Autosyncing with Wine HEAD
[reactos.git] / reactos / dll / win32 / cryptnet / cryptnet_main.c
1 /*
2 * Copyright (C) 2006 Maarten Lankhorst
3 * Copyright 2007 Juan Lang
4 *
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
9 *
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
14 *
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18 *
19 */
20
21 #include "config.h"
22 #include "wine/port.h"
23 #include <stdio.h>
24
25 #define NONAMELESSUNION
26 #define NONAMELESSSTRUCT
27
28 #include "windef.h"
29 #include "wine/debug.h"
30 #include "winbase.h"
31 #include "winnt.h"
32 #include "winnls.h"
33 #include "wininet.h"
34 #include "objbase.h"
35 #define CERT_REVOCATION_PARA_HAS_EXTRA_FIELDS
36 #include "wincrypt.h"
37
38 WINE_DEFAULT_DEBUG_CHANNEL(cryptnet);
39
40 BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
41 {
42 TRACE("(0x%p, %d, %p)\n", hinstDLL, fdwReason, lpvReserved);
43
44 switch (fdwReason) {
45 case DLL_PROCESS_ATTACH:
46 DisableThreadLibraryCalls(hinstDLL);
47 break;
48 case DLL_PROCESS_DETACH:
49 /* Do uninitialisation here */
50 break;
51 default: break;
52 }
53 return TRUE;
54 }
55
56 static const WCHAR cryptNet[] = { 'c','r','y','p','t','n','e','t','.',
57 'd','l','l',0 };
58 static const WCHAR ldapProvOpenStore[] = { 'L','d','a','p','P','r','o','v',
59 'O','p','e','S','t','o','r','e',0 };
60
61 /***********************************************************************
62 * DllRegisterServer (CRYPTNET.@)
63 */
64 HRESULT WINAPI DllRegisterServer(void)
65 {
66 TRACE("\n");
67 CryptRegisterDefaultOIDFunction(X509_ASN_ENCODING,
68 CRYPT_OID_VERIFY_REVOCATION_FUNC, 0, cryptNet);
69 CryptRegisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC, "Ldap",
70 cryptNet, "LdapProvOpenStore");
71 CryptRegisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC,
72 CERT_STORE_PROV_LDAP_W, cryptNet, "LdapProvOpenStore");
73 return S_OK;
74 }
75
76 /***********************************************************************
77 * DllUnregisterServer (CRYPTNET.@)
78 */
79 HRESULT WINAPI DllUnregisterServer(void)
80 {
81 TRACE("\n");
82 CryptUnregisterDefaultOIDFunction(X509_ASN_ENCODING,
83 CRYPT_OID_VERIFY_REVOCATION_FUNC, cryptNet);
84 CryptUnregisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC, "Ldap");
85 CryptUnregisterOIDFunction(0, CRYPT_OID_OPEN_STORE_PROV_FUNC,
86 CERT_STORE_PROV_LDAP_W);
87 return S_OK;
88 }
89
90 static const char *url_oid_to_str(LPCSTR oid)
91 {
92 if (HIWORD(oid))
93 return oid;
94 else
95 {
96 static char buf[10];
97
98 switch (LOWORD(oid))
99 {
100 #define _x(oid) case LOWORD(oid): return #oid
101 _x(URL_OID_CERTIFICATE_ISSUER);
102 _x(URL_OID_CERTIFICATE_CRL_DIST_POINT);
103 _x(URL_OID_CTL_ISSUER);
104 _x(URL_OID_CTL_NEXT_UPDATE);
105 _x(URL_OID_CRL_ISSUER);
106 _x(URL_OID_CERTIFICATE_FRESHEST_CRL);
107 _x(URL_OID_CRL_FRESHEST_CRL);
108 _x(URL_OID_CROSS_CERT_DIST_POINT);
109 #undef _x
110 default:
111 snprintf(buf, sizeof(buf), "%d", LOWORD(oid));
112 return buf;
113 }
114 }
115 }
116
117 typedef BOOL (WINAPI *UrlDllGetObjectUrlFunc)(LPCSTR, LPVOID, DWORD,
118 PCRYPT_URL_ARRAY, DWORD *, PCRYPT_URL_INFO, DWORD *, LPVOID);
119
120 static BOOL WINAPI CRYPT_GetUrlFromCertificateIssuer(LPCSTR pszUrlOid,
121 LPVOID pvPara, DWORD dwFlags, PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray,
122 PCRYPT_URL_INFO pUrlInfo, DWORD *pcbUrlInfo, LPVOID pvReserved)
123 {
124 /* FIXME: This depends on the AIA (authority info access) extension being
125 * supported in crypt32.
126 */
127 FIXME("\n");
128 SetLastError(CRYPT_E_NOT_FOUND);
129 return FALSE;
130 }
131
132 static BOOL WINAPI CRYPT_GetUrlFromCertificateCRLDistPoint(LPCSTR pszUrlOid,
133 LPVOID pvPara, DWORD dwFlags, PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray,
134 PCRYPT_URL_INFO pUrlInfo, DWORD *pcbUrlInfo, LPVOID pvReserved)
135 {
136 PCCERT_CONTEXT cert = (PCCERT_CONTEXT)pvPara;
137 PCERT_EXTENSION ext;
138 BOOL ret = FALSE;
139
140 /* The only applicable flag is CRYPT_GET_URL_FROM_EXTENSION */
141 if (dwFlags && !(dwFlags & CRYPT_GET_URL_FROM_EXTENSION))
142 {
143 SetLastError(CRYPT_E_NOT_FOUND);
144 return FALSE;
145 }
146 if ((ext = CertFindExtension(szOID_CRL_DIST_POINTS,
147 cert->pCertInfo->cExtension, cert->pCertInfo->rgExtension)))
148 {
149 CRL_DIST_POINTS_INFO *info;
150 DWORD size;
151
152 ret = CryptDecodeObjectEx(X509_ASN_ENCODING, X509_CRL_DIST_POINTS,
153 ext->Value.pbData, ext->Value.cbData, CRYPT_DECODE_ALLOC_FLAG, NULL,
154 &info, &size);
155 if (ret)
156 {
157 DWORD i, cUrl, bytesNeeded = sizeof(CRYPT_URL_ARRAY);
158
159 for (i = 0, cUrl = 0; i < info->cDistPoint; i++)
160 if (info->rgDistPoint[i].DistPointName.dwDistPointNameChoice
161 == CRL_DIST_POINT_FULL_NAME)
162 {
163 DWORD j;
164 CERT_ALT_NAME_INFO *name =
165 &info->rgDistPoint[i].DistPointName.u.FullName;
166
167 for (j = 0; j < name->cAltEntry; j++)
168 if (name->rgAltEntry[j].dwAltNameChoice ==
169 CERT_ALT_NAME_URL)
170 {
171 if (name->rgAltEntry[j].u.pwszURL)
172 {
173 cUrl++;
174 bytesNeeded += sizeof(LPWSTR) +
175 (lstrlenW(name->rgAltEntry[j].u.pwszURL) + 1)
176 * sizeof(WCHAR);
177 }
178 }
179 }
180 if (!pcbUrlArray)
181 {
182 SetLastError(E_INVALIDARG);
183 ret = FALSE;
184 }
185 else if (!pUrlArray)
186 *pcbUrlArray = bytesNeeded;
187 else if (*pcbUrlArray < bytesNeeded)
188 {
189 SetLastError(ERROR_MORE_DATA);
190 *pcbUrlArray = bytesNeeded;
191 ret = FALSE;
192 }
193 else
194 {
195 LPWSTR nextUrl;
196
197 *pcbUrlArray = bytesNeeded;
198 pUrlArray->cUrl = 0;
199 pUrlArray->rgwszUrl =
200 (LPWSTR *)((BYTE *)pUrlArray + sizeof(CRYPT_URL_ARRAY));
