wined3d: Make the shader parameter to init_output_registers() const.
[wine/multimedia.git] / dlls / cryptnet / cryptnet_main.c
blobe7f9f461f3a46af205e4535c17a084df707d0fe8
1 /*
2 * Copyright (C) 2006 Maarten Lankhorst
3 * Copyright 2007 Juan Lang
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #include "config.h"
22 #include "wine/port.h"
24 #define NONAMELESSUNION
25 #define NONAMELESSSTRUCT
26 #define CERT_REVOCATION_PARA_HAS_EXTRA_FIELDS
28 #include <stdio.h>
29 #include <stdarg.h>
31 #include "windef.h"
32 #include "winbase.h"
33 #include "winnt.h"
34 #include "winnls.h"
35 #include "wininet.h"
36 #include "objbase.h"
37 #include "wincrypt.h"
39 #include "wine/debug.h"
41 WINE_DEFAULT_DEBUG_CHANNEL(cryptnet);
43 #define IS_INTOID(x) (((ULONG_PTR)(x) >> 16) == 0)
45 BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
47 TRACE("(0x%p, %d, %p)\n", hinstDLL, fdwReason, lpvReserved);
49 switch (fdwReason) {
50 case DLL_PROCESS_ATTACH:
51 DisableThreadLibraryCalls(hinstDLL);
52 break;
53 case DLL_PROCESS_DETACH:
54 /* Do uninitialisation here */
55 break;
56 default: break;
58 return TRUE;
61 static const WCHAR cryptNet[] = { 'c','r','y','p','t','n','e','t','.',
62 'd','l','l',0 };
63 static const WCHAR ldapProvOpenStore[] = { 'L','d','a','p','P','r','o','v',
64 'O','p','e','S','t','o','r','e',0 };
66 /***********************************************************************
67 * DllRegisterServer (CRYPTNET.@)
69 HRESULT WINAPI DllRegisterServer(void)
71 TRACE("\n");
72 CryptRegisterDefaultOIDFunction(X509_ASN_ENCODING,
73 CRYPT_OID_VERIFY_REVOCATION_FUNC, 0, cryptNet);
74 CryptRegisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC, "Ldap",
75 cryptNet, "LdapProvOpenStore");
76 CryptRegisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC,
77 CERT_STORE_PROV_LDAP_W, cryptNet, "LdapProvOpenStore");
78 return S_OK;
81 /***********************************************************************
82 * DllUnregisterServer (CRYPTNET.@)
84 HRESULT WINAPI DllUnregisterServer(void)
86 TRACE("\n");
87 CryptUnregisterDefaultOIDFunction(X509_ASN_ENCODING,
88 CRYPT_OID_VERIFY_REVOCATION_FUNC, cryptNet);
89 CryptUnregisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC, "Ldap");
90 CryptUnregisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC,
91 CERT_STORE_PROV_LDAP_W);
92 return S_OK;
95 static const char *url_oid_to_str(LPCSTR oid)
97 if (IS_INTOID(oid))
99 static char buf[10];
101 switch (LOWORD(oid))
103 #define _x(oid) case LOWORD(oid): return #oid
104 _x(URL_OID_CERTIFICATE_ISSUER);
105 _x(URL_OID_CERTIFICATE_CRL_DIST_POINT);
106 _x(URL_OID_CTL_ISSUER);
107 _x(URL_OID_CTL_NEXT_UPDATE);
108 _x(URL_OID_CRL_ISSUER);
109 _x(URL_OID_CERTIFICATE_FRESHEST_CRL);
110 _x(URL_OID_CRL_FRESHEST_CRL);
111 _x(URL_OID_CROSS_CERT_DIST_POINT);
112 #undef _x
113 default:
114 snprintf(buf, sizeof(buf), "%d", LOWORD(oid));
115 return buf;
118 else
119 return oid;
122 typedef BOOL (WINAPI *UrlDllGetObjectUrlFunc)(LPCSTR, LPVOID, DWORD,
123 PCRYPT_URL_ARRAY, DWORD *, PCRYPT_URL_INFO, DWORD *, LPVOID);
125 static BOOL WINAPI CRYPT_GetUrlFromCertificateIssuer(LPCSTR pszUrlOid,
126 LPVOID pvPara, DWORD dwFlags, PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray,
127 PCRYPT_URL_INFO pUrlInfo, DWORD *pcbUrlInfo, LPVOID pvReserved)
129 PCCERT_CONTEXT cert = pvPara;
130 PCERT_EXTENSION ext;
131 BOOL ret = FALSE;
133 /* The only applicable flag is CRYPT_GET_URL_FROM_EXTENSION */
134 if (dwFlags && !(dwFlags & CRYPT_GET_URL_FROM_EXTENSION))
136 SetLastError(CRYPT_E_NOT_FOUND);
137 return FALSE;
139 if ((ext = CertFindExtension(szOID_AUTHORITY_INFO_ACCESS,
140 cert->pCertInfo->cExtension, cert->pCertInfo->rgExtension)))
142 CERT_AUTHORITY_INFO_ACCESS *aia;
143 DWORD size;
145 ret = CryptDecodeObjectEx(X509_ASN_ENCODING, X509_AUTHORITY_INFO_ACCESS,
146 ext->Value.pbData, ext->Value.cbData, CRYPT_DECODE_ALLOC_FLAG, NULL,
147 &aia, &size);
148 if (ret)
150 DWORD i, cUrl, bytesNeeded = sizeof(CRYPT_URL_ARRAY);
152 for (i = 0, cUrl = 0; i < aia->cAccDescr; i++)
153 if (!strcmp(aia->rgAccDescr[i].pszAccessMethod,
154 szOID_PKIX_CA_ISSUERS))
156 if (aia->rgAccDescr[i].AccessLocation.dwAltNameChoice ==
157 CERT_ALT_NAME_URL)
159 if (aia->rgAccDescr[i].AccessLocation.u.pwszURL)
161 cUrl++;
162 bytesNeeded += sizeof(LPWSTR) +
163 (lstrlenW(aia->rgAccDescr[i].AccessLocation.u.
164 pwszURL) + 1) * sizeof(WCHAR);
167 else
168 FIXME("unsupported alt name type %d\n",
169 aia->rgAccDescr[i].AccessLocation.dwAltNameChoice);
171 if (!pcbUrlArray)
173 SetLastError(E_INVALIDARG);
174 ret = FALSE;
176 else if (!pUrlArray)
177 *pcbUrlArray = bytesNeeded;
178 else if (*pcbUrlArray < bytesNeeded)
180 SetLastError(ERROR_MORE_DATA);
181 *pcbUrlArray = bytesNeeded;
182 ret = FALSE;
184 else
186 LPWSTR nextUrl;
188 *pcbUrlArray = bytesNeeded;
189 pUrlArray->cUrl = 0;
190 pUrlArray->rgwszUrl =
191 (LPWSTR *)((BYTE *)pUrlArray + sizeof(CRYPT_URL_ARRAY));
192 nextUrl = (LPWSTR)((BYTE *)pUrlArray + sizeof(CRYPT_URL_ARRAY)
193 + cUrl * sizeof(LPWSTR));
194 for (i = 0; i < aia->cAccDescr; i++)
195 if (!strcmp(aia->rgAccDescr[i].pszAccessMethod,
196 szOID_PKIX_CA_ISSUERS))
198 if (aia->rgAccDescr[i].AccessLocation.dwAltNameChoice
199 == CERT_ALT_NAME_URL)
201 if (aia->rgAccDescr[i].AccessLocation.u.pwszURL)
203 lstrcpyW(nextUrl,
204 aia->rgAccDescr[i].AccessLocation.u.pwszURL);
205 pUrlArray->rgwszUrl[pUrlArray->cUrl++] =
206 nextUrl;
207 nextUrl += (lstrlenW(nextUrl) + 1);
212 if (ret)
214 if (pcbUrlInfo)
216 FIXME("url info: stub\n");
217 if (!pUrlInfo)
218 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
219 else if (*pcbUrlInfo < sizeof(CRYPT_URL_INFO))
221 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
222 SetLastError(ERROR_MORE_DATA);
223 ret = FALSE;
225 else
227 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
228 memset(pUrlInfo, 0, sizeof(CRYPT_URL_INFO));
232 LocalFree(aia);
235 else
236 SetLastError(CRYPT_E_NOT_FOUND);
237 return ret;
240 static BOOL CRYPT_GetUrlFromCRLDistPointsExt(const CRYPT_DATA_BLOB *value,
241 PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray, PCRYPT_URL_INFO pUrlInfo,
242 DWORD *pcbUrlInfo)
244 BOOL ret;
245 CRL_DIST_POINTS_INFO *info;
246 DWORD size;
248 ret = CryptDecodeObjectEx(X509_ASN_ENCODING, X509_CRL_DIST_POINTS,
249 value->pbData, value->cbData, CRYPT_DECODE_ALLOC_FLAG, NULL, &info, &size);
