Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

741 lines
21 KiB

//+-------------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (C) Microsoft Corporation, 1996 - 1999
//
// File: trustapi.cpp
//
// Contents: Microsoft Internet Security Trust APIs
//
// Functions: TrustFindIssuerCertificate
// TrustOpenStores
// TrustDecode
// TrustFreeDecode
//
// *** local functions ***
// _CompareAuthKeyId
// _CompareAuthKeyId2
// _SetCertErrorAndHygiene
// _GetExternalIssuerCert
//
// History: 20-Nov-1997 pberkman created
//
//--------------------------------------------------------------------------
#include "global.hxx"
BOOL _CompareAuthKeyId(DWORD dwEncoding, PCCERT_CONTEXT pChildContext,
PCCERT_CONTEXT pParentContext);
BOOL _CompareAuthKeyId2(DWORD dwEncoding, PCCERT_CONTEXT pChildContext,
PCCERT_CONTEXT pParentContext);
BOOL _SetCertErrorAndHygiene(PCCERT_CONTEXT pSubjectContext,
PCCERT_CONTEXT pIssuerContext,
DWORD dwCurrentConfidence, DWORD *pdwError);
PCCERT_CONTEXT _GetExternalIssuerCert(PCCERT_CONTEXT pContext,
DWORD dwEncoding,
DWORD *pdwRetError,
DWORD *pdwConfidence,
FILETIME *psftVerifyAsOf);
void _SetConfidenceOnIssuer(DWORD dwEncoding, PCCERT_CONTEXT pChildCert, PCCERT_CONTEXT pTestIssuerCert,
DWORD dwVerificationFlag, FILETIME *psftVerifyAsOf, DWORD *pdwConfidence,
DWORD *pdwError);
PCCERT_CONTEXT WINAPI TrustFindIssuerCertificate(PCCERT_CONTEXT pChildContext,
DWORD dwEncoding,
DWORD chStores,
HCERTSTORE *pahStores,
FILETIME *psftVerifyAsOf,
DWORD *pdwConfidence,
DWORD *pdwError,
DWORD dwFlags)
{
if (!(pChildContext) ||
!(pahStores) ||
!(psftVerifyAsOf) ||
(dwFlags != 0))
{
SetLastError(ERROR_INVALID_PARAMETER);
return(NULL);
}
PCCERT_CONTEXT pCertContext;
DWORD fdwRetError;
DWORD fdwWork;
DWORD dwError;
PCCERT_CONTEXT pCertWithHighestConfidence;
DWORD dwHighestConfidence;
DWORD dwConfidence;
if (pdwError)
{
*pdwError = ERROR_SUCCESS;
}
dwConfidence = 0;
dwHighestConfidence = 0;
pCertWithHighestConfidence = NULL;
fdwRetError = 0;
fdwWork = 0;
for (int i = 0; i < (int)chStores; i++)
{
fdwWork = CERT_STORE_SIGNATURE_FLAG;
pCertContext = NULL;
while (pCertContext = CertGetIssuerCertificateFromStore(pahStores[i],
pChildContext,
pCertContext,
&fdwWork))
{
_SetConfidenceOnIssuer(dwEncoding, pChildContext, pCertContext, fdwWork,
psftVerifyAsOf, &dwConfidence, &dwError);
if (dwConfidence > dwHighestConfidence)
{
if (pCertWithHighestConfidence)
{
CertFreeCertificateContext(pCertWithHighestConfidence);
