You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1450 lines
39 KiB
1450 lines
39 KiB
//+---------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 1992 - 1995.
|
|
//
|
|
// File: cert.c
|
|
//
|
|
// Contents:
|
|
//
|
|
// Classes:
|
|
//
|
|
// Functions:
|
|
//
|
|
// History: 09-23-97 jbanes LSA integration stuff.
|
|
// 01-05-98 jbanes Use WinVerifyTrust to validate certs.
|
|
// 03-26-99 jbanes Fix CTL support, bug #303246
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
|
|
#include <stdlib.h>
|
|
#include <spbase.h>
|
|
#include <ssl2msg.h>
|
|
#include <ssl3msg.h>
|
|
#include <wincrypt.h>
|
|
#include <oidenc.h>
|
|
#include <softpub.h>
|
|
|
|
#define CERT_HEADER_CONST "certificate"
|
|
#define CERT_HEADER_LENGTH 11
|
|
#define CERT_HEADER_OFFSET 6
|
|
|
|
SP_STATUS
|
|
SchGetTrustedRoots(
|
|
HCERTSTORE *phClientRootStore);
|
|
|
|
BOOL
|
|
WINAPI
|
|
SchCreateWorldStore (
|
|
IN HCERTSTORE hRoot,
|
|
IN DWORD cAdditionalStore,
|
|
IN HCERTSTORE* rghAdditionalStore,
|
|
OUT HCERTSTORE* phWorld);
|
|
|
|
BOOL
|
|
IsCertSelfSigned(PCCERT_CONTEXT pCertContext);
|
|
|
|
|
|
// typedef struct _OIDPROVMAP
|
|
// {
|
|
// LPSTR szOid;
|
|
// DWORD dwExchSpec;
|
|
// DWORD dwCertType; // used for SSL 3.0 client auth
|
|
// } OIDPROVMAP, *POIDPROVMAP;
|
|
|
|
OIDPROVMAP g_CertTypes[] =
|
|
{
|
|
{ szOID_RSA_RSA, SP_EXCH_RSA_PKCS1, SSL3_CERTTYPE_RSA_SIGN},
|
|
{ szOID_RSA_MD2RSA, SP_EXCH_RSA_PKCS1, SSL3_CERTTYPE_RSA_SIGN},
|
|
{ szOID_RSA_MD4RSA, SP_EXCH_RSA_PKCS1, SSL3_CERTTYPE_RSA_SIGN},
|
|
{ szOID_RSA_MD5RSA, SP_EXCH_RSA_PKCS1, SSL3_CERTTYPE_RSA_SIGN},
|
|
{ szOID_RSA_SHA1RSA, SP_EXCH_RSA_PKCS1, SSL3_CERTTYPE_RSA_SIGN},
|
|
{ szOID_OIWSEC_dsa, SP_EXCH_DH_PKCS3, SSL3_CERTTYPE_DSS_SIGN},
|
|
{ szOID_X957_DSA, SP_EXCH_DH_PKCS3, SSL3_CERTTYPE_DSS_SIGN},
|
|
};
|
|
|
|
DWORD g_cCertTypes = sizeof(g_CertTypes)/sizeof(OIDPROVMAP);
|
|
|
|
|
|
DWORD
|
|
MapOidToKeyExch(LPSTR szOid)
|
|
{
|
|
DWORD i;
|
|
|
|
for(i = 0; i < g_cCertTypes; i++)
|
|
{
|
|
if(strcmp(szOid, g_CertTypes[i].szOid) == 0)
|
|
{
|
|
return g_CertTypes[i].dwExchSpec;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
DWORD
|
|
MapOidToCertType(LPSTR szOid)
|
|
{
|
|
DWORD i;
|
|
|
|
for(i = 0; i < g_cCertTypes; i++)
|
|
{
|
|
if(strcmp(szOid, g_CertTypes[i].szOid) == 0)
|
|
{
|
|
return g_CertTypes[i].dwCertType;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
// SPLoadCertificate takes a string of encoded cert bytes
|
|
// and decodes them into the local certificate cache. It
|
|
// then returns the first certificate of the group.
|
|
|
|
SP_STATUS
|
|
SPLoadCertificate(
|
|
DWORD fProtocol,
|
|
DWORD dwCertEncodingType,
|
|
PUCHAR pCertificate,
|
|
DWORD cbCertificate,
|
|
PCCERT_CONTEXT *ppCertContext)
|
|
{
|
|
HCERTSTORE hCertStore = NULL;
|
|
PCCERT_CONTEXT pCertContext = NULL;
|
|
|
|
PBYTE pbCurrentRaw;
|
|
DWORD cbCurrentRaw;
|
|
BOOL fLeafCert;
|
|
SP_STATUS pctRet;
|
|
|
|
|
|
//
|
|
// Dereference the cert that we are replacing.
|
|
//
|
|
|
|
if(ppCertContext == NULL)
|
|
{
|
|
return SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR);
|
|
}
|
|
|
|
if(*ppCertContext != NULL)
|
|
{
|
|
CertFreeCertificateContext(*ppCertContext);
|
|
}
|
|
*ppCertContext = NULL;
|
|
|
|
|
|
//
|
|
// Create an in-memory certificate store.
|
|
//
|
|
|
|
hCertStore = CertOpenStore(CERT_STORE_PROV_MEMORY,
|
|
0, 0,
|
|
CERT_STORE_DEFER_CLOSE_UNTIL_LAST_FREE_FLAG,
|
|
0);
|
|
if(hCertStore == NULL)
|
|
{
|
|
SP_LOG_RESULT(GetLastError());
|
|
return SEC_E_INSUFFICIENT_MEMORY;
|
|
}
|
|
|
|
fLeafCert = TRUE;
|
|
pbCurrentRaw = pCertificate;
|
|
cbCurrentRaw = cbCertificate;
|
|
|
|
do
|
|
{
|
|
|
|
//
|
|
// Skip to beginning of certificate.
|
|
//
|
|
|
|
if((fProtocol & SP_PROT_SSL3TLS1) && cbCurrentRaw > 3)
|
|
{
|
|
// SSL3 style cert chain, where the length
|
|
// of each cert is prepended.
|
|
pbCurrentRaw += 3;
|
|
cbCurrentRaw -= 3;
|
|
}
|
|
|
|
// Skip past the "certificate" header
|
|
if((cbCurrentRaw > (CERT_HEADER_OFFSET + CERT_HEADER_LENGTH)) &&
|
|
(memcmp(pbCurrentRaw + CERT_HEADER_OFFSET, CERT_HEADER_CONST, CERT_HEADER_LENGTH) == 0))
|
|
{
|
|
pbCurrentRaw += CERT_HEADER_OFFSET + CERT_HEADER_LENGTH;
|
|
cbCurrentRaw -= CERT_HEADER_OFFSET + CERT_HEADER_LENGTH;
|
|
}
|
|
|
|
|
|
//
|
|
// Decode this certificate context.
