//+------------------------------------------------------------------------- // // Microsoft Windows // // Copyright (C) Microsoft Corporation, 1998 - 1999 // // File: pfximpt.cpp // // Contents: PFX import dialog // // History: 06/98 xtan // //---------------------------------------------------------------------------- #include "pch.cpp" #pragma hdrstop #include "cscsp.h" #include "certmsg.h" #include "initcert.h" #include "setuput.h" #include "cspenum.h" #include "wizpage.h" #include "usecert.h" #define __dwFILE__ __dwFILE_OCMSETUP_PFXIMPT_CPP__ typedef struct _certpfximportinfo { HINSTANCE hInstance; BOOL fUnattended; WCHAR *pwszFileName; DWORD dwFileNameSize; WCHAR *pwszPassword; DWORD dwPasswordSize; } CERTPFXIMPORTINFO; HRESULT CertBrowsePFX(HINSTANCE hInstance, HWND hDlg) { HRESULT hr; WCHAR *pwszFileNameIn = NULL; WCHAR *pwszFileNameOut = NULL; HWND hCtrl = GetDlgItem(hDlg, IDC_PFX_FILENAME); hr = myUIGetWindowText(hCtrl, &pwszFileNameIn); _JumpIfError(hr, error, "myUIGetWindowText"); hr = myGetOpenFileName( hDlg, hInstance, IDS_IMPORT_PFX_TITLE, IDS_PFX_FILE_FILTER, 0, // no def ext OFN_PATHMUSTEXIST | OFN_HIDEREADONLY, pwszFileNameIn, &pwszFileNameOut); _JumpIfError(hr, error, "myGetOpenFileName"); if (NULL != pwszFileNameOut) { SetWindowText(hCtrl, pwszFileNameOut); } hr = S_OK; error: if (NULL != pwszFileNameOut) { LocalFree(pwszFileNameOut); } if (NULL != pwszFileNameIn) { LocalFree(pwszFileNameIn); } return hr; } HRESULT GetPFXInfo( HWND hDlg, CERTPFXIMPORTINFO* pCertPfxImportInfo) { HRESULT hr; GetWindowText(GetDlgItem(hDlg, IDC_PFX_FILENAME), pCertPfxImportInfo->pwszFileName, pCertPfxImportInfo->dwFileNameSize); if (0x0 == pCertPfxImportInfo->pwszFileName[0]) { // file can't empty hr = E_INVALIDARG; CertWarningMessageBox( pCertPfxImportInfo->hInstance, pCertPfxImportInfo->fUnattended, hDlg, IDS_ERR_EMPTYPFXFILE, 0, NULL); SetFocus(GetDlgItem(hDlg, IDC_PFX_FILENAME)); goto error; } GetWindowText(GetDlgItem(hDlg, IDC_PFX_PASSWORD), pCertPfxImportInfo->pwszPassword, pCertPfxImportInfo->dwPasswordSize); hr = S_OK; error: return hr; } INT_PTR CALLBACK CertPFXFilePasswordProc( HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam) { HRESULT hr; BOOL ret = FALSE; int id = IDCANCEL; static CERTPFXIMPORTINFO *pCertPfxImportInfo = NULL; switch (iMsg) { case WM_INITDIALOG: pCertPfxImportInfo = (CERTPFXIMPORTINFO*)lParam; ret = TRUE; break; case WM_COMMAND: switch (LOWORD(wParam)) { case IDC_PFX_FILENAME: break; case IDC_PFX_PASSWORD: break; case IDC_PFX_BROWSE: CertBrowsePFX(pCertPfxImportInfo->hInstance, hDlg); ret = TRUE; break; case IDOK: hr = GetPFXInfo(hDlg, pCertPfxImportInfo); if (S_OK != hr) { break; } id = IDOK; case IDCANCEL: ret = EndDialog(hDlg, id); break; } break; default: ret = FALSE; } return ret; } int CertGetPFXFileAndPassword( IN HWND hwnd, IN HINSTANCE hInstance, IN BOOL fUnattended, IN OUT WCHAR *pwszFileName, IN DWORD dwFileNameSize, IN OUT WCHAR *pwszPassword, IN DWORD dwPasswordSize) { CERTPFXIMPORTINFO CertPfxImportInfo = {hInstance, fUnattended, pwszFileName, dwFileNameSize, pwszPassword, dwPasswordSize}; return (int) DialogBoxParam(hInstance, MAKEINTRESOURCE(IDD_PFXIMPORT), hwnd, CertPFXFilePasswordProc, (LPARAM)&CertPfxImportInfo); } //-------------------------------------------------------------------- HRESULT