//+-------------------------------------------------------------------------- // // Microsoft Windows // Copyright (C) Microsoft Corporation, 1996 - 1999 // // File: admin.cpp // // Contents: Cert Server admin implementation // // History: 24-Aug-96 vich created // //--------------------------------------------------------------------------- #include "pch.cpp" #pragma hdrstop #include #include "certsrvd.h" #include "certbcli.h" #include "csprop.h" #include "csdisp.h" #include "admin.h" #include "certadmp.h" #include "config.h" #define __dwFILE__ __dwFILE_CERTADM_ADMIN_CPP__ //+-------------------------------------------------------------------------- // CCertAdmin::~CCertAdmin -- destructor // // free memory associated with this instance //+-------------------------------------------------------------------------- CCertAdmin::~CCertAdmin() { _Cleanup(); } //+-------------------------------------------------------------------------- // CCertAdmin::_CleanupOldConnection -- free memory // // free memory associated with this instance //+-------------------------------------------------------------------------- VOID CCertAdmin::_CleanupOldConnection() { _CleanupCAPropInfo(); } //+-------------------------------------------------------------------------- // CCertAdmin::_Cleanup -- free memory // // free memory associated with this instance //+-------------------------------------------------------------------------- VOID CCertAdmin::_Cleanup() { _CloseConnection(); _CleanupOldConnection(); } //+-------------------------------------------------------------------------- // CCertAdmin::_OpenConnection -- get DCOM object interface // //+-------------------------------------------------------------------------- HRESULT CCertAdmin::_OpenConnection( IN WCHAR const *pwszConfig, IN DWORD RequiredVersion, OUT WCHAR const **ppwszAuthority) { HRESULT hr; hr = myOpenAdminDComConnection( pwszConfig, ppwszAuthority, &m_pwszServerName, &m_dwServerVersion, &m_pICertAdminD); _JumpIfError(hr, error, "myOpenAdminDComConnection"); CSASSERT(NULL != m_pICertAdminD); CSASSERT(0 != m_dwServerVersion); if (m_dwServerVersion < RequiredVersion) { hr = RPC_E_VERSION_MISMATCH; _JumpError(hr, error, "old server"); } error: return(hr); } //+-------------------------------------------------------------------------- // CCertAdmin::_CloseConnection -- release DCOM object // //+-------------------------------------------------------------------------- VOID CCertAdmin::_CloseConnection() { myCloseDComConnection((IUnknown **) &m_pICertAdminD, &m_pwszServerName); m_dwServerVersion = 0; } //+-------------------------------------------------------------------------- // CCertAdmin::IsValidCertificate -- Verify certificate validity // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::IsValidCertificate( /* [in] */ BSTR const strConfig, /* [in] */ BSTR const strSerialNumber, /* [out, retval] */ LONG *pDisposition) { HRESULT hr; WCHAR const *pwszAuthority; if (NULL == strSerialNumber || NULL == pDisposition) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); m_fRevocationReasonValid = FALSE; __try { hr = m_pICertAdminD->IsValidCertificate( pwszAuthority, strSerialNumber, &m_RevocationReason, pDisposition); if (S_OK != hr || CA_DISP_REVOKED != *pDisposition) { m_fRevocationReasonValid = FALSE; } else { m_fRevocationReasonValid = TRUE; } } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "IsValidCertificate"); m_fRevocationReasonValid = TRUE; error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::IsValidCertificate")); } //+-------------------------------------------------------------------------- // CCertAdmin::GetRevocationReason -- Get Revocation Reason // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::GetRevocationReason( /* [out, retval] */ LONG *pReason) { HRESULT hr = S_OK; if (NULL == pReason) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } if (!m_fRevocationReasonValid) { hr = E_UNEXPECTED; _JumpError(hr, error, "m_fRevocationReasonValid"); } *pReason = m_RevocationReason; error: return(_SetErrorInfo(hr, L"CCertAdmin::GetRevocationReason")); } //+-------------------------------------------------------------------------- // CCertAdmin::RevokeCertificate -- Revoke a certificate // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::RevokeCertificate( /* [in] */ BSTR const strConfig, /* [in] */ BSTR const strSerialNumber, /* [in] */ LONG Reason, /* [in] */ DATE Date) { HRESULT hr; WCHAR const *pwszAuthority; FILETIME ft; if (NULL == strConfig || NULL == strSerialNumber) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = myDateToFileTime(&Date, &ft); _JumpIfError(hr, error, "myDateToFileTime"); hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->RevokeCertificate( pwszAuthority, strSerialNumber, Reason, ft); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "RevokeCertificate"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::RevokeCertificate")); } //+-------------------------------------------------------------------------- // CCertAdmin::SetRequestAttributes -- Add request attributes // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::SetRequestAttributes( /* [in] */ BSTR const strConfig, /* [in] */ LONG RequestId, /* [in] */ BSTR const strAttributes) { HRESULT hr; WCHAR const *pwszAuthority; if (NULL == strAttributes) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->SetAttributes( pwszAuthority, (DWORD) RequestId, strAttributes); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "SetAttributes"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::SetRequestAttributes")); } //+-------------------------------------------------------------------------- // CCertAdmin::SetCertificateExtension -- Set a Certificate Extension // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::SetCertificateExtension( /* [in] */ BSTR const strConfig, /* [in] */ LONG RequestId, /* [in] */ BSTR const strExtensionName, /* [in] */ LONG Type, /* [in] */ LONG Flags, /* [in] */ VARIANT const *pvarValue) { HRESULT hr; WCHAR const *pwszAuthority; CERTTRANSBLOB ctbValue; ctbValue.pb = NULL; if (NULL == strExtensionName || NULL == pvarValue) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); hr = myMarshalVariant(pvarValue, Type, &ctbValue.cb, &ctbValue.pb); _JumpIfError(hr, error, "myMarshalVariant"); __try { hr = m_pICertAdminD->SetExtension( pwszAuthority, (DWORD) RequestId, strExtensionName, Type, Flags, &ctbValue); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "SetExtension"); error: if (NULL != ctbValue.pb) { LocalFree(ctbValue.pb); } hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::SetCertificateExtension")); } //+-------------------------------------------------------------------------- // CCertAdmin::ResubmitRequest -- Resubmit a certificate request // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::ResubmitRequest( /* [in] */ BSTR const strConfig, /* [in] */ LONG RequestId, /* [out, retval] */ LONG *pDisposition) { HRESULT hr; WCHAR const *pwszAuthority; if (NULL == pDisposition) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } *pDisposition = 0; hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->ResubmitRequest( pwszAuthority, (DWORD) RequestId, (DWORD *) pDisposition); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "ResubmitRequest"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::ResubmitRequest")); } //+-------------------------------------------------------------------------- // CCertAdmin::DenyRequest -- Deny a certificate request // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::DenyRequest( /* [in] */ BSTR const strConfig, /* [in] */ LONG RequestId) { HRESULT hr; WCHAR const *pwszAuthority; hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->DenyRequest(pwszAuthority, (DWORD) RequestId); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "DenyRequest"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::DenyRequest")); } //+-------------------------------------------------------------------------- // CCertAdmin::PublishCRL -- Puhlish a new CRL // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::PublishCRL( /* [in] */ BSTR const strConfig, /* [in] */ DATE Date) { HRESULT hr; WCHAR const *pwszAuthority; FILETIME ft; // Date = 0.0 means pass ft = 0 to the DCOM interface if (Date == 0.0) { ZeroMemory(&ft, sizeof(FILETIME)); } else // translate date to ft { hr = myDateToFileTime(&Date, &ft); _JumpIfError(hr, error, "myDateToFileTime"); } hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->PublishCRL(pwszAuthority, ft); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "PublishCRL"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::PublishCRL")); } //+-------------------------------------------------------------------------- // CCertAdmin::PublishCRLs -- Publish new base CRL, delta CRL or both // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- HRESULT CCertAdmin::PublishCRLs( /* [in] */ BSTR const strConfig, /* [in] */ DATE Date, /* [in] */ LONG CRLFlags) // CA_CRL_* { HRESULT hr; WCHAR const *pwszAuthority; FILETIME ft; // Date = 0.0 means pass ft = 0 to the DCOM interface if (Date == 0.0) { ZeroMemory(&ft, sizeof(FILETIME)); } else // translate date to ft { hr = myDateToFileTime(&Date, &ft); _JumpIfError(hr, error, "myDateToFileTime"); } hr = _OpenConnection(strConfig, 2, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->PublishCRLs(pwszAuthority, ft, CRLFlags); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "PublishCRLs"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::PublishCRLs")); } //+-------------------------------------------------------------------------- // CCertAdmin::GetCRL -- Get the latest CRL // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::GetCRL( /* [in] */ BSTR const strConfig, /* [in] */ LONG Flags, /* [out, retval] */ BSTR *pstrCRL) { HRESULT hr; WCHAR const *pwszAuthority; CERTTRANSBLOB ctbCRL; ctbCRL.pb = NULL; if (NULL == pstrCRL) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); ctbCRL.cb = 0; __try { hr = m_pICertAdminD->GetCRL(pwszAuthority, &ctbCRL); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "GetCRL"); myRegisterMemAlloc(ctbCRL.pb, ctbCRL.cb, CSM_COTASKALLOC); CSASSERT(CR_OUT_BASE64HEADER == CRYPT_STRING_BASE64HEADER); if (CR_OUT_BASE64HEADER == Flags) { Flags = CRYPT_STRING_BASE64X509CRLHEADER; } hr = EncodeCertString(ctbCRL.pb, ctbCRL.cb, Flags, pstrCRL); _JumpIfError(hr, error, "EncodeCertString"); error: if (NULL != ctbCRL.pb) { CoTaskMemFree(ctbCRL.pb); } hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::GetCRL")); } //+-------------------------------------------------------------------------- // CCertAdmin::ImportCertificate -- Import a certificate into the database // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::ImportCertificate( /* [in] */ BSTR const strConfig, /* [in] */ BSTR const strCertificate, /* [in] */ LONG Flags, /* [out, retval] */ LONG *pRequestId) { HRESULT hr; WCHAR const *pwszAuthority; CERTTRANSBLOB ctbCert; ctbCert.pb = NULL; if (NULL == strCertificate) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = DecodeCertString( strCertificate, Flags & CR_IN_ENCODEMASK, &ctbCert.pb, &ctbCert.cb); _JumpIfError(hr, error, "DecodeCertString"); hr = _OpenConnection(strConfig, 1, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->ImportCertificate( pwszAuthority, &ctbCert, Flags, pRequestId); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError3( hr, error, "ImportCertificate", NTE_BAD_SIGNATURE, HRESULT_FROM_WIN32(ERROR_OBJECT_ALREADY_EXISTS)); error: if (NULL != ctbCert.pb) { LocalFree(ctbCert.pb); } hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::ImportCertificate")); } //+-------------------------------------------------------------------------- // CCertAdmin::GetArchivedKey -- Get archived, encrypted key in a PKCS7 // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::GetArchivedKey( /* [in] */ BSTR const strConfig, /* [in] */ LONG RequestId, /* [in] */ LONG Flags, /* [out, retval] */ BSTR *pstrArchivedKey) { HRESULT hr; WCHAR const *pwszAuthority; CERTTRANSBLOB ctbArchivedKey; ctbArchivedKey.pb = NULL; if (NULL == pstrArchivedKey) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 2, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); ctbArchivedKey.cb = 0; __try { hr = m_pICertAdminD->GetArchivedKey( pwszAuthority, RequestId, &ctbArchivedKey); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "GetArchivedKey"); myRegisterMemAlloc( ctbArchivedKey.pb, ctbArchivedKey.cb, CSM_COTASKALLOC); CSASSERT(CR_OUT_BASE64HEADER == CRYPT_STRING_BASE64HEADER); hr = EncodeCertString( ctbArchivedKey.pb, ctbArchivedKey.cb, Flags, pstrArchivedKey); _JumpIfError(hr, error, "EncodeCertString"); error: if (NULL != ctbArchivedKey.pb) { CoTaskMemFree(ctbArchivedKey.pb); } hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::GetArchivedKey")); } //+-------------------------------------------------------------------------- // CCertAdmin::GetConfigEntry -- get CA configuration entry // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::GetConfigEntry( /* [in] */ BSTR const strConfig, /* [in] */ BSTR const strNodePath, /* [in] */ BSTR const strEntryName, /* [out, retval] */ VARIANT *pvarEntry) { HRESULT hr; WCHAR const *pwszAuthority; if (NULL == strEntryName || NULL == pvarEntry) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 2, &pwszAuthority); __try { if(S_OK != hr) { hr = _GetConfigEntryFromRegistry( strConfig, strNodePath, strEntryName, pvarEntry); _LeaveIfError(hr, "_GetConfigEntryFromRegistry"); } else { hr = m_pICertAdminD->GetConfigEntry( pwszAuthority, strNodePath, strEntryName, pvarEntry); _LeaveIfError(hr, "GetConfigEntry"); myRegisterMemAlloc(pvarEntry, 0, CSM_VARIANT); } } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError2(hr, error, "GetConfigEntry", HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND)); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::GetConfigEntry")); } //+-------------------------------------------------------------------------- // CCertAdmin::SetConfigEntry -- set CA configuration entry // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::SetConfigEntry( /* [in] */ BSTR const strConfig, /* [in] */ BSTR const strNodePath, /* [in] */ BSTR const strEntryName, /* [in] */ VARIANT *pvarEntry) { HRESULT hr; WCHAR const *pwszAuthority; if (NULL == strEntryName || NULL == pvarEntry) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 2, &pwszAuthority); __try { if(S_OK != hr) { hr = _SetConfigEntryFromRegistry( strConfig, strNodePath, strEntryName, pvarEntry); } else { hr = m_pICertAdminD->SetConfigEntry( pwszAuthority, strNodePath, strEntryName, pvarEntry); } } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "SetConfigEntry"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::SetConfigEntry")); } //+-------------------------------------------------------------------------- // CCertAdmin::ImportKey -- Archive Private Key // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::ImportKey( /* [in] */ BSTR const strConfig, /* [in] */ LONG RequestId, /* [in] */ BSTR const strCertHash, /* [in] */ LONG Flags, /* [in] */ BSTR const strKey) { HRESULT hr; WCHAR const *pwszAuthority; CERTTRANSBLOB ctbKey; ctbKey.pb = NULL; if (NULL == strKey) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = DecodeCertString( strKey, Flags & CR_IN_ENCODEMASK, &ctbKey.pb, &ctbKey.cb); _JumpIfError(hr, error, "DecodeCertString"); hr = _OpenConnection(strConfig, 2, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->ImportKey( pwszAuthority, RequestId, strCertHash, Flags, &ctbKey); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError2( hr, error, "ImportKey", HRESULT_FROM_WIN32(ERROR_OBJECT_ALREADY_EXISTS)); error: if (NULL != ctbKey.pb) { LocalFree(ctbKey.pb); } hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::ImportKey")); } HRESULT CCertAdmin::_SetErrorInfo( IN HRESULT hrError, IN WCHAR const *pwszDescription) { CSASSERT(FAILED(hrError) || S_OK == hrError || S_FALSE == hrError); if (FAILED(hrError)) { HRESULT hr; hr = DispatchSetErrorInfo( hrError, pwszDescription, wszCLASS_CERTADMIN, &IID_ICertAdmin); CSASSERT(hr == hrError); } return(hrError); } //+-------------------------------------------------------------------------- // CCertAdmin::GetMyRoles -- Gets current user roles // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::GetMyRoles( /* [in] */ BSTR const strConfig, /* [out, retval] */ LONG *pRoles) { HRESULT hr; WCHAR const *pwszAuthority; if (NULL == strConfig || NULL == pRoles) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } hr = _OpenConnection(strConfig, 2, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->GetMyRoles( pwszAuthority, pRoles); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "GetMyRoles"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::GetMyRoles")); } //+-------------------------------------------------------------------------- // CCertAdmin::DeleteRow -- Delete row from database // // ... // // Returns S_OK on success. //+-------------------------------------------------------------------------- STDMETHODIMP CCertAdmin::DeleteRow( /* [in] */ BSTR const strConfig, /* [in] */ LONG Flags, // CDR_* /* [in] */ DATE Date, /* [in] */ LONG Table, // CVRC_TABLE_* /* [in] */ LONG RowId, /* [out, retval]*/ LONG *pcDeleted) { HRESULT hr; FILETIME ft; WCHAR const *pwszAuthority; if (NULL == strConfig) { hr = E_POINTER; _JumpError(hr, error, "NULL parm"); } // Date = 0.0 means pass ft = 0 to the DCOM interface if (Date == 0.0) { ZeroMemory(&ft, sizeof(FILETIME)); } else // translate date to ft { hr = myDateToFileTime(&Date, &ft); _JumpIfError(hr, error, "myDateToFileTime"); } hr = _OpenConnection(strConfig, 2, &pwszAuthority); _JumpIfError(hr, error, "_OpenConnection"); __try { hr = m_pICertAdminD->DeleteRow( pwszAuthority, Flags, ft, Table, RowId, pcDeleted); } __except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER) { } _JumpIfError(hr, error, "DeleteRow"); error: hr = myHError(hr); return(_SetErrorInfo(hr, L"CCertAdmin::DeleteRow")); } HRESULT CCertAdmin::_GetConfigEntryFromRegistry( IN BSTR const strConfig, IN BSTR const strNodePath, IN BSTR const strEntryName, IN OUT VARIANT *pvarEntry) { HRESULT hr; CertSrv::CConfigStorage stg; LPWSTR pwszMachine = NULL; LPWSTR pwszCAName = NULL; hr = mySplitConfigString( strConfig, &pwszMachine, &pwszCAName); _JumpIfErrorStr(hr, error, "mySplitConfigString", strConfig); hr = stg.InitMachine(pwszMachine); _JumpIfError(hr, error, "CConfigStorage::InitMachine"); hr = stg.GetEntry( pwszCAName, strNodePath, strEntryName, pvarEntry); _JumpIfError(hr, error, "CConfigStorage::GetEntry"); error: LOCAL_FREE(pwszMachine); LOCAL_FREE(pwszCAName); return hr; } HRESULT CCertAdmin::_SetConfigEntryFromRegistry( IN BSTR const strConfig, IN BSTR const strNodePath, IN BSTR const strEntryName, IN const VARIANT *pvarEntry) { HRESULT hr; CertSrv::CConfigStorage stg; LPWSTR pwszMachine = NULL; LPWSTR pwszCAName = NULL; hr = mySplitConfigString( strConfig, &pwszMachine, &pwszCAName); _JumpIfErrorStr(hr, error, "mySplitConfigString", strConfig); hr = stg.InitMachine(pwszMachine); _JumpIfError(hr, error, "CConfigStorage::InitMachine"); hr = stg.SetEntry( pwszCAName, strNodePath, strEntryName, const_cast(pvarEntry)); _JumpIfError(hr, error, "CConfigStorage::GetEntry"); error: LOCAL_FREE(pwszMachine); LOCAL_FREE(pwszCAName); return hr; } #undef __DIR__ #undef __dwFILE__ #define CCERTADMIN #include "csprop2.cpp"