source: trunk/src/crypt32/oid.c@ 21354

Last change on this file since 21354 was 21354, checked in by rlwalsh, 16 years ago

eliminate VACPP warning & info msgs - see Ticket #1

File size: 56.4 KB
Line 
1/*
2 * Copyright 2002 Mike McCormack for CodeWeavers
3 * Copyright 2005-2006 Juan Lang
4 *
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
9 *
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
14 *
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18 */
19
20#include "config.h"
21#include "wine/port.h"
22
23#include <stdio.h>
24#include <stdarg.h>
25#include <string.h>
26#define NONAMELESSUNION
27#include "windef.h"
28#include "winbase.h"
29#include "wincrypt.h"
30#include "winreg.h"
31#include "winuser.h"
32#include "wine/debug.h"
33#include "wine/list.h"
34#include "crypt32_private.h"
35#include "cryptres.h"
36
37//WINE_DEFAULT_DEBUG_CHANNEL(crypt);
38
39static const WCHAR DllW[] = { 'D','l','l',0 };
40
41static void init_oid_info(void);
42static void free_function_sets(void);
43static void free_oid_info(void);
44
45void crypt_oid_init(void)
46{
47 init_oid_info();
48}
49
50void crypt_oid_free(void)
51{
52 dprintf(("oid: cp1"));
53 free_function_sets();
54 dprintf(("oid: cp2"));
55 free_oid_info();
56 dprintf(("oid: cp3"));
57}
58
59static RTL_CRITICAL_SECTION funcSetCS;
60static RTL_CRITICAL_SECTION_DEBUG funcSetCSDebug =
61{
62 0, 0, &funcSetCS,
63 { &funcSetCSDebug.ProcessLocksList, &funcSetCSDebug.ProcessLocksList },
64 0, 0, { (DWORD)(DWORD_PTR)(__FILE__ ": funcSetCS") }
65};
66static RTL_CRITICAL_SECTION funcSetCS = { &funcSetCSDebug, -1, 0, 0, 0, 0 };
67static struct list funcSets = { &funcSets, &funcSets };
68
69struct OIDFunctionSet
70{
71 LPSTR name;
72 RTL_CRITICAL_SECTION cs; /* protects functions */
73 struct list functions;
74 struct list next;
75};
76
77struct OIDFunction
78{
79 DWORD encoding;
80 CRYPT_OID_FUNC_ENTRY entry;
81 struct list next;
82};
83
84static const WCHAR ROOT[] = {'R','O','O','T',0};
85static const WCHAR MY[] = {'M','Y',0};
86static const WCHAR CA[] = {'C','A',0};
87static const WCHAR ADDRESSBOOK[] = {'A','D','D','R','E','S','S','B','O','O','K',0};
88static const LPCWSTR LocalizedKeys[] = {ROOT,MY,CA,ADDRESSBOOK};
89static WCHAR LocalizedNames[4][256];
90
91static void free_function_sets(void)
92{
93 struct OIDFunctionSet *setCursor, *setNext;
94
95 LIST_FOR_EACH_ENTRY_SAFE(setCursor, setNext, &funcSets,
96 struct OIDFunctionSet, next)
97 {
98 struct OIDFunction *functionCursor, *funcNext;
99
100 list_remove(&setCursor->next);
101 CryptMemFree(setCursor->name);
102 LIST_FOR_EACH_ENTRY_SAFE(functionCursor, funcNext,
103 &setCursor->functions, struct OIDFunction, next)
104 {
105 list_remove(&functionCursor->next);
106 CryptMemFree(functionCursor);
107 }
108 setCursor->cs.DebugInfo->Spare[0] = 0;
109 DeleteCriticalSection((CRITICAL_SECTION*)&setCursor->cs);
110 CryptMemFree(setCursor);
111 }
112}
113
114/* There is no free function associated with this; therefore, the sets are
115 * freed when crypt32.dll is unloaded.
116 */
117HCRYPTOIDFUNCSET WINAPI CryptInitOIDFunctionSet(LPCSTR pszFuncName,
118 DWORD dwFlags)
119{
120 struct OIDFunctionSet *cursor, *ret = NULL;
121
122 TRACE("(%s, %x)\n", debugstr_a(pszFuncName), dwFlags);
123
124 EnterCriticalSection((CRITICAL_SECTION*)&funcSetCS);
125 LIST_FOR_EACH_ENTRY(cursor, &funcSets, struct OIDFunctionSet, next)
126 {
127 if (!strcasecmp(pszFuncName, cursor->name))
128 {
129 ret = (HCRYPTOIDFUNCSET)cursor;
130 break;
131 }
132 }
133 if (!ret)
134 {
135 ret = CryptMemAlloc(sizeof(struct OIDFunctionSet));
136 if (ret)
137 {
138 memset(ret, 0, sizeof(*ret));
139 ret->name = CryptMemAlloc(strlen(pszFuncName) + 1);
140 if (ret->name)
141 {
142 InitializeCriticalSection((CRITICAL_SECTION*)&ret->cs);
143 ret->cs.DebugInfo->Spare[0] = (DWORD)(DWORD_PTR)(__FILE__ ": OIDFunctionSet.cs");
144 list_init(&ret->functions);
145 strcpy(ret->name, pszFuncName);
146 list_add_tail(&funcSets, &ret->next);
147 }
148 else
149 {
150 CryptMemFree(ret);
151 ret = NULL;
152 }
153 }
154 }
155 LeaveCriticalSection((CRITICAL_SECTION*)&funcSetCS);
156
157 return (HCRYPTOIDFUNCSET)ret;
158}
159
160static char *CRYPT_GetKeyName(DWORD dwEncodingType, LPCSTR pszFuncName,
161 LPCSTR pszOID)
162{
163 static const char szEncodingTypeFmt[] =
164 "Software\\Microsoft\\Cryptography\\OID\\EncodingType %d\\%s\\%s";
165 UINT len;
166 char numericOID[7]; /* enough for "#65535" */
167 const char *oid;
168 LPSTR szKey;
169
170 /* MSDN says the encoding type is a mask, but it isn't treated that way.
171 * (E.g., if dwEncodingType were 3, the key names "EncodingType 1" and
172 * "EncodingType 2" would be expected if it were a mask. Instead native
173 * stores values in "EncodingType 3".
174 */
175 if (!HIWORD(pszOID))
176 {
177 snprintf(numericOID, sizeof(numericOID), "#%d", LOWORD(pszOID));
178 oid = numericOID;
179 }
180 else
181 oid = pszOID;
182
183 /* This is enough: the lengths of the two string parameters are explicitly
184 * counted, and we need up to five additional characters for the encoding
185 * type. These are covered by the "%d", "%s", and "%s" characters in the
186 * format specifier that are removed by sprintf.
187 */
188 len = sizeof(szEncodingTypeFmt) + lstrlenA(pszFuncName) + lstrlenA(oid);
189 szKey = CryptMemAlloc(len);
190 if (szKey)
191 sprintf(szKey, szEncodingTypeFmt,
192 GET_CERT_ENCODING_TYPE(dwEncodingType), pszFuncName, oid);
193 return szKey;
194}
195
196BOOL WINAPI CryptGetDefaultOIDDllList(HCRYPTOIDFUNCSET hFuncSet,
197 DWORD dwEncodingType, LPWSTR pwszDllList, DWORD *pcchDllList)
198{
199 BOOL ret = TRUE;
200 struct OIDFunctionSet *set = (struct OIDFunctionSet *)hFuncSet;
201 char *keyName;
202 HKEY key;
203 long rc;
204
205 TRACE("(%p, %d, %p, %p)\n", hFuncSet, dwEncodingType, pwszDllList,
206 pcchDllList);
207
208 keyName = CRYPT_GetKeyName(dwEncodingType, set->name, "DEFAULT");
209 rc = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0,
210 KEY_READ, NULL, &key, NULL);
211 if (!rc)
212 {
213 DWORD size = *pcchDllList * sizeof(WCHAR);
214
215 rc = RegQueryValueExW(key, DllW, NULL, NULL, (LPBYTE)pwszDllList,
216 &size);
217 if (!rc)
218 *pcchDllList = size / sizeof(WCHAR);
219 else
220 {
221 /* No value, return an empty list */
222 if (pwszDllList && *pcchDllList)
223 *pwszDllList = '\0';
224 *pcchDllList = 1;
225 }
226 RegCloseKey(key);
227 }
228 else
229 {
230 /* No value, return an empty list */
231 if (pwszDllList && *pcchDllList)
232 *pwszDllList = '\0';
233 *pcchDllList = 1;
234 }
235 CryptMemFree(keyName);
236
237 return ret;
238}
239
240BOOL WINAPI CryptInstallOIDFunctionAddress(HMODULE hModule,
241 DWORD dwEncodingType, LPCSTR pszFuncName, DWORD cFuncEntry,
242 const CRYPT_OID_FUNC_ENTRY rgFuncEntry[], DWORD dwFlags)
243{
244 BOOL ret = TRUE;
245 struct OIDFunctionSet *set;
246
247 TRACE("(%p, %d, %s, %d, %p, %08x)\n", hModule, dwEncodingType,
248 debugstr_a(pszFuncName), cFuncEntry, rgFuncEntry, dwFlags);
249
250 set = (struct OIDFunctionSet *)CryptInitOIDFunctionSet(pszFuncName, 0);
251 if (set)
252 {
253 DWORD i;
254
255 EnterCriticalSection((CRITICAL_SECTION*)&set->cs);
256 for (i = 0; ret && i < cFuncEntry; i++)
257 {
258 struct OIDFunction *func;
259
260 if (HIWORD(rgFuncEntry[i].pszOID))
261 func = CryptMemAlloc(sizeof(struct OIDFunction)
262 + strlen(rgFuncEntry[i].pszOID) + 1);
263 else
264 func = CryptMemAlloc(sizeof(struct OIDFunction));
265 if (func)
266 {
267 func->encoding = GET_CERT_ENCODING_TYPE(dwEncodingType);
268 if (HIWORD(rgFuncEntry[i].pszOID))
269 {
270 LPSTR oid;
271
272 oid = (LPSTR)((LPBYTE)func + sizeof(*func));
273 strcpy(oid, rgFuncEntry[i].pszOID);
274 func->entry.pszOID = oid;
275 }
276 else
277 func->entry.pszOID = rgFuncEntry[i].pszOID;
278 func->entry.pvFuncAddr = rgFuncEntry[i].pvFuncAddr;
279 list_add_tail(&set->functions, &func->next);
280 }
281 else
282 ret = FALSE;
283 }
284 LeaveCriticalSection((CRITICAL_SECTION*)&set->cs);
285 }
286 else
287 ret = FALSE;
288 return ret;
289}
290
291struct FuncAddr
292{
293 HMODULE lib;
294 LPWSTR dllList;
295 LPWSTR currentDll;
296};
297
298static BOOL CRYPT_GetFuncFromReg(DWORD dwEncodingType, LPCSTR pszOID,
299 LPCSTR szFuncName, LPVOID *ppvFuncAddr, HCRYPTOIDFUNCADDR *phFuncAddr)
300{
301 BOOL ret = FALSE;
302 char *keyName;
303 const char *funcName;
304 HKEY key;
305 long rc;
306
307 keyName = CRYPT_GetKeyName(dwEncodingType, szFuncName, pszOID);
308 rc = RegOpenKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, KEY_READ, &key);
309 if (!rc)
310 {
311 DWORD type, size = 0;
312
313 rc = RegQueryValueExA(key, "FuncName", NULL, &type, NULL, &size);
314 if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
315 {
316 funcName = CryptMemAlloc(size);
317 rc = RegQueryValueExA(key, "FuncName", NULL, &type,
318 (LPBYTE)funcName, &size);
319 }
320 else
321 funcName = szFuncName;
322 rc = RegQueryValueExW(key, DllW, NULL, &type, NULL, &size);
323 if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
324 {
325 LPWSTR dllName = CryptMemAlloc(size);
326
327 if (dllName)
328 {
329 rc = RegQueryValueExW(key, DllW, NULL, NULL,
330 (LPBYTE)dllName, &size);
331 if (!rc)
332 {
333 HMODULE lib;
334
335 /* This is a bit of a hack; MSDN describes a more
336 * complicated unload routine than this will allow.
