blob: 5b93d3a1a35ceb92da665f184be711bd04135a52 [file] [log] [blame]
Juan Langc4f2bcf2006-05-25 09:01:03 -07001/*
2 * Copyright 2006 Juan Lang
3 *
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
8 *
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
13 *
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
17 *
18 */
19
20#include <assert.h>
21#include <stdarg.h>
Juan Langc84c53b2009-11-18 16:21:09 -080022#define NONAMELESSUNION
Juan Langc4f2bcf2006-05-25 09:01:03 -070023#include "windef.h"
24#include "winbase.h"
25#include "wincrypt.h"
26#include "wine/debug.h"
Juan Langc84c53b2009-11-18 16:21:09 -080027#include "wine/unicode.h"
Juan Langc4f2bcf2006-05-25 09:01:03 -070028#include "crypt32_private.h"
29
30WINE_DEFAULT_DEBUG_CHANNEL(crypt);
31
32PCCRL_CONTEXT WINAPI CertCreateCRLContext(DWORD dwCertEncodingType,
33 const BYTE* pbCrlEncoded, DWORD cbCrlEncoded)
34{
35 PCRL_CONTEXT crl = NULL;
36 BOOL ret;
Juan Langc4f2bcf2006-05-25 09:01:03 -070037 PCRL_INFO crlInfo = NULL;
38 DWORD size = 0;
39
Juan Langf3a1f2b2006-10-03 21:58:09 -070040 TRACE("(%08x, %p, %d)\n", dwCertEncodingType, pbCrlEncoded,
Juan Langc4f2bcf2006-05-25 09:01:03 -070041 cbCrlEncoded);
42
43 if ((dwCertEncodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING)
44 {
45 SetLastError(E_INVALIDARG);
46 return NULL;
47 }
Juan Lang13e006a2006-06-19 14:11:37 -070048 ret = CryptDecodeObjectEx(dwCertEncodingType, X509_CERT_CRL_TO_BE_SIGNED,
49 pbCrlEncoded, cbCrlEncoded, CRYPT_DECODE_ALLOC_FLAG, NULL,
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +010050 &crlInfo, &size);
Juan Langc4f2bcf2006-05-25 09:01:03 -070051 if (ret)
52 {
53 BYTE *data = NULL;
54
Michael Stefaniuc75897152008-11-03 22:35:50 +010055 crl = Context_CreateDataContext(sizeof(CRL_CONTEXT));
Juan Langc4f2bcf2006-05-25 09:01:03 -070056 if (!crl)
57 goto end;
58 data = CryptMemAlloc(cbCrlEncoded);
59 if (!data)
60 {
61 CryptMemFree(crl);
62 crl = NULL;
63 goto end;
64 }
65 memcpy(data, pbCrlEncoded, cbCrlEncoded);
66 crl->dwCertEncodingType = dwCertEncodingType;
67 crl->pbCrlEncoded = data;
68 crl->cbCrlEncoded = cbCrlEncoded;
69 crl->pCrlInfo = crlInfo;
70 crl->hCertStore = 0;
71 }
72
73end:
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +010074 return crl;
Juan Langc4f2bcf2006-05-25 09:01:03 -070075}
76
77BOOL WINAPI CertAddEncodedCRLToStore(HCERTSTORE hCertStore,
78 DWORD dwCertEncodingType, const BYTE *pbCrlEncoded, DWORD cbCrlEncoded,
79 DWORD dwAddDisposition, PCCRL_CONTEXT *ppCrlContext)
80{
81 PCCRL_CONTEXT crl = CertCreateCRLContext(dwCertEncodingType,
82 pbCrlEncoded, cbCrlEncoded);
83 BOOL ret;
84
Juan Langf3a1f2b2006-10-03 21:58:09 -070085 TRACE("(%p, %08x, %p, %d, %08x, %p)\n", hCertStore, dwCertEncodingType,
Juan Langc4f2bcf2006-05-25 09:01:03 -070086 pbCrlEncoded, cbCrlEncoded, dwAddDisposition, ppCrlContext);
87
88 if (crl)
89 {
90 ret = CertAddCRLContextToStore(hCertStore, crl, dwAddDisposition,
91 ppCrlContext);
92 CertFreeCRLContext(crl);
93 }
94 else
95 ret = FALSE;
96 return ret;
97}
98