}
dwHighestConfidence = dwConfidence;
pCertWithHighestConfidence = CertDuplicateCertificateContext(pCertContext);
fdwRetError = dwError;
}
if (dwConfidence >= CERT_CONFIDENCE_HIGHEST)
{
if (pdwError)
{
*pdwError = dwError;
}
if (pdwConfidence)
{
*pdwConfidence = dwConfidence;
}
CertFreeCertificateContext(pCertContext);
return(pCertWithHighestConfidence);
}
fdwWork = CERT_STORE_SIGNATURE_FLAG;
}
}
if (!(dwHighestConfidence & CERT_CONFIDENCE_HYGIENE))
{
if (pCertContext = _GetExternalIssuerCert(pChildContext,
dwEncoding,
&fdwRetError,
&dwConfidence,
psftVerifyAsOf))
{
if (dwHighestConfidence < dwConfidence)
{
CertFreeCertificateContext(pCertWithHighestConfidence);
pCertWithHighestConfidence = pCertContext;
dwHighestConfidence = dwConfidence;
}
}
}
if (pdwError)
{
*pdwError = fdwRetError;
}
if (pdwConfidence)
{
*pdwConfidence = dwHighestConfidence;
}
return(pCertWithHighestConfidence);
}
BOOL WINAPI TrustOpenStores(HCRYPTPROV hProv, OUT DWORD *pchStores,
HCERTSTORE *pahStores, DWORD dwFlags)
{
BOOL fRet;
DWORD cs = 0;
HCERTSTORE pas[WVT_STOREID_MAX];
fRet = FALSE;
if (!(pchStores) ||
(dwFlags != 0))
{
goto ErrorInvalidParam;
}
//
// ROOT store - ALWAYS #0 !!!!
//
if (!(pas[cs] = StoreProviderGetStore(hProv, WVT_STOREID_ROOT)))
{
goto ErrorNoRootStore;
}
cs++;
if (pas[cs] = StoreProviderGetStore(hProv, WVT_STOREID_TRUST))
{
cs++;
}
if (pas[cs] = StoreProviderGetStore(hProv, WVT_STOREID_CA))
{
cs++;
}
if (pas[cs] = StoreProviderGetStore(hProv, WVT_STOREID_MY))
{
cs++;
}
if (pas[cs] = StoreProviderGetStore(hProv, WVT_STOREID_LM_MY))
{
cs++;
}
if ((pahStores) && (cs > *pchStores))
{
*pchStores = cs;
goto ErrorMoreData;
}
*pchStores = cs;
fRet = TRUE;
if (!(pahStores))
{
goto ErrorMoreData;
}
DWORD i;
for (i = 0; i < cs; i++)
{
pahStores[i] = pas[i];
}
CommonReturn:
return(fRet);
ErrorReturn:
while (cs > 0)
{
CertCloseStore(pas[cs - 1], 0);
cs--;
}
goto CommonReturn;
SET_ERROR_VAR_EX(DBG_SS, ErrorMoreData, ERROR_MORE_DATA);
SET_ERROR_VAR_EX(DBG_SS, ErrorNoRootStore, TRUST_E_SYSTEM_ERROR);
SET_ERROR_VAR_EX(DBG_SS, ErrorInvalidParam, ERROR_INVALID_PARAMETER);
}
BOOL WINAPI TrustIsCertificateSelfSigned(PCCERT_CONTEXT pContext,
DWORD dwEncoding,
DWORD dwFlags)
{
if (!(pContext) ||
(dwFlags != 0))
{
SetLastError(ERROR_INVALID_PARAMETER);
return(FALSE);
}
if (!(CertCompareCertificateName(dwEncoding,
&pContext->pCertInfo->Issuer,
&pContext->pCertInfo->Subject)))
{
return(FALSE);
}
DWORD dwFlag;
dwFlag = CERT_STORE_SIGNATURE_FLAG;