201 nextUrl = (LPWSTR)((BYTE *)pUrlArray + sizeof(CRYPT_URL_ARRAY)
202 + cUrl * sizeof(LPWSTR));
203 for (i = 0; i < info->cDistPoint; i++)
204 if (info->rgDistPoint[i].DistPointName.dwDistPointNameChoice
205 == CRL_DIST_POINT_FULL_NAME)
206 {
207 DWORD j;
208 CERT_ALT_NAME_INFO *name =
209 &info->rgDistPoint[i].DistPointName.u.FullName;
210
211 for (j = 0; j < name->cAltEntry; j++)
212 if (name->rgAltEntry[j].dwAltNameChoice ==
213 CERT_ALT_NAME_URL)
214 {
215 if (name->rgAltEntry[j].u.pwszURL)
216 {
217 lstrcpyW(nextUrl,
218 name->rgAltEntry[j].u.pwszURL);
219 pUrlArray->rgwszUrl[pUrlArray->cUrl++] =
220 nextUrl;
221 nextUrl +=
222 (lstrlenW(name->rgAltEntry[j].u.pwszURL) + 1)
223 * sizeof(WCHAR);
224 }
225 }
226 }
227 }
228 if (ret)
229 {
230 if (pcbUrlInfo)
231 {
232 FIXME("url info: stub\n");
233 if (!pUrlInfo)
234 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
235 else if (*pcbUrlInfo < sizeof(CRYPT_URL_INFO))
236 {
237 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
238 SetLastError(ERROR_MORE_DATA);
239 ret = FALSE;
240 }
241 else
242 {
243 *pcbUrlInfo = sizeof(CRYPT_URL_INFO);
244 memset(pUrlInfo, 0, sizeof(CRYPT_URL_INFO));
245 }
246 }
247 }
248 LocalFree(info);
249 }
250 }
251 else
252 SetLastError(CRYPT_E_NOT_FOUND);
253 return ret;
254 }
255
256 /***********************************************************************
257 * CryptGetObjectUrl (CRYPTNET.@)
258 */
259 BOOL WINAPI CryptGetObjectUrl(LPCSTR pszUrlOid, LPVOID pvPara, DWORD dwFlags,
260 PCRYPT_URL_ARRAY pUrlArray, DWORD *pcbUrlArray, PCRYPT_URL_INFO pUrlInfo,
261 DWORD *pcbUrlInfo, LPVOID pvReserved)
262 {
263 UrlDllGetObjectUrlFunc func = NULL;
264 HCRYPTOIDFUNCADDR hFunc = NULL;
265 BOOL ret = FALSE;
266
267 TRACE("(%s, %p, %08x, %p, %p, %p, %p, %p)\n", debugstr_a(pszUrlOid),
268 pvPara, dwFlags, pUrlArray, pcbUrlArray, pUrlInfo, pcbUrlInfo, pvReserved);
269
270 if (!HIWORD(pszUrlOid))
271 {
272 switch (LOWORD(pszUrlOid))
273 {
274 case LOWORD(URL_OID_CERTIFICATE_ISSUER):
275 func = CRYPT_GetUrlFromCertificateIssuer;
276 break;
277 case LOWORD(URL_OID_CERTIFICATE_CRL_DIST_POINT):
278 func = CRYPT_GetUrlFromCertificateCRLDistPoint;
279 break;
280 default:
281 FIXME("unimplemented for %s\n", url_oid_to_str(pszUrlOid));
282 SetLastError(ERROR_FILE_NOT_FOUND);
283 }
284 }
285 else
286 {
287 static HCRYPTOIDFUNCSET set = NULL;
288
289 if (!set)
290 set = CryptInitOIDFunctionSet(URL_OID_GET_OBJECT_URL_FUNC, 0);
291 CryptGetOIDFunctionAddress(set, X509_ASN_ENCODING, pszUrlOid, 0,
292 (void **)&func, &hFunc);
293 }
294 if (func)
295 ret = func(pszUrlOid, pvPara, dwFlags, pUrlArray, pcbUrlArray,
296 pUrlInfo, pcbUrlInfo, pvReserved);
297 if (hFunc)
298 CryptFreeOIDFunctionAddress(hFunc, 0);
299 return ret;
300 }
301
302 /***********************************************************************
303 * CryptRetrieveObjectByUrlA (CRYPTNET.@)
304 */
305 BOOL WINAPI CryptRetrieveObjectByUrlA(LPCSTR pszURL, LPCSTR pszObjectOid,
306 DWORD dwRetrievalFlags, DWORD dwTimeout, LPVOID *ppvObject,
307 HCRYPTASYNC hAsyncRetrieve, PCRYPT_CREDENTIALS pCredentials, LPVOID pvVerify,
308 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
309 {
310 BOOL ret = FALSE;
311 int len;
312
313 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p)\n", debugstr_a(pszURL),
314 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, ppvObject,
315 hAsyncRetrieve, pCredentials, pvVerify, pAuxInfo);
316
317 if (!pszURL)
318 {
319 SetLastError(ERROR_INVALID_PARAMETER);
320 return FALSE;
321 }
322 len = MultiByteToWideChar(CP_ACP, 0, pszURL, -1, NULL, 0);
323 if (len)
324 {
325 LPWSTR url = CryptMemAlloc(len * sizeof(WCHAR));
326
327 if (url)
328 {
329 MultiByteToWideChar(CP_ACP, 0, pszURL, -1, url, len);
330 ret = CryptRetrieveObjectByUrlW(url, pszObjectOid,
331 dwRetrievalFlags, dwTimeout, ppvObject, hAsyncRetrieve,
332 pCredentials, pvVerify, pAuxInfo);
333 CryptMemFree(url);
334 }
335 else
336 SetLastError(ERROR_OUTOFMEMORY);
337 }
338 return ret;
339 }
340
341 static void WINAPI CRYPT_FreeBlob(LPCSTR pszObjectOid,
342 PCRYPT_BLOB_ARRAY pObject, void *pvFreeContext)
343 {
344 DWORD i;
345
346 for (i = 0; i < pObject->cBlob; i++)
347 CryptMemFree(pObject->rgBlob[i].pbData);
348 CryptMemFree(pObject->rgBlob);
349 }
350
351 static BOOL CRYPT_GetObjectFromFile(HANDLE hFile, PCRYPT_BLOB_ARRAY pObject)
352 {
353 BOOL ret;
354 LARGE_INTEGER size;
355
356 if ((ret = GetFileSizeEx(hFile, &size)))
357 {
358 if (size.u.HighPart)
359 {
360 WARN("file too big\n");
361 SetLastError(ERROR_INVALID_DATA);
362 ret = FALSE;
363 }
364 else
365 {
366 CRYPT_DATA_BLOB blob;
367
368 blob.pbData = CryptMemAlloc(size.u.LowPart);
369 if (blob.pbData)
370 {
371 blob.cbData = size.u.LowPart;
372 ret = ReadFile(hFile, blob.pbData, size.u.LowPart, &blob.cbData,
373 NULL);
374 if (ret)
375 {
376 pObject->rgBlob = CryptMemAlloc(sizeof(CRYPT_DATA_BLOB));
377 if (pObject->rgBlob)
378 {
379 pObject->cBlob = 1;
380 memcpy(pObject->rgBlob, &blob, sizeof(CRYPT_DATA_BLOB));
381 }
382 else
383 {
384 SetLastError(ERROR_OUTOFMEMORY);
385 ret = FALSE;
386 }
387 }
388 if (!ret)
389 CryptMemFree(blob.pbData);
390 }
391 else
392 {
393 SetLastError(ERROR_OUTOFMEMORY);
394 ret = FALSE;
395 }
396 }
397 }
398 return ret;
399 }
400
401 /* FIXME: should make wininet cache all downloads instead */
402 static BOOL CRYPT_GetObjectFromCache(LPCWSTR pszURL, PCRYPT_BLOB_ARRAY pObject,
403 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
404 {
405 BOOL ret = FALSE;
406 INTERNET_CACHE_ENTRY_INFOW cacheInfo = { sizeof(cacheInfo), 0 };
407 DWORD size = sizeof(cacheInfo);
