2 * Copyright (C) 2006 Maarten Lankhorst
3 * Copyright 2007 Juan Lang
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #include "wine/port.h"
24 #define NONAMELESSUNION
25 #define NONAMELESSSTRUCT
26 #define CERT_REVOCATION_PARA_HAS_EXTRA_FIELDS
39 #include "wine/debug.h"
41 WINE_DEFAULT_DEBUG_CHANNEL(cryptnet
);
43 #define IS_INTOID(x) (((ULONG_PTR)(x) >> 16) == 0)
45 BOOL WINAPI
DllMain(HINSTANCE hinstDLL
, DWORD fdwReason
, LPVOID lpvReserved
)
47 TRACE("(0x%p, %d, %p)\n", hinstDLL
, fdwReason
, lpvReserved
);
50 case DLL_PROCESS_ATTACH
:
51 DisableThreadLibraryCalls(hinstDLL
);
53 case DLL_PROCESS_DETACH
:
54 /* Do uninitialisation here */
61 static const WCHAR cryptNet
[] = { 'c','r','y','p','t','n','e','t','.',
64 /***********************************************************************
65 * DllRegisterServer (CRYPTNET.@)
67 HRESULT WINAPI
DllRegisterServer(void)
70 CryptRegisterDefaultOIDFunction(X509_ASN_ENCODING
,
71 CRYPT_OID_VERIFY_REVOCATION_FUNC
, 0, cryptNet
);
72 CryptRegisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC
, "Ldap",
73 cryptNet
, "LdapProvOpenStore");
74 CryptRegisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC
,
75 CERT_STORE_PROV_LDAP_W
, cryptNet
, "LdapProvOpenStore");
79 /***********************************************************************
80 * DllUnregisterServer (CRYPTNET.@)
82 HRESULT WINAPI
DllUnregisterServer(void)
85 CryptUnregisterDefaultOIDFunction(X509_ASN_ENCODING
,
86 CRYPT_OID_VERIFY_REVOCATION_FUNC
, cryptNet
);
87 CryptUnregisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC
, "Ldap");
88 CryptUnregisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC
,
89 CERT_STORE_PROV_LDAP_W
);
93 static const char *url_oid_to_str(LPCSTR oid
)
101 #define _x(oid) case LOWORD(oid): return #oid
102 _x(URL_OID_CERTIFICATE_ISSUER
);
103 _x(URL_OID_CERTIFICATE_CRL_DIST_POINT
);
104 _x(URL_OID_CTL_ISSUER
);
105 _x(URL_OID_CTL_NEXT_UPDATE
);
106 _x(URL_OID_CRL_ISSUER
);
107 _x(URL_OID_CERTIFICATE_FRESHEST_CRL
);
108 _x(URL_OID_CRL_FRESHEST_CRL
);
109 _x(URL_OID_CROSS_CERT_DIST_POINT
);
112 snprintf(buf
, sizeof(buf
), "%d", LOWORD(oid
));
120 typedef BOOL (WINAPI
*UrlDllGetObjectUrlFunc
)(LPCSTR
, LPVOID
, DWORD
,
121 PCRYPT_URL_ARRAY
, DWORD
*, PCRYPT_URL_INFO
, DWORD
*, LPVOID
);
123 static BOOL WINAPI
CRYPT_GetUrlFromCertificateIssuer(LPCSTR pszUrlOid
,
124 LPVOID pvPara
, DWORD dwFlags
, PCRYPT_URL_ARRAY pUrlArray
, DWORD
*pcbUrlArray
,
125 PCRYPT_URL_INFO pUrlInfo
, DWORD
*pcbUrlInfo
, LPVOID pvReserved
)
127 PCCERT_CONTEXT cert
= pvPara
;
131 /* The only applicable flag is CRYPT_GET_URL_FROM_EXTENSION */
132 if (dwFlags
&& !(dwFlags
& CRYPT_GET_URL_FROM_EXTENSION
))
134 SetLastError(CRYPT_E_NOT_FOUND
);
137 if ((ext
= CertFindExtension(szOID_AUTHORITY_INFO_ACCESS
,
138 cert
->pCertInfo
->cExtension
, cert
->pCertInfo
->rgExtension
)))
140 CERT_AUTHORITY_INFO_ACCESS
*aia
;
143 ret
= CryptDecodeObjectEx(X509_ASN_ENCODING
, X509_AUTHORITY_INFO_ACCESS
,
144 ext
->Value
.pbData
, ext
->Value
.cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
,
148 DWORD i
, cUrl
, bytesNeeded
= sizeof(CRYPT_URL_ARRAY
);
150 for (i
= 0, cUrl
= 0; i
< aia
->cAccDescr
; i
++)
151 if (!strcmp(aia
->rgAccDescr
[i
].pszAccessMethod
,
152 szOID_PKIX_CA_ISSUERS
))
154 if (aia
->rgAccDescr
[i
].AccessLocation
.dwAltNameChoice
==
157 if (aia
->rgAccDescr
[i
].AccessLocation
.u
.pwszURL
)
160 bytesNeeded
+= sizeof(LPWSTR
) +
161 (lstrlenW(aia
->rgAccDescr
[i
].AccessLocation
.u
.
162 pwszURL
) + 1) * sizeof(WCHAR
);
166 FIXME("unsupported alt name type %d\n",
167 aia
->rgAccDescr
[i
].AccessLocation
.dwAltNameChoice
);
171 SetLastError(E_INVALIDARG
);
175 *pcbUrlArray
= bytesNeeded
;
176 else if (*pcbUrlArray
< bytesNeeded
)
178 SetLastError(ERROR_MORE_DATA
);
179 *pcbUrlArray
= bytesNeeded
;
186 *pcbUrlArray
= bytesNeeded
;
188 pUrlArray
->rgwszUrl
=
189 (LPWSTR
*)((BYTE
*)pUrlArray
+ sizeof(CRYPT_URL_ARRAY
));
190 nextUrl
= (LPWSTR
)((BYTE
*)pUrlArray
+ sizeof(CRYPT_URL_ARRAY
)
191 + cUrl
* sizeof(LPWSTR
));
192 for (i
= 0; i
< aia
->cAccDescr
; i
++)
193 if (!strcmp(aia
->rgAccDescr
[i
].pszAccessMethod
,
194 szOID_PKIX_CA_ISSUERS
))
196 if (aia
->rgAccDescr
[i
].AccessLocation
.dwAltNameChoice
197 == CERT_ALT_NAME_URL
)
199 if (aia
->rgAccDescr
[i
].AccessLocation
.u
.pwszURL
)
202 aia
->rgAccDescr
[i
].AccessLocation
.u
.pwszURL
);
203 pUrlArray
->rgwszUrl
[pUrlArray
->cUrl
++] =
205 nextUrl
+= (lstrlenW(nextUrl
) + 1);
214 FIXME("url info: stub\n");
216 *pcbUrlInfo
= sizeof(CRYPT_URL_INFO
);
217 else if (*pcbUrlInfo
< sizeof(CRYPT_URL_INFO
))
219 *pcbUrlInfo
= sizeof(CRYPT_URL_INFO
);
220 SetLastError(ERROR_MORE_DATA
);
225 *pcbUrlInfo
= sizeof(CRYPT_URL_INFO
);
226 memset(pUrlInfo
, 0, sizeof(CRYPT_URL_INFO
));
234 SetLastError(CRYPT_E_NOT_FOUND
);
238 static BOOL
CRYPT_GetUrlFromCRLDistPointsExt(const CRYPT_DATA_BLOB
*value
,
239 PCRYPT_URL_ARRAY pUrlArray
, DWORD
*pcbUrlArray
, PCRYPT_URL_INFO pUrlInfo
,
243 CRL_DIST_POINTS_INFO
*info
;
246 ret
= CryptDecodeObjectEx(X509_ASN_ENCODING
, X509_CRL_DIST_POINTS
,
247 value
->pbData
, value
->cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
, &info
, &size
);
250 DWORD i