250 if (ret)
252 DWORD i, cUrl, bytesNeeded = sizeof(CRYPT_URL_ARRAY);
254 for (i = 0, cUrl = 0; i < info->cDistPoint; i++)
255 if (info->rgDistPoint[i].DistPointName.dwDistPointNameChoice
256 == CRL_DIST_POINT_FULL_NAME)
258 DWORD j;
259 CERT_ALT_NAME_INFO *name =
260 &info->rgDistPoint[i].DistPointName.u.FullName;
262 for (j = 0; j < name->cAltEntry; j++)
263 if (name->rgAltEntry[j].dwAltNameChoice ==
264 CERT_ALT_NAME_URL)
266 if (name->rgAltEntry[j].u.pwszURL)
268 cUrl++;
269 bytesNeeded += sizeof(LPWSTR) +
270 (lstrlenW(name->rgAltEntry[j].u.pwszURL) + 1)
271 * sizeof(WCHAR);
275 if (!pcbUrlArray)
277 SetLastError(E_INVALIDARG);
278 ret = FALSE;
280 else if (!pUrlArray)
281 *pcbUrlArray = bytesNeeded;
282 else if (*pcbUrlArray < bytesNeeded)
284 SetLastError(ERROR_MORE_DATA);
285 *pcbUrlArray = bytesNeeded;
286 ret = FALSE;
288 else
290 LPWSTR nextUrl;
292 *pcbUrlArray = bytesNeeded;
293 pUrlArray->cUrl = 0;
294 pUrlArray->rgwszUrl =
295 (LPWSTR *)((BYTE *)pUrlArray + sizeof(CRYPT_URL_ARRAY));
296 nextUrl = (LPWSTR)((BYTE *)pUrlArray + sizeof(CRYPT_URL_ARRAY)
297 + cUrl * sizeof(LPWSTR));
298 for (i = 0; i < info->cDistPoint; i++)
299 if (info->rgDistPoint[i].DistPointName.dwDistPointNameChoice
300 == CRL_DIST_POINT_FULL_NAME)
302 DWORD j;
303 CERT_ALT_NAME_INFO *name =
304 &info->rgDistPoint[i].DistPointName.u.FullName;
306 for (j = 0; j < name->cAltEntry; j++)
307 if (name->rgAltEntry[j].dwAltNameChoice ==
308 CERT_ALT_NAME_URL)
310 if (name->rgAltEntry[j].u.pwszURL)
312 lstrcpyW(nextUrl,
313 name->rgAltEntry[j].u.pwszURL);
314 pUrlArray->rgwszUrl[pUrlArray->cUrl++] =
315 nextUrl;
316 nextUrl +=
317 (lstrlenW(name->rgAltEntry[j].u.pwszURL) + 1);
322 if (ret)
324 if (pcbUrlInfo)
326 FIXME("url info: stub\n");
327 if (!pUrlInfo)
328 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
329 else if (*pcbUrlInfo < sizeof(CRYPT_URL_INFO))
331 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
332 SetLastError(ERROR_MORE_DATA);
333 ret = FALSE;
335 else
337 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
338 memset(pUrlInfo, 0, sizeof(CRYPT_URL_INFO));
342 LocalFree(info);
344 return ret;
347 static BOOL WINAPI CRYPT_GetUrlFromCertificateCRLDistPoint(LPCSTR pszUrlOid,
348 LPVOID pvPara, DWORD dwFlags, PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray,
349 PCRYPT_URL_INFO pUrlInfo, DWORD *pcbUrlInfo, LPVOID pvReserved)
351 PCCERT_CONTEXT cert = pvPara;
352 PCERT_EXTENSION ext;
353 BOOL ret = FALSE;
355 /* The only applicable flag is CRYPT_GET_URL_FROM_EXTENSION */
356 if (dwFlags && !(dwFlags & CRYPT_GET_URL_FROM_EXTENSION))
358 SetLastError(CRYPT_E_NOT_FOUND);
359 return FALSE;
361 if ((ext = CertFindExtension(szOID_CRL_DIST_POINTS,
362 cert->pCertInfo->cExtension, cert->pCertInfo->rgExtension)))
363 ret = CRYPT_GetUrlFromCRLDistPointsExt(&ext->Value, pUrlArray,
364 pcbUrlArray, pUrlInfo, pcbUrlInfo);
365 else
366 SetLastError(CRYPT_E_NOT_FOUND);
367 return ret;
370 /***********************************************************************
371 * CryptGetObjectUrl (CRYPTNET.@)
373 BOOL WINAPI CryptGetObjectUrl(LPCSTR pszUrlOid, LPVOID pvPara, DWORD dwFlags,
374 PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray, PCRYPT_URL_INFO pUrlInfo,
375 DWORD *pcbUrlInfo, LPVOID pvReserved)
377 UrlDllGetObjectUrlFunc func = NULL;
378 HCRYPTOIDFUNCADDR hFunc = NULL;
379 BOOL ret = FALSE;
381 TRACE("(%s, %p, %08x, %p, %p, %p, %p, %p)\n", debugstr_a(pszUrlOid),
382 pvPara, dwFlags, pUrlArray, pcbUrlArray, pUrlInfo, pcbUrlInfo, pvReserved);
384 if (IS_INTOID(pszUrlOid))
386 switch (LOWORD(pszUrlOid))
388 case LOWORD(URL_OID_CERTIFICATE_ISSUER):
389 func = CRYPT_GetUrlFromCertificateIssuer;
390 break;
391 case LOWORD(URL_OID_CERTIFICATE_CRL_DIST_POINT):
392 func = CRYPT_GetUrlFromCertificateCRLDistPoint;
393 break;
394 default:
395 FIXME("unimplemented for %s\n", url_oid_to_str(pszUrlOid));
396 SetLastError(ERROR_FILE_NOT_FOUND);
399 else
401 static HCRYPTOIDFUNCSET set = NULL;
403 if (!set)
404 set = CryptInitOIDFunctionSet(URL_OID_GET_OBJECT_URL_FUNC, 0);
405 CryptGetOIDFunctionAddress(set, X509_ASN_ENCODING, pszUrlOid, 0,
406 (void **)&func, &hFunc);
408 if (func)
409 ret = func(pszUrlOid, pvPara, dwFlags, pUrlArray, pcbUrlArray,
410 pUrlInfo, pcbUrlInfo, pvReserved);
411 if (hFunc)
412 CryptFreeOIDFunctionAddress(hFunc, 0);
413 return ret;
416 /***********************************************************************
417 * CryptRetrieveObjectByUrlA (CRYPTNET.@)
419 BOOL WINAPI CryptRetrieveObjectByUrlA(LPCSTR pszURL, LPCSTR pszObjectOid,
420 DWORD dwRetrievalFlags, DWORD dwTimeout, LPVOID *ppvObject,
421 HCRYPTASYNC hAsyncRetrieve, PCRYPT_CREDENTIALS pCredentials, LPVOID pvVerify,
422 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
424 BOOL ret = FALSE;
425 int len;
427 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p)\n", debugstr_a(pszURL),
428 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, ppvObject,
429 hAsyncRetrieve, pCredentials, pvVerify, pAuxInfo);
431 if (!pszURL)
433 SetLastError(ERROR_INVALID_PARAMETER);
434 return FALSE;
436 len = MultiByteToWideChar(CP_ACP, 0, pszURL, -1, NULL, 0);
437 if (len)
439 LPWSTR url = CryptMemAlloc(len * sizeof(WCHAR));
441 if (url)
443 MultiByteToWideChar(CP_ACP, 0, pszURL, -1, url, len);
444 ret = CryptRetrieveObjectByUrlW(url, pszObjectOid,
445 dwRetrievalFlags, dwTimeout, ppvObject, hAsyncRetrieve,
446 pCredentials, pvVerify, pAuxInfo);
447 CryptMemFree(url);
449 else
450 SetLastError(ERROR_OUTOFMEMORY);
452 return ret;
455 static void WINAPI CRYPT_FreeBlob(LPCSTR pszObjectOid,
456 PCRYPT_BLOB_ARRAY pObject, void *pvFreeContext)
458 DWORD i;
460 for (i = 0; i < pObject->cBlob; i++)
461 CryptMemFree(pObject->rgBlob[i].pbData);
462 CryptMemFree(pObject->rgBlob);
465 static BOOL CRYPT_GetObjectFromFile(HANDLE hFile, PCRYPT_BLOB_ARRAY pObject)
467 BOOL ret;
468 LARGE_INTEGER size;
470 if ((ret = GetFileSizeEx(hFile, &size)))
472 if (size.u.HighPart)
474 WARN("file too big\n");
475 SetLastError(ERROR_INVALID_DATA);
476 ret = FALSE;
478 else
480 CRYPT_DATA_BLOB blob;
482 blob.pbData = CryptMemAlloc(size.u.LowPart);
483 if (blob.pbData)
485 blob.cbData = size.u.LowPart;
486 ret = ReadFile(hFile, blob.pbData, size.u.LowPart, &blob.cbData,
487 NULL);
488 if (ret)