408
409 TRACE("(%s, %p, %p)\n", debugstr_w(pszURL), pObject, pAuxInfo);
410
411 if (GetUrlCacheEntryInfoW(pszURL, &cacheInfo, &size) ||
412 GetLastError() == ERROR_INSUFFICIENT_BUFFER)
413 {
414 FILETIME ft;
415
416 GetSystemTimeAsFileTime(&ft);
417 if (CompareFileTime(&cacheInfo.ExpireTime, &ft) >= 0)
418 {
419 LPINTERNET_CACHE_ENTRY_INFOW pCacheInfo = CryptMemAlloc(size);
420
421 if (pCacheInfo)
422 {
423 if (GetUrlCacheEntryInfoW(pszURL, pCacheInfo, &size))
424 {
425 HANDLE hFile = CreateFileW(pCacheInfo->lpszLocalFileName,
426 GENERIC_READ, 0, NULL, OPEN_EXISTING,
427 FILE_ATTRIBUTE_NORMAL, NULL);
428
429 if (hFile != INVALID_HANDLE_VALUE)
430 {
431 if ((ret = CRYPT_GetObjectFromFile(hFile, pObject)))
432 {
433 if (pAuxInfo && pAuxInfo->cbSize >=
434 offsetof(CRYPT_RETRIEVE_AUX_INFO,
435 pLastSyncTime) + sizeof(PFILETIME) &&
436 pAuxInfo->pLastSyncTime)
437 memcpy(pAuxInfo->pLastSyncTime,
438 &pCacheInfo->LastSyncTime,
439 sizeof(FILETIME));
440 }
441 CloseHandle(hFile);
442 }
443 }
444 CryptMemFree(pCacheInfo);
445 }
446 else
447 SetLastError(ERROR_OUTOFMEMORY);
448 }
449 else
450 DeleteUrlCacheEntryW(pszURL);
451 }
452 TRACE("returning %d\n", ret);
453 return ret;
454 }
455
456 /* Parses the URL, and sets components's lpszHostName and lpszUrlPath members
457 * to NULL-terminated copies of those portions of the URL (to be freed with
458 * CryptMemFree.)
459 */
460 static BOOL CRYPT_CrackUrl(LPCWSTR pszURL, URL_COMPONENTSW *components)
461 {
462 BOOL ret;
463
464 TRACE("(%s, %p)\n", debugstr_w(pszURL), components);
465
466 memset(components, 0, sizeof(*components));
467 components->dwStructSize = sizeof(*components);
468 components->lpszHostName = CryptMemAlloc(MAX_PATH * sizeof(WCHAR));
469 components->dwHostNameLength = MAX_PATH;
470 components->lpszUrlPath = CryptMemAlloc(MAX_PATH * 2 * sizeof(WCHAR));
471 components->dwUrlPathLength = 2 * MAX_PATH;
472 ret = InternetCrackUrlW(pszURL, 0, ICU_DECODE, components);
473 if (ret)
474 {
475 if ((components->dwUrlPathLength == 2 * MAX_PATH - 1) ||
476 (components->dwHostNameLength == MAX_PATH - 1))
477 FIXME("Buffers are too small\n");
478 switch (components->nScheme)
479 {
480 case INTERNET_SCHEME_FTP:
481 if (!components->nPort)
482 components->nPort = INTERNET_DEFAULT_FTP_PORT;
483 break;
484 case INTERNET_SCHEME_HTTP:
485 if (!components->nPort)
486 components->nPort = INTERNET_DEFAULT_HTTP_PORT;
487 break;
488 default:
489 ; /* do nothing */
490 }
491 }
492 TRACE("returning %d\n", ret);
493 return ret;
494 }
495
496 struct InetContext
497 {
498 HANDLE event;
499 DWORD timeout;
500 DWORD error;
501 };
502
503 static struct InetContext *CRYPT_MakeInetContext(DWORD dwTimeout)
504 {
505 struct InetContext *context = CryptMemAlloc(sizeof(struct InetContext));
506
507 if (context)
508 {
509 context->event = CreateEventW(NULL, FALSE, FALSE, NULL);
510 if (!context->event)
511 {
512 CryptMemFree(context);
513 context = NULL;
514 }
515 else
516 {
517 context->timeout = dwTimeout;
518 context->error = ERROR_SUCCESS;
519 }
520 }
521 return context;
522 }
523
524 static BOOL CRYPT_DownloadObject(DWORD dwRetrievalFlags, HINTERNET hHttp,
525 struct InetContext *context, PCRYPT_BLOB_ARRAY pObject,
526 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
527 {
528 CRYPT_DATA_BLOB object = { 0, NULL };
529 DWORD bytesAvailable;
530 BOOL ret;
531
532 do {
533 if ((ret = InternetQueryDataAvailable(hHttp, &bytesAvailable, 0, 0)))
534 {
535 if (bytesAvailable)
536 {
537 if (object.pbData)
538 object.pbData = CryptMemRealloc(object.pbData,
539 object.cbData + bytesAvailable);
540 else
541 object.pbData = CryptMemAlloc(bytesAvailable);
542 if (object.pbData)
543 {
544 INTERNET_BUFFERSA buffer = { sizeof(buffer), 0 };
545
546 buffer.dwBufferLength = bytesAvailable;
547 buffer.lpvBuffer = object.pbData + object.cbData;
548 if (!(ret = InternetReadFileExA(hHttp, &buffer, IRF_NO_WAIT,
549 (DWORD_PTR)context)))
550 {
551 if (GetLastError() == ERROR_IO_PENDING)
552 {
553 if (WaitForSingleObject(context->event,
554 context->timeout) == WAIT_TIMEOUT)
555 SetLastError(ERROR_TIMEOUT);
556 else if (context->error)
557 SetLastError(context->error);
558 else
559 ret = TRUE;
560 }
561 }
562 if (ret)
563 object.cbData += bytesAvailable;
564 }
565 else
566 {
567 SetLastError(ERROR_OUTOFMEMORY);
568 ret = FALSE;
569 }
570 }
571 }
572 else if (GetLastError() == ERROR_IO_PENDING)
573 {
574 if (WaitForSingleObject(context->event, context->timeout) ==
575 WAIT_TIMEOUT)
576 SetLastError(ERROR_TIMEOUT);
577 else
578 ret = TRUE;
579 }
580 } while (ret && bytesAvailable);
581 if (ret)
582 {
583 pObject->rgBlob = CryptMemAlloc(sizeof(CRYPT_DATA_BLOB));
584 if (!pObject->rgBlob)
585 {
586 CryptMemFree(object.pbData);
587 SetLastError(ERROR_OUTOFMEMORY);
588 ret = FALSE;
589 }
590 else
591 {
592 pObject->rgBlob[0].cbData = object.cbData;
593 pObject->rgBlob[0].pbData = object.pbData;
594 pObject->cBlob = 1;
595 }
596 }
597 TRACE("returning %d\n", ret);
598 return ret;
599 }
600
601 static void CRYPT_CacheURL(LPCWSTR pszURL, PCRYPT_BLOB_ARRAY pObject,
602 DWORD dwRetrievalFlags, FILETIME expires)
603 {
604 WCHAR cacheFileName[MAX_PATH];
605
606 /* FIXME: let wininet directly cache instead */
607 if (CreateUrlCacheEntryW(pszURL, pObject->rgBlob[0].cbData, NULL,
608 cacheFileName, 0))
609 {
610 HANDLE hCacheFile = CreateFileW(cacheFileName, GENERIC_WRITE, 0, NULL,
611 CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
612
613 if (hCacheFile != INVALID_HANDLE_VALUE)
614 {
615 DWORD bytesWritten, entryType;
616 FILETIME ft = { 0 };
617