, cUrl
, bytesNeeded
= sizeof(CRYPT_URL_ARRAY
);
252 for (i
= 0, cUrl
= 0; i
< info
->cDistPoint
; i
++)
253 if (info
->rgDistPoint
[i
].DistPointName
.dwDistPointNameChoice
254 == CRL_DIST_POINT_FULL_NAME
)
257 CERT_ALT_NAME_INFO
*name
=
258 &info
->rgDistPoint
[i
].DistPointName
.u
.FullName
;
260 for (j
= 0; j
< name
->cAltEntry
; j
++)
261 if (name
->rgAltEntry
[j
].dwAltNameChoice
==
264 if (name
->rgAltEntry
[j
].u
.pwszURL
)
267 bytesNeeded
+= sizeof(LPWSTR
) +
268 (lstrlenW(name
->rgAltEntry
[j
].u
.pwszURL
) + 1)
275 SetLastError(E_INVALIDARG
);
279 *pcbUrlArray
= bytesNeeded
;
280 else if (*pcbUrlArray
< bytesNeeded
)
282 SetLastError(ERROR_MORE_DATA
);
283 *pcbUrlArray
= bytesNeeded
;
290 *pcbUrlArray
= bytesNeeded
;
292 pUrlArray
->rgwszUrl
=
293 (LPWSTR
*)((BYTE
*)pUrlArray
+ sizeof(CRYPT_URL_ARRAY
));
294 nextUrl
= (LPWSTR
)((BYTE
*)pUrlArray
+ sizeof(CRYPT_URL_ARRAY
)
295 + cUrl
* sizeof(LPWSTR
));
296 for (i
= 0; i
< info
->cDistPoint
; i
++)
297 if (info
->rgDistPoint
[i
].DistPointName
.dwDistPointNameChoice
298 == CRL_DIST_POINT_FULL_NAME
)
301 CERT_ALT_NAME_INFO
*name
=
302 &info
->rgDistPoint
[i
].DistPointName
.u
.FullName
;
304 for (j
= 0; j
< name
->cAltEntry
; j
++)
305 if (name
->rgAltEntry
[j
].dwAltNameChoice
==
308 if (name
->rgAltEntry
[j
].u
.pwszURL
)
311 name
->rgAltEntry
[j
].u
.pwszURL
);
312 pUrlArray
->rgwszUrl
[pUrlArray
->cUrl
++] =
315 (lstrlenW(name
->rgAltEntry
[j
].u
.pwszURL
) + 1);
324 FIXME("url info: stub\n");
326 *pcbUrlInfo
= sizeof(CRYPT_URL_INFO
);
327 else if (*pcbUrlInfo
< sizeof(CRYPT_URL_INFO
))
329 *pcbUrlInfo
= sizeof(CRYPT_URL_INFO
);
330 SetLastError(ERROR_MORE_DATA
);
335 *pcbUrlInfo
= sizeof(CRYPT_URL_INFO
);
336 memset(pUrlInfo
, 0, sizeof(CRYPT_URL_INFO
));
345 static BOOL WINAPI
CRYPT_GetUrlFromCertificateCRLDistPoint(LPCSTR pszUrlOid
,
346 LPVOID pvPara
, DWORD dwFlags
, PCRYPT_URL_ARRAY pUrlArray
, DWORD
*pcbUrlArray
,
347 PCRYPT_URL_INFO pUrlInfo
, DWORD
*pcbUrlInfo
, LPVOID pvReserved
)
349 PCCERT_CONTEXT cert
= pvPara
;
353 /* The only applicable flag is CRYPT_GET_URL_FROM_EXTENSION */
354 if (dwFlags
&& !(dwFlags
& CRYPT_GET_URL_FROM_EXTENSION
))
356 SetLastError(CRYPT_E_NOT_FOUND
);
359 if ((ext
= CertFindExtension(szOID_CRL_DIST_POINTS
,
360 cert
->pCertInfo
->cExtension
, cert
->pCertInfo
->rgExtension
)))
361 ret
= CRYPT_GetUrlFromCRLDistPointsExt(&ext
->Value
, pUrlArray
,
362 pcbUrlArray
, pUrlInfo
, pcbUrlInfo
);
364 SetLastError(CRYPT_E_NOT_FOUND
);
368 /***********************************************************************
369 * CryptGetObjectUrl (CRYPTNET.@)
371 BOOL WINAPI
CryptGetObjectUrl(LPCSTR pszUrlOid
, LPVOID pvPara
, DWORD dwFlags
,
372 PCRYPT_URL_ARRAY pUrlArray
, DWORD
*pcbUrlArray
, PCRYPT_URL_INFO pUrlInfo
,
373 DWORD
*pcbUrlInfo
, LPVOID pvReserved
)
375 UrlDllGetObjectUrlFunc func
= NULL
;
376 HCRYPTOIDFUNCADDR hFunc
= NULL
;
379 TRACE("(%s, %p, %08x, %p, %p, %p, %p, %p)\n", debugstr_a(pszUrlOid
),
380 pvPara
, dwFlags
, pUrlArray
, pcbUrlArray
, pUrlInfo
, pcbUrlInfo
, pvReserved
);
382 if (IS_INTOID(pszUrlOid
))
384 switch (LOWORD(pszUrlOid
))
386 case LOWORD(URL_OID_CERTIFICATE_ISSUER
):
387 func
= CRYPT_GetUrlFromCertificateIssuer
;
389 case LOWORD(URL_OID_CERTIFICATE_CRL_DIST_POINT
):
390 func
= CRYPT_GetUrlFromCertificateCRLDistPoint
;
393 FIXME("unimplemented for %s\n", url_oid_to_str(pszUrlOid
));
394 SetLastError(ERROR_FILE_NOT_FOUND
);
399 static HCRYPTOIDFUNCSET set
= NULL
;
402 set
= CryptInitOIDFunctionSet(URL_OID_GET_OBJECT_URL_FUNC
, 0);
403 CryptGetOIDFunctionAddress(set
, X509_ASN_ENCODING
, pszUrlOid
, 0,
404 (void **)&func
, &hFunc
);
407 ret
= func(pszUrlOid
, pvPara
, dwFlags
, pUrlArray
, pcbUrlArray
,
408 pUrlInfo
, pcbUrlInfo
, pvReserved
);
410 CryptFreeOIDFunctionAddress(hFunc
, 0);
414 /***********************************************************************
415 * CryptRetrieveObjectByUrlA (CRYPTNET.@)
417 BOOL WINAPI
CryptRetrieveObjectByUrlA(LPCSTR pszURL
, LPCSTR pszObjectOid
,
418 DWORD dwRetrievalFlags
, DWORD dwTimeout
, LPVOID
*ppvObject
,
419 HCRYPTASYNC hAsyncRetrieve
, PCRYPT_CREDENTIALS pCredentials
, LPVOID pvVerify
,
420 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
425 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p)\n", debugstr_a(pszURL
),
426 debugstr_a(pszObjectOid
), dwRetrievalFlags
, dwTimeout
, ppvObject
,
427 hAsyncRetrieve
, pCredentials
, pvVerify
, pAuxInfo
);
431 SetLastError(ERROR_INVALID_PARAMETER
);
434 len
= MultiByteToWideChar(CP_ACP
, 0, pszURL
, -1, NULL
, 0);
437 LPWSTR url
= CryptMemAlloc(len
* sizeof(WCHAR
));
441 MultiByteToWideChar(CP_ACP
, 0, pszURL
, -1, url
, len
);
442 ret
= CryptRetrieveObjectByUrlW(url
, pszObjectOid
,
443 dwRetrievalFlags
, dwTimeout
, ppvObject
, hAsyncRetrieve
,
444 pCredentials
, pvVerify
, pAuxInfo
);
448 SetLastError(ERROR_OUTOFMEMORY
);
453 static void WINAPI
CRYPT_FreeBlob(LPCSTR pszObjectOid
,
454 PCRYPT_BLOB_ARRAY pObject
, void *pvFreeContext
)
458 for (i
= 0; i
< pObject
->cBlob
; i
++)
459 CryptMemFree(pObject
->rgBlob
[i
].pbData
);
460 CryptMemFree(pObject
->rgBlob
);
463 static BOOL
CRYPT_GetObjectFromFile(HANDLE hFile
, PCRYPT_BLOB_ARRAY pObject
)
