Sweden-Number/dlls/crypt32/main.c

325 lines
8.3 KiB
C
Raw Normal View History

2002-04-03 21:55:13 +02:00
/*
* Copyright 2002 Mike McCormack for CodeWeavers
* Copyright 2005 Juan Lang
2002-04-03 21:55:13 +02:00
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
2002-04-03 21:55:13 +02:00
*/
#include "config.h"
#include <stdarg.h>
#include <stdio.h>
#include "windef.h"
2002-04-03 21:55:13 +02:00
#include "winbase.h"
2002-06-14 00:02:17 +02:00
#include "wincrypt.h"
#include "winreg.h"
#include "winuser.h"
#include "i_cryptasn1tls.h"
2005-08-25 11:51:59 +02:00
#include "crypt32_private.h"
2002-08-16 03:36:53 +02:00
#include "wine/debug.h"
WINE_DEFAULT_DEBUG_CHANNEL(crypt);
2002-06-14 00:02:17 +02:00
2005-08-25 11:51:59 +02:00
static HCRYPTPROV hDefProv;
HINSTANCE hInstance;
2005-08-25 11:51:59 +02:00
static CRITICAL_SECTION prov_param_cs;
static CRITICAL_SECTION_DEBUG prov_param_cs_debug =
{
0, 0, &prov_param_cs,
{ &prov_param_cs_debug.ProcessLocksList,
&prov_param_cs_debug.ProcessLocksList },
0, 0, { (DWORD_PTR)(__FILE__ ": prov_param_cs") }
};
static CRITICAL_SECTION prov_param_cs = { &prov_param_cs_debug, -1, 0, 0, 0, 0 };
BOOL WINAPI DllMain(HINSTANCE hInst, DWORD fdwReason, PVOID pvReserved)
2005-08-25 11:51:59 +02:00
{
switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
hInstance = hInst;
DisableThreadLibraryCalls(hInst);
init_empty_store();
crypt_oid_init();
break;
2005-08-25 11:51:59 +02:00
case DLL_PROCESS_DETACH:
if (pvReserved) break;
crypt_oid_free();
2007-07-10 02:07:54 +02:00
crypt_sip_free();
2007-08-16 01:22:43 +02:00
default_chain_engine_free();
if (hDefProv) CryptReleaseContext(hDefProv, 0);
2005-08-25 11:51:59 +02:00
break;
}
return TRUE;
}
static HCRYPTPROV CRYPT_GetDefaultProvider(void)
2005-08-25 11:51:59 +02:00
{
if (!hDefProv)
{
HCRYPTPROV prov;
if (!CryptAcquireContextW(&prov, NULL, MS_ENH_RSA_AES_PROV_W,
PROV_RSA_AES, CRYPT_VERIFYCONTEXT))
return hDefProv;
InterlockedCompareExchangePointer((PVOID *)&hDefProv, (PVOID)prov,
NULL);
if (hDefProv != prov)
CryptReleaseContext(prov, 0);
}
2005-08-25 11:51:59 +02:00
return hDefProv;
}
typedef void * HLRUCACHE;
/* this function is called by Internet Explorer when it is about to verify a
* downloaded component. The first parameter appears to be a pointer to an
* unknown type, native fails unless it points to a buffer of at least 20 bytes.
* The second parameter appears to be an out parameter, whatever it's set to is
* passed (by cryptnet.dll) to I_CryptFlushLruCache.
*/
BOOL WINAPI I_CryptCreateLruCache(void *unknown, HLRUCACHE *out)
2002-04-03 21:55:13 +02:00
{
FIXME("(%p, %p): stub!\n", unknown, out);
*out = (void *)0xbaadf00d;
return TRUE;
2002-04-03 21:55:13 +02:00
}
BOOL WINAPI I_CryptFindLruEntry(DWORD unk0, DWORD unk1)
{
FIXME("(%08x, %08x): stub!\n", unk0, unk1);
return FALSE;
}
BOOL WINAPI I_CryptFindLruEntryData(DWORD unk0, DWORD unk1, DWORD unk2)
2002-04-03 21:55:13 +02:00
{
FIXME("(%08x, %08x, %08x): stub!\n", unk0, unk1, unk2);
2002-04-03 21:55:13 +02:00
return FALSE;
}
BOOL WINAPI I_CryptCreateLruEntry(HLRUCACHE h, DWORD unk0, DWORD unk1)
{
FIXME("(%p, %08x, %08x): stub!\n", h, unk0, unk1);
return FALSE;
}
DWORD WINAPI I_CryptFlushLruCache(HLRUCACHE h, DWORD unk0, DWORD unk1)
2002-04-03 21:55:13 +02:00
{
FIXME("(%p, %08x, %08x): stub!\n", h, unk0, unk1);
return 0;
2002-04-03 21:55:13 +02:00
}
HLRUCACHE WINAPI I_CryptFreeLruCache(HLRUCACHE h, DWORD unk0, DWORD unk1)
2002-04-03 21:55:13 +02:00
{
FIXME("(%p, %08x, %08x): stub!\n", h, unk0, unk1);
return h;
2002-04-03 21:55:13 +02:00
}
2002-06-14 00:02:17 +02:00
LPVOID WINAPI CryptMemAlloc(ULONG cbSize)
{
return HeapAlloc(GetProcessHeap(), 0, cbSize);
}
LPVOID WINAPI CryptMemRealloc(LPVOID pv, ULONG cbSize)
{