618 if (!(dwRetrievalFlags & CRYPT_STICKY_CACHE_RETRIEVAL))
619 entryType = NORMAL_CACHE_ENTRY;
620 else
621 entryType = STICKY_CACHE_ENTRY;
622 WriteFile(hCacheFile, pObject->rgBlob[0].pbData,
623 pObject->rgBlob[0].cbData, &bytesWritten, NULL);
624 CloseHandle(hCacheFile);
625 CommitUrlCacheEntryW(pszURL, cacheFileName, expires, ft, entryType,
626 NULL, 0, NULL, NULL);
627 }
628 }
629 }
630
631 static void CALLBACK CRYPT_InetStatusCallback(HINTERNET hInt,
632 DWORD_PTR dwContext, DWORD status, void *statusInfo, DWORD statusInfoLen)
633 {
634 struct InetContext *context = (struct InetContext *)dwContext;
635 LPINTERNET_ASYNC_RESULT result;
636
637 switch (status)
638 {
639 case INTERNET_STATUS_REQUEST_COMPLETE:
640 result = (LPINTERNET_ASYNC_RESULT)statusInfo;
641 context->error = result->dwError;
642 SetEvent(context->event);
643 }
644 }
645
646 static BOOL CRYPT_Connect(URL_COMPONENTSW *components,
647 struct InetContext *context, PCRYPT_CREDENTIALS pCredentials,
648 HINTERNET *phInt, HINTERNET *phHost)
649 {
650 BOOL ret;
651
652 TRACE("(%s:%d, %p, %p, %p, %p)\n", debugstr_w(components->lpszHostName),
653 components->nPort, context, pCredentials, phInt, phInt);
654
655 *phHost = NULL;
656 *phInt = InternetOpenW(NULL, INTERNET_OPEN_TYPE_DIRECT, NULL, NULL,
657 context ? INTERNET_FLAG_ASYNC : 0);
658 if (*phInt)
659 {
660 DWORD service;
661
662 if (context)
663 InternetSetStatusCallbackW(*phInt, CRYPT_InetStatusCallback);
664 switch (components->nScheme)
665 {
666 case INTERNET_SCHEME_FTP:
667 service = INTERNET_SERVICE_FTP;
668 break;
669 case INTERNET_SCHEME_HTTP:
670 service = INTERNET_SERVICE_HTTP;
671 break;
672 default:
673 service = 0;
674 }
675 /* FIXME: use pCredentials for username/password */
676 *phHost = InternetConnectW(*phInt, components->lpszHostName,
677 components->nPort, NULL, NULL, service, 0, (DWORD_PTR)context);
678 if (!*phHost)
679 {
680 InternetCloseHandle(*phInt);
681 *phInt = NULL;
682 ret = FALSE;
683 }
684 else
685 ret = TRUE;
686 }
687 else
688 ret = FALSE;
689 TRACE("returning %d\n", ret);
690 return ret;
691 }
692
693 static BOOL WINAPI FTP_RetrieveEncodedObjectW(LPCWSTR pszURL,
694 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
695 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
696 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
697 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
698 {
699 FIXME("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
700 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, pObject,
701 ppfnFreeObject, ppvFreeContext, hAsyncRetrieve, pCredentials, pAuxInfo);
702
703 pObject->cBlob = 0;
704 pObject->rgBlob = NULL;
705 *ppfnFreeObject = CRYPT_FreeBlob;
706 *ppvFreeContext = NULL;
707 return FALSE;
708 }
709
710 static const WCHAR x509cacert[] = { 'a','p','p','l','i','c','a','t','i','o','n',
711 '/','x','-','x','5','0','9','-','c','a','-','c','e','r','t',0 };
712 static const WCHAR x509emailcert[] = { 'a','p','p','l','i','c','a','t','i','o',
713 'n','/','x','-','x','5','0','9','-','e','m','a','i','l','-','c','e','r','t',
714 0 };
715 static const WCHAR x509servercert[] = { 'a','p','p','l','i','c','a','t','i','o',
716 'n','/','x','-','x','5','0','9','-','s','e','r','v','e','r','-','c','e','r',
717 't',0 };
718 static const WCHAR x509usercert[] = { 'a','p','p','l','i','c','a','t','i','o',
719 'n','/','x','-','x','5','0','9','-','u','s','e','r','-','c','e','r','t',0 };
720 static const WCHAR pkcs7cert[] = { 'a','p','p','l','i','c','a','t','i','o','n',
721 '/','x','-','p','k','c','s','7','-','c','e','r','t','i','f','c','a','t','e',
722 's',0 };
723 static const WCHAR pkixCRL[] = { 'a','p','p','l','i','c','a','t','i','o','n',
724 '/','p','k','i','x','-','c','r','l',0 };
725 static const WCHAR pkcs7CRL[] = { 'a','p','p','l','i','c','a','t','i','o','n',
726 '/','x','-','p','k','c','s','7','-','c','r','l',0 };
727 static const WCHAR pkcs7sig[] = { 'a','p','p','l','i','c','a','t','i','o','n',
728 '/','x','-','p','k','c','s','7','-','s','i','g','n','a','t','u','r','e',0 };
729 static const WCHAR pkcs7mime[] = { 'a','p','p','l','i','c','a','t','i','o','n',
730 '/','x','-','p','k','c','s','7','-','m','i','m','e',0 };
731
732 static BOOL WINAPI HTTP_RetrieveEncodedObjectW(LPCWSTR pszURL,
733 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
734 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
735 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
736 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
737 {
738 BOOL ret = FALSE;
739
740 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
741 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, pObject,
742 ppfnFreeObject, ppvFreeContext, hAsyncRetrieve, pCredentials, pAuxInfo);
743
744 pObject->cBlob = 0;
745 pObject->rgBlob = NULL;
746 *ppfnFreeObject = CRYPT_FreeBlob;
747 *ppvFreeContext = NULL;
748
749 if (!(dwRetrievalFlags & CRYPT_WIRE_ONLY_RETRIEVAL))
750 ret = CRYPT_GetObjectFromCache(pszURL, pObject, pAuxInfo);
751 if (!ret && (!(dwRetrievalFlags & CRYPT_CACHE_ONLY_RETRIEVAL) ||
752 (dwRetrievalFlags & CRYPT_WIRE_ONLY_RETRIEVAL)))
753 {
754 URL_COMPONENTSW components;
755
756 if ((ret = CRYPT_CrackUrl(pszURL, &components)))
757 {
758 HINTERNET hInt, hHost;
759 struct InetContext *context = NULL;
760
761 if (dwTimeout)
762 context = CRYPT_MakeInetContext(dwTimeout);
763 ret = CRYPT_Connect(&components, context, pCredentials, &hInt,
764 &hHost);
765 if (ret)
766 {
767 static LPCWSTR types[] = { x509cacert, x509emailcert,
768 x509servercert, x509usercert, pkcs7cert, pkixCRL, pkcs7CRL,
769 pkcs7sig, pkcs7mime, NULL };
