Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

2488 lines
70 KiB

// USERLIST.cpp : implementation file
//
#include "stdafx.h"
#include "EFSADU.h"
#include "USERLIST.h"
#include "cryptui.h"
#include "objsel.h"
#include <winefs.h>
#include "efsui.h"
#ifdef _DEBUG
#define new DEBUG_NEW
#undef THIS_FILE
static char THIS_FILE[] = __FILE__;
#endif
#define OTHERPEOPLE L"AddressBook"
#define TRUSTEDPEOPLE L"TrustedPeople"
#define KEYPATH TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\EFS\\CurrentKeys")
#define CERT_HASH TEXT("CertificateHash")
LPSTR EfsOidlpstr = szOID_KP_EFS;
PCCERT_CONTEXT GetCertInMyStore(PCRYPT_HASH_BLOB pHashBlob);
PCRYPT_KEY_PROV_INFO GetKeyProvInfo(PCCERT_CONTEXT pCertContext);
BOOLEAN CertHasKey(PCCERT_CONTEXT pCertContext);
/////////////////////////////////////////////////////////////////////////////
// USERLIST dialog
USERLIST::USERLIST(CWnd* pParent /*=NULL*/)
: CDialog(USERLIST::IDD, pParent)
{
//{{AFX_DATA_INIT(USERLIST)
//}}AFX_DATA_INIT
}
USERLIST::USERLIST(LPCTSTR FileName, CWnd* pParent /*=NULL*/)
: CDialog(USERLIST::IDD, pParent)
{
m_FileName = FileName;
}
void USERLIST::DoDataExchange(CDataExchange* pDX)
{
CDialog::DoDataExchange(pDX);
//{{AFX_DATA_MAP(USERLIST)
DDX_Control(pDX, IDC_BACKUP, m_BackupButton);
DDX_Control(pDX, IDC_LISTRA, m_RecoveryListCtrl);
DDX_Control(pDX, IDC_LISTUSER, m_UserListCtrl);
DDX_Control(pDX, IDC_ADD, m_AddButton);
DDX_Control(pDX, IDC_REMOVE, m_RemoveButton);
//}}AFX_DATA_MAP
}
BEGIN_MESSAGE_MAP(USERLIST, CDialog)
//{{AFX_MSG_MAP(USERLIST)
ON_BN_CLICKED(IDC_REMOVE, OnRemove)
ON_BN_CLICKED(IDC_ADD, OnAdd)
ON_NOTIFY(NM_SETFOCUS, IDC_LISTUSER, OnSetfocusListuser)
ON_NOTIFY(NM_KILLFOCUS, IDC_LISTUSER, OnKillfocusListuser)
ON_NOTIFY(LVN_ITEMCHANGED, IDC_LISTUSER, OnItemchangedListuser)
ON_NOTIFY(NM_SETFOCUS, IDC_LISTRA, OnSetfocusListra)
ON_BN_CLICKED(IDC_BACKUP, OnBackup)
//}}AFX_MSG_MAP
END_MESSAGE_MAP()
/////////////////////////////////////////////////////////////////////////////
// USERLIST message handlers
void USERLIST::OnRemove()
{
int ItemPos;
BOOL NoAction = FALSE;
CString NoCertName;
try{
NoCertName.LoadString(IDS_NOCERTNAME);
}
catch(...){
NoAction = TRUE;
}
if (NoAction){
return;
}
ItemPos = m_UserListCtrl.GetNextItem( -1, LVNI_SELECTED );
while ( ItemPos != -1 ){
CString CertName;
LPTSTR pCertName;
CertName = m_UserListCtrl.GetItemText( ItemPos, 0 );
if ( !CertName.Compare(NoCertName) ){
pCertName = NULL;
} else {
pCertName = CertName.GetBuffer(CertName.GetLength() + 1);
}
m_Users.Remove( pCertName);
m_UserListCtrl.DeleteItem( ItemPos );
if (pCertName){
CertName.ReleaseBuffer();
}
//
// Because we have deleted the item. We have to start from -1 again.
//
ItemPos = m_UserListCtrl.GetNextItem( -1, LVNI_SELECTED );
}
m_AddButton.SetFocus();
}
void USERLIST::OnCancel()
{
// TODO: Add extra cleanup here
CDialog::OnCancel();
}
void USERLIST::OnOK()
{
// TODO: Add extra validation here
LONG NoUsersToAdd = m_Users.GetUserAddedCnt();
LONG NoUsersToRemove = m_Users.GetUserRemovedCnt();
if ( (NoUsersToRemove - NoUsersToAdd) >= m_CurrentUsers) {
//
// All the users are going to be removed from the file. Do not allow.
//
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NOREMOVEALL)){
MessageBox(ErrMsg);
}
return;
}
CDialog::OnOK();
}
STDAPI_(void) EfsDetail(HWND hwndParent, LPCWSTR FileName)
{
INT_PTR RetCode;
AFX_MANAGE_STATE(AfxGetStaticModuleState());
DWORD FileAttributes = GetFileAttributes(FileName);
if ( (-1 != FileAttributes) && ( FileAttributes & FILE_ATTRIBUTE_DIRECTORY)){
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NOADDUSERDIR)){
MessageBox(hwndParent, ErrMsg, NULL, MB_OK);
}
return;
}
CWnd cwnd;
cwnd.FromHandle(hwndParent);
USERLIST DetailDialog(FileName, &cwnd);
RetCode = DetailDialog.DoModal();
if ( IDOK == RetCode ){
//
// Commit the change
//
DetailDialog.ApplyChanges( FileName );
} else if (IDCANCEL == RetCode) {
//
// Nothing needs to be done
//
}
}
BOOL WINAPI EfsFilter(
PCCERT_CONTEXT pCertContext,
BOOL *pfInitialSelectedCert,
void *pvCallbackData
)
{
BOOL disp = FALSE;
PCERT_ENHKEY_USAGE pUsage = NULL;
DWORD cbUsage = 0;
if ( CertVerifyTimeValidity(
NULL,
pCertContext->pCertInfo
)){
return disp;
}
if (CertGetEnhancedKeyUsage(
pCertContext,
0,
NULL,
&cbUsage) && 0 != cbUsage){
pUsage = (PCERT_ENHKEY_USAGE) new BYTE[cbUsage];
if (pUsage){
if (CertGetEnhancedKeyUsage(
pCertContext,
0,
pUsage,
&cbUsage)){
//
// Search for EFS usage
//
DWORD cUsages = pUsage->cUsageIdentifier;
while (cUsages){
if (!strcmp(szOID_KP_EFS, pUsage->rgpszUsageIdentifier[cUsages-1])){
disp = TRUE;
break;
}
cUsages--;
}
}
delete [] pUsage;
}
}
return disp;
}
BOOL USERLIST::OnInitDialog()
{
CDialog::OnInitDialog();
CString WinTitle;
RECT ListRect;
DWORD ColWidth;
CString ColName;
CString ColCert;
CString RecName;
LPTSTR UserCertName = NULL;