|
|
//
|
|
|
|
if(!CertAddEncodedCertificateToStore(hCertStore,
|
|
dwCertEncodingType,
|
|
pbCurrentRaw,
|
|
cbCurrentRaw,
|
|
CERT_STORE_ADD_USE_EXISTING,
|
|
&pCertContext))
|
|
{
|
|
SP_LOG_RESULT(GetLastError());
|
|
pctRet = PCT_ERR_BAD_CERTIFICATE;
|
|
goto cleanup;
|
|
}
|
|
|
|
pbCurrentRaw += pCertContext->cbCertEncoded;
|
|
if(cbCurrentRaw < pCertContext->cbCertEncoded)
|
|
{
|
|
pctRet = SP_LOG_RESULT(PCT_ERR_BAD_CERTIFICATE);
|
|
goto cleanup;
|
|
}
|
|
cbCurrentRaw -= pCertContext->cbCertEncoded;
|
|
|
|
if(fLeafCert)
|
|
{
|
|
fLeafCert = FALSE;
|
|
*ppCertContext = pCertContext;
|
|
}
|
|
else
|
|
{
|
|
CertFreeCertificateContext(pCertContext);
|
|
}
|
|
pCertContext = NULL;
|
|
|
|
} while(cbCurrentRaw);
|
|
|
|
pctRet = PCT_ERR_OK;
|
|
|
|
|
|
cleanup:
|
|
|
|
CertCloseStore(hCertStore, 0);
|
|
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
if(pCertContext)
|
|
{
|
|
CertFreeCertificateContext(pCertContext);
|
|
}
|
|
if(*ppCertContext)
|
|
{
|
|
CertFreeCertificateContext(*ppCertContext);
|
|
*ppCertContext = NULL;
|
|
}
|
|
}
|
|
|
|
return pctRet;
|
|
}
|
|
|
|
|
|
SP_STATUS
|
|
SPPublicKeyFromCert(
|
|
PCCERT_CONTEXT pCert,
|
|
PUBLICKEY ** ppKey,
|
|
ExchSpec * pdwExchSpec)
|
|
{
|
|
PCERT_PUBLIC_KEY_INFO pPubKeyInfo;
|
|
PUBLICKEY * pPublicKey;
|
|
DWORD dwExchSpec;
|
|
DWORD cbBlob;
|
|
SP_STATUS pctRet;
|
|
|
|
//
|
|
// Log the subject and issuer names.
|
|
//
|
|
|
|
LogDistinguishedName(DEB_TRACE,
|
|
"Subject: %s\n",
|
|
pCert->pCertInfo->Subject.pbData,
|
|
pCert->pCertInfo->Subject.cbData);
|
|
|
|
LogDistinguishedName(DEB_TRACE,
|
|
"Issuer: %s\n",
|
|
pCert->pCertInfo->Issuer.pbData,
|
|
pCert->pCertInfo->Issuer.cbData);
|
|
|
|
//
|
|
// Determine type of public key embedded in the certificate.
|
|
//
|
|
|
|
pPubKeyInfo = &pCert->pCertInfo->SubjectPublicKeyInfo;
|
|
if(pPubKeyInfo == NULL)
|
|
{
|
|
return SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR);
|
|
}
|
|
|
|
dwExchSpec = MapOidToKeyExch(pPubKeyInfo->Algorithm.pszObjId);
|
|
|
|
if(dwExchSpec == 0)
|
|
{
|
|
return PCT_INT_UNKNOWN_CREDENTIAL;
|
|
}
|
|
|
|
//
|
|
// Build public key blob from encoded public key.
|
|
//
|
|
|
|
switch(dwExchSpec)
|
|
{
|
|
case SP_EXCH_RSA_PKCS1:
|
|
pctRet = RsaPublicKeyFromCert(pPubKeyInfo,
|
|
NULL,
|
|
&cbBlob);
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
return pctRet;
|
|
}
|
|
|
|
pPublicKey = SPExternalAlloc(sizeof(PUBLICKEY) + cbBlob);
|
|
if(pPublicKey == NULL)
|
|
{
|
|
return SP_LOG_RESULT(SEC_E_INSUFFICIENT_MEMORY);
|
|
}
|
|
|
|
pPublicKey->pPublic = (BLOBHEADER *)(pPublicKey + 1);
|
|
pPublicKey->cbPublic = cbBlob;
|
|
|
|
pctRet = RsaPublicKeyFromCert(pPubKeyInfo,
|
|
pPublicKey->pPublic,
|
|
&pPublicKey->cbPublic);
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
SPExternalFree(pPublicKey);
|
|
return pctRet;
|
|
}
|
|
break;
|
|
|
|
case SP_EXCH_DH_PKCS3:
|
|
pctRet = DssPublicKeyFromCert(pPubKeyInfo,
|
|
NULL,
|
|
&cbBlob);
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
return pctRet;
|
|
}
|
|
|
|
pPublicKey = SPExternalAlloc(sizeof(PUBLICKEY) + cbBlob);
|
|
if(pPublicKey == NULL)
|
|
{
|
|
return SP_LOG_RESULT(SEC_E_INSUFFICIENT_MEMORY);
|
|
}
|
|
|
|
pPublicKey->pPublic = (BLOBHEADER *)(pPublicKey + 1);
|
|
pPublicKey->cbPublic = cbBlob;
|
|
|
|
pctRet = DssPublicKeyFromCert(pPubKeyInfo,
|
|
pPublicKey->pPublic,
|
|
&pPublicKey->cbPublic);
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
SPExternalFree(pPublicKey);
|
|
return pctRet;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
return SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR);
|
|
}
|
|
|
|
|
|
//
|
|
// Set function outputs.
