| /* |
| * Copyright 2007 Juan Lang |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA |
| */ |
| |
| #include "config.h" |
| #include "wine/port.h" |
| |
| #include <stdarg.h> |
| #define NONAMELESSUNION |
| #include "windef.h" |
| #include "winbase.h" |
| #include "wincrypt.h" |
| #include "snmp.h" |
| |
| #include "wine/debug.h" |
| #include "wine/exception.h" |
| #include "crypt32_private.h" |
| |
| WINE_DEFAULT_DEBUG_CHANNEL(crypt); |
| |
| /* Called when a message's ref count reaches zero. Free any message-specific |
| * data here. |
| */ |
| typedef void (*CryptMsgCloseFunc)(HCRYPTMSG msg); |
| |
| typedef BOOL (*CryptMsgGetParamFunc)(HCRYPTMSG hCryptMsg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData); |
| |
| typedef BOOL (*CryptMsgUpdateFunc)(HCRYPTMSG hCryptMsg, const BYTE *pbData, |
| DWORD cbData, BOOL fFinal); |
| |
| typedef BOOL (*CryptMsgControlFunc)(HCRYPTMSG hCryptMsg, DWORD dwFlags, |
| DWORD dwCtrlType, const void *pvCtrlPara); |
| |
| static BOOL CRYPT_DefaultMsgControl(HCRYPTMSG hCryptMsg, DWORD dwFlags, |
| DWORD dwCtrlType, const void *pvCtrlPara) |
| { |
| TRACE("(%p, %08x, %d, %p)\n", hCryptMsg, dwFlags, dwCtrlType, pvCtrlPara); |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| |
| typedef enum _CryptMsgState { |
| MsgStateInit, |
| MsgStateUpdated, |
| MsgStateDataFinalized, |
| MsgStateFinalized |
| } CryptMsgState; |
| |
| typedef struct _CryptMsgBase |
| { |
| LONG ref; |
| DWORD open_flags; |
| BOOL streamed; |
| CMSG_STREAM_INFO stream_info; |
| CryptMsgState state; |
| CryptMsgCloseFunc close; |
| CryptMsgUpdateFunc update; |
| CryptMsgGetParamFunc get_param; |
| CryptMsgControlFunc control; |
| } CryptMsgBase; |
| |
| static inline void CryptMsgBase_Init(CryptMsgBase *msg, DWORD dwFlags, |
| PCMSG_STREAM_INFO pStreamInfo, CryptMsgCloseFunc close, |
| CryptMsgGetParamFunc get_param, CryptMsgUpdateFunc update, |
| CryptMsgControlFunc control) |
| { |
| msg->ref = 1; |
| msg->open_flags = dwFlags; |
| if (pStreamInfo) |
| { |
| msg->streamed = TRUE; |
| msg->stream_info = *pStreamInfo; |
| } |
| else |
| { |
| msg->streamed = FALSE; |
| memset(&msg->stream_info, 0, sizeof(msg->stream_info)); |
| } |
| msg->close = close; |
| msg->get_param = get_param; |
| msg->update = update; |
| msg->control = control; |
| msg->state = MsgStateInit; |
| } |
| |
| typedef struct _CDataEncodeMsg |
| { |
| CryptMsgBase base; |
| DWORD bare_content_len; |
| LPBYTE bare_content; |
| } CDataEncodeMsg; |
| |
| static const BYTE empty_data_content[] = { 0x04,0x00 }; |
| |
| static void CDataEncodeMsg_Close(HCRYPTMSG hCryptMsg) |
| { |
| CDataEncodeMsg *msg = hCryptMsg; |
| |
| if (msg->bare_content != empty_data_content) |
| LocalFree(msg->bare_content); |
| } |
| |
| static BOOL WINAPI CRYPT_EncodeContentLength(DWORD dwCertEncodingType, |
| LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags, |
| PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded) |
| { |
| DWORD dataLen = *(DWORD *)pvStructInfo; |
| DWORD lenBytes; |
| BOOL ret = TRUE; |
| |
| /* Trick: report bytes needed based on total message length, even though |
| * the message isn't available yet. The caller will use the length |
| * reported here to encode its length. |
| */ |
| CRYPT_EncodeLen(dataLen, NULL, &lenBytes); |
| if (!pbEncoded) |
| *pcbEncoded = 1 + lenBytes + dataLen; |
| else |
| { |
| if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded, |
| pcbEncoded, 1 + lenBytes))) |
| { |
| if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG) |
| pbEncoded = *(BYTE **)pbEncoded; |
| *pbEncoded++ = ASN_OCTETSTRING; |
| CRYPT_EncodeLen(dataLen, pbEncoded, |
| &lenBytes); |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CRYPT_EncodeDataContentInfoHeader(const CDataEncodeMsg *msg, |
| CRYPT_DATA_BLOB *header) |
| { |
| BOOL ret; |
| |
| if (msg->base.streamed && msg->base.stream_info.cbContent == 0xffffffff) |
| { |
| static const BYTE headerValue[] = { 0x30,0x80,0x06,0x09,0x2a,0x86,0x48, |
| 0x86,0xf7,0x0d,0x01,0x07,0x01,0xa0,0x80,0x24,0x80 }; |
| |
| header->pbData = LocalAlloc(0, sizeof(headerValue)); |
| if (header->pbData) |
| { |
| header->cbData = sizeof(headerValue); |
| memcpy(header->pbData, headerValue, sizeof(headerValue)); |
| ret = TRUE; |
| } |
| else |
| ret = FALSE; |
| } |
| else |
| { |
| struct AsnConstructedItem constructed = { 0, |
| &msg->base.stream_info.cbContent, CRYPT_EncodeContentLength }; |
| struct AsnEncodeSequenceItem items[2] = { |
| { szOID_RSA_data, CRYPT_AsnEncodeOid, 0 }, |
| { &constructed, CRYPT_AsnEncodeConstructed, 0 }, |
| }; |
| |
| ret = CRYPT_AsnEncodeSequence(X509_ASN_ENCODING, items, |
| sizeof(items) / sizeof(items[0]), CRYPT_ENCODE_ALLOC_FLAG, NULL, |
| (LPBYTE)&header->pbData, &header->cbData); |
| if (ret) |
| { |
| /* Trick: subtract the content length from the reported length, |
| * as the actual content hasn't come yet. |
| */ |
| header->cbData -= msg->base.stream_info.cbContent; |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CDataEncodeMsg_Update(HCRYPTMSG hCryptMsg, const BYTE *pbData, |
| DWORD cbData, BOOL fFinal) |
| { |
| CDataEncodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| if (msg->base.state == MsgStateFinalized) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else if (msg->base.streamed) |
| { |
| __TRY |
| { |
| if (msg->base.state != MsgStateUpdated) |
| { |
| CRYPT_DATA_BLOB header; |
| |
| ret = CRYPT_EncodeDataContentInfoHeader(msg, &header); |
| if (ret) |
| { |
| ret = msg->base.stream_info.pfnStreamOutput( |
| msg->base.stream_info.pvArg, header.pbData, header.cbData, |
| FALSE); |
| LocalFree(header.pbData); |
| } |
| } |
| /* Curiously, every indefinite-length streamed update appears to |
| * get its own tag and length, regardless of fFinal. |
| */ |
| if (msg->base.stream_info.cbContent == 0xffffffff) |
| { |
| BYTE *header; |
| DWORD headerLen; |
| |
| ret = CRYPT_EncodeContentLength(X509_ASN_ENCODING, NULL, |
| &cbData, CRYPT_ENCODE_ALLOC_FLAG, NULL, (BYTE *)&header, |
| &headerLen); |
| if (ret) |
| { |
| ret = msg->base.stream_info.pfnStreamOutput( |
| msg->base.stream_info.pvArg, header, headerLen, |
| FALSE); |
| LocalFree(header); |
| } |
| } |
| if (!fFinal) |
| { |
| ret = msg->base.stream_info.pfnStreamOutput( |
| msg->base.stream_info.pvArg, (BYTE *)pbData, cbData, |
| FALSE); |
| msg->base.state = MsgStateUpdated; |
| } |
| else |
| { |
| msg->base.state = MsgStateFinalized; |
| if (msg->base.stream_info.cbContent == 0xffffffff) |
| { |
| BYTE indefinite_trailer[6] = { 0 }; |
| |
| ret = msg->base.stream_info.pfnStreamOutput( |
| msg->base.stream_info.pvArg, (BYTE *)pbData, cbData, |
| FALSE); |
| if (ret) |
| ret = msg->base.stream_info.pfnStreamOutput( |
| msg->base.stream_info.pvArg, indefinite_trailer, |
| sizeof(indefinite_trailer), TRUE); |
| } |
| else |
| ret = msg->base.stream_info.pfnStreamOutput( |
| msg->base.stream_info.pvArg, (BYTE *)pbData, cbData, TRUE); |
| } |
| } |
| __EXCEPT_PAGE_FAULT |
| { |
| SetLastError(STATUS_ACCESS_VIOLATION); |
| ret = FALSE; |
| } |
| __ENDTRY; |
| } |
| else |
| { |
| if (!fFinal) |
| { |
| if (msg->base.open_flags & CMSG_DETACHED_FLAG) |
| SetLastError(E_INVALIDARG); |
| else |
| SetLastError(CRYPT_E_MSG_ERROR); |
| } |
| else |
| { |
| msg->base.state = MsgStateFinalized; |
| if (!cbData) |
| SetLastError(E_INVALIDARG); |
| else |
| { |
| CRYPT_DATA_BLOB blob = { cbData, (LPBYTE)pbData }; |
| |
| /* non-streamed data messages don't allow non-final updates, |
| * don't bother checking whether data already exist, they can't. |
| */ |
| ret = CryptEncodeObjectEx(X509_ASN_ENCODING, X509_OCTET_STRING, |
| &blob, CRYPT_ENCODE_ALLOC_FLAG, NULL, &msg->bare_content, |
| &msg->bare_content_len); |
| } |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CRYPT_CopyParam(void *pvData, DWORD *pcbData, const void *src, |
| DWORD len) |
| { |
| BOOL ret = TRUE; |
| |
| if (!pvData) |
| *pcbData = len; |
| else if (*pcbData < len) |
| { |
| *pcbData = len; |
| SetLastError(ERROR_MORE_DATA); |
| ret = FALSE; |
| } |
| else |
| { |
| *pcbData = len; |
| memcpy(pvData, src, len); |
| } |
| return ret; |
| } |
| |
| static BOOL CDataEncodeMsg_GetParam(HCRYPTMSG hCryptMsg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| CDataEncodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| switch (dwParamType) |
| { |
| case CMSG_CONTENT_PARAM: |
| if (msg->base.streamed) |
| SetLastError(E_INVALIDARG); |
| else |
| { |
| CRYPT_CONTENT_INFO info; |
| char rsa_data[] = "1.2.840.113549.1.7.1"; |
| |
| info.pszObjId = rsa_data; |
| info.Content.cbData = msg->bare_content_len; |
| info.Content.pbData = msg->bare_content; |
| ret = CryptEncodeObject(X509_ASN_ENCODING, PKCS_CONTENT_INFO, &info, |
| pvData, pcbData); |
| } |
| break; |
| case CMSG_BARE_CONTENT_PARAM: |
| if (msg->base.streamed) |
| SetLastError(E_INVALIDARG); |
| else |
| ret = CRYPT_CopyParam(pvData, pcbData, msg->bare_content, |
| msg->bare_content_len); |
| break; |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| return ret; |
| } |
| |
| static HCRYPTMSG CDataEncodeMsg_Open(DWORD dwFlags, const void *pvMsgEncodeInfo, |
| LPSTR pszInnerContentObjID, PCMSG_STREAM_INFO pStreamInfo) |
| { |
| CDataEncodeMsg *msg; |
| |
| if (pvMsgEncodeInfo) |
| { |
| SetLastError(E_INVALIDARG); |
| return NULL; |
| } |
| msg = CryptMemAlloc(sizeof(CDataEncodeMsg)); |
| if (msg) |
| { |
| CryptMsgBase_Init((CryptMsgBase *)msg, dwFlags, pStreamInfo, |
| CDataEncodeMsg_Close, CDataEncodeMsg_GetParam, CDataEncodeMsg_Update, |
| CRYPT_DefaultMsgControl); |
| msg->bare_content_len = sizeof(empty_data_content); |
| msg->bare_content = (LPBYTE)empty_data_content; |
| } |
| return msg; |
| } |
| |
| typedef struct _CHashEncodeMsg |
| { |
| CryptMsgBase base; |
| HCRYPTPROV prov; |
| HCRYPTHASH hash; |
| CRYPT_DATA_BLOB data; |
| } CHashEncodeMsg; |
| |
| static void CHashEncodeMsg_Close(HCRYPTMSG hCryptMsg) |
| { |
| CHashEncodeMsg *msg = hCryptMsg; |
| |
| CryptMemFree(msg->data.pbData); |
| CryptDestroyHash(msg->hash); |
| if (msg->base.open_flags & CMSG_CRYPT_RELEASE_CONTEXT_FLAG) |
| CryptReleaseContext(msg->prov, 0); |
| } |
| |
| static BOOL CRYPT_EncodePKCSDigestedData(CHashEncodeMsg *msg, void *pvData, |
| DWORD *pcbData) |
| { |
| BOOL ret; |
| ALG_ID algID; |
| DWORD size = sizeof(algID); |
| |
| ret = CryptGetHashParam(msg->hash, HP_ALGID, (BYTE *)&algID, &size, 0); |
| if (ret) |
| { |
| CRYPT_DIGESTED_DATA digestedData = { 0 }; |