BOOL EnableAddButton = FALSE;
PENCRYPTION_CERTIFICATE_HASH_LIST pUsers = NULL;
PENCRYPTION_CERTIFICATE_HASH_LIST pRecs = NULL;
try {
DWORD RetCode;
AfxFormatString1( WinTitle, IDS_DETAILWINTITLE, m_FileName );
SetWindowText( WinTitle );
m_CertChainPara.cbSize = sizeof(CERT_CHAIN_PARA);
m_CertChainPara.RequestedUsage.dwType = USAGE_MATCH_TYPE_AND;
//
// Check EFS EKU
//
m_CertChainPara.RequestedUsage.Usage.cUsageIdentifier = 1;
m_CertChainPara.RequestedUsage.Usage.rgpszUsageIdentifier=&EfsOidlpstr;
m_UserListCtrl.GetClientRect(&ListRect);
ColName.LoadString(IDS_USERCOLTITLE);
ColCert.LoadString(IDS_CERTCOLTITLE);
RecName.LoadString(IDS_RECCOLTITLE);
ColWidth = ( ListRect.right - ListRect.left ) / 4;
m_UserListCtrl.InsertColumn(0, ColName, LVCFMT_LEFT, ColWidth*3 );
m_UserListCtrl.InsertColumn(1, ColCert, LVCFMT_LEFT, ColWidth );
m_RecoveryListCtrl.GetClientRect(&ListRect);
ColWidth = ( ListRect.right - ListRect.left ) / 4;
m_RecoveryListCtrl.InsertColumn(0, RecName, LVCFMT_LEFT, ColWidth*3 );
m_RecoveryListCtrl.InsertColumn(1, ColCert, LVCFMT_LEFT, ColWidth );
RetCode = QueryUsersOnEncryptedFile( (LPWSTR)(LPCWSTR) m_FileName, &pUsers);
if ( !RetCode ){
RetCode = QueryRecoveryAgentsOnEncryptedFile( (LPWSTR)(LPCWSTR) m_FileName, &pRecs);
if ( !RetCode ){
//
// Got the info about the encrypted file
//
DWORD NUsers = pUsers->nCert_Hash;
BOOL RecDone = FALSE;
PENCRYPTION_CERTIFICATE_HASH_LIST pCertHashList = pUsers;
m_CurrentUsers = (LONG) NUsers;
//
// Get all the users
//
while ( NUsers > 0 ){
UserCertName = new TCHAR[_tcslen(pCertHashList->pUsers[NUsers - 1]->lpDisplayInformation) + 1];
if (UserCertName){
_tcscpy(UserCertName, pCertHashList->pUsers[NUsers - 1]->lpDisplayInformation);
} else {
AfxThrowMemoryException( );
}
//
// We got the user name
//
if (RecDone){
RetCode = m_Recs.Add(
UserCertName,
pCertHashList->pUsers[NUsers - 1]->pHash,
NULL
);
} else {
//
// Try to get a better name from the cert
//
LPTSTR UserName;
RetCode = TryGetBetterNameInCert(pCertHashList->pUsers[NUsers - 1]->pHash, &UserName);
if (ERROR_SUCCESS == RetCode){
//
// We get a better name from the certs
//
delete [] UserCertName;
UserCertName = UserName;
}
RetCode = m_Users.Add(
UserCertName,
pCertHashList->pUsers[NUsers - 1]->pHash,
NULL
);
}
if ( NO_ERROR != RetCode ) {
delete [] UserCertName;
UserCertName = NULL;
}
NUsers--;
if (NUsers == 0 && !RecDone){
//
// Let's deal with the recovery agents.
//
RecDone = TRUE;
pCertHashList = pRecs;
NUsers = pRecs->nCert_Hash;
}
}
if ( pRecs ){
FreeEncryptionCertificateHashList( pRecs );
pRecs = NULL;
}
//
// In memory intial list established
//
SetUpListBox(&EnableAddButton);
} else {
//
// Cannot get recovery info
//
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NORECINFO)){
MessageBox(ErrMsg);
}
}
if ( pUsers ){
FreeEncryptionCertificateHashList( pUsers );
pUsers = NULL;
}
} else {
//
// Cannot get user info
//
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NOINFO)){
MessageBox(ErrMsg);
}
}
}
catch (...) {
//
// The exception mostly is caused by out of memory.
// We can not prevent the page to be displayed from this routine,
// So we just go ahead with empty list
//
m_UserListCtrl.DeleteAllItems( );
m_RecoveryListCtrl.DeleteAllItems( );
//
// Delete works even if UserCertName == NULL
//
delete [] UserCertName;
if ( pUsers ){
FreeEncryptionCertificateHashList( pUsers );
}
if ( pRecs ){
FreeEncryptionCertificateHashList( pRecs );
}
}
m_RemoveButton.EnableWindow( FALSE );
if ( !EnableAddButton ){
m_AddButton.EnableWindow( FALSE );
}
ShowBackup();
return TRUE; // return TRUE unless you set the focus to a control
// EXCEPTION: OCX Property Pages should return FALSE
}
void USERLIST::ShowRemove()
{
if (m_UserListCtrl.GetSelectedCount() > 0){
//
// Enable the Remove Button
//
m_RemoveButton.EnableWindow( TRUE );
} else {
//
// Disable the Remove Button
//
m_RemoveButton.EnableWindow( FALSE );
}
}
DWORD
USERLIST::ApplyChanges(
LPCTSTR FileName
)
{
DWORD RetCode = NO_ERROR;
DWORD NoUsersToRemove;
DWORD NoUsersToAdd;
DWORD RemoveUserIndex;
DWORD AddUserIndex;
PENCRYPTION_CERTIFICATE_HASH_LIST RemoveUserList = NULL;
PENCRYPTION_CERTIFICATE_LIST AddUserList = NULL;
PVOID EnumHandle;
//
// Get all the users to be added or removed first
//
NoUsersToAdd = m_Users.GetUserAddedCnt();
NoUsersToRemove = m_Users.GetUserRemovedCnt();
if ( (NoUsersToAdd == 0) && (NoUsersToRemove == 0)){
return NO_ERROR;
}
if ( NoUsersToAdd ) {
//
// At least one user is to be added
//
DWORD BytesToAllocate;
BytesToAllocate = sizeof ( ENCRYPTION_CERTIFICATE_LIST ) +
NoUsersToAdd * sizeof ( PENCRYPTION_CERTIFICATE ) +
NoUsersToAdd * sizeof (ENCRYPTION_CERTIFICATE);
AddUserList = (PENCRYPTION_CERTIFICATE_LIST) new BYTE[BytesToAllocate];
if ( NULL == AddUserList ){
//
// Out of memory. Try our best to display the error message.