|
|
//
|
|
|
|
*ppKey = pPublicKey;
|
|
|
|
if(pdwExchSpec)
|
|
{
|
|
*pdwExchSpec = dwExchSpec;
|
|
}
|
|
|
|
return PCT_ERR_OK;
|
|
}
|
|
|
|
|
|
SP_STATUS
|
|
SPSerializeCertificate(
|
|
DWORD dwProtocol, // in
|
|
BOOL fBuildChain, // in
|
|
PBYTE * ppCertChain, // out
|
|
DWORD * pcbCertChain, // out
|
|
PCCERT_CONTEXT pCertContext, // in
|
|
DWORD dwChainingFlags) // in
|
|
{
|
|
PCCERT_CHAIN_CONTEXT pChainContext = NULL;
|
|
CERT_CHAIN_PARA ChainPara;
|
|
PCERT_SIMPLE_CHAIN pSimpleChain;
|
|
PCCERT_CONTEXT pCurrentCert;
|
|
|
|
BOOL fSuccess = FALSE;
|
|
PBYTE pbCertChain;
|
|
DWORD cbCertChain;
|
|
DWORD i;
|
|
SP_STATUS pctRet;
|
|
BOOL fImpersonating = FALSE;
|
|
|
|
SP_BEGIN("SPSerializeCertificate");
|
|
|
|
if(pcbCertChain == NULL)
|
|
{
|
|
SP_RETURN( SP_LOG_RESULT(PCT_INT_INTERNAL_ERROR));
|
|
}
|
|
|
|
if(fBuildChain)
|
|
{
|
|
ZeroMemory(&ChainPara, sizeof(ChainPara));
|
|
ChainPara.cbSize = sizeof(ChainPara);
|
|
|
|
fImpersonating = SslImpersonateClient();
|
|
|
|
if(!(fSuccess = CertGetCertificateChain(
|
|
NULL,
|
|
pCertContext,
|
|
NULL,
|
|
NULL,
|
|
&ChainPara,
|
|
dwChainingFlags,
|
|
NULL,
|
|
&pChainContext)))
|
|
{
|
|
DebugLog((DEB_WARN, "Error 0x%x returned by CertGetCertificateChain!\n", GetLastError()));
|
|
pChainContext = NULL;
|
|
}
|
|
|
|
if(fImpersonating)
|
|
{
|
|
RevertToSelf();
|
|
fImpersonating = FALSE;
|
|
}
|
|
}
|
|
|
|
if(!fSuccess)
|
|
{
|
|
//
|
|
// Send the leaf certificate only.
|
|
//
|
|
|
|
// Compute size of chain.
|
|
cbCertChain = pCertContext->cbCertEncoded;
|
|
if(dwProtocol & SP_PROT_SSL3TLS1)
|
|
{
|
|
cbCertChain += CB_SSL3_CERT_VECTOR;
|
|
}
|
|
|
|
// Allocate memory for chain.
|
|
if(ppCertChain == NULL)
|
|
{
|
|
*pcbCertChain = cbCertChain;
|
|
pctRet = PCT_ERR_OK;
|
|
goto cleanup;
|
|
}
|
|
else if(*ppCertChain == NULL)
|
|
{
|
|
*ppCertChain = SPExternalAlloc(cbCertChain);
|
|
if(*ppCertChain == NULL)
|
|
{
|
|
pctRet = SP_LOG_RESULT(SEC_E_INSUFFICIENT_MEMORY);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else if(*pcbCertChain < cbCertChain)
|
|
{
|
|
pctRet = SP_LOG_RESULT(PCT_INT_BUFF_TOO_SMALL);
|
|
goto cleanup;
|
|
}
|
|
*pcbCertChain = cbCertChain;
|
|
|
|
// Place chain in output buffer.
|
|
pbCertChain = *ppCertChain;
|
|
|
|
if(dwProtocol & SP_PROT_SSL3TLS1)
|
|
{
|
|
pbCertChain[0] = MS24BOF(pCertContext->cbCertEncoded);
|
|
pbCertChain[1] = MSBOF(pCertContext->cbCertEncoded);
|
|
pbCertChain[2] = LSBOF(pCertContext->cbCertEncoded);
|
|
pbCertChain += CB_SSL3_CERT_VECTOR;
|
|
}
|
|
CopyMemory(pbCertChain, pCertContext->pbCertEncoded, pCertContext->cbCertEncoded);
|
|
|
|
pctRet = PCT_ERR_OK;
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
//
|
|
// Compute size of chain.
|
|
//
|
|
|
|
pSimpleChain = pChainContext->rgpChain[0];
|
|
cbCertChain = 0;
|
|
|
|
for(i = 0; i < pSimpleChain->cElement; i++)
|
|
{
|
|
pCurrentCert = pSimpleChain->rgpElement[i]->pCertContext;
|
|
|
|
if(i > 0)
|
|
{
|
|
// Verify that this is not a root certificate.
|
|
if(CertCompareCertificateName(pCurrentCert->dwCertEncodingType,
|
|
&pCurrentCert->pCertInfo->Issuer,
|
|
&pCurrentCert->pCertInfo->Subject))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
|
|
cbCertChain += pCurrentCert->cbCertEncoded;
|
|
if(dwProtocol & SP_PROT_SSL3TLS1)
|
|
{
|
|
cbCertChain += CB_SSL3_CERT_VECTOR;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Allocate memory for chain.
|
|
//
|
|
|
|
if(ppCertChain == NULL)
|
|
{
|
|
*pcbCertChain = cbCertChain;
|
|
pctRet = PCT_ERR_OK;
|
|
goto cleanup;
|
|
}
|
|
else if(*ppCertChain == NULL)
|
|
{
|
|
*ppCertChain = SPExternalAlloc(cbCertChain);
|
|
if(*ppCertChain == NULL)
|
|
{
|
|
pctRet = SP_LOG_RESULT(SEC_E_INSUFFICIENT_MEMORY);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else if(*pcbCertChain < cbCertChain)
|
|
{
|
|
pctRet = SP_LOG_RESULT(PCT_INT_BUFF_TOO_SMALL);
|
|
goto cleanup;
|
|
}
|
|
*pcbCertChain = cbCertChain;
|
|
|
|
|
|
//
|
|
// Place chain in output buffer.
|
|
//
|
|
|
|
pbCertChain = *ppCertChain;
|
|
|
|
for(i = 0; i < pSimpleChain->cElement; i++)
|
|
{
|
|
pCurrentCert = pSimpleChain->rgpElement[i]->pCertContext;
|
|
|
|
if(i > 0)
|
|
{
|
|
// Verify that this is not a root certificate.