return HeapReAlloc(GetProcessHeap(), 0, pv, cbSize);
}
VOID WINAPI CryptMemFree(LPVOID pv)
{
HeapFree(GetProcessHeap(), 0, pv);
}
DWORD WINAPI I_CryptAllocTls(void)
{
return TlsAlloc();
}
LPVOID WINAPI I_CryptDetachTls(DWORD dwTlsIndex)
{
LPVOID ret;
ret = TlsGetValue(dwTlsIndex);
TlsSetValue(dwTlsIndex, NULL);
return ret;
}
LPVOID WINAPI I_CryptGetTls(DWORD dwTlsIndex)
{
return TlsGetValue(dwTlsIndex);
}
BOOL WINAPI I_CryptSetTls(DWORD dwTlsIndex, LPVOID lpTlsValue)
{
return TlsSetValue(dwTlsIndex, lpTlsValue);
}
BOOL WINAPI I_CryptFreeTls(DWORD dwTlsIndex, DWORD unknown)
{
BOOL ret;
TRACE("(%d, %d)\n", dwTlsIndex, unknown);
ret = TlsFree(dwTlsIndex);
if (!ret) SetLastError( E_INVALIDARG );
return ret;
}
BOOL WINAPI I_CryptGetOssGlobal(DWORD x)
{
FIXME("%08x\n", x);
return FALSE;
}
static BOOL is_supported_algid(HCRYPTPROV prov, ALG_ID algid)
{
PROV_ENUMALGS prov_algs;
DWORD size = sizeof(prov_algs);
BOOL ret = FALSE;
/* This enumeration is not thread safe */
EnterCriticalSection(&prov_param_cs);
if (CryptGetProvParam(prov, PP_ENUMALGS, (BYTE *)&prov_algs, &size, CRYPT_FIRST))
{
do
{
if (prov_algs.aiAlgid == algid)
{
ret = TRUE;
break;
}
} while (CryptGetProvParam(prov, PP_ENUMALGS, (BYTE *)&prov_algs, &size, CRYPT_NEXT));
}
LeaveCriticalSection(&prov_param_cs);
return ret;
}
HCRYPTPROV WINAPI DECLSPEC_HOTPATCH I_CryptGetDefaultCryptProv(ALG_ID algid)
{
HCRYPTPROV prov, defprov;
TRACE("(%08x)\n", algid);
defprov = CRYPT_GetDefaultProvider();
if (algid && !is_supported_algid(defprov, algid))
{
DWORD i = 0, type, size;
while (CryptEnumProvidersW(i, NULL, 0, &type, NULL, &size))
{
WCHAR *name = CryptMemAlloc(size);
if (name)
{
if (CryptEnumProvidersW(i, NULL, 0, &type, name, &size))
{
if (CryptAcquireContextW(&prov, NULL, name, type, CRYPT_VERIFYCONTEXT))
{
if (is_supported_algid(prov, algid))
{
CryptMemFree(name);
return prov;
}
CryptReleaseContext(prov, 0);
}
}
CryptMemFree(name);
}
i++;
}
SetLastError(E_INVALIDARG);
return 0;
}
CryptContextAddRef(defprov, NULL, 0);
return defprov;
}
BOOL WINAPI I_CryptReadTrustedPublisherDWORDValueFromRegistry(LPCWSTR name,
DWORD *value)
{
static const WCHAR safer[] = {
'S','o','f','t','w','a','r','e','\\','P','o','l','i','c','i','e','s','\\',
'M','i','c','r','o','s','o','f','t','\\','S','y','s','t','e','m',
'C','e','r','t','i','f','i','c','a','t','e','s','\\',
'T','r','u','s','t','e','d','P','u','b','l','i','s','h','e','r','\\',
'S','a','f','e','r',0 };
HKEY key;
LONG rc;
BOOL ret = FALSE;
TRACE("(%s, %p)\n", debugstr_w(name), value);
*value = 0;
rc = RegCreateKeyW(HKEY_LOCAL_MACHINE, safer, &key);
if (rc == ERROR_SUCCESS)
{
DWORD size = sizeof(DWORD);
if (!RegQueryValueExW(key, name, NULL, NULL, (LPBYTE)value, &size))
ret = TRUE;
RegCloseKey(key);
}
return ret;
}
DWORD WINAPI I_CryptInstallOssGlobal(DWORD x, DWORD y, DWORD z)
{
static int ret = 8;
ret++;
FIXME("%08x %08x %08x, return value %d\n", x, y, z,ret);
return ret;
}
BOOL WINAPI I_CryptInstallAsn1Module(ASN1module_t x, DWORD y, void* z)
{
FIXME("(%p %08x %p): stub\n", x, y, z);
return TRUE;
}
BOOL WINAPI I_CryptUninstallAsn1Module(HCRYPTASN1MODULE x)
{
FIXME("(%08x): stub\n", x);
return TRUE;
}
ASN1decoding_t WINAPI I_CryptGetAsn1Decoder(HCRYPTASN1MODULE x)
{
FIXME("(%08x): stub\n", x);
return NULL;
}
ASN1encoding_t WINAPI I_CryptGetAsn1Encoder(HCRYPTASN1MODULE x)
{
FIXME("(%08x): stub\n", x);
return NULL;
}
BOOL WINAPI CryptProtectMemory(void *data, DWORD len, DWORD flags)
{
static int fixme_once;
if (!fixme_once++) FIXME("(%p %u %08x): stub\n", data, len, flags);
return TRUE;
}
BOOL WINAPI CryptUnprotectMemory(void *data, DWORD len, DWORD flags)
{
static int fixme_once;
if (!fixme_once++) FIXME("(%p %u %08x): stub\n", data, len, flags);
return TRUE;
}