mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1503 lines
32 KiB
1503 lines
32 KiB
/*++
|
|
|
|
Copyright (c) 1994-1998 Microsoft Corporation
|
|
|
|
Module Name :
|
|
|
|
authent.cpp
|
|
|
|
Abstract:
|
|
|
|
WWW Authentication Dialog
|
|
|
|
Author:
|
|
|
|
Ronald Meijer (ronaldm)
|
|
|
|
Project:
|
|
|
|
Internet Services Manager
|
|
|
|
Revision History:
|
|
|
|
--*/
|
|
|
|
//
|
|
// Include Files
|
|
//
|
|
#include "stdafx.h"
|
|
#include "resource.h"
|
|
#include "common.h"
|
|
#include "inetprop.h"
|
|
//#include "supdlgs.h"
|
|
#include "w3sht.h"
|
|
#include "wincrypt.h"
|
|
#include "cryptui.h"
|
|
#include "certmap.h"
|
|
//#include "basdom.h"
|
|
#include "anondlg.h"
|
|
#include "seccom.h"
|
|
|
|
|
|
|
|
#ifdef _DEBUG
|
|
#define new DEBUG_NEW
|
|
#undef THIS_FILE
|
|
static char THIS_FILE[] = __FILE__;
|
|
#endif
|
|
|
|
const LPCTSTR SZ_CTL_DEFAULT_STORE_NAME = _T("CA");
|
|
const LPCSTR szOID_IIS_VIRTUAL_SERVER = "1.3.6.1.4.1.311.30.1";
|
|
|
|
|
|
|
|
//
|
|
// Needed for GetModuleFileName() below:
|
|
//
|
|
extern HINSTANCE hInstance;
|
|
|
|
|
|
|
|
CSecCommDlg::CSecCommDlg(
|
|
IN LPCTSTR lpstrServerName,
|
|
IN LPCTSTR lpstrMetaPath,
|
|
IN CString & strBasicDomain,
|
|
IN DWORD & dwAuthFlags,
|
|
IN CComAuthInfo * pAuthInfo,
|
|
IN DWORD & dwAccessPermissions,
|
|
IN BOOL fIsMasterInstance,
|
|
IN BOOL fSSLSupported,
|
|
IN BOOL fSSL128Supported,
|
|
IN BOOL fU2Installed,
|
|
IN CString & strCTLIdentifier,
|
|
IN CString & strCTLStoreName,
|
|
IN BOOL fEditCTLs,
|
|
IN BOOL fIsLocal,
|
|
IN CWnd * pParent OPTIONAL
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Authentication dialog constructor
|
|
|
|
Arguments:
|
|
|
|
LPCTSTR lpstrServerName : Server name
|
|
LPCTSTR lpstrMetaPath : Metabase path
|
|
CString & strBasicDomain : Basic domain name
|
|
DWORD & dwAuthFlags : Authorization flags
|
|
DWORD & dwAccessPermissions : Access permissions
|
|
BOOL fIsMasterInstance : Master instance
|
|
BOOL fSSLSupported : TRUE if SSL is supported
|
|
BOOL fSSL128Supported : TRUE if 128 bit SSL is supported
|
|
CString & strCTLIdentifier
|
|
CString & strCTLStoreName
|
|
BOOL fEditCTLs
|
|
BOOL fIsLocal
|
|
CWnd * pParent : Optional parent window
|
|
|
|
Return Value:
|
|
|
|
N/A
|
|
|
|
--*/
|
|
: CDialog(CSecCommDlg::IDD, pParent),
|
|
m_strServerName(lpstrServerName),
|
|
m_strMetaPath(lpstrMetaPath),
|
|
m_dwAuthFlags(dwAuthFlags),
|
|
m_pAuthInfo(pAuthInfo),
|
|
m_dwAccessPermissions(dwAccessPermissions),
|
|
m_fIsMasterInstance(fIsMasterInstance),
|
|
m_fSSLEnabledOnServer(FALSE),
|
|
m_fSSLInstalledOnServer(FALSE),
|
|
m_fSSL128Supported(fSSL128Supported),
|
|
m_fU2Installed(fU2Installed),
|
|
m_hCTLStore(NULL),
|
|
m_bCTLDirty(FALSE),
|
|
m_iLastUsedCert(-1),
|
|
m_fIsLocal(fIsLocal),
|
|
m_fEditCTLs(fEditCTLs)
|
|
{
|
|
#if 0 // Keep Class Wizard happy
|
|
|
|
//{{AFX_DATA_INIT(CSecCommDlg)
|
|
m_nRadioNoCert = -1;
|
|
m_fAccountMapping = FALSE;
|
|
//m_fEnableDS = FALSE;
|
|
m_fRequireSSL = FALSE;
|
|
m_fEnableCtl = FALSE;
|
|
m_strCtl = _T("");
|
|
//}}AFX_DATA_INIT
|
|
|
|
#endif // 0
|
|
|
|
if (fSSLSupported)
|
|
{
|
|
::IsSSLEnabledOnServer(
|
|
m_pAuthInfo,
|
|
m_fSSLInstalledOnServer,
|
|
m_fSSLEnabledOnServer
|
|
);
|
|
}
|
|
else
|
|
{
|
|
m_fSSLInstalledOnServer = m_fSSLEnabledOnServer = FALSE;
|
|
}
|
|
|
|
if (IS_FLAG_SET(m_dwAccessPermissions, MD_ACCESS_REQUIRE_CERT))
|
|
{
|
|
m_nRadioNoCert = RADIO_REQ_CERT;
|
|
}
|
|
else if (IS_FLAG_SET(m_dwAccessPermissions, MD_ACCESS_NEGO_CERT))
|
|
{
|
|
m_nRadioNoCert = RADIO_ACCEPT_CERT;
|
|
}
|
|
else
|
|
{
|
|
m_nRadioNoCert = RADIO_NO_CERT;
|
|
}
|
|
|
|
m_fRequireSSL = m_fSSLInstalledOnServer
|
|
&& IS_FLAG_SET(m_dwAccessPermissions, MD_ACCESS_SSL);
|
|
|
|
m_fRequire128BitSSL = m_fSSLInstalledOnServer
|
|
&& IS_FLAG_SET(m_dwAccessPermissions, MD_ACCESS_SSL128);
|
|
|
|
m_fAccountMapping = m_fSSLInstalledOnServer
|
|
&& IS_FLAG_SET(m_dwAccessPermissions, MD_ACCESS_MAP_CERT);
|
|
|
|
//
|
|
// CTL information.