|
|
if(CertCompareCertificateName(pCurrentCert->dwCertEncodingType,
|
|
&pCurrentCert->pCertInfo->Issuer,
|
|
&pCurrentCert->pCertInfo->Subject))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
|
|
if(dwProtocol & SP_PROT_SSL3TLS1)
|
|
{
|
|
pbCertChain[0] = MS24BOF(pCurrentCert->cbCertEncoded);
|
|
pbCertChain[1] = MSBOF(pCurrentCert->cbCertEncoded);
|
|
pbCertChain[2] = LSBOF(pCurrentCert->cbCertEncoded);
|
|
pbCertChain += CB_SSL3_CERT_VECTOR;
|
|
}
|
|
CopyMemory(pbCertChain, pCurrentCert->pbCertEncoded, pCurrentCert->cbCertEncoded);
|
|
pbCertChain += pCurrentCert->cbCertEncoded;
|
|
}
|
|
|
|
SP_ASSERT(*ppCertChain + cbCertChain == pbCertChain);
|
|
|
|
pctRet = PCT_ERR_OK;
|
|
|
|
cleanup:
|
|
|
|
if(pChainContext)
|
|
{
|
|
CertFreeCertificateChain(pChainContext);
|
|
}
|
|
|
|
SP_RETURN(pctRet);
|
|
}
|
|
|
|
|
|
/*****************************************************************************/
|
|
SP_STATUS
|
|
ExtractIssuerNamesFromStore(
|
|
HCERTSTORE hStore, // in
|
|
PBYTE pbIssuers, // out
|
|
DWORD *pcbIssuers) // in, out
|
|
{
|
|
DWORD cbCurIssuerLen = 0;
|
|
DWORD cbIssuerLen = *pcbIssuers;
|
|
PBYTE pbCurIssuer = pbIssuers;
|
|
PCCERT_CONTEXT pCurrent = NULL;
|
|
SECURITY_STATUS scRet;
|
|
BOOL fIsAllowed;
|
|
|
|
// Initialize output to zero.
|
|
*pcbIssuers = 0;
|
|
|
|
while(TRUE)
|
|
{
|
|
pCurrent = CertEnumCertificatesInStore(hStore, pCurrent);
|
|
if(pCurrent == NULL) break;
|
|
|
|
// Is this a client-auth certificate?
|
|
scRet = SPCheckKeyUsage(pCurrent,
|
|
szOID_PKIX_KP_CLIENT_AUTH,
|
|
FALSE,
|
|
&fIsAllowed);
|
|
if(scRet != SEC_E_OK)
|
|
{
|
|
continue;
|
|
}
|
|
if(!fIsAllowed)
|
|
{
|
|
continue;
|
|
}
|
|
|
|
cbCurIssuerLen += 2 + pCurrent->pCertInfo->Subject.cbData;
|
|
|
|
// Are we writing?
|
|
if(pbIssuers)
|
|
{
|
|
if(cbCurIssuerLen > cbIssuerLen)
|
|
{
|
|
// Memory overrun
|
|
CertFreeCertificateContext(pCurrent);
|
|
return SP_LOG_RESULT(PCT_INT_DATA_OVERFLOW);
|
|
}
|
|
|
|
pbCurIssuer[0] = MSBOF(pCurrent->pCertInfo->Subject.cbData);
|
|
pbCurIssuer[1] = LSBOF(pCurrent->pCertInfo->Subject.cbData);
|
|
pbCurIssuer += 2;
|
|
|
|
CopyMemory(pbCurIssuer, pCurrent->pCertInfo->Subject.pbData,
|
|
pCurrent->pCertInfo->Subject.cbData);
|
|
pbCurIssuer += pCurrent->pCertInfo->Subject.cbData;
|
|
}
|
|
}
|
|
|
|
*pcbIssuers = cbCurIssuerLen;
|
|
|
|
return PCT_ERR_OK;
|
|
}
|
|
|
|
|
|
/*****************************************************************************/
|
|
SP_STATUS
|
|
GetDefaultIssuers(
|
|
PBYTE pbIssuers, // out
|
|
DWORD *pcbIssuers) // in, out
|
|
{
|
|
HCERTSTORE hStore;
|
|
SP_STATUS pctRet;
|
|
|
|
pctRet = SchGetTrustedRoots(&hStore);
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
return pctRet;
|
|
}
|
|
|
|
pctRet = ExtractIssuerNamesFromStore(hStore, pbIssuers, pcbIssuers);
|
|
if(pctRet != PCT_ERR_OK)
|
|
{
|
|
CertCloseStore(hStore, 0);
|
|
return pctRet;
|
|
}
|
|
|
|
CertCloseStore(hStore, 0);
|
|
return PCT_ERR_OK;
|
|
}
|
|
|
|
|
|
SP_STATUS
|
|
SchGetTrustedRoots(
|
|
HCERTSTORE *phClientRootStore)
|
|
{
|
|
HTTPSPolicyCallbackData polHttps;
|
|
CERT_CHAIN_POLICY_PARA PolicyPara;
|
|
CERT_CHAIN_POLICY_STATUS PolicyStatus;
|
|
CERT_CHAIN_PARA ChainPara;
|
|
PCCERT_CHAIN_CONTEXT pChainContext = NULL;
|
|
LPSTR pszUsage;
|
|
|
|
PCCERT_CONTEXT pCertContext;
|
|
HCERTSTORE hClientRootStore = 0;
|
|
HCERTSTORE hRootStore = 0;
|
|
HCERTSTORE hWorldStore = 0;
|
|
SP_STATUS Status = SEC_E_OK;
|
|
BOOL fImpersonating = FALSE;
|
|
|
|
|
|
|
|
// Open output store.
|
|
hClientRootStore = CertOpenStore(CERT_STORE_PROV_MEMORY,
|
|
0, 0,
|
|
CERT_STORE_DEFER_CLOSE_UNTIL_LAST_FREE_FLAG,
|
|
0);
|
|
if(hClientRootStore == NULL)
|
|
{
|
|
//SP_LOG_RESULT(GetLastError());
|
|
Status = SEC_E_INSUFFICIENT_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
fImpersonating = SslImpersonateClient();
|
|
|
|
// Open root store.
|
|
hRootStore = CertOpenSystemStore(0, "ROOT");
|
|
if(hRootStore == NULL)
|
|
{
|
|
DebugLog((DEB_WARN, "Error 0x%x opening root store\n", GetLastError()));
|
|
}
|
|
|
|
// Create world store.
|
|
if(!SchCreateWorldStore(hRootStore,
|
|
0, NULL,
|
|
&hWorldStore))
|
|
{
|
|
DebugLog((DEB_ERROR, "Error 0x%x creating world store\n", GetLastError()));
|
|
goto cleanup;
|
|
}
|
|
|
|
// Enumerate the certificates in the world store, looking
|
|
// for trusted roots. This approach will automatically take
|
|
// advantage of any CTLs that are installed on the system.