if (!(CertVerifySubjectCertificateContext(pContext, pContext, &dwFlag)) ||
(dwFlag & CERT_STORE_SIGNATURE_FLAG))
{
return(FALSE);
}
return(TRUE);
}
#define sz_CRYPTNET_DLL "cryptnet.dll"
#define sz_CryptGetObjectUrl "CryptGetObjectUrl"
#define sz_CryptRetrieveObjectByUrlW "CryptRetrieveObjectByUrlW"
typedef BOOL (WINAPI *PFN_CRYPT_GET_OBJECT_URL)(
IN LPCSTR pszUrlOid,
IN LPVOID pvPara,
IN DWORD dwFlags,
OUT OPTIONAL PCRYPT_URL_ARRAY pUrlArray,
IN OUT DWORD* pcbUrlArray,
OUT OPTIONAL PCRYPT_URL_INFO pUrlInfo,
IN OUT OPTIONAL DWORD* pcbUrlInfo,
IN OPTIONAL LPVOID pvReserved
);
typedef BOOL (WINAPI *PFN_CRYPT_RETRIEVE_OBJECT_BY_URLW)(
IN LPCWSTR pszUrl,
IN LPCSTR pszObjectOid,
IN DWORD dwRetrievalFlags,
IN DWORD dwTimeout,
OUT LPVOID* ppvObject,
IN HCRYPTASYNC hAsyncRetrieve,
IN OPTIONAL PCRYPT_CREDENTIALS pCredentials,
IN OPTIONAL LPVOID pvVerify,
IN OPTIONAL LPVOID pvReserved
);
PCCERT_CONTEXT _GetExternalIssuerCert(PCCERT_CONTEXT pContext,
DWORD dwEncoding,
DWORD *pdwRetError,
DWORD *pdwConfidence,
FILETIME *psftVerifyAsOf)
{
*pdwConfidence = 0;
#if (USE_IEv4CRYPT32)
return(NULL);
#else
DWORD cbUrlArray;
CRYPT_URL_ARRAY *pUrlArray;
PCCERT_CONTEXT pIssuer;
PCCERT_CONTEXT pCertBestMatch;
DWORD dwHighestConfidence;
DWORD dwConfidence;
DWORD dwStatus;
DWORD dwError;
DWORD i;
pCertBestMatch = NULL;
pIssuer = NULL;
pUrlArray = NULL;
cbUrlArray = 0;
dwHighestConfidence = 0;
HMODULE hDll = NULL;
PFN_CRYPT_GET_OBJECT_URL pfnCryptGetObjectUrl;
PFN_CRYPT_RETRIEVE_OBJECT_BY_URLW pfnCryptRetrieveObjectByUrlW;
if (NULL == (hDll = LoadLibraryA(sz_CRYPTNET_DLL)))
goto LoadCryptNetDllError;
if (NULL == (pfnCryptGetObjectUrl =
(PFN_CRYPT_GET_OBJECT_URL) GetProcAddress(hDll,
sz_CryptGetObjectUrl)))
goto CryptGetObjectUrlProcAddressError;
if (NULL == (pfnCryptRetrieveObjectByUrlW =
(PFN_CRYPT_RETRIEVE_OBJECT_BY_URLW) GetProcAddress(hDll,
sz_CryptRetrieveObjectByUrlW)))
goto CryptRetrieveObjectByUrlWProcAddressError;
if (!(pfnCryptGetObjectUrl(URL_OID_CERTIFICATE_ISSUER, (void *)pContext, 0, NULL, &cbUrlArray, NULL, NULL, NULL)) ||
(cbUrlArray < 1))
{
goto GetObjectUrlFailed;
}
if (!(pUrlArray = (CRYPT_URL_ARRAY *) new BYTE[cbUrlArray]))
{
goto MemoryError;
}
memset(pUrlArray, 0x00, cbUrlArray);
if (!(pfnCryptGetObjectUrl(URL_OID_CERTIFICATE_ISSUER, (void *)pContext, 0, pUrlArray, &cbUrlArray, NULL, NULL, NULL)))
{
goto GetObjectUrlFailed;
}
for (i = 0; i < pUrlArray->cUrl; i++)
{
if (pIssuer)
{
CertFreeCertificateContext(pIssuer);