|
|
//
|
|
if (fEditCTLs)
|
|
{
|
|
m_strCTLIdentifier = strCTLIdentifier;
|
|
m_strCTLStoreName = strCTLStoreName;
|
|
|
|
if (m_strCTLStoreName.IsEmpty())
|
|
{
|
|
m_strCTLStoreName = SZ_CTL_DEFAULT_STORE_NAME;
|
|
}
|
|
|
|
m_strCtl.Empty();
|
|
m_fEnableCtl = !m_strCTLIdentifier.IsEmpty()
|
|
&& !strCTLStoreName.IsEmpty();
|
|
|
|
//
|
|
// For now, we only allow enabling when editing the local machine
|
|
//
|
|
m_fEnableCtl &= m_fIsLocal;
|
|
}
|
|
else
|
|
{
|
|
m_fEnableCtl = FALSE;
|
|
m_check_EnableCtl.EnableWindow(FALSE);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
CSecCommDlg::~CSecCommDlg()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
custom destructor for CSecCommDlg
|
|
|
|
Arguments:
|
|
|
|
None
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
// dereference the CTL context pointers in the combo box
|
|
//CleanUpCTLList();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::DoDataExchange(
|
|
IN CDataExchange * pDX
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Initialise/Store control data
|
|
|
|
Arguments:
|
|
|
|
CDataExchange * pDX - DDX/DDV control structure
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
CDialog::DoDataExchange(pDX);
|
|
//{{AFX_DATA_MAP(CSecCommDlg)
|
|
|
|
DDX_Radio(pDX, IDC_RADIO_NO_CERT, m_nRadioNoCert);
|
|
DDX_Check(pDX, IDC_CHECK_SSL_ACCOUNT_MAPPING, m_fAccountMapping);
|
|
DDX_Check(pDX, IDC_CHECK_REQUIRE_SSL, m_fRequireSSL);
|
|
DDX_Check(pDX, IDC_CHECK_REQUIRE_128BIT, m_fRequire128BitSSL);
|
|
DDX_Check(pDX, IDC_CHECK_ENABLE_CTL, m_fEnableCtl);
|
|
DDX_CBString(pDX, IDC_COMBO_CTL, m_strCtl);
|
|
DDX_Control(pDX, IDC_CTL_SEPERATOR, m_static_CTLSeparator);
|
|
DDX_Control(pDX, IDC_STATIC_CURRENT_CTL, m_static_CTLPrompt);
|
|
DDX_Control(pDX, IDC_CHECK_SSL_ACCOUNT_MAPPING, m_check_AccountMapping);
|
|
DDX_Control(pDX, IDC_CHECK_REQUIRE_SSL, m_check_RequireSSL);
|
|
DDX_Control(pDX, IDC_CHECK_REQUIRE_128BIT, m_check_Require128BitSSL);
|
|
DDX_Control(pDX, IDC_CHECK_ENABLE_CTL, m_check_EnableCtl);
|
|
DDX_Control(pDX, IDC_BUTTON_EDIT_CTL, m_button_EditCtl);
|
|
DDX_Control(pDX, IDC_BUTTON_NEW_CTL, m_button_NewCtl);
|
|
DDX_Control(pDX, IDC_CERTMAPCTRL1, m_ocx_ClientMappings);
|
|
DDX_Control(pDX, IDC_COMBO_CTL, m_combo_ctl);
|
|
//}}AFX_DATA_MAP
|
|
|
|
//
|
|
// Private DDX Controls
|
|
//
|
|
DDX_Control(pDX, IDC_RADIO_REQUIRE_CERT, m_radio_RequireCert);
|
|
DDX_Control(pDX, IDC_RADIO_ACCEPT_CERT, m_radio_AcceptCert);
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Message Map
|
|
//
|
|
BEGIN_MESSAGE_MAP(CSecCommDlg, CDialog)
|
|
//{{AFX_MSG_MAP(CSecCommDlg)
|
|
ON_BN_CLICKED(IDC_CHECK_SSL_ACCOUNT_MAPPING, OnCheckSslAccountMapping)
|
|
ON_BN_CLICKED(IDC_CHECK_REQUIRE_SSL, OnCheckRequireSsl)
|
|
ON_BN_CLICKED(IDC_RADIO_ACCEPT_CERT, OnRadioAcceptCert)
|
|
ON_BN_CLICKED(IDC_RADIO_NO_CERT, OnRadioNoCert)
|
|
ON_BN_CLICKED(IDC_RADIO_REQUIRE_CERT, OnRadioRequireCert)
|
|
ON_BN_CLICKED(IDC_BUTTON_EDIT_CTL, OnButtonEditCtl)
|
|
ON_BN_CLICKED(IDC_CHECK_ENABLE_CTL, OnCheckEnableCtl)
|
|
ON_BN_CLICKED(IDC_BUTTON_NEW_CTL, OnButtonNewCtl)
|
|
ON_CBN_SELCHANGE(IDC_COMBO_CTL, OnSelchangeComboCtl)
|
|
ON_WM_DESTROY()
|
|
//}}AFX_MSG_MAP
|
|
END_MESSAGE_MAP()
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::SetControlStates()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Set control states depending on current data in the dialog
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
m_check_RequireSSL.EnableWindow(m_fSSLEnabledOnServer);
|
|
m_check_Require128BitSSL.EnableWindow(
|
|
m_fSSLEnabledOnServer
|
|
&& m_fSSL128Supported
|
|
&& m_fRequireSSL
|
|
);
|
|
|
|
m_ocx_ClientMappings.EnableWindow(
|
|
m_fAccountMapping
|
|
&& !m_fU2Installed
|
|
&& !m_fIsMasterInstance
|
|
);
|
|
|
|
m_radio_RequireCert.EnableWindow(m_fRequireSSL);
|
|
|
|
//
|
|
// Special case: if "require SSL" is off, but "require
|
|
// client certificates" is on, change the latter to "accept
|
|
// client certificates"
|
|
//
|
|
