Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

698 lines
26 KiB

/////////////////////////////////////////////////////////////////////////////////
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 2000-2002.
//
// File: PolicyDlg.cpp
//
// Contents: Implementation of CPolicyDlg
//
//----------------------------------------------------------------------------
// PolicyDlg.cpp : implementation file
//
#include "stdafx.h"
#include "PolicyDlg.h"
#include "SelectOIDDlg.h"
#include "NewApplicationOIDDlg.h"
#include "NewIssuanceOIDDlg.h"
#ifdef _DEBUG
#define new DEBUG_NEW
#undef THIS_FILE
static char THIS_FILE[] = __FILE__;
#endif
/////////////////////////////////////////////////////////////////////////////
// CPolicyDlg property page
CPolicyDlg::CPolicyDlg(CWnd* pParent,
CCertTemplate& rCertTemplate,
PCERT_EXTENSION pCertExtension)
: CHelpDialog(CPolicyDlg::IDD, pParent),
m_rCertTemplate (rCertTemplate),
m_pCertExtension (pCertExtension),
m_bIsEKU ( !_stricmp (szOID_ENHANCED_KEY_USAGE, pCertExtension->pszObjId) ? true : false),
m_bIsApplicationPolicy ( !_stricmp (szOID_APPLICATION_CERT_POLICIES, pCertExtension->pszObjId) ? true : false),
m_bModified (false)
{
//{{AFX_DATA_INIT(CPolicyDlg)
// NOTE: the ClassWizard will add member initialization here
//}}AFX_DATA_INIT
}
CPolicyDlg::~CPolicyDlg()
{
}
void CPolicyDlg::DoDataExchange(CDataExchange* pDX)
{
CHelpDialog::DoDataExchange(pDX);
//{{AFX_DATA_MAP(CPolicyDlg)
DDX_Control(pDX, IDC_POLICIES_LIST, m_policyList);
//}}AFX_DATA_MAP
}
BEGIN_MESSAGE_MAP(CPolicyDlg, CHelpDialog)
//{{AFX_MSG_MAP(CPolicyDlg)
ON_WM_CANCELMODE()
ON_BN_CLICKED(IDC_ADD_POLICY, OnAddPolicy)
ON_BN_CLICKED(IDC_REMOVE_POLICY, OnRemovePolicy)
ON_BN_CLICKED(IDC_POLICY_CRITICAL, OnPolicyCritical)
ON_WM_DESTROY()
ON_LBN_SELCHANGE(IDC_POLICIES_LIST, OnSelchangePoliciesList)
ON_BN_CLICKED(IDC_EDIT_POLICY, OnEditPolicy)
ON_LBN_DBLCLK(IDC_POLICIES_LIST, OnDblclkPoliciesList)
//}}AFX_MSG_MAP
END_MESSAGE_MAP()
/////////////////////////////////////////////////////////////////////////////
// CPolicyDlg message handlers
BOOL CPolicyDlg::OnInitDialog()
{
_TRACE (1, L"Entering CPolicyDlg::OnInitDialog\n");
CHelpDialog::OnInitDialog();
CString text;
if ( m_bIsEKU )
{
VERIFY (text.LoadString (IDS_EDIT_APPLICATION_POLICIES_EXTENSION));
SetWindowText (text);
VERIFY (text.LoadString (IDS_EFFECTIVE_APPLICATION_POLICIES));
int nEKUIndex = 0;
CString szEKU;
while ( SUCCEEDED (m_rCertTemplate.GetEnhancedKeyUsage (nEKUIndex, szEKU)) )
{
// security review 2/21/2002 BryanWal ok
int nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) szEKU, // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
0, // buffer for new string
0, // size of buffer - API returns null terminator when 0
0, // default for unmappable chars
0); // set when default char used
if ( nLen > 0 )
{
PSTR pszAnsiBuf = new char[nLen];
if ( pszAnsiBuf )
{
// security review 2/21/2002 BryanWal ok
ZeroMemory (pszAnsiBuf, nLen);
// security review 2/21/2002 BryanWal ok
nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) szEKU, // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
pszAnsiBuf, // buffer for new string
nLen, // size of buffer
0, // default for unmappable chars
0); // set when default char used
if ( nLen )
{
CString szEKUName;
if ( MyGetOIDInfoA (szEKUName, pszAnsiBuf) )
{
int nIndex = m_policyList.AddString (szEKUName);
if ( nIndex >= 0 )
{
m_policyList.SetItemDataPtr (nIndex, pszAnsiBuf);
}
else
delete [] pszAnsiBuf;
}
else
delete [] pszAnsiBuf;
}
}
}
nEKUIndex++;
}
}
else if ( m_bIsApplicationPolicy )
{
VERIFY (text.LoadString (IDS_EDIT_APPLICATION_POLICIES_EXTENSION));
SetWindowText (text);
VERIFY (text.LoadString (IDS_EFFECTIVE_APPLICATION_POLICIES));
int nAppPolicyIndex = 0;
CString szAppPolicy;
while ( SUCCEEDED (m_rCertTemplate.GetApplicationPolicy (nAppPolicyIndex, szAppPolicy)) )
{
// security review 2/21/2002 BryanWal ok
int nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) szAppPolicy, // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
0, // buffer for new string
0, // size of buffer - 0 causes API to return len inc. null term.