337 * Still, this seems to suffice for now.
338 */
339 lib = LoadLibraryW(dllName);
340 if (lib)
341 {
342 *ppvFuncAddr = (LPVOID)GetProcAddress(lib, funcName);
343 if (*ppvFuncAddr)
344 {
345 struct FuncAddr *addr =
346 CryptMemAlloc(sizeof(struct FuncAddr));
347
348 if (addr)
349 {
350 addr->lib = lib;
351 addr->dllList = addr->currentDll = NULL;
352 *phFuncAddr = addr;
353 ret = TRUE;
354 }
355 else
356 {
357 *phFuncAddr = NULL;
358 FreeLibrary(lib);
359 }
360 }
361 else
362 {
363 /* Unload the library, the caller doesn't want
364 * to unload it when the return value is NULL.
365 */
366 FreeLibrary(lib);
367 }
368 }
369 }
370 else
371 SetLastError(rc);
372 CryptMemFree(dllName);
373 }
374 }
375 else
376 SetLastError(rc);
377 if (funcName != szFuncName)
378 CryptMemFree((char *)funcName);
379 RegCloseKey(key);
380 }
381 else
382 SetLastError(rc);
383 CryptMemFree(keyName);
384 return ret;
385}
386
387BOOL WINAPI CryptGetOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
388 DWORD dwEncodingType, LPCSTR pszOID, DWORD dwFlags, void **ppvFuncAddr,
389 HCRYPTOIDFUNCADDR *phFuncAddr)
390{
391 BOOL ret = FALSE;
392 struct OIDFunctionSet *set = (struct OIDFunctionSet *)hFuncSet;
393
394 TRACE("(%p, %d, %s, %08x, %p, %p)\n", hFuncSet, dwEncodingType,
395 debugstr_a(pszOID), dwFlags, ppvFuncAddr, phFuncAddr);
396
397 *ppvFuncAddr = NULL;
398 if (!(dwFlags & CRYPT_GET_INSTALLED_OID_FUNC_FLAG))
399 {
400 struct OIDFunction *function;
401
402 EnterCriticalSection((CRITICAL_SECTION*)&set->cs);
403 LIST_FOR_EACH_ENTRY(function, &set->functions, struct OIDFunction, next)
404 {
405 if (function->encoding == GET_CERT_ENCODING_TYPE(dwEncodingType))
406 {
407 if (HIWORD(pszOID))
408 {
409 if (HIWORD(function->entry.pszOID) &&
410 !strcasecmp(function->entry.pszOID, pszOID))
411 {
412 *ppvFuncAddr = function->entry.pvFuncAddr;
413 *phFuncAddr = NULL; /* FIXME: what should it be? */
414 ret = TRUE;
415 break;
416 }
417 }
418 else if (function->entry.pszOID == pszOID)
419 {
420 *ppvFuncAddr = function->entry.pvFuncAddr;
421 *phFuncAddr = NULL; /* FIXME: what should it be? */
422 ret = TRUE;
423 break;
424 }
425 }
426 }
427 LeaveCriticalSection((CRITICAL_SECTION*)&set->cs);
428 }
429 if (!*ppvFuncAddr)
430 ret = CRYPT_GetFuncFromReg(dwEncodingType, pszOID, set->name,
431 ppvFuncAddr, phFuncAddr);
432 TRACE("returning %d\n", ret);
433 return ret;
434}
435
436BOOL WINAPI CryptFreeOIDFunctionAddress(HCRYPTOIDFUNCADDR hFuncAddr,
437 DWORD dwFlags)
438{
439 TRACE("(%p, %08x)\n", hFuncAddr, dwFlags);
440
441 /* FIXME: as MSDN states, need to check for DllCanUnloadNow in the DLL,
442 * and only unload it if it can be unloaded. Also need to implement ref
443 * counting on the functions.
444 */
445 if (hFuncAddr)
446 {
447 struct FuncAddr *addr = (struct FuncAddr *)hFuncAddr;
448
449 CryptMemFree(addr->dllList);
450 FreeLibrary(addr->lib);
451 CryptMemFree(addr);
452 }
453 return TRUE;
454}
455
456static BOOL CRYPT_GetFuncFromDll(LPCWSTR dll, LPCSTR func, HMODULE *lib,
457 void **ppvFuncAddr)
458{
459 BOOL ret = FALSE;
460
461 *lib = LoadLibraryW(dll);
462 if (*lib)
463 {
464 *ppvFuncAddr = (LPVOID)GetProcAddress(*lib, func);
465 if (*ppvFuncAddr)
466 ret = TRUE;
467 else
468 {
469 FreeLibrary(*lib);
470 *lib = NULL;
471 }
472 }
473 return ret;
474}
475
476BOOL WINAPI CryptGetDefaultOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
477 DWORD dwEncodingType, LPCWSTR pwszDll, DWORD dwFlags, void **ppvFuncAddr,
478 HCRYPTOIDFUNCADDR *phFuncAddr)
479{
480 struct OIDFunctionSet *set = (struct OIDFunctionSet *)hFuncSet;
481 BOOL ret = FALSE;
482
483 TRACE("(%p, %d, %s, %08x, %p, %p)\n", hFuncSet, dwEncodingType,
484 debugstr_w(pwszDll), dwFlags, ppvFuncAddr, phFuncAddr);
485
486 if (pwszDll)
487 {
488 HMODULE lib;
489
490 *phFuncAddr = NULL;
491 ret = CRYPT_GetFuncFromDll(pwszDll, set->name, &lib, ppvFuncAddr);
492 if (ret)
493 {
494 struct FuncAddr *addr = CryptMemAlloc(sizeof(struct FuncAddr));
495
496 if (addr)
497 {
498 addr->lib = lib;
499 addr->dllList = addr->currentDll = NULL;
500 *phFuncAddr = addr;
501 }
502 else
503 {
504 FreeLibrary(lib);
505 *ppvFuncAddr = NULL;
506 SetLastError(ERROR_OUTOFMEMORY);
507 ret = FALSE;
508 }
509 }
510 else
511 SetLastError(ERROR_FILE_NOT_FOUND);
512 }
513 else
514 {
515 struct FuncAddr *addr = (struct FuncAddr *)*phFuncAddr;
516
517 if (!addr)
518 {
519 DWORD size;
520
521 ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType, NULL,
522 &size);
523 if (ret)
524 {
525 LPWSTR dllList = CryptMemAlloc(size * sizeof(WCHAR));
526
527 if (dllList)
528 {
529 ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType,
530 dllList, &size);
531 if (ret)
532 {
533 addr = CryptMemAlloc(sizeof(struct FuncAddr));
534 if (addr)
535 {
536 addr->dllList = dllList;
537 addr->currentDll = dllList;
538 addr->lib = NULL;
539 *phFuncAddr = addr;
540 }
541 else
542 {
543 CryptMemFree(dllList);
544 SetLastError(ERROR_OUTOFMEMORY);
545 ret = FALSE;
546 }
547 }
548 }
549 else
550 {
551 SetLastError(ERROR_OUTOFMEMORY);
552 ret = FALSE;
553 }
554 }
555 }
556 if (addr)
557 {
558 if (!*addr->currentDll)
559 {
560 CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
561 SetLastError(ERROR_FILE_NOT_FOUND);
562 *phFuncAddr = NULL;
563 ret = FALSE;
564 }
565 else
566 {
567 /* FIXME: as elsewhere, can't free until DllCanUnloadNow says
568 * it's possible, and should defer unloading for some time to
569 * avoid repeated LoadLibrary/FreeLibrary on the same dll.