99typedef BOOL (*CrlCompareFunc)(PCCRL_CONTEXT pCrlContext, DWORD dwType,
100 DWORD dwFlags, const void *pvPara);
101
102static BOOL compare_crl_any(PCCRL_CONTEXT pCrlContext, DWORD dwType,
103 DWORD dwFlags, const void *pvPara)
104{
105 return TRUE;
106}
107
108static BOOL compare_crl_issued_by(PCCRL_CONTEXT pCrlContext, DWORD dwType,
109 DWORD dwFlags, const void *pvPara)
110{
111 BOOL ret;
112
113 if (pvPara)
114 {
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +0100115 PCCERT_CONTEXT issuer = pvPara;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700116
117 ret = CertCompareCertificateName(issuer->dwCertEncodingType,
118 &issuer->pCertInfo->Issuer, &pCrlContext->pCrlInfo->Issuer);
Juan Lang47272122009-11-18 16:27:49 -0800119 if (ret && (dwFlags & CRL_FIND_ISSUED_BY_SIGNATURE_FLAG))
120 ret = CryptVerifyCertificateSignatureEx(0,
121 issuer->dwCertEncodingType,
122 CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL, (void *)pCrlContext,
123 CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT, (void *)issuer, 0, NULL);
Juan Lang8fcaa522009-11-18 16:54:49 -0800124 if (ret && (dwFlags & CRL_FIND_ISSUED_BY_AKI_FLAG))
125 {
126 PCERT_EXTENSION aki = CertFindExtension(
127 szOID_AUTHORITY_KEY_IDENTIFIER2, pCrlContext->pCrlInfo->cExtension,
128 pCrlContext->pCrlInfo->rgExtension);
129
130 if (aki)
131 {
132 CERT_EXTENSION *ski;
133
134 if ((ski = CertFindExtension(szOID_SUBJECT_KEY_IDENTIFIER,
135 issuer->pCertInfo->cExtension,
136 issuer->pCertInfo->rgExtension)))
137 {
138 if (aki->Value.cbData == ski->Value.cbData)
139 ret = !memcmp(aki->Value.pbData, ski->Value.pbData,
140 aki->Value.cbData);
141 else
142 ret = FALSE;
143 }
144 else
145 ret = FALSE;
146 }
147 /* else: a CRL without an AKI matches any cert */
148 }
Juan Langc4f2bcf2006-05-25 09:01:03 -0700149 }
150 else
151 ret = TRUE;
152 return ret;
153}
154
155static BOOL compare_crl_existing(PCCRL_CONTEXT pCrlContext, DWORD dwType,
156 DWORD dwFlags, const void *pvPara)
157{
158 BOOL ret;
159
160 if (pvPara)
161 {
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +0100162 PCCRL_CONTEXT crl = pvPara;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700163
164 ret = CertCompareCertificateName(pCrlContext->dwCertEncodingType,
165 &pCrlContext->pCrlInfo->Issuer, &crl->pCrlInfo->Issuer);
166 }
167 else
168 ret = TRUE;
169 return ret;
170}
171
Juan Lang4fa4f672009-11-18 10:40:08 -0800172static BOOL compare_crl_issued_for(PCCRL_CONTEXT pCrlContext, DWORD dwType,
173 DWORD dwFlags, const void *pvPara)
174{
175 const CRL_FIND_ISSUED_FOR_PARA *para = pvPara;
176 BOOL ret;
177
178 ret = CertCompareCertificateName(para->pIssuerCert->dwCertEncodingType,
179 &para->pIssuerCert->pCertInfo->Issuer, &pCrlContext->pCrlInfo->Issuer);
180 if (ret)
181 ret = CertIsValidCRLForCertificate(para->pSubjectCert, pCrlContext,
182 0, NULL);
183 return ret;
184}
185
Juan Langc4f2bcf2006-05-25 09:01:03 -0700186PCCRL_CONTEXT WINAPI CertFindCRLInStore(HCERTSTORE hCertStore,
187 DWORD dwCertEncodingType, DWORD dwFindFlags, DWORD dwFindType,