| char oid_rsa_data[] = szOID_RSA_data; |
| |
| digestedData.version = CMSG_HASHED_DATA_PKCS_1_5_VERSION; |
| digestedData.DigestAlgorithm.pszObjId = (LPSTR)CertAlgIdToOID(algID); |
| /* FIXME: what about digestedData.DigestAlgorithm.Parameters? */ |
| /* Quirk: OID is only encoded messages if an update has happened */ |
| if (msg->base.state != MsgStateInit) |
| digestedData.ContentInfo.pszObjId = oid_rsa_data; |
| if (!(msg->base.open_flags & CMSG_DETACHED_FLAG) && msg->data.cbData) |
| { |
| ret = CRYPT_AsnEncodeOctets(0, NULL, &msg->data, |
| CRYPT_ENCODE_ALLOC_FLAG, NULL, |
| (LPBYTE)&digestedData.ContentInfo.Content.pbData, |
| &digestedData.ContentInfo.Content.cbData); |
| } |
| if (msg->base.state == MsgStateFinalized) |
| { |
| size = sizeof(DWORD); |
| ret = CryptGetHashParam(msg->hash, HP_HASHSIZE, |
| (LPBYTE)&digestedData.hash.cbData, &size, 0); |
| if (ret) |
| { |
| digestedData.hash.pbData = CryptMemAlloc( |
| digestedData.hash.cbData); |
| ret = CryptGetHashParam(msg->hash, HP_HASHVAL, |
| digestedData.hash.pbData, &digestedData.hash.cbData, 0); |
| } |
| } |
| if (ret) |
| ret = CRYPT_AsnEncodePKCSDigestedData(&digestedData, pvData, |
| pcbData); |
| CryptMemFree(digestedData.hash.pbData); |
| LocalFree(digestedData.ContentInfo.Content.pbData); |
| } |
| return ret; |
| } |
| |
| static BOOL CHashEncodeMsg_GetParam(HCRYPTMSG hCryptMsg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| CHashEncodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| TRACE("(%p, %d, %d, %p, %p)\n", hCryptMsg, dwParamType, dwIndex, |
| pvData, pcbData); |
| |
| switch (dwParamType) |
| { |
| case CMSG_BARE_CONTENT_PARAM: |
| if (msg->base.streamed) |
| SetLastError(E_INVALIDARG); |
| else |
| ret = CRYPT_EncodePKCSDigestedData(msg, pvData, pcbData); |
| break; |
| case CMSG_CONTENT_PARAM: |
| { |
| CRYPT_CONTENT_INFO info; |
| |
| ret = CryptMsgGetParam(hCryptMsg, CMSG_BARE_CONTENT_PARAM, 0, NULL, |
| &info.Content.cbData); |
| if (ret) |
| { |
| info.Content.pbData = CryptMemAlloc(info.Content.cbData); |
| if (info.Content.pbData) |
| { |
| ret = CryptMsgGetParam(hCryptMsg, CMSG_BARE_CONTENT_PARAM, 0, |
| info.Content.pbData, &info.Content.cbData); |
| if (ret) |
| { |
| char oid_rsa_hashed[] = szOID_RSA_hashedData; |
| |
| info.pszObjId = oid_rsa_hashed; |
| ret = CryptEncodeObjectEx(X509_ASN_ENCODING, |
| PKCS_CONTENT_INFO, &info, 0, NULL, pvData, pcbData); |
| } |
| CryptMemFree(info.Content.pbData); |
| } |
| else |
| ret = FALSE; |
| } |
| break; |
| } |
| case CMSG_COMPUTED_HASH_PARAM: |
| ret = CryptGetHashParam(msg->hash, HP_HASHVAL, pvData, pcbData, 0); |
| break; |
| case CMSG_VERSION_PARAM: |
| if (msg->base.state != MsgStateFinalized) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else |
| { |
| DWORD version = CMSG_HASHED_DATA_PKCS_1_5_VERSION; |
| |
| /* Since the data are always encoded as octets, the version is |
| * always 0 (see rfc3852, section 7) |
| */ |
| ret = CRYPT_CopyParam(pvData, pcbData, &version, sizeof(version)); |
| } |
| break; |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| return ret; |
| } |
| |
| static BOOL CHashEncodeMsg_Update(HCRYPTMSG hCryptMsg, const BYTE *pbData, |
| DWORD cbData, BOOL fFinal) |
| { |
| CHashEncodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| TRACE("(%p, %p, %d, %d)\n", hCryptMsg, pbData, cbData, fFinal); |
| |
| if (msg->base.state == MsgStateFinalized) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else if (msg->base.streamed || (msg->base.open_flags & CMSG_DETACHED_FLAG)) |
| { |
| /* Doesn't do much, as stream output is never called, and you |
| * can't get the content. |
| */ |
| ret = CryptHashData(msg->hash, pbData, cbData, 0); |
| msg->base.state = fFinal ? MsgStateFinalized : MsgStateUpdated; |
| } |
| else |
| { |
| if (!fFinal) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else |
| { |
| ret = CryptHashData(msg->hash, pbData, cbData, 0); |
| if (ret) |
| { |
| msg->data.pbData = CryptMemAlloc(cbData); |
| if (msg->data.pbData) |
| { |
| memcpy(msg->data.pbData + msg->data.cbData, pbData, cbData); |
| msg->data.cbData += cbData; |
| } |
| else |
| ret = FALSE; |
| } |
| msg->base.state = MsgStateFinalized; |
| } |
| } |
| return ret; |
| } |
| |
| static HCRYPTMSG CHashEncodeMsg_Open(DWORD dwFlags, const void *pvMsgEncodeInfo, |
| LPSTR pszInnerContentObjID, PCMSG_STREAM_INFO pStreamInfo) |
| { |
| CHashEncodeMsg *msg; |
| const CMSG_HASHED_ENCODE_INFO *info = pvMsgEncodeInfo; |
| HCRYPTPROV prov; |
| ALG_ID algID; |
| |
| if (info->cbSize != sizeof(CMSG_HASHED_ENCODE_INFO)) |
| { |
| SetLastError(E_INVALIDARG); |
| return NULL; |
| } |
| if (!(algID = CertOIDToAlgId(info->HashAlgorithm.pszObjId))) |
| { |
| SetLastError(CRYPT_E_UNKNOWN_ALGO); |
| return NULL; |
| } |
| if (info->hCryptProv) |
| prov = info->hCryptProv; |
| else |
| { |
| prov = CRYPT_GetDefaultProvider(); |
| dwFlags &= ~CMSG_CRYPT_RELEASE_CONTEXT_FLAG; |
| } |
| msg = CryptMemAlloc(sizeof(CHashEncodeMsg)); |
| if (msg) |
| { |
| CryptMsgBase_Init((CryptMsgBase *)msg, dwFlags, pStreamInfo, |
| CHashEncodeMsg_Close, CHashEncodeMsg_GetParam, CHashEncodeMsg_Update, |
| CRYPT_DefaultMsgControl); |
| msg->prov = prov; |
| msg->data.cbData = 0; |
| msg->data.pbData = NULL; |
| if (!CryptCreateHash(prov, algID, 0, 0, &msg->hash)) |
| { |
| CryptMsgClose(msg); |
| msg = NULL; |
| } |
| } |
| return msg; |
| } |
| |
| typedef struct _CMSG_SIGNER_ENCODE_INFO_WITH_CMS |
| { |
| DWORD cbSize; |
| PCERT_INFO pCertInfo; |
| HCRYPTPROV hCryptProv; |
| DWORD dwKeySpec; |
| CRYPT_ALGORITHM_IDENTIFIER HashAlgorithm; |
| void *pvHashAuxInfo; |
| DWORD cAuthAttr; |
| PCRYPT_ATTRIBUTE rgAuthAttr; |
| DWORD cUnauthAttr; |
| PCRYPT_ATTRIBUTE rgUnauthAttr; |
| CERT_ID SignerId; |
| CRYPT_ALGORITHM_IDENTIFIER HashEncryptionAlgorithm; |
| void *pvHashEncryptionAuxInfo; |
| } CMSG_SIGNER_ENCODE_INFO_WITH_CMS, *PCMSG_SIGNER_ENCODE_INFO_WITH_CMS; |
| |
| typedef struct _CMSG_SIGNED_ENCODE_INFO_WITH_CMS |
| { |
| DWORD cbSize; |
| DWORD cSigners; |
| PCMSG_SIGNER_ENCODE_INFO_WITH_CMS rgSigners; |
| DWORD cCertEncoded; |
| PCERT_BLOB rgCertEncoded; |
| DWORD cCrlEncoded; |
| PCRL_BLOB rgCrlEncoded; |
| DWORD cAttrCertEncoded; |
| PCERT_BLOB rgAttrCertEncoded; |
| } CMSG_SIGNED_ENCODE_INFO_WITH_CMS, *PCMSG_SIGNED_ENCODE_INFO_WITH_CMS; |
| |
| static BOOL CRYPT_IsValidSigner(const CMSG_SIGNER_ENCODE_INFO_WITH_CMS *signer) |
| { |
| if (signer->cbSize != sizeof(CMSG_SIGNER_ENCODE_INFO) && |
| signer->cbSize != sizeof(CMSG_SIGNER_ENCODE_INFO_WITH_CMS)) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| if (signer->cbSize == sizeof(CMSG_SIGNER_ENCODE_INFO)) |
| { |
| if (!signer->pCertInfo->SerialNumber.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| if (!signer->pCertInfo->Issuer.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| } |
| else if (signer->cbSize == sizeof(CMSG_SIGNER_ENCODE_INFO_WITH_CMS)) |
| { |
| switch (signer->SignerId.dwIdChoice) |
| { |
| case 0: |
| if (!signer->pCertInfo->SerialNumber.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| if (!signer->pCertInfo->Issuer.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| break; |
| case CERT_ID_ISSUER_SERIAL_NUMBER: |
| if (!signer->SignerId.u.IssuerSerialNumber.SerialNumber.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| if (!signer->SignerId.u.IssuerSerialNumber.Issuer.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| break; |
| case CERT_ID_KEY_IDENTIFIER: |
| if (!signer->SignerId.u.KeyId.cbData) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| break; |
| default: |
| SetLastError(E_INVALIDARG); |
| } |
| if (signer->HashEncryptionAlgorithm.pszObjId) |
| { |
| FIXME("CMSG_SIGNER_ENCODE_INFO with CMS fields unsupported\n"); |
| return FALSE; |
| } |
| } |
| if (!signer->hCryptProv) |
| { |
| SetLastError(E_INVALIDARG); |
| return FALSE; |
| } |
| if (!CertOIDToAlgId(signer->HashAlgorithm.pszObjId)) |
| { |
| SetLastError(CRYPT_E_UNKNOWN_ALGO); |
| return FALSE; |
| } |
| return TRUE; |
| } |
| |
| static BOOL CRYPT_ConstructBlob(CRYPT_DATA_BLOB *out, const CRYPT_DATA_BLOB *in) |
| { |
| BOOL ret = TRUE; |
| |
| out->cbData = in->cbData; |
| if (out->cbData) |
| { |
| out->pbData = CryptMemAlloc(out->cbData); |
| if (out->pbData) |
| memcpy(out->pbData, in->pbData, out->cbData); |
| else |
| ret = FALSE; |
| } |
| else |
| out->pbData = NULL; |
| return ret; |
| } |
| |
| static BOOL CRYPT_ConstructBlobArray(DWORD *outCBlobs, |
| PCRYPT_DATA_BLOB *outPBlobs, DWORD cBlobs, const CRYPT_DATA_BLOB *pBlobs) |
| { |
| BOOL ret = TRUE; |
| |
| *outCBlobs = cBlobs; |
| if (cBlobs) |
| { |
| *outPBlobs = CryptMemAlloc(cBlobs * sizeof(CRYPT_DATA_BLOB)); |
| if (*outPBlobs) |
| { |
| DWORD i; |
| |
| memset(*outPBlobs, 0, cBlobs * sizeof(CRYPT_DATA_BLOB)); |
| for (i = 0; ret && i < cBlobs; i++) |
| ret = CRYPT_ConstructBlob(&(*outPBlobs)[i], &pBlobs[i]); |
| } |
| else |
| ret = FALSE; |
| } |
| return ret; |
| } |
| |
| static void CRYPT_FreeBlobArray(DWORD cBlobs, PCRYPT_DATA_BLOB blobs) |
| { |
| DWORD i; |
| |
| for (i = 0; i < cBlobs; i++) |
| CryptMemFree(blobs[i].pbData); |
| CryptMemFree(blobs); |
| } |
| |
| static BOOL CRYPT_ConstructAttribute(CRYPT_ATTRIBUTE *out, |
| const CRYPT_ATTRIBUTE *in) |
| { |
| BOOL ret; |
| |
| out->pszObjId = CryptMemAlloc(strlen(in->pszObjId) + 1); |
| if (out->pszObjId) |
| { |
| strcpy(out->pszObjId, in->pszObjId); |
| ret = CRYPT_ConstructBlobArray(&out->cValue, &out->rgValue, |
| in->cValue, in->rgValue); |
| } |
| else |
| ret = FALSE; |
| return ret; |
| } |
| |
| static BOOL CRYPT_ConstructAttributes(CRYPT_ATTRIBUTES *out, |
| const CRYPT_ATTRIBUTES *in) |
| { |
| BOOL ret = TRUE; |
| |
| out->cAttr = in->cAttr; |
| if (out->cAttr) |
| { |
| out->rgAttr = CryptMemAlloc(out->cAttr * sizeof(CRYPT_ATTRIBUTE)); |
| if (out->rgAttr) |
| { |
| DWORD i; |
| |
| memset(out->rgAttr, 0, out->cAttr * sizeof(CRYPT_ATTRIBUTE)); |
| for (i = 0; ret && i < out->cAttr; i++) |
| ret = CRYPT_ConstructAttribute(&out->rgAttr[i], &in->rgAttr[i]); |
| } |
| else |
| ret = FALSE; |
| } |
| else |
| out->rgAttr = NULL; |
| return ret; |
| } |
| |
| /* Constructs a CMSG_CMS_SIGNER_INFO from a CMSG_SIGNER_ENCODE_INFO_WITH_CMS. */ |
| static BOOL CSignerInfo_Construct(CMSG_CMS_SIGNER_INFO *info, |
| const CMSG_SIGNER_ENCODE_INFO_WITH_CMS *in) |
| { |
| BOOL ret; |
| |
| if (in->cbSize == sizeof(CMSG_SIGNER_ENCODE_INFO)) |
| { |
| info->dwVersion = CMSG_SIGNER_INFO_V1; |
| ret = CRYPT_ConstructBlob(&info->SignerId.u.IssuerSerialNumber.Issuer, |