ImportPFXAndUpdateCSPInfo( IN const HWND hDlg, IN OUT PER_COMPONENT_DATA *pComp) { HRESULT hr; int nDlgRet; BOOL bRetVal; WCHAR wszName[MAX_PATH]; WCHAR wszPassword[MAX_PATH]; CSP_INFO * pCSPInfo; DWORD dwCSPInfoSize; CASERVERSETUPINFO * pServer=pComp->CA.pServer; // variables that must be cleaned up CRYPT_KEY_PROV_INFO *pCertKeyProvInfo = NULL; CERT_CONTEXT const *pSavedLeafCert = NULL; wszName[0] = L'\0'; // get file name & password if(pComp->fUnattended) { CSASSERT(NULL!=pServer->pwszPFXFile); if(MAX_PATH<=wcslen(pServer->pwszPFXFile)|| NULL!=pServer->pwszPFXPassword && MAX_PATH<=wcslen(pServer->pwszPFXPassword)) { hr = ERROR_BAD_PATHNAME; CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_FILE_OR_PASSWORD_TOO_LONG, 0, NULL); _JumpError(hr, error, "PFX file name or password is too long"); } wcscpy(wszName, pServer->pwszPFXFile); wcscpy(wszPassword, pServer->pwszPFXPassword?pServer->pwszPFXPassword:L""); if (NULL == pServer->pCSPInfoList) { hr = GetCSPInfoList(&pServer->pCSPInfoList); _JumpIfError(hr, error, "GetCSPInfoList"); } } else{ nDlgRet = CertGetPFXFileAndPassword( hDlg, pComp->hInstance, pComp->fUnattended, wszName, sizeof(wszName)/sizeof(WCHAR), wszPassword, sizeof(wszPassword)/sizeof(WCHAR)); if (IDOK != nDlgRet) { // cancel hr=HRESULT_FROM_WIN32(ERROR_CANCELLED); _JumpError(hr, error, "CertGetPFXFileAndPassword canceled"); } } // import pkcs12 hr=myCertServerImportPFX( wszName, wszPassword, FALSE, NULL, NULL, &pSavedLeafCert); if (S_OK != hr) { if (HRESULT_FROM_WIN32(ERROR_INVALID_PASSWORD)==hr) { // tell the user that their password was invalid CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_INVALID_PASSWORD, 0, NULL); _JumpError(hr, error, "myCertServerImportPFX"); } else if (HRESULT_FROM_WIN32(ERROR_FILE_EXISTS) == hr) { if(pComp->fUnattended) { nDlgRet=IDYES; } else { // confirm from user that they want to overwrite // the existing key and cert nDlgRet=CertMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_KEYANDCERTEXIST, 0, MB_YESNO | MB_ICONWARNING | CMB_NOERRFROMSYS, NULL); } if (IDYES==nDlgRet) { hr=myCertServerImportPFX( wszName, wszPassword, TRUE, NULL, NULL, &pSavedLeafCert); _JumpIfError(hr, errorMsg, "myCertServerImportPFX"); } else { // cancel hr=HRESULT_FROM_WIN32(ERROR_CANCELLED); _JumpError(hr, error, "myCertServerImportPFX canceled"); } } else if (HRESULT_FROM_WIN32(ERROR_PATH_NOT_FOUND) == hr) { CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_PATH_INVALID, 0, wszName); _JumpError(hr, error, "myCertServerImportPFX"); } else if (HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND) == hr) { CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_FILE_NOT_FOUND, 0, wszName); _JumpError(hr, error, "myCertServerImportPFX"); } else if (HRESULT_FROM_WIN32(CRYPT_E_SELF_SIGNED) == hr) { // this cert is not appropriate for this CA type (no CA certs found at all) CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_WRONG_SELFSIGN_TYPE, S_OK, // don't show an error number NULL); _JumpError(hr, error, "This cert is not appropriate for this CA type"); } else { // import failed for some other reason _JumpError(hr, errorMsg, "myCertServerImportPFX"); } } // PFX import was successful. The cert is in the machine's MY store. CSASSERT(NULL!