0, // default for unmappable chars
0); // set when default char used
if ( nLen > 0 )
{
PSTR pszAnsiBuf = new char[nLen];
if ( pszAnsiBuf )
{
// security review 2/21/2002 BryanWal ok
ZeroMemory (pszAnsiBuf, nLen);
// security review 2/21/2002 BryanWal ok
nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) szAppPolicy, // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
pszAnsiBuf, // buffer for new string
nLen, // size of buffer
0, // default for unmappable chars
0); // set when default char used
if ( nLen )
{
CString szAppPolicyName;
if ( MyGetOIDInfoA (szAppPolicyName, pszAnsiBuf) )
{
int nIndex = m_policyList.AddString (szAppPolicyName);
if ( nIndex >= 0 )
{
m_policyList.SetItemDataPtr (nIndex, pszAnsiBuf);
}
else
delete [] pszAnsiBuf;
}
else
delete [] pszAnsiBuf;
}
}
}
nAppPolicyIndex++;
}
}
else
{
VERIFY (text.LoadString (IDS_EDIT_ISSUANCE_POLICIES_EXTENSION));
SetWindowText (text);
VERIFY (text.LoadString (IDS_ISSUANCE_POLICIES_HINT));
SetDlgItemText (IDC_POLICIES_HINT, text);
VERIFY (text.LoadString (IDS_EFFECTIVE_ISSUANCE_POLICIES));
int nCertPolicyIndex = 0;
CString szCertPolicy;
while ( SUCCEEDED (m_rCertTemplate.GetCertPolicy (nCertPolicyIndex, szCertPolicy)) )
{
// security review 2/21/2002 BryanWal ok
int nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) szCertPolicy, // wide-character string
// security review 2/21/2002 BryanWal ok
-1, // -1 - calculate length of null-terminated string automatically
0, // buffer for new string
0, // size of buffer - 0 causes API to return len inc. null term.
0, // default for unmappable chars
0); // set when default char used
if ( nLen > 0 )
{
PSTR pszAnsiBuf = new char[nLen];
if ( pszAnsiBuf )
{
// security review 2/21/2002 BryanWal ok
ZeroMemory (pszAnsiBuf, nLen);
// security review 2/21/2002 BryanWal ok
nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) szCertPolicy, // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
pszAnsiBuf, // buffer for new string
nLen, // size of buffer
0, // default for unmappable chars
0); // set when default char used
if ( nLen )
{
CString szPolicyName;
if ( MyGetOIDInfoA (szPolicyName, pszAnsiBuf) )
{
int nIndex = m_policyList.AddString (szPolicyName);
if ( nIndex >= 0 )
{
m_policyList.SetItemDataPtr (nIndex, pszAnsiBuf);
}
else
delete [] pszAnsiBuf;
}
else
delete [] pszAnsiBuf;
}
}
}
nCertPolicyIndex++;
}
}
SetDlgItemText (IDC_POLICIES_LABEL, text);
if ( 1 == m_rCertTemplate.GetType () )
{
GetDlgItem (IDC_POLICY_CRITICAL)->EnableWindow (FALSE);
GetDlgItem (IDC_POLICIES_LABEL)->EnableWindow (FALSE);
GetDlgItem (IDC_POLICIES_LIST)->EnableWindow (FALSE);
GetDlgItem (IDC_ADD_POLICY)->EnableWindow (FALSE);
GetDlgItem (IDC_REMOVE_POLICY)->EnableWindow (FALSE);
}
bool bCritical = false;
PWSTR pszOID = 0;
if ( m_bIsEKU )
pszOID = TEXT (szOID_ENHANCED_KEY_USAGE);
else if ( m_bIsApplicationPolicy )
pszOID = TEXT (szOID_APPLICATION_CERT_POLICIES);
else
pszOID = TEXT (szOID_CERT_POLICIES);
if ( SUCCEEDED (m_rCertTemplate.IsExtensionCritical (
pszOID,
bCritical)) && bCritical )
{
SendDlgItemMessage (IDC_POLICY_CRITICAL, BM_SETCHECK, BST_CHECKED);
}
EnableControls ();
_TRACE (-1, L"Leaving CPolicyDlg::OnInitDialog\n");
return TRUE; // return TRUE unless you set the focus to a control
// EXCEPTION: OCX Property Pages should return FALSE
}
void CPolicyDlg::OnCancelMode()
{
CHelpDialog::OnCancelMode();
if ( m_pCertExtension->fCritical )
SendDlgItemMessage (IDC_POLICY_CRITICAL, BM_SETCHECK, BST_CHECKED);
}
void CPolicyDlg::OnAddPolicy()
{
// Create the list of already added OIDs. These will not be displayed
// in the Select OID dialog.