468 if ((ret
= GetFileSizeEx(hFile
, &size
)))
472 WARN("file too big\n");
473 SetLastError(ERROR_INVALID_DATA
);
478 CRYPT_DATA_BLOB blob
;
480 blob
.pbData
= CryptMemAlloc(size
.u
.LowPart
);
483 blob
.cbData
= size
.u
.LowPart
;
484 ret
= ReadFile(hFile
, blob
.pbData
, size
.u
.LowPart
, &blob
.cbData
,
488 pObject
->rgBlob
= CryptMemAlloc(sizeof(CRYPT_DATA_BLOB
));
492 memcpy(pObject
->rgBlob
, &blob
, sizeof(CRYPT_DATA_BLOB
));
496 SetLastError(ERROR_OUTOFMEMORY
);
501 CryptMemFree(blob
.pbData
);
505 SetLastError(ERROR_OUTOFMEMORY
);
513 static BOOL
CRYPT_GetObjectFromCache(LPCWSTR pszURL
, PCRYPT_BLOB_ARRAY pObject
,
514 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
517 INTERNET_CACHE_ENTRY_INFOW
*pCacheInfo
= NULL
;
520 TRACE("(%s, %p, %p)\n", debugstr_w(pszURL
), pObject
, pAuxInfo
);
522 ret
= GetUrlCacheEntryInfoW(pszURL
, NULL
, &size
);
523 if (!ret
&& GetLastError() == ERROR_INSUFFICIENT_BUFFER
)
525 pCacheInfo
= CryptMemAlloc(size
);
529 SetLastError(ERROR_OUTOFMEMORY
);
531 if (ret
&& (ret
= GetUrlCacheEntryInfoW(pszURL
, pCacheInfo
, &size
)))
535 GetSystemTimeAsFileTime(&ft
);
536 if (CompareFileTime(&pCacheInfo
->ExpireTime
, &ft
) >= 0)
538 HANDLE hFile
= CreateFileW(pCacheInfo
->lpszLocalFileName
,
539 GENERIC_READ
, 0, NULL
, OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
541 if (hFile
!= INVALID_HANDLE_VALUE
)
543 if ((ret
= CRYPT_GetObjectFromFile(hFile
, pObject
)))
545 if (pAuxInfo
&& pAuxInfo
->cbSize
>=
546 offsetof(CRYPT_RETRIEVE_AUX_INFO
,
547 pLastSyncTime
) + sizeof(PFILETIME
) &&
548 pAuxInfo
->pLastSyncTime
)
549 memcpy(pAuxInfo
->pLastSyncTime
,
550 &pCacheInfo
->LastSyncTime
,
557 DeleteUrlCacheEntryW(pszURL
);
563 DeleteUrlCacheEntryW(pszURL
);
567 CryptMemFree(pCacheInfo
);
568 TRACE("returning %d\n", ret
);
572 /* Parses the URL, and sets components' lpszHostName and lpszUrlPath members
573 * to NULL-terminated copies of those portions of the URL (to be freed with
576 static BOOL
CRYPT_CrackUrl(LPCWSTR pszURL
, URL_COMPONENTSW
*components
)
580 TRACE("(%s, %p)\n", debugstr_w(pszURL
), components
);
582 memset(components
, 0, sizeof(*components
));
583 components
->dwStructSize
= sizeof(*components
);
584 components
->lpszHostName
= CryptMemAlloc(INTERNET_MAX_HOST_NAME_LENGTH
* sizeof(WCHAR
));
585 components
->dwHostNameLength
= INTERNET_MAX_HOST_NAME_LENGTH
;
586 if (!components
->lpszHostName
)
588 SetLastError(ERROR_OUTOFMEMORY
);
591 components
->lpszUrlPath
= CryptMemAlloc(INTERNET_MAX_PATH_LENGTH
* sizeof(WCHAR
));
592 components
->dwUrlPathLength
= INTERNET_MAX_PATH_LENGTH
;
593 if (!components
->lpszUrlPath
)
595 CryptMemFree(components
->lpszHostName
);
596 SetLastError(ERROR_OUTOFMEMORY
);
600 ret
= InternetCrackUrlW(pszURL
, 0, ICU_DECODE
, components
);
603 switch (components
->nScheme
)
605 case INTERNET_SCHEME_FTP
:
606 if (!components
->nPort
)
607 components
->nPort
= INTERNET_DEFAULT_FTP_PORT
;
609 case INTERNET_SCHEME_HTTP
:
610 if (!components
->nPort
)
611 components
->nPort
= INTERNET_DEFAULT_HTTP_PORT
;
617 TRACE("returning %d\n", ret
);
628 static struct InetContext
*CRYPT_MakeInetContext(DWORD dwTimeout
)
630 struct InetContext
*context
= CryptMemAlloc(sizeof(struct InetContext
));
634 context
->event
= CreateEventW(NULL
, FALSE
, FALSE
, NULL
);
637 CryptMemFree(context
);
642 context
->timeout
= dwTimeout
;
643 context
->error
= ERROR_SUCCESS
;
649 static BOOL
CRYPT_DownloadObject(DWORD dwRetrievalFlags
, HINTERNET hHttp
,
650 struct InetContext
*context
, PCRYPT_BLOB_ARRAY pObject
,
651 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
653 CRYPT_DATA_BLOB object
= { 0, NULL
};
654 DWORD bytesAvailable
;
658 if ((ret
= InternetQueryDataAvailable(hHttp
, &bytesAvailable
, 0, 0)))
663 object
.pbData
= CryptMemRealloc(object
.pbData
,
664 object
.cbData
+ bytesAvailable
);
666 object
.pbData
= CryptMemAlloc(bytesAvailable
);
669 INTERNET_BUFFERSA buffer
= { sizeof(buffer
), 0 };
671 buffer
.dwBufferLength
= bytesAvailable
;
672 buffer
.lpvBuffer
= object
.pbData
+ object
.cbData
;
673 if (!(ret
= InternetReadFileExA(hHttp
, &buffer
, IRF_NO_WAIT
,
674 (DWORD_PTR
)context
)))
676 if (GetLastError() == ERROR_IO_PENDING
)
678 if (WaitForSingleObject(context
->event
,
679 context
->timeout
) == WAIT_TIMEOUT
)
680 SetLastError(ERROR_TIMEOUT
);
681 else if (context
->error
)
682 SetLastError(context
->error
);
688 object
.cbData
+= buffer
.dwBufferLength
;
692 SetLastError(ERROR_OUTOFMEMORY
);
697 else if (GetLastError() == ERROR_IO_PENDING
)
699 if (WaitForSingleObject(context
->event
, context
->timeout
) ==
701 SetLastError(ERROR_TIMEOUT
);
705 } while (ret
&& bytesAvailable
);
708 pObject
->rgBlob
= CryptMemAlloc(sizeof(CRYPT_DATA_BLOB
));
709 if (!pObject
->rgBlob
)
711 CryptMemFree(object
.pbData
);
712 SetLastError(ERROR_OUTOFMEMORY
);
717 pObject
->rgBlob
[0].cbData
= object
.cbData
;
718 pObject
->rgBlob
[0].pbData
= object
.pbData
;
722 TRACE("returning %d\n", ret
);
726 /* Finds the object specified by pszURL in the cache. If it's not found,
727 * creates a new cache entry for the object and writes the object to it.
728 * Sets the expiration time of the cache entry to expires.