570 */
571 FreeLibrary(addr->lib);
572 ret = CRYPT_GetFuncFromDll(addr->currentDll, set->name,
573 &addr->lib, ppvFuncAddr);
574 if (ret)
575 {
576 /* Move past the current DLL */
577 addr->currentDll += lstrlenW(addr->currentDll) + 1;
578 *phFuncAddr = addr;
579 }
580 else
581 {
582 CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
583 SetLastError(ERROR_FILE_NOT_FOUND);
584 *phFuncAddr = NULL;
585 }
586 }
587 }
588 }
589 return ret;
590}
591
592/***********************************************************************
593 * CryptRegisterOIDFunction (CRYPT32.@)
594 *
595 * Register the DLL and the functions it uses to cover the combination
596 * of encoding type, functionname and OID.
597 *
598 * PARAMS
599 * dwEncodingType [I] Encoding type to be used.
600 * pszFuncName [I] Name of the function to be registered.
601 * pszOID [I] OID of the function (numeric or string).
602 * pwszDll [I] The DLL that is to be registered.
603 * pszOverrideFuncName [I] Name of the function in the DLL.
604 *
605 * RETURNS
606 * Success: TRUE.
607 * Failure: FALSE. (Look at GetLastError()).
608 *
609 * NOTES
610 * Registry errors are always reported via SetLastError().
611 */
612BOOL WINAPI CryptRegisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
613 LPCSTR pszOID, LPCWSTR pwszDll, LPCSTR pszOverrideFuncName)
614{
615 LONG r;
616 HKEY hKey;
617 LPSTR szKey;
618
619 TRACE("(%x, %s, %s, %s, %s)\n", dwEncodingType, pszFuncName,
620 debugstr_a(pszOID), debugstr_w(pwszDll), pszOverrideFuncName);
621
622 /* Native does nothing pwszDll is NULL */
623 if (!pwszDll)
624 return TRUE;
625
626 /* I'm not matching MS bug for bug here, because I doubt any app depends on
627 * it: native "succeeds" if pszFuncName is NULL, but the nonsensical entry
628 * it creates would never be used.
629 */
630 if (!pszFuncName || !pszOID)
631 {
632 SetLastError(E_INVALIDARG);
633 return FALSE;
634 }
635
636 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
637 TRACE("Key name is %s\n", debugstr_a(szKey));
638
639 if (!szKey)
640 return FALSE;
641
642 r = RegCreateKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
643 CryptMemFree(szKey);
644
645 if (r != ERROR_SUCCESS) goto error_close_key;
646
647 /* write the values */
648 if (pszOverrideFuncName)
649 {
650 r = RegSetValueExA(hKey, "FuncName", 0, REG_SZ,
651 (LPBYTE)pszOverrideFuncName, lstrlenA(pszOverrideFuncName) + 1);
652 if (r != ERROR_SUCCESS) goto error_close_key;
653 }
654 r = RegSetValueExW(hKey, DllW, 0, REG_SZ, (LPBYTE) pwszDll,
655 (lstrlenW(pwszDll) + 1) * sizeof (WCHAR));
656
657error_close_key:
658
659 RegCloseKey(hKey);
660
661 if (r != ERROR_SUCCESS)
662 {
663 SetLastError(r);
664 return FALSE;
665 }
666
667 return TRUE;
668}
669
670/***********************************************************************
671 * CryptUnregisterOIDFunction (CRYPT32.@)
672 */
673BOOL WINAPI CryptUnregisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
674 LPCSTR pszOID)
675{
676 LPSTR szKey;
677 LONG rc;
678
679 TRACE("%x %s %s\n", dwEncodingType, debugstr_a(pszFuncName),
680 debugstr_a(pszOID));
681
682 if (!pszFuncName || !pszOID)
683 {
684 SetLastError(ERROR_INVALID_PARAMETER);
685 return FALSE;
686 }
687
688 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
689 rc = RegDeleteKeyA(HKEY_LOCAL_MACHINE, szKey);
690 CryptMemFree(szKey);
691 if (rc)
692 SetLastError(rc);
693 return rc ? FALSE : TRUE;
694}
695
696BOOL WINAPI CryptGetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
697 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD *pdwValueType, BYTE *pbValueData,
698 DWORD *pcbValueData)
699{
700 LPSTR szKey;
701 LONG rc;
702 HKEY hKey;
703
704 TRACE("%x %s %s %s %p %p %p\n", dwEncodingType, debugstr_a(pszFuncName),
705 debugstr_a(pszOID), debugstr_w(pwszValueName), pdwValueType, pbValueData,
706 pcbValueData);
707
708 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
709 return TRUE;
710
711 if (!pszFuncName || !pszOID || !pwszValueName)
712 {
713 SetLastError(ERROR_INVALID_PARAMETER);
714 return FALSE;
715 }
716
717 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
718 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
719 CryptMemFree(szKey);
720 if (rc)
721 SetLastError(rc);
722 else
723 {
724 rc = RegQueryValueExW(hKey, pwszValueName, NULL, pdwValueType,
725 pbValueData, pcbValueData);
726 if (rc)
727 SetLastError(rc);
728 RegCloseKey(hKey);
729 }
730 return rc ? FALSE : TRUE;
731}
732
733BOOL WINAPI CryptSetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
734 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD dwValueType,
735 const BYTE *pbValueData, DWORD cbValueData)
736{
737 LPSTR szKey;
738 LONG rc;
739 HKEY hKey;
740
741 TRACE("%x %s %s %s %d %p %d\n", dwEncodingType, debugstr_a(pszFuncName),
742 debugstr_a(pszOID), debugstr_w(pwszValueName), dwValueType, pbValueData,
743 cbValueData);
744
745 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
746 return TRUE;
747
748 if (!pszFuncName || !pszOID || !pwszValueName)
749 {
750 SetLastError(ERROR_INVALID_PARAMETER);
751 return FALSE;
752 }
753
754 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
755 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
756 CryptMemFree(szKey);
757 if (rc)
758 SetLastError(rc);
759 else
760 {
761 rc = RegSetValueExW(hKey, pwszValueName, 0, dwValueType, (LPBYTE)pbValueData,
762 cbValueData);
763 if (rc)
764 SetLastError(rc);
765 RegCloseKey(hKey);
766 }
767 return rc ? FALSE : TRUE;
768}
769
770static LPCWSTR CRYPT_FindStringInMultiString(LPCWSTR multi, LPCWSTR toFind)
771{
772 LPCWSTR ret = NULL, ptr;
773
774 for (ptr = multi; ptr && *ptr && !ret; ptr += lstrlenW(ptr) + 1)
775 {
776 if (!lstrcmpiW(ptr, toFind))
777 ret = ptr;
778 }
779 return ret;
780}
781
782static DWORD CRYPT_GetMultiStringCharacterLen(LPCWSTR multi)
783{
784 DWORD ret;
785
786 if (multi)
787 {
788 LPCWSTR ptr;
789
790 /* Count terminating empty string */
791 ret = 1;
792 for (ptr = multi; *ptr; ptr += lstrlenW(ptr) + 1)
793 ret += lstrlenW(ptr) + 1;
794 }
795 else
796 ret = 0;
797 return ret;
798}
799
800static LPWSTR CRYPT_AddStringToMultiString(LPWSTR multi, LPCWSTR toAdd,
801 DWORD index)
802{
803 LPWSTR ret;
804
805 if (!multi)
806 {
807 /* FIXME: ignoring index, is that okay? */
808 ret = CryptMemAlloc((lstrlenW(toAdd) + 2) * sizeof(WCHAR));
809 if (ret)
810 {
811 /* copy string, including NULL terminator */
812 memcpy(ret, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
813 /* add terminating empty string */
814 *(ret + lstrlenW(toAdd) + 1) = 0;
815 }
816 }
817 else
818 {
819 DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
820
821 ret = CryptMemRealloc(multi, (len + lstrlenW(toAdd) + 1) *
822 sizeof(WCHAR));
823 if (ret)
824 {
825 LPWSTR spotToAdd;
826
827 if (index == CRYPT_REGISTER_LAST_INDEX)
828 spotToAdd = ret + len - 1;
829 else
830 {
831 DWORD i;
832
833 /* FIXME: if index is too large for the string, toAdd is
834 * added to the end. Is that okay?
