs.DebugInfo->Spare[0] = 0;
|
2005-12-02 11:28:09 +01:00
|
|
|
DeleteCriticalSection(&setCursor->cs);
|
2006-02-27 22:24:59 +01:00
|
|
|
CryptMemFree(setCursor);
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
2011-11-16 16:33:42 +01:00
|
|
|
DeleteCriticalSection(&funcSetCS);
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* There is no free function associated with this; therefore, the sets are
|
|
|
|
* freed when crypt32.dll is unloaded.
|
|
|
|
*/
|
|
|
|
HCRYPTOIDFUNCSET WINAPI CryptInitOIDFunctionSet(LPCSTR pszFuncName,
|
|
|
|
DWORD dwFlags)
|
|
|
|
{
|
|
|
|
struct OIDFunctionSet *cursor, *ret = NULL;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%s, %lx)\n", debugstr_a(pszFuncName), dwFlags);
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
EnterCriticalSection(&funcSetCS);
|
|
|
|
LIST_FOR_EACH_ENTRY(cursor, &funcSets, struct OIDFunctionSet, next)
|
|
|
|
{
|
2020-11-09 11:41:21 +01:00
|
|
|
if (!stricmp(pszFuncName, cursor->name))
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
2009-01-28 10:25:22 +01:00
|
|
|
ret = cursor;
|
2005-12-02 11:28:09 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
ret = CryptMemAlloc(sizeof(struct OIDFunctionSet));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
memset(ret, 0, sizeof(*ret));
|
|
|
|
ret->name = CryptMemAlloc(strlen(pszFuncName) + 1);
|
|
|
|
if (ret->name)
|
|
|
|
{
|
|
|
|
InitializeCriticalSection(&ret->cs);
|
2007-03-10 22:08:02 +01:00
|
|
|
ret->cs.DebugInfo->Spare[0] = (DWORD_PTR)(__FILE__ ": OIDFunctionSet.cs");
|
2005-12-02 11:28:09 +01:00
|
|
|
list_init(&ret->functions);
|
|
|
|
strcpy(ret->name, pszFuncName);
|
|
|
|
list_add_tail(&funcSets, &ret->next);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
CryptMemFree(ret);
|
|
|
|
ret = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&funcSetCS);
|
|
|
|
|
2009-01-28 10:25:22 +01:00
|
|
|
return ret;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static char *CRYPT_GetKeyName(DWORD dwEncodingType, LPCSTR pszFuncName,
|
|
|
|
LPCSTR pszOID)
|
|
|
|
{
|
|
|
|
static const char szEncodingTypeFmt[] =
|
2022-02-09 09:25:50 +01:00
|
|
|
"Software\\Microsoft\\Cryptography\\OID\\EncodingType %ld\\%s\\%s";
|
2005-12-02 11:28:09 +01:00
|
|
|
UINT len;
|
|
|
|
char numericOID[7]; /* enough for "#65535" */
|
|
|
|
const char *oid;
|
|
|
|
LPSTR szKey;
|
|
|
|
|
|
|
|
/* MSDN says the encoding type is a mask, but it isn't treated that way.
|
|
|
|
* (E.g., if dwEncodingType were 3, the key names "EncodingType 1" and
|
|
|
|
* "EncodingType 2" would be expected if it were a mask. Instead native
|
|
|
|
* stores values in "EncodingType 3".
|
|
|
|
*/
|
2010-01-29 01:39:26 +01:00
|
|
|
if (IS_INTOID(pszOID))
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
|
|
|
snprintf(numericOID, sizeof(numericOID), "#%d", LOWORD(pszOID));
|
|
|
|
oid = numericOID;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
oid = pszOID;
|
|
|
|
|
|
|
|
/* This is enough: the lengths of the two string parameters are explicitly
|
|
|
|
* counted, and we need up to five additional characters for the encoding
|
|
|
|
* type. These are covered by the "%d", "%s", and "%s" characters in the
|
|
|
|
* format specifier that are removed by sprintf.
|
|
|
|
*/
|
|
|
|
len = sizeof(szEncodingTypeFmt) + lstrlenA(pszFuncName) + lstrlenA(oid);
|
|
|
|
szKey = CryptMemAlloc(len);
|
|
|
|
if (szKey)
|
2007-08-09 22:18:05 +02:00
|
|
|
sprintf(szKey, szEncodingTypeFmt,
|
|
|
|
GET_CERT_ENCODING_TYPE(dwEncodingType), pszFuncName, oid);
|
2005-12-02 11:28:09 +01:00
|
|
|
return szKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptGetDefaultOIDDllList(HCRYPTOIDFUNCSET hFuncSet,
|
|
|
|
DWORD dwEncodingType, LPWSTR pwszDllList, DWORD *pcchDllList)
|
|
|
|
{
|
2009-01-28 10:25:22 +01:00
|
|
|
struct OIDFunctionSet *set = hFuncSet;
|
2005-12-02 11:28:09 +01:00
|
|
|
char *keyName;
|
|
|
|
HKEY key;
|
2009-06-03 09:44:55 +02:00
|
|
|
LSTATUS rc;
|
2005-12-02 11:28:09 +01:00
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%p, %ld, %p, %p)\n", hFuncSet, dwEncodingType, pwszDllList,
|
2005-12-02 11:28:09 +01:00
|
|
|
pcchDllList);
|
|
|
|
|
|
|
|
keyName = CRYPT_GetKeyName(dwEncodingType, set->name, "DEFAULT");
|
|
|
|
rc = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0,
|
|
|
|
KEY_READ, NULL, &key, NULL);
|
|
|
|
if (!rc)
|
|
|
|
{
|
|
|
|
DWORD size = *pcchDllList * sizeof(WCHAR);
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
rc = RegQueryValueExW(key, L"Dll", NULL, NULL, (LPBYTE)pwszDllList,
|
2005-12-02 11:28:09 +01:00
|
|
|
&size);
|
|
|
|
if (!rc)
|
|
|
|
*pcchDllList = size / sizeof(WCHAR);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* No value, return an empty list */
|
2007-10-17 18:34:14 +02:00
|
|
|
if (pwszDllList && *pcchDllList)
|
2005-12-02 11:28:09 +01:00
|
|
|
*pwszDllList = '\0';
|
|
|
|
*pcchDllList = 1;
|
|
|
|
}
|
|
|
|
RegCloseKey(key);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2007-10-17 18:34:14 +02:00
|
|
|
/* No value, return an empty list */
|
|
|
|
if (pwszDllList && *pcchDllList)
|
|
|
|
*pwszDllList = '\0';
|
|
|
|
*pcchDllList = 1;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
CryptMemFree(keyName);
|
|
|
|
|
2019-02-26 23:14:56 +01:00
|
|
|
return TRUE;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptInstallOIDFunctionAddress(HMODULE hModule,
|
|
|
|
DWORD dwEncodingType, LPCSTR pszFuncName, DWORD cFuncEntry,
|
|
|
|
const CRYPT_OID_FUNC_ENTRY rgFuncEntry[], DWORD dwFlags)
|
|
|
|
{
|
|
|
|
BOOL ret = TRUE;
|
|
|
|
struct OIDFunctionSet *set;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%p, %ld, %s, %ld, %p, %08lx)\n", hModule, dwEncodingType,
|
2005-12-02 11:28:09 +01:00
|
|
|
debugstr_a(pszFuncName), cFuncEntry, rgFuncEntry, dwFlags);
|
|
|
|
|
2009-01-28 10:25:22 +01:00
|
|
|
set = CryptInitOIDFunctionSet(pszFuncName, 0);
|
2005-12-02 11:28:09 +01:00
|
|
|
if (set)
|
|
|
|
{
|
|
|
|
DWORD i;
|
|
|
|
|
|
|
|
EnterCriticalSection(&set->cs);
|
|
|
|
for (i = 0; ret && i < cFuncEntry; i++)
|
|
|
|
{
|
|
|
|
struct OIDFunction *func;
|
|
|
|
|
2018-10-26 12:17:14 +02:00
|
|
|
TRACE("OID %s, func %p\n", debugstr_a(rgFuncEntry[i].pszOID), rgFuncEntry[i].pvFuncAddr);
|
|
|
|
|
2010-01-29 01:39:26 +01:00
|
|
|
if (!IS_INTOID(rgFuncEntry[i].pszOID))
|
2005-12-02 11:28:09 +01:00
|
|
|
func = CryptMemAlloc(sizeof(struct OIDFunction)
|
|
|
|
+ strlen(rgFuncEntry[i].pszOID) + 1);
|
|
|
|
else
|
|
|
|
func = CryptMemAlloc(sizeof(struct OIDFunction));
|
|
|
|
if (func)
|
|
|
|
{
|
2007-08-09 22:18:05 +02:00
|
|
|
func->encoding = GET_CERT_ENCODING_TYPE(dwEncodingType);
|
2010-01-29 01:39:26 +01:00
|
|
|
if (!IS_INTOID(rgFuncEntry[i].pszOID))
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
2006-10-25 21:38:54 +02:00
|
|
|
LPSTR oid;
|
|
|
|
|
|
|
|
oid = (LPSTR)((LPBYTE)func + sizeof(*func));
|
|
|
|
strcpy(oid, rgFuncEntry[i].pszOID);
|
|
|
|
func->entry.pszOID = oid;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
func->entry.pszOID = rgFuncEntry[i].pszOID;
|
|
|
|
func->entry.pvFuncAddr = rgFuncEntry[i].pvFuncAddr;
|
2018-10-31 13:43:08 +01:00
|
|
|
func->hModule = hModule;
|
2005-12-02 11:28:09 +01:00
|
|
|
list_add_tail(&set->functions, &func->next);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&set->cs);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ret = FALSE;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2007-10-17 18:30:33 +02:00
|
|
|
struct FuncAddr
|
|
|
|
{
|
|
|
|
HMODULE lib;
|
2007-10-17 18:32:04 +02:00
|
|
|
LPWSTR dllList;
|
|
|
|
LPWSTR currentDll;
|
2007-10-17 18:30:33 +02:00
|
|
|
};
|
|
|
|
|
2005-12-02 11:28:09 +01:00
|
|
|
static BOOL CRYPT_GetFuncFromReg(DWORD dwEncodingType, LPCSTR pszOID,
|
|
|
|
LPCSTR szFuncName, LPVOID *ppvFuncAddr, HCRYPTOIDFUNCADDR *phFuncAddr)
|
|
|
|
{
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
char *keyName;
|
|
|
|
const char *funcName;
|
|
|
|
HKEY key;
|
2009-06-03 09:44:55 +02:00
|
|
|
LSTATUS rc;
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
keyName = CRYPT_GetKeyName(dwEncodingType, szFuncName, pszOID);
|
|
|
|
rc = RegOpenKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, KEY_READ, &key);
|
|
|
|
if (!rc)
|
|
|
|
{
|
|
|
|
DWORD type, size = 0;
|
|
|
|
|
|
|
|
rc = RegQueryValueExA(key, "FuncName", NULL, &type, NULL, &size);
|
2007-08-09 22:18:05 +02:00
|
|
|
if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
|
|
|
funcName = CryptMemAlloc(size);
|
|
|
|
rc = RegQueryValueExA(key, "FuncName", NULL, &type,
|
|
|
|
(LPBYTE)funcName, &size);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
funcName = szFuncName;
|
2020-11-09 11:41:52 +01:00
|
|
|
rc = RegQueryValueExW(key, L"Dll", NULL, &type, NULL, &size);
|
2007-08-09 22:18:05 +02:00
|
|
|
if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
|
|
|
LPWSTR dllName = CryptMemAlloc(size);
|
|
|
|
|
|
|
|
if (dllName)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
rc = RegQueryValueExW(key, L"Dll", NULL, NULL,
|
2005-12-02 11:28:09 +01:00
|
|
|
(LPBYTE)dllName, &size);
|
|
|
|
if (!rc)
|
|
|
|
{
|
|
|
|
HMODULE lib;
|
|
|
|
|
|
|
|
/* This is a bit of a hack; MSDN describes a more
|
|
|
|
* complicated unload routine than this will allow.
|
|
|
|
* Still, this seems to suffice for now.