770 HINTERNET hHttp = HttpOpenRequestW(hHost, NULL,
771 components.lpszUrlPath, NULL, NULL, types,
772 INTERNET_FLAG_NO_COOKIES | INTERNET_FLAG_NO_UI,
773 (DWORD_PTR)context);
774
775 if (hHttp)
776 {
777 if (dwTimeout)
778 {
779 InternetSetOptionW(hHttp,
780 INTERNET_OPTION_RECEIVE_TIMEOUT, &dwTimeout,
781 sizeof(dwTimeout));
782 InternetSetOptionW(hHttp, INTERNET_OPTION_SEND_TIMEOUT,
783 &dwTimeout, sizeof(dwTimeout));
784 }
785 ret = HttpSendRequestExW(hHttp, NULL, NULL, 0,
786 (DWORD_PTR)context);
787 if (!ret && GetLastError() == ERROR_IO_PENDING)
788 {
789 if (WaitForSingleObject(context->event,
790 context->timeout) == WAIT_TIMEOUT)
791 SetLastError(ERROR_TIMEOUT);
792 else
793 ret = TRUE;
794 }
795 /* We don't set ret to TRUE in this block to avoid masking
796 * an error from HttpSendRequestExW.
797 */
798 if (!HttpEndRequestW(hHttp, NULL, 0, (DWORD_PTR)context) &&
799 GetLastError() == ERROR_IO_PENDING)
800 {
801 if (WaitForSingleObject(context->event,
802 context->timeout) == WAIT_TIMEOUT)
803 {
804 SetLastError(ERROR_TIMEOUT);
805 ret = FALSE;
806 }
807 }
808 if (ret)
809 ret = CRYPT_DownloadObject(dwRetrievalFlags, hHttp,
810 context, pObject, pAuxInfo);
811 if (ret && !(dwRetrievalFlags & CRYPT_DONT_CACHE_RESULT))
812 {
813 SYSTEMTIME st;
814 DWORD len = sizeof(st);
815
816 if (HttpQueryInfoW(hHttp,
817 HTTP_QUERY_EXPIRES | HTTP_QUERY_FLAG_SYSTEMTIME, &st,
818 &len, NULL))
819 {
820 FILETIME ft;
821
822 SystemTimeToFileTime(&st, &ft);
823 CRYPT_CacheURL(pszURL, pObject, dwRetrievalFlags,
824 ft);
825 }
826 }
827 InternetCloseHandle(hHttp);
828 }
829 InternetCloseHandle(hHost);
830 InternetCloseHandle(hInt);
831 }
832 if (context)
833 {
834 CloseHandle(context->event);
835 CryptMemFree(context);
836 }
837 CryptMemFree(components.lpszUrlPath);
838 CryptMemFree(components.lpszHostName);
839 }
840 }
841 TRACE("returning %d\n", ret);
842 return ret;
843 }
844
845 static BOOL WINAPI File_RetrieveEncodedObjectW(LPCWSTR pszURL,
846 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
847 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
848 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
849 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
850 {
851 URL_COMPONENTSW components = { sizeof(components), 0 };
852 BOOL ret;
853
854 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
855 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, pObject,
856 ppfnFreeObject, ppvFreeContext, hAsyncRetrieve, pCredentials, pAuxInfo);
857
858 pObject->cBlob = 0;
859 pObject->rgBlob = NULL;
860 *ppfnFreeObject = CRYPT_FreeBlob;
861 *ppvFreeContext = NULL;
862
863 components.lpszUrlPath = CryptMemAlloc(MAX_PATH * 2 * sizeof(WCHAR));
864 components.dwUrlPathLength = 2 * MAX_PATH;
865 ret = InternetCrackUrlW(pszURL, 0, ICU_DECODE, &components);
866 if (ret)
867 {
868 LPWSTR path;
869
870 if (components.dwUrlPathLength == 2 * MAX_PATH - 1)
871 FIXME("Buffers are too small\n");
872
873 /* 3 == lstrlenW(L"c:") + 1 */
874 path = CryptMemAlloc((components.dwUrlPathLength + 3) * sizeof(WCHAR));
875 if (path)
876 {
877 HANDLE hFile;
878
879 /* Try to create the file directly - Wine handles / in pathnames */
880 lstrcpynW(path, components.lpszUrlPath,
881 components.dwUrlPathLength + 1);
882 hFile = CreateFileW(path, GENERIC_READ, 0, NULL, OPEN_EXISTING,
883 FILE_ATTRIBUTE_NORMAL, NULL);
884 if (hFile == INVALID_HANDLE_VALUE)
885 {
886 /* Try again on the current drive */
887 GetCurrentDirectoryW(components.dwUrlPathLength, path);
888 if (path[1] == ':')
889 {
890 lstrcpynW(path + 2, components.lpszUrlPath,
891 components.dwUrlPathLength + 1);
892 hFile = CreateFileW(path, GENERIC_READ, 0, NULL,
893 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
894 }
895 if (hFile == INVALID_HANDLE_VALUE)
896 {
897 /* Try again on the Windows drive */
898 GetWindowsDirectoryW(path, components.dwUrlPathLength);
899 if (path[1] == ':')
900 {
901 lstrcpynW(path + 2, components.lpszUrlPath,
902 components.dwUrlPathLength + 1);
903 hFile = CreateFileW(path, GENERIC_READ, 0, NULL,
904 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
905 }
906 }
907 }
908 if (hFile != INVALID_HANDLE_VALUE)
909 {
910 if ((ret = CRYPT_GetObjectFromFile(hFile, pObject)))
911 {
912 if (pAuxInfo && pAuxInfo->cbSize >=
913 offsetof(CRYPT_RETRIEVE_AUX_INFO,
914 pLastSyncTime) + sizeof(PFILETIME) &&
915 pAuxInfo->pLastSyncTime)
916 GetFileTime(hFile, NULL, NULL,
917 pAuxInfo->pLastSyncTime);
918 }
919 CloseHandle(hFile);
920 }
921 else
922 ret = FALSE;
923 CryptMemFree(path);
924 }
925 }
926 CryptMemFree(components.lpszUrlPath);
927 return ret;
928 }
929
930 typedef BOOL (WINAPI *SchemeDllRetrieveEncodedObjectW)(LPCWSTR pwszUrl,
931 LPCSTR pszObjectOid, DWORD dwRetrievalFlags, DWORD dwTimeout,
932 PCRYPT_BLOB_ARRAY pObject, PFN_FREE_ENCODED_OBJECT_FUNC *ppfnFreeObject,
933 void **ppvFreeContext, HCRYPTASYNC hAsyncRetrieve,
934 PCRYPT_CREDENTIALS pCredentials, PCRYPT_RETRIEVE_AUX_INFO pAuxInfo);
935
936 static BOOL CRYPT_GetRetrieveFunction(LPCWSTR pszURL,
937 SchemeDllRetrieveEncodedObjectW *pFunc, HCRYPTOIDFUNCADDR *phFunc)
938 {
939 URL_COMPONENTSW components = { sizeof(components), 0 };
940 BOOL ret;
941
942 TRACE("(%s, %p, %p)\n", debugstr_w(pszURL), pFunc, phFunc);
943
944 *pFunc = NULL;
945 *phFunc = 0;
946 components.dwSchemeLength = 1;
947 ret = InternetCrackUrlW(pszURL, 0, 0, &components);
948 if (ret)
949 {
950 /* Microsoft always uses CryptInitOIDFunctionSet/
951 * CryptGetOIDFunctionAddress, but there doesn't seem to be a pressing
952 * reason to do so for builtin schemes.