835 */
836 for (i = 0, spotToAdd = ret; i < index && *spotToAdd;
837 spotToAdd += lstrlenW(spotToAdd) + 1)
838 ;
839 }
840 if (spotToAdd)
841 {
842 /* Copy existing string "right" */
843 memmove(spotToAdd + lstrlenW(toAdd) + 1, spotToAdd,
844 (len - (spotToAdd - ret)) * sizeof(WCHAR));
845 /* Copy new string */
846 memcpy(spotToAdd, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
847 }
848 else
849 {
850 CryptMemFree(ret);
851 ret = NULL;
852 }
853 }
854 }
855 return ret;
856}
857
858static BOOL CRYPT_RemoveStringFromMultiString(LPWSTR multi, LPCWSTR toRemove)
859{
860 LPWSTR spotToRemove = (LPWSTR)CRYPT_FindStringInMultiString(multi,
861 toRemove);
862 BOOL ret;
863
864 if (spotToRemove)
865 {
866 DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
867
868 /* Copy remainder of string "left" */
869 memmove(spotToRemove, spotToRemove + lstrlenW(toRemove) + 1,
870 (len - (spotToRemove - multi)) * sizeof(WCHAR));
871 ret = TRUE;
872 }
873 else
874 {
875 SetLastError(ERROR_FILE_NOT_FOUND);
876 ret = FALSE;
877 }
878 return ret;
879}
880
881static BOOL CRYPT_GetDefaultOIDKey(DWORD dwEncodingType, LPCSTR pszFuncName,
882 PHKEY key)
883{
884 LPSTR keyName;
885 LONG r;
886
887 keyName = CRYPT_GetKeyName(dwEncodingType, pszFuncName, "DEFAULT");
888 TRACE("Key name is %s\n", debugstr_a(keyName));
889
890 if (!keyName)
891 return FALSE;
892
893 r = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0, KEY_ALL_ACCESS,
894 NULL, key, NULL);
895 CryptMemFree(keyName);
896 if (r != ERROR_SUCCESS)
897 {
898 SetLastError(r);
899 return FALSE;
900 }
901 return TRUE;
902}
903
904static LPWSTR CRYPT_GetDefaultOIDDlls(HKEY key)
905{
906 LONG r;
907 DWORD type, size;
908 LPWSTR dlls;
909
910 r = RegQueryValueExW(key, DllW, NULL, &type, NULL, &size);
911 if (r == ERROR_SUCCESS && type == REG_MULTI_SZ)
912 {
913 dlls = CryptMemAlloc(size);
914 r = RegQueryValueExW(key, DllW, NULL, &type, (LPBYTE)dlls, &size);
915 if (r != ERROR_SUCCESS)
916 {
917 CryptMemFree(dlls);
918 dlls = NULL;
919 }
920 }
921 else
922 dlls = NULL;
923 return dlls;
924}
925
926static inline BOOL CRYPT_SetDefaultOIDDlls(HKEY key, LPCWSTR dlls)
927{
928 DWORD len = CRYPT_GetMultiStringCharacterLen(dlls);
929 LONG r;
930
931 if ((r = RegSetValueExW(key, DllW, 0, REG_MULTI_SZ, (LPBYTE)dlls,
932 len * sizeof (WCHAR))) != 0)
933 SetLastError(r);
934 return r == ERROR_SUCCESS;
935}
936
937/***********************************************************************
938 * CryptRegisterDefaultOIDFunction (CRYPT32.@)
939 */
940BOOL WINAPI CryptRegisterDefaultOIDFunction(DWORD dwEncodingType,
941 LPCSTR pszFuncName, DWORD dwIndex, LPCWSTR pwszDll)
942{
943 HKEY key;
944 LPWSTR dlls;
945 BOOL ret = FALSE;
946
947 TRACE("(%x, %s, %d, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
948 dwIndex, debugstr_w(pwszDll));
949
950 if (!pwszDll)
951 {
952 SetLastError(E_INVALIDARG);
953 return FALSE;
954 }
955
956 if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
957 return FALSE;
958
959 dlls = CRYPT_GetDefaultOIDDlls(key);
960 if (CRYPT_FindStringInMultiString(dlls, pwszDll))
961 SetLastError(ERROR_FILE_EXISTS);
962 else
963 {
964 dlls = CRYPT_AddStringToMultiString(dlls, pwszDll, dwIndex);
965 if (dlls)
966 ret = CRYPT_SetDefaultOIDDlls(key, dlls);
967 }
968 CryptMemFree(dlls);
969 RegCloseKey(key);
970 return ret;
971}
972
973BOOL WINAPI CryptUnregisterDefaultOIDFunction(DWORD dwEncodingType,
974 LPCSTR pszFuncName, LPCWSTR pwszDll)
975{
976 HKEY key;
977 LPWSTR dlls;
978 BOOL ret;
979
980 TRACE("(%x, %s, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
981 debugstr_w(pwszDll));
982
983 if (!pwszDll)
984 {
985 SetLastError(E_INVALIDARG);
986 return FALSE;
987 }
988
989 if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
990 return FALSE;
991
992 dlls = CRYPT_GetDefaultOIDDlls(key);
993 if ((ret = CRYPT_RemoveStringFromMultiString(dlls, pwszDll)) != FALSE)
994 ret = CRYPT_SetDefaultOIDDlls(key, dlls);
995 CryptMemFree(dlls);
996 RegCloseKey(key);
997 return ret;
998}
999
1000static void oid_init_localizednames(void)
1001{
1002 unsigned int i;
1003
1004 for(i = 0; i < sizeof(LocalizedKeys)/sizeof(LPCWSTR); i++)
1005 {
1006 LoadStringW(hInstance, IDS_LOCALIZEDNAME_ROOT+i, LocalizedNames[i], 256);
1007 }
1008}
1009
1010/********************************************************************
1011 * CryptFindLocalizedName (CRYPT32.@)
1012 */
1013LPCWSTR WINAPI CryptFindLocalizedName(LPCWSTR pwszCryptName)
1014{
1015 unsigned int i;
1016
1017 for(i = 0; i < sizeof(LocalizedKeys)/sizeof(LPCWSTR); i++)
1018 {
1019 if(!lstrcmpiW(LocalizedKeys[i], pwszCryptName))
1020 {
1021 return LocalizedNames[i];
1022 }
1023 }
1024
1025 FIXME("No name for: %s - stub\n",debugstr_w(pwszCryptName));
1026 return NULL;
1027}
1028
1029static RTL_CRITICAL_SECTION oidInfoCS;
1030static RTL_CRITICAL_SECTION_DEBUG oidInfoCSDebug =
1031{
1032 0, 0, &oidInfoCS,
1033 { &oidInfoCSDebug.ProcessLocksList, &oidInfoCSDebug.ProcessLocksList },
1034 0, 0, { (DWORD)(DWORD_PTR)(__FILE__ ": oidInfoCS") }
1035};
1036static RTL_CRITICAL_SECTION oidInfoCS = { &oidInfoCSDebug, -1, 0, 0, 0, 0 };
1037static struct list oidInfo = { &oidInfo, &oidInfo };
1038
1039static const WCHAR tripledes[] = { '3','d','e','s',0 };
1040static const WCHAR cms3deswrap[] = { 'C','M','S','3','D','E','S','w','r','a',
1041 'p',0 };
1042static const WCHAR cmsrc2wrap[] = { 'C','M','S','R','C','2','w','r','a','p',0 };
1043static const WCHAR des[] = { 'd','e','s',0 };
1044static const WCHAR md2[] = { 'm','d','2',0 };
1045static const WCHAR md4[] = { 'm','d','4',0 };
1046static const WCHAR md5[] = { 'm','d','5',0 };
1047static const WCHAR rc2[] = { 'r','c','2',0 };
1048static const WCHAR rc4[] = { 'r','c','4',0 };
1049static const WCHAR sha[] = { 's','h','a',0 };
1050static const WCHAR sha1[] = { 's','h','a','1',0 };
1051static const WCHAR RSA[] = { 'R','S','A',0 };
1052static const WCHAR RSA_KEYX[] = { 'R','S','A','_','K','E','Y','X',0 };
1053static const WCHAR RSA_SIGN[] = { 'R','S','A','_','S','I','G','N',0 };
1054static const WCHAR DSA[] = { 'D','S','A',0 };
1055static const WCHAR DSA_SIGN[] = { 'D','S','A','_','S','I','G','N',0 };
1056static const WCHAR DH[] = { 'D','H',0 };
1057static const WCHAR DSS[] = { 'D','S','S',0 };
1058static const WCHAR mosaicKMandUpdSig[] =
1059 { 'm','o','s','a','i','c','K','M','a','n','d','U','p','d','S','i','g',0 };
1060static const WCHAR ESDH[] = { 'E','S','D','H',0 };
1061static const WCHAR NO_SIGN[] = { 'N','O','S','I','G','N',0 };
1062static const WCHAR dsaSHA1[] = { 'd','s','a','S','H','A','1',0 };
