2 * Copyright 2006 Juan Lang
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #define NONAMELESSUNION
26 #include "wine/debug.h"
27 #include "wine/unicode.h"
28 #include "crypt32_private.h"
30 WINE_DEFAULT_DEBUG_CHANNEL(crypt
);
32 static void CRL_free(context_t
*context
)
34 crl_t
*crl
= (crl_t
*)context
;
36 CryptMemFree(crl
->ctx
.pbCrlEncoded
);
37 LocalFree(crl
->ctx
.pCrlInfo
);
40 static const context_vtbl_t crl_vtbl
;
42 static context_t
*CRL_clone(context_t
*context
, WINECRYPT_CERTSTORE
*store
, BOOL use_link
)
47 crl
= (crl_t
*)Context_CreateLinkContext(sizeof(CRL_CONTEXT
), context
, store
);
51 const crl_t
*cloned
= (const crl_t
*)context
;
55 crl
= (crl_t
*)Context_CreateDataContext(sizeof(CRL_CONTEXT
), &crl_vtbl
, store
);
59 Context_CopyProperties(&crl
->ctx
, &cloned
->ctx
);
61 crl
->ctx
.dwCertEncodingType
= cloned
->ctx
.dwCertEncodingType
;
62 crl
->ctx
.pbCrlEncoded
= CryptMemAlloc(cloned
->ctx
.cbCrlEncoded
);
63 memcpy(crl
->ctx
.pbCrlEncoded
, cloned
->ctx
.pbCrlEncoded
, cloned
->ctx
.cbCrlEncoded
);
64 crl
->ctx
.cbCrlEncoded
= cloned
->ctx
.cbCrlEncoded
;
66 /* FIXME: We don't need to decode the object here, we could just clone crl info. */
67 res
= CryptDecodeObjectEx(crl
->ctx
.dwCertEncodingType
, X509_CERT_CRL_TO_BE_SIGNED
,
68 crl
->ctx
.pbCrlEncoded
, crl
->ctx
.cbCrlEncoded
, CRYPT_DECODE_ALLOC_FLAG
, NULL
,
69 &crl
->ctx
.pCrlInfo
, &size
);
71 CertFreeCRLContext(&crl
->ctx
);
76 crl
->ctx
.hCertStore
= store
;
80 static const context_vtbl_t crl_vtbl
= {
85 PCCRL_CONTEXT WINAPI
CertCreateCRLContext(DWORD dwCertEncodingType
,
86 const BYTE
* pbCrlEncoded
, DWORD cbCrlEncoded
)
90 PCRL_INFO crlInfo
= NULL
;
94 TRACE("(%08x, %p, %d)\n", dwCertEncodingType
, pbCrlEncoded
,
97 if ((dwCertEncodingType
& CERT_ENCODING_TYPE_MASK
) != X509_ASN_ENCODING
)
99 SetLastError(E_INVALIDARG
);
102 ret
= CryptDecodeObjectEx(dwCertEncodingType
, X509_CERT_CRL_TO_BE_SIGNED
,
103 pbCrlEncoded
, cbCrlEncoded
, CRYPT_DECODE_ALLOC_FLAG
, NULL
,
108 crl
= (crl_t
*)Context_CreateDataContext(sizeof(CRL_CONTEXT
), &crl_vtbl
, &empty_store
);
112 data
= CryptMemAlloc(cbCrlEncoded
);
115 Context_Release(&crl
->base
);
119 memcpy(data
, pbCrlEncoded
, cbCrlEncoded
);
120 crl
->ctx
.dwCertEncodingType
= dwCertEncodingType
;
121 crl
->ctx
.pbCrlEncoded
= data
;
122 crl
->ctx
.cbCrlEncoded
= cbCrlEncoded
;
123 crl
->ctx
.pCrlInfo
= crlInfo
;
124 crl
->ctx
.hCertStore
= &empty_store
;
129 BOOL WINAPI
CertAddEncodedCRLToStore(HCERTSTORE hCertStore
,
130 DWORD dwCertEncodingType
, const BYTE
*pbCrlEncoded
, DWORD cbCrlEncoded
,
131 DWORD dwAddDisposition
, PCCRL_CONTEXT
*ppCrlContext
)
133 PCCRL_CONTEXT crl
= CertCreateCRLContext(dwCertEncodingType
,
134 pbCrlEncoded
, cbCrlEncoded
);
137 TRACE("(%p, %08x, %p, %d, %08x, %p)\n", hCertStore
, dwCertEncodingType
,
138 pbCrlEncoded
, cbCrlEncoded
, dwAddDisposition
, ppCrlContext
);
142 ret