//
try {
CString ErrMsg;
if (ErrMsg.LoadString(IDS_ERRORMEM)){
::MessageBox(NULL, ErrMsg, NULL, MB_OK);
}
}
catch (...) {
}
return ERROR_NOT_ENOUGH_MEMORY;
}
AddUserList->nUsers = NoUsersToAdd;
AddUserList->pUsers = (PENCRYPTION_CERTIFICATE *)(((PBYTE) AddUserList) +
sizeof ( ENCRYPTION_CERTIFICATE_LIST ));
}
if ( NoUsersToRemove ){
//
// At least one user is to be removed
//
DWORD BytesToAllocate;
BytesToAllocate = sizeof ( ENCRYPTION_CERTIFICATE_HASH_LIST ) +
NoUsersToRemove * sizeof ( PENCRYPTION_CERTIFICATE_HASH) +
NoUsersToRemove * sizeof (ENCRYPTION_CERTIFICATE_HASH);
RemoveUserList = (PENCRYPTION_CERTIFICATE_HASH_LIST) new BYTE[BytesToAllocate];
if ( NULL == RemoveUserList ){
//
// Out of memory. Try our best to display the error message.
//
if (AddUserList){
delete [] AddUserList;
AddUserList = NULL;
}
try {
CString ErrMsg;
if (ErrMsg.LoadString(IDS_ERRORMEM)){
::MessageBox(NULL, ErrMsg, NULL, MB_OK);
}
}
catch (...) {
}
return ERROR_NOT_ENOUGH_MEMORY;
}
RemoveUserList->nCert_Hash = NoUsersToRemove;
RemoveUserList->pUsers = (PENCRYPTION_CERTIFICATE_HASH *)(((PBYTE) RemoveUserList) +
sizeof ( ENCRYPTION_CERTIFICATE_HASH_LIST ));
}
EnumHandle = m_Users.StartEnum();
RemoveUserIndex = 0;
AddUserIndex = 0;
while ( EnumHandle ){
DWORD Flag;
PSID UserSid;
PVOID CertData;
LPTSTR UserName;
EnumHandle = m_Users.GetNextChangedUser(
EnumHandle,
&UserName,
&UserSid,
&CertData,
&Flag
);
if ( Flag ){
//
// We get our changed user
//
if ( Flag & USERADDED ){
ASSERT( AddUserList );
//
// Add the user to the adding list
//
PENCRYPTION_CERTIFICATE EfsCert;
ASSERT (AddUserIndex < NoUsersToAdd);
EfsCert= (PENCRYPTION_CERTIFICATE)(((PBYTE) AddUserList) +
sizeof ( ENCRYPTION_CERTIFICATE_LIST ) +
NoUsersToAdd * sizeof ( PENCRYPTION_CERTIFICATE) +
AddUserIndex * sizeof (ENCRYPTION_CERTIFICATE));
AddUserList->pUsers[AddUserIndex] = EfsCert;
EfsCert->pUserSid = (SID *) UserSid;
EfsCert->cbTotalLength = sizeof (ENCRYPTION_CERTIFICATE);
EfsCert->pCertBlob = (PEFS_CERTIFICATE_BLOB) CertData;
AddUserIndex++;
} else if ( Flag & USERREMOVED ) {
ASSERT (RemoveUserList);
//
// Add the user to the removing list
//
PENCRYPTION_CERTIFICATE_HASH EfsCertHash;
ASSERT (RemoveUserIndex < NoUsersToRemove);
EfsCertHash= (PENCRYPTION_CERTIFICATE_HASH)(((PBYTE) RemoveUserList) +
sizeof ( ENCRYPTION_CERTIFICATE_HASH_LIST ) +
NoUsersToRemove * sizeof ( PENCRYPTION_CERTIFICATE_HASH) +
RemoveUserIndex * sizeof (ENCRYPTION_CERTIFICATE_HASH));
RemoveUserList->pUsers[RemoveUserIndex] = EfsCertHash;
EfsCertHash->cbTotalLength = sizeof (ENCRYPTION_CERTIFICATE_HASH);
EfsCertHash->pUserSid = (SID *)UserSid;
EfsCertHash->pHash = (PEFS_HASH_BLOB) CertData;
EfsCertHash->lpDisplayInformation = NULL;
RemoveUserIndex++;
} else {
ASSERT(FALSE);
}
}
}
ASSERT(RemoveUserIndex == NoUsersToRemove);
ASSERT(AddUserIndex == NoUsersToAdd);
if ( AddUserIndex && AddUserList ){
//
// Add the user to the file list
//
RetCode = AddUsersToEncryptedFile(FileName, AddUserList);
if ( NO_ERROR != RetCode ){
CString ErrMsg;
TCHAR ErrCode[16];
if (ERROR_ACCESS_DENIED != RetCode) {
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_ADDUSERERR, ErrCode );
} else {
ErrMsg.LoadString(IDS_ADDUSERDENIED);
}
MessageBox(ErrMsg);
}
}
if ( RemoveUserIndex && RemoveUserList){
//
// Remove the user from the list
//
DWORD RetCodeBak = RetCode;
RetCode = RemoveUsersFromEncryptedFile(FileName, RemoveUserList);
if ( NO_ERROR != RetCode ){
CString ErrMsg;
TCHAR ErrCode[16];
if (ERROR_ACCESS_DENIED != RetCode) {
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_REMOVEUSERERR, ErrCode );
} else {
ErrMsg.LoadString(IDS_REMOVEUSERDENIED);
}
MessageBox(ErrMsg);
} else {
//
// Reflect the error happened
//
RetCode = RetCodeBak;
}
}
if (AddUserList){
delete [] AddUserList;
}
if (RemoveUserList){
delete [] RemoveUserList;
}
return RetCode;
}
DWORD
USERLIST::AddNewUsers(CUsers &NewUser)
{
DWORD RetCode = ERROR_SUCCESS;
m_UserListCtrl.DeleteAllItems( );
RetCode = m_Users.Add(NewUser);
SetUpListBox(NULL);
return RetCode;
}
void USERLIST::SetUpListBox(BOOL *EnableAdd)
{
PVOID EnumHandle;
try{
CString NoCertName;
NoCertName.LoadString(IDS_NOCERTNAME);
if (EnumHandle = m_Users.StartEnum()){
LV_ITEM fillItem;
fillItem.mask = LVIF_TEXT;
//
// At least one user is available
//
while ( EnumHandle ){
CString CertName;
CString CertHash;
fillItem.iItem = 0;
fillItem.iSubItem = 0;
EnumHandle = m_Users.GetNextUser(EnumHandle, CertName, CertHash);
if (!EnumHandle && CertName.IsEmpty() && CertHash.IsEmpty()) {
//
// No more items.
//
break;
}
if (CertName.IsEmpty()){
fillItem.pszText = NoCertName.GetBuffer(NoCertName.GetLength() + 1);
} else {
fillItem.pszText = CertName.GetBuffer(CertName.GetLength() + 1);
}
//
// Add the user to the list
//
fillItem.iItem = m_UserListCtrl.InsertItem(&fillItem);
if (CertName.IsEmpty()){
NoCertName.ReleaseBuffer();
} else {
CertName.ReleaseBuffer();
}
if ( fillItem.iItem != -1 ){
if ( EnableAdd ){
*EnableAdd = TRUE;
}
if (CertHash.IsEmpty()){
fillItem.pszText = NULL;
} else {
fillItem.pszText = CertHash.GetBuffer(CertHash.GetLength() + 1);
}
fillItem.iSubItem = 1;
m_UserListCtrl.SetItem(&fillItem);
if (!CertHash.IsEmpty()){
CertHash.ReleaseBuffer();
}
}
}
}
if (EnableAdd){
//
// From the dialog init. Do the Rec list as well
//
if (EnumHandle = m_Recs.StartEnum()){
LV_ITEM fillItem;
fillItem.mask = LVIF_TEXT;
//
// At least one user is available
//
while ( EnumHandle ){
CString CertName;
CString CertHash;
fillItem.iItem = 0;
fillItem.iSubItem = 0;
EnumHandle = m_Recs.GetNextUser(EnumHandle, CertName, CertHash);
if (!EnumHandle && CertName.IsEmpty() && CertHash.IsEmpty()) {
//
// No more items.