730 static void CRYPT_CacheURL(LPCWSTR pszURL
, const CRYPT_BLOB_ARRAY
*pObject
,
731 DWORD dwRetrievalFlags
, FILETIME expires
)
733 WCHAR cacheFileName
[MAX_PATH
];
735 BOOL ret
, create
= FALSE
;
737 GetUrlCacheEntryInfoW(pszURL
, NULL
, &size
);
738 if (GetLastError() == ERROR_INSUFFICIENT_BUFFER
)
740 INTERNET_CACHE_ENTRY_INFOW
*info
= CryptMemAlloc(size
);
746 ret
= GetUrlCacheEntryInfoW(pszURL
, info
, &size
);
748 lstrcpyW(cacheFileName
, info
->lpszLocalFileName
);
749 /* Check if the existing cache entry is up to date. If it isn't,
750 * remove the existing cache entry, and create a new one with the
753 GetSystemTimeAsFileTime(&ft
);
754 if (CompareFileTime(&info
->ExpireTime
, &ft
) < 0)
757 DeleteUrlCacheEntryW(pszURL
);
766 ret
= CreateUrlCacheEntryW(pszURL
, pObject
->rgBlob
[0].cbData
, NULL
,
777 HANDLE hCacheFile
= CreateFileW(cacheFileName
, GENERIC_WRITE
, 0,
778 NULL
, CREATE_ALWAYS
, FILE_ATTRIBUTE_NORMAL
, NULL
);
780 if (hCacheFile
!= INVALID_HANDLE_VALUE
)
784 WriteFile(hCacheFile
, pObject
->rgBlob
[0].pbData
,
785 pObject
->rgBlob
[0].cbData
, &bytesWritten
, NULL
);
786 CloseHandle(hCacheFile
);
793 if (!(dwRetrievalFlags
& CRYPT_STICKY_CACHE_RETRIEVAL
))
794 entryType
= NORMAL_CACHE_ENTRY
;
796 entryType
= STICKY_CACHE_ENTRY
;
797 CommitUrlCacheEntryW(pszURL
, cacheFileName
, expires
, ft
, entryType
,
798 NULL
, 0, NULL
, NULL
);
803 static void CALLBACK
CRYPT_InetStatusCallback(HINTERNET hInt
,
804 DWORD_PTR dwContext
, DWORD status
, void *statusInfo
, DWORD statusInfoLen
)
806 struct InetContext
*context
= (struct InetContext
*)dwContext
;
807 LPINTERNET_ASYNC_RESULT result
;
811 case INTERNET_STATUS_REQUEST_COMPLETE
:
813 context
->error
= result
->dwError
;
814 SetEvent(context
->event
);
818 static BOOL
CRYPT_Connect(const URL_COMPONENTSW
*components
,
819 struct InetContext
*context
, PCRYPT_CREDENTIALS pCredentials
,
820 HINTERNET
*phInt
, HINTERNET
*phHost
)
824 TRACE("(%s:%d, %p, %p, %p, %p)\n", debugstr_w(components
->lpszHostName
),
825 components
->nPort
, context
, pCredentials
, phInt
, phInt
);
828 *phInt
= InternetOpenW(NULL
, INTERNET_OPEN_TYPE_PRECONFIG
, NULL
, NULL
,
829 context
? INTERNET_FLAG_ASYNC
: 0);
835 InternetSetStatusCallbackW(*phInt
, CRYPT_InetStatusCallback
);
836 switch (components
->nScheme
)
838 case INTERNET_SCHEME_FTP
:
839 service
= INTERNET_SERVICE_FTP
;
841 case INTERNET_SCHEME_HTTP
:
842 service
= INTERNET_SERVICE_HTTP
;
847 /* FIXME: use pCredentials for username/password */
848 *phHost
= InternetConnectW(*phInt
, components
->lpszHostName
,
849 components
->nPort
, NULL
, NULL
, service
, 0, (DWORD_PTR
)context
);
852 InternetCloseHandle(*phInt
);
861 TRACE("returning %d\n", ret
);
865 static BOOL WINAPI
FTP_RetrieveEncodedObjectW(LPCWSTR pszURL
,
866 LPCSTR pszObjectOid
, DWORD dwRetrievalFlags
, DWORD dwTimeout
,
867 PCRYPT_BLOB_ARRAY pObject
, PFN_FREE_ENCODED_OBJECT_FUNC
*ppfnFreeObject
,
868 void **ppvFreeContext
, HCRYPTASYNC hAsyncRetrieve
,
869 PCRYPT_CREDENTIALS pCredentials
, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
871 FIXME("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL
),
872 debugstr_a(pszObjectOid
), dwRetrievalFlags
, dwTimeout
, pObject
,
873 ppfnFreeObject
, ppvFreeContext
, hAsyncRetrieve
, pCredentials
, pAuxInfo
);
876 pObject
->rgBlob
= NULL
;
877 *ppfnFreeObject
= CRYPT_FreeBlob
;
878 *ppvFreeContext
= NULL
;
882 static const WCHAR x509cacert
[] = { 'a','p','p','l','i','c','a','t','i','o','n',
883 '/','x','-','x','5','0','9','-','c','a','-','c','e','r','t',0 };
884 static const WCHAR x509emailcert
[] = { 'a','p','p','l','i','c','a','t','i','o',
885 'n','/','x','-','x','5','0','9','-','e','m','a','i','l','-','c','e','r','t',
887 static const WCHAR x509servercert
[] = { 'a','p','p','l','i','c','a','t','i','o',
888 'n','/','x','-','x','5','0','9','-','s','e','r','v','e','r','-','c','e','r',
890 static const WCHAR x509usercert
[] = { 'a','p','p','l','i','c','a','t','i','o',
891 'n','/','x','-','x','5','0','9','-','u','s','e','r','-','c','e','r','t',0 };
892 static const WCHAR pkcs7cert
[] = { 'a','p','p','l','i','c','a','t','i','o','n',
893 '/','x','-','p','k','c','s','7','-','c','e','r','t','i','f','c','a','t','e',
895 static const WCHAR pkixCRL
[] = { 'a','p','p','l','i','c','a','t','i','o','n',
896 '/','p','k','i','x','-','c','r','l',0 };
897 static const WCHAR pkcs7CRL
[] = { 'a','p','p','l','i','c','a','t','i','o','n',
898 '/','x','-','p','k','c','s','7','-','c','r','l',0 };
899 static const WCHAR pkcs7sig
[] = { 'a','p','p','l','i','c','a','t','i','o','n',
900 '/','x','-','p','k','c','s','7','-','s','i','g','n','a','t','u','r','e',0 };
901 static const WCHAR pkcs7mime
[] = { 'a','p','p','l','i','c','a','t','i','o','n',
902 '/','x','-','p','k','c','s','7','-','m','i','m','e',0 };
904 static BOOL WINAPI
HTTP_RetrieveEncodedObjectW(LPCWSTR pszURL
,
905 LPCSTR pszObjectOid
, DWORD dwRetrievalFlags
, DWORD dwTimeout
,
906 PCRYPT_BLOB_ARRAY pObject
, PFN_FREE_ENCODED_OBJECT_FUNC
*ppfnFreeObject
,
907 void **ppvFreeContext
, HCRYPTASYNC hAsyncRetrieve
,
908 PCRYPT_CREDENTIALS pCredentials
, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
912 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL
),
913 debugstr_a(pszObjectOid
), dwRetrievalFlags
, dwTimeout
, pObject
,
914 ppfnFreeObject
, ppvFreeContext
, hAsyncRetrieve
, pCredentials
, pAuxInfo
);
917 pObject
->rgBlob
= NULL
;
918 *ppfnFreeObject
= CRYPT_FreeBlob
;
919 *ppvFreeContext
= NULL
;
921 if (!(dwRetrievalFlags
& CRYPT_WIRE_ONLY_RETRIEVAL
))
922 ret
= CRYPT_GetObjectFromCache(pszURL
, pObject
, pAuxInfo
);
923 if (!ret
&& (!(dwRetrievalFlags
& CRYPT_CACHE_ONLY_RETRIEVAL
) ||
924 (dwRetrievalFlags
& CRYPT_WIRE_ONLY_RETRIEVAL
)))
926 URL_COMPONENTSW components
;
928 if ((ret
= CRYPT_CrackUrl(pszURL
, &components
)))
930 HINTERNET hInt
, hHost
;
931 struct InetContext
*context
= NULL
;
934 context
= CRYPT_MakeInetContext(dwTimeout
);
935 ret
= CRYPT_Connect(&components
, context
, pCredentials
, &hInt
,
939 static LPCWSTR types
[] = { x509cacert
, x509emailcert
,
940 x509servercert
, x509usercert
, pkcs7cert
, pkixCRL
, pkcs7CRL
,
941 pkcs7sig
, pkcs7mime
, NULL
};
942 HINTERNET hHttp
= HttpOpenRequestW(hHost
, NULL
,
943 components
.lpszUrlPath
, NULL
, NULL
, types
,
944 INTERNET_FLAG_NO_COOKIES
| INTERNET_FLAG_NO_UI
,
951 InternetSetOptionW(hHttp
,
952 INTERNET_OPTION_RECEIVE_TIMEOUT
, &dwTimeout
,
954 InternetSetOptionW(hHttp
, INTERNET_OPTION_SEND_TIMEOUT
,
955 &dwTimeout
, sizeof(dwTimeout
));
957 ret
= HttpSendRequestExW(hHttp
, NULL
, NULL
, 0,
959 if (!ret
&& GetLastError() == ERROR_IO_PENDING
)
961 if (WaitForSingleObject(context
->event
,
962 context
->timeout
) == WAIT_TIMEOUT
)
963 SetLastError(ERROR_TIMEOUT
);
967 /* We don't set ret to TRUE in this block to avoid masking
968 * an error from HttpSendRequestExW.