188 const void *pvFindPara, PCCRL_CONTEXT pPrevCrlContext)
189{
190 PCCRL_CONTEXT ret;
191 CrlCompareFunc compare;
192
Juan Langf3a1f2b2006-10-03 21:58:09 -0700193 TRACE("(%p, %d, %d, %d, %p, %p)\n", hCertStore, dwCertEncodingType,
Juan Langc4f2bcf2006-05-25 09:01:03 -0700194 dwFindFlags, dwFindType, pvFindPara, pPrevCrlContext);
195
196 switch (dwFindType)
197 {
198 case CRL_FIND_ANY:
199 compare = compare_crl_any;
200 break;
201 case CRL_FIND_ISSUED_BY:
202 compare = compare_crl_issued_by;
203 break;
204 case CRL_FIND_EXISTING:
205 compare = compare_crl_existing;
206 break;
Juan Lang4fa4f672009-11-18 10:40:08 -0800207 case CRL_FIND_ISSUED_FOR:
208 compare = compare_crl_issued_for;
209 break;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700210 default:
Juan Langf3a1f2b2006-10-03 21:58:09 -0700211 FIXME("find type %08x unimplemented\n", dwFindType);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700212 compare = NULL;
213 }
214
215 if (compare)
216 {
217 BOOL matches = FALSE;
218
219 ret = pPrevCrlContext;
220 do {
221 ret = CertEnumCRLsInStore(hCertStore, ret);
222 if (ret)
223 matches = compare(ret, dwFindType, dwFindFlags, pvFindPara);
224 } while (ret != NULL && !matches);
225 if (!ret)
226 SetLastError(CRYPT_E_NOT_FOUND);
227 }
228 else
229 {
230 SetLastError(CRYPT_E_NOT_FOUND);
231 ret = NULL;
232 }
233 return ret;
234}
235
Juan Lang77ea5832006-06-21 20:50:11 -0700236PCCRL_CONTEXT WINAPI CertGetCRLFromStore(HCERTSTORE hCertStore,
237 PCCERT_CONTEXT pIssuerContext, PCCRL_CONTEXT pPrevCrlContext, DWORD *pdwFlags)
238{
239 static const DWORD supportedFlags = CERT_STORE_SIGNATURE_FLAG |
240 CERT_STORE_TIME_VALIDITY_FLAG | CERT_STORE_BASE_CRL_FLAG |
241 CERT_STORE_DELTA_CRL_FLAG;
242 PCCRL_CONTEXT ret;
243
Juan Langf3a1f2b2006-10-03 21:58:09 -0700244 TRACE("(%p, %p, %p, %08x)\n", hCertStore, pIssuerContext, pPrevCrlContext,
Juan Lang77ea5832006-06-21 20:50:11 -0700245 *pdwFlags);
246
247 if (*pdwFlags & ~supportedFlags)
248 {
249 SetLastError(E_INVALIDARG);
250 return NULL;
251 }
252 if (pIssuerContext)
253 ret = CertFindCRLInStore(hCertStore, pIssuerContext->dwCertEncodingType,
254 0, CRL_FIND_ISSUED_BY, pIssuerContext, pPrevCrlContext);
255 else
256 ret = CertFindCRLInStore(hCertStore, 0, 0, CRL_FIND_ANY, NULL,
257 pPrevCrlContext);
258 if (ret)
259 {
260 if (*pdwFlags & CERT_STORE_TIME_VALIDITY_FLAG)
261 {
262 if (0 == CertVerifyCRLTimeValidity(NULL, ret->pCrlInfo))
263 *pdwFlags &= ~CERT_STORE_TIME_VALIDITY_FLAG;
264 }
265 if (*pdwFlags & CERT_STORE_SIGNATURE_FLAG)
266 {
267 if (CryptVerifyCertificateSignatureEx(0, ret->dwCertEncodingType,
268 CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL, (void *)ret,
269 CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT, (void *)pIssuerContext, 0,
270 NULL))
271 *pdwFlags &= ~CERT_STORE_SIGNATURE_FLAG;
272 }
273 }
274 return ret;
275}
276
Juan Langc4f2bcf2006-05-25 09:01:03 -0700277PCCRL_CONTEXT WINAPI CertDuplicateCRLContext(PCCRL_CONTEXT pCrlContext)
278{
279 TRACE("(%p)\n", pCrlContext);