|
|
|
|
*/
|
|
|
|
lib = LoadLibraryW(dllName);
|
|
|
|
if (lib)
|
|
|
|
{
|
2007-08-09 22:18:05 +02:00
|
|
|
*ppvFuncAddr = GetProcAddress(lib, funcName);
|
2005-12-02 11:28:09 +01:00
|
|
|
if (*ppvFuncAddr)
|
|
|
|
{
|
2007-10-17 18:30:33 +02:00
|
|
|
struct FuncAddr *addr =
|
|
|
|
CryptMemAlloc(sizeof(struct FuncAddr));
|
|
|
|
|
|
|
|
if (addr)
|
|
|
|
{
|
|
|
|
addr->lib = lib;
|
2007-10-17 18:32:04 +02:00
|
|
|
addr->dllList = addr->currentDll = NULL;
|
2007-10-17 18:30:33 +02:00
|
|
|
*phFuncAddr = addr;
|
|
|
|
ret = TRUE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*phFuncAddr = NULL;
|
|
|
|
FreeLibrary(lib);
|
|
|
|
}
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Unload the library, the caller doesn't want
|
|
|
|
* to unload it when the return value is NULL.
|
|
|
|
*/
|
|
|
|
FreeLibrary(lib);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
SetLastError(rc);
|
|
|
|
CryptMemFree(dllName);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
SetLastError(rc);
|
|
|
|
if (funcName != szFuncName)
|
|
|
|
CryptMemFree((char *)funcName);
|
|
|
|
RegCloseKey(key);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
SetLastError(rc);
|
|
|
|
CryptMemFree(keyName);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptGetOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
|
|
|
|
DWORD dwEncodingType, LPCSTR pszOID, DWORD dwFlags, void **ppvFuncAddr,
|
|
|
|
HCRYPTOIDFUNCADDR *phFuncAddr)
|
|
|
|
{
|
|
|
|
BOOL ret = FALSE;
|
2009-01-28 10:25:22 +01:00
|
|
|
struct OIDFunctionSet *set = hFuncSet;
|
2005-12-02 11:28:09 +01:00
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%p, %ld, %s, %08lx, %p, %p)\n", hFuncSet, dwEncodingType,
|
2005-12-02 11:28:09 +01:00
|
|
|
debugstr_a(pszOID), dwFlags, ppvFuncAddr, phFuncAddr);
|
|
|
|
|
|
|
|
*ppvFuncAddr = NULL;
|
|
|
|
if (!(dwFlags & CRYPT_GET_INSTALLED_OID_FUNC_FLAG))
|
|
|
|
{
|
|
|
|
struct OIDFunction *function;
|
|
|
|
|
|
|
|
EnterCriticalSection(&set->cs);
|
|
|
|
LIST_FOR_EACH_ENTRY(function, &set->functions, struct OIDFunction, next)
|
|
|
|
{
|
2007-08-09 22:18:05 +02:00
|
|
|
if (function->encoding == GET_CERT_ENCODING_TYPE(dwEncodingType))
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
2010-01-29 01:39:26 +01:00
|
|
|
if (!IS_INTOID(pszOID))
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
2010-01-29 01:39:26 +01:00
|
|
|
if (!IS_INTOID(function->entry.pszOID) &&
|
2020-11-09 11:41:21 +01:00
|
|
|
!stricmp(function->entry.pszOID, pszOID))
|
2005-12-02 11:28:09 +01:00
|
|
|
{
|
|
|
|
*ppvFuncAddr = function->entry.pvFuncAddr;
|
|
|
|
*phFuncAddr = NULL; /* FIXME: what should it be? */
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (function->entry.pszOID == pszOID)
|
|
|
|
{
|
|
|
|
*ppvFuncAddr = function->entry.pvFuncAddr;
|
|
|
|
*phFuncAddr = NULL; /* FIXME: what should it be? */
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&set->cs);
|
|
|
|
}
|
|
|
|
if (!*ppvFuncAddr)
|
|
|
|
ret = CRYPT_GetFuncFromReg(dwEncodingType, pszOID, set->name,
|
|
|
|
ppvFuncAddr, phFuncAddr);
|
2007-08-09 22:18:05 +02:00
|
|
|
TRACE("returning %d\n", ret);
|
2005-12-02 11:28:09 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-10-31 13:43:08 +01:00
|
|
|
static BOOL is_module_registered(HMODULE hModule)
|
|
|
|
{
|
|
|
|
struct OIDFunctionSet *set;
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
|
|
|
EnterCriticalSection(&funcSetCS);
|
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY(set, &funcSets, struct OIDFunctionSet, next)
|
|
|
|
{
|
|
|
|
struct OIDFunction *function;
|
|
|
|
|
|
|
|
EnterCriticalSection(&set->cs);
|
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY(function, &set->functions, struct OIDFunction, next)
|
|
|
|
{
|
|
|
|
if (function->hModule == hModule)
|
|
|
|
{
|
|
|
|
ret = TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
LeaveCriticalSection(&set->cs);
|
|
|
|
|
|
|
|
if (ret) break;
|
|
|
|
}
|
|
|
|
|
|
|
|
LeaveCriticalSection(&funcSetCS);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-12-02 11:28:09 +01:00
|
|
|
BOOL WINAPI CryptFreeOIDFunctionAddress(HCRYPTOIDFUNCADDR hFuncAddr,
|
|
|
|
DWORD dwFlags)
|
|
|
|
{
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%p, %08lx)\n", hFuncAddr, dwFlags);
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
/* FIXME: as MSDN states, need to check for DllCanUnloadNow in the DLL,
|
|
|
|
* and only unload it if it can be unloaded. Also need to implement ref
|
|
|
|
* counting on the functions.
|
|
|
|
*/
|
2007-10-17 18:30:33 +02:00
|
|
|
if (hFuncAddr)
|
|
|
|
{
|
2009-01-28 10:25:22 +01:00
|
|
|
struct FuncAddr *addr = hFuncAddr;
|
2007-10-17 18:30:33 +02:00
|
|
|
|
2018-10-31 13:43:08 +01:00
|
|
|
if (!is_module_registered(addr->lib))
|
|
|
|
{
|
|
|
|
CryptMemFree(addr->dllList);
|
|
|
|
FreeLibrary(addr->lib);
|
|
|
|
CryptMemFree(addr);
|
|
|
|
}
|
2007-10-17 18:30:33 +02:00
|
|
|
}
|
2005-12-02 11:28:09 +01:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2007-10-17 18:32:04 +02:00
|
|
|
static BOOL CRYPT_GetFuncFromDll(LPCWSTR dll, LPCSTR func, HMODULE *lib,
|
|
|
|
void **ppvFuncAddr)
|
|
|
|
{
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
|
|
|
*lib = LoadLibraryW(dll);
|
|
|
|
if (*lib)
|
|
|
|
{
|
|
|
|
*ppvFuncAddr = GetProcAddress(*lib, func);
|
|
|
|
if (*ppvFuncAddr)
|
|
|
|
ret = TRUE;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FreeLibrary(*lib);
|
|
|
|
*lib = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-12-02 11:28:09 +01:00
|
|
|
BOOL WINAPI CryptGetDefaultOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
|
2007-10-15 10:12:26 +02:00
|
|
|
DWORD dwEncodingType, LPCWSTR pwszDll, DWORD dwFlags, void **ppvFuncAddr,
|
2005-12-02 11:28:09 +01:00
|
|
|
HCRYPTOIDFUNCADDR *phFuncAddr)
|
|
|
|
{
|
2009-01-28 10:25:22 +01:00
|
|
|
struct OIDFunctionSet *set = hFuncSet;
|
2007-10-17 18:32:04 +02:00
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%p, %ld, %s, %08lx, %p, %p)\n", hFuncSet, dwEncodingType,
|
2005-12-02 11:28:09 +01:00
|
|
|
debugstr_w(pwszDll), dwFlags, ppvFuncAddr, phFuncAddr);
|
2007-10-17 18:32:04 +02:00
|
|
|
|
|
|
|
if (pwszDll)
|
|
|
|
{
|
|
|
|
HMODULE lib;
|
|
|
|
|
|
|
|
*phFuncAddr = NULL;
|
|
|
|
ret = CRYPT_GetFuncFromDll(pwszDll, set->name, &lib, ppvFuncAddr);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
struct FuncAddr *addr = CryptMemAlloc(sizeof(struct FuncAddr));
|
|
|
|
|
|
|
|
if (addr)
|
|
|
|
{
|
|
|
|
addr->lib = lib;
|
|
|
|
addr->dllList = addr->currentDll = NULL;
|
|
|
|
*phFuncAddr = addr;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FreeLibrary(lib);
|
|
|
|
*ppvFuncAddr = NULL;
|
|
|
|
SetLastError(ERROR_OUTOFMEMORY);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
SetLastError(ERROR_FILE_NOT_FOUND);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-01-28 10:25:22 +01:00
|
|
|
struct FuncAddr *addr = *phFuncAddr;
|
2007-10-17 18:32:04 +02:00
|
|
|
|
|
|
|
if (!addr)
|
|
|
|
{
|
|
|
|
DWORD size;
|
|
|
|
|
|
|
|
ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType, NULL,
|
|
|
|
&size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
LPWSTR dllList = CryptMemAlloc(size * sizeof(WCHAR));
|
|
|
|
|
|
|
|
if (dllList)
|
|
|
|
{
|
|
|
|
ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType,
|
|
|
|
dllList, &size);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
addr = CryptMemAlloc(sizeof(struct FuncAddr));
|
|
|
|
if (addr)
|
|
|
|
{
|
|
|
|
addr->dllList = dllList;
|
|
|
|
addr->currentDll = dllList;
|
|
|
|
addr->lib = NULL;
|
|
|
|
*phFuncAddr = addr;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
CryptMemFree(dllList);
|
|
|
|
SetLastError(ERROR_OUTOFMEMORY);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_OUTOFMEMORY);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (addr)
|
|
|
|
{
|
|
|
|
if (!*addr->currentDll)
|
|
|
|
{
|
|
|
|
CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
|
|
|
|
SetLastError(ERROR_FILE_NOT_FOUND);
|
|
|
|
*phFuncAddr = NULL;
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* FIXME: as elsewhere, can't free until DllCanUnloadNow says
|
|
|
|
* it's possible, and should defer unloading for some time to
|
|
|
|
* avoid repeated LoadLibrary/FreeLibrary on the same dll.
|
|
|
|
*/
|
|
|
|
FreeLibrary(addr->lib);
|
|
|
|
ret = CRYPT_GetFuncFromDll(addr->currentDll, set->name,
|
|
|
|
&addr->lib, ppvFuncAddr);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
/* Move past the current DLL */
|
|
|
|
addr->currentDll += lstrlenW(addr->currentDll) + 1;
|
|
|
|
*phFuncAddr = addr;
|
|
|
|
}
|
|
|
|
else
|
2007-10-19 06:52:06 +02:00
|
|
|
{
|
|
|
|
CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
|
2007-10-17 18:32:04 +02:00
|
|
|
SetLastError(ERROR_FILE_NOT_FOUND);
|
2007-10-19 06:52:06 +02:00
|
|
|
*phFuncAddr = NULL;
|
|
|
|
}
|
2007-10-17 18:32:04 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
|
2006-09-07 15:07:40 +02:00
|
|
|
/***********************************************************************
|
|
|
|
* CryptRegisterOIDFunction (CRYPT32.@)
|
|
|
|
*
|
|
|
|
* Register the DLL and the functions it uses to cover the combination
|
2011-07-30 12:03:08 +02:00
|
|
|
* of encoding type, function name and OID.
|
2006-09-07 15:07:40 +02:00
|
|
|
*
|
|
|
|
* PARAMS
|
|
|
|
* dwEncodingType [I] Encoding type to be used.
|
|
|
|
* pszFuncName [I] Name of the function to be registered.
|
|
|
|
* pszOID [I] OID of the function (numeric or string).
|
|
|
|
* pwszDll [I] The DLL that is to be registered.
|
|
|
|
* pszOverrideFuncName [I] Name of the function in the DLL.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: TRUE.
|
|
|
|
* Failure: FALSE. (Look at GetLastError()).
|
|
|
|
*
|
|
|
|
* NOTES
|
|
|
|
* Registry errors are always reported via SetLastError().
|
|
|
|
*/
|
2005-12-02 11:28:09 +01:00
|
|
|
BOOL WINAPI CryptRegisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
|
|
|
|
LPCSTR pszOID, LPCWSTR pwszDll, LPCSTR pszOverrideFuncName)
|
|
|
|
{
|
|
|
|
LONG r;
|
|
|
|
HKEY hKey;
|
|
|
|
LPSTR szKey;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%lx, %s, %s, %s, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
|
2011-09-19 23:26:49 +02:00
|
|
|
debugstr_a(pszOID), debugstr_w(pwszDll), debugstr_a(pszOverrideFuncName));
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
/* Native does nothing pwszDll is NULL */
|
|
|
|
if (!pwszDll)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
/* I'm not matching MS bug for bug here, because I doubt any app depends on
|
|
|
|
* it: native "succeeds" if pszFuncName is NULL, but the nonsensical entry
|
|
|
|
* it creates would never be used.
