Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1103 lines
26 KiB

//+--------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1996 - 1999
//
// File: admin.cpp
//
// Contents: Cert Server admin implementation
//
// History: 24-Aug-96 vich created
//
//---------------------------------------------------------------------------
#include "pch.cpp"
#pragma hdrstop
#include <objbase.h>
#include "certsrvd.h"
#include "certbcli.h"
#include "csprop.h"
#include "csdisp.h"
#include "admin.h"
#include "certadmp.h"
#include "config.h"
#define __dwFILE__ __dwFILE_CERTADM_ADMIN_CPP__
//+--------------------------------------------------------------------------
// CCertAdmin::~CCertAdmin -- destructor
//
// free memory associated with this instance
//+--------------------------------------------------------------------------
CCertAdmin::~CCertAdmin()
{
_Cleanup();
}
//+--------------------------------------------------------------------------
// CCertAdmin::_CleanupOldConnection -- free memory
//
// free memory associated with this instance
//+--------------------------------------------------------------------------
VOID
CCertAdmin::_CleanupOldConnection()
{
_CleanupCAPropInfo();
}
//+--------------------------------------------------------------------------
// CCertAdmin::_Cleanup -- free memory
//
// free memory associated with this instance
//+--------------------------------------------------------------------------
VOID
CCertAdmin::_Cleanup()
{
_CloseConnection();
_CleanupOldConnection();
}
//+--------------------------------------------------------------------------
// CCertAdmin::_OpenConnection -- get DCOM object interface
//
//+--------------------------------------------------------------------------
HRESULT
CCertAdmin::_OpenConnection(
IN WCHAR const *pwszConfig,
IN DWORD RequiredVersion,
OUT WCHAR const **ppwszAuthority)
{
HRESULT hr;
hr = myOpenAdminDComConnection(
pwszConfig,
ppwszAuthority,
&m_pwszServerName,
&m_dwServerVersion,
&m_pICertAdminD);
_JumpIfError(hr, error, "myOpenAdminDComConnection");
CSASSERT(NULL != m_pICertAdminD);
CSASSERT(0 != m_dwServerVersion);
if (m_dwServerVersion < RequiredVersion)
{
hr = RPC_E_VERSION_MISMATCH;
_JumpError(hr, error, "old server");
}
error:
return(hr);
}
//+--------------------------------------------------------------------------
// CCertAdmin::_CloseConnection -- release DCOM object
//
//+--------------------------------------------------------------------------
VOID
CCertAdmin::_CloseConnection()
{
myCloseDComConnection((IUnknown **) &m_pICertAdminD, &m_pwszServerName);
m_dwServerVersion = 0;
}
//+--------------------------------------------------------------------------
// CCertAdmin::IsValidCertificate -- Verify certificate validity
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::IsValidCertificate(
/* [in] */ BSTR const strConfig,
/* [in] */ BSTR const strSerialNumber,
/* [out, retval] */ LONG *pDisposition)
{
HRESULT hr;
WCHAR const *pwszAuthority;
if (NULL == strSerialNumber || NULL == pDisposition)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
m_fRevocationReasonValid = FALSE;
__try
{
hr = m_pICertAdminD->IsValidCertificate(
pwszAuthority,
strSerialNumber,
&m_RevocationReason,
pDisposition);
if (S_OK != hr || CA_DISP_REVOKED != *pDisposition)
{
m_fRevocationReasonValid = FALSE;
}
else
{
m_fRevocationReasonValid = TRUE;
}
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "IsValidCertificate");
m_fRevocationReasonValid = TRUE;
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::IsValidCertificate"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::GetRevocationReason -- Get Revocation Reason
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::GetRevocationReason(
/* [out, retval] */ LONG *pReason)
{
HRESULT hr = S_OK;
if (NULL == pReason)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
if (!m_fRevocationReasonValid)
{
hr = E_UNEXPECTED;
_JumpError(hr, error, "m_fRevocationReasonValid");
}
*pReason = m_RevocationReason;
error:
return(_SetErrorInfo(hr, L"CCertAdmin::GetRevocationReason"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::RevokeCertificate -- Revoke a certificate
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::RevokeCertificate(
/* [in] */ BSTR const strConfig,
/* [in] */ BSTR const strSerialNumber,
/* [in] */ LONG Reason,
/* [in] */ DATE Date)
{
HRESULT hr;
WCHAR const *pwszAuthority;
FILETIME ft;
if (NULL == strConfig || NULL == strSerialNumber)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = myDateToFileTime(&Date, &ft);
_JumpIfError(hr, error, "myDateToFileTime");
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->RevokeCertificate(
pwszAuthority,
strSerialNumber,
Reason,
ft);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "RevokeCertificate");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::RevokeCertificate"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::SetRequestAttributes -- Add request attributes
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::SetRequestAttributes(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG RequestId,
/* [in] */ BSTR const strAttributes)
{
HRESULT hr;
WCHAR const *pwszAuthority;
if (NULL == strAttributes)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->SetAttributes(
pwszAuthority,
(DWORD) RequestId,