Juan Langacc9d812009-10-20 09:52:36 -0700280 if (pCrlContext)
281 Context_AddRef((void *)pCrlContext, sizeof(CRL_CONTEXT));
Juan Langc4f2bcf2006-05-25 09:01:03 -0700282 return pCrlContext;
283}
284
285static void CrlDataContext_Free(void *context)
286{
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +0100287 PCRL_CONTEXT crlContext = context;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700288
289 CryptMemFree(crlContext->pbCrlEncoded);
290 LocalFree(crlContext->pCrlInfo);
291}
292
293BOOL WINAPI CertFreeCRLContext( PCCRL_CONTEXT pCrlContext)
294{
Juan Lang40855ca2009-10-30 15:06:39 -0700295 BOOL ret = TRUE;
296
Juan Langc4f2bcf2006-05-25 09:01:03 -0700297 TRACE("(%p)\n", pCrlContext);
298
299 if (pCrlContext)
Juan Lang40855ca2009-10-30 15:06:39 -0700300 ret = Context_Release((void *)pCrlContext, sizeof(CRL_CONTEXT),
Juan Langc4f2bcf2006-05-25 09:01:03 -0700301 CrlDataContext_Free);
Juan Lang40855ca2009-10-30 15:06:39 -0700302 return ret;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700303}
304
305DWORD WINAPI CertEnumCRLContextProperties(PCCRL_CONTEXT pCRLContext,
306 DWORD dwPropId)
307{
308 PCONTEXT_PROPERTY_LIST properties = Context_GetProperties(
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +0100309 pCRLContext, sizeof(CRL_CONTEXT));
Juan Langc4f2bcf2006-05-25 09:01:03 -0700310 DWORD ret;
311
Juan Langf3a1f2b2006-10-03 21:58:09 -0700312 TRACE("(%p, %d)\n", pCRLContext, dwPropId);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700313
314 if (properties)
315 ret = ContextPropertyList_EnumPropIDs(properties, dwPropId);
316 else
317 ret = 0;
318 return ret;
319}
320
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100321static BOOL CRLContext_SetProperty(PCCRL_CONTEXT context, DWORD dwPropId,
322 DWORD dwFlags, const void *pvData);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700323
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100324static BOOL CRLContext_GetHashProp(PCCRL_CONTEXT context, DWORD dwPropId,
Juan Langc4f2bcf2006-05-25 09:01:03 -0700325 ALG_ID algID, const BYTE *toHash, DWORD toHashLen, void *pvData,
326 DWORD *pcbData)
327{
328 BOOL ret = CryptHashCertificate(0, algID, 0, toHash, toHashLen, pvData,
329 pcbData);
Juan Lang00c50a62008-12-22 19:32:41 -0800330 if (ret && pvData)
Juan Langc4f2bcf2006-05-25 09:01:03 -0700331 {
332 CRYPT_DATA_BLOB blob = { *pcbData, pvData };
333
334 ret = CRLContext_SetProperty(context, dwPropId, 0, &blob);
335 }
336 return ret;
337}
338
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100339static BOOL CRLContext_GetProperty(PCCRL_CONTEXT context, DWORD dwPropId,
340 void *pvData, DWORD *pcbData)
Juan Langc4f2bcf2006-05-25 09:01:03 -0700341{
Juan Langc4f2bcf2006-05-25 09:01:03 -0700342 PCONTEXT_PROPERTY_LIST properties =
343 Context_GetProperties(context, sizeof(CRL_CONTEXT));
344 BOOL ret;
345 CRYPT_DATA_BLOB blob;
346
Juan Langf3a1f2b2006-10-03 21:58:09 -0700347 TRACE("(%p, %d, %p, %p)\n", context, dwPropId, pvData, pcbData);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700348