= CertAddCRLContextToStore(hCertStore
, crl
, dwAddDisposition
,
144 CertFreeCRLContext(crl
);
151 typedef BOOL (*CrlCompareFunc
)(PCCRL_CONTEXT pCrlContext
, DWORD dwType
,
152 DWORD dwFlags
, const void *pvPara
);
154 static BOOL
compare_crl_any(PCCRL_CONTEXT pCrlContext
, DWORD dwType
,
155 DWORD dwFlags
, const void *pvPara
)
160 static BOOL
compare_crl_issued_by(PCCRL_CONTEXT pCrlContext
, DWORD dwType
,
161 DWORD dwFlags
, const void *pvPara
)
167 PCCERT_CONTEXT issuer
= pvPara
;
169 ret
= CertCompareCertificateName(issuer
->dwCertEncodingType
,
170 &issuer
->pCertInfo
->Subject
, &pCrlContext
->pCrlInfo
->Issuer
);
171 if (ret
&& (dwFlags
& CRL_FIND_ISSUED_BY_SIGNATURE_FLAG
))
172 ret
= CryptVerifyCertificateSignatureEx(0,
173 issuer
->dwCertEncodingType
,
174 CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL
, (void *)pCrlContext
,
175 CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT
, (void *)issuer
, 0, NULL
);
176 if (ret
&& (dwFlags
& CRL_FIND_ISSUED_BY_AKI_FLAG
))
178 PCERT_EXTENSION ext
= CertFindExtension(
179 szOID_AUTHORITY_KEY_IDENTIFIER2
, pCrlContext
->pCrlInfo
->cExtension
,
180 pCrlContext
->pCrlInfo
->rgExtension
);
184 CERT_AUTHORITY_KEY_ID2_INFO
*info
;
187 if ((ret
= CryptDecodeObjectEx(X509_ASN_ENCODING
,
188 X509_AUTHORITY_KEY_ID2
, ext
->Value
.pbData
, ext
->Value
.cbData
,
189 CRYPT_DECODE_ALLOC_FLAG
, NULL
, &info
, &size
)))
191 if (info
->AuthorityCertIssuer
.cAltEntry
&&
192 info
->AuthorityCertSerialNumber
.cbData
)
194 PCERT_ALT_NAME_ENTRY directoryName
= NULL
;
197 for (i
= 0; !directoryName
&&
198 i
< info
->AuthorityCertIssuer
.cAltEntry
; i
++)
199 if (info
->AuthorityCertIssuer
.rgAltEntry
[i
].
200 dwAltNameChoice
== CERT_ALT_NAME_DIRECTORY_NAME
)
202 &info
->AuthorityCertIssuer
.rgAltEntry
[i
];
205 ret
= CertCompareCertificateName(
206 issuer
->dwCertEncodingType
,
207 &issuer
->pCertInfo
->Subject
,
208 &directoryName
->u
.DirectoryName
);
210 ret
= CertCompareIntegerBlob(
211 &issuer
->pCertInfo
->SerialNumber
,
212 &info
->AuthorityCertSerialNumber
);
216 FIXME("no supported name type in authority key id2\n");
220 else if (info
->KeyId
.cbData
)
224 ret
= CertGetCertificateContextProperty(issuer
,
225 CERT_KEY_IDENTIFIER_PROP_ID
, NULL
, &size
);
226 if (ret
&& size
== info
->KeyId
.cbData
)
228 LPBYTE buf
= CryptMemAlloc(size
);
232 CertGetCertificateContextProperty(issuer
,
233 CERT_KEY_IDENTIFIER_PROP_ID
, buf
, &size
);
234 ret
= !memcmp(buf
, info
->KeyId
.pbData
, size
);
245 FIXME("unsupported value for AKI extension\n");
251 /* else: a CRL without an AKI matches any cert */
259 static BOOL
compare_crl_existing(PCCRL_CONTEXT pCrlContext
, DWORD dwType
,
260 DWORD dwFlags
, const void *pvPara
)
266 PCCRL_CONTEXT crl
= pvPara
;
268 ret
= CertCompareCertificateName(pCrlContext
->dwCertEncodingType
,
269 &pCrlContext
->pCrlInfo
->Issuer
, &crl
->pCrlInfo
->Issuer
);
276 static BOOL
