Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

5284 lines
166 KiB

//+-------------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (C) Microsoft Corporation, 1995 - 1999
//
// File: certhlpr.cpp
//
// Contents: Certificate and CRL Helper APIs
//
// Functions: CertHelperDllMain
// I_CryptGetDefaultCryptProv
// I_CryptGetDefaultCryptProvForEncrypt
// CertCompareIntegerBlob
// CertCompareCertificate
// CertCompareCertificateName
// CertIsRDNAttrsInCertificateName
// CertComparePublicKeyInfo
// CryptVerifyCertificateSignature
// CryptHashCertificate
// CryptHashToBeSigned
// CryptSignCertificate
// CryptSignAndEncodeCertificate
// CertVerifyTimeValidity
// CertVerifyCRLTimeValidity
// CertVerifyValidityNesting
// CertVerifyCRLRevocation
// CertAlgIdToOID
// CertOIDToAlgId
// CertFindExtension
// CertFindAttribute
// CertFindRDNAttr
// CertGetIntendedKeyUsage
// CertGetPublicKeyLength
// CryptHashPublicKeyInfo
//
// I_CertCompareCertAndProviderPublicKey
// CryptFindCertificateKeyProvInfo
//
// CryptCreatePublicKeyInfo
// CryptConvertPublicKeyInfo
// CryptExportPublicKeyInfo
// CryptExportPublicKeyInfoEx
// CryptImportPublicKeyInfo
// CryptImportPublicKeyInfoEx
// CryptCreateKeyIdentifierFromCSP
//
// CryptInstallDefaultContext
// CryptUninstallDefaultContext
//
// History: 23-Feb-96 philh created
//--------------------------------------------------------------------------
#include "global.hxx"
#include <dbgdef.h>
// All the *pvInfo extra stuff needs to be aligned
#define INFO_LEN_ALIGN(Len) ((Len + 7) & ~7)
#define NULL_ASN_TAG 0x05
//+=========================================================================
// CryptCreatePublicKeyInfo, EncodePublicKeyAndParameters
// and CryptConvertPublicKeyInfo functions
//-=========================================================================
// The following should be moved to wincrypt.x
// If CRYPT_ALLOC_FLAG is set, *pvPubKeyInfo is updated with a LocalAlloc'ed
// pointer to a CERT_PUBLIC_KEY_INFO data structure which must be freed by
// calling LocalFree. Otherwise, pvPubKeyInfo points to a user allocated
// CERT_PUBLIC_KEY_INFO data structure which is updated.
WINCRYPT32API
BOOL
WINAPI
CryptCreatePublicKeyInfo(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyInfo,
IN OUT DWORD *pcbPubKeyInfo
);
#define CRYPT_ALLOC_FLAG 0x8000
#define CRYPT_OID_ENCODE_PUBLIC_KEY_AND_PARAMETERS_FUNC \
"CryptDllEncodePublicKeyAndParameters"
// The returned encoded public keys and parameters are LocalAlloc'ed.
typedef BOOL (WINAPI *PFN_CRYPT_ENCODE_PUBLIC_KEY_AND_PARAMETERS)(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
);
// If CRYPT_ALLOC_FLAG is set, *pvPubKeyStruc is updated with a LocalAlloc'ed
// pointer to a PUBLICKEYSTRUC data structure which must be freed by calling
// LocalFree. Otherwise, pvPubKeyStruc points to a user allocated
// PUBLICKEYSTRUC data structure which is updated.
WINCRYPT32API
BOOL
WINAPI
CryptConvertPublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
);
#define CRYPT_OID_CONVERT_PUBLIC_KEY_INFO_FUNC "CryptDllConvertPublicKeyInfo"
typedef BOOL (WINAPI *PFN_CRYPT_CONVERT_PUBLIC_KEY_INFO)(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
);
// End of what should be moved to wincrypt.x
static HCRYPTOIDFUNCSET hEncodePubKeyFuncSet;
static HCRYPTOIDFUNCSET hConvertPubKeyFuncSet;
//+-------------------------------------------------------------------------
// Encode the RSA public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeRSAPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
);
//+-------------------------------------------------------------------------
// Convert as an RSA public key
//--------------------------------------------------------------------------
static BOOL WINAPI ConvertRSAPublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
);
//+-------------------------------------------------------------------------
// Encode the DSS public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeDSSPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
);
//+-------------------------------------------------------------------------
// Convert as an DSS public key
//--------------------------------------------------------------------------
static BOOL WINAPI ConvertDSSPublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
);
//+-------------------------------------------------------------------------
// Encode the RSA DH public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeRSADHPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
);
//+-------------------------------------------------------------------------
// Encode the X942 DH public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeX942DHPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
);
static const CRYPT_OID_FUNC_ENTRY EncodePubKeyFuncTable[] = {
szOID_RSA_RSA, EncodeRSAPublicKeyAndParameters,
szOID_OIWSEC_rsaXchg, EncodeRSAPublicKeyAndParameters,
szOID_OIWSEC_dsa, EncodeDSSPublicKeyAndParameters,
szOID_X957_DSA, EncodeDSSPublicKeyAndParameters,
szOID_ANSI_X942_DH, EncodeX942DHPublicKeyAndParameters,
szOID_RSA_DH, EncodeRSADHPublicKeyAndParameters,
};
#define ENCODE_PUB_KEY_FUNC_COUNT (sizeof(EncodePubKeyFuncTable) / \
sizeof(EncodePubKeyFuncTable[0]))
static const CRYPT_OID_FUNC_ENTRY ConvertPubKeyFuncTable[] = {
szOID_RSA_RSA, ConvertRSAPublicKeyInfo,
szOID_OIWSEC_rsaXchg, ConvertRSAPublicKeyInfo,
szOID_OIWSEC_dsa, ConvertDSSPublicKeyInfo,
szOID_X957_DSA, ConvertDSSPublicKeyInfo,
};
#define CONVERT_PUB_KEY_FUNC_COUNT (sizeof(ConvertPubKeyFuncTable) / \
sizeof(ConvertPubKeyFuncTable[0]))
//+=========================================================================
// CryptExportPublicKeyInfoEx and CryptImportPublicKeyInfoEx OID
// installable functions.
//-=========================================================================
typedef BOOL (WINAPI *PFN_EXPORT_PUB_KEY_FUNC) (
IN HCRYPTPROV hCryptProv,
IN DWORD dwKeySpec,
IN DWORD dwCertEncodingType,
IN LPSTR pszPublicKeyObjId,
IN DWORD dwFlags,
IN OPTIONAL void *pvAuxInfo,
OUT PCERT_PUBLIC_KEY_INFO pInfo,
IN OUT DWORD *pcbInfo
);
typedef BOOL (WINAPI *PFN_IMPORT_PUB_KEY_FUNC) (
IN HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pInfo,
IN ALG_ID aiKeyAlg,
IN DWORD dwFlags,
IN OPTIONAL void *pvAuxInfo,
OUT HCRYPTKEY *phKey
);
static HCRYPTOIDFUNCSET hExportPubKeyFuncSet;
static HCRYPTOIDFUNCSET hImportPubKeyFuncSet;
//+-------------------------------------------------------------------------
// Default CryptProvs. Once acquired, not released until ProcessDetach.
//--------------------------------------------------------------------------
#define DEFAULT_RSA_CRYPT_PROV 0
#define DEFAULT_DSS_CRYPT_PROV 1
#define DEFAULT_ENCRYPT_BASE_RSA_CRYPT_PROV 2
#define DEFAULT_ENCRYPT_ENH_RSA_CRYPT_PROV 3
#define DEFAULT_ENCRYPT_DH_CRYPT_PROV 4
#define DEFAULT_CRYPT_PROV_CNT 5
static HCRYPTPROV rghDefaultCryptProv[DEFAULT_CRYPT_PROV_CNT];
static CRITICAL_SECTION DefaultCryptProvCriticalSection;
typedef struct _ENCRYPT_ALG_INFO ENCRYPT_ALG_INFO, *PENCRYPT_ALG_INFO;
struct _ENCRYPT_ALG_INFO {
ALG_ID aiAlgid;
DWORD dwMinLen;
DWORD dwMaxLen;
PENCRYPT_ALG_INFO pNext;
};
static BOOL fLoadedRSAEncryptAlgInfo = FALSE;
static PENCRYPT_ALG_INFO pRSAEncryptAlgInfoHead = NULL;
//+=========================================================================
// DefaultContext Function Forward References and Data Structures
//-=========================================================================
//
// dwDefaultTypes:
// CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID (pvDefaultPara :== pszOID)
BOOL
WINAPI
I_CryptGetDefaultContext(
IN DWORD dwDefaultType,
IN const void *pvDefaultPara,
OUT HCRYPTPROV *phCryptProv,
OUT HCRYPTDEFAULTCONTEXT *phDefaultContext
);
// hDefaultContext is only NON-null for Process default context
void
WINAPI
I_CryptFreeDefaultContext(
HCRYPTDEFAULTCONTEXT hDefaultContext
);
typedef struct _DEFAULT_CONTEXT DEFAULT_CONTEXT, *PDEFAULT_CONTEXT;
struct _DEFAULT_CONTEXT {
HCRYPTPROV hCryptProv;
DWORD dwDefaultType;
union {
// CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID (note, converted to MULTI_)
// CRYPT_DEFAULT_CONTEXT_MULTI_CERT_SIGN_OID
PCRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA pOIDDefaultPara;
};
DWORD dwFlags;
PDEFAULT_CONTEXT pNext;
PDEFAULT_CONTEXT pPrev;
// Following applicable to Process DefaultContext
LONG lRefCnt;
HANDLE hWait;
};
static BOOL fHasThreadDefaultContext;
static HCRYPTTLS hTlsDefaultContext;
static BOOL fHasProcessDefaultContext;
static CRITICAL_SECTION DefaultContextCriticalSection;
static PDEFAULT_CONTEXT pProcessDefaultContextHead;
//+-------------------------------------------------------------------------
// Default CryptProv: initialization and free
//--------------------------------------------------------------------------
static BOOL InitDefaultCryptProv()
{
return Pki_InitializeCriticalSection(&DefaultCryptProvCriticalSection);
}
static void FreeDefaultCryptProv()
{
PENCRYPT_ALG_INFO pAlgInfo;
DWORD cProv = DEFAULT_CRYPT_PROV_CNT;
while (cProv--) {
HCRYPTPROV hProv = rghDefaultCryptProv[cProv];
if (hProv)
CryptReleaseContext(hProv, 0);
}
pAlgInfo = pRSAEncryptAlgInfoHead;
while (pAlgInfo) {
PENCRYPT_ALG_INFO pDeleteAlgInfo = pAlgInfo;
pAlgInfo = pAlgInfo->pNext;
PkiFree(pDeleteAlgInfo);
}
DeleteCriticalSection(&DefaultCryptProvCriticalSection);
}
static
VOID
WINAPI
DetachDefaultContext(
IN LPVOID pv
)
{
PDEFAULT_CONTEXT pDefaultContext = (PDEFAULT_CONTEXT) pv;
while (pDefaultContext) {
PDEFAULT_CONTEXT pFree = pDefaultContext;
pDefaultContext = pDefaultContext->pNext;
if (pFree->dwFlags & CRYPT_DEFAULT_CONTEXT_AUTO_RELEASE_FLAG)
CryptReleaseContext(pFree->hCryptProv, 0);
PkiFree(pFree);
}
}
//+-------------------------------------------------------------------------
// Dll initialization
//--------------------------------------------------------------------------
BOOL
WINAPI
CertHelperDllMain(
HMODULE hInst,
ULONG ulReason,
LPVOID lpReserved)
{
BOOL fRet;
switch (ulReason) {
case DLL_PROCESS_ATTACH:
// Public key function setup
if (NULL == (hExportPubKeyFuncSet = CryptInitOIDFunctionSet(
CRYPT_OID_EXPORT_PUBLIC_KEY_INFO_FUNC,
0)))
goto CryptInitOIDFunctionSetError;
if (NULL == (hImportPubKeyFuncSet = CryptInitOIDFunctionSet(
CRYPT_OID_IMPORT_PUBLIC_KEY_INFO_FUNC,
0)))
goto CryptInitOIDFunctionSetError;
if (NULL == (hEncodePubKeyFuncSet = CryptInitOIDFunctionSet(
CRYPT_OID_ENCODE_PUBLIC_KEY_AND_PARAMETERS_FUNC,
0)))
goto CryptInitOIDFunctionSetError;
if (NULL == (hConvertPubKeyFuncSet = CryptInitOIDFunctionSet(
CRYPT_OID_CONVERT_PUBLIC_KEY_INFO_FUNC,
0)))
goto CryptInitOIDFunctionSetError;
if (!CryptInstallOIDFunctionAddress(
NULL, // hModule
X509_ASN_ENCODING,
CRYPT_OID_ENCODE_PUBLIC_KEY_AND_PARAMETERS_FUNC,
ENCODE_PUB_KEY_FUNC_COUNT,
EncodePubKeyFuncTable,
0)) // dwFlags
goto CryptInstallOIDFunctionAddressError;
if (!CryptInstallOIDFunctionAddress(
NULL, // hModule
X509_ASN_ENCODING,
CRYPT_OID_CONVERT_PUBLIC_KEY_INFO_FUNC,
CONVERT_PUB_KEY_FUNC_COUNT,
ConvertPubKeyFuncTable,
0)) // dwFlags
goto CryptInstallOIDFunctionAddressError;
if (!InitDefaultCryptProv())
goto InitDefaultCryptProvError;
if (!Pki_InitializeCriticalSection(&DefaultContextCriticalSection))
goto InitCritSectionError;
if (NULL == (hTlsDefaultContext = I_CryptAllocTls()))
goto CryptAllocTlsError;
break;
case DLL_PROCESS_DETACH:
FreeDefaultCryptProv();
while (pProcessDefaultContextHead) {
PDEFAULT_CONTEXT pFree = pProcessDefaultContextHead;
pProcessDefaultContextHead = pProcessDefaultContextHead->pNext;
if (pFree->dwFlags & CRYPT_DEFAULT_CONTEXT_AUTO_RELEASE_FLAG)
CryptReleaseContext(pFree->hCryptProv, 0);
PkiFree(pFree);
}
DeleteCriticalSection(&DefaultContextCriticalSection);
I_CryptFreeTls(hTlsDefaultContext, DetachDefaultContext);
break;
case DLL_THREAD_DETACH:
DetachDefaultContext(I_CryptDetachTls(hTlsDefaultContext));
break;
default:
break;
}
fRet = TRUE;
CommonReturn:
return fRet;
CryptAllocTlsError:
DeleteCriticalSection(&DefaultContextCriticalSection);
InitCritSectionError:
FreeDefaultCryptProv();
ErrorReturn:
fRet = FALSE;
goto CommonReturn;
TRACE_ERROR(InitDefaultCryptProvError)
TRACE_ERROR(CryptInitOIDFunctionSetError)
TRACE_ERROR(CryptInstallOIDFunctionAddressError)
}
//+-------------------------------------------------------------------------
// Acquire default CryptProv according to the public key algorithm supported
// by the provider type. The provider is acquired with only
// CRYPT_VERIFYCONTEXT.
//
// Setting aiPubKey to 0, gets the default provider for RSA_FULL.
//
// Note, the returned CryptProv must not be released. Once acquired, the
// CryptProv isn't released until ProcessDetach. This allows the returned
// CryptProvs to be shared.
//--------------------------------------------------------------------------
HCRYPTPROV
WINAPI
I_CryptGetDefaultCryptProv(
IN ALG_ID aiPubKey
)
{
HCRYPTPROV hProv;
DWORD dwProvType;
DWORD dwDefaultProvIndex;
switch (aiPubKey) {
case 0:
case CALG_RSA_SIGN:
case CALG_RSA_KEYX:
case CALG_NO_SIGN:
dwProvType = PROV_RSA_FULL;
dwDefaultProvIndex = DEFAULT_RSA_CRYPT_PROV;
break;
case CALG_DSS_SIGN:
dwProvType = PROV_DSS_DH;
dwDefaultProvIndex = DEFAULT_DSS_CRYPT_PROV;
break;
default:
SetLastError((DWORD) E_INVALIDARG);
return 0;
}
hProv = rghDefaultCryptProv[dwDefaultProvIndex];
if (0 == hProv) {
EnterCriticalSection(&DefaultCryptProvCriticalSection);
hProv = rghDefaultCryptProv[dwDefaultProvIndex];
if (0 == hProv) {
if (!CryptAcquireContext(
&hProv,
NULL, // pszContainer
NULL, // pszProvider,
dwProvType,
CRYPT_VERIFYCONTEXT // dwFlags
)) {
hProv = 0; // CAPI bug, sets hCryptProv to nonzero
if (DEFAULT_DSS_CRYPT_PROV == dwDefaultProvIndex) {
if (!CryptAcquireContext(
&hProv,
NULL, // pszContainer
NULL, // pszProvider,
PROV_DSS,
CRYPT_VERIFYCONTEXT // dwFlags
))
hProv = 0; // CAPI bug, sets hCryptProv to nonzero
}
}
rghDefaultCryptProv[dwDefaultProvIndex] = hProv;
}
LeaveCriticalSection(&DefaultCryptProvCriticalSection);
}
return hProv;
}
// Note, PP_ENUMALGS_EX returns the bit range. However, this parameter type
// may not be supported by all CSPs. If this fails, try PP_ENUMALGS which only
// returns a single, default bit length.
static void LoadRSAEncryptAlgInfo()
{
EnterCriticalSection(&DefaultCryptProvCriticalSection);
if (!fLoadedRSAEncryptAlgInfo) {
HCRYPTPROV hProv;
if (hProv = I_CryptGetDefaultCryptProv(CALG_RSA_KEYX)) {
DWORD dwFlags = CRYPT_FIRST;
BOOL fEx = TRUE;
while (TRUE) {
ENCRYPT_ALG_INFO AlgInfo;
PENCRYPT_ALG_INFO pAllocAlgInfo;
if (fEx) {
PROV_ENUMALGS_EX Data;
DWORD cbData = sizeof(Data);
if (!CryptGetProvParam(
hProv,
PP_ENUMALGS_EX,
(BYTE *) &Data,
&cbData,
dwFlags
)) {
if (0 != dwFlags) {
// Try PP_ENUMALGS
fEx = FALSE;
continue;
} else
break;
}
AlgInfo.aiAlgid = Data.aiAlgid;
AlgInfo.dwMinLen = Data.dwMinLen;
AlgInfo.dwMaxLen = Data.dwMaxLen;
} else {
PROV_ENUMALGS Data;
DWORD cbData = sizeof(Data);
if (!CryptGetProvParam(
hProv,
PP_ENUMALGS,
(BYTE *) &Data,
&cbData,
dwFlags
))
break;
// Only know about a single length
AlgInfo.aiAlgid = Data.aiAlgid;
AlgInfo.dwMinLen = Data.dwBitLen;
AlgInfo.dwMaxLen = Data.dwBitLen;
}
dwFlags = 0; // CRYPT_NEXT
// Only interested in encrypt algorithms
if (ALG_CLASS_DATA_ENCRYPT != GET_ALG_CLASS(AlgInfo.aiAlgid))
continue;
if (NULL == (pAllocAlgInfo = (PENCRYPT_ALG_INFO)
PkiNonzeroAlloc(sizeof(ENCRYPT_ALG_INFO))))
break;
AlgInfo.pNext = pRSAEncryptAlgInfoHead;
memcpy(pAllocAlgInfo, &AlgInfo, sizeof(*pAllocAlgInfo));
pRSAEncryptAlgInfoHead = pAllocAlgInfo;
}
}
fLoadedRSAEncryptAlgInfo = TRUE;
}
LeaveCriticalSection(&DefaultCryptProvCriticalSection);
}
static BOOL IsDefaultRSACryptProvForEncrypt(
IN ALG_ID aiEncrypt,
IN DWORD dwBitLen
)
{
PENCRYPT_ALG_INFO pInfo;
if (!fLoadedRSAEncryptAlgInfo)
LoadRSAEncryptAlgInfo();
if (0 == dwBitLen && (CALG_RC2 == aiEncrypt || CALG_RC4 == aiEncrypt))
dwBitLen = 40;
for (pInfo = pRSAEncryptAlgInfoHead; pInfo; pInfo = pInfo->pNext) {
if (aiEncrypt == pInfo->aiAlgid) {
if (0 == dwBitLen || (pInfo->dwMinLen <= dwBitLen &&
dwBitLen <= pInfo->dwMaxLen))
return TRUE;
}
}
return FALSE;
}
//+-------------------------------------------------------------------------
// Acquire default CryptProv according to the public key algorithm, encrypt
// key algorithm and encrypt key length supported by the provider type.
//
// dwBitLen = 0, assumes the aiEncrypt's default bit length. For example,
// CALG_RC2 has a default bit length of 40.