349 if (properties)
350 ret = ContextPropertyList_FindProperty(properties, dwPropId, &blob);
351 else
352 ret = FALSE;
353 if (ret)
354 {
355 if (!pvData)
Juan Langc4f2bcf2006-05-25 09:01:03 -0700356 *pcbData = blob.cbData;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700357 else if (*pcbData < blob.cbData)
358 {
359 SetLastError(ERROR_MORE_DATA);
360 *pcbData = blob.cbData;
Juan Lang0170a412007-05-14 18:04:51 -0700361 ret = FALSE;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700362 }
363 else
364 {
365 memcpy(pvData, blob.pbData, blob.cbData);
366 *pcbData = blob.cbData;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700367 }
368 }
369 else
370 {
371 /* Implicit properties */
372 switch (dwPropId)
373 {
374 case CERT_SHA1_HASH_PROP_ID:
375 ret = CRLContext_GetHashProp(context, dwPropId, CALG_SHA1,
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100376 context->pbCrlEncoded, context->cbCrlEncoded, pvData,
Juan Langc4f2bcf2006-05-25 09:01:03 -0700377 pcbData);
378 break;
379 case CERT_MD5_HASH_PROP_ID:
380 ret = CRLContext_GetHashProp(context, dwPropId, CALG_MD5,
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100381 context->pbCrlEncoded, context->cbCrlEncoded, pvData,
Juan Langc4f2bcf2006-05-25 09:01:03 -0700382 pcbData);
383 break;
384 default:
385 SetLastError(CRYPT_E_NOT_FOUND);
386 }
387 }
388 TRACE("returning %d\n", ret);
389 return ret;
390}
391
392BOOL WINAPI CertGetCRLContextProperty(PCCRL_CONTEXT pCRLContext,
393 DWORD dwPropId, void *pvData, DWORD *pcbData)
394{
395 BOOL ret;
396
Juan Langf3a1f2b2006-10-03 21:58:09 -0700397 TRACE("(%p, %d, %p, %p)\n", pCRLContext, dwPropId, pvData, pcbData);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700398
399 switch (dwPropId)
400 {
401 case 0:
402 case CERT_CERT_PROP_ID:
403 case CERT_CRL_PROP_ID:
404 case CERT_CTL_PROP_ID:
405 SetLastError(E_INVALIDARG);
406 ret = FALSE;
407 break;
408 case CERT_ACCESS_STATE_PROP_ID:
409 if (!pvData)
410 {
411 *pcbData = sizeof(DWORD);
412 ret = TRUE;
413 }
414 else if (*pcbData < sizeof(DWORD))
415 {
416 SetLastError(ERROR_MORE_DATA);
417 *pcbData = sizeof(DWORD);
418 ret = FALSE;
419 }
420 else
421 {
Juan Lang79cd6722007-05-14 18:06:48 -0700422 if (pCRLContext->hCertStore)
423 ret = CertGetStoreProperty(pCRLContext->hCertStore, dwPropId,
424 pvData, pcbData);
425 else
426 *(DWORD *)pvData = 0;
Juan Langc4f2bcf2006-05-25 09:01:03 -0700427 ret = TRUE;
428 }
429 break;
430 default:
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100431 ret = CRLContext_GetProperty(pCRLContext, dwPropId, pvData,
Juan Langc4f2bcf2006-05-25 09:01:03 -0700432 pcbData);
433 }
434 return ret;
435}
436
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100437static BOOL CRLContext_SetProperty(PCCRL_CONTEXT context, DWORD dwPropId,
Juan Langc4f2bcf2006-05-25 09:01:03 -0700438 DWORD dwFlags, const void *pvData)
439{
440 PCONTEXT_PROPERTY_LIST properties =
Juan Lang0ab77812008-08-28 10:05:30 -0700441 Context_GetProperties(context, sizeof(CRL_CONTEXT));