strAttributes);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "SetAttributes");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::SetRequestAttributes"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::SetCertificateExtension -- Set a Certificate Extension
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::SetCertificateExtension(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG RequestId,
/* [in] */ BSTR const strExtensionName,
/* [in] */ LONG Type,
/* [in] */ LONG Flags,
/* [in] */ VARIANT const *pvarValue)
{
HRESULT hr;
WCHAR const *pwszAuthority;
CERTTRANSBLOB ctbValue;
ctbValue.pb = NULL;
if (NULL == strExtensionName || NULL == pvarValue)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
hr = myMarshalVariant(pvarValue, Type, &ctbValue.cb, &ctbValue.pb);
_JumpIfError(hr, error, "myMarshalVariant");
__try
{
hr = m_pICertAdminD->SetExtension(
pwszAuthority,
(DWORD) RequestId,
strExtensionName,
Type,
Flags,
&ctbValue);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "SetExtension");
error:
if (NULL != ctbValue.pb)
{
LocalFree(ctbValue.pb);
}
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::SetCertificateExtension"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::ResubmitRequest -- Resubmit a certificate request
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::ResubmitRequest(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG RequestId,
/* [out, retval] */ LONG *pDisposition)
{
HRESULT hr;
WCHAR const *pwszAuthority;
if (NULL == pDisposition)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
*pDisposition = 0;
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->ResubmitRequest(
pwszAuthority,
(DWORD) RequestId,
(DWORD *) pDisposition);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "ResubmitRequest");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::ResubmitRequest"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::DenyRequest -- Deny a certificate request
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::DenyRequest(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG RequestId)
{
HRESULT hr;
WCHAR const *pwszAuthority;
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->DenyRequest(pwszAuthority, (DWORD) RequestId);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "DenyRequest");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::DenyRequest"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::PublishCRL -- Puhlish a new CRL
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::PublishCRL(
/* [in] */ BSTR const strConfig,
/* [in] */ DATE Date)
{
HRESULT hr;
WCHAR const *pwszAuthority;
FILETIME ft;
// Date = 0.0 means pass ft = 0 to the DCOM interface
if (Date == 0.0)
{
ZeroMemory(&ft, sizeof(FILETIME));
}
else // translate date to ft
{
hr = myDateToFileTime(&Date, &ft);
_JumpIfError(hr, error, "myDateToFileTime");
}
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->PublishCRL(pwszAuthority, ft);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "PublishCRL");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::PublishCRL"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::PublishCRLs -- Publish new base CRL, delta CRL or both
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
HRESULT
CCertAdmin::PublishCRLs(
/* [in] */ BSTR const strConfig,
/* [in] */ DATE Date,
/* [in] */ LONG CRLFlags) // CA_CRL_*
{
HRESULT hr;
WCHAR const *pwszAuthority;
FILETIME ft;
// Date = 0.0 means pass ft = 0 to the DCOM interface
if (Date == 0.0)
{
ZeroMemory(&ft, sizeof(FILETIME));
}
else // translate date to ft
{
hr = myDateToFileTime(&Date, &ft);
_JumpIfError(hr, error, "myDateToFileTime");
}
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->PublishCRLs(pwszAuthority, ft, CRLFlags);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "PublishCRLs");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::PublishCRLs"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::GetCRL -- Get the latest CRL
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::GetCRL(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG Flags,
/* [out, retval] */ BSTR *pstrCRL)
{
HRESULT hr;
WCHAR const *pwszAuthority;
CERTTRANSBLOB ctbCRL;
ctbCRL.pb = NULL;
if (NULL == pstrCRL)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
ctbCRL.cb = 0;
__try
{
hr = m_pICertAdminD->GetCRL(pwszAuthority, &ctbCRL);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "GetCRL");
myRegisterMemAlloc(ctbCRL.pb, ctbCRL.cb, CSM_COTASKALLOC);
CSASSERT(CR_OUT_BASE64HEADER == CRYPT_STRING_BASE64HEADER);
if (CR_OUT_BASE64HEADER == Flags)
{
Flags = CRYPT_STRING_BASE64X509CRLHEADER;
}
hr = EncodeCertString(ctbCRL.pb, ctbCRL.cb, Flags, pstrCRL);
_JumpIfError(hr, error, "EncodeCertString");
error:
if (NULL != ctbCRL.pb)
{
CoTaskMemFree(ctbCRL.pb);
}
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::GetCRL"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::ImportCertificate -- Import a certificate into the database
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::ImportCertificate(
/* [in] */ BSTR const strConfig,
/* [in] */ BSTR const strCertificate,
/* [in] */ LONG Flags,
/* [out, retval] */ LONG *pRequestId)
{
HRESULT hr;
WCHAR const *pwszAuthority;
CERTTRANSBLOB ctbCert;
ctbCert.pb = NULL;
if (NULL == strCertificate)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = DecodeCertString(
strCertificate,
Flags & CR_IN_ENCODEMASK,
&ctbCert.pb,
&ctbCert.cb);
_JumpIfError(hr, error, "DecodeCertString");