953 */
954 switch (components.nScheme)
955 {
956 case INTERNET_SCHEME_FTP:
957 *pFunc = FTP_RetrieveEncodedObjectW;
958 break;
959 case INTERNET_SCHEME_HTTP:
960 *pFunc = HTTP_RetrieveEncodedObjectW;
961 break;
962 case INTERNET_SCHEME_FILE:
963 *pFunc = File_RetrieveEncodedObjectW;
964 break;
965 default:
966 {
967 int len = WideCharToMultiByte(CP_ACP, 0, components.lpszScheme,
968 components.dwSchemeLength, NULL, 0, NULL, NULL);
969
970 if (len)
971 {
972 LPSTR scheme = CryptMemAlloc(len);
973
974 if (scheme)
975 {
976 static HCRYPTOIDFUNCSET set = NULL;
977
978 if (!set)
979 set = CryptInitOIDFunctionSet(
980 SCHEME_OID_RETRIEVE_ENCODED_OBJECTW_FUNC, 0);
981 WideCharToMultiByte(CP_ACP, 0, components.lpszScheme,
982 components.dwSchemeLength, scheme, len, NULL, NULL);
983 ret = CryptGetOIDFunctionAddress(set, X509_ASN_ENCODING,
984 scheme, 0, (void **)pFunc, phFunc);
985 CryptMemFree(scheme);
986 }
987 else
988 {
989 SetLastError(ERROR_OUTOFMEMORY);
990 ret = FALSE;
991 }
992 }
993 else
994 ret = FALSE;
995 }
996 }
997 }
998 TRACE("returning %d\n", ret);
999 return ret;
1000 }
1001
1002 static BOOL WINAPI CRYPT_CreateBlob(LPCSTR pszObjectOid,
1003 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext)
1004 {
1005 DWORD size, i;
1006 CRYPT_BLOB_ARRAY *context;
1007 BOOL ret = FALSE;
1008
1009 size = sizeof(CRYPT_BLOB_ARRAY) + pObject->cBlob * sizeof(CRYPT_DATA_BLOB);
1010 for (i = 0; i < pObject->cBlob; i++)
1011 size += pObject->rgBlob[i].cbData;
1012 context = CryptMemAlloc(size);
1013 if (context)
1014 {
1015 LPBYTE nextData;
1016
1017 context->cBlob = 0;
1018 context->rgBlob =
1019 (CRYPT_DATA_BLOB *)((LPBYTE)context + sizeof(CRYPT_BLOB_ARRAY));
1020 nextData =
1021 (LPBYTE)context->rgBlob + pObject->cBlob * sizeof(CRYPT_DATA_BLOB);
1022 for (i = 0; i < pObject->cBlob; i++)
1023 {
1024 memcpy(nextData, pObject->rgBlob[i].pbData,
1025 pObject->rgBlob[i].cbData);
1026 context->rgBlob[i].pbData = nextData;
1027 context->rgBlob[i].cbData = pObject->rgBlob[i].cbData;
1028 nextData += pObject->rgBlob[i].cbData;
1029 context->cBlob++;
1030 }
1031 *ppvContext = context;
1032 ret = TRUE;
1033 }
1034 return ret;
1035 }
1036
1037 typedef BOOL (WINAPI *AddContextToStore)(HCERTSTORE hCertStore,
1038 const void *pContext, DWORD dwAddDisposition, const void **ppStoreContext);
1039
1040 static BOOL CRYPT_CreateContext(PCRYPT_BLOB_ARRAY pObject,
1041 DWORD dwExpectedContentTypeFlags, AddContextToStore addFunc, void **ppvContext)
1042 {
1043 BOOL ret = TRUE;
1044
1045 if (!pObject->cBlob)
1046 {
1047 SetLastError(ERROR_INVALID_DATA);
1048 *ppvContext = NULL;
1049 ret = FALSE;
1050 }
1051 else if (pObject->cBlob == 1)
1052 {
1053 if (!CryptQueryObject(CERT_QUERY_OBJECT_BLOB, &pObject->rgBlob[0],
1054 dwExpectedContentTypeFlags, CERT_QUERY_FORMAT_FLAG_BINARY, 0, NULL,
1055 NULL, NULL, NULL, NULL, (const void **)ppvContext))
1056 {
1057 SetLastError(CRYPT_E_NO_MATCH);
1058 ret = FALSE;
1059 }
1060 }
1061 else
1062 {
1063 HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
1064 CERT_STORE_CREATE_NEW_FLAG, NULL);
1065
1066 if (store)
1067 {
1068 DWORD i;
1069 const void *context;
1070
1071 for (i = 0; i < pObject->cBlob; i++)
1072 {
1073 if (CryptQueryObject(CERT_QUERY_OBJECT_BLOB,
1074 &pObject->rgBlob[i], dwExpectedContentTypeFlags,
1075 CERT_QUERY_FORMAT_FLAG_BINARY, 0, NULL, NULL, NULL, NULL,
1076 NULL, &context))
1077 {
1078 if (!addFunc(store, context, CERT_STORE_ADD_ALWAYS, NULL))
1079 ret = FALSE;
1080 }
1081 else
1082 {
1083 SetLastError(CRYPT_E_NO_MATCH);
1084 ret = FALSE;
1085 }
1086 }
1087 }
1088 else
1089 ret = FALSE;
1090 *ppvContext = store;
1091 }
1092 return ret;
1093 }
1094
1095 static BOOL WINAPI CRYPT_CreateCert(LPCSTR pszObjectOid,
1096 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext)
1097 {
1098 return CRYPT_CreateContext(pObject, CERT_QUERY_CONTENT_FLAG_CERT,
1099 (AddContextToStore)CertAddCertificateContextToStore, ppvContext);
1100 }
1101
1102 static BOOL WINAPI CRYPT_CreateCRL(LPCSTR pszObjectOid,
1103 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext)
1104 {
1105 return CRYPT_CreateContext(pObject, CERT_QUERY_CONTENT_FLAG_CRL,
1106 (AddContextToStore)CertAddCRLContextToStore, ppvContext);
1107 }
1108
1109 static BOOL WINAPI CRYPT_CreateCTL(LPCSTR pszObjectOid,
1110 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext)
1111 {
1112 return CRYPT_CreateContext(pObject, CERT_QUERY_CONTENT_FLAG_CTL,
1113 (AddContextToStore)CertAddCTLContextToStore, ppvContext);
1114 }
1115
1116 static BOOL WINAPI CRYPT_CreatePKCS7(LPCSTR pszObjectOid,
1117 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext)
1118 {
1119 BOOL ret;
1120