if (m_radio_RequireCert.GetCheck() > 0 && !m_fRequireSSL)
|
|
{
|
|
m_radio_RequireCert.SetCheck(0);
|
|
m_radio_AcceptCert.SetCheck(1);
|
|
m_nRadioNoCert = RADIO_ACCEPT_CERT;
|
|
}
|
|
|
|
if (m_fEditCTLs)
|
|
{
|
|
m_static_CTLPrompt.EnableWindow(m_fEnableCtl);
|
|
m_combo_ctl.EnableWindow(m_fEnableCtl);
|
|
m_button_EditCtl.EnableWindow(m_fEnableCtl);
|
|
m_button_NewCtl.EnableWindow(m_fEnableCtl);
|
|
m_ocx_CertificateAuthorities.EnableWindow(m_fEnableCtl);
|
|
|
|
//
|
|
// If enable Ctl is on, but nothing is selected, disable Edit
|
|
//
|
|
if (m_fEnableCtl)
|
|
{
|
|
if (m_combo_ctl.GetCurSel() == CB_ERR)
|
|
{
|
|
m_button_EditCtl.EnableWindow(FALSE);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
m_fEnableCtl = FALSE;
|
|
|
|
//
|
|
// Hide the controls
|
|
//
|
|
DeActivateControl(m_static_CTLPrompt);
|
|
DeActivateControl(m_combo_ctl);
|
|
DeActivateControl(m_button_EditCtl);
|
|
DeActivateControl(m_button_NewCtl);
|
|
DeActivateControl(m_ocx_CertificateAuthorities);
|
|
DeActivateControl(m_check_EnableCtl);
|
|
DeActivateControl(m_static_CTLSeparator);
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Message Handlers
|
|
//
|
|
// <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
|
|
|
|
|
|
|
|
BOOL
|
|
CSecCommDlg::OnInitDialog()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
WM_INITDIALOG handler. Initialize the dialog.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
TRUE if no focus is to be set automatically, FALSE if the focus
|
|
is already set.
|
|
|
|
--*/
|
|
{
|
|
CDialog::OnInitDialog();
|
|
|
|
//
|
|
// Initialize certificate authorities ocx
|
|
//
|
|
CRect rc(0, 0, 0, 0);
|
|
m_ocx_CertificateAuthorities.Create(
|
|
_T("CertWiz"),
|
|
WS_BORDER,
|
|
rc,
|
|
this,
|
|
IDC_APPSCTRL
|
|
);
|
|
|
|
CString strCaption;
|
|
VERIFY(strCaption.LoadString(IDS_OCX_CERTMAP));
|
|
|
|
m_ocx_ClientMappings.SetCaption(strCaption);
|
|
m_ocx_ClientMappings.SetServerInstance(m_strMetaPath);
|
|
m_ocx_ClientMappings.SetMachineName(m_strServerName);
|
|
|
|
//
|
|
// Initialize the CTL list data
|
|
//
|
|
InitializeCTLList();
|
|
|
|
SetControlStates();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnCheckSslAccountMapping()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
SSL Account mapping checkbox handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
m_fAccountMapping = !m_fAccountMapping;
|
|
SetControlStates();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnOK()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
OK button handler, save information
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
if (UpdateData(TRUE))
|
|
{
|
|
SET_FLAG_IF(m_fAccountMapping, m_dwAccessPermissions, MD_ACCESS_MAP_CERT);
|
|
SET_FLAG_IF(m_fRequireSSL, m_dwAccessPermissions, MD_ACCESS_SSL);
|
|
SET_FLAG_IF(m_fRequire128BitSSL, m_dwAccessPermissions, MD_ACCESS_SSL128);
|
|
RESET_FLAG(m_dwAccessPermissions,
|
|
(MD_ACCESS_REQUIRE_CERT | MD_ACCESS_NEGO_CERT));
|
|
|
|
switch(m_nRadioNoCert)
|
|
{
|
|
case RADIO_REQ_CERT:
|
|
SET_FLAG(m_dwAccessPermissions,
|
|
(MD_ACCESS_REQUIRE_CERT | MD_ACCESS_NEGO_CERT));
|
|
break;
|
|
|
|
case RADIO_ACCEPT_CERT:
|
|
SET_FLAG(m_dwAccessPermissions, MD_ACCESS_NEGO_CERT);
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Provide warning if no authentication is selected
|
|
//
|
|
if (!m_dwAuthFlags && !m_dwAccessPermissions
|
|
&& !NoYesMessageBox(IDS_WRN_NO_AUTH))
|
|
{
|
|
//
|
|
// Don't dismiss the dialog
|
|
//
|
|
return;
|
|
}
|
|
|
|
//
|
|
// If CTL stuff has changed, update the strings
|
|
//
|
|
if (m_bCTLDirty)
|
|
{
|
|
//
|
|
// Get the index of the selected item
|
|
//
|
|
INT iSel = m_combo_ctl.GetCurSel();
|
|
|
|
//
|
|
// If nothing is selected, then clear out the strings
|
|
//
|
|
if (!m_fEnableCtl || (iSel == CB_ERR))
|
|
{
|
|
m_strCTLIdentifier.Empty();
|
|
m_strCTLStoreName.Empty();
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// There is one selected. Update the Identifier string
|
|
// first get the context itself
|
|
//