|
|
|
|
*/
|
|
|
|
if (!pszFuncName || !pszOID)
|
|
|
|
{
|
2006-05-11 18:48:01 +02:00
|
|
|
SetLastError(E_INVALIDARG);
|
2005-12-02 11:28:09 +01:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
|
|
|
|
TRACE("Key name is %s\n", debugstr_a(szKey));
|
|
|
|
|
|
|
|
if (!szKey)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
r = RegCreateKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
|
|
|
|
CryptMemFree(szKey);
|
2006-09-06 15:48:00 +02:00
|
|
|
|
2006-09-07 15:08:14 +02:00
|
|
|
if (r != ERROR_SUCCESS) goto error_close_key;
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
/* write the values */
|
|
|
|
if (pszOverrideFuncName)
|
2006-09-06 15:48:00 +02:00
|
|
|
{
|
|
|
|
r = RegSetValueExA(hKey, "FuncName", 0, REG_SZ,
|
|
|
|
(const BYTE*)pszOverrideFuncName, lstrlenA(pszOverrideFuncName) + 1);
|
2006-09-07 15:08:14 +02:00
|
|
|
if (r != ERROR_SUCCESS) goto error_close_key;
|
2006-09-06 15:48:00 +02:00
|
|
|
}
|
2020-11-09 11:41:52 +01:00
|
|
|
r = RegSetValueExW(hKey, L"Dll", 0, REG_SZ, (const BYTE*) pwszDll,
|
2006-09-06 15:48:00 +02:00
|
|
|
(lstrlenW(pwszDll) + 1) * sizeof (WCHAR));
|
2006-09-07 15:08:14 +02:00
|
|
|
|
|
|
|
error_close_key:
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
RegCloseKey(hKey);
|
2006-09-07 15:08:14 +02:00
|
|
|
|
|
|
|
if (r != ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
SetLastError(r);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2005-12-02 11:28:09 +01:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2018-10-05 10:40:47 +02:00
|
|
|
/***********************************************************************
|
|
|
|
* CryptUnregisterOIDInfo (CRYPT32.@)
|
|
|
|
*/
|
|
|
|
BOOL WINAPI CryptUnregisterOIDInfo(PCCRYPT_OID_INFO info)
|
|
|
|
{
|
|
|
|
char *key_name;
|
|
|
|
HKEY root;
|
|
|
|
DWORD err;
|
|
|
|
|
|
|
|
TRACE("(%p)\n", info);
|
|
|
|
|
|
|
|
if (!info || info->cbSize != sizeof(*info) || !info->pszOID)
|
|
|
|
{
|
|
|
|
SetLastError(E_INVALIDARG);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegOpenKeyExW(HKEY_LOCAL_MACHINE, L"Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptDllFindOIDInfo", 0, KEY_ALL_ACCESS, &root);
|
2018-10-05 10:40:47 +02:00
|
|
|
if (err != ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
SetLastError(err);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
key_name = CryptMemAlloc(strlen(info->pszOID) + 16);
|
|
|
|
if (key_name)
|
|
|
|
{
|
2022-02-09 09:25:50 +01:00
|
|
|
sprintf(key_name, "%s!%lu", info->pszOID, info->dwGroupId);
|
2018-10-05 10:40:47 +02:00
|
|
|
err = RegDeleteKeyA(root, key_name);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
err = ERROR_OUTOFMEMORY;
|
|
|
|
|
|
|
|
CryptMemFree(key_name);
|
|
|
|
RegCloseKey(root);
|
|
|
|
|
|
|
|
if (err)
|
|
|
|
SetLastError(err);
|
|
|
|
|
|
|
|
return !err;
|
|
|
|
}
|
|
|
|
|
2009-06-20 10:08:46 +02:00
|
|
|
/***********************************************************************
|
|
|
|
* CryptRegisterOIDInfo (CRYPT32.@)
|
|
|
|
*/
|
2018-10-05 10:41:36 +02:00
|
|
|
BOOL WINAPI CryptRegisterOIDInfo(PCCRYPT_OID_INFO info, DWORD flags)
|
2009-06-20 10:08:46 +02:00
|
|
|
{
|
2018-10-05 10:41:36 +02:00
|
|
|
char *key_name;
|
|
|
|
HKEY root = 0, key = 0;
|
|
|
|
DWORD err;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%p, %lx)\n", info, flags );
|
2018-10-05 10:41:36 +02:00
|
|
|
|
|
|
|
if (!info || info->cbSize != sizeof(*info) || !info->pszOID)
|
|
|
|
{
|
|
|
|
SetLastError(E_INVALIDARG);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!info->dwGroupId) return TRUE;
|
|
|
|
|
|
|
|
key_name = CryptMemAlloc(strlen(info->pszOID) + 16);
|
|
|
|
if (!key_name)
|
|
|
|
{
|
|
|
|
err = ERROR_OUTOFMEMORY;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegCreateKeyExW(HKEY_LOCAL_MACHINE, L"Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptDllFindOIDInfo",
|
2018-10-05 10:41:36 +02:00
|
|
|
0, NULL, 0, KEY_ALL_ACCESS, NULL, &root, NULL);
|
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
sprintf(key_name, "%s!%lu", info->pszOID, info->dwGroupId);
|
2018-10-05 10:41:36 +02:00
|
|
|
err = RegCreateKeyA(root, key_name, &key);
|
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
|
|
|
|
if (flags)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegSetValueExW(key, L"Flags", 0, REG_DWORD, (const BYTE *)&flags, sizeof(flags));
|
2018-10-05 10:41:36 +02:00
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->pwszName)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegSetValueExW(key, L"Name", 0, REG_SZ, (const BYTE *)info->pwszName, (lstrlenW(info->pwszName) + 1) * sizeof(WCHAR));
|
2018-10-05 10:41:36 +02:00
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->u.Algid)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegSetValueExW(key, L"Algid", 0, REG_DWORD, (const BYTE *)&info->u.Algid, sizeof(info->u.Algid));
|
2018-10-05 10:41:36 +02:00
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->ExtraInfo.cbData && info->ExtraInfo.pbData)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegSetValueExW(key, L"ExtraInfo", 0, REG_BINARY, info->ExtraInfo.pbData, info->ExtraInfo.cbData);
|
2018-10-05 10:41:36 +02:00
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->pwszCNGAlgid)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegSetValueExW(key, L"CNGAlgid", 0, REG_SZ, (const BYTE *)info->pwszCNGAlgid, (lstrlenW(info->pwszCNGAlgid) + 1) * sizeof(WCHAR));
|
2018-10-05 10:41:36 +02:00
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->pwszCNGExtraAlgid)
|
|
|
|
{
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegSetValueExW(key, L"CNGExtraAlgid", 0, REG_SZ, (const BYTE *)info->pwszCNGExtraAlgid, (lstrlenW(info->pwszCNGExtraAlgid) + 1) * sizeof(WCHAR));
|
2018-10-05 10:41:36 +02:00
|
|
|
if (err != ERROR_SUCCESS) goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
CryptMemFree(key_name);
|
|
|
|
if (key) RegCloseKey(key);
|
|
|
|
if (root) RegCloseKey(root);
|
|
|
|
|
|
|
|
if (err)
|
|
|
|
SetLastError(err);
|
|
|
|
|
|
|
|
return !err;
|
2009-06-20 10:08:46 +02:00
|
|
|
}
|
|
|
|
|
2006-11-12 20:23:28 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* CryptUnregisterOIDFunction (CRYPT32.@)
|
|
|
|
*/
|
2005-12-02 11:28:09 +01:00
|
|
|
BOOL WINAPI CryptUnregisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
|
|
|
|
LPCSTR pszOID)
|
|
|
|
{
|
|
|
|
LPSTR szKey;
|
|
|
|
LONG rc;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("%lx %s %s\n", dwEncodingType, debugstr_a(pszFuncName),
|
2007-10-17 18:32:32 +02:00
|
|
|
debugstr_a(pszOID));
|
2005-12-02 11:28:09 +01:00
|
|
|
|
|
|
|
if (!pszFuncName || !pszOID)
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_PARAMETER);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
|
|
|
|
rc = RegDeleteKeyA(HKEY_LOCAL_MACHINE, szKey);
|
|
|
|
CryptMemFree(szKey);
|
|
|
|
if (rc)
|
|
|
|
SetLastError(rc);
|
2012-08-06 11:19:22 +02:00
|
|
|
return !rc;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptGetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
|
|
|
|
LPCSTR pszOID, LPCWSTR pwszValueName, DWORD *pdwValueType, BYTE *pbValueData,
|
|
|
|
DWORD *pcbValueData)
|
|
|
|
{
|
|
|
|
LPSTR szKey;
|
|
|
|
LONG rc;
|
|
|
|
HKEY hKey;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("%lx %s %s %s %p %p %p\n", dwEncodingType, debugstr_a(pszFuncName),
|
2005-12-02 11:28:09 +01:00
|
|
|
debugstr_a(pszOID), debugstr_w(pwszValueName), pdwValueType, pbValueData,
|
|
|
|
pcbValueData);
|
|
|
|
|
|
|
|
if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
if (!pszFuncName || !pszOID || !pwszValueName)
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_PARAMETER);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
|
|
|
|
rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
|
|
|
|
CryptMemFree(szKey);
|
|
|
|
if (rc)
|
|
|
|
SetLastError(rc);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
rc = RegQueryValueExW(hKey, pwszValueName, NULL, pdwValueType,
|
|
|
|
pbValueData, pcbValueData);
|
|
|
|
if (rc)
|
|
|
|
SetLastError(rc);
|
|
|
|
RegCloseKey(hKey);
|
|
|
|
}
|
2012-08-06 11:19:22 +02:00
|
|
|
return !rc;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptSetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
|
|
|
|
LPCSTR pszOID, LPCWSTR pwszValueName, DWORD dwValueType,
|
|
|
|
const BYTE *pbValueData, DWORD cbValueData)
|
|
|
|
{
|
|
|
|
LPSTR szKey;
|
|
|
|
LONG rc;
|
|
|
|
HKEY hKey;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("%lx %s %s %s %ld %p %ld\n", dwEncodingType, debugstr_a(pszFuncName),
|
2005-12-02 11:28:09 +01:00
|
|
|
debugstr_a(pszOID), debugstr_w(pwszValueName), dwValueType, pbValueData,
|
|
|
|
cbValueData);
|
|
|
|
|
|
|
|
if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
if (!pszFuncName || !pszOID || !pwszValueName)
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_INVALID_PARAMETER);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
|
|
|
|
rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
|
|
|
|
CryptMemFree(szKey);
|
|
|
|
if (rc)
|
|
|
|
SetLastError(rc);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
rc = RegSetValueExW(hKey, pwszValueName, 0, dwValueType, pbValueData,
|
|
|
|
cbValueData);
|
|
|
|
if (rc)
|
|
|
|
SetLastError(rc);
|
|
|
|
RegCloseKey(hKey);
|
|
|
|
}
|
2012-08-06 11:19:22 +02:00
|
|
|
return !rc;
|
2005-12-02 11:28:09 +01:00
|
|
|
}
|
2006-02-23 01:26:52 +01:00
|
|
|
|
2006-08-09 21:17:10 +02:00
|
|
|
static LPCWSTR CRYPT_FindStringInMultiString(LPCWSTR multi, LPCWSTR toFind)
|
|
|
|
{
|
|
|
|
LPCWSTR ret = NULL, ptr;
|
|
|
|
|
|
|
|
for (ptr = multi; ptr && *ptr && !ret; ptr += lstrlenW(ptr) + 1)
|
|
|
|
{
|
|
|
|
if (!lstrcmpiW(ptr, toFind))
|
|
|
|
ret = ptr;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DWORD CRYPT_GetMultiStringCharacterLen(LPCWSTR multi)
|
|
|
|
{
|
|
|
|
DWORD ret;
|
|
|
|
|
|
|
|
if (multi)
|
|
|
|
{
|
|
|
|
LPCWSTR ptr;
|
|
|
|
|
|
|
|
/* Count terminating empty string */
|
|
|
|
ret = 1;
|
|
|
|
for (ptr = multi; *ptr; ptr += lstrlenW(ptr) + 1)
|
|
|
|
ret += lstrlenW(ptr) + 1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ret = 0;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static LPWSTR CRYPT_AddStringToMultiString(LPWSTR multi, LPCWSTR toAdd,
|
|
|
|
DWORD index)
|
|
|
|
{
|
|
|
|
LPWSTR ret;
|
|
|
|
|
|
|
|
if (!multi)
|
|
|
|
{
|
|
|
|
/* FIXME: ignoring index, is that okay? */
|
|
|
|
ret = CryptMemAlloc((lstrlenW(toAdd) + 2) * sizeof(WCHAR));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
/* copy string, including NULL terminator */
|
|
|
|
memcpy(ret, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
|
|
|
|
/* add terminating empty string */
|
|
|
|
*(ret + lstrlenW(toAdd) + 1) = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
|
|
|
|
|
|
|
|
ret = CryptMemRealloc(multi, (len + lstrlenW(toAdd) + 1) *
|
|
|
|
sizeof(WCHAR));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
LPWSTR spotToAdd;
|
|
|
|
|
|
|
|
if (index == CRYPT_REGISTER_LAST_INDEX)
|
|
|
|
spotToAdd = ret + len - 1;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
DWORD i;
|
|
|
|
|
|
|
|
/* FIXME: if index is too large for the string, toAdd is
|
|
|
|
* added to the end. Is that okay?