490 pObject->rgBlob = CryptMemAlloc(sizeof(CRYPT_DATA_BLOB));
491 if (pObject->rgBlob)
493 pObject->cBlob = 1;
494 memcpy(pObject->rgBlob, &blob, sizeof(CRYPT_DATA_BLOB));
496 else
498 SetLastError(ERROR_OUTOFMEMORY);
499 ret = FALSE;
502 if (!ret)
503 CryptMemFree(blob.pbData);
505 else
507 SetLastError(ERROR_OUTOFMEMORY);
508 ret = FALSE;
512 return ret;
515 static BOOL CRYPT_GetObjectFromCache(LPCWSTR pszURL, PCRYPT_BLOB_ARRAY pObject,
516 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
518 BOOL ret = FALSE;
519 INTERNET_CACHE_ENTRY_INFOW *pCacheInfo = NULL;
520 DWORD size = 0;
522 TRACE("(%s, %p, %p)\n", debugstr_w(pszURL), pObject, pAuxInfo);
524 ret = GetUrlCacheEntryInfoW(pszURL, NULL, &size);
525 if (!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
527 pCacheInfo = CryptMemAlloc(size);
528 if (pCacheInfo)
529 ret = TRUE;
530 else
531 SetLastError(ERROR_OUTOFMEMORY);
533 if (ret && (ret = GetUrlCacheEntryInfoW(pszURL, pCacheInfo, &size)))
535 FILETIME ft;
537 GetSystemTimeAsFileTime(&ft);
538 if (CompareFileTime(&pCacheInfo->ExpireTime, &ft) >= 0)
540 HANDLE hFile = CreateFileW(pCacheInfo->lpszLocalFileName,
541 GENERIC_READ, 0, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
543 if (hFile != INVALID_HANDLE_VALUE)
545 if ((ret = CRYPT_GetObjectFromFile(hFile, pObject)))
547 if (pAuxInfo && pAuxInfo->cbSize >=
548 offsetof(CRYPT_RETRIEVE_AUX_INFO,
549 pLastSyncTime) + sizeof(PFILETIME) &&
550 pAuxInfo->pLastSyncTime)
551 memcpy(pAuxInfo->pLastSyncTime,
552 &pCacheInfo->LastSyncTime,
553 sizeof(FILETIME));
555 CloseHandle(hFile);
557 else
559 DeleteUrlCacheEntryW(pszURL);
560 ret = FALSE;
563 else
565 DeleteUrlCacheEntryW(pszURL);
566 ret = FALSE;
569 CryptMemFree(pCacheInfo);
570 TRACE("returning %d\n", ret);
571 return ret;
574 /* Parses the URL, and sets components' lpszHostName and lpszUrlPath members
575 * to NULL-terminated copies of those portions of the URL (to be freed with
576 * CryptMemFree.)
578 static BOOL CRYPT_CrackUrl(LPCWSTR pszURL, URL_COMPONENTSW *components)
580 BOOL ret;
582 TRACE("(%s, %p)\n", debugstr_w(pszURL), components);
584 memset(components, 0, sizeof(*components));
585 components->dwStructSize = sizeof(*components);
586 components->lpszHostName = CryptMemAlloc(INTERNET_MAX_HOST_NAME_LENGTH * sizeof(WCHAR));
587 components->dwHostNameLength = INTERNET_MAX_HOST_NAME_LENGTH;
588 if (!components->lpszHostName)
590 SetLastError(ERROR_OUTOFMEMORY);
591 return FALSE;
593 components->lpszUrlPath = CryptMemAlloc(INTERNET_MAX_PATH_LENGTH * sizeof(WCHAR));
594 components->dwUrlPathLength = INTERNET_MAX_PATH_LENGTH;
595 if (!components->lpszUrlPath)
597 CryptMemFree(components->lpszHostName);
598 SetLastError(ERROR_OUTOFMEMORY);
599 return FALSE;
602 ret = InternetCrackUrlW(pszURL, 0, ICU_DECODE, components);
603 if (ret)
605 switch (components->nScheme)
607 case INTERNET_SCHEME_FTP:
608 if (!components->nPort)
609 components->nPort = INTERNET_DEFAULT_FTP_PORT;
610 break;
611 case INTERNET_SCHEME_HTTP:
612 if (!components->nPort)
613 components->nPort = INTERNET_DEFAULT_HTTP_PORT;
614 break;
615 default:
616 ; /* do nothing */
619 TRACE("returning %d\n", ret);
620 return ret;
623 struct InetContext
625 HANDLE event;
626 DWORD timeout;
627 DWORD error;
630 static struct InetContext *CRYPT_MakeInetContext(DWORD dwTimeout)
632 struct InetContext *context = CryptMemAlloc(sizeof(struct InetContext));
634 if (context)
636 context->event = CreateEventW(NULL, FALSE, FALSE, NULL);
637 if (!context->event)
639 CryptMemFree(context);
640 context = NULL;
642 else
644 context->timeout = dwTimeout;
645 context->error = ERROR_SUCCESS;
648 return context;
651 static BOOL CRYPT_DownloadObject(DWORD dwRetrievalFlags, HINTERNET hHttp,
652 struct InetContext *context, PCRYPT_BLOB_ARRAY pObject,
653 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
655 CRYPT_DATA_BLOB object = { 0, NULL };
656 DWORD bytesAvailable;
657 BOOL ret;
659 do {
660 if ((ret = InternetQueryDataAvailable(hHttp, &bytesAvailable, 0, 0)))
662 if (bytesAvailable)
664 if (object.pbData)
665 object.pbData = CryptMemRealloc(object.pbData,
666 object.cbData + bytesAvailable);
667 else
668 object.pbData = CryptMemAlloc(bytesAvailable);
669 if (object.pbData)
671 INTERNET_BUFFERSA buffer = { sizeof(buffer), 0 };
673 buffer.dwBufferLength = bytesAvailable;
674 buffer.lpvBuffer = object.pbData + object.cbData;
675 if (!(ret = InternetReadFileExA(hHttp, &buffer, IRF_NO_WAIT,
676 (DWORD_PTR)context)))
678 if (GetLastError() == ERROR_IO_PENDING)
680 if (WaitForSingleObject(context->event,
681 context->timeout) == WAIT_TIMEOUT)
682 SetLastError(ERROR_TIMEOUT);
683 else if (context->error)
684 SetLastError(context->error);
685 else
686 ret = TRUE;
689 if (ret)
690 object.cbData += buffer.dwBufferLength;
692 else
694 SetLastError(ERROR_OUTOFMEMORY);
695 ret = FALSE;
699 else if (GetLastError() == ERROR_IO_PENDING)
701 if (WaitForSingleObject(context->event, context->timeout) ==
702 WAIT_TIMEOUT)
703 SetLastError(ERROR_TIMEOUT);
704 else
705 ret = TRUE;
707 } while (ret && bytesAvailable);
708 if (ret)
710 pObject->rgBlob = CryptMemAlloc(sizeof(CRYPT_DATA_BLOB));
711 if (!pObject->rgBlob)
713 CryptMemFree(object.pbData);
714 SetLastError(ERROR_OUTOFMEMORY);
715 ret = FALSE;
717 else
719 pObject->rgBlob[0].cbData = object.cbData;
720 pObject->rgBlob[0].pbData = object.pbData;
721 pObject->cBlob = 1;
724 TRACE("returning %d\n", ret);
725 return ret;
728 /* Finds the object specified by pszURL in the cache. If it's not found,
729 * creates a new cache entry for the object and writes the object to it.
730 * Sets the expiration time of the cache entry to expires.
732 static void CRYPT_CacheURL(LPCWSTR pszURL, const CRYPT_BLOB_ARRAY *pObject,
733 DWORD dwRetrievalFlags, FILETIME expires)
735 WCHAR cacheFileName[MAX_PATH];
736 DWORD size = 0;
737 BOOL ret, create = FALSE;
739 GetUrlCacheEntryInfoW(pszURL, NULL, &size);
740 if (GetLastError() == ERROR_INSUFFICIENT_BUFFER)
742 INTERNET_CACHE_ENTRY_INFOW *info = CryptMemAlloc(size);
744 if (info)
746 FILETIME ft;
748 ret = GetUrlCacheEntryInfoW(pszURL, info, &size);
749 if (ret)
750 lstrcpyW(cacheFileName, info->lpszLocalFileName);
751 /* Check if the existing cache entry is up to date. If it isn't,
752 * remove the existing cache entry, and create a new one with the
753 * new value.