| &in->pCertInfo->Issuer); |
| if (ret) |
| ret = CRYPT_ConstructBlob( |
| &info->SignerId.u.IssuerSerialNumber.SerialNumber, |
| &in->pCertInfo->SerialNumber); |
| info->SignerId.dwIdChoice = CERT_ID_ISSUER_SERIAL_NUMBER; |
| info->HashEncryptionAlgorithm.pszObjId = |
| in->pCertInfo->SubjectPublicKeyInfo.Algorithm.pszObjId; |
| if (ret) |
| ret = CRYPT_ConstructBlob(&info->HashEncryptionAlgorithm.Parameters, |
| &in->pCertInfo->SubjectPublicKeyInfo.Algorithm.Parameters); |
| } |
| else |
| { |
| const CRYPT_ALGORITHM_IDENTIFIER *pEncrAlg; |
| |
| /* Implicitly in->cbSize == sizeof(CMSG_SIGNER_ENCODE_INFO_WITH_CMS). |
| * See CRYPT_IsValidSigner. |
| */ |
| if (!in->SignerId.dwIdChoice) |
| { |
| info->dwVersion = CMSG_SIGNER_INFO_V1; |
| ret = CRYPT_ConstructBlob(&info->SignerId.u.IssuerSerialNumber.Issuer, |
| &in->pCertInfo->Issuer); |
| if (ret) |
| ret = CRYPT_ConstructBlob( |
| &info->SignerId.u.IssuerSerialNumber.SerialNumber, |
| &in->pCertInfo->SerialNumber); |
| info->SignerId.dwIdChoice = CERT_ID_ISSUER_SERIAL_NUMBER; |
| } |
| else if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| info->dwVersion = CMSG_SIGNER_INFO_V1; |
| info->SignerId.dwIdChoice = CERT_ID_ISSUER_SERIAL_NUMBER; |
| ret = CRYPT_ConstructBlob(&info->SignerId.u.IssuerSerialNumber.Issuer, |
| &in->SignerId.u.IssuerSerialNumber.Issuer); |
| if (ret) |
| ret = CRYPT_ConstructBlob( |
| &info->SignerId.u.IssuerSerialNumber.SerialNumber, |
| &in->SignerId.u.IssuerSerialNumber.SerialNumber); |
| } |
| else |
| { |
| /* Implicitly dwIdChoice == CERT_ID_KEY_IDENTIFIER */ |
| info->dwVersion = CMSG_SIGNER_INFO_V3; |
| info->SignerId.dwIdChoice = CERT_ID_KEY_IDENTIFIER; |
| ret = CRYPT_ConstructBlob(&info->SignerId.u.KeyId, |
| &in->SignerId.u.KeyId); |
| } |
| pEncrAlg = in->HashEncryptionAlgorithm.pszObjId ? |
| &in->HashEncryptionAlgorithm : |
| &in->pCertInfo->SubjectPublicKeyInfo.Algorithm; |
| info->HashEncryptionAlgorithm.pszObjId = pEncrAlg->pszObjId; |
| if (ret) |
| ret = CRYPT_ConstructBlob(&info->HashEncryptionAlgorithm.Parameters, |
| &pEncrAlg->Parameters); |
| } |
| /* Assumption: algorithm IDs will point to static strings, not |
| * stack-based ones, so copying the pointer values is safe. |
| */ |
| info->HashAlgorithm.pszObjId = in->HashAlgorithm.pszObjId; |
| if (ret) |
| ret = CRYPT_ConstructBlob(&info->HashAlgorithm.Parameters, |
| &in->HashAlgorithm.Parameters); |
| if (ret) |
| ret = CRYPT_ConstructAttributes(&info->AuthAttrs, |
| (CRYPT_ATTRIBUTES *)&in->cAuthAttr); |
| if (ret) |
| ret = CRYPT_ConstructAttributes(&info->UnauthAttrs, |
| (CRYPT_ATTRIBUTES *)&in->cUnauthAttr); |
| return ret; |
| } |
| |
| static void CSignerInfo_Free(CMSG_CMS_SIGNER_INFO *info) |
| { |
| DWORD i, j; |
| |
| if (info->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| CryptMemFree(info->SignerId.u.IssuerSerialNumber.Issuer.pbData); |
| CryptMemFree(info->SignerId.u.IssuerSerialNumber.SerialNumber.pbData); |
| } |
| else |
| CryptMemFree(info->SignerId.u.KeyId.pbData); |
| CryptMemFree(info->HashAlgorithm.Parameters.pbData); |
| CryptMemFree(info->HashEncryptionAlgorithm.Parameters.pbData); |
| CryptMemFree(info->EncryptedHash.pbData); |
| for (i = 0; i < info->AuthAttrs.cAttr; i++) |
| { |
| for (j = 0; j < info->AuthAttrs.rgAttr[i].cValue; j++) |
| CryptMemFree(info->AuthAttrs.rgAttr[i].rgValue[j].pbData); |
| CryptMemFree(info->AuthAttrs.rgAttr[i].rgValue); |
| CryptMemFree(info->AuthAttrs.rgAttr[i].pszObjId); |
| } |
| CryptMemFree(info->AuthAttrs.rgAttr); |
| for (i = 0; i < info->UnauthAttrs.cAttr; i++) |
| { |
| for (j = 0; j < info->UnauthAttrs.rgAttr[i].cValue; j++) |
| CryptMemFree(info->UnauthAttrs.rgAttr[i].rgValue[j].pbData); |
| CryptMemFree(info->UnauthAttrs.rgAttr[i].rgValue); |
| CryptMemFree(info->UnauthAttrs.rgAttr[i].pszObjId); |
| } |
| CryptMemFree(info->UnauthAttrs.rgAttr); |
| } |
| |
| typedef struct _CSignerHandles |
| { |
| HCRYPTHASH contentHash; |
| HCRYPTHASH authAttrHash; |
| } CSignerHandles; |
| |
| typedef struct _CSignedMsgData |
| { |
| CRYPT_SIGNED_INFO *info; |
| DWORD cSignerHandle; |
| CSignerHandles *signerHandles; |
| } CSignedMsgData; |
| |
| /* Constructs the signer handles for the signerIndex'th signer of msg_data. |
| * Assumes signerIndex is a valid idnex, and that msg_data's info has already |
| * been constructed. |
| */ |
| static BOOL CSignedMsgData_ConstructSignerHandles(CSignedMsgData *msg_data, |
| DWORD signerIndex, HCRYPTPROV crypt_prov) |
| { |
| ALG_ID algID; |
| BOOL ret; |
| |
| algID = CertOIDToAlgId( |
| msg_data->info->rgSignerInfo[signerIndex].HashAlgorithm.pszObjId); |
| ret = CryptCreateHash(crypt_prov, algID, 0, 0, |
| &msg_data->signerHandles->contentHash); |
| if (ret && msg_data->info->rgSignerInfo[signerIndex].AuthAttrs.cAttr > 0) |
| ret = CryptCreateHash(crypt_prov, algID, 0, 0, |
| &msg_data->signerHandles->authAttrHash); |
| return ret; |
| } |
| |
| /* Allocates a CSignedMsgData's handles. Assumes its info has already been |
| * constructed. |
| */ |
| static BOOL CSignedMsgData_AllocateHandles(CSignedMsgData *msg_data) |
| { |
| BOOL ret = TRUE; |
| |
| if (msg_data->info->cSignerInfo) |
| { |
| msg_data->signerHandles = |
| CryptMemAlloc(msg_data->info->cSignerInfo * sizeof(CSignerHandles)); |
| if (msg_data->signerHandles) |
| { |
| msg_data->cSignerHandle = msg_data->info->cSignerInfo; |
| memset(msg_data->signerHandles, 0, |
| msg_data->info->cSignerInfo * sizeof(CSignerHandles)); |
| } |
| else |
| { |
| msg_data->cSignerHandle = 0; |
| ret = FALSE; |
| } |
| } |
| else |
| { |
| msg_data->cSignerHandle = 0; |
| msg_data->signerHandles = NULL; |
| } |
| return ret; |
| } |
| |
| static void CSignedMsgData_CloseHandles(CSignedMsgData *msg_data) |
| { |
| DWORD i; |
| |
| for (i = 0; i < msg_data->cSignerHandle; i++) |
| { |
| if (msg_data->signerHandles[i].contentHash) |
| CryptDestroyHash(msg_data->signerHandles[i].contentHash); |
| if (msg_data->signerHandles[i].authAttrHash) |
| CryptDestroyHash(msg_data->signerHandles[i].authAttrHash); |
| } |
| CryptMemFree(msg_data->signerHandles); |
| msg_data->signerHandles = NULL; |
| msg_data->cSignerHandle = 0; |
| } |
| |
| static BOOL CSignedMsgData_UpdateHash(CSignedMsgData *msg_data, |
| const BYTE *pbData, DWORD cbData) |
| { |
| DWORD i; |
| BOOL ret = TRUE; |
| |
| for (i = 0; ret && i < msg_data->cSignerHandle; i++) |
| ret = CryptHashData(msg_data->signerHandles[i].contentHash, pbData, |
| cbData, 0); |
| return ret; |
| } |
| |
| static BOOL CRYPT_AppendAttribute(CRYPT_ATTRIBUTES *out, |
| const CRYPT_ATTRIBUTE *in) |
| { |
| BOOL ret = FALSE; |
| |
| out->rgAttr = CryptMemRealloc(out->rgAttr, |
| (out->cAttr + 1) * sizeof(CRYPT_ATTRIBUTE)); |
| if (out->rgAttr) |
| { |
| ret = CRYPT_ConstructAttribute(&out->rgAttr[out->cAttr], in); |
| if (ret) |
| out->cAttr++; |
| } |
| return ret; |
| } |
| |
| static BOOL CSignedMsgData_AppendMessageDigestAttribute( |
| CSignedMsgData *msg_data, DWORD signerIndex) |
| { |
| BOOL ret; |
| DWORD size; |
| CRYPT_HASH_BLOB hash = { 0, NULL }, encodedHash = { 0, NULL }; |
| char messageDigest[] = szOID_RSA_messageDigest; |
| CRYPT_ATTRIBUTE messageDigestAttr = { messageDigest, 1, &encodedHash }; |
| |
| size = sizeof(DWORD); |
| ret = CryptGetHashParam( |
| msg_data->signerHandles[signerIndex].contentHash, HP_HASHSIZE, |
| (LPBYTE)&hash.cbData, &size, 0); |
| if (ret) |
| { |
| hash.pbData = CryptMemAlloc(hash.cbData); |
| ret = CryptGetHashParam( |
| msg_data->signerHandles[signerIndex].contentHash, HP_HASHVAL, |
| hash.pbData, &hash.cbData, 0); |
| if (ret) |
| { |
| ret = CRYPT_AsnEncodeOctets(0, NULL, &hash, CRYPT_ENCODE_ALLOC_FLAG, |
| NULL, (LPBYTE)&encodedHash.pbData, &encodedHash.cbData); |
| if (ret) |
| { |
| ret = CRYPT_AppendAttribute( |
| &msg_data->info->rgSignerInfo[signerIndex].AuthAttrs, |
| &messageDigestAttr); |
| LocalFree(encodedHash.pbData); |
| } |
| } |
| CryptMemFree(hash.pbData); |
| } |
| return ret; |
| } |
| |
| typedef enum { |
| Sign, |
| Verify |
| } SignOrVerify; |
| |
| static BOOL CSignedMsgData_UpdateAuthenticatedAttributes( |
| CSignedMsgData *msg_data, SignOrVerify flag) |
| { |
| DWORD i; |
| BOOL ret = TRUE; |
| |
| TRACE("(%p)\n", msg_data); |
| |
| for (i = 0; ret && i < msg_data->info->cSignerInfo; i++) |
| { |
| if (msg_data->info->rgSignerInfo[i].AuthAttrs.cAttr) |
| { |
| if (flag == Sign) |
| { |
| BYTE oid_rsa_data_encoded[] = { 0x06,0x09,0x2a,0x86,0x48,0x86, |
| 0xf7,0x0d,0x01,0x07,0x01 }; |
| CRYPT_DATA_BLOB content = { sizeof(oid_rsa_data_encoded), |
| oid_rsa_data_encoded }; |
| char contentType[] = szOID_RSA_contentType; |
| CRYPT_ATTRIBUTE contentTypeAttr = { contentType, 1, &content }; |
| |
| /* FIXME: does this depend on inner OID? */ |
| ret = CRYPT_AppendAttribute( |
| &msg_data->info->rgSignerInfo[i].AuthAttrs, &contentTypeAttr); |
| if (ret) |
| ret = CSignedMsgData_AppendMessageDigestAttribute(msg_data, |
| i); |
| } |
| if (ret) |
| { |
| LPBYTE encodedAttrs; |
| DWORD size; |
| |
| ret = CryptEncodeObjectEx(X509_ASN_ENCODING, PKCS_ATTRIBUTES, |
| &msg_data->info->rgSignerInfo[i].AuthAttrs, |
| CRYPT_ENCODE_ALLOC_FLAG, NULL, &encodedAttrs, &size); |
| if (ret) |
| { |
| ret = CryptHashData( |
| msg_data->signerHandles[i].authAttrHash, encodedAttrs, |
| size, 0); |
| LocalFree(encodedAttrs); |
| } |
| } |
| } |
| } |
| TRACE("returning %d\n", ret); |
| return ret; |
| } |
| |
| static void CRYPT_ReverseBytes(CRYPT_HASH_BLOB *hash) |
| { |
| DWORD i; |
| BYTE tmp; |
| |
| for (i = 0; i < hash->cbData / 2; i++) |
| { |
| tmp = hash->pbData[hash->cbData - i - 1]; |
| hash->pbData[hash->cbData - i - 1] = hash->pbData[i]; |
| hash->pbData[i] = tmp; |
| } |
| } |
| |
| static BOOL CSignedMsgData_Sign(CSignedMsgData *msg_data) |
| { |
| DWORD i; |
| BOOL ret = TRUE; |
| |
| TRACE("(%p)\n", msg_data); |
| |
| for (i = 0; ret && i < msg_data->info->cSignerInfo; i++) |
| { |
| HCRYPTHASH hash; |
| |
| if (msg_data->info->rgSignerInfo[i].AuthAttrs.cAttr) |
| hash = msg_data->signerHandles[i].authAttrHash; |
| else |
| hash = msg_data->signerHandles[i].contentHash; |
| ret = CryptSignHashW(hash, AT_SIGNATURE, NULL, 0, NULL, |
| &msg_data->info->rgSignerInfo[i].EncryptedHash.cbData); |
| if (ret) |
| { |
| msg_data->info->rgSignerInfo[i].EncryptedHash.pbData = |
| CryptMemAlloc( |
| msg_data->info->rgSignerInfo[i].EncryptedHash.cbData); |
| if (msg_data->info->rgSignerInfo[i].EncryptedHash.pbData) |
| { |