int nCnt = m_policyList.GetCount ();
PSTR* paszUsedOIDs = 0;
// allocate an array of PSTR pointers and add each item.
// Set the last to NULL
if ( nCnt )
{
paszUsedOIDs = new PSTR[nCnt+1];
if ( paszUsedOIDs )
{
// security review 2/21/2002 BryanWal ok
::ZeroMemory (paszUsedOIDs, sizeof (PSTR) * (nCnt+1));
while (--nCnt >= 0)
{
PSTR pszOID = (PSTR) m_policyList.GetItemData (nCnt);
if ( pszOID )
{
// security review 2/21/2002 BryanWal ok
PSTR pNewStr = new char[strlen (pszOID) + 1];
if ( pNewStr )
{
// security review 2/21/2002 BryanWal ok
strcpy (pNewStr, pszOID);
paszUsedOIDs[nCnt] = pNewStr;
}
else
break;
}
}
}
}
CSelectOIDDlg dlg (this, m_pCertExtension, m_bIsEKU || m_bIsApplicationPolicy,
paszUsedOIDs);
CThemeContextActivator activator;
if ( IDOK == dlg.DoModal () )
{
if ( dlg.m_paszReturnedOIDs && dlg.m_paszReturnedFriendlyNames )
{
for (int nIndex = 0; !dlg.m_paszReturnedOIDs[nIndex].IsEmpty (); nIndex++)
{
// security review 2/21/2002 BryanWal ok
int nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) dlg.m_paszReturnedOIDs[nIndex], // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
0, // buffer for new string
0, // size of buffer - 0 causes API to return len inc. null term.
0, // default for unmappable chars
0); // set when default char used
if ( nLen > 0 )
{
PSTR pszAnsiBuf = new char[nLen];
if ( pszAnsiBuf )
{
// security review 2/21/2002 BryanWal ok
ZeroMemory (pszAnsiBuf, nLen);
// security review 2/21/2002 BryanWal ok
nLen = WideCharToMultiByte(
CP_ACP, // code page
0, // performance and mapping flags
(PCWSTR) dlg.m_paszReturnedOIDs[nIndex], // wide-character string
-1, // -1 - calculate length of null-terminated string automatically
pszAnsiBuf, // buffer for new string
nLen, // size of buffer
0, // default for unmappable chars
0); // set when default char used
if ( nLen )
{
int nAddedIndex = m_policyList.AddString (dlg.m_paszReturnedFriendlyNames[nIndex]);
if ( nAddedIndex >= 0 )
{
m_policyList.SetItemDataPtr (nAddedIndex, pszAnsiBuf);
m_policyList.SetSel (nAddedIndex, TRUE);
m_bModified = true;
EnableControls ();
}
}
else
{
_TRACE (0, L"WideCharToMultiByte (%s) failed: 0x%x\n",
(PCWSTR) dlg.m_paszReturnedOIDs[nIndex], GetLastError ());
}
}
}
else
{
_TRACE (0, L"WideCharToMultiByte (%s) failed: 0x%x\n",
(PCWSTR) dlg.m_paszReturnedOIDs[nIndex], GetLastError ());
}
}
}
}
// clean up
if ( paszUsedOIDs )
{
for (int nIndex = 0; paszUsedOIDs[nIndex]; nIndex++)
delete [] paszUsedOIDs[nIndex];
delete [] paszUsedOIDs;
}
}
void CPolicyDlg::OnRemovePolicy()
{
int nSelCnt = m_policyList.GetSelCount ();
if ( nSelCnt > 0 )
{
int* pnSelIndexes = new int[nSelCnt];
if ( pnSelIndexes )
{
if ( LB_ERR != m_policyList.GetSelItems (nSelCnt, pnSelIndexes) )
{
for (int nIndex = nSelCnt - 1; nIndex >= 0; nIndex--)
{
PSTR pszOID = (PSTR) m_policyList.GetItemDataPtr (pnSelIndexes[nIndex]);
if ( pszOID )
delete [] pszOID;
m_policyList.DeleteString (pnSelIndexes[nIndex]);
}
m_bModified = true;
}
delete [] pnSelIndexes;
}
}
m_policyList.SetFocus ();
EnableControls ();
}
void CPolicyDlg::EnableControls()
{
if ( 1 == m_rCertTemplate.GetType () )
{
GetDlgItem (IDOK)->EnableWindow (FALSE);
GetDlgItem (IDC_REMOVE_POLICY)->EnableWindow (FALSE);