Juan Langc4f2bcf2006-05-25 09:01:03 -0700442 BOOL ret;
443
Juan Langf3a1f2b2006-10-03 21:58:09 -0700444 TRACE("(%p, %d, %08x, %p)\n", context, dwPropId, dwFlags, pvData);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700445
446 if (!properties)
447 ret = FALSE;
448 else if (!pvData)
449 {
450 ContextPropertyList_RemoveProperty(properties, dwPropId);
451 ret = TRUE;
452 }
453 else
454 {
455 switch (dwPropId)
456 {
457 case CERT_AUTO_ENROLL_PROP_ID:
458 case CERT_CTL_USAGE_PROP_ID: /* same as CERT_ENHKEY_USAGE_PROP_ID */
459 case CERT_DESCRIPTION_PROP_ID:
460 case CERT_FRIENDLY_NAME_PROP_ID:
461 case CERT_HASH_PROP_ID:
462 case CERT_KEY_IDENTIFIER_PROP_ID:
463 case CERT_MD5_HASH_PROP_ID:
464 case CERT_NEXT_UPDATE_LOCATION_PROP_ID:
465 case CERT_PUBKEY_ALG_PARA_PROP_ID:
466 case CERT_PVK_FILE_PROP_ID:
467 case CERT_SIGNATURE_HASH_PROP_ID:
468 case CERT_ISSUER_PUBLIC_KEY_MD5_HASH_PROP_ID:
469 case CERT_SUBJECT_NAME_MD5_HASH_PROP_ID:
470 case CERT_SUBJECT_PUBLIC_KEY_MD5_HASH_PROP_ID:
471 case CERT_ENROLLMENT_PROP_ID:
472 case CERT_CROSS_CERT_DIST_POINTS_PROP_ID:
473 case CERT_RENEWAL_PROP_ID:
474 {
475 PCRYPT_DATA_BLOB blob = (PCRYPT_DATA_BLOB)pvData;
476
477 ret = ContextPropertyList_SetProperty(properties, dwPropId,
478 blob->pbData, blob->cbData);
479 break;
480 }
481 case CERT_DATE_STAMP_PROP_ID:
482 ret = ContextPropertyList_SetProperty(properties, dwPropId,
Michael Stefaniuc4eaaa912009-01-26 11:01:47 +0100483 pvData, sizeof(FILETIME));
Juan Langc4f2bcf2006-05-25 09:01:03 -0700484 break;
485 default:
Juan Langf3a1f2b2006-10-03 21:58:09 -0700486 FIXME("%d: stub\n", dwPropId);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700487 ret = FALSE;
488 }
489 }
490 TRACE("returning %d\n", ret);
491 return ret;
492}
493
494BOOL WINAPI CertSetCRLContextProperty(PCCRL_CONTEXT pCRLContext,
495 DWORD dwPropId, DWORD dwFlags, const void *pvData)
496{
497 BOOL ret;
498
Juan Langf3a1f2b2006-10-03 21:58:09 -0700499 TRACE("(%p, %d, %08x, %p)\n", pCRLContext, dwPropId, dwFlags, pvData);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700500
501 /* Handle special cases for "read-only"/invalid prop IDs. Windows just
502 * crashes on most of these, I'll be safer.
503 */
504 switch (dwPropId)
505 {
506 case 0:
507 case CERT_ACCESS_STATE_PROP_ID:
508 case CERT_CERT_PROP_ID:
509 case CERT_CRL_PROP_ID:
510 case CERT_CTL_PROP_ID:
511 SetLastError(E_INVALIDARG);
512 return FALSE;
513 }
Alexandre Julliard8926dce2008-01-02 12:22:16 +0100514 ret = CRLContext_SetProperty(pCRLContext, dwPropId, dwFlags, pvData);
Juan Langc4f2bcf2006-05-25 09:01:03 -0700515 TRACE("returning %d\n", ret);
516 return ret;
517}
Juan Langb29c2332006-05-26 09:48:13 -0700518
Juan Langc84c53b2009-11-18 16:21:09 -0800519static BOOL compare_dist_point_name(const CRL_DIST_POINT_NAME *name1,
520 const CRL_DIST_POINT_NAME *name2)
521{
522 BOOL match;
523
524 if (name1->dwDistPointNameChoice == name2->dwDistPointNameChoice)
525 {
526 match = TRUE;
527 if (name1->dwDistPointNameChoice == CRL_DIST_POINT_FULL_NAME)
528 {