|
|
pCertContext = NULL;
|
|
while(TRUE)
|
|
{
|
|
pCertContext = CertEnumCertificatesInStore(hWorldStore, pCertContext);
|
|
if(pCertContext == NULL) break;
|
|
|
|
if(!IsCertSelfSigned(pCertContext))
|
|
{
|
|
continue;
|
|
}
|
|
|
|
pszUsage = szOID_PKIX_KP_CLIENT_AUTH;
|
|
|
|
ZeroMemory(&ChainPara, sizeof(ChainPara));
|
|
ChainPara.cbSize = sizeof(ChainPara);
|
|
ChainPara.RequestedUsage.dwType = USAGE_MATCH_TYPE_OR;
|
|
ChainPara.RequestedUsage.Usage.cUsageIdentifier = 1;
|
|
ChainPara.RequestedUsage.Usage.rgpszUsageIdentifier = &pszUsage;
|
|
|
|
if(!CertGetCertificateChain(
|
|
NULL,
|
|
pCertContext,
|
|
NULL,
|
|
0,
|
|
&ChainPara,
|
|
0,
|
|
NULL,
|
|
&pChainContext))
|
|
{
|
|
SP_LOG_RESULT(GetLastError());
|
|
continue;
|
|
}
|
|
|
|
// Set up validate chain structures.
|
|
ZeroMemory(&polHttps, sizeof(HTTPSPolicyCallbackData));
|
|
polHttps.cbStruct = sizeof(HTTPSPolicyCallbackData);
|
|
polHttps.dwAuthType = AUTHTYPE_CLIENT;
|
|
polHttps.fdwChecks = 0;
|
|
polHttps.pwszServerName = NULL;
|
|
|
|
ZeroMemory(&PolicyStatus, sizeof(PolicyStatus));
|
|
PolicyStatus.cbSize = sizeof(PolicyStatus);
|
|
|
|
ZeroMemory(&PolicyPara, sizeof(PolicyPara));
|
|
PolicyPara.cbSize = sizeof(PolicyPara);
|
|
PolicyPara.pvExtraPolicyPara= &polHttps;
|
|
PolicyPara.dwFlags = CERT_CHAIN_POLICY_IGNORE_ALL_NOT_TIME_VALID_FLAGS;
|
|
|
|
// Validate chain
|
|
if(!CertVerifyCertificateChainPolicy(
|
|
CERT_CHAIN_POLICY_SSL,
|
|
pChainContext,
|
|
&PolicyPara,
|
|
&PolicyStatus))
|
|
{
|
|
SP_LOG_RESULT(GetLastError());
|
|
CertFreeCertificateChain(pChainContext);
|
|
continue;
|
|
}
|
|
|
|
if(PolicyStatus.dwError)
|
|
{
|
|
// Certificate did not validate, move on to the next one.
|
|
CertFreeCertificateChain(pChainContext);
|
|
continue;
|
|
}
|
|
|
|
CertFreeCertificateChain(pChainContext);
|
|
|
|
// Add the root certificate to the list of trusted ones.
|
|
if(!CertAddCertificateContextToStore(hClientRootStore,
|
|
pCertContext,
|
|
CERT_STORE_ADD_USE_EXISTING,
|
|
NULL))
|
|
{
|
|
SP_LOG_RESULT(GetLastError());
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
|
|
if(hRootStore)
|
|
{
|
|
CertCloseStore(hRootStore, 0);
|
|
}
|
|
|
|
if(hWorldStore)
|
|
{
|
|
CertCloseStore(hWorldStore, 0);
|
|
}
|
|
|
|
if(fImpersonating)
|
|
{
|
|
RevertToSelf();
|
|
}
|
|
|
|
if(Status == SEC_E_OK)
|
|
{
|
|
*phClientRootStore = hClientRootStore;
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
//+---------------------------------------------------------------------------
|
|
//
|
|
// Function: ChainCreateCollectionIncludingCtlCertificates
|
|
//
|
|
// Synopsis: create a collection which includes the source store hStore and
|
|
// any CTL certificates from it
|
|
//
|
|
//----------------------------------------------------------------------------
|
|
BOOL WINAPI
|
|
ChainCreateCollectionIncludingCtlCertificates (
|
|
IN HCERTSTORE hStore,
|
|
OUT HCERTSTORE* phCollection
|
|
)
|
|
{
|
|
BOOL fResult = FALSE;
|
|
HCERTSTORE hCollection;
|
|
PCCTL_CONTEXT pCtlContext = NULL;
|
|
HCERTSTORE hCtlStore;
|
|
|
|
hCollection = CertOpenStore(
|
|
CERT_STORE_PROV_COLLECTION,
|
|
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
|
|
0,
|
|
CERT_STORE_DEFER_CLOSE_UNTIL_LAST_FREE_FLAG,
|
|
NULL
|
|
);
|
|
|
|
if ( hCollection == NULL )
|
|
{
|
|
return( FALSE );
|
|
}
|
|
|
|
fResult = CertAddStoreToCollection( hCollection, hStore, 0, 0 );
|
|
|
|
while ( ( fResult == TRUE ) &&
|
|
( ( pCtlContext = CertEnumCTLsInStore(
|
|
hStore,
|
|
pCtlContext
|
|
) ) != NULL ) )
|
|
{
|
|
hCtlStore = CertOpenStore(
|
|
CERT_STORE_PROV_MSG,
|
|
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
|
|
0,
|
|
0,
|
|
pCtlContext->hCryptMsg
|
|
);
|
|
|
|
if ( hCtlStore != NULL )
|
|
{
|
|
fResult = CertAddStoreToCollection(
|
|
hCollection,
|
|
hCtlStore,
|
|
0,
|
|
0
|
|
);
|
|
|
|
CertCloseStore( hCtlStore, 0 );
|
|
}
|
|
}
|
|
|
|
if ( fResult == TRUE )
|
|
{
|
|
*phCollection = hCollection;
|
|
}
|
|
else
|
|
{
|
|
CertCloseStore( hCollection, 0 );
|
|
}
|
|
|
|
return( fResult );
|
|
}
|
|
|
|
|
|
BOOL
|
|
WINAPI
|
|
SchCreateWorldStore (
|
|
IN HCERTSTORE hRoot,
|
|
IN DWORD cAdditionalStore,
|
|
IN HCERTSTORE* rghAdditionalStore,
|
|
OUT HCERTSTORE* phWorld)
|
|
{
|
|
BOOL fResult;
|
|