//
break;
}
//
// Add the agent to the list
//
if (CertName.IsEmpty()){
fillItem.pszText = NoCertName.GetBuffer(NoCertName.GetLength() + 1);
} else {
fillItem.pszText = CertName.GetBuffer(CertName.GetLength() + 1);
}
fillItem.iItem = m_RecoveryListCtrl.InsertItem(&fillItem);
if (CertName.IsEmpty()){
NoCertName.ReleaseBuffer();
} else {
CertName.ReleaseBuffer();
}
if ( fillItem.iItem != -1 ){
if (CertHash.IsEmpty()){
fillItem.pszText = NULL;
} else {
fillItem.pszText = CertHash.GetBuffer(CertHash.GetLength() + 1);
}
fillItem.iSubItem = 1;
m_RecoveryListCtrl.SetItem(&fillItem);
if (!CertHash.IsEmpty()){
CertHash.ReleaseBuffer();
}
}
}
}
}
}
catch(...){
m_UserListCtrl.DeleteAllItems( );
m_RecoveryListCtrl.DeleteAllItems( );
if ( EnableAdd ){
*EnableAdd = FALSE;
}
}
}
DWORD
USERLIST::GetCertNameFromCertContext(
PCCERT_CONTEXT CertContext,
LPTSTR * UserDispName
)
//////////////////////////////////////////////////////////////////////
// Routine Description:
// Get the user name from the certificate
// Arguments:
// CertContext -- Cert Context
// UserCertName -- User Common Name
// ( Caller is responsible to delete this memory using delete [] )
// Return Value:
// ERROR_SUCCESS if succeed.
// If No Name found. "USER_UNKNOWN is returned".
//
//////////////////////////////////////////////////////////////////////
{
DWORD NameLength;
DWORD UserNameBufLen = 0;
DWORD BlobLen = 0;
PCERT_EXTENSION AlterNameExt = NULL;
BOOL b;
LPTSTR DNSName = NULL;
LPTSTR UPNName = NULL;
LPTSTR CommonName = NULL;
if ( NULL == UserDispName ){
return ERROR_SUCCESS;
}
*UserDispName = NULL;
AlterNameExt = CertFindExtension(
szOID_SUBJECT_ALT_NAME2,
CertContext->pCertInfo->cExtension,
CertContext->pCertInfo->rgExtension
);
if (AlterNameExt){
//
// Find the alternative name
//
b = CryptDecodeObject(
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
szOID_SUBJECT_ALT_NAME ,
AlterNameExt->Value.pbData,
AlterNameExt->Value.cbData,
0,
NULL,
&BlobLen
);
if (b){
//
// Let's decode it
//
CERT_ALT_NAME_INFO *AltNameInfo = NULL;
AltNameInfo = (CERT_ALT_NAME_INFO *) new BYTE[BlobLen];
if (AltNameInfo){
b = CryptDecodeObject(
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
szOID_SUBJECT_ALT_NAME,
AlterNameExt->Value.pbData,
AlterNameExt->Value.cbData,
0,
AltNameInfo,
&BlobLen
);
if (b){
//
// Now search for the UPN, SPN, DNS, EFS name
//
DWORD cAltEntry = AltNameInfo->cAltEntry;
DWORD ii = 0;
while (ii < cAltEntry){
if ((AltNameInfo->rgAltEntry[ii].dwAltNameChoice == CERT_ALT_NAME_OTHER_NAME ) &&
!strcmp(szOID_NT_PRINCIPAL_NAME, AltNameInfo->rgAltEntry[ii].pOtherName->pszObjId)
){
//
// We found the UPN name
//
CERT_NAME_VALUE* CertUPNName = NULL;
b = CryptDecodeObject(
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
X509_UNICODE_ANY_STRING,
AltNameInfo->rgAltEntry[ii].pOtherName->Value.pbData,
AltNameInfo->rgAltEntry[ii].pOtherName->Value.cbData,
0,
NULL,
&BlobLen
);
if (b){
CertUPNName = (CERT_NAME_VALUE *) new BYTE[BlobLen];
if (CertUPNName){
b = CryptDecodeObject(
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
X509_UNICODE_ANY_STRING,
AltNameInfo->rgAltEntry[ii].pOtherName->Value.pbData,
AltNameInfo->rgAltEntry[ii].pOtherName->Value.cbData,
0,
CertUPNName,
&BlobLen
);
if (b){
UPNName = (LPTSTR)new BYTE[CertUPNName->Value.cbData + sizeof(WCHAR)];
if (UPNName){
wcscpy(UPNName, (LPCTSTR) CertUPNName->Value.pbData);
}
}
delete [] CertUPNName;
if (UPNName){
//
// Got the UPN name. Stop searching.
//
break;
}
}
}
} else {
//
// Check for other alternative name
//
if (AltNameInfo->rgAltEntry[ii].dwAltNameChoice == CERT_ALT_NAME_DNS_NAME){
DNSName = AltNameInfo->rgAltEntry[ii].pwszDNSName;
}
}
ii++;
}
if ( NULL == UPNName ){
//
// No UPN name, let's get the other option
//
if (DNSName){
UPNName = (LPTSTR)new TCHAR[wcslen( DNSName ) + 1];
if (UPNName){
wcscpy(UPNName, DNSName);
}
}
}
}
delete [] AltNameInfo;
}
}
}
NameLength = CertGetNameString(
CertContext,
CERT_NAME_SIMPLE_DISPLAY_TYPE,
0,
NULL,
NULL,
0
);
if ( NameLength > 1){
//
// The display name exist. Go get the display name.