1063static const WCHAR md2RSA[] = { 'm','d','2','R','S','A',0 };
1064static const WCHAR md4RSA[] = { 'm','d','4','R','S','A',0 };
1065static const WCHAR md5RSA[] = { 'm','d','5','R','S','A',0 };
1066static const WCHAR shaDSA[] = { 's','h','a','D','S','A',0 };
1067static const WCHAR sha1DSA[] = { 's','h','a','1','D','S','A',0 };
1068static const WCHAR shaRSA[] = { 's','h','a','R','S','A',0 };
1069static const WCHAR sha1RSA[] = { 's','h','a','1','R','S','A',0 };
1070static const WCHAR mosaicUpdatedSig[] =
1071 { 'm','o','s','a','i','c','U','p','d','a','t','e','d','S','i','g',0 };
1072static const WCHAR CN[] = { 'C','N',0 };
1073static const WCHAR L[] = { 'L',0 };
1074static const WCHAR O[] = { 'O',0 };
1075static const WCHAR OU[] = { 'O','U',0 };
1076static const WCHAR E[] = { 'E',0 };
1077static const WCHAR C[] = { 'C',0 };
1078static const WCHAR S[] = { 'S',0 };
1079static const WCHAR ST[] = { 'S','T',0 };
1080static const WCHAR STREET[] = { 'S','T','R','E','E','T',0 };
1081static const WCHAR T[] = { 'T',0 };
1082static const WCHAR Title[] = { 'T','i','t','l','e',0 };
1083static const WCHAR G[] = { 'G',0 };
1084static const WCHAR GivenName[] = { 'G','i','v','e','n','N','a','m','e',0 };
1085static const WCHAR I[] = { 'I',0 };
1086static const WCHAR Initials[] = { 'I','n','i','t','i','a','l','s',0 };
1087static const WCHAR SN[] = { 'S','N',0 };
1088static const WCHAR DC[] = { 'D','C',0 };
1089static const WCHAR Description[] =
1090 { 'D','e','s','c','r','i','p','t','i','o','n',0 };
1091static const WCHAR PostalCode[] = { 'P','o','s','t','a','l','C','o','d','e',0 };
1092static const WCHAR POBox[] = { 'P','O','B','o','x',0 };
1093static const WCHAR Phone[] = { 'P','h','o','n','e',0 };
1094static const WCHAR X21Address[] = { 'X','2','1','A','d','d','r','e','s','s',0 };
1095static const WCHAR dnQualifier[] =
1096 { 'd','n','Q','u','a','l','i','f','i','e','r',0 };
1097static const WCHAR Email[] = { 'E','m','a','i','l',0 };
1098static const WCHAR GN[] = { 'G','N',0 };
1099
1100static const DWORD noNullFlag = CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
1101static const DWORD mosaicFlags = CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
1102 CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
1103static const CRYPT_DATA_BLOB noNullBlob = { sizeof(noNullFlag),
1104 (LPBYTE)&noNullFlag };
1105static const CRYPT_DATA_BLOB mosaicFlagsBlob = { sizeof(mosaicFlags),
1106 (LPBYTE)&mosaicFlags };
1107
1108static const DWORD rsaSign = CALG_RSA_SIGN;
1109static const DWORD dssSign[2] = { CALG_DSS_SIGN,
1110 CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1111static const DWORD mosaicSign[2] = { CALG_DSS_SIGN,
1112 CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
1113 CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1114static const CRYPT_DATA_BLOB rsaSignBlob = { sizeof(rsaSign),
1115 (LPBYTE)&rsaSign };
1116static const CRYPT_DATA_BLOB dssSignBlob = { sizeof(dssSign),
1117 (LPBYTE)dssSign };
1118static const CRYPT_DATA_BLOB mosaicSignBlob = { sizeof(mosaicSign),
1119 (LPBYTE)mosaicSign };
1120
1121static const DWORD ia5String[] = { CERT_RDN_IA5_STRING, 0 };
1122static const DWORD numericString[] = { CERT_RDN_NUMERIC_STRING, 0 };
1123static const DWORD printableString[] = { CERT_RDN_PRINTABLE_STRING, 0 };
1124static const DWORD domainCompTypes[] = { CERT_RDN_IA5_STRING,
1125 CERT_RDN_UTF8_STRING, 0 };
1126static const CRYPT_DATA_BLOB ia5StringBlob = { sizeof(ia5String),
1127 (LPBYTE)ia5String };
1128static const CRYPT_DATA_BLOB numericStringBlob = { sizeof(numericString),
1129 (LPBYTE)numericString };
1130static const CRYPT_DATA_BLOB printableStringBlob = { sizeof(printableString),
1131 (LPBYTE)printableString };
1132static const CRYPT_DATA_BLOB domainCompTypesBlob = { sizeof(domainCompTypes),
1133 (LPBYTE)domainCompTypes };
1134
1135static const struct OIDInfoConstructor {
1136 DWORD dwGroupId;
1137 LPCSTR pszOID;
1138 UINT Algid;
1139 LPCWSTR pwszName;
1140 const CRYPT_DATA_BLOB *blob;
1141} oidInfoConstructors[] = {
1142 { 1, szOID_OIWSEC_sha1, CALG_SHA1, sha1, NULL },
1143 { 1, szOID_OIWSEC_sha1, CALG_SHA1, sha, NULL },
1144 { 1, szOID_OIWSEC_sha, CALG_SHA, sha, NULL },
1145 { 1, szOID_RSA_MD5, CALG_MD5, md5, NULL },
1146 { 1, szOID_RSA_MD4, CALG_MD4, md4, NULL },
1147 { 1, szOID_RSA_MD2, CALG_MD2, md2, NULL },
1148
1149 { 2, szOID_OIWSEC_desCBC, CALG_DES, des, NULL },
1150 { 2, szOID_RSA_DES_EDE3_CBC, CALG_3DES, tripledes, NULL },
1151 { 2, szOID_RSA_RC2CBC, CALG_RC2, rc2, NULL },
1152 { 2, szOID_RSA_RC4, CALG_RC4, rc4, NULL },
1153 { 2, szOID_RSA_SMIMEalgCMS3DESwrap, CALG_3DES, cms3deswrap, NULL },
1154 { 2, szOID_RSA_SMIMEalgCMSRC2wrap, CALG_RC2, cmsrc2wrap, NULL },
1155
1156 { 3, szOID_RSA_RSA, CALG_RSA_KEYX, RSA, NULL },
1157 { 3, szOID_X957_DSA, CALG_DSS_SIGN, DSA, &noNullBlob },
1158 { 3, szOID_ANSI_X942_DH, CALG_DH_SF, DH, &noNullBlob },
1159 { 3, szOID_RSA_RSA, CALG_RSA_KEYX, RSA_KEYX, NULL },
1160 { 3, szOID_RSA_RSA, CALG_RSA_SIGN, RSA, NULL },
1161 { 3, szOID_RSA_RSA, CALG_RSA_SIGN, RSA_SIGN, NULL },
1162 { 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, DSA, &noNullBlob },
1163 { 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, DSS, &noNullBlob },
1164 { 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, DSA_SIGN, &noNullBlob },
1165 { 3, szOID_RSA_DH, CALG_DH_SF, DH, &noNullBlob },
1166 { 3, szOID_OIWSEC_rsaXchg, CALG_RSA_KEYX, RSA_KEYX, NULL },
1167 { 3, szOID_INFOSEC_mosaicKMandUpdSig, CALG_DSS_SIGN, mosaicKMandUpdSig,
1168 &mosaicFlagsBlob },
1169 { 3, szOID_RSA_SMIMEalgESDH, CALG_DH_EPHEM, ESDH, &noNullBlob },
1170 { 3, szOID_PKIX_NO_SIGNATURE, CALG_NO_SIGN, NO_SIGN, NULL },
1171
1172 { 4, szOID_RSA_SHA1RSA, CALG_SHA1, sha1RSA, &rsaSignBlob },
1173 { 4, szOID_RSA_MD5RSA, CALG_MD5, md5RSA, &rsaSignBlob },
1174 { 4, szOID_X957_SHA1DSA, CALG_SHA1, sha1DSA, &dssSignBlob },
1175 { 4, szOID_OIWSEC_sha1RSASign, CALG_SHA1, sha1RSA, &rsaSignBlob },
1176 { 4, szOID_OIWSEC_sha1RSASign, CALG_SHA1, shaRSA, &rsaSignBlob },
1177 { 4, szOID_OIWSEC_shaRSA, CALG_SHA1, shaRSA, &rsaSignBlob },
1178 { 4, szOID_OIWSEC_md5RSA, CALG_MD5, md5RSA, &rsaSignBlob },
1179 { 4, szOID_RSA_MD2RSA, CALG_MD2, md2RSA, &rsaSignBlob },
1180 { 4, szOID_RSA_MD4RSA, CALG_MD4, md4RSA, &rsaSignBlob },
1181 { 4, szOID_OIWSEC_md4RSA, CALG_MD4, md4RSA, &rsaSignBlob },
1182 { 4, szOID_OIWSEC_md4RSA2, CALG_MD4, md4RSA, &rsaSignBlob },
1183 { 4, szOID_OIWDIR_md2RSA, CALG_MD2, md2RSA, &rsaSignBlob },
1184 { 4, szOID_OIWSEC_shaDSA, CALG_SHA1, sha1DSA, &dssSignBlob },