=pSavedLeafCert); // The following things have been verified by myCertServerImportPFX // * The cert has an AT_SIGNATURE key // * The key in the store matches the one on the cer // * The cert is not expired // // We still need to check: // * self-signed or not // * verify chain // Note: IT IS VERY IMPORTANT that pfx import maintains all the // invariants about CSP, key container, hash, cert validity, etc. // that the rest of the UI maintains. // get key prov info from cert bRetVal=myCertGetCertificateContextProperty( pSavedLeafCert, CERT_KEY_PROV_INFO_PROP_ID, CERTLIB_USE_LOCALALLOC, (void **)&pCertKeyProvInfo, &dwCSPInfoSize); if (FALSE==bRetVal) { hr=myHLastError(); _JumpError(hr, errorMsg, "myCertGetCertificateContextProperty"); } // find our description of the CSP pCSPInfo=findCSPInfoFromList(pServer->pCSPInfoList, pCertKeyProvInfo->pwszProvName, pCertKeyProvInfo->dwProvType); CSASSERT(NULL!=pCSPInfo); if (pCSPInfo == NULL) // we don't have this CSP enumerated in our UI { hr = CRYPT_E_NOT_FOUND; _JumpError(hr, errorMsg, "pCSPInfo NULL"); } // // Looks like this key is good. Use it. // // Stop using the previous cert and key // delete previously created key container, if necessary. ClearKeyContainerName(pServer); // update the CSP // note: CSP, key container, and hash must all be consistent! pServer->pCSPInfo=pCSPInfo; hr = DetermineDefaultHash(pServer); _JumpIfError(hr, error, "DetermineDefaultHash"); // save the name of the key container hr=SetKeyContainerName(pServer, pCertKeyProvInfo->pwszContainerName); _JumpIfError(hr, error, "SetKeyContainerName"); // See if we can use the cert // verify to make sure no cert in chain is revoked, but don't kill yourself if offline hr=myVerifyCertContext( pSavedLeafCert, CA_VERIFY_FLAGS_IGNORE_OFFLINE, 0, NULL, HCCE_LOCAL_MACHINE, NULL, NULL); _JumpIfError(hr, errorMsg, "myVerifyCertContext"); // See if this cert appropriately is self-signed or not. // A root CA cert must be self-signed, while // a subordinate CA cert must not be self-signed. hr=IsCertSelfSignedForCAType(pServer, pSavedLeafCert, &bRetVal); _JumpIfError(hr, errorMsg, "IsCertSelfSignedForCAType"); if (FALSE==bRetVal) { // this cert is not appropriate for this CA type CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_PFX_WRONG_SELFSIGN_TYPE, S_OK, // don't show an error number NULL); hr=CRYPT_E_SELF_SIGNED; _JumpError(hr, error, "This cert is not appropriate for this CA type"); } // // Looks like this cert is good. Use it. // // save the cert and update the hash algorithm hr=SetExistingCertToUse(pServer, pSavedLeafCert); _JumpIfError(hr, error, "SetExistingCertToUse"); pSavedLeafCert=NULL; hr=S_OK; errorMsg: if (FAILED(hr)) { // an error occurred while trying to import the PFX file CertWarningMessageBox( pComp->hInstance, pComp->fUnattended, hDlg, IDS_ERR_IMPORTPFX, hr, NULL); } error: SecureZeroMemory(wszPassword, wcslen(wszPassword)*sizeof(WCHAR)); CSILOG( hr, IDS_LOG_IMPORTPFX, L'\0' == wszName[0]? NULL : wszName, NULL, NULL); if (NULL != pSavedLeafCert) { CertFreeCertificateContext(pSavedLeafCert); } if (NULL != pCertKeyProvInfo) { LocalFree(pCertKeyProvInfo); } return hr; }