//
// Note, the returned CryptProv must not be released. Once acquired, the
// CryptProv isn't released until ProcessDetach. This allows the returned
// CryptProvs to be shared.
//--------------------------------------------------------------------------
HCRYPTPROV
WINAPI
I_CryptGetDefaultCryptProvForEncrypt(
IN ALG_ID aiPubKey,
IN ALG_ID aiEncrypt,
IN DWORD dwBitLen
)
{
HCRYPTPROV hProv;
DWORD dwProvType;
DWORD dwDefaultProvIndex;
LPCSTR pszProvider;
if (CALG_DH_SF == aiPubKey || CALG_DH_EPHEM == aiPubKey) {
dwProvType = PROV_DSS_DH;
dwDefaultProvIndex = DEFAULT_ENCRYPT_DH_CRYPT_PROV;
pszProvider = NULL;
} else {
dwProvType = PROV_RSA_FULL;
if (IsDefaultRSACryptProvForEncrypt(
aiEncrypt,
dwBitLen
))
// Set to fall through to the default case
aiEncrypt = 0;
switch (aiEncrypt) {
case CALG_DES:
case CALG_3DES:
case CALG_3DES_112:
dwDefaultProvIndex = DEFAULT_ENCRYPT_ENH_RSA_CRYPT_PROV;
pszProvider = MS_ENHANCED_PROV_A;
break;
case CALG_RC2:
case CALG_RC4:
if (40 >= dwBitLen) {
dwDefaultProvIndex = DEFAULT_ENCRYPT_BASE_RSA_CRYPT_PROV;
pszProvider = MS_DEF_PROV_A;
} else {
dwDefaultProvIndex = DEFAULT_ENCRYPT_ENH_RSA_CRYPT_PROV;
pszProvider = MS_ENHANCED_PROV_A;
}
break;
case 0:
default:
dwDefaultProvIndex = DEFAULT_RSA_CRYPT_PROV;
pszProvider = NULL;
break;
}
}
hProv = rghDefaultCryptProv[dwDefaultProvIndex];
if (0 == hProv) {
EnterCriticalSection(&DefaultCryptProvCriticalSection);
hProv = rghDefaultCryptProv[dwDefaultProvIndex];
if (0 == hProv) {
if (!CryptAcquireContext(
&hProv,
NULL, // pszContainer
pszProvider,
dwProvType,
CRYPT_VERIFYCONTEXT // dwFlags
))
hProv = 0; // CAPI bug, sets hCryptProv to nonzero
else
rghDefaultCryptProv[dwDefaultProvIndex] = hProv;
}
LeaveCriticalSection(&DefaultCryptProvCriticalSection);
}
return hProv;
}
//+-------------------------------------------------------------------------
// Cert helper allocation and free functions
//--------------------------------------------------------------------------
static void *AllocAndDecodeObject(
IN DWORD dwCertEncodingType,
IN LPCSTR lpszStructType,
IN const BYTE *pbEncoded,
IN DWORD cbEncoded,
OUT OPTIONAL DWORD *pcbStructInfo = NULL
)
{
DWORD cbStructInfo;
void *pvStructInfo;
if (!CryptDecodeObjectEx(
dwCertEncodingType,
lpszStructType,
pbEncoded,
cbEncoded,
CRYPT_DECODE_NOCOPY_FLAG | CRYPT_DECODE_ALLOC_FLAG,
&PkiDecodePara,
(void *) &pvStructInfo,
&cbStructInfo
))
goto ErrorReturn;
CommonReturn:
if (pcbStructInfo)
*pcbStructInfo = cbStructInfo;
return pvStructInfo;
ErrorReturn:
pvStructInfo = NULL;
goto CommonReturn;
}
static BOOL AllocAndEncodeObject(
IN DWORD dwCertEncodingType,
IN LPCSTR lpszStructType,
IN const void *pvStructInfo,
OUT BYTE **ppbEncoded,
OUT DWORD *pcbEncoded
)
{
return CryptEncodeObjectEx(
dwCertEncodingType,
lpszStructType,
pvStructInfo,
CRYPT_ENCODE_ALLOC_FLAG,
&PkiEncodePara,
(void *) ppbEncoded,
pcbEncoded
);
}
#if 0
//+-------------------------------------------------------------------------
// For an authority key identifier extension, compare the extension's optional
// fields with the specified issuer certificate.
//
// Returns TRUE for no authority key identifier extension or an issuer
// certificate match.
//--------------------------------------------------------------------------
static BOOL CompareAuthorityKeyIdentifier(
IN DWORD dwCertEncodingType,
IN DWORD cExtensions,
IN CERT_EXTENSION rgExtensions[],
IN PCERT_INFO pIssuerInfo
)
{
BOOL fResult;
PCERT_EXTENSION pExt;
PCERT_AUTHORITY_KEY_ID_INFO pKeyIdInfo = NULL;
pExt = CertFindExtension(
szOID_AUTHORITY_KEY_IDENTIFIER,
cExtensions,
rgExtensions
);
if (pExt == NULL)
return TRUE;
if (NULL == (pKeyIdInfo =
(PCERT_AUTHORITY_KEY_ID_INFO) AllocAndDecodeObject(
dwCertEncodingType,
X509_AUTHORITY_KEY_ID,
pExt->Value.pbData,
pExt->Value.cbData
))) goto DecodeError;
if (pKeyIdInfo->CertIssuer.cbData) {
// Issuer certificate's issuer name must match
if (!CertCompareCertificateName(
dwCertEncodingType,
&pKeyIdInfo->CertIssuer,
&pIssuerInfo->Issuer
)) goto ErrorReturn;
}
if (pKeyIdInfo->CertSerialNumber.cbData) {
// Issuer certificate's serial number must match
if (!CertCompareIntegerBlob(
&pKeyIdInfo->CertSerialNumber,
&pIssuerInfo->SerialNumber))
goto ErrorReturn;
}
fResult = TRUE;
goto CommonReturn;
DecodeError:
fResult = TRUE;
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
CommonReturn:
PkiFree(pKeyIdInfo);
return fResult;
}
#endif
//+-------------------------------------------------------------------------
// Compare two multiple byte integer blobs to see if they are identical.
//
// Before doing the comparison, leading zero bytes are removed from a
// positive number and leading 0xFF bytes are removed from a negative
// number.
//
// The multiple byte integers are treated as Little Endian. pbData[0] is the
// least significant byte and pbData[cbData - 1] is the most significant
// byte.
//
// Returns TRUE if the integer blobs are identical after removing leading
// 0 or 0xFF bytes.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertCompareIntegerBlob(
IN PCRYPT_INTEGER_BLOB pInt1,
IN PCRYPT_INTEGER_BLOB pInt2
)
{
BYTE *pb1 = pInt1->pbData;
DWORD cb1 = pInt1->cbData;
BYTE *pb2 = pInt2->pbData;
DWORD cb2 = pInt2->cbData;
// Assumption: normally don't have leading 0 or 0xFF bytes.
while (cb1 > 1) {
BYTE bEnd = pb1[cb1 - 1];
BYTE bPrev = pb1[cb1 - 2];
if ((0 == bEnd && 0 == (bPrev & 0x80)) ||
(0xFF == bEnd && 0 != (bPrev & 0x80)))
cb1--;
else
break;
}
while (cb2 > 1) {
BYTE bEnd = pb2[cb2 - 1];
BYTE bPrev = pb2[cb2 - 2];
if ((0 == bEnd && 0 == (bPrev & 0x80)) ||
(0xFF == bEnd && 0 != (bPrev & 0x80)))
cb2--;
else
break;
}
if (cb1 == cb2 && (0 == cb1 || 0 == memcmp(pb1, pb2, cb1)))
return TRUE;
else
return FALSE;
}
//+-------------------------------------------------------------------------
// Compare two certificates to see if they are identical.
//
// Since a certificate is uniquely identified by its Issuer and SerialNumber,
// these are the only fields needing to be compared.
//
// Returns TRUE if the certificates are identical.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertCompareCertificate(
IN DWORD dwCertEncodingType,
IN PCERT_INFO pCertId1,
IN PCERT_INFO pCertId2
)
{
if (CertCompareIntegerBlob(&pCertId1->SerialNumber,
&pCertId2->SerialNumber) &&
pCertId1->Issuer.cbData == pCertId2->Issuer.cbData &&
memcmp(pCertId1->Issuer.pbData, pCertId2->Issuer.pbData,
pCertId1->Issuer.cbData) == 0)
return TRUE;
else
return FALSE;
}
//+-------------------------------------------------------------------------
// Compare two certificate names to see if they are identical.
//
// Returns TRUE if the names are identical.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertCompareCertificateName(
IN DWORD dwCertEncodingType,
IN PCERT_NAME_BLOB pCertName1,
IN PCERT_NAME_BLOB pCertName2
)
{
if (pCertName1->cbData == pCertName2->cbData &&
memcmp(pCertName1->pbData, pCertName2->pbData,
pCertName1->cbData) == 0)
return TRUE;
else
return FALSE;
}
//+-------------------------------------------------------------------------
// Compare the attributes in the certificate name with the specified
// Relative Distinguished Name's (CERT_RDN) array of attributes.
// The comparison iterates through the CERT_RDN attributes and looks for an
// attribute match in any of the certificate's RDNs. Returns TRUE if all the
// attributes are found and match.
//
// The CERT_RDN_ATTR fields can have the following special values:
// pszObjId == NULL - ignore the attribute object identifier
// dwValueType == CERT_RDN_ANY_TYPE - ignore the value type
// Value.pbData == NULL - match any value
//
// CERT_CASE_INSENSITIVE_IS_RDN_ATTRS_FLAG should be set to do
// a case insensitive match. Otherwise, defaults to an exact, case sensitive
// match.
//
// CERT_UNICODE_IS_RDN_ATTRS_FLAG should be set if the pRDN was initialized
// with unicode strings as for CryptEncodeObject(X509_UNICODE_NAME).
//--------------------------------------------------------------------------
BOOL
WINAPI
CertIsRDNAttrsInCertificateName(
IN DWORD dwCertEncodingType,
IN DWORD dwFlags,
IN PCERT_NAME_BLOB pCertName,
IN PCERT_RDN pRDN
)
{
BOOL fResult;
PCERT_NAME_INFO pNameInfo = NULL;
DWORD cCmpAttr;
PCERT_RDN_ATTR pCmpAttr;
BOOL fMatch;
if (NULL == (pNameInfo =
(PCERT_NAME_INFO) AllocAndDecodeObject(
dwCertEncodingType,
CERT_UNICODE_IS_RDN_ATTRS_FLAG & dwFlags ? X509_UNICODE_NAME :
X509_NAME,
pCertName->pbData,
pCertName->cbData
))) goto ErrorReturn;
cCmpAttr = pRDN->cRDNAttr;
pCmpAttr = pRDN->rgRDNAttr;
fMatch = TRUE;
// Iterate through list of attributes to be compared against
for ( ; cCmpAttr > 0; cCmpAttr--, pCmpAttr++) {
fMatch = FALSE;
DWORD cNameRDN = pNameInfo->cRDN;
PCERT_RDN pNameRDN = pNameInfo->rgRDN;
// Iterate through name's list of RDNs
for ( ; cNameRDN > 0; cNameRDN--, pNameRDN++) {
DWORD cNameAttr = pNameRDN->cRDNAttr;
PCERT_RDN_ATTR pNameAttr = pNameRDN->rgRDNAttr;
// Iterate through name's CERT_RDN's list of attributes
for ( ; cNameAttr > 0; cNameAttr--, pNameAttr++) {
if (pCmpAttr->pszObjId &&
(pNameAttr->pszObjId == NULL ||
strcmp(pCmpAttr->pszObjId, pNameAttr->pszObjId) != 0))
continue;
if (pCmpAttr->dwValueType != CERT_RDN_ANY_TYPE &&
pCmpAttr->dwValueType != pNameAttr->dwValueType)
continue;
if (pCmpAttr->Value.pbData == NULL) {
fMatch = TRUE;
break;
}
if (CERT_CASE_INSENSITIVE_IS_RDN_ATTRS_FLAG & dwFlags) {
DWORD cch;
if (CERT_UNICODE_IS_RDN_ATTRS_FLAG & dwFlags) {
if (0 == pCmpAttr->Value.cbData)
cch = wcslen((LPWSTR) pCmpAttr->Value.pbData);
else
cch = pCmpAttr->Value.cbData / sizeof(WCHAR);
if (cch == (pNameAttr->Value.cbData / sizeof(WCHAR))
&&
CSTR_EQUAL == CompareStringU(
LOCALE_USER_DEFAULT,
NORM_IGNORECASE,
(LPWSTR) pCmpAttr->Value.pbData,
cch,
(LPWSTR) pNameAttr->Value.pbData,
cch)) {
fMatch = TRUE;
break;
}
} else {
cch = pCmpAttr->Value.cbData;
if (cch == (pNameAttr->Value.cbData)
&&
CSTR_EQUAL == CompareStringA(
LOCALE_USER_DEFAULT,
NORM_IGNORECASE,
(LPSTR) pCmpAttr->Value.pbData,
cch,
(LPSTR) pNameAttr->Value.pbData,
cch)) {
fMatch = TRUE;
break;
}
}
} else {
DWORD cbCmpData = pCmpAttr->Value.cbData;
if ((CERT_UNICODE_IS_RDN_ATTRS_FLAG & dwFlags) &&
0 == cbCmpData)
cbCmpData = wcslen((LPWSTR) pCmpAttr->Value.pbData) *
sizeof(WCHAR);
if (cbCmpData == pNameAttr->Value.cbData &&
(cbCmpData == 0 ||
memcmp(pCmpAttr->Value.pbData,
pNameAttr->Value.pbData,
cbCmpData) == 0)) {
fMatch = TRUE;
break;
}
}
}
if (fMatch) break;
}
if (!fMatch) break;
}
if (!fMatch) {
SetLastError((DWORD) CRYPT_E_NO_MATCH);
goto ErrorReturn;
}
fResult = TRUE;
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
CommonReturn:
PkiFree(pNameInfo);
return fResult;
}
#if 0
#ifndef RSA1
#define RSA1 ((DWORD)'R'+((DWORD)'S'<<8)+((DWORD)'A'<<16)+((DWORD)'1'<<24))
#endif
//+-------------------------------------------------------------------------
// Compare two public keys to see if they are identical.
//
// Returns TRUE if the keys are identical.
//
// Note: ignores CAPI's reserved and aiKeyAlg fields in the comparison.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertComparePublicKeyBitBlob(
IN DWORD dwCertEncodingType,
IN PCRYPT_BIT_BLOB pPublicKey1,
IN PCRYPT_BIT_BLOB pPublicKey2
)
{
BYTE *pb1, *pb2;
PUBLICKEYSTRUC *pPubKeyStruc1, *pPubKeyStruc2;
RSAPUBKEY *pRsaPubKey1, *pRsaPubKey2;
BYTE *pbModulus1, *pbModulus2;
DWORD cbModulus1, cbModulus2;
// The CAPI public key representation consists of the following sequence:
// - PUBLICKEYSTRUC
// - RSAPUBKEY
// - rgbModulus[]
pb1 = pPublicKey1->pbData;
pPubKeyStruc1 = (PUBLICKEYSTRUC *) pb1;
pRsaPubKey1 = (RSAPUBKEY *) (pb1 + sizeof(PUBLICKEYSTRUC));
pbModulus1 = pb1 + sizeof(PUBLICKEYSTRUC) + sizeof(RSAPUBKEY);
cbModulus1 = pRsaPubKey1->bitlen / 8;
assert(cbModulus1 > 0);
assert(sizeof(PUBLICKEYSTRUC) + sizeof(RSAPUBKEY) + cbModulus1 <=
pPublicKey1->cbData);
assert(pPubKeyStruc1->bType == PUBLICKEYBLOB);
assert(pPubKeyStruc1->bVersion == CUR_BLOB_VERSION);
assert(pPubKeyStruc1->aiKeyAlg == CALG_RSA_SIGN ||
pPubKeyStruc1->aiKeyAlg == CALG_RSA_KEYX);
assert(pRsaPubKey1->magic == RSA1);
assert(pRsaPubKey1->bitlen % 8 == 0);
pb2 = pPublicKey2->pbData;
pPubKeyStruc2 = (PUBLICKEYSTRUC *) pb2;
pRsaPubKey2 = (RSAPUBKEY *) (pb2 + sizeof(PUBLICKEYSTRUC));
pbModulus2 = pb2 + sizeof(PUBLICKEYSTRUC) + sizeof(RSAPUBKEY);
cbModulus2 = pRsaPubKey2->bitlen / 8;
assert(cbModulus2 > 0);
assert(sizeof(PUBLICKEYSTRUC) + sizeof(RSAPUBKEY) + cbModulus2 <=
pPublicKey2->cbData);
assert(pPubKeyStruc2->bType == PUBLICKEYBLOB);
assert(pPubKeyStruc2->bVersion == CUR_BLOB_VERSION);
assert(pPubKeyStruc2->aiKeyAlg == CALG_RSA_SIGN ||
pPubKeyStruc2->aiKeyAlg == CALG_RSA_KEYX);
assert(pRsaPubKey2->magic == RSA1);
assert(pRsaPubKey2->bitlen % 8 == 0);
if (pRsaPubKey1->pubexp == pRsaPubKey2->pubexp &&
cbModulus1 == cbModulus2 &&
memcmp(pbModulus1, pbModulus2, cbModulus1) == 0)
return TRUE;
else
return FALSE;
}
#endif
//+-------------------------------------------------------------------------
// Compare two public keys to see if they are identical.
//
// Returns TRUE if the keys are identical.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertComparePublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPublicKey1,
IN PCERT_PUBLIC_KEY_INFO pPublicKey2
)
{
DWORD cbData;
DWORD cb1;
BYTE * pb1;
DWORD cb2;
BYTE * pb2;
BOOL fResult = FALSE;
PUBLICKEYSTRUC * pBlob1 = NULL;
PUBLICKEYSTRUC * pBlob2 = NULL;
if (!((cbData = pPublicKey1->PublicKey.cbData) ==
pPublicKey2->PublicKey.cbData
&&
(cbData == 0 || memcmp(pPublicKey1->PublicKey.pbData,
pPublicKey2->PublicKey.pbData, cbData) == 0)))
{
// DSIE: Bug 402662.
// Encoded compare failed, try decoded compare.
if (NULL == (pBlob1 = (PUBLICKEYSTRUC *) AllocAndDecodeObject(
dwCertEncodingType,
RSA_CSP_PUBLICKEYBLOB,
pPublicKey1->PublicKey.pbData,
pPublicKey1->PublicKey.cbData,
&cb1)))
{
goto CLEANUP;
}
if (NULL == (pBlob2 = (PUBLICKEYSTRUC *) AllocAndDecodeObject(
dwCertEncodingType,
RSA_CSP_PUBLICKEYBLOB,
pPublicKey2->PublicKey.pbData,
pPublicKey2->PublicKey.cbData,
&cb2)))
{
goto CLEANUP;
}
if (!((cb1 == cb2) &&
(cb1 == 0 || memcmp(pBlob1, pBlob2, cb1) == 0)))
{
goto CLEANUP;
}
}
// Compare algorithm parameters
cb1 = pPublicKey1->Algorithm.Parameters.cbData;
pb1 = pPublicKey1->Algorithm.Parameters.pbData;
cb2 = pPublicKey2->Algorithm.Parameters.cbData;
pb2 = pPublicKey2->Algorithm.Parameters.pbData;
if (X509_ASN_ENCODING == GET_CERT_ENCODING_TYPE(dwCertEncodingType))
{
// Check if either has NO or NULL parameters
if (0 == cb1 || *pb1 == NULL_ASN_TAG ||
0 == cb2 || *pb2 == NULL_ASN_TAG)
{
fResult = TRUE;
goto CLEANUP;
}
}
if (cb1 == cb2)
{
if (0 == cb1 || 0 == memcmp(pb1, pb2, cb1))
{
fResult = TRUE;
}
}
CLEANUP:
if (pBlob1)
PkiFree(pBlob1);
if (pBlob2)
PkiFree(pBlob2);
return fResult;
}
static BOOL GetSignOIDInfo(
IN LPCSTR pszObjId,
OUT ALG_ID *paiHash,
OUT ALG_ID *paiPubKey,
OUT DWORD *pdwFlags,
OUT DWORD *pdwProvType = NULL
)
{
BOOL fResult;
PCCRYPT_OID_INFO pInfo;
*paiPubKey = 0;
*pdwFlags = 0;
if (pdwProvType)
*pdwProvType = 0;
if (pInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
(void *) pszObjId,
CRYPT_SIGN_ALG_OID_GROUP_ID
)) {
DWORD cExtra = pInfo->ExtraInfo.cbData / sizeof(DWORD);
DWORD *pdwExtra = (DWORD *) pInfo->ExtraInfo.pbData;
*paiHash = pInfo->Algid;
if (1 <= cExtra) {
*paiPubKey = pdwExtra[0];
if (2 <= cExtra) {
*pdwFlags = pdwExtra[1];
if (3 <= cExtra && pdwProvType) {
*pdwProvType = pdwExtra[2];
}
}
}
fResult = TRUE;
} else if (pInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
(void *) pszObjId,
CRYPT_HASH_ALG_OID_GROUP_ID
)) {
*paiHash = pInfo->Algid;
*paiPubKey = CALG_NO_SIGN;
fResult = TRUE;
} else {
*paiHash = 0;
fResult = FALSE;
SetLastError((DWORD) NTE_BAD_ALGID);
}
return fResult;
}
#ifndef CMS_PKCS7
//+-------------------------------------------------------------------------
// Verify the signature of a subject certificate or a CRL using the
// specified public key.