| ret = CryptSignHashW(hash, AT_SIGNATURE, NULL, 0, |
| msg_data->info->rgSignerInfo[i].EncryptedHash.pbData, |
| &msg_data->info->rgSignerInfo[i].EncryptedHash.cbData); |
| if (ret) |
| CRYPT_ReverseBytes( |
| &msg_data->info->rgSignerInfo[i].EncryptedHash); |
| } |
| else |
| ret = FALSE; |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CSignedMsgData_Update(CSignedMsgData *msg_data, |
| const BYTE *pbData, DWORD cbData, BOOL fFinal, SignOrVerify flag) |
| { |
| BOOL ret = CSignedMsgData_UpdateHash(msg_data, pbData, cbData); |
| |
| if (ret && fFinal) |
| { |
| ret = CSignedMsgData_UpdateAuthenticatedAttributes(msg_data, flag); |
| if (ret && flag == Sign) |
| ret = CSignedMsgData_Sign(msg_data); |
| } |
| return ret; |
| } |
| |
| typedef struct _CSignedEncodeMsg |
| { |
| CryptMsgBase base; |
| LPSTR innerOID; |
| CRYPT_DATA_BLOB data; |
| CSignedMsgData msg_data; |
| } CSignedEncodeMsg; |
| |
| static void CSignedEncodeMsg_Close(HCRYPTMSG hCryptMsg) |
| { |
| CSignedEncodeMsg *msg = hCryptMsg; |
| DWORD i; |
| |
| CryptMemFree(msg->innerOID); |
| CryptMemFree(msg->data.pbData); |
| CRYPT_FreeBlobArray(msg->msg_data.info->cCertEncoded, |
| msg->msg_data.info->rgCertEncoded); |
| CRYPT_FreeBlobArray(msg->msg_data.info->cCrlEncoded, |
| msg->msg_data.info->rgCrlEncoded); |
| for (i = 0; i < msg->msg_data.info->cSignerInfo; i++) |
| CSignerInfo_Free(&msg->msg_data.info->rgSignerInfo[i]); |
| CSignedMsgData_CloseHandles(&msg->msg_data); |
| CryptMemFree(msg->msg_data.info->rgSignerInfo); |
| CryptMemFree(msg->msg_data.info); |
| } |
| |
| static BOOL CSignedEncodeMsg_GetParam(HCRYPTMSG hCryptMsg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| CSignedEncodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| switch (dwParamType) |
| { |
| case CMSG_CONTENT_PARAM: |
| { |
| CRYPT_CONTENT_INFO info; |
| |
| ret = CryptMsgGetParam(hCryptMsg, CMSG_BARE_CONTENT_PARAM, 0, NULL, |
| &info.Content.cbData); |
| if (ret) |
| { |
| info.Content.pbData = CryptMemAlloc(info.Content.cbData); |
| if (info.Content.pbData) |
| { |
| ret = CryptMsgGetParam(hCryptMsg, CMSG_BARE_CONTENT_PARAM, 0, |
| info.Content.pbData, &info.Content.cbData); |
| if (ret) |
| { |
| char oid_rsa_signed[] = szOID_RSA_signedData; |
| |
| info.pszObjId = oid_rsa_signed; |
| ret = CryptEncodeObjectEx(X509_ASN_ENCODING, |
| PKCS_CONTENT_INFO, &info, 0, NULL, pvData, pcbData); |
| } |
| CryptMemFree(info.Content.pbData); |
| } |
| else |
| ret = FALSE; |
| } |
| break; |
| } |
| case CMSG_BARE_CONTENT_PARAM: |
| { |
| CRYPT_SIGNED_INFO info; |
| BOOL freeContent = FALSE; |
| |
| info = *msg->msg_data.info; |
| if (!msg->innerOID || !strcmp(msg->innerOID, szOID_RSA_data)) |
| { |
| char oid_rsa_data[] = szOID_RSA_data; |
| |
| /* Quirk: OID is only encoded messages if an update has happened */ |
| if (msg->base.state != MsgStateInit) |
| info.content.pszObjId = oid_rsa_data; |
| else |
| info.content.pszObjId = NULL; |
| if (msg->data.cbData) |
| { |
| CRYPT_DATA_BLOB blob = { msg->data.cbData, msg->data.pbData }; |
| |
| ret = CryptEncodeObjectEx(X509_ASN_ENCODING, X509_OCTET_STRING, |
| &blob, CRYPT_ENCODE_ALLOC_FLAG, NULL, |
| &info.content.Content.pbData, &info.content.Content.cbData); |
| freeContent = TRUE; |
| } |
| else |
| { |
| info.content.Content.cbData = 0; |
| info.content.Content.pbData = NULL; |
| ret = TRUE; |
| } |
| } |
| else |
| { |
| info.content.pszObjId = msg->innerOID; |
| info.content.Content.cbData = msg->data.cbData; |
| info.content.Content.pbData = msg->data.pbData; |
| ret = TRUE; |
| } |
| if (ret) |
| { |
| ret = CRYPT_AsnEncodeCMSSignedInfo(&info, pvData, pcbData); |
| if (freeContent) |
| LocalFree(info.content.Content.pbData); |
| } |
| break; |
| } |
| case CMSG_COMPUTED_HASH_PARAM: |
| if (dwIndex >= msg->msg_data.cSignerHandle) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CryptGetHashParam( |
| msg->msg_data.signerHandles[dwIndex].contentHash, HP_HASHVAL, |
| pvData, pcbData, 0); |
| break; |
| case CMSG_ENCODED_SIGNER: |
| if (dwIndex >= msg->msg_data.info->cSignerInfo) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CryptEncodeObjectEx(X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, |
| CMS_SIGNER_INFO, &msg->msg_data.info->rgSignerInfo[dwIndex], 0, |
| NULL, pvData, pcbData); |
| break; |
| case CMSG_VERSION_PARAM: |
| ret = CRYPT_CopyParam(pvData, pcbData, &msg->msg_data.info->version, |
| sizeof(msg->msg_data.info->version)); |
| break; |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| return ret; |
| } |
| |
| static BOOL CSignedEncodeMsg_Update(HCRYPTMSG hCryptMsg, const BYTE *pbData, |
| DWORD cbData, BOOL fFinal) |
| { |
| CSignedEncodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| if (msg->base.state == MsgStateFinalized) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else if (msg->base.streamed || (msg->base.open_flags & CMSG_DETACHED_FLAG)) |
| { |
| ret = CSignedMsgData_Update(&msg->msg_data, pbData, cbData, fFinal, |
| Sign); |
| if (msg->base.streamed) |
| FIXME("streamed partial stub\n"); |
| msg->base.state = fFinal ? MsgStateFinalized : MsgStateUpdated; |
| } |
| else |
| { |
| if (!fFinal) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else |
| { |
| if (cbData) |
| { |
| msg->data.pbData = CryptMemAlloc(cbData); |
| if (msg->data.pbData) |
| { |
| memcpy(msg->data.pbData, pbData, cbData); |
| msg->data.cbData = cbData; |
| ret = TRUE; |
| } |
| } |
| else |
| ret = TRUE; |
| if (ret) |
| ret = CSignedMsgData_Update(&msg->msg_data, pbData, cbData, |
| fFinal, Sign); |
| msg->base.state = MsgStateFinalized; |
| } |
| } |
| return ret; |
| } |
| |
| static HCRYPTMSG CSignedEncodeMsg_Open(DWORD dwFlags, |
| const void *pvMsgEncodeInfo, LPCSTR pszInnerContentObjID, |
| PCMSG_STREAM_INFO pStreamInfo) |
| { |
| const CMSG_SIGNED_ENCODE_INFO_WITH_CMS *info = pvMsgEncodeInfo; |
| DWORD i; |
| CSignedEncodeMsg *msg; |
| |
| if (info->cbSize != sizeof(CMSG_SIGNED_ENCODE_INFO) && |
| info->cbSize != sizeof(CMSG_SIGNED_ENCODE_INFO_WITH_CMS)) |
| { |
| SetLastError(E_INVALIDARG); |
| return NULL; |
| } |
| if (info->cbSize == sizeof(CMSG_SIGNED_ENCODE_INFO_WITH_CMS) && |
| info->cAttrCertEncoded) |
| { |
| FIXME("CMSG_SIGNED_ENCODE_INFO with CMS fields unsupported\n"); |
| return NULL; |
| } |
| for (i = 0; i < info->cSigners; i++) |
| if (!CRYPT_IsValidSigner(&info->rgSigners[i])) |
| return NULL; |
| msg = CryptMemAlloc(sizeof(CSignedEncodeMsg)); |
| if (msg) |
| { |
| BOOL ret = TRUE; |
| |
| CryptMsgBase_Init((CryptMsgBase *)msg, dwFlags, pStreamInfo, |
| CSignedEncodeMsg_Close, CSignedEncodeMsg_GetParam, |
| CSignedEncodeMsg_Update, CRYPT_DefaultMsgControl); |
| if (pszInnerContentObjID) |
| { |
| msg->innerOID = CryptMemAlloc(strlen(pszInnerContentObjID) + 1); |
| if (msg->innerOID) |
| strcpy(msg->innerOID, pszInnerContentObjID); |
| else |
| ret = FALSE; |
| } |
| else |
| msg->innerOID = NULL; |
| msg->data.cbData = 0; |
| msg->data.pbData = NULL; |
| if (ret) |
| msg->msg_data.info = CryptMemAlloc(sizeof(CRYPT_SIGNED_INFO)); |
| else |
| msg->msg_data.info = NULL; |
| if (msg->msg_data.info) |
| { |
| memset(msg->msg_data.info, 0, sizeof(CRYPT_SIGNED_INFO)); |
| msg->msg_data.info->version = CMSG_SIGNED_DATA_V1; |
| } |
| else |
| ret = FALSE; |
| if (ret) |
| { |
| if (info->cSigners) |
| { |
| msg->msg_data.info->rgSignerInfo = |
| CryptMemAlloc(info->cSigners * sizeof(CMSG_CMS_SIGNER_INFO)); |
| if (msg->msg_data.info->rgSignerInfo) |
| { |
| msg->msg_data.info->cSignerInfo = info->cSigners; |
| memset(msg->msg_data.info->rgSignerInfo, 0, |
| msg->msg_data.info->cSignerInfo * |
| sizeof(CMSG_CMS_SIGNER_INFO)); |
| ret = CSignedMsgData_AllocateHandles(&msg->msg_data); |
| for (i = 0; ret && i < msg->msg_data.info->cSignerInfo; i++) |
| { |
| if (info->rgSigners[i].SignerId.dwIdChoice == |
| CERT_ID_KEY_IDENTIFIER) |
| msg->msg_data.info->version = CMSG_SIGNED_DATA_V3; |
| ret = CSignerInfo_Construct( |
| &msg->msg_data.info->rgSignerInfo[i], |
| &info->rgSigners[i]); |
| if (ret) |
| { |
| ret = CSignedMsgData_ConstructSignerHandles( |
| &msg->msg_data, i, info->rgSigners[i].hCryptProv); |
| if (dwFlags & CMSG_CRYPT_RELEASE_CONTEXT_FLAG) |
| CryptReleaseContext(info->rgSigners[i].hCryptProv, |
| 0); |
| } |
| } |
| } |
| else |
| ret = FALSE; |
| } |
| else |
| { |
| msg->msg_data.info->cSignerInfo = 0; |
| msg->msg_data.signerHandles = NULL; |
| msg->msg_data.cSignerHandle = 0; |
| } |
| } |
| if (ret) |
| ret = CRYPT_ConstructBlobArray(&msg->msg_data.info->cCertEncoded, |
| &msg->msg_data.info->rgCertEncoded, info->cCertEncoded, |
| info->rgCertEncoded); |
| if (ret) |
| ret = CRYPT_ConstructBlobArray(&msg->msg_data.info->cCrlEncoded, |
| &msg->msg_data.info->rgCrlEncoded, info->cCrlEncoded, |
| info->rgCrlEncoded); |
| if (!ret) |
| { |
| CSignedEncodeMsg_Close(msg); |
| msg = NULL; |
| } |
| } |
| return msg; |
| } |
| |
| HCRYPTMSG WINAPI CryptMsgOpenToEncode(DWORD dwMsgEncodingType, DWORD dwFlags, |
| DWORD dwMsgType, const void *pvMsgEncodeInfo, LPSTR pszInnerContentObjID, |
| PCMSG_STREAM_INFO pStreamInfo) |
| { |
| HCRYPTMSG msg = NULL; |
| |
| TRACE("(%08x, %08x, %08x, %p, %s, %p)\n", dwMsgEncodingType, dwFlags, |
| dwMsgType, pvMsgEncodeInfo, debugstr_a(pszInnerContentObjID), pStreamInfo); |
| |
| if (GET_CMSG_ENCODING_TYPE(dwMsgEncodingType) != PKCS_7_ASN_ENCODING) |
| { |
| SetLastError(E_INVALIDARG); |
| return NULL; |
| } |
| switch (dwMsgType) |
| { |
| case CMSG_DATA: |
| msg = CDataEncodeMsg_Open(dwFlags, pvMsgEncodeInfo, |
| pszInnerContentObjID, pStreamInfo); |
| break; |
| case CMSG_HASHED: |
| msg = CHashEncodeMsg_Open(dwFlags, pvMsgEncodeInfo, |
| pszInnerContentObjID, pStreamInfo); |
| break; |
| case CMSG_SIGNED: |
| msg = CSignedEncodeMsg_Open(dwFlags, pvMsgEncodeInfo, |
| pszInnerContentObjID, pStreamInfo); |
| break; |
| case CMSG_ENVELOPED: |
| FIXME("unimplemented for type CMSG_ENVELOPED\n"); |
| break; |
| case CMSG_SIGNED_AND_ENVELOPED: |
| case CMSG_ENCRYPTED: |
| /* defined but invalid, fall through */ |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| return msg; |
| } |
| |
| typedef struct _CDecodeMsg |
| { |
| CryptMsgBase base; |
| DWORD type; |
| HCRYPTPROV crypt_prov; |
| union { |
| HCRYPTHASH hash; |
| CSignedMsgData signed_data; |
| } u; |
| CRYPT_DATA_BLOB msg_data; |
| CRYPT_DATA_BLOB detached_data; |
| PCONTEXT_PROPERTY_LIST properties; |
| } CDecodeMsg; |
| |
| static void CDecodeMsg_Close(HCRYPTMSG hCryptMsg) |
| { |
| CDecodeMsg *msg = hCryptMsg; |
| |