529 if (name1->u.FullName.cAltEntry == name2->u.FullName.cAltEntry)
530 {
531 DWORD i;
532
533 for (i = 0; match && i < name1->u.FullName.cAltEntry; i++)
534 {
535 const CERT_ALT_NAME_ENTRY *entry1 =
536 &name1->u.FullName.rgAltEntry[i];
537 const CERT_ALT_NAME_ENTRY *entry2 =
538 &name2->u.FullName.rgAltEntry[i];
539
540 if (entry1->dwAltNameChoice == entry2->dwAltNameChoice)
541 {
542 switch (entry1->dwAltNameChoice)
543 {
544 case CERT_ALT_NAME_URL:
545 match = !strcmpiW(entry1->u.pwszURL,
546 entry2->u.pwszURL);
547 break;
548 case CERT_ALT_NAME_DIRECTORY_NAME:
549 match = (entry1->u.DirectoryName.cbData ==
550 entry2->u.DirectoryName.cbData) &&
551 !memcmp(entry1->u.DirectoryName.pbData,
552 entry2->u.DirectoryName.pbData,
553 entry1->u.DirectoryName.cbData);
554 break;
555 default:
556 FIXME("unimplemented for type %d\n",
557 entry1->dwAltNameChoice);
558 match = FALSE;
559 }
560 }
561 else
562 match = FALSE;
563 }
564 }
565 else
566 match = FALSE;
567 }
568 }
569 else
570 match = FALSE;
571 return match;
572}
573
574static BOOL match_dist_point_with_issuing_dist_point(
575 const CRL_DIST_POINT *distPoint, const CRL_ISSUING_DIST_POINT *idp)
576{
577 BOOL match;
578
579 /* While RFC 5280, section 4.2.1.13 recommends against segmenting
580 * CRL distribution points by reasons, it doesn't preclude doing so.
581 * "This profile RECOMMENDS against segmenting CRLs by reason code."
582 * If the issuing distribution point for this CRL is only valid for
583 * some reasons, only match if the reasons covered also match the
584 * reasons in the CRL distribution point.
585 */
586 if (idp->OnlySomeReasonFlags.cbData)
587 {
588 if (idp->OnlySomeReasonFlags.cbData == distPoint->ReasonFlags.cbData)
589 {
590 DWORD i;
591
592 match = TRUE;
593 for (i = 0; match && i < distPoint->ReasonFlags.cbData; i++)
594 if (idp->OnlySomeReasonFlags.pbData[i] !=
595 distPoint->ReasonFlags.pbData[i])
596 match = FALSE;
597 }
598 else
599 match = FALSE;
600 }
601 else
602 match = TRUE;
603 if (match)
604 match = compare_dist_point_name(&idp->DistPointName,
605 &distPoint->DistPointName);
606 return match;
607}
608
Juan Lange8992af2006-06-20 16:06:27 -0700609BOOL WINAPI CertIsValidCRLForCertificate(PCCERT_CONTEXT pCert,
610 PCCRL_CONTEXT pCrl, DWORD dwFlags, void *pvReserved)
611{
Juan Langc84c53b2009-11-18 16:21:09 -0800612 PCERT_EXTENSION ext;
613 BOOL ret;
614
Juan Langf3a1f2b2006-10-03 21:58:09 -0700615 TRACE("(%p, %p, %08x, %p)\n", pCert, pCrl, dwFlags, pvReserved);
Juan Langc84c53b2009-11-18 16:21:09 -0800616
617 if (!pCert)
618 return TRUE;
619
620 if ((ext = CertFindExtension(szOID_ISSUING_DIST_POINT,
621 pCrl->pCrlInfo->cExtension, pCrl->pCrlInfo->rgExtension)))
622 {
623 CRL_ISSUING_DIST_POINT *idp;
624 DWORD size;
625
626 if ((ret = CryptDecodeObjectEx(pCrl->dwCertEncodingType,
627 X509_ISSUING_DIST_POINT, ext->Value.pbData, ext->Value.cbData,
628 CRYPT_DECODE_ALLOC_FLAG, NULL, &idp, &size)))
629 {
630 if ((ext = CertFindExtension(szOID_CRL_DIST_POINTS,