compare_crl_issued_for(PCCRL_CONTEXT pCrlContext
, DWORD dwType
,
277 DWORD dwFlags
, const void *pvPara
)
279 const CRL_FIND_ISSUED_FOR_PARA
*para
= pvPara
;
282 ret
= CertCompareCertificateName(para
->pIssuerCert
->dwCertEncodingType
,
283 ¶
->pIssuerCert
->pCertInfo
->Issuer
, &pCrlContext
->pCrlInfo
->Issuer
);
287 PCCRL_CONTEXT WINAPI
CertFindCRLInStore(HCERTSTORE hCertStore
,
288 DWORD dwCertEncodingType
, DWORD dwFindFlags
, DWORD dwFindType
,
289 const void *pvFindPara
, PCCRL_CONTEXT pPrevCrlContext
)
292 CrlCompareFunc compare
;
294 TRACE("(%p, %d, %d, %d, %p, %p)\n", hCertStore
, dwCertEncodingType
,
295 dwFindFlags
, dwFindType
, pvFindPara
, pPrevCrlContext
);
300 compare
= compare_crl_any
;
302 case CRL_FIND_ISSUED_BY
:
303 compare
= compare_crl_issued_by
;
305 case CRL_FIND_EXISTING
:
306 compare
= compare_crl_existing
;
308 case CRL_FIND_ISSUED_FOR
:
309 compare
= compare_crl_issued_for
;
312 FIXME("find type %08x unimplemented\n", dwFindType
);
318 BOOL matches
= FALSE
;
320 ret
= pPrevCrlContext
;
322 ret
= CertEnumCRLsInStore(hCertStore
, ret
);
324 matches
= compare(ret
, dwFindType
, dwFindFlags
, pvFindPara
);
325 } while (ret
!= NULL
&& !matches
);
327 SetLastError(CRYPT_E_NOT_FOUND
);
331 SetLastError(CRYPT_E_NOT_FOUND
);
337 PCCRL_CONTEXT WINAPI
CertGetCRLFromStore(HCERTSTORE hCertStore
,
338 PCCERT_CONTEXT pIssuerContext
, PCCRL_CONTEXT pPrevCrlContext
, DWORD
*pdwFlags
)
340 static const DWORD supportedFlags
= CERT_STORE_SIGNATURE_FLAG
|
341 CERT_STORE_TIME_VALIDITY_FLAG
| CERT_STORE_BASE_CRL_FLAG
|
342 CERT_STORE_DELTA_CRL_FLAG
;
345 TRACE("(%p, %p, %p, %08x)\n", hCertStore
, pIssuerContext
, pPrevCrlContext
,
348 if (*pdwFlags
& ~supportedFlags
)
350 SetLastError(E_INVALIDARG
);
354 ret
= CertFindCRLInStore(hCertStore
, pIssuerContext
->dwCertEncodingType
,
355 0, CRL_FIND_ISSUED_BY
, pIssuerContext
, pPrevCrlContext
);
357 ret
= CertFindCRLInStore(hCertStore
, 0, 0, CRL_FIND_ANY
, NULL
,
361 if (*pdwFlags
& CERT_STORE_TIME_VALIDITY_FLAG
)
363 if (0 == CertVerifyCRLTimeValidity(NULL
, ret
->pCrlInfo
))
364 *pdwFlags
&= ~CERT_STORE_TIME_VALIDITY_FLAG
;
366 if (*pdwFlags
& CERT_STORE_SIGNATURE_FLAG
)
368 if (CryptVerifyCertificateSignatureEx(0, ret
->dwCertEncodingType
,
369 CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL
, (void *)ret
,
370 CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT
, (void *)pIssuerContext
, 0,
372 *pdwFlags
&= ~CERT_STORE_SIGNATURE_FLAG
;
378 PCCRL_CONTEXT WINAPI
CertDuplicateCRLContext(PCCRL_CONTEXT pCrlContext
)
380 TRACE("(%p)\n", pCrlContext
);
382 Context_AddRef(&crl_from_ptr(pCrlContext
)->base
);
386 BOOL WINAPI
CertFreeCRLContext(PCCRL_CONTEXT pCrlContext
)
388 TRACE("(%p)\n", pCrlContext
);
391 Context_Release(&crl_from_ptr(pCrlContext
)->base
);
395 DWORD WINAPI
CertEnumCRLContextProperties(PCCRL_CONTEXT pCRLContext
,
398 TRACE("(%p, %d)\n", pCRLContext
, dwPropId