//
// Returns TRUE for a valid signature.
//
// hCryptProv specifies the crypto provider to use to verify the signature.
// It doesn't need to use a private key.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptVerifyCertificateSignature(
IN HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN const BYTE * pbEncoded,
IN DWORD cbEncoded,
IN PCERT_PUBLIC_KEY_INFO pPublicKey
)
{
BOOL fResult;
PCERT_SIGNED_CONTENT_INFO pSignedInfo = NULL;
HCRYPTDEFAULTCONTEXT hDefaultContext = NULL;
HCRYPTKEY hSignKey = 0;
HCRYPTHASH hHash = 0;
BYTE *pbSignature; // not allocated
DWORD cbSignature;
BYTE rgbDssSignature[CERT_DSS_SIGNATURE_LEN];
ALG_ID aiHash;
ALG_ID aiPubKey;
DWORD dwSignFlags;
DWORD dwErr;
if (NULL == (pSignedInfo =
(PCERT_SIGNED_CONTENT_INFO) AllocAndDecodeObject(
dwCertEncodingType,
X509_CERT,
pbEncoded,
cbEncoded
))) goto ErrorReturn;
if (!GetSignOIDInfo(pSignedInfo->SignatureAlgorithm.pszObjId,
&aiHash, &aiPubKey, &dwSignFlags))
goto ErrorReturn;
if (0 == hCryptProv) {
if (!I_CryptGetDefaultContext(
CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID,
(const void *) pSignedInfo->SignatureAlgorithm.pszObjId,
&hCryptProv,
&hDefaultContext
)) {
if (0 == (hCryptProv = I_CryptGetDefaultCryptProv(aiPubKey)))
goto ErrorReturn;
}
}
#if 0
// Slow down the signature verify while holding the default context
// reference count
if (hDefaultContext)
Sleep(5000);
#endif
if (!CryptImportPublicKeyInfo(
hCryptProv,
dwCertEncodingType,
pPublicKey,
&hSignKey
)) goto ErrorReturn;
if (!CryptCreateHash(
hCryptProv,
aiHash,
NULL, // hKey - optional for MAC
0, // dwFlags
&hHash
)) goto ErrorReturn;
if (!CryptHashData(
hHash,
pSignedInfo->ToBeSigned.pbData,
pSignedInfo->ToBeSigned.cbData,
0 // dwFlags
)) goto ErrorReturn;
pbSignature = pSignedInfo->Signature.pbData;
cbSignature = pSignedInfo->Signature.cbData;
if (CALG_DSS_SIGN == aiPubKey &&
0 == (dwSignFlags & CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG)) {
DWORD cbData;
// Undo the reversal done by CryptDecodeObject(X509_CERT)
PkiAsn1ReverseBytes(pbSignature, cbSignature);
// Convert from ASN.1 sequence of two integers to the CSP signature
// format.
cbData = sizeof(rgbDssSignature);
if (!CryptDecodeObject(
dwCertEncodingType,
X509_DSS_SIGNATURE,
pbSignature,
cbSignature,
0, // dwFlags
rgbDssSignature,
&cbData
))
goto ErrorReturn;
pbSignature = rgbDssSignature;
assert(cbData == sizeof(rgbDssSignature));
cbSignature = sizeof(rgbDssSignature);
}
if (!CryptVerifySignature(
hHash,
pbSignature,
cbSignature,
hSignKey,
NULL, // sDescription
0 // dwFlags
)) goto ErrorReturn;
fResult = TRUE;
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
CommonReturn:
dwErr = GetLastError();
if (hSignKey)
CryptDestroyKey(hSignKey);
if (hHash)
CryptDestroyHash(hHash);
I_CryptFreeDefaultContext(hDefaultContext);
PkiFree(pSignedInfo);
SetLastError(dwErr);
return fResult;
}
#endif // CMS_PKCS7
BOOL
WINAPI
DefaultHashCertificate(
IN ALG_ID Algid,
IN const BYTE *pbEncoded,
IN DWORD cbEncoded,
OUT BYTE *pbHash,
IN OUT DWORD *pcbHash
)
{
DWORD cbInHash;
DWORD cbOutHash;
if (NULL == pbHash)
cbInHash = 0;
else
cbInHash = *pcbHash;
switch (Algid) {
case CALG_MD5:
cbOutHash = MD5DIGESTLEN;
if (MD5DIGESTLEN <= cbInHash) {
MD5_CTX md5ctx;
MD5Init(&md5ctx);
if (cbEncoded)
MD5Update(&md5ctx, pbEncoded, cbEncoded);
MD5Final(&md5ctx);
memcpy(pbHash, md5ctx.digest, MD5DIGESTLEN);
}
break;
case CALG_SHA1:
default:
assert(CALG_SHA1 == Algid);
assert(CALG_SHA == Algid);
cbOutHash = A_SHA_DIGEST_LEN;
if (A_SHA_DIGEST_LEN <= cbInHash) {
A_SHA_CTX shactx;
A_SHAInit(&shactx);
if (cbEncoded)
A_SHAUpdate(&shactx, (BYTE *) pbEncoded, cbEncoded);
A_SHAFinal(&shactx, pbHash);
}
break;
}
*pcbHash = cbOutHash;
if (cbInHash < cbOutHash && pbHash) {
SetLastError((DWORD) ERROR_MORE_DATA);
return FALSE;
} else
return TRUE;
}
//+-------------------------------------------------------------------------
// Hash the encoded content.
//
// hCryptProv specifies the crypto provider to use to compute the hash.
// It doesn't need to use a private key.
//
// Algid specifies the CAPI hash algorithm to use. If Algid is 0, then, the
// default hash algorithm (currently SHA1) is used.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptHashCertificate(
IN HCRYPTPROV hCryptProv,
IN ALG_ID Algid,
IN DWORD dwFlags,
IN const BYTE *pbEncoded,
IN DWORD cbEncoded,
OUT BYTE *pbComputedHash,
IN OUT DWORD *pcbComputedHash
)
{
BOOL fResult;
HCRYPTHASH hHash = 0;
DWORD dwErr;
if (Algid == 0) {
Algid = CALG_SHA;
dwFlags = 0;
}
if (0 == hCryptProv) {
if (CALG_SHA1 == Algid || CALG_MD5 == Algid)
return DefaultHashCertificate(
Algid,
pbEncoded,
cbEncoded,
pbComputedHash,
pcbComputedHash
);
if (0 == (hCryptProv = I_CryptGetDefaultCryptProv(0)))
goto ErrorReturn;
}
if (!CryptCreateHash(
hCryptProv,
Algid,
NULL, // hKey - optional for MAC
dwFlags,
&hHash
))
goto ErrorReturn;
if (!CryptHashData(
hHash,
pbEncoded,
cbEncoded,
0 // dwFlags
))
goto ErrorReturn;
fResult = CryptGetHashParam(
hHash,
HP_HASHVAL,
pbComputedHash,
pcbComputedHash,
0 // dwFlags
);
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
*pcbComputedHash = 0;
CommonReturn:
dwErr = GetLastError();
if (hHash)
CryptDestroyHash(hHash);
SetLastError(dwErr);
return fResult;
}
//+-------------------------------------------------------------------------
// Compute the hash of the "to be signed" information in the encoded
// signed content.
//
// hCryptProv specifies the crypto provider to use to compute the hash.
// It doesn't need to use a private key.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptHashToBeSigned(
IN HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN const BYTE *pbEncoded,
IN DWORD cbEncoded,
OUT BYTE *pbComputedHash,
IN OUT DWORD *pcbComputedHash
)
{
BOOL fResult;
PCERT_SIGNED_CONTENT_INFO pSignedInfo = NULL;
HCRYPTHASH hHash = 0;
DWORD dwErr;
ALG_ID aiHash;
ALG_ID aiPubKey;
DWORD dwSignFlags;
if (NULL == (pSignedInfo =
(PCERT_SIGNED_CONTENT_INFO) AllocAndDecodeObject(
dwCertEncodingType,
X509_CERT,
pbEncoded,
cbEncoded
))) goto ErrorReturn;
if (!GetSignOIDInfo(pSignedInfo->SignatureAlgorithm.pszObjId,
&aiHash, &aiPubKey, &dwSignFlags))
goto ErrorReturn;
if (0 == hCryptProv) {
if (CALG_SHA1 == aiHash || CALG_MD5 == aiHash) {
fResult = DefaultHashCertificate(
aiHash,
pSignedInfo->ToBeSigned.pbData,
pSignedInfo->ToBeSigned.cbData,
pbComputedHash,
pcbComputedHash
);
goto CommonReturn;
}
if (0 == (hCryptProv = I_CryptGetDefaultCryptProv(0)))
goto ErrorReturn;
}
if (!CryptCreateHash(
hCryptProv,
aiHash,
NULL, // hKey - optional for MAC
0, // dwFlags
&hHash
))
goto ErrorReturn;
if (!CryptHashData(
hHash,
pSignedInfo->ToBeSigned.pbData,
pSignedInfo->ToBeSigned.cbData,
0 // dwFlags
))
goto ErrorReturn;
fResult = CryptGetHashParam(
hHash,
HP_HASHVAL,
pbComputedHash,
pcbComputedHash,
0 // dwFlags
);
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
*pcbComputedHash = 0;
CommonReturn:
dwErr = GetLastError();
if (hHash)
CryptDestroyHash(hHash);
PkiFree(pSignedInfo);
SetLastError(dwErr);
return fResult;
}
//+-------------------------------------------------------------------------
// Sign the "to be signed" information in the encoded signed content.
//
// hCryptProv specifies the crypto provider to use to do the signature.
// It needs to use the provider's signature private key.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptSignCertificate(
IN HCRYPTPROV hCryptProv,
IN DWORD dwKeySpec,
IN DWORD dwCertEncodingType,
IN const BYTE *pbEncodedToBeSigned,
IN DWORD cbEncodedToBeSigned,
IN PCRYPT_ALGORITHM_IDENTIFIER pSignatureAlgorithm,
IN OPTIONAL const void *pvHashAuxInfo,
OUT BYTE *pbSignature,
IN OUT DWORD *pcbSignature
)
{
BOOL fResult;
ALG_ID aiHash;
ALG_ID aiPubKey;
DWORD dwSignFlags;
HCRYPTHASH hHash = 0;
DWORD dwErr;
if (!GetSignOIDInfo(pSignatureAlgorithm->pszObjId,
&aiHash, &aiPubKey, &dwSignFlags))
goto ErrorReturn;
if (CALG_NO_SIGN == aiPubKey) {
fResult = CryptHashCertificate(
hCryptProv,
aiHash,
0, // dwFlags
pbEncodedToBeSigned,
cbEncodedToBeSigned,
pbSignature,
pcbSignature
);
if (fResult && pbSignature)
// A subsequent CryptEncodeObject(X509_CERT) will reverse
// the signature bytes
PkiAsn1ReverseBytes(pbSignature, *pcbSignature);
return fResult;
}
if (CALG_DSS_SIGN == aiPubKey &&
0 == (dwSignFlags & CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG)) {
if (NULL == pbSignature) {
*pcbSignature = CERT_MAX_ASN_ENCODED_DSS_SIGNATURE_LEN;
return TRUE;
}
}
if (!CryptCreateHash(
hCryptProv,
aiHash,
NULL, // hKey - optional for MAC
0, // dwFlags,
&hHash
))
goto ErrorReturn;
if (!CryptHashData(
hHash,
pbEncodedToBeSigned,
cbEncodedToBeSigned,
0 // dwFlags
))
goto ErrorReturn;
if (CALG_DSS_SIGN == aiPubKey &&
0 == (dwSignFlags & CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG)) {
DWORD cbData;
BYTE rgbDssSignature[CERT_DSS_SIGNATURE_LEN];
cbData = sizeof(rgbDssSignature);
if (!CryptSignHash(
hHash,
dwKeySpec,
NULL, // sDescription
0, // dwFlags
rgbDssSignature,
&cbData
)) goto ErrorReturn;
assert(cbData == sizeof(rgbDssSignature));
// Convert from the CSP signature format to an ASN.1 sequence of
// two integers
fResult = CryptEncodeObject(
dwCertEncodingType,
X509_DSS_SIGNATURE,
rgbDssSignature,
pbSignature,
pcbSignature
);
if (fResult)
// A subsequent CryptEncodeObject(X509_CERT) will reverse
// the signature bytes
PkiAsn1ReverseBytes(pbSignature, *pcbSignature);
else if (0 != *pcbSignature)
// Since a random number is used in each CryptSignHash invocation,
// the generated signature will be different. In particular
// different signatures may have different leading 0x00's or
// 0xFF's which get removed when converted to the ASN.1 sequence
// of integers.
*pcbSignature = CERT_MAX_ASN_ENCODED_DSS_SIGNATURE_LEN;
} else
fResult = CryptSignHash(
hHash,
dwKeySpec,
NULL, // sDescription
0, // dwFlags
pbSignature, // pbData
pcbSignature
);
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
*pcbSignature = 0;
CommonReturn:
dwErr = GetLastError();
if (hHash)
CryptDestroyHash(hHash);
SetLastError(dwErr);
return fResult;
}
static DWORD AdjustForMaximumEncodedSignatureLength(
IN PCRYPT_ALGORITHM_IDENTIFIER pSignatureAlgorithm,
IN DWORD cbOrig
)
{
DWORD cbAdjust;
ALG_ID aiHash;
ALG_ID aiPubKey;
DWORD dwSignFlags;
cbAdjust = 0;
if (GetSignOIDInfo(pSignatureAlgorithm->pszObjId,
&aiHash, &aiPubKey, &dwSignFlags)) {
if (CALG_DSS_SIGN == aiPubKey &&
0 == (dwSignFlags & CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG)) {
assert(CERT_MAX_ASN_ENCODED_DSS_SIGNATURE_LEN >= cbOrig);
if (CERT_MAX_ASN_ENCODED_DSS_SIGNATURE_LEN > cbOrig)
// the +1 is for adjusting the number of length octets in
// the outer SEQUENCE. Note, the number of length octets in
// the signature's BITSTRING will always be 1, ie,
// CERT_MAX_ASN_ENCODED_DSS_SIGNATURE_LEN <= 0x7F.
cbAdjust =
(CERT_MAX_ASN_ENCODED_DSS_SIGNATURE_LEN - cbOrig) + 1;
}
}
return cbAdjust;
}
//+-------------------------------------------------------------------------
// Encode the "to be signed" information. Sign the encoded "to be signed".
// Encode the "to be signed" and the signature.
//
// hCryptProv specifies the crypto provider to use to do the signature.
// It uses the specified private key.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptSignAndEncodeCertificate(
IN HCRYPTPROV hCryptProv,
IN DWORD dwKeySpec,
IN DWORD dwCertEncodingType,
IN LPCSTR lpszStructType,
IN const void *pvStructInfo,
IN PCRYPT_ALGORITHM_IDENTIFIER pSignatureAlgorithm,
IN OPTIONAL const void *pvHashAuxInfo,
OUT BYTE *pbEncoded,
IN OUT DWORD *pcbEncoded
)
{
BOOL fResult;
CERT_SIGNED_CONTENT_INFO SignedInfo;
memset(&SignedInfo, 0, sizeof(SignedInfo));
SignedInfo.SignatureAlgorithm = *pSignatureAlgorithm;
if (!AllocAndEncodeObject(
dwCertEncodingType,
lpszStructType,
pvStructInfo,
&SignedInfo.ToBeSigned.pbData,
&SignedInfo.ToBeSigned.cbData
)) goto ErrorReturn;
CryptSignCertificate(
hCryptProv,
dwKeySpec,
dwCertEncodingType,
SignedInfo.ToBeSigned.pbData,
SignedInfo.ToBeSigned.cbData,
&SignedInfo.SignatureAlgorithm,
pvHashAuxInfo,
NULL, // pbSignature
&SignedInfo.Signature.cbData
);
if (SignedInfo.Signature.cbData == 0) goto ErrorReturn;
SignedInfo.Signature.pbData =
(BYTE *) PkiNonzeroAlloc(SignedInfo.Signature.cbData);
if (SignedInfo.Signature.pbData == NULL) goto ErrorReturn;
if (pbEncoded) {
if (!CryptSignCertificate(
hCryptProv,
dwKeySpec,
dwCertEncodingType,
SignedInfo.ToBeSigned.pbData,
SignedInfo.ToBeSigned.cbData,
&SignedInfo.SignatureAlgorithm,
pvHashAuxInfo,
SignedInfo.Signature.pbData,
&SignedInfo.Signature.cbData
)) goto ErrorReturn;
}
fResult = CryptEncodeObject(
dwCertEncodingType,
X509_CERT,
&SignedInfo,
pbEncoded,
pcbEncoded
);
if (!fResult && *pcbEncoded) {
*pcbEncoded += AdjustForMaximumEncodedSignatureLength(
&SignedInfo.SignatureAlgorithm,
SignedInfo.Signature.cbData
);
}
CommonReturn:
PkiFree(SignedInfo.ToBeSigned.pbData);
PkiFree(SignedInfo.Signature.pbData);
return fResult;
ErrorReturn:
fResult = FALSE;
*pcbEncoded = 0;
goto CommonReturn;
}
//+-------------------------------------------------------------------------
// Verify the time validity of a certificate.
//
// Returns -1 if before NotBefore, +1 if after NotAfter and otherwise 0 for
// a valid certificate
//
// If pTimeToVerify is NULL, uses the current time.
//--------------------------------------------------------------------------
LONG
WINAPI
CertVerifyTimeValidity(
IN LPFILETIME pTimeToVerify,
IN PCERT_INFO pCertInfo
)
{
SYSTEMTIME SystemTime;
FILETIME FileTime;
LPFILETIME pFileTime;
if (pTimeToVerify)
pFileTime = pTimeToVerify;
else {
GetSystemTime(&SystemTime);
SystemTimeToFileTime(&SystemTime, &FileTime);
pFileTime = &FileTime;
}
if (CompareFileTime(pFileTime, &pCertInfo->NotBefore) < 0)
return -1;
else if (CompareFileTime(pFileTime, &pCertInfo->NotAfter) > 0)
return 1;
else
return 0;
}
//+-------------------------------------------------------------------------
// Verify the time validity of a CRL.
//
// Returns -1 if before ThisUpdate, +1 if after NextUpdate and otherwise 0 for
// a valid CRL
//
// If pTimeToVerify is NULL, uses the current time.
//--------------------------------------------------------------------------
LONG
WINAPI
CertVerifyCRLTimeValidity(
IN LPFILETIME pTimeToVerify,
IN PCRL_INFO pCrlInfo
)
{
SYSTEMTIME SystemTime;
FILETIME FileTime;
LPFILETIME pFileTime;
if (pTimeToVerify)
pFileTime = pTimeToVerify;
else {
GetSystemTime(&SystemTime);
SystemTimeToFileTime(&SystemTime, &FileTime);
pFileTime = &FileTime;
}
// Note, NextUpdate is optional. When not present, set to 0
if (CompareFileTime(pFileTime, &pCrlInfo->ThisUpdate) < 0)
return -1;
else if ((pCrlInfo->NextUpdate.dwLowDateTime ||
pCrlInfo->NextUpdate.dwHighDateTime) &&
CompareFileTime(pFileTime, &pCrlInfo->NextUpdate) > 0)
return 1;
else
return 0;
}
//+-------------------------------------------------------------------------
// Verify that the subject's time validity nests within the issuer's time
// validity.
//
// Returns TRUE if it nests. Otherwise, returns FALSE.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertVerifyValidityNesting(
IN PCERT_INFO pSubjectInfo,
IN PCERT_INFO pIssuerInfo
)
{
if ((CompareFileTime(&pSubjectInfo->NotBefore,
&pIssuerInfo->NotBefore) >= 0) &&
(CompareFileTime(&pSubjectInfo->NotAfter,
&pIssuerInfo->NotAfter) <= 0))
return TRUE;
else
return FALSE;
}
//+-------------------------------------------------------------------------
// Verify that the subject certificate isn't on its issuer CRL.