755 GetSystemTimeAsFileTime(&ft);
756 if (CompareFileTime(&info->ExpireTime, &ft) < 0)
758 create = TRUE;
759 DeleteUrlCacheEntryW(pszURL);
761 CryptMemFree(info);
763 else
764 ret = FALSE;
766 else
768 ret = CreateUrlCacheEntryW(pszURL, pObject->rgBlob[0].cbData, NULL,
769 cacheFileName, 0);
770 create = TRUE;
772 if (ret)
774 DWORD entryType;
775 FILETIME ft = { 0 };
777 if (create)
779 HANDLE hCacheFile = CreateFileW(cacheFileName, GENERIC_WRITE, 0,
780 NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
782 if (hCacheFile != INVALID_HANDLE_VALUE)
784 DWORD bytesWritten;
786 WriteFile(hCacheFile, pObject->rgBlob[0].pbData,
787 pObject->rgBlob[0].cbData, &bytesWritten, NULL);
788 CloseHandle(hCacheFile);
790 else
791 ret = FALSE;
793 if (ret)
795 if (!(dwRetrievalFlags & CRYPT_STICKY_CACHE_RETRIEVAL))
796 entryType = NORMAL_CACHE_ENTRY;
797 else
798 entryType = STICKY_CACHE_ENTRY;
799 CommitUrlCacheEntryW(pszURL, cacheFileName, expires, ft, entryType,
800 NULL, 0, NULL, NULL);
805 static void CALLBACK CRYPT_InetStatusCallback(HINTERNET hInt,
806 DWORD_PTR dwContext, DWORD status, void *statusInfo, DWORD statusInfoLen)
808 struct InetContext *context = (struct InetContext *)dwContext;
809 LPINTERNET_ASYNC_RESULT result;
811 switch (status)
813 case INTERNET_STATUS_REQUEST_COMPLETE:
814 result = statusInfo;
815 context->error = result->dwError;
816 SetEvent(context->event);
820 static BOOL CRYPT_Connect(const URL_COMPONENTSW *components,
821 struct InetContext *context, PCRYPT_CREDENTIALS pCredentials,
822 HINTERNET *phInt, HINTERNET *phHost)
824 BOOL ret;
826 TRACE("(%s:%d, %p, %p, %p, %p)\n", debugstr_w(components->lpszHostName),
827 components->nPort, context, pCredentials, phInt, phInt);
829 *phHost = NULL;
830 *phInt = InternetOpenW(NULL, INTERNET_OPEN_TYPE_PRECONFIG, NULL, NULL,
831 context ? INTERNET_FLAG_ASYNC : 0);
832 if (*phInt)
834 DWORD service;
836 if (context)
837 InternetSetStatusCallbackW(*phInt, CRYPT_InetStatusCallback);
838 switch (components->nScheme)
840 case INTERNET_SCHEME_FTP:
841 service = INTERNET_SERVICE_FTP;
842 break;
843 case INTERNET_SCHEME_HTTP:
844 service = INTERNET_SERVICE_HTTP;
845 break;
846 default:
847 service = 0;
849 /* FIXME: use pCredentials for username/password */
850 *phHost = InternetConnectW(*phInt, components->lpszHostName,
851 components->nPort, NULL, NULL, service, 0, (DWORD_PTR)context);
852 if (!*phHost)
854 InternetCloseHandle(*phInt);
855 *phInt = NULL;
856 ret = FALSE;
858 else
859 ret = TRUE;
861 else
862 ret = FALSE;
863 TRACE("returning %d\n", ret);
864 return ret;
867 static BOOL WINAPI FTP_RetrieveEncodedObjectW(LPCWSTR pszURL,
868 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
869 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
870 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
871 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
873 FIXME("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
874 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, pObject,
875 ppfnFreeObject, ppvFreeContext, hAsyncRetrieve, pCredentials, pAuxInfo);
877 pObject->cBlob = 0;
878 pObject->rgBlob = NULL;
879 *ppfnFreeObject = CRYPT_FreeBlob;
880 *ppvFreeContext = NULL;
881 return FALSE;
884 static const WCHAR x509cacert[] = { 'a','p','p','l','i','c','a','t','i','o','n',
885 '/','x','-','x','5','0','9','-','c','a','-','c','e','r','t',0 };
886 static const WCHAR x509emailcert[] = { 'a','p','p','l','i','c','a','t','i','o',
887 'n','/','x','-','x','5','0','9','-','e','m','a','i','l','-','c','e','r','t',
888 0 };
889 static const WCHAR x509servercert[] = { 'a','p','p','l','i','c','a','t','i','o',
890 'n','/','x','-','x','5','0','9','-','s','e','r','v','e','r','-','c','e','r',
891 't',0 };
892 static const WCHAR x509usercert[] = { 'a','p','p','l','i','c','a','t','i','o',
893 'n','/','x','-','x','5','0','9','-','u','s','e','r','-','c','e','r','t',0 };
894 static const WCHAR pkcs7cert[] = { 'a','p','p','l','i','c','a','t','i','o','n',
895 '/','x','-','p','k','c','s','7','-','c','e','r','t','i','f','c','a','t','e',
896 's',0 };
897 static const WCHAR pkixCRL[] = { 'a','p','p','l','i','c','a','t','i','o','n',
898 '/','p','k','i','x','-','c','r','l',0 };
899 static const WCHAR pkcs7CRL[] = { 'a','p','p','l','i','c','a','t','i','o','n',
900 '/','x','-','p','k','c','s','7','-','c','r','l',0 };
901 static const WCHAR pkcs7sig[] = { 'a','p','p','l','i','c','a','t','i','o','n',
902 '/','x','-','p','k','c','s','7','-','s','i','g','n','a','t','u','r','e',0 };
903 static const WCHAR pkcs7mime[] = { 'a','p','p','l','i','c','a','t','i','o','n',
904 '/','x','-','p','k','c','s','7','-','m','i','m','e',0 };
906 static BOOL WINAPI HTTP_RetrieveEncodedObjectW(LPCWSTR pszURL,
907 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
908 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
909 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
910 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
912 BOOL ret = FALSE;
914 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
915 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, pObject,
916 ppfnFreeObject, ppvFreeContext, hAsyncRetrieve, pCredentials, pAuxInfo);
918 pObject->cBlob = 0;
919 pObject->rgBlob = NULL;
920 *ppfnFreeObject = CRYPT_FreeBlob;
921 *ppvFreeContext = NULL;
923 if (!(dwRetrievalFlags & CRYPT_WIRE_ONLY_RETRIEVAL))
924 ret = CRYPT_GetObjectFromCache(pszURL, pObject, pAuxInfo);
925 if (!ret && (!(dwRetrievalFlags & CRYPT_CACHE_ONLY_RETRIEVAL) ||
926 (dwRetrievalFlags & CRYPT_WIRE_ONLY_RETRIEVAL)))
928 URL_COMPONENTSW components;
930 if ((ret = CRYPT_CrackUrl(pszURL, &components)))
932 HINTERNET hInt, hHost;
933 struct InetContext *context = NULL;
935 if (dwTimeout)
936 context = CRYPT_MakeInetContext(dwTimeout);
937 ret = CRYPT_Connect(&components, context, pCredentials, &hInt,
938 &hHost);
939 if (ret)
941 static LPCWSTR types[] = { x509cacert, x509emailcert,
942 x509servercert, x509usercert, pkcs7cert, pkixCRL, pkcs7CRL,
943 pkcs7sig, pkcs7mime, NULL };
944 HINTERNET hHttp = HttpOpenRequestW(hHost, NULL,
945 components.lpszUrlPath, NULL, NULL, types,
946 INTERNET_FLAG_NO_COOKIES | INTERNET_FLAG_NO_UI,
947 (DWORD_PTR)context);
949 if (hHttp)
951 if (dwTimeout)
953 InternetSetOptionW(hHttp,
954 INTERNET_OPTION_RECEIVE_TIMEOUT, &dwTimeout,
955 sizeof(dwTimeout));
956 InternetSetOptionW(hHttp, INTERNET_OPTION_SEND_TIMEOUT,
957 &dwTimeout, sizeof(dwTimeout));
959 ret = HttpSendRequestExW(hHttp, NULL, NULL, 0,
960 (DWORD_PTR)context);
961 if (!ret && GetLastError() == ERROR_IO_PENDING)
963 if (WaitForSingleObject(context->event,
964 context->timeout) == WAIT_TIMEOUT)
965 SetLastError(ERROR_TIMEOUT);
966 else
967 ret = TRUE;
969 /* We don't set ret to TRUE in this block to avoid masking
970 * an error from HttpSendRequestExW.