|
|
PCCTL_CONTEXT pCTL =
|
|
(PCCTL_CONTEXT)m_combo_ctl.GetItemData(iSel);
|
|
|
|
if (pCTL != NULL)
|
|
{
|
|
//
|
|
// Now get the list identifier for it and put it in
|
|
// the string the list identifier is a inherint value
|
|
// of the context and doesn't need to be read in seperately.
|
|
// We can just reference it.
|
|
//
|
|
m_strCTLIdentifier.Empty();
|
|
|
|
if (pCTL->pCtlInfo
|
|
&& pCTL->pCtlInfo->ListIdentifier.cbData >= 2
|
|
&& pCTL->pCtlInfo->ListIdentifier.cbData)
|
|
{
|
|
//
|
|
// If the identifiers are the same, then this is
|
|
// our default CTL
|
|
//
|
|
// m_strCTLIdentifier =
|
|
// (PWCHAR)pCTL->pCtlInfo->ListIdentifier.pbData;
|
|
|
|
wcsncpy(m_strCTLIdentifier.GetBuffer(
|
|
pCTL->pCtlInfo->ListIdentifier.cbData + 2),
|
|
(PWCHAR)pCTL->pCtlInfo->ListIdentifier.pbData,
|
|
pCTL->pCtlInfo->ListIdentifier.cbData
|
|
);
|
|
|
|
m_strCTLIdentifier.ReleaseBuffer();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
m_strCTLIdentifier.Empty();
|
|
m_strCTLStoreName.Empty();
|
|
}
|
|
}
|
|
}
|
|
|
|
CDialog::OnOK();
|
|
}
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnCheckRequireSsl()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
'require ssl' checkbox handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
m_fRequireSSL = !m_fRequireSSL;
|
|
SetControlStates();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnRadioNoCert()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
'Do not accept certificates' radio button handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
m_nRadioNoCert = RADIO_NO_CERT;
|
|
SetControlStates();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnRadioAcceptCert()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
'accept certificates' radio button handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
m_nRadioNoCert = RADIO_ACCEPT_CERT;
|
|
SetControlStates();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnRadioRequireCert()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
'require certificates' radio button handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
m_nRadioNoCert = RADIO_REQ_CERT;
|
|
SetControlStates();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnCheckEnableCtl()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
'Enable CTL' checkbox handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Since this is local only, if we are remote and the user checks the
|
|
// box, then we should alert them to the situation and then do nothing.
|
|
//
|
|
if (!m_fIsLocal)
|
|
{
|
|
AfxMessageBox(IDS_CTL_LOCAL_ONLY);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
m_fEnableCtl = !m_fEnableCtl;
|
|
|
|
//
|
|
// If we are now disabling, record the current cert and then blank it
|
|
//
|
|
if (!m_fEnableCtl)
|
|
{
|
|
m_iLastUsedCert = m_combo_ctl.GetCurSel();
|
|
m_combo_ctl.SetCurSel(-1);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We are enabling, use the last recorded cert
|
|
//
|
|
m_combo_ctl.SetCurSel(m_iLastUsedCert);
|
|
}
|
|
|
|
m_bCTLDirty = TRUE;
|
|
SetControlStates();
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnButtonEditCtl()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
"Edit CTL" button handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Get the index of the selected item
|
|
//
|
|
INT iSel = m_combo_ctl.GetCurSel();
|
|
ASSERT( iSel != CB_ERR );
|
|
|
|
//
|
|
// Get the selected CTL context
|
|
//
|
|
PCCTL_CONTEXT pCTL = (PCCTL_CONTEXT)m_combo_ctl.GetItemData(iSel);
|
|
|
|
//
|
|
// Pass in the selected CTL context to edit it
|
|
//
|
|
PCCTL_CONTEXT pCTLNew = CallCTLWizard( pCTL );
|
|
|
|
//
|
|
// If the CTL on the item has changed, then update the private data item
|
|
//
|
|
if (pCTLNew && pCTLNew != pCTL)
|
|
{
|
|
//
|
|
// start be deleting the current item from the list
|
|
//
|
|
m_combo_ctl.DeleteString(iSel);
|
|
|
|
//
|
|
// free the old context
|
|
//
|
|
CertFreeCTLContext(pCTL);
|
|
|
|
//
|
|
// now add the new one and select it.