|
|
|
|
*/
|
|
|
|
for (i = 0, spotToAdd = ret; i < index && *spotToAdd;
|
|
|
|
spotToAdd += lstrlenW(spotToAdd) + 1)
|
|
|
|
;
|
|
|
|
}
|
|
|
|
if (spotToAdd)
|
|
|
|
{
|
|
|
|
/* Copy existing string "right" */
|
|
|
|
memmove(spotToAdd + lstrlenW(toAdd) + 1, spotToAdd,
|
|
|
|
(len - (spotToAdd - ret)) * sizeof(WCHAR));
|
|
|
|
/* Copy new string */
|
|
|
|
memcpy(spotToAdd, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
CryptMemFree(ret);
|
|
|
|
ret = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_RemoveStringFromMultiString(LPWSTR multi, LPCWSTR toRemove)
|
|
|
|
{
|
|
|
|
LPWSTR spotToRemove = (LPWSTR)CRYPT_FindStringInMultiString(multi,
|
|
|
|
toRemove);
|
|
|
|
BOOL ret;
|
|
|
|
|
|
|
|
if (spotToRemove)
|
|
|
|
{
|
|
|
|
DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
|
|
|
|
|
2009-11-05 01:29:33 +01:00
|
|
|
if (spotToRemove + lstrlenW(toRemove) + 2 >= multi + len)
|
|
|
|
{
|
|
|
|
/* Removing last string in list, terminate multi string directly */
|
|
|
|
*spotToRemove = 0;
|
|
|
|
*(spotToRemove + 1) = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-11-29 20:42:57 +01:00
|
|
|
LPCWSTR nextStr = spotToRemove + lstrlenW(toRemove) + 1;
|
|
|
|
|
2009-11-05 01:29:33 +01:00
|
|
|
/* Copy remainder of string "left" */
|
2009-11-29 20:42:57 +01:00
|
|
|
memmove(spotToRemove, nextStr,
|
|
|
|
(len - (nextStr - multi)) * sizeof(WCHAR));
|
2009-11-05 01:29:33 +01:00
|
|
|
}
|
2006-08-09 21:17:10 +02:00
|
|
|
ret = TRUE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
SetLastError(ERROR_FILE_NOT_FOUND);
|
|
|
|
ret = FALSE;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static BOOL CRYPT_GetDefaultOIDKey(DWORD dwEncodingType, LPCSTR pszFuncName,
|
|
|
|
PHKEY key)
|
|
|
|
{
|
|
|
|
LPSTR keyName;
|
|
|
|
LONG r;
|
|
|
|
|
|
|
|
keyName = CRYPT_GetKeyName(dwEncodingType, pszFuncName, "DEFAULT");
|
|
|
|
TRACE("Key name is %s\n", debugstr_a(keyName));
|
|
|
|
|
|
|
|
if (!keyName)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
r = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0, KEY_ALL_ACCESS,
|
|
|
|
NULL, key, NULL);
|
|
|
|
CryptMemFree(keyName);
|
|
|
|
if (r != ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
SetLastError(r);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static LPWSTR CRYPT_GetDefaultOIDDlls(HKEY key)
|
|
|
|
{
|
|
|
|
LONG r;
|
|
|
|
DWORD type, size;
|
|
|
|
LPWSTR dlls;
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
r = RegQueryValueExW(key, L"Dll", NULL, &type, NULL, &size);
|
2006-08-09 21:17:10 +02:00
|
|
|
if (r == ERROR_SUCCESS && type == REG_MULTI_SZ)
|
|
|
|
{
|
|
|
|
dlls = CryptMemAlloc(size);
|
2020-11-09 11:41:52 +01:00
|
|
|
r = RegQueryValueExW(key, L"Dll", NULL, &type, (LPBYTE)dlls, &size);
|
2006-08-09 21:17:10 +02:00
|
|
|
if (r != ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
CryptMemFree(dlls);
|
|
|
|
dlls = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
dlls = NULL;
|
|
|
|
return dlls;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline BOOL CRYPT_SetDefaultOIDDlls(HKEY key, LPCWSTR dlls)
|
|
|
|
{
|
|
|
|
DWORD len = CRYPT_GetMultiStringCharacterLen(dlls);
|
|
|
|
LONG r;
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
if ((r = RegSetValueExW(key, L"Dll", 0, REG_MULTI_SZ, (const BYTE *)dlls,
|
2006-08-09 21:17:10 +02:00
|
|
|
len * sizeof (WCHAR))))
|
|
|
|
SetLastError(r);
|
|
|
|
return r == ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2006-11-12 20:23:28 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* CryptRegisterDefaultOIDFunction (CRYPT32.@)
|
|
|
|
*/
|
2006-08-09 21:17:10 +02:00
|
|
|
BOOL WINAPI CryptRegisterDefaultOIDFunction(DWORD dwEncodingType,
|
|
|
|
LPCSTR pszFuncName, DWORD dwIndex, LPCWSTR pwszDll)
|
|
|
|
{
|
|
|
|
HKEY key;
|
|
|
|
LPWSTR dlls;
|
|
|
|
BOOL ret = FALSE;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%lx, %s, %ld, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
|
2007-10-17 18:32:32 +02:00
|
|
|
dwIndex, debugstr_w(pwszDll));
|
2006-08-09 21:17:10 +02:00
|
|
|
|
|
|
|
if (!pwszDll)
|
|
|
|
{
|
|
|
|
SetLastError(E_INVALIDARG);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
dlls = CRYPT_GetDefaultOIDDlls(key);
|
2008-04-14 23:13:41 +02:00
|
|
|
if (CRYPT_FindStringInMultiString(dlls, pwszDll))
|
2006-08-09 21:17:10 +02:00
|
|
|
SetLastError(ERROR_FILE_EXISTS);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
dlls = CRYPT_AddStringToMultiString(dlls, pwszDll, dwIndex);
|
|
|
|
if (dlls)
|
|
|
|
ret = CRYPT_SetDefaultOIDDlls(key, dlls);
|
|
|
|
}
|
|
|
|
CryptMemFree(dlls);
|
|
|
|
RegCloseKey(key);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL WINAPI CryptUnregisterDefaultOIDFunction(DWORD dwEncodingType,
|
|
|
|
LPCSTR pszFuncName, LPCWSTR pwszDll)
|
|
|
|
{
|
|
|
|
HKEY key;
|
|
|
|
LPWSTR dlls;
|
|
|
|
BOOL ret;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%lx, %s, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
|
2006-08-09 21:17:10 +02:00
|
|
|
debugstr_w(pwszDll));
|
|
|
|
|
|
|
|
if (!pwszDll)
|
|
|
|
{
|
|
|
|
SetLastError(E_INVALIDARG);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
dlls = CRYPT_GetDefaultOIDDlls(key);
|
|
|
|
if ((ret = CRYPT_RemoveStringFromMultiString(dlls, pwszDll)))
|
|
|
|
ret = CRYPT_SetDefaultOIDDlls(key, dlls);
|
|
|
|
CryptMemFree(dlls);
|
|
|
|
RegCloseKey(key);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-10-31 17:33:58 +01:00
|
|
|
static void oid_init_localizednames(void)
|
2008-01-06 17:02:33 +01:00
|
|
|
{
|
2008-09-23 23:38:33 +02:00
|
|
|
unsigned int i;
|
2008-01-06 17:02:33 +01:00
|
|
|
|
2018-06-20 09:37:55 +02:00
|
|
|
for(i = 0; i < ARRAY_SIZE(LocalizedKeys); i++)
|
2008-01-06 17:02:33 +01:00
|
|
|
{
|
|
|
|
LoadStringW(hInstance, IDS_LOCALIZEDNAME_ROOT+i, LocalizedNames[i], 256);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-05-14 01:05:53 +02:00
|
|
|
/********************************************************************
|
|
|
|
* CryptFindLocalizedName (CRYPT32.@)
|
|
|
|
*/
|
|
|
|
LPCWSTR WINAPI CryptFindLocalizedName(LPCWSTR pwszCryptName)
|
|
|
|
{
|
2008-09-23 23:38:33 +02:00
|
|
|
unsigned int i;
|
2008-01-06 17:02:33 +01:00
|
|
|
|
2018-06-20 09:37:55 +02:00
|
|
|
for(i = 0; i < ARRAY_SIZE(LocalizedKeys); i++)
|
2008-01-06 17:02:33 +01:00
|
|
|
{
|
|
|
|
if(!lstrcmpiW(LocalizedKeys[i], pwszCryptName))
|
|
|
|
{
|
|
|
|
return LocalizedNames[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
FIXME("No name for: %s - stub\n",debugstr_w(pwszCryptName));
|
2007-05-14 01:05:53 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-06-12 13:45:11 +02:00
|
|
|
static CRITICAL_SECTION oidInfoCS;
|
2007-05-25 01:42:45 +02:00
|
|
|
static CRITICAL_SECTION_DEBUG oidInfoCSDebug =
|
|
|
|
{
|
|
|
|
0, 0, &oidInfoCS,
|
|
|
|
{ &oidInfoCSDebug.ProcessLocksList, &oidInfoCSDebug.ProcessLocksList },
|
|
|
|
0, 0, { (DWORD_PTR)(__FILE__ ": oidInfoCS") }
|
|
|
|
};
|
|
|
|
static CRITICAL_SECTION oidInfoCS = { &oidInfoCSDebug, -1, 0, 0, 0, 0 };
|
|
|
|
static struct list oidInfo = { &oidInfo, &oidInfo };
|
2006-02-23 22:18:13 +01:00
|
|
|
|
|
|
|
static const DWORD noNullFlag = CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
|
|
|
|
static const DWORD mosaicFlags = CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
|
|
|
|
CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
|
|
|
|
static const CRYPT_DATA_BLOB noNullBlob = { sizeof(noNullFlag),
|
|
|
|
(LPBYTE)&noNullFlag };
|
|
|
|
static const CRYPT_DATA_BLOB mosaicFlagsBlob = { sizeof(mosaicFlags),
|
|
|
|
(LPBYTE)&mosaicFlags };
|
|
|
|
|
|
|
|
static const DWORD rsaSign = CALG_RSA_SIGN;
|
|
|
|
static const DWORD dssSign[2] = { CALG_DSS_SIGN,
|
|
|
|
CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
|
|
|
|
static const DWORD mosaicSign[2] = { CALG_DSS_SIGN,
|
|
|
|
CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
|
|
|
|
CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
|
2018-06-22 15:26:55 +02:00
|
|
|
static const DWORD ecdsaSign[2] = { CALG_OID_INFO_PARAMETERS, CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
|
2006-02-23 22:18:13 +01:00
|
|
|
static const CRYPT_DATA_BLOB rsaSignBlob = { sizeof(rsaSign),
|
|
|
|
(LPBYTE)&rsaSign };
|
|
|
|
static const CRYPT_DATA_BLOB dssSignBlob = { sizeof(dssSign),
|
|
|
|
(LPBYTE)dssSign };
|
|
|