972 if (!HttpEndRequestW(hHttp, NULL, 0, (DWORD_PTR)context) &&
973 GetLastError() == ERROR_IO_PENDING)
975 if (WaitForSingleObject(context->event,
976 context->timeout) == WAIT_TIMEOUT)
978 SetLastError(ERROR_TIMEOUT);
979 ret = FALSE;
982 if (ret)
983 ret = CRYPT_DownloadObject(dwRetrievalFlags, hHttp,
984 context, pObject, pAuxInfo);
985 if (ret && !(dwRetrievalFlags & CRYPT_DONT_CACHE_RESULT))
987 SYSTEMTIME st;
988 DWORD len = sizeof(st);
990 if (HttpQueryInfoW(hHttp,
991 HTTP_QUERY_EXPIRES | HTTP_QUERY_FLAG_SYSTEMTIME, &st,
992 &len, NULL))
994 FILETIME ft;
996 SystemTimeToFileTime(&st, &ft);
997 CRYPT_CacheURL(pszURL, pObject, dwRetrievalFlags,
998 ft);
1001 InternetCloseHandle(hHttp);
1003 InternetCloseHandle(hHost);
1004 InternetCloseHandle(hInt);
1006 if (context)
1008 CloseHandle(context->event);
1009 CryptMemFree(context);
1011 CryptMemFree(components.lpszUrlPath);
1012 CryptMemFree(components.lpszHostName);
1015 TRACE("returning %d\n", ret);
1016 return ret;
1019 static BOOL WINAPI File_RetrieveEncodedObjectW(LPCWSTR pszURL,
1020 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
1021 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
1022 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
1023 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
1025 URL_COMPONENTSW components = { sizeof(components), 0 };
1026 BOOL ret;
1028 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
1029 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, pObject,
1030 ppfnFreeObject, ppvFreeContext, hAsyncRetrieve, pCredentials, pAuxInfo);
1032 pObject->cBlob = 0;
1033 pObject->rgBlob = NULL;
1034 *ppfnFreeObject = CRYPT_FreeBlob;
1035 *ppvFreeContext = NULL;
1037 components.lpszUrlPath = CryptMemAlloc(INTERNET_MAX_PATH_LENGTH * sizeof(WCHAR));
1038 components.dwUrlPathLength = INTERNET_MAX_PATH_LENGTH;
1039 if (!components.lpszUrlPath)
1041 SetLastError(ERROR_OUTOFMEMORY);
1042 return FALSE;
1045 ret = InternetCrackUrlW(pszURL, 0, ICU_DECODE, &components);
1046 if (ret)
1048 LPWSTR path;
1050 /* 3 == lstrlenW(L"c:") + 1 */
1051 path = CryptMemAlloc((components.dwUrlPathLength + 3) * sizeof(WCHAR));
1052 if (path)
1054 HANDLE hFile;
1056 /* Try to create the file directly - Wine handles / in pathnames */
1057 lstrcpynW(path, components.lpszUrlPath,
1058 components.dwUrlPathLength + 1);
1059 hFile = CreateFileW(path, GENERIC_READ, 0, NULL, OPEN_EXISTING,
1060 FILE_ATTRIBUTE_NORMAL, NULL);
1061 if (hFile == INVALID_HANDLE_VALUE)
1063 /* Try again on the current drive */
1064 GetCurrentDirectoryW(components.dwUrlPathLength, path);
1065 if (path[1] == ':')
1067 lstrcpynW(path + 2, components.lpszUrlPath,
1068 components.dwUrlPathLength + 1);
1069 hFile = CreateFileW(path, GENERIC_READ, 0, NULL,
1070 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
1072 if (hFile == INVALID_HANDLE_VALUE)
1074 /* Try again on the Windows drive */
1075 GetWindowsDirectoryW(path, components.dwUrlPathLength);
1076 if (path[1] == ':')
1078 lstrcpynW(path + 2, components.lpszUrlPath,
1079 components.dwUrlPathLength + 1);
1080 hFile = CreateFileW(path, GENERIC_READ, 0, NULL,
1081 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
1085 if (hFile != INVALID_HANDLE_VALUE)
1087 if ((ret = CRYPT_GetObjectFromFile(hFile, pObject)))
1089 if (pAuxInfo && pAuxInfo->cbSize >=
1090 offsetof(CRYPT_RETRIEVE_AUX_INFO,
1091 pLastSyncTime) + sizeof(PFILETIME) &&
1092 pAuxInfo->pLastSyncTime)
1093 GetFileTime(hFile, NULL, NULL,
1094 pAuxInfo->pLastSyncTime);
1096 CloseHandle(hFile);
1098 else
1099 ret = FALSE;
1100 CryptMemFree(path);
1102 else
1104 SetLastError(ERROR_OUTOFMEMORY);
1105 ret = FALSE;
1108 CryptMemFree(components.lpszUrlPath);
1109 return ret;
1112 typedef BOOL (WINAPI *SchemeDllRetrieveEncodedObjectW)(LPCWSTR pwszUrl,
1113 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
1114 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
1115 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
1116 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo);
1118 static BOOL CRYPT_GetRetrieveFunction(LPCWSTR pszURL,
1119 SchemeDllRetrieveEncodedObjectW *pFunc, HCRYPTOIDFUNCADDR *phFunc)
1121 URL_COMPONENTSW components = { sizeof(components), 0 };
1122 BOOL ret;
1124 TRACE("(%s, %p, %p)\n", debugstr_w(pszURL), pFunc, phFunc);
1126 *pFunc = NULL;
1127 *phFunc = 0;
1128 components.dwSchemeLength = 1;
1129 ret = InternetCrackUrlW(pszURL, 0, 0, &components);
1130 if (ret)
1132 /* Microsoft always uses CryptInitOIDFunctionSet/
1133 * CryptGetOIDFunctionAddress, but there doesn't seem to be a pressing
1134 * reason to do so for builtin schemes.
1136 switch (components.nScheme)
1138 case INTERNET_SCHEME_FTP:
1139 *pFunc = FTP_RetrieveEncodedObjectW;
1140 break;
1141 case INTERNET_SCHEME_HTTP:
1142 *pFunc = HTTP_RetrieveEncodedObjectW;
1143 break;
1144 case INTERNET_SCHEME_FILE:
1145 *pFunc = File_RetrieveEncodedObjectW;
1146 break;
1147 default:
1149 int len = WideCharToMultiByte(CP_ACP, 0, components.lpszScheme,
1150 components.dwSchemeLength, NULL, 0, NULL, NULL);
1152 if (len)
1154 LPSTR scheme = CryptMemAlloc(len);
1156 if (scheme)
1158 static HCRYPTOIDFUNCSET set = NULL;
1160 if (!set)
1161 set = CryptInitOIDFunctionSet(
1162 SCHEME_OID_RETRIEVE_ENCODED_OBJECTW_FUNC, 0);
1163 WideCharToMultiByte(CP_ACP, 0, components.lpszScheme,
1164 components.dwSchemeLength, scheme, len, NULL, NULL);
1165 ret = CryptGetOIDFunctionAddress(set, X509_ASN_ENCODING,
1166 scheme, 0, (void **)pFunc, phFunc);
1167 CryptMemFree(scheme);
1169 else
1171 SetLastError(ERROR_OUTOFMEMORY);
1172 ret = FALSE;
1175 else
1176 ret = FALSE;
1180 TRACE("returning %d\n", ret);
1181 return ret;
1184 static BOOL WINAPI CRYPT_CreateBlob(LPCSTR pszObjectOid,
1185 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext)
1187 DWORD size, i;
1188 CRYPT_BLOB_ARRAY *context;
1189 BOOL ret = FALSE;
1191 size = sizeof(CRYPT_BLOB_ARRAY) + pObject->cBlob * sizeof(CRYPT_DATA_BLOB);
1192 for (i = 0; i < pObject->cBlob; i++)
1193 size += pObject->rgBlob[i].cbData;
1194 context = CryptMemAlloc(size);
1195 if (context)
1197 LPBYTE nextData;
1199 context->cBlob = 0;
1200 context->rgBlob =
1201 (CRYPT_DATA_BLOB *)((LPBYTE)context + sizeof(CRYPT_BLOB_ARRAY));
1202 nextData =
1203 (LPBYTE)context->rgBlob + pObject->cBlob * sizeof(CRYPT_DATA_BLOB);
1204 for (i = 0; i < pObject->cBlob; i++)
1206 memcpy(nextData, pObject->rgBlob[i].pbData,
1207 pObject->rgBlob[i].cbData);
1208 context->rgBlob[i].pbData = nextData;
1209 context->rgBlob[i].cbData = pObject->rgBlob[i].cbData;
1210 nextData += pObject->rgBlob[i].cbData;
1211 context->cBlob++;
1213 *ppvContext = context;
1214 ret = TRUE;
1216 return ret;
1219 typedef BOOL (WINAPI *AddContextToStore)(HCERTSTORE hCertStore,
