|
|
//+-------------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (C) Microsoft Corporation, 1997 - 1998
//
// File: cert.cpp
//
//--------------------------------------------------------------------------
/////////////////////////////////////////////////////////////////////
// Cert.cpp
//
// This file is the implementation of the CCertificate object.
//
// GLOSSARY
// - BLOB Binary Large Object
// - DER Distinguished Encoding Rules
// - RDN Relative Distinguished Names
//
// HISTORY
// 19-Jun-97 t-danm Creation.
/////////////////////////////////////////////////////////////////////
#include "stdafx.h"
#include "common.h"
#include "cert.h"
/////////////////////////////////////////////////////////////////////
CCertificate::CCertificate() { m_paCertContext = NULL; m_blobCertData.pbData = NULL; }
CCertificate::~CCertificate() { // Free the certificate
::CertFreeCertificateContext(m_paCertContext); delete m_blobCertData.pbData; }
void DisplaySystemError (HWND hParent, DWORD dwErr) { AFX_MANAGE_STATE (AfxGetStaticModuleState ()); LPVOID lpMsgBuf; FormatMessage (FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, dwErr, MAKELANGID (LANG_NEUTRAL, SUBLANG_DEFAULT), // Default language
(LPTSTR) &lpMsgBuf, 0, NULL); // Display the string.
CString caption; VERIFY (caption.LoadString (IDS_ADD_CERTIFICATE_MAPPING)); ::MessageBox (hParent, (LPWSTR) lpMsgBuf, (LPCTSTR) caption, MB_OK | MB_ICONINFORMATION); // Free the buffer.
LocalFree (lpMsgBuf); }
// This code copied from CertMgr project - LOCATE.C
BOOL CCertificate::FLoadCertificate (LPCTSTR szFile) { ASSERT (szFile); if ( !szFile ) return FALSE;
BOOL bReturn = FALSE; PVOID FileNameVoidP = (PVOID) szFile; PCCERT_CONTEXT pCertContext = NULL; DWORD dwEncodingType = 0; DWORD dwContentType = 0; DWORD dwFormatType = 0;
// NB. It's possible to read in a serialized store at this point, too.
// We've have to add the UI to display the certs in the file so the
// user could pick one. Use CryptUIDlgSelectCertificate ().
bReturn = ::CryptQueryObject ( CERT_QUERY_OBJECT_FILE, FileNameVoidP, CERT_QUERY_CONTENT_FLAG_ALL, //CERT_QUERY_CONTENT_CERT | CERT_QUERY_CONTENT_SERIALIZED_CERT,
CERT_QUERY_FORMAT_FLAG_ALL, 0, &dwEncodingType, &dwContentType, &dwFormatType, NULL, NULL, (const void **)&pCertContext);
ASSERT (bReturn); if ( bReturn ) { //
// Success. See what we get back.
//
if ( (dwContentType != CERT_QUERY_CONTENT_CERT) || !pCertContext ) { //
// Not a valid cert file.
//
if ( pCertContext ) ::CertFreeCertificateContext (pCertContext);
CString text; CString caption;
VERIFY (text.LoadString (IDS_CERTFILEFORMATERR)); VERIFY (caption.LoadString (IDS_ADD_CERTIFICATE_MAPPING)); MessageBox (NULL, text, caption, MB_OK | MB_ICONINFORMATION); bReturn = FALSE; } else { // Cert context is valid - let's save it to the global handle
m_paCertContext = pCertContext; } } else { DWORD dwErr = GetLastError ();
DisplaySystemError (NULL, dwErr); }
return bReturn; }
/////////////////////////////////////////////////////////////////////
// This routine is a wrapper to API ::CertNameToStr() automatically
// calculating the length of the output string and returning the data
// into the CString object.