1121 if (!pObject->cBlob)
1122 {
1123 SetLastError(ERROR_INVALID_DATA);
1124 *ppvContext = NULL;
1125 ret = FALSE;
1126 }
1127 else if (pObject->cBlob == 1)
1128 ret = CryptQueryObject(CERT_QUERY_OBJECT_BLOB, &pObject->rgBlob[0],
1129 CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED |
1130 CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED, CERT_QUERY_FORMAT_FLAG_BINARY,
1131 0, NULL, NULL, NULL, ppvContext, NULL, NULL);
1132 else
1133 {
1134 FIXME("multiple messages unimplemented\n");
1135 ret = FALSE;
1136 }
1137 return ret;
1138 }
1139
1140 static BOOL WINAPI CRYPT_CreateAny(LPCSTR pszObjectOid,
1141 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext)
1142 {
1143 BOOL ret;
1144
1145 if (!pObject->cBlob)
1146 {
1147 SetLastError(ERROR_INVALID_DATA);
1148 *ppvContext = NULL;
1149 ret = FALSE;
1150 }
1151 else
1152 {
1153 HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_COLLECTION, 0, 0,
1154 CERT_STORE_CREATE_NEW_FLAG, NULL);
1155
1156 if (store)
1157 {
1158 HCERTSTORE memStore = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
1159 CERT_STORE_CREATE_NEW_FLAG, NULL);
1160
1161 if (memStore)
1162 {
1163 CertAddStoreToCollection(store, memStore,
1164 CERT_PHYSICAL_STORE_ADD_ENABLE_FLAG, 0);
1165 CertCloseStore(memStore, 0);
1166 }
1167 else
1168 {
1169 CertCloseStore(store, 0);
1170 store = NULL;
1171 }
1172 }
1173 if (store)
1174 {
1175 DWORD i;
1176
1177 ret = TRUE;
1178 for (i = 0; i < pObject->cBlob; i++)
1179 {
1180 DWORD contentType, expectedContentTypes =
1181 CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED |
1182 CERT_QUERY_CONTENT_FLAG_PKCS7_UNSIGNED |
1183 CERT_QUERY_CONTENT_FLAG_CERT |
1184 CERT_QUERY_CONTENT_FLAG_CRL |
1185 CERT_QUERY_CONTENT_FLAG_CTL;
1186 HCERTSTORE contextStore;
1187 const void *context;
1188
1189 if (CryptQueryObject(CERT_QUERY_OBJECT_BLOB,
1190 &pObject->rgBlob[i], expectedContentTypes,
1191 CERT_QUERY_FORMAT_FLAG_BINARY, 0, NULL, &contentType, NULL,
1192 &contextStore, NULL, &context))
1193 {
1194 switch (contentType)
1195 {
1196 case CERT_QUERY_CONTENT_CERT:
1197 if (!CertAddCertificateContextToStore(store,
1198 (PCCERT_CONTEXT)context, CERT_STORE_ADD_ALWAYS, NULL))
1199 ret = FALSE;
1200 break;
1201 case CERT_QUERY_CONTENT_CRL:
1202 if (!CertAddCRLContextToStore(store,
1203 (PCCRL_CONTEXT)context, CERT_STORE_ADD_ALWAYS, NULL))
1204 ret = FALSE;
1205 break;
1206 case CERT_QUERY_CONTENT_CTL:
1207 if (!CertAddCTLContextToStore(store,
1208 (PCCTL_CONTEXT)context, CERT_STORE_ADD_ALWAYS, NULL))
1209 ret = FALSE;
1210 break;
1211 default:
1212 CertAddStoreToCollection(store, contextStore, 0, 0);
1213 }
1214 }
1215 else
1216 ret = FALSE;
1217 }
1218 }
1219 else
1220 ret = FALSE;
1221 *ppvContext = store;
1222 }
1223 return ret;
1224 }
1225
1226 typedef BOOL (WINAPI *ContextDllCreateObjectContext)(LPCSTR pszObjectOid,
1227 DWORD dwRetrievalFlags, PCRYPT_BLOB_ARRAY pObject, void **ppvContext);
1228
1229 static BOOL CRYPT_GetCreateFunction(LPCSTR pszObjectOid,
1230 ContextDllCreateObjectContext *pFunc, HCRYPTOIDFUNCADDR *phFunc)
1231 {
1232 BOOL ret = TRUE;
1233
1234 TRACE("(%s, %p, %p)\n", debugstr_a(pszObjectOid), pFunc, phFunc);
1235
1236 *pFunc = NULL;
1237 *phFunc = 0;
1238 if (!HIWORD(pszObjectOid))
1239 {
1240 switch (LOWORD(pszObjectOid))
1241 {
1242 case 0:
1243 *pFunc = CRYPT_CreateBlob;
1244 break;
1245 case LOWORD(CONTEXT_OID_CERTIFICATE):
1246 *pFunc = CRYPT_CreateCert;
1247 break;
1248 case LOWORD(CONTEXT_OID_CRL):
1249 *pFunc = CRYPT_CreateCRL;
1250 break;
1251 case LOWORD(CONTEXT_OID_CTL):
1252 *pFunc = CRYPT_CreateCTL;
1253 break;
1254 case LOWORD(CONTEXT_OID_PKCS7):
1255 *pFunc = CRYPT_CreatePKCS7;
1256 break;
1257 case LOWORD(CONTEXT_OID_CAPI2_ANY):
1258 *pFunc = CRYPT_CreateAny;
1259 break;
1260 }
1261 }
1262 if (!*pFunc)
1263 {
1264 static HCRYPTOIDFUNCSET set = NULL;
1265
1266 if (!set)
1267 set = CryptInitOIDFunctionSet(
1268 CONTEXT_OID_CREATE_OBJECT_CONTEXT_FUNC, 0);
1269 ret = CryptGetOIDFunctionAddress(set, X509_ASN_ENCODING, pszObjectOid,
1270 0, (void **)pFunc, phFunc);
1271 }
1272 TRACE("returning %d\n", ret);
1273 return ret;
1274 }
1275
1276 /***********************************************************************
1277 * CryptRetrieveObjectByUrlW (CRYPTNET.@)
1278 */
1279 BOOL WINAPI CryptRetrieveObjectByUrlW(LPCWSTR pszURL, LPCSTR pszObjectOid,
1280 DWORD dwRetrievalFlags, DWORD dwTimeout, LPVOID *ppvObject,
1281 HCRYPTASYNC hAsyncRetrieve, PCRYPT_CREDENTIALS pCredentials, LPVOID pvVerify,
1282 PCRYPT_RETRIEVE_AUX_INFO pAuxInfo)
1283 {
1284 BOOL ret;
1285 SchemeDllRetrieveEncodedObjectW retrieve;
1286 ContextDllCreateObjectContext create;