//
CommonName = new TCHAR[NameLength];
if ( NULL == CommonName ){
if (UPNName){
delete [] UPNName;
}
return ERROR_NOT_ENOUGH_MEMORY;
}
UserNameBufLen = NameLength;
NameLength = CertGetNameString(
CertContext,
CERT_NAME_SIMPLE_DISPLAY_TYPE,
0,
NULL,
CommonName,
UserNameBufLen
);
ASSERT (NameLength == UserNameBufLen);
}
if (CommonName || UPNName){
NameLength = 3;
if (CommonName){
NameLength += wcslen(CommonName);
}
if (UPNName){
NameLength += wcslen(UPNName);
}
*UserDispName = new TCHAR[NameLength];
if (CommonName){
wcscpy(*UserDispName, CommonName);
if (UPNName){
wcscat(*UserDispName, L"(");
wcscat(*UserDispName, UPNName);
wcscat(*UserDispName, L")");
}
} else {
wcscpy(*UserDispName, UPNName);
}
if (CommonName){
delete [] CommonName;
}
if (UPNName){
delete [] UPNName;
}
return ERROR_SUCCESS;
}
try {
CString UnknownCertName;
UnknownCertName.LoadString(IDS_NOCERTNAME);
UserNameBufLen = UnknownCertName.GetLength();
*UserDispName = new TCHAR[UserNameBufLen + 1];
_tcscpy( *UserDispName, UnknownCertName);
}
catch (...){
return ERROR_NOT_ENOUGH_MEMORY;
}
return ERROR_SUCCESS;
}
void USERLIST::OnAdd()
{
CRYPTUI_SELECTCERTIFICATE_STRUCTW cryptUI;
HCERTSTORE otherStore;
HCERTSTORE trustedStore;
HCERTSTORE memStore;
HCERTSTORE localStore[2];
PCCERT_CONTEXT selectedCert;
CString DlgTitle;
CString DispText;
LPTSTR UserDispName;
HRESULT hr;
DWORD rc;
DWORD StoreNum = 0;
DWORD StoreIndex = 0xffffffff;
BOOL EfsEkuExist = FALSE;
DWORD ii;
BOOL ContinueProcess = TRUE;
otherStore = CertOpenStore(
CERT_STORE_PROV_SYSTEM_W,
0, // dwEncodingType
0, // hCryptProv,
CERT_SYSTEM_STORE_CURRENT_USER | CERT_STORE_MAXIMUM_ALLOWED_FLAG,
OTHERPEOPLE
);
trustedStore = CertOpenStore(
CERT_STORE_PROV_SYSTEM_W,
0, // dwEncodingType
0, // hCryptProv,
CERT_SYSTEM_STORE_CURRENT_USER | CERT_STORE_MAXIMUM_ALLOWED_FLAG,
TRUSTEDPEOPLE
);
if (otherStore) {
localStore[0] = otherStore;
StoreNum++;
}
if (trustedStore) {
localStore[StoreNum] = trustedStore;
StoreNum++;
}
memStore = CertOpenStore(
CERT_STORE_PROV_MEMORY,
0,
0,
CERT_STORE_MAXIMUM_ALLOWED_FLAG,
NULL
);
if (!memStore) {
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(GetLastError(), ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_INTERNALERROR, ErrCode );
MessageBox(ErrMsg);
if (otherStore) {
CertCloseStore( otherStore, 0 );
}
if (trustedStore) {
CertCloseStore( trustedStore, 0 );
}
return;
}
//
// Let's put it into a memory store to eliminate the redundancy
//
ii = 0;
while ( (ii < StoreNum) && ContinueProcess ) {
PCCERT_CONTEXT pCertContext = NULL;
while (pCertContext = CertEnumCertificatesInStore(
localStore[ii],
pCertContext
)) {
if (!CertAddCertificateLinkToStore(
memStore,
pCertContext,
CERT_STORE_ADD_USE_EXISTING,
NULL
)){
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(GetLastError(), ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_INTERNALERROR, ErrCode );
MessageBox(ErrMsg);
ContinueProcess = FALSE;
break;
}
}
ii++;
}
if (!ContinueProcess) {
if (otherStore) {
CertCloseStore( otherStore, 0 );
}
if (trustedStore) {
CertCloseStore( trustedStore, 0 );
}
CertCloseStore( memStore, 0 );
return;
}
if (StoreNum != 0) {
RtlZeroMemory(&cryptUI, sizeof (CRYPTUI_SELECTCERTIFICATE_STRUCTW));
cryptUI.dwSize = sizeof (CRYPTUI_SELECTCERTIFICATE_STRUCTW);
cryptUI.dwFlags = CRYPTUI_SELECTCERT_ADDFROMDS;
cryptUI.cDisplayStores = 1;
cryptUI.rghDisplayStores = &memStore;
cryptUI.pFilterCallback = EfsFilter;
cryptUI.dwDontUseColumn = CRYPTUI_SELECT_LOCATION_COLUMN | CRYPTUI_SELECT_ISSUEDBY_COLUMN | CRYPTUI_SELECT_INTENDEDUSE_COLUMN;
if (DlgTitle.LoadString(IDS_DLGTITLE)){
cryptUI.szTitle = (LPCWSTR) DlgTitle.GetBuffer(DlgTitle.GetLength() + 1);
}
if (DispText.LoadString(IDS_DISPTEXT)){
cryptUI.szDisplayString = (LPCWSTR) DispText.GetBuffer(DispText.GetLength() + 1);
}
selectedCert = CryptUIDlgSelectCertificateW(&cryptUI);
if ( selectedCert ){
PCCERT_CHAIN_CONTEXT pChainContext;
//
// Let's first see if the cert is from DS, if Yes, add the EFS EKU first if no EKU.
//
StoreIndex = CertInStore(localStore, StoreNum, selectedCert);
if (StoreIndex >= StoreNum){
//
// The cert is not in the local stores. Let's see if we need add the EKU or not.
//
EfsEkuExist = EfsFilter(selectedCert, NULL, NULL);
if (!EfsEkuExist) {
//
// Let's add the EFS EKU
//
CTL_USAGE EfsEkuUsage;
DWORD cbEncoded;
void *pbEncoded;
CRYPT_DATA_BLOB EfsEkuBlob;
EfsEkuUsage.cUsageIdentifier = 1; // Only adding EFS EKU
EfsEkuUsage.rgpszUsageIdentifier = &EfsOidlpstr;
if(!CryptEncodeObjectEx(
X509_ASN_ENCODING,
szOID_ENHANCED_KEY_USAGE,
&EfsEkuUsage,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // Use LocalFree
&pbEncoded,
&cbEncoded
)){
//
// Failed to encode the EFS EKU
//
CString ErrMsg;
TCHAR ErrCode[16];
ContinueProcess = FALSE;
_ltot(GetLastError(), ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_ADDEFSEKUFAIL, ErrCode );
MessageBox(ErrMsg);
} else {
//
// Now let's add the EKU to the cert
//
EfsEkuBlob.cbData=cbEncoded;
EfsEkuBlob.pbData=(BYTE *)pbEncoded;
if(!CertSetCertificateContextProperty(
selectedCert,
CERT_ENHKEY_USAGE_PROP_ID,
0,
&EfsEkuBlob)){
//
// Failed to add the EFS EKU
//
CString ErrMsg;
TCHAR ErrCode[16];
ContinueProcess = FALSE;
_ltot(GetLastError(), ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_ADDEFSEKUFAIL, ErrCode );
MessageBox(ErrMsg);
}
}
}
}
//
// Let's validate the cert first
//
if (ContinueProcess && CertGetCertificateChain (
HCCE_CURRENT_USER,
selectedCert,
NULL,
NULL,
&m_CertChainPara,
CERT_CHAIN_REVOCATION_CHECK_CHAIN,
NULL,
&pChainContext
)) {
PCERT_SIMPLE_CHAIN pChain = pChainContext->rgpChain[ 0 ];
PCERT_CHAIN_ELEMENT pElement = pChain->rgpElement[ 0 ];
BOOL bSelfSigned = pElement->TrustStatus.dwInfoStatus & CERT_TRUST_IS_SELF_SIGNED;
BOOL ContinueAdd = TRUE;
DWORD dwErrorStatus = pChainContext->TrustStatus.dwErrorStatus;
if (0 == (dwErrorStatus & ~CERT_TRUST_REVOCATION_STATUS_UNKNOWN)) {
//
// The validation succeed. If the cert is from the DS (not in the store we opened), we will put it
// in the my Other People's store
//
if (StoreIndex >= StoreNum) {
//
// The cert is not in our local stores. Add it to the other people
//
if (otherStore) {
if(!CertAddCertificateContextToStore(
otherStore,
selectedCert,
CERT_STORE_ADD_NEW,
NULL) ) {
//
// The error code is only for debug.