971 !HttpEndRequestW(hHttp
, NULL
, 0, (DWORD_PTR
)context
) &&
972 GetLastError() == ERROR_IO_PENDING
)
974 if (WaitForSingleObject(context
->event
,
975 context
->timeout
) == WAIT_TIMEOUT
)
977 SetLastError(ERROR_TIMEOUT
);
982 ret
= CRYPT_DownloadObject(dwRetrievalFlags
, hHttp
,
983 context
, pObject
, pAuxInfo
);
984 if (ret
&& !(dwRetrievalFlags
& CRYPT_DONT_CACHE_RESULT
))
987 DWORD len
= sizeof(st
);
989 if (HttpQueryInfoW(hHttp
,
990 HTTP_QUERY_EXPIRES
| HTTP_QUERY_FLAG_SYSTEMTIME
, &st
,
995 SystemTimeToFileTime(&st
, &ft
);
996 CRYPT_CacheURL(pszURL
, pObject
, dwRetrievalFlags
,
1000 InternetCloseHandle(hHttp
);
1002 InternetCloseHandle(hHost
);
1003 InternetCloseHandle(hInt
);
1007 CloseHandle(context
->event
);
1008 CryptMemFree(context
);
1010 CryptMemFree(components
.lpszUrlPath
);
1011 CryptMemFree(components
.lpszHostName
);
1014 TRACE("returning %d\n", ret
);
1018 static BOOL WINAPI
File_RetrieveEncodedObjectW(LPCWSTR pszURL
,
1019 LPCSTR pszObjectOid
, DWORD dwRetrievalFlags
, DWORD dwTimeout
,
1020 PCRYPT_BLOB_ARRAY pObject
, PFN_FREE_ENCODED_OBJECT_FUNC
*ppfnFreeObject
,
1021 void **ppvFreeContext
, HCRYPTASYNC hAsyncRetrieve
,
1022 PCRYPT_CREDENTIALS pCredentials
, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
1024 URL_COMPONENTSW components
= { sizeof(components
), 0 };
1027 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL
),
1028 debugstr_a(pszObjectOid
), dwRetrievalFlags
, dwTimeout
, pObject
,
1029 ppfnFreeObject
, ppvFreeContext
, hAsyncRetrieve
, pCredentials
, pAuxInfo
);
1032 pObject
->rgBlob
= NULL
;
1033 *ppfnFreeObject
= CRYPT_FreeBlob
;
1034 *ppvFreeContext
= NULL
;
1036 components
.lpszUrlPath
= CryptMemAlloc(INTERNET_MAX_PATH_LENGTH
* sizeof(WCHAR
));
1037 components
.dwUrlPathLength
= INTERNET_MAX_PATH_LENGTH
;
1038 if (!components
.lpszUrlPath
)
1040 SetLastError(ERROR_OUTOFMEMORY
);
1044 ret
= InternetCrackUrlW(pszURL
, 0, ICU_DECODE
, &components
);
1049 /* 3 == lstrlenW(L"c:") + 1 */
1050 path
= CryptMemAlloc((components
.dwUrlPathLength
+ 3) * sizeof(WCHAR
));
1055 /* Try to create the file directly - Wine handles / in pathnames */
1056 lstrcpynW(path
, components
.lpszUrlPath
,
1057 components
.dwUrlPathLength
+ 1);
1058 hFile
= CreateFileW(path
, GENERIC_READ
, 0, NULL
, OPEN_EXISTING
,
1059 FILE_ATTRIBUTE_NORMAL
, NULL
);
1060 if (hFile
== INVALID_HANDLE_VALUE
)
1062 /* Try again on the current drive */
1063 GetCurrentDirectoryW(components
.dwUrlPathLength
, path
);
1066 lstrcpynW(path
+ 2, components
.lpszUrlPath
,
1067 components
.dwUrlPathLength
+ 1);
1068 hFile
= CreateFileW(path
, GENERIC_READ
, 0, NULL
,
1069 OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
1071 if (hFile
== INVALID_HANDLE_VALUE
)
1073 /* Try again on the Windows drive */
1074 GetWindowsDirectoryW(path
, components
.dwUrlPathLength
);
1077 lstrcpynW(path
+ 2, components
.lpszUrlPath
,
1078 components
.dwUrlPathLength
+ 1);
1079 hFile
= CreateFileW(path
, GENERIC_READ
, 0, NULL
,
1080 OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
1084 if (hFile
!= INVALID_HANDLE_VALUE
)
1086 if ((ret
= CRYPT_GetObjectFromFile(hFile
, pObject
)))
1088 if (pAuxInfo
&& pAuxInfo
->cbSize
>=
1089 offsetof(CRYPT_RETRIEVE_AUX_INFO
,
1090 pLastSyncTime
) + sizeof(PFILETIME
) &&
1091 pAuxInfo
->pLastSyncTime
)
1092 GetFileTime(hFile
, NULL
, NULL
,
1093 pAuxInfo
->pLastSyncTime
);
1103 SetLastError(ERROR_OUTOFMEMORY
);
1107 CryptMemFree(components
.lpszUrlPath
);
1111 typedef BOOL (WINAPI
*SchemeDllRetrieveEncodedObjectW
)(LPCWSTR pwszUrl
,
1112 LPCSTR pszObjectOid
, DWORD dwRetrievalFlags
, DWORD dwTimeout
,
1113 PCRYPT_BLOB_ARRAY pObject
, PFN_FREE_ENCODED_OBJECT_FUNC
*ppfnFreeObject
,
1114 void **ppvFreeContext
, HCRYPTASYNC hAsyncRetrieve
,
1115 PCRYPT_CREDENTIALS pCredentials
, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
);
1117 static BOOL
CRYPT_GetRetrieveFunction(LPCWSTR pszURL
,
1118 SchemeDllRetrieveEncodedObjectW
*pFunc
, HCRYPTOIDFUNCADDR
*phFunc
)
1120 URL_COMPONENTSW components
= { sizeof(components
), 0 };
1123 TRACE("(%s, %p, %p)\n", debugstr_w(pszURL
), pFunc
, phFunc
);
1127 components
.dwSchemeLength
= 1;
1128 ret
= InternetCrackUrlW(pszURL
, 0, 0, &components
);
1131 /* Microsoft always uses CryptInitOIDFunctionSet/
1132 * CryptGetOIDFunctionAddress, but there doesn't seem to be a pressing
1133 * reason to do so for builtin schemes.