| if (msg->base.open_flags & CMSG_CRYPT_RELEASE_CONTEXT_FLAG) |
| CryptReleaseContext(msg->crypt_prov, 0); |
| switch (msg->type) |
| { |
| case CMSG_HASHED: |
| if (msg->u.hash) |
| CryptDestroyHash(msg->u.hash); |
| break; |
| case CMSG_SIGNED: |
| if (msg->u.signed_data.info) |
| { |
| LocalFree(msg->u.signed_data.info); |
| CSignedMsgData_CloseHandles(&msg->u.signed_data); |
| } |
| break; |
| } |
| CryptMemFree(msg->msg_data.pbData); |
| CryptMemFree(msg->detached_data.pbData); |
| ContextPropertyList_Free(msg->properties); |
| } |
| |
| static BOOL CDecodeMsg_CopyData(CRYPT_DATA_BLOB *blob, const BYTE *pbData, |
| DWORD cbData) |
| { |
| BOOL ret = TRUE; |
| |
| if (cbData) |
| { |
| if (blob->cbData) |
| blob->pbData = CryptMemRealloc(blob->pbData, |
| blob->cbData + cbData); |
| else |
| blob->pbData = CryptMemAlloc(cbData); |
| if (blob->pbData) |
| { |
| memcpy(blob->pbData + blob->cbData, pbData, cbData); |
| blob->cbData += cbData; |
| } |
| else |
| ret = FALSE; |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_DecodeDataContent(CDecodeMsg *msg, const CRYPT_DER_BLOB *blob) |
| { |
| BOOL ret; |
| CRYPT_DATA_BLOB *data; |
| DWORD size; |
| |
| ret = CryptDecodeObjectEx(X509_ASN_ENCODING, X509_OCTET_STRING, |
| blob->pbData, blob->cbData, CRYPT_DECODE_ALLOC_FLAG, NULL, &data, &size); |
| if (ret) |
| { |
| ret = ContextPropertyList_SetProperty(msg->properties, |
| CMSG_CONTENT_PARAM, data->pbData, data->cbData); |
| LocalFree(data); |
| } |
| return ret; |
| } |
| |
| static void CDecodeMsg_SaveAlgorithmID(CDecodeMsg *msg, DWORD param, |
| const CRYPT_ALGORITHM_IDENTIFIER *id) |
| { |
| static const BYTE nullParams[] = { ASN_NULL, 0 }; |
| CRYPT_ALGORITHM_IDENTIFIER *copy; |
| DWORD len = sizeof(CRYPT_ALGORITHM_IDENTIFIER); |
| |
| /* Linearize algorithm id */ |
| len += strlen(id->pszObjId) + 1; |
| len += id->Parameters.cbData; |
| copy = CryptMemAlloc(len); |
| if (copy) |
| { |
| copy->pszObjId = |
| (LPSTR)((BYTE *)copy + sizeof(CRYPT_ALGORITHM_IDENTIFIER)); |
| strcpy(copy->pszObjId, id->pszObjId); |
| copy->Parameters.pbData = (BYTE *)copy->pszObjId + strlen(id->pszObjId) |
| + 1; |
| /* Trick: omit NULL parameters */ |
| if (id->Parameters.cbData == sizeof(nullParams) && |
| !memcmp(id->Parameters.pbData, nullParams, sizeof(nullParams))) |
| { |
| copy->Parameters.cbData = 0; |
| len -= sizeof(nullParams); |
| } |
| else |
| copy->Parameters.cbData = id->Parameters.cbData; |
| if (copy->Parameters.cbData) |
| memcpy(copy->Parameters.pbData, id->Parameters.pbData, |
| id->Parameters.cbData); |
| ContextPropertyList_SetProperty(msg->properties, param, (BYTE *)copy, |
| len); |
| CryptMemFree(copy); |
| } |
| } |
| |
| static inline void CRYPT_FixUpAlgorithmID(CRYPT_ALGORITHM_IDENTIFIER *id) |
| { |
| id->pszObjId = (LPSTR)((BYTE *)id + sizeof(CRYPT_ALGORITHM_IDENTIFIER)); |
| id->Parameters.pbData = (BYTE *)id->pszObjId + strlen(id->pszObjId) + 1; |
| } |
| |
| static BOOL CDecodeMsg_DecodeHashedContent(CDecodeMsg *msg, |
| const CRYPT_DER_BLOB *blob) |
| { |
| BOOL ret; |
| CRYPT_DIGESTED_DATA *digestedData; |
| DWORD size; |
| |
| ret = CRYPT_AsnDecodePKCSDigestedData(blob->pbData, blob->cbData, |
| CRYPT_DECODE_ALLOC_FLAG, NULL, (CRYPT_DIGESTED_DATA *)&digestedData, |
| &size); |
| if (ret) |
| { |
| ContextPropertyList_SetProperty(msg->properties, CMSG_VERSION_PARAM, |
| (const BYTE *)&digestedData->version, sizeof(digestedData->version)); |
| CDecodeMsg_SaveAlgorithmID(msg, CMSG_HASH_ALGORITHM_PARAM, |
| &digestedData->DigestAlgorithm); |
| ContextPropertyList_SetProperty(msg->properties, |
| CMSG_INNER_CONTENT_TYPE_PARAM, |
| (const BYTE *)digestedData->ContentInfo.pszObjId, |
| digestedData->ContentInfo.pszObjId ? |
| strlen(digestedData->ContentInfo.pszObjId) + 1 : 0); |
| if (!(msg->base.open_flags & CMSG_DETACHED_FLAG)) |
| { |
| if (digestedData->ContentInfo.Content.cbData) |
| CDecodeMsg_DecodeDataContent(msg, |
| &digestedData->ContentInfo.Content); |
| else |
| ContextPropertyList_SetProperty(msg->properties, |
| CMSG_CONTENT_PARAM, NULL, 0); |
| } |
| ContextPropertyList_SetProperty(msg->properties, CMSG_HASH_DATA_PARAM, |
| digestedData->hash.pbData, digestedData->hash.cbData); |
| LocalFree(digestedData); |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_DecodeSignedContent(CDecodeMsg *msg, |
| const CRYPT_DER_BLOB *blob) |
| { |
| BOOL ret; |
| CRYPT_SIGNED_INFO *signedInfo; |
| DWORD size; |
| |
| ret = CRYPT_AsnDecodeCMSSignedInfo(blob->pbData, blob->cbData, |
| CRYPT_DECODE_ALLOC_FLAG, NULL, (CRYPT_SIGNED_INFO *)&signedInfo, |
| &size); |
| if (ret) |
| msg->u.signed_data.info = signedInfo; |
| return ret; |
| } |
| |
| /* Decodes the content in blob as the type given, and updates the value |
| * (type, parameters, etc.) of msg based on what blob contains. |
| * It doesn't just use msg's type, to allow a recursive call from an implicitly |
| * typed message once the outer content info has been decoded. |
| */ |
| static BOOL CDecodeMsg_DecodeContent(CDecodeMsg *msg, const CRYPT_DER_BLOB *blob, |
| DWORD type) |
| { |
| BOOL ret; |
| |
| switch (type) |
| { |
| case CMSG_DATA: |
| if ((ret = CDecodeMsg_DecodeDataContent(msg, blob))) |
| msg->type = CMSG_DATA; |
| break; |
| case CMSG_HASHED: |
| if ((ret = CDecodeMsg_DecodeHashedContent(msg, blob))) |
| msg->type = CMSG_HASHED; |
| break; |
| case CMSG_ENVELOPED: |
| FIXME("unimplemented for type CMSG_ENVELOPED\n"); |
| ret = TRUE; |
| break; |
| case CMSG_SIGNED: |
| if ((ret = CDecodeMsg_DecodeSignedContent(msg, blob))) |
| msg->type = CMSG_SIGNED; |
| break; |
| default: |
| { |
| CRYPT_CONTENT_INFO *info; |
| DWORD size; |
| |
| ret = CryptDecodeObjectEx(X509_ASN_ENCODING, PKCS_CONTENT_INFO, |
| msg->msg_data.pbData, msg->msg_data.cbData, CRYPT_DECODE_ALLOC_FLAG, |
| NULL, &info, &size); |
| if (ret) |
| { |
| if (!strcmp(info->pszObjId, szOID_RSA_data)) |
| ret = CDecodeMsg_DecodeContent(msg, &info->Content, CMSG_DATA); |
| else if (!strcmp(info->pszObjId, szOID_RSA_digestedData)) |
| ret = CDecodeMsg_DecodeContent(msg, &info->Content, |
| CMSG_HASHED); |
| else if (!strcmp(info->pszObjId, szOID_RSA_envelopedData)) |
| ret = CDecodeMsg_DecodeContent(msg, &info->Content, |
| CMSG_ENVELOPED); |
| else if (!strcmp(info->pszObjId, szOID_RSA_signedData)) |
| ret = CDecodeMsg_DecodeContent(msg, &info->Content, |
| CMSG_SIGNED); |
| else |
| { |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| ret = FALSE; |
| } |
| LocalFree(info); |
| } |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_FinalizeHashedContent(CDecodeMsg *msg, |
| CRYPT_DER_BLOB *blob) |
| { |
| CRYPT_ALGORITHM_IDENTIFIER *hashAlgoID = NULL; |
| DWORD size = 0; |
| ALG_ID algID = 0; |
| BOOL ret; |
| |
| CryptMsgGetParam(msg, CMSG_HASH_ALGORITHM_PARAM, 0, NULL, &size); |
| hashAlgoID = CryptMemAlloc(size); |
| ret = CryptMsgGetParam(msg, CMSG_HASH_ALGORITHM_PARAM, 0, hashAlgoID, |
| &size); |
| if (ret) |
| algID = CertOIDToAlgId(hashAlgoID->pszObjId); |
| ret = CryptCreateHash(msg->crypt_prov, algID, 0, 0, &msg->u.hash); |
| if (ret) |
| { |
| CRYPT_DATA_BLOB content; |
| |
| if (msg->base.open_flags & CMSG_DETACHED_FLAG) |
| { |
| /* Unlike for non-detached messages, the data were never stored as |
| * the content param, but were saved in msg->detached_data instead. |
| */ |
| content.pbData = msg->detached_data.pbData; |
| content.cbData = msg->detached_data.cbData; |
| } |
| else |
| ret = ContextPropertyList_FindProperty(msg->properties, |
| CMSG_CONTENT_PARAM, &content); |
| if (ret) |
| ret = CryptHashData(msg->u.hash, content.pbData, content.cbData, 0); |
| } |
| CryptMemFree(hashAlgoID); |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_FinalizeSignedContent(CDecodeMsg *msg, |
| CRYPT_DER_BLOB *blob) |
| { |
| BOOL ret; |
| DWORD i, size; |
| |
| ret = CSignedMsgData_AllocateHandles(&msg->u.signed_data); |
| for (i = 0; ret && i < msg->u.signed_data.info->cSignerInfo; i++) |
| ret = CSignedMsgData_ConstructSignerHandles(&msg->u.signed_data, i, |
| msg->crypt_prov); |
| if (ret) |
| { |
| CRYPT_DATA_BLOB *content; |
| |
| /* Now that we have all the content, update the hash handles with |
| * it. If the message is a detached message, the content is stored |
| * in msg->detached_data rather than in the signed message's |
| * content. |
| */ |
| if (msg->base.open_flags & CMSG_DETACHED_FLAG) |
| content = &msg->detached_data; |
| else |
| content = &msg->u.signed_data.info->content.Content; |
| if (content->cbData) |
| { |
| /* If the message is not detached, have to decode the message's |
| * content if the type is szOID_RSA_data. |
| */ |
| if (!(msg->base.open_flags & CMSG_DETACHED_FLAG) && |
| !strcmp(msg->u.signed_data.info->content.pszObjId, |
| szOID_RSA_data)) |
| { |
| CRYPT_DATA_BLOB *blob; |
| |
| ret = CryptDecodeObjectEx(X509_ASN_ENCODING, |
| X509_OCTET_STRING, content->pbData, content->cbData, |
| CRYPT_DECODE_ALLOC_FLAG, NULL, &blob, &size); |
| if (ret) |
| { |
| ret = CSignedMsgData_Update(&msg->u.signed_data, |
| blob->pbData, blob->cbData, TRUE, Verify); |
| LocalFree(blob); |
| } |
| } |
| else |
| ret = CSignedMsgData_Update(&msg->u.signed_data, |
| content->pbData, content->cbData, TRUE, Verify); |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_FinalizeContent(CDecodeMsg *msg, CRYPT_DER_BLOB *blob) |
| { |
| BOOL ret = FALSE; |
| |
| switch (msg->type) |
| { |
| case CMSG_HASHED: |
| ret = CDecodeMsg_FinalizeHashedContent(msg, blob); |
| break; |
| case CMSG_SIGNED: |
| ret = CDecodeMsg_FinalizeSignedContent(msg, blob); |
| break; |
| default: |
| ret = TRUE; |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_Update(HCRYPTMSG hCryptMsg, const BYTE *pbData, |
| DWORD cbData, BOOL fFinal) |
| { |
| CDecodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| TRACE("(%p, %p, %d, %d)\n", hCryptMsg, pbData, cbData, fFinal); |
| |
| if (msg->base.state == MsgStateFinalized) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else if (msg->base.streamed) |
| { |
| FIXME("(%p, %p, %d, %d): streamed update stub\n", hCryptMsg, pbData, |
| cbData, fFinal); |
| switch (msg->base.state) |
| { |
| case MsgStateInit: |
| ret = CDecodeMsg_CopyData(&msg->msg_data, pbData, cbData); |
| if (fFinal) |
| { |
| if (msg->base.open_flags & CMSG_DETACHED_FLAG) |
| msg->base.state = MsgStateDataFinalized; |
| else |
| msg->base.state = MsgStateFinalized; |
| } |
| else |
| msg->base.state = MsgStateUpdated; |
| break; |
| case MsgStateUpdated: |