|
static const CRYPT_DATA_BLOB mosaicSignBlob = { sizeof(mosaicSign),
|
|
|
|
(LPBYTE)mosaicSign };
|
2018-06-22 15:26:55 +02:00
|
|
|
static const CRYPT_DATA_BLOB ecdsaSignBlob = { sizeof(ecdsaSign), (BYTE *)ecdsaSign };
|
2006-02-23 22:18:13 +01:00
|
|
|
|
|
|
|
static const DWORD ia5String[] = { CERT_RDN_IA5_STRING, 0 };
|
|
|
|
static const DWORD numericString[] = { CERT_RDN_NUMERIC_STRING, 0 };
|
|
|
|
static const DWORD printableString[] = { CERT_RDN_PRINTABLE_STRING, 0 };
|
|
|
|
static const DWORD domainCompTypes[] = { CERT_RDN_IA5_STRING,
|
|
|
|
CERT_RDN_UTF8_STRING, 0 };
|
|
|
|
static const CRYPT_DATA_BLOB ia5StringBlob = { sizeof(ia5String),
|
|
|
|
(LPBYTE)ia5String };
|
|
|
|
static const CRYPT_DATA_BLOB numericStringBlob = { sizeof(numericString),
|
|
|
|
(LPBYTE)numericString };
|
|
|
|
static const CRYPT_DATA_BLOB printableStringBlob = { sizeof(printableString),
|
|
|
|
(LPBYTE)printableString };
|
|
|
|
static const CRYPT_DATA_BLOB domainCompTypesBlob = { sizeof(domainCompTypes),
|
|
|
|
(LPBYTE)domainCompTypes };
|
|
|
|
|
2006-06-12 13:45:11 +02:00
|
|
|
static const struct OIDInfoConstructor {
|
2006-02-23 22:18:13 +01:00
|
|
|
DWORD dwGroupId;
|
|
|
|
LPCSTR pszOID;
|
|
|
|
UINT Algid;
|
|
|
|
LPCWSTR pwszName;
|
|
|
|
const CRYPT_DATA_BLOB *blob;
|
2018-06-22 15:26:55 +02:00
|
|
|
const WCHAR *pwszCNGAlgid;
|
|
|
|
const WCHAR *pwszCNGExtraAlgid;
|
2006-02-23 22:18:13 +01:00
|
|
|
} oidInfoConstructors[] = {
|
2020-11-09 11:41:52 +01:00
|
|
|
{ 1, szOID_OIWSEC_sha1, CALG_SHA1, L"sha1", NULL },
|
|
|
|
{ 1, szOID_OIWSEC_sha1, CALG_SHA1, L"sha", NULL },
|
|
|
|
{ 1, szOID_OIWSEC_sha, CALG_SHA, L"sha", NULL },
|
|
|
|
{ 1, szOID_RSA_MD5, CALG_MD5, L"md5", NULL },
|
|
|
|
{ 1, szOID_RSA_MD4, CALG_MD4, L"md4", NULL },
|
|
|
|
{ 1, szOID_RSA_MD2, CALG_MD2, L"md2", NULL },
|
2018-01-29 19:51:21 +01:00
|
|
|
/* NOTE: Windows Vista+ uses -1 instead of CALG_SHA_* following SHA entries. */
|
2020-11-09 11:41:52 +01:00
|
|
|
{ 1, szOID_NIST_sha256, CALG_SHA_256, L"sha256", NULL },
|
|
|
|
{ 1, szOID_NIST_sha384, CALG_SHA_384, L"sha384", NULL },
|
|
|
|
{ 1, szOID_NIST_sha512, CALG_SHA_512, L"sha512", NULL },
|
|
|
|
|
|
|
|
{ 2, szOID_OIWSEC_desCBC, CALG_DES, L"des", NULL },
|
|
|
|
{ 2, szOID_RSA_DES_EDE3_CBC, CALG_3DES, L"3des", NULL },
|
|
|
|
{ 2, szOID_RSA_RC2CBC, CALG_RC2, L"rc2", NULL },
|
|
|
|
{ 2, szOID_RSA_RC4, CALG_RC4, L"rc4", NULL },
|
|
|
|
{ 2, szOID_RSA_SMIMEalgCMS3DESwrap, CALG_3DES, L"CMS3DESwrap", NULL },
|
|
|
|
{ 2, szOID_RSA_SMIMEalgCMSRC2wrap, CALG_RC2, L"CMSRC2wrap", NULL },
|
|
|
|
|
|
|
|
{ 3, szOID_RSA_RSA, CALG_RSA_KEYX, L"RSA", NULL },
|
|
|
|
{ 3, szOID_X957_DSA, CALG_DSS_SIGN, L"DSA", &noNullBlob },
|
|
|
|
{ 3, szOID_ANSI_X942_DH, CALG_DH_SF, L"DH", &noNullBlob },
|
|
|
|
{ 3, szOID_RSA_RSA, CALG_RSA_KEYX, L"RSA_KEYX", NULL },
|
|
|
|
{ 3, szOID_RSA_RSA, CALG_RSA_SIGN, L"RSA", NULL },
|
|
|
|
{ 3, szOID_RSA_RSA, CALG_RSA_SIGN, L"RSA_SIGN", NULL },
|
|
|
|
{ 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, L"DSA", &noNullBlob },
|
|
|
|
{ 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, L"DSS", &noNullBlob },
|
|
|
|
{ 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, L"DSA_SIGN", &noNullBlob },
|
|
|
|
{ 3, szOID_RSA_DH, CALG_DH_SF, L"DH", &noNullBlob },
|
|
|
|
{ 3, szOID_OIWSEC_rsaXchg, CALG_RSA_KEYX, L"RSA_KEYX", NULL },
|
|
|
|
{ 3, szOID_INFOSEC_mosaicKMandUpdSig, CALG_DSS_SIGN, L"mosaicKMandUpdSig", &mosaicFlagsBlob },
|
|
|
|
{ 3, szOID_RSA_SMIMEalgESDH, CALG_DH_EPHEM, L"ESDH", &noNullBlob },
|
|
|
|
{ 3, szOID_PKIX_NO_SIGNATURE, CALG_NO_SIGN, L"NOSIGN", NULL },
|
|
|
|
|
|
|
|
{ 4, szOID_RSA_SHA1RSA, CALG_SHA1, L"sha1RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_RSA_SHA256RSA, CALG_SHA_256, L"sha256RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_RSA_SHA384RSA, CALG_SHA_384, L"sha384RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_RSA_SHA512RSA, CALG_SHA_512, L"sha512RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_RSA_MD5RSA, CALG_MD5, L"md5RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_X957_SHA1DSA, CALG_SHA1, L"sha1DSA", &dssSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_sha1RSASign, CALG_SHA1, L"sha1RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_sha1RSASign, CALG_SHA1, L"shaRSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_shaRSA, CALG_SHA1, L"shaRSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_md5RSA, CALG_MD5, L"md5RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_RSA_MD2RSA, CALG_MD2, L"md2RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_RSA_MD4RSA, CALG_MD4, L"md4RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_md4RSA, CALG_MD4, L"md4RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_md4RSA2, CALG_MD4, L"md4RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWDIR_md2RSA, CALG_MD2, L"md2RSA", &rsaSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_shaDSA, CALG_SHA1, L"sha1DSA", &dssSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_shaDSA, CALG_SHA1, L"shaDSA", &dssSignBlob },
|
|
|
|
{ 4, szOID_OIWSEC_dsaSHA1, CALG_SHA1, L"dsaSHA1", &dssSignBlob },
|
|
|
|
{ 4, szOID_INFOSEC_mosaicUpdatedSig, CALG_SHA1, L"mosaicUpdatedSig", &mosaicSignBlob },
|
|
|
|
{ 4, szOID_ECDSA_SHA256, CALG_OID_INFO_CNG_ONLY, L"sha256ECDSA", &ecdsaSignBlob,
|
2018-06-22 15:26:55 +02:00
|
|
|
BCRYPT_SHA256_ALGORITHM, CRYPT_OID_INFO_ECC_PARAMETERS_ALGORITHM },
|
2020-11-09 11:41:52 +01:00
|
|
|
{ 4, szOID_ECDSA_SHA384, CALG_OID_INFO_CNG_ONLY, L"sha384ECDSA", &ecdsaSignBlob,
|
2018-06-22 15:26:55 +02:00
|
|
|
BCRYPT_SHA384_ALGORITHM, CRYPT_OID_INFO_ECC_PARAMETERS_ALGORITHM },
|
2006-02-23 22:18:13 +01:00
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
{ 5, szOID_COMMON_NAME, 0, L"CN", NULL },
|
|
|
|
{ 5, szOID_LOCALITY_NAME, 0, L"L", NULL },
|
|
|
|
{ 5, szOID_ORGANIZATION_NAME, 0, L"O", NULL },
|
|
|
|
{ 5, szOID_ORGANIZATIONAL_UNIT_NAME, 0, L"OU", NULL },
|
|
|
|
{ 5, szOID_RSA_emailAddr, 0, L"E", &ia5StringBlob },
|
|
|
|
{ 5, szOID_RSA_emailAddr, 0, L"Email", &ia5StringBlob },
|
|
|
|
{ 5, szOID_COUNTRY_NAME, 0, L"C", &printableStringBlob },
|
|
|
|
{ 5, szOID_STATE_OR_PROVINCE_NAME, 0, L"S", NULL },
|
|
|
|
{ 5, szOID_STATE_OR_PROVINCE_NAME, 0, L"ST", NULL },
|
|
|
|
{ 5, szOID_STREET_ADDRESS, 0, L"STREET", NULL },
|
|
|
|
{ 5, szOID_TITLE, 0, L"T", NULL },
|
|
|
|
{ 5, szOID_TITLE, 0, L"Title", NULL },
|
|
|
|
{ 5, szOID_GIVEN_NAME, 0, L"G", NULL },
|
|
|
|
{ 5, szOID_GIVEN_NAME, 0, L"GN", NULL },
|
|
|
|
{ 5, szOID_GIVEN_NAME, 0, L"GivenName", NULL },
|
|
|
|
{ 5, szOID_INITIALS, 0, L"I", NULL },
|
|
|
|
{ 5, szOID_INITIALS, 0, L"Initials", NULL },
|
|
|
|
{ 5, szOID_SUR_NAME, 0, L"SN", NULL },
|
|
|
|
{ 5, szOID_DOMAIN_COMPONENT, 0, L"DC", &domainCompTypesBlob },
|
|
|
|
{ 5, szOID_DESCRIPTION, 0, L"Description", NULL },
|
|
|
|
{ 5, szOID_POSTAL_CODE, 0, L"PostalCode", NULL },
|
|
|
|
{ 5, szOID_POST_OFFICE_BOX, 0, L"POBox", NULL },
|
|
|
|
{ 5, szOID_TELEPHONE_NUMBER, 0, L"Phone", &printableStringBlob },
|
|
|
|
{ 5, szOID_X21_ADDRESS, 0, L"X21Address", &numericStringBlob },
|
|
|
|
{ 5, szOID_DN_QUALIFIER, 0, L"dnQualifier", NULL },
|
|
|
|
{ 5, szOID_DEVICE_SERIAL_NUMBER, 0, L"SERIALNUMBER", NULL },
|
2006-02-23 22:18:13 +01:00
|
|
|
|
|
|
|
{ 6, szOID_AUTHORITY_KEY_IDENTIFIER2, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
|
|
|
|
{ 6, szOID_AUTHORITY_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
|
|
|
|
{ 6, szOID_KEY_ATTRIBUTES, 0, (LPCWSTR)IDS_KEY_ATTRIBUTES, NULL },
|
|
|
|
{ 6, szOID_KEY_USAGE_RESTRICTION, 0, (LPCWSTR)IDS_KEY_USAGE_RESTRICTION, NULL },
|
|
|
|
{ 6, szOID_SUBJECT_ALT_NAME2, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
|
|
|
|
{ 6, szOID_SUBJECT_ALT_NAME, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
|
|
|
|
{ 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
|
|
|
|
{ 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
|
|
|
|
{ 6, szOID_BASIC_CONSTRAINTS2, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
|
|
|
|
{ 6, szOID_BASIC_CONSTRAINTS, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
|
|
|
|
{ 6, szOID_KEY_USAGE, 0, (LPCWSTR)IDS_KEY_USAGE, NULL },
|
|
|
|
{ 6, szOID_CERT_POLICIES, 0, (LPCWSTR)IDS_CERT_POLICIES, NULL },
|
|
|
|
{ 6, szOID_SUBJECT_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_SUBJECT_KEY_IDENTIFIER, NULL },