|
|
//
|
|
AddCTLToList(pCTLNew, TRUE);
|
|
SetControlStates();
|
|
|
|
//
|
|
// set the dirty flag
|
|
//
|
|
m_bCTLDirty = TRUE;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnButtonNewCtl()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
"New CTL" button handler
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Pass in NULL to create a new CTL
|
|
//
|
|
PCCTL_CONTEXT pCTL = CallCTLWizard(NULL);
|
|
|
|
//
|
|
// If a CTL was created, add it to the list and select it.
|
|
//
|
|
if (pCTL != NULL)
|
|
{
|
|
AddCTLToList(pCTL, TRUE);
|
|
SetControlStates();
|
|
m_bCTLDirty = TRUE;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
PCCTL_CONTEXT
|
|
CSecCommDlg::CallCTLWizard(
|
|
IN PCCTL_CONTEXT pCTLSrc
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Adds a CTL to the drop down CTL list. Note that the context pointers are
|
|
set as the private data on the list items. This means that they will need
|
|
to be de-referenced when this object is destroyed. See the
|
|
routine CleanUpCTLList.
|
|
|
|
This routine by boydm
|
|
|
|
Arguments:
|
|
|
|
PCCTL_CONTEXT pctl ctl context pointer of the ctl being added
|
|
BOOL fSelect flag specifying if this ctl should be selected after it
|
|
is added
|
|
|
|
Return Value:
|
|
|
|
returns TRUE if successful
|
|
|
|
--*/
|
|
{
|
|
PCCTL_CONTEXT pCTLOut = NULL;
|
|
|
|
CRYPTUI_WIZ_BUILDCTL_NEW_CTL_INFO newInfo;
|
|
CTL_USAGE useInfo;
|
|
CString szFriendly;
|
|
CString szDescription;
|
|
CString szListIdentifier;
|
|
LPOLESTR pszListIdentifier = NULL;
|
|
LPCSTR rgbpszUsageArray[2];
|
|
|
|
//
|
|
// Prepare the main src structure
|
|
//
|
|
CRYPTUI_WIZ_BUILDCTL_SRC_INFO srcInfo;
|
|
ZeroMemory( &srcInfo, sizeof(srcInfo) );
|
|
srcInfo.dwSize = sizeof(srcInfo);
|
|
|
|
//
|
|
// If we are editing an existing CTL then we do one thing
|
|
//
|
|
if ( pCTLSrc )
|
|
{
|
|
srcInfo.dwSourceChoice = CRYPTUI_WIZ_BUILDCTL_SRC_EXISTING_CTL;
|
|
srcInfo.pCTLContext = pCTLSrc;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Prepare the usage arrays
|
|
//
|
|
ZeroMemory( &rgbpszUsageArray, sizeof(rgbpszUsageArray) );
|
|
rgbpszUsageArray[0] = szOID_IIS_VIRTUAL_SERVER;
|
|
|
|
//
|
|
// Must also have client auth - or else no certs show up in the list!
|
|
//
|
|
rgbpszUsageArray[1] = szOID_PKIX_KP_CLIENT_AUTH;
|
|
ZeroMemory( &useInfo, sizeof(useInfo) );
|
|
useInfo.cUsageIdentifier = 2;
|
|
useInfo.rgpszUsageIdentifier = (PCHAR*)&rgbpszUsageArray;
|
|
|
|
//
|
|
// Prep the new ctl structure, which may or may not get used
|
|
//
|
|
ZeroMemory( &newInfo, sizeof(newInfo) );
|
|
|
|
//
|
|
// We making a new CTL, fill in the rest of the stuff
|
|
//
|
|
srcInfo.dwSourceChoice = CRYPTUI_WIZ_BUILDCTL_SRC_NEW_CTL;
|
|
srcInfo.pNewCTLInfo = &newInfo;
|
|
|
|
//
|
|
// Load the friendly name and the description
|
|
//
|
|
szFriendly.LoadString(IDS_CTL_NEW);
|
|
szDescription.LoadString(IDS_CTL_DESCRIPTION);
|
|
|
|
//
|
|
// Create a guid string for the identifier
|
|
//
|
|
GUID id;
|
|
HRESULT hres = CoCreateGuid(&id);
|
|
hres = StringFromGUID2(id, szListIdentifier.GetBuffer(1000), 1000);
|
|
szListIdentifier.ReleaseBuffer();
|
|
|
|
//
|
|
// Fill in the newInfo structure
|
|
//
|
|
newInfo.dwSize = sizeof(newInfo);
|
|
|
|
//
|
|
// For now - don't set the usage
|
|
//
|
|
newInfo.pSubjectUsage = &useInfo;
|
|
|
|
//
|
|
// Put the generated list identifier into place
|
|
//
|
|
newInfo.pwszListIdentifier = (LPTSTR)(LPCTSTR)szListIdentifier;
|
|
|
|
//
|
|
// Fill in the friendly strings that were loaded from the resources
|
|
//
|
|
newInfo.pwszFriendlyName = (LPTSTR)(LPCTSTR)szFriendly;
|
|
newInfo.pwszDescription = (LPTSTR)(LPCTSTR)szDescription;
|
|
}
|
|
|
|
//
|
|
// Make the call to the CTL wizard
|
|
//
|
|
if (!CryptUIWizBuildCTL(
|
|
CRYPTUI_WIZ_BUILDCTL_SKIP_SIGNING |
|
|
CRYPTUI_WIZ_BUILDCTL_SKIP_PURPOSE |
|
|
CRYPTUI_WIZ_BUILDCTL_SKIP_DESTINATION,
|
|
m_hWnd,
|
|
NULL,
|
|
&srcInfo,
|
|
NULL,
|
|
&pCTLOut
|
|
))
|
|
{
|
|
//
|
|
// The user canceled the CTL wizard or it failed in general.