1220 const void *pContext, DWORD dwAddDisposition, const void **ppStoreContext);
1222 static BOOL CRYPT_CreateContext(const CRYPT_BLOB_ARRAY *pObject,
1223 DWORD dwExpectedContentTypeFlags, AddContextToStore addFunc, void **ppvContext)
1225 BOOL ret = TRUE;
1227 if (!pObject->cBlob)
1229 SetLastError(ERROR_INVALID_DATA);
1230 *ppvContext = NULL;
1231 ret = FALSE;
1233 else if (pObject->cBlob == 1)
1235 if (!CryptQueryObject(CERT_QUERY_OBJECT_BLOB, &pObject->rgBlob[0],
1236 dwExpectedContentTypeFlags, CERT_QUERY_FORMAT_FLAG_BINARY, 0, NULL,
1237 NULL, NULL, NULL, NULL, (const void **)ppvContext))
1239 SetLastError(CRYPT_E_NO_MATCH);
1240 ret = FALSE;
1243 else
1245 HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
1246 CERT_STORE_CREATE_NEW_FLAG, NULL);
1248 if (store)
1250 DWORD i;
1251 const void *context;
1253 for (i = 0; i < pObject->cBlob; i++)
1255 if (CryptQueryObject(CERT_QUERY_OBJECT_BLOB,
1256 &pObject->rgBlob[i], dwExpectedContentTypeFlags,
1257 CERT_QUERY_FORMAT_FLAG_BINARY, 0, NULL, NULL, NULL, NULL,
1258 NULL, &context))
1260 if (!addFunc(store, context, CERT_STORE_ADD_ALWAYS, NULL))
1261 ret = FALSE;
1263 else
1265 SetLastError(CRYPT_E_NO_MATCH);
1266 ret = FALSE;
1270 else
1271 ret = FALSE;
1272 *ppvContext = store;
1274 return ret;
1277 static BOOL WINAPI CRYPT_CreateCert(LPCSTR pszObjectOid,
1278 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext)
1280 return CRYPT_CreateContext(pObject, CERT_QUERY_CONTENT_FLAG_CERT,
1281 (AddContextToStore)CertAddCertificateContextToStore, ppvContext);
1284 static BOOL WINAPI CRYPT_CreateCRL(LPCSTR pszObjectOid,
1285 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext)
1287 return CRYPT_CreateContext(pObject, CERT_QUERY_CONTENT_FLAG_CRL,
1288 (AddContextToStore)CertAddCRLContextToStore, ppvContext);
1291 static BOOL WINAPI CRYPT_CreateCTL(LPCSTR pszObjectOid,
1292 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext)
1294 return CRYPT_CreateContext(pObject, CERT_QUERY_CONTENT_FLAG_CTL,
1295 (AddContextToStore)CertAddCTLContextToStore, ppvContext);
1298 static BOOL WINAPI CRYPT_CreatePKCS7(LPCSTR pszObjectOid,
1299 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext)
1301 BOOL ret;
1303 if (!pObject->cBlob)
1305 SetLastError(ERROR_INVALID_DATA);
1306 *ppvContext = NULL;
1307 ret = FALSE;
1309 else if (pObject->cBlob == 1)
1310 ret = CryptQueryObject(CERT_QUERY_OBJECT_BLOB, &pObject->rgBlob[0],
1311 CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED |
1312 CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED, CERT_QUERY_FORMAT_FLAG_BINARY,
1313 0, NULL, NULL, NULL, ppvContext, NULL, NULL);
1314 else
1316 FIXME("multiple messages unimplemented\n");
1317 ret = FALSE;
1319 return ret;
1322 static BOOL WINAPI CRYPT_CreateAny(LPCSTR pszObjectOid,
1323 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext)
1325 BOOL ret;
1327 if (!pObject->cBlob)
1329 SetLastError(ERROR_INVALID_DATA);
1330 *ppvContext = NULL;
1331 ret = FALSE;
1333 else
1335 HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_COLLECTION, 0, 0,
1336 CERT_STORE_CREATE_NEW_FLAG, NULL);
1338 if (store)
1340 HCERTSTORE memStore = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
1341 CERT_STORE_CREATE_NEW_FLAG, NULL);
1343 if (memStore)
1345 CertAddStoreToCollection(store, memStore,
1346 CERT_PHYSICAL_STORE_ADD_ENABLE_FLAG, 0);
1347 CertCloseStore(memStore, 0);
1349 else
1351 CertCloseStore(store, 0);
1352 store = NULL;
1355 if (store)
1357 DWORD i;
1359 ret = TRUE;
1360 for (i = 0; i < pObject->cBlob; i++)
1362 DWORD contentType, expectedContentTypes =
1363 CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED |
1364 CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED |
1365 CERT_QUERY_CONTENT_FLAG_CERT |
1366 CERT_QUERY_CONTENT_FLAG_CRL |
1367 CERT_QUERY_CONTENT_FLAG_CTL;
1368 HCERTSTORE contextStore;
1369 const void *context;
1371 if (CryptQueryObject(CERT_QUERY_OBJECT_BLOB,
1372 &pObject->rgBlob[i], expectedContentTypes,
1373 CERT_QUERY_FORMAT_FLAG_BINARY, 0, NULL, &contentType, NULL,
1374 &contextStore, NULL, &context))
1376 switch (contentType)
1378 case CERT_QUERY_CONTENT_CERT:
1379 if (!CertAddCertificateContextToStore(store,
1380 context, CERT_STORE_ADD_ALWAYS, NULL))
1381 ret = FALSE;
1382 CertFreeCertificateContext(context);
1383 break;
1384 case CERT_QUERY_CONTENT_CRL:
1385 if (!CertAddCRLContextToStore(store,
1386 context, CERT_STORE_ADD_ALWAYS, NULL))
1387 ret = FALSE;
1388 CertFreeCRLContext(context);
1389 break;
1390 case CERT_QUERY_CONTENT_CTL:
1391 if (!CertAddCTLContextToStore(store,
1392 context, CERT_STORE_ADD_ALWAYS, NULL))
1393 ret = FALSE;
1394 CertFreeCTLContext(context);
1395 break;
1396 default:
1397 CertAddStoreToCollection(store, contextStore, 0, 0);
1399 CertCloseStore(contextStore, 0);
1401 else
1402 ret = FALSE;
1405 else
1406 ret = FALSE;
1407 *ppvContext = store;
1409 return ret;
1412 typedef BOOL (WINAPI *ContextDllCreateObjectContext)(LPCSTR pszObjectOid,
1413 DWORD dwRetrievalFlags, const CRYPT_BLOB_ARRAY *pObject, void **ppvContext);
1415 static BOOL CRYPT_GetCreateFunction(LPCSTR pszObjectOid,
1416 ContextDllCreateObjectContext *pFunc, HCRYPTOIDFUNCADDR *phFunc)
1418 BOOL ret = TRUE;
1420 TRACE("(%s, %p, %p)\n", debugstr_a(pszObjectOid), pFunc, phFunc);
1422 *pFunc = NULL;
1423 *phFunc = 0;
1424 if (IS_INTOID(pszObjectOid))
1426 switch (LOWORD(pszObjectOid))
1428 case 0:
1429 *pFunc = CRYPT_CreateBlob;
1430 break;
1431 case LOWORD(CONTEXT_OID_CERTIFICATE):
1432 *pFunc = CRYPT_CreateCert;
1433 break;
1434 case LOWORD(CONTEXT_OID_CRL):
1435 *pFunc = CRYPT_CreateCRL;
1436 break;
1437 case LOWORD(CONTEXT_OID_CTL):
1438 *pFunc = CRYPT_CreateCTL;
1439 break;
1440 case LOWORD(CONTEXT_OID_PKCS7):
1441 *pFunc = CRYPT_CreatePKCS7;
1442 break;
1443 case LOWORD(CONTEXT_OID_CAPI2_ANY):
1444 *pFunc = CRYPT_CreateAny;
1445 break;
1448 if (!*pFunc)
1450 static HCRYPTOIDFUNCSET set = NULL;
1452 if (!set)
1453 set = CryptInitOIDFunctionSet(
1454 CONTEXT_OID_CREATE_OBJECT_CONTEXT_FUNC, 0);
1455 ret = CryptGetOIDFunctionAddress(set, X509_ASN_ENCODING, pszObjectOid,
1456 0, (void **)pFunc, phFunc);
1458 TRACE("returning %d\n", ret);
1459 return ret;
1462 typedef BOOL (*get_object_expiration_func)(const void *pvContext,
1463 FILETIME *expiration);
1465 static BOOL CRYPT_GetExpirationFromCert(const void *pvObject, FILETIME *expiration)
1467 PCCERT_CONTEXT cert = pvObject;
1469 *expiration = cert->pCertInfo->NotAfter;
1470 return TRUE;
1473 static BOOL CRYPT_GetExpirationFromCRL(const void *pvObject, FILETIME *expiration)
1475 PCCRL_CONTEXT cert = pvObject;
1477 *expiration = cert->pCrlInfo->NextUpdate;
1478 return TRUE;