//
// Returns true if the certificate isn't on the CRL.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertVerifyCRLRevocation(
IN DWORD dwCertEncodingType,
IN PCERT_INFO pCertId, // Only the Issuer and SerialNumber
// fields are used
IN DWORD cCrlInfo,
IN PCRL_INFO rgpCrlInfo[]
)
{
DWORD InfoIdx;
for (InfoIdx = 0; InfoIdx < cCrlInfo; InfoIdx++) {
DWORD cEntry = rgpCrlInfo[InfoIdx]->cCRLEntry;
PCRL_ENTRY rgEntry = rgpCrlInfo[InfoIdx]->rgCRLEntry;
DWORD EntryIdx;
for (EntryIdx = 0; EntryIdx < cEntry; EntryIdx++) {
if (CertCompareIntegerBlob(&rgEntry[EntryIdx].SerialNumber,
&pCertId->SerialNumber))
// It has been revoked!!!
return FALSE;
}
}
return TRUE;
}
//+-------------------------------------------------------------------------
// Convert the CAPI AlgId to the ASN.1 Object Identifier string
//
// Returns NULL if there isn't an ObjId corresponding to the AlgId.
//--------------------------------------------------------------------------
LPCSTR
WINAPI
CertAlgIdToOID(
IN DWORD dwAlgId
)
{
DWORD dwGroupId;
for (dwGroupId = CRYPT_FIRST_ALG_OID_GROUP_ID;
dwGroupId <= CRYPT_LAST_ALG_OID_GROUP_ID; dwGroupId++) {
PCCRYPT_OID_INFO pInfo;
if (pInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_ALGID_KEY,
&dwAlgId,
dwGroupId
))
return pInfo->pszOID;
}
return NULL;
}
//+-------------------------------------------------------------------------
// Convert the ASN.1 Object Identifier string to the CAPI AlgId.
//
// Returns 0 if there isn't an AlgId corresponding to the ObjId.
//--------------------------------------------------------------------------
DWORD
WINAPI
CertOIDToAlgId(
IN LPCSTR pszObjId
)
{
DWORD dwGroupId;
for (dwGroupId = CRYPT_FIRST_ALG_OID_GROUP_ID;
dwGroupId <= CRYPT_LAST_ALG_OID_GROUP_ID; dwGroupId++) {
PCCRYPT_OID_INFO pInfo;
if (pInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
(void *) pszObjId,
dwGroupId
))
return pInfo->Algid;
}
return 0;
}
//+-------------------------------------------------------------------------
// Find an extension identified by its Object Identifier.
//
// If found, returns pointer to the extension. Otherwise, returns NULL.
//--------------------------------------------------------------------------
PCERT_EXTENSION
WINAPI
CertFindExtension(
IN LPCSTR pszObjId,
IN DWORD cExtensions,
IN CERT_EXTENSION rgExtensions[]
)
{
for (; cExtensions > 0; cExtensions--, rgExtensions++) {
if (strcmp(pszObjId, rgExtensions->pszObjId) == 0)
return rgExtensions;
}
return NULL;
}
//+-------------------------------------------------------------------------
// Find the first attribute identified by its Object Identifier.
//
// If found, returns pointer to the attribute. Otherwise, returns NULL.
//--------------------------------------------------------------------------
PCRYPT_ATTRIBUTE
WINAPI
CertFindAttribute(
IN LPCSTR pszObjId,
IN DWORD cAttr,
IN CRYPT_ATTRIBUTE rgAttr[]
)
{
for (; cAttr > 0; cAttr--, rgAttr++) {
if (strcmp(pszObjId, rgAttr->pszObjId) == 0)
return rgAttr;
}
return NULL;
}
//+-------------------------------------------------------------------------
// Find the first CERT_RDN attribute identified by its Object Identifier in
// the name's list of Relative Distinguished Names.
//
// If found, returns pointer to the attribute. Otherwise, returns NULL.
//--------------------------------------------------------------------------
PCERT_RDN_ATTR
WINAPI
CertFindRDNAttr(
IN LPCSTR pszObjId,
IN PCERT_NAME_INFO pName
)
{
DWORD cRDN = pName->cRDN;
PCERT_RDN pRDN = pName->rgRDN;
for ( ; cRDN > 0; cRDN--, pRDN++) {
DWORD cRDNAttr = pRDN->cRDNAttr;
PCERT_RDN_ATTR pRDNAttr = pRDN->rgRDNAttr;
for (; cRDNAttr > 0; cRDNAttr--, pRDNAttr++) {
if (strcmp(pszObjId, pRDNAttr->pszObjId) == 0)
return pRDNAttr;
}
}
return NULL;
}
//+-------------------------------------------------------------------------
// Get the intended key usage bytes from the certificate.
//
// If the certificate doesn't have any intended key usage bytes, returns FALSE
// and *pbKeyUsage is zeroed. Otherwise, returns TRUE and up through
// cbKeyUsage bytes are copied into *pbKeyUsage. Any remaining uncopied
// bytes are zeroed.
//--------------------------------------------------------------------------
BOOL
WINAPI
CertGetIntendedKeyUsage(
IN DWORD dwCertEncodingType,
IN PCERT_INFO pCertInfo,
OUT BYTE *pbKeyUsage,
IN DWORD cbKeyUsage
)
{
BOOL fResult;
DWORD cbData;
PCERT_EXTENSION pExt;
PCERT_KEY_ATTRIBUTES_INFO pKeyAttrInfo = NULL;
PCRYPT_BIT_BLOB pAllocKeyUsage = NULL;
PCRYPT_BIT_BLOB pKeyUsage = NULL; // not allocated
// First see if the certificate has the simple Key Usage Extension
if (NULL != (pExt = CertFindExtension(
szOID_KEY_USAGE,
pCertInfo->cExtension,
pCertInfo->rgExtension
)) &&
NULL != (pAllocKeyUsage =
(PCRYPT_BIT_BLOB) AllocAndDecodeObject(
dwCertEncodingType,
X509_KEY_USAGE,
pExt->Value.pbData,
pExt->Value.cbData
)))
pKeyUsage = pAllocKeyUsage;
else {
pExt = CertFindExtension(
szOID_KEY_ATTRIBUTES,
pCertInfo->cExtension,
pCertInfo->rgExtension
);
if (pExt == NULL) goto GetError;
if (NULL == (pKeyAttrInfo =
(PCERT_KEY_ATTRIBUTES_INFO) AllocAndDecodeObject(
dwCertEncodingType,
X509_KEY_ATTRIBUTES,
pExt->Value.pbData,
pExt->Value.cbData
))) goto ErrorReturn;
pKeyUsage = &pKeyAttrInfo->IntendedKeyUsage;
}
if (pKeyUsage->cbData == 0 || cbKeyUsage == 0)
goto GetError;
cbData = min(pKeyUsage->cbData, cbKeyUsage);
memcpy(pbKeyUsage, pKeyUsage->pbData, cbData);
fResult = TRUE;
goto CommonReturn;
GetError:
SetLastError(0);
ErrorReturn:
fResult = FALSE;
cbData = 0;
CommonReturn:
PkiFree(pAllocKeyUsage);
PkiFree(pKeyAttrInfo);
if (cbData < cbKeyUsage)
memset(pbKeyUsage + cbData, 0, cbKeyUsage - cbData);
return fResult;
}
static DWORD GetYPublicKeyLength(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPublicKeyInfo
)
{
PCRYPT_UINT_BLOB pY = NULL;
DWORD dwBitLen;
if (NULL == (pY = (PCRYPT_UINT_BLOB) AllocAndDecodeObject(
dwCertEncodingType,
X509_MULTI_BYTE_UINT,
pPublicKeyInfo->PublicKey.pbData,
pPublicKeyInfo->PublicKey.cbData
))) goto DecodePubKeyError;
dwBitLen = pY->cbData * 8;
CommonReturn:
PkiFree(pY);
return dwBitLen;
ErrorReturn:
dwBitLen = 0;
goto CommonReturn;
TRACE_ERROR(DecodePubKeyError)
}
// If there are parameters, use the length of the 'P' parameter. Otherwise,
// use the length of Y. Note, P's MSB must be set. Y's MSB may not be set.
static DWORD GetDHPublicKeyLength(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPublicKey
)
{
PCERT_X942_DH_PARAMETERS pDhParameters = NULL;
DWORD dwBitLen;
if (0 == pPublicKey->Algorithm.Parameters.cbData)
goto NoDhParametersError;
if (NULL == (pDhParameters =
(PCERT_X942_DH_PARAMETERS) AllocAndDecodeObject(
dwCertEncodingType,
X942_DH_PARAMETERS,
pPublicKey->Algorithm.Parameters.pbData,
pPublicKey->Algorithm.Parameters.cbData
))) goto DecodeParametersError;
dwBitLen = pDhParameters->p.cbData * 8;
CommonReturn:
PkiFree(pDhParameters);
return dwBitLen;
ErrorReturn:
dwBitLen = GetYPublicKeyLength(dwCertEncodingType, pPublicKey);
goto CommonReturn;
TRACE_ERROR(NoDhParametersError)
TRACE_ERROR(DecodeParametersError)
}
// If there are parameters, use the length of the 'P' parameter. Otherwise,
// use the length of Y. Note, P's MSB must be set. Y's MSB may not be set.
static DWORD GetDSSPublicKeyLength(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPublicKey
)
{
PCERT_DSS_PARAMETERS pDssParameters = NULL;
DWORD dwBitLen;
if (0 == pPublicKey->Algorithm.Parameters.cbData)
goto NoDssParametersError;
if (NULL == (pDssParameters = (PCERT_DSS_PARAMETERS) AllocAndDecodeObject(
dwCertEncodingType,
X509_DSS_PARAMETERS,
pPublicKey->Algorithm.Parameters.pbData,
pPublicKey->Algorithm.Parameters.cbData
))) goto DecodeParametersError;
dwBitLen = pDssParameters->p.cbData * 8;
CommonReturn:
PkiFree(pDssParameters);
return dwBitLen;
ErrorReturn:
dwBitLen = GetYPublicKeyLength(dwCertEncodingType, pPublicKey);
goto CommonReturn;
TRACE_ERROR(NoDssParametersError)
TRACE_ERROR(DecodeParametersError)
}
//+-------------------------------------------------------------------------
// Get the public/private key's bit length.
//
// Returns 0 if unable to determine the key's length.
//--------------------------------------------------------------------------
DWORD
WINAPI
CertGetPublicKeyLength(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPublicKey
)
{
DWORD dwErr = 0;
DWORD dwBitLen;
ALG_ID aiPubKey;
PCCRYPT_OID_INFO pOIDInfo;
HCRYPTPROV hCryptProv; // don't need to release
HCRYPTKEY hPubKey = 0;
DWORD cbData;
if (pOIDInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
pPublicKey->Algorithm.pszObjId,
CRYPT_PUBKEY_ALG_OID_GROUP_ID))
aiPubKey = pOIDInfo->Algid;
else
aiPubKey = 0;
if (aiPubKey == CALG_DH_SF || aiPubKey == CALG_DH_EPHEM)
return GetDHPublicKeyLength(
dwCertEncodingType,
pPublicKey
);
if (aiPubKey == CALG_DSS_SIGN)
return GetDSSPublicKeyLength(
dwCertEncodingType,
pPublicKey
);
if (0 == (hCryptProv = I_CryptGetDefaultCryptProv(aiPubKey)))
goto GetDefaultCryptProvError;
if (!CryptImportPublicKeyInfo(
hCryptProv,
dwCertEncodingType,
pPublicKey,
&hPubKey
)) goto ImportPublicKeyError;
cbData = sizeof(dwBitLen);
if (CryptGetKeyParam(
hPubKey,
KP_KEYLEN,
(BYTE *) &dwBitLen,
&cbData,
0)) // dwFlags
goto CommonReturn;
cbData = sizeof(dwBitLen);
if (CryptGetKeyParam(
hPubKey,
KP_BLOCKLEN,
(BYTE *) &dwBitLen,
&cbData,
0)) // dwFlags
goto CommonReturn;
{
// The CSP should have supported one of the above
// Export the public key and look at the bitlen field.
// The CAPI public key representation consists of the following
// sequence:
// - PUBLICKEYSTRUC
// - DSSPUBKEY | RSAPUBKEY (DSSPUBKEY is subset of RSAPUBKEY)
// ...
BYTE *pbPubKey = NULL;
DWORD cbPubKey;
dwBitLen = 0;
dwErr = GetLastError();
cbPubKey = 0;
if (CryptExportKey(
hPubKey,
0, // hPubKey
PUBLICKEYBLOB,
0, // dwFlags
NULL, // pbData
&cbPubKey
) &&
cbPubKey >= (sizeof(PUBLICKEYSTRUC) + sizeof(DSSPUBKEY)) &&
NULL != (pbPubKey = (BYTE *) PkiNonzeroAlloc(cbPubKey))) {
if (CryptExportKey(
hPubKey,
0, // hPubKey
PUBLICKEYBLOB,
0, // dwFlags
pbPubKey,
&cbPubKey
)) {
DSSPUBKEY *pPubKey =
(DSSPUBKEY *) (pbPubKey + sizeof(PUBLICKEYSTRUC));
dwBitLen = pPubKey->bitlen;
}
PkiFree(pbPubKey);
}
if (0 != dwBitLen)
goto CommonReturn;
SetLastError(dwErr);
goto GetKeyParamError;
}
CommonReturn:
if (hPubKey)
CryptDestroyKey(hPubKey);
SetLastError(dwErr);
return dwBitLen;
ErrorReturn:
dwBitLen = 0;
dwErr = GetLastError();
goto CommonReturn;
TRACE_ERROR(GetDefaultCryptProvError)
TRACE_ERROR(ImportPublicKeyError)
TRACE_ERROR(GetKeyParamError)
}
//+-------------------------------------------------------------------------
// Compute the hash of the encoded public key info.
//
// The public key info is encoded and then hashed.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptHashPublicKeyInfo(
IN HCRYPTPROV hCryptProv,
IN ALG_ID Algid,
IN DWORD dwFlags,
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pInfo,
OUT BYTE *pbComputedHash,
IN OUT DWORD *pcbComputedHash
)
{
BOOL fResult;
BYTE *pbEncoded = NULL;
DWORD cbEncoded;
if (!AllocAndEncodeObject(
dwCertEncodingType,
X509_PUBLIC_KEY_INFO,
pInfo,
&pbEncoded,
&cbEncoded
))
goto ErrorReturn;
fResult = CryptHashCertificate(
hCryptProv,
Algid ? Algid : CALG_MD5,
dwFlags,
pbEncoded,
cbEncoded,
pbComputedHash,
pcbComputedHash
);
goto CommonReturn;
ErrorReturn:
fResult = FALSE;
*pcbComputedHash = 0;
CommonReturn:
PkiFree(pbEncoded);
return fResult;
}
//+-------------------------------------------------------------------------
// Compares the certificate's public key with the provider's public key
// to see if they are identical.
//
// Returns TRUE if the keys are identical.
//--------------------------------------------------------------------------
BOOL
WINAPI
I_CertCompareCertAndProviderPublicKey(
IN PCCERT_CONTEXT pCert,
IN HCRYPTPROV hProv,
IN DWORD dwKeySpec
)
{
BOOL fResult;
PCERT_PUBLIC_KEY_INFO pProvPubKeyInfo = NULL;
DWORD cbProvPubKeyInfo;
DWORD dwCertEncodingType = pCert->dwCertEncodingType;
// Get provider's public key
if (!CryptExportPublicKeyInfo(
hProv,
dwKeySpec,
dwCertEncodingType,
NULL, // pProvPubKeyInfo
&cbProvPubKeyInfo
))
goto ExportPublicKeyInfoError;
assert(cbProvPubKeyInfo);
if (NULL == (pProvPubKeyInfo = (PCERT_PUBLIC_KEY_INFO) PkiNonzeroAlloc(
cbProvPubKeyInfo)))
goto OutOfMemory;
if (!CryptExportPublicKeyInfo(
hProv,
dwKeySpec,
dwCertEncodingType,
pProvPubKeyInfo,
&cbProvPubKeyInfo
))
goto ExportPublicKeyInfoError;
if (!CertComparePublicKeyInfo(
dwCertEncodingType,
&pCert->pCertInfo->SubjectPublicKeyInfo,
pProvPubKeyInfo
))
goto ComparePublicKeyError;
fResult = TRUE;
CommonReturn:
PkiFree(pProvPubKeyInfo);
return fResult;
ErrorReturn:
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(ExportPublicKeyInfoError)
TRACE_ERROR(OutOfMemory)
SET_ERROR(ComparePublicKeyError, NTE_BAD_PUBLIC_KEY)
}
//+=========================================================================
// CryptFindCertificateKeyProvInfo Support Functions
//-=========================================================================
static BOOL HasValidKeyProvInfo(
IN PCCERT_CONTEXT pCert,
IN DWORD dwFindKeySetFlags
)
{
BOOL fResult;
PCRYPT_KEY_PROV_INFO pKeyProvInfo = NULL;
HCRYPTPROV hProv = 0;
DWORD cbData;
DWORD dwAcquireFlags;
if (!CertGetCertificateContextProperty(
pCert,
CERT_KEY_PROV_INFO_PROP_ID,
NULL, // pvData
&cbData
))
return FALSE;
if (NULL == (pKeyProvInfo = (PCRYPT_KEY_PROV_INFO) PkiNonzeroAlloc(
cbData)))
goto OutOfMemory;
if (!CertGetCertificateContextProperty(
pCert,
CERT_KEY_PROV_INFO_PROP_ID,
pKeyProvInfo,
&cbData
))
goto GetKeyProvInfoPropertyError;
if (pKeyProvInfo->dwFlags & CRYPT_MACHINE_KEYSET) {
if (0 == (dwFindKeySetFlags & CRYPT_FIND_MACHINE_KEYSET_FLAG))
goto NotUserContainer;
} else {
if (0 == (dwFindKeySetFlags & CRYPT_FIND_USER_KEYSET_FLAG))
goto NotMachineContainer;
}
dwAcquireFlags = CRYPT_ACQUIRE_COMPARE_KEY_FLAG;
if (dwFindKeySetFlags & CRYPT_FIND_SILENT_KEYSET_FLAG)
dwAcquireFlags |= CRYPT_ACQUIRE_SILENT_FLAG;
if (!CryptAcquireCertificatePrivateKey(
pCert,
dwAcquireFlags,
NULL, // pvReserved
&hProv,
NULL, // pdwKeySpec
NULL // pfCallerFreeProv
))
goto AcquireCertPrivateKeyError;
fResult = TRUE;
CommonReturn:
PkiFree(pKeyProvInfo);
if (hProv) {
DWORD dwErr = GetLastError();
CryptReleaseContext(hProv, 0);
SetLastError(dwErr);
}
return fResult;
ErrorReturn:
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(OutOfMemory)
TRACE_ERROR(GetKeyProvInfoPropertyError)
SET_ERROR(NotUserContainer, NTE_NOT_FOUND)
SET_ERROR(NotMachineContainer, NTE_NOT_FOUND)
TRACE_ERROR(AcquireCertPrivateKeyError)
}
// Default to Algid being supported. Only return FALSE if successfully
// enumerated all the provider algorithms and didn't find a match.
static BOOL IsPublicKeyAlgidSupported(
IN PCCERT_CONTEXT pCert,
IN HCRYPTPROV hProv,
IN ALG_ID aiPubKey
)
{
BOOL fResult;
DWORD dwErr;
BYTE *pbData = NULL;
DWORD cbMaxData;
DWORD cbData;
DWORD dwFlags;
if (0 == aiPubKey)
return TRUE;
// Get maximum length of provider algorithm parameter data
cbMaxData = 0;
if (!CryptGetProvParam(
hProv,
PP_ENUMALGS,
NULL, // pbData
&cbMaxData,
CRYPT_FIRST // dwFlags
)) {
dwErr = GetLastError();
if (ERROR_MORE_DATA != dwErr)
goto GetProvAlgParamError;
}
if (0 == cbMaxData)
goto NoProvAlgParamError;
if (NULL == (pbData = (BYTE *) PkiNonzeroAlloc(cbMaxData)))
goto OutOfMemory;
dwFlags = CRYPT_FIRST;
while (TRUE) {
ALG_ID aiProv;
cbData = cbMaxData;
if (!CryptGetProvParam(
hProv,
PP_ENUMALGS,
pbData,
&cbData,
dwFlags
)) {
dwErr = GetLastError();
if (ERROR_NO_MORE_ITEMS == dwErr) {
fResult = FALSE;
goto PublicKeyAlgidNotSupported;
} else
goto GetProvAlgParamError;
}
assert(cbData >= sizeof(ALG_ID));
aiProv = *(ALG_ID *) pbData;
// Don't distinguish between exchange or signature
if (GET_ALG_TYPE(aiPubKey) == GET_ALG_TYPE(aiProv))
break;
dwFlags = 0; // CRYPT_NEXT
}
fResult = TRUE;
PublicKeyAlgidNotSupported:
CommonReturn:
PkiFree(pbData);
return fResult;
ErrorReturn:
// For an error, assume the public key algorithm is supported.
fResult = TRUE;
goto CommonReturn;
SET_ERROR_VAR(GetProvAlgParamError, dwErr)
SET_ERROR(NoProvAlgParamError, NTE_NOT_FOUND)
TRACE_ERROR(OutOfMemory)
}
// For success, updates the certificate's KEY_PROV_INFO property
//
// If container isn't found, LastError is set to ERROR_NO_MORE_ITEMS.