|
|
// the CTL wizard puts up its own error dialogs
|
|
//
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
// get the friendly name from the CTL that comes out of the wizard.
|
|
// the process of signing this CTL does not transfer the friendly
|
|
// name to the resulting new CTL. Oh well.
|
|
DWORD cbProperty;
|
|
CertGetCTLContextProperty(
|
|
IN pCTLOut,
|
|
IN CERT_FRIENDLY_NAME_PROP_ID,
|
|
OUT NULL,
|
|
IN OUT &cbProperty
|
|
);
|
|
// increase buffer just to cover any nulls just to be safe
|
|
cbProperty += 2;
|
|
// get the friendly name
|
|
CertGetCTLContextProperty(
|
|
IN pCTLOut,
|
|
IN CERT_FRIENDLY_NAME_PROP_ID,
|
|
OUT szFriendly.GetBuffer(cbProperty),
|
|
IN OUT &cbProperty
|
|
);
|
|
szFriendly.ReleaseBuffer();
|
|
|
|
// get the description from the CTL that comes out of the wizard.
|
|
// the process of signing this CTL does not transfer the friendly
|
|
// name to the resulting new CTL. Oh well.
|
|
CertGetCTLContextProperty(
|
|
IN pCTLOut,
|
|
IN CERT_DESCRIPTION_PROP_ID,
|
|
OUT NULL,
|
|
IN OUT &cbProperty
|
|
);
|
|
// increase buffer just to cover any nulls just to be safe
|
|
cbProperty += 2;
|
|
// get the friendly name
|
|
CertGetCTLContextProperty(
|
|
IN pCTLOut,
|
|
IN CERT_DESCRIPTION_PROP_ID,
|
|
OUT szDescription.GetBuffer(cbProperty),
|
|
IN OUT &cbProperty
|
|
);
|
|
szDescription.ReleaseBuffer();
|
|
|
|
|
|
// prepare the signer information
|
|
CMSG_SIGNER_ENCODE_INFO infoSigner;
|
|
ZeroMemory( &infoSigner, sizeof(infoSigner) );
|
|
infoSigner.cbSize = sizeof(infoSigner);
|
|
infoSigner.pCertInfo = m_pServerCert->pCertInfo;
|
|
|
|
|
|
// infoSigner.HashAlgorithm.pszObjId = szOID_RSA_SHA1RSA;
|
|
|
|
|
|
//CERT_CONTEXT
|
|
|
|
// prepare the signing cert information
|
|
CERT_BLOB infoSigningCert;
|
|
infoSigningCert.cbData = m_pServerCert->cbCertEncoded;
|
|
infoSigningCert.pbData = m_pServerCert->pbCertEncoded;
|
|
|
|
// prepare the signed information
|
|
CMSG_SIGNED_ENCODE_INFO infoSigned;
|
|
ZeroMemory( &infoSigned, sizeof(infoSigned) );
|
|
infoSigned.cbSize = sizeof(infoSigned);
|
|
// infoSigned.cSigners = 1;
|
|
// infoSigned.rgSigners = &infoSigner;
|
|
infoSigned.cCertEncoded = 1;
|
|
infoSigned.rgCertEncoded = &infoSigningCert;
|
|
|
|
// find out how much space we need for the encoded signed message
|
|
DWORD cbEncodedCTLMessage;
|
|
PBYTE pbyteEncodedMessage = NULL;
|
|
// make the call to get the space requirement
|
|
|
|
BOOL f = CryptMsgSignCTL(
|
|
IN CRYPT_ASN_ENCODING | PKCS_7_ASN_ENCODING,
|
|
IN pCTLOut->pbCtlContent,
|
|
IN pCTLOut->cbCtlContent,
|
|
IN &infoSigned,
|
|
IN 0,
|
|
OUT NULL,
|
|
IN OUT &cbEncodedCTLMessage
|
|
);
|
|
|
|
if ( f )
|
|
{
|
|
// allocate the buffer for the message
|
|
pbyteEncodedMessage = (PBYTE)GlobalAlloc( GPTR, cbEncodedCTLMessage );
|
|
if ( !pbyteEncodedMessage )
|
|
{
|
|
f = FALSE;
|
|
}
|
|
else
|
|
{
|
|
// make the real call and get the message
|
|
f = CryptMsgSignCTL(
|
|
IN CRYPT_ASN_ENCODING | PKCS_7_ASN_ENCODING,
|
|
IN pCTLOut->pbCtlContent,
|
|
IN pCTLOut->cbCtlContent,
|
|
IN &infoSigned,
|
|
IN 0,
|
|
OUT pbyteEncodedMessage,
|
|
IN OUT &cbEncodedCTLMessage
|
|
);
|
|
}
|
|
}
|
|
|
|
// at this point we are done with the CTL returned by the wizard
|
|
CertFreeCTLContext( pCTLOut );
|
|
pCTLOut = NULL;
|
|
|
|
// If the signing failed, ask the user if that want to proceed anyway
|
|
if ( !f && AfxMessageBox( IDS_CTL_SIGN_FAIL, MB_YESNO ) == IDNO )
|
|
{
|
|
CertFreeCTLContext( pCTLOut );
|
|
if ( pbyteEncodedMessage )
|
|
{
|
|
GlobalFree( pbyteEncodedMessage );
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
// add the encoded and signed CTL to the Cert store.