hr = _OpenConnection(strConfig, 1, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->ImportCertificate(
pwszAuthority,
&ctbCert,
Flags,
pRequestId);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError3(
hr,
error,
"ImportCertificate",
NTE_BAD_SIGNATURE,
HRESULT_FROM_WIN32(ERROR_OBJECT_ALREADY_EXISTS));
error:
if (NULL != ctbCert.pb)
{
LocalFree(ctbCert.pb);
}
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::ImportCertificate"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::GetArchivedKey -- Get archived, encrypted key in a PKCS7
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::GetArchivedKey(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG RequestId,
/* [in] */ LONG Flags,
/* [out, retval] */ BSTR *pstrArchivedKey)
{
HRESULT hr;
WCHAR const *pwszAuthority;
CERTTRANSBLOB ctbArchivedKey;
ctbArchivedKey.pb = NULL;
if (NULL == pstrArchivedKey)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
ctbArchivedKey.cb = 0;
__try
{
hr = m_pICertAdminD->GetArchivedKey(
pwszAuthority,
RequestId,
&ctbArchivedKey);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "GetArchivedKey");
myRegisterMemAlloc(
ctbArchivedKey.pb,
ctbArchivedKey.cb,
CSM_COTASKALLOC);
CSASSERT(CR_OUT_BASE64HEADER == CRYPT_STRING_BASE64HEADER);
hr = EncodeCertString(
ctbArchivedKey.pb,
ctbArchivedKey.cb,
Flags,
pstrArchivedKey);
_JumpIfError(hr, error, "EncodeCertString");
error:
if (NULL != ctbArchivedKey.pb)
{
CoTaskMemFree(ctbArchivedKey.pb);
}
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::GetArchivedKey"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::GetConfigEntry -- get CA configuration entry
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::GetConfigEntry(
/* [in] */ BSTR const strConfig,
/* [in] */ BSTR const strNodePath,
/* [in] */ BSTR const strEntryName,
/* [out, retval] */ VARIANT *pvarEntry)
{
HRESULT hr;
WCHAR const *pwszAuthority;
if (NULL == strEntryName || NULL == pvarEntry)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
__try
{
if(S_OK != hr)
{
hr = _GetConfigEntryFromRegistry(
strConfig,
strNodePath,
strEntryName,
pvarEntry);
_LeaveIfError(hr, "_GetConfigEntryFromRegistry");
}
else
{
hr = m_pICertAdminD->GetConfigEntry(
pwszAuthority,
strNodePath,
strEntryName,
pvarEntry);
_LeaveIfError(hr, "GetConfigEntry");
myRegisterMemAlloc(pvarEntry, 0, CSM_VARIANT);
}
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError2(hr, error, "GetConfigEntry",
HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND));
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::GetConfigEntry"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::SetConfigEntry -- set CA configuration entry
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::SetConfigEntry(
/* [in] */ BSTR const strConfig,
/* [in] */ BSTR const strNodePath,
/* [in] */ BSTR const strEntryName,
/* [in] */ VARIANT *pvarEntry)
{
HRESULT hr;
WCHAR const *pwszAuthority;
if (NULL == strEntryName || NULL == pvarEntry)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
__try
{
if(S_OK != hr)
{
hr = _SetConfigEntryFromRegistry(
strConfig,
strNodePath,
strEntryName,
pvarEntry);
}
else
{
hr = m_pICertAdminD->SetConfigEntry(
pwszAuthority,
strNodePath,
strEntryName,
pvarEntry);
}
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "SetConfigEntry");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::SetConfigEntry"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::ImportKey -- Archive Private Key
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::ImportKey(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG RequestId,
/* [in] */ BSTR const strCertHash,
/* [in] */ LONG Flags,
/* [in] */ BSTR const strKey)
{
HRESULT hr;
WCHAR const *pwszAuthority;
CERTTRANSBLOB ctbKey;
ctbKey.pb = NULL;
if (NULL == strKey)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = DecodeCertString(
strKey,
Flags & CR_IN_ENCODEMASK,
&ctbKey.pb,
&ctbKey.cb);
_JumpIfError(hr, error, "DecodeCertString");
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->ImportKey(
pwszAuthority,
RequestId,
strCertHash,
Flags,
&ctbKey);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError2(
hr,
error,
"ImportKey",
HRESULT_FROM_WIN32(ERROR_OBJECT_ALREADY_EXISTS));
error:
if (NULL != ctbKey.pb)
{
LocalFree(ctbKey.pb);
}
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::ImportKey"));
}
HRESULT
CCertAdmin::_SetErrorInfo(
IN HRESULT hrError,
IN WCHAR const *pwszDescription)
{
CSASSERT(FAILED(hrError) || S_OK == hrError || S_FALSE == hrError);
if (FAILED(hrError))
{
HRESULT hr;
hr = DispatchSetErrorInfo(
hrError,
pwszDescription,
wszCLASS_CERTADMIN,
&IID_ICertAdmin);
CSASSERT(hr == hrError);
}
return(hrError);
}
//+--------------------------------------------------------------------------
// CCertAdmin::GetMyRoles -- Gets current user roles
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::GetMyRoles(
/* [in] */ BSTR const strConfig,
/* [out, retval] */ LONG *pRoles)
{
HRESULT hr;
WCHAR const *pwszAuthority;
if (NULL == strConfig || NULL == pRoles)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->GetMyRoles(
pwszAuthority,
pRoles);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "GetMyRoles");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::GetMyRoles"));
}
//+--------------------------------------------------------------------------
// CCertAdmin::DeleteRow -- Delete row from database
//
// ...