631 pCert->pCertInfo->cExtension, pCert->pCertInfo->rgExtension)))
632 {
633 CRL_DIST_POINTS_INFO *distPoints;
634
635 if ((ret = CryptDecodeObjectEx(pCert->dwCertEncodingType,
636 X509_CRL_DIST_POINTS, ext->Value.pbData, ext->Value.cbData,
637 CRYPT_DECODE_ALLOC_FLAG, NULL, &distPoints, &size)))
638 {
639 DWORD i;
640
641 ret = FALSE;
642 for (i = 0; !ret && i < distPoints->cDistPoint; i++)
643 ret = match_dist_point_with_issuing_dist_point(
644 &distPoints->rgDistPoint[i], idp);
645 if (!ret)
646 SetLastError(CRYPT_E_NO_MATCH);
647 LocalFree(distPoints);
648 }
649 }
650 else
651 {
Juan Langf3783942009-11-19 11:48:53 -0800652 /* no CRL dist points extension in cert, can't match the CRL
653 * (which has an issuing dist point extension)
Juan Langc84c53b2009-11-18 16:21:09 -0800654 */
Juan Langf3783942009-11-19 11:48:53 -0800655 ret = FALSE;
656 SetLastError(CRYPT_E_NO_MATCH);
Juan Langc84c53b2009-11-18 16:21:09 -0800657 }
658 LocalFree(idp);
659 }
660 }
661 else
662 ret = TRUE;
663 return ret;
Juan Lange8992af2006-06-20 16:06:27 -0700664}
665
Andrew Talbote04f6be2007-04-09 20:28:22 +0100666static PCRL_ENTRY CRYPT_FindCertificateInCRL(PCERT_INFO cert, const CRL_INFO *crl)
Juan Lange8992af2006-06-20 16:06:27 -0700667{
668 DWORD i;
669 PCRL_ENTRY entry = NULL;
670
Juan Lange8992af2006-06-20 16:06:27 -0700671 for (i = 0; !entry && i < crl->cCRLEntry; i++)
672 if (CertCompareIntegerBlob(&crl->rgCRLEntry[i].SerialNumber,
673 &cert->SerialNumber))
674 entry = &crl->rgCRLEntry[i];
675 return entry;
676}
677
678BOOL WINAPI CertFindCertificateInCRL(PCCERT_CONTEXT pCert,
679 PCCRL_CONTEXT pCrlContext, DWORD dwFlags, void *pvReserved,
680 PCRL_ENTRY *ppCrlEntry)
681{
Juan Langf3a1f2b2006-10-03 21:58:09 -0700682 TRACE("(%p, %p, %08x, %p, %p)\n", pCert, pCrlContext, dwFlags, pvReserved,
Juan Lange8992af2006-06-20 16:06:27 -0700683 ppCrlEntry);
684
685 *ppCrlEntry = CRYPT_FindCertificateInCRL(pCert->pCertInfo,
686 pCrlContext->pCrlInfo);
687 return TRUE;
688}
689
690BOOL WINAPI CertVerifyCRLRevocation(DWORD dwCertEncodingType,
691 PCERT_INFO pCertId, DWORD cCrlInfo, PCRL_INFO rgpCrlInfo[])
692{
693 DWORD i;
694 PCRL_ENTRY entry = NULL;
695
Juan Langf3a1f2b2006-10-03 21:58:09 -0700696 TRACE("(%08x, %p, %d, %p)\n", dwCertEncodingType, pCertId, cCrlInfo,
Juan Lange8992af2006-06-20 16:06:27 -0700697 rgpCrlInfo);
698
699 for (i = 0; !entry && i < cCrlInfo; i++)
700 entry = CRYPT_FindCertificateInCRL(pCertId, rgpCrlInfo[i]);
701 return entry == NULL;
702}
703
Juan Langb29c2332006-05-26 09:48:13 -0700704LONG WINAPI CertVerifyCRLTimeValidity(LPFILETIME pTimeToVerify,
705 PCRL_INFO pCrlInfo)
706{
707 FILETIME fileTime;
708 LONG ret;
709
710 if (!pTimeToVerify)
711 {
Juan Langcf904c22007-10-18 11:14:12 -0700712 GetSystemTimeAsFileTime(&fileTime);
Juan Langb29c2332006-05-26 09:48:13 -0700713 pTimeToVerify = &fileTime;
714 }
715 if ((ret = CompareFileTime(pTimeToVerify, &pCrlInfo->ThisUpdate)) >= 0)
716 {
717 ret = CompareFileTime(pTimeToVerify, &pCrlInfo->NextUpdate);
718 if (ret < 0)
719 ret = 0;
720 }
721 return ret;
722}