// If we failed to add the cert to other People store,
// it is fine to continue
//
rc = GetLastError();
}
}
}
} else {
//
// The cert validation failed, as the user if we will accept the cert. If yes, the cert
// will be added to my TrustedPeople.
//
// (((dwErrorStatus & ~CERT_TRUST_REVOCATION_STATUS_UNKNOWN) == CERT_TRUST_IS_UNTRUSTED_ROOT) && bSelfSigned) {
if (bSelfSigned && !(dwErrorStatus & (CERT_TRUST_IS_NOT_TIME_VALID |
CERT_TRUST_IS_NOT_SIGNATURE_VALID |
CERT_TRUST_IS_NOT_VALID_FOR_USAGE))){
//
// A self signed cert. Ask the user if he would like to accept.
// If it is already in the trusted store, we can skip the pop up.
//
DWORD StoreIndex;
if (trustedStore) {
StoreIndex = CertInStore(&trustedStore, 1, selectedCert);
}
if (StoreIndex >= 1) {
CString ErrMsg;
TCHAR ErrCode[16];
int buttonID;
_ltot(GetLastError(), ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_ACCEPTSELFCERT, ErrCode );
buttonID = MessageBox(ErrMsg, NULL, MB_ICONQUESTION | MB_YESNO);
if (IDYES == buttonID) {
//
// User Accepted the cert.
//
if (trustedStore) {
if(!CertAddCertificateContextToStore(
trustedStore,
selectedCert,
CERT_STORE_ADD_NEW,
NULL) ) {
//
// The error code is only for debug.
// If we failed to add the cert to other People store,
// it is fine to continue
//
rc = GetLastError();
}
}
} else {
//
// User declined the cert.
//
ContinueAdd = FALSE;
}
}
} else {
//
// Let's get the error code of the chain building.
//
CERT_CHAIN_POLICY_PARA PolicyPara;
CERT_CHAIN_POLICY_STATUS PolicyStatus;
ContinueAdd = FALSE;
RtlZeroMemory(&PolicyPara, sizeof(CERT_CHAIN_POLICY_PARA));
RtlZeroMemory(&PolicyStatus, sizeof(CERT_CHAIN_POLICY_STATUS));
PolicyPara.cbSize = sizeof(CERT_CHAIN_POLICY_PARA);
PolicyStatus.cbSize = sizeof(CERT_CHAIN_POLICY_STATUS);
if (CertVerifyCertificateChainPolicy(
CERT_CHAIN_POLICY_BASE,
pChainContext,
&PolicyPara,
&PolicyStatus
) && PolicyStatus.dwError ) {
//
// Display the error to the user.
//
DWORD len;
LPWSTR DisplayBuffer;
len = FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_ALLOCATE_BUFFER,
NULL, PolicyStatus.dwError, 0,
(LPWSTR)&DisplayBuffer, 0, NULL);
if (len && DisplayBuffer) {
MessageBox(DisplayBuffer);
LocalFree(DisplayBuffer);
}
}
}
}
CertFreeCertificateChain( pChainContext );
if (ContinueAdd) {
hr = GetCertNameFromCertContext(selectedCert, &UserDispName);
if ( ERROR_SUCCESS == hr ){
EFS_CERTIFICATE_BLOB CertBlob;
CertBlob.cbData = selectedCert->cbCertEncoded;
CertBlob.pbData = selectedCert->pbCertEncoded;
CertBlob.dwCertEncodingType = selectedCert->dwCertEncodingType;
hr = m_Users.Add(
UserDispName,
(PVOID)&CertBlob,
NULL,
USERADDED,
(PVOID)selectedCert
);
if ( (ERROR_SUCCESS != hr) && (CRYPT_E_EXISTS != hr) ){
//
// Error in adding the user
//
CertFreeCertificateContext(selectedCert);
selectedCert = NULL;
} else {
//
// We could just insert the items here to improve the performace.
// But we don't have the time right now. We could fix this later
// if performance is a problem here.
//
m_UserListCtrl.DeleteAllItems( );
SetUpListBox(NULL);
if ( hr == ERROR_SUCCESS ){
//
// UserDispName is used in m_Users.Add
//
UserDispName = NULL;
}
/* This is the old code when we have the single list.
//
// Add the user to the list box.
//
if ( hr == ERROR_SUCCESS ){
if (m_UsersList.AddString(UserDispName) < 0){
//
// Error to add to the list box
//
m_Users.Remove(UserDispName);
}
UserDispName = NULL;
} else {
//
// Let's check if we need to add this to the list box.
//
if (m_UsersList.FindStringExact( 0, UserDispName ) < 0){
//
// Not found
//
if (m_UsersList.AddString(UserDispName) < 0){
//
// Error to add to the list box
//
m_Users.Remove(UserDispName);
}
}
}
*/
}
if (UserDispName){
delete [] UserDispName;
}
} else {
CertFreeCertificateContext(selectedCert);
}
}
} else {
CString ErrMsg;
TCHAR ErrCode[16];
CertFreeCertificateContext(selectedCert);
if (ContinueProcess) {
//
// The error has not been processed.
//
_ltot(GetLastError(), ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_COULDNOTVERIFYCERT, ErrCode );
MessageBox(ErrMsg);
}
}
}
if (!DlgTitle.IsEmpty()){
DlgTitle.ReleaseBuffer();
}
if (!DispText.IsEmpty()){
DispText.ReleaseBuffer();
}
if (otherStore) {
CertCloseStore( otherStore, 0 );
}
if (trustedStore) {
CertCloseStore( trustedStore, 0 );
}
}
CertCloseStore( memStore, 0 );
return;
}
DWORD USERLIST::TryGetBetterNameInCert(PEFS_HASH_BLOB HashData, LPTSTR *UserName)
{
HCERTSTORE localStore;
PCCERT_CONTEXT pCertContext;
DWORD retCode;
//
// We will add the remote case later
//
localStore = CertOpenStore(
CERT_STORE_PROV_SYSTEM_W,
0, // dwEncodingType
0, // hCryptProv,
CERT_SYSTEM_STORE_CURRENT_USER | CERT_STORE_MAXIMUM_ALLOWED_FLAG,
TRUSTEDPEOPLE
);
if (localStore != NULL) {
//
// Let's try to the cert in the store
//
pCertContext = CertFindCertificateInStore( localStore,
CRYPT_ASN_ENCODING,
0,
CERT_FIND_HASH,
(CRYPT_HASH_BLOB *)HashData,
NULL
);
if ( pCertContext ){
retCode = GetCertNameFromCertContext(
pCertContext,
UserName
);
CertFreeCertificateContext(pCertContext);
}
else {
retCode = GetLastError();
}
CertCloseStore( localStore, 0 );
} else {
retCode = GetLastError();
}
return retCode;
}
DWORD USERLIST::CertInStore(HCERTSTORE *pStores, DWORD StoreNum, PCCERT_CONTEXT selectedCert)
{
DWORD ii = 0;
PCCERT_CONTEXT pCert = NULL;
while (ii < StoreNum) {
pCert = CertFindCertificateInStore(
pStores[ii],
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
0,
CERT_FIND_EXISTING,
selectedCert,
pCert
);
if (pCert) {
//
// We found it.