//
static BOOL FindContainerAndSetKeyProvInfo(
IN PCCERT_CONTEXT pCert,
IN HCRYPTPROV hProv,
IN LPWSTR pwszProvName,
IN DWORD dwProvType,
IN DWORD dwProvFlags // CRYPT_MACHINE_KEYSET and/or CRYPT_SILENT
)
{
BOOL fResult;
DWORD dwEnumFlags;
DWORD dwEnumErr = 0;
DWORD dwAcquireErr = 0;
LPSTR pszContainerName = NULL;
DWORD cchContainerName;
DWORD cchMaxContainerName;
LPWSTR pwszContainerName = NULL;
// Get maximum container name length
cchMaxContainerName = 0;
if (!CryptGetProvParam(
hProv,
PP_ENUMCONTAINERS,
NULL, // pbData
&cchMaxContainerName,
CRYPT_FIRST
)) {
dwEnumErr = GetLastError();
if (ERROR_FILE_NOT_FOUND == dwEnumErr ||
ERROR_INVALID_PARAMETER == dwEnumErr)
goto PublicKeyContainerNotFound;
else if (ERROR_MORE_DATA != dwEnumErr)
goto EnumContainersError;
}
if (0 == cchMaxContainerName)
goto PublicKeyContainerNotFound;
if (NULL == (pszContainerName = (LPSTR) PkiNonzeroAlloc(
cchMaxContainerName + 1)))
goto OutOfMemory;
dwEnumFlags = CRYPT_FIRST;
while (TRUE) {
HCRYPTPROV hContainerProv = 0;
LPWSTR pwszAcquireProvName = pwszProvName;
cchContainerName = cchMaxContainerName;
if (!CryptGetProvParam(
hProv,
PP_ENUMCONTAINERS,
(BYTE *) pszContainerName,
&cchContainerName,
dwEnumFlags
)) {
dwEnumErr = GetLastError();
if (ERROR_NO_MORE_ITEMS == dwEnumErr ||
ERROR_FILE_NOT_FOUND == dwEnumErr) {
if (0 != dwAcquireErr)
goto CryptAcquireContextError;
else
goto PublicKeyContainerNotFound;
} else
goto EnumContainersError;
}
dwEnumFlags = 0; // CRYPT_NEXT
if (NULL == (pwszContainerName = MkWStr(pszContainerName)))
goto OutOfMemory;
// First try using enhanced providers for the base guys
if (PROV_RSA_FULL == dwProvType &&
0 == _wcsicmp(pwszProvName, MS_DEF_PROV_W)) {
fResult = CryptAcquireContextU(
&hContainerProv,
pwszContainerName,
MS_ENHANCED_PROV_W,
PROV_RSA_FULL,
dwProvFlags
);
if (fResult)
pwszAcquireProvName = MS_ENHANCED_PROV_W;
} else if (PROV_DSS_DH == dwProvType &&
0 == _wcsicmp(pwszProvName, MS_DEF_DSS_DH_PROV_W)) {
fResult = CryptAcquireContextU(
&hContainerProv,
pwszContainerName,
MS_ENH_DSS_DH_PROV_W,
PROV_DSS_DH,
dwProvFlags
);
if (fResult)
pwszAcquireProvName = MS_ENH_DSS_DH_PROV_W;
} else
fResult = FALSE;
if (!fResult)
fResult = CryptAcquireContextU(
&hContainerProv,
pwszContainerName,
pwszAcquireProvName,
dwProvType,
dwProvFlags
);
if (!fResult)
dwAcquireErr = GetLastError();
else {
DWORD dwKeySpec;
dwKeySpec = AT_KEYEXCHANGE;
fResult = FALSE;
while (TRUE) {
if (I_CertCompareCertAndProviderPublicKey(
pCert,
hContainerProv,
dwKeySpec
)) {
fResult = TRUE;
break;
} else if (AT_SIGNATURE == dwKeySpec)
break;
else
dwKeySpec = AT_SIGNATURE;
}
CryptReleaseContext(hContainerProv, 0);
if (fResult) {
CRYPT_KEY_PROV_INFO KeyProvInfo;
memset(&KeyProvInfo, 0, sizeof(KeyProvInfo));
KeyProvInfo.pwszContainerName = pwszContainerName;
KeyProvInfo.pwszProvName = pwszAcquireProvName;
KeyProvInfo.dwProvType = dwProvType;
KeyProvInfo.dwFlags = dwProvFlags & ~CRYPT_SILENT;
KeyProvInfo.dwKeySpec = dwKeySpec;
if (!CertSetCertificateContextProperty(
pCert,
CERT_KEY_PROV_INFO_PROP_ID,
0, // dwFlags
&KeyProvInfo
))
goto SetKeyProvInfoPropertyError;
else
goto SuccessReturn;
}
}
FreeWStr(pwszContainerName);
pwszContainerName = NULL;
}
goto UnexpectedError;
SuccessReturn:
fResult = TRUE;
CommonReturn:
PkiFree(pszContainerName);
FreeWStr(pwszContainerName);
return fResult;
ErrorReturn:
fResult = FALSE;
goto CommonReturn;
SET_ERROR_VAR(EnumContainersError, dwEnumErr)
TRACE_ERROR(OutOfMemory)
SET_ERROR_VAR(CryptAcquireContextError, dwAcquireErr)
SET_ERROR(PublicKeyContainerNotFound, ERROR_NO_MORE_ITEMS)
TRACE_ERROR(SetKeyProvInfoPropertyError)
SET_ERROR(UnexpectedError, E_UNEXPECTED)
}
//+-------------------------------------------------------------------------
// Enumerates the cryptographic providers and their containers to find the
// private key corresponding to the certificate's public key. For a match,
// the certificate's CERT_KEY_PROV_INFO_PROP_ID property is updated.
//
// If the CERT_KEY_PROV_INFO_PROP_ID is already set, then, its checked to
// see if it matches the provider's public key. For a match, the above
// enumeration is skipped.
//
// By default both the user and machine key containers are searched.
// The CRYPT_FIND_USER_KEYSET_FLAG or CRYPT_FIND_MACHINE_KEYSET_FLAG
// can be set in dwFlags to restrict the search to either of the containers.
//
// The CRYPT_FIND_SILENT_KEYSET_FLAG can be set to suppress any UI by the CSP.
// See CryptAcquireContext's CRYPT_SILENT flag for more details.
//
// If a container isn't found, returns FALSE with LastError set to
// NTE_NO_KEY.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptFindCertificateKeyProvInfo(
IN PCCERT_CONTEXT pCert,
IN DWORD dwFlags,
IN void *pvReserved
)
{
BOOL fResult;
DWORD dwFindContainerErr = ERROR_NO_MORE_ITEMS;
DWORD dwAcquireErr = 0;
DWORD dwProvIndex;
PCCRYPT_OID_INFO pOIDInfo;
ALG_ID aiPubKey;
if (0 == (dwFlags &
(CRYPT_FIND_USER_KEYSET_FLAG | CRYPT_FIND_MACHINE_KEYSET_FLAG)))
dwFlags |=
CRYPT_FIND_USER_KEYSET_FLAG | CRYPT_FIND_MACHINE_KEYSET_FLAG;
if (HasValidKeyProvInfo(pCert, dwFlags))
return TRUE;
if (pOIDInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
pCert->pCertInfo->SubjectPublicKeyInfo.Algorithm.pszObjId,
CRYPT_PUBKEY_ALG_OID_GROUP_ID
))
aiPubKey = pOIDInfo->Algid;
else
aiPubKey = 0;
for (dwProvIndex = 0; TRUE; dwProvIndex++) {
LPWSTR pwszProvName;
DWORD cbProvName;
HCRYPTPROV hProv;
DWORD dwProvType;
cbProvName = 0;
dwProvType = 0;
if (!CryptEnumProvidersU(
dwProvIndex,
NULL, // pdwReserved
0, // dwFlags
&dwProvType,
NULL, // pwszProvName,
&cbProvName
) || 0 == cbProvName) {
if (0 == dwProvIndex)
goto EnumProvidersError;
else if (ERROR_NO_MORE_ITEMS != dwFindContainerErr)
goto FindContainerError;
else if (0 != dwAcquireErr)
goto CryptAcquireContextError;
else
goto KeyContainerNotFound;
}
if (NULL == (pwszProvName = (LPWSTR) PkiNonzeroAlloc(
(cbProvName + 1) * sizeof(WCHAR))))
goto OutOfMemory;
if (!CryptEnumProvidersU(
dwProvIndex,
NULL, // pdwReserved
0, // dwFlags
&dwProvType,
pwszProvName,
&cbProvName
)) {
PkiFree(pwszProvName);
goto EnumProvidersError;
}
fResult = FALSE;
if (!CryptAcquireContextU(
&hProv,
NULL, // pwszContainerName,
pwszProvName,
dwProvType,
CRYPT_VERIFYCONTEXT // dwFlags
)) {
dwAcquireErr = GetLastError();
hProv = 0; // CAPI bug, sets hCryptProv to nonzero
} else if (IsPublicKeyAlgidSupported(
pCert,
hProv,
aiPubKey
)) {
DWORD dwSetProvFlags;
if (dwFlags & CRYPT_FIND_SILENT_KEYSET_FLAG)
dwSetProvFlags = CRYPT_SILENT;
else
dwSetProvFlags = 0;
if (dwFlags & CRYPT_FIND_USER_KEYSET_FLAG) {
if (FindContainerAndSetKeyProvInfo(
pCert,
hProv,
pwszProvName,
dwProvType,
dwSetProvFlags
))
fResult = TRUE;
else if (ERROR_NO_MORE_ITEMS == dwFindContainerErr)
dwFindContainerErr = GetLastError();
}
if (!fResult && (dwFlags & CRYPT_FIND_MACHINE_KEYSET_FLAG)) {
CryptReleaseContext(hProv, 0);
if (!CryptAcquireContextU(
&hProv,
NULL, // pwszContainerName,
pwszProvName,
dwProvType,
CRYPT_VERIFYCONTEXT | CRYPT_MACHINE_KEYSET // dwFlags
)) {
dwAcquireErr = GetLastError();
hProv = 0; // CAPI bug, sets hCryptProv to nonzero
} else {
if (FindContainerAndSetKeyProvInfo(
pCert,
hProv,
pwszProvName,
dwProvType,
dwSetProvFlags | CRYPT_MACHINE_KEYSET
))
fResult = TRUE;
else if (ERROR_NO_MORE_ITEMS == dwFindContainerErr)
dwFindContainerErr = GetLastError();
}
}
}
if (hProv)
CryptReleaseContext(hProv, 0);
PkiFree(pwszProvName);
if (fResult)
goto CommonReturn;
}
goto UnexpectedError;
CommonReturn:
return fResult;
ErrorReturn:
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(EnumProvidersError)
SET_ERROR(KeyContainerNotFound, NTE_NO_KEY)
SET_ERROR_VAR(FindContainerError, dwFindContainerErr)
SET_ERROR_VAR(CryptAcquireContextError, dwAcquireErr)
TRACE_ERROR(OutOfMemory)
SET_ERROR(UnexpectedError, E_UNEXPECTED)
}
//+=========================================================================
// CryptCreatePublicKeyInfo, EncodePublicKeyAndParameters
// and CryptConvertPublicKeyInfo functions
//-=========================================================================
static BOOL EncodePublicKeyInfo(
IN LPCSTR pszPubKeyOID,
IN BYTE *pbEncodedPubKey,
IN DWORD cbEncodedPubKey,
IN BYTE *pbEncodedParameters,
IN DWORD cbEncodedParameters,
OUT PCERT_PUBLIC_KEY_INFO pInfo,
IN OUT DWORD *pcbInfo
)
{
BOOL fResult;
BYTE *pbExtra;
LONG lRemainExtra;
DWORD cbOID;
if (pInfo == NULL)
*pcbInfo = 0;
// for lRemainExtra < 0, LENGTH_ONLY calculation
lRemainExtra = (LONG) *pcbInfo - sizeof(CERT_PUBLIC_KEY_INFO);
if (lRemainExtra < 0)
pbExtra = NULL;
else
pbExtra = (BYTE *) pInfo + sizeof(CERT_PUBLIC_KEY_INFO);
cbOID = strlen(pszPubKeyOID) + 1;
lRemainExtra -= INFO_LEN_ALIGN(cbOID) +
INFO_LEN_ALIGN(cbEncodedParameters) + cbEncodedPubKey;
if (lRemainExtra >= 0) {
memset(pInfo, 0, sizeof(CERT_PUBLIC_KEY_INFO));
pInfo->Algorithm.pszObjId = (LPSTR) pbExtra;
memcpy(pbExtra, pszPubKeyOID, cbOID);
pbExtra += INFO_LEN_ALIGN(cbOID);
if (cbEncodedParameters) {
pInfo->Algorithm.Parameters.cbData = cbEncodedParameters;
pInfo->Algorithm.Parameters.pbData = pbExtra;
memcpy(pbExtra, pbEncodedParameters, cbEncodedParameters);
pbExtra += INFO_LEN_ALIGN(cbEncodedParameters);
}
pInfo->PublicKey.pbData = pbExtra;
pInfo->PublicKey.cbData = cbEncodedPubKey;
memcpy(pbExtra, pbEncodedPubKey, cbEncodedPubKey);
*pcbInfo = *pcbInfo - (DWORD) lRemainExtra;
} else {
*pcbInfo = *pcbInfo + (DWORD) -lRemainExtra;
if (pInfo) goto LengthError;
}
fResult = TRUE;
CommonReturn:
return fResult;
LengthError:
SetLastError((DWORD) ERROR_MORE_DATA);
fResult = FALSE;
goto CommonReturn;
}
// By default, the pPubKeyStruc->aiKeyAlg is used to find the appropriate
// public key Object Identifier. pszPubKeyOID can be set to override
// the default OID obtained from the aiKeyAlg.