);
400 return ContextPropertyList_EnumPropIDs(crl_from_ptr(pCRLContext
)->base
.properties
, dwPropId
);
403 static BOOL
CRLContext_SetProperty(crl_t
*crl
, DWORD dwPropId
,
404 DWORD dwFlags
, const void *pvData
);
406 static BOOL
CRLContext_GetHashProp(crl_t
*crl
, DWORD dwPropId
,
407 ALG_ID algID
, const BYTE
*toHash
, DWORD toHashLen
, void *pvData
,
410 BOOL ret
= CryptHashCertificate(0, algID
, 0, toHash
, toHashLen
, pvData
,
414 CRYPT_DATA_BLOB blob
= { *pcbData
, pvData
};
416 ret
= CRLContext_SetProperty(crl
, dwPropId
, 0, &blob
);
421 static BOOL
CRLContext_GetProperty(crl_t
*crl
, DWORD dwPropId
,
422 void *pvData
, DWORD
*pcbData
)
425 CRYPT_DATA_BLOB blob
;
427 TRACE("(%p, %d, %p, %p)\n", crl
, dwPropId
, pvData
, pcbData
);
429 if (crl
->base
.properties
)
430 ret
= ContextPropertyList_FindProperty(crl
->base
.properties
, dwPropId
, &blob
);
436 *pcbData
= blob
.cbData
;
437 else if (*pcbData
< blob
.cbData
)
439 SetLastError(ERROR_MORE_DATA
);
440 *pcbData
= blob
.cbData
;
445 memcpy(pvData
, blob
.pbData
, blob
.cbData
);
446 *pcbData
= blob
.cbData
;
451 /* Implicit properties */
454 case CERT_SHA1_HASH_PROP_ID
:
455 ret
= CRLContext_GetHashProp(crl
, dwPropId
, CALG_SHA1
,
456 crl
->ctx
.pbCrlEncoded
, crl
->ctx
.cbCrlEncoded
, pvData
,
459 case CERT_MD5_HASH_PROP_ID
:
460 ret
= CRLContext_GetHashProp(crl
, dwPropId
, CALG_MD5
,
461 crl
->ctx
.pbCrlEncoded
, crl
->ctx
.cbCrlEncoded
, pvData
,
465 SetLastError(CRYPT_E_NOT_FOUND
);
468 TRACE("returning %d\n", ret
);
472 BOOL WINAPI
CertGetCRLContextProperty(PCCRL_CONTEXT pCRLContext
,
473 DWORD dwPropId
, void *pvData
, DWORD
*pcbData
)
477 TRACE("(%p, %d, %p, %p)\n", pCRLContext
, dwPropId
, pvData
, pcbData
);
482 case CERT_CERT_PROP_ID
:
483 case CERT_CRL_PROP_ID
:
484 case CERT_CTL_PROP_ID
:
485 SetLastError(E_INVALIDARG
);
488 case CERT_ACCESS_STATE_PROP_ID
:
491 *pcbData
= sizeof(DWORD
);
494 else if (*pcbData
< sizeof(DWORD
))
496 SetLastError(ERROR_MORE_DATA
);
497 *pcbData
= sizeof(DWORD
);
502 ret
= CertGetStoreProperty(pCRLContext
->hCertStore
, dwPropId
, pvData
, pcbData
);
506 ret
= CRLContext_GetProperty(crl_from_ptr(pCRLContext
), dwPropId
, pvData
, pcbData
);
511 static BOOL
CRLContext_SetProperty(crl_t
*crl
, DWORD dwPropId
,
512 DWORD dwFlags
, const void *pvData
)
516 TRACE("(%p, %d, %08x, %p)\n", crl
, dwPropId
, dwFlags
, pvData
);
518 if (!crl
->base
.properties
)
522 ContextPropertyList_RemoveProperty(crl
->base
.properties
, dwPropId
);
529 case CERT_AUTO_ENROLL_PROP_ID
:
530 case CERT_CTL_USAGE_PROP_ID
: /* same as CERT_ENHKEY_USAGE_PROP_ID */
531 case CERT_DESCRIPTION_PROP_ID
:
532 case CERT_FRIENDLY_NAME_PROP_ID
:
533 case CERT_HASH_PROP_ID
:
534 case CERT_KEY_IDENTIFIER_PROP_ID
:
535 case CERT_MD5_HASH_PROP_ID
:
536 case CERT_NEXT_UPDATE_LOCATION_PROP_ID
:
537 case CERT_PUBKEY_ALG_PARA_PROP_ID
:
538 case CERT_PVK_FILE_PROP_ID
:
539 case CERT_SIGNATURE_HASH_PROP_ID
:
540 case CERT_ISSUER_PUBLIC_KEY_MD5_HASH_PROP_ID
:
541 case CERT_SUBJECT_NAME_MD5_HASH_PROP_ID
:
542 case CERT_SUBJECT_PUBLIC_KEY_MD5_HASH_PROP_ID
:
543 case CERT_ENROLLMENT_PROP_ID
:
544 case CERT_CROSS_CERT_DIST_POINTS_PROP_ID
:
545 case CERT_RENEWAL_PROP_ID
:
547 PCRYPT_DATA_BLOB blob
= (PCRYPT_DATA_BLOB
)pvData
;
549 ret
= ContextPropertyList_SetProperty(crl
->base
.properties
, dwPropId
,
550 blob
->pbData
, blob
->cbData
);
553 case CERT_DATE_STAMP_PROP_ID
:
554 ret
= ContextPropertyList_SetProperty(crl
->base
.properties
, dwPropId
,
555 pvData
, sizeof(FILETIME
));
558 FIXME("%d: stub\n", dwPropId
);
562 TRACE("returning %d\n", ret
);
566 BOOL WINAPI
CertSetCRLContextProperty(PCCRL_CONTEXT pCRLContext
,
567 DWORD dwPropId
, DWORD dwFlags
, const void *pvData
)
571 TRACE("(%p, %d, %08x, %p)\n", pCRLContext
, dwPropId
, dwFlags
, pvData
);
573 /* Handle special cases for "read-only"/invalid prop IDs. Windows just
574 * crashes on most of these, I'll be safer.
579 case CERT_ACCESS_STATE_PROP_ID
:
580 case CERT_CERT_PROP_ID
:
581 case CERT_CRL_PROP_ID
:
582 case CERT_CTL_PROP_ID
:
583 SetLastError(E_INVALIDARG
);
586 ret
= CRLContext_SetProperty(crl_from_ptr(pCRLContext
), dwPropId
, dwFlags
, pvData
);
587 TRACE("returning %d\n", ret
);
591 static BOOL
compare_dist_point_name(const CRL_DIST_POINT_NAME
*name1
,
592 const CRL_DIST_POINT_NAME
*name2
)
596 if (name1
->dwDistPointNameChoice
== name2
->dwDistPointNameChoice
)
599 if (name1
->dwDistPointNameChoice
== CRL_DIST_POINT_FULL_NAME
)
601 if (name1
->u
.FullName
.cAltEntry
== name2
->u
.FullName
.cAltEntry
)
605 for (i
= 0; match
&& i
< name1
->u
.FullName
.cAltEntry
; i
++)
607 const CERT_ALT_NAME_ENTRY
*entry1
=
608 &name1
->u
.FullName
.rgAltEntry
[i
];
609 const CERT_ALT_NAME_ENTRY
*entry2
=
610 &name2
->u
.FullName
.rgAltEntry
[i
];
612 if (entry1
->dwAltNameChoice
== entry2
->dwAltNameChoice
)
614 switch (entry1
->dwAltNameChoice
)
616 case CERT_ALT_NAME_URL
:
617 match
= !strcmpiW(entry1
->u
.pwszURL
,
620 case CERT_ALT_NAME_DIRECTORY_NAME
:
621 match
= (entry1
->u
.DirectoryName
.cbData
==
622 entry2
->u
.DirectoryName
.cbData
) &&
623 !memcmp(entry1
->u
.DirectoryName
.pbData
,
624 entry2
->u
.DirectoryName
.pbData
,
625 entry1
->u
.DirectoryName
.cbData
);
628 FIXME("unimplemented for type %d\n",
629 entry1
->dwAltNameChoice
);
646 static BOOL
match_dist_point_with_issuing_dist_point(
647 const CRL_DIST_POINT
*distPoint
, const CRL_ISSUING_DIST_POINT
*idp
)
651 /* While RFC 5280, section 4.2.1.13 recommends against segmenting
652 * CRL distribution points by reasons, it doesn't preclude doing so.
653 * "This profile RECOMMENDS against segmenting CRLs by reason code."
654 * If the issuing distribution point for this CRL is only valid for
655 * some reasons, only match if the reasons covered also match the
656 * reasons in the CRL distribution point.