//
CertFreeCertificateContext(pCert);
break;
}
ii++;
}
return ii;
}
void USERLIST::OnSetfocusListuser(NMHDR* pNMHDR, LRESULT* pResult)
{
int ItemPos;
ShowRemove();
ShowBackup();
ItemPos = m_UserListCtrl.GetNextItem( -1, LVNI_SELECTED );
if ( ItemPos == -1 ){
m_UserListCtrl.SetItem(0, 0, LVIF_STATE, NULL, 0, LVIS_SELECTED, LVIS_SELECTED, 0);
}
*pResult = 0;
}
void USERLIST::OnKillfocusListuser(NMHDR* pNMHDR, LRESULT* pResult)
{
ShowRemove();
ShowBackup();
*pResult = 0;
}
void USERLIST::OnItemchangedListuser(NMHDR* pNMHDR, LRESULT* pResult)
{
NM_LISTVIEW* pNMListView = (NM_LISTVIEW*)pNMHDR;
ShowRemove();
ShowBackup();
*pResult = 0;
}
void USERLIST::OnSetfocusListra(NMHDR* pNMHDR, LRESULT* pResult)
{
int ItemPos;
ItemPos = m_RecoveryListCtrl.GetNextItem( -1, LVNI_SELECTED );
if ( ItemPos == -1 ){
if (m_RecoveryListCtrl.GetItemCount( ) > 0){
m_RecoveryListCtrl.SetItem(0, 0, LVIF_STATE, NULL, 0, LVIS_SELECTED, LVIS_SELECTED, 0);
}
}
*pResult = 0;
}
void USERLIST::OnBackup()
{
int ItemPos;
DWORD rc;
PCRYPT_HASH_BLOB pHashBlob;
PCCERT_CONTEXT pCertContext = NULL;
PCRYPT_KEY_PROV_INFO pCryptKeyProvInfo = NULL;
HCRYPTKEY hLocalKey = 0;
HCRYPTPROV hLocalProv = 0;
BOOLEAN ValidCertFound = FALSE;
BOOL NoAction = FALSE;
CString NoCertName;
try{
NoCertName.LoadString(IDS_NOCERTNAME);
}
catch(...){
NoAction = TRUE;
}
if (NoAction){
return;
}
//
// Get the selected item first
//
ItemPos = m_UserListCtrl.GetNextItem( -1, LVNI_SELECTED );
if ( ItemPos != -1 ){
//
// Get the hash
//
CString CertName;
LPTSTR pCertName;
BOOLEAN ReleaseCertContext = FALSE;
CertName = m_UserListCtrl.GetItemText( ItemPos, 0 );
if ( !CertName.Compare(NoCertName) ){
pCertName = NULL;
} else {
pCertName = CertName.GetBuffer(CertName.GetLength() + 1);
}
rc = m_Users.GetCertInfo(
pCertName,
(PVOID *) &pHashBlob,
(PVOID *) &pCertContext
);
if (pCertName){
CertName.ReleaseBuffer();
}
if (rc == ERROR_SUCCESS) {
if (pCertContext == NULL) {
//
// We don't have the cert context. Try to create one
//
pCertContext = GetCertInMyStore(pHashBlob);
if (pCertContext) {
ReleaseCertContext = TRUE;
} else {
rc = GetLastError();
}
}
//
// We should have the cert context now
//
if (pCertContext) {
//
// Now try to get the keys.
//
ValidCertFound = CertHasKey(pCertContext);
if (ValidCertFound) {
BOOL bRet;
//
// Now do the export
//
CRYPTUI_WIZ_EXPORT_INFO myWizardInfo;
RtlZeroMemory(&myWizardInfo, sizeof (CRYPTUI_WIZ_EXPORT_INFO));
myWizardInfo.dwSize = sizeof(CRYPTUI_WIZ_EXPORT_INFO);
myWizardInfo.dwSubjectChoice = CRYPTUI_WIZ_EXPORT_CERT_CONTEXT;
myWizardInfo.pCertContext = pCertContext;
bRet = CryptUIWizExport(
CRYPTUI_WIZ_EXPORT_PRIVATE_KEY | CRYPTUI_WIZ_EXPORT_NO_DELETE_PRIVATE_KEY,
NULL,
NULL,
&myWizardInfo,
NULL
);
if (!bRet) {
//
// Give the error message
//
rc = GetLastError();
if (ERROR_CANCELLED != rc) {
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(rc, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCERTORKEY, ErrCode );
MessageBox(ErrMsg);
}
}
} else {
//
// Give the error message
//
CString ErrMsg;
TCHAR ErrCode[16];
rc = GetLastError();
_ltot(rc, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCERTORKEY, ErrCode );
MessageBox(ErrMsg);
}
if (ReleaseCertContext) {
CertFreeCertificateContext( pCertContext );
}
} else {
//
// The cert is not available
//
//
// Give the error message
//
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(rc, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCERTORKEY, ErrCode );
MessageBox(ErrMsg);
}
} else {
//
// We should not come here. The user were added by us. We expect to find him in our list.