BOOL
WINAPI
CryptCreatePublicKeyInfo(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyInfo,
IN OUT DWORD *pcbPubKeyInfo
)
{
BOOL fResult;
void *pvFuncAddr;
HCRYPTOIDFUNCADDR hFuncAddr;
LPCSTR pszEncodePubKeyOID;
BYTE *pbEncodedPubKey = NULL;
DWORD cbEncodedPubKey = 0;
BYTE *pbEncodedParameters = NULL;
DWORD cbEncodedParameters = 0;
PCERT_PUBLIC_KEY_INFO pPubKeyInfo = NULL;
DWORD cbPubKeyInfo;
if (NULL == pszPubKeyOID) {
PCCRYPT_OID_INFO pInfo;
if (NULL == (pInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_ALGID_KEY,
(void *) &pPubKeyStruc->aiKeyAlg,
CRYPT_PUBKEY_ALG_OID_GROUP_ID
)))
goto NoPubKeyOIDInfo;
pszEncodePubKeyOID = pInfo->pszOID;
} else
pszEncodePubKeyOID = pszPubKeyOID;
if (!CryptGetOIDFunctionAddress(
hEncodePubKeyFuncSet,
dwCertEncodingType,
pszEncodePubKeyOID,
0, // dwFlags
&pvFuncAddr,
&hFuncAddr)) {
PCCRYPT_OID_INFO pInfo;
if (NULL == pszPubKeyOID)
goto NoEncodePubKeyFunction;
if (NULL == (pInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_ALGID_KEY,
(void *) &pPubKeyStruc->aiKeyAlg,
CRYPT_PUBKEY_ALG_OID_GROUP_ID
)))
goto NoPubKeyOIDInfo;
pszEncodePubKeyOID = pInfo->pszOID;
if (!CryptGetOIDFunctionAddress(
hEncodePubKeyFuncSet,
dwCertEncodingType,
pszEncodePubKeyOID,
0, // dwFlags
&pvFuncAddr,
&hFuncAddr))
goto NoEncodePubKeyFunction;
}
if (NULL == pszPubKeyOID)
pszPubKeyOID = pszEncodePubKeyOID;
fResult = ((PFN_CRYPT_ENCODE_PUBLIC_KEY_AND_PARAMETERS) pvFuncAddr)(
dwCertEncodingType,
pszPubKeyOID,
pPubKeyStruc,
cbPubKeyStruc,
dwFlags,
pvReserved,
&pbEncodedPubKey,
&cbEncodedPubKey,
&pbEncodedParameters,
&cbEncodedParameters
);
CryptFreeOIDFunctionAddress(hFuncAddr, 0);
if (!fResult)
goto EncodePubKeyAndParametersError;
if (dwFlags & CRYPT_ALLOC_FLAG) {
if (!EncodePublicKeyInfo(
pszPubKeyOID,
pbEncodedPubKey,
cbEncodedPubKey,
pbEncodedParameters,
cbEncodedParameters,
NULL, // pPubKeyInfo
&cbPubKeyInfo
))
goto EncodePublicKeyInfoError;
if (NULL == (pPubKeyInfo =
(PCERT_PUBLIC_KEY_INFO) PkiDefaultCryptAlloc(cbPubKeyInfo)))
goto OutOfMemory;
*((PCERT_PUBLIC_KEY_INFO *) pvPubKeyInfo) = pPubKeyInfo;
} else {
pPubKeyInfo = (PCERT_PUBLIC_KEY_INFO) pvPubKeyInfo;
cbPubKeyInfo = *pcbPubKeyInfo;
}
fResult = EncodePublicKeyInfo(
pszPubKeyOID,
pbEncodedPubKey,
cbEncodedPubKey,
pbEncodedParameters,
cbEncodedParameters,
pPubKeyInfo,
&cbPubKeyInfo
);
if (!fResult && (dwFlags & CRYPT_ALLOC_FLAG))
goto ErrorReturn;
CommonReturn:
PkiDefaultCryptFree(pbEncodedPubKey);
PkiDefaultCryptFree(pbEncodedParameters);
*pcbPubKeyInfo = cbPubKeyInfo;
return fResult;
ErrorReturn:
if (dwFlags & CRYPT_ALLOC_FLAG) {
PkiDefaultCryptFree(pPubKeyInfo);
*((void **) pvPubKeyInfo) = NULL;
}
cbPubKeyInfo = 0;
fResult = FALSE;
goto CommonReturn;
SET_ERROR(NoPubKeyOIDInfo, ERROR_FILE_NOT_FOUND)
TRACE_ERROR(NoEncodePubKeyFunction)
TRACE_ERROR(EncodePubKeyAndParametersError)
TRACE_ERROR(EncodePublicKeyInfoError)
TRACE_ERROR(OutOfMemory)
}
BOOL
WINAPI
CryptConvertPublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
)
{
BOOL fResult;
void *pvFuncAddr;
HCRYPTOIDFUNCADDR hFuncAddr;
if (CryptGetOIDFunctionAddress(
hConvertPubKeyFuncSet,
dwCertEncodingType,
pPubKeyInfo->Algorithm.pszObjId,
0, // dwFlags
&pvFuncAddr,
&hFuncAddr)) {
fResult = ((PFN_CRYPT_CONVERT_PUBLIC_KEY_INFO) pvFuncAddr)(
dwCertEncodingType,
pPubKeyInfo,
dwFlags,
pvReserved,
pvPubKeyStruc,
pcbPubKeyStruc
);
CryptFreeOIDFunctionAddress(hFuncAddr, 0);
} else {
ALG_ID aiPubKey;
PCCRYPT_OID_INFO pOIDInfo;
if (pOIDInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
pPubKeyInfo->Algorithm.pszObjId,
CRYPT_PUBKEY_ALG_OID_GROUP_ID
))
aiPubKey = pOIDInfo->Algid;
else
aiPubKey = 0;
switch (aiPubKey) {
case CALG_DSS_SIGN:
fResult = ConvertDSSPublicKeyInfo(
dwCertEncodingType,
pPubKeyInfo,
dwFlags,
pvReserved,
pvPubKeyStruc,
pcbPubKeyStruc
);
break;
default:
// Attempt to decode as a PKCS #1 RSA public key
fResult = ConvertRSAPublicKeyInfo(
dwCertEncodingType,
pPubKeyInfo,
dwFlags,
pvReserved,
pvPubKeyStruc,
pcbPubKeyStruc
);
break;
}
}
return fResult;
}
//+-------------------------------------------------------------------------
// Encode the RSA public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeRSAPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
)
{
*ppbEncodedParameters = NULL;
*pcbEncodedParameters = 0;
return CryptEncodeObjectEx(
dwCertEncodingType,
RSA_CSP_PUBLICKEYBLOB,
pPubKeyStruc,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedPubKey,
pcbEncodedPubKey
);
}
//+-------------------------------------------------------------------------
// Convert as an RSA public key
//--------------------------------------------------------------------------
static BOOL WINAPI ConvertRSAPublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
)
{
return CryptDecodeObjectEx(
dwCertEncodingType,
RSA_CSP_PUBLICKEYBLOB,
pPubKeyInfo->PublicKey.pbData,
pPubKeyInfo->PublicKey.cbData,
(dwFlags & CRYPT_ALLOC_FLAG) ? CRYPT_DECODE_ALLOC_FLAG : 0,
NULL, // pDecodePara,
pvPubKeyStruc,
pcbPubKeyStruc
);
}
#ifndef DSS1
#define DSS1 ((DWORD)'D'+((DWORD)'S'<<8)+((DWORD)'S'<<16)+((DWORD)'1'<<24))
#endif
#define DSS_Q_LEN 20
//+-------------------------------------------------------------------------
// Encode the DSS public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeDSSPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
)
{
BOOL fResult;
BYTE *pbKeyBlob;
DSSPUBKEY *pCspPubKey;
DWORD cbKey;
BYTE *pbKey;
CERT_DSS_PARAMETERS DssParameters;
CRYPT_UINT_BLOB DssPubKey;
*ppbEncodedPubKey = NULL;
*ppbEncodedParameters = NULL;
// The CAPI public key representation consists of the following sequence:
// - PUBLICKEYSTRUC
// - DSSPUBKEY
// - rgbP[cbKey]
// - rgbQ[20]
// - rgbG[cbKey]
// - rgbY[cbKey]
// - DSSSEED
pbKeyBlob = (BYTE *) pPubKeyStruc;
pCspPubKey = (DSSPUBKEY *) (pbKeyBlob + sizeof(PUBLICKEYSTRUC));
pbKey = pbKeyBlob + sizeof(PUBLICKEYSTRUC) + sizeof(DSSPUBKEY);
cbKey = pCspPubKey->bitlen / 8;
assert(cbKey > 0);
assert(cbPubKeyStruc >= sizeof(PUBLICKEYSTRUC) + sizeof(DSSPUBKEY) +
cbKey + DSS_Q_LEN + cbKey + cbKey + sizeof(DSSSEED));
assert(pPubKeyStruc->bType == PUBLICKEYBLOB);
assert(pPubKeyStruc->bVersion == CUR_BLOB_VERSION);
assert(pPubKeyStruc->aiKeyAlg == CALG_DSS_SIGN);
assert(pCspPubKey->magic == DSS1);
assert(pCspPubKey->bitlen % 8 == 0);
if (pPubKeyStruc->bType != PUBLICKEYBLOB)
goto InvalidArg;
// Initialize DSS parameters from CSP data structure
DssParameters.p.cbData = cbKey;
DssParameters.p.pbData = pbKey;
pbKey += cbKey;
DssParameters.q.cbData = DSS_Q_LEN;
DssParameters.q.pbData = pbKey;
pbKey += DSS_Q_LEN;
DssParameters.g.cbData = cbKey;
DssParameters.g.pbData = pbKey;
pbKey += cbKey;
// Initialize DSS public key from CSP data structure
DssPubKey.cbData = cbKey;
DssPubKey.pbData = pbKey;
// Encode the parameters and public key
if (!CryptEncodeObjectEx(
dwCertEncodingType,
X509_DSS_PARAMETERS,
&DssParameters,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedParameters,
pcbEncodedParameters
)) goto ErrorReturn;
if (!CryptEncodeObjectEx(
dwCertEncodingType,
X509_DSS_PUBLICKEY,
&DssPubKey,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedPubKey,
pcbEncodedPubKey
)) goto ErrorReturn;
fResult = TRUE;
CommonReturn:
return fResult;
ErrorReturn:
PkiDefaultCryptFree(*ppbEncodedParameters);
PkiDefaultCryptFree(*ppbEncodedPubKey);
*ppbEncodedParameters = NULL;
*ppbEncodedPubKey = NULL;
*pcbEncodedParameters = 0;
*pcbEncodedPubKey = 0;
fResult = FALSE;
goto CommonReturn;
SET_ERROR(InvalidArg, E_INVALIDARG)
}
//+-------------------------------------------------------------------------
// Convert as an DSS public key
//--------------------------------------------------------------------------
static BOOL WINAPI ConvertDSSPublicKeyInfo(
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pPubKeyInfo,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT void *pvPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
)
{
BOOL fResult;
PCERT_DSS_PARAMETERS pDssParameters = NULL;
PCRYPT_UINT_BLOB pDssPubKey = NULL;
PUBLICKEYSTRUC *pPubKeyStruc = NULL;
DWORD cbPubKeyStruc;
BYTE *pbKeyBlob;
DSSPUBKEY *pCspPubKey;
DSSSEED *pCspSeed;
DWORD cbKey;
BYTE *pbKey;
DWORD cb;
if (0 == pPubKeyInfo->Algorithm.Parameters.cbData ||
NULL_ASN_TAG == *pPubKeyInfo->Algorithm.Parameters.pbData)
goto NoDssParametersError;
if (NULL == (pDssParameters = (PCERT_DSS_PARAMETERS) AllocAndDecodeObject(
dwCertEncodingType,
X509_DSS_PARAMETERS,
pPubKeyInfo->Algorithm.Parameters.pbData,
pPubKeyInfo->Algorithm.Parameters.cbData
))) goto DecodeParametersError;
if (NULL == (pDssPubKey = (PCRYPT_UINT_BLOB) AllocAndDecodeObject(
dwCertEncodingType,
X509_DSS_PUBLICKEY,
pPubKeyInfo->PublicKey.pbData,
pPubKeyInfo->PublicKey.cbData
))) goto DecodePubKeyError;
// The CAPI public key representation consists of the following sequence:
// - PUBLICKEYSTRUC
// - DSSPUBKEY
// - rgbP[cbKey]
// - rgbQ[20]
// - rgbG[cbKey]
// - rgbY[cbKey]
// - DSSSEED
cbKey = pDssParameters->p.cbData;
if (0 == cbKey)
goto InvalidDssParametersError;
cbPubKeyStruc = sizeof(PUBLICKEYSTRUC) + sizeof(DSSPUBKEY) +
cbKey + DSS_Q_LEN + cbKey + cbKey + sizeof(DSSSEED);
if (dwFlags & CRYPT_ALLOC_FLAG) {
if (NULL == (pPubKeyStruc =
(PUBLICKEYSTRUC *) PkiDefaultCryptAlloc(cbPubKeyStruc)))
goto OutOfMemory;
*((PUBLICKEYSTRUC **) pvPubKeyStruc) = pPubKeyStruc;
} else
pPubKeyStruc = (PUBLICKEYSTRUC *) pvPubKeyStruc;
fResult = TRUE;
if (pPubKeyStruc) {
if (0 == (dwFlags & CRYPT_ALLOC_FLAG) &&
*pcbPubKeyStruc < cbPubKeyStruc) {
SetLastError((DWORD) ERROR_MORE_DATA);
fResult = FALSE;
} else {
pbKeyBlob = (BYTE *) pPubKeyStruc;
pCspPubKey = (DSSPUBKEY *) (pbKeyBlob + sizeof(PUBLICKEYSTRUC));
pbKey = pbKeyBlob + sizeof(PUBLICKEYSTRUC) + sizeof(DSSPUBKEY);
// NOTE, the length of G and Y can be less than the length of P.
// The CSP requires G and Y to be padded out with 0x00 bytes if it
// is less and in little endian form
// PUBLICKEYSTRUC
pPubKeyStruc->bType = PUBLICKEYBLOB;
pPubKeyStruc->bVersion = CUR_BLOB_VERSION;
pPubKeyStruc->reserved = 0;
pPubKeyStruc->aiKeyAlg = CALG_DSS_SIGN;
// DSSPUBKEY
pCspPubKey->magic = DSS1;
pCspPubKey->bitlen = cbKey * 8;
// rgbP[cbKey]
memcpy(pbKey, pDssParameters->p.pbData, cbKey);
pbKey += cbKey;
// rgbQ[20]
cb = pDssParameters->q.cbData;
if (0 == cb || cb > DSS_Q_LEN)
goto InvalidDssParametersError;
memcpy(pbKey, pDssParameters->q.pbData, cb);
if (DSS_Q_LEN > cb)
memset(pbKey + cb, 0, DSS_Q_LEN - cb);
pbKey += DSS_Q_LEN;
// rgbG[cbKey]
cb = pDssParameters->g.cbData;
if (0 == cb || cb > cbKey)
goto InvalidDssParametersError;
memcpy(pbKey, pDssParameters->g.pbData, cb);
if (cbKey > cb)
memset(pbKey + cb, 0, cbKey - cb);
pbKey += cbKey;
// rgbY[cbKey]
cb = pDssPubKey->cbData;
if (0 == cb || cb > cbKey)
goto InvalidDssPubKeyError;
memcpy(pbKey, pDssPubKey->pbData, cb);
if (cbKey > cb)
memset(pbKey + cb, 0, cbKey - cb);
pbKey += cbKey;
// DSSSEED: set counter to 0xFFFFFFFF to indicate not available
pCspSeed = (DSSSEED *) pbKey;
memset(&pCspSeed->counter, 0xFF, sizeof(pCspSeed->counter));
}
}
CommonReturn:
*pcbPubKeyStruc = cbPubKeyStruc;
PkiFree(pDssParameters);
PkiFree(pDssPubKey);
return fResult;
ErrorReturn:
if (dwFlags & CRYPT_ALLOC_FLAG) {
PkiDefaultCryptFree(pPubKeyStruc);
*((PUBLICKEYSTRUC **) pvPubKeyStruc) = NULL;
}
cbPubKeyStruc = 0;
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(OutOfMemory)
TRACE_ERROR(DecodeParametersError)
TRACE_ERROR(DecodePubKeyError)
#ifdef CMS_PKCS7
SET_ERROR(NoDssParametersError, CRYPT_E_MISSING_PUBKEY_PARA)
#else
SET_ERROR(NoDssParametersError, E_INVALIDARG)
#endif // CMS_PKCS7
SET_ERROR(InvalidDssParametersError, E_INVALIDARG)
SET_ERROR(InvalidDssPubKeyError, E_INVALIDARG)
}
#ifndef DH3
#define DH3 (((DWORD)'D'<<8)+((DWORD)'H'<<16)+((DWORD)'3'<<24))
#endif
//+-------------------------------------------------------------------------
// Encode the RSA DH public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeRSADHPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
)
{
BOOL fResult;
BYTE *pbKeyBlob;
DHPUBKEY_VER3 *pCspPubKey;
DWORD cbP;
DWORD cbQ;
DWORD cbJ;
BYTE *pbKey;
CERT_DH_PARAMETERS DhParameters;
CRYPT_UINT_BLOB DhPubKey;
*ppbEncodedPubKey = NULL;
*ppbEncodedParameters = NULL;
// The CAPI public key representation consists of the following sequence:
// - PUBLICKEYSTRUC
// - DHPUBKEY_VER3
// - rgbP[cbP]
// - rgbQ[cbQ] -- not used in RSA_DH
// - rgbG[cbP]
// - rgbJ[cbJ] -- not used in RSA_DH
// - rgbY[cbP]
pbKeyBlob = (BYTE *) pPubKeyStruc;
pCspPubKey = (DHPUBKEY_VER3 *) (pbKeyBlob + sizeof(PUBLICKEYSTRUC));
pbKey = pbKeyBlob + sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3);
cbP = pCspPubKey->bitlenP / 8;
cbQ = pCspPubKey->bitlenQ / 8;
cbJ = pCspPubKey->bitlenJ / 8;
if (cbPubKeyStruc < sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3) +
cbP * 3 + cbQ + cbJ)
goto InvalidArg;
if (pPubKeyStruc->bType != PUBLICKEYBLOB)
goto InvalidArg;
if (pCspPubKey->magic != DH3)
goto InvalidArg;
assert(cbP > 0);
assert(cbPubKeyStruc >= sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3) +
cbP * 3 + cbQ + cbJ);
assert(pPubKeyStruc->bType == PUBLICKEYBLOB);
//assert(pPubKeyStruc->bVersion == 3);
assert(pPubKeyStruc->aiKeyAlg == CALG_DH_SF ||
pPubKeyStruc->aiKeyAlg == CALG_DH_EPHEM);
assert(pCspPubKey->magic == DH3);
assert(pCspPubKey->bitlenP % 8 == 0);
assert(pCspPubKey->bitlenQ % 8 == 0);
assert(pCspPubKey->bitlenJ % 8 == 0);
// Initialize the RSA DH Parameters from CSP data structure
DhParameters.p.pbData = pbKey;
DhParameters.p.cbData = cbP;
pbKey += cbP;
// No RSA DH Q parameter
pbKey += cbQ;
DhParameters.g.pbData = pbKey;
DhParameters.g.cbData = cbP;
pbKey += cbP;
// No RSA DH J parameter
pbKey += cbJ;
// Initialize DH public key from CSP data structure
DhPubKey.cbData = cbP;
DhPubKey.pbData = pbKey;
// Encode the parameters and public key
if (!CryptEncodeObjectEx(
dwCertEncodingType,
X509_DH_PARAMETERS,
&DhParameters,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedParameters,
pcbEncodedParameters
)) goto ErrorReturn;
if (!CryptEncodeObjectEx(
dwCertEncodingType,
X509_DH_PUBLICKEY,
&DhPubKey,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedPubKey,
pcbEncodedPubKey
)) goto ErrorReturn;
fResult = TRUE;
CommonReturn:
return fResult;
ErrorReturn:
PkiDefaultCryptFree(*ppbEncodedParameters);
PkiDefaultCryptFree(*ppbEncodedPubKey);
*ppbEncodedParameters = NULL;
*ppbEncodedPubKey = NULL;
*pcbEncodedParameters = 0;
*pcbEncodedPubKey = 0;
fResult = FALSE;
goto CommonReturn;
SET_ERROR(InvalidArg, E_INVALIDARG)
}
//+-------------------------------------------------------------------------
// Encode the X942 DH public key and parameters
//--------------------------------------------------------------------------
static BOOL WINAPI EncodeX942DHPublicKeyAndParameters(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE **ppbEncodedPubKey,
OUT DWORD *pcbEncodedPubKey,
OUT BYTE **ppbEncodedParameters,
OUT DWORD *pcbEncodedParameters
)
{
BOOL fResult;
BYTE *pbKeyBlob;
DHPUBKEY_VER3 *pCspPubKey;
DWORD cbP;
DWORD cbQ;
DWORD cbJ;
BYTE *pbKey;
CERT_X942_DH_PARAMETERS DhParameters;
CERT_X942_DH_VALIDATION_PARAMS DhValidationParams;
CRYPT_UINT_BLOB DhPubKey;
*ppbEncodedPubKey = NULL;
*ppbEncodedParameters = NULL;
// The CAPI public key representation consists of the following sequence:
// - PUBLICKEYSTRUC
// - DHPUBKEY_VER3
// - rgbP[cbP]
// - rgbQ[cbQ]
// - rgbG[cbP]
// - rgbJ[cbJ]
// - rgbY[cbP]
pbKeyBlob = (BYTE *) pPubKeyStruc;
pCspPubKey = (DHPUBKEY_VER3 *) (pbKeyBlob + sizeof(PUBLICKEYSTRUC));
pbKey = pbKeyBlob + sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3);
cbP = pCspPubKey->bitlenP / 8;
cbQ = pCspPubKey->bitlenQ / 8;
cbJ = pCspPubKey->bitlenJ / 8;
if (0 == cbQ)
return EncodeRSADHPublicKeyAndParameters(
dwCertEncodingType,
pszPubKeyOID,
pPubKeyStruc,
cbPubKeyStruc,
dwFlags,
pvReserved,
ppbEncodedPubKey,
pcbEncodedPubKey,
ppbEncodedParameters,
pcbEncodedParameters
);
if (cbPubKeyStruc < sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3) +
cbP * 3 + cbQ + cbJ)
goto InvalidArg;
if (pPubKeyStruc->bType != PUBLICKEYBLOB)
goto InvalidArg;
if (pCspPubKey->magic != DH3)
goto InvalidArg;
assert(cbP > 0);
assert(cbPubKeyStruc >= sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3) +
cbP * 3 + cbQ + cbJ);
assert(pPubKeyStruc->bType == PUBLICKEYBLOB);
//assert(pPubKeyStruc->bVersion == 3);
assert(pPubKeyStruc->aiKeyAlg == CALG_DH_SF ||
pPubKeyStruc->aiKeyAlg == CALG_DH_EPHEM);
assert(pCspPubKey->magic == DH3);
assert(pCspPubKey->bitlenP % 8 == 0);
assert(pCspPubKey->bitlenQ % 8 == 0);
assert(pCspPubKey->bitlenJ % 8 == 0);
// Initialize the X942 DH Parameters from CSP data structure
DhParameters.p.pbData = pbKey;
DhParameters.p.cbData = cbP;
pbKey += cbP;
DhParameters.q.pbData = pbKey;
DhParameters.q.cbData = cbQ;
pbKey += cbQ;
DhParameters.g.pbData = pbKey;
DhParameters.g.cbData = cbP;
pbKey += cbP;
DhParameters.j.pbData = pbKey;
DhParameters.j.cbData = cbJ;
pbKey += cbJ;
if (0xFFFFFFFF == pCspPubKey->DSSSeed.counter ||
0 == pCspPubKey->DSSSeed.counter)
DhParameters.pValidationParams = NULL;
else {
DhParameters.pValidationParams = &DhValidationParams;
DhValidationParams.pgenCounter = pCspPubKey->DSSSeed.counter;
DhValidationParams.seed.pbData = pCspPubKey->DSSSeed.seed;
DhValidationParams.seed.cbData = sizeof(pCspPubKey->DSSSeed.seed);
DhValidationParams.seed.cUnusedBits = 0;
}
// Initialize DH public key from CSP data structure
DhPubKey.cbData = cbP;
DhPubKey.pbData = pbKey;
// Encode the parameters and public key
if (!CryptEncodeObjectEx(
dwCertEncodingType,
X942_DH_PARAMETERS,
&DhParameters,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedParameters,
pcbEncodedParameters
)) goto ErrorReturn;
if (!CryptEncodeObjectEx(
dwCertEncodingType,
X509_DH_PUBLICKEY,
&DhPubKey,
CRYPT_ENCODE_ALLOC_FLAG,
NULL, // pEncodePara
(void *) ppbEncodedPubKey,
pcbEncodedPubKey
)) goto ErrorReturn;
fResult = TRUE;
CommonReturn:
return fResult;
ErrorReturn:
PkiDefaultCryptFree(*ppbEncodedParameters);
PkiDefaultCryptFree(*ppbEncodedPubKey);
*ppbEncodedParameters = NULL;
*ppbEncodedPubKey = NULL;
*pcbEncodedParameters = 0;
*pcbEncodedPubKey = 0;
fResult = FALSE;
goto CommonReturn;
SET_ERROR(InvalidArg, E_INVALIDARG)
}
#ifndef DH1
#define DH1 (((DWORD)'D'<<8)+((DWORD)'H'<<16)+((DWORD)'1'<<24))
#endif
// Convert a DH1 PublicKey Struc, to a DH3 PublicKey Struc by getting
// the P and G parameters from the hPubKey.