pIssuer = NULL;
}
if (pfnCryptRetrieveObjectByUrlW(pUrlArray->rgwszUrl[i], CONTEXT_OID_CERTIFICATE, 0, 0, (void **)&pIssuer,
NULL, NULL, NULL, NULL))
{
if (!(CertCompareCertificateName(X509_ASN_ENCODING, &pContext->pCertInfo->Issuer,
&pIssuer->pCertInfo->Subject)))
{
continue;
}
dwStatus = CERT_STORE_SIGNATURE_FLAG;
if (!(CertVerifySubjectCertificateContext(pContext, pIssuer, &dwStatus)))
{
continue;
}
dwError = 0;
_SetConfidenceOnIssuer(dwEncoding, pContext, pIssuer, dwStatus, psftVerifyAsOf,
&dwConfidence, &dwError);
if (dwError != 0)
{
continue;
}
if (dwConfidence > dwHighestConfidence)
{
if (pCertBestMatch)
{
CertFreeCertificateContext(pCertBestMatch);
}
dwHighestConfidence = dwConfidence;
pCertBestMatch = CertDuplicateCertificateContext(pIssuer);
}
if (dwConfidence >= CERT_CONFIDENCE_HIGHEST)
{
goto CommonReturn;
}
}
}
goto RetrieveObjectFailed;
CommonReturn:
if (hDll)
FreeLibrary(hDll);
if (pIssuer)
{
CertFreeCertificateContext(pIssuer);
}
if (pUrlArray)
{
delete pUrlArray;
}
*pdwConfidence = dwHighestConfidence;
return(pCertBestMatch);
ErrorReturn:
if (pCertBestMatch)
{
CertFreeCertificateContext(pCertBestMatch);
pCertBestMatch = NULL;
}
goto CommonReturn;
TRACE_ERROR_EX(DBG_SS, LoadCryptNetDllError)
TRACE_ERROR_EX(DBG_SS, CryptGetObjectUrlProcAddressError)
TRACE_ERROR_EX(DBG_SS, CryptRetrieveObjectByUrlWProcAddressError)
TRACE_ERROR_EX(DBG_SS, GetObjectUrlFailed);
TRACE_ERROR_EX(DBG_SS, RetrieveObjectFailed);
SET_ERROR_VAR_EX(DBG_SS, MemoryError, ERROR_NOT_ENOUGH_MEMORY);
#endif // USE_IEv4CRYPT32
}
BOOL WINAPI TrustDecode(DWORD dwModuleId, BYTE **ppbRet, DWORD *pcbRet, DWORD cbHint,
DWORD dwEncoding, const char *pcszOID, const BYTE *pbEncoded, DWORD cbEncoded,
DWORD dwDecodeFlags)
{
if (!(*ppbRet = new BYTE[cbHint]))
{
goto MemoryError;
}
*pcbRet = cbHint;
if (!(CryptDecodeObject(dwEncoding, pcszOID, pbEncoded, cbEncoded, dwDecodeFlags,
*ppbRet, pcbRet)))
{
if (GetLastError() != ERROR_MORE_DATA)
{
goto DecodeError;
}
}
if (cbHint < *pcbRet)
{
DBG_PRINTF((DBG_SS, "****** TrustDecode(0x%08.8lX): recalling due to bad size: hint: %lu actual: %lu\r\n",
dwModuleId, cbHint, *pcbRet));
DELETE_OBJECT(*ppbRet);
return(TrustDecode(dwModuleId, ppbRet, pcbRet, *pcbRet, dwEncoding, pcszOID,
pbEncoded, cbEncoded, dwDecodeFlags));
}
# if DBG
if ((cbHint / 3) > *pcbRet)
{
DBG_PRINTF((DBG_SS, "TrustDecode(0x%08.8lX): hint too big. hint: %lu actual: %lu\r\n",
dwModuleId, cbHint, *pcbRet));
}
# endif
return(TRUE);