658 if (idp
->OnlySomeReasonFlags
.cbData
)
660 if (idp
->OnlySomeReasonFlags
.cbData
== distPoint
->ReasonFlags
.cbData
)
665 for (i
= 0; match
&& i
< distPoint
->ReasonFlags
.cbData
; i
++)
666 if (idp
->OnlySomeReasonFlags
.pbData
[i
] !=
667 distPoint
->ReasonFlags
.pbData
[i
])
676 match
= compare_dist_point_name(&idp
->DistPointName
,
677 &distPoint
->DistPointName
);
681 BOOL WINAPI
CertIsValidCRLForCertificate(PCCERT_CONTEXT pCert
,
682 PCCRL_CONTEXT pCrl
, DWORD dwFlags
, void *pvReserved
)
687 TRACE("(%p, %p, %08x, %p)\n", pCert
, pCrl
, dwFlags
, pvReserved
);
692 if ((ext
= CertFindExtension(szOID_ISSUING_DIST_POINT
,
693 pCrl
->pCrlInfo
->cExtension
, pCrl
->pCrlInfo
->rgExtension
)))
695 CRL_ISSUING_DIST_POINT
*idp
;
698 if ((ret
= CryptDecodeObjectEx(pCrl
->dwCertEncodingType
,
699 X509_ISSUING_DIST_POINT
, ext
->Value
.pbData
, ext
->Value
.cbData
,
700 CRYPT_DECODE_ALLOC_FLAG
, NULL
, &idp
, &size
)))
702 if ((ext
= CertFindExtension(szOID_CRL_DIST_POINTS
,
703 pCert
->pCertInfo
->cExtension
, pCert
->pCertInfo
->rgExtension
)))
705 CRL_DIST_POINTS_INFO
*distPoints
;
707 if ((ret
= CryptDecodeObjectEx(pCert
->dwCertEncodingType
,
708 X509_CRL_DIST_POINTS
, ext
->Value
.pbData
, ext
->Value
.cbData
,
709 CRYPT_DECODE_ALLOC_FLAG
, NULL
, &distPoints
, &size
)))
714 for (i
= 0; !ret
&& i
< distPoints
->cDistPoint
; i
++)
715 ret
= match_dist_point_with_issuing_dist_point(
716 &distPoints
->rgDistPoint
[i
], idp
);
718 SetLastError(CRYPT_E_NO_MATCH
);
719 LocalFree(distPoints
);
724 /* no CRL dist points extension in cert, can't match the CRL
725 * (which has an issuing dist point extension)
728 SetLastError(CRYPT_E_NO_MATCH
);
738 static PCRL_ENTRY
CRYPT_FindCertificateInCRL(PCERT_INFO cert
, const CRL_INFO
*crl
)
741 PCRL_ENTRY entry
= NULL
;
743 for (i
= 0; !entry
&& i
< crl
->cCRLEntry
; i
++)
744 if (CertCompareIntegerBlob(&crl
->rgCRLEntry
[i
].SerialNumber
,
745 &cert
->SerialNumber
))
746 entry
= &crl
->rgCRLEntry
[i
];
750 BOOL WINAPI
CertFindCertificateInCRL(PCCERT_CONTEXT pCert
,
751 PCCRL_CONTEXT pCrlContext
, DWORD dwFlags
, void *pvReserved
,
752 PCRL_ENTRY
*ppCrlEntry
)
754 TRACE("(%p, %p, %08x, %p, %p)\n", pCert
, pCrlContext
, dwFlags
, pvReserved
,
757 *ppCrlEntry
= CRYPT_FindCertificateInCRL(pCert
->pCertInfo
,
758 pCrlContext
->pCrlInfo
);
762 BOOL WINAPI
CertVerifyCRLRevocation(DWORD dwCertEncodingType
,
763 PCERT_INFO pCertId
, DWORD cCrlInfo
, PCRL_INFO rgpCrlInfo
[])
766 PCRL_ENTRY entry
= NULL
;
768 TRACE("(%08x, %p, %d, %p)\n", dwCertEncodingType
, pCertId
, cCrlInfo
,
771 for (i
= 0; !entry
&& i
< cCrlInfo
; i
++)
772 entry
= CRYPT_FindCertificateInCRL(pCertId
, rgpCrlInfo
[i
]);
773 return entry
== NULL
;
776 LONG WINAPI
CertVerifyCRLTimeValidity(LPFILETIME pTimeToVerify
,
784 GetSystemTimeAsFileTime(&fileTime
);
785 pTimeToVerify
= &fileTime
;
787 if ((ret
= CompareFileTime(pTimeToVerify
, &pCrlInfo
->ThisUpdate
)) >= 0)
789 ret
= CompareFileTime(pTimeToVerify
, &pCrlInfo
->NextUpdate
);