1185 { 4, szOID_OIWSEC_shaDSA, CALG_SHA1, shaDSA, &dssSignBlob },
1186 { 4, szOID_OIWSEC_dsaSHA1, CALG_SHA1, dsaSHA1, &dssSignBlob },
1187 { 4, szOID_INFOSEC_mosaicUpdatedSig, CALG_SHA1, mosaicUpdatedSig,
1188 &mosaicSignBlob },
1189
1190 { 5, szOID_COMMON_NAME, 0, CN, NULL },
1191 { 5, szOID_LOCALITY_NAME, 0, L, NULL },
1192 { 5, szOID_ORGANIZATION_NAME, 0, O, NULL },
1193 { 5, szOID_ORGANIZATIONAL_UNIT_NAME, 0, OU, NULL },
1194 { 5, szOID_RSA_emailAddr, 0, E, &ia5StringBlob },
1195 { 5, szOID_RSA_emailAddr, 0, Email, &ia5StringBlob },
1196 { 5, szOID_COUNTRY_NAME, 0, C, &printableStringBlob },
1197 { 5, szOID_STATE_OR_PROVINCE_NAME, 0, S, NULL },
1198 { 5, szOID_STATE_OR_PROVINCE_NAME, 0, ST, NULL },
1199 { 5, szOID_STREET_ADDRESS, 0, STREET, NULL },
1200 { 5, szOID_TITLE, 0, T, NULL },
1201 { 5, szOID_TITLE, 0, Title, NULL },
1202 { 5, szOID_GIVEN_NAME, 0, G, NULL },
1203 { 5, szOID_GIVEN_NAME, 0, GN, NULL },
1204 { 5, szOID_GIVEN_NAME, 0, GivenName, NULL },
1205 { 5, szOID_INITIALS, 0, I, NULL },
1206 { 5, szOID_INITIALS, 0, Initials, NULL },
1207 { 5, szOID_SUR_NAME, 0, SN, NULL },
1208 { 5, szOID_DOMAIN_COMPONENT, 0, DC, &domainCompTypesBlob },
1209 { 5, szOID_DESCRIPTION, 0, Description, NULL },
1210 { 5, szOID_POSTAL_CODE, 0, PostalCode, NULL },
1211 { 5, szOID_POST_OFFICE_BOX, 0, POBox, NULL },
1212 { 5, szOID_TELEPHONE_NUMBER, 0, Phone, &printableStringBlob },
1213 { 5, szOID_X21_ADDRESS, 0, X21Address, &numericStringBlob },
1214 { 5, szOID_DN_QUALIFIER, 0, dnQualifier, NULL },
1215
1216 { 6, szOID_AUTHORITY_KEY_IDENTIFIER2, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
1217 { 6, szOID_AUTHORITY_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
1218 { 6, szOID_KEY_ATTRIBUTES, 0, (LPCWSTR)IDS_KEY_ATTRIBUTES, NULL },
1219 { 6, szOID_KEY_USAGE_RESTRICTION, 0, (LPCWSTR)IDS_KEY_USAGE_RESTRICTION, NULL },
1220 { 6, szOID_SUBJECT_ALT_NAME2, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
1221 { 6, szOID_SUBJECT_ALT_NAME, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
1222 { 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
1223 { 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
1224 { 6, szOID_BASIC_CONSTRAINTS2, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
1225 { 6, szOID_BASIC_CONSTRAINTS, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
1226 { 6, szOID_KEY_USAGE, 0, (LPCWSTR)IDS_KEY_USAGE, NULL },
1227 { 6, szOID_CERT_POLICIES, 0, (LPCWSTR)IDS_CERT_POLICIES, NULL },
1228 { 6, szOID_SUBJECT_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_SUBJECT_KEY_IDENTIFIER, NULL },
1229 { 6, szOID_CRL_REASON_CODE, 0, (LPCWSTR)IDS_CRL_REASON_CODE, NULL },
1230 { 6, szOID_CRL_DIST_POINTS, 0, (LPCWSTR)IDS_CRL_DIST_POINTS, NULL },
1231 { 6, szOID_ENHANCED_KEY_USAGE, 0, (LPCWSTR)IDS_ENHANCED_KEY_USAGE, NULL },
1232 { 6, szOID_AUTHORITY_INFO_ACCESS, 0, (LPCWSTR)IDS_AUTHORITY_INFO_ACCESS, NULL },
1233 { 6, szOID_CERT_EXTENSIONS, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
1234 { 6, szOID_RSA_certExtensions, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
1235 { 6, szOID_NEXT_UPDATE_LOCATION, 0, (LPCWSTR)IDS_NEXT_UPDATE_LOCATION, NULL },
1236 { 6, szOID_YESNO_TRUST_ATTR, 0, (LPCWSTR)IDS_YES_OR_NO_TRUST, NULL },
1237 { 6, szOID_RSA_emailAddr, 0, (LPCWSTR)IDS_EMAIL_ADDRESS, NULL },
1238 { 6, szOID_RSA_unstructName, 0, (LPCWSTR)IDS_UNSTRUCTURED_NAME, NULL },
1239 { 6, szOID_RSA_contentType, 0, (LPCWSTR)IDS_CONTENT_TYPE, NULL },
1240 { 6, szOID_RSA_messageDigest, 0, (LPCWSTR)IDS_MESSAGE_DIGEST, NULL },
1241 { 6, szOID_RSA_signingTime, 0, (LPCWSTR)IDS_SIGNING_TIME, NULL },
1242 { 6, szOID_RSA_counterSign, 0, (LPCWSTR)IDS_COUNTER_SIGN, NULL },
1243 { 6, szOID_RSA_challengePwd, 0, (LPCWSTR)IDS_CHALLENGE_PASSWORD, NULL },
1244 { 6, szOID_RSA_unstructAddr, 0, (LPCWSTR)IDS_UNSTRUCTURED_ADDRESS, NULL },
1245 { 6, szOID_RSA_SMIMECapabilities, 0, (LPCWSTR)IDS_SMIME_CAPABILITIES, NULL },
1246 { 6, szOID_RSA_preferSignedData, 0, (LPCWSTR)IDS_PREFER_SIGNED_DATA, NULL },
1247 { 6, szOID_PKIX_POLICY_QUALIFIER_CPS, 0, (LPCWSTR)IDS_CPS, NULL },
1248 { 6, szOID_PKIX_POLICY_QUALIFIER_USERNOTICE, 0, (LPCWSTR)IDS_USER_NOTICE, NULL },
1249 { 6, szOID_PKIX_OCSP, 0, (LPCWSTR)IDS_OCSP, NULL },
1250 { 6, szOID_PKIX_CA_ISSUERS, 0, (LPCWSTR)IDS_CA_ISSUER, NULL },
1251 { 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TEMPLATE_NAME, NULL },
1252 { 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TYPE, NULL },
1253 { 6, szOID_CERT_MANIFOLD, 0, (LPCWSTR)IDS_CERT_MANIFOLD, NULL },
1254 { 6, szOID_NETSCAPE_CERT_TYPE, 0, (LPCWSTR)IDS_NETSCAPE_CERT_TYPE, NULL },
1255 { 6, szOID_NETSCAPE_BASE_URL, 0, (LPCWSTR)IDS_NETSCAPE_BASE_URL, NULL },
1256 { 6, szOID_NETSCAPE_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_REVOCATION_URL, NULL },
1257 { 6, szOID_NETSCAPE_CA_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_REVOCATION_URL, NULL },
1258 { 6, szOID_NETSCAPE_CERT_RENEWAL_URL, 0, (LPCWSTR)IDS_NETSCAPE_CERT_RENEWAL_URL, NULL },
1259 { 6, szOID_NETSCAPE_CA_POLICY_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_POLICY_URL, NULL },
1260 { 6, szOID_NETSCAPE_SSL_SERVER_NAME, 0, (LPCWSTR)IDS_NETSCAPE_SSL_SERVER_NAME, NULL },
1261 { 6, szOID_NETSCAPE_COMMENT, 0, (LPCWSTR)IDS_NETSCAPE_COMMENT, NULL },
1262 { 6, "1.3.6.1.4.1.311.2.1.10", 0, (LPCWSTR)IDS_SPC_SP_AGENCY_INFO, NULL },
1263 { 6, "1.3.6.1.4.1.311.2.1.27", 0, (LPCWSTR)IDS_SPC_FINANCIAL_CRITERIA, NULL },
1264 { 6, "1.3.6.1.4.1.311.2.1.26", 0, (LPCWSTR)IDS_SPC_MINIMAL_CRITERIA, NULL },
1265 { 6, szOID_COUNTRY_NAME, 0, (LPCWSTR)IDS_COUNTRY, NULL },
1266 { 6, szOID_ORGANIZATION_NAME, 0, (LPCWSTR)IDS_ORGANIZATION, NULL },
1267 { 6, szOID_ORGANIZATIONAL_UNIT_NAME, 0, (LPCWSTR)IDS_ORGANIZATIONAL_UNIT, NULL },
1268 { 6, szOID_COMMON_NAME, 0, (LPCWSTR)IDS_COMMON_NAME, NULL },
1269 { 6, szOID_LOCALITY_NAME, 0, (LPCWSTR)IDS_LOCALITY, NULL },
1270 { 6, szOID_STATE_OR_PROVINCE_NAME, 0, (LPCWSTR)IDS_STATE_OR_PROVINCE, NULL },
1271 { 6, szOID_TITLE, 0, (LPCWSTR)IDS_TITLE, NULL },
1272 { 6, szOID_GIVEN_NAME, 0, (LPCWSTR)IDS_GIVEN_NAME, NULL },
1273 { 6, szOID_INITIALS, 0, (LPCWSTR)IDS_INITIALS, NULL },
1274 { 6, szOID_SUR_NAME, 0, (LPCWSTR)IDS_SUR_NAME, NULL },
1275 { 6, szOID_DOMAIN_COMPONENT, 0, (LPCWSTR)IDS_DOMAIN_COMPONENT, NULL },
1276 { 6, szOID_STREET_ADDRESS, 0, (LPCWSTR)IDS_STREET_ADDRESS, NULL },
1277 { 6, szOID_DEVICE_SERIAL_NUMBER, 0, (LPCWSTR)IDS_SERIAL_NUMBER, NULL },
1278 { 6, szOID_CERTSRV_CA_VERSION, 0, (LPCWSTR)IDS_CA_VERSION, NULL },
1279 { 6, szOID_CERTSRV_CROSSCA_VERSION, 0, (LPCWSTR)IDS_CROSS_CA_VERSION, NULL },