HCERTSTORE hWorld;
|
|
HCERTSTORE hStore, hCtl;
|
|
DWORD cCount;
|
|
|
|
hWorld = CertOpenStore(
|
|
CERT_STORE_PROV_COLLECTION,
|
|
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
|
|
0,
|
|
CERT_STORE_DEFER_CLOSE_UNTIL_LAST_FREE_FLAG,
|
|
NULL
|
|
);
|
|
|
|
if ( hWorld == NULL )
|
|
{
|
|
return( FALSE );
|
|
}
|
|
|
|
fResult = CertAddStoreToCollection( hWorld, hRoot, 0, 0 );
|
|
|
|
for ( cCount = 0;
|
|
( cCount < cAdditionalStore ) && ( fResult == TRUE );
|
|
cCount++ )
|
|
{
|
|
fResult = CertAddStoreToCollection(
|
|
hWorld,
|
|
rghAdditionalStore[ cCount ],
|
|
0,
|
|
0
|
|
);
|
|
}
|
|
|
|
if ( fResult == TRUE )
|
|
{
|
|
hStore = CertOpenSystemStore(0, "trust");
|
|
if( hStore != NULL )
|
|
{
|
|
if(ChainCreateCollectionIncludingCtlCertificates(hStore, &hCtl))
|
|
{
|
|
if(!CertAddStoreToCollection( hWorld, hCtl, 0, 0 ))
|
|
{
|
|
DebugLog((DEB_WARN, "Error 0x%x adding CTL collection\n", GetLastError()));
|
|
}
|
|
CertCloseStore( hCtl, 0 );
|
|
}
|
|
else
|
|
{
|
|
DebugLog((DEB_WARN, "Error 0x%x creating CTL collection\n", GetLastError()));
|
|
}
|
|
CertCloseStore( hStore, 0 );
|
|
}
|
|
}
|
|
|
|
if ( fResult == TRUE )
|
|
{
|
|
hStore = CertOpenSystemStore(0, "ca");
|
|
if ( hStore != NULL )
|
|
{
|
|
fResult = CertAddStoreToCollection( hWorld, hStore, 0, 0 );
|
|
CertCloseStore( hStore, 0 );
|
|
}
|
|
else
|
|
{
|
|
fResult = FALSE;
|
|
}
|
|
}
|
|
|
|
if ( fResult == TRUE )
|
|
{
|
|
hStore = CertOpenSystemStore(0, "my");
|
|
if ( hStore != NULL )
|
|
{
|
|
fResult = CertAddStoreToCollection( hWorld, hStore, 0, 0 );
|
|
CertCloseStore( hStore, 0 );
|
|
}
|
|
else
|
|
{
|
|
fResult = FALSE;
|
|
}
|
|
}
|
|
|
|
if ( fResult == TRUE )
|
|
{
|
|
*phWorld = hWorld;
|
|
}
|
|
else
|
|
{
|
|
CertCloseStore( hWorld, 0 );
|
|
}
|
|
|
|
return( fResult );
|
|
}
|
|
|
|
|
|
BOOL
|
|
IsCertSelfSigned(PCCERT_CONTEXT pCertContext)
|
|
{
|
|
// Compare subject and issuer names.
|
|
if(pCertContext->pCertInfo->Subject.cbData == pCertContext->pCertInfo->Issuer.cbData)
|
|
{
|
|
if(memcmp(pCertContext->pCertInfo->Subject.pbData,
|
|
pCertContext->pCertInfo->Issuer.pbData,
|
|
pCertContext->pCertInfo->Issuer.cbData) == 0)
|
|
{
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
SECURITY_STATUS
|
|
MapWinTrustError(
|
|
SECURITY_STATUS Status,
|
|
SECURITY_STATUS DefaultError,
|
|
DWORD dwIgnoreErrors)
|
|
{
|
|
if((Status == CRYPT_E_NO_REVOCATION_CHECK) &&
|
|
(dwIgnoreErrors & CRED_FLAG_IGNORE_NO_REVOCATION_CHECK))
|
|
{
|
|
DebugLog((DEB_WARN, "MapWinTrustError: Ignoring CRYPT_E_NO_REVOCATION_CHECK\n"));
|
|
Status = STATUS_SUCCESS;
|
|
}
|
|
if((Status == CRYPT_E_REVOCATION_OFFLINE) &&
|
|
(dwIgnoreErrors & CRED_FLAG_IGNORE_REVOCATION_OFFLINE))
|
|
{
|
|
DebugLog((DEB_WARN, "MapWinTrustError: Ignoring CRYPT_E_REVOCATION_OFFLINE\n"));
|
|
Status = STATUS_SUCCESS;
|
|
}
|
|
|
|
if(HRESULT_FACILITY(Status) == FACILITY_SECURITY)
|
|
{
|
|
return (Status);
|
|
}
|
|
|
|
switch(Status)
|
|
{
|
|
case ERROR_SUCCESS:
|
|
return SEC_E_OK;
|
|
|
|
// Expired certificate.
|
|
case CERT_E_EXPIRED:
|
|
case CERT_E_VALIDITYPERIODNESTING:
|
|
return SEC_E_CERT_EXPIRED;
|
|
|
|
// Unknown CA
|
|
case CERT_E_UNTRUSTEDROOT:
|
|
case CERT_E_UNTRUSTEDCA:
|
|
return SEC_E_UNTRUSTED_ROOT;
|
|
|
|
// Certificate revoked.
|
|
case CERT_E_REVOKED:
|
|
return CRYPT_E_REVOKED;
|
|
|
|
// Target name doesn't match name in certificate.
|
|
case CERT_E_CN_NO_MATCH:
|
|
return SEC_E_WRONG_PRINCIPAL;
|
|
|
|
// Certificate contains wrong EKU.
|
|
case CERT_E_WRONG_USAGE:
|
|
return SEC_E_CERT_WRONG_USAGE;
|
|
|
|
// Some other error.
|
|
default:
|
|
if(DefaultError)
|
|
{
|
|
return DefaultError;
|
|
}
|
|
else
|
|
{
|
|
return SEC_E_CERT_UNKNOWN;
|
|
}
|
|
}
|
|
}
|
|
|
|
NTSTATUS
|
|
VerifyClientCertificate(
|
|
PCCERT_CONTEXT pCertContext,
|
|
DWORD dwCertFlags,
|
|
DWORD dwIgnoreErrors,
|
|
LPCSTR pszPolicyOID,
|
|
PCCERT_CHAIN_CONTEXT *ppChainContext) // optional
|
|
{
|
|
HTTPSPolicyCallbackData polHttps;
|
|
CERT_CHAIN_POLICY_PARA PolicyPara;
|
|
CERT_CHAIN_POLICY_STATUS PolicyStatus;
|
|
CERT_CHAIN_PARA ChainPara;
|
|
PCCERT_CHAIN_CONTEXT pChainContext = NULL;
|
|
DWORD Status;
|
|
LPSTR pszUsage;
|
|
BOOL fImpersonating = FALSE;
|
|
|
|
//
|
|
// Build certificate chain.