static BOOL ConvertDh1ToDh3PublicKeyStruc(
IN HCRYPTKEY hPubKey,
IN OUT PUBLICKEYSTRUC **ppPubKeyStruc,
IN OUT DWORD *pcbPubKeyStruc
)
{
BOOL fResult;
PUBLICKEYSTRUC *pDh1PubKeyStruc = *ppPubKeyStruc;
BYTE *pbDh1KeyBlob;
DHPUBKEY *pDh1CspPubKey;
BYTE *pbDh1Key;
PUBLICKEYSTRUC *pDh3PubKeyStruc = NULL;
DWORD cbDh3PubKeyStruc;
BYTE *pbDh3KeyBlob;
DHPUBKEY_VER3 *pDh3CspPubKey;
BYTE *pbDh3Key;
DWORD cbP;
DWORD cbData;
// The DH1 CAPI public key representation consists of the following
// sequence:
// - PUBLICKEYSTRUC
// - DHPUBKEY
// - rgbY[cbP]
pbDh1KeyBlob = (BYTE *) pDh1PubKeyStruc;
pDh1CspPubKey = (DHPUBKEY *) (pbDh1KeyBlob + sizeof(PUBLICKEYSTRUC));
pbDh1Key = pbDh1KeyBlob + sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY);
if (pDh1CspPubKey->magic != DH1)
return TRUE;
cbP = pDh1CspPubKey->bitlen / 8;
if (*pcbPubKeyStruc < sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY) + cbP)
goto InvalidArg;
// The DH3 CAPI public key representation consists of the following
// sequence:
// - PUBLICKEYSTRUC
// - DHPUBKEY_VER3
// - rgbP[cbP]
// - rgbQ[cbQ] -- will be omitted here
// - rgbG[cbP]
// - rgbJ[cbJ] -- will be omitted here
// - rgbY[cbP]
cbDh3PubKeyStruc = sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3) +
cbP * 3;
if (NULL == (pDh3PubKeyStruc = (PUBLICKEYSTRUC *) PkiZeroAlloc(
cbDh3PubKeyStruc)))
goto OutOfMemory;
pbDh3KeyBlob = (BYTE *) pDh3PubKeyStruc;
pDh3CspPubKey = (DHPUBKEY_VER3 *) (pbDh3KeyBlob + sizeof(PUBLICKEYSTRUC));
pbDh3Key = pbDh3KeyBlob + sizeof(PUBLICKEYSTRUC) + sizeof(DHPUBKEY_VER3);
pDh3PubKeyStruc->bType = PUBLICKEYBLOB;
pDh3PubKeyStruc->bVersion = 3;
pDh3PubKeyStruc->aiKeyAlg = CALG_DH_SF;
pDh3CspPubKey->magic = DH3;
pDh3CspPubKey->bitlenP = cbP * 8;
//pDh3CspPubKey->bitlenQ = 0;
//pDh3CspPubKey->bitlenJ = 0;
// Get the P parameter from the public key
cbData = cbP;
if (!CryptGetKeyParam(
hPubKey,
KP_P,
pbDh3Key,
&cbData,
0 // dwFlags
) || cbData != cbP)
goto GetPError;
pbDh3Key += cbP;
// No Q parameter
// Get G parameter from the public key
cbData = cbP;
if (!CryptGetKeyParam(
hPubKey,
KP_G,
pbDh3Key,
&cbData,
0 // dwFlags
) || cbData != cbP)
goto GetGError;
pbDh3Key += cbP;
// No J parameter
// Y
memcpy(pbDh3Key, pbDh1Key, cbP);
assert(pbDh3Key - pbDh3KeyBlob + cbP == cbDh3PubKeyStruc);
PkiFree(pDh1PubKeyStruc);
*ppPubKeyStruc = pDh3PubKeyStruc;
*pcbPubKeyStruc = cbDh3PubKeyStruc;
fResult = TRUE;
CommonReturn:
return fResult;
ErrorReturn:
fResult = FALSE;
PkiFree(pDh3PubKeyStruc);
goto CommonReturn;
SET_ERROR(InvalidArg, E_INVALIDARG)
TRACE_ERROR(OutOfMemory)
TRACE_ERROR(GetPError)
TRACE_ERROR(GetGError)
}
//+=========================================================================
// CryptExportPublicKeyInfo functions
//-=========================================================================
//+-------------------------------------------------------------------------
// Use the aiKeyAlg in the public key structure exported by the CSP to
// determine how to encode the public key.
//
// The dwFlags and pvAuxInfo aren't used.
//--------------------------------------------------------------------------
static BOOL WINAPI ExportCspPublicKeyInfoEx(
IN HCRYPTPROV hCryptProv,
IN DWORD dwKeySpec,
IN DWORD dwCertEncodingType,
IN OPTIONAL LPSTR pszPublicKeyObjId,
IN DWORD dwFlags,
IN OPTIONAL void *pvAuxInfo,
OUT PCERT_PUBLIC_KEY_INFO pInfo,
IN OUT DWORD *pcbInfo
)
{
BOOL fResult;
DWORD dwErr;
HCRYPTKEY hPubKey = 0;
PUBLICKEYSTRUC *pPubKeyStruc = NULL;
DWORD cbPubKeyStruc;
if (!CryptGetUserKey(
hCryptProv,
dwKeySpec,
&hPubKey
)) {
hPubKey = 0;
goto GetUserKeyError;
}
cbPubKeyStruc = 0;
if (!CryptExportKey(
hPubKey,
0, // hPubKey
PUBLICKEYBLOB,
0, // dwFlags
NULL, // pbData
&cbPubKeyStruc
) || (cbPubKeyStruc == 0))
goto ExportPublicKeyBlobError;
if (NULL == (pPubKeyStruc = (PUBLICKEYSTRUC *) PkiNonzeroAlloc(
cbPubKeyStruc)))
goto OutOfMemory;
if (!CryptExportKey(
hPubKey,
0, // hPubKey
PUBLICKEYBLOB,
0, // dwFlags
(BYTE *) pPubKeyStruc,
&cbPubKeyStruc
))
goto ExportPublicKeyBlobError;
if (CALG_DH_SF == pPubKeyStruc->aiKeyAlg ||
CALG_DH_EPHEM == pPubKeyStruc->aiKeyAlg) {
DWORD cbDh3PubKeyStruc;
PUBLICKEYSTRUC *pDh3PubKeyStruc;
// Check if the CSP supports DH3
cbDh3PubKeyStruc = 0;
if (!CryptExportKey(
hPubKey,
0, // hPubKey
PUBLICKEYBLOB,
CRYPT_BLOB_VER3,
NULL, // pbData
&cbDh3PubKeyStruc
) || (cbDh3PubKeyStruc == 0)) {
// Convert DH1 to DH3 by getting and adding the P and G
// parameters
if (!ConvertDh1ToDh3PublicKeyStruc(
hPubKey,
&pPubKeyStruc,
&cbPubKeyStruc
))
goto ConvertDh1ToDh3PublicKeyStrucError;
} else {
if (NULL == (pDh3PubKeyStruc = (PUBLICKEYSTRUC *) PkiNonzeroAlloc(
cbDh3PubKeyStruc)))
goto OutOfMemory;
if (!CryptExportKey(
hPubKey,
0, // hPubKey
PUBLICKEYBLOB,
CRYPT_BLOB_VER3,
(BYTE *) pDh3PubKeyStruc,
&cbDh3PubKeyStruc
)) {
PkiFree(pDh3PubKeyStruc);
goto ExportPublicKeyBlobError;
}
PkiFree(pPubKeyStruc);
pPubKeyStruc = pDh3PubKeyStruc;
cbPubKeyStruc = cbDh3PubKeyStruc;
}
if (NULL == pszPublicKeyObjId) {
DHPUBKEY_VER3 *pDh3CspPubKey;
// The CAPI public key representation consists of the
// following sequence:
// - PUBLICKEYSTRUC
// - DHPUBKEY_VER3
// - rgbP[cbP]
// - rgbQ[cbQ] -- not used in szOID_RSA_DH
// - rgbG[cbP]
// - rgbJ[cbJ] -- not used in szOID_RSA_DH
// - rgbY[cbP]
pDh3CspPubKey = (DHPUBKEY_VER3 *)
((BYTE*) pPubKeyStruc + sizeof(PUBLICKEYSTRUC));
if (DH3 == pDh3CspPubKey->magic && 0 == pDh3CspPubKey->bitlenQ)
// szOID_RSA_DH indicates no Q parameter
pszPublicKeyObjId = szOID_RSA_DH;
}
}
fResult = CryptCreatePublicKeyInfo(
dwCertEncodingType,
pszPublicKeyObjId,
pPubKeyStruc,
cbPubKeyStruc,
0, // dwFlags
NULL, // pvAuxInfo
pInfo,
pcbInfo
);
CommonReturn:
dwErr = GetLastError();
if (hPubKey)
CryptDestroyKey(hPubKey);
PkiFree(pPubKeyStruc);
SetLastError(dwErr);
return fResult;
ErrorReturn:
*pcbInfo = 0;
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(GetUserKeyError)
TRACE_ERROR(ExportPublicKeyBlobError)
TRACE_ERROR(OutOfMemory)
TRACE_ERROR(ConvertDh1ToDh3PublicKeyStrucError)
}
//+-------------------------------------------------------------------------
// Export the public key info associated with the provider's corresponding
// private key.
//
// Uses the dwCertEncodingType and pszPublicKeyObjId to call the
// installable CRYPT_OID_EXPORT_PUBLIC_KEY_INFO_FUNC. The called function
// has the same signature as CryptExportPublicKeyInfoEx.
//
// If unable to find an installable OID function for the pszPublicKeyObjId,
// attempts to export via the default export function.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptExportPublicKeyInfoEx(
IN HCRYPTPROV hCryptProv,
IN DWORD dwKeySpec,
IN DWORD dwCertEncodingType,
IN OPTIONAL LPSTR pszPublicKeyObjId,
IN DWORD dwFlags,
IN OPTIONAL void *pvAuxInfo,
OUT PCERT_PUBLIC_KEY_INFO pInfo,
IN OUT DWORD *pcbInfo
)
{
BOOL fResult;
void *pvFuncAddr;
HCRYPTOIDFUNCADDR hFuncAddr;
if (pszPublicKeyObjId && CryptGetOIDFunctionAddress(
hExportPubKeyFuncSet,
dwCertEncodingType,
pszPublicKeyObjId,
0, // dwFlags
&pvFuncAddr,
&hFuncAddr)) {
fResult = ((PFN_EXPORT_PUB_KEY_FUNC) pvFuncAddr)(
hCryptProv,
dwKeySpec,
dwCertEncodingType,
pszPublicKeyObjId,
dwFlags,
pvAuxInfo,
pInfo,
pcbInfo
);
CryptFreeOIDFunctionAddress(hFuncAddr, 0);
} else
// Attempt to export via the default function that looks at the
// public key algorithm in the public key struc exported by the CSP.
fResult = ExportCspPublicKeyInfoEx(
hCryptProv,
dwKeySpec,
dwCertEncodingType,
pszPublicKeyObjId,
dwFlags,
pvAuxInfo,
pInfo,
pcbInfo
);
return fResult;
}
//+-------------------------------------------------------------------------
// Export the public key info associated with the provider's corresponding
// private key.
//
// Calls CryptExportPublicKeyInfoEx with pszPublicKeyObjId = NULL,
// dwFlags = 0 and pvAuxInfo = NULL.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptExportPublicKeyInfo(
IN HCRYPTPROV hCryptProv,
IN DWORD dwKeySpec,
IN DWORD dwCertEncodingType,
OUT PCERT_PUBLIC_KEY_INFO pInfo,
IN OUT DWORD *pcbInfo
)
{
return CryptExportPublicKeyInfoEx(
hCryptProv,
dwKeySpec,
dwCertEncodingType,
NULL, // pszPublicKeyObjId
0, // dwFlags
NULL, // pvAuxInfo
pInfo,
pcbInfo
);
}
//+=========================================================================
// CryptImportPublicKeyInfo functions
//-=========================================================================
//+-------------------------------------------------------------------------
// Convert and import the public key info into the provider and return a
// handle to the public key.
//
// Uses the dwCertEncodingType and pInfo->Algorithm.pszObjId to call the
// installable CRYPT_OID_IMPORT_PUBLIC_KEY_INFO_FUNC. The called function
// has the same signature as CryptImportPublicKeyInfoEx.
//
// If unable to find an installable OID function for the pszObjId,
// decodes the PublicKeyInfo into a CSP PublicKey Blob and imports.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptImportPublicKeyInfoEx(
IN HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pInfo,
IN ALG_ID aiKeyAlg,
IN DWORD dwFlags,
IN OPTIONAL void *pvAuxInfo,
OUT HCRYPTKEY *phKey
)
{
BOOL fResult;
void *pvFuncAddr;
HCRYPTOIDFUNCADDR hFuncAddr;
PUBLICKEYSTRUC *pPubKeyStruc = NULL;
DWORD cbPubKeyStruc;
if (CryptGetOIDFunctionAddress(
hImportPubKeyFuncSet,
dwCertEncodingType,
pInfo->Algorithm.pszObjId,
0, // dwFlags
&pvFuncAddr,
&hFuncAddr)) {
fResult = ((PFN_IMPORT_PUB_KEY_FUNC) pvFuncAddr)(
hCryptProv,
dwCertEncodingType,
pInfo,
aiKeyAlg,
dwFlags,
pvAuxInfo,
phKey
);
CryptFreeOIDFunctionAddress(hFuncAddr, 0);
} else {
if (!CryptConvertPublicKeyInfo(
dwCertEncodingType,
pInfo,
CRYPT_ALLOC_FLAG,
NULL, // pvReserved
(void *) &pPubKeyStruc,
&cbPubKeyStruc
))
goto ConvertPublicKeyInfoError;
if (aiKeyAlg)
pPubKeyStruc->aiKeyAlg = aiKeyAlg;
if (!CryptImportKey(
hCryptProv,
(BYTE *) pPubKeyStruc,
cbPubKeyStruc,
NULL, // hImpKey
0, // dwFlags
phKey
))
goto ImportKeyError;
fResult = TRUE;
}
CommonReturn:
PkiDefaultCryptFree(pPubKeyStruc);
return fResult;
ErrorReturn:
*phKey = NULL;
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(ConvertPublicKeyInfoError)
TRACE_ERROR(ImportKeyError)
}
//+-------------------------------------------------------------------------
// Convert and import the public key info into the provider and return a
// handle to the public key.
//
// Calls CryptImportPublicKeyInfoEx with aiKeyAlg = 0, dwFlags = 0 and
// pvAuxInfo = NULL.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptImportPublicKeyInfo(
IN HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN PCERT_PUBLIC_KEY_INFO pInfo,
OUT HCRYPTKEY *phKey
)
{
return CryptImportPublicKeyInfoEx(
hCryptProv,
dwCertEncodingType,
pInfo,
0, // aiKeyAlg
0, // dwFlags
NULL, // pvAuxInfo
phKey
);
}
//+-------------------------------------------------------------------------
// Create a KeyIdentifier from the CSP Public Key Blob.
//
// Converts the CSP PUBLICKEYSTRUC into a X.509 CERT_PUBLIC_KEY_INFO and
// encodes. The encoded CERT_PUBLIC_KEY_INFO is SHA1 hashed to obtain
// the Key Identifier.
//
// By default, the pPubKeyStruc->aiKeyAlg is used to find the appropriate
// public key Object Identifier. pszPubKeyOID can be set to override
// the default OID obtained from the aiKeyAlg.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptCreateKeyIdentifierFromCSP(
IN DWORD dwCertEncodingType,
IN OPTIONAL LPCSTR pszPubKeyOID,
IN const PUBLICKEYSTRUC *pPubKeyStruc,
IN DWORD cbPubKeyStruc,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved,
OUT BYTE *pbHash,
IN OUT DWORD *pcbHash
)
{
BOOL fResult;
PCERT_PUBLIC_KEY_INFO pInfo = NULL;
DWORD cbInfo;
if (!CryptCreatePublicKeyInfo(
dwCertEncodingType,
pszPubKeyOID,
pPubKeyStruc,
cbPubKeyStruc,
CRYPT_ALLOC_FLAG,
NULL, // pvReserved
(void *) &pInfo,
&cbInfo
))
goto CreatePublicKeyInfoError;
fResult = CryptHashPublicKeyInfo(
NULL, // hCryptProv
CALG_SHA1,
0, // dwFlags
dwCertEncodingType,
pInfo,
pbHash,
pcbHash
);
CommonReturn:
PkiDefaultCryptFree(pInfo);
return fResult;
ErrorReturn:
*pcbHash = 0;
fResult = FALSE;
goto CommonReturn;
TRACE_ERROR(CreatePublicKeyInfoError)
}
//+=========================================================================
// DefaultContext APIs and Data Structures
//-=========================================================================
static BOOL InstallThreadDefaultContext(
IN PDEFAULT_CONTEXT pDefaultContext
)
{
PDEFAULT_CONTEXT pNext;
pNext = (PDEFAULT_CONTEXT) I_CryptGetTls(hTlsDefaultContext);
if (pNext) {
pDefaultContext->pNext = pNext;
pNext->pPrev = pDefaultContext;
}
fHasThreadDefaultContext = TRUE;
return I_CryptSetTls(hTlsDefaultContext, pDefaultContext);
}
static BOOL InstallProcessDefaultContext(
IN PDEFAULT_CONTEXT pDefaultContext
)
{
EnterCriticalSection(&DefaultContextCriticalSection);
if (pProcessDefaultContextHead) {
pDefaultContext->pNext = pProcessDefaultContextHead;
pProcessDefaultContextHead->pPrev = pDefaultContext;
}
pProcessDefaultContextHead = pDefaultContext;
fHasProcessDefaultContext = TRUE;
LeaveCriticalSection(&DefaultContextCriticalSection);
return TRUE;
}
//+-------------------------------------------------------------------------
// Install a previously CryptAcquiredContext'ed HCRYPTPROV to be used as
// a default context.
//
// dwDefaultType and pvDefaultPara specify where the default context is used.
// For example, install the HCRYPTPROV to be used to verify certificate's
// having szOID_OIWSEC_md5RSA signatures.
//
// By default, the installed HCRYPTPROV is only applicable to the current
// thread. Set CRYPT_DEFAULT_CONTEXT_PROCESS_FLAG to allow the HCRYPTPROV
// to be used by all threads in the current process.
//
// For a successful install, TRUE is returned and *phDefaultContext is
// updated with the HANDLE to be passed to CryptUninstallDefaultContext.
//
// The installed HCRYPTPROVs are stack ordered (the last installed
// HCRYPTPROV is checked first). All thread installed HCRYPTPROVs are
// checked before any process HCRYPTPROVs.
//
// The installed HCRYPTPROV remains available for default usage until
// CryptUninstallDefaultContext is called or the thread or process exits.
//
// If CRYPT_DEFAULT_CONTEXT_AUTO_RELEASE_FLAG is set, then, the HCRYPTPROV
// is CryptReleaseContext'ed at thread or process exit. However,
// not CryptReleaseContext'ed if CryptUninstallDefaultContext is
// called.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptInstallDefaultContext(
IN HCRYPTPROV hCryptProv,
IN DWORD dwDefaultType,
IN const void *pvDefaultPara,
IN DWORD dwFlags,
IN void *pvReserved,
OUT HCRYPTDEFAULTCONTEXT *phDefaultContext
)
{
BOOL fResult;
CRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA MultiOIDPara;
LPSTR rgpszOID[1];
PCRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA pMultiOIDPara;
PDEFAULT_CONTEXT pDefaultContext = NULL;
DWORD cbDefaultContext;
BYTE *pbExtra;
DWORD cbExtra;
if (CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID == dwDefaultType) {
dwDefaultType = CRYPT_DEFAULT_CONTEXT_MULTI_CERT_SIGN_OID;
if (pvDefaultPara) {
rgpszOID[0] = (LPSTR) pvDefaultPara;
MultiOIDPara.cOID = 1;
MultiOIDPara.rgpszOID = rgpszOID;
pvDefaultPara = (const void *) &MultiOIDPara;
}
}
if (CRYPT_DEFAULT_CONTEXT_MULTI_CERT_SIGN_OID != dwDefaultType)
goto InvalidArg;
pMultiOIDPara = (PCRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA) pvDefaultPara;
if (pMultiOIDPara) {
DWORD cOID = pMultiOIDPara->cOID;
LPSTR *ppszOID = pMultiOIDPara->rgpszOID;
if (0 == cOID)
goto InvalidArg;
cbExtra = INFO_LEN_ALIGN(sizeof(CRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA)) +
cOID * sizeof(LPSTR);
for ( ; cOID; cOID--, ppszOID++)
cbExtra += strlen(*ppszOID) + 1;
} else {
if (dwFlags & CRYPT_DEFAULT_CONTEXT_PROCESS_FLAG)
goto InvalidArg;
cbExtra = 0;
}
cbDefaultContext = INFO_LEN_ALIGN(sizeof(DEFAULT_CONTEXT)) + cbExtra;
if (NULL == (pDefaultContext = (PDEFAULT_CONTEXT) PkiZeroAlloc(
cbDefaultContext)))
goto OutOfMemory;
pDefaultContext->hCryptProv = hCryptProv;
pDefaultContext->dwDefaultType = dwDefaultType;
pDefaultContext->dwFlags = dwFlags;
pbExtra = ((BYTE *) pDefaultContext) +
INFO_LEN_ALIGN(sizeof(DEFAULT_CONTEXT));
if (cbExtra) {
DWORD cOID = pMultiOIDPara->cOID;
LPSTR *ppszOID = pMultiOIDPara->rgpszOID;
PCRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA pOIDDefaultPara;
LPSTR *ppszOIDDefault;
assert(cOID);
pOIDDefaultPara = (PCRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA) pbExtra;
pDefaultContext->pOIDDefaultPara = pOIDDefaultPara;
pbExtra += INFO_LEN_ALIGN(sizeof(CRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA));
ppszOIDDefault = (LPSTR *) pbExtra;
pbExtra += cOID * sizeof(LPSTR);
pOIDDefaultPara->cOID = cOID;
pOIDDefaultPara->rgpszOID = ppszOIDDefault;
for ( ; cOID; cOID--, ppszOID++, ppszOIDDefault++) {
DWORD cch = strlen(*ppszOID) + 1;
memcpy(pbExtra, *ppszOID, cch);
*ppszOIDDefault = (LPSTR) pbExtra;
pbExtra += cch;
}
}
assert(pbExtra == ((BYTE *) pDefaultContext) + cbDefaultContext);
if (dwFlags & CRYPT_DEFAULT_CONTEXT_PROCESS_FLAG)
fResult = InstallProcessDefaultContext(pDefaultContext);
else
fResult = InstallThreadDefaultContext(pDefaultContext);
if (!fResult)
goto ErrorReturn;
CommonReturn:
*phDefaultContext = (HCRYPTDEFAULTCONTEXT) pDefaultContext;
return fResult;
ErrorReturn:
PkiFree(pDefaultContext);
fResult = FALSE;
goto CommonReturn;
SET_ERROR(InvalidArg, E_INVALIDARG)
TRACE_ERROR(OutOfMemory)
}
//+-------------------------------------------------------------------------
// Uninstall a default context previously installed by
// CryptInstallDefaultContext.