1280 { 6, szOID_SERIALIZED, 0, (LPCWSTR)IDS_SERIALIZED_SIG_SERIAL_NUMBER, NULL },
1281 { 6, szOID_NT_PRINCIPAL_NAME, 0, (LPCWSTR)IDS_PRINCIPAL_NAME, NULL },
1282 { 6, szOID_PRODUCT_UPDATE, 0, (LPCWSTR)IDS_WINDOWS_PRODUCT_UPDATE, NULL },
1283 { 6, szOID_ENROLLMENT_NAME_VALUE_PAIR, 0, (LPCWSTR)IDS_ENROLLMENT_NAME_VALUE_PAIR, NULL },
1284 { 6, szOID_OS_VERSION, 0, (LPCWSTR)IDS_OS_VERSION, NULL },
1285 { 6, szOID_ENROLLMENT_CSP_PROVIDER, 0, (LPCWSTR)IDS_ENROLLMENT_CSP, NULL },
1286 { 6, szOID_CRL_NUMBER, 0, (LPCWSTR)IDS_CRL_NUMBER, NULL },
1287 { 6, szOID_DELTA_CRL_INDICATOR, 0, (LPCWSTR)IDS_DELTA_CRL_INDICATOR, NULL },
1288 { 6, szOID_ISSUING_DIST_POINT, 0, (LPCWSTR)IDS_ISSUING_DIST_POINT, NULL },
1289 { 6, szOID_FRESHEST_CRL, 0, (LPCWSTR)IDS_FRESHEST_CRL, NULL },
1290 { 6, szOID_NAME_CONSTRAINTS, 0, (LPCWSTR)IDS_NAME_CONSTRAINTS, NULL },
1291 { 6, szOID_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
1292 { 6, szOID_LEGACY_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
1293 { 6, szOID_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_POLICY_CONSTRAINTS, NULL },
1294 { 6, szOID_CROSS_CERT_DIST_POINTS, 0, (LPCWSTR)IDS_CROSS_CERT_DIST_POINTS, NULL },
1295 { 6, szOID_APPLICATION_CERT_POLICIES, 0, (LPCWSTR)IDS_APPLICATION_POLICIES, NULL },
1296 { 6, szOID_APPLICATION_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_MAPPINGS, NULL },
1297 { 6, szOID_APPLICATION_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_CONSTRAINTS, NULL },
1298 { 6, szOID_CT_PKI_DATA, 0, (LPCWSTR)IDS_CMC_DATA, NULL },
1299 { 6, szOID_CT_PKI_RESPONSE, 0, (LPCWSTR)IDS_CMC_RESPONSE, NULL },
1300 { 6, szOID_CMC, 0, (LPCWSTR)IDS_UNSIGNED_CMC_REQUEST, NULL },
1301 { 6, szOID_CMC_STATUS_INFO, 0, (LPCWSTR)IDS_CMC_STATUS_INFO, NULL },
1302 { 6, szOID_CMC_ADD_EXTENSIONS, 0, (LPCWSTR)IDS_CMC_EXTENSIONS, NULL },
1303 { 6, szOID_CTL, 0, (LPCWSTR)IDS_CMC_ATTRIBUTES, NULL },
1304 { 6, szOID_RSA_data, 0, (LPCWSTR)IDS_PKCS_7_DATA, NULL },
1305 { 6, szOID_RSA_signedData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED, NULL },
1306 { 6, szOID_RSA_envelopedData, 0, (LPCWSTR)IDS_PKCS_7_ENVELOPED, NULL },
1307 { 6, szOID_RSA_signEnvData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED_ENVELOPED, NULL },
1308 { 6, szOID_RSA_digestedData, 0, (LPCWSTR)IDS_PKCS_7_DIGESTED, NULL },
1309 { 6, szOID_RSA_encryptedData, 0, (LPCWSTR)IDS_PKCS_7_ENCRYPTED, NULL },
1310 { 6, szOID_CERTSRV_PREVIOUS_CERT_HASH, 0, (LPCWSTR)IDS_PREVIOUS_CA_CERT_HASH, NULL },
1311 { 6, szOID_CRL_VIRTUAL_BASE, 0, (LPCWSTR)IDS_CRL_VIRTUAL_BASE, NULL },
1312 { 6, szOID_CRL_NEXT_PUBLISH, 0, (LPCWSTR)IDS_CRL_NEXT_PUBLISH, NULL },
1313 { 6, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
1314 { 6, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
1315 { 6, szOID_CERTIFICATE_TEMPLATE, 0, (LPCWSTR)IDS_CERTIFICATE_TEMPLATE, NULL },
1316 { 6, szOID_ENTERPRISE_OID_ROOT, 0, (LPCWSTR)IDS_ENTERPRISE_ROOT_OID, NULL },
1317 { 6, szOID_RDN_DUMMY_SIGNER, 0, (LPCWSTR)IDS_RDN_DUMMY_SIGNER, NULL },
1318 { 6, szOID_ARCHIVED_KEY_ATTR, 0, (LPCWSTR)IDS_ARCHIVED_KEY_ATTR, NULL },
1319 { 6, szOID_CRL_SELF_CDP, 0, (LPCWSTR)IDS_CRL_SELF_CDP, NULL },
1320 { 6, szOID_REQUIRE_CERT_CHAIN_POLICY, 0, (LPCWSTR)IDS_REQUIRE_CERT_CHAIN_POLICY, NULL },
1321 { 6, szOID_CMC_TRANSACTION_ID, 0, (LPCWSTR)IDS_TRANSACTION_ID, NULL },
1322 { 6, szOID_CMC_SENDER_NONCE, 0, (LPCWSTR)IDS_SENDER_NONCE, NULL },
1323 { 6, szOID_CMC_RECIPIENT_NONCE, 0, (LPCWSTR)IDS_RECIPIENT_NONCE, NULL },
1324 { 6, szOID_CMC_REG_INFO, 0, (LPCWSTR)IDS_REG_INFO, NULL },
1325 { 6, szOID_CMC_GET_CERT, 0, (LPCWSTR)IDS_GET_CERTIFICATE, NULL },
1326 { 6, szOID_CMC_GET_CRL, 0, (LPCWSTR)IDS_GET_CRL, NULL },
1327 { 6, szOID_CMC_REVOKE_REQUEST, 0, (LPCWSTR)IDS_REVOKE_REQUEST, NULL },
1328 { 6, szOID_CMC_QUERY_PENDING, 0, (LPCWSTR)IDS_QUERY_PENDING, NULL },
1329 { 6, szOID_SORTED_CTL, 0, (LPCWSTR)IDS_SORTED_CTL, NULL },
1330 { 6, szOID_ARCHIVED_KEY_CERT_HASH, 0, (LPCWSTR)IDS_ARCHIVED_KEY_CERT_HASH, NULL },
1331 { 6, szOID_PRIVATEKEY_USAGE_PERIOD, 0, (LPCWSTR)IDS_PRIVATE_KEY_USAGE_PERIOD, NULL },
1332 { 6, szOID_REQUEST_CLIENT_INFO, 0, (LPCWSTR)IDS_CLIENT_INFORMATION, NULL },
1333
1334 { 7, szOID_PKIX_KP_SERVER_AUTH, 0, (LPCWSTR)IDS_SERVER_AUTHENTICATION, NULL },
1335 { 7, szOID_PKIX_KP_CLIENT_AUTH, 0, (LPCWSTR)IDS_CLIENT_AUTHENTICATION, NULL },
1336 { 7, szOID_PKIX_KP_CODE_SIGNING, 0, (LPCWSTR)IDS_CODE_SIGNING, NULL },
1337 { 7, szOID_PKIX_KP_EMAIL_PROTECTION, 0, (LPCWSTR)IDS_SECURE_EMAIL, NULL },
1338 { 7, szOID_PKIX_KP_TIMESTAMP_SIGNING, 0, (LPCWSTR)IDS_TIME_STAMPING, NULL },
1339 { 7, szOID_KP_CTL_USAGE_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TRUST_LIST_SIGNING, NULL },
1340 { 7, szOID_KP_TIME_STAMP_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TIME_STAMPING, NULL },
1341 { 7, szOID_PKIX_KP_IPSEC_END_SYSTEM, 0, (LPCWSTR)IDS_IPSEC_END_SYSTEM, NULL },
1342 { 7, szOID_PKIX_KP_IPSEC_TUNNEL, 0, (LPCWSTR)IDS_IPSEC_TUNNEL, NULL },
1343 { 7, szOID_PKIX_KP_IPSEC_USER, 0, (LPCWSTR)IDS_IPSEC_USER, NULL },
1344 { 7, szOID_KP_EFS, 0, (LPCWSTR)IDS_EFS, NULL },
1345 { 7, szOID_WHQL_CRYPTO, 0, (LPCWSTR)IDS_WHQL_CRYPTO, NULL },
1346 { 7, szOID_NT5_CRYPTO, 0, (LPCWSTR)IDS_NT5_CRYPTO, NULL },
1347 { 7, szOID_OEM_WHQL_CRYPTO, 0, (LPCWSTR)IDS_OEM_WHQL_CRYPTO, NULL },
1348 { 7, szOID_EMBEDDED_NT_CRYPTO, 0, (LPCWSTR)IDS_EMBEDDED_NT_CRYPTO, NULL },
1349 { 7, szOID_LICENSES, 0, (LPCWSTR)IDS_KEY_PACK_LICENSES, NULL },
1350 { 7, szOID_LICENSE_SERVER, 0, (LPCWSTR)IDS_LICENSE_SERVER, NULL },
1351 { 7, szOID_KP_SMARTCARD_LOGON, 0, (LPCWSTR)IDS_SMART_CARD_LOGON, NULL },
1352 { 7, szOID_DRM, 0, (LPCWSTR)IDS_DIGITAL_RIGHTS, NULL },
1353 { 7, szOID_KP_QUALIFIED_SUBORDINATION, 0, (LPCWSTR)IDS_QUALIFIED_SUBORDINATION, NULL },
1354 { 7, szOID_KP_KEY_RECOVERY, 0, (LPCWSTR)IDS_KEY_RECOVERY, NULL },
1355 { 7, szOID_KP_DOCUMENT_SIGNING, 0, (LPCWSTR)IDS_DOCUMENT_SIGNING, NULL },
1356 { 7, szOID_IPSEC_KP_IKE_INTERMEDIATE, 0, (LPCWSTR)IDS_IPSEC_IKE_INTERMEDIATE, NULL },
1357 { 7, szOID_EFS_RECOVERY, 0, (LPCWSTR)IDS_FILE_RECOVERY, NULL },
1358 { 7, szOID_ROOT_LIST_SIGNER, 0, (LPCWSTR)IDS_ROOT_LIST_SIGNER, NULL },
1359 { 7, szOID_ANY_APPLICATION_POLICY, 0, (LPCWSTR)IDS_ANY_APPLICATION_POLICIES, NULL },
1360 { 7, szOID_DS_EMAIL_REPLICATION, 0, (LPCWSTR)IDS_DS_EMAIL_REPLICATION, NULL },
1361 { 7, szOID_ENROLLMENT_AGENT, 0, (LPCWSTR)IDS_ENROLLMENT_AGENT, NULL },
1362 { 7, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
1363 { 7, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
1364 { 7, szOID_KP_LIFETIME_SIGNING, 0, (LPCWSTR)IDS_LIFETIME_SIGNING, NULL },