|
|
|
|
{ 6, szOID_CRL_REASON_CODE, 0, (LPCWSTR)IDS_CRL_REASON_CODE, NULL },
|
|
|
|
{ 6, szOID_CRL_DIST_POINTS, 0, (LPCWSTR)IDS_CRL_DIST_POINTS, NULL },
|
|
|
|
{ 6, szOID_ENHANCED_KEY_USAGE, 0, (LPCWSTR)IDS_ENHANCED_KEY_USAGE, NULL },
|
|
|
|
{ 6, szOID_AUTHORITY_INFO_ACCESS, 0, (LPCWSTR)IDS_AUTHORITY_INFO_ACCESS, NULL },
|
|
|
|
{ 6, szOID_CERT_EXTENSIONS, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
|
|
|
|
{ 6, szOID_RSA_certExtensions, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
|
|
|
|
{ 6, szOID_NEXT_UPDATE_LOCATION, 0, (LPCWSTR)IDS_NEXT_UPDATE_LOCATION, NULL },
|
|
|
|
{ 6, szOID_YESNO_TRUST_ATTR, 0, (LPCWSTR)IDS_YES_OR_NO_TRUST, NULL },
|
|
|
|
{ 6, szOID_RSA_emailAddr, 0, (LPCWSTR)IDS_EMAIL_ADDRESS, NULL },
|
|
|
|
{ 6, szOID_RSA_unstructName, 0, (LPCWSTR)IDS_UNSTRUCTURED_NAME, NULL },
|
|
|
|
{ 6, szOID_RSA_contentType, 0, (LPCWSTR)IDS_CONTENT_TYPE, NULL },
|
|
|
|
{ 6, szOID_RSA_messageDigest, 0, (LPCWSTR)IDS_MESSAGE_DIGEST, NULL },
|
|
|
|
{ 6, szOID_RSA_signingTime, 0, (LPCWSTR)IDS_SIGNING_TIME, NULL },
|
|
|
|
{ 6, szOID_RSA_counterSign, 0, (LPCWSTR)IDS_COUNTER_SIGN, NULL },
|
|
|
|
{ 6, szOID_RSA_challengePwd, 0, (LPCWSTR)IDS_CHALLENGE_PASSWORD, NULL },
|
|
|
|
{ 6, szOID_RSA_unstructAddr, 0, (LPCWSTR)IDS_UNSTRUCTURED_ADDRESS, NULL },
|
|
|
|
{ 6, szOID_RSA_SMIMECapabilities, 0, (LPCWSTR)IDS_SMIME_CAPABILITIES, NULL },
|
|
|
|
{ 6, szOID_RSA_preferSignedData, 0, (LPCWSTR)IDS_PREFER_SIGNED_DATA, NULL },
|
|
|
|
{ 6, szOID_PKIX_POLICY_QUALIFIER_CPS, 0, (LPCWSTR)IDS_CPS, NULL },
|
|
|
|
{ 6, szOID_PKIX_POLICY_QUALIFIER_USERNOTICE, 0, (LPCWSTR)IDS_USER_NOTICE, NULL },
|
|
|
|
{ 6, szOID_PKIX_OCSP, 0, (LPCWSTR)IDS_OCSP, NULL },
|
|
|
|
{ 6, szOID_PKIX_CA_ISSUERS, 0, (LPCWSTR)IDS_CA_ISSUER, NULL },
|
|
|
|
{ 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TEMPLATE_NAME, NULL },
|
|
|
|
{ 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TYPE, NULL },
|
|
|
|
{ 6, szOID_CERT_MANIFOLD, 0, (LPCWSTR)IDS_CERT_MANIFOLD, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_CERT_TYPE, 0, (LPCWSTR)IDS_NETSCAPE_CERT_TYPE, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_BASE_URL, 0, (LPCWSTR)IDS_NETSCAPE_BASE_URL, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_REVOCATION_URL, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_CA_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_REVOCATION_URL, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_CERT_RENEWAL_URL, 0, (LPCWSTR)IDS_NETSCAPE_CERT_RENEWAL_URL, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_CA_POLICY_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_POLICY_URL, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_SSL_SERVER_NAME, 0, (LPCWSTR)IDS_NETSCAPE_SSL_SERVER_NAME, NULL },
|
|
|
|
{ 6, szOID_NETSCAPE_COMMENT, 0, (LPCWSTR)IDS_NETSCAPE_COMMENT, NULL },
|
2020-11-09 11:41:52 +01:00
|
|
|
{ 6, "1.3.6.1.4.1.311.2.1.10", 0, L"SpcSpAgencyInfo", NULL },
|
|
|
|
{ 6, "1.3.6.1.4.1.311.2.1.27", 0, L"SpcFinancialCriteria", NULL },
|
|
|
|
{ 6, "1.3.6.1.4.1.311.2.1.26", 0, L"SpcMinimalCriteria", NULL },
|
2006-02-23 22:18:13 +01:00
|
|
|
{ 6, szOID_COUNTRY_NAME, 0, (LPCWSTR)IDS_COUNTRY, NULL },
|
|
|
|
{ 6, szOID_ORGANIZATION_NAME, 0, (LPCWSTR)IDS_ORGANIZATION, NULL },
|
|
|
|
{ 6, szOID_ORGANIZATIONAL_UNIT_NAME, 0, (LPCWSTR)IDS_ORGANIZATIONAL_UNIT, NULL },
|
|
|
|
{ 6, szOID_COMMON_NAME, 0, (LPCWSTR)IDS_COMMON_NAME, NULL },
|
|
|
|
{ 6, szOID_LOCALITY_NAME, 0, (LPCWSTR)IDS_LOCALITY, NULL },
|
|
|
|
{ 6, szOID_STATE_OR_PROVINCE_NAME, 0, (LPCWSTR)IDS_STATE_OR_PROVINCE, NULL },
|
|
|
|
{ 6, szOID_TITLE, 0, (LPCWSTR)IDS_TITLE, NULL },
|
|
|
|
{ 6, szOID_GIVEN_NAME, 0, (LPCWSTR)IDS_GIVEN_NAME, NULL },
|
|
|
|
{ 6, szOID_INITIALS, 0, (LPCWSTR)IDS_INITIALS, NULL },
|
|
|
|
{ 6, szOID_SUR_NAME, 0, (LPCWSTR)IDS_SUR_NAME, NULL },
|
|
|
|
{ 6, szOID_DOMAIN_COMPONENT, 0, (LPCWSTR)IDS_DOMAIN_COMPONENT, NULL },
|
|
|
|
{ 6, szOID_STREET_ADDRESS, 0, (LPCWSTR)IDS_STREET_ADDRESS, NULL },
|
|
|
|
{ 6, szOID_DEVICE_SERIAL_NUMBER, 0, (LPCWSTR)IDS_SERIAL_NUMBER, NULL },
|
|
|
|
{ 6, szOID_CERTSRV_CA_VERSION, 0, (LPCWSTR)IDS_CA_VERSION, NULL },
|
|
|
|
{ 6, szOID_CERTSRV_CROSSCA_VERSION, 0, (LPCWSTR)IDS_CROSS_CA_VERSION, NULL },
|
|
|
|
{ 6, szOID_SERIALIZED, 0, (LPCWSTR)IDS_SERIALIZED_SIG_SERIAL_NUMBER, NULL },
|
|
|
|
{ 6, szOID_NT_PRINCIPAL_NAME, 0, (LPCWSTR)IDS_PRINCIPAL_NAME, NULL },
|
|
|
|
{ 6, szOID_PRODUCT_UPDATE, 0, (LPCWSTR)IDS_WINDOWS_PRODUCT_UPDATE, NULL },
|
|
|
|
{ 6, szOID_ENROLLMENT_NAME_VALUE_PAIR, 0, (LPCWSTR)IDS_ENROLLMENT_NAME_VALUE_PAIR, NULL },
|
|
|
|
{ 6, szOID_OS_VERSION, 0, (LPCWSTR)IDS_OS_VERSION, NULL },
|
|
|
|
{ 6, szOID_ENROLLMENT_CSP_PROVIDER, 0, (LPCWSTR)IDS_ENROLLMENT_CSP, NULL },
|
|
|
|
{ 6, szOID_CRL_NUMBER, 0, (LPCWSTR)IDS_CRL_NUMBER, NULL },
|
|
|
|
{ 6, szOID_DELTA_CRL_INDICATOR, 0, (LPCWSTR)IDS_DELTA_CRL_INDICATOR, NULL },
|
|
|
|
{ 6, szOID_ISSUING_DIST_POINT, 0, (LPCWSTR)IDS_ISSUING_DIST_POINT, NULL },
|
|
|
|
{ 6, szOID_FRESHEST_CRL, 0, (LPCWSTR)IDS_FRESHEST_CRL, NULL },
|
|
|
|
{ 6, szOID_NAME_CONSTRAINTS, 0, (LPCWSTR)IDS_NAME_CONSTRAINTS, NULL },
|
|
|
|
{ 6, szOID_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
|
|
|
|
{ 6, szOID_LEGACY_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
|
|
|
|
{ 6, szOID_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_POLICY_CONSTRAINTS, NULL },
|
|
|
|
{ 6, szOID_CROSS_CERT_DIST_POINTS, 0, (LPCWSTR)IDS_CROSS_CERT_DIST_POINTS, NULL },
|
|
|
|
{ 6, szOID_APPLICATION_CERT_POLICIES, 0, (LPCWSTR)IDS_APPLICATION_POLICIES, NULL },
|
|
|
|
{ 6, szOID_APPLICATION_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_MAPPINGS, NULL },
|
|
|
|
{ 6, szOID_APPLICATION_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_CONSTRAINTS, NULL },
|
|
|
|
{ 6, szOID_CT_PKI_DATA, 0, (LPCWSTR)IDS_CMC_DATA, NULL },
|
|
|
|
{ 6, szOID_CT_PKI_RESPONSE, 0, (LPCWSTR)IDS_CMC_RESPONSE, NULL },
|
|
|
|
{ 6, szOID_CMC, 0, (LPCWSTR)IDS_UNSIGNED_CMC_REQUEST, NULL },
|
|
|
|
{ 6, szOID_CMC_STATUS_INFO, 0, (LPCWSTR)IDS_CMC_STATUS_INFO, NULL },
|
|
|
|
{ 6, szOID_CMC_ADD_EXTENSIONS, 0, (LPCWSTR)IDS_CMC_EXTENSIONS, NULL },
|
|
|
|
{ 6, szOID_CTL, 0, (LPCWSTR)IDS_CMC_ATTRIBUTES, NULL },
|
|
|
|
{ 6, szOID_RSA_data, 0, (LPCWSTR)IDS_PKCS_7_DATA, NULL },
|
|
|
|
{ 6, szOID_RSA_signedData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED, NULL },
|
|
|
|
{ 6, szOID_RSA_envelopedData, 0, (LPCWSTR)IDS_PKCS_7_ENVELOPED, NULL },
|
|
|
|
{ 6, szOID_RSA_signEnvData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED_ENVELOPED, NULL },
|
|
|
|
{ 6, szOID_RSA_digestedData, 0, (LPCWSTR)IDS_PKCS_7_DIGESTED, NULL },
|
|
|
|
{ 6, szOID_RSA_encryptedData, 0, (LPCWSTR)IDS_PKCS_7_ENCRYPTED, NULL },
|
|
|
|
{ 6, szOID_CERTSRV_PREVIOUS_CERT_HASH, 0, (LPCWSTR)IDS_PREVIOUS_CA_CERT_HASH, NULL },
|
|
|
|
{ 6, szOID_CRL_VIRTUAL_BASE, 0, (LPCWSTR)IDS_CRL_VIRTUAL_BASE, NULL },
|
|
|
|
{ 6, szOID_CRL_NEXT_PUBLISH, 0, (LPCWSTR)IDS_CRL_NEXT_PUBLISH, NULL },
|
|
|
|
{ 6, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
|
|
|
|
{ 6, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
|
|
|
|
{ 6, szOID_CERTIFICATE_TEMPLATE, 0, (LPCWSTR)IDS_CERTIFICATE_TEMPLATE, NULL },
|
|
|
|
{ 6, szOID_ENTERPRISE_OID_ROOT, 0, (LPCWSTR)IDS_ENTERPRISE_ROOT_OID, NULL },
|
|
|
|
{ 6, szOID_RDN_DUMMY_SIGNER, 0, (LPCWSTR)IDS_RDN_DUMMY_SIGNER, NULL },
|
|
|
|
{ 6, szOID_ARCHIVED_KEY_ATTR, 0, (LPCWSTR)IDS_ARCHIVED_KEY_ATTR, NULL },
|
|
|
|
{ 6, szOID_CRL_SELF_CDP, 0, (LPCWSTR)IDS_CRL_SELF_CDP, NULL },
|
|
|
|
{ 6, szOID_REQUIRE_CERT_CHAIN_POLICY, 0, (LPCWSTR)IDS_REQUIRE_CERT_CHAIN_POLICY, NULL },
|
|
|
|
{ 6, szOID_CMC_TRANSACTION_ID, 0, (LPCWSTR)IDS_TRANSACTION_ID, NULL },
|
|
|
|
{ 6, szOID_CMC_SENDER_NONCE, 0, (LPCWSTR)IDS_SENDER_NONCE, NULL },
|
|
|
|
{ 6, szOID_CMC_RECIPIENT_NONCE, 0, (LPCWSTR)IDS_RECIPIENT_NONCE, NULL },
|
|
|
|
{ 6, szOID_CMC_REG_INFO, 0, (LPCWSTR)IDS_REG_INFO, NULL },
|
|
|
|
{ 6, szOID_CMC_GET_CERT, 0, (LPCWSTR)IDS_GET_CERTIFICATE, NULL },
|
|
|
|
{ 6, szOID_CMC_GET_CRL, 0, (LPCWSTR)IDS_GET_CRL, NULL },
|
|
|
|
{ 6, szOID_CMC_REVOKE_REQUEST, 0, (LPCWSTR)IDS_REVOKE_REQUEST, NULL },
|
|
|
|
{ 6, szOID_CMC_QUERY_PENDING, 0, (LPCWSTR)IDS_QUERY_PENDING, NULL },
|
|
|
|
{ 6, szOID_SORTED_CTL, 0, (LPCWSTR)IDS_SORTED_CTL, NULL },
|
|
|
|