//
// For a default context installed with CRYPT_DEFAULT_CONTEXT_PROCESS_FLAG
// set, if any other threads are currently using this context,
// this function will block until they finish.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptUninstallDefaultContext(
HCRYPTDEFAULTCONTEXT hDefaultContext,
IN DWORD dwFlags,
IN void *pvReserved
)
{
BOOL fResult;
PDEFAULT_CONTEXT pDefaultContext = (PDEFAULT_CONTEXT) hDefaultContext;
PDEFAULT_CONTEXT pDefaultContextHead;
BOOL fProcess;
if (NULL == pDefaultContext)
return TRUE;
fProcess = (pDefaultContext->dwFlags & CRYPT_DEFAULT_CONTEXT_PROCESS_FLAG);
if (fProcess) {
EnterCriticalSection(&DefaultContextCriticalSection);
pDefaultContextHead = pProcessDefaultContextHead;
} else {
pDefaultContextHead = (PDEFAULT_CONTEXT) I_CryptGetTls(
hTlsDefaultContext);
}
if (NULL == pDefaultContextHead)
goto InvalidArg;
// Remove context from the list
if (pDefaultContext->pNext)
pDefaultContext->pNext->pPrev = pDefaultContext->pPrev;
if (pDefaultContext->pPrev)
pDefaultContext->pPrev->pNext = pDefaultContext->pNext;
else if (pDefaultContext == pDefaultContextHead) {
pDefaultContextHead = pDefaultContext->pNext;
if (fProcess)
pProcessDefaultContextHead = pDefaultContextHead;
else
I_CryptSetTls(hTlsDefaultContext, pDefaultContextHead);
} else
goto InvalidArg;
if (fProcess) {
if (pDefaultContext->lRefCnt) {
// Wait for all uses of the hCryptProv handle to finish
if (NULL == (pDefaultContext->hWait = CreateEvent(
NULL, // lpsa
FALSE, // fManualReset
FALSE, // fInitialState
NULL))) { // lpszEventName
assert(pDefaultContext->hWait);
goto UnexpectedError;
}
while (pDefaultContext->lRefCnt) {
LeaveCriticalSection(&DefaultContextCriticalSection);
WaitForSingleObject(pDefaultContext->hWait, INFINITE);
EnterCriticalSection(&DefaultContextCriticalSection);
}
CloseHandle(pDefaultContext->hWait);
pDefaultContext->hWait = NULL;
}
}
PkiFree(pDefaultContext);
fResult = TRUE;
CommonReturn:
if (fProcess)
LeaveCriticalSection(&DefaultContextCriticalSection);
return fResult;
ErrorReturn:
fResult = FALSE;
goto CommonReturn;
SET_ERROR(InvalidArg, E_INVALIDARG)
SET_ERROR(UnexpectedError, E_UNEXPECTED)
}
static PDEFAULT_CONTEXT FindDefaultContext(
IN DWORD dwDefaultType,
IN const void *pvDefaultPara,
IN PDEFAULT_CONTEXT pDefaultContext
)
{
for ( ; pDefaultContext; pDefaultContext = pDefaultContext->pNext) {
switch (dwDefaultType) {
case CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID:
if (CRYPT_DEFAULT_CONTEXT_MULTI_CERT_SIGN_OID ==
pDefaultContext->dwDefaultType) {
PCRYPT_DEFAULT_CONTEXT_MULTI_OID_PARA pOIDDefaultPara =
pDefaultContext->pOIDDefaultPara;
DWORD cOID;
LPSTR *ppszOID;
if (NULL == pOIDDefaultPara)
return pDefaultContext;
cOID = pOIDDefaultPara->cOID;
ppszOID = pOIDDefaultPara->rgpszOID;
for ( ; cOID; cOID--, ppszOID++) {
if (0 == strcmp(*ppszOID, (LPSTR) pvDefaultPara))
return pDefaultContext;
}
}
break;
default:
return NULL;
}
}
return NULL;
}
//
// dwDefaultTypes:
// CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID (pvDefaultPara :== pszOID)
BOOL
WINAPI
I_CryptGetDefaultContext(
IN DWORD dwDefaultType,
IN const void *pvDefaultPara,
OUT HCRYPTPROV *phCryptProv,
OUT HCRYPTDEFAULTCONTEXT *phDefaultContext
)
{
if (fHasThreadDefaultContext) {
PDEFAULT_CONTEXT pDefaultContext;
pDefaultContext = (PDEFAULT_CONTEXT) I_CryptGetTls(hTlsDefaultContext);
if (pDefaultContext = FindDefaultContext(
dwDefaultType,
pvDefaultPara,
pDefaultContext
)) {
*phCryptProv = pDefaultContext->hCryptProv;
*phDefaultContext = NULL;
return TRUE;
}
}
if (fHasProcessDefaultContext) {
PDEFAULT_CONTEXT pDefaultContext;
EnterCriticalSection(&DefaultContextCriticalSection);
if (pDefaultContext = FindDefaultContext(
dwDefaultType,
pvDefaultPara,
pProcessDefaultContextHead
))
pDefaultContext->lRefCnt++;
LeaveCriticalSection(&DefaultContextCriticalSection);
if (pDefaultContext) {
*phCryptProv = pDefaultContext->hCryptProv;
*phDefaultContext = (HCRYPTDEFAULTCONTEXT) pDefaultContext;
return TRUE;
}
}
*phCryptProv = NULL;
*phDefaultContext = NULL;
return FALSE;
}
// hDefaultContext is only NON-null for Process default context
void
WINAPI
I_CryptFreeDefaultContext(
HCRYPTDEFAULTCONTEXT hDefaultContext
)
{
PDEFAULT_CONTEXT pDefaultContext = (PDEFAULT_CONTEXT) hDefaultContext;
if (NULL == pDefaultContext)
return;
assert(pDefaultContext->dwFlags & CRYPT_DEFAULT_CONTEXT_PROCESS_FLAG);
assert(0 < pDefaultContext->lRefCnt);
EnterCriticalSection(&DefaultContextCriticalSection);
if (0 == --pDefaultContext->lRefCnt && pDefaultContext->hWait)
SetEvent(pDefaultContext->hWait);
LeaveCriticalSection(&DefaultContextCriticalSection);
}
#ifdef CMS_PKCS7
WINCRYPT32API
BOOL
WINAPI
CryptVerifyCertificateSignatureEx(
IN OPTIONAL HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN DWORD dwSubjectType,
IN void *pvSubject,
IN DWORD dwIssuerType,
IN void *pvIssuer,
IN DWORD dwFlags,
IN OPTIONAL void *pvReserved
)
{
BOOL fResult;
PCERT_SIGNED_CONTENT_INFO pSignedInfo = NULL;
DWORD cbSignedInfo;
HCRYPTDEFAULTCONTEXT hDefaultContext = NULL;
HCRYPTKEY hSignKey = 0;
HCRYPTHASH hHash = 0;
BYTE *pbSignature; // not allocated
DWORD cbSignature;
BYTE rgbDssSignature[CERT_DSS_SIGNATURE_LEN];
ALG_ID aiHash;
ALG_ID aiPubKey;
DWORD dwProvType;
HCRYPTPROV hAcquiredCryptProv = 0;
DWORD dwSignFlags;
DWORD dwErr;
const BYTE *pbEncoded; // not allocated
DWORD cbEncoded;
PCERT_PUBLIC_KEY_INFO pIssuerPubKeyInfo;
CERT_PUBLIC_KEY_INFO IssuerPubKeyInfo;
PCRYPT_OBJID_BLOB pIssuerPara;
BYTE *pbAllocIssuerPara = NULL;
switch (dwSubjectType) {
case CRYPT_VERIFY_CERT_SIGN_SUBJECT_BLOB:
{
PCRYPT_DATA_BLOB pBlob = (PCRYPT_DATA_BLOB) pvSubject;
pbEncoded = pBlob->pbData;
cbEncoded = pBlob->cbData;
}
break;
case CRYPT_VERIFY_CERT_SIGN_SUBJECT_CERT:
{
PCCERT_CONTEXT pSubject = (PCCERT_CONTEXT) pvSubject;
pbEncoded = pSubject->pbCertEncoded;
cbEncoded = pSubject->cbCertEncoded;
}
break;
case CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL:
{
PCCRL_CONTEXT pSubject = (PCCRL_CONTEXT) pvSubject;
pbEncoded = pSubject->pbCrlEncoded;
cbEncoded = pSubject->cbCrlEncoded;
}
break;
default:
goto InvalidSubjectType;
}
if (!CryptDecodeObjectEx(
dwCertEncodingType,
X509_CERT,
pbEncoded,
cbEncoded,
CRYPT_DECODE_NOCOPY_FLAG | CRYPT_DECODE_ALLOC_FLAG |
CRYPT_DECODE_NO_SIGNATURE_BYTE_REVERSAL_FLAG,
&PkiDecodePara,
(void *) &pSignedInfo,
&cbSignedInfo
)) goto DecodeCertError;
if (!GetSignOIDInfo(pSignedInfo->SignatureAlgorithm.pszObjId,
&aiHash, &aiPubKey, &dwSignFlags, &dwProvType))
goto GetSignOIDInfoError;
if (0 == hCryptProv) {
if (!I_CryptGetDefaultContext(
CRYPT_DEFAULT_CONTEXT_CERT_SIGN_OID,
(const void *) pSignedInfo->SignatureAlgorithm.pszObjId,
&hCryptProv,
&hDefaultContext
)) {
if (dwProvType && CryptAcquireContext(
&hCryptProv,
NULL, // pszContainer
NULL, // pszProvider,
dwProvType,
CRYPT_VERIFYCONTEXT // dwFlags
))
hAcquiredCryptProv = hCryptProv;
else if (0 == (hCryptProv = I_CryptGetDefaultCryptProv(aiPubKey)))
goto GetDefaultCryptProvError;
}
}
#if 0
// Slow down the signature verify while holding the default context
// reference count
if (hDefaultContext)
Sleep(5000);
#endif
switch (dwIssuerType) {
case CRYPT_VERIFY_CERT_SIGN_ISSUER_PUBKEY:
pIssuerPubKeyInfo = (PCERT_PUBLIC_KEY_INFO) pvIssuer;
break;
case CRYPT_VERIFY_CERT_SIGN_ISSUER_CHAIN:
{
PCCERT_CHAIN_CONTEXT pChain = (PCCERT_CHAIN_CONTEXT) pvIssuer;
// All chains have at least the leaf certificate context
assert(pChain->cChain && pChain->rgpChain[0]->cElement);
pvIssuer =
(void *) pChain->rgpChain[0]->rgpElement[0]->pCertContext;
dwIssuerType = CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT;
}
// fall through
case CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT:
{
PCCERT_CONTEXT pIssuer = (PCCERT_CONTEXT) pvIssuer;
pIssuerPubKeyInfo = &pIssuer->pCertInfo->SubjectPublicKeyInfo;
// Check if the public key parameters were omitted
// from the encoded certificate. If omitted, try
// to use the certificate's CERT_PUBKEY_ALG_PARA_PROP_ID
// property.
pIssuerPara = &pIssuerPubKeyInfo->Algorithm.Parameters;
if (0 == pIssuerPara->cbData ||
NULL_ASN_TAG == *pIssuerPara->pbData) {
DWORD cbData;
if (CertGetCertificateContextProperty(
pIssuer,
CERT_PUBKEY_ALG_PARA_PROP_ID,
NULL, // pvData
&cbData) && 0 < cbData
&&
(pbAllocIssuerPara = (BYTE *) PkiNonzeroAlloc(
cbData))
&&
CertGetCertificateContextProperty(
pIssuer,
CERT_PUBKEY_ALG_PARA_PROP_ID,
pbAllocIssuerPara,
&cbData)) {
IssuerPubKeyInfo = *pIssuerPubKeyInfo;
IssuerPubKeyInfo.Algorithm.Parameters.pbData =
pbAllocIssuerPara;
IssuerPubKeyInfo.Algorithm.Parameters.cbData = cbData;
pIssuerPubKeyInfo = &IssuerPubKeyInfo;
}
}
}
break;
case CRYPT_VERIFY_CERT_SIGN_ISSUER_NULL:
if (CALG_NO_SIGN != aiPubKey)
goto InvalidIssuerType;
pIssuerPubKeyInfo = NULL;
break;
default:
goto InvalidIssuerType;
}
if (CALG_NO_SIGN == aiPubKey) {
if (dwIssuerType != CRYPT_VERIFY_CERT_SIGN_ISSUER_NULL)
goto InvalidIssuerType;
} else {
if (!CryptImportPublicKeyInfo(
hCryptProv,
dwCertEncodingType,
pIssuerPubKeyInfo,
&hSignKey
)) goto ImportPublicKeyInfoError;
}
if (!CryptCreateHash(
hCryptProv,
aiHash,
NULL, // hKey - optional for MAC
0, // dwFlags
&hHash
)) goto CreateHashError;
if (!CryptHashData(
hHash,
pSignedInfo->ToBeSigned.pbData,
pSignedInfo->ToBeSigned.cbData,
0 // dwFlags
)) goto HashDataError;
pbSignature = pSignedInfo->Signature.pbData;
cbSignature = pSignedInfo->Signature.cbData;
if (0 == cbSignature)
goto NoSignatureError;
if (CALG_NO_SIGN == aiPubKey) {
BYTE rgbHash[MAX_HASH_LEN];
DWORD cbHash = sizeof(rgbHash);
if (!CryptGetHashParam(
hHash,
HP_HASHVAL,
rgbHash,
&cbHash,
0 // dwFlags
))
goto GetHashValueError;
if (cbHash != cbSignature || 0 != memcmp(rgbHash, pbSignature, cbHash))
goto NoSignHashCompareError;
goto SuccessReturn;
}
if (CALG_DSS_SIGN == aiPubKey &&
0 == (dwSignFlags & CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG)) {
DWORD cbData;
// Convert from ASN.1 sequence of two integers to the CSP signature
// format.
cbData = sizeof(rgbDssSignature);
if (!CryptDecodeObject(
dwCertEncodingType,
X509_DSS_SIGNATURE,
pbSignature,
cbSignature,
0, // dwFlags
rgbDssSignature,
&cbData
))
goto DecodeDssSignatureError;
pbSignature = rgbDssSignature;
assert(cbData == sizeof(rgbDssSignature));
cbSignature = sizeof(rgbDssSignature);
} else
PkiAsn1ReverseBytes(pbSignature, cbSignature);
if (!CryptVerifySignature(
hHash,
pbSignature,
cbSignature,
hSignKey,
NULL, // sDescription
0 // dwFlags
)) goto VerifySignatureError;
// For a certificate context certificate, check if the issuer has public
// key parameters that can be inherited
pIssuerPara = &pIssuerPubKeyInfo->Algorithm.Parameters;
if (CRYPT_VERIFY_CERT_SIGN_SUBJECT_CERT == dwSubjectType &&
pIssuerPara->cbData && NULL_ASN_TAG != *pIssuerPara->pbData) {
// If a subject is missing its public key parameters and has
// the same public key algorithm as its issuer, then, set
// its CERT_PUBKEY_ALG_PARA_PROP_ID property.
PCCERT_CONTEXT pSubject = (PCCERT_CONTEXT) pvSubject;
PCERT_PUBLIC_KEY_INFO pSubjectPubKeyInfo =
&pSubject->pCertInfo->SubjectPublicKeyInfo;
PCCRYPT_OID_INFO pOIDInfo;
PCRYPT_OBJID_BLOB pSubjectPara;
DWORD cbData;
pSubjectPara = &pSubjectPubKeyInfo->Algorithm.Parameters;
if (pSubjectPara->cbData && NULL_ASN_TAG != *pSubjectPara->pbData)
// Subject public key has parameters
goto SuccessReturn;
if (CertGetCertificateContextProperty(
pSubject,
CERT_PUBKEY_ALG_PARA_PROP_ID,
NULL, // pvData
&cbData) && 0 < cbData)
// Subject already has public key parameters property
goto SuccessReturn;
pOIDInfo = CryptFindOIDInfo(
CRYPT_OID_INFO_OID_KEY,
pSubjectPubKeyInfo->Algorithm.pszObjId,
CRYPT_PUBKEY_ALG_OID_GROUP_ID);
if (NULL == pOIDInfo || aiPubKey != pOIDInfo->Algid)
// Subject and issuer don't have the same public key algorithms
goto SuccessReturn;
CertSetCertificateContextProperty(
pSubject,
CERT_PUBKEY_ALG_PARA_PROP_ID,
CERT_SET_PROPERTY_IGNORE_PERSIST_ERROR_FLAG,
pIssuerPara
);
}
SuccessReturn:
fResult = TRUE;
CommonReturn:
dwErr = GetLastError();
if (hSignKey)
CryptDestroyKey(hSignKey);
if (hHash)
CryptDestroyHash(hHash);
I_CryptFreeDefaultContext(hDefaultContext);
if (hAcquiredCryptProv)
CryptReleaseContext(hAcquiredCryptProv, 0);
PkiFree(pSignedInfo);
PkiFree(pbAllocIssuerPara);
SetLastError(dwErr);
return fResult;
ErrorReturn:
fResult = FALSE;
goto CommonReturn;
SET_ERROR(InvalidSubjectType, E_INVALIDARG)
TRACE_ERROR(DecodeCertError)
TRACE_ERROR(GetSignOIDInfoError)
TRACE_ERROR(GetDefaultCryptProvError)
SET_ERROR(InvalidIssuerType, E_INVALIDARG)
TRACE_ERROR(ImportPublicKeyInfoError)
TRACE_ERROR(CreateHashError)
TRACE_ERROR(HashDataError)
SET_ERROR(NoSignatureError, TRUST_E_NOSIGNATURE)
TRACE_ERROR(GetHashValueError)
SET_ERROR(NoSignHashCompareError, NTE_BAD_SIGNATURE)
TRACE_ERROR(DecodeDssSignatureError)
TRACE_ERROR(VerifySignatureError)
}
//+-------------------------------------------------------------------------
// Verify the signature of a subject certificate or a CRL using the
// specified public key.
//
// Returns TRUE for a valid signature.
//
// hCryptProv specifies the crypto provider to use to verify the signature.
// It doesn't need to use a private key.
//--------------------------------------------------------------------------
BOOL
WINAPI
CryptVerifyCertificateSignature(
IN HCRYPTPROV hCryptProv,
IN DWORD dwCertEncodingType,
IN const BYTE * pbEncoded,
IN DWORD cbEncoded,
IN PCERT_PUBLIC_KEY_INFO pPublicKey
)
{
CRYPT_DATA_BLOB Subject;
Subject.cbData = cbEncoded;
Subject.pbData = (BYTE *) pbEncoded;
return CryptVerifyCertificateSignatureEx(
hCryptProv,
dwCertEncodingType,
CRYPT_VERIFY_CERT_SIGN_SUBJECT_BLOB,
(void *) &Subject,
CRYPT_VERIFY_CERT_SIGN_ISSUER_PUBKEY,
(void *) pPublicKey,
0, // dwFlags
NULL // pvReserved
);
}
#endif // CMS_PKCS7