|
|
if ( CertAddEncodedCTLToStore(
|
|
IN m_hCTLStore,
|
|
IN CRYPT_ASN_ENCODING | PKCS_7_ASN_ENCODING,
|
|
IN pbyteEncodedMessage,
|
|
IN cbEncodedCTLMessage,
|
|
IN CERT_STORE_ADD_REPLACE_EXISTING,
|
|
OUT &pCTLOut
|
|
) )
|
|
{
|
|
*/
|
|
/*
|
|
// replace the friendly name and description that just got lost
|
|
CertSetCTLContextProperty(
|
|
IN pCTLOut,
|
|
IN CERT_FRIENDLY_NAME_PROP_ID,
|
|
IN 0,
|
|
IN (LPCTSTR)szFriendly
|
|
);
|
|
CertSetCTLContextProperty(
|
|
IN pCTLOut,
|
|
IN CERT_DESCRIPTION_PROP_ID,
|
|
IN 0,
|
|
IN (LPCTSTR)szDescription
|
|
);
|
|
*/
|
|
/*
|
|
}
|
|
else
|
|
{
|
|
// we failed to write it out to the store.
|
|
AfxMessageBox( IDS_CTL_WRITE_FAIL );
|
|
}
|
|
|
|
|
|
// cleanup
|
|
if ( pbyteEncodedMessage )
|
|
{
|
|
GlobalFree( pbyteEncodedMessage );
|
|
}
|
|
*/
|
|
|
|
//
|
|
// Add the certificate context to the store
|
|
//
|
|
if (pCTLOut != NULL)
|
|
{
|
|
PCCTL_CONTEXT pCTLAdded = NULL;
|
|
|
|
if (CertAddCTLContextToStore(
|
|
m_hCTLStore,
|
|
pCTLOut,
|
|
CERT_STORE_ADD_REPLACE_EXISTING,
|
|
&pCTLAdded
|
|
))
|
|
{
|
|
CertFreeCTLContext( pCTLOut );
|
|
pCTLOut = pCTLAdded;
|
|
}
|
|
else
|
|
{
|
|
CertFreeCTLContext( pCTLOut );
|
|
pCTLOut = NULL;
|
|
}
|
|
}
|
|
|
|
return pCTLOut;
|
|
}
|
|
|
|
|
|
|
|
BOOL
|
|
CSecCommDlg::AddCTLToList(
|
|
IN PCCTL_CONTEXT pCTL,
|
|
IN BOOL fSelect
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Adds a CTL to the drop down CTL list. Note that the context pointers are
|
|
set as the private data on the list items. This means that they will need
|
|
to be de-referenced when this object is destroyed. See the
|
|
routine CleanUpCTLList.
|
|
|
|
This routine by boydm
|
|
|
|
Arguments:
|
|
|
|
PCCTL_CONTEXT pctl ctl context pointer of the ctl being added
|
|
BOOL fSelect - flag specifying if this ctl should be selected after it
|
|
is added
|
|
|
|
Return Value:
|
|
|
|
returns TRUE if successful
|
|
|
|
--*/
|
|
{
|
|
BOOL fSuccess;
|
|
|
|
ASSERT(pCTL != NULL);
|
|
|
|
if (!pCTL)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// First, we extract the friendly name from the CTL.
|
|
//
|
|
CString szFriendlyName; // the friendly name
|
|
DWORD cbName = 0; // count of BYTES for the name, not chars
|
|
|
|
//
|
|
// Find out how much space we need
|
|
//
|
|
fSuccess = CertGetCTLContextProperty(
|
|
pCTL,
|
|
CERT_FRIENDLY_NAME_PROP_ID,
|
|
NULL,
|
|
&cbName
|
|
);
|
|
|
|
//
|
|
// Increase buffer just to cover any nulls just to be safe
|
|
//
|
|
cbName += 2;
|
|
|
|
//
|
|
// Get the friendly name
|
|
//
|
|
fSuccess = CertGetCTLContextProperty(
|
|
pCTL,
|
|
CERT_FRIENDLY_NAME_PROP_ID,
|
|
szFriendlyName.GetBuffer(cbName),
|
|
&cbName
|
|
);
|
|
|
|
szFriendlyName.ReleaseBuffer();
|
|
|
|
//
|
|
// If we did not get the name, then load the default name.
|
|
// The friendly name is an optional parameter in the CTL so it
|
|
// is OK if it is not there.
|
|
//
|
|
if (!fSuccess)
|
|
{
|
|
szFriendlyName.LoadString(IDS_CTL_UNNAMED);
|
|
}
|
|
|
|
//
|
|
// Add the friendly name string to the drop down CTL list and record
|
|
// the index of the newly created item
|
|
//
|
|
INT iCTLPosition = m_combo_ctl.AddString(szFriendlyName);
|
|
|
|
//
|
|
// If it worked, then add the context pointer to the item as private data
|
|
//
|
|
if (iCTLPosition >=0)
|
|
{
|
|
m_combo_ctl.SetItemData(iCTLPosition, (ULONG_PTR)pCTL);
|
|
|
|
//
|
|
// if we have been told to select the CTL, do so at this point
|
|
//
|
|
if (fSelect)
|
|
{
|
|
m_combo_ctl.SetCurSel(iCTLPosition);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Return TRUE if we successfully added the CTL
|
|
//
|
|
return (iCTLPosition >=0);
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::InitializeCTLList()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Initializes the CTL drop down box by opening the CTL store pointer
|
|
to the target store and filling in the CTL list box with the enumerated
|
|
values.