{ 6, szOID_ARCHIVED_KEY_CERT_HASH, 0, (LPCWSTR)IDS_ARCHIVED_KEY_CERT_HASH, NULL },
|
|
|
|
{ 6, szOID_PRIVATEKEY_USAGE_PERIOD, 0, (LPCWSTR)IDS_PRIVATE_KEY_USAGE_PERIOD, NULL },
|
|
|
|
{ 6, szOID_REQUEST_CLIENT_INFO, 0, (LPCWSTR)IDS_CLIENT_INFORMATION, NULL },
|
|
|
|
|
|
|
|
{ 7, szOID_PKIX_KP_SERVER_AUTH, 0, (LPCWSTR)IDS_SERVER_AUTHENTICATION, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_CLIENT_AUTH, 0, (LPCWSTR)IDS_CLIENT_AUTHENTICATION, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_CODE_SIGNING, 0, (LPCWSTR)IDS_CODE_SIGNING, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_EMAIL_PROTECTION, 0, (LPCWSTR)IDS_SECURE_EMAIL, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_TIMESTAMP_SIGNING, 0, (LPCWSTR)IDS_TIME_STAMPING, NULL },
|
|
|
|
{ 7, szOID_KP_CTL_USAGE_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TRUST_LIST_SIGNING, NULL },
|
|
|
|
{ 7, szOID_KP_TIME_STAMP_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TIME_STAMPING, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_IPSEC_END_SYSTEM, 0, (LPCWSTR)IDS_IPSEC_END_SYSTEM, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_IPSEC_TUNNEL, 0, (LPCWSTR)IDS_IPSEC_TUNNEL, NULL },
|
|
|
|
{ 7, szOID_PKIX_KP_IPSEC_USER, 0, (LPCWSTR)IDS_IPSEC_USER, NULL },
|
|
|
|
{ 7, szOID_KP_EFS, 0, (LPCWSTR)IDS_EFS, NULL },
|
|
|
|
{ 7, szOID_WHQL_CRYPTO, 0, (LPCWSTR)IDS_WHQL_CRYPTO, NULL },
|
|
|
|
{ 7, szOID_NT5_CRYPTO, 0, (LPCWSTR)IDS_NT5_CRYPTO, NULL },
|
|
|
|
{ 7, szOID_OEM_WHQL_CRYPTO, 0, (LPCWSTR)IDS_OEM_WHQL_CRYPTO, NULL },
|
|
|
|
{ 7, szOID_EMBEDDED_NT_CRYPTO, 0, (LPCWSTR)IDS_EMBEDDED_NT_CRYPTO, NULL },
|
|
|
|
{ 7, szOID_LICENSES, 0, (LPCWSTR)IDS_KEY_PACK_LICENSES, NULL },
|
|
|
|
{ 7, szOID_LICENSE_SERVER, 0, (LPCWSTR)IDS_LICENSE_SERVER, NULL },
|
|
|
|
{ 7, szOID_KP_SMARTCARD_LOGON, 0, (LPCWSTR)IDS_SMART_CARD_LOGON, NULL },
|
|
|
|
{ 7, szOID_DRM, 0, (LPCWSTR)IDS_DIGITAL_RIGHTS, NULL },
|
|
|
|
{ 7, szOID_KP_QUALIFIED_SUBORDINATION, 0, (LPCWSTR)IDS_QUALIFIED_SUBORDINATION, NULL },
|
|
|
|
{ 7, szOID_KP_KEY_RECOVERY, 0, (LPCWSTR)IDS_KEY_RECOVERY, NULL },
|
|
|
|
{ 7, szOID_KP_DOCUMENT_SIGNING, 0, (LPCWSTR)IDS_DOCUMENT_SIGNING, NULL },
|
|
|
|
{ 7, szOID_IPSEC_KP_IKE_INTERMEDIATE, 0, (LPCWSTR)IDS_IPSEC_IKE_INTERMEDIATE, NULL },
|
|
|
|
{ 7, szOID_EFS_RECOVERY, 0, (LPCWSTR)IDS_FILE_RECOVERY, NULL },
|
|
|
|
{ 7, szOID_ROOT_LIST_SIGNER, 0, (LPCWSTR)IDS_ROOT_LIST_SIGNER, NULL },
|
|
|
|
{ 7, szOID_ANY_APPLICATION_POLICY, 0, (LPCWSTR)IDS_ANY_APPLICATION_POLICIES, NULL },
|
|
|
|
{ 7, szOID_DS_EMAIL_REPLICATION, 0, (LPCWSTR)IDS_DS_EMAIL_REPLICATION, NULL },
|
|
|
|
{ 7, szOID_ENROLLMENT_AGENT, 0, (LPCWSTR)IDS_ENROLLMENT_AGENT, NULL },
|
|
|
|
{ 7, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
|
|
|
|
{ 7, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
|
|
|
|
{ 7, szOID_KP_LIFETIME_SIGNING, 0, (LPCWSTR)IDS_LIFETIME_SIGNING, NULL },
|
|
|
|
|
|
|
|
{ 8, szOID_ANY_CERT_POLICY, 0, (LPCWSTR)IDS_ANY_CERT_POLICY, NULL },
|
2006-02-23 01:26:52 +01:00
|
|
|
};
|
|
|
|
|
2006-02-23 22:18:13 +01:00
|
|
|
struct OIDInfo {
|
|
|
|
CRYPT_OID_INFO info;
|
|
|
|
struct list entry;
|
2006-02-23 01:26:52 +01:00
|
|
|
};
|
|
|
|
|
2018-10-05 10:43:06 +02:00
|
|
|
static struct OIDInfo *read_oid_info(HKEY root, char *key_name, DWORD *flags)
|
|
|
|
{
|
|
|
|
HKEY key;
|
|
|
|
DWORD len, oid_len, name_len = 0, extra_len = 0, cngalgid_len = 0, cngextra_len = 0, group_id = 0;
|
|
|
|
struct OIDInfo *info;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
if (RegOpenKeyExA(root, key_name, 0, KEY_READ, &key))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
p = strchr(key_name, '!');
|
|
|
|
if (p)
|
|
|
|
{
|
|
|
|
group_id = strtol(p + 1, NULL, 10);
|
|
|
|
*p = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
oid_len = strlen(key_name) + 1;
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"Name", NULL, NULL, NULL, &name_len);
|
|
|
|
RegQueryValueExW(key, L"ExtraInfo", NULL, NULL, NULL, &extra_len);
|
|
|
|
RegQueryValueExW(key, L"CNGAlgid", NULL, NULL, NULL, &cngalgid_len);
|
|
|
|
RegQueryValueExW(key, L"CNGExtraAlgid", NULL, NULL, NULL, &cngextra_len);
|
2018-10-05 10:43:06 +02:00
|
|
|
|
|
|
|
info = CryptMemAlloc(sizeof(*info) + oid_len + name_len + extra_len + cngalgid_len + cngextra_len);
|
|
|
|
if (info)
|
|
|
|
{
|
|
|
|
*flags = 0;
|
|
|
|
len = sizeof(*flags);
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"Flags", NULL, NULL, (BYTE *)flags, &len);
|
2018-10-05 10:43:06 +02:00
|
|
|
|
|
|
|
memset(info, 0, sizeof(*info));
|
|
|
|
info->info.cbSize = sizeof(info->info);
|
|
|
|
|
|
|
|
p = (char *)(info + 1);
|
|
|
|
|
|
|
|
info->info.pszOID = p;
|
|
|
|
strcpy((char *)info->info.pszOID, key_name);
|
|
|
|
p += oid_len;
|
|
|
|
|
|
|
|
if (name_len)
|
|
|
|
{
|
|
|
|
info->info.pwszName = (WCHAR *)p;
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"Name", NULL, NULL, (BYTE *)info->info.pwszName, &name_len);
|
2018-10-05 10:43:06 +02:00
|
|
|
p += name_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
info->info.dwGroupId = group_id;
|
|
|
|
|
|
|
|
len = sizeof(info->info.u.Algid);
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"Algid", NULL, NULL, (BYTE *)&info->info.u.Algid, &len);
|
2018-10-05 10:43:06 +02:00
|
|
|
|
|
|
|
if (extra_len)
|
|
|
|
{
|
|
|
|
info->info.ExtraInfo.cbData = extra_len;
|
|
|
|
info->info.ExtraInfo.pbData = (BYTE *)p;
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"ExtraInfo", NULL, NULL, info->info.ExtraInfo.pbData, &extra_len);
|
2018-10-05 10:43:06 +02:00
|
|
|
p += extra_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cngalgid_len)
|
|
|
|
{
|
|
|
|
info->info.pwszCNGAlgid = (WCHAR *)p;
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"CNGAlgid", NULL, NULL, (BYTE *)info->info.pwszCNGAlgid, &cngalgid_len);
|
2018-10-05 10:43:06 +02:00
|
|
|
p += cngalgid_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cngextra_len)
|
|
|
|
{
|
|
|
|
info->info.pwszCNGExtraAlgid = (WCHAR *)p;
|
2020-11-09 11:41:52 +01:00
|
|
|
RegQueryValueExW(key, L"CNGExtraAlgid", NULL, NULL, (BYTE *)info->info.pwszCNGExtraAlgid, &cngalgid_len);
|
2018-10-05 10:43:06 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
RegCloseKey(key);
|
|
|
|
|
|
|
|
return info;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void init_registered_oid_info(void)
|
|
|
|
{
|
|
|
|
DWORD err, idx;
|
|
|
|
HKEY root;
|
|
|
|
|
2020-11-09 11:41:52 +01:00
|
|
|
err = RegOpenKeyExW(HKEY_LOCAL_MACHINE, L"Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptDllFindOIDInfo",
|
2018-10-05 10:43:06 +02:00
|
|
|
0, KEY_ALL_ACCESS, &root);
|
|
|
|
if (err != ERROR_SUCCESS) return;
|
|
|
|
|
|
|
|
idx = 0;
|
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
char key_name[MAX_PATH];
|
|
|
|
struct OIDInfo *info;
|
|
|
|
DWORD flags;
|
|
|
|
|
|
|
|
err = RegEnumKeyA(root, idx++, key_name, MAX_PATH);
|
|
|
|
if (err == ERROR_NO_MORE_ITEMS)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (err == ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
if ((info = read_oid_info(root, key_name, &flags)))
|
|
|
|
{
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("adding oid %s, name %s, groupid %lu, algid %u, extra %lu, CNG algid %s, CNG extra %s\n",
|
2018-10-05 10:43:06 +02:00
|
|
|
debugstr_a(info->info.pszOID), debugstr_w(info->info.pwszName),
|
|
|
|
info->info.dwGroupId, info->info.u.Algid, info->info.ExtraInfo.cbData,
|
|
|
|
debugstr_w(info->info.pwszCNGAlgid), debugstr_w(info->info.pwszCNGExtraAlgid));
|
|
|
|
|
|
|
|
if (flags & CRYPT_INSTALL_OID_INFO_BEFORE_FLAG)
|
|
|
|
list_add_head(&oidInfo, &info->entry);
|
|
|
|
else
|
|
|
|
list_add_tail(&oidInfo, &info->entry);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
RegCloseKey(root);
|
|
|
|
}
|
|
|
|
|
2008-10-31 17:33:58 +01:00
|
|
|
static void init_oid_info(void)
|
2006-02-23 01:26:52 +01:00
|
|
|
{
|
2006-02-23 22:18:13 +01:00
|
|
|
DWORD i;
|
|
|
|
|
2008-10-31 17:33:58 +01:00
|
|
|
oid_init_localizednames();
|
2018-06-20 09:37:55 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(oidInfoConstructors); i++)
|
2006-02-23 01:26:52 +01:00
|
|
|
{
|
2010-01-29 01:39:26 +01:00
|
|
|
if (!IS_INTRESOURCE(oidInfoConstructors[i].pwszName))
|
2006-02-23 22:18:13 +01:00
|
|
|
{
|
|
|
|
struct OIDInfo *info;
|
|
|
|
|
|
|
|