GetDlgItem (IDC_ADD_POLICY)->EnableWindow (FALSE);
GetDlgItem (IDC_POLICY_CRITICAL)->EnableWindow (FALSE);
GetDlgItem (IDC_EDIT_POLICY)->EnableWindow (FALSE);
}
else
{
GetDlgItem (IDOK)->EnableWindow (m_bModified && !m_rCertTemplate.ReadOnly ());
GetDlgItem (IDC_REMOVE_POLICY)->EnableWindow (
m_policyList.GetSelCount () > 0 && !m_rCertTemplate.ReadOnly ());
GetDlgItem (IDC_ADD_POLICY)->EnableWindow (!m_rCertTemplate.ReadOnly ());
GetDlgItem (IDC_POLICY_CRITICAL)->EnableWindow (!m_rCertTemplate.ReadOnly ());
GetDlgItem (IDC_EDIT_POLICY)->EnableWindow (
m_policyList.GetSelCount () == 1 && !m_rCertTemplate.ReadOnly ());
}
}
void CPolicyDlg::OnPolicyCritical()
{
m_bModified = true;
EnableControls ();
}
void CPolicyDlg::OnDestroy()
{
CHelpDialog::OnDestroy();
int nCnt = m_policyList.GetCount ();
for (int nIndex = 0; nIndex < nCnt; nIndex++)
{
PSTR pszOID = (PSTR) m_policyList.GetItemDataPtr (nIndex);
if ( pszOID )
delete [] pszOID;
}
}
void CPolicyDlg::OnSelchangePoliciesList()
{
EnableControls ();
}
void CPolicyDlg::DoContextHelp (HWND hWndControl)
{
_TRACE(1, L"Entering CPolicyDlg::DoContextHelp\n");
switch (::GetDlgCtrlID (hWndControl))
{
case IDC_POLICIES_LABEL:
break;
default:
// Display context help for a control
if ( !::WinHelp (
hWndControl,
GetContextHelpFile (),
HELP_WM_HELP,
(DWORD_PTR) g_aHelpIDs_IDD_POLICY) )
{
_TRACE(0, L"WinHelp () failed: 0x%x\n", GetLastError ());
}
break;
}
_TRACE(-1, L"Leaving CPolicyDlg::DoContextHelp\n");
}
void CPolicyDlg::OnEditPolicy()
{
int nSel = this->m_policyList.GetCurSel ();
if ( nSel >= 0 )
{
CString szDisplayName;
m_policyList.GetText (nSel, szDisplayName);
PSTR pszOID = (PSTR) m_policyList.GetItemDataPtr (nSel);
if ( pszOID )
{
CString newDisplayName;
INT_PTR iRet = 0;
if ( m_bIsEKU || m_bIsApplicationPolicy)
{
CNewApplicationOIDDlg dlg (this, szDisplayName, pszOID);
CThemeContextActivator activator;
iRet = dlg.DoModal ();
if ( IDOK == iRet )
newDisplayName = dlg.m_oidFriendlyName;
}
else
{
PWSTR pszCPS = 0;
CString strOID = pszOID;
HRESULT hr = CAOIDGetProperty(
strOID,
CERT_OID_PROPERTY_CPS,
&pszCPS);
if ( SUCCEEDED (hr) ||
HRESULT_FROM_WIN32 (ERROR_FILE_NOT_FOUND) == hr ||
HRESULT_FROM_WIN32 (ERROR_DS_OBJ_NOT_FOUND) == hr ||
HRESULT_FROM_WIN32 (ERROR_INVALID_PARAMETER) == hr )
{
CNewIssuanceOIDDlg dlg (this, szDisplayName, pszOID,
pszCPS);
CThemeContextActivator activator;
iRet = dlg.DoModal ();
if ( IDOK == iRet )
newDisplayName = dlg.m_oidFriendlyName;
}
else
{
DWORD dwErr = HRESULT_CODE (hr);
if ( ERROR_INVALID_PARAMETER != dwErr )
{
CString text;
CString caption;
CThemeContextActivator activator;
VERIFY (caption.LoadString (IDS_CERTTMPL));
// security review 2/21/2002 BryanWal ok
text.FormatMessage (IDS_CANNOT_READ_CPS, GetSystemMessage (hr));
MessageBox (text, caption, MB_OK);
_TRACE (0, L"CAOIDGetProperty (CERT_OID_PROPERTY_CPS) failed: 0x%x\n", hr);
}
}
}
if ( IDOK == iRet )
{
if ( szDisplayName != newDisplayName )
{
m_policyList.DeleteString (nSel);
int nIndex = m_policyList.AddString (newDisplayName);
if ( nIndex >= 0 )
m_policyList.SetItemDataPtr (nIndex, pszOID);
}
}
}
}
}
void CPolicyDlg::OnOK()
{
// Create the list of OIDs.