ErrorReturn:
DELETE_OBJECT(*ppbRet);
return(FALSE);
TRACE_ERROR_EX(DBG_SS, DecodeError);
SET_ERROR_VAR_EX(DBG_SS, MemoryError, ERROR_NOT_ENOUGH_MEMORY);
}
BOOL WINAPI TrustFreeDecode(DWORD dwModuleId, BYTE **pbAllocated)
{
DELETE_OBJECT(*pbAllocated);
return(TRUE);
}
void _SetConfidenceOnIssuer(DWORD dwEncoding, PCCERT_CONTEXT pChildCert, PCCERT_CONTEXT pTestIssuerCert,
DWORD dwVerificationFlag, FILETIME *psftVerifyAsOf, DWORD *pdwConfidence,
DWORD *pdwError)
{
*pdwConfidence = 0;
if (!(dwVerificationFlag & CERT_STORE_SIGNATURE_FLAG))
{
*pdwConfidence |= CERT_CONFIDENCE_SIG;
}
if (CertVerifyTimeValidity(psftVerifyAsOf, pTestIssuerCert->pCertInfo) == 0)
{
*pdwConfidence |= CERT_CONFIDENCE_TIME;
}
if (CertVerifyValidityNesting(pChildCert->pCertInfo, pTestIssuerCert->pCertInfo))
{
*pdwConfidence |= CERT_CONFIDENCE_TIMENEST;
}
if (_CompareAuthKeyId(dwEncoding, pChildCert, pTestIssuerCert))
{
*pdwConfidence |= CERT_CONFIDENCE_AUTHIDEXT;
}
else if (_CompareAuthKeyId2(dwEncoding, pChildCert, pTestIssuerCert))
{
*pdwConfidence |= CERT_CONFIDENCE_AUTHIDEXT;
}
if (_SetCertErrorAndHygiene(pChildCert, pTestIssuerCert, *pdwConfidence, pdwError))
{
*pdwConfidence |= CERT_CONFIDENCE_HYGIENE;
}
}
BOOL _SetCertErrorAndHygiene(PCCERT_CONTEXT pSubjectContext, PCCERT_CONTEXT pIssuerContext,
DWORD dwCurrentConfidence, DWORD *pdwError)
{
*pdwError = ERROR_SUCCESS;
if (!(dwCurrentConfidence & CERT_CONFIDENCE_SIG))
{
*pdwError = TRUST_E_CERT_SIGNATURE;
return(FALSE);
}
if ((dwCurrentConfidence & CERT_CONFIDENCE_SIG) &&
(dwCurrentConfidence & CERT_CONFIDENCE_TIME) &&
(dwCurrentConfidence & CERT_CONFIDENCE_TIMENEST) &&
(dwCurrentConfidence & CERT_CONFIDENCE_AUTHIDEXT))
{
return(TRUE);
}
if (dwCurrentConfidence & CERT_CONFIDENCE_AUTHIDEXT)
{
return(TRUE);
}
return(FALSE);
}
BOOL _CompareAuthKeyId2(DWORD dwEncoding, PCCERT_CONTEXT pChildContext, PCCERT_CONTEXT pParentContext)
{
DWORD i;
PCERT_EXTENSION pExt;
DWORD cbIdInfo;
PCERT_AUTHORITY_KEY_ID2_INFO pIdInfo;
BOOL fRet;
pIdInfo = NULL;
if (pChildContext->pCertInfo->cExtension < 1)
{
goto NoExtensions;
}
if (!(pExt = CertFindExtension(szOID_AUTHORITY_KEY_IDENTIFIER2, pChildContext->pCertInfo->cExtension,
pChildContext->pCertInfo->rgExtension)))
{
goto NoExtensions;
}
if (!(TrustDecode(WVT_MODID_WINTRUST, (BYTE **)&pIdInfo, &cbIdInfo, 103,
dwEncoding, X509_AUTHORITY_KEY_ID2, pExt->Value.pbData, pExt->Value.cbData,
CRYPT_DECODE_NOCOPY_FLAG)))
{
goto DecodeFailed;
}