|
|
//
|
|
|
|
fImpersonating = SslImpersonateClient();
|
|
|
|
pszUsage = szOID_PKIX_KP_CLIENT_AUTH;
|
|
|
|
ZeroMemory(&ChainPara, sizeof(ChainPara));
|
|
ChainPara.cbSize = sizeof(ChainPara);
|
|
ChainPara.RequestedUsage.dwType = USAGE_MATCH_TYPE_OR;
|
|
ChainPara.RequestedUsage.Usage.cUsageIdentifier = 1;
|
|
ChainPara.RequestedUsage.Usage.rgpszUsageIdentifier = &pszUsage;
|
|
|
|
if(!CertGetCertificateChain(
|
|
NULL, // hChainEngine
|
|
pCertContext, // pCertContext
|
|
NULL, // pTime
|
|
pCertContext->hCertStore, // hAdditionalStore
|
|
&ChainPara, // pChainPara
|
|
dwCertFlags, // dwFlags
|
|
NULL, // pvReserved
|
|
&pChainContext)) // ppChainContext
|
|
{
|
|
Status = SP_LOG_RESULT(GetLastError());
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate certificate chain.
|
|
//
|
|
|
|
if(pszPolicyOID == CERT_CHAIN_POLICY_NT_AUTH)
|
|
{
|
|
ZeroMemory(&PolicyPara, sizeof(PolicyPara));
|
|
PolicyPara.cbSize = sizeof(PolicyPara);
|
|
PolicyPara.dwFlags = BASIC_CONSTRAINTS_CERT_CHAIN_POLICY_END_ENTITY_FLAG;
|
|
}
|
|
else
|
|
{
|
|
ZeroMemory(&polHttps, sizeof(HTTPSPolicyCallbackData));
|
|
polHttps.cbStruct = sizeof(HTTPSPolicyCallbackData);
|
|
polHttps.dwAuthType = AUTHTYPE_CLIENT;
|
|
polHttps.fdwChecks = 0;
|
|
|
|
ZeroMemory(&PolicyPara, sizeof(PolicyPara));
|
|
PolicyPara.cbSize = sizeof(PolicyPara);
|
|
PolicyPara.pvExtraPolicyPara = &polHttps;
|
|
}
|
|
|
|
ZeroMemory(&PolicyStatus, sizeof(PolicyStatus));
|
|
PolicyStatus.cbSize = sizeof(PolicyStatus);
|
|
|
|
if(!CertVerifyCertificateChainPolicy(
|
|
pszPolicyOID,
|
|
pChainContext,
|
|
&PolicyPara,
|
|
&PolicyStatus))
|
|
{
|
|
Status = SP_LOG_RESULT(GetLastError());
|
|
goto cleanup;
|
|
}
|
|
|
|
#if DBG
|
|
if(PolicyStatus.dwError)
|
|
{
|
|
DebugLog((DEB_WARN, "CertVerifyCertificateChainPolicy returned 0x%x\n", PolicyStatus.dwError));
|
|
}
|
|
#endif
|
|
|
|
Status = MapWinTrustError(PolicyStatus.dwError, 0, dwIgnoreErrors);
|
|
|
|
if(Status)
|
|
{
|
|
DebugLog((DEB_ERROR, "MapWinTrustError returned 0x%x\n", Status));
|
|
goto cleanup;
|
|
}
|
|
|
|
Status = STATUS_SUCCESS;
|
|
|
|
if(ppChainContext != NULL)
|
|
{
|
|
*ppChainContext = pChainContext;
|
|
pChainContext = NULL;
|
|
}
|
|
|
|
cleanup:
|
|
|
|
if(pChainContext)
|
|
{
|
|
CertFreeCertificateChain(pChainContext);
|
|
}
|
|
|
|
if(fImpersonating) RevertToSelf();
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
AutoVerifyServerCertificate(PSPContext pContext)
|
|
{
|
|
PSPCredentialGroup pCredGroup;
|
|
DWORD dwCertFlags = 0;
|
|
DWORD dwIgnoreErrors = 0;
|
|
|
|
if(pContext->Flags & CONTEXT_FLAG_MANUAL_CRED_VALIDATION)
|
|
{
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
pCredGroup = pContext->pCredGroup;
|
|
if(pCredGroup == NULL)
|
|
{
|
|
return SP_LOG_RESULT(SEC_E_INTERNAL_ERROR);
|
|
}
|
|
|
|
if(pCredGroup->dwFlags & CRED_FLAG_REVCHECK_END_CERT)
|
|
dwCertFlags |= CERT_CHAIN_REVOCATION_CHECK_END_CERT;
|
|
if(pCredGroup->dwFlags & CRED_FLAG_REVCHECK_CHAIN)
|
|
dwCertFlags |= CERT_CHAIN_REVOCATION_CHECK_CHAIN;
|
|
if(pCredGroup->dwFlags & CRED_FLAG_REVCHECK_CHAIN_EXCLUDE_ROOT)
|
|
dwCertFlags |= CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT;
|
|
if(pCredGroup->dwFlags & CRED_FLAG_IGNORE_NO_REVOCATION_CHECK)
|
|
dwIgnoreErrors |= CRED_FLAG_IGNORE_NO_REVOCATION_CHECK;
|
|
if(pCredGroup->dwFlags & CRED_FLAG_IGNORE_REVOCATION_OFFLINE)
|
|
dwIgnoreErrors |= CRED_FLAG_IGNORE_REVOCATION_OFFLINE;
|
|
|
|
return VerifyServerCertificate(pContext, dwCertFlags, dwIgnoreErrors);
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
VerifyServerCertificate(
|
|
PSPContext pContext,
|
|
DWORD dwCertFlags,
|
|
DWORD dwIgnoreErrors)
|
|
{
|
|
HTTPSPolicyCallbackData polHttps;
|
|
CERT_CHAIN_POLICY_PARA PolicyPara;
|
|
CERT_CHAIN_POLICY_STATUS PolicyStatus;
|
|
CERT_CHAIN_PARA ChainPara;
|
|
PCCERT_CHAIN_CONTEXT pChainContext = NULL;
|
|
|
|
#define SERVER_USAGE_COUNT 3
|
|
LPSTR rgszUsages[SERVER_USAGE_COUNT] = {
|
|
szOID_PKIX_KP_SERVER_AUTH,
|
|
szOID_SERVER_GATED_CRYPTO,
|
|
szOID_SGC_NETSCAPE };
|
|
|
|
NTSTATUS Status;
|
|
PWSTR pwszServerName = NULL;
|
|
PSPCredentialGroup pCred;
|
|
PCCERT_CONTEXT pCertContext;
|
|
BOOL fImpersonating = FALSE;
|
|
|
|
pCred = pContext->pCredGroup;
|
|
if(pCred == NULL)
|
|
{
|
|
return SEC_E_INTERNAL_ERROR;
|
|
}
|
|
|
|
pCertContext = pContext->RipeZombie->pRemoteCert;
|
|
if(pCertContext == NULL)
|
|
{
|
|
return SEC_E_INTERNAL_ERROR;
|
|
}
|
|
|
|
|
|
//
|
|
// Build certificate chain.