//
// Returns S_OK on success.
//+--------------------------------------------------------------------------
STDMETHODIMP
CCertAdmin::DeleteRow(
/* [in] */ BSTR const strConfig,
/* [in] */ LONG Flags, // CDR_*
/* [in] */ DATE Date,
/* [in] */ LONG Table, // CVRC_TABLE_*
/* [in] */ LONG RowId,
/* [out, retval]*/ LONG *pcDeleted)
{
HRESULT hr;
FILETIME ft;
WCHAR const *pwszAuthority;
if (NULL == strConfig)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL parm");
}
// Date = 0.0 means pass ft = 0 to the DCOM interface
if (Date == 0.0)
{
ZeroMemory(&ft, sizeof(FILETIME));
}
else // translate date to ft
{
hr = myDateToFileTime(&Date, &ft);
_JumpIfError(hr, error, "myDateToFileTime");
}
hr = _OpenConnection(strConfig, 2, &pwszAuthority);
_JumpIfError(hr, error, "_OpenConnection");
__try
{
hr = m_pICertAdminD->DeleteRow(
pwszAuthority,
Flags,
ft,
Table,
RowId,
pcDeleted);
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "DeleteRow");
error:
hr = myHError(hr);
return(_SetErrorInfo(hr, L"CCertAdmin::DeleteRow"));
}
HRESULT
CCertAdmin::_GetConfigEntryFromRegistry(
IN BSTR const strConfig,
IN BSTR const strNodePath,
IN BSTR const strEntryName,
IN OUT VARIANT *pvarEntry)
{
HRESULT hr;
CertSrv::CConfigStorage stg;
LPWSTR pwszMachine = NULL;
LPWSTR pwszCAName = NULL;
hr = mySplitConfigString(
strConfig,
&pwszMachine,
&pwszCAName);
_JumpIfErrorStr(hr, error, "mySplitConfigString", strConfig);
hr = stg.InitMachine(pwszMachine);
_JumpIfError(hr, error, "CConfigStorage::InitMachine");
hr = stg.GetEntry(
pwszCAName,
strNodePath,
strEntryName,
pvarEntry);
_JumpIfError(hr, error, "CConfigStorage::GetEntry");
error:
LOCAL_FREE(pwszMachine);
LOCAL_FREE(pwszCAName);
return hr;
}
HRESULT
CCertAdmin::_SetConfigEntryFromRegistry(
IN BSTR const strConfig,
IN BSTR const strNodePath,
IN BSTR const strEntryName,
IN const VARIANT *pvarEntry)
{
HRESULT hr;
CertSrv::CConfigStorage stg;
LPWSTR pwszMachine = NULL;
LPWSTR pwszCAName = NULL;
hr = mySplitConfigString(
strConfig,
&pwszMachine,
&pwszCAName);
_JumpIfErrorStr(hr, error, "mySplitConfigString", strConfig);
hr = stg.InitMachine(pwszMachine);
_JumpIfError(hr, error, "CConfigStorage::InitMachine");
hr = stg.SetEntry(
pwszCAName,
strNodePath,
strEntryName,
const_cast<VARIANT*>(pvarEntry));
_JumpIfError(hr, error, "CConfigStorage::GetEntry");
error:
LOCAL_FREE(pwszMachine);
LOCAL_FREE(pwszCAName);
return hr;
}
#undef __DIR__
#undef __dwFILE__
#define CCERTADMIN
#include "csprop2.cpp"