int nCnt = m_policyList.GetCount ();
PWSTR* paszEKUs = 0;
// allocate an array of PSTR pointers and add each item.
// Set the last to NULL
if ( nCnt )
{
paszEKUs = new PWSTR[nCnt+1];
if ( paszEKUs )
{
// security review 2/21/2002 BryanWal ok
::ZeroMemory (paszEKUs, sizeof (PWSTR) * (nCnt+1));
while (--nCnt >= 0)
{
PSTR pszOID = (PSTR) m_policyList.GetItemData (nCnt);
if ( pszOID )
{
PWSTR pNewStr = 0;
// security review 2/21/2002 BryanWal ok
int nLen = ::MultiByteToWideChar (CP_ACP, 0, pszOID, -1, NULL, 0);
ASSERT (nLen); // NOTICE: API returns required char count
// including null terminator if last arg is 0
if ( nLen > 0 )
{
pNewStr = new WCHAR[nLen];
if ( pNewStr )
{
// security review 2/21/2002 BryanWal ok
nLen = ::MultiByteToWideChar (CP_ACP, 0, pszOID, -1,
pNewStr, nLen);
ASSERT (nLen);
if ( nLen > 0)
{
paszEKUs[nCnt] = pNewStr;
}
}
}
}
}
}
}
CThemeContextActivator activator;
bool bCritical = BST_CHECKED == SendDlgItemMessage (
IDC_POLICY_CRITICAL, BM_GETCHECK);
HRESULT hr = S_OK;
if ( m_bIsEKU )
{
hr = m_rCertTemplate.SetEnhancedKeyUsage (paszEKUs, bCritical);
if ( FAILED (hr) )
{
CString text;
CString caption;
VERIFY (caption.LoadString (IDS_CERTTMPL));
// security review 2/21/2002 BryanWal ok
text.FormatMessage (IDS_CANNOT_SAVE_EKU_EXTENSION, GetSystemMessage (hr));
MessageBox (text, caption, MB_OK);
}
}
else if ( m_bIsApplicationPolicy )
{
hr = m_rCertTemplate.SetApplicationPolicy (paszEKUs, bCritical);
if ( FAILED (hr) )
{
CString text;
CString caption;
VERIFY (caption.LoadString (IDS_CERTTMPL));
// security review 2/21/2002 BryanWal ok
text.FormatMessage (IDS_CANNOT_SAVE_APPLICATION_POLICY_EXTENSION, GetSystemMessage (hr));
MessageBox (text, caption, MB_OK);
}
}
else
{
hr = m_rCertTemplate.SetCertPolicy (paszEKUs, bCritical);
if ( FAILED (hr) )
{
CString text;
CString caption;
VERIFY (caption.LoadString (IDS_CERTTMPL));
// security review 2/21/2002 BryanWal ok
text.FormatMessage (IDS_CANNOT_SAVE_CERT_POLICY_EXTENSION, GetSystemMessage (hr));
MessageBox (text, caption, MB_OK);
}
}
// clean up
if ( paszEKUs )
{
for (int nIndex = 0; paszEKUs[nIndex]; nIndex++)
delete [] paszEKUs[nIndex];
delete [] paszEKUs;
}
if ( SUCCEEDED (hr) )
CHelpDialog::OnOK();
}
void CPolicyDlg::OnDblclkPoliciesList()
{
OnEditPolicy ();
}