1135 switch (components
.nScheme
)
1137 case INTERNET_SCHEME_FTP
:
1138 *pFunc
= FTP_RetrieveEncodedObjectW
;
1140 case INTERNET_SCHEME_HTTP
:
1141 *pFunc
= HTTP_RetrieveEncodedObjectW
;
1143 case INTERNET_SCHEME_FILE
:
1144 *pFunc
= File_RetrieveEncodedObjectW
;
1148 int len
= WideCharToMultiByte(CP_ACP
, 0, components
.lpszScheme
,
1149 components
.dwSchemeLength
, NULL
, 0, NULL
, NULL
);
1153 LPSTR scheme
= CryptMemAlloc(len
);
1157 static HCRYPTOIDFUNCSET set
= NULL
;
1160 set
= CryptInitOIDFunctionSet(
1161 SCHEME_OID_RETRIEVE_ENCODED_OBJECTW_FUNC
, 0);
1162 WideCharToMultiByte(CP_ACP
, 0, components
.lpszScheme
,
1163 components
.dwSchemeLength
, scheme
, len
, NULL
, NULL
);
1164 ret
= CryptGetOIDFunctionAddress(set
, X509_ASN_ENCODING
,
1165 scheme
, 0, (void **)pFunc
, phFunc
);
1166 CryptMemFree(scheme
);
1170 SetLastError(ERROR_OUTOFMEMORY
);
1179 TRACE("returning %d\n", ret
);
1183 static BOOL WINAPI
CRYPT_CreateBlob(LPCSTR pszObjectOid
,
1184 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
)
1187 CRYPT_BLOB_ARRAY
*context
;
1190 size
= sizeof(CRYPT_BLOB_ARRAY
) + pObject
->cBlob
* sizeof(CRYPT_DATA_BLOB
);
1191 for (i
= 0; i
< pObject
->cBlob
; i
++)
1192 size
+= pObject
->rgBlob
[i
].cbData
;
1193 context
= CryptMemAlloc(size
);
1200 (CRYPT_DATA_BLOB
*)((LPBYTE
)context
+ sizeof(CRYPT_BLOB_ARRAY
));
1202 (LPBYTE
)context
->rgBlob
+ pObject
->cBlob
* sizeof(CRYPT_DATA_BLOB
);
1203 for (i
= 0; i
< pObject
->cBlob
; i
++)
1205 memcpy(nextData
, pObject
->rgBlob
[i
].pbData
,
1206 pObject
->rgBlob
[i
].cbData
);
1207 context
->rgBlob
[i
].pbData
= nextData
;
1208 context
->rgBlob
[i
].cbData
= pObject
->rgBlob
[i
].cbData
;
1209 nextData
+= pObject
->rgBlob
[i
].cbData
;
1212 *ppvContext
= context
;
1218 typedef BOOL (WINAPI
*AddContextToStore
)(HCERTSTORE hCertStore
,
1219 const void *pContext
, DWORD dwAddDisposition
, const void **ppStoreContext
);
1221 static BOOL
CRYPT_CreateContext(const CRYPT_BLOB_ARRAY
*pObject
,
1222 DWORD dwExpectedContentTypeFlags
, AddContextToStore addFunc
, void **ppvContext
)
1226 if (!pObject
->cBlob
)
1228 SetLastError(ERROR_INVALID_DATA
);
1232 else if (pObject
->cBlob
== 1)
1234 if (!CryptQueryObject(CERT_QUERY_OBJECT_BLOB
, &pObject
->rgBlob
[0],
1235 dwExpectedContentTypeFlags
, CERT_QUERY_FORMAT_FLAG_BINARY
, 0, NULL
,
1236 NULL
, NULL
, NULL
, NULL
, (const void **)ppvContext
))
1238 SetLastError(CRYPT_E_NO_MATCH
);
1244 HCERTSTORE store
= CertOpenStore(CERT_STORE_PROV_MEMORY
, 0, 0,
1245 CERT_STORE_CREATE_NEW_FLAG
, NULL
);
1250 const void *context
;
1252 for (i
= 0; i
< pObject
->cBlob
; i
++)
1254 if (CryptQueryObject(CERT_QUERY_OBJECT_BLOB
,
1255 &pObject
->rgBlob
[i
], dwExpectedContentTypeFlags
,
1256 CERT_QUERY_FORMAT_FLAG_BINARY
, 0, NULL
, NULL
, NULL
, NULL
,
1259 if (!addFunc(store
, context
, CERT_STORE_ADD_ALWAYS
, NULL
))
1264 SetLastError(CRYPT_E_NO_MATCH
);
1271 *ppvContext
= store
;
1276 static BOOL WINAPI
CRYPT_CreateCert(LPCSTR pszObjectOid
,
1277 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
)
1279 return CRYPT_CreateContext(pObject
, CERT_QUERY_CONTENT_FLAG_CERT
,
1280 (AddContextToStore
)CertAddCertificateContextToStore
, ppvContext
);
1283 static BOOL WINAPI
CRYPT_CreateCRL(LPCSTR pszObjectOid
,
1284 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
)
1286 return CRYPT_CreateContext(pObject
, CERT_QUERY_CONTENT_FLAG_CRL
,
1287 (AddContextToStore
)CertAddCRLContextToStore
, ppvContext
);
1290 static BOOL WINAPI
CRYPT_CreateCTL(LPCSTR pszObjectOid
,
1291 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
)
1293 return CRYPT_CreateContext(pObject
, CERT_QUERY_CONTENT_FLAG_CTL
,
1294 (AddContextToStore
)CertAddCTLContextToStore
, ppvContext
);
1297 static BOOL WINAPI
CRYPT_CreatePKCS7(LPCSTR pszObjectOid
,
1298 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
)
1302 if (!pObject
->cBlob
)
1304 SetLastError(ERROR_INVALID_DATA
);
1308 else if (pObject
->cBlob
== 1)
1309 ret
= CryptQueryObject(CERT_QUERY_OBJECT_BLOB
, &pObject
->rgBlob
[0],
1310 CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED
|
1311 CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED
, CERT_QUERY_FORMAT_FLAG_BINARY
,
1312 0, NULL
, NULL
, NULL
, ppvContext
, NULL
, NULL
);
1315 FIXME("multiple messages unimplemented\n");
1321 static BOOL WINAPI
CRYPT_CreateAny(LPCSTR pszObjectOid
,
1322 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
)
1326 if (!pObject
->cBlob
)
1328 SetLastError(ERROR_INVALID_DATA
);
1334 HCERTSTORE store
= CertOpenStore(CERT_STORE_PROV_COLLECTION
, 0, 0,
1335 CERT_STORE_CREATE_NEW_FLAG
, NULL
);
1339 HCERTSTORE memStore
= CertOpenStore(CERT_STORE_PROV_MEMORY
, 0, 0,
1340 CERT_STORE_CREATE_NEW_FLAG
, NULL
);
1344 CertAddStoreToCollection(store
, memStore
,
1345 CERT_PHYSICAL_STORE_ADD_ENABLE_FLAG
, 0);
1346 CertCloseStore(memStore
, 0);
1350 CertCloseStore(store
, 0);
1359 for (i
= 0; i
< pObject
->cBlob
; i
++)
1361 DWORD contentType
, expectedContentTypes
=
1362 CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED
|
1363 CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED
|
1364 CERT_QUERY_CONTENT_FLAG_CERT
|
1365 CERT_QUERY_CONTENT_FLAG_CRL
|
1366 CERT_QUERY_CONTENT_FLAG_CTL
;
1367 HCERTSTORE contextStore
;
1368 const void *context
;
1370 if (CryptQueryObject(CERT_QUERY_OBJECT_BLOB
,
1371 &pObject
->rgBlob
[i
], expectedContentTypes
,
1372 CERT_QUERY_FORMAT_FLAG_BINARY
, 0, NULL
, &contentType
, NULL
,
1373 &contextStore
, NULL
, &context
))
1375 switch (contentType
)
1377 case CERT_QUERY_CONTENT_CERT
:
1378 if (!CertAddCertificateContextToStore(store
,
1379 context
, CERT_STORE_ADD_ALWAYS
, NULL
))
1381 CertFreeCertificateContext(context
);
1383 case CERT_QUERY_CONTENT_CRL
:
1384 if (!CertAddCRLContextToStore(store
,
1385 context
, CERT_STORE_ADD_ALWAYS
, NULL
))
1387 CertFreeCRLContext(context
);
1389 case CERT_QUERY_CONTENT_CTL
:
1390 if (!CertAddCTLContextToStore(store
,
1391 context
, CERT_STORE_ADD_ALWAYS
, NULL
))
1393 CertFreeCTLContext(context
);
1396 CertAddStoreToCollection(store
, contextStore
, 0, 0);
1398 CertCloseStore(contextStore
, 0);
1406 *ppvContext
= store
;
1411 typedef BOOL (WINAPI
*ContextDllCreateObjectContext
)(LPCSTR pszObjectOid
,
1412 DWORD dwRetrievalFlags
, const CRYPT_BLOB_ARRAY
*pObject
, void **ppvContext
);
1414 static BOOL
CRYPT_GetCreateFunction(LPCSTR pszObjectOid
,
1415 ContextDllCreateObjectContext
*pFunc
, HCRYPTOIDFUNCADDR
*phFunc
)
1419 TRACE("(%s, %p, %p)\n", debugstr_a(pszObjectOid
), pFunc
, phFunc
);
1423 if (IS_INTOID(pszObjectOid
))
1425 switch (LOWORD(pszObjectOid
))
1428 *pFunc
= CRYPT_CreateBlob
;
1430 case LOWORD(CONTEXT_OID_CERTIFICATE
):
1431 *pFunc
= CRYPT_CreateCert
;
1433 case LOWORD(CONTEXT_OID_CRL
):
1434 *pFunc
= CRYPT_CreateCRL
;
1436 case LOWORD(CONTEXT_OID_CTL
):
1437 *pFunc
= CRYPT_CreateCTL
;
1439 case LOWORD(CONTEXT_OID_PKCS7
):
1440 *pFunc
= CRYPT_CreatePKCS7
;