| ret = CDecodeMsg_CopyData(&msg->msg_data, pbData, cbData); |
| if (fFinal) |
| { |
| if (msg->base.open_flags & CMSG_DETACHED_FLAG) |
| msg->base.state = MsgStateDataFinalized; |
| else |
| msg->base.state = MsgStateFinalized; |
| } |
| break; |
| case MsgStateDataFinalized: |
| ret = CDecodeMsg_CopyData(&msg->detached_data, pbData, cbData); |
| if (fFinal) |
| msg->base.state = MsgStateFinalized; |
| break; |
| default: |
| SetLastError(CRYPT_E_MSG_ERROR); |
| break; |
| } |
| } |
| else |
| { |
| if (!fFinal) |
| SetLastError(CRYPT_E_MSG_ERROR); |
| else |
| { |
| switch (msg->base.state) |
| { |
| case MsgStateInit: |
| ret = CDecodeMsg_CopyData(&msg->msg_data, pbData, cbData); |
| if (msg->base.open_flags & CMSG_DETACHED_FLAG) |
| msg->base.state = MsgStateDataFinalized; |
| else |
| msg->base.state = MsgStateFinalized; |
| break; |
| case MsgStateDataFinalized: |
| ret = CDecodeMsg_CopyData(&msg->detached_data, pbData, cbData); |
| msg->base.state = MsgStateFinalized; |
| break; |
| default: |
| SetLastError(CRYPT_E_MSG_ERROR); |
| } |
| } |
| } |
| if (ret && fFinal && |
| ((msg->base.open_flags & CMSG_DETACHED_FLAG && msg->base.state == |
| MsgStateDataFinalized) || |
| (!(msg->base.open_flags & CMSG_DETACHED_FLAG) && msg->base.state == |
| MsgStateFinalized))) |
| ret = CDecodeMsg_DecodeContent(msg, &msg->msg_data, msg->type); |
| if (ret && msg->base.state == MsgStateFinalized) |
| ret = CDecodeMsg_FinalizeContent(msg, &msg->msg_data); |
| return ret; |
| } |
| |
| static BOOL CDecodeHashMsg_GetParam(CDecodeMsg *msg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| BOOL ret = FALSE; |
| |
| switch (dwParamType) |
| { |
| case CMSG_TYPE_PARAM: |
| ret = CRYPT_CopyParam(pvData, pcbData, &msg->type, sizeof(msg->type)); |
| break; |
| case CMSG_HASH_ALGORITHM_PARAM: |
| { |
| CRYPT_DATA_BLOB blob; |
| |
| ret = ContextPropertyList_FindProperty(msg->properties, dwParamType, |
| &blob); |
| if (ret) |
| { |
| ret = CRYPT_CopyParam(pvData, pcbData, blob.pbData, blob.cbData); |
| if (ret && pvData) |
| CRYPT_FixUpAlgorithmID(pvData); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| } |
| case CMSG_COMPUTED_HASH_PARAM: |
| ret = CryptGetHashParam(msg->u.hash, HP_HASHVAL, pvData, pcbData, 0); |
| break; |
| default: |
| { |
| CRYPT_DATA_BLOB blob; |
| |
| ret = ContextPropertyList_FindProperty(msg->properties, dwParamType, |
| &blob); |
| if (ret) |
| ret = CRYPT_CopyParam(pvData, pcbData, blob.pbData, blob.cbData); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| } |
| return ret; |
| } |
| |
| /* nextData is an in/out parameter - on input it's the memory location in |
| * which a copy of in's data should be made, and on output it's the memory |
| * location immediately after out's copy of in's data. |
| */ |
| static inline void CRYPT_CopyBlob(CRYPT_DATA_BLOB *out, |
| const CRYPT_DATA_BLOB *in, LPBYTE *nextData) |
| { |
| out->cbData = in->cbData; |
| if (in->cbData) |
| { |
| out->pbData = *nextData; |
| memcpy(out->pbData, in->pbData, in->cbData); |
| *nextData += in->cbData; |
| } |
| } |
| |
| static inline void CRYPT_CopyAlgorithmId(CRYPT_ALGORITHM_IDENTIFIER *out, |
| const CRYPT_ALGORITHM_IDENTIFIER *in, LPBYTE *nextData) |
| { |
| if (in->pszObjId) |
| { |
| out->pszObjId = (LPSTR)*nextData; |
| strcpy(out->pszObjId, in->pszObjId); |
| *nextData += strlen(out->pszObjId) + 1; |
| } |
| CRYPT_CopyBlob(&out->Parameters, &in->Parameters, nextData); |
| } |
| |
| static inline void CRYPT_CopyAttributes(CRYPT_ATTRIBUTES *out, |
| const CRYPT_ATTRIBUTES *in, LPBYTE *nextData) |
| { |
| out->cAttr = in->cAttr; |
| if (in->cAttr) |
| { |
| DWORD i; |
| |
| *nextData = POINTER_ALIGN_DWORD_PTR(*nextData); |
| out->rgAttr = (CRYPT_ATTRIBUTE *)*nextData; |
| *nextData += in->cAttr * sizeof(CRYPT_ATTRIBUTE); |
| for (i = 0; i < in->cAttr; i++) |
| { |
| if (in->rgAttr[i].pszObjId) |
| { |
| out->rgAttr[i].pszObjId = (LPSTR)*nextData; |
| strcpy(out->rgAttr[i].pszObjId, in->rgAttr[i].pszObjId); |
| *nextData += strlen(in->rgAttr[i].pszObjId) + 1; |
| } |
| if (in->rgAttr[i].cValue) |
| { |
| DWORD j; |
| |
| out->rgAttr[i].cValue = in->rgAttr[i].cValue; |
| *nextData = POINTER_ALIGN_DWORD_PTR(*nextData); |
| out->rgAttr[i].rgValue = (PCRYPT_DATA_BLOB)*nextData; |
| *nextData += in->rgAttr[i].cValue * sizeof(CRYPT_DATA_BLOB); |
| for (j = 0; j < in->rgAttr[i].cValue; j++) |
| CRYPT_CopyBlob(&out->rgAttr[i].rgValue[j], |
| &in->rgAttr[i].rgValue[j], nextData); |
| } |
| } |
| } |
| } |
| |
| static DWORD CRYPT_SizeOfAttributes(const CRYPT_ATTRIBUTES *attr) |
| { |
| DWORD size = attr->cAttr * sizeof(CRYPT_ATTRIBUTE), i, j; |
| |
| for (i = 0; i < attr->cAttr; i++) |
| { |
| if (attr->rgAttr[i].pszObjId) |
| size += strlen(attr->rgAttr[i].pszObjId) + 1; |
| /* align pointer */ |
| size = ALIGN_DWORD_PTR(size); |
| size += attr->rgAttr[i].cValue * sizeof(CRYPT_DATA_BLOB); |
| for (j = 0; j < attr->rgAttr[i].cValue; j++) |
| size += attr->rgAttr[i].rgValue[j].cbData; |
| } |
| /* align pointer again to be conservative */ |
| size = ALIGN_DWORD_PTR(size); |
| return size; |
| } |
| |
| static DWORD CRYPT_SizeOfKeyIdAsIssuerAndSerial(const CRYPT_DATA_BLOB *keyId) |
| { |
| static char oid_key_rdn[] = szOID_KEYID_RDN; |
| DWORD size = 0; |
| CERT_RDN_ATTR attr; |
| CERT_RDN rdn = { 1, &attr }; |
| CERT_NAME_INFO name = { 1, &rdn }; |
| |
| attr.pszObjId = oid_key_rdn; |
| attr.dwValueType = CERT_RDN_OCTET_STRING; |
| attr.Value.cbData = keyId->cbData; |
| attr.Value.pbData = keyId->pbData; |
| if (CryptEncodeObject(X509_ASN_ENCODING, X509_NAME, &name, NULL, &size)) |
| size++; /* Only include size of special zero serial number on success */ |
| return size; |
| } |
| |
| static BOOL CRYPT_CopyKeyIdAsIssuerAndSerial(CERT_NAME_BLOB *issuer, |
| CRYPT_INTEGER_BLOB *serialNumber, const CRYPT_DATA_BLOB *keyId, DWORD encodedLen, |
| LPBYTE *nextData) |
| { |
| static char oid_key_rdn[] = szOID_KEYID_RDN; |
| CERT_RDN_ATTR attr; |
| CERT_RDN rdn = { 1, &attr }; |
| CERT_NAME_INFO name = { 1, &rdn }; |
| BOOL ret; |
| |
| /* Encode special zero serial number */ |
| serialNumber->cbData = 1; |
| serialNumber->pbData = *nextData; |
| **nextData = 0; |
| (*nextData)++; |
| /* Encode issuer */ |
| issuer->pbData = *nextData; |
| attr.pszObjId = oid_key_rdn; |
| attr.dwValueType = CERT_RDN_OCTET_STRING; |
| attr.Value.cbData = keyId->cbData; |
| attr.Value.pbData = keyId->pbData; |
| ret = CryptEncodeObject(X509_ASN_ENCODING, X509_NAME, &name, *nextData, |
| &encodedLen); |
| if (ret) |
| { |
| *nextData += encodedLen; |
| issuer->cbData = encodedLen; |
| } |
| return ret; |
| } |
| |
| static BOOL CRYPT_CopySignerInfo(void *pvData, DWORD *pcbData, |
| const CMSG_CMS_SIGNER_INFO *in) |
| { |
| DWORD size = sizeof(CMSG_SIGNER_INFO), rdnSize = 0; |
| BOOL ret; |
| |
| TRACE("(%p, %d, %p)\n", pvData, pvData ? *pcbData : 0, in); |
| |
| if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| size += in->SignerId.u.IssuerSerialNumber.Issuer.cbData; |
| size += in->SignerId.u.IssuerSerialNumber.SerialNumber.cbData; |
| } |
| else |
| { |
| rdnSize = CRYPT_SizeOfKeyIdAsIssuerAndSerial(&in->SignerId.u.KeyId); |
| size += rdnSize; |
| } |
| if (in->HashAlgorithm.pszObjId) |
| size += strlen(in->HashAlgorithm.pszObjId) + 1; |
| size += in->HashAlgorithm.Parameters.cbData; |
| if (in->HashEncryptionAlgorithm.pszObjId) |
| size += strlen(in->HashEncryptionAlgorithm.pszObjId) + 1; |
| size += in->HashEncryptionAlgorithm.Parameters.cbData; |
| size += in->EncryptedHash.cbData; |
| /* align pointer */ |
| size = ALIGN_DWORD_PTR(size); |
| size += CRYPT_SizeOfAttributes(&in->AuthAttrs); |
| size += CRYPT_SizeOfAttributes(&in->UnauthAttrs); |
| if (!pvData) |
| { |
| *pcbData = size; |
| ret = TRUE; |
| } |
| else if (*pcbData < size) |
| { |
| *pcbData = size; |
| SetLastError(ERROR_MORE_DATA); |
| ret = FALSE; |
| } |
| else |
| { |
| LPBYTE nextData = (BYTE *)pvData + sizeof(CMSG_SIGNER_INFO); |
| CMSG_SIGNER_INFO *out = pvData; |
| |
| ret = TRUE; |
| out->dwVersion = in->dwVersion; |
| if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| CRYPT_CopyBlob(&out->Issuer, |
| &in->SignerId.u.IssuerSerialNumber.Issuer, &nextData); |
| CRYPT_CopyBlob(&out->SerialNumber, |
| &in->SignerId.u.IssuerSerialNumber.SerialNumber, &nextData); |
| } |
| else |
| ret = CRYPT_CopyKeyIdAsIssuerAndSerial(&out->Issuer, &out->SerialNumber, |
| &in->SignerId.u.KeyId, rdnSize, &nextData); |
| if (ret) |
| { |
| CRYPT_CopyAlgorithmId(&out->HashAlgorithm, &in->HashAlgorithm, |
| &nextData); |
| CRYPT_CopyAlgorithmId(&out->HashEncryptionAlgorithm, |
| &in->HashEncryptionAlgorithm, &nextData); |
| CRYPT_CopyBlob(&out->EncryptedHash, &in->EncryptedHash, &nextData); |
| nextData = POINTER_ALIGN_DWORD_PTR(nextData); |
| CRYPT_CopyAttributes(&out->AuthAttrs, &in->AuthAttrs, &nextData); |
| CRYPT_CopyAttributes(&out->UnauthAttrs, &in->UnauthAttrs, &nextData); |
| } |
| } |
| TRACE("returning %d\n", ret); |
| return ret; |
| } |
| |
| static BOOL CRYPT_CopyCMSSignerInfo(void *pvData, DWORD *pcbData, |
| const CMSG_CMS_SIGNER_INFO *in) |
| { |
| DWORD size = sizeof(CMSG_CMS_SIGNER_INFO); |
| BOOL ret; |
| |
| TRACE("(%p, %d, %p)\n", pvData, pvData ? *pcbData : 0, in); |
| |
| if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| size += in->SignerId.u.IssuerSerialNumber.Issuer.cbData; |
| size += in->SignerId.u.IssuerSerialNumber.SerialNumber.cbData; |
| } |
| else |
| size += in->SignerId.u.KeyId.cbData; |
| if (in->HashAlgorithm.pszObjId) |
| size += strlen(in->HashAlgorithm.pszObjId) + 1; |
| size += in->HashAlgorithm.Parameters.cbData; |
| if (in->HashEncryptionAlgorithm.pszObjId) |
| size += strlen(in->HashEncryptionAlgorithm.pszObjId) + 1; |
| size += in->HashEncryptionAlgorithm.Parameters.cbData; |
| size += in->EncryptedHash.cbData; |
| /* align pointer */ |
| size = ALIGN_DWORD_PTR(size); |
| size += CRYPT_SizeOfAttributes(&in->AuthAttrs); |
| size += CRYPT_SizeOfAttributes(&in->UnauthAttrs); |
| if (!pvData) |
| { |
| *pcbData = size; |
| ret = TRUE; |
| } |
| else if (*pcbData < size) |
| { |
| *pcbData = size; |
| SetLastError(ERROR_MORE_DATA); |
| ret = FALSE; |
| } |
| else |
| { |
| LPBYTE nextData = (BYTE *)pvData + sizeof(CMSG_CMS_SIGNER_INFO); |
| CMSG_CMS_SIGNER_INFO *out = pvData; |
| |
| out->dwVersion = in->dwVersion; |
| out->SignerId.dwIdChoice = in->SignerId.dwIdChoice; |
| if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| CRYPT_CopyBlob(&out->SignerId.u.IssuerSerialNumber.Issuer, |