1365
1366 { 8, szOID_ANY_CERT_POLICY, 0, (LPCWSTR)IDS_ANY_CERT_POLICY, NULL },
1367};
1368
1369struct OIDInfo {
1370 CRYPT_OID_INFO info;
1371 struct list entry;
1372};
1373
1374static void init_oid_info(void)
1375{
1376 DWORD i;
1377
1378 oid_init_localizednames();
1379 for (i = 0; i < sizeof(oidInfoConstructors) /
1380 sizeof(oidInfoConstructors[0]); i++)
1381 {
1382 if (HIWORD(oidInfoConstructors[i].pwszName))
1383 {
1384 struct OIDInfo *info = NULL;
1385
1386 /* The name is a static string, so just use the same pointer */
1387 info = CryptMemAlloc(sizeof(struct OIDInfo));
1388 if (info)
1389 {
1390#if 1
1391 memset(info, 0, sizeof(*info));
1392 info->info.cbSize = sizeof(CRYPT_OID_INFO);
1393 info->info.pszOID = oidInfoConstructors[i].pszOID;
1394 info->info.pwszName = oidInfoConstructors[i].pwszName;
1395 info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
1396 info->info.u.Algid = oidInfoConstructors[i].Algid;
1397 if (oidInfoConstructors[i].blob)
1398 {
1399 info->info.ExtraInfo.cbData =
1400 oidInfoConstructors[i].blob->cbData;
1401 info->info.ExtraInfo.pbData =
1402 oidInfoConstructors[i].blob->pbData;
1403 }
1404#endif
1405 list_add_tail(&oidInfo, &info->entry);
1406 }
1407 }
1408 else
1409 {
1410 LPCWSTR stringresource = NULL;
1411 int len = LoadStringW(hInstance,
1412 (UINT)(UINT_PTR)oidInfoConstructors[i].pwszName,
1413 (LPWSTR)&stringresource, 0);
1414
1415 if (len)
1416 {
1417 struct OIDInfo *info = CryptMemAlloc(sizeof(struct OIDInfo) +
1418 (len + 1) * sizeof(WCHAR));
1419
1420 if (info)
1421 {
1422#if 1
1423 memset(info, 0, sizeof(*info));
1424 info->info.cbSize = sizeof(CRYPT_OID_INFO);
1425 info->info.pszOID = oidInfoConstructors[i].pszOID;
1426 info->info.pwszName = (LPWSTR)(info + 1);
1427 info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
1428 info->info.u.Algid = oidInfoConstructors[i].Algid;
1429 if (stringresource && (char*)stringresource != (char*)0xAAAAAAAA)
1430 memcpy(info + 1, stringresource, len*sizeof(WCHAR));
1431 ((LPWSTR)(info + 1))[len] = 0;
1432 if (oidInfoConstructors[i].blob)
1433 {
1434 info->info.ExtraInfo.cbData =
1435 oidInfoConstructors[i].blob->cbData;
1436 info->info.ExtraInfo.pbData =
1437 oidInfoConstructors[i].blob->pbData;
1438 }
1439#endif
1440 list_add_tail(&oidInfo, &info->entry);
1441 }
1442 }
1443 }
1444 }
1445}
1446
1447static void free_oid_info(void)
1448{
1449 struct OIDInfo *info, *next;
1450
1451 LIST_FOR_EACH_ENTRY_SAFE(info, next, &oidInfo, struct OIDInfo, entry)
1452 {
1453 if (info > (struct OIDInfo*)0x10000)
1454 {
1455 if (&info->entry > (struct list*)0x10000)
1456 list_remove(&info->entry);
1457 CryptMemFree(info);
1458 }
1459 }
1460}
1461
1462/***********************************************************************
1463 * CryptEnumOIDInfo (CRYPT32.@)
1464 */
1465BOOL WINAPI CryptEnumOIDInfo(DWORD dwGroupId, DWORD dwFlags, void *pvArg,
1466 PFN_CRYPT_ENUM_OID_INFO pfnEnumOIDInfo)
1467{
1468 BOOL ret = TRUE;
1469 struct OIDInfo *info;
1470
1471 TRACE("(%d, %08x, %p, %p)\n", dwGroupId, dwFlags, pvArg,
1472 pfnEnumOIDInfo);
1473
1474 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1475 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1476 {
1477 if (!dwGroupId || dwGroupId == info->info.dwGroupId)
1478 {
1479 ret = pfnEnumOIDInfo(&info->info, pvArg);
1480 if (!ret)
1481 break;
1482 }
1483 }
1484 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1485 return ret;
1486}
1487
1488PCCRYPT_OID_INFO WINAPI CryptFindOIDInfo(DWORD dwKeyType, void *pvKey,
1489 DWORD dwGroupId)
1490{
1491 PCCRYPT_OID_INFO ret = NULL;
1492
1493 TRACE("(%d, %p, %d)\n", dwKeyType, pvKey, dwGroupId);
1494
1495 switch(dwKeyType)
1496 {
1497 case CRYPT_OID_INFO_ALGID_KEY:
1498 {
1499 struct OIDInfo *info;
1500
1501 TRACE("CRYPT_OID_INFO_ALGID_KEY: %d\n", *(DWORD *)pvKey);
1502 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1503 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1504 {
1505 if (info->info.u.Algid == *(DWORD *)pvKey &&
1506 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1507 {
1508 ret = &info->info;
1509 break;
1510 }
1511 }
1512 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1513 break;
1514 }
1515 case CRYPT_OID_INFO_NAME_KEY:
1516 {
1517 struct OIDInfo *info;
1518
1519 TRACE("CRYPT_OID_INFO_NAME_KEY: %s\n", debugstr_w((LPWSTR)pvKey));
1520 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1521 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1522 {
1523 if (!lstrcmpW(info->info.pwszName, (LPWSTR)pvKey) &&
1524 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1525 {
1526 ret = &info->info;
1527 break;
1528 }
1529 }
1530 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1531 break;
1532 }
1533 case CRYPT_OID_INFO_OID_KEY:
1534 {
1535 struct OIDInfo *info;
1536 LPSTR oid = (LPSTR)pvKey;
1537
1538 TRACE("CRYPT_OID_INFO_OID_KEY: %s\n", debugstr_a(oid));
1539 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1540 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1541 {
1542 if (!lstrcmpA(info->info.pszOID, oid) &&
1543 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1544 {
1545 ret = &info->info;
1546 break;
1547 }
1548 }
1549 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1550 break;
1551 }
1552 case CRYPT_OID_INFO_SIGN_KEY:
1553 {
1554 struct OIDInfo *info;
1555
1556 TRACE("CRYPT_OID_INFO_SIGN_KEY: %d\n", *(DWORD *)pvKey);
1557 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1558 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1559 {
1560 if (info->info.u.Algid == *(DWORD *)pvKey &&
1561 info->info.ExtraInfo.cbData >= sizeof(DWORD) &&
1562 *(DWORD *)info->info.ExtraInfo.pbData ==
1563 *(DWORD *)((LPBYTE)pvKey + sizeof(DWORD)) &&
1564 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1565 {
1566 ret = &info->info;
1567 break;
1568 }
1569 }
1570 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1571 break;
1572 }
1573 }
1574 return ret;
1575}
1576
1577LPCSTR WINAPI CertAlgIdToOID(DWORD dwAlgId)
1578{
1579 LPCSTR ret;
1580 PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_ALGID_KEY,
1581 &dwAlgId, 0);
1582
1583 if (info)
1584 ret = info->pszOID;
1585 else
1586 ret = NULL;
1587 return ret;
1588}
1589
1590DWORD WINAPI CertOIDToAlgId(LPCSTR pszObjId)
1591{
1592 DWORD ret;
1593 PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_OID_KEY,
1594 (void *)pszObjId, 0);
1595
1596 if (info)
1597 ret = info->u.Algid;
1598 else
1599 ret = 0;
1600 return ret;
1601}
Note: See TracBrowser for help on using the repository browser.