1442 case LOWORD(CONTEXT_OID_CAPI2_ANY
):
1443 *pFunc
= CRYPT_CreateAny
;
1449 static HCRYPTOIDFUNCSET set
= NULL
;
1452 set
= CryptInitOIDFunctionSet(
1453 CONTEXT_OID_CREATE_OBJECT_CONTEXT_FUNC
, 0);
1454 ret
= CryptGetOIDFunctionAddress(set
, X509_ASN_ENCODING
, pszObjectOid
,
1455 0, (void **)pFunc
, phFunc
);
1457 TRACE("returning %d\n", ret
);
1461 typedef BOOL (*get_object_expiration_func
)(const void *pvContext
,
1462 FILETIME
*expiration
);
1464 static BOOL
CRYPT_GetExpirationFromCert(const void *pvObject
, FILETIME
*expiration
)
1466 PCCERT_CONTEXT cert
= pvObject
;
1468 *expiration
= cert
->pCertInfo
->NotAfter
;
1472 static BOOL
CRYPT_GetExpirationFromCRL(const void *pvObject
, FILETIME
*expiration
)
1474 PCCRL_CONTEXT cert
= pvObject
;
1476 *expiration
= cert
->pCrlInfo
->NextUpdate
;
1480 static BOOL
CRYPT_GetExpirationFromCTL(const void *pvObject
, FILETIME
*expiration
)
1482 PCCTL_CONTEXT cert
= pvObject
;
1484 *expiration
= cert
->pCtlInfo
->NextUpdate
;
1488 static BOOL
CRYPT_GetExpirationFunction(LPCSTR pszObjectOid
,
1489 get_object_expiration_func
*getExpiration
)
1493 if (IS_INTOID(pszObjectOid
))
1495 switch (LOWORD(pszObjectOid
))
1497 case LOWORD(CONTEXT_OID_CERTIFICATE
):
1498 *getExpiration
= CRYPT_GetExpirationFromCert
;
1501 case LOWORD(CONTEXT_OID_CRL
):
1502 *getExpiration
= CRYPT_GetExpirationFromCRL
;
1505 case LOWORD(CONTEXT_OID_CTL
):
1506 *getExpiration
= CRYPT_GetExpirationFromCTL
;
1518 /***********************************************************************
1519 * CryptRetrieveObjectByUrlW (CRYPTNET.@)
1521 BOOL WINAPI
CryptRetrieveObjectByUrlW(LPCWSTR pszURL
, LPCSTR pszObjectOid
,
1522 DWORD dwRetrievalFlags
, DWORD dwTimeout
, LPVOID
*ppvObject
,
1523 HCRYPTASYNC hAsyncRetrieve
, PCRYPT_CREDENTIALS pCredentials
, LPVOID pvVerify
,
1524 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo
)
1527 SchemeDllRetrieveEncodedObjectW retrieve
;
1528 ContextDllCreateObjectContext create
;
1529 HCRYPTOIDFUNCADDR hRetrieve
= 0, hCreate
= 0;
1531 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL
),
1532 debugstr_a(pszObjectOid
), dwRetrievalFlags
, dwTimeout
, ppvObject
,
1533 hAsyncRetrieve
, pCredentials
, pvVerify
, pAuxInfo
);
1537 SetLastError(ERROR_INVALID_PARAMETER
);
1540 ret
= CRYPT_GetRetrieveFunction(pszURL
, &retrieve
, &hRetrieve
);
1542 ret
= CRYPT_GetCreateFunction(pszObjectOid
, &create
, &hCreate
);
1545 CRYPT_BLOB_ARRAY object
= { 0, NULL
};
1546 PFN_FREE_ENCODED_OBJECT_FUNC freeObject
;
1549 ret
= retrieve(pszURL
, pszObjectOid
, dwRetrievalFlags
, dwTimeout
,
1550 &object
, &freeObject
, &freeContext
, hAsyncRetrieve
, pCredentials
,
1554 get_object_expiration_func getExpiration
;
1556 ret
= create(pszObjectOid
, dwRetrievalFlags
, &object
, ppvObject
);
1557 if (ret
&& !(dwRetrievalFlags
& CRYPT_DONT_CACHE_RESULT
) &&
1558 CRYPT_GetExpirationFunction(pszObjectOid
, &getExpiration
))
1562 if (getExpiration(*ppvObject
, &expires
))
1563 CRYPT_CacheURL(pszURL
, &object
, dwRetrievalFlags
, expires
);
1565 freeObject(pszObjectOid
, &object
, freeContext
);
1569 CryptFreeOIDFunctionAddress(hCreate
, 0);
1571 CryptFreeOIDFunctionAddress(hRetrieve
, 0);
1572 TRACE("returning %d\n", ret
);
1576 static DWORD
verify_cert_revocation_with_crl_online(PCCERT_CONTEXT cert
,
1577 PCCRL_CONTEXT crl
, DWORD index
, FILETIME
*pTime
,
1578 PCERT_REVOCATION_STATUS pRevStatus
)
1581 PCRL_ENTRY entry
= NULL
;
1583 CertFindCertificateInCRL(cert
, crl
, 0, NULL
, &entry
);
1586 error
= CRYPT_E_REVOKED
;
1587 pRevStatus
->dwIndex
= index
;
1591 /* Since the CRL was retrieved for the cert being checked, then it's
1592 * guaranteed to be fresh, and the cert is not revoked.
1594 error
= ERROR_SUCCESS
;
1599 static DWORD
verify_cert_revocation_from_dist_points_ext(
1600 const CRYPT_DATA_BLOB
*value
, PCCERT_CONTEXT cert
, DWORD index
,
1601 FILETIME
*pTime
, DWORD dwFlags
, const CERT_REVOCATION_PARA
*pRevPara
,
1602 PCERT_REVOCATION_STATUS pRevStatus
)
1604 DWORD error
= ERROR_SUCCESS
, cbUrlArray
;
1606 if (CRYPT_GetUrlFromCRLDistPointsExt(value
, NULL
, &cbUrlArray
, NULL
, NULL
))
1608 CRYPT_URL_ARRAY
*urlArray
= CryptMemAlloc(cbUrlArray
);
1612 DWORD j
, retrievalFlags
= 0, startTime
, endTime
, timeout
;
1615 ret
= CRYPT_GetUrlFromCRLDistPointsExt(value
, urlArray
,
1616 &cbUrlArray
, NULL
, NULL
);
1617 if (dwFlags
& CERT_VERIFY_CACHE_ONLY_BASED_REVOCATION
)
1618 retrievalFlags
|= CRYPT_CACHE_ONLY_RETRIEVAL
;
1619 if (dwFlags
& CERT_VERIFY_REV_ACCUMULATIVE_TIMEOUT_FLAG
&&
1620 pRevPara
&& pRevPara
->cbSize
>= offsetof(CERT_REVOCATION_PARA
,
1621 dwUrlRetrievalTimeout
) + sizeof(DWORD
))
1623 startTime
= GetTickCount();
1624 endTime
= startTime
+ pRevPara
->dwUrlRetrievalTimeout
;
1625 timeout
= pRevPara
->dwUrlRetrievalTimeout
;
1628 endTime
= timeout
= 0;
1630 error
= GetLastError();
1631 for (j
= 0; !error
&& j
< urlArray
->cUrl
; j
++)
1635 ret
= CryptRetrieveObjectByUrlW(urlArray
->rgwszUrl
[j
],
1636 CONTEXT_OID_CRL
, retrievalFlags
, timeout
, (void **)&crl
,
1637 NULL
, NULL
, NULL
, NULL
);
1640 error
= verify_cert_revocation_with_crl_online(cert
, crl
,
1641 index
, pTime
, pRevStatus
);
1642 if (!error
&& timeout
)
1644 DWORD time
= GetTickCount();
1646 if ((int)(endTime
- time
) <= 0)
1648 error
= ERROR_TIMEOUT
;
1649 pRevStatus
->dwIndex
= index
;
1652 timeout
= endTime
- time
;
1654 CertFreeCRLContext(crl
);
1657 error
= CRYPT_E_REVOCATION_OFFLINE
;
1659 CryptMemFree(urlArray
);
1663 error
= ERROR_OUTOFMEMORY
;
1664 pRevStatus
->dwIndex
= index
;
1669 error
= GetLastError();
1670 pRevStatus
->dwIndex
= index
;
1675 static DWORD
verify_cert_revocation_from_aia_ext(
1676 const CRYPT_DATA_BLOB
*value
, PCCERT_CONTEXT cert
, DWORD index
,
1677 FILETIME
*pTime
, DWORD dwFlags
, PCERT_REVOCATION_PARA pRevPara
,
1678 PCERT_REVOCATION_STATUS pRevStatus
)
1682 CERT_AUTHORITY_INFO_ACCESS
*aia
;
1684 ret
= CryptDecodeObjectEx(X509_ASN_ENCODING
, X509_AUTHORITY_INFO_ACCESS
,
1685 value
->pbData
, value
->cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
, &aia
, &size
);
1690 for (i
= 0; i
< aia
->cAccDescr
; i
++)
1691 if (!strcmp(aia
->rgAccDescr
[i
].pszAccessMethod
,
1694 if (aia
->rgAccDescr
[i
].AccessLocation
.dwAltNameChoice
==
1696 FIXME("OCSP URL = %s\n",
1697 debugstr_w(aia
->rgAccDescr
[i
].AccessLocation
.u
.pwszURL
));
1699 FIXME("unsupported AccessLocation type %d\n",
1700 aia
->rgAccDescr
[i
].AccessLocation
.dwAltNameChoice
);
1703 /* FIXME: lie and pretend OCSP validated the cert */
1704 error
= ERROR_SUCCESS
;
1707 error
= GetLastError();
1711 static DWORD
verify_cert_revocation_with_crl_offline(PCCERT_CONTEXT cert
,
1712 PCCRL_CONTEXT crl
, DWORD index
, FILETIME
*pTime
,
1713 PCERT_REVOCATION_STATUS pRevStatus
)
1718 valid
= CompareFileTime(pTime
, &crl
->pCrlInfo
->ThisUpdate
);
1721 /* If this CRL is not older than the time being verified, there's no
1722 * way to know whether the certificate was revoked.