|
|
|
|
This routine by boydm
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
None
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// For now this is Local ONLY
|
|
//
|
|
if (!m_fIsLocal)
|
|
{
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Build the remote name for the store.
|
|
// It takes the form of "\\MACHINE_NAME\STORENAME"
|
|
// The store name is always "MY" and is define above. The machine
|
|
// name is the name of the machine being edited. The leading \\ in the
|
|
// machine name is optional so we will skip it in this case
|
|
//
|
|
CString szStore;
|
|
|
|
//
|
|
// Start by adding the machine name that we are targeting
|
|
//
|
|
szStore = m_strServerName;
|
|
|
|
//
|
|
// Add the specific store name
|
|
//
|
|
szStore += _T('\\');
|
|
szStore += m_strCTLStoreName;
|
|
|
|
//
|
|
// BUGBUG just use MY for now
|
|
//
|
|
szStore = m_strCTLStoreName;
|
|
|
|
//
|
|
// Open the store
|
|
//
|
|
m_hCTLStore = CertOpenStore( CERT_STORE_PROV_SYSTEM,
|
|
0,
|
|
NULL,
|
|
CERT_SYSTEM_STORE_LOCAL_MACHINE,
|
|
szStore
|
|
);
|
|
|
|
//
|
|
// If we failed to open the store, then we will be unable to do anything
|
|
// with CTLs on this machine at all. Disable everything having to do
|
|
// with the CTL controls.
|
|
//
|
|
if (!m_hCTLStore)
|
|
{
|
|
m_fEnableCtl = FALSE;
|
|
|
|
//
|
|
// Return early as we have no need to enumerate the CTLs
|
|
//
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Enumerate all the CTLs in the store and add them to the drop-down list
|
|
//
|
|
PCCTL_CONTEXT pCTLEnum = NULL;
|
|
|
|
//
|
|
// Enumerate undil NULL is returned. Note that CertEnumCTLsInStore
|
|
// free the context passed into pCTLEnum if it is non NULL. Thus we
|
|
// need to create a duplicate of it to add to the drop-list
|
|
//
|
|
while (pCTLEnum = CertEnumCTLsInStore(m_hCTLStore, pCTLEnum))
|
|
{
|
|
//
|
|
// Make a duplicate of the CTL context for storing in thte list
|
|
//
|
|
PCCTL_CONTEXT pCTL = CertDuplicateCTLContext(pCTLEnum);
|
|
|
|
if (!pCTL)
|
|
{
|
|
//
|
|
// Duplication Failed
|
|
//
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// The list identifier is a inherint value of the context and doesn't
|
|
// need to be read in separately. We can just referenece it
|
|
//
|
|
BOOL fIsCurrentCTL = FALSE;
|
|
|
|
if (pCTL->pCtlInfo
|
|
&& pCTL->pCtlInfo->ListIdentifier.cbData >= 2
|
|
&& pCTL->pCtlInfo->ListIdentifier.cbData)
|
|
{
|
|
//
|
|
// If the identifiers are the same, then this is our default CTL
|
|
//
|
|
fIsCurrentCTL = (wcsncmp(
|
|
(LPCTSTR)m_strCTLIdentifier,
|
|
(PWCHAR)pCTL->pCtlInfo->ListIdentifier.pbData,
|
|
pCTL->pCtlInfo->ListIdentifier.cbData
|
|
) == 0);
|
|
|
|
// fIsCurrentCTL = ( m_strCTLIdentifier == (PWCHAR)pCTL->pCtlInfo->ListIdentifier.pbData );
|
|
}
|
|
|
|
//
|
|
// Add the CTL to the list
|
|
//
|
|
AddCTLToList(pCTL, fIsCurrentCTL);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::CleanUpCTLList()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Dereferences all the CTL context pointers in the private data of
|
|
the items in the CTL combo box.
|
|
Then it closes the CTL store handle
|
|
|
|
This routine by boydm
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
DWORD cItems = m_combo_ctl.GetCount();
|
|
|
|
//
|
|
// Loop through each item and free its reference to the CTL pointer
|
|
//
|
|
for (DWORD i = 0; i < cItems; ++i)
|
|
{
|
|
//
|
|
// Get the CTL context pointer from the item's private data
|
|
//
|
|
PCCTL_CONTEXT pCTL = (PCCTL_CONTEXT)m_combo_ctl.GetItemData(i);
|
|
|
|
if (pCTL)
|
|
{
|
|
CertFreeCTLContext(pCTL);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Close the handle to the store that contains the CTLs
|
|
//
|
|
if (m_hCTLStore)
|
|
{
|
|
CertCloseStore( m_hCTLStore, CERT_CLOSE_STORE_FORCE_FLAG );
|
|
m_hCTLStore = NULL;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnSelchangeComboCtl()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The selection in the drop-down list changed
|
|
|
|
This routine by boydm
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
None
|
|
|
|
--*/
|
|
{
|
|
SetControlStates();
|
|
m_bCTLDirty = TRUE;
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CSecCommDlg::OnDestroy()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
WM_DESTROY handler. Clean up internal data
|
|
|
|
Arguments:
|
|
|
|
None
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
{
|
|
CDialog::OnDestroy();
|
|
|
|
CleanUpCTLList();
|
|
}
|