for (i = 0; i < pIdInfo->AuthorityCertIssuer.cAltEntry; i++)
{
if (pIdInfo->AuthorityCertIssuer.rgAltEntry[i].dwAltNameChoice ==
CERT_ALT_NAME_DIRECTORY_NAME)
{
break;
}
}
if (i == pIdInfo->AuthorityCertIssuer.cAltEntry)
{
goto NoAltDirectoryName;
}
if (!(CertCompareCertificateName(dwEncoding,
&pIdInfo->AuthorityCertIssuer.rgAltEntry[i].DirectoryName,
&pParentContext->pCertInfo->Issuer)))
{
goto IncorrectIssuer;
}
//
// issuer certificate's serial number must match
//
if (!(CertCompareIntegerBlob(&pIdInfo->AuthorityCertSerialNumber,
&pParentContext->pCertInfo->SerialNumber)))
{
goto IncorrectIssuer;
}
fRet = TRUE;
CommonReturn:
if (pIdInfo)
{
TrustFreeDecode(WVT_MODID_WINTRUST, (BYTE **)&pIdInfo);
}
return(fRet);
ErrorReturn:
fRet = FALSE;
goto CommonReturn;
TRACE_ERROR_EX(DBG_SS, NoExtensions);
TRACE_ERROR_EX(DBG_SS, DecodeFailed);
TRACE_ERROR_EX(DBG_SS, IncorrectIssuer);
TRACE_ERROR_EX(DBG_SS, NoAltDirectoryName);
}
BOOL _CompareAuthKeyId(DWORD dwEncoding, PCCERT_CONTEXT pChildContext, PCCERT_CONTEXT pParentContext)
{
PCERT_EXTENSION pExt;
PCERT_AUTHORITY_KEY_ID_INFO pChildKeyIdInfo;
DWORD cbKeyIdInfo;
BOOL fRet;
pChildKeyIdInfo = NULL;
pExt = NULL;
if (pChildContext->pCertInfo->cExtension < 1)
{
goto NoExtensions;
}
pChildKeyIdInfo = NULL;
if (!(pExt = CertFindExtension(szOID_AUTHORITY_KEY_IDENTIFIER,
pChildContext->pCertInfo->cExtension,
pChildContext->pCertInfo->rgExtension)))
{
goto NoExtensions;
}
if (!(TrustDecode(WVT_MODID_WINTRUST, (BYTE **)&pChildKeyIdInfo, &cbKeyIdInfo, 104,
dwEncoding, X509_AUTHORITY_KEY_ID, pExt->Value.pbData, pExt->Value.cbData,
CRYPT_DECODE_NOCOPY_FLAG)))
{
goto DecodeFailed;
}
if ((pChildKeyIdInfo->CertIssuer.cbData < 1) ||
(pChildKeyIdInfo->CertSerialNumber.cbData < 1))
{
goto NoKeyId;
}
//
// issuer certificate's issuer name must match
//
if (!(CertCompareCertificateName(dwEncoding, &pChildKeyIdInfo->CertIssuer,
&pParentContext->pCertInfo->Issuer)))
{
goto IncorrectIssuer;
}
//
// issuer certificate's serial number must match
//
if (!(CertCompareIntegerBlob(&pChildKeyIdInfo->CertSerialNumber,
&pParentContext->pCertInfo->SerialNumber)))
{
goto IncorrectIssuer;
}
fRet = TRUE;
CommonReturn:
if (pChildKeyIdInfo)
{
TrustFreeDecode(WVT_MODID_WINTRUST, (BYTE **)&pChildKeyIdInfo);
}
return(fRet);
ErrorReturn:
fRet = FALSE;
goto CommonReturn;
TRACE_ERROR_EX(DBG_SS, NoExtensions);
TRACE_ERROR_EX(DBG_SS, DecodeFailed);
TRACE_ERROR_EX(DBG_SS, NoKeyId);
TRACE_ERROR_EX(DBG_SS, IncorrectIssuer);
}