| &in->SignerId.u.IssuerSerialNumber.Issuer, &nextData); |
| CRYPT_CopyBlob(&out->SignerId.u.IssuerSerialNumber.SerialNumber, |
| &in->SignerId.u.IssuerSerialNumber.SerialNumber, &nextData); |
| } |
| else |
| CRYPT_CopyBlob(&out->SignerId.u.KeyId, &in->SignerId.u.KeyId, &nextData); |
| CRYPT_CopyAlgorithmId(&out->HashAlgorithm, &in->HashAlgorithm, |
| &nextData); |
| CRYPT_CopyAlgorithmId(&out->HashEncryptionAlgorithm, |
| &in->HashEncryptionAlgorithm, &nextData); |
| CRYPT_CopyBlob(&out->EncryptedHash, &in->EncryptedHash, &nextData); |
| nextData = POINTER_ALIGN_DWORD_PTR(nextData); |
| CRYPT_CopyAttributes(&out->AuthAttrs, &in->AuthAttrs, &nextData); |
| CRYPT_CopyAttributes(&out->UnauthAttrs, &in->UnauthAttrs, &nextData); |
| ret = TRUE; |
| } |
| TRACE("returning %d\n", ret); |
| return ret; |
| } |
| |
| static BOOL CRYPT_CopySignerCertInfo(void *pvData, DWORD *pcbData, |
| const CMSG_CMS_SIGNER_INFO *in) |
| { |
| DWORD size = sizeof(CERT_INFO), rdnSize = 0; |
| BOOL ret; |
| |
| TRACE("(%p, %d, %p)\n", pvData, pvData ? *pcbData : 0, in); |
| |
| if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| size += in->SignerId.u.IssuerSerialNumber.Issuer.cbData; |
| size += in->SignerId.u.IssuerSerialNumber.SerialNumber.cbData; |
| } |
| else |
| { |
| rdnSize = CRYPT_SizeOfKeyIdAsIssuerAndSerial(&in->SignerId.u.KeyId); |
| size += rdnSize; |
| } |
| if (!pvData) |
| { |
| *pcbData = size; |
| ret = TRUE; |
| } |
| else if (*pcbData < size) |
| { |
| *pcbData = size; |
| SetLastError(ERROR_MORE_DATA); |
| ret = FALSE; |
| } |
| else |
| { |
| LPBYTE nextData = (BYTE *)pvData + sizeof(CERT_INFO); |
| CERT_INFO *out = pvData; |
| |
| memset(out, 0, sizeof(CERT_INFO)); |
| if (in->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| CRYPT_CopyBlob(&out->Issuer, |
| &in->SignerId.u.IssuerSerialNumber.Issuer, &nextData); |
| CRYPT_CopyBlob(&out->SerialNumber, |
| &in->SignerId.u.IssuerSerialNumber.SerialNumber, &nextData); |
| ret = TRUE; |
| } |
| else |
| ret = CRYPT_CopyKeyIdAsIssuerAndSerial(&out->Issuer, &out->SerialNumber, |
| &in->SignerId.u.KeyId, rdnSize, &nextData); |
| } |
| TRACE("returning %d\n", ret); |
| return ret; |
| } |
| |
| static BOOL CDecodeSignedMsg_GetParam(CDecodeMsg *msg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| BOOL ret = FALSE; |
| |
| switch (dwParamType) |
| { |
| case CMSG_TYPE_PARAM: |
| ret = CRYPT_CopyParam(pvData, pcbData, &msg->type, sizeof(msg->type)); |
| break; |
| case CMSG_CONTENT_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (!strcmp(msg->u.signed_data.info->content.pszObjId, |
| szOID_RSA_data)) |
| { |
| CRYPT_DATA_BLOB *blob; |
| DWORD size; |
| |
| ret = CryptDecodeObjectEx(X509_ASN_ENCODING, X509_OCTET_STRING, |
| msg->u.signed_data.info->content.Content.pbData, |
| msg->u.signed_data.info->content.Content.cbData, |
| CRYPT_DECODE_ALLOC_FLAG, NULL, &blob, &size); |
| if (ret) |
| { |
| ret = CRYPT_CopyParam(pvData, pcbData, blob->pbData, |
| blob->cbData); |
| LocalFree(blob); |
| } |
| } |
| else |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| msg->u.signed_data.info->content.Content.pbData, |
| msg->u.signed_data.info->content.Content.cbData); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_INNER_CONTENT_TYPE_PARAM: |
| if (msg->u.signed_data.info) |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| msg->u.signed_data.info->content.pszObjId, |
| strlen(msg->u.signed_data.info->content.pszObjId) + 1); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_SIGNER_COUNT_PARAM: |
| if (msg->u.signed_data.info) |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| &msg->u.signed_data.info->cSignerInfo, sizeof(DWORD)); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_SIGNER_INFO_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.info->cSignerInfo) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CRYPT_CopySignerInfo(pvData, pcbData, |
| &msg->u.signed_data.info->rgSignerInfo[dwIndex]); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_SIGNER_CERT_INFO_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.info->cSignerInfo) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CRYPT_CopySignerCertInfo(pvData, pcbData, |
| &msg->u.signed_data.info->rgSignerInfo[dwIndex]); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_CERT_COUNT_PARAM: |
| if (msg->u.signed_data.info) |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| &msg->u.signed_data.info->cCertEncoded, sizeof(DWORD)); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_CERT_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.info->cCertEncoded) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| msg->u.signed_data.info->rgCertEncoded[dwIndex].pbData, |
| msg->u.signed_data.info->rgCertEncoded[dwIndex].cbData); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_CRL_COUNT_PARAM: |
| if (msg->u.signed_data.info) |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| &msg->u.signed_data.info->cCrlEncoded, sizeof(DWORD)); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_CRL_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.info->cCrlEncoded) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| msg->u.signed_data.info->rgCrlEncoded[dwIndex].pbData, |
| msg->u.signed_data.info->rgCrlEncoded[dwIndex].cbData); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_COMPUTED_HASH_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.cSignerHandle) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CryptGetHashParam( |
| msg->u.signed_data.signerHandles[dwIndex].contentHash, |
| HP_HASHVAL, pvData, pcbData, 0); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_ENCODED_SIGNER: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.info->cSignerInfo) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CryptEncodeObjectEx( |
| X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, CMS_SIGNER_INFO, |
| &msg->u.signed_data.info->rgSignerInfo[dwIndex], 0, NULL, |
| pvData, pcbData); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_ATTR_CERT_COUNT_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| DWORD attrCertCount = 0; |
| |
| ret = CRYPT_CopyParam(pvData, pcbData, |
| &attrCertCount, sizeof(DWORD)); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_ATTR_CERT_PARAM: |
| if (msg->u.signed_data.info) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| case CMSG_CMS_SIGNER_INFO_PARAM: |
| if (msg->u.signed_data.info) |
| { |
| if (dwIndex >= msg->u.signed_data.info->cSignerInfo) |
| SetLastError(CRYPT_E_INVALID_INDEX); |
| else |
| ret = CRYPT_CopyCMSSignerInfo(pvData, pcbData, |
| &msg->u.signed_data.info->rgSignerInfo[dwIndex]); |
| } |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| break; |
| default: |
| FIXME("unimplemented for %d\n", dwParamType); |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_GetParam(HCRYPTMSG hCryptMsg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| CDecodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| switch (msg->type) |
| { |
| case CMSG_HASHED: |
| ret = CDecodeHashMsg_GetParam(msg, dwParamType, dwIndex, pvData, |
| pcbData); |
| break; |
| case CMSG_SIGNED: |
| ret = CDecodeSignedMsg_GetParam(msg, dwParamType, dwIndex, pvData, |
| pcbData); |
| break; |
| default: |
| switch (dwParamType) |
| { |
| case CMSG_TYPE_PARAM: |
| ret = CRYPT_CopyParam(pvData, pcbData, &msg->type, |
| sizeof(msg->type)); |
| break; |
| default: |
| { |
| CRYPT_DATA_BLOB blob; |
| |
| ret = ContextPropertyList_FindProperty(msg->properties, dwParamType, |
| &blob); |
| if (ret) |
| ret = CRYPT_CopyParam(pvData, pcbData, blob.pbData, |
| blob.cbData); |
| else |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeHashMsg_VerifyHash(CDecodeMsg *msg) |
| { |
| BOOL ret; |
| CRYPT_DATA_BLOB hashBlob; |
| |
| ret = ContextPropertyList_FindProperty(msg->properties, |
| CMSG_HASH_DATA_PARAM, &hashBlob); |
| if (ret) |
| { |
| DWORD computedHashSize = 0; |
| |
| ret = CDecodeHashMsg_GetParam(msg, CMSG_COMPUTED_HASH_PARAM, 0, NULL, |
| &computedHashSize); |
| if (hashBlob.cbData == computedHashSize) |
| { |
| LPBYTE computedHash = CryptMemAlloc(computedHashSize); |
| |
| if (computedHash) |
| { |
| ret = CDecodeHashMsg_GetParam(msg, CMSG_COMPUTED_HASH_PARAM, 0, |
| computedHash, &computedHashSize); |
| if (ret) |
| { |
| if (memcmp(hashBlob.pbData, computedHash, hashBlob.cbData)) |
| { |
| SetLastError(CRYPT_E_HASH_VALUE); |
| ret = FALSE; |
| } |
| } |
| CryptMemFree(computedHash); |
| } |
| else |
| { |
| SetLastError(ERROR_OUTOFMEMORY); |
| ret = FALSE; |
| } |
| } |
| else |
| { |
| SetLastError(CRYPT_E_HASH_VALUE); |
| ret = FALSE; |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeSignedMsg_VerifySignatureWithKey(CDecodeMsg *msg, |
| HCRYPTPROV prov, DWORD signerIndex, PCERT_PUBLIC_KEY_INFO keyInfo) |
| { |
| HCRYPTKEY key; |
| BOOL ret; |
| |
| if (!prov) |
| prov = msg->crypt_prov; |
| ret = CryptImportPublicKeyInfo(prov, X509_ASN_ENCODING, keyInfo, &key); |
| if (ret) |
| { |
| HCRYPTHASH hash; |
| CRYPT_HASH_BLOB reversedHash; |
| |
| if (msg->u.signed_data.info->rgSignerInfo[signerIndex].AuthAttrs.cAttr) |
| hash = msg->u.signed_data.signerHandles[signerIndex].authAttrHash; |
| else |
| hash = msg->u.signed_data.signerHandles[signerIndex].contentHash; |
| ret = CRYPT_ConstructBlob(&reversedHash, |
| &msg->u.signed_data.info->rgSignerInfo[signerIndex].EncryptedHash); |
| if (ret) |
| { |
| CRYPT_ReverseBytes(&reversedHash); |
| ret = CryptVerifySignatureW(hash, reversedHash.pbData, |
| reversedHash.cbData, key, NULL, 0); |
| CryptMemFree(reversedHash.pbData); |
| } |
| CryptDestroyKey(key); |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeSignedMsg_VerifySignature(CDecodeMsg *msg, PCERT_INFO info) |
| { |
| BOOL ret = FALSE; |
| DWORD i; |
| |
| if (!msg->u.signed_data.signerHandles) |
| { |
| SetLastError(NTE_BAD_SIGNATURE); |
| return FALSE; |
| } |
| for (i = 0; !ret && i < msg->u.signed_data.info->cSignerInfo; i++) |
| { |
| PCMSG_CMS_SIGNER_INFO signerInfo = |
| &msg->u.signed_data.info->rgSignerInfo[i]; |
| |
| if (signerInfo->SignerId.dwIdChoice == CERT_ID_ISSUER_SERIAL_NUMBER) |
| { |
| ret = CertCompareCertificateName(X509_ASN_ENCODING, |
| &signerInfo->SignerId.u.IssuerSerialNumber.Issuer, |
| &info->Issuer); |
| if (ret) |
| { |
| ret = CertCompareIntegerBlob( |
| &signerInfo->SignerId.u.IssuerSerialNumber.SerialNumber, |
| &info->SerialNumber); |
| if (ret) |
| break; |
| } |
| } |
| else |
| { |
| FIXME("signer %d: unimplemented for key id\n", i); |