1481 static BOOL CRYPT_GetExpirationFromCTL(const void *pvObject, FILETIME *expiration)
1483 PCCTL_CONTEXT cert = pvObject;
1485 *expiration = cert->pCtlInfo->NextUpdate;
1486 return TRUE;
1489 static BOOL CRYPT_GetExpirationFunction(LPCSTR pszObjectOid,
1490 get_object_expiration_func *getExpiration)
1492 BOOL ret;
1494 if (IS_INTOID(pszObjectOid))
1496 switch (LOWORD(pszObjectOid))
1498 case LOWORD(CONTEXT_OID_CERTIFICATE):
1499 *getExpiration = CRYPT_GetExpirationFromCert;
1500 ret = TRUE;
1501 break;
1502 case LOWORD(CONTEXT_OID_CRL):
1503 *getExpiration = CRYPT_GetExpirationFromCRL;
1504 ret = TRUE;
1505 break;
1506 case LOWORD(CONTEXT_OID_CTL):
1507 *getExpiration = CRYPT_GetExpirationFromCTL;
1508 ret = TRUE;
1509 break;
1510 default:
1511 ret = FALSE;
1514 else
1515 ret = FALSE;
1516 return ret;
1519 /***********************************************************************
1520 * CryptRetrieveObjectByUrlW (CRYPTNET.@)
1522 BOOL WINAPI CryptRetrieveObjectByUrlW(LPCWSTR pszURL, LPCSTR pszObjectOid,
1523 DWORD dwRetrievalFlags, DWORD dwTimeout, LPVOID *ppvObject,
1524 HCRYPTASYNC hAsyncRetrieve, PCRYPT_CREDENTIALS pCredentials, LPVOID pvVerify,
1525 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
1527 BOOL ret;
1528 SchemeDllRetrieveEncodedObjectW retrieve;
1529 ContextDllCreateObjectContext create;
1530 HCRYPTOIDFUNCADDR hRetrieve = 0, hCreate = 0;
1532 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
1533 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, ppvObject,
1534 hAsyncRetrieve, pCredentials, pvVerify, pAuxInfo);
1536 if (!pszURL)
1538 SetLastError(ERROR_INVALID_PARAMETER);
1539 return FALSE;
1541 ret = CRYPT_GetRetrieveFunction(pszURL, &retrieve, &hRetrieve);
1542 if (ret)
1543 ret = CRYPT_GetCreateFunction(pszObjectOid, &create, &hCreate);
1544 if (ret)
1546 CRYPT_BLOB_ARRAY object = { 0, NULL };
1547 PFN_FREE_ENCODED_OBJECT_FUNC freeObject;
1548 void *freeContext;
1550 ret = retrieve(pszURL, pszObjectOid, dwRetrievalFlags, dwTimeout,
1551 &object, &freeObject, &freeContext, hAsyncRetrieve, pCredentials,
1552 pAuxInfo);
1553 if (ret)
1555 get_object_expiration_func getExpiration;
1557 ret = create(pszObjectOid, dwRetrievalFlags, &object, ppvObject);
1558 if (ret && !(dwRetrievalFlags & CRYPT_DONT_CACHE_RESULT) &&
1559 CRYPT_GetExpirationFunction(pszObjectOid, &getExpiration))
1561 FILETIME expires;
1563 if (getExpiration(*ppvObject, &expires))
1564 CRYPT_CacheURL(pszURL, &object, dwRetrievalFlags, expires);
1566 freeObject(pszObjectOid, &object, freeContext);
1569 if (hCreate)
1570 CryptFreeOIDFunctionAddress(hCreate, 0);
1571 if (hRetrieve)
1572 CryptFreeOIDFunctionAddress(hRetrieve, 0);
1573 TRACE("returning %d\n", ret);
1574 return ret;
1577 static DWORD verify_cert_revocation_with_crl_online(PCCERT_CONTEXT cert,
1578 PCCRL_CONTEXT crl, DWORD index, FILETIME *pTime,
1579 PCERT_REVOCATION_STATUS pRevStatus)
1581 DWORD error;
1582 PCRL_ENTRY entry = NULL;
1584 CertFindCertificateInCRL(cert, crl, 0, NULL, &entry);
1585 if (entry)
1587 error = CRYPT_E_REVOKED;
1588 pRevStatus->dwIndex = index;
1590 else
1592 /* Since the CRL was retrieved for the cert being checked, then it's
1593 * guaranteed to be fresh, and the cert is not revoked.
1595 error = ERROR_SUCCESS;
1597 return error;
1600 static DWORD verify_cert_revocation_from_dist_points_ext(
1601 const CRYPT_DATA_BLOB *value, PCCERT_CONTEXT cert, DWORD index,
1602 FILETIME *pTime, DWORD dwFlags, const CERT_REVOCATION_PARA *pRevPara,
1603 PCERT_REVOCATION_STATUS pRevStatus)
1605 DWORD error = ERROR_SUCCESS, cbUrlArray;
1607 if (CRYPT_GetUrlFromCRLDistPointsExt(value, NULL, &cbUrlArray, NULL, NULL))
1609 CRYPT_URL_ARRAY *urlArray = CryptMemAlloc(cbUrlArray);
1611 if (urlArray)
1613 DWORD j, retrievalFlags = 0, startTime, endTime, timeout;
1614 BOOL ret;
1616 ret = CRYPT_GetUrlFromCRLDistPointsExt(value, urlArray,
1617 &cbUrlArray, NULL, NULL);
1618 if (dwFlags & CERT_VERIFY_CACHE_ONLY_BASED_REVOCATION)
1619 retrievalFlags |= CRYPT_CACHE_ONLY_RETRIEVAL;
1620 if (dwFlags & CERT_VERIFY_REV_ACCUMULATIVE_TIMEOUT_FLAG &&
1621 pRevPara && pRevPara->cbSize >= offsetof(CERT_REVOCATION_PARA,
1622 dwUrlRetrievalTimeout) + sizeof(DWORD))
1624 startTime = GetTickCount();
1625 endTime = startTime + pRevPara->dwUrlRetrievalTimeout;
1626 timeout = pRevPara->dwUrlRetrievalTimeout;
1628 else
1629 endTime = timeout = 0;
1630 if (!ret)
1631 error = GetLastError();
1632 for (j = 0; !error && j < urlArray->cUrl; j++)
1634 PCCRL_CONTEXT crl;
1636 ret = CryptRetrieveObjectByUrlW(urlArray->rgwszUrl[j],
1637 CONTEXT_OID_CRL, retrievalFlags, timeout, (void **)&crl,
1638 NULL, NULL, NULL, NULL);
1639 if (ret)
1641 error = verify_cert_revocation_with_crl_online(cert, crl,
1642 index, pTime, pRevStatus);
1643 if (!error && timeout)
1645 DWORD time = GetTickCount();
1647 if ((int)(endTime - time) <= 0)
1649 error = ERROR_TIMEOUT;
1650 pRevStatus->dwIndex = index;
1652 else
1653 timeout = endTime - time;
1655 CertFreeCRLContext(crl);
1657 else
1658 error = CRYPT_E_REVOCATION_OFFLINE;
1660 CryptMemFree(urlArray);
1662 else
1664 error = ERROR_OUTOFMEMORY;
1665 pRevStatus->dwIndex = index;
1668 else
1670 error = GetLastError();
1671 pRevStatus->dwIndex = index;
1673 return error;
1676 static DWORD verify_cert_revocation_from_aia_ext(
1677 const CRYPT_DATA_BLOB *value, PCCERT_CONTEXT cert, DWORD index,
1678 FILETIME *pTime, DWORD dwFlags, PCERT_REVOCATION_PARA pRevPara,
1679 PCERT_REVOCATION_STATUS pRevStatus)
1681 BOOL ret;
1682 DWORD error, size;
1683 CERT_AUTHORITY_INFO_ACCESS *aia;
1685 ret = CryptDecodeObjectEx(X509_ASN_ENCODING, X509_AUTHORITY_INFO_ACCESS,
1686 value->pbData, value->cbData, CRYPT_DECODE_ALLOC_FLAG, NULL, &aia, &size);
1687 if (ret)
1689 DWORD i;
1691 for (i = 0; i < aia->cAccDescr; i++)
1692 if (!strcmp(aia->rgAccDescr[i].pszAccessMethod,
1693 szOID_PKIX_OCSP))
1695 if (aia->rgAccDescr[i].AccessLocation.dwAltNameChoice ==
1696 CERT_ALT_NAME_URL)
1697 FIXME("OCSP URL = %s\n",
1698 debugstr_w(aia->rgAccDescr[i].AccessLocation.u.pwszURL));
1699 else
1700 FIXME("unsupported AccessLocation type %d\n",
1701 aia->rgAccDescr[i].AccessLocation.dwAltNameChoice);
1703 LocalFree(aia);
1704 /* FIXME: lie and pretend OCSP validated the cert */
1705 error = ERROR_SUCCESS;
1707 else
1708 error = GetLastError();
1709 return error;
1712 static DWORD verify_cert_revocation_with_crl_offline(PCCERT_CONTEXT cert,
1713 PCCRL_CONTEXT crl, DWORD index, FILETIME *pTime,
1714 PCERT_REVOCATION_STATUS pRevStatus)
1716 DWORD error;
1717 LONG valid;
1719 valid = CompareFileTime(pTime, &crl->pCrlInfo->ThisUpdate);
1720 if (valid <= 0)
1722 /* If this CRL is not older than the time being verified, there's no
1723 * way to know whether the certificate was revoked.