1287 HCRYPTOIDFUNCADDR hRetrieve = 0, hCreate = 0;
1288
1289 TRACE("(%s, %s, %08x, %d, %p, %p, %p, %p, %p)\n", debugstr_w(pszURL),
1290 debugstr_a(pszObjectOid), dwRetrievalFlags, dwTimeout, ppvObject,
1291 hAsyncRetrieve, pCredentials, pvVerify, pAuxInfo);
1292
1293 if (!pszURL)
1294 {
1295 SetLastError(ERROR_INVALID_PARAMETER);
1296 return FALSE;
1297 }
1298 ret = CRYPT_GetRetrieveFunction(pszURL, &retrieve, &hRetrieve);
1299 if (ret)
1300 ret = CRYPT_GetCreateFunction(pszObjectOid, &create, &hCreate);
1301 if (ret)
1302 {
1303 CRYPT_BLOB_ARRAY object = { 0, NULL };
1304 PFN_FREE_ENCODED_OBJECT_FUNC freeObject;
1305 void *freeContext;
1306
1307 ret = retrieve(pszURL, pszObjectOid, dwRetrievalFlags, dwTimeout,
1308 &object, &freeObject, &freeContext, hAsyncRetrieve, pCredentials,
1309 pAuxInfo);
1310 if (ret)
1311 {
1312 ret = create(pszObjectOid, dwRetrievalFlags, &object, ppvObject);
1313 freeObject(pszObjectOid, &object, freeContext);
1314 }
1315 }
1316 if (hCreate)
1317 CryptFreeOIDFunctionAddress(hCreate, 0);
1318 if (hRetrieve)
1319 CryptFreeOIDFunctionAddress(hRetrieve, 0);
1320 TRACE("returning %d\n", ret);
1321 return ret;
1322 }
1323
1324 typedef struct _OLD_CERT_REVOCATION_STATUS {
1325 DWORD cbSize;
1326 DWORD dwIndex;
1327 DWORD dwError;
1328 DWORD dwReason;
1329 } OLD_CERT_REVOCATION_STATUS, *POLD_CERT_REVOCATION_STATUS;
1330
1331 /***********************************************************************
1332 * CertDllVerifyRevocation (CRYPTNET.@)
1333 */
1334 BOOL WINAPI CertDllVerifyRevocation(DWORD dwEncodingType, DWORD dwRevType,
1335 DWORD cContext, PVOID rgpvContext[], DWORD dwFlags,
1336 PCERT_REVOCATION_PARA pRevPara, PCERT_REVOCATION_STATUS pRevStatus)
1337 {
1338 DWORD error = 0, i;
1339 BOOL ret;
1340
1341 TRACE("(%08x, %d, %d, %p, %08x, %p, %p)\n", dwEncodingType, dwRevType,
1342 cContext, rgpvContext, dwFlags, pRevPara, pRevStatus);
1343
1344 if (pRevStatus->cbSize != sizeof(OLD_CERT_REVOCATION_STATUS) &&
1345 pRevStatus->cbSize != sizeof(CERT_REVOCATION_STATUS))
1346 {
1347 SetLastError(E_INVALIDARG);
1348 return FALSE;
1349 }
1350 memset(&pRevStatus->dwIndex, 0, pRevStatus->cbSize - sizeof(DWORD));
1351 if (dwRevType != CERT_CONTEXT_REVOCATION_TYPE)
1352 {
1353 error = CRYPT_E_NO_REVOCATION_CHECK;
1354 ret = FALSE;
1355 }
1356 else
1357 {
1358 ret = TRUE;
1359 for (i = 0; ret && i < cContext; i++)
1360 {
1361 DWORD cbUrlArray;
1362
1363 ret = CryptGetObjectUrl(URL_OID_CERTIFICATE_CRL_DIST_POINT,
1364 rgpvContext[i], 0, NULL, &cbUrlArray, NULL, NULL, NULL);
1365 if (!ret && GetLastError() == CRYPT_E_NOT_FOUND)
1366 {
1367 error = CRYPT_E_NO_REVOCATION_CHECK;
1368 pRevStatus->dwIndex = i;
1369 }
1370 else if (ret)
1371 {
1372 CRYPT_URL_ARRAY *urlArray = CryptMemAlloc(cbUrlArray);
1373
1374 if (urlArray)
1375 {
1376 DWORD j, retrievalFlags = 0, startTime, endTime, timeout;
1377
1378 ret = CryptGetObjectUrl(URL_OID_CERTIFICATE_CRL_DIST_POINT,
1379 rgpvContext[i], 0, urlArray, &cbUrlArray, NULL, NULL,
1380 NULL);
1381 if (dwFlags & CERT_VERIFY_CACHE_ONLY_BASED_REVOCATION)
1382 retrievalFlags |= CRYPT_CACHE_ONLY_RETRIEVAL;
1383 if (dwFlags & CERT_VERIFY_REV_ACCUMULATIVE_TIMEOUT_FLAG &&
1384 pRevPara->cbSize >= offsetof(CERT_REVOCATION_PARA,
1385 dwUrlRetrievalTimeout) + sizeof(DWORD))
1386 {
1387 startTime = GetTickCount();
1388 endTime = startTime + pRevPara->dwUrlRetrievalTimeout;
1389 timeout = pRevPara->dwUrlRetrievalTimeout;
1390 }
1391 else
1392 endTime = timeout = 0;
1393 for (j = 0; ret && j < urlArray->cUrl; j++)
1394 {
1395 PCCRL_CONTEXT crl;
1396
1397 ret = CryptRetrieveObjectByUrlW(urlArray->rgwszUrl[j],
1398 CONTEXT_OID_CRL, retrievalFlags, timeout,
1399 (void **)&crl, NULL, NULL, NULL, NULL);
1400 if (ret)
1401 {
1402 PCRL_ENTRY entry = NULL;
1403
1404 CertFindCertificateInCRL(
1405 (PCCERT_CONTEXT)rgpvContext[i], crl, 0, NULL,
1406 &entry);
1407 if (entry)
1408 {
1409 error = CRYPT_E_REVOKED;
1410 pRevStatus->dwIndex = i;
1411 ret = FALSE;
1412 }
1413 else if (timeout)
1414 {
1415 DWORD time = GetTickCount();
1416
1417 if ((int)(endTime - time) <= 0)
1418 {
1419 error = ERROR_TIMEOUT;
1420 pRevStatus->dwIndex = i;
1421 ret = FALSE;
1422 }
1423 else
1424 timeout = endTime - time;
1425 }
1426 CertFreeCRLContext(crl);
1427 }
1428 else
1429 error = CRYPT_E_REVOCATION_OFFLINE;
1430 }
1431 CryptMemFree(urlArray);
1432 }
1433 else
1434 {
1435 error = ERROR_OUTOFMEMORY;
1436 pRevStatus->dwIndex = i;
1437 ret = FALSE;
1438 }
1439 }
1440 else
1441 pRevStatus->dwIndex = i;
1442 }
1443 }
1444
1445 if (!ret)
1446 {
1447 SetLastError(error);
1448 pRevStatus->dwError = error;
1449 }
1450 TRACE("returning %d (%08x)\n", ret, error);
1451 return ret;
1452 }