/* The name is a static string, so just use the same pointer */
|
|
|
|
info = CryptMemAlloc(sizeof(struct OIDInfo));
|
|
|
|
if (info)
|
|
|
|
{
|
|
|
|
memset(info, 0, sizeof(*info));
|
|
|
|
info->info.cbSize = sizeof(CRYPT_OID_INFO);
|
|
|
|
info->info.pszOID = oidInfoConstructors[i].pszOID;
|
|
|
|
info->info.pwszName = oidInfoConstructors[i].pwszName;
|
|
|
|
info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
|
2006-02-27 18:23:07 +01:00
|
|
|
info->info.u.Algid = oidInfoConstructors[i].Algid;
|
2006-02-23 22:18:13 +01:00
|
|
|
if (oidInfoConstructors[i].blob)
|
|
|
|
{
|
|
|
|
info->info.ExtraInfo.cbData =
|
|
|
|
oidInfoConstructors[i].blob->cbData;
|
|
|
|
info->info.ExtraInfo.pbData =
|
|
|
|
oidInfoConstructors[i].blob->pbData;
|
|
|
|
}
|
2018-06-22 15:26:55 +02:00
|
|
|
info->info.pwszCNGAlgid = oidInfoConstructors[i].pwszCNGAlgid;
|
|
|
|
info->info.pwszCNGExtraAlgid = oidInfoConstructors[i].pwszCNGExtraAlgid;
|
2006-02-23 22:18:13 +01:00
|
|
|
list_add_tail(&oidInfo, &info->entry);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2008-03-05 21:28:54 +01:00
|
|
|
LPCWSTR stringresource;
|
2008-10-31 17:33:58 +01:00
|
|
|
int len = LoadStringW(hInstance,
|
|
|
|
(UINT_PTR)oidInfoConstructors[i].pwszName,
|
2008-03-05 21:28:54 +01:00
|
|
|
(LPWSTR)&stringresource, 0);
|
2006-02-23 22:18:13 +01:00
|
|
|
|
|
|
|
if (len)
|
|
|
|
{
|
|
|
|
struct OIDInfo *info = CryptMemAlloc(sizeof(struct OIDInfo) +
|
|
|
|
(len + 1) * sizeof(WCHAR));
|
|
|
|
|
|
|
|
if (info)
|
|
|
|
{
|
|
|
|
memset(info, 0, sizeof(*info));
|
|
|
|
info->info.cbSize = sizeof(CRYPT_OID_INFO);
|
|
|
|
info->info.pszOID = oidInfoConstructors[i].pszOID;
|
2008-03-05 21:28:54 +01:00
|
|
|
info->info.pwszName = (LPWSTR)(info + 1);
|
2006-02-23 22:18:13 +01:00
|
|
|
info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
|
2006-02-27 18:23:07 +01:00
|
|
|
info->info.u.Algid = oidInfoConstructors[i].Algid;
|
2008-03-05 21:28:54 +01:00
|
|
|
memcpy(info + 1, stringresource, len*sizeof(WCHAR));
|
|
|
|
((LPWSTR)(info + 1))[len] = 0;
|
2006-02-23 22:18:13 +01:00
|
|
|
if (oidInfoConstructors[i].blob)
|
|
|
|
{
|
|
|
|
info->info.ExtraInfo.cbData =
|
|
|
|
oidInfoConstructors[i].blob->cbData;
|
|
|
|
info->info.ExtraInfo.pbData =
|
|
|
|
oidInfoConstructors[i].blob->pbData;
|
|
|
|
}
|
2018-06-22 15:26:55 +02:00
|
|
|
info->info.pwszCNGAlgid = oidInfoConstructors[i].pwszCNGAlgid;
|
|
|
|
info->info.pwszCNGExtraAlgid = oidInfoConstructors[i].pwszCNGExtraAlgid;
|
2006-02-23 22:18:13 +01:00
|
|
|
list_add_tail(&oidInfo, &info->entry);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2006-02-23 01:26:52 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-02-23 22:18:13 +01:00
|
|
|
static void free_oid_info(void)
|
|
|
|
{
|
|
|
|
struct OIDInfo *info, *next;
|
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY_SAFE(info, next, &oidInfo, struct OIDInfo, entry)
|
|
|
|
{
|
|
|
|
list_remove(&info->entry);
|
|
|
|
CryptMemFree(info);
|
|
|
|
}
|
2011-11-16 16:33:42 +01:00
|
|
|
DeleteCriticalSection(&oidInfoCS);
|
2006-02-23 22:18:13 +01:00
|
|
|
}
|
|
|
|
|
2006-11-12 20:23:28 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* CryptEnumOIDInfo (CRYPT32.@)
|
|
|
|
*/
|
2006-02-23 22:18:13 +01:00
|
|
|
BOOL WINAPI CryptEnumOIDInfo(DWORD dwGroupId, DWORD dwFlags, void *pvArg,
|
|
|
|
PFN_CRYPT_ENUM_OID_INFO pfnEnumOIDInfo)
|
|
|
|
{
|
|
|
|
BOOL ret = TRUE;
|
|
|
|
struct OIDInfo *info;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%ld, %08lx, %p, %p)\n", dwGroupId, dwFlags, pvArg,
|
2006-02-23 22:18:13 +01:00
|
|
|
pfnEnumOIDInfo);
|
|
|
|
|
|
|
|
EnterCriticalSection(&oidInfoCS);
|
|
|
|
LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
|
|
|
|
{
|
|
|
|
if (!dwGroupId || dwGroupId == info->info.dwGroupId)
|
|
|
|
{
|
|
|
|
ret = pfnEnumOIDInfo(&info->info, pvArg);
|
|
|
|
if (!ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&oidInfoCS);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
PCCRYPT_OID_INFO WINAPI CryptFindOIDInfo(DWORD dwKeyType, void *pvKey,
|
|
|
|
DWORD dwGroupId)
|
2006-02-23 01:26:52 +01:00
|
|
|
{
|
2006-02-23 22:18:13 +01:00
|
|
|
PCCRYPT_OID_INFO ret = NULL;
|
2006-02-23 01:26:52 +01:00
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("(%ld, %p, %ld)\n", dwKeyType, pvKey, dwGroupId);
|
2006-02-23 22:18:13 +01:00
|
|
|
|
|
|
|
switch(dwKeyType)
|
|
|
|
{
|
|
|
|
case CRYPT_OID_INFO_ALGID_KEY:
|
2006-02-23 01:26:52 +01:00
|
|
|
{
|
2006-02-23 22:18:13 +01:00
|
|
|
struct OIDInfo *info;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("CRYPT_OID_INFO_ALGID_KEY: %ld\n", *(DWORD *)pvKey);
|
2006-02-23 22:18:13 +01:00
|
|
|
EnterCriticalSection(&oidInfoCS);
|
|
|
|
LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
|
2006-02-23 01:26:52 +01:00
|
|
|
{
|
2006-02-27 18:23:07 +01:00
|
|
|
if (info->info.u.Algid == *(DWORD *)pvKey &&
|
2006-02-23 22:18:13 +01:00
|
|
|
(!dwGroupId || info->info.dwGroupId == dwGroupId))
|
|
|
|
{
|
|
|
|
ret = &info->info;
|
|
|
|
break;
|
|
|
|
}
|
2006-02-23 01:26:52 +01:00
|
|
|
}
|
2006-02-23 22:18:13 +01:00
|
|
|
LeaveCriticalSection(&oidInfoCS);
|
|
|
|
break;
|
2006-02-23 01:26:52 +01:00
|
|
|
}
|
2006-02-23 22:18:13 +01:00
|
|
|
case CRYPT_OID_INFO_NAME_KEY:
|
|
|
|
{
|
|
|
|
struct OIDInfo *info;
|
|
|
|
|
2009-01-28 10:25:22 +01:00
|
|
|
TRACE("CRYPT_OID_INFO_NAME_KEY: %s\n", debugstr_w(pvKey));
|
2006-02-23 22:18:13 +01:00
|
|
|
EnterCriticalSection(&oidInfoCS);
|
|
|
|
LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
|
|
|
|
{
|
2020-11-09 11:41:21 +01:00
|
|
|
if (!wcscmp(info->info.pwszName, pvKey) &&
|
2006-02-23 22:18:13 +01:00
|
|
|
(!dwGroupId || info->info.dwGroupId == dwGroupId))
|
|
|
|
{
|
|
|
|
ret = &info->info;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&oidInfoCS);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case CRYPT_OID_INFO_OID_KEY:
|
|
|
|
{
|
|
|
|
struct OIDInfo *info;
|
2009-01-28 10:25:22 +01:00
|
|
|
LPSTR oid = pvKey;
|
2006-02-23 22:18:13 +01:00
|
|
|
|
2006-08-09 08:18:56 +02:00
|
|
|
TRACE("CRYPT_OID_INFO_OID_KEY: %s\n", debugstr_a(oid));
|
2006-02-23 22:18:13 +01:00
|
|
|
EnterCriticalSection(&oidInfoCS);
|
|
|
|
LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
|
|
|
|
{
|
|
|
|
if (!lstrcmpA(info->info.pszOID, oid) &&
|
|
|
|
(!dwGroupId || info->info.dwGroupId == dwGroupId))
|
|
|
|
{
|
|
|
|
ret = &info->info;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&oidInfoCS);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case CRYPT_OID_INFO_SIGN_KEY:
|
|
|
|
{
|
|
|
|
struct OIDInfo *info;
|
|
|
|
|
2022-02-09 09:25:50 +01:00
|
|
|
TRACE("CRYPT_OID_INFO_SIGN_KEY: %ld\n", *(DWORD *)pvKey);
|
2006-02-23 22:18:13 +01:00
|
|
|
EnterCriticalSection(&oidInfoCS);
|
|
|
|
LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
|
|
|
|
{
|
2006-02-27 18:23:07 +01:00
|
|
|
if (info->info.u.Algid == *(DWORD *)pvKey &&
|
2006-02-23 22:18:13 +01:00
|
|
|
info->info.ExtraInfo.cbData >= sizeof(DWORD) &&
|
|
|
|
*(DWORD *)info->info.ExtraInfo.pbData ==
|
|
|
|
*(DWORD *)((LPBYTE)pvKey + sizeof(DWORD)) &&
|
|
|
|
(!dwGroupId || info->info.dwGroupId == dwGroupId))
|
|
|
|
{
|
|
|
|
ret = &info->info;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&oidInfoCS);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
LPCSTR WINAPI CertAlgIdToOID(DWORD dwAlgId)
|
|
|
|
{
|
|
|
|
LPCSTR ret;
|
|
|
|
PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_ALGID_KEY,
|
|
|
|
&dwAlgId, 0);
|
|
|
|
|
|
|
|
if (info)
|
|
|
|
ret = info->pszOID;
|
|
|
|
else
|
|
|
|
ret = NULL;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD WINAPI CertOIDToAlgId(LPCSTR pszObjId)
|
|
|
|
{
|
|
|
|
DWORD ret;
|
|
|
|
PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_OID_KEY,
|
|
|
|
(void *)pszObjId, 0);
|
|
|
|
|
|
|
|
if (info)
|
2006-02-27 18:23:07 +01:00
|
|
|
ret = info->u.Algid;
|
2006-02-23 22:18:13 +01:00
|
|
|
else
|
|
|
|
ret = 0;
|
|
|
|
return ret;
|
2006-02-23 01:26:52 +01:00
|
|
|
}
|
2011-11-15 14:37:05 +01:00
|
|
|
|
|
|
|
void crypt_oid_init(void)
|
|
|
|
{
|
|
|
|
init_oid_info();
|
2018-10-05 10:43:06 +02:00
|
|
|
init_registered_oid_info();
|
2011-11-15 14:37:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void crypt_oid_free(void)
|
|
|
|
{
|
|
|
|
free_function_sets();
|
|
|
|
free_oid_info();
|
|
|
|
}
|