//
ASSERT(FALSE);
return;
}
}
}
void USERLIST::ShowBackup()
{
if (m_UserListCtrl.GetSelectedCount() == 1){
//
// Enable the Backup Button
//
m_BackupButton.EnableWindow( TRUE );
} else {
//
// Disable the Backup Button
//
m_BackupButton.EnableWindow( FALSE );
}
}
PCCERT_CONTEXT
GetCertInMyStore(
PCRYPT_HASH_BLOB pHashBlob
)
{
DWORD rc = ERROR_SUCCESS;
HCERTSTORE myStore;
PCCERT_CONTEXT pCertContext = NULL;
myStore = CertOpenStore(
CERT_STORE_PROV_SYSTEM_REGISTRY_W,
0, // dwEncodingType
0, // hCryptProv,
CERT_SYSTEM_STORE_CURRENT_USER,
L"My"
);
if (myStore != NULL) {
//
// Let's try to get the cert in the store
//
pCertContext = CertFindCertificateInStore( myStore,
CRYPT_ASN_ENCODING,
0,
CERT_FIND_HASH,
pHashBlob,
NULL
);
if (pCertContext == NULL) {
rc = GetLastError();
}
CertCloseStore( myStore, 0 );
if (rc != ERROR_SUCCESS) {
SetLastError(rc);
}
}
return pCertContext;
}
PCRYPT_KEY_PROV_INFO
GetKeyProvInfo(
PCCERT_CONTEXT pCertContext
)
{
DWORD cbData = 0;
BOOL b;
PCRYPT_KEY_PROV_INFO pCryptKeyProvInfo = NULL;
b = CertGetCertificateContextProperty(
pCertContext,
CERT_KEY_PROV_INFO_PROP_ID,
NULL,
&cbData
);
if (b) {
pCryptKeyProvInfo = (PCRYPT_KEY_PROV_INFO) new BYTE[cbData];
if (pCryptKeyProvInfo != NULL) {
b = CertGetCertificateContextProperty(
pCertContext,
CERT_KEY_PROV_INFO_PROP_ID,
pCryptKeyProvInfo,
&cbData
);
if (!b) {
delete [] pCryptKeyProvInfo;
pCryptKeyProvInfo = NULL;
}
} else {
SetLastError( ERROR_NOT_ENOUGH_MEMORY );
}
}
return ( pCryptKeyProvInfo );
}
BOOLEAN
CertHasKey(
PCCERT_CONTEXT pCertContext
)
{
PCRYPT_KEY_PROV_INFO pCryptKeyProvInfo = NULL;
DWORD rc = ERROR_SUCCESS;
HCRYPTKEY hLocalKey = 0;
HCRYPTPROV hLocalProv = 0;
BOOLEAN ValidCertFound = FALSE;
pCryptKeyProvInfo = GetKeyProvInfo( pCertContext );
if (pCryptKeyProvInfo) {
if (CryptAcquireContext( &hLocalProv, pCryptKeyProvInfo->pwszContainerName, pCryptKeyProvInfo->pwszProvName, PROV_RSA_FULL, CRYPT_SILENT)) {
if (CryptGetUserKey(hLocalProv, AT_KEYEXCHANGE, &hLocalKey)) {
//
// We found the key. Let's add the cert to Memory store
//
ValidCertFound = TRUE;
CryptDestroyKey( hLocalKey );
} else {
rc = GetLastError();
}
CryptReleaseContext( hLocalProv, 0 );
} else {
rc = GetLastError();
}
delete [] pCryptKeyProvInfo;
}
if (rc != ERROR_SUCCESS) {
SetLastError(rc);
}
return ValidCertFound;
}
void CALLBACK
BackCurrentEfsCert(
HWND hwnd,
HINSTANCE hinst,
LPWSTR lpszCmdLine,
int nCmdShow
)
{
DWORD RetCode;
HKEY hRegKey = NULL;
CRYPT_HASH_BLOB HashBlob;
PCCERT_CONTEXT pCertContext=NULL;
AFX_MANAGE_STATE(AfxGetStaticModuleState());
RetCode = RegOpenKeyEx(
HKEY_CURRENT_USER,
KEYPATH,
0,
GENERIC_READ,
&hRegKey
);
if (RetCode == ERROR_SUCCESS) {
DWORD Type;
RetCode = RegQueryValueEx(
hRegKey,
CERT_HASH,
NULL,
&Type,
NULL,
&(HashBlob.cbData)
);
if (RetCode == ERROR_SUCCESS) {
//
// Query out the thumbprint, find the cert, and return the key information.
//
if ( HashBlob.pbData = (PBYTE) malloc(HashBlob.cbData) ) {
RetCode = RegQueryValueEx(
hRegKey,
CERT_HASH,
NULL,
&Type,
HashBlob.pbData,
&(HashBlob.cbData)
);
if (RetCode == ERROR_SUCCESS) {
//
// We get the cert hash.
//
pCertContext = GetCertInMyStore(&HashBlob);
if (pCertContext != NULL) {
BOOLEAN ValidCertFound;
//
// Let's try to see if keys are available
//
ValidCertFound = CertHasKey(pCertContext);
if (ValidCertFound) {
BOOL bRet;
//
// Now do the export
//
CRYPTUI_WIZ_EXPORT_INFO myWizardInfo;
RtlZeroMemory(&myWizardInfo, sizeof (CRYPTUI_WIZ_EXPORT_INFO));
myWizardInfo.dwSize = sizeof(CRYPTUI_WIZ_EXPORT_INFO);
myWizardInfo.dwSubjectChoice = CRYPTUI_WIZ_EXPORT_CERT_CONTEXT;
myWizardInfo.pCertContext = pCertContext;
if (!CryptUIWizExport(
CRYPTUI_WIZ_EXPORT_PRIVATE_KEY | CRYPTUI_WIZ_EXPORT_NO_DELETE_PRIVATE_KEY,
NULL,
NULL,
&myWizardInfo,
NULL
)){
RetCode = GetLastError();
if (ERROR_CANCELLED != RetCode) {
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCERTORKEY, ErrCode );
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
}
} else {
//
// Cert has no key.
//
RetCode = GetLastError();
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCERTORKEY, ErrCode );
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
CertFreeCertificateContext( pCertContext );
pCertContext = NULL;
} else {
//
// Cert not find in MY store
//
RetCode = GetLastError();
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_CERTNOTINMY, ErrCode );
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
} else {
//
// Error in read EFS current key. Not likely to happen.
//
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCRNTCERT, ErrCode );
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
free(HashBlob.pbData);
} else {
//
// Out of memory
//
CString ErrMsg;
if (ErrMsg.LoadString(IDS_ERRORMEM)){
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
}
} else {
//
// No current EFS Cert
//
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCRNTCERT, ErrCode );
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
//
// Close the key handle
//
RegCloseKey( hRegKey );
} else {
//
// No current EFS Cert
//
CString ErrMsg;
TCHAR ErrCode[16];
_ltot(RetCode, ErrCode, 10 );
AfxFormatString1( ErrMsg, IDS_NOCRNTCERT, ErrCode );
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
}
void CALLBACK
AddUserToObjectW(
HWND hwnd,
HINSTANCE hinst,
LPWSTR lpszCmdLine,
int nCmdShow
)
{
DWORD FileAttributes = GetFileAttributes(lpszCmdLine);
if ((-1 == FileAttributes) || (!(FileAttributes & FILE_ATTRIBUTE_ENCRYPTED)) || ((FileAttributes & FILE_ATTRIBUTE_DIRECTORY))) {
AFX_MANAGE_STATE(AfxGetStaticModuleState());
if (-1 == FileAttributes) {
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NOOBJECT)){
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
return;
}
if ( !(FileAttributes & FILE_ATTRIBUTE_ENCRYPTED)){
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NOTENCRYPTED)){
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
return;
}
if ( (FileAttributes & FILE_ATTRIBUTE_DIRECTORY)){
CString ErrMsg;
if (ErrMsg.LoadString(IDS_NOADDUSERDIR)){
MessageBox(hwnd, ErrMsg, NULL, MB_OK);
}
return;
}
}
EfsDetail(hwnd, lpszCmdLine);
}