| } |
| } |
| if (ret) |
| ret = CDecodeSignedMsg_VerifySignatureWithKey(msg, 0, i, |
| &info->SubjectPublicKeyInfo); |
| else |
| SetLastError(CRYPT_E_SIGNER_NOT_FOUND); |
| |
| return ret; |
| } |
| |
| static BOOL CDecodeSignedMsg_VerifySignatureEx(CDecodeMsg *msg, |
| PCMSG_CTRL_VERIFY_SIGNATURE_EX_PARA para) |
| { |
| BOOL ret = FALSE; |
| |
| if (para->cbSize != sizeof(CMSG_CTRL_VERIFY_SIGNATURE_EX_PARA)) |
| SetLastError(ERROR_INVALID_PARAMETER); |
| else if (para->dwSignerIndex >= msg->u.signed_data.info->cSignerInfo) |
| SetLastError(CRYPT_E_SIGNER_NOT_FOUND); |
| else if (!msg->u.signed_data.signerHandles) |
| SetLastError(NTE_BAD_SIGNATURE); |
| else |
| { |
| switch (para->dwSignerType) |
| { |
| case CMSG_VERIFY_SIGNER_PUBKEY: |
| ret = CDecodeSignedMsg_VerifySignatureWithKey(msg, |
| para->hCryptProv, para->dwSignerIndex, para->pvSigner); |
| break; |
| case CMSG_VERIFY_SIGNER_CERT: |
| { |
| PCCERT_CONTEXT cert = para->pvSigner; |
| |
| ret = CDecodeSignedMsg_VerifySignatureWithKey(msg, para->hCryptProv, |
| para->dwSignerIndex, &cert->pCertInfo->SubjectPublicKeyInfo); |
| break; |
| } |
| default: |
| FIXME("unimplemented for signer type %d\n", para->dwSignerType); |
| SetLastError(CRYPT_E_SIGNER_NOT_FOUND); |
| } |
| } |
| return ret; |
| } |
| |
| static BOOL CDecodeMsg_Control(HCRYPTMSG hCryptMsg, DWORD dwFlags, |
| DWORD dwCtrlType, const void *pvCtrlPara) |
| { |
| CDecodeMsg *msg = hCryptMsg; |
| BOOL ret = FALSE; |
| |
| switch (dwCtrlType) |
| { |
| case CMSG_CTRL_VERIFY_SIGNATURE: |
| switch (msg->type) |
| { |
| case CMSG_SIGNED: |
| ret = CDecodeSignedMsg_VerifySignature(msg, (PCERT_INFO)pvCtrlPara); |
| break; |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| break; |
| case CMSG_CTRL_DECRYPT: |
| switch (msg->type) |
| { |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| break; |
| case CMSG_CTRL_VERIFY_HASH: |
| switch (msg->type) |
| { |
| case CMSG_HASHED: |
| ret = CDecodeHashMsg_VerifyHash(msg); |
| break; |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| break; |
| case CMSG_CTRL_VERIFY_SIGNATURE_EX: |
| switch (msg->type) |
| { |
| case CMSG_SIGNED: |
| ret = CDecodeSignedMsg_VerifySignatureEx(msg, |
| (PCMSG_CTRL_VERIFY_SIGNATURE_EX_PARA)pvCtrlPara); |
| break; |
| default: |
| SetLastError(CRYPT_E_INVALID_MSG_TYPE); |
| } |
| break; |
| default: |
| SetLastError(CRYPT_E_CONTROL_TYPE); |
| } |
| return ret; |
| } |
| |
| HCRYPTMSG WINAPI CryptMsgOpenToDecode(DWORD dwMsgEncodingType, DWORD dwFlags, |
| DWORD dwMsgType, HCRYPTPROV_LEGACY hCryptProv, PCERT_INFO pRecipientInfo, |
| PCMSG_STREAM_INFO pStreamInfo) |
| { |
| CDecodeMsg *msg; |
| |
| TRACE("(%08x, %08x, %08x, %08lx, %p, %p)\n", dwMsgEncodingType, |
| dwFlags, dwMsgType, hCryptProv, pRecipientInfo, pStreamInfo); |
| |
| if (GET_CMSG_ENCODING_TYPE(dwMsgEncodingType) != PKCS_7_ASN_ENCODING) |
| { |
| SetLastError(E_INVALIDARG); |
| return NULL; |
| } |
| msg = CryptMemAlloc(sizeof(CDecodeMsg)); |
| if (msg) |
| { |
| CryptMsgBase_Init((CryptMsgBase *)msg, dwFlags, pStreamInfo, |
| CDecodeMsg_Close, CDecodeMsg_GetParam, CDecodeMsg_Update, |
| CDecodeMsg_Control); |
| msg->type = dwMsgType; |
| if (hCryptProv) |
| msg->crypt_prov = hCryptProv; |
| else |
| { |
| msg->crypt_prov = CRYPT_GetDefaultProvider(); |
| msg->base.open_flags &= ~CMSG_CRYPT_RELEASE_CONTEXT_FLAG; |
| } |
| memset(&msg->u, 0, sizeof(msg->u)); |
| msg->msg_data.cbData = 0; |
| msg->msg_data.pbData = NULL; |
| msg->detached_data.cbData = 0; |
| msg->detached_data.pbData = NULL; |
| msg->properties = ContextPropertyList_Create(); |
| } |
| return msg; |
| } |
| |
| HCRYPTMSG WINAPI CryptMsgDuplicate(HCRYPTMSG hCryptMsg) |
| { |
| TRACE("(%p)\n", hCryptMsg); |
| |
| if (hCryptMsg) |
| { |
| CryptMsgBase *msg = hCryptMsg; |
| |
| InterlockedIncrement(&msg->ref); |
| } |
| return hCryptMsg; |
| } |
| |
| BOOL WINAPI CryptMsgClose(HCRYPTMSG hCryptMsg) |
| { |
| TRACE("(%p)\n", hCryptMsg); |
| |
| if (hCryptMsg) |
| { |
| CryptMsgBase *msg = hCryptMsg; |
| |
| if (InterlockedDecrement(&msg->ref) == 0) |
| { |
| TRACE("freeing %p\n", msg); |
| if (msg->close) |
| msg->close(msg); |
| CryptMemFree(msg); |
| } |
| } |
| return TRUE; |
| } |
| |
| BOOL WINAPI CryptMsgUpdate(HCRYPTMSG hCryptMsg, const BYTE *pbData, |
| DWORD cbData, BOOL fFinal) |
| { |
| CryptMsgBase *msg = hCryptMsg; |
| |
| TRACE("(%p, %p, %d, %d)\n", hCryptMsg, pbData, cbData, fFinal); |
| |
| return msg->update(hCryptMsg, pbData, cbData, fFinal); |
| } |
| |
| BOOL WINAPI CryptMsgGetParam(HCRYPTMSG hCryptMsg, DWORD dwParamType, |
| DWORD dwIndex, void *pvData, DWORD *pcbData) |
| { |
| CryptMsgBase *msg = hCryptMsg; |
| |
| TRACE("(%p, %d, %d, %p, %p)\n", hCryptMsg, dwParamType, dwIndex, |
| pvData, pcbData); |
| return msg->get_param(hCryptMsg, dwParamType, dwIndex, pvData, pcbData); |
| } |
| |
| BOOL WINAPI CryptMsgControl(HCRYPTMSG hCryptMsg, DWORD dwFlags, |
| DWORD dwCtrlType, const void *pvCtrlPara) |
| { |
| CryptMsgBase *msg = hCryptMsg; |
| |
| TRACE("(%p, %08x, %d, %p)\n", hCryptMsg, dwFlags, dwCtrlType, |
| pvCtrlPara); |
| return msg->control(hCryptMsg, dwFlags, dwCtrlType, pvCtrlPara); |
| } |
| |
| static CERT_INFO *CRYPT_GetSignerCertInfoFromMsg(HCRYPTMSG msg, |
| DWORD dwSignerIndex) |
| { |
| CERT_INFO *certInfo = NULL; |
| DWORD size; |
| |
| if (CryptMsgGetParam(msg, CMSG_SIGNER_CERT_INFO_PARAM, dwSignerIndex, NULL, |
| &size)) |
| { |
| certInfo = CryptMemAlloc(size); |
| if (certInfo) |
| { |
| if (!CryptMsgGetParam(msg, CMSG_SIGNER_CERT_INFO_PARAM, |
| dwSignerIndex, certInfo, &size)) |
| { |
| CryptMemFree(certInfo); |
| certInfo = NULL; |
| } |
| } |
| } |
| return certInfo; |
| } |
| |
| BOOL WINAPI CryptMsgGetAndVerifySigner(HCRYPTMSG hCryptMsg, DWORD cSignerStore, |
| HCERTSTORE *rghSignerStore, DWORD dwFlags, PCCERT_CONTEXT *ppSigner, |
| DWORD *pdwSignerIndex) |
| { |
| HCERTSTORE store; |
| DWORD i, signerIndex = 0; |
| PCCERT_CONTEXT signerCert = NULL; |
| BOOL ret = FALSE; |
| |
| TRACE("(%p, %d, %p, %08x, %p, %p)\n", hCryptMsg, cSignerStore, |
| rghSignerStore, dwFlags, ppSigner, pdwSignerIndex); |
| |
| /* Clear output parameters */ |
| if (ppSigner) |
| *ppSigner = NULL; |
| if (pdwSignerIndex && !(dwFlags & CMSG_USE_SIGNER_INDEX_FLAG)) |
| *pdwSignerIndex = 0; |
| |
| /* Create store to search for signer certificates */ |
| store = CertOpenStore(CERT_STORE_PROV_COLLECTION, 0, 0, |
| CERT_STORE_CREATE_NEW_FLAG, NULL); |
| if (!(dwFlags & CMSG_TRUSTED_SIGNER_FLAG)) |
| { |
| HCERTSTORE msgStore = CertOpenStore(CERT_STORE_PROV_MSG, 0, 0, 0, |
| hCryptMsg); |
| |
| CertAddStoreToCollection(store, msgStore, 0, 0); |
| CertCloseStore(msgStore, 0); |
| } |
| for (i = 0; i < cSignerStore; i++) |
| CertAddStoreToCollection(store, rghSignerStore[i], 0, 0); |
| |
| /* Find signer cert */ |
| if (dwFlags & CMSG_USE_SIGNER_INDEX_FLAG) |
| { |
| CERT_INFO *signer = CRYPT_GetSignerCertInfoFromMsg(hCryptMsg, |
| *pdwSignerIndex); |
| |
| if (signer) |
| { |
| signerIndex = *pdwSignerIndex; |
| signerCert = CertFindCertificateInStore(store, X509_ASN_ENCODING, |
| 0, CERT_FIND_SUBJECT_CERT, signer, NULL); |
| CryptMemFree(signer); |
| } |
| } |
| else |
| { |
| DWORD count, size = sizeof(count); |
| |
| if (CryptMsgGetParam(hCryptMsg, CMSG_SIGNER_COUNT_PARAM, 0, &count, |
| &size)) |
| { |
| for (i = 0; !signerCert && i < count; i++) |
| { |
| CERT_INFO *signer = CRYPT_GetSignerCertInfoFromMsg(hCryptMsg, |
| i); |
| |
| if (signer) |
| { |
| signerCert = CertFindCertificateInStore(store, |
| X509_ASN_ENCODING, 0, CERT_FIND_SUBJECT_CERT, signer, |
| NULL); |
| if (signerCert) |
| signerIndex = i; |
| CryptMemFree(signer); |
| } |
| } |
| } |
| if (!signerCert) |
| SetLastError(CRYPT_E_NO_TRUSTED_SIGNER); |
| } |
| if (signerCert) |
| { |
| if (!(dwFlags & CMSG_SIGNER_ONLY_FLAG)) |
| ret = CryptMsgControl(hCryptMsg, 0, CMSG_CTRL_VERIFY_SIGNATURE, |
| signerCert->pCertInfo); |
| else |
| ret = TRUE; |
| if (ret) |
| { |
| if (ppSigner) |
| *ppSigner = CertDuplicateCertificateContext(signerCert); |
| if (pdwSignerIndex) |
| *pdwSignerIndex = signerIndex; |
| } |
| CertFreeCertificateContext(signerCert); |
| } |
| |
| CertCloseStore(store, 0); |
| return ret; |
| } |
| |
| BOOL WINAPI CryptMsgVerifyCountersignatureEncodedEx(HCRYPTPROV_LEGACY hCryptProv, |
| DWORD dwEncodingType, PBYTE pbSignerInfo, DWORD cbSignerInfo, |
| PBYTE pbSignerInfoCountersignature, DWORD cbSignerInfoCountersignature, |
| DWORD dwSignerType, void *pvSigner, DWORD dwFlags, void *pvReserved) |
| { |
| FIXME("(%08lx, %08x, %p, %d, %p, %d, %d, %p, %08x, %p): stub\n", hCryptProv, |
| dwEncodingType, pbSignerInfo, cbSignerInfo, pbSignerInfoCountersignature, |
| cbSignerInfoCountersignature, dwSignerType, pvSigner, dwFlags, pvReserved); |
| return FALSE; |
| } |
| |
| BOOL WINAPI CryptMsgEncodeAndSignCTL(DWORD dwMsgEncodingType, |
| PCTL_INFO pCtlInfo, PCMSG_SIGNED_ENCODE_INFO pSignInfo, DWORD dwFlags, |
| BYTE *pbEncoded, DWORD *pcbEncoded) |
| { |
| BOOL ret; |
| BYTE *pbCtlContent; |
| DWORD cbCtlContent; |
| |
| TRACE("(%08x, %p, %p, %08x, %p, %p)\n", dwMsgEncodingType, pCtlInfo, |
| pSignInfo, dwFlags, pbEncoded, pcbEncoded); |
| |
| if (dwFlags) |
| { |
| FIXME("unimplemented for flags %08x\n", dwFlags); |
| return FALSE; |
| } |
| if ((ret = CryptEncodeObjectEx(dwMsgEncodingType, PKCS_CTL, pCtlInfo, |
| CRYPT_ENCODE_ALLOC_FLAG, NULL, &pbCtlContent, &cbCtlContent))) |
| { |
| ret = CryptMsgSignCTL(dwMsgEncodingType, pbCtlContent, cbCtlContent, |
| pSignInfo, dwFlags, pbEncoded, pcbEncoded); |
| LocalFree(pbCtlContent); |
| } |
| return ret; |
| } |
| |
| BOOL WINAPI CryptMsgSignCTL(DWORD dwMsgEncodingType, BYTE *pbCtlContent, |
| DWORD cbCtlContent, PCMSG_SIGNED_ENCODE_INFO pSignInfo, DWORD dwFlags, |
| BYTE *pbEncoded, DWORD *pcbEncoded) |
| { |
| static char oid_ctl[] = szOID_CTL; |
| BOOL ret; |
| HCRYPTMSG msg; |
| |
| TRACE("(%08x, %p, %d, %p, %08x, %p, %p)\n", dwMsgEncodingType, |
| pbCtlContent, cbCtlContent, pSignInfo, dwFlags, pbEncoded, pcbEncoded); |
| |
| if (dwFlags) |
| { |
| FIXME("unimplemented for flags %08x\n", dwFlags); |
| return FALSE; |
| } |
| msg = CryptMsgOpenToEncode(dwMsgEncodingType, 0, CMSG_SIGNED, pSignInfo, |
| oid_ctl, NULL); |
| if (msg) |
| { |
| ret = CryptMsgUpdate(msg, pbCtlContent, cbCtlContent, TRUE); |
| if (ret) |
| ret = CryptMsgGetParam(msg, CMSG_CONTENT_PARAM, 0, pbEncoded, |
| pcbEncoded); |
| CryptMsgClose(msg); |
| } |
| else |
| ret = FALSE; |
| return ret; |
| } |