void CCertificate::CertNameToCString( IN DWORD dwCertEncodingType, IN CERT_NAME_BLOB * pName, OUT CString * pstrData) { ASSERT(pstrData != NULL); // Calculate how many characters are needed
int cch = ::CertNameToStr( IN dwCertEncodingType, IN pName, IN c_dwCertNameStrType, NULL, 0); TCHAR * pchT = pstrData->GetBuffer(cch); ASSERT(pchT != NULL); ASSERT(lstrlen(pchT) == 0); (void)::CertNameToStr( IN dwCertEncodingType, IN pName, IN c_dwCertNameStrType, OUT pchT, IN cch); pstrData->ReleaseBuffer(); } // CCertificate::CertNameToCString()
/////////////////////////////////////////////////////////////////////
void CCertificate::GetIssuer(OUT CString * pstrName) { ASSERT(pstrName != NULL); ASSERT(m_paCertContext != NULL); ASSERT(m_paCertContext->pCertInfo != NULL);
CERT_INFO * pCertInfo = m_paCertContext->pCertInfo;
BOOL fSelfIssued = CertCompareCertificateName( m_paCertContext->dwCertEncodingType, &pCertInfo->Subject, &pCertInfo->Issuer); if (fSelfIssued) { // Self issued certificate
GetSubject(OUT pstrName); return; } // Get the issuer
CertNameToCString( IN m_paCertContext->dwCertEncodingType, IN &pCertInfo->Issuer, OUT pstrName); } // CCertificate::GetIssuer()
/////////////////////////////////////////////////////////////////////
void CCertificate::GetSubject(OUT CString * pstrName) { ASSERT(pstrName != NULL); ASSERT(m_paCertContext != NULL); ASSERT(m_paCertContext->pCertInfo != NULL);
CertNameToCString( IN m_paCertContext->dwCertEncodingType, IN &m_paCertContext->pCertInfo->Subject, OUT pstrName); } // CCertificate::GetSubject()
/////////////////////////////////////////////////////////////////////
void CCertificate::GetAltSubject(OUT CString * pstrName) { ASSERT(pstrName != NULL); ASSERT(m_paCertContext != NULL); ASSERT(m_paCertContext->pCertInfo != NULL);
pstrName->Empty(); CERT_INFO * pCertInfo = m_paCertContext->pCertInfo; CERT_EXTENSION * pCertExtension;
// Search for the AltSubject in the extensions
pCertExtension = ::CertFindExtension( IN szOID_SUBJECT_ALT_NAME, // Same as X509_ALTERNATE_NAME
IN pCertInfo->cExtension, IN pCertInfo->rgExtension); if (pCertExtension == NULL) return; // No AltSubject
DWORD dwErr = ERROR_SUCCESS; BOOL fSuccess; DWORD cbData = 0; // Find out how many bytes are needed for AltSubject
fSuccess = ::CryptDecodeObject( m_paCertContext->dwCertEncodingType, X509_ALTERNATE_NAME, IN pCertExtension->Value.pbData, IN pCertExtension->Value.cbData, 0, // dwFlags
NULL, INOUT &cbData); if (!fSuccess) { dwErr = ::GetLastError(); TRACE1("CryptDecodeObject() returned error %u", dwErr); return; } ASSERT(cbData > 0); BYTE * pbDataT = new BYTE[cbData];
// Decode the AltSubject name
fSuccess = ::CryptDecodeObject( m_paCertContext->dwCertEncodingType, X509_ALTERNATE_NAME, IN pCertExtension->Value.pbData, IN pCertExtension->Value.cbData, 0, // dwFlags
OUT pbDataT, INOUT &cbData); if (!fSuccess) { dwErr = ::GetLastError(); TRACE1("CryptDecodeObject() returned error %u", dwErr); } else { CERT_ALT_NAME_INFO * pCertAltNameInfo = (CERT_ALT_NAME_INFO *)pbDataT; CERT_ALT_NAME_ENTRY * pEntry = pCertAltNameInfo->rgAltEntry; ASSERT(pEntry != NULL); for (UINT i = 0; i < pCertAltNameInfo->cAltEntry; i++, pEntry++) { if (pEntry->dwAltNameChoice == CERT_ALT_NAME_DNS_NAME) { *pstrName = pEntry->pwszDNSName; break; }
} // for
} // if...else
delete pbDataT; } // CCertificate::GetAltSubject()
/////////////////////////////////////////////////////////////////////
void CCertificate::GetSimString(OUT CString * pstrData) { ASSERT(pstrData != NULL);
CString strIssuer; CString strSubject; CString strAltSubject; GetIssuer(OUT &strIssuer); GetSubject(OUT &strSubject); GetAltSubject(OUT &strAltSubject);
LPTSTR * pargzpszIssuer = ParseSimString(strIssuer); LPTSTR * pargzpszSubject = ParseSimString(strSubject); LPTSTR * pargzpszAltSubject = ParseSimString(strAltSubject);
// Make a "X509" string
UnsplitX509String(OUT pstrData, pargzpszIssuer, pargzpszSubject, pargzpszAltSubject); delete pargzpszIssuer; delete pargzpszSubject; delete pargzpszAltSubject; } // CCertificate::GetSimString()
|