1724 TRACE("CRL not old enough\n");
1725 error
= CRYPT_E_REVOCATION_OFFLINE
;
1729 PCRL_ENTRY entry
= NULL
;
1731 CertFindCertificateInCRL(cert
, crl
, 0, NULL
, &entry
);
1734 error
= CRYPT_E_REVOKED
;
1735 pRevStatus
->dwIndex
= index
;
1739 /* Since the CRL was not retrieved for the cert being checked,
1740 * there's no guarantee it's fresh, so the cert *might* be okay,
1741 * but it's safer not to guess.
1743 TRACE("certificate not found\n");
1744 error
= CRYPT_E_REVOCATION_OFFLINE
;
1750 static DWORD
verify_cert_revocation(PCCERT_CONTEXT cert
, DWORD index
,
1751 FILETIME
*pTime
, DWORD dwFlags
, PCERT_REVOCATION_PARA pRevPara
,
1752 PCERT_REVOCATION_STATUS pRevStatus
)
1754 DWORD error
= ERROR_SUCCESS
;
1755 PCERT_EXTENSION ext
;
1757 if ((ext
= CertFindExtension(szOID_CRL_DIST_POINTS
,
1758 cert
->pCertInfo
->cExtension
, cert
->pCertInfo
->rgExtension
)))
1759 error
= verify_cert_revocation_from_dist_points_ext(&ext
->Value
, cert
,
1760 index
, pTime
, dwFlags
, pRevPara
, pRevStatus
);
1761 else if ((ext
= CertFindExtension(szOID_AUTHORITY_INFO_ACCESS
,
1762 cert
->pCertInfo
->cExtension
, cert
->pCertInfo
->rgExtension
)))
1763 error
= verify_cert_revocation_from_aia_ext(&ext
->Value
, cert
,
1764 index
, pTime
, dwFlags
, pRevPara
, pRevStatus
);
1767 if (pRevPara
&& pRevPara
->hCrlStore
&& pRevPara
->pIssuerCert
)
1769 PCCRL_CONTEXT crl
= NULL
;
1772 /* If the caller told us about the issuer, make sure the issuer
1773 * can sign CRLs before looking for one.
1775 if ((ext
= CertFindExtension(szOID_KEY_USAGE
,
1776 pRevPara
->pIssuerCert
->pCertInfo
->cExtension
,
1777 pRevPara
->pIssuerCert
->pCertInfo
->rgExtension
)))
1779 CRYPT_BIT_BLOB usage
;
1780 DWORD size
= sizeof(usage
);
1782 if (!CryptDecodeObjectEx(cert
->dwCertEncodingType
, X509_BITS
,
1783 ext
->Value
.pbData
, ext
->Value
.cbData
,
1784 CRYPT_DECODE_NOCOPY_FLAG
, NULL
, &usage
, &size
))
1785 canSignCRLs
= FALSE
;
1786 else if (usage
.cbData
> 2)
1788 /* The key usage extension only defines 9 bits => no more
1789 * than 2 bytes are needed to encode all known usages.
1791 canSignCRLs
= FALSE
;
1795 BYTE usageBits
= usage
.pbData
[usage
.cbData
- 1];
1797 canSignCRLs
= usageBits
& CERT_CRL_SIGN_KEY_USAGE
;
1804 /* If the caller was helpful enough to tell us where to find a
1805 * CRL for the cert, look for one and check it.
1807 crl
= CertFindCRLInStore(pRevPara
->hCrlStore
,
1808 cert
->dwCertEncodingType
,
1809 CRL_FIND_ISSUED_BY_SIGNATURE_FLAG
|
1810 CRL_FIND_ISSUED_BY_AKI_FLAG
,
1811 CRL_FIND_ISSUED_BY
, pRevPara
->pIssuerCert
, NULL
);
1815 error
= verify_cert_revocation_with_crl_offline(cert
, crl
,
1816 index
, pTime
, pRevStatus
);
1817 CertFreeCRLContext(crl
);
1821 TRACE("no CRL found\n");
1822 error
= CRYPT_E_NO_REVOCATION_CHECK
;
1823 pRevStatus
->dwIndex
= index
;
1829 WARN("no CERT_REVOCATION_PARA\n");
1830 else if (!pRevPara
->hCrlStore
)
1831 WARN("no dist points/aia extension and no CRL store\n");
1832 else if (!pRevPara
->pIssuerCert
)
1833 WARN("no dist points/aia extension and no issuer\n");
1834 error
= CRYPT_E_NO_REVOCATION_CHECK
;
1835 pRevStatus
->dwIndex
= index
;
1841 typedef struct _CERT_REVOCATION_PARA_NO_EXTRA_FIELDS
{
1843 PCCERT_CONTEXT pIssuerCert
;
1845 HCERTSTORE
*rgCertStore
;
1846 HCERTSTORE hCrlStore
;
1847 LPFILETIME pftTimeToUse
;
1848 } CERT_REVOCATION_PARA_NO_EXTRA_FIELDS
, *PCERT_REVOCATION_PARA_NO_EXTRA_FIELDS
;
1850 typedef struct _OLD_CERT_REVOCATION_STATUS
{
1855 } OLD_CERT_REVOCATION_STATUS
, *POLD_CERT_REVOCATION_STATUS
;
1857 /***********************************************************************
1858 * CertDllVerifyRevocation (CRYPTNET.@)
1860 BOOL WINAPI
CertDllVerifyRevocation(DWORD dwEncodingType
, DWORD dwRevType
,
1861 DWORD cContext
, PVOID rgpvContext
[], DWORD dwFlags
,
1862 PCERT_REVOCATION_PARA pRevPara
, PCERT_REVOCATION_STATUS pRevStatus
)
1866 LPFILETIME pTime
= NULL
;
1868 TRACE("(%08x, %d, %d, %p, %08x, %p, %p)\n", dwEncodingType
, dwRevType
,
1869 cContext
, rgpvContext
, dwFlags
, pRevPara
, pRevStatus
);
1871 if (pRevStatus
->cbSize
!= sizeof(OLD_CERT_REVOCATION_STATUS
) &&
1872 pRevStatus
->cbSize
!= sizeof(CERT_REVOCATION_STATUS
))
1874 SetLastError(E_INVALIDARG
);
1879 SetLastError(E_INVALIDARG
);
1882 if (pRevPara
&& pRevPara
->cbSize
>=
1883 sizeof(CERT_REVOCATION_PARA_NO_EXTRA_FIELDS
))
1884 pTime
= pRevPara
->pftTimeToUse
;
1887 GetSystemTimeAsFileTime(&now
);
1890 memset(&pRevStatus
->dwIndex
, 0, pRevStatus
->cbSize
- sizeof(DWORD
));
1891 if (dwRevType
!= CERT_CONTEXT_REVOCATION_TYPE
)
1892 error
= CRYPT_E_NO_REVOCATION_CHECK
;
1895 for (i
= 0; !error
&& i
< cContext
; i
++)
1896 error
= verify_cert_revocation(rgpvContext
[i
], i
, pTime
, dwFlags
,
1897 pRevPara
, pRevStatus
);
1901 SetLastError(error
);
1902 pRevStatus
->dwError
= error
;
1904 TRACE("returning %d (%08x)\n", !error
, error
);