1725 TRACE("CRL not old enough\n");
1726 error = CRYPT_E_REVOCATION_OFFLINE;
1728 else
1730 PCRL_ENTRY entry = NULL;
1732 CertFindCertificateInCRL(cert, crl, 0, NULL, &entry);
1733 if (entry)
1735 error = CRYPT_E_REVOKED;
1736 pRevStatus->dwIndex = index;
1738 else
1740 /* Since the CRL was not retrieved for the cert being checked,
1741 * there's no guarantee it's fresh, so the cert *might* be okay,
1742 * but it's safer not to guess.
1744 TRACE("certificate not found\n");
1745 error = CRYPT_E_REVOCATION_OFFLINE;
1748 return error;
1751 static DWORD verify_cert_revocation(PCCERT_CONTEXT cert, DWORD index,
1752 FILETIME *pTime, DWORD dwFlags, PCERT_REVOCATION_PARA pRevPara,
1753 PCERT_REVOCATION_STATUS pRevStatus)
1755 DWORD error = ERROR_SUCCESS;
1756 PCERT_EXTENSION ext;
1758 if ((ext = CertFindExtension(szOID_CRL_DIST_POINTS,
1759 cert->pCertInfo->cExtension, cert->pCertInfo->rgExtension)))
1760 error = verify_cert_revocation_from_dist_points_ext(&ext->Value, cert,
1761 index, pTime, dwFlags, pRevPara, pRevStatus);
1762 else if ((ext = CertFindExtension(szOID_AUTHORITY_INFO_ACCESS,
1763 cert->pCertInfo->cExtension, cert->pCertInfo->rgExtension)))
1764 error = verify_cert_revocation_from_aia_ext(&ext->Value, cert,
1765 index, pTime, dwFlags, pRevPara, pRevStatus);
1766 else
1768 if (pRevPara && pRevPara->hCrlStore && pRevPara->pIssuerCert)
1770 PCCRL_CONTEXT crl = NULL;
1771 BOOL canSignCRLs;
1773 /* If the caller told us about the issuer, make sure the issuer
1774 * can sign CRLs before looking for one.
1776 if ((ext = CertFindExtension(szOID_KEY_USAGE,
1777 pRevPara->pIssuerCert->pCertInfo->cExtension,
1778 pRevPara->pIssuerCert->pCertInfo->rgExtension)))
1780 CRYPT_BIT_BLOB usage;
1781 DWORD size = sizeof(usage);
1783 if (!CryptDecodeObjectEx(cert->dwCertEncodingType, X509_BITS,
1784 ext->Value.pbData, ext->Value.cbData,
1785 CRYPT_DECODE_NOCOPY_FLAG, NULL, &usage, &size))
1786 canSignCRLs = FALSE;
1787 else if (usage.cbData > 2)
1789 /* The key usage extension only defines 9 bits => no more
1790 * than 2 bytes are needed to encode all known usages.
1792 canSignCRLs = FALSE;
1794 else
1796 BYTE usageBits = usage.pbData[usage.cbData - 1];
1798 canSignCRLs = usageBits & CERT_CRL_SIGN_KEY_USAGE;
1801 else
1802 canSignCRLs = TRUE;
1803 if (canSignCRLs)
1805 /* If the caller was helpful enough to tell us where to find a
1806 * CRL for the cert, look for one and check it.
1808 crl = CertFindCRLInStore(pRevPara->hCrlStore,
1809 cert->dwCertEncodingType,
1810 CRL_FIND_ISSUED_BY_SIGNATURE_FLAG |
1811 CRL_FIND_ISSUED_BY_AKI_FLAG,
1812 CRL_FIND_ISSUED_BY, pRevPara->pIssuerCert, NULL);
1814 if (crl)
1816 error = verify_cert_revocation_with_crl_offline(cert, crl,
1817 index, pTime, pRevStatus);
1818 CertFreeCRLContext(crl);
1820 else
1822 TRACE("no CRL found\n");
1823 error = CRYPT_E_NO_REVOCATION_CHECK;
1824 pRevStatus->dwIndex = index;
1827 else
1829 if (!pRevPara)
1830 WARN("no CERT_REVOCATION_PARA\n");
1831 else if (!pRevPara->hCrlStore)
1832 WARN("no dist points/aia extension and no CRL store\n");
1833 else if (!pRevPara->pIssuerCert)
1834 WARN("no dist points/aia extension and no issuer\n");
1835 error = CRYPT_E_NO_REVOCATION_CHECK;
1836 pRevStatus->dwIndex = index;
1839 return error;
1842 typedef struct _CERT_REVOCATION_PARA_NO_EXTRA_FIELDS {
1843 DWORD cbSize;
1844 PCCERT_CONTEXT pIssuerCert;
1845 DWORD cCertStore;
1846 HCERTSTORE *rgCertStore;
1847 HCERTSTORE hCrlStore;
1848 LPFILETIME pftTimeToUse;
1849 } CERT_REVOCATION_PARA_NO_EXTRA_FIELDS, *PCERT_REVOCATION_PARA_NO_EXTRA_FIELDS;
1851 typedef struct _OLD_CERT_REVOCATION_STATUS {
1852 DWORD cbSize;
1853 DWORD dwIndex;
1854 DWORD dwError;
1855 DWORD dwReason;
1856 } OLD_CERT_REVOCATION_STATUS, *POLD_CERT_REVOCATION_STATUS;
1858 /***********************************************************************
1859 * CertDllVerifyRevocation (CRYPTNET.@)
1861 BOOL WINAPI CertDllVerifyRevocation(DWORD dwEncodingType, DWORD dwRevType,
1862 DWORD cContext, PVOID rgpvContext[], DWORD dwFlags,
1863 PCERT_REVOCATION_PARA pRevPara, PCERT_REVOCATION_STATUS pRevStatus)
1865 DWORD error = 0, i;
1866 FILETIME now;
1867 LPFILETIME pTime = NULL;
1869 TRACE("(%08x, %d, %d, %p, %08x, %p, %p)\n", dwEncodingType, dwRevType,
1870 cContext, rgpvContext, dwFlags, pRevPara, pRevStatus);
1872 if (pRevStatus->cbSize != sizeof(OLD_CERT_REVOCATION_STATUS) &&
1873 pRevStatus->cbSize != sizeof(CERT_REVOCATION_STATUS))
1875 SetLastError(E_INVALIDARG);
1876 return FALSE;
1878 if (!cContext)
1880 SetLastError(E_INVALIDARG);
1881 return FALSE;
1883 if (pRevPara && pRevPara->cbSize >=
1884 sizeof(CERT_REVOCATION_PARA_NO_EXTRA_FIELDS))
1885 pTime = pRevPara->pftTimeToUse;
1886 if (!pTime)
1888 GetSystemTimeAsFileTime(&now);
1889 pTime = &now;
1891 memset(&pRevStatus->dwIndex, 0, pRevStatus->cbSize - sizeof(DWORD));
1892 if (dwRevType != CERT_CONTEXT_REVOCATION_TYPE)
1893 error = CRYPT_E_NO_REVOCATION_CHECK;
1894 else
1896 for (i = 0; !error && i < cContext; i++)
1897 error = verify_cert_revocation(rgpvContext[i], i, pTime, dwFlags,
1898 pRevPara, pRevStatus);
1900 if (error)
1902 SetLastError(error);
1903 pRevStatus->dwError = error;
1905 TRACE("returning %d (%08x)\n", !error, error);
1906 return !error;