|
|
//
|
|
|
|
fImpersonating = SslImpersonateClient();
|
|
|
|
ZeroMemory(&ChainPara, sizeof(ChainPara));
|
|
ChainPara.cbSize = sizeof(ChainPara);
|
|
ChainPara.RequestedUsage.dwType = USAGE_MATCH_TYPE_OR;
|
|
ChainPara.RequestedUsage.Usage.cUsageIdentifier = SERVER_USAGE_COUNT;
|
|
ChainPara.RequestedUsage.Usage.rgpszUsageIdentifier = rgszUsages;
|
|
|
|
if(!CertGetCertificateChain(
|
|
NULL, // hChainEngine
|
|
pCertContext, // pCertContext
|
|
NULL, // pTime
|
|
pCertContext->hCertStore, // hAdditionalStore
|
|
&ChainPara, // pChainPara
|
|
dwCertFlags, // dwFlags
|
|
NULL, // pvReserved
|
|
&pChainContext)) // ppChainContext
|
|
{
|
|
Status = SP_LOG_RESULT(GetLastError());
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate certificate chain.
|
|
//
|
|
|
|
if(!(pCred->dwFlags & CRED_FLAG_NO_SERVERNAME_CHECK))
|
|
{
|
|
pwszServerName = pContext->RipeZombie->szCacheID;
|
|
|
|
if(pwszServerName == NULL || lstrlenW(pwszServerName) == 0)
|
|
{
|
|
Status = SP_LOG_RESULT(SEC_E_WRONG_PRINCIPAL);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
ZeroMemory(&polHttps, sizeof(HTTPSPolicyCallbackData));
|
|
polHttps.cbStruct = sizeof(HTTPSPolicyCallbackData);
|
|
polHttps.dwAuthType = AUTHTYPE_SERVER;
|
|
polHttps.fdwChecks = 0;
|
|
polHttps.pwszServerName = pwszServerName;
|
|
|
|
ZeroMemory(&PolicyPara, sizeof(PolicyPara));
|
|
PolicyPara.cbSize = sizeof(PolicyPara);
|
|
PolicyPara.pvExtraPolicyPara = &polHttps;
|
|
|
|
ZeroMemory(&PolicyStatus, sizeof(PolicyStatus));
|
|
PolicyStatus.cbSize = sizeof(PolicyStatus);
|
|
|
|
if(!CertVerifyCertificateChainPolicy(
|
|
CERT_CHAIN_POLICY_SSL,
|
|
pChainContext,
|
|
&PolicyPara,
|
|
&PolicyStatus))
|
|
{
|
|
Status = SP_LOG_RESULT(GetLastError());
|
|
goto cleanup;
|
|
}
|
|
|
|
#if DBG
|
|
if(PolicyStatus.dwError)
|
|
{
|
|
DebugLog((DEB_WARN, "CertVerifyCertificateChainPolicy returned 0x%x\n", PolicyStatus.dwError));
|
|
}
|
|
#endif
|
|
|
|
Status = MapWinTrustError(PolicyStatus.dwError, 0, dwIgnoreErrors);
|
|
|
|
if(Status)
|
|
{
|
|
DebugLog((DEB_ERROR, "MapWinTrustError returned 0x%x\n", Status));
|
|
LogBogusServerCertEvent(pCertContext, pwszServerName, Status);
|
|
goto cleanup;
|
|
}
|
|
|
|
Status = STATUS_SUCCESS;
|
|
|
|
|
|
cleanup:
|
|
|
|
if(pChainContext)
|
|
{
|
|
CertFreeCertificateChain(pChainContext);
|
|
}
|
|
|
|
if(fImpersonating) RevertToSelf();
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
SECURITY_STATUS
|
|
SPCheckKeyUsage(
|
|
PCCERT_CONTEXT pCertContext,
|
|
PSTR pszUsage,
|
|
BOOL fOnCertOnly,
|
|
PBOOL pfIsAllowed)
|
|
{
|
|
PCERT_ENHKEY_USAGE pKeyUsage;
|
|
DWORD cbKeyUsage;
|
|
DWORD j;
|
|
BOOL fFound;
|
|
DWORD dwFlags = 0;
|
|
|
|
if(fOnCertOnly)
|
|
{
|
|
dwFlags = CERT_FIND_EXT_ONLY_ENHKEY_USAGE_FLAG;
|
|
}
|
|
|
|
// Determine size of usage information.
|
|
if(!CertGetEnhancedKeyUsage(pCertContext,
|
|
dwFlags,
|
|
NULL,
|
|
&cbKeyUsage))
|
|
{
|
|
// No usage information exists.
|
|
*pfIsAllowed = TRUE;
|
|
return SEC_E_OK;
|
|
}
|
|
|
|
SafeAllocaAllocate(pKeyUsage, cbKeyUsage);
|
|
if(pKeyUsage == NULL)
|
|
{
|
|
*pfIsAllowed = FALSE;
|
|
return SP_LOG_RESULT(SEC_E_INSUFFICIENT_MEMORY);
|
|
}
|
|
|
|
// Read key usage information.
|
|
if(!CertGetEnhancedKeyUsage(pCertContext,
|
|
dwFlags,
|
|
pKeyUsage,
|
|
&cbKeyUsage))
|
|
{
|
|
// No usage information exists.
|
|
SafeAllocaFree(pKeyUsage);
|
|
*pfIsAllowed = TRUE;
|
|
return SEC_E_OK;
|
|
}
|
|
|
|
if(pKeyUsage->cUsageIdentifier == 0 && GetLastError() == CRYPT_E_NOT_FOUND)
|
|
{
|
|
// No usage information exists.
|
|
SafeAllocaFree(pKeyUsage);
|
|
*pfIsAllowed = TRUE;
|
|
return SEC_E_OK;
|
|
}
|
|
|
|
// See if requested usage is in list of supported usages.
|
|
fFound = FALSE;
|
|
for(j = 0; j < pKeyUsage->cUsageIdentifier; j++)
|
|
{
|
|
if(strcmp(pszUsage, pKeyUsage->rgpszUsageIdentifier[j]) == 0)
|
|
{
|
|
fFound = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
SafeAllocaFree(pKeyUsage);
|
|
|
|
if(!fFound)
|
|
{
|
|
// Usage extensions found, but doesn't list ours.
|
|
*pfIsAllowed = FALSE;
|
|
}
|
|
else
|
|
{
|
|
*pfIsAllowed = TRUE;
|
|
}
|
|
|
|
return SEC_